722 lines
27 KiB
Python
722 lines
27 KiB
Python
import asyncio
|
|
import secrets
|
|
import string
|
|
import uuid
|
|
from pathlib import Path
|
|
from unittest.mock import patch
|
|
|
|
import pytest
|
|
from sqlalchemy import delete
|
|
|
|
from letta.config import LettaConfig
|
|
from letta.functions.function_sets.base import core_memory_append, core_memory_replace
|
|
from letta.orm.sandbox_config import SandboxConfig, SandboxEnvironmentVariable
|
|
from letta.schemas.agent import AgentState, CreateAgent
|
|
from letta.schemas.block import CreateBlock
|
|
from letta.schemas.environment_variables import AgentEnvironmentVariable, SandboxEnvironmentVariableCreate
|
|
from letta.schemas.organization import Organization
|
|
from letta.schemas.pip_requirement import PipRequirement
|
|
from letta.schemas.sandbox_config import E2BSandboxConfig, LocalSandboxConfig, SandboxConfigCreate
|
|
from letta.schemas.user import User
|
|
from letta.server.server import SyncServer
|
|
from letta.services.organization_manager import OrganizationManager
|
|
from letta.services.sandbox_config_manager import SandboxConfigManager
|
|
from letta.services.tool_manager import ToolManager
|
|
from letta.services.tool_sandbox.e2b_sandbox import AsyncToolSandboxE2B
|
|
from letta.services.tool_sandbox.local_sandbox import AsyncToolSandboxLocal
|
|
from letta.services.user_manager import UserManager
|
|
from tests.helpers.utils import create_tool_from_func
|
|
|
|
# Constants
|
|
namespace = uuid.NAMESPACE_DNS
|
|
org_name = str(uuid.uuid5(namespace, "test-tool-execution-sandbox-org"))
|
|
user_name = str(uuid.uuid5(namespace, "test-tool-execution-sandbox-user"))
|
|
|
|
|
|
# Fixtures
|
|
@pytest.fixture(scope="module")
|
|
def server():
|
|
"""
|
|
Creates a SyncServer instance for testing.
|
|
|
|
Loads and saves config to ensure proper initialization.
|
|
"""
|
|
config = LettaConfig.load()
|
|
|
|
config.save()
|
|
|
|
server = SyncServer(init_with_default_org_and_user=True)
|
|
yield server
|
|
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def clear_tables():
|
|
"""Fixture to clear the organization table before each test."""
|
|
from letta.server.db import db_context
|
|
|
|
with db_context() as session:
|
|
session.execute(delete(SandboxEnvironmentVariable))
|
|
session.execute(delete(SandboxConfig))
|
|
session.commit() # Commit the deletion
|
|
|
|
|
|
@pytest.fixture
|
|
def test_organization():
|
|
"""Fixture to create and return the default organization."""
|
|
org = OrganizationManager().create_organization(Organization(name=org_name))
|
|
yield org
|
|
|
|
|
|
@pytest.fixture
|
|
def test_user(test_organization):
|
|
"""Fixture to create and return the default user within the default organization."""
|
|
user = UserManager().create_user(User(name=user_name, organization_id=test_organization.id))
|
|
yield user
|
|
|
|
|
|
@pytest.fixture
|
|
def add_integers_tool(test_user):
|
|
def add(x: int, y: int) -> int:
|
|
"""
|
|
Simple function that adds two integers.
|
|
|
|
Parameters:
|
|
x (int): The first integer to add.
|
|
y (int): The second integer to add.
|
|
|
|
Returns:
|
|
int: The result of adding x and y.
|
|
"""
|
|
return x + y
|
|
|
|
tool = create_tool_from_func(add)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def cowsay_tool(test_user):
|
|
# This defines a tool for a package we definitely do NOT have in letta
|
|
# If this test passes, that means the tool was correctly executed in a separate Python environment
|
|
def cowsay() -> str:
|
|
"""
|
|
Simple function that uses the cowsay package to print out the secret word env variable.
|
|
|
|
Returns:
|
|
str: The cowsay ASCII art.
|
|
"""
|
|
import os
|
|
|
|
import cowsay
|
|
|
|
cowsay.cow(os.getenv("secret_word"))
|
|
|
|
tool = create_tool_from_func(cowsay)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def get_env_tool(test_user):
|
|
def get_env() -> str:
|
|
"""
|
|
Simple function that returns the secret word env variable.
