Add Microsoft 365 tool providing access to Outlook mail, Teams messages, Calendar events, OneDrive files, and SharePoint search via Microsoft Graph API. Includes OAuth2 token caching (client credentials and device code flows), security policy enforcement, and config validation. Rebased on latest master, resolving conflicts with SwarmConfig exports and adding approval_manager to ChannelRuntimeContext test constructors. Original work by @rareba. Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
797 lines
27 KiB
Rust
797 lines
27 KiB
Rust
//! Tool subsystem for agent-callable capabilities.
|
|
//!
|
|
//! This module implements the tool execution surface exposed to the LLM during
|
|
//! agentic loops. Each tool implements the [`Tool`] trait defined in [`traits`],
|
|
//! which requires a name, description, JSON parameter schema, and an async
|
|
//! `execute` method returning a structured [`ToolResult`].
|
|
//!
|
|
//! Tools are assembled into registries by [`default_tools`] (shell, file read/write)
|
|
//! and [`all_tools`] (full set including memory, browser, cron, HTTP, delegation,
|
|
//! and optional integrations). Security policy enforcement is injected via
|
|
//! [`SecurityPolicy`](crate::security::SecurityPolicy) at construction time.
|
|
//!
|
|
//! # Extension
|
|
//!
|
|
//! To add a new tool, implement [`Tool`] in a new submodule and register it in
|
|
//! [`all_tools_with_runtime`]. See `AGENTS.md` §7.3 for the full change playbook.
|
|
|
|
pub mod browser;
|
|
pub mod browser_open;
|
|
pub mod cli_discovery;
|
|
pub mod composio;
|
|
pub mod content_search;
|
|
pub mod cron_add;
|
|
pub mod cron_list;
|
|
pub mod cron_remove;
|
|
pub mod cron_run;
|
|
pub mod cron_runs;
|
|
pub mod cron_update;
|
|
pub mod delegate;
|
|
pub mod file_edit;
|
|
pub mod file_read;
|
|
pub mod file_write;
|
|
pub mod git_operations;
|
|
pub mod glob_search;
|
|
#[cfg(feature = "hardware")]
|
|
pub mod hardware_board_info;
|
|
#[cfg(feature = "hardware")]
|
|
pub mod hardware_memory_map;
|
|
#[cfg(feature = "hardware")]
|
|
pub mod hardware_memory_read;
|
|
pub mod http_request;
|
|
pub mod image_info;
|
|
pub mod mcp_client;
|
|
pub mod mcp_deferred;
|
|
pub mod mcp_protocol;
|
|
pub mod mcp_tool;
|
|
pub mod mcp_transport;
|
|
pub mod memory_forget;
|
|
pub mod memory_recall;
|
|
pub mod memory_store;
|
|
pub mod microsoft365;
|
|
pub mod model_routing_config;
|
|
pub mod node_tool;
|
|
pub mod notion_tool;
|
|
pub mod pdf_read;
|
|
pub mod proxy_config;
|
|
pub mod pushover;
|
|
pub mod schedule;
|
|
pub mod schema;
|
|
pub mod screenshot;
|
|
pub mod shell;
|
|
pub mod swarm;
|
|
pub mod tool_search;
|
|
pub mod traits;
|
|
pub mod web_fetch;
|
|
pub mod web_search_tool;
|
|
pub mod workspace_tool;
|
|
|
|
pub use browser::{BrowserTool, ComputerUseConfig};
|
|
pub use browser_open::BrowserOpenTool;
|
|
pub use composio::ComposioTool;
|
|
pub use content_search::ContentSearchTool;
|
|
pub use cron_add::CronAddTool;
|
|
pub use cron_list::CronListTool;
|
|
pub use cron_remove::CronRemoveTool;
|
|
pub use cron_run::CronRunTool;
|
|
pub use cron_runs::CronRunsTool;
|
|
pub use cron_update::CronUpdateTool;
|
|
pub use delegate::DelegateTool;
|
|
pub use file_edit::FileEditTool;
|
|
pub use file_read::FileReadTool;
|
|
pub use file_write::FileWriteTool;
|
|
pub use git_operations::GitOperationsTool;
|
|
pub use glob_search::GlobSearchTool;
|
|
#[cfg(feature = "hardware")]
|
|
pub use hardware_board_info::HardwareBoardInfoTool;
|
|
