mirror of
https://github.com/simstudioai/sim.git
synced 2026-02-14 00:15:09 -05:00
962 lines
29 KiB
TypeScript
962 lines
29 KiB
TypeScript
/**
|
|
* @vitest-environment jsdom
|
|
*
|
|
* Tools Registry and Executor Unit Tests
|
|
*
|
|
* This file contains unit tests for the tools registry and executeTool function,
|
|
* which are the central pieces of infrastructure for executing tools.
|
|
*/
|
|
|
|
import {
|
|
createExecutionContext,
|
|
createMockFetch,
|
|
type ExecutionContext,
|
|
type MockFetchResponse,
|
|
} from '@sim/testing'
|
|
import { afterEach, beforeEach, describe, expect, it, vi } from 'vitest'
|
|
|
|
// Mock custom tools query - must be hoisted before imports
|
|
vi.mock('@/hooks/queries/custom-tools', () => ({
|
|
getCustomTool: (toolId: string) => {
|
|
if (toolId === 'custom-tool-123') {
|
|
return {
|
|
id: 'custom-tool-123',
|
|
title: 'Custom Weather Tool',
|
|
code: 'return { result: "Weather data" }',
|
|
schema: {
|
|
function: {
|
|
description: 'Get weather information',
|
|
parameters: {
|
|
type: 'object',
|
|
properties: {
|
|
location: { type: 'string', description: 'City name' },
|
|
unit: { type: 'string', description: 'Unit (metric/imperial)' },
|
|
},
|
|
required: ['location'],
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
return undefined
|
|
},
|
|
getCustomTools: () => [
|
|
{
|
|
id: 'custom-tool-123',
|
|
title: 'Custom Weather Tool',
|
|
code: 'return { result: "Weather data" }',
|
|
schema: {
|
|
function: {
|
|
description: 'Get weather information',
|
|
parameters: {
|
|
type: 'object',
|
|
properties: {
|
|
location: { type: 'string', description: 'City name' },
|
|
unit: { type: 'string', description: 'Unit (metric/imperial)' },
|
|
},
|
|
required: ['location'],
|
|
},
|
|
},
|
|
},
|
|
},
|
|
],
|
|
}))
|
|
|
|
import { executeTool } from '@/tools/index'
|
|
import { tools } from '@/tools/registry'
|
|
import { getTool } from '@/tools/utils'
|
|
|
|
/**
|
|
* Sets up global fetch mock with Next.js preconnect support.
|
|
*/
|
|
function setupFetchMock(config: MockFetchResponse = {}) {
|
|
const mockFetch = createMockFetch(config)
|
|
const fetchWithPreconnect = Object.assign(mockFetch, { preconnect: vi.fn() }) as typeof fetch
|
|
global.fetch = fetchWithPreconnect
|
|
return mockFetch
|
|
}
|
|
|
|
/**
|
|
* Creates a mock execution context with workspaceId for tool tests.
|
|
*/
|
|
function createToolExecutionContext(overrides?: Partial<ExecutionContext>): ExecutionContext {
|
|
const ctx = createExecutionContext({
|
|
workflowId: overrides?.workflowId ?? 'test-workflow',
|
|
blockStates: overrides?.blockStates,
|
|
executedBlocks: overrides?.executedBlocks,
|
|
blockLogs: overrides?.blockLogs,
|
|
metadata: overrides?.metadata,
|
|
environmentVariables: overrides?.environmentVariables,
|
|
})
|
|
return {
|
|
...ctx,
|
|
workspaceId: 'workspace-456',
|
|
...overrides,
|
|
} as ExecutionContext
|
|
}
|
|
|
|
/**
|
|
* Sets up environment variables and returns a cleanup function.
