karaoke-gen 0.99.3__py3-none-any.whl → 0.103.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- backend/api/routes/admin.py +512 -1
- backend/api/routes/audio_search.py +17 -34
- backend/api/routes/file_upload.py +60 -84
- backend/api/routes/internal.py +6 -0
- backend/api/routes/jobs.py +11 -3
- backend/api/routes/rate_limits.py +428 -0
- backend/api/routes/review.py +13 -6
- backend/api/routes/tenant.py +120 -0
- backend/api/routes/users.py +229 -247
- backend/config.py +16 -0
- backend/exceptions.py +66 -0
- backend/main.py +30 -1
- backend/middleware/__init__.py +7 -1
- backend/middleware/tenant.py +192 -0
- backend/models/job.py +19 -3
- backend/models/tenant.py +208 -0
- backend/models/user.py +18 -0
- backend/services/email_service.py +253 -6
- backend/services/email_validation_service.py +646 -0
- backend/services/firestore_service.py +27 -0
- backend/services/job_defaults_service.py +113 -0
- backend/services/job_manager.py +73 -3
- backend/services/rate_limit_service.py +641 -0
- backend/services/stripe_service.py +61 -35
- backend/services/tenant_service.py +285 -0
- backend/services/user_service.py +85 -7
- backend/tests/conftest.py +7 -1
- backend/tests/emulator/test_made_for_you_integration.py +167 -0
- backend/tests/test_admin_job_files.py +337 -0
- backend/tests/test_admin_job_reset.py +384 -0
- backend/tests/test_admin_job_update.py +326 -0
- backend/tests/test_audio_search.py +12 -8
- backend/tests/test_email_service.py +233 -0
- backend/tests/test_email_validation_service.py +298 -0
- backend/tests/test_file_upload.py +8 -6
- backend/tests/test_impersonation.py +223 -0
- backend/tests/test_job_creation_regression.py +4 -0
- backend/tests/test_job_manager.py +146 -1
- backend/tests/test_made_for_you.py +2088 -0
- backend/tests/test_models.py +139 -0
- backend/tests/test_rate_limit_service.py +396 -0
- backend/tests/test_rate_limits_api.py +392 -0
- backend/tests/test_tenant_api.py +350 -0
- backend/tests/test_tenant_middleware.py +345 -0
- backend/tests/test_tenant_models.py +406 -0
- backend/tests/test_tenant_service.py +418 -0
- backend/workers/video_worker.py +8 -3
- backend/workers/video_worker_orchestrator.py +26 -0
- {karaoke_gen-0.99.3.dist-info → karaoke_gen-0.103.1.dist-info}/METADATA +1 -1
- {karaoke_gen-0.99.3.dist-info → karaoke_gen-0.103.1.dist-info}/RECORD +55 -33
- lyrics_transcriber/frontend/src/api.ts +13 -5
- lyrics_transcriber/frontend/src/components/PreviewVideoSection.tsx +90 -57
- {karaoke_gen-0.99.3.dist-info → karaoke_gen-0.103.1.dist-info}/WHEEL +0 -0
- {karaoke_gen-0.99.3.dist-info → karaoke_gen-0.103.1.dist-info}/entry_points.txt +0 -0
- {karaoke_gen-0.99.3.dist-info → karaoke_gen-0.103.1.dist-info}/licenses/LICENSE +0 -0
|
@@ -0,0 +1,392 @@
|
|
|
1
|
+
"""
|
|
2
|
+
Unit tests for rate limits admin API endpoints.
|
|
3
|
+
|
|
4
|
+
Tests the rate limit statistics, blocklist management, and user override endpoints.
