mirror of
https://github.com/cpacker/MemGPT.git
synced 2025-06-03 04:30:22 +00:00

Co-authored-by: Andy Li <55300002+cliandy@users.noreply.github.com> Co-authored-by: Kevin Lin <klin5061@gmail.com> Co-authored-by: Sarah Wooders <sarahwooders@gmail.com> Co-authored-by: jnjpng <jin@letta.com> Co-authored-by: Matthew Zhou <mattzh1314@gmail.com>
553 lines
20 KiB
Python
553 lines
20 KiB
Python
import asyncio
|
|
import secrets
|
|
import string
|
|
import uuid
|
|
from pathlib import Path
|
|
from unittest.mock import patch
|
|
|
|
import pytest
|
|
from sqlalchemy import delete
|
|
|
|
from letta.config import LettaConfig
|
|
from letta.functions.function_sets.base import core_memory_append, core_memory_replace
|
|
from letta.orm.sandbox_config import SandboxConfig, SandboxEnvironmentVariable
|
|
from letta.schemas.agent import AgentState, CreateAgent
|
|
from letta.schemas.block import CreateBlock
|
|
from letta.schemas.environment_variables import AgentEnvironmentVariable, SandboxEnvironmentVariableCreate
|
|
from letta.schemas.organization import Organization
|
|
from letta.schemas.sandbox_config import E2BSandboxConfig, LocalSandboxConfig, PipRequirement, SandboxConfigCreate
|
|
from letta.schemas.user import User
|
|
from letta.server.server import SyncServer
|
|
from letta.services.organization_manager import OrganizationManager
|
|
from letta.services.sandbox_config_manager import SandboxConfigManager
|
|
from letta.services.tool_manager import ToolManager
|
|
from letta.services.tool_sandbox.e2b_sandbox import AsyncToolSandboxE2B
|
|
from letta.services.tool_sandbox.local_sandbox import AsyncToolSandboxLocal
|
|
from letta.services.user_manager import UserManager
|
|
from tests.helpers.utils import create_tool_from_func
|
|
|
|
# Constants
|
|
namespace = uuid.NAMESPACE_DNS
|
|
org_name = str(uuid.uuid5(namespace, "test-tool-execution-sandbox-org"))
|
|
user_name = str(uuid.uuid5(namespace, "test-tool-execution-sandbox-user"))
|
|
|
|
|
|
# Fixtures
|
|
@pytest.fixture(scope="module")
|
|
def server():
|
|
"""
|
|
Creates a SyncServer instance for testing.
|
|
|
|
Loads and saves config to ensure proper initialization.
|
|
"""
|
|
config = LettaConfig.load()
|
|
|
|
config.save()
|
|
|
|
server = SyncServer(init_with_default_org_and_user=True)
|
|
yield server
|
|
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def clear_tables():
|
|
"""Fixture to clear the organization table before each test."""
|
|
from letta.server.db import db_context
|
|
|
|
with db_context() as session:
|
|
session.execute(delete(SandboxEnvironmentVariable))
|
|
session.execute(delete(SandboxConfig))
|
|
session.commit() # Commit the deletion
|
|
|
|
|
|
@pytest.fixture
|
|
def test_organization():
|
|
"""Fixture to create and return the default organization."""
|
|
org = OrganizationManager().create_organization(Organization(name=org_name))
|
|
yield org
|
|
|
|
|
|
@pytest.fixture
|
|
def test_user(test_organization):
|
|
"""Fixture to create and return the default user within the default organization."""
|
|
user = UserManager().create_user(User(name=user_name, organization_id=test_organization.id))
|
|
yield user
|
|
|
|
|
|
@pytest.fixture
|
|
def add_integers_tool(test_user):
|
|
def add(x: int, y: int) -> int:
|
|
"""
|
|
Simple function that adds two integers.
|
|
|
|
Parameters:
|
|
x (int): The first integer to add.
|
|
y (int): The second integer to add.
|
|
|
|
Returns:
|
|
int: The result of adding x and y.
|
|
"""
|
|
return x + y
|
|
|
|
tool = create_tool_from_func(add)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def cowsay_tool(test_user):
|
|
# This defines a tool for a package we definitely do NOT have in letta
|
|
# If this test passes, that means the tool was correctly executed in a separate Python environment
|
|
def cowsay() -> str:
|
|
"""
|
|
Simple function that uses the cowsay package to print out the secret word env variable.
|
|
|
|
Returns:
|
|
str: The cowsay ASCII art.
