This commit is contained in:
Lukas 2025-10-12 18:05:31 +02:00
parent 57d49bcf78
commit 7a71715183
130 changed files with 30010 additions and 50631 deletions

Binary file not shown.

View File

@ -1,53 +0,0 @@
{
"security": {
"master_password_hash": "bab56314cf756abaa50615a4e5594683d0e5ce5ac1e051bc9eec683056eeacb0",
"salt": "salt_change_in_production_abcdef",
"session_timeout_hours": 24,
"max_failed_attempts": 5,
"lockout_duration_minutes": 30
},
"anime": {
"directory": "C:\\test\\anime",
"download_threads": 3,
"download_speed_limit": null,
"auto_rescan_time": "03:00",
"auto_download_after_rescan": false
},
"logging": {
"level": "INFO",
"enable_console_logging": true,
"enable_console_progress": false,
"enable_fail2ban_logging": true,
"log_file": "aniworld.log",
"max_log_size_mb": 10,
"log_backup_count": 5
},
"providers": {
"default_provider": "aniworld.to",
"preferred_language": "German Dub",
"fallback_providers": [
"aniworld.to"
],
"provider_timeout": 30,
"retry_attempts": 3,
"provider_settings": {
"aniworld.to": {
"enabled": true,
"priority": 1,
"quality_preference": "720p"
}
}
},
"advanced": {
"max_concurrent_downloads": 3,
"download_buffer_size": 8192,
"connection_timeout": 30,
"read_timeout": 300,
"enable_debug_mode": false,
"cache_duration_minutes": 60
},
"setup": {
"completed": true,
"completed_at": "2025-10-06 11:28:22.571378"
}
}

View File

@ -9942,3 +9942,53 @@
2025-10-06 13:06:51,970 - src.server.fastapi_app - INFO - Anime directory: ./downloads
2025-10-06 13:06:51,970 - src.server.fastapi_app - INFO - Log level: INFO
2025-10-06 13:16:44,402 - src.server.fastapi_app - INFO - Shutting down AniWorld FastAPI server...
2025-10-06 13:16:45,377 - src.server.fastapi_app - INFO - Starting AniWorld FastAPI server...
2025-10-06 13:16:45,378 - src.server.fastapi_app - INFO - Anime directory: ./downloads
2025-10-06 13:16:45,378 - src.server.fastapi_app - INFO - Log level: INFO
2025-10-06 13:28:03,558 - src.server.services.setup_service - INFO - Setup incomplete: Configuration file is missing or invalid
2025-10-06 13:28:03,558 - src.server.middleware.application_flow_middleware - INFO - Redirecting / to /setup
2025-10-06 13:28:03,561 - src.server.services.setup_service - INFO - Setup incomplete: Configuration file is missing or invalid
2025-10-06 13:28:22,549 - src.server.services.setup_service - INFO - Setup incomplete: Configuration file is missing or invalid
2025-10-06 13:28:22,564 - src.server.fastapi_app - INFO - Created aniworld.db
2025-10-06 13:28:22,571 - src.server.fastapi_app - INFO - Created cache.db
2025-10-06 13:28:22,572 - src.server.services.setup_service - INFO - Configuration saved to data\config.json
2025-10-06 13:28:22,572 - src.server.fastapi_app - INFO - Application setup completed successfully
2025-10-06 13:30:52,668 - src.server.middleware.application_flow_middleware - INFO - Redirecting / to /login
2025-10-08 17:52:08,812 - __main__ - INFO - Starting AniWorld FastAPI server with uvicorn...
2025-10-08 17:52:08,812 - __main__ - INFO - Anime directory: ./downloads
2025-10-08 17:52:08,812 - __main__ - INFO - Log level: INFO
2025-10-08 17:52:08,812 - __main__ - INFO - Server will be available at http://127.0.0.1:8000
2025-10-08 17:52:08,812 - __main__ - INFO - API documentation at http://127.0.0.1:8000/docs
2025-10-08 17:52:09,022 - fastapi_app - INFO - Starting AniWorld FastAPI server...
2025-10-08 17:52:09,024 - fastapi_app - INFO - Anime directory: ./downloads
2025-10-08 17:52:09,024 - fastapi_app - INFO - Log level: INFO
2025-10-08 17:52:16,944 - src.server.middleware.application_flow_middleware - INFO - Redirecting / to /login
2025-10-08 17:52:33,962 - fastapi_app - INFO - Shutting down AniWorld FastAPI server...
2025-10-08 17:52:53,850 - __main__ - INFO - Starting AniWorld FastAPI server with uvicorn...
2025-10-08 17:52:53,854 - __main__ - INFO - Anime directory: ./downloads
2025-10-08 17:52:53,854 - __main__ - INFO - Log level: INFO
2025-10-08 17:52:53,854 - __main__ - INFO - Server will be available at http://127.0.0.1:8000
2025-10-08 17:52:53,854 - __main__ - INFO - API documentation at http://127.0.0.1:8000/docs
2025-10-08 17:52:53,977 - fastapi_app - INFO - Starting AniWorld FastAPI server...
2025-10-08 17:52:53,977 - fastapi_app - INFO - Anime directory: ./downloads
2025-10-08 17:52:53,977 - fastapi_app - INFO - Log level: INFO
2025-10-08 17:53:04,990 - src.server.services.setup_service - INFO - Setup incomplete: Configuration file is missing or invalid
2025-10-08 17:53:04,998 - src.server.middleware.application_flow_middleware - INFO - Redirecting / to /setup
2025-10-08 17:53:05,007 - src.server.services.setup_service - INFO - Setup incomplete: Configuration file is missing or invalid
2025-10-08 17:53:17,699 - src.server.services.setup_service - INFO - Setup incomplete: Configuration file is missing or invalid
2025-10-08 17:53:17,729 - fastapi_app - INFO - Created aniworld.db
2025-10-08 17:53:17,749 - fastapi_app - INFO - Created cache.db
2025-10-08 17:53:17,749 - src.server.services.setup_service - INFO - Configuration saved to data\config.json
2025-10-08 17:53:17,749 - fastapi_app - INFO - Application setup completed successfully
2025-10-08 17:54:14,632 - fastapi_app - INFO - Shutting down AniWorld FastAPI server...
2025-10-08 17:55:45,640 - __main__ - INFO - Starting AniWorld FastAPI server with uvicorn...
2025-10-08 17:55:45,640 - __main__ - INFO - Anime directory: ./downloads
2025-10-08 17:55:45,640 - __main__ - INFO - Log level: INFO
2025-10-08 17:55:45,640 - __main__ - INFO - Server will be available at http://127.0.0.1:8000
2025-10-08 17:55:45,640 - __main__ - INFO - API documentation at http://127.0.0.1:8000/docs
2025-10-08 17:55:45,781 - fastapi_app - INFO - Starting AniWorld FastAPI server...
2025-10-08 17:55:45,781 - fastapi_app - INFO - Anime directory: ./downloads
2025-10-08 17:55:45,786 - fastapi_app - INFO - Log level: INFO
2025-10-08 17:55:51,336 - fastapi_app - WARNING - Failed login attempt from IP: 127.0.0.1
2025-10-08 17:55:59,448 - fastapi_app - WARNING - Failed login attempt from IP: 127.0.0.1
2025-10-08 17:56:53,904 - fastapi_app - INFO - Shutting down AniWorld FastAPI server...

View File

@ -22,7 +22,8 @@ import jwt
# Add parent directory to path for imports
current_dir = os.path.dirname(__file__)
parent_dir = os.path.join(current_dir, '..')
sys.path.insert(0, os.path.abspath(parent_dir))
project_root = os.path.join(parent_dir, '..') # Go up two levels to reach project root
sys.path.insert(0, os.path.abspath(project_root))
import uvicorn
from fastapi import Depends, FastAPI, HTTPException, Request, Security, status
@ -34,9 +35,17 @@ from fastapi.templating import Jinja2Templates
from pydantic import BaseModel, Field
from pydantic_settings import BaseSettings
# Import application flow services
from src.server.middleware.application_flow_middleware import ApplicationFlowMiddleware
from src.server.services.setup_service import SetupService
# Import application flow services - use relative imports or fix the path
try:
from core.application.services.setup_service import SetupService
from src.server.middleware.application_flow_middleware import (
ApplicationFlowMiddleware,
)
except ImportError:
# Alternative approach with relative imports
from ..core.application.services.setup_service import SetupService
from .middleware.application_flow_middleware import ApplicationFlowMiddleware
# Import our custom middleware - temporarily disabled due to file corruption
# from src.server.web.middleware.fastapi_auth_middleware import AuthMiddleware
@ -575,7 +584,7 @@ async def process_setup(request_data: SetupRequest) -> SetupResponse:
)
# Authentication endpoints
@app.post("/auth/login", response_model=LoginResponse, tags=["Authentication"])
@app.post("/api/auth/login", response_model=LoginResponse, tags=["Authentication"])
async def login(request_data: LoginRequest, request: Request) -> LoginResponse:
"""
Authenticate with master password and receive JWT token.
@ -610,7 +619,7 @@ async def login(request_data: LoginRequest, request: Request) -> LoginResponse:
detail="Authentication service error"
)
@app.get("/auth/verify", response_model=TokenVerifyResponse, tags=["Authentication"])
@app.get("/api/auth/verify", response_model=TokenVerifyResponse, tags=["Authentication"])
async def verify_token(current_user: Dict = Depends(get_current_user)) -> TokenVerifyResponse:
"""
Verify the validity of the current JWT token.
@ -624,7 +633,7 @@ async def verify_token(current_user: Dict = Depends(get_current_user)) -> TokenV
expires_at=datetime.fromtimestamp(current_user.get('exp', 0))
)
@app.post("/auth/logout", response_model=Dict[str, Any], tags=["Authentication"])
@app.post("/api/auth/logout", response_model=Dict[str, Any], tags=["Authentication"])
async def logout(current_user: Dict = Depends(get_current_user)) -> Dict[str, Any]:
"""
Logout endpoint (stateless - client should remove token).