|
|
*/
|
|
function setupEnvVars(variables: Record<string, string>) {
|
|
const originalEnv = { ...process.env }
|
|
Object.assign(process.env, variables)
|
|
|
|
return () => {
|
|
Object.keys(variables).forEach((key) => delete process.env[key])
|
|
Object.entries(originalEnv).forEach(([key, value]) => {
|
|
if (value !== undefined) process.env[key] = value
|
|
})
|
|
}
|
|
}
|
|
|
|
describe('Tools Registry', () => {
|
|
it('should include all expected built-in tools', () => {
|
|
expect(Object.keys(tools).length).toBeGreaterThan(10)
|
|
|
|
expect(tools.http_request).toBeDefined()
|
|
expect(tools.function_execute).toBeDefined()
|
|
|
|
expect(tools.gmail_read).toBeDefined()
|
|
expect(tools.gmail_send).toBeDefined()
|
|
expect(tools.google_drive_list).toBeDefined()
|
|
expect(tools.serper_search).toBeDefined()
|
|
})
|
|
|
|
it('getTool should return the correct tool by ID', () => {
|
|
const httpTool = getTool('http_request')
|
|
expect(httpTool).toBeDefined()
|
|
expect(httpTool?.id).toBe('http_request')
|
|
expect(httpTool?.name).toBe('HTTP Request')
|
|
|
|
const gmailTool = getTool('gmail_read')
|
|
expect(gmailTool).toBeDefined()
|
|
expect(gmailTool?.id).toBe('gmail_read')
|
|
expect(gmailTool?.name).toBe('Gmail Read')
|
|
})
|
|
|
|
it('getTool should return undefined for non-existent tool', () => {
|
|
const nonExistentTool = getTool('non_existent_tool')
|
|
expect(nonExistentTool).toBeUndefined()
|
|
})
|
|
})
|
|
|
|
describe('Custom Tools', () => {
|
|
it('should get custom tool by ID', () => {
|
|
const customTool = getTool('custom_custom-tool-123')
|
|
expect(customTool).toBeDefined()
|
|
expect(customTool?.name).toBe('Custom Weather Tool')
|
|
expect(customTool?.description).toBe('Get weather information')
|
|
expect(customTool?.params.location).toBeDefined()
|
|
expect(customTool?.params.location.required).toBe(true)
|
|
})
|
|
|
|
it('should handle non-existent custom tool', () => {
|
|
const nonExistentTool = getTool('custom_non-existent')
|
|
expect(nonExistentTool).toBeUndefined()
|
|
})
|
|
})
|
|
|
|
describe('executeTool Function', () => {
|
|
let cleanupEnvVars: () => void
|
|
|
|
beforeEach(() => {
|
|
setupFetchMock({
|
|
json: { success: true, output: { result: 'Direct request successful' } },
|
|
status: 200,
|
|
headers: { 'content-type': 'application/json' },
|
|
})
|
|
|
|
process.env.NEXT_PUBLIC_APP_URL = 'http://localhost:3000'
|
|
cleanupEnvVars = setupEnvVars({ NEXT_PUBLIC_APP_URL: 'http://localhost:3000' })
|
|
})
|
|
|
|
afterEach(() => {
|
|
vi.resetAllMocks()
|
|
cleanupEnvVars()
|
|
})
|
|
|
|
it('should execute a tool successfully', async () => {
|
|
// Use function_execute as it's an internal route that uses global.fetch
|
|
const originalFunctionTool = { ...tools.function_execute }
|
|
tools.function_execute = {
|
|
...tools.function_execute,
|
|
transformResponse: vi.fn().mockResolvedValue({
|
|
success: true,
|
|
output: { result: 'executed' },
|
|
}),
|
|
}
|
|
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => ({
|
|
ok: true,
|
|
status: 200,
|
|
json: () => Promise.resolve({ success: true, output: { result: 'executed' } }),
|
|
})),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const result = await executeTool(
|
|
'function_execute',
|
|
{
|
|
code: 'return 1',
|
|
timeout: 5000,
|
|
},
|
|
true
|
|
)
|
|
|
|
expect(result.success).toBe(true)
|
|
expect(result.output).toBeDefined()
|
|
expect(result.timing).toBeDefined()
|
|
expect(result.timing?.startTime).toBeDefined()
|
|
expect(result.timing?.endTime).toBeDefined()
|
|
expect(result.timing?.duration).toBeGreaterThanOrEqual(0)
|
|
|
|
tools.function_execute = originalFunctionTool
|
|
})
|
|
|
|