|
|
5
|
+
"""
|
|
6
|
+
import pytest
|
|
7
|
+
from unittest.mock import Mock, patch, MagicMock
|
|
8
|
+
from fastapi.testclient import TestClient
|
|
9
|
+
from fastapi import FastAPI
|
|
10
|
+
from datetime import datetime, timezone
|
|
11
|
+
|
|
12
|
+
from backend.api.routes.rate_limits import router
|
|
13
|
+
from backend.api.dependencies import require_admin
|
|
14
|
+
from backend.services.auth_service import AuthResult, UserType
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
# Create a test app with the rate_limits router
|
|
18
|
+
app = FastAPI()
|
|
19
|
+
app.include_router(router, prefix="/api")
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
def get_mock_admin():
|
|
23
|
+
"""Override for require_admin dependency."""
|
|
24
|
+
return AuthResult(
|
|
25
|
+
is_valid=True,
|
|
26
|
+
user_type=UserType.ADMIN,
|
|
27
|
+
remaining_uses=-1,
|
|
28
|
+
message="Admin access granted",
|
|
29
|
+
user_email="admin@example.com",
|
|
30
|
+
is_admin=True,
|
|
31
|
+
)
|
|
32
|
+
|
|
33
|
+
|
|
34
|
+
# Override the require_admin dependency
|
|
35
|
+
app.dependency_overrides[require_admin] = get_mock_admin
|
|
36
|
+
|
|
37
|
+
|
|
38
|
+
@pytest.fixture
|
|
39
|
+
def client():
|
|
40
|
+
"""Create a test client."""
|
|
41
|
+
return TestClient(app)
|
|
42
|
+
|
|
43
|
+
|
|
44
|
+
@pytest.fixture
|
|
45
|
+
def mock_settings():
|
|
46
|
+
"""Create mock settings."""
|
|
47
|
+
settings = Mock()
|
|
48
|
+
settings.enable_rate_limiting = True
|
|
49
|
+
settings.rate_limit_jobs_per_day = 5
|
|
50
|
+
settings.rate_limit_youtube_uploads_per_day = 10
|
|
51
|
+
settings.rate_limit_beta_ip_per_day = 1
|
|
52
|
+
return settings
|
|
53
|
+
|
|
54
|
+
|
|
55
|
+
class TestGetRateLimitStats:
|
|
56
|
+
"""Tests for GET /api/admin/rate-limits/stats endpoint."""
|
|
57
|
+
|
|
58
|
+
def test_returns_stats(self, client, mock_settings):
|
|
59
|
+
"""Test successful stats retrieval."""
|
|
60
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls, \
|
|
61
|
+
patch('backend.api.routes.rate_limits.get_email_validation_service') as mock_get_evs, \
|
|
62
|
+
patch('backend.api.routes.rate_limits.settings', mock_settings):
|
|
63
|
+
|
|
64
|
+
# Setup rate limit service mock
|
|
65
|
+
mock_rls = Mock()
|
|
66
|
+
mock_rls.get_youtube_uploads_today.return_value = 3
|
|
67
|
+
mock_rls.get_all_overrides.return_value = {"user1@example.com": {}}
|
|
68
|
+
mock_get_rls.return_value = mock_rls
|
|
69
|
+
|
|
70
|
+
# Setup email validation service mock
|
|
71
|
+
mock_evs = Mock()
|
|
72
|
+
mock_evs.get_blocklist_stats.return_value = {
|
|
73
|
+
"disposable_domains_count": 100,
|
|
74
|
+
"blocked_emails_count": 5,
|
|
75
|
+
"blocked_ips_count": 2,
|
|
76
|
+
"default_disposable_domains_count": 130,
|
|
77
|
+
}
|
|
78
|
+
mock_get_evs.return_value = mock_evs
|
|
79
|
+
|
|
80
|
+
response = client.get(
|
|
81
|
+
"/api/admin/rate-limits/stats",
|
|
82
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
83
|
+
)
|
|
84
|
+
|
|
85
|
+
assert response.status_code == 200
|
|
86
|
+
data = response.json()
|
|
87
|
+
assert data["jobs_per_day_limit"] == 5
|
|
88
|
+
assert data["youtube_uploads_per_day_limit"] == 10
|
|
89
|
+
assert data["youtube_uploads_today"] == 3
|
|
90
|
+
assert data["youtube_uploads_remaining"] == 7
|
|
91
|
+
assert data["disposable_domains_count"] == 100
|
|
92
|
+
assert data["total_overrides"] == 1
|
|
93
|
+
|
|
94
|
+
|
|
95
|
+
class TestGetUserRateLimitStatus:
|
|
96
|
+
"""Tests for GET /api/admin/rate-limits/users/{email} endpoint."""