|
|
"""
|
|
import os
|
|
|
|
import cowsay
|
|
|
|
cowsay.cow(os.getenv("secret_word"))
|
|
|
|
tool = create_tool_from_func(cowsay)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def get_env_tool(test_user):
|
|
def get_env() -> str:
|
|
"""
|
|
Simple function that returns the secret word env variable.
|
|
|
|
Returns:
|
|
str: The secret word
|
|
"""
|
|
import os
|
|
|
|
secret_word = os.getenv("secret_word")
|
|
print(secret_word)
|
|
return secret_word
|
|
|
|
tool = create_tool_from_func(get_env)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def get_warning_tool(test_user):
|
|
def warn_hello_world() -> str:
|
|
"""
|
|
Simple function that warns hello world.
|
|
|
|
Returns:
|
|
str: hello world
|
|
"""
|
|
import warnings
|
|
|
|
msg = "Hello World"
|
|
warnings.warn(msg)
|
|
return msg
|
|
|
|
tool = create_tool_from_func(warn_hello_world)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def always_err_tool(test_user):
|
|
def error() -> str:
|
|
"""
|
|
Simple function that errors
|
|
|
|
Returns:
|
|
str: not important
|
|
"""
|
|
# Raise a unusual error so we know it's from this function
|
|
print("Going to error now")
|
|
raise ZeroDivisionError("This is an intentionally weird division!")
|
|
|
|
tool = create_tool_from_func(error)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def list_tool(test_user):
|
|
def create_list():
|
|
"""Simple function that returns a list"""
|
|
|
|
return [1] * 5
|
|
|
|
tool = create_tool_from_func(create_list)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def clear_core_memory_tool(test_user):
|
|
def clear_memory(agent_state: "AgentState"):
|
|
"""Clear the core memory"""
|
|
agent_state.memory.get_block("human").value = ""
|
|
agent_state.memory.get_block("persona").value = ""
|
|
|
|
tool = create_tool_from_func(clear_memory)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def external_codebase_tool(test_user):
|
|
from tests.test_tool_sandbox.restaurant_management_system.adjust_menu_prices import adjust_menu_prices
|
|
|
|
tool = create_tool_from_func(adjust_menu_prices)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
yield tool
|
|
|
|
|
|
@pytest.fixture
|
|
def agent_state(server):
|
|
actor = server.user_manager.get_user_or_default()
|
|
agent_state = server.create_agent(
|
|
CreateAgent(
|
|
memory_blocks=[
|
|
CreateBlock(
|
|
label="human",
|
|
value="username: sarah",
|
|
),
|
|
CreateBlock(
|
|
label="persona",
|
|
value="This is the persona",
|
|
),
|
|
],
|
|
include_base_tools=True,
|
|
model="openai/gpt-4o-mini",
|
|
tags=["test_agents"],
|
|
embedding="letta/letta-free",
|
|
),
|
|
actor=actor,
|
|
)
|
|
agent_state.tool_rules = []
|
|
yield agent_state
|
|
|
|
|
|
@pytest.fixture
|
|
def custom_test_sandbox_config(test_user):
|
|
"""
|
|
Fixture to create a consistent local sandbox configuration for tests.
|
|
|
|
Args:
|
|
test_user: The test user to be used for creating the sandbox configuration.
|
|
|
|
Returns:
|
|
A tuple containing the SandboxConfigManager and the created sandbox configuration.
|
|
"""
|
|
# Create the SandboxConfigManager
|
|
manager = SandboxConfigManager()
|
|
|
|
# Set the sandbox to be within the external codebase path and use a venv
|
|
external_codebase_path = str(Path(__file__).parent / "test_tool_sandbox" / "restaurant_management_system")
|
|
# tqdm is used in this codebase, but NOT in the requirements.txt, this tests that we can successfully install pip requirements
|
|
local_sandbox_config = LocalSandboxConfig(
|
|
sandbox_dir=external_codebase_path, use_venv=True, pip_requirements=[PipRequirement(name="tqdm")]
|
|
)
|
|
|
|
# Create the sandbox configuration
|
|
config_create = SandboxConfigCreate(config=local_sandbox_config.model_dump())
|
|
|
|
# Create or update the sandbox configuration
|
|
manager.create_or_update_sandbox_config(sandbox_config_create=config_create, actor=test_user)
|
|
|
|
return manager, local_sandbox_config
|
|
|
|
|
|
# Tool-specific fixtures
|
|
@pytest.fixture
|
|
def core_memory_tools(test_user):
|
|
"""Create all base tools for testing."""