it('should call internal routes directly', async () => {
|
|
const originalFunctionTool = { ...tools.function_execute }
|
|
tools.function_execute = {
|
|
...tools.function_execute,
|
|
transformResponse: vi.fn().mockResolvedValue({
|
|
success: true,
|
|
output: { result: 'Function executed successfully' },
|
|
}),
|
|
}
|
|
|
|
await executeTool(
|
|
'function_execute',
|
|
{
|
|
code: 'return { result: "hello world" }',
|
|
language: 'javascript',
|
|
},
|
|
true
|
|
) // Skip proxy
|
|
|
|
tools.function_execute = originalFunctionTool
|
|
|
|
expect(global.fetch).toHaveBeenCalledWith(
|
|
expect.stringContaining('/api/function/execute'),
|
|
expect.anything()
|
|
)
|
|
})
|
|
|
|
it('should handle non-existent tool', async () => {
|
|
vi.spyOn(console, 'error').mockImplementation(() => {})
|
|
|
|
const result = await executeTool('non_existent_tool', {})
|
|
|
|
expect(result.success).toBe(false)
|
|
expect(result.error).toContain('Tool not found')
|
|
|
|
vi.restoreAllMocks()
|
|
})
|
|
|
|
it('should add timing information to results', async () => {
|
|
const result = await executeTool(
|
|
'http_request',
|
|
{
|
|
url: 'https://api.example.com/data',
|
|
},
|
|
true
|
|
)
|
|
|
|
expect(result.timing).toBeDefined()
|
|
expect(result.timing?.startTime).toMatch(/^\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2}/)
|
|
expect(result.timing?.endTime).toMatch(/^\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2}/)
|
|
expect(result.timing?.duration).toBeGreaterThanOrEqual(0)
|
|
})
|
|
})
|
|
|
|
describe('Automatic Internal Route Detection', () => {
|
|
let cleanupEnvVars: () => void
|
|
|
|
beforeEach(() => {
|
|
process.env.NEXT_PUBLIC_APP_URL = 'http://localhost:3000'
|
|
cleanupEnvVars = setupEnvVars({ NEXT_PUBLIC_APP_URL: 'http://localhost:3000' })
|
|
})
|
|
|
|
afterEach(() => {
|
|
vi.resetAllMocks()
|
|
cleanupEnvVars()
|
|
})
|
|
|
|
it('should detect internal routes (URLs starting with /api/) and call them directly', async () => {
|
|
const mockTool = {
|
|
id: 'test_internal_tool',
|
|
name: 'Test Internal Tool',
|
|
description: 'A test tool with internal route',
|
|
version: '1.0.0',
|
|
params: {},
|
|
request: {
|
|
url: '/api/test/endpoint',
|
|
method: 'POST',
|
|
headers: () => ({ 'Content-Type': 'application/json' }),
|
|
},
|
|
transformResponse: vi.fn().mockResolvedValue({
|
|
success: true,
|
|
output: { result: 'Internal route success' },
|
|
}),
|
|
}
|
|
|
|
const originalTools = { ...tools }
|
|
;(tools as any).test_internal_tool = mockTool
|
|
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async (url) => {
|
|
expect(url).toBe('http://localhost:3000/api/test/endpoint')
|
|
const responseData = { success: true, data: 'test' }
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
statusText: 'OK',
|
|
headers: new Headers(),
|
|
json: () => Promise.resolve(responseData),
|
|
text: () => Promise.resolve(JSON.stringify(responseData)),
|
|
clone: vi.fn().mockReturnThis(),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const result = await executeTool('test_internal_tool', {}, false)
|
|
|
|
expect(result.success).toBe(true)
|
|
expect(result.output.result).toBe('Internal route success')
|
|
expect(mockTool.transformResponse).toHaveBeenCalled()
|
|
|
|
Object.assign(tools, originalTools)
|
|
})
|
|
|
|
it('should detect external routes (full URLs) and call directly with SSRF protection', async () => {
|
|
// This test verifies that external URLs are called directly (not via proxy)
|
|
// with SSRF protection via secureFetchWithPinnedIP
|
|
const mockTool = {
|
|
id: 'test_external_tool',
|
|
name: 'Test External Tool',
|
|
description: 'A test tool with external route',
|
|
version: '1.0.0',
|
|
params: {},
|
|
