refactor: Create admin enpoints and some renaming of api endpoints

This commit is contained in:
JSC
2025-08-01 15:34:35 +02:00
parent 43be92c8f9
commit 3132175354
9 changed files with 999 additions and 1269 deletions

View File

@@ -2,7 +2,7 @@
from fastapi import APIRouter from fastapi import APIRouter
from app.api.v1 import auth, main, player, playlists, socket, sounds from app.api.v1 import admin, auth, main, player, playlists, socket, sounds
# V1 API router with v1 prefix # V1 API router with v1 prefix
api_router = APIRouter(prefix="/v1") api_router = APIRouter(prefix="/v1")
@@ -14,3 +14,4 @@ api_router.include_router(player.router, tags=["player"])
api_router.include_router(playlists.router, tags=["playlists"]) api_router.include_router(playlists.router, tags=["playlists"])
api_router.include_router(socket.router, tags=["socket"]) api_router.include_router(socket.router, tags=["socket"])
api_router.include_router(sounds.router, tags=["sounds"]) api_router.include_router(sounds.router, tags=["sounds"])
api_router.include_router(admin.router)

View File

@@ -0,0 +1,10 @@
"""Admin API endpoints."""
from fastapi import APIRouter
from app.api.v1.admin import sounds
router = APIRouter(prefix="/admin")
# Include all admin sub-routers
router.include_router(sounds.router)

