karaoke-gen 0.101.0__py3-none-any.whl → 0.103.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- backend/api/routes/audio_search.py +4 -32
- backend/api/routes/file_upload.py +18 -83
- backend/api/routes/jobs.py +2 -2
- backend/api/routes/rate_limits.py +428 -0
- backend/api/routes/users.py +79 -19
- backend/config.py +16 -0
- backend/exceptions.py +66 -0
- backend/main.py +25 -1
- backend/services/email_validation_service.py +646 -0
- backend/services/firestore_service.py +21 -0
- backend/services/job_defaults_service.py +113 -0
- backend/services/job_manager.py +41 -2
- backend/services/rate_limit_service.py +641 -0
- backend/tests/conftest.py +7 -1
- backend/tests/test_audio_search.py +12 -8
- backend/tests/test_email_validation_service.py +298 -0
- backend/tests/test_file_upload.py +8 -6
- backend/tests/test_made_for_you.py +6 -4
- backend/tests/test_rate_limit_service.py +396 -0
- backend/tests/test_rate_limits_api.py +392 -0
- backend/workers/video_worker_orchestrator.py +26 -0
- {karaoke_gen-0.101.0.dist-info → karaoke_gen-0.103.1.dist-info}/METADATA +1 -1
- {karaoke_gen-0.101.0.dist-info → karaoke_gen-0.103.1.dist-info}/RECORD +26 -18
- {karaoke_gen-0.101.0.dist-info → karaoke_gen-0.103.1.dist-info}/WHEEL +0 -0
- {karaoke_gen-0.101.0.dist-info → karaoke_gen-0.103.1.dist-info}/entry_points.txt +0 -0
- {karaoke_gen-0.101.0.dist-info → karaoke_gen-0.103.1.dist-info}/licenses/LICENSE +0 -0
|
@@ -845,7 +845,8 @@ class TestAudioSearchThemeSupport:
|
|
|
845
845
|
This is the key behavior: selecting a theme should automatically
|
|
846
846
|
enable CDG and TXT output formats.
|
|
847
847
|
"""
|
|
848
|
-
from backend.api.routes.audio_search import AudioSearchRequest
|
|
848
|
+
from backend.api.routes.audio_search import AudioSearchRequest
|
|
849
|
+
from backend.services.job_defaults_service import resolve_cdg_txt_defaults
|
|
849
850
|
|
|
850
851
|
# When theme_id is set, enable_cdg/enable_txt should default to True
|
|
851
852
|
request = AudioSearchRequest(
|
|
@@ -855,7 +856,7 @@ class TestAudioSearchThemeSupport:
|
|
|
855
856
|
# enable_cdg and enable_txt are None (not specified)
|
|
856
857
|
)
|
|
857
858
|
|
|
858
|
-
resolved_cdg, resolved_txt =
|
|
859
|
+
resolved_cdg, resolved_txt = resolve_cdg_txt_defaults(
|
|
859
860
|
request.theme_id, request.enable_cdg, request.enable_txt
|
|
860
861
|
)
|
|
861
862
|
|
|
@@ -864,7 +865,8 @@ class TestAudioSearchThemeSupport:
|
|
|
864
865
|
|
|
865
866
|
def test_audio_search_request_no_theme_no_cdg_txt(self):
|
|
866
867
|
"""Test that without theme_id, CDG/TXT defaults to disabled."""
|
|
867
|
-
from backend.api.routes.audio_search import AudioSearchRequest
|
|
868
|
+
from backend.api.routes.audio_search import AudioSearchRequest
|
|
869
|
+
from backend.services.job_defaults_service import resolve_cdg_txt_defaults
|
|
868
870
|
|
|
869
871
|
request = AudioSearchRequest(
|
|
870
872
|
artist="Test Artist",
|
|
@@ -872,7 +874,7 @@ class TestAudioSearchThemeSupport:
|
|
|
872
874
|
# No theme_id, no enable_cdg, no enable_txt
|
|
873
875
|
)
|
|
874
876
|
|
|
875
|
-
resolved_cdg, resolved_txt =
|
|
877
|
+
resolved_cdg, resolved_txt = resolve_cdg_txt_defaults(
|
|
876
878
|
request.theme_id, request.enable_cdg, request.enable_txt
|
|
877
879
|
)
|
|
878
880
|
|
|
@@ -881,7 +883,8 @@ class TestAudioSearchThemeSupport:
|
|
|
881
883
|
|
|
882
884
|
def test_explicit_cdg_txt_overrides_theme_default(self):
|
|
883
885
|
"""Test that explicit enable_cdg/enable_txt values override theme defaults."""