|
|
|
|
Returns:
|
|
str: The secret word
|
|
"""
|
|
import os
|
|
|
|
secret_word = os.getenv("secret_word")
|
|
print(secret_word)
|
|
return secret_word
|
|
|
|
tool = create_tool_from_func(get_env)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def get_warning_tool(test_user):
|
|
def warn_hello_world() -> str:
|
|
"""
|
|
Simple function that warns hello world.
|
|
|
|
Returns:
|
|
str: hello world
|
|
"""
|
|
import warnings
|
|
|
|
msg = "Hello World"
|
|
warnings.warn(msg)
|
|
return msg
|
|
|
|
tool = create_tool_from_func(warn_hello_world)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def always_err_tool(test_user):
|
|
def error() -> str:
|
|
"""
|
|
Simple function that errors
|
|
|
|
Returns:
|
|
str: not important
|
|
"""
|
|
# Raise a unusual error so we know it's from this function
|
|
print("Going to error now")
|
|
raise ZeroDivisionError("This is an intentionally weird division!")
|
|
|
|
tool = create_tool_from_func(error)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def list_tool(test_user):
|
|
def create_list():
|
|
"""Simple function that returns a list"""
|
|
|
|
return [1] * 5
|
|
|
|
tool = create_tool_from_func(create_list)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def clear_core_memory_tool(test_user):
|
|
def clear_memory(agent_state: "AgentState"):
|
|
"""Clear the core memory"""
|
|
agent_state.memory.get_block("human").value = ""
|
|
agent_state.memory.get_block("persona").value = ""
|
|
|
|
tool = create_tool_from_func(clear_memory)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def external_codebase_tool(test_user):
|
|
from tests.test_tool_sandbox.restaurant_management_system.adjust_menu_prices import adjust_menu_prices
|
|
|
|
tool = create_tool_from_func(adjust_menu_prices)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def agent_state(server):
|
|
actor = server.user_manager.get_user_or_default()
|
|
agent_state = server.create_agent(
|
|
CreateAgent(
|
|
memory_blocks=[
|
|
CreateBlock(
|
|
label="human",
|
|
value="username: sarah",
|
|
),
|
|
CreateBlock(
|
|
label="persona",
|
|
value="This is the persona",
|
|
),
|
|
],
|
|
include_base_tools=True,
|
|
model="openai/gpt-4o-mini",
|
|
tags=["test_agents"],
|
|
embedding="letta/letta-free",
|
|
),
|
|
actor=actor,
|
|
)
|
|
agent_state.tool_rules = []
|
|
yield agent_state
|
|
|
|
|
|
@pytest.fixture
|
|
def custom_test_sandbox_config(test_user):
|
|
"""
|
|
Fixture to create a consistent local sandbox configuration for tests.
|
|
|
|
Args:
|
|
test_user: The test user to be used for creating the sandbox configuration.
|
|
|
|
Returns:
|
|
A tuple containing the SandboxConfigManager and the created sandbox configuration.
|
|
"""
|
|
# Create the SandboxConfigManager
|
|
manager = SandboxConfigManager()
|
|
|
|
# Set the sandbox to be within the external codebase path and use a venv
|
|
external_codebase_path = str(Path(__file__).parent / "test_tool_sandbox" / "restaurant_management_system")
|
|
# tqdm is used in this codebase, but NOT in the requirements.txt, this tests that we can successfully install pip requirements
|
|
local_sandbox_config = LocalSandboxConfig(
|
|
sandbox_dir=external_codebase_path, use_venv=True, pip_requirements=[PipRequirement(name="tqdm")]
|
|
)
|
|
|
|
# Create the sandbox configuration
|
|
config_create = SandboxConfigCreate(config=local_sandbox_config.model_dump())
|
|
|
|
# Create or update the sandbox configuration
|
|
manager.create_or_update_sandbox_config(sandbox_config_create=config_create, actor=test_user)
|
|
|
|
return manager, local_sandbox_config
|
|
|
|
|
|
# Tool-specific fixtures
|
|
@pytest.fixture
|
|
def tool_with_pip_requirements(test_user):
|
|
def use_requests_and_numpy() -> str:
|
|
"""
|
|
Function that uses requests and numpy packages to test tool-specific pip requirements.
|
|
|
|
Returns:
|
|
str: Success message if packages are available.
