|
| 1 | +import json |
| 2 | +from types import SimpleNamespace |
| 3 | + |
| 4 | +import pytest |
| 5 | + |
| 6 | +from astrbot.core.agent.run_context import ContextWrapper |
| 7 | +from astrbot.core.computer.tools.browser import BrowserExecTool |
| 8 | +from astrbot.core.computer.tools.neo_skills import GetExecutionHistoryTool |
| 9 | + |
| 10 | + |
| 11 | +class _FakeBrowser: |
| 12 | + async def exec(self, **kwargs): |
| 13 | + return { |
| 14 | + "ok": True, |
| 15 | + "cmd": kwargs["cmd"], |
| 16 | + } |
| 17 | + |
| 18 | + |
| 19 | +class _FakeSandbox: |
| 20 | + async def get_execution_history(self, **kwargs): |
| 21 | + return { |
| 22 | + "items": [], |
| 23 | + "limit": kwargs["limit"], |
| 24 | + } |
| 25 | + |
| 26 | + |
| 27 | +def _make_run_context(require_admin: bool, role: str = "member") -> ContextWrapper: |
| 28 | + config_holder = SimpleNamespace( |
| 29 | + get_config=lambda umo: { # noqa: ARG005 |
| 30 | + "provider_settings": { |
| 31 | + "computer_use_require_admin": require_admin, |
| 32 | + } |
| 33 | + } |
| 34 | + ) |
| 35 | + event = SimpleNamespace( |
| 36 | + role=role, |
| 37 | + unified_msg_origin="qq_official:friend:user-1", |
| 38 | + get_sender_id=lambda: "user-1", |
| 39 | + ) |
| 40 | + astr_ctx = SimpleNamespace(context=config_holder, event=event) |
| 41 | + return ContextWrapper(context=astr_ctx) |
| 42 | + |
| 43 | + |
| 44 | +@pytest.mark.asyncio |
| 45 | +async def test_browser_tool_allows_non_admin_when_admin_requirement_disabled( |
| 46 | + monkeypatch, |
| 47 | +): |
| 48 | + async def _fake_get_booter(_ctx, _session_id): |
| 49 | + return SimpleNamespace(browser=_FakeBrowser()) |
| 50 | + |
| 51 | + monkeypatch.setattr( |
| 52 | + "astrbot.core.computer.tools.browser.get_booter", |
| 53 | + _fake_get_booter, |
| 54 | + ) |
| 55 | + |
| 56 | + result = await BrowserExecTool().call( |
| 57 | + _make_run_context(require_admin=False), |
| 58 | + cmd="open https://example.com", |
| 59 | + ) |
| 60 | + |
| 61 | + assert json.loads(result)["ok"] is True |
| 62 | + |
| 63 | + |
| 64 | +@pytest.mark.asyncio |
| 65 | +async def test_neo_skill_tool_allows_non_admin_when_admin_requirement_disabled( |
| 66 | + monkeypatch, |
| 67 | +): |
| 68 | + async def _fake_get_booter(_ctx, _session_id): |
| 69 | + return SimpleNamespace( |
| 70 | + bay_client=object(), |
| 71 | + sandbox=_FakeSandbox(), |
| 72 | + ) |
| 73 | + |
| 74 | + monkeypatch.setattr( |
| 75 | + "astrbot.core.computer.tools.neo_skills.get_booter", |
| 76 | + _fake_get_booter, |
| 77 | + ) |
| 78 | + |
| 79 | + result = await GetExecutionHistoryTool().call( |
| 80 | + _make_run_context(require_admin=False), |
| 81 | + limit=5, |
| 82 | + ) |
| 83 | + |
| 84 | + payload = json.loads(result) |
| 85 | + assert payload["items"] == [] |
| 86 | + assert payload["limit"] == 5 |
| 87 | + |
| 88 | + |
| 89 | +@pytest.mark.asyncio |
| 90 | +async def test_browser_tool_still_denies_non_admin_when_admin_requirement_enabled(): |
| 91 | + result = await BrowserExecTool().call( |
| 92 | + _make_run_context(require_admin=True), |
| 93 | + cmd="open https://example.com", |
| 94 | + ) |
| 95 | + |
| 96 | + assert "Permission denied" in result |
| 97 | + assert "Using browser tools is only allowed for admin users" in result |
| 98 | + assert "User's ID is: user-1" in result |
0 commit comments