request: {
|
|
url: 'https://api.example.com/endpoint',
|
|
method: 'GET',
|
|
headers: () => ({ 'Content-Type': 'application/json' }),
|
|
},
|
|
transformResponse: vi.fn().mockResolvedValue({
|
|
success: true,
|
|
output: { result: 'External route called directly' },
|
|
}),
|
|
}
|
|
|
|
const originalTools = { ...tools }
|
|
;(tools as any).test_external_tool = mockTool
|
|
|
|
// Mock fetch for the DNS validation that happens first
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => {
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
json: () => Promise.resolve({}),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
// The actual external fetch uses secureFetchWithPinnedIP which uses Node's http/https
|
|
// This will fail with a network error in tests, which is expected
|
|
const result = await executeTool('test_external_tool', {})
|
|
|
|
// We expect it to attempt direct fetch (which will fail in test env due to network)
|
|
// The key point is it should NOT try to call /api/proxy
|
|
expect(global.fetch).not.toHaveBeenCalledWith(
|
|
expect.stringContaining('/api/proxy'),
|
|
expect.anything()
|
|
)
|
|
|
|
// Restore original tools
|
|
Object.assign(tools, originalTools)
|
|
})
|
|
|
|
it('should handle dynamic URLs that resolve to internal routes', async () => {
|
|
const mockTool = {
|
|
id: 'test_dynamic_internal',
|
|
name: 'Test Dynamic Internal Tool',
|
|
description: 'A test tool with dynamic internal route',
|
|
version: '1.0.0',
|
|
params: {
|
|
resourceId: { type: 'string', required: true },
|
|
},
|
|
request: {
|
|
url: (params: any) => `/api/resources/${params.resourceId}`,
|
|
method: 'GET',
|
|
headers: () => ({ 'Content-Type': 'application/json' }),
|
|
},
|
|
transformResponse: vi.fn().mockResolvedValue({
|
|
success: true,
|
|
output: { result: 'Dynamic internal route success' },
|
|
}),
|
|
}
|
|
|
|
// Mock the tool registry to include our test tool
|
|
const originalTools = { ...tools }
|
|
;(tools as any).test_dynamic_internal = mockTool
|
|
|
|
// Mock fetch for the internal API call
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async (url) => {
|
|
// Should call the internal API directly with the resolved dynamic URL
|
|
expect(url).toBe('http://localhost:3000/api/resources/123')
|
|
const responseData = { success: true, data: 'test' }
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
statusText: 'OK',
|
|
headers: new Headers(),
|
|
json: () => Promise.resolve(responseData),
|
|
text: () => Promise.resolve(JSON.stringify(responseData)),
|
|
clone: vi.fn().mockReturnThis(),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const result = await executeTool('test_dynamic_internal', { resourceId: '123' })
|
|
|
|
expect(result.success).toBe(true)
|
|
expect(result.output.result).toBe('Dynamic internal route success')
|
|
expect(mockTool.transformResponse).toHaveBeenCalled()
|
|
|
|
Object.assign(tools, originalTools)
|
|
})
|
|
|
|
it('should handle dynamic URLs that resolve to external routes directly', async () => {
|
|
const mockTool = {
|
|
id: 'test_dynamic_external',
|
|
name: 'Test Dynamic External Tool',
|
|
description: 'A test tool with dynamic external route',
|
|
version: '1.0.0',
|
|
params: {
|
|
endpoint: { type: 'string', required: true },
|
|
},
|
|
request: {
|
|
url: (params: any) => `https://api.external.com/${params.endpoint}`,
|
|
method: 'GET',
|
|
headers: () => ({ 'Content-Type': 'application/json' }),
|
|
},
|
|
transformResponse: vi.fn().mockResolvedValue({
|
|
success: true,
|
|
output: { result: 'Dynamic external route called directly' },
|
|
}),
|
|
}
|
|
|
|
const originalTools = { ...tools }
|
|
;(tools as any).test_dynamic_external = mockTool
|
|