#[cfg(feature = "hardware")]
|
|
pub use hardware_memory_map::HardwareMemoryMapTool;
|
|
#[cfg(feature = "hardware")]
|
|
pub use hardware_memory_read::HardwareMemoryReadTool;
|
|
pub use http_request::HttpRequestTool;
|
|
pub use image_info::ImageInfoTool;
|
|
pub use mcp_client::McpRegistry;
|
|
pub use mcp_deferred::{ActivatedToolSet, DeferredMcpToolSet};
|
|
pub use mcp_tool::McpToolWrapper;
|
|
pub use memory_forget::MemoryForgetTool;
|
|
pub use memory_recall::MemoryRecallTool;
|
|
pub use memory_store::MemoryStoreTool;
|
|
pub use microsoft365::Microsoft365Tool;
|
|
pub use model_routing_config::ModelRoutingConfigTool;
|
|
#[allow(unused_imports)]
|
|
pub use node_tool::NodeTool;
|
|
pub use notion_tool::NotionTool;
|
|
pub use pdf_read::PdfReadTool;
|
|
pub use proxy_config::ProxyConfigTool;
|
|
pub use pushover::PushoverTool;
|
|
pub use schedule::ScheduleTool;
|
|
#[allow(unused_imports)]
|
|
pub use schema::{CleaningStrategy, SchemaCleanr};
|
|
pub use screenshot::ScreenshotTool;
|
|
pub use shell::ShellTool;
|
|
pub use swarm::SwarmTool;
|
|
pub use tool_search::ToolSearchTool;
|
|
pub use traits::Tool;
|
|
#[allow(unused_imports)]
|
|
pub use traits::{ToolResult, ToolSpec};
|
|
pub use web_fetch::WebFetchTool;
|
|
pub use web_search_tool::WebSearchTool;
|
|
pub use workspace_tool::WorkspaceTool;
|
|
|
|
use crate::config::{Config, DelegateAgentConfig};
|
|
use crate::memory::Memory;
|
|
use crate::runtime::{NativeRuntime, RuntimeAdapter};
|
|
use crate::security::SecurityPolicy;
|
|
use async_trait::async_trait;
|
|
use parking_lot::RwLock;
|
|
use std::collections::HashMap;
|
|
use std::sync::Arc;
|
|
|
|
/// Shared handle to the delegate tool's parent-tools list.
|
|
/// Callers can push additional tools (e.g. MCP wrappers) after construction.
|
|
pub type DelegateParentToolsHandle = Arc<RwLock<Vec<Arc<dyn Tool>>>>;
|
|
|
|
/// Thin wrapper that makes an `Arc<dyn Tool>` usable as `Box<dyn Tool>`.
|
|
pub struct ArcToolRef(pub Arc<dyn Tool>);
|
|
|
|
#[async_trait]
|
|
impl Tool for ArcToolRef {
|
|
fn name(&self) -> &str {
|
|
self.0.name()
|
|
}
|
|
|
|
fn description(&self) -> &str {
|
|
self.0.description()
|
|
}
|
|
|
|
fn parameters_schema(&self) -> serde_json::Value {
|
|
self.0.parameters_schema()
|
|
}
|
|
|
|
async fn execute(&self, args: serde_json::Value) -> anyhow::Result<ToolResult> {
|
|
self.0.execute(args).await
|
|
}
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
struct ArcDelegatingTool {
|
|
inner: Arc<dyn Tool>,
|
|
}
|
|
|
|
impl ArcDelegatingTool {
|
|
fn boxed(inner: Arc<dyn Tool>) -> Box<dyn Tool> {
|
|
Box::new(Self { inner })
|
|
}
|
|
}
|
|
|
|
#[async_trait]
|
|
impl Tool for ArcDelegatingTool {
|
|
fn name(&self) -> &str {
|
|
self.inner.name()
|
|
}
|
|
|
|
fn description(&self) -> &str {
|
|
self.inner.description()
|
|
}
|
|
|
|
fn parameters_schema(&self) -> serde_json::Value {
|
|
self.inner.parameters_schema()
|
|
}
|
|
|
|
async fn execute(&self, args: serde_json::Value) -> anyhow::Result<ToolResult> {
|
|
self.inner.execute(args).await
|
|
}
|
|
}
|
|
|
|
fn boxed_registry_from_arcs(tools: Vec<Arc<dyn Tool>>) -> Vec<Box<dyn Tool>> {
|
|
tools.into_iter().map(ArcDelegatingTool::boxed).collect()
|
|
}
|
|
|
|
/// Create the default tool registry
|
|
pub fn default_tools(security: Arc<SecurityPolicy>) -> Vec<Box<dyn Tool>> {
|
|
default_tools_with_runtime(security, Arc::new(NativeRuntime::new()))
|
|
}
|
|
|
|
/// Create the default tool registry with explicit runtime adapter.