View File

@ -19,7 +19,7 @@ from starlette.middleware.base import BaseHTTPMiddleware
# Import the setup service
try:
from ..services.setup_service import SetupService
from ...core.application.services.setup_service import SetupService
except ImportError:
# Handle case where service is not available
class SetupService:

View File

@ -1,782 +0,0 @@
"""
Anime Management API Endpoints
This module provides REST API endpoints for anime CRUD operations,
including creation, reading, updating, deletion, and search functionality.
"""
import uuid
from typing import Any, Dict, List, Optional
from fastapi import APIRouter, Depends, HTTPException, Query, status
from pydantic import BaseModel, Field
# Import SeriesApp for business logic
from src.core.SeriesApp import SeriesApp
# FastAPI dependencies and models
from src.server.fastapi_app import get_current_user, settings
# Pydantic models for requests
class AnimeSearchRequest(BaseModel):
"""Request model for anime search."""
query: str = Field(..., min_length=1, max_length=100)
status: Optional[str] = Field(None, pattern="^(ongoing|completed|planned|dropped|paused)$")
genre: Optional[str] = None
year: Optional[int] = Field(None, ge=1900, le=2100)
class AnimeResponse(BaseModel):
"""Response model for anime data."""
id: str
title: str
description: Optional[str] = None
status: str = "Unknown"
folder: Optional[str] = None
episodes: int = 0
class AnimeCreateRequest(BaseModel):
"""Request model for creating anime entries."""
name: str = Field(..., min_length=1, max_length=255)
folder: str = Field(..., min_length=1)
description: Optional[str] = None
status: str = Field(default="planned", pattern="^(ongoing|completed|planned|dropped|paused)$")
genre: Optional[str] = None
year: Optional[int] = Field(None, ge=1900, le=2100)
class AnimeUpdateRequest(BaseModel):
"""Request model for updating anime entries."""
name: Optional[str] = Field(None, min_length=1, max_length=255)
folder: Optional[str] = None
description: Optional[str] = None
status: Optional[str] = Field(None, pattern="^(ongoing|completed|planned|dropped|paused)$")
genre: Optional[str] = None
year: Optional[int] = Field(None, ge=1900, le=2100)
class PaginatedAnimeResponse(BaseModel):
"""Paginated response model for anime lists."""
success: bool = True
data: List[AnimeResponse]
pagination: Dict[str, Any]
class AnimeSearchResponse(BaseModel):
"""Response model for anime search results."""
success: bool = True
data: List[AnimeResponse]
pagination: Dict[str, Any]
search: Dict[str, Any]
class RescanResponse(BaseModel):
"""Response model for rescan operations."""
success: bool
message: str
total_series: int
# Dependency to get SeriesApp instance
def get_series_app() -> SeriesApp:
"""Get SeriesApp instance for business logic operations."""
if not settings.anime_directory:
raise HTTPException(
status_code=status.HTTP_503_SERVICE_UNAVAILABLE,
detail="Anime directory not configured"
)
return SeriesApp(settings.anime_directory)
# Create FastAPI router for anime management endpoints
router = APIRouter(prefix='/api/v1/anime', tags=['anime'])
@router.get('', response_model=PaginatedAnimeResponse)
async def list_anime(
status: Optional[str] = Query(None, pattern="^(ongoing|completed|planned|dropped|paused)$"),
genre: Optional[str] = Query(None),
year: Optional[int] = Query(None, ge=1900, le=2100),
search: Optional[str] = Query(None),
page: int = Query(1, ge=1),
per_page: int = Query(50, ge=1, le=1000),
current_user: Optional[Dict] = Depends(get_current_user),
series_app: SeriesApp = Depends(get_series_app)
) -> PaginatedAnimeResponse:
"""
Get all anime with optional filtering and pagination.
Query Parameters:
- status: Filter by anime status (ongoing, completed, planned, dropped, paused)
- genre: Filter by genre
- year: Filter by release year
- search: Search in name and description
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated list of anime with metadata
"""
try:
# Get the series list from SeriesApp
anime_list = series_app.series_list
# Convert to list of AnimeResponse objects
anime_responses = []
for series_item in anime_list:
anime_response = AnimeResponse(
id=getattr(series_item, 'id', str(uuid.uuid4())),
title=getattr(series_item, 'name', 'Unknown'),
folder=getattr(series_item, 'folder', ''),
description=getattr(series_item, 'description', ''),
status='ongoing', # Default status
episodes=getattr(series_item, 'total_episodes', 0)
)
# Apply search filter if provided
if search:
if search.lower() not in anime_response.title.lower():
continue
anime_responses.append(anime_response)
# Apply pagination
total = len(anime_responses)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_anime = anime_responses[start_idx:end_idx]
return PaginatedAnimeResponse(
data=paginated_anime,
pagination={
"page": page,
"per_page": per_page,
"total": total,
"pages": (total + per_page - 1) // per_page,
"has_next": end_idx < total,
"has_prev": page > 1
}
)
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Error retrieving anime list: {str(e)}"
)
@anime_bp.route('/<int:anime_id>', methods=['GET'])
@handle_api_errors
@validate_id_parameter('anime_id')
@optional_auth
def get_anime(anime_id: int) -> Dict[str, Any]:
"""
Get specific anime by ID.
Args:
anime_id: Unique identifier for the anime
Returns:
Anime details with episodes summary
"""
if not anime_repository:
raise APIException("Anime repository not available", 503)
anime = anime_repository.get_anime_by_id(anime_id)
if not anime:
raise NotFoundError("Anime not found")
# Format anime data
anime_data = format_anime_response(anime.__dict__)
# Add episodes summary
episodes_summary = anime_repository.get_episodes_summary(anime_id)
anime_data['episodes_summary'] = episodes_summary
return create_success_response(anime_data)
@anime_bp.route('', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['name', 'folder'],
optional_fields=['key', 'description', 'genres', 'release_year', 'status', 'total_episodes', 'poster_url', 'custom_metadata'],
field_types={
'name': str,
'folder': str,
'key': str,
'description': str,
'genres': list,
'release_year': int,
'status': str,
'total_episodes': int,
'poster_url': str,
'custom_metadata': dict
}
)
@require_auth
def create_anime() -> Dict[str, Any]:
"""
Create a new anime record.
Required Fields:
- name: Anime name
- folder: Folder path where anime files are stored
Optional Fields:
- key: Unique key identifier
- description: Anime description
- genres: List of genres
- release_year: Year of release
- status: Status (ongoing, completed, planned, dropped, paused)
- total_episodes: Total number of episodes
- poster_url: URL to poster image
- custom_metadata: Additional metadata as key-value pairs
Returns:
Created anime details with generated ID
"""
if not anime_repository:
raise APIException("Anime repository not available", 503)
data = request.get_json()
# Validate status if provided
if 'status' in data and data['status'] not in ['ongoing', 'completed', 'planned', 'dropped', 'paused']:
raise ValidationError("Status must be one of: ongoing, completed, planned, dropped, paused")
# Check if anime with same folder already exists
existing_anime = anime_repository.get_anime_by_folder(data['folder'])
if existing_anime:
raise ValidationError("Anime with this folder already exists")
# Create anime metadata object
try:
anime = AnimeMetadata(
anime_id=str(uuid.uuid4()),
name=data['name'],
folder=data['folder'],
key=data.get('key'),
description=data.get('description'),
genres=data.get('genres', []),
release_year=data.get('release_year'),
status=data.get('status', 'planned'),
total_episodes=data.get('total_episodes'),
poster_url=data.get('poster_url'),
custom_metadata=data.get('custom_metadata', {})
)
except Exception as e:
raise ValidationError(f"Invalid anime data: {str(e)}")
# Save to database
success = anime_repository.create_anime(anime)
if not success:
raise APIException("Failed to create anime", 500)
# Return created anime
anime_data = format_anime_response(anime.__dict__)
return create_success_response(
data=anime_data,
message="Anime created successfully",
status_code=201
)
@anime_bp.route('/<int:anime_id>', methods=['PUT'])
@handle_api_errors
@validate_id_parameter('anime_id')
@validate_json_input(
optional_fields=['name', 'folder', 'key', 'description', 'genres', 'release_year', 'status', 'total_episodes', 'poster_url', 'custom_metadata'],
field_types={
'name': str,
'folder': str,
'key': str,
'description': str,
'genres': list,
'release_year': int,
'status': str,
'total_episodes': int,
'poster_url': str,
'custom_metadata': dict
}
)
@require_auth
def update_anime(anime_id: int) -> Dict[str, Any]:
"""
Update an existing anime record.
Args:
anime_id: Unique identifier for the anime
Optional Fields:
- name: Anime name
- folder: Folder path where anime files are stored
- key: Unique key identifier
- description: Anime description
- genres: List of genres
- release_year: Year of release
- status: Status (ongoing, completed, planned, dropped, paused)
- total_episodes: Total number of episodes
- poster_url: URL to poster image
- custom_metadata: Additional metadata as key-value pairs
Returns:
Updated anime details
"""
if not anime_repository:
raise APIException("Anime repository not available", 503)
data = request.get_json()
# Get existing anime
existing_anime = anime_repository.get_anime_by_id(anime_id)
if not existing_anime:
raise NotFoundError("Anime not found")
# Validate status if provided
if 'status' in data and data['status'] not in ['ongoing', 'completed', 'planned', 'dropped', 'paused']:
raise ValidationError("Status must be one of: ongoing, completed, planned, dropped, paused")
# Check if folder is being changed and if it conflicts
if 'folder' in data and data['folder'] != existing_anime.folder:
conflicting_anime = anime_repository.get_anime_by_folder(data['folder'])
if conflicting_anime and conflicting_anime.anime_id != anime_id:
raise ValidationError("Another anime with this folder already exists")
# Update fields
update_fields = {}
for field in ['name', 'folder', 'key', 'description', 'genres', 'release_year', 'status', 'total_episodes', 'poster_url']:
if field in data:
update_fields[field] = data[field]
# Handle custom metadata update (merge instead of replace)
if 'custom_metadata' in data:
existing_metadata = existing_anime.custom_metadata or {}
existing_metadata.update(data['custom_metadata'])
update_fields['custom_metadata'] = existing_metadata
# Perform update
success = anime_repository.update_anime(anime_id, update_fields)
if not success:
raise APIException("Failed to update anime", 500)
# Get updated anime
updated_anime = anime_repository.get_anime_by_id(anime_id)
anime_data = format_anime_response(updated_anime.__dict__)
return create_success_response(
data=anime_data,
message="Anime updated successfully"
)
@anime_bp.route('/<int:anime_id>', methods=['DELETE'])
@handle_api_errors
@validate_id_parameter('anime_id')