|
|
"""
|
|
try:
|
|
import numpy as np
|
|
import requests
|
|
|
|
# Simple usage to verify packages work
|
|
response = requests.get("https://httpbin.org/json", timeout=5)
|
|
arr = np.array([1, 2, 3])
|
|
return f"Success! Status: {response.status_code}, Array sum: {np.sum(arr)}"
|
|
except ImportError as e:
|
|
return f"Import error: {e}"
|
|
except Exception as e:
|
|
return f"Other error: {e}"
|
|
|
|
tool = create_tool_from_func(use_requests_and_numpy)
|
|
# Add pip requirements to the tool - using more recent versions for E2B compatibility
|
|
tool.pip_requirements = [
|
|
PipRequirement(name="requests", version="2.31.0"),
|
|
PipRequirement(name="numpy", version="1.26.0"),
|
|
]
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def tool_with_broken_pip_requirements(test_user):
|
|
def use_broken_package() -> str:
|
|
"""
|
|
Function that requires a package with known compatibility issues.
|
|
|
|
Returns:
|
|
str: Should not reach here due to pip install failure.
|
|
"""
|
|
try:
|
|
import some_nonexistent_package # This will fail during pip install
|
|
|
|
return "This should not execute"
|
|
except ImportError as e:
|
|
return f"Import error: {e}"
|
|
|
|
tool = create_tool_from_func(use_broken_package)
|
|
# Add pip requirements that will fail in E2B environment
|
|
tool.pip_requirements = [
|
|
PipRequirement(name="numpy", version="1.24.0"), # Known to have compatibility issues
|
|
PipRequirement(name="nonexistent-package-12345"), # This package doesn't exist
|
|
]
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def core_memory_tools(test_user):
|
|
"""Create all base tools for testing."""
|
|
tools = {}
|
|
for func in [
|
|
core_memory_replace,
|
|
core_memory_append,
|
|
]:
|
|
tool = create_tool_from_func(func)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
tools[func.__name__] = tool
|
|
yield tools
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def event_loop(request):
|
|
"""Create an instance of the default event loop for each test case."""
|
|
loop = asyncio.get_event_loop_policy().new_event_loop()
|
|
yield loop
|
|
loop.close()
|
|
|
|
|
|
# Local sandbox tests
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_default(disable_e2b_api_key, add_integers_tool, test_user, event_loop):
|
|
args = {"x": 10, "y": 5}
|
|
|
|
# Mock and assert correct pathway was invoked
|
|
with patch.object(AsyncToolSandboxLocal, "run_local_dir_sandbox") as mock_run_local_dir_sandbox:
|
|
sandbox = AsyncToolSandboxLocal(add_integers_tool.name, args, user=test_user)
|
|
await sandbox.run()
|
|
mock_run_local_dir_sandbox.assert_called_once()
|
|
|
|
# Run again to get actual response
|
|
sandbox = AsyncToolSandboxLocal(add_integers_tool.name, args, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return == args["x"] + args["y"]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_stateful_tool(disable_e2b_api_key, clear_core_memory_tool, test_user, agent_state, event_loop):
|
|
args = {}
|
|
sandbox = AsyncToolSandboxLocal(clear_core_memory_tool.name, args, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert sandbox.inject_agent_state == True
|
|
assert result.agent_state.memory.get_block("human").value == ""
|
|
assert result.agent_state.memory.get_block("persona").value == ""
|
|
assert result.func_return is None
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_with_list_rv(disable_e2b_api_key, list_tool, test_user, event_loop):
|
|
sandbox = AsyncToolSandboxLocal(list_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert len(result.func_return) == 5
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_env(disable_e2b_api_key, get_env_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
sandbox_dir = str(Path(__file__).parent / "test_tool_sandbox")
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig(sandbox_dir=sandbox_dir).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string), sandbox_config_id=config.id, actor=test_user
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxLocal(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_per_agent_env(disable_e2b_api_key, get_env_tool, agent_state, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
key = "secret_word"
|
|
sandbox_dir = str(Path(__file__).parent / "test_tool_sandbox")
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig(sandbox_dir=sandbox_dir).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
wrong_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(SandboxEnvironmentVariableCreate(key=key, value=wrong_val), sandbox_config_id=config.id, actor=test_user)
|
|
|
|
correct_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
agent_state.tool_exec_environment_variables = [AgentEnvironmentVariable(key=key, value=correct_val, agent_id=agent_state.id)]
|
|
|
|
sandbox = AsyncToolSandboxLocal(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert wrong_val not in result.func_return
|
|
assert correct_val in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_external_codebase_with_venv(
|
|
disable_e2b_api_key, custom_test_sandbox_config, external_codebase_tool, test_user, event_loop
|
|
):
|
|
args = {"percentage": 10}
|
|