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => {
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
json: () => Promise.resolve({}),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
// External URLs are now called directly with SSRF protection
|
|
// The test verifies proxy is NOT called
|
|
const result = await executeTool('test_dynamic_external', { endpoint: 'users' })
|
|
|
|
// Verify proxy was not called
|
|
expect(global.fetch).not.toHaveBeenCalledWith(
|
|
expect.stringContaining('/api/proxy'),
|
|
expect.anything()
|
|
)
|
|
|
|
// Result will fail in test env due to network, but that's expected
|
|
Object.assign(tools, originalTools)
|
|
})
|
|
|
|
it('PLACEHOLDER - external routes are called directly', async () => {
|
|
// Placeholder test to maintain test count - external URLs now go direct
|
|
// No proxy is used for external URLs anymore - they use secureFetchWithPinnedIP
|
|
expect(true).toBe(true)
|
|
})
|
|
|
|
it('should call external URLs directly with SSRF protection', async () => {
|
|
// External URLs now use secureFetchWithPinnedIP which uses Node's http/https modules
|
|
// This test verifies the proxy is NOT called for external URLs
|
|
const mockTool = {
|
|
id: 'test_external_direct',
|
|
name: 'Test External Direct Tool',
|
|
description: 'A test tool to verify external URLs are called directly',
|
|
version: '1.0.0',
|
|
params: {},
|
|
request: {
|
|
url: 'https://api.example.com/endpoint',
|
|
method: 'GET',
|
|
headers: () => ({ 'Content-Type': 'application/json' }),
|
|
},
|
|
}
|
|
|
|
const originalTools = { ...tools }
|
|
;(tools as any).test_external_direct = mockTool
|
|
|
|
const mockFetch = vi.fn()
|
|
global.fetch = Object.assign(mockFetch, { preconnect: vi.fn() }) as typeof fetch
|
|
|
|
// The actual request will fail in test env (no real network), but we verify:
|
|
// 1. The proxy route is NOT called
|
|
// 2. The tool execution is attempted
|
|
await executeTool('test_external_direct', {})
|
|
|
|
// Verify proxy was not called (global.fetch should not be called with /api/proxy)
|
|
for (const call of mockFetch.mock.calls) {
|
|
const url = call[0]
|
|
if (typeof url === 'string') {
|
|
expect(url).not.toContain('/api/proxy')
|
|
}
|
|
}
|
|
|
|
Object.assign(tools, originalTools)
|
|
})
|
|
})
|
|
|
|
describe('Centralized Error Handling', () => {
|
|
let cleanupEnvVars: () => void
|
|
|
|
beforeEach(() => {
|
|
process.env.NEXT_PUBLIC_APP_URL = 'http://localhost:3000'
|
|
cleanupEnvVars = setupEnvVars({ NEXT_PUBLIC_APP_URL: 'http://localhost:3000' })
|
|
})
|
|
|
|
afterEach(() => {
|
|
vi.resetAllMocks()
|
|
cleanupEnvVars()
|
|
})
|
|
|
|
const testErrorFormat = async (name: string, errorResponse: any, expectedError: string) => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => ({
|
|
ok: false,
|
|
status: 400,
|
|
statusText: 'Bad Request',
|
|
headers: {
|
|
get: (key: string) => (key === 'content-type' ? 'application/json' : null),
|
|
forEach: (callback: (value: string, key: string) => void) => {
|
|
callback('application/json', 'content-type')
|
|
},
|
|
},
|
|
text: () => Promise.resolve(JSON.stringify(errorResponse)),
|
|
json: () => Promise.resolve(errorResponse),
|
|
clone: vi.fn().mockReturnThis(),
|
|
})),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const result = await executeTool(
|
|
'function_execute',
|
|
{ code: 'return { result: "test" }' },
|
|
true
|
|
)
|
|
|
|
expect(result.success).toBe(false)
|
|
expect(result.error).toBe(expectedError)
|
|
}
|
|
|
|
it('should extract GraphQL error format (Linear API)', async () => {
|
|
await testErrorFormat(
|
|
'GraphQL',
|
|
{ errors: [{ message: 'Invalid query field' }] },
|
|
'Invalid query field'
|
|