|
|
884
|
-
from backend.api.routes.audio_search import AudioSearchRequest
|
|
886
|
+
from backend.api.routes.audio_search import AudioSearchRequest
|
|
887
|
+
from backend.services.job_defaults_service import resolve_cdg_txt_defaults
|
|
885
888
|
|
|
886
889
|
# Theme set (would default to True), but explicitly disabled
|
|
887
890
|
request = AudioSearchRequest(
|
|
@@ -892,7 +895,7 @@ class TestAudioSearchThemeSupport:
|
|
|
892
895
|
enable_txt=False,
|
|
893
896
|
)
|
|
894
897
|
|
|
895
|
-
resolved_cdg, resolved_txt =
|
|
898
|
+
resolved_cdg, resolved_txt = resolve_cdg_txt_defaults(
|
|
896
899
|
request.theme_id, request.enable_cdg, request.enable_txt
|
|
897
900
|
)
|
|
898
901
|
|
|
@@ -901,7 +904,8 @@ class TestAudioSearchThemeSupport:
|
|
|
901
904
|
|
|
902
905
|
def test_explicit_cdg_txt_enables_without_theme(self):
|
|
903
906
|
"""Test that explicit True enables CDG/TXT even without theme."""
|
|
904
|
-
from backend.api.routes.audio_search import AudioSearchRequest
|
|
907
|
+
from backend.api.routes.audio_search import AudioSearchRequest
|
|
908
|
+
from backend.services.job_defaults_service import resolve_cdg_txt_defaults
|
|
905
909
|
|
|
906
910
|
# No theme (would default to False), but explicitly enabled
|
|
907
911
|
request = AudioSearchRequest(
|
|
@@ -911,7 +915,7 @@ class TestAudioSearchThemeSupport:
|
|
|
911
915
|
enable_txt=True,
|
|
912
916
|
)
|
|
913
917
|
|
|
914
|
-
resolved_cdg, resolved_txt =
|
|
918
|
+
resolved_cdg, resolved_txt = resolve_cdg_txt_defaults(
|
|
915
919
|
request.theme_id, request.enable_cdg, request.enable_txt
|
|
916
920
|
)
|
|
917
921
|
|
|
@@ -0,0 +1,298 @@
|
|
|
1
|
+
"""
|
|
2
|
+
Unit tests for EmailValidationService.
|
|
3
|
+
|
|
4
|
+
Tests email normalization, disposable domain detection, and blocklist management.
|
|
5
|
+
"""
|
|
6
|
+
|
|
7
|
+
import pytest
|
|
8
|
+
from unittest.mock import Mock, MagicMock, patch
|
|
9
|
+
|
|
10
|
+
# Mock Google Cloud before imports
|
|
11
|
+
import sys
|
|
12
|
+
sys.modules['google.cloud.firestore'] = MagicMock()
|
|
13
|
+
sys.modules['google.cloud.storage'] = MagicMock()
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
class TestEmailNormalization:
|
|
17
|
+
"""Test email normalization logic."""
|
|
18
|
+
|
|
19
|
+
@pytest.fixture
|
|
20
|
+
def mock_db(self):
|
|
21
|
+
"""Create a mock Firestore client."""
|
|
22
|
+
mock = MagicMock()
|
|
23
|
+
# Default: empty blocklist config
|
|
24
|
+
mock_doc = Mock()
|
|
25
|
+
mock_doc.exists = False
|
|
26
|
+
mock.collection.return_value.document.return_value.get.return_value = mock_doc
|
|
27
|
+
return mock
|
|
28
|
+
|
|
29
|
+
@pytest.fixture
|
|
30
|
+
def email_service(self, mock_db):
|
|
31
|
+
"""Create EmailValidationService instance with mocks."""