|
|
pub fn default_tools_with_runtime(
|
|
security: Arc<SecurityPolicy>,
|
|
runtime: Arc<dyn RuntimeAdapter>,
|
|
) -> Vec<Box<dyn Tool>> {
|
|
vec![
|
|
Box::new(ShellTool::new(security.clone(), runtime)),
|
|
Box::new(FileReadTool::new(security.clone())),
|
|
Box::new(FileWriteTool::new(security.clone())),
|
|
Box::new(FileEditTool::new(security.clone())),
|
|
Box::new(GlobSearchTool::new(security.clone())),
|
|
Box::new(ContentSearchTool::new(security)),
|
|
]
|
|
}
|
|
|
|
/// Create full tool registry including memory tools and optional Composio
|
|
#[allow(clippy::implicit_hasher, clippy::too_many_arguments)]
|
|
pub fn all_tools(
|
|
config: Arc<Config>,
|
|
security: &Arc<SecurityPolicy>,
|
|
memory: Arc<dyn Memory>,
|
|
composio_key: Option<&str>,
|
|
composio_entity_id: Option<&str>,
|
|
browser_config: &crate::config::BrowserConfig,
|
|
http_config: &crate::config::HttpRequestConfig,
|
|
web_fetch_config: &crate::config::WebFetchConfig,
|
|
workspace_dir: &std::path::Path,
|
|
agents: &HashMap<String, DelegateAgentConfig>,
|
|
fallback_api_key: Option<&str>,
|
|
root_config: &crate::config::Config,
|
|
) -> (Vec<Box<dyn Tool>>, Option<DelegateParentToolsHandle>) {
|
|
all_tools_with_runtime(
|
|
config,
|
|
security,
|
|
Arc::new(NativeRuntime::new()),
|
|
memory,
|
|
composio_key,
|
|
composio_entity_id,
|
|
browser_config,
|
|
http_config,
|
|
web_fetch_config,
|
|
workspace_dir,
|
|
agents,
|
|
fallback_api_key,
|
|
root_config,
|
|
)
|
|
}
|
|
|
|
/// Create full tool registry including memory tools and optional Composio.
|
|
#[allow(clippy::implicit_hasher, clippy::too_many_arguments)]
|
|
pub fn all_tools_with_runtime(
|
|
config: Arc<Config>,
|
|
security: &Arc<SecurityPolicy>,
|
|
runtime: Arc<dyn RuntimeAdapter>,
|
|
memory: Arc<dyn Memory>,
|
|
composio_key: Option<&str>,
|
|
composio_entity_id: Option<&str>,
|
|
browser_config: &crate::config::BrowserConfig,
|
|
http_config: &crate::config::HttpRequestConfig,
|
|
web_fetch_config: &crate::config::WebFetchConfig,
|
|
workspace_dir: &std::path::Path,
|
|
agents: &HashMap<String, DelegateAgentConfig>,
|
|
fallback_api_key: Option<&str>,
|
|
root_config: &crate::config::Config,
|
|
) -> (Vec<Box<dyn Tool>>, Option<DelegateParentToolsHandle>) {
|
|
let mut tool_arcs: Vec<Arc<dyn Tool>> = vec![
|
|
Arc::new(ShellTool::new(security.clone(), runtime)),
|
|
Arc::new(FileReadTool::new(security.clone())),
|
|
Arc::new(FileWriteTool::new(security.clone())),
|
|
Arc::new(FileEditTool::new(security.clone())),
|
|
Arc::new(GlobSearchTool::new(security.clone())),
|
|
Arc::new(ContentSearchTool::new(security.clone())),
|
|
Arc::new(CronAddTool::new(config.clone(), security.clone())),
|
|
