diff options
Diffstat (limited to 'tests/integration/test_execute_code.py')
-rw-r--r-- | tests/integration/test_execute_code.py | 136 |
1 files changed, 0 insertions, 136 deletions
diff --git a/tests/integration/test_execute_code.py b/tests/integration/test_execute_code.py deleted file mode 100644 index b7be8622a..000000000 --- a/tests/integration/test_execute_code.py +++ /dev/null @@ -1,136 +0,0 @@ -import os -import random -import re -import string -import tempfile - -import pytest - -import autogpt.commands.execute_code as sut # system under testing -from autogpt.agent.agent import Agent -from autogpt.config import Config - - -@pytest.fixture -def random_code(random_string) -> str: - return f"print('Hello {random_string}!')" - - -@pytest.fixture -def python_test_file(config: Config, random_code: str) -> str: - temp_file = tempfile.NamedTemporaryFile(dir=config.workspace_path, suffix=".py") - temp_file.write(str.encode(random_code)) - temp_file.flush() - - yield temp_file.name - temp_file.close() - - -@pytest.fixture -def random_string(): - return "".join(random.choice(string.ascii_lowercase) for _ in range(10)) - - -def test_execute_python_file(python_test_file: str, random_string: str, agent: Agent): - result: str = sut.execute_python_file(python_test_file, agent=agent) - assert result.replace("\r", "") == f"Hello {random_string}!\n" - - -def test_execute_python_code(random_code: str, random_string: str, agent: Agent): - ai_name = agent.ai_name - - result: str = sut.execute_python_code(random_code, "test_code", agent=agent) - assert result.replace("\r", "") == f"Hello {random_string}!\n" - - # Check that the code is stored - destination = os.path.join( - agent.config.workspace_path, ai_name, "executed_code", "test_code.py" - ) - with open(destination) as f: - assert f.read() == random_code - - -def test_execute_python_code_disallows_name_arg_path_traversal( - random_code: str, agent: Agent -): - result: str = sut.execute_python_code( - random_code, name="../../test_code", agent=agent - ) - assert "Error:" in result, "Path traversal in 'name' argument does not return error" - assert "path traversal" in result.lower() - - # Check that the code is not stored in parent directory - dst_with_traversal = agent.workspace.get_path("test_code.py") - assert not dst_with_traversal.is_file(), "Path traversal by filename not prevented" - - -def test_execute_python_code_overwrites_file(random_code: str, agent: Agent): - ai_name = agent.ai_name - destination = os.path.join( - agent.config.workspace_path, ai_name, "executed_code", "test_code.py" - ) - os.makedirs(os.path.dirname(destination), exist_ok=True) - - with open(destination, "w+") as f: - f.write("This will be overwritten") - - sut.execute_python_code(random_code, "test_code.py", agent=agent) - - # Check that the file is updated with the new code - with open(destination) as f: - assert f.read() == random_code - - -def test_execute_python_file_invalid(agent: Agent): - assert all( - s in sut.execute_python_file("not_python", agent).lower() - for s in ["error:", "invalid", ".py"] - ) - - -def test_execute_python_file_not_found(agent: Agent): - result = sut.execute_python_file("notexist.py", agent).lower() - assert re.match(r"python: can't open file '([A-Z]:)?[/\\\-\w]*notexist.py'", result) - assert "[errno 2] no such file or directory" in result - - -def test_execute_shell(random_string: str, agent: Agent): - result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) - assert f"Hello {random_string}!" in result - - -def test_execute_shell_local_commands_not_allowed(random_string: str, agent: Agent): - result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) - assert f"Hello {random_string}!" in result - - -def test_execute_shell_denylist_should_deny(agent: Agent, random_string: str): - agent.config.shell_denylist = ["echo"] - - result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) - assert "Error:" in result and "not allowed" in result - - -def test_execute_shell_denylist_should_allow(agent: Agent, random_string: str): - agent.config.shell_denylist = ["cat"] - - result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) - assert "Hello" in result and random_string in result - assert "Error" not in result - - -def test_execute_shell_allowlist_should_deny(agent: Agent, random_string: str): - agent.config.shell_command_control = sut.ALLOWLIST_CONTROL - agent.config.shell_allowlist = ["cat"] - - result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) - assert "Error:" in result and "not allowed" in result - - -def test_execute_shell_allowlist_should_allow(agent: Agent, random_string: str): - agent.config.shell_command_control = sut.ALLOWLIST_CONTROL - agent.config.shell_allowlist = ["echo"] - - result = sut.execute_shell(f"echo 'Hello {random_string}!'", agent) - assert "Hello" in result and random_string in result - assert "Error" not in result |