@require_auth
def delete_anime(anime_id: int) -> Dict[str, Any]:
"""
Delete an anime record and all related data.
Args:
anime_id: Unique identifier for the anime
Query Parameters:
- force: Set to 'true' to force deletion even if episodes exist
Returns:
Deletion confirmation
"""
if not anime_repository:
raise APIException("Anime repository not available", 503)
# Check if anime exists
existing_anime = anime_repository.get_anime_by_id(anime_id)
if not existing_anime:
raise NotFoundError("Anime not found")
# Check for existing episodes unless force deletion
force_delete = request.args.get('force', 'false').lower() == 'true'
if not force_delete:
episode_count = anime_repository.get_episode_count(anime_id)
if episode_count > 0:
raise ValidationError(
f"Cannot delete anime with {episode_count} episodes. "
"Use ?force=true to force deletion or delete episodes first."
)
# Perform deletion (this should cascade to episodes, downloads, etc.)
success = anime_repository.delete_anime(anime_id)
if not success:
raise APIException("Failed to delete anime", 500)
return create_success_response(
message=f"Anime '{existing_anime.name}' deleted successfully"
)
@router.get('/search', response_model=AnimeSearchResponse)
async def search_anime(
q: str = Query(..., min_length=2, description="Search query"),
page: int = Query(1, ge=1),
per_page: int = Query(20, ge=1, le=100),
current_user: Optional[Dict] = Depends(get_current_user),
series_app: SeriesApp = Depends(get_series_app)
) -> AnimeSearchResponse:
"""
Search anime by name using SeriesApp.
Query Parameters:
- q: Search query (required, min 2 characters)
- page: Page number (default: 1)
- per_page: Items per page (default: 20, max: 100)
Returns:
Paginated search results
"""
try:
# Use SeriesApp to perform search
search_results = series_app.search(q)
# Convert search results to AnimeResponse objects
anime_responses = []
for result in search_results:
anime_response = AnimeResponse(
id=getattr(result, 'id', str(uuid.uuid4())),
title=getattr(result, 'name', getattr(result, 'title', 'Unknown')),
description=getattr(result, 'description', ''),
status='available',
episodes=getattr(result, 'episodes', 0),
folder=getattr(result, 'key', '')
)
anime_responses.append(anime_response)
# Apply pagination
total = len(anime_responses)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_results = anime_responses[start_idx:end_idx]
return AnimeSearchResponse(
data=paginated_results,
pagination={
"page": page,
"per_page": per_page,
"total": total,
"pages": (total + per_page - 1) // per_page,
"has_next": end_idx < total,
"has_prev": page > 1
},
search={
"query": q,
"total_results": total
}
)
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Search failed: {str(e)}"
)
# Apply pagination
total = len(formatted_results)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_results = formatted_results[start_idx:end_idx]
# Create response with search metadata
response = create_paginated_response(
data=paginated_results,
page=page,
per_page=per_page,
total=total,
endpoint='anime.search_anime',
q=search_term,
fields=','.join(search_fields)
)
# Add search metadata
response['search'] = {
'query': search_term,
'fields': search_fields,
'total_results': total
}
return response
@anime_bp.route('/<int:anime_id>/episodes', methods=['GET'])
@handle_api_errors
@validate_id_parameter('anime_id')
@validate_pagination_params
@optional_auth
def get_anime_episodes(anime_id: int) -> Dict[str, Any]:
"""
Get all episodes for a specific anime.
Args:
anime_id: Unique identifier for the anime
Query Parameters:
- status: Filter by episode status
- downloaded: Filter by download status (true/false)
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated list of episodes for the anime
"""
if not anime_repository:
raise APIException("Anime repository not available", 503)
# Check if anime exists
anime = anime_repository.get_anime_by_id(anime_id)
if not anime:
raise NotFoundError("Anime not found")
# Get filters
status_filter = request.args.get('status')
downloaded_filter = request.args.get('downloaded')
# Validate downloaded filter
if downloaded_filter and downloaded_filter.lower() not in ['true', 'false']:
raise ValidationError("Downloaded filter must be 'true' or 'false'")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Get episodes
episodes = anime_repository.get_episodes_for_anime(
anime_id=anime_id,
status_filter=status_filter,
downloaded_filter=downloaded_filter.lower() == 'true' if downloaded_filter else None
)
# Format episodes (this would use episode formatting from episodes.py)
formatted_episodes = []
for episode in episodes:
formatted_episodes.append({
'id': episode.id,
'episode_number': episode.episode_number,
'title': episode.title,
'url': episode.url,
'status': episode.status,
'is_downloaded': episode.is_downloaded,
'file_path': episode.file_path,
'file_size': episode.file_size,
'created_at': episode.created_at.isoformat() if episode.created_at else None,
'updated_at': episode.updated_at.isoformat() if episode.updated_at else None
})
# Apply pagination
total = len(formatted_episodes)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_episodes = formatted_episodes[start_idx:end_idx]
return create_paginated_response(
data=paginated_episodes,
page=page,
per_page=per_page,
total=total,
endpoint='anime.get_anime_episodes',
anime_id=anime_id
)
@anime_bp.route('/bulk', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['action', 'anime_ids'],
optional_fields=['data'],
field_types={
'action': str,
'anime_ids': list,
'data': dict
}
)
@require_auth
def bulk_anime_operation() -> Dict[str, Any]:
"""
Perform bulk operations on multiple anime.
Required Fields:
- action: Operation to perform (update_status, delete, update_metadata)
- anime_ids: List of anime IDs to operate on
Optional Fields:
- data: Additional data for the operation
Returns:
Results of the bulk operation
"""
if not anime_repository:
raise APIException("Anime repository not available", 503)
data = request.get_json()
action = data['action']
anime_ids = data['anime_ids']
operation_data = data.get('data', {})
# Validate action
valid_actions = ['update_status', 'delete', 'update_metadata', 'update_genres']
if action not in valid_actions:
raise ValidationError(f"Invalid action. Must be one of: {', '.join(valid_actions)}")
# Validate anime_ids
if not isinstance(anime_ids, list) or not anime_ids:
raise ValidationError("anime_ids must be a non-empty list")
if len(anime_ids) > 100:
raise ValidationError("Cannot operate on more than 100 anime at once")
# Validate anime IDs are integers
try:
anime_ids = [int(aid) for aid in anime_ids]
except ValueError:
raise ValidationError("All anime_ids must be valid integers")
# Perform bulk operation
successful_items = []
failed_items = []
for anime_id in anime_ids:
try:
if action == 'update_status':
if 'status' not in operation_data:
raise ValueError("Status is required for update_status action")
success = anime_repository.update_anime(anime_id, {'status': operation_data['status']})
if success:
successful_items.append({'anime_id': anime_id, 'action': 'status_updated'})
else:
failed_items.append({'anime_id': anime_id, 'error': 'Update failed'})
elif action == 'delete':
success = anime_repository.delete_anime(anime_id)
if success:
successful_items.append({'anime_id': anime_id, 'action': 'deleted'})
else:
failed_items.append({'anime_id': anime_id, 'error': 'Deletion failed'})
elif action == 'update_metadata':
success = anime_repository.update_anime(anime_id, operation_data)
if success:
successful_items.append({'anime_id': anime_id, 'action': 'metadata_updated'})
else:
failed_items.append({'anime_id': anime_id, 'error': 'Metadata update failed'})
except Exception as e:
failed_items.append({'anime_id': anime_id, 'error': str(e)})
# Create batch response
from ...shared.response_helpers import create_batch_response
return create_batch_response(
successful_items=successful_items,
failed_items=failed_items,
message=f"Bulk {action} operation completed"
)
@router.post('/rescan', response_model=RescanResponse)
async def rescan_anime_directory(
current_user: Dict = Depends(get_current_user),
series_app: SeriesApp = Depends(get_series_app)
) -> RescanResponse:
"""
Rescan the anime directory for new episodes and series.
Returns:
Status of the rescan operation
"""
try:
# Use SeriesApp to perform rescan with a simple callback
def progress_callback(progress_info):
# Simple progress tracking - in a real implementation,
# this could be sent via WebSocket or stored for polling
pass
series_app.ReScan(progress_callback)
return RescanResponse(
success=True,
message="Anime directory rescanned successfully",
total_series=len(series_app.series_list) if hasattr(series_app, 'series_list') else 0
)
except Exception as e:
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=f"Rescan failed: {str(e)}"
)
# Additional endpoints for legacy API compatibility
class AddSeriesRequest(BaseModel):
"""Request model for adding a new series."""
link: str = Field(..., min_length=1)
name: str = Field(..., min_length=1, max_length=255)
class AddSeriesResponse(BaseModel):
"""Response model for add series operation."""
status: str
message: str
class DownloadRequest(BaseModel):
"""Request model for downloading series."""
folders: List[str] = Field(..., min_items=1)
class DownloadResponse(BaseModel):
"""Response model for download operation."""
status: str
message: str
@router.post('/add_series', response_model=AddSeriesResponse)
async def add_series(
request_data: AddSeriesRequest,
current_user: Dict = Depends(get_current_user),
series_app: SeriesApp = Depends(get_series_app)
) -> AddSeriesResponse:
"""
Add a new series to the collection.
Args:
request_data: Contains link and name of the series to add
Returns:
Status of the add operation
"""
try:
# For now, just return success - actual implementation would use SeriesApp
# to add the series to the collection
return AddSeriesResponse(
status="success",
message=f"Series '{request_data.name}' added successfully"
)
except Exception as e:
return AddSeriesResponse(
status="error",
message=f"Failed to add series: {str(e)}"
)
@router.post('/download', response_model=DownloadResponse)
async def download_series(
request_data: DownloadRequest,
current_user: Dict = Depends(get_current_user),
series_app: SeriesApp = Depends(get_series_app)
) -> DownloadResponse:
"""
Start downloading selected series folders.
Args:
request_data: Contains list of folder names to download
Returns:
Status of the download operation
"""
try:
# For now, just return success - actual implementation would use SeriesApp
# to start downloads
folder_count = len(request_data.folders)
return DownloadResponse(
status="success",
message=f"Download started for {folder_count} series"
)
except Exception as e:
return DownloadResponse(
status="error",
message=f"Failed to start download: {str(e)}"
)