|
|
32
|
+
from backend.services.email_validation_service import EmailValidationService
|
|
33
|
+
service = EmailValidationService(db=mock_db)
|
|
34
|
+
return service
|
|
35
|
+
|
|
36
|
+
# =========================================================================
|
|
37
|
+
# Gmail Normalization Tests
|
|
38
|
+
# =========================================================================
|
|
39
|
+
|
|
40
|
+
def test_normalize_gmail_removes_dots(self, email_service):
|
|
41
|
+
"""Test that dots are removed from Gmail local part."""
|
|
42
|
+
result = email_service.normalize_email("j.o.h.n@gmail.com")
|
|
43
|
+
assert result == "john@gmail.com"
|
|
44
|
+
|
|
45
|
+
def test_normalize_gmail_removes_plus_suffix(self, email_service):
|
|
46
|
+
"""Test that +tag is removed from Gmail local part."""
|
|
47
|
+
result = email_service.normalize_email("john+spam@gmail.com")
|
|
48
|
+
assert result == "john@gmail.com"
|
|
49
|
+
|
|
50
|
+
def test_normalize_gmail_removes_dots_and_plus(self, email_service):
|
|
51
|
+
"""Test both dots and +tag are removed from Gmail."""
|
|
52
|
+
result = email_service.normalize_email("j.o.h.n+newsletter@gmail.com")
|
|
53
|
+
assert result == "john@gmail.com"
|
|
54
|
+
|
|
55
|
+
def test_normalize_googlemail_treated_like_gmail(self, email_service):
|
|
56
|
+
"""Test that googlemail.com is normalized like gmail.com."""
|
|
57
|
+
result = email_service.normalize_email("j.o.h.n+test@googlemail.com")
|
|
58
|
+
assert result == "john@googlemail.com"
|
|
59
|
+
|
|
60
|
+
def test_normalize_gmail_to_lowercase(self, email_service):
|
|
61
|
+
"""Test Gmail addresses are lowercased."""
|
|
62
|
+
result = email_service.normalize_email("JOHN.DOE+Test@GMAIL.COM")
|
|
63
|
+
assert result == "johndoe@gmail.com"
|
|
64
|
+
|
|
65
|
+
# =========================================================================
|
|
66
|
+
# Non-Gmail Normalization Tests
|
|
67
|
+
# =========================================================================
|
|
68
|
+
|
|
69
|
+
def test_normalize_non_gmail_preserves_dots(self, email_service):
|
|
70
|
+
"""Test dots are preserved for non-Gmail domains."""
|
|
71
|
+
result = email_service.normalize_email("j.o.h.n@example.com")
|
|
72
|
+
assert result == "j.o.h.n@example.com"
|
|
73
|
+
|
|
74
|
+
def test_normalize_non_gmail_preserves_plus(self, email_service):
|
|
75
|
+
"""Test +tag is preserved for non-Gmail domains."""
|
|
76
|
+
result = email_service.normalize_email("john+tag@company.com")
|
|
77
|
+
assert result == "john+tag@company.com"
|
|
78
|
+
|
|
79
|
+
def test_normalize_non_gmail_to_lowercase(self, email_service):
|
|
80
|
+
"""Test non-Gmail addresses are lowercased."""
|
|
81
|
+
result = email_service.normalize_email("John.Doe@Example.Com")
|
|
82
|
+
assert result == "john.doe@example.com"
|
|
83
|
+
|
|
84
|
+
def test_normalize_strips_whitespace(self, email_service):
|
|
85
|
+
"""Test whitespace is stripped."""
|
|
86
|
+
result = email_service.normalize_email(" john@example.com ")
|
|
87
|
+
assert result == "john@example.com"
|
|
88
|
+
|
|
89
|
+
# =========================================================================
|
|
90
|
+
# Edge Cases
|
|
91
|
+
# =========================================================================
|
|
92
|
+
|
|
93
|
+
def test_normalize_empty_string(self, email_service):
|
|
94
|
+
"""Test empty string returns empty."""
|
|
95
|
+
result = email_service.normalize_email("")
|
|
96
|
+
assert result == ""
|
|
97
|
+
|
|
98
|
+
def test_normalize_none_returns_empty(self, email_service):
|
|
99
|
+
"""Test None returns empty string."""
|
|
100
|
+
result = email_service.normalize_email(None)
|
|
101
|
+
assert result == ""
|
|
102
|
+
|
|
103
|
+
def test_normalize_invalid_no_at_sign(self, email_service):
|
|
104
|
+
"""Test email without @ is returned as-is (lowercase)."""