|
|
tools = {}
|
|
for func in [
|
|
core_memory_replace,
|
|
core_memory_append,
|
|
]:
|
|
tool = create_tool_from_func(func)
|
|
tool = ToolManager().create_or_update_tool(tool, test_user)
|
|
tools[func.__name__] = tool
|
|
yield tools
|
|
|
|
|
|
@pytest.fixture(scope="session")
|
|
def event_loop(request):
|
|
"""Create an instance of the default event loop for each test case."""
|
|
loop = asyncio.get_event_loop_policy().new_event_loop()
|
|
yield loop
|
|
loop.close()
|
|
|
|
|
|
# Local sandbox tests
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_default(disable_e2b_api_key, add_integers_tool, test_user, event_loop):
|
|
args = {"x": 10, "y": 5}
|
|
|
|
# Mock and assert correct pathway was invoked
|
|
with patch.object(AsyncToolSandboxLocal, "run_local_dir_sandbox") as mock_run_local_dir_sandbox:
|
|
sandbox = AsyncToolSandboxLocal(add_integers_tool.name, args, user=test_user)
|
|
await sandbox.run()
|
|
mock_run_local_dir_sandbox.assert_called_once()
|
|
|
|
# Run again to get actual response
|
|
sandbox = AsyncToolSandboxLocal(add_integers_tool.name, args, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return == args["x"] + args["y"]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_stateful_tool(disable_e2b_api_key, clear_core_memory_tool, test_user, agent_state, event_loop):
|
|
args = {}
|
|
sandbox = AsyncToolSandboxLocal(clear_core_memory_tool.name, args, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert sandbox.inject_agent_state == True
|
|
assert result.agent_state.memory.get_block("human").value == ""
|
|
assert result.agent_state.memory.get_block("persona").value == ""
|
|
assert result.func_return is None
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_with_list_rv(disable_e2b_api_key, list_tool, test_user, event_loop):
|
|
sandbox = AsyncToolSandboxLocal(list_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert len(result.func_return) == 5
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_env(disable_e2b_api_key, get_env_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
sandbox_dir = str(Path(__file__).parent / "test_tool_sandbox")
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig(sandbox_dir=sandbox_dir).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string), sandbox_config_id=config.id, actor=test_user
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxLocal(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_per_agent_env(disable_e2b_api_key, get_env_tool, agent_state, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
key = "secret_word"
|
|
sandbox_dir = str(Path(__file__).parent / "test_tool_sandbox")
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig(sandbox_dir=sandbox_dir).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
wrong_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(SandboxEnvironmentVariableCreate(key=key, value=wrong_val), sandbox_config_id=config.id, actor=test_user)
|
|
|
|
correct_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
agent_state.tool_exec_environment_variables = [AgentEnvironmentVariable(key=key, value=correct_val, agent_id=agent_state.id)]
|
|
|
|
sandbox = AsyncToolSandboxLocal(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert wrong_val not in result.func_return
|
|
assert correct_val in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_external_codebase_with_venv(
|
|
disable_e2b_api_key, custom_test_sandbox_config, external_codebase_tool, test_user, event_loop
|
|
):
|
|
args = {"percentage": 10}
|
|
sandbox = AsyncToolSandboxLocal(external_codebase_tool.name, args, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return == "Price Adjustments:\nBurger: $8.99 -> $9.89\nFries: $2.99 -> $3.29\nSoda: $1.99 -> $2.19"
|
|
assert "Hello World" in result.stdout[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.local_sandbox
|
|
async def test_local_sandbox_with_venv_and_warnings_does_not_error(
|
|
disable_e2b_api_key, custom_test_sandbox_config, get_warning_tool, test_user, event_loop
|
|
):
|
|
sandbox = AsyncToolSandboxLocal(get_warning_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return == "Hello World"
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_local_sandbox_with_venv_errors(disable_e2b_api_key, custom_test_sandbox_config, always_err_tool, test_user, event_loop):
|
|
sandbox = AsyncToolSandboxLocal(always_err_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert len(result.stdout) != 0
|
|
assert "error" in result.stdout[0]
|
|
assert len(result.stderr) != 0
|
|
assert "ZeroDivisionError: This is an intentionally weird division!" in result.stderr[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_local_sandbox_with_venv_pip_installs_basic(disable_e2b_api_key, cowsay_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(
|
|
config=LocalSandboxConfig(use_venv=True, pip_requirements=[PipRequirement(name="cowsay")]).model_dump()