View File

@ -1,773 +0,0 @@
"""
Authentication API endpoints.
This module handles all authentication-related operations including:
- User authentication
- Session management
- Password management
- API key management
"""
from flask import Blueprint, request, session, jsonify
from typing import Dict, List, Any, Optional, Tuple
import logging
import hashlib
import secrets
import time
from datetime import datetime, timedelta
# Import shared utilities
try:
from src.server.web.controllers.shared.auth_decorators import require_auth, optional_auth
from src.server.web.controllers.shared.error_handlers import handle_api_errors
from src.server.web.controllers.shared.validators import (
validate_json_input, validate_query_params, is_valid_email, sanitize_string
)
from src.server.web.controllers.shared.response_helpers import (
create_success_response, create_error_response, format_user_data
)
except ImportError:
# Fallback imports for development
def require_auth(f): return f
def optional_auth(f): return f
def handle_api_errors(f): return f
def validate_json_input(**kwargs): return lambda f: f
def validate_query_params(**kwargs): return lambda f: f
def is_valid_email(email): return '@' in email
def sanitize_string(s): return str(s).strip()
def create_success_response(msg, code=200, data=None): return jsonify({'success': True, 'message': msg, 'data': data}), code
def create_error_response(msg, code=400, details=None): return jsonify({'error': msg, 'details': details}), code
def format_user_data(data): return data
# Import authentication components
try:
from src.data.user_manager import UserManager
from src.data.session_manager import SessionManager
from src.data.api_key_manager import APIKeyManager
except ImportError:
# Fallback for development
class UserManager:
def authenticate_user(self, username, password): return None
def get_user_by_id(self, id): return None
def get_user_by_username(self, username): return None
def get_user_by_email(self, email): return None
def create_user(self, **kwargs): return 1
def update_user(self, id, **kwargs): return True
def delete_user(self, id): return True
def change_password(self, id, new_password): return True
def reset_password(self, email): return 'reset_token'
def verify_reset_token(self, token): return None
def get_user_sessions(self, user_id): return []
def get_user_activity(self, user_id): return []
class SessionManager:
def create_session(self, user_id): return 'session_token'
def validate_session(self, token): return None
def destroy_session(self, token): return True
def destroy_all_sessions(self, user_id): return True
def get_session_info(self, token): return None
def update_session_activity(self, token): return True
class APIKeyManager:
def create_api_key(self, user_id, name): return {'id': 1, 'key': 'api_key', 'name': name}
def get_user_api_keys(self, user_id): return []
def revoke_api_key(self, key_id): return True
def validate_api_key(self, key): return None
# Create blueprint
auth_bp = Blueprint('auth', __name__)
# Initialize managers
user_manager = UserManager()
session_manager = SessionManager()
api_key_manager = APIKeyManager()
logger = logging.getLogger(__name__)
@auth_bp.route('/auth/login', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['username', 'password'],
optional_fields=['remember_me'],
field_types={'username': str, 'password': str, 'remember_me': bool}
)
def login() -> Tuple[Any, int]:
"""
Authenticate user and create session.
Request Body:
- username: Username or email
- password: User password
- remember_me: Extend session duration (optional)
Returns:
JSON response with authentication result
"""
data = request.get_json()
username = sanitize_string(data['username'])
password = data['password']
remember_me = data.get('remember_me', False)
try:
# Authenticate user
user = user_manager.authenticate_user(username, password)
if not user:
logger.warning(f"Failed login attempt for username: {username}")
return create_error_response("Invalid username or password", 401)
# Create session
session_token = session_manager.create_session(
user['id'],
extended=remember_me
)
# Set session data
session['user_id'] = user['id']
session['username'] = user['username']
session['session_token'] = session_token
session.permanent = remember_me
# Format user data (exclude sensitive information)
user_data = format_user_data(user, include_sensitive=False)
response_data = {
'user': user_data,
'session_token': session_token,
'expires_at': (datetime.now() + timedelta(days=30 if remember_me else 7)).isoformat()
}
logger.info(f"User {user['username']} (ID: {user['id']}) logged in successfully")
return create_success_response("Login successful", 200, response_data)
except Exception as e:
logger.error(f"Error during login for username {username}: {str(e)}")
return create_error_response("Login failed", 500)
@auth_bp.route('/auth/logout', methods=['POST'])
@require_auth
@handle_api_errors
def logout() -> Tuple[Any, int]:
"""
Logout user and destroy session.
Returns:
JSON response with logout result
"""
try:
# Get session token
session_token = session.get('session_token')
user_id = session.get('user_id')
if session_token:
# Destroy session in database
session_manager.destroy_session(session_token)
# Clear Flask session
session.clear()
logger.info(f"User ID {user_id} logged out successfully")
return create_success_response("Logout successful")
except Exception as e:
logger.error(f"Error during logout: {str(e)}")
return create_error_response("Logout failed", 500)
@auth_bp.route('/auth/register', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['username', 'email', 'password'],
optional_fields=['full_name'],
field_types={'username': str, 'email': str, 'password': str, 'full_name': str}
)
def register() -> Tuple[Any, int]:
"""
Register new user account.
Request Body:
- username: Unique username
- email: User email address
- password: User password
- full_name: User's full name (optional)
Returns:
JSON response with registration result
"""
data = request.get_json()
username = sanitize_string(data['username'])
email = sanitize_string(data['email'])
password = data['password']
full_name = sanitize_string(data.get('full_name', ''))
# Validate input
if len(username) < 3:
return create_error_response("Username must be at least 3 characters long", 400)
if len(password) < 8:
return create_error_response("Password must be at least 8 characters long", 400)
if not is_valid_email(email):
return create_error_response("Invalid email address", 400)
try:
# Check if username already exists
existing_user = user_manager.get_user_by_username(username)
if existing_user:
return create_error_response("Username already exists", 409)
# Check if email already exists
existing_email = user_manager.get_user_by_email(email)
if existing_email:
return create_error_response("Email already registered", 409)
# Create user
user_id = user_manager.create_user(
username=username,
email=email,
password=password,
full_name=full_name
)
# Get created user
user = user_manager.get_user_by_id(user_id)
user_data = format_user_data(user, include_sensitive=False)
logger.info(f"New user registered: {username} (ID: {user_id})")
return create_success_response("Registration successful", 201, user_data)
except Exception as e:
logger.error(f"Error during registration for username {username}: {str(e)}")
return create_error_response("Registration failed", 500)
@auth_bp.route('/auth/me', methods=['GET'])
@require_auth
@handle_api_errors
def get_current_user() -> Tuple[Any, int]:
"""
Get current user information.
Returns:
JSON response with current user data
"""
try:
user_id = session.get('user_id')
user = user_manager.get_user_by_id(user_id)
if not user:
return create_error_response("User not found", 404)
user_data = format_user_data(user, include_sensitive=False)
return create_success_response("User information retrieved", 200, user_data)
except Exception as e:
logger.error(f"Error getting current user: {str(e)}")
return create_error_response("Failed to get user information", 500)
@auth_bp.route('/auth/me', methods=['PUT'])
@require_auth
@handle_api_errors
@validate_json_input(
optional_fields=['email', 'full_name'],
field_types={'email': str, 'full_name': str}
)
def update_current_user() -> Tuple[Any, int]:
"""
Update current user information.
Request Body:
- email: New email address (optional)
- full_name: New full name (optional)
Returns:
JSON response with update result
"""
data = request.get_json()
user_id = session.get('user_id')
# Validate email if provided
if 'email' in data and not is_valid_email(data['email']):
return create_error_response("Invalid email address", 400)
try:
# Check if email is already taken by another user
if 'email' in data:
existing_user = user_manager.get_user_by_email(data['email'])
if existing_user and existing_user['id'] != user_id:
return create_error_response("Email already registered", 409)
# Update user
success = user_manager.update_user(user_id, **data)
if success:
# Get updated user
user = user_manager.get_user_by_id(user_id)
user_data = format_user_data(user, include_sensitive=False)
logger.info(f"User {user_id} updated their profile")
return create_success_response("Profile updated successfully", 200, user_data)
else:
return create_error_response("Failed to update profile", 500)
except Exception as e:
logger.error(f"Error updating user {user_id}: {str(e)}")
return create_error_response("Failed to update profile", 500)
@auth_bp.route('/auth/change-password', methods=['PUT'])
@require_auth
@handle_api_errors
@validate_json_input(
required_fields=['current_password', 'new_password'],
field_types={'current_password': str, 'new_password': str}
)
def change_password() -> Tuple[Any, int]:
"""
Change user password.
Request Body:
- current_password: Current password
- new_password: New password
Returns:
JSON response with change result
"""
data = request.get_json()
user_id = session.get('user_id')
current_password = data['current_password']
new_password = data['new_password']
# Validate new password
if len(new_password) < 8:
return create_error_response("New password must be at least 8 characters long", 400)
try:
# Get user
user = user_manager.get_user_by_id(user_id)
# Verify current password
authenticated_user = user_manager.authenticate_user(user['username'], current_password)
if not authenticated_user:
return create_error_response("Current password is incorrect", 401)
# Change password
success = user_manager.change_password(user_id, new_password)
if success:
logger.info(f"User {user_id} changed their password")
return create_success_response("Password changed successfully")
else:
return create_error_response("Failed to change password", 500)
except Exception as e:
logger.error(f"Error changing password for user {user_id}: {str(e)}")
return create_error_response("Failed to change password", 500)
@auth_bp.route('/auth/forgot-password', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['email'],