|
|
105
|
+
result = email_service.normalize_email("notanemail")
|
|
106
|
+
assert result == "notanemail"
|
|
107
|
+
|
|
108
|
+
|
|
109
|
+
class TestDisposableDomainDetection:
|
|
110
|
+
"""Test disposable domain detection."""
|
|
111
|
+
|
|
112
|
+
@pytest.fixture
|
|
113
|
+
def mock_db(self):
|
|
114
|
+
"""Create a mock Firestore client."""
|
|
115
|
+
mock = MagicMock()
|
|
116
|
+
mock_doc = Mock()
|
|
117
|
+
mock_doc.exists = False
|
|
118
|
+
mock.collection.return_value.document.return_value.get.return_value = mock_doc
|
|
119
|
+
return mock
|
|
120
|
+
|
|
121
|
+
@pytest.fixture
|
|
122
|
+
def email_service(self, mock_db):
|
|
123
|
+
"""Create EmailValidationService instance with mocks."""
|
|
124
|
+
from backend.services.email_validation_service import EmailValidationService
|
|
125
|
+
# Clear any cached blocklist
|
|
126
|
+
EmailValidationService._blocklist_cache = None
|
|
127
|
+
EmailValidationService._blocklist_cache_time = None
|
|
128
|
+
service = EmailValidationService(db=mock_db)
|
|
129
|
+
return service
|
|
130
|
+
|
|
131
|
+
def test_detect_known_disposable_domain(self, email_service):
|
|
132
|
+
"""Test known disposable domains are detected."""
|
|
133
|
+
# These are in DEFAULT_DISPOSABLE_DOMAINS
|
|
134
|
+
assert email_service.is_disposable_domain("user@tempmail.com") is True
|
|
135
|
+
assert email_service.is_disposable_domain("user@mailinator.com") is True
|
|
136
|
+
assert email_service.is_disposable_domain("user@guerrillamail.com") is True
|
|
137
|
+
|
|
138
|
+
def test_detect_legitimate_domain(self, email_service):
|
|
139
|
+
"""Test legitimate domains are not flagged."""
|
|
140
|
+
assert email_service.is_disposable_domain("user@gmail.com") is False
|
|
141
|
+
assert email_service.is_disposable_domain("user@yahoo.com") is False
|
|
142
|
+
assert email_service.is_disposable_domain("user@company.com") is False
|
|
143
|
+
|
|
144
|
+
def test_detect_case_insensitive(self, email_service):
|
|
145
|
+
"""Test domain detection is case-insensitive."""
|
|
146
|
+
assert email_service.is_disposable_domain("user@TEMPMAIL.COM") is True
|
|
147
|
+
assert email_service.is_disposable_domain("user@TempMail.Com") is True
|
|
148
|
+
|
|
149
|
+
def test_detect_invalid_email_returns_false(self, email_service):
|
|
150
|
+
"""Test invalid email returns False."""
|
|
151
|
+
assert email_service.is_disposable_domain("notanemail") is False
|
|
152
|
+
assert email_service.is_disposable_domain("") is False
|
|
153
|
+
|
|
154
|
+
|
|
155
|
+
class TestBlocklistManagement:
|
|
156
|
+
"""Test blocklist management functionality."""
|
|
157
|
+
|
|
158
|
+
@pytest.fixture
|
|
159
|
+
def mock_db(self):
|
|
160
|
+
"""Create a mock Firestore client with blocklist."""
|
|
161
|
+
mock = MagicMock()
|
|
162
|
+
mock_doc = Mock()
|
|
163
|
+
mock_doc.exists = True
|
|
164
|
+
mock_doc.to_dict.return_value = {
|
|
165
|
+
"disposable_domains": ["custom-temp.com"],
|
|
166
|
+
"blocked_emails": ["spammer@example.com"],
|
|
167
|
+
"blocked_ips": ["192.168.1.100"],
|
|
168
|
+
}
|
|
169
|
+
mock.collection.return_value.document.return_value.get.return_value = mock_doc
|
|
170
|
+
return mock
|
|
171
|
+
|
|
172
|
+
@pytest.fixture
|
|
173
|
+
def email_service(self, mock_db):
|
|
174
|
+
"""Create EmailValidationService instance with mocks."""
