|
8 | 8 |
|
9 | 9 | import seclab_taskflows.mcp_servers.container_shell as cs_mod |
10 | 10 | from seclab_taskflow_agent.available_tools import AvailableTools |
| 11 | +from seclab_taskflow_agent.models import ToolboxDocument |
11 | 12 |
|
12 | 13 |
|
13 | 14 | # --------------------------------------------------------------------------- |
@@ -298,22 +299,22 @@ def test_toolbox_yaml_valid_base(self): |
298 | 299 | tools = AvailableTools() |
299 | 300 | result = tools.get_toolbox("seclab_taskflows.toolboxes.container_shell_base") |
300 | 301 | assert result is not None |
301 | | - assert result["seclab-taskflow-agent"]["filetype"] == "toolbox" |
| 302 | + assert isinstance(result, ToolboxDocument) |
302 | 303 |
|
303 | 304 | def test_toolbox_yaml_valid_malware(self): |
304 | 305 | tools = AvailableTools() |
305 | 306 | result = tools.get_toolbox("seclab_taskflows.toolboxes.container_shell_malware_analysis") |
306 | 307 | assert result is not None |
307 | | - assert result["seclab-taskflow-agent"]["filetype"] == "toolbox" |
| 308 | + assert isinstance(result, ToolboxDocument) |
308 | 309 |
|
309 | 310 | def test_toolbox_yaml_valid_network(self): |
310 | 311 | tools = AvailableTools() |
311 | 312 | result = tools.get_toolbox("seclab_taskflows.toolboxes.container_shell_network_analysis") |
312 | 313 | assert result is not None |
313 | | - assert result["seclab-taskflow-agent"]["filetype"] == "toolbox" |
| 314 | + assert isinstance(result, ToolboxDocument) |
314 | 315 |
|
315 | 316 | def test_toolbox_yaml_valid_sast(self): |
316 | 317 | tools = AvailableTools() |
317 | 318 | result = tools.get_toolbox("seclab_taskflows.toolboxes.container_shell_sast") |
318 | 319 | assert result is not None |
319 | | - assert result["seclab-taskflow-agent"]["filetype"] == "toolbox" |
| 320 | + assert isinstance(result, ToolboxDocument) |
0 commit comments