field_types={'email': str}
)
def forgot_password() -> Tuple[Any, int]:
"""
Request password reset.
Request Body:
- email: User email address
Returns:
JSON response with reset result
"""
data = request.get_json()
email = sanitize_string(data['email'])
if not is_valid_email(email):
return create_error_response("Invalid email address", 400)
try:
# Check if user exists
user = user_manager.get_user_by_email(email)
if user:
# Generate reset token
reset_token = user_manager.reset_password(email)
# In a real application, you would send this token via email
logger.info(f"Password reset requested for user {user['id']} (email: {email})")
# For security, always return success even if email doesn't exist
return create_success_response("If the email exists, a reset link has been sent")
else:
# For security, don't reveal that email doesn't exist
logger.warning(f"Password reset requested for non-existent email: {email}")
return create_success_response("If the email exists, a reset link has been sent")
except Exception as e:
logger.error(f"Error processing password reset for email {email}: {str(e)}")
return create_error_response("Failed to process password reset", 500)
@auth_bp.route('/auth/reset-password', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['token', 'new_password'],
field_types={'token': str, 'new_password': str}
)
def reset_password() -> Tuple[Any, int]:
"""
Reset password using token.
Request Body:
- token: Password reset token
- new_password: New password
Returns:
JSON response with reset result
"""
data = request.get_json()
token = data['token']
new_password = data['new_password']
# Validate new password
if len(new_password) < 8:
return create_error_response("New password must be at least 8 characters long", 400)
try:
# Verify reset token
user = user_manager.verify_reset_token(token)
if not user:
return create_error_response("Invalid or expired reset token", 400)
# Change password
success = user_manager.change_password(user['id'], new_password)
if success:
logger.info(f"Password reset completed for user {user['id']}")
return create_success_response("Password reset successfully")
else:
return create_error_response("Failed to reset password", 500)
except Exception as e:
logger.error(f"Error resetting password with token: {str(e)}")
return create_error_response("Failed to reset password", 500)
@auth_bp.route('/auth/sessions', methods=['GET'])
@require_auth
@handle_api_errors
def get_user_sessions() -> Tuple[Any, int]:
"""
Get user's active sessions.
Returns:
JSON response with user sessions
"""
try:
user_id = session.get('user_id')
sessions = user_manager.get_user_sessions(user_id)
return create_success_response("Sessions retrieved successfully", 200, sessions)
except Exception as e:
logger.error(f"Error getting user sessions: {str(e)}")
return create_error_response("Failed to get sessions", 500)
@auth_bp.route('/auth/sessions', methods=['DELETE'])
@require_auth
@handle_api_errors
def destroy_all_sessions() -> Tuple[Any, int]:
"""
Destroy all user sessions except current one.
Returns:
JSON response with operation result
"""
try:
user_id = session.get('user_id')
current_token = session.get('session_token')
# Destroy all sessions except current
success = session_manager.destroy_all_sessions(user_id, except_token=current_token)
if success:
logger.info(f"All sessions destroyed for user {user_id}")
return create_success_response("All other sessions destroyed successfully")
else:
return create_error_response("Failed to destroy sessions", 500)
except Exception as e:
logger.error(f"Error destroying sessions: {str(e)}")
return create_error_response("Failed to destroy sessions", 500)
@auth_bp.route('/auth/api-keys', methods=['GET'])
@require_auth
@handle_api_errors
def get_api_keys() -> Tuple[Any, int]:
"""
Get user's API keys.
Returns:
JSON response with API keys
"""
try:
user_id = session.get('user_id')
api_keys = api_key_manager.get_user_api_keys(user_id)
return create_success_response("API keys retrieved successfully", 200, api_keys)
except Exception as e:
logger.error(f"Error getting API keys: {str(e)}")
return create_error_response("Failed to get API keys", 500)
@auth_bp.route('/auth/api-keys', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
required_fields=['name'],
optional_fields=['description'],
field_types={'name': str, 'description': str}
)
def create_api_key() -> Tuple[Any, int]:
"""
Create new API key.
Request Body:
- name: API key name
- description: API key description (optional)
Returns:
JSON response with created API key
"""
data = request.get_json()
user_id = session.get('user_id')
name = sanitize_string(data['name'])
description = sanitize_string(data.get('description', ''))
try:
# Create API key
api_key = api_key_manager.create_api_key(
user_id=user_id,
name=name,
description=description
)
logger.info(f"API key created for user {user_id}: {name}")
return create_success_response("API key created successfully", 201, api_key)
except Exception as e:
logger.error(f"Error creating API key for user {user_id}: {str(e)}")
return create_error_response("Failed to create API key", 500)
@auth_bp.route('/auth/api-keys/<int:key_id>', methods=['DELETE'])
@require_auth
@handle_api_errors
def revoke_api_key(key_id: int) -> Tuple[Any, int]:
"""
Revoke API key.
Args:
key_id: API key ID
Returns:
JSON response with revocation result
"""
try:
user_id = session.get('user_id')
# Verify key belongs to user and revoke
success = api_key_manager.revoke_api_key(key_id, user_id)
if success:
logger.info(f"API key {key_id} revoked by user {user_id}")
return create_success_response("API key revoked successfully")
else:
return create_error_response("API key not found or access denied", 404)
except Exception as e:
logger.error(f"Error revoking API key {key_id}: {str(e)}")
return create_error_response("Failed to revoke API key", 500)
@auth_bp.route('/auth/password-reset', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['email'],
field_types={'email': str}
)
def request_password_reset() -> Tuple[Any, int]:
"""
Request password reset for user email.
Request Body:
- email: User email address
Returns:
JSON response with password reset request result
"""
data = request.get_json()
email = sanitize_string(data['email'])
try:
# Validate email format
if not is_valid_email(email):
return create_error_response("Invalid email format", 400)
# Check if user exists
user = user_manager.get_user_by_email(email)
if not user:
# Don't reveal if email exists or not for security
logger.warning(f"Password reset requested for non-existent email: {email}")
return create_success_response("If the email exists, a password reset link has been sent")
# Generate reset token
reset_token = user_manager.create_password_reset_token(user['id'])
# In a real implementation, you would send an email here
# For now, we'll just log it and return success
logger.info(f"Password reset token generated for user {user['id']}: {reset_token}")
return create_success_response("If the email exists, a password reset link has been sent")
except Exception as e:
logger.error(f"Error during password reset request for {email}: {str(e)}")
return create_error_response("Failed to process password reset request", 500)
@auth_bp.route('/auth/password-reset/confirm', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['token', 'new_password'],
field_types={'token': str, 'new_password': str}
)
def confirm_password_reset() -> Tuple[Any, int]:
"""
Confirm password reset with token.
Request Body:
- token: Password reset token
- new_password: New password
Returns:
JSON response with password reset confirmation result
"""
data = request.get_json()
token = data['token']
new_password = data['new_password']
try:
# Validate password strength
if len(new_password) < 8:
return create_error_response("Password must be at least 8 characters long", 400)
# Verify reset token
user_id = user_manager.verify_reset_token(token)
if not user_id:
return create_error_response("Invalid or expired reset token", 400)
# Update password
success = user_manager.change_password(user_id, new_password)
if not success:
return create_error_response("Failed to update password", 500)
# Invalidate all existing sessions for security
session_manager.destroy_all_sessions(user_id)
logger.info(f"Password reset completed for user ID {user_id}")
return create_success_response("Password has been successfully reset")
except Exception as e:
logger.error(f"Error during password reset confirmation: {str(e)}")
return create_error_response("Failed to reset password", 500)
@auth_bp.route('/auth/refresh', methods=['POST'])
@handle_api_errors
def refresh_token() -> Tuple[Any, int]:
"""
Refresh authentication token.
Returns:
JSON response with new token
"""
try:
# Get current session token
session_token = session.get('session_token')
if not session_token:
return create_error_response("No active session found", 401)
# Validate current session
session_info = session_manager.get_session_info(session_token)
if not session_info or session_info.get('expired', True):
session.clear()
return create_error_response("Session expired", 401)
# Create new session token
user_id = session_info['user_id']
new_session_token = session_manager.create_session(user_id)
# Destroy old session
session_manager.destroy_session(session_token)
# Update session data
session['session_token'] = new_session_token
session_manager.update_session_activity(new_session_token)
# Get user data
user = user_manager.get_user_by_id(user_id)
user_data = format_user_data(user, include_sensitive=False)
response_data = {
'user': user_data,
'session_token': new_session_token,
'expires_at': (datetime.now() + timedelta(days=7)).isoformat()
}
logger.info(f"Token refreshed for user ID {user_id}")
return create_success_response("Token refreshed successfully", 200, response_data)
except Exception as e:
logger.error(f"Error during token refresh: {str(e)}")
return create_error_response("Failed to refresh token", 500)
@auth_bp.route('/auth/activity', methods=['GET'])
@require_auth
@handle_api_errors
@validate_query_params(
allowed_params=['limit', 'offset'],
param_types={'limit': int, 'offset': int}
)
def get_user_activity() -> Tuple[Any, int]:
"""
Get user activity log.
Query Parameters:
- limit: Number of activities to return (default: 50, max: 200)
- offset: Number of activities to skip (default: 0)
Returns:
JSON response with user activity
"""
limit = min(request.args.get('limit', 50, type=int), 200)
offset = request.args.get('offset', 0, type=int)
try:
user_id = session.get('user_id')
activity = user_manager.get_user_activity(user_id, limit=limit, offset=offset)
return create_success_response("User activity retrieved successfully", 200, activity)
except Exception as e:
logger.error(f"Error getting user activity: {str(e)}")
return create_error_response("Failed to get user activity", 500)

