DesertWolf's picture
Upload folder using huggingface_hub
447ebeb verified
import pytest
import requests
from litellm.proxy.client.exceptions import UnauthorizedError
from litellm.proxy.client.keys import KeysManagementClient
@pytest.fixture
def base_url():
return "http://localhost:8000"
@pytest.fixture
def api_key():
return "test-api-key"
@pytest.fixture
def client(base_url, api_key):
return KeysManagementClient(base_url=base_url, api_key=api_key)
def test_client_initialization(base_url, api_key):
"""Test that the KeysManagementClient is properly initialized"""
client = KeysManagementClient(base_url=base_url, api_key=api_key)
assert client._base_url == base_url
assert client._api_key == api_key
def test_client_initialization_strips_trailing_slash():
"""Test that the client properly strips trailing slashes from base_url during initialization"""
base_url = "http://localhost:8000/////"
client = KeysManagementClient(base_url=base_url)
assert client._base_url == "http://localhost:8000"
def test_client_without_api_key(base_url):
"""Test that the client works without an API key"""
client = KeysManagementClient(base_url=base_url)
assert client._api_key is None
def test_list_request_minimal(client, base_url, api_key):
"""Test list request with minimal parameters"""
request = client.list(return_request=True)
assert request.method == "GET"
assert request.url == f"{base_url}/key/list"
assert request.headers["Content-Type"] == "application/json"
assert request.headers["Authorization"] == f"Bearer {api_key}"
assert not request.params
def test_list_request_pagination(client):
"""Test list request with pagination parameters"""
request = client.list(page=2, size=10, return_request=True)
assert request.params == {"page": 2, "size": 10}
def test_list_request_filters(client):
"""Test list request with filtering parameters"""
request = client.list(
user_id="user123",
team_id="team456",
organization_id="org789",
key_hash="hash123",
key_alias="alias123",
return_request=True,
)
assert request.params == {
"user_id": "user123",
"team_id": "team456",
"organization_id": "org789",
"key_hash": "hash123",
"key_alias": "alias123",
}
def test_list_request_flags(client):
"""Test list request with boolean flag parameters"""
request = client.list(
return_full_object=True, include_team_keys=False, return_request=True
)
assert request.params == {
"return_full_object": "true",
"include_team_keys": "false",
}
def test_list_request_all_parameters(client):
"""Test list request with all parameters"""
request = client.list(
page=2,
size=10,
user_id="user123",
team_id="team456",
organization_id="org789",
key_hash="hash123",
key_alias="alias123",
return_full_object=True,
include_team_keys=False,
return_request=True,
)
assert request.params == {
"page": 2,
"size": 10,
"user_id": "user123",
"team_id": "team456",
"organization_id": "org789",
"key_hash": "hash123",
"key_alias": "alias123",
"return_full_object": "true",
"include_team_keys": "false",
}
def test_list_mock_response_pagination(client, requests_mock):
"""Test list with a mocked paginated response"""
mock_response = {
"data": {
"keys": [
{
"key": "key1",
"expires": "2024-12-31T23:59:59Z",
"models": ["gpt-4"],
"aliases": {"gpt4": "gpt-4"},
"spend": 100.0,
},
{
"key": "key2",
"expires": None,
"models": ["gpt-3.5-turbo"],
"aliases": {},
"spend": None,
},
],
"total": 5,
"page": 1,
"size": 2,
}
}
requests_mock.get(
f"{client._base_url}/key/list",
json=mock_response,
additional_matcher=lambda r: r.qs == {"page": ["1"], "size": ["2"]},
)
response = client.list(page=1, size=2)
assert response == mock_response
def test_list_mock_response_filtered(client, requests_mock):
"""Test list with a mocked filtered response"""
mock_response = {
"keys": [
{
"key": "key1",
"user_id": "user123",
"team_id": "team456",
"expires": "2024-12-31T23:59:59Z",
"models": ["gpt-4"],
"aliases": {"gpt4": "gpt-4"},
"spend": 100.0,
}
]
}
requests_mock.get(
f"{client._base_url}/key/list",
json=mock_response,
additional_matcher=lambda r: (
r.qs.get("user_id") == ["user123"] and r.qs.get("team_id") == ["team456"]
),
)
response = client.list(user_id="user123", team_id="team456")
assert response == mock_response
def test_list_unauthorized_error(client, requests_mock):
"""Test that list raises UnauthorizedError for 401 responses"""
requests_mock.get(
f"{client._base_url}/key/list", status_code=401, json={"error": "Unauthorized"}
)
with pytest.raises(UnauthorizedError):
client.list()
def test_generate_request_minimal(client, base_url, api_key):
"""Test generate with minimal parameters"""
request = client.generate(return_request=True)
assert request.method == "POST"
assert request.url == f"{base_url}/key/generate"
assert request.headers["Content-Type"] == "application/json"
assert request.headers["Authorization"] == f"Bearer {api_key}"
def test_generate_request_full(client):
"""Test generate with all parameters"""
request = client.generate(