Arc::new(CronListTool::new(config.clone())),
|
|
Arc::new(CronRemoveTool::new(config.clone(), security.clone())),
|
|
Arc::new(CronUpdateTool::new(config.clone(), security.clone())),
|
|
Arc::new(CronRunTool::new(config.clone(), security.clone())),
|
|
Arc::new(CronRunsTool::new(config.clone())),
|
|
Arc::new(MemoryStoreTool::new(memory.clone(), security.clone())),
|
|
Arc::new(MemoryRecallTool::new(memory.clone())),
|
|
Arc::new(MemoryForgetTool::new(memory, security.clone())),
|
|
Arc::new(ScheduleTool::new(security.clone(), root_config.clone())),
|
|
Arc::new(ModelRoutingConfigTool::new(
|
|
config.clone(),
|
|
security.clone(),
|
|
)),
|
|
Arc::new(ProxyConfigTool::new(config.clone(), security.clone())),
|
|
Arc::new(GitOperationsTool::new(
|
|
security.clone(),
|
|
workspace_dir.to_path_buf(),
|
|
)),
|
|
Arc::new(PushoverTool::new(
|
|
security.clone(),
|
|
workspace_dir.to_path_buf(),
|
|
)),
|
|
];
|
|
|
|
if browser_config.enabled {
|
|
// Add legacy browser_open tool for simple URL opening
|
|
tool_arcs.push(Arc::new(BrowserOpenTool::new(
|
|
security.clone(),
|
|
browser_config.allowed_domains.clone(),
|
|
)));
|
|
// Add full browser automation tool (pluggable backend)
|
|
tool_arcs.push(Arc::new(BrowserTool::new_with_backend(
|
|
security.clone(),
|
|
browser_config.allowed_domains.clone(),
|
|
browser_config.session_name.clone(),
|
|
browser_config.backend.clone(),
|
|
browser_config.native_headless,
|
|
browser_config.native_webdriver_url.clone(),
|
|
browser_config.native_chrome_path.clone(),
|
|
ComputerUseConfig {
|
|
endpoint: browser_config.computer_use.endpoint.clone(),
|
|
api_key: browser_config.computer_use.api_key.clone(),
|
|
timeout_ms: browser_config.computer_use.timeout_ms,
|
|
allow_remote_endpoint: browser_config.computer_use.allow_remote_endpoint,
|
|
window_allowlist: browser_config.computer_use.window_allowlist.clone(),
|
|
max_coordinate_x: browser_config.computer_use.max_coordinate_x,
|
|
max_coordinate_y: browser_config.computer_use.max_coordinate_y,
|
|
},
|
|
)));
|
|
}
|
|
|
|
if http_config.enabled {
|
|
tool_arcs.push(Arc::new(HttpRequestTool::new(
|
|
security.clone(),
|
|
http_config.allowed_domains.clone(),
|
|
http_config.max_response_size,
|
|
http_config.timeout_secs,
|
|
http_config.allow_private_hosts,
|
|
)));
|
|
}
|
|
|
|
if web_fetch_config.enabled {
|
|
tool_arcs.push(Arc::new(WebFetchTool::new(
|
|
security.clone(),
|
|
web_fetch_config.allowed_domains.clone(),
|
|
web_fetch_config.blocked_domains.clone(),
|
|
web_fetch_config.max_response_size,
|
|
web_fetch_config.timeout_secs,
|
|
)));
|
|
}
|
|
|
|
// Web search tool (enabled by default for GLM and other models)
|
|
if root_config.web_search.enabled {
|
|