235
app/api/v1/admin/sounds.py Normal file
View File

@@ -0,0 +1,235 @@
"""Admin sound management API endpoints."""
from typing import Annotated
from fastapi import APIRouter, Depends, HTTPException, Query, status
from sqlmodel.ext.asyncio.session import AsyncSession
from app.core.database import get_db
from app.core.dependencies import get_admin_user
from app.models.user import User
from app.services.extraction_processor import extraction_processor
from app.services.sound_normalizer import NormalizationResults, SoundNormalizerService
from app.services.sound_scanner import ScanResults, SoundScannerService
router = APIRouter(prefix="/sounds", tags=["admin-sounds"])
async def get_sound_scanner_service(
session: Annotated[AsyncSession, Depends(get_db)],
) -> SoundScannerService:
"""Get the sound scanner service."""
return SoundScannerService(session)
async def get_sound_normalizer_service(
session: Annotated[AsyncSession, Depends(get_db)],
) -> SoundNormalizerService:
"""Get the sound normalizer service."""
return SoundNormalizerService(session)
# SCAN ENDPOINTS
@router.post("/scan")
async def scan_sounds(
current_user: Annotated[User, Depends(get_admin_user)],
scanner_service: Annotated[SoundScannerService, Depends(get_sound_scanner_service)],
) -> dict[str, ScanResults | str]:
"""Sync the soundboard directory (add/update/delete sounds). Admin only."""
try:
results = await scanner_service.scan_soundboard_directory()
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to sync sounds: {e!s}",
) from e
else:
return {
"message": "Sound sync completed",
"results": results,
}
@router.post("/scan/custom")
async def scan_custom_directory(
directory: str,
current_user: Annotated[User, Depends(get_admin_user)],
scanner_service: Annotated[SoundScannerService, Depends(get_sound_scanner_service)],
sound_type: str = "SDB",
) -> dict[str, ScanResults | str]:
"""Sync a custom directory with the database (add/update/delete sounds). Admin only."""
try:
results = await scanner_service.scan_directory(directory, sound_type)
except ValueError as e:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail=str(e),
) from e
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to sync directory: {e!s}",
) from e
else:
return {
"message": f"Sync of directory '{directory}' completed",
"results": results,
}
# NORMALIZE ENDPOINTS
@router.post("/normalize/all")
async def normalize_all_sounds(
current_user: Annotated[User, Depends(get_admin_user)],
normalizer_service: Annotated[
SoundNormalizerService,
Depends(get_sound_normalizer_service),
],
force: Annotated[
bool,
Query( # noqa: FBT002
description="Force normalization of already normalized sounds",
),
] = False,
one_pass: Annotated[
bool | None,
Query(
description="Use one-pass normalization (overrides config)",
),
] = None,
) -> dict[str, NormalizationResults | str]:
"""Normalize all unnormalized sounds. Admin only."""
try:
results = await normalizer_service.normalize_all_sounds(
force=force,
one_pass=one_pass,
)
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize sounds: {e!s}",
) from e
else:
return {
"message": "Sound normalization completed",
"results": results,
}
@router.post("/normalize/type/{sound_type}")
async def normalize_sounds_by_type(
sound_type: str,
current_user: Annotated[User, Depends(get_admin_user)],
normalizer_service: Annotated[
SoundNormalizerService,
Depends(get_sound_normalizer_service),
],
force: Annotated[
bool,
Query( # noqa: FBT002
description="Force normalization of already normalized sounds",
),
] = False,
one_pass: Annotated[
bool | None,
Query(
description="Use one-pass normalization (overrides config)",
),
] = None,
) -> dict[str, NormalizationResults | str]:
"""Normalize all sounds of a specific type (SDB, TTS, EXT). Admin only."""
# Validate sound type
valid_types = ["SDB", "TTS", "EXT"]
if sound_type not in valid_types:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail=f"Invalid sound type. Must be one of: {', '.join(valid_types)}",
)
try:
results = await normalizer_service.normalize_sounds_by_type(
sound_type=sound_type,
force=force,
one_pass=one_pass,
)
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize {sound_type} sounds: {e!s}",
) from e
else:
return {
"message": f"Normalization of {sound_type} sounds completed",
"results": results,
}
@router.post("/normalize/{sound_id}")
async def normalize_sound_by_id(
sound_id: int,
current_user: Annotated[User, Depends(get_admin_user)],
normalizer_service: Annotated[
SoundNormalizerService,
Depends(get_sound_normalizer_service),
],
force: Annotated[
bool,
Query( # noqa: FBT002
description="Force normalization of already normalized sound",
),
] = False,
one_pass: Annotated[
bool | None,
Query(
description="Use one-pass normalization (overrides config)",
),
] = None,
) -> dict[str, str]:
"""Normalize a specific sound by ID. Admin only."""
try:
# Get the sound
sound = await normalizer_service.sound_repo.get_by_id(sound_id)
if not sound:
raise HTTPException(
status_code=status.HTTP_404_NOT_FOUND,
detail=f"Sound with ID {sound_id} not found",
)
# Normalize the sound
result = await normalizer_service.normalize_sound(
sound=sound,
force=force,
one_pass=one_pass,
)
# Check result status
if result["status"] == "error":
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize sound: {result['error']}",
)
return {
"message": f"Sound normalization {result['status']}: {sound.filename}",
"status": result["status"],
"reason": result["reason"] or "",
"normalized_filename": result["normalized_filename"] or "",
}
except HTTPException:
# Re-raise HTTPExceptions without wrapping them
raise
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize sound: {e!s}",
) from e
# EXTRACTION PROCESSOR STATUS
@router.get("/extract/status")
async def get_extraction_processor_status(
current_user: Annotated[User, Depends(get_admin_user)], # noqa: ARG001
) -> dict:
"""Get the status of the extraction processor. Admin only."""
return extraction_processor.get_status()

