package mcp import ( "os" "path/filepath" "testing" ) func TestNew_Good_DefaultWorkspace(t *testing.T) { cwd, err := os.Getwd() if err != nil { t.Fatalf("Failed to get working directory: %v", err) } s, err := New() if err != nil { t.Fatalf("Failed to create service: %v", err) } if s.workspaceRoot != cwd { t.Errorf("Expected default workspace root %s, got %s", cwd, s.workspaceRoot) } if s.medium == nil { t.Error("Expected medium to be set") } } func TestNew_Good_CustomWorkspace(t *testing.T) { tmpDir := t.TempDir() s, err := New(WithWorkspaceRoot(tmpDir)) if err != nil { t.Fatalf("Failed to create service: %v", err) } if s.workspaceRoot != tmpDir { t.Errorf("Expected workspace root %s, got %s", tmpDir, s.workspaceRoot) } if s.medium == nil { t.Error("Expected medium to be set") } } func TestNew_Good_NoRestriction(t *testing.T) { s, err := New(WithWorkspaceRoot("")) if err != nil { t.Fatalf("Failed to create service: %v", err) } if s.workspaceRoot != "" { t.Errorf("Expected empty workspace root, got %s", s.workspaceRoot) } if s.medium == nil { t.Error("Expected medium to be set (unsandboxed)") } } func TestMedium_Good_ReadWrite(t *testing.T) { tmpDir := t.TempDir() s, err := New(WithWorkspaceRoot(tmpDir)) if err != nil { t.Fatalf("Failed to create service: %v", err) } // Write a file testContent := "hello world" err = s.medium.Write("test.txt", testContent) if err != nil { t.Fatalf("Failed to write file: %v", err) } // Read it back content, err := s.medium.Read("test.txt") if err != nil { t.Fatalf("Failed to read file: %v", err) } if content != testContent { t.Errorf("Expected content %q, got %q", testContent, content) } // Verify file exists on disk diskPath := filepath.Join(tmpDir, "test.txt") if _, err := os.Stat(diskPath); os.IsNotExist(err) { t.Error("File should exist on disk") } } func TestMedium_Good_EnsureDir(t *testing.T) { tmpDir := t.TempDir() s, err := New(WithWorkspaceRoot(tmpDir)) if err != nil { t.Fatalf("Failed to create service: %v", err) } err = s.medium.EnsureDir("subdir/nested") if err != nil { t.Fatalf("Failed to create directory: %v", err) } // Verify directory exists diskPath := filepath.Join(tmpDir, "subdir", "nested") info, err := os.Stat(diskPath) if os.IsNotExist(err) { t.Error("Directory should exist on disk") } if err == nil && !info.IsDir() { t.Error("Path should be a directory") } } func TestMedium_Good_IsFile(t *testing.T) { tmpDir := t.TempDir() s, err := New(WithWorkspaceRoot(tmpDir)) if err != nil { t.Fatalf("Failed to create service: %v", err) } // File doesn't exist yet if s.medium.IsFile("test.txt") { t.Error("File should not exist yet") } // Create the file _ = s.medium.Write("test.txt", "content") // Now it should exist if !s.medium.IsFile("test.txt") { t.Error("File should exist after write") } } func TestSandboxing_Bad_Traversal(t *testing.T) { tmpDir := t.TempDir() s, err := New(WithWorkspaceRoot(tmpDir)) if err != nil { t.Fatalf("Failed to create service: %v", err) } // Path traversal should fail _, err = s.medium.Read("../secret.txt") if err == nil { t.Error("Expected error for path traversal") } // Absolute path outside workspace should fail // Note: local.Medium rejects all absolute paths if they are not inside root. // But Read takes relative path usually. If absolute, it cleans it. // If we pass "/etc/passwd", local.Medium path clean might reject it or treat it relative? // local.Medium.path() implementation: // if filepath.IsAbs(cleanPath) { return "", errors.New("path traversal attempt detected") } // So yes, it rejects absolute paths passed to Read. _, err = s.medium.Read("/etc/passwd") if err == nil { t.Error("Expected error for absolute path") } } func TestSandboxing_Bad_SymlinkTraversal(t *testing.T) { tmpDir := t.TempDir() outsideDir := t.TempDir() // Create a target file outside workspace targetFile := filepath.Join(outsideDir, "secret.txt") if err := os.WriteFile(targetFile, []byte("secret"), 0644); err != nil { t.Fatalf("Failed to create target file: %v", err) } // Create symlink inside workspace pointing outside symlinkPath := filepath.Join(tmpDir, "evil-link") if err := os.Symlink(targetFile, symlinkPath); err != nil { t.Skipf("Symlinks not supported: %v", err) } s, err := New(WithWorkspaceRoot(tmpDir)) if err != nil { t.Fatalf("Failed to create service: %v", err) } // Symlink traversal should be blocked _, err = s.medium.Read("evil-link") if err == nil { t.Error("Expected error for symlink pointing outside workspace") } }