tool_arcs.push(Arc::new(WebSearchTool::new_with_config(
|
|
root_config.web_search.provider.clone(),
|
|
root_config.web_search.brave_api_key.clone(),
|
|
root_config.web_search.max_results,
|
|
root_config.web_search.timeout_secs,
|
|
root_config.config_path.clone(),
|
|
root_config.secrets.encrypt,
|
|
)));
|
|
}
|
|
|
|
// Notion API tool (conditionally registered)
|
|
if root_config.notion.enabled {
|
|
let notion_api_key = if root_config.notion.api_key.trim().is_empty() {
|
|
std::env::var("NOTION_API_KEY").unwrap_or_default()
|
|
} else {
|
|
root_config.notion.api_key.trim().to_string()
|
|
};
|
|
if notion_api_key.trim().is_empty() {
|
|
tracing::warn!(
|
|
"Notion tool enabled but no API key found (set notion.api_key or NOTION_API_KEY env var)"
|
|
);
|
|
} else {
|
|
tool_arcs.push(Arc::new(NotionTool::new(notion_api_key, security.clone())));
|
|
}
|
|
}
|
|
|
|
// PDF extraction (feature-gated at compile time via rag-pdf)
|
|
tool_arcs.push(Arc::new(PdfReadTool::new(security.clone())));
|
|
|
|
// Vision tools are always available
|
|
tool_arcs.push(Arc::new(ScreenshotTool::new(security.clone())));
|
|
tool_arcs.push(Arc::new(ImageInfoTool::new(security.clone())));
|
|
|
|
if let Some(key) = composio_key {
|
|
if !key.is_empty() {
|
|
tool_arcs.push(Arc::new(ComposioTool::new(
|
|
key,
|
|
composio_entity_id,
|
|
security.clone(),
|
|
)));
|
|
}
|
|
}
|
|
|
|
// Microsoft 365 Graph API integration
|
|
if root_config.microsoft365.enabled {
|
|
let ms_cfg = &root_config.microsoft365;
|
|
let tenant_id = ms_cfg
|
|
.tenant_id
|
|
.as_deref()
|
|
.unwrap_or_default()
|
|
.trim()
|
|
.to_string();
|
|
let client_id = ms_cfg
|
|
.client_id
|
|
.as_deref()
|
|
.unwrap_or_default()
|
|
.trim()
|
|
.to_string();
|
|
if !tenant_id.is_empty() && !client_id.is_empty() {
|
|
// Fail fast: client_credentials flow requires a client_secret at registration time.
|
|
if ms_cfg.auth_flow.trim() == "client_credentials"
|
|
&& ms_cfg
|
|
.client_secret
|
|
.as_deref()
|
|
.map_or(true, |s| s.trim().is_empty())
|
|
{
|
|
tracing::error!(
|
|
"microsoft365: client_credentials auth_flow requires a non-empty client_secret"
|
|
);
|
|
return (boxed_registry_from_arcs(tool_arcs), None);
|
|
}
|
|
|
|
let resolved = microsoft365::types::Microsoft365ResolvedConfig {
|
|
tenant_id,
|
|
client_id,
|
|
client_secret: ms_cfg.client_secret.clone(),
|
|
auth_flow: ms_cfg.auth_flow.clone(),
|
|
scopes: ms_cfg.scopes.clone(),
|
|
token_cache_encrypted: ms_cfg.token_cache_encrypted,
|
|
user_id: ms_cfg.user_id.as_deref().unwrap_or("me").to_string(),
|
|
};
|
|
// Store token cache in the config directory (next to config.toml),
|
|
// not the workspace directory, to keep bearer tokens out of the
|
|
// project tree.