View File

@@ -13,26 +13,11 @@ from app.repositories.sound import SoundRepository
from app.services.credit import CreditService, InsufficientCreditsError from app.services.credit import CreditService, InsufficientCreditsError
from app.services.extraction import ExtractionInfo, ExtractionService from app.services.extraction import ExtractionInfo, ExtractionService
from app.services.extraction_processor import extraction_processor from app.services.extraction_processor import extraction_processor
from app.services.sound_normalizer import NormalizationResults, SoundNormalizerService
from app.services.sound_scanner import ScanResults, SoundScannerService
from app.services.vlc_player import VLCPlayerService, get_vlc_player_service from app.services.vlc_player import VLCPlayerService, get_vlc_player_service
router = APIRouter(prefix="/sounds", tags=["sounds"]) router = APIRouter(prefix="/sounds", tags=["sounds"])
async def get_sound_scanner_service(
session: Annotated[AsyncSession, Depends(get_db)],
) -> SoundScannerService:
"""Get the sound scanner service."""
return SoundScannerService(session)
async def get_sound_normalizer_service(
session: Annotated[AsyncSession, Depends(get_db)],
) -> SoundNormalizerService:
"""Get the sound normalizer service."""
return SoundNormalizerService(session)
async def get_extraction_service( async def get_extraction_service(
session: Annotated[AsyncSession, Depends(get_db)], session: Annotated[AsyncSession, Depends(get_db)],
@@ -58,216 +43,6 @@ async def get_sound_repository(
return SoundRepository(session) return SoundRepository(session)
# SCAN
@router.post("/scan")
async def scan_sounds(
current_user: Annotated[User, Depends(get_current_active_user_flexible)],
scanner_service: Annotated[SoundScannerService, Depends(get_sound_scanner_service)],
) -> dict[str, ScanResults | str]:
"""Sync the soundboard directory (add/update/delete sounds)."""
# Only allow admins to scan sounds
if current_user.role not in ["admin", "superadmin"]:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="Only administrators can sync sounds",
)
try:
results = await scanner_service.scan_soundboard_directory()
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to sync sounds: {e!s}",
) from e
else:
return {
"message": "Sound sync completed",
"results": results,
}
@router.post("/scan/custom")
async def scan_custom_directory(
directory: str,
current_user: Annotated[User, Depends(get_current_active_user_flexible)],
scanner_service: Annotated[SoundScannerService, Depends(get_sound_scanner_service)],
sound_type: str = "SDB",
) -> dict[str, ScanResults | str]:
"""Sync a custom directory with the database (add/update/delete sounds)."""
# Only allow admins to sync sounds
if current_user.role not in ["admin", "superadmin"]:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="Only administrators can sync sounds",
)
try:
results = await scanner_service.scan_directory(directory, sound_type)
except ValueError as e:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail=str(e),
) from e
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to sync directory: {e!s}",
) from e
else:
return {
"message": f"Sync of directory '{directory}' completed",
"results": results,
}
# NORMALIZE
@router.post("/normalize/all")
async def normalize_all_sounds(
current_user: Annotated[User, Depends(get_current_active_user_flexible)],
normalizer_service: Annotated[
SoundNormalizerService, Depends(get_sound_normalizer_service),
],
force: Annotated[bool, Query( # noqa: FBT002
description="Force normalization of already normalized sounds",
)] = False,
one_pass: Annotated[bool | None, Query(
description="Use one-pass normalization (overrides config)",
)] = None,
) -> dict[str, NormalizationResults | str]:
"""Normalize all unnormalized sounds."""
# Only allow admins to normalize sounds
if current_user.role not in ["admin", "superadmin"]:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="Only administrators can normalize sounds",
)
try:
results = await normalizer_service.normalize_all_sounds(
force=force,
one_pass=one_pass,
)
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize sounds: {e!s}",
) from e
else:
return {
"message": "Sound normalization completed",
"results": results,
}
@router.post("/normalize/type/{sound_type}")
async def normalize_sounds_by_type(
sound_type: str,