View File

@ -1,649 +0,0 @@
"""
Backup Management API Endpoints
This module provides REST API endpoints for database backup operations,
including backup creation, restoration, and cleanup functionality.
"""
from flask import Blueprint, request, send_file
from typing import Dict, List, Any, Optional
import os
from datetime import datetime
from ...shared.auth_decorators import require_auth, optional_auth
from ...shared.error_handlers import handle_api_errors, APIException, NotFoundError, ValidationError
from ...shared.validators import validate_json_input, validate_id_parameter, validate_pagination_params
from ...shared.response_helpers import (
create_success_response, create_paginated_response, extract_pagination_params
)
# Import backup components (these imports would need to be adjusted based on actual structure)
try:
from database_manager import backup_manager, BackupInfo
except ImportError:
# Fallback for development/testing
backup_manager = None
BackupInfo = None
# Blueprint for backup management endpoints
backups_bp = Blueprint('backups', __name__, url_prefix='/api/v1/backups')
@backups_bp.route('', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def list_backups() -> Dict[str, Any]:
"""
List all available backups with optional filtering.
Query Parameters:
- backup_type: Filter by backup type (full, metadata_only, incremental)
- date_from: Filter from date (ISO format)
- date_to: Filter to date (ISO format)
- min_size_mb: Minimum backup size in MB
- max_size_mb: Maximum backup size in MB
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated list of backups
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
# Extract filters
backup_type_filter = request.args.get('backup_type')
date_from = request.args.get('date_from')
date_to = request.args.get('date_to')
min_size_mb = request.args.get('min_size_mb')
max_size_mb = request.args.get('max_size_mb')
# Validate filters
valid_types = ['full', 'metadata_only', 'incremental']
if backup_type_filter and backup_type_filter not in valid_types:
raise ValidationError(f"backup_type must be one of: {', '.join(valid_types)}")
# Validate dates
if date_from:
try:
datetime.fromisoformat(date_from.replace('Z', '+00:00'))
except ValueError:
raise ValidationError("date_from must be in ISO format")
if date_to:
try:
datetime.fromisoformat(date_to.replace('Z', '+00:00'))
except ValueError:
raise ValidationError("date_to must be in ISO format")
# Validate size filters
if min_size_mb:
try:
min_size_mb = float(min_size_mb)
if min_size_mb < 0:
raise ValueError()
except ValueError:
raise ValidationError("min_size_mb must be a non-negative number")
if max_size_mb:
try:
max_size_mb = float(max_size_mb)
if max_size_mb < 0:
raise ValueError()
except ValueError:
raise ValidationError("max_size_mb must be a non-negative number")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Get backups with filters
backups = backup_manager.list_backups(
backup_type=backup_type_filter,
date_from=date_from,
date_to=date_to,
min_size_bytes=int(min_size_mb * 1024 * 1024) if min_size_mb else None,
max_size_bytes=int(max_size_mb * 1024 * 1024) if max_size_mb else None
)
# Format backup data
backup_data = []
for backup in backups:
backup_data.append({
'backup_id': backup.backup_id,
'backup_type': backup.backup_type,
'created_at': backup.created_at.isoformat(),
'size_mb': round(backup.size_bytes / (1024 * 1024), 2),
'size_bytes': backup.size_bytes,
'description': backup.description,
'tables_included': backup.tables_included,
'backup_path': backup.backup_path,
'is_compressed': backup.is_compressed,
'checksum': backup.checksum,
'status': backup.status
})
# Apply pagination
total = len(backup_data)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_backups = backup_data[start_idx:end_idx]
return create_paginated_response(
data=paginated_backups,
page=page,
per_page=per_page,
total=total,
endpoint='backups.list_backups'
)
@backups_bp.route('/<backup_id>', methods=['GET'])
@handle_api_errors
@validate_id_parameter('backup_id')
@optional_auth
def get_backup(backup_id: str) -> Dict[str, Any]:
"""
Get detailed information about a specific backup.
Args:
backup_id: Unique identifier for the backup
Returns:
Detailed backup information
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
backup = backup_manager.get_backup_by_id(backup_id)
if not backup:
raise NotFoundError("Backup not found")
# Get additional details
backup_details = {
'backup_id': backup.backup_id,
'backup_type': backup.backup_type,
'created_at': backup.created_at.isoformat(),
'size_mb': round(backup.size_bytes / (1024 * 1024), 2),
'size_bytes': backup.size_bytes,
'description': backup.description,
'tables_included': backup.tables_included,
'backup_path': backup.backup_path,
'is_compressed': backup.is_compressed,
'checksum': backup.checksum,
'status': backup.status,
'creation_duration_seconds': backup.creation_duration_seconds,
'file_exists': os.path.exists(backup.backup_path),
'validation_status': backup_manager.validate_backup(backup_id)
}
return create_success_response(backup_details)
@backups_bp.route('', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['backup_type'],
optional_fields=['description', 'tables', 'compress', 'encryption_key'],
field_types={
'backup_type': str,
'description': str,
'tables': list,
'compress': bool,
'encryption_key': str
}
)
@require_auth
def create_backup() -> Dict[str, Any]:
"""
Create a new database backup.
Required Fields:
- backup_type: Type of backup (full, metadata_only, incremental)
Optional Fields:
- description: Backup description
- tables: Specific tables to backup (for selective backups)
- compress: Whether to compress the backup (default: true)
- encryption_key: Key for backup encryption
Returns:
Created backup information
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
data = request.get_json()
backup_type = data['backup_type']
# Validate backup type
valid_types = ['full', 'metadata_only', 'incremental']
if backup_type not in valid_types:
raise ValidationError(f"backup_type must be one of: {', '.join(valid_types)}")
description = data.get('description')
tables = data.get('tables')
compress = data.get('compress', True)
encryption_key = data.get('encryption_key')
# Validate tables if provided
if tables:
if not isinstance(tables, list) or not all(isinstance(t, str) for t in tables):
raise ValidationError("tables must be a list of table names")
# Validate table names exist
valid_tables = backup_manager.get_available_tables()
invalid_tables = [t for t in tables if t not in valid_tables]
if invalid_tables:
raise ValidationError(f"Invalid tables: {', '.join(invalid_tables)}")
try:
# Create backup based on type
if backup_type == 'full':
backup_info = backup_manager.create_full_backup(
description=description,
compress=compress,
encryption_key=encryption_key
)
elif backup_type == 'metadata_only':
backup_info = backup_manager.create_metadata_backup(
description=description,
compress=compress,
encryption_key=encryption_key
)
elif backup_type == 'incremental':
backup_info = backup_manager.create_incremental_backup(
description=description,
compress=compress,
encryption_key=encryption_key
)
else: # selective backup
backup_info = backup_manager.create_selective_backup(
tables=tables,
description=description,
compress=compress,
encryption_key=encryption_key
)
if not backup_info:
raise APIException("Failed to create backup", 500)
backup_data = {
'backup_id': backup_info.backup_id,
'backup_type': backup_info.backup_type,
'size_mb': round(backup_info.size_bytes / (1024 * 1024), 2),
'created_at': backup_info.created_at.isoformat(),
'description': backup_info.description,
'tables_included': backup_info.tables_included,
'is_compressed': backup_info.is_compressed,
'checksum': backup_info.checksum
}
return create_success_response(
data=backup_data,
message=f"{backup_type.title()} backup created successfully",
status_code=201
)
except Exception as e:
raise APIException(f"Failed to create backup: {str(e)}", 500)
@backups_bp.route('/<backup_id>/restore', methods=['POST'])
@handle_api_errors
@validate_id_parameter('backup_id')
@validate_json_input(
optional_fields=['confirm', 'tables', 'target_database', 'restore_data', 'restore_schema'],
field_types={
'confirm': bool,
'tables': list,
'target_database': str,
'restore_data': bool,
'restore_schema': bool
}
)
@require_auth
def restore_backup(backup_id: str) -> Dict[str, Any]:
"""
Restore from a backup.
Args:
backup_id: Unique identifier for the backup
Optional Fields:
- confirm: Confirmation flag (required for production)
- tables: Specific tables to restore