|
|
let cache_dir = root_config.config_path.parent().unwrap_or(workspace_dir);
|
|
match Microsoft365Tool::new(resolved, security.clone(), cache_dir) {
|
|
Ok(tool) => tool_arcs.push(Arc::new(tool)),
|
|
Err(e) => {
|
|
tracing::error!("microsoft365: failed to initialize tool: {e}");
|
|
}
|
|
}
|
|
} else {
|
|
tracing::warn!(
|
|
"microsoft365: skipped registration because tenant_id or client_id is empty"
|
|
);
|
|
}
|
|
}
|
|
|
|
// Add delegation tool when agents are configured
|
|
let delegate_fallback_credential = fallback_api_key.and_then(|value| {
|
|
let trimmed_value = value.trim();
|
|
(!trimmed_value.is_empty()).then(|| trimmed_value.to_owned())
|
|
});
|
|
let provider_runtime_options = crate::providers::ProviderRuntimeOptions {
|
|
auth_profile_override: None,
|
|
provider_api_url: root_config.api_url.clone(),
|
|
zeroclaw_dir: root_config
|
|
.config_path
|
|
.parent()
|
|
.map(std::path::PathBuf::from),
|
|
secrets_encrypt: root_config.secrets.encrypt,
|
|
reasoning_enabled: root_config.runtime.reasoning_enabled,
|
|
provider_timeout_secs: Some(root_config.provider_timeout_secs),
|
|
extra_headers: root_config.extra_headers.clone(),
|
|
api_path: root_config.api_path.clone(),
|
|
};
|
|
|
|
let delegate_handle: Option<DelegateParentToolsHandle> = if agents.is_empty() {
|
|
None
|
|
} else {
|
|
let delegate_agents: HashMap<String, DelegateAgentConfig> = agents
|
|
.iter()
|
|
.map(|(name, cfg)| (name.clone(), cfg.clone()))
|
|
.collect();
|
|
let parent_tools = Arc::new(RwLock::new(tool_arcs.clone()));
|
|
let delegate_tool = DelegateTool::new_with_options(
|
|
delegate_agents,
|
|
delegate_fallback_credential.clone(),
|
|
security.clone(),
|
|
provider_runtime_options.clone(),
|
|
)
|
|
.with_parent_tools(Arc::clone(&parent_tools))
|
|
.with_multimodal_config(root_config.multimodal.clone());
|
|
tool_arcs.push(Arc::new(delegate_tool));
|
|
Some(parent_tools)
|
|
};
|
|
|
|
// Add swarm tool when swarms are configured
|
|
if !root_config.swarms.is_empty() {
|
|
let swarm_agents: HashMap<String, DelegateAgentConfig> = agents
|
|
.iter()
|
|
.map(|(name, cfg)| (name.clone(), cfg.clone()))
|
|
.collect();
|
|
tool_arcs.push(Arc::new(SwarmTool::new(
|
|
root_config.swarms.clone(),
|
|
swarm_agents,
|
|
delegate_fallback_credential,
|
|
security.clone(),
|
|
provider_runtime_options,
|
|
)));
|
|
}
|
|
|
|
// Workspace management tool (conditionally registered when workspace isolation is enabled)
|
|
if root_config.workspace.enabled {
|
|
let workspaces_dir = if root_config.workspace.workspaces_dir.starts_with("~/") {
|
|
let home = directories::UserDirs::new()
|
|
.map(|u| u.home_dir().to_path_buf())
|
|
.unwrap_or_else(|| std::path::PathBuf::from("."));
|
|
home.join(&root_config.workspace.workspaces_dir[2..])
|
|
} else {
|
|
std::path::PathBuf::from(&root_config.workspace.workspaces_dir)
|
|
};
|
|
let ws_manager = crate::config::workspace::WorkspaceManager::new(workspaces_dir);
|
|
tool_arcs.push(Arc::new(WorkspaceTool::new(
|
|
Arc::new(tokio::sync::RwLock::new(ws_manager)),
|
|
security.clone(),
|
|
)));
|
|
}
|
|
|
|
(boxed_registry_from_arcs(tool_arcs), delegate_handle)
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use crate::config::{BrowserConfig, Config, MemoryConfig};
|
|
use tempfile::TempDir;
|
|
|
|
fn test_config(tmp: &TempDir) -> Config {
|
|
Config {
|
|
workspace_dir: tmp.path().join("workspace"),
|
|
config_path: tmp.path().join("config.toml"),
|
|
..Config::default()
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn default_tools_has_expected_count() {
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let tools = default_tools(security);
|
|
assert_eq!(tools.len(), 6);