current_user: Annotated[User, Depends(get_current_active_user_flexible)],
normalizer_service: Annotated[
SoundNormalizerService, Depends(get_sound_normalizer_service),
],
force: Annotated[bool, Query( # noqa: FBT002
description="Force normalization of already normalized sounds",
)] = False,
one_pass: Annotated[bool | None, Query(
description="Use one-pass normalization (overrides config)",
)] = None,
) -> dict[str, NormalizationResults | str]:
"""Normalize all sounds of a specific type (SDB, TTS, EXT)."""
# Only allow admins to normalize sounds
if current_user.role not in ["admin", "superadmin"]:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="Only administrators can normalize sounds",
)
# Validate sound type
valid_types = ["SDB", "TTS", "EXT"]
if sound_type not in valid_types:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail=f"Invalid sound type. Must be one of: {', '.join(valid_types)}",
)
try:
results = await normalizer_service.normalize_sounds_by_type(
sound_type=sound_type,
force=force,
one_pass=one_pass,
)
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize {sound_type} sounds: {e!s}",
) from e
else:
return {
"message": f"Normalization of {sound_type} sounds completed",
"results": results,
}
@router.post("/normalize/{sound_id}")
async def normalize_sound_by_id(
sound_id: int,
current_user: Annotated[User, Depends(get_current_active_user_flexible)],
normalizer_service: Annotated[
SoundNormalizerService, Depends(get_sound_normalizer_service),
],
force: Annotated[bool, Query( # noqa: FBT002
description="Force normalization of already normalized sound",
)] = False,
one_pass: Annotated[bool | None, Query(
description="Use one-pass normalization (overrides config)",
)] = None,
) -> dict[str, str]:
"""Normalize a specific sound by ID."""
# Only allow admins to normalize sounds
if current_user.role not in ["admin", "superadmin"]:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="Only administrators can normalize sounds",
)
try:
# Get the sound
sound = await normalizer_service.sound_repo.get_by_id(sound_id)
if not sound:
raise HTTPException(
status_code=status.HTTP_404_NOT_FOUND,
detail=f"Sound with ID {sound_id} not found",
)
# Normalize the sound
result = await normalizer_service.normalize_sound(
sound=sound,
force=force,
one_pass=one_pass,
)
# Check result status
if result["status"] == "error":
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize sound: {result['error']}",
)
return {
"message": f"Sound normalization {result['status']}: {sound.filename}",
"status": result["status"],
"reason": result["reason"] or "",
"normalized_filename": result["normalized_filename"] or "",
}
except HTTPException:
# Re-raise HTTPExceptions without wrapping them
raise
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Failed to normalize sound: {e!s}",
) from e
# EXTRACT # EXTRACT
@router.post("/extract") @router.post("/extract")
@@ -308,19 +83,6 @@ async def create_extraction(
} }
@router.get("/extract/status")
async def get_extraction_processor_status(
current_user: Annotated[User, Depends(get_current_active_user_flexible)],
) -> dict:
"""Get the status of the extraction processor."""
# Only allow admins to see processor status
if current_user.role not in ["admin", "superadmin"]:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="Only administrators can view processor status",
)
return extraction_processor.get_status()
@router.get("/extract/{extraction_id}") @router.get("/extract/{extraction_id}")
@@ -377,7 +139,7 @@ async def get_user_extractions(
# VLC PLAYER # VLC PLAYER
@router.post("/vlc/play/{sound_id}") @router.post("/play/{sound_id}")
async def play_sound_with_vlc( async def play_sound_with_vlc(
sound_id: int, sound_id: int,
current_user: Annotated[User, Depends(get_current_active_user_flexible)], current_user: Annotated[User, Depends(get_current_active_user_flexible)],
@@ -445,7 +207,7 @@ async def play_sound_with_vlc(
@router.post("/vlc/stop-all") @router.post("/stop")
async def stop_all_vlc_instances( async def stop_all_vlc_instances(
current_user: Annotated[User, Depends(get_current_active_user_flexible)], # noqa: ARG001 current_user: Annotated[User, Depends(get_current_active_user_flexible)], # noqa: ARG001
vlc_player: Annotated[VLCPlayerService, Depends(get_vlc_player)], vlc_player: Annotated[VLCPlayerService, Depends(get_vlc_player)],