models=["gpt-4", "gpt-3.5-turbo"],
aliases={"gpt4": "gpt-4", "turbo": "gpt-3.5-turbo"},
spend=100.0,
duration="24h",
key_alias="test-key-alias",
team_id="team123",
user_id="user456",
budget_id="budget789",
config={"max_parallel_requests": 5},
return_request=True,
)
assert request.json == {
"models": ["gpt-4", "gpt-3.5-turbo"],
"aliases": {"gpt4": "gpt-4", "turbo": "gpt-3.5-turbo"},
"spend": 100.0,
"duration": "24h",
"key_alias": "test-key-alias",
"team_id": "team123",
"user_id": "user456",
"budget_id": "budget789",
"config": {"max_parallel_requests": 5},
}
def test_generate_mock_response(client, requests_mock):
"""Test generate with a mocked successful response"""
mock_response = {
"key": "new-test-key",
"expires": "2024-12-31T23:59:59Z",
"models": ["gpt-4"],
"aliases": {"gpt4": "gpt-4"},
"spend": 100.0,
"key_alias": "test-key-alias",
"team_id": "team123",
"user_id": "user456",
"budget_id": "budget789",
"config": {"max_parallel_requests": 5},
}
requests_mock.post(f"{client._base_url}/key/generate", json=mock_response)
response = client.generate(
key_alias="test-key-alias",
team_id="team123",
user_id="user456",
budget_id="budget789",
config={"max_parallel_requests": 5},
)
assert response == mock_response
def test_generate_unauthorized_error(client, requests_mock):
"""Test that generate raises UnauthorizedError for 401 responses"""
requests_mock.post(
f"{client._base_url}/key/generate",
status_code=401,
json={"error": "Unauthorized"},
)
with pytest.raises(UnauthorizedError):
client.generate()
def test_delete_request_minimal(client, base_url, api_key):
"""Test delete request with minimal parameters"""
request = client.delete(return_request=True)
assert request.method == "POST"
assert request.url == f"{base_url}/key/delete"
assert request.headers["Content-Type"] == "application/json"
assert request.headers["Authorization"] == f"Bearer {api_key}"
assert request.json == {"keys": None, "key_aliases": None}
def test_delete_request_with_keys(client):
"""Test delete request with keys list"""
keys_to_delete = ["key1", "key2", "key3"]
request = client.delete(keys=keys_to_delete, return_request=True)
assert request.json == {"keys": keys_to_delete, "key_aliases": None}
def test_delete_request_with_aliases(client):
"""Test delete request with key aliases list"""
aliases_to_delete = ["alias1", "alias2"]
request = client.delete(key_aliases=aliases_to_delete, return_request=True)
assert request.json == {"keys": None, "key_aliases": aliases_to_delete}
def test_delete_request_with_keys_and_aliases(client):
"""Test delete request with both keys and aliases"""
keys_to_delete = ["key1", "key2"]
aliases_to_delete = ["alias1", "alias2"]
request = client.delete(
keys=keys_to_delete, key_aliases=aliases_to_delete, return_request=True
)
assert request.json == {"keys": keys_to_delete, "key_aliases": aliases_to_delete}
def test_delete_mock_response(client, requests_mock):
"""Test delete with a mocked successful response"""
mock_response = {
"status": "success",
"deleted_keys": ["key1", "key2"],
"deleted_aliases": ["alias1"],
}
requests_mock.post(f"{client._base_url}/key/delete", json=mock_response)
response = client.delete(keys=["key1", "key2"], key_aliases=["alias1"])
assert response == mock_response
def test_delete_unauthorized_error(client, requests_mock):
"""Test that delete raises UnauthorizedError for 401 responses"""
requests_mock.post(
f"{client._base_url}/key/delete",
status_code=401,
json={"error": "Unauthorized"},
)
with pytest.raises(UnauthorizedError):
client.delete(keys=["key-to-delete"])
def test_info_request_minimal(client, base_url, api_key):
"""Test info request with minimal parameters"""
request = client.info(key="test-key", return_request=True)
assert request.method == "GET"
assert request.url == f"{base_url}/keys/info?key=test-key"
assert request.headers["Content-Type"] == "application/json"
assert request.headers["Authorization"] == f"Bearer {api_key}"
def test_info_mock_response(client, requests_mock):
"""Test info with a mocked successful response"""
mock_response = {
"key": "test-key",
"user_id": "user123",
"team_id": "team456",
"models": ["gpt-4"],
"spend": 100.0,
}
requests_mock.get(f"{client._base_url}/keys/info?key=test-key", json=mock_response)
response = client.info(key="test-key")
assert response == mock_response
def test_info_unauthorized_error(client, requests_mock):
"""Test that info raises UnauthorizedError for 401 responses"""
requests_mock.get(
f"{client._base_url}/keys/info?key=test-key",
status_code=401,
json={"error": "Unauthorized"},
)
with pytest.raises(UnauthorizedError):
client.info(key="test-key")
def test_info_server_error(client, requests_mock):
"""Test that info raises HTTPError for server errors"""
requests_mock.get(
f"{client._base_url}/keys/info?key=test-key",
status_code=500,
json={"error": "Internal Server Error"},
)
with pytest.raises(requests.exceptions.HTTPError):
client.info(key="test-key")