|
|
}
|
|
|
|
#[test]
|
|
fn all_tools_excludes_browser_when_disabled() {
|
|
let tmp = TempDir::new().unwrap();
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let mem_cfg = MemoryConfig {
|
|
backend: "markdown".into(),
|
|
..MemoryConfig::default()
|
|
};
|
|
let mem: Arc<dyn Memory> =
|
|
Arc::from(crate::memory::create_memory(&mem_cfg, tmp.path(), None).unwrap());
|
|
|
|
let browser = BrowserConfig {
|
|
enabled: false,
|
|
allowed_domains: vec!["example.com".into()],
|
|
session_name: None,
|
|
..BrowserConfig::default()
|
|
};
|
|
let http = crate::config::HttpRequestConfig::default();
|
|
let cfg = test_config(&tmp);
|
|
|
|
let (tools, _) = all_tools(
|
|
Arc::new(Config::default()),
|
|
&security,
|
|
mem,
|
|
None,
|
|
None,
|
|
&browser,
|
|
&http,
|
|
&crate::config::WebFetchConfig::default(),
|
|
tmp.path(),
|
|
&HashMap::new(),
|
|
None,
|
|
&cfg,
|
|
);
|
|
let names: Vec<&str> = tools.iter().map(|t| t.name()).collect();
|
|
assert!(!names.contains(&"browser_open"));
|
|
assert!(names.contains(&"schedule"));
|
|
assert!(names.contains(&"model_routing_config"));
|
|
assert!(names.contains(&"pushover"));
|
|
assert!(names.contains(&"proxy_config"));
|
|
}
|
|
|
|
#[test]
|
|
fn all_tools_includes_browser_when_enabled() {
|
|
let tmp = TempDir::new().unwrap();
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let mem_cfg = MemoryConfig {
|
|
backend: "markdown".into(),
|
|
..MemoryConfig::default()
|
|
};
|
|
let mem: Arc<dyn Memory> =
|
|
Arc::from(crate::memory::create_memory(&mem_cfg, tmp.path(), None).unwrap());
|
|
|
|
let browser = BrowserConfig {
|
|
enabled: true,
|
|
allowed_domains: vec!["example.com".into()],
|
|
session_name: None,
|
|
..BrowserConfig::default()
|
|
};
|
|
let http = crate::config::HttpRequestConfig::default();
|
|
let cfg = test_config(&tmp);
|
|
|
|
let (tools, _) = all_tools(
|
|
Arc::new(Config::default()),
|
|
&security,
|
|
mem,
|
|
None,
|
|
None,
|
|
&browser,
|
|
&http,
|
|
&crate::config::WebFetchConfig::default(),
|
|
tmp.path(),
|
|
&HashMap::new(),
|
|
None,
|
|
&cfg,
|
|
);
|
|
let names: Vec<&str> = tools.iter().map(|t| t.name()).collect();
|
|
assert!(names.contains(&"browser_open"));
|
|
assert!(names.contains(&"content_search"));
|
|
assert!(names.contains(&"model_routing_config"));
|
|
assert!(names.contains(&"pushover"));
|
|
assert!(names.contains(&"proxy_config"));
|
|
}
|
|
|
|
#[test]
|
|
fn default_tools_names() {
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let tools = default_tools(security);
|
|
let names: Vec<&str> = tools.iter().map(|t| t.name()).collect();
|
|
assert!(names.contains(&"shell"));
|
|
assert!(names.contains(&"file_read"));
|
|
assert!(names.contains(&"file_write"));
|
|
assert!(names.contains(&"file_edit"));
|
|
assert!(names.contains(&"glob_search"));
|
|
assert!(names.contains(&"content_search"));
|
|
}
|
|
|
|
#[test]
|
|
fn default_tools_all_have_descriptions() {
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let tools = default_tools(security);
|
|
for tool in &tools {
|
|
assert!(
|
|
!tool.description().is_empty(),
|
|
"Tool {} has empty description",
|
|
tool.name()
|
|
);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn default_tools_all_have_schemas() {
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let tools = default_tools(security);
|
|
for tool in &tools {
|
|
let schema = tool.parameters_schema();
|
|
assert!(
|
|
schema.is_object(),
|
|
"Tool {} schema is not an object",
|
|
tool.name()
|
|
);
|
|
assert!(
|
|
schema["properties"].is_object(),
|
|
"Tool {} schema has no properties",
|
|
tool.name()
|
|
);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn tool_spec_generation() {