View File

@@ -0,0 +1 @@
"""Tests for admin API endpoints."""

View File

@@ -0,0 +1,554 @@
"""Tests for admin sound API endpoints."""
from typing import TYPE_CHECKING
from unittest.mock import patch
import pytest
from httpx import ASGITransport, AsyncClient
from app.models.user import User
if TYPE_CHECKING:
from app.services.sound_normalizer import NormalizationResults
from app.services.sound_scanner import ScanResults
class TestAdminSoundEndpoints:
"""Test admin sound API endpoints."""
@pytest.mark.asyncio
async def test_scan_sounds_success(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test successful sound scanning."""
# Mock the scanner service to return successful results
mock_results: ScanResults = {
"scanned": 5,
"added": 3,
"updated": 1,
"deleted": 1,
"skipped": 0,
"errors": 0,
"files": [
{
"filename": "test1.mp3",
"status": "added",
"reason": None,
"name": "Test1",
"duration": 5000,
"size": 1024,
"id": 1,
"error": None,
"changes": None,
},
{
"filename": "test2.mp3",
"status": "updated",
"reason": "file was modified",
"name": "Test2",
"duration": 7500,
"size": 2048,
"id": 2,
"error": None,
"changes": ["hash", "duration", "size"],
},
{
"filename": "test3.mp3",
"status": "deleted",
"reason": "file no longer exists",
"name": "Test3",
"duration": 3000,
"size": 512,
"id": 3,
"error": None,
"changes": None,
},
],
}
with patch(
"app.services.sound_scanner.SoundScannerService.scan_soundboard_directory",
) as mock_scan:
mock_scan.return_value = mock_results
response = await authenticated_admin_client.post("/api/v1/admin/sounds/scan")
assert response.status_code == 200
data = response.json()
assert "message" in data
assert "Sound sync completed" in data["message"]
assert "results" in data
results = data["results"]
assert results["scanned"] == 5
assert results["added"] == 3
assert results["updated"] == 1
assert results["deleted"] == 1
assert results["skipped"] == 0
assert results["errors"] == 0
assert len(results["files"]) == 3
# Check file details
assert results["files"][0]["filename"] == "test1.mp3"
assert results["files"][0]["status"] == "added"
assert results["files"][1]["status"] == "updated"
assert results["files"][2]["status"] == "deleted"
@pytest.mark.asyncio
async def test_scan_sounds_unauthenticated(self, client: AsyncClient) -> None:
"""Test scanning sounds without authentication."""
response = await client.post("/api/v1/admin/sounds/scan")
assert response.status_code == 401
data = response.json()
assert "Could not validate credentials" in data["detail"]
@pytest.mark.asyncio
async def test_scan_sounds_non_admin(
self,
test_app,
test_user: User,
) -> None:
"""Test scanning sounds with non-admin user."""
from fastapi import HTTPException
from app.core.dependencies import get_admin_user
# Override the admin dependency to raise 403 for non-admin users
async def override_get_admin_user():
raise HTTPException(status_code=403, detail="Not enough permissions")
test_app.dependency_overrides[get_admin_user] = override_get_admin_user
# Create API token for regular user
headers = {"API-TOKEN": "test_api_token"}
async with AsyncClient(
transport=ASGITransport(app=test_app),
base_url="http://test",
) as client:
response = await client.post("/api/v1/admin/sounds/scan", headers=headers)
assert response.status_code == 403
data = response.json()
assert "Not enough permissions" in data["detail"]
# Clean up override
test_app.dependency_overrides.pop(get_admin_user, None)
@pytest.mark.asyncio
async def test_scan_sounds_service_error(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test scanning sounds when service raises an error."""
with patch(
"app.services.sound_scanner.SoundScannerService.scan_soundboard_directory",
) as mock_scan:
mock_scan.side_effect = Exception("Directory not found")
response = await authenticated_admin_client.post("/api/v1/admin/sounds/scan")
assert response.status_code == 500
data = response.json()
assert "Failed to sync sounds" in data["detail"]
assert "Directory not found" in data["detail"]
@pytest.mark.asyncio
async def test_scan_custom_directory_success(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test successful custom directory scanning."""
mock_results: ScanResults = {
"scanned": 2,
"added": 2,
"updated": 0,
"deleted": 0,
"skipped": 0,
"errors": 0,
"files": [
{
"filename": "custom1.wav",
"status": "added",
"reason": None,
"name": "Custom1",
"duration": 4000,
"size": 800,
"id": 10,
"error": None,
"changes": None,
},
{
"filename": "custom2.wav",
"status": "added",
"reason": None,
"name": "Custom2",
"duration": 6000,
"size": 1200,
"id": 11,