|
|
)
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string), sandbox_config_id=config.id, actor=test_user
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxLocal(cowsay_tool.name, {}, user=test_user, force_recreate_venv=True)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.stdout[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_local_sandbox_with_venv_pip_installs_with_update(disable_e2b_api_key, cowsay_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig(use_venv=True).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string), sandbox_config_id=config.id, actor=test_user
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxLocal(cowsay_tool.name, {}, user=test_user, force_recreate_venv=True)
|
|
result = await sandbox.run()
|
|
assert len(result.stdout) == 0
|
|
assert "No module named 'cowsay'" in result.stderr[0]
|
|
|
|
config_create = SandboxConfigCreate(
|
|
config=LocalSandboxConfig(use_venv=True, pip_requirements=[PipRequirement(name="cowsay")]).model_dump()
|
|
)
|
|
manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxLocal(cowsay_tool.name, {}, user=test_user, force_recreate_venv=False)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.stdout[0]
|
|
|
|
|
|
# E2B sandbox tests
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_default(check_e2b_key_is_set, add_integers_tool, test_user, event_loop):
|
|
args = {"x": 10, "y": 5}
|
|
|
|
# Mock and assert correct pathway was invoked
|
|
with patch.object(AsyncToolSandboxE2B, "run_e2b_sandbox") as mock_run_local_dir_sandbox:
|
|
sandbox = AsyncToolSandboxE2B(add_integers_tool.name, args, user=test_user)
|
|
await sandbox.run()
|
|
mock_run_local_dir_sandbox.assert_called_once()
|
|
|
|
# Run again to get actual response
|
|
sandbox = AsyncToolSandboxE2B(add_integers_tool.name, args, user=test_user)
|
|
result = await sandbox.run()
|
|
assert int(result.func_return) == args["x"] + args["y"]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_pip_installs(check_e2b_key_is_set, cowsay_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=E2BSandboxConfig(pip_requirements=["cowsay"]).model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string),
|
|
sandbox_config_id=config.id,
|
|
actor=test_user,
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxE2B(cowsay_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.stdout[0]
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_stateful_tool(check_e2b_key_is_set, clear_core_memory_tool, test_user, agent_state, event_loop):
|
|
sandbox = AsyncToolSandboxE2B(clear_core_memory_tool.name, {}, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert result.agent_state.memory.get_block("human").value == ""
|
|
assert result.agent_state.memory.get_block("persona").value == ""
|
|
assert result.func_return is None
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_inject_env_var_existing_sandbox(check_e2b_key_is_set, get_env_tool, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
config_create = SandboxConfigCreate(config=E2BSandboxConfig().model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
|
|
sandbox = AsyncToolSandboxE2B(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert result.func_return is None
|
|
|
|
key = "secret_word"
|
|
long_random_string = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=long_random_string),
|
|
sandbox_config_id=config.id,
|
|
actor=test_user,
|
|
)
|
|
|
|
sandbox = AsyncToolSandboxE2B(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert long_random_string in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_per_agent_env(check_e2b_key_is_set, get_env_tool, agent_state, test_user, event_loop):
|
|
manager = SandboxConfigManager()
|
|
key = "secret_word"
|
|
wrong_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
correct_val = "".join(secrets.choice(string.ascii_letters + string.digits) for _ in range(20))
|
|
|
|
config_create = SandboxConfigCreate(config=LocalSandboxConfig().model_dump())
|
|
config = manager.create_or_update_sandbox_config(config_create, test_user)
|
|
manager.create_sandbox_env_var(
|
|
SandboxEnvironmentVariableCreate(key=key, value=wrong_val),
|
|
sandbox_config_id=config.id,
|
|
actor=test_user,
|
|
)
|
|
|
|
agent_state.tool_exec_environment_variables = [AgentEnvironmentVariable(key=key, value=correct_val, agent_id=agent_state.id)]
|
|
|
|
sandbox = AsyncToolSandboxE2B(get_env_tool.name, {}, user=test_user)
|
|
result = await sandbox.run(agent_state=agent_state)
|
|
assert wrong_val not in result.func_return
|
|
assert correct_val in result.func_return
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
@pytest.mark.e2b_sandbox
|
|
async def test_e2b_sandbox_with_list_rv(check_e2b_key_is_set, list_tool, test_user, event_loop):
|
|
sandbox = AsyncToolSandboxE2B(list_tool.name, {}, user=test_user)
|
|
result = await sandbox.run()
|
|
assert len(result.func_return) == 5
|