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let tools = default_tools(security);
|
|
for tool in &tools {
|
|
let spec = tool.spec();
|
|
assert_eq!(spec.name, tool.name());
|
|
assert_eq!(spec.description, tool.description());
|
|
assert!(spec.parameters.is_object());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn tool_result_serde() {
|
|
let result = ToolResult {
|
|
success: true,
|
|
output: "hello".into(),
|
|
error: None,
|
|
};
|
|
let json = serde_json::to_string(&result).unwrap();
|
|
let parsed: ToolResult = serde_json::from_str(&json).unwrap();
|
|
assert!(parsed.success);
|
|
assert_eq!(parsed.output, "hello");
|
|
assert!(parsed.error.is_none());
|
|
}
|
|
|
|
#[test]
|
|
fn tool_result_with_error_serde() {
|
|
let result = ToolResult {
|
|
success: false,
|
|
output: String::new(),
|
|
error: Some("boom".into()),
|
|
};
|
|
let json = serde_json::to_string(&result).unwrap();
|
|
let parsed: ToolResult = serde_json::from_str(&json).unwrap();
|
|
assert!(!parsed.success);
|
|
assert_eq!(parsed.error.as_deref(), Some("boom"));
|
|
}
|
|
|
|
#[test]
|
|
fn tool_spec_serde() {
|
|
let spec = ToolSpec {
|
|
name: "test".into(),
|
|
description: "A test tool".into(),
|
|
parameters: serde_json::json!({"type": "object"}),
|
|
};
|
|
let json = serde_json::to_string(&spec).unwrap();
|
|
let parsed: ToolSpec = serde_json::from_str(&json).unwrap();
|
|
assert_eq!(parsed.name, "test");
|
|
assert_eq!(parsed.description, "A test tool");
|
|
}
|
|
|
|
#[test]
|
|
fn all_tools_includes_delegate_when_agents_configured() {
|
|
let tmp = TempDir::new().unwrap();
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let mem_cfg = MemoryConfig {
|
|
backend: "markdown".into(),
|
|
..MemoryConfig::default()
|
|
};
|
|
let mem: Arc<dyn Memory> =
|
|
Arc::from(crate::memory::create_memory(&mem_cfg, tmp.path(), None).unwrap());
|
|
|
|
let browser = BrowserConfig::default();
|
|
let http = crate::config::HttpRequestConfig::default();
|
|
let cfg = test_config(&tmp);
|
|
|
|
let mut agents = HashMap::new();
|
|
agents.insert(
|
|
"researcher".to_string(),
|
|
DelegateAgentConfig {
|
|
provider: "ollama".to_string(),
|
|
model: "llama3".to_string(),
|
|
system_prompt: None,
|
|
api_key: None,
|
|
temperature: None,
|
|
max_depth: 3,
|
|
agentic: false,
|
|
allowed_tools: Vec::new(),
|
|
max_iterations: 10,
|
|
},
|
|
);
|
|
|
|
let (tools, _) = all_tools(
|
|
Arc::new(Config::default()),
|
|
&security,
|
|
mem,
|
|
None,
|
|
None,
|
|
&browser,
|
|
&http,
|
|
&crate::config::WebFetchConfig::default(),
|
|
tmp.path(),
|
|
&agents,
|
|
Some("delegate-test-credential"),
|
|
&cfg,
|
|
);
|
|
let names: Vec<&str> = tools.iter().map(|t| t.name()).collect();
|
|
assert!(names.contains(&"delegate"));
|
|
}
|
|
|
|
#[test]
|
|
fn all_tools_excludes_delegate_when_no_agents() {
|
|
let tmp = TempDir::new().unwrap();
|
|
let security = Arc::new(SecurityPolicy::default());
|
|
let mem_cfg = MemoryConfig {
|
|
backend: "markdown".into(),
|
|
..MemoryConfig::default()
|
|
};
|
|
let mem: Arc<dyn Memory> =
|
|
Arc::from(crate::memory::create_memory(&mem_cfg, tmp.path(), None).unwrap());
|
|
|
|
let browser = BrowserConfig::default();
|
|
let http = crate::config::HttpRequestConfig::default();
|
|
let cfg = test_config(&tmp);
|
|
|
|
let (tools, _) = all_tools(
|
|
Arc::new(Config::default()),
|
|
&security,
|
|
mem,
|
|
None,
|
|
None,
|
|
&browser,
|
|
&http,
|
|
&crate::config::WebFetchConfig::default(),
|
|
tmp.path(),
|
|
&HashMap::new(),
|
|
None,
|
|
&cfg,
|
|
);
|
|
let names: Vec<&str> = tools.iter().map(|t| t.name()).collect();
|
|
assert!(!names.contains(&"delegate"));
|
|
}
|
|
}
|