|
|
175
|
+
from backend.services.email_validation_service import EmailValidationService
|
|
176
|
+
# Clear any cached blocklist
|
|
177
|
+
EmailValidationService._blocklist_cache = None
|
|
178
|
+
EmailValidationService._blocklist_cache_time = None
|
|
179
|
+
service = EmailValidationService(db=mock_db)
|
|
180
|
+
return service
|
|
181
|
+
|
|
182
|
+
def test_is_email_blocked(self, email_service):
|
|
183
|
+
"""Test blocked email detection."""
|
|
184
|
+
assert email_service.is_email_blocked("spammer@example.com") is True
|
|
185
|
+
assert email_service.is_email_blocked("legitimate@example.com") is False
|
|
186
|
+
|
|
187
|
+
def test_is_email_blocked_case_insensitive(self, email_service):
|
|
188
|
+
"""Test blocked email detection is case-insensitive."""
|
|
189
|
+
assert email_service.is_email_blocked("SPAMMER@example.com") is True
|
|
190
|
+
assert email_service.is_email_blocked("Spammer@Example.Com") is True
|
|
191
|
+
|
|
192
|
+
def test_is_ip_blocked(self, email_service):
|
|
193
|
+
"""Test blocked IP detection."""
|
|
194
|
+
assert email_service.is_ip_blocked("192.168.1.100") is True
|
|
195
|
+
assert email_service.is_ip_blocked("10.0.0.1") is False
|
|
196
|
+
|
|
197
|
+
def test_custom_disposable_domain_added(self, email_service):
|
|
198
|
+
"""Test custom disposable domains from Firestore are included."""
|
|
199
|
+
assert email_service.is_disposable_domain("user@custom-temp.com") is True
|
|
200
|
+
|
|
201
|
+
def test_blocklist_caching(self, email_service, mock_db):
|
|
202
|
+
"""Test blocklist is cached."""
|
|
203
|
+
# First call
|
|
204
|
+
email_service.is_disposable_domain("user@test.com")
|
|
205
|
+
# Second call should use cache
|
|
206
|
+
email_service.is_disposable_domain("user@test2.com")
|
|
207
|
+
|
|
208
|
+
# Should only call Firestore once due to caching
|
|
209
|
+
assert mock_db.collection.return_value.document.return_value.get.call_count == 1
|
|
210
|
+
|
|
211
|
+
|
|
212
|
+
class TestBetaEnrollmentValidation:
|
|
213
|
+
"""Test beta enrollment validation."""
|
|
214
|
+
|
|
215
|
+
@pytest.fixture
|
|
216
|
+
def mock_db(self):
|
|
217
|
+
"""Create a mock Firestore client."""
|
|
218
|
+
mock = MagicMock()
|
|
219
|
+
mock_doc = Mock()
|
|
220
|
+
mock_doc.exists = True
|
|
221
|
+
mock_doc.to_dict.return_value = {
|
|
222
|
+
"disposable_domains": [],
|
|
223
|
+
"blocked_emails": ["blocked@example.com"],
|
|
224
|
+
"blocked_ips": [],
|
|
225
|
+
}
|
|
226
|
+
mock.collection.return_value.document.return_value.get.return_value = mock_doc
|
|
227
|
+
return mock
|
|
228
|
+
|
|
229
|
+
@pytest.fixture
|
|
230
|
+
def email_service(self, mock_db):
|
|
231
|
+
"""Create EmailValidationService instance with mocks."""
|
|
232
|
+
from backend.services.email_validation_service import EmailValidationService
|
|
233
|
+
EmailValidationService._blocklist_cache = None
|
|
234
|
+
EmailValidationService._blocklist_cache_time = None
|
|
235
|
+
service = EmailValidationService(db=mock_db)
|
|
236
|
+
return service
|
|
237
|
+
|
|
238
|
+
def test_validate_legitimate_email(self, email_service):
|
|
239
|
+
"""Test legitimate email passes validation."""
|
|
240
|
+
is_valid, error = email_service.validate_email_for_beta("user@gmail.com")
|
|
241
|
+
assert is_valid is True
|
|
242
|
+
assert error == ""
|
|
243
|
+
|
|
244
|
+
def test_validate_disposable_email_rejected(self, email_service):
|
|
245
|
+
"""Test disposable email is rejected."""