)
|
|
})
|
|
|
|
it('should extract X/Twitter API error format', async () => {
|
|
await testErrorFormat(
|
|
'X/Twitter',
|
|
{ errors: [{ detail: 'Rate limit exceeded' }] },
|
|
'Rate limit exceeded'
|
|
)
|
|
})
|
|
|
|
it('should extract Hunter API error format', async () => {
|
|
await testErrorFormat('Hunter', { errors: [{ details: 'Invalid API key' }] }, 'Invalid API key')
|
|
})
|
|
|
|
it('should extract direct errors array (string)', async () => {
|
|
await testErrorFormat('Direct string array', { errors: ['Network timeout'] }, 'Network timeout')
|
|
})
|
|
|
|
it('should extract direct errors array (object)', async () => {
|
|
await testErrorFormat(
|
|
'Direct object array',
|
|
{ errors: [{ message: 'Validation failed' }] },
|
|
'Validation failed'
|
|
)
|
|
})
|
|
|
|
it('should extract OAuth error description', async () => {
|
|
await testErrorFormat('OAuth', { error_description: 'Invalid grant' }, 'Invalid grant')
|
|
})
|
|
|
|
it('should extract SOAP fault error', async () => {
|
|
await testErrorFormat(
|
|
'SOAP fault',
|
|
{ fault: { faultstring: 'Server unavailable' } },
|
|
'Server unavailable'
|
|
)
|
|
})
|
|
|
|
it('should extract simple SOAP faultstring', async () => {
|
|
await testErrorFormat(
|
|
'Simple SOAP',
|
|
{ faultstring: 'Authentication failed' },
|
|
'Authentication failed'
|
|
)
|
|
})
|
|
|
|
it('should extract Notion/Discord message format', async () => {
|
|
await testErrorFormat('Notion/Discord', { message: 'Page not found' }, 'Page not found')
|
|
})
|
|
|
|
it('should extract Airtable error object format', async () => {
|
|
await testErrorFormat(
|
|
'Airtable',
|
|
{ error: { message: 'Invalid table ID' } },
|
|
'Invalid table ID'
|
|
)
|
|
})
|
|
|
|
it('should extract simple error string format', async () => {
|
|
await testErrorFormat(
|
|
'Simple string',
|
|
{ error: 'Simple error message' },
|
|
'Simple error message'
|
|
)
|
|
})
|
|
|
|
it('should fall back to text when JSON parsing fails and extract error message', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => ({
|
|
ok: false,
|
|
status: 401,
|
|
statusText: 'Unauthorized',
|
|
headers: {
|
|
get: (key: string) => (key === 'content-type' ? 'text/plain' : null),
|
|
forEach: (callback: (value: string, key: string) => void) => {
|
|
callback('text/plain', 'content-type')
|
|
},
|
|
},
|
|
text: () => Promise.resolve('Invalid access token'),
|
|
json: () => Promise.reject(new Error('Invalid JSON')),
|
|
clone: vi.fn().mockReturnThis(),
|
|
})),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const result = await executeTool(
|
|
'function_execute',
|
|
{ code: 'return { result: "test" }' },
|
|
true
|
|
)
|
|
|
|
expect(result.success).toBe(false)
|
|
// Should extract the text error message, not the JSON parsing error
|
|
expect(result.error).toBe('Invalid access token')
|
|
})
|
|
|
|
it('should handle plain text error responses from APIs like Apollo', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => ({
|
|
ok: false,
|
|
status: 403,
|
|
statusText: 'Forbidden',
|
|
headers: {
|
|
get: (key: string) => (key === 'content-type' ? 'text/plain' : null),
|
|
forEach: (callback: (value: string, key: string) => void) => {
|
|
callback('text/plain', 'content-type')
|
|
},
|
|
},
|
|
text: () => Promise.resolve('Invalid API key provided'),
|
|
json: () => Promise.reject(new Error('Unexpected token I')),
|
|
clone: vi.fn().mockReturnThis(),
|
|
})),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const result = await executeTool(
|
|
'function_execute',
|
|
{ code: 'return { result: "test" }' },
|
|
true
|
|
)
|
|
|
|
expect(result.success).toBe(false)
|
|
expect(result.error).toBe('Invalid API key provided')
|
|
})