|
|
97
|
+
|
|
98
|
+
def test_returns_user_status(self, client, mock_settings):
|
|
99
|
+
"""Test successful user status retrieval."""
|
|
100
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls, \
|
|
101
|
+
patch('backend.api.routes.rate_limits.settings', mock_settings):
|
|
102
|
+
|
|
103
|
+
mock_rls = Mock()
|
|
104
|
+
mock_rls.get_user_job_count_today.return_value = 2
|
|
105
|
+
mock_rls.get_user_override.return_value = None
|
|
106
|
+
mock_get_rls.return_value = mock_rls
|
|
107
|
+
|
|
108
|
+
response = client.get(
|
|
109
|
+
"/api/admin/rate-limits/users/user@example.com",
|
|
110
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
111
|
+
)
|
|
112
|
+
|
|
113
|
+
assert response.status_code == 200
|
|
114
|
+
data = response.json()
|
|
115
|
+
assert data["email"] == "user@example.com"
|
|
116
|
+
assert data["jobs_today"] == 2
|
|
117
|
+
assert data["jobs_limit"] == 5
|
|
118
|
+
assert data["jobs_remaining"] == 3
|
|
119
|
+
assert data["has_bypass"] is False
|
|
120
|
+
|
|
121
|
+
def test_returns_user_with_bypass(self, client, mock_settings):
|
|
122
|
+
"""Test user with bypass override."""
|
|
123
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls, \
|
|
124
|
+
patch('backend.api.routes.rate_limits.settings', mock_settings):
|
|
125
|
+
|
|
126
|
+
mock_rls = Mock()
|
|
127
|
+
mock_rls.get_user_job_count_today.return_value = 10
|
|
128
|
+
mock_rls.get_user_override.return_value = {
|
|
129
|
+
"bypass_job_limit": True,
|
|
130
|
+
"reason": "VIP user"
|
|
131
|
+
}
|
|
132
|
+
mock_get_rls.return_value = mock_rls
|
|
133
|
+
|
|
134
|
+
response = client.get(
|
|
135
|
+
"/api/admin/rate-limits/users/vip@example.com",
|
|
136
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
137
|
+
)
|
|
138
|
+
|
|
139
|
+
assert response.status_code == 200
|
|
140
|
+
data = response.json()
|
|
141
|
+
assert data["has_bypass"] is True
|
|
142
|
+
assert data["bypass_reason"] == "VIP user"
|
|
143
|
+
assert data["jobs_remaining"] == -1 # Unlimited
|
|
144
|
+
|
|
145
|
+
|
|
146
|
+
class TestBlocklistEndpoints:
|
|
147
|
+
"""Tests for blocklist management endpoints."""
|
|
148
|
+
|
|
149
|
+
def test_get_blocklists(self, client):
|
|
150
|
+
"""Test getting all blocklists."""
