forked from github/copilot-sdk
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathtest_permissions.py
More file actions
193 lines (137 loc) · 7.19 KB
/
test_permissions.py
File metadata and controls
193 lines (137 loc) · 7.19 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
"""
Tests for permission callback functionality
"""
import asyncio
import pytest
from copilot import PermissionRequest, PermissionRequestResult
from .testharness import E2ETestContext, get_final_assistant_message
from .testharness.helper import read_file, write_file
pytestmark = pytest.mark.asyncio(loop_scope="module")
class TestPermissions:
async def test_permission_handler_for_write_operations(self, ctx: E2ETestContext):
"""Test that permission handler is invoked for write operations"""
permission_requests = []
def on_permission_request(
request: PermissionRequest, invocation: dict
) -> PermissionRequestResult:
permission_requests.append(request)
assert invocation["session_id"] == session.session_id
# Approve the permission
return {"kind": "approved"}
session = await ctx.client.create_session({"on_permission_request": on_permission_request})
write_file(ctx.work_dir, "test.txt", "original content")
await session.send({"prompt": "Edit test.txt and replace 'original' with 'modified'"})
await get_final_assistant_message(session)
# Should have received at least one permission request
assert len(permission_requests) > 0
# Should include write permission request
write_requests = [req for req in permission_requests if req.get("kind") == "write"]
assert len(write_requests) > 0
await session.destroy()
async def test_permission_handler_for_shell_commands(self, ctx: E2ETestContext):
"""Test that permission handler is invoked for shell commands"""
permission_requests = []
def on_permission_request(
request: PermissionRequest, invocation: dict
) -> PermissionRequestResult:
permission_requests.append(request)
# Approve the permission
return {"kind": "approved"}
session = await ctx.client.create_session({"on_permission_request": on_permission_request})
await session.send({"prompt": "Run 'echo hello world' and tell me the output"})
await get_final_assistant_message(session)
# Should have received at least one shell permission request
shell_requests = [req for req in permission_requests if req.get("kind") == "shell"]
assert len(shell_requests) > 0
await session.destroy()
async def test_deny_permission(self, ctx: E2ETestContext):
"""Test denying permissions"""
def on_permission_request(
request: PermissionRequest, invocation: dict
) -> PermissionRequestResult:
# Deny all permissions
return {"kind": "denied-interactively-by-user"}
session = await ctx.client.create_session({"on_permission_request": on_permission_request})
original_content = "protected content"
write_file(ctx.work_dir, "protected.txt", original_content)
await session.send({"prompt": "Edit protected.txt and replace 'protected' with 'hacked'."})
await get_final_assistant_message(session)
# Verify the file was NOT modified
content = read_file(ctx.work_dir, "protected.txt")
assert content == original_content
await session.destroy()
async def test_without_permission_handler(self, ctx: E2ETestContext):
"""Test that sessions work without permission handler (default behavior)"""
# Create session without on_permission_request handler
session = await ctx.client.create_session()
await session.send({"prompt": "What is 2+2?"})
message = await get_final_assistant_message(session)
assert "4" in message.data.content
await session.destroy()
async def test_async_permission_handler(self, ctx: E2ETestContext):
"""Test async permission handler"""
permission_requests = []
async def on_permission_request(
request: PermissionRequest, invocation: dict
) -> PermissionRequestResult:
permission_requests.append(request)
# Simulate async permission check (e.g., user prompt)
await asyncio.sleep(0.01)
return {"kind": "approved"}
session = await ctx.client.create_session({"on_permission_request": on_permission_request})
await session.send({"prompt": "Run 'echo test' and tell me what happens"})
await get_final_assistant_message(session)
assert len(permission_requests) > 0
await session.destroy()
async def test_resume_session_with_permission_handler(self, ctx: E2ETestContext):
"""Test resuming session with permission handler"""
permission_requests = []
# Create session without permission handler
session1 = await ctx.client.create_session()
session_id = session1.session_id
await session1.send({"prompt": "What is 1+1?"})
await get_final_assistant_message(session1)
# Resume with permission handler
def on_permission_request(
request: PermissionRequest, invocation: dict
) -> PermissionRequestResult:
permission_requests.append(request)
return {"kind": "approved"}
session2 = await ctx.client.resume_session(
session_id, {"on_permission_request": on_permission_request}
)
await session2.send({"prompt": "Run 'echo resumed' for me"})
await get_final_assistant_message(session2)
# Should have permission requests from resumed session
assert len(permission_requests) > 0
await session2.destroy()
async def test_permission_handler_errors(self, ctx: E2ETestContext):
"""Test that permission handler errors are handled gracefully"""
def on_permission_request(
request: PermissionRequest, invocation: dict
) -> PermissionRequestResult:
raise RuntimeError("Handler error")
session = await ctx.client.create_session({"on_permission_request": on_permission_request})
await session.send({"prompt": "Run 'echo test'. If you can't, say 'failed'."})
message = await get_final_assistant_message(session)
# Should handle the error and deny permission
content_lower = message.data.content.lower()
assert any(word in content_lower for word in ["fail", "cannot", "unable", "permission"])
await session.destroy()
async def test_tool_call_id_in_permission_requests(self, ctx: E2ETestContext):
"""Test that toolCallId is included in permission requests"""
received_tool_call_id = False
def on_permission_request(
request: PermissionRequest, invocation: dict
) -> PermissionRequestResult:
nonlocal received_tool_call_id
if request.get("toolCallId"):
received_tool_call_id = True
assert isinstance(request["toolCallId"], str)
assert len(request["toolCallId"]) > 0
return {"kind": "approved"}
session = await ctx.client.create_session({"on_permission_request": on_permission_request})
await session.send({"prompt": "Run 'echo test'"})
await get_final_assistant_message(session)
assert received_tool_call_id
await session.destroy()