|
|
|
|
it('should fall back to HTTP status text when both JSON and text parsing fail', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => ({
|
|
ok: false,
|
|
status: 500,
|
|
statusText: 'Internal Server Error',
|
|
headers: {
|
|
get: (key: string) => (key === 'content-type' ? 'text/plain' : null),
|
|
forEach: (callback: (value: string, key: string) => void) => {
|
|
callback('text/plain', 'content-type')
|
|
},
|
|
},
|
|
text: () => Promise.reject(new Error('Cannot read response')),
|
|
json: () => Promise.reject(new Error('Invalid JSON')),
|
|
clone: vi.fn().mockReturnThis(),
|
|
})),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const result = await executeTool(
|
|
'function_execute',
|
|
{ code: 'return { result: "test" }' },
|
|
true
|
|
)
|
|
|
|
expect(result.success).toBe(false)
|
|
// Should fall back to HTTP status text when both parsing methods fail
|
|
expect(result.error).toBe('Internal Server Error')
|
|
})
|
|
|
|
it('should handle complex nested error objects', async () => {
|
|
await testErrorFormat(
|
|
'Complex nested',
|
|
{ error: { code: 400, message: 'Complex validation error', details: 'Field X is invalid' } },
|
|
'Complex validation error'
|
|
)
|
|
})
|
|
|
|
it('should handle error arrays with multiple entries (take first)', async () => {
|
|
await testErrorFormat(
|
|
'Multiple errors',
|
|
{ errors: [{ message: 'First error' }, { message: 'Second error' }] },
|
|
'First error'
|
|
)
|
|
})
|
|
|
|
it('should stringify complex error objects when no message found', async () => {
|
|
const complexError = { code: 500, type: 'ServerError', context: { requestId: '123' } }
|
|
await testErrorFormat(
|
|
'Complex object stringify',
|
|
{ error: complexError },
|
|
JSON.stringify(complexError)
|
|
)
|
|
})
|
|
})
|
|
|
|
describe('MCP Tool Execution', () => {
|
|
let cleanupEnvVars: () => void
|
|
|
|
beforeEach(() => {
|
|
process.env.NEXT_PUBLIC_APP_URL = 'http://localhost:3000'
|
|
cleanupEnvVars = setupEnvVars({ NEXT_PUBLIC_APP_URL: 'http://localhost:3000' })
|
|
})
|
|
|
|
afterEach(() => {
|
|
vi.resetAllMocks()
|
|
cleanupEnvVars()
|
|
})
|
|
|
|
it('should execute MCP tool with valid tool ID', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async (url, options) => {
|
|
expect(url).toBe('http://localhost:3000/api/mcp/tools/execute')
|
|
expect(options?.method).toBe('POST')
|
|
|
|
const body = JSON.parse(options?.body as string)
|
|
expect(body.serverId).toBe('mcp-123')
|
|
expect(body.toolName).toBe('list_files')
|
|
expect(body.arguments).toEqual({ path: '/test' })
|
|
expect(body.workspaceId).toBe('workspace-456')
|
|
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
json: () =>
|
|
Promise.resolve({
|
|
success: true,
|
|
data: {
|
|
output: {
|
|
content: [{ type: 'text', text: 'Files listed successfully' }],
|
|
},
|
|
},
|
|
}),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const mockContext = createToolExecutionContext()
|
|
|
|
const result = await executeTool('mcp-123-list_files', { path: '/test' }, false, mockContext)
|
|
|
|
expect(result.success).toBe(true)
|
|
expect(result.output).toBeDefined()
|
|
expect(result.output.content).toBeDefined()
|
|
expect(result.timing).toBeDefined()
|
|
})
|
|
|
|
it('should handle MCP tool ID parsing correctly', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async (url, options) => {
|
|
const body = JSON.parse(options?.body as string)
|
|
expect(body.serverId).toBe('mcp-timestamp123')
|
|
expect(body.toolName).toBe('complex-tool-name')
|
|
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
json: () =>
|
|
Promise.resolve({
|
|
success: true,
|
|
data: { output: { content: [{ type: 'text', text: 'Success' }] } },
|
|