- target_database: Target database path (for restore to different location)
- restore_data: Whether to restore data (default: true)
- restore_schema: Whether to restore schema (default: true)
Returns:
Restoration results
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
data = request.get_json() or {}
# Check if backup exists
backup = backup_manager.get_backup_by_id(backup_id)
if not backup:
raise NotFoundError("Backup not found")
# Validate backup file exists
if not os.path.exists(backup.backup_path):
raise APIException("Backup file not found", 404)
# Require confirmation for production environments
confirm = data.get('confirm', False)
if not confirm:
# Check if this is a production environment
from config import config
if hasattr(config, 'environment') and config.environment == 'production':
raise ValidationError("Confirmation required for restore operation in production")
tables = data.get('tables')
target_database = data.get('target_database')
restore_data = data.get('restore_data', True)
restore_schema = data.get('restore_schema', True)
# Validate tables if provided
if tables:
if not isinstance(tables, list) or not all(isinstance(t, str) for t in tables):
raise ValidationError("tables must be a list of table names")
try:
# Perform restoration
restore_result = backup_manager.restore_backup(
backup_id=backup_id,
tables=tables,
target_database=target_database,
restore_data=restore_data,
restore_schema=restore_schema
)
if restore_result.success:
return create_success_response(
data={
'backup_id': backup_id,
'restore_time': restore_result.restore_time.isoformat(),
'restored_tables': restore_result.restored_tables,
'restored_records': restore_result.restored_records,
'duration_seconds': restore_result.duration_seconds
},
message="Backup restored successfully"
)
else:
raise APIException(f"Restore failed: {restore_result.error_message}", 500)
except Exception as e:
raise APIException(f"Failed to restore backup: {str(e)}", 500)
@backups_bp.route('/<backup_id>/download', methods=['GET'])
@handle_api_errors
@validate_id_parameter('backup_id')
@require_auth
def download_backup(backup_id: str):
"""
Download a backup file.
Args:
backup_id: Unique identifier for the backup
Returns:
Backup file download
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
# Check if backup exists
backup = backup_manager.get_backup_by_id(backup_id)
if not backup:
raise NotFoundError("Backup not found")
# Check if backup file exists
if not os.path.exists(backup.backup_path):
raise NotFoundError("Backup file not found")
# Generate filename
timestamp = backup.created_at.strftime('%Y%m%d_%H%M%S')
filename = f"backup_{backup.backup_type}_{timestamp}_{backup_id[:8]}.db"
if backup.is_compressed:
filename += ".gz"
try:
return send_file(
backup.backup_path,
as_attachment=True,
download_name=filename,
mimetype='application/octet-stream'
)
except Exception as e:
raise APIException(f"Failed to download backup: {str(e)}", 500)
@backups_bp.route('/<backup_id>/validate', methods=['POST'])
@handle_api_errors
@validate_id_parameter('backup_id')
@optional_auth
def validate_backup(backup_id: str) -> Dict[str, Any]:
"""
Validate a backup file integrity.
Args:
backup_id: Unique identifier for the backup
Returns:
Validation results
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
# Check if backup exists
backup = backup_manager.get_backup_by_id(backup_id)
if not backup:
raise NotFoundError("Backup not found")
try:
validation_result = backup_manager.validate_backup(backup_id)
return create_success_response(
data={
'backup_id': backup_id,
'is_valid': validation_result.is_valid,
'file_exists': validation_result.file_exists,
'checksum_valid': validation_result.checksum_valid,
'database_readable': validation_result.database_readable,
'tables_count': validation_result.tables_count,
'records_count': validation_result.records_count,
'validation_errors': validation_result.errors,
'validated_at': datetime.utcnow().isoformat()
}
)
except Exception as e:
raise APIException(f"Failed to validate backup: {str(e)}", 500)
@backups_bp.route('/<backup_id>', methods=['DELETE'])
@handle_api_errors
@validate_id_parameter('backup_id')
@require_auth
def delete_backup(backup_id: str) -> Dict[str, Any]:
"""
Delete a backup.
Args:
backup_id: Unique identifier for the backup
Query Parameters:
- delete_file: Set to 'true' to also delete the backup file
Returns:
Deletion confirmation
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
# Check if backup exists
backup = backup_manager.get_backup_by_id(backup_id)
if not backup:
raise NotFoundError("Backup not found")
delete_file = request.args.get('delete_file', 'true').lower() == 'true'
try:
success = backup_manager.delete_backup(backup_id, delete_file=delete_file)
if success:
message = f"Backup {backup_id} deleted successfully"
if delete_file:
message += " (including file)"
return create_success_response(message=message)
else:
raise APIException("Failed to delete backup", 500)
except Exception as e:
raise APIException(f"Failed to delete backup: {str(e)}", 500)
@backups_bp.route('/cleanup', methods=['POST'])
@handle_api_errors
@validate_json_input(
optional_fields=['keep_days', 'keep_count', 'backup_types', 'dry_run'],
field_types={
'keep_days': int,
'keep_count': int,
'backup_types': list,
'dry_run': bool
}
)
@require_auth
def cleanup_backups() -> Dict[str, Any]:
"""
Clean up old backup files based on retention policy.
Optional Fields:
- keep_days: Keep backups newer than this many days (default: 30)
- keep_count: Keep at least this many backups (default: 10)
- backup_types: Types of backups to clean up (default: all)
- dry_run: Preview what would be deleted without actually deleting
Returns:
Cleanup results
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
data = request.get_json() or {}
keep_days = data.get('keep_days', 30)
keep_count = data.get('keep_count', 10)
backup_types = data.get('backup_types', ['full', 'metadata_only', 'incremental'])
dry_run = data.get('dry_run', False)
# Validate parameters
if keep_days < 1:
raise ValidationError("keep_days must be at least 1")
if keep_count < 1:
raise ValidationError("keep_count must be at least 1")
valid_types = ['full', 'metadata_only', 'incremental']
if not all(bt in valid_types for bt in backup_types):
raise ValidationError(f"backup_types must contain only: {', '.join(valid_types)}")
try:
cleanup_result = backup_manager.cleanup_old_backups(
keep_days=keep_days,
keep_count=keep_count,
backup_types=backup_types,
dry_run=dry_run
)
return create_success_response(
data={
'dry_run': dry_run,
'deleted_count': cleanup_result.deleted_count,
'deleted_backups': cleanup_result.deleted_backups,
'space_freed_mb': round(cleanup_result.space_freed_bytes / (1024 * 1024), 2),
'kept_count': cleanup_result.kept_count,
'retention_policy': {
'keep_days': keep_days,
'keep_count': keep_count,
'backup_types': backup_types
}
},
message=f"Backup cleanup {'simulated' if dry_run else 'completed'}"
)
except Exception as e:
raise APIException(f"Failed to cleanup backups: {str(e)}", 500)
@backups_bp.route('/schedule', methods=['GET'])
@handle_api_errors
@optional_auth
def get_backup_schedule() -> Dict[str, Any]:
"""
Get current backup schedule configuration.
Returns:
Backup schedule information
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
try:
schedule_config = backup_manager.get_backup_schedule()
return create_success_response(data=schedule_config)
except Exception as e:
raise APIException(f"Failed to get backup schedule: {str(e)}", 500)
@backups_bp.route('/schedule', methods=['PUT'])
@handle_api_errors
@validate_json_input(
optional_fields=['enabled', 'full_backup_interval', 'incremental_interval', 'retention_days', 'cleanup_enabled'],
field_types={
'enabled': bool,
'full_backup_interval': str,
'incremental_interval': str,
'retention_days': int,
'cleanup_enabled': bool
}
)
@require_auth
def update_backup_schedule() -> Dict[str, Any]:
"""
Update backup schedule configuration.
Optional Fields:
- enabled: Enable/disable automatic backups
- full_backup_interval: Cron expression for full backups
- incremental_interval: Cron expression for incremental backups
- retention_days: Number of days to keep backups
- cleanup_enabled: Enable/disable automatic cleanup
Returns:
Updated schedule configuration
"""
if not backup_manager:
raise APIException("Backup manager not available", 503)
data = request.get_json()
try:
updated_config = backup_manager.update_backup_schedule(data)
return create_success_response(
data=updated_config,
message="Backup schedule updated successfully"
)
except Exception as e:
raise APIException(f"Failed to update backup schedule: {str(e)}", 500)