"error": None,
"changes": None,
},
],
}
with patch(
"app.services.sound_scanner.SoundScannerService.scan_directory",
) as mock_scan:
mock_scan.return_value = mock_results
response = await authenticated_admin_client.post(
"/api/v1/admin/sounds/scan/custom",
params={"directory": "/custom/path", "sound_type": "CUSTOM"},
)
assert response.status_code == 200
data = response.json()
assert "Sync of directory '/custom/path' completed" in data["message"]
assert "results" in data
results = data["results"]
assert results["scanned"] == 2
assert results["added"] == 2
assert len(results["files"]) == 2
# Verify the service was called with correct parameters
mock_scan.assert_called_once_with("/custom/path", "CUSTOM")
@pytest.mark.asyncio
async def test_normalize_all_sounds_success(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test successful normalization of all sounds."""
mock_results: NormalizationResults = {
"processed": 3,
"normalized": 2,
"skipped": 1,
"errors": 0,
"files": [
{
"filename": "test1.mp3",
"status": "normalized",
"reason": None,
"original_path": "/fake/test1.mp3",
"normalized_path": "/fake/test1_normalized.mp3",
"normalized_filename": "test1_normalized.mp3",
"normalized_duration": 5000,
"normalized_size": 1024,
"normalized_hash": "norm_hash1",
"id": 1,
"error": None,
},
{
"filename": "test2.wav",
"status": "normalized",
"reason": None,
"original_path": "/fake/test2.wav",
"normalized_path": "/fake/test2_normalized.mp3",
"normalized_filename": "test2_normalized.mp3",
"normalized_duration": 7000,
"normalized_size": 2048,
"normalized_hash": "norm_hash2",
"id": 2,
"error": None,
},
{
"filename": "test3.mp3",
"status": "skipped",
"reason": "already normalized",
"original_path": None,
"normalized_path": None,
"normalized_filename": None,
"normalized_duration": None,
"normalized_size": None,
"normalized_hash": None,
"id": 3,
"error": None,
},
],
}
with patch(
"app.services.sound_normalizer.SoundNormalizerService.normalize_all_sounds",
) as mock_normalize:
mock_normalize.return_value = mock_results
response = await authenticated_admin_client.post(
"/api/v1/admin/sounds/normalize/all",
)
assert response.status_code == 200
data = response.json()
assert "message" in data
assert "Sound normalization completed" in data["message"]
assert "results" in data
results = data["results"]
assert results["processed"] == 3
assert results["normalized"] == 2
assert results["skipped"] == 1
assert results["errors"] == 0
assert len(results["files"]) == 3
@pytest.mark.asyncio
async def test_normalize_all_sounds_unauthenticated(self, client: AsyncClient) -> None:
"""Test normalizing sounds without authentication."""
response = await client.post("/api/v1/admin/sounds/normalize/all")
assert response.status_code == 401
data = response.json()
assert "Could not validate credentials" in data["detail"]
@pytest.mark.asyncio
async def test_normalize_all_sounds_non_admin(
self,
test_app,
test_user: User,
) -> None:
"""Test normalizing sounds with non-admin user."""
from fastapi import HTTPException
from app.core.dependencies import get_admin_user
# Override the admin dependency to raise 403 for non-admin users
async def override_get_admin_user():
raise HTTPException(status_code=403, detail="Not enough permissions")
test_app.dependency_overrides[get_admin_user] = override_get_admin_user
headers = {"API-TOKEN": "test_api_token"}
async with AsyncClient(
transport=ASGITransport(app=test_app),
base_url="http://test",
) as client:
response = await client.post(
"/api/v1/admin/sounds/normalize/all", headers=headers,
)
assert response.status_code == 403
data = response.json()
assert "Not enough permissions" in data["detail"]
# Clean up override
test_app.dependency_overrides.pop(get_admin_user, None)
@pytest.mark.asyncio
async def test_normalize_sounds_by_type_success(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test successful normalization by sound type."""
mock_results: NormalizationResults = {
"processed": 2,
"normalized": 2,
"skipped": 0,
"errors": 0,
"files": [
{
"filename": "sdb1.mp3",
"status": "normalized",
"reason": None,
"original_path": "/fake/sdb1.mp3",
"normalized_path": "/fake/sdb1_normalized.mp3",
"normalized_filename": "sdb1_normalized.mp3",
"normalized_duration": 4000,
"normalized_size": 800,
"normalized_hash": "sdb_hash1",
"id": 10,
"error": None,
},
{
"filename": "sdb2.wav",
"status": "normalized",
"reason": None,
"original_path": "/fake/sdb2.wav",
"normalized_path": "/fake/sdb2_normalized.mp3",
"normalized_filename": "sdb2_normalized.mp3",
"normalized_duration": 6000,
"normalized_size": 1200,
