Spaces:
Build error
Build error
Upload test_webhooks_server.py
Browse files- test_webhooks_server.py +188 -0
test_webhooks_server.py
ADDED
@@ -0,0 +1,188 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
import unittest
|
2 |
+
from unittest.mock import patch
|
3 |
+
|
4 |
+
from fastapi import Request
|
5 |
+
|
6 |
+
from huggingface_hub.utils import capture_output, is_gradio_available
|
7 |
+
|
8 |
+
from .testing_utils import require_webhooks
|
9 |
+
|
10 |
+
|
11 |
+
if is_gradio_available():
|
12 |
+
import gradio as gr
|
13 |
+
from fastapi.testclient import TestClient
|
14 |
+
|
15 |
+
import huggingface_hub._webhooks_server
|
16 |
+
from huggingface_hub import WebhookPayload, WebhooksServer
|
17 |
+
|
18 |
+
|
19 |
+
# Taken from https://huggingface.co/docs/hub/webhooks#event
|
20 |
+
WEBHOOK_PAYLOAD_EXAMPLE = {
|
21 |
+
"event": {"action": "create", "scope": "discussion"},
|
22 |
+
"repo": {
|
23 |
+
"type": "model",
|
24 |
+
"name": "gpt2",
|
25 |
+
"id": "621ffdc036468d709f17434d",
|
26 |
+
"private": False,
|
27 |
+
"url": {"web": "https://huggingface.co/gpt2", "api": "https://huggingface.co/api/models/gpt2"},
|
28 |
+
"owner": {"id": "628b753283ef59b5be89e937"},
|
29 |
+
},
|
30 |
+
"discussion": {
|
31 |
+
"id": "6399f58518721fdd27fc9ca9",
|
32 |
+
"title": "Update co2 emissions",
|
33 |
+
"url": {
|
34 |
+
"web": "https://huggingface.co/gpt2/discussions/19",
|
35 |
+
"api": "https://huggingface.co/api/models/gpt2/discussions/19",
|
36 |
+
},
|
37 |
+
"status": "open",
|
38 |
+
"author": {"id": "61d2f90c3c2083e1c08af22d"},
|
39 |
+
"num": 19,
|
40 |
+
"isPullRequest": True,
|
41 |
+
"changes": {"base": "refs/heads/main"},
|
42 |
+
},
|
43 |
+
"comment": {
|
44 |
+
"id": "6399f58518721fdd27fc9caa",
|
45 |
+
"author": {"id": "61d2f90c3c2083e1c08af22d"},
|
46 |
+
"content": "Add co2 emissions information to the model card",
|
47 |
+
"hidden": False,
|
48 |
+
"url": {"web": "https://huggingface.co/gpt2/discussions/19#6399f58518721fdd27fc9caa"},
|
49 |
+
},
|
50 |
+
"webhook": {"id": "6390e855e30d9209411de93b", "version": 3},
|
51 |
+
}
|
52 |
+
|
53 |
+
|
54 |
+
@require_webhooks
|
55 |
+
class TestWebhooksServerDontRun(unittest.TestCase):
|
56 |
+
def test_add_webhook_implicit_path(self):
|
57 |
+
# Test adding a webhook
|
58 |
+
app = WebhooksServer()
|
59 |
+
|
60 |
+
@app.add_webhook
|
61 |
+
async def handler():
|
62 |
+
pass
|
63 |
+
|
64 |
+
self.assertIn("/webhooks/handler", app.registered_webhooks)
|
65 |
+
|
66 |
+
def test_add_webhook_explicit_path(self):
|
67 |
+
# Test adding a webhook
|
68 |
+
app = WebhooksServer()
|
69 |
+
|
70 |
+
@app.add_webhook(path="/test_webhook")
|
71 |
+
async def handler():
|
72 |
+
pass
|
73 |
+
|
74 |
+
self.assertIn("/webhooks/test_webhook", app.registered_webhooks) # still registered under /webhooks
|
75 |
+
|
76 |
+
def test_add_webhook_twice_should_fail(self):
|
77 |
+
# Test adding a webhook
|
78 |
+
app = WebhooksServer()
|
79 |
+
|
80 |
+
@app.add_webhook("my_webhook")
|
81 |
+
async def test_webhook():
|
82 |
+
pass
|
83 |
+
|
84 |
+
# Registering twice the same webhook should raise an error
|
85 |
+
with self.assertRaises(ValueError):
|
86 |
+
|
87 |
+
@app.add_webhook("my_webhook")
|
88 |
+
async def test_webhook_2():
|
89 |
+
pass
|
90 |
+
|
91 |
+
|
92 |
+
@require_webhooks
|
93 |
+
class TestWebhooksServerRun(unittest.TestCase):
|
94 |
+
HEADERS_VALID_SECRET = {"x-webhook-secret": "my_webhook_secret"}
|
95 |
+
HEADERS_WRONG_SECRET = {"x-webhook-secret": "wrong_webhook_secret"}
|
96 |
+
|
97 |
+
def setUp(self) -> None:
|
98 |
+
with gr.Blocks() as ui:
|
99 |
+
gr.Markdown("Hello World!")