|
|
151
|
+
with patch('backend.api.routes.rate_limits.get_email_validation_service') as mock_get_evs, \
|
|
152
|
+
patch('backend.services.firestore_service.get_firestore_client') as mock_get_db:
|
|
153
|
+
|
|
154
|
+
mock_evs = Mock()
|
|
155
|
+
mock_evs.get_blocklist_config.return_value = {
|
|
156
|
+
"disposable_domains": {"tempmail.com", "mailinator.com"},
|
|
157
|
+
"blocked_emails": {"spammer@example.com"},
|
|
158
|
+
"blocked_ips": {"192.168.1.100"},
|
|
159
|
+
}
|
|
160
|
+
mock_get_evs.return_value = mock_evs
|
|
161
|
+
|
|
162
|
+
# Mock Firestore for metadata
|
|
163
|
+
mock_db = Mock()
|
|
164
|
+
mock_doc = Mock()
|
|
165
|
+
mock_doc.exists = True
|
|
166
|
+
mock_doc.to_dict.return_value = {
|
|
167
|
+
"updated_at": datetime.now(timezone.utc),
|
|
168
|
+
"updated_by": "admin@example.com"
|
|
169
|
+
}
|
|
170
|
+
mock_db.collection.return_value.document.return_value.get.return_value = mock_doc
|
|
171
|
+
mock_get_db.return_value = mock_db
|
|
172
|
+
|
|
173
|
+
response = client.get(
|
|
174
|
+
"/api/admin/rate-limits/blocklists",
|
|
175
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
176
|
+
)
|
|
177
|
+
|
|
178
|
+
assert response.status_code == 200
|
|
179
|
+
data = response.json()
|
|
180
|
+
assert "tempmail.com" in data["disposable_domains"]
|
|
181
|
+
assert "spammer@example.com" in data["blocked_emails"]
|
|
182
|
+
|
|
183
|
+
def test_add_disposable_domain(self, client):
|
|
184
|
+
"""Test adding a disposable domain."""
|
|
185
|
+
with patch('backend.api.routes.rate_limits.get_email_validation_service') as mock_get_evs:
|
|
186
|
+
|
|
187
|
+
mock_evs = Mock()
|
|
188
|
+
mock_evs.add_disposable_domain.return_value = True
|
|
189
|
+
mock_get_evs.return_value = mock_evs
|
|
190
|
+
|
|
191
|
+
response = client.post(
|
|
192
|
+
"/api/admin/rate-limits/blocklists/disposable-domains",
|
|
193
|
+
json={"domain": "newtemp.com"},
|
|
194
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
195
|
+
)
|
|
196
|
+
|
|
197
|
+
assert response.status_code == 200
|
|
198
|
+
data = response.json()
|
|
199
|
+
assert data["success"] is True
|
|
200
|
+
mock_evs.add_disposable_domain.assert_called_once_with("newtemp.com", "admin@example.com")
|
|
201
|
+
|
|
202
|
+
def test_add_disposable_domain_invalid(self, client):
|
|
203
|
+
"""Test adding invalid domain."""
|
|
204
|
+
response = client.post(
|
|
205
|
+
"/api/admin/rate-limits/blocklists/disposable-domains",
|
|
206
|
+
json={"domain": "invalid"}, # No dot
|
|
207
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
208
|
+
)
|
|
209
|
+
|
|
210
|
+
assert response.status_code == 400
|
|
211
|
+
|
|
212
|
+
def test_remove_disposable_domain(self, client):
|
|
213
|
+
"""Test removing a disposable domain."""
|
|
214
|
+
with patch('backend.api.routes.rate_limits.get_email_validation_service') as mock_get_evs:
|
|
215
|
+
|
|
216
|
+
mock_evs = Mock()
|
|
217
|
+
mock_evs.remove_disposable_domain.return_value = True
|
|
218
|
+
mock_get_evs.return_value = mock_evs
|
|
219
|
+
|
|
220
|
+
response = client.delete(
|
|
221
|
+
"/api/admin/rate-limits/blocklists/disposable-domains/tempmail.com",
|
|
222
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
223
|
+
)
|
|
224
|
+
|
|
225
|
+
assert response.status_code == 200
|
|
226
|
+
mock_evs.remove_disposable_domain.assert_called_once()
|
|
227
|
+
|
|
228
|
+
def test_remove_disposable_domain_not_found(self, client):
|
|
229
|
+
"""Test removing non-existent domain."""