"normalized_hash": "sdb_hash2",
"id": 11,
"error": None,
},
],
}
with patch(
"app.services.sound_normalizer.SoundNormalizerService.normalize_sounds_by_type",
) as mock_normalize:
mock_normalize.return_value = mock_results
response = await authenticated_admin_client.post(
"/api/v1/admin/sounds/normalize/type/SDB",
)
assert response.status_code == 200
data = response.json()
assert "Normalization of SDB sounds completed" in data["message"]
assert "results" in data
results = data["results"]
assert results["processed"] == 2
assert results["normalized"] == 2
assert len(results["files"]) == 2
# Verify the service was called with correct type
mock_normalize.assert_called_once_with(
sound_type="SDB", force=False, one_pass=None,
)
@pytest.mark.asyncio
async def test_normalize_sounds_by_type_invalid_type(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test normalization with invalid sound type."""
response = await authenticated_admin_client.post(
"/api/v1/admin/sounds/normalize/type/INVALID",
)
assert response.status_code == 400
data = response.json()
assert "Invalid sound type" in data["detail"]
assert "Must be one of: SDB, TTS, EXT" in data["detail"]
@pytest.mark.asyncio
async def test_normalize_sound_by_id_success(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test successful normalization of a specific sound."""
# Mock the sound
mock_sound = type(
"Sound",
(),
{
"id": 42,
"filename": "specific_sound.mp3",
"type": "SDB",
"name": "Specific Sound",
},
)()
# Mock normalization result
mock_result = {
"filename": "specific_sound.mp3",
"status": "normalized",
"reason": None,
"original_path": "/fake/specific_sound.mp3",
"normalized_path": "/fake/specific_sound_normalized.mp3",
"normalized_filename": "specific_sound_normalized.mp3",
"normalized_duration": 8000,
"normalized_size": 1600,
"normalized_hash": "specific_hash",
"id": 42,
"error": None,
}
with (
patch(
"app.services.sound_normalizer.SoundNormalizerService.normalize_sound",
) as mock_normalize_sound,
patch("app.repositories.sound.SoundRepository.get_by_id") as mock_get_sound,
):
mock_get_sound.return_value = mock_sound
mock_normalize_sound.return_value = mock_result
response = await authenticated_admin_client.post(
"/api/v1/admin/sounds/normalize/42",
)
assert response.status_code == 200
data = response.json()
assert "Sound normalization normalized" in data["message"]
assert "specific_sound.mp3" in data["message"]
assert data["status"] == "normalized"
assert data["normalized_filename"] == "specific_sound_normalized.mp3"
# Verify sound was retrieved and normalized
mock_get_sound.assert_called_once_with(42)
mock_normalize_sound.assert_called_once()
@pytest.mark.asyncio
async def test_get_extraction_processor_status(
self,
authenticated_admin_client: AsyncClient,
admin_user: User,
) -> None:
"""Test getting extraction processor status."""
with patch(
"app.services.extraction_processor.extraction_processor.get_status"
) as mock_get_status:
mock_status = {
"is_running": True,
"queue_size": 2,
"active_extractions": 1,
"max_concurrent": 2,
}
mock_get_status.return_value = mock_status
response = await authenticated_admin_client.get(
"/api/v1/admin/sounds/extract/status"
)
assert response.status_code == 200
data = response.json()
assert data == mock_status
@pytest.mark.asyncio
async def test_get_extraction_processor_status_unauthenticated(
self, client: AsyncClient
) -> None:
"""Test getting extraction processor status without authentication."""
response = await client.get("/api/v1/admin/sounds/extract/status")
assert response.status_code == 401
data = response.json()
assert "Could not validate credentials" in data["detail"]
@pytest.mark.asyncio
async def test_get_extraction_processor_status_non_admin(
self,
test_app,
test_user: User,
) -> None:
"""Test getting extraction processor status with non-admin user."""
from fastapi import HTTPException
from app.core.dependencies import get_admin_user
# Override the admin dependency to raise 403 for non-admin users
async def override_get_admin_user():
raise HTTPException(status_code=403, detail="Not enough permissions")
test_app.dependency_overrides[get_admin_user] = override_get_admin_user
headers = {"API-TOKEN": "test_api_token"}
async with AsyncClient(
transport=ASGITransport(app=test_app),
base_url="http://test",
) as client:
response = await client.get(
"/api/v1/admin/sounds/extract/status", headers=headers
)
assert response.status_code == 403
data = response.json()
assert "Not enough permissions" in data["detail"]
# Clean up override
test_app.dependency_overrides.pop(get_admin_user, None)