|
100 |
+
app = WebhooksServer(ui=ui, webhook_secret="my_webhook_secret")
|
101 |
+
|
102 |
+
# Route to check payload parsing
|
103 |
+
@app.add_webhook
|
104 |
+
async def test_webhook(payload: WebhookPayload) -> None:
|
105 |
+
return {"scope": payload.event.scope}
|
106 |
+
|
107 |
+
# Routes to check secret validation
|
108 |
+
# Checks all 4 cases (async/sync, with/without request parameter)
|
109 |
+
@app.add_webhook
|
110 |
+
async def async_with_request(request: Request) -> None:
|
111 |
+
return {"success": True}
|
112 |
+
|
113 |
+
@app.add_webhook
|
114 |
+
def sync_with_request(request: Request) -> None:
|
115 |
+
return {"success": True}
|
116 |
+
|
117 |
+
@app.add_webhook
|
118 |
+
async def async_no_request() -> None:
|
119 |
+
return {"success": True}
|
120 |
+
|
121 |
+
@app.add_webhook
|
122 |
+
def sync_no_request() -> None:
|
123 |
+
return {"success": True}
|
124 |
+
|
125 |
+
# Route to check explicit path
|
126 |
+
@app.add_webhook(path="/explicit_path")
|
127 |
+
async def with_explicit_path() -> None:
|
128 |
+
return {"success": True}
|
129 |
+
|
130 |
+
self.ui = ui
|
131 |
+
self.app = app
|
132 |
+
self.client = self.mocked_run_app()
|
133 |
+
|
134 |
+
def tearDown(self) -> None:
|
135 |
+
self.ui.server.close()
|
136 |
+
|
137 |
+
def mocked_run_app(self) -> "TestClient":
|
138 |
+
with patch.object(self.ui, "block_thread"):
|
139 |
+
# Run without blocking
|
140 |
+
with patch.object(huggingface_hub._webhooks_server, "_is_local", False):
|
141 |
+
# Run without tunnel
|
142 |
+
self.app.run()
|
143 |
+
return TestClient(self.app.fastapi_app)
|
144 |
+
|
145 |
+
def test_run_print_instructions(self):
|
146 |
+
"""Test that the instructions are printed when running the app."""
|
147 |
+
# Test running the app
|
148 |
+
with capture_output() as output:
|
149 |
+
self.mocked_run_app()
|
150 |
+
|
151 |
+
instructions = output.getvalue()
|
152 |
+
self.assertIn("Webhooks are correctly setup and ready to use:", instructions)
|
153 |
+
self.assertIn("- POST http://127.0.0.1:7860/webhooks/test_webhook", instructions)
|
154 |
+
|
155 |
+
def test_run_parse_payload(self):
|
156 |
+
"""Test that the payload is correctly parsed when running the app."""
|
157 |
+
response = self.client.post(
|
158 |
+
"/webhooks/test_webhook", headers=self.HEADERS_VALID_SECRET, json=WEBHOOK_PAYLOAD_EXAMPLE
|
159 |
+
)
|
160 |
+
self.assertEqual(response.status_code, 200)
|
161 |
+
self.assertEqual(response.json(), {"scope": "discussion"})
|
162 |
+
|
163 |
+
def test_with_webhook_secret_should_succeed(self):
|
164 |
+
"""Test success if valid secret is sent."""
|
165 |
+
for path in ["async_with_request", "sync_with_request", "async_no_request", "sync_no_request"]:
|
166 |
+
with self.subTest(path):
|
167 |
+
response = self.client.post(f"/webhooks/{path}", headers=self.HEADERS_VALID_SECRET)
|
168 |
+
self.assertEqual(response.status_code, 200)
|
169 |
+
self.assertEqual(response.json(), {"success": True})
|
170 |
+
|
171 |
+
def test_no_webhook_secret_should_be_unauthorized(self):
|
172 |
+
"""Test failure if valid secret is sent."""
|
173 |
+
for path in ["async_with_request", "sync_with_request", "async_no_request", "sync_no_request"]:
|
174 |
+
with self.subTest(path):
|
175 |
+
response = self.client.post(f"/webhooks/{path}")
|
176 |
+
self.assertEqual(response.status_code, 401)
|
177 |
+
|
178 |
+
def test_wrong_webhook_secret_should_be_forbidden(self):
|
179 |
+
"""Test failure if valid secret is sent."""
|
180 |
+
for path in ["async_with_request", "sync_with_request", "async_no_request", "sync_no_request"]:
|
181 |
+
with self.subTest(path):
|
182 |
+
response = self.client.post(f"/webhooks/{path}", headers=self.HEADERS_WRONG_SECRET)
|
183 |
+
self.assertEqual(response.status_code, 403)
|
184 |
+
|
185 |
+
def test_route_with_explicit_path(self):
|
186 |
+
"""Test that the route with an explicit path is correctly registered."""
|
187 |
+
response = self.client.post("/webhooks/explicit_path", headers=self.HEADERS_VALID_SECRET)
|
188 |
+
self.assertEqual(response.status_code, 200)
|