|
|
246
|
+
is_valid, error = email_service.validate_email_for_beta("user@tempmail.com")
|
|
247
|
+
assert is_valid is False
|
|
248
|
+
assert "Disposable email" in error
|
|
249
|
+
|
|
250
|
+
def test_validate_blocked_email_rejected(self, email_service):
|
|
251
|
+
"""Test blocked email is rejected."""
|
|
252
|
+
is_valid, error = email_service.validate_email_for_beta("blocked@example.com")
|
|
253
|
+
assert is_valid is False
|
|
254
|
+
assert "not allowed" in error
|
|
255
|
+
|
|
256
|
+
def test_validate_invalid_format_rejected(self, email_service):
|
|
257
|
+
"""Test invalid email format is rejected."""
|
|
258
|
+
is_valid, error = email_service.validate_email_for_beta("notanemail")
|
|
259
|
+
assert is_valid is False
|
|
260
|
+
assert "Invalid email format" in error
|
|
261
|
+
|
|
262
|
+
def test_validate_empty_email_rejected(self, email_service):
|
|
263
|
+
"""Test empty email is rejected."""
|
|
264
|
+
is_valid, error = email_service.validate_email_for_beta("")
|
|
265
|
+
assert is_valid is False
|
|
266
|
+
|
|
267
|
+
|
|
268
|
+
class TestIPHashing:
|
|
269
|
+
"""Test IP address hashing."""
|
|
270
|
+
|
|
271
|
+
@pytest.fixture
|
|
272
|
+
def email_service(self):
|
|
273
|
+
"""Create EmailValidationService instance with mocks."""
|
|
274
|
+
mock_db = MagicMock()
|
|
275
|
+
mock_doc = Mock()
|
|
276
|
+
mock_doc.exists = False
|
|
277
|
+
mock_db.collection.return_value.document.return_value.get.return_value = mock_doc
|
|
278
|
+
|
|
279
|
+
from backend.services.email_validation_service import EmailValidationService
|
|
280
|
+
return EmailValidationService(db=mock_db)
|
|
281
|
+
|
|
282
|
+
def test_hash_ip_consistent(self, email_service):
|
|
283
|
+
"""Test IP hashing produces consistent results."""
|
|
284
|
+
hash1 = email_service.hash_ip("192.168.1.1")
|
|
285
|
+
hash2 = email_service.hash_ip("192.168.1.1")
|
|
286
|
+
assert hash1 == hash2
|
|
287
|
+
|
|
288
|
+
def test_hash_ip_different_for_different_ips(self, email_service):
|
|
289
|
+
"""Test different IPs produce different hashes."""
|
|
290
|
+
hash1 = email_service.hash_ip("192.168.1.1")
|
|
291
|
+
hash2 = email_service.hash_ip("192.168.1.2")
|
|
292
|
+
assert hash1 != hash2
|
|
293
|
+
|
|
294
|
+
def test_hash_ip_is_sha256(self, email_service):
|
|
295
|
+
"""Test IP hash is SHA-256 (64 hex chars)."""
|
|
296
|
+
hash_result = email_service.hash_ip("192.168.1.1")
|
|
297
|
+
assert len(hash_result) == 64
|
|
298
|
+
assert all(c in "0123456789abcdef" for c in hash_result)
|
|
@@ -1681,17 +1681,19 @@ class TestUploadEndpointThemeSupport:
|
|
|
1681
1681
|
)
|
|
1682
1682
|
|
|
1683
1683
|
def test_upload_endpoint_uses_resolve_cdg_txt_defaults(self):
|
|
1684
|
-
"""Verify the upload endpoint uses
|
|
1684
|
+
"""Verify the upload endpoint uses resolve_cdg_txt_defaults for theme-based defaults."""
|
|
1685
|
+
import inspect
|
|
1685
1686
|
from backend.api.routes import file_upload as file_upload_module
|
|
1686
1687
|
|
|
1687
|
-
|
|
1688
|
-
source_code = f.read()
|
|
1688
|
+
source_code = inspect.getsource(file_upload_module)
|
|
1689
1689
|
|
|
1690
|
-
|
|
1690
|
+
# Check for the centralized resolve_cdg_txt_defaults function (imported from job_defaults_service)
|
|
1691
|
+
has_resolve_call = 'resolve_cdg_txt_defaults(' in source_code
|
|
1691
1692
|
|
|
1692
1693
|
assert has_resolve_call, (
|
|
1693
|
-
"file_upload.py does not call
|
|
1694
|
-
"
|
|
1694
|
+
"file_upload.py does not call resolve_cdg_txt_defaults(). "
|
|
1695
|
+
"Theme-driven CDG/TXT defaults (controlled by DEFAULT_ENABLE_CDG/DEFAULT_ENABLE_TXT "
|
|
1696
|
+
"settings) must be applied via the centralized job_defaults_service."