View File

@@ -45,35 +45,20 @@ class TestExtractionEndpoints:
assert response.status_code == 401 assert response.status_code == 401
@pytest.mark.asyncio @pytest.mark.asyncio
async def test_get_processor_status_admin( async def test_get_processor_status_moved_to_admin(
self, test_client: AsyncClient, admin_cookies: dict[str, str], self, test_client: AsyncClient, admin_cookies: dict[str, str],
) -> None: ) -> None:
"""Test getting processor status as admin.""" """Test that processor status endpoint was moved to admin."""
# Set cookies on client instance to avoid deprecation warning # Set cookies on client instance to avoid deprecation warning
test_client.cookies.update(admin_cookies) test_client.cookies.update(admin_cookies)
response = await test_client.get("/api/v1/sounds/extract/status") # The new admin endpoint should work
response = await test_client.get("/api/v1/admin/sounds/extract/status")
# Should succeed for admin users
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()
assert "running" in data assert "running" in data or "is_running" in data
assert "max_concurrent" in data assert "max_concurrent" in data
@pytest.mark.asyncio
async def test_get_processor_status_non_admin(
self, test_client: AsyncClient, auth_cookies: dict[str, str],
) -> None:
"""Test getting processor status as non-admin user."""
# Set cookies on client instance to avoid deprecation warning
test_client.cookies.update(auth_cookies)
response = await test_client.get("/api/v1/sounds/extract/status")
# Should return 403 for non-admin users
assert response.status_code == 403
assert "Only administrators" in response.json()["detail"]
@pytest.mark.asyncio @pytest.mark.asyncio
async def test_get_user_extractions( async def test_get_user_extractions(
self, test_client: AsyncClient, auth_cookies: dict[str, str], self, test_client: AsyncClient, auth_cookies: dict[str, str],

File diff suppressed because it is too large Load Diff

View File

@@ -50,7 +50,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/play/1") response = await authenticated_client.post("/api/v1/sounds/play/1")
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()
@@ -89,7 +89,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/play/999") response = await authenticated_client.post("/api/v1/sounds/play/999")
assert response.status_code == 404 assert response.status_code == 404
data = response.json() data = response.json()
@@ -136,7 +136,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/play/1") response = await authenticated_client.post("/api/v1/sounds/play/1")
assert response.status_code == 500 assert response.status_code == 500
data = response.json() data = response.json()
@@ -169,7 +169,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/play/1") response = await authenticated_client.post("/api/v1/sounds/play/1")
assert response.status_code == 500 assert response.status_code == 500
data = response.json() data = response.json()
@@ -186,7 +186,7 @@ class TestVLCEndpoints:
client: AsyncClient, client: AsyncClient,
) -> None: ) -> None:
"""Test VLC playback without authentication.""" """Test VLC playback without authentication."""
response = await client.post("/api/v1/sounds/vlc/play/1") response = await client.post("/api/v1/sounds/play/1")
assert response.status_code == 401 assert response.status_code == 401
@pytest.mark.asyncio @pytest.mark.asyncio
@@ -212,7 +212,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/stop-all") response = await authenticated_client.post("/api/v1/sounds/stop")
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()
@@ -250,7 +250,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/stop-all") response = await authenticated_client.post("/api/v1/sounds/stop")
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()
@@ -285,7 +285,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/stop-all") response = await authenticated_client.post("/api/v1/sounds/stop")
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()
@@ -320,7 +320,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/stop-all") response = await authenticated_client.post("/api/v1/sounds/stop")
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()
@@ -347,7 +347,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service
try: try:
response = await authenticated_client.post("/api/v1/sounds/vlc/stop-all") response = await authenticated_client.post("/api/v1/sounds/stop")
assert response.status_code == 500 assert response.status_code == 500
data = response.json() data = response.json()
@@ -362,7 +362,7 @@ class TestVLCEndpoints:
client: AsyncClient, client: AsyncClient,
) -> None: ) -> None:
"""Test stopping VLC instances without authentication.""" """Test stopping VLC instances without authentication."""
response = await client.post("/api/v1/sounds/vlc/stop-all") response = await client.post("/api/v1/sounds/stop")
assert response.status_code == 401 assert response.status_code == 401
@pytest.mark.asyncio @pytest.mark.asyncio
@@ -401,7 +401,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service test_app.dependency_overrides[get_credit_service] = lambda: mock_credit_service
try: try:
response = await authenticated_admin_client.post("/api/v1/sounds/vlc/play/1") response = await authenticated_admin_client.post("/api/v1/sounds/play/1")
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()
@@ -427,7 +427,7 @@ class TestVLCEndpoints:
test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service_2 test_app.dependency_overrides[get_vlc_player] = lambda: mock_vlc_service_2
try: try:
response = await authenticated_admin_client.post("/api/v1/sounds/vlc/stop-all") response = await authenticated_admin_client.post("/api/v1/sounds/stop")
assert response.status_code == 200 assert response.status_code == 200
data = response.json() data = response.json()