}),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const mockContext2 = createToolExecutionContext()
|
|
|
|
await executeTool('mcp-timestamp123-complex-tool-name', { param: 'value' }, false, mockContext2)
|
|
})
|
|
|
|
it('should handle MCP block arguments format', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async (url, options) => {
|
|
const body = JSON.parse(options?.body as string)
|
|
expect(body.arguments).toEqual({ file: 'test.txt', mode: 'read' })
|
|
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
json: () =>
|
|
Promise.resolve({
|
|
success: true,
|
|
data: { output: { content: [{ type: 'text', text: 'File read' }] } },
|
|
}),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const mockContext3 = createToolExecutionContext()
|
|
|
|
await executeTool(
|
|
'mcp-123-read_file',
|
|
{
|
|
arguments: JSON.stringify({ file: 'test.txt', mode: 'read' }),
|
|
server: 'mcp-123',
|
|
tool: 'read_file',
|
|
},
|
|
false,
|
|
mockContext3
|
|
)
|
|
})
|
|
|
|
it('should handle agent block MCP arguments format', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async (url, options) => {
|
|
const body = JSON.parse(options?.body as string)
|
|
expect(body.arguments).toEqual({ query: 'search term', limit: 10 })
|
|
|
|
return {
|
|
ok: true,
|
|
status: 200,
|
|
json: () =>
|
|
Promise.resolve({
|
|
success: true,
|
|
data: { output: { content: [{ type: 'text', text: 'Search results' }] } },
|
|
}),
|
|
}
|
|
}),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const mockContext4 = createToolExecutionContext()
|
|
|
|
await executeTool(
|
|
'mcp-123-search',
|
|
{
|
|
query: 'search term',
|
|
limit: 10,
|
|
// These should be filtered out as system parameters
|
|
server: 'mcp-123',
|
|
tool: 'search',
|
|
workspaceId: 'workspace-456',
|
|
requestId: 'req-123',
|
|
},
|
|
false,
|
|
mockContext4
|
|
)
|
|
})
|
|
|
|
it('should handle MCP tool execution errors', async () => {
|
|
global.fetch = Object.assign(
|
|
vi.fn().mockImplementation(async () => ({
|
|
ok: false,
|
|
status: 404,
|
|
statusText: 'Not Found',
|
|
json: () =>
|
|
Promise.resolve({
|
|
success: false,
|
|
error: 'Tool not found on server',
|
|
}),
|
|
})),
|
|
{ preconnect: vi.fn() }
|
|
) as typeof fetch
|
|
|
|
const mockContext5 = createToolExecutionContext()
|
|
|
|
const result = await executeTool(
|
|
'mcp-123-nonexistent_tool',
|
|
{ param: 'value' },
|
|
false,
|
|
mockContext5
|
|
)
|
|
|
|
expect(result.success).toBe(false)
|
|
expect(result.error).toContain('Tool not found on server')
|
|
expect(result.timing).toBeDefined()
|
|
})
|
|
|
|
it('should require workspaceId for MCP tools', async () => {
|
|
const result = await executeTool('mcp-123-test_tool', { param: 'value' })
|
|
|
|
expect(result.success).toBe(false)
|
|
expect(result.error).toContain('Missing workspaceId in execution context for MCP tool')
|
|
})
|
|
|
|
it('should handle invalid MCP tool ID format', async () => {
|
|
const mockContext6 = createToolExecutionContext()
|
|
|
|
const result = await executeTool('invalid-mcp-id', { param: 'value' }, false, mockContext6)
|
|
|
|
expect(result.success).toBe(false)
|
|
expect(result.error).toContain('Tool not found')
|
|
})
|
|
|
|
it('should handle MCP API network errors', async () => {
|
|
global.fetch = Object.assign(vi.fn().mockRejectedValue(new Error('Network error')), {
|
|
preconnect: vi.fn(),
|
|
}) as typeof fetch
|
|
|
|
const mockContext7 = createToolExecutionContext()
|
|
|
|
const result = await executeTool('mcp-123-test_tool', { param: 'value' }, false, mockContext7)
|
|
|
|
expect(result.success).toBe(false)
|
|
expect(result.error).toContain('Network error')
|
|
expect(result.timing).toBeDefined()
|
|
})
|
|
})
|