|
|
230
|
+
with patch('backend.api.routes.rate_limits.get_email_validation_service') as mock_get_evs:
|
|
231
|
+
|
|
232
|
+
mock_evs = Mock()
|
|
233
|
+
mock_evs.remove_disposable_domain.return_value = False
|
|
234
|
+
mock_get_evs.return_value = mock_evs
|
|
235
|
+
|
|
236
|
+
response = client.delete(
|
|
237
|
+
"/api/admin/rate-limits/blocklists/disposable-domains/notfound.com",
|
|
238
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
239
|
+
)
|
|
240
|
+
|
|
241
|
+
assert response.status_code == 404
|
|
242
|
+
|
|
243
|
+
def test_add_blocked_email(self, client):
|
|
244
|
+
"""Test adding a blocked email."""
|
|
245
|
+
with patch('backend.api.routes.rate_limits.get_email_validation_service') as mock_get_evs:
|
|
246
|
+
|
|
247
|
+
mock_evs = Mock()
|
|
248
|
+
mock_evs.add_blocked_email.return_value = True
|
|
249
|
+
mock_get_evs.return_value = mock_evs
|
|
250
|
+
|
|
251
|
+
response = client.post(
|
|
252
|
+
"/api/admin/rate-limits/blocklists/blocked-emails",
|
|
253
|
+
json={"email": "spammer@example.com"},
|
|
254
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
255
|
+
)
|
|
256
|
+
|
|
257
|
+
assert response.status_code == 200
|
|
258
|
+
|
|
259
|
+
def test_add_blocked_ip(self, client):
|
|
260
|
+
"""Test adding a blocked IP."""
|
|
261
|
+
with patch('backend.api.routes.rate_limits.get_email_validation_service') as mock_get_evs:
|
|
262
|
+
|
|
263
|
+
mock_evs = Mock()
|
|
264
|
+
mock_evs.add_blocked_ip.return_value = True
|
|
265
|
+
mock_get_evs.return_value = mock_evs
|
|
266
|
+
|
|
267
|
+
response = client.post(
|
|
268
|
+
"/api/admin/rate-limits/blocklists/blocked-ips",
|
|
269
|
+
json={"ip_address": "192.168.1.100"},
|
|
270
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
271
|
+
)
|
|
272
|
+
|
|
273
|
+
assert response.status_code == 200
|
|
274
|
+
|
|
275
|
+
|
|
276
|
+
class TestUserOverrideEndpoints:
|
|
277
|
+
"""Tests for user override management endpoints."""
|
|
278
|
+
|
|
279
|
+
def test_get_all_overrides(self, client):
|
|
280
|
+
"""Test getting all user overrides."""
|
|
281
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls:
|
|
282
|
+
|
|
283
|
+
mock_rls = Mock()
|
|
284
|
+
mock_rls.get_all_overrides.return_value = {
|
|
285
|
+
"vip@example.com": {
|
|
286
|
+
"bypass_job_limit": True,
|
|
287
|
+
"custom_daily_job_limit": None,
|
|
288
|
+
"reason": "VIP user",
|
|
289
|
+
"created_by": "admin@example.com",
|
|
290
|
+
"created_at": datetime.now(timezone.utc),
|
|
291
|
+
}
|
|
292
|
+
}
|
|
293
|
+
mock_get_rls.return_value = mock_rls
|
|
294
|
+
|
|
295
|
+
response = client.get(
|
|
296
|
+
"/api/admin/rate-limits/overrides",
|
|
297
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
298
|
+
)
|
|
299
|
+
|
|
300
|
+
assert response.status_code == 200
|
|
301
|
+
data = response.json()
|
|
302
|
+
assert data["total"] == 1
|
|
303
|
+
assert len(data["overrides"]) == 1
|
|
304
|
+
assert data["overrides"][0]["email"] == "vip@example.com"
|
|
305
|
+
|
|
306
|
+
def test_set_user_override(self, client):
|
|
307
|
+
"""Test setting a user override."""