sandbox = AsyncToolSandboxLocal(external_codebase_tool.name, args, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return == "Price Adjustments:\nBurger: $8.99 -> $9.89\nFries: $2.99 -> $3.29\nSoda: $1.99 -> $2.19"
|
|
assert "Hello World" in result.stdout[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_with_venv_and_warnings_does_not_error(
|
|
disable_e2b_api_key, custom_test_sandbox_config, get_warning_tool, test_user, event_loop
|
|
):
|
|
sandbox = AsyncToolSandboxLocal(get_warning_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return == "Hello World"
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_local_sandbox_with_venv_errors(disable_e2b_api_key, custom_test_sandbox_config, always_err_tool, test_user, event_loop):
|
|
sandbox = AsyncToolSandboxLocal(always_err_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert len(result.stdout) != 0
|
|
assert "error" in result.stdout[0]
|
|
assert len(result.stderr) != 0
|
|
assert "ZeroDivisionError: This is an intentionally weird division!" in result.stderr[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_local_sandbox_with_venv_pip_installs_basic(disable_e2b_api_key, cowsay_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(
|
|
config=LocalSandboxConfig(use_venv=True, pip_requirements=[PipRequirement(name="cowsay")]).model_dump()
|
|
)
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string), sandbox_config_id=config.id, actor=test_user
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxLocal(cowsay_tool.name, {}, user=test_user, force_recreate_venv=True)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.stdout[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_with_tool_pip_requirements(disable_e2b_api_key, tool_with_pip_requirements, test_user, event_loop):
|
|
"""Test that local sandbox installs tool-specific pip requirements."""
|
|
manager = SandboxConfigManager()
|
|
sandbox_dir = str(Path(__file__).parent / "test_tool_sandbox")
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig(sandbox_dir=sandbox_dir, use_venv=True).model_dump())
|
|
manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxLocal(
|
|
tool_with_pip_requirements.name, {}, user=test_user, tool_object=tool_with_pip_requirements, force_recreate_venv=True
|
|
)
|
|
result = await sandbox.run()
|
|
|
|
# Should succeed since tool pip requirements were installed
|
|
assert "Success!" in result.func_return
|
|
assert "Status: 200" in result.func_return
|
|
assert "Array sum: 6" in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_with_mixed_pip_requirements(disable_e2b_api_key, tool_with_pip_requirements, test_user, event_loop):
|
|
"""Test that local sandbox installs both sandbox and tool pip requirements."""
|
|
manager = SandboxConfigManager()
|
|
sandbox_dir = str(Path(__file__).parent / "test_tool_sandbox")
|
|
|
|
# Add sandbox-level pip requirement
|
|
config_create = SandboxConfigCreate(
|
|
config=LocalSandboxConfig(sandbox_dir=sandbox_dir, use_venv=True, pip_requirements=[PipRequirement(name="cowsay")]).model_dump()
|
|
)
|
|
manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxLocal(
|
|
tool_with_pip_requirements.name, {}, user=test_user, tool_object=tool_with_pip_requirements, force_recreate_venv=True
|
|
)
|
|
result = await sandbox.run()
|
|
|
|
# Should succeed since both sandbox and tool pip requirements were installed
|
|
assert "Success!" in result.func_return
|
|
assert "Status: 200" in result.func_return
|
|
assert "Array sum: 6" in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_local_sandbox_with_venv_pip_installs_with_update(disable_e2b_api_key, cowsay_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig(use_venv=True).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string), sandbox_config_id=config.id, actor=test_user
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxLocal(cowsay_tool.name, {}, user=test_user, force_recreate_venv=True)
|
|
result = await sandbox.run()
|
|
assert len(result.stdout) == 0
|
|
assert "No module named 'cowsay'" in result.stderr[0]
|
|
|
|
config_create = SandboxConfigCreate(
|
|
config=LocalSandboxConfig(use_venv=True, pip_requirements=[PipRequirement(name="cowsay")]).model_dump()
|
|
)
|
|
manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxLocal(cowsay_tool.name, {}, user=test_user, force_recreate_venv=False)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.stdout[0]
|
|
|
|
|
|
# E2B sandbox tests
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_default(check_e2b_key_is_set, add_integers_tool, test_user, event_loop):
|
|
args = {"x": 10, "y": 5}
|
|
|
|
# Mock and assert correct pathway was invoked
|
|
with patch.object(AsyncToolSandboxE2B, "run_e2b_sandbox") as mock_run_local_dir_sandbox:
|
|
sandbox = AsyncToolSandboxE2B(add_integers_tool.name, args, user=test_user)
|
|
await sandbox.run()
|
|
mock_run_local_dir_sandbox.assert_called_once()
|
|
|
|
# Run again to get actual response
|
|
sandbox = AsyncToolSandboxE2B(add_integers_tool.name, args, user=test_user)
|
|
result = await sandbox.run()
|
|
