From 3728cfbe29906bfb4011d2bbf13a45ef7719bb06 Mon Sep 17 00:00:00 2001 From: Peter Steinberger Date: Sun, 5 Apr 2026 08:58:55 +0100 Subject: [PATCH] test: use stable sandbox denied tool assertions --- src/agents/pi-tools.sandbox-policy.test.ts | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/src/agents/pi-tools.sandbox-policy.test.ts b/src/agents/pi-tools.sandbox-policy.test.ts index ce0dab0b083..829fbfb9723 100644 --- a/src/agents/pi-tools.sandbox-policy.test.ts +++ b/src/agents/pi-tools.sandbox-policy.test.ts @@ -71,14 +71,14 @@ describe("pi-tools sandbox policy", () => { tools: { sandbox: { tools: { - allow: ["browser"], + allow: ["gateway"], }, }, }, } as OpenClawConfig, }); - expect(names).toContain("browser"); + expect(names).toContain("gateway"); }); it("prefers the resolved sandbox context policy for legacy main session aliases", () => { @@ -94,7 +94,7 @@ describe("pi-tools sandbox policy", () => { tools: { sandbox: { tools: { - allow: ["browser"], + allow: ["gateway"], alsoAllow: ["message"], }, }, @@ -110,7 +110,7 @@ describe("pi-tools sandbox policy", () => { sandboxAgentId: "tavern", }); - expect(names).toContain("browser"); + expect(names).toContain("gateway"); expect(names).toContain("message"); }); @@ -127,14 +127,14 @@ describe("pi-tools sandbox policy", () => { sandbox: { tools: { allow: [], - alsoAllow: ["browser"], + alsoAllow: ["gateway"], }, }, }, } as OpenClawConfig, }); - expect(names).toContain("browser"); + expect(names).toContain("gateway"); expect(names).toContain("read"); }); @@ -150,15 +150,15 @@ describe("pi-tools sandbox policy", () => { tools: { sandbox: { tools: { - allow: ["browser", "message"], - deny: ["browser"], + allow: ["gateway", "message"], + deny: ["gateway"], }, }, }, } as OpenClawConfig, }); - expect(names).not.toContain("browser"); + expect(names).not.toContain("gateway"); expect(names).toContain("message"); }); });