|
|
308
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls:
|
|
309
|
+
|
|
310
|
+
mock_rls = Mock()
|
|
311
|
+
mock_get_rls.return_value = mock_rls
|
|
312
|
+
|
|
313
|
+
response = client.put(
|
|
314
|
+
"/api/admin/rate-limits/overrides/user@example.com",
|
|
315
|
+
json={
|
|
316
|
+
"bypass_job_limit": True,
|
|
317
|
+
"reason": "Special access granted"
|
|
318
|
+
},
|
|
319
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
320
|
+
)
|
|
321
|
+
|
|
322
|
+
assert response.status_code == 200
|
|
323
|
+
mock_rls.set_user_override.assert_called_once_with(
|
|
324
|
+
user_email="user@example.com",
|
|
325
|
+
bypass_job_limit=True,
|
|
326
|
+
custom_daily_job_limit=None,
|
|
327
|
+
reason="Special access granted",
|
|
328
|
+
admin_email="admin@example.com",
|
|
329
|
+
)
|
|
330
|
+
|
|
331
|
+
def test_set_user_override_with_custom_limit(self, client):
|
|
332
|
+
"""Test setting a user override with custom limit."""
|
|
333
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls:
|
|
334
|
+
|
|
335
|
+
mock_rls = Mock()
|
|
336
|
+
mock_get_rls.return_value = mock_rls
|
|
337
|
+
|
|
338
|
+
response = client.put(
|
|
339
|
+
"/api/admin/rate-limits/overrides/user@example.com",
|
|
340
|
+
json={
|
|
341
|
+
"bypass_job_limit": False,
|
|
342
|
+
"custom_daily_job_limit": 20,
|
|
343
|
+
"reason": "High volume user"
|
|
344
|
+
},
|
|
345
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
346
|
+
)
|
|
347
|
+
|
|
348
|
+
assert response.status_code == 200
|
|
349
|
+
mock_rls.set_user_override.assert_called_once()
|
|
350
|
+
|
|
351
|
+
def test_set_user_override_missing_reason(self, client):
|
|
352
|
+
"""Test setting override without reason fails."""
|
|
353
|
+
response = client.put(
|
|
354
|
+
"/api/admin/rate-limits/overrides/user@example.com",
|
|
355
|
+
json={
|
|
356
|
+
"bypass_job_limit": True,
|
|
357
|
+
"reason": "ab" # Too short
|
|
358
|
+
},
|
|
359
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
360
|
+
)
|
|
361
|
+
|
|
362
|
+
assert response.status_code == 400
|
|
363
|
+
|
|
364
|
+
def test_remove_user_override(self, client):
|
|
365
|
+
"""Test removing a user override."""
|
|
366
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls:
|
|
367
|
+
|
|
368
|
+
mock_rls = Mock()
|
|
369
|
+
mock_rls.remove_user_override.return_value = True
|
|
370
|
+
mock_get_rls.return_value = mock_rls
|
|
371
|
+
|
|
372
|
+
response = client.delete(
|
|
373
|
+
"/api/admin/rate-limits/overrides/user@example.com",
|
|
374
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
375
|
+
)
|
|
376
|
+
|
|
377
|
+
assert response.status_code == 200
|
|
378
|
+
|
|
379
|
+
def test_remove_user_override_not_found(self, client):
|
|
380
|
+
"""Test removing non-existent override."""
|
|
381
|
+
with patch('backend.api.routes.rate_limits.get_rate_limit_service') as mock_get_rls:
|
|
382
|
+
|
|
383
|
+
mock_rls = Mock()
|
|
384
|
+
mock_rls.remove_user_override.return_value = False
|
|
385
|
+
mock_get_rls.return_value = mock_rls
|
|
386
|
+
|
|
387
|
+
response = client.delete(
|
|
388
|
+
"/api/admin/rate-limits/overrides/notfound@example.com",
|
|
389
|
+
headers={"Authorization": "Bearer admin-token"}
|
|
390
|
+
)
|
|
391
|
+
|
|
392
|
+
assert response.status_code == 404
|