assert int(result.func_return) == args["x"] + args["y"]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_pip_installs(check_e2b_key_is_set, cowsay_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=E2BSandboxConfig(pip_requirements=["cowsay"]).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string),
|
|
sandbox_config_id=config.id,
|
|
actor=test_user,
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxE2B(cowsay_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.stdout[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_stateful_tool(check_e2b_key_is_set, clear_core_memory_tool, test_user, agent_state, event_loop):
|
|
sandbox = AsyncToolSandboxE2B(clear_core_memory_tool.name, {}, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert result.agent_state.memory.get_block("human").value == ""
|
|
assert result.agent_state.memory.get_block("persona").value == ""
|
|
assert result.func_return is None
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_inject_env_var_existing_sandbox(check_e2b_key_is_set, get_env_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=E2BSandboxConfig().model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxE2B(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return is None
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string),
|
|
sandbox_config_id=config.id,
|
|
actor=test_user,
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxE2B(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_per_agent_env(check_e2b_key_is_set, get_env_tool, agent_state, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
key = "secret_word"
|
|
wrong_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
correct_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig().model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=wrong_val),
|
|
sandbox_config_id=config.id,
|
|
actor=test_user,
|
|
)
|
|
|
|
agent_state.tool_exec_environment_variables = [AgentEnvironmentVariable(key=key, value=correct_val, agent_id=agent_state.id)]
|
|
|
|
sandbox = AsyncToolSandboxE2B(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert wrong_val not in result.func_return
|
|
assert correct_val in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_with_list_rv(check_e2b_key_is_set, list_tool, test_user, event_loop):
|
|
sandbox = AsyncToolSandboxE2B(list_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert len(result.func_return) == 5
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_with_tool_pip_requirements(check_e2b_key_is_set, tool_with_pip_requirements, test_user, event_loop):
|
|
"""Test that E2B sandbox installs tool-specific pip requirements."""
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=E2BSandboxConfig().model_dump())
|
|
manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxE2B(tool_with_pip_requirements.name, {}, user=test_user, tool_object=tool_with_pip_requirements)
|
|
result = await sandbox.run()
|
|
|
|
# Should succeed since tool pip requirements were installed
|
|
assert "Success!" in result.func_return
|
|
assert "Status: 200" in result.func_return
|
|
assert "Array sum: 6" in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_with_mixed_pip_requirements(check_e2b_key_is_set, tool_with_pip_requirements, test_user, event_loop):
|
|
"""Test that E2B sandbox installs both sandbox and tool pip requirements."""
|
|
manager = SandboxConfigManager()
|
|
|
|
# Add sandbox-level pip requirement
|
|
config_create = SandboxConfigCreate(config=E2BSandboxConfig(pip_requirements=["cowsay"]).model_dump())
|
|
manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxE2B(tool_with_pip_requirements.name, {}, user=test_user, tool_object=tool_with_pip_requirements)
|
|
result = await sandbox.run()
|
|
|
|
# Should succeed since both sandbox and tool pip requirements were installed
|
|
assert "Success!" in result.func_return
|
|
assert "Status: 200" in result.func_return
|
|
assert "Array sum: 6" in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_with_broken_tool_pip_requirements_error_handling(
|
|
check_e2b_key_is_set, tool_with_broken_pip_requirements, test_user, event_loop
|
|
):
|
|
"""Test that E2B sandbox provides informative error messages for broken tool pip requirements."""
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=E2BSandboxConfig().model_dump())
|
|
manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxE2B(tool_with_broken_pip_requirements.name, {}, user=test_user, tool_object=tool_with_broken_pip_requirements)
|
|
|
|
# Should raise a RuntimeError with informative message
|
|
with pytest.raises(RuntimeError) as exc_info:
|
|
await sandbox.run()
|
|
|
|
error_message = str(exc_info.value)
|
|
print(error_message)
|
|
|
|
# Verify the error message contains helpful information
|
|
assert "Failed to install tool pip requirement" in error_message
|
|
assert "use_broken_package" in error_message # Tool name
|
|
assert "E2B sandbox" in error_message
|
|
assert "package version incompatibility" in error_message
|
|
assert "Consider updating the package version or removing the version constraint" in error_message
|
|
|
|
# Should mention one of the problematic packages
|
|
assert "numpy==1.24.0" in error_message or "nonexistent-package-12345" in error_message
|