|
|
1695
1697
|
)
|
|
1696
1698
|
|
|
1697
1699
|
def test_upload_endpoint_has_optional_cdg_txt_params(self):
|
|
@@ -1503,6 +1503,8 @@ class TestMadeForYouDistributionSettings:
|
|
|
1503
1503
|
settings.default_brand_prefix = "NOMAD"
|
|
1504
1504
|
settings.default_discord_webhook_url = None
|
|
1505
1505
|
settings.default_youtube_description = None
|
|
1506
|
+
settings.default_enable_cdg = True
|
|
1507
|
+
settings.default_enable_txt = True
|
|
1506
1508
|
return settings
|
|
1507
1509
|
|
|
1508
1510
|
@pytest.mark.asyncio
|
|
@@ -1522,7 +1524,7 @@ class TestMadeForYouDistributionSettings:
|
|
|
1522
1524
|
patch('backend.services.audio_search_service.get_audio_search_service') as mock_get_audio, \
|
|
1523
1525
|
patch('backend.services.storage_service.StorageService'), \
|
|
1524
1526
|
patch('backend.api.routes.users.get_theme_service', return_value=mock_theme_service), \
|
|
1525
|
-
patch('backend.
|
|
1527
|
+
patch('backend.services.job_defaults_service.get_settings', return_value=mock_settings):
|
|
1526
1528
|
|
|
1527
1529
|
from backend.services.audio_search_service import NoResultsError
|
|
1528
1530
|
mock_audio_service = MagicMock()
|
|
@@ -1558,7 +1560,7 @@ class TestMadeForYouDistributionSettings:
|
|
|
1558
1560
|
patch('backend.services.audio_search_service.get_audio_search_service') as mock_get_audio, \
|
|
1559
1561
|
patch('backend.services.storage_service.StorageService'), \
|
|
1560
1562
|
patch('backend.api.routes.users.get_theme_service', return_value=mock_theme_service), \
|
|
1561
|
-
patch('backend.
|
|
1563
|
+
patch('backend.services.job_defaults_service.get_settings', return_value=mock_settings):
|
|
1562
1564
|
|
|
1563
1565
|
from backend.services.audio_search_service import NoResultsError
|
|
1564
1566
|
mock_audio_service = MagicMock()
|
|
@@ -1594,7 +1596,7 @@ class TestMadeForYouDistributionSettings:
|
|
|
1594
1596
|
patch('backend.services.audio_search_service.get_audio_search_service') as mock_get_audio, \
|
|
1595
1597
|
patch('backend.services.storage_service.StorageService'), \
|
|
1596
1598
|
patch('backend.api.routes.users.get_theme_service', return_value=mock_theme_service), \
|
|
1597
|
-
patch('backend.
|
|
1599
|
+
patch('backend.services.job_defaults_service.get_settings', return_value=mock_settings):
|
|
1598
1600
|
|
|
1599
1601
|
from backend.services.audio_search_service import NoResultsError
|
|
1600
1602
|
mock_audio_service = MagicMock()
|
|
@@ -1628,7 +1630,7 @@ class TestMadeForYouDistributionSettings:
|
|
|
1628
1630
|
patch('backend.services.audio_search_service.get_audio_search_service') as mock_get_audio, \
|
|
1629
1631
|
patch('backend.services.storage_service.StorageService'), \
|
|
1630
1632
|
patch('backend.api.routes.users.get_theme_service', return_value=mock_theme_service), \
|
|
1631
|
-
patch('backend.
|
|
1633
|
+
patch('backend.services.job_defaults_service.get_settings', return_value=mock_settings):
|
|
1632
1634
|
|
|
1633
1635
|
from backend.services.audio_search_service import NoResultsError
|
|
1634
1636
|
mock_audio_service = MagicMock()
|