View File

@ -1,341 +0,0 @@
"""
Bulk Operations API endpoints
Provides REST API for bulk series management operations.
"""
from flask import Blueprint, request, jsonify, send_file
import asyncio
import threading
from typing import Dict, Any
import uuid
import io
from bulk_operations import bulk_operations_manager
bulk_api_bp = Blueprint('bulk_api', __name__, url_prefix='/api/bulk')
# Store active operations
active_operations = {}
@bulk_api_bp.route('/download', methods=['POST'])
def bulk_download():
"""Start bulk download operation."""
try:
data = request.get_json()
operation_id = data.get('operation_id')
series_ids = data.get('series_ids', [])
if not series_ids:
return jsonify({'success': False, 'error': 'No series IDs provided'}), 400
# Create task ID
task_id = str(uuid.uuid4())
# Store operation info
active_operations[task_id] = {
'id': operation_id,
'type': 'download',
'status': 'running',
'progress': {
'completed': 0,
'total': len(series_ids),
'message': 'Starting download...'
}
}
# Start async operation
def run_bulk_download():
loop = asyncio.new_event_loop()
asyncio.set_event_loop(loop)
try:
result = loop.run_until_complete(
bulk_operations_manager.bulk_download(series_ids, operation_id)
)
active_operations[task_id]['status'] = 'completed'
active_operations[task_id]['result'] = result
except Exception as e:
active_operations[task_id]['status'] = 'failed'
active_operations[task_id]['error'] = str(e)
finally:
loop.close()
thread = threading.Thread(target=run_bulk_download)
thread.start()
return jsonify({'success': True, 'task_id': task_id})
except Exception as e:
return jsonify({'success': False, 'error': str(e)}), 500
@bulk_api_bp.route('/update', methods=['POST'])
def bulk_update():
"""Start bulk update operation."""
try:
data = request.get_json()
operation_id = data.get('operation_id')
series_ids = data.get('series_ids', [])
if not series_ids:
return jsonify({'success': False, 'error': 'No series IDs provided'}), 400
task_id = str(uuid.uuid4())
active_operations[task_id] = {
'id': operation_id,
'type': 'update',
'status': 'running',
'progress': {
'completed': 0,
'total': len(series_ids),
'message': 'Starting update...'
}
}
def run_bulk_update():
loop = asyncio.new_event_loop()
asyncio.set_event_loop(loop)
try:
result = loop.run_until_complete(
bulk_operations_manager.bulk_update(series_ids, operation_id)
)
active_operations[task_id]['status'] = 'completed'
active_operations[task_id]['result'] = result
except Exception as e:
active_operations[task_id]['status'] = 'failed'
active_operations[task_id]['error'] = str(e)
finally:
loop.close()
thread = threading.Thread(target=run_bulk_update)
thread.start()
return jsonify({'success': True, 'task_id': task_id})
except Exception as e:
return jsonify({'success': False, 'error': str(e)}), 500
@bulk_api_bp.route('/organize', methods=['POST'])
def bulk_organize():
"""Start bulk organize operation."""
try:
data = request.get_json()
operation_id = data.get('operation_id')
series_ids = data.get('series_ids', [])
options = data.get('options', {})
if not series_ids:
return jsonify({'success': False, 'error': 'No series IDs provided'}), 400
task_id = str(uuid.uuid4())
active_operations[task_id] = {
'id': operation_id,
'type': 'organize',
'status': 'running',
'progress': {
'completed': 0,
'total': len(series_ids),
'message': 'Starting organization...'
}
}
def run_bulk_organize():
loop = asyncio.new_event_loop()
asyncio.set_event_loop(loop)
try:
result = loop.run_until_complete(
bulk_operations_manager.bulk_organize(series_ids, options, operation_id)
)
active_operations[task_id]['status'] = 'completed'
active_operations[task_id]['result'] = result
except Exception as e:
active_operations[task_id]['status'] = 'failed'
active_operations[task_id]['error'] = str(e)
finally:
loop.close()
thread = threading.Thread(target=run_bulk_organize)
thread.start()
return jsonify({'success': True, 'task_id': task_id})
except Exception as e:
return jsonify({'success': False, 'error': str(e)}), 500
@bulk_api_bp.route('/delete', methods=['DELETE'])
def bulk_delete():
"""Start bulk delete operation."""
try:
data = request.get_json()
operation_id = data.get('operation_id')
series_ids = data.get('series_ids', [])
if not series_ids:
return jsonify({'success': False, 'error': 'No series IDs provided'}), 400
task_id = str(uuid.uuid4())
active_operations[task_id] = {
'id': operation_id,
'type': 'delete',
'status': 'running',
'progress': {
'completed': 0,
'total': len(series_ids),
'message': 'Starting deletion...'
}
}
def run_bulk_delete():
loop = asyncio.new_event_loop()
asyncio.set_event_loop(loop)
try:
result = loop.run_until_complete(
bulk_operations_manager.bulk_delete(series_ids, operation_id)
)
active_operations[task_id]['status'] = 'completed'
active_operations[task_id]['result'] = result
except Exception as e:
active_operations[task_id]['status'] = 'failed'
active_operations[task_id]['error'] = str(e)
finally:
loop.close()
thread = threading.Thread(target=run_bulk_delete)
thread.start()
return jsonify({'success': True, 'task_id': task_id})
except Exception as e:
return jsonify({'success': False, 'error': str(e)}), 500
@bulk_api_bp.route('/export', methods=['POST'])
def bulk_export():
"""Export series data."""
try:
data = request.get_json()
series_ids = data.get('series_ids', [])
format_type = data.get('format', 'json')
if not series_ids:
return jsonify({'success': False, 'error': 'No series IDs provided'}), 400
# Generate export data
loop = asyncio.new_event_loop()
asyncio.set_event_loop(loop)
try:
export_data = loop.run_until_complete(
bulk_operations_manager.export_series_data(series_ids, format_type)
)
finally:
loop.close()
# Determine content type and filename
content_types = {
'json': 'application/json',
'csv': 'text/csv',
'xml': 'application/xml'
}
content_type = content_types.get(format_type, 'application/octet-stream')
filename = f'series_export_{len(series_ids)}_items.{format_type}'
return send_file(
io.BytesIO(export_data),
mimetype=content_type,
as_attachment=True,
download_name=filename
)
except Exception as e:
return jsonify({'success': False, 'error': str(e)}), 500
@bulk_api_bp.route('/status/<task_id>', methods=['GET'])
def get_operation_status(task_id):
"""Get operation status and progress."""
try:
if task_id not in active_operations:
return jsonify({'error': 'Task not found'}), 404
operation = active_operations[task_id]
response = {
'complete': operation['status'] in ['completed', 'failed'],
'success': operation['status'] == 'completed',
'status': operation['status']
}
if 'progress' in operation:
response.update(operation['progress'])
if 'error' in operation:
response['error'] = operation['error']
if 'result' in operation:
response['result'] = operation['result']
return jsonify(response)
except Exception as e:
return jsonify({'error': str(e)}), 500
@bulk_api_bp.route('/cancel/<task_id>', methods=['POST'])
def cancel_operation(task_id):
"""Cancel a running operation."""
try:
if task_id not in active_operations:
return jsonify({'error': 'Task not found'}), 404
# Mark operation as cancelled
active_operations[task_id]['status'] = 'cancelled'
return jsonify({'success': True, 'message': 'Operation cancelled'})
except Exception as e:
return jsonify({'error': str(e)}), 500
@bulk_api_bp.route('/history', methods=['GET'])
def get_operation_history():
"""Get history of bulk operations."""
try:
# Return completed/failed operations
history = []
for task_id, operation in active_operations.items():
if operation['status'] in ['completed', 'failed', 'cancelled']:
history.append({
'task_id': task_id,
'operation_id': operation['id'],
'type': operation['type'],
'status': operation['status'],
'progress': operation.get('progress', {}),
'error': operation.get('error'),
'result': operation.get('result')
})
# Sort by most recent first
history.sort(key=lambda x: x.get('progress', {}).get('completed', 0), reverse=True)
return jsonify({'history': history})
except Exception as e:
return jsonify({'error': str(e)}), 500
@bulk_api_bp.route('/cleanup', methods=['POST'])
def cleanup_completed_operations():
"""Clean up completed/failed operations."""
try:
to_remove = []
for task_id, operation in active_operations.items():
if operation['status'] in ['completed', 'failed', 'cancelled']:
to_remove.append(task_id)
for task_id in to_remove:
del active_operations[task_id]
return jsonify({
'success': True,
'cleaned_up': len(to_remove),
'message': f'Cleaned up {len(to_remove)} completed operations'
})
except Exception as e:
return jsonify({'error': str(e)}), 500

View File

@ -1,454 +0,0 @@
"""
API endpoints for configuration management.
Provides comprehensive configuration management with validation, backup, and restore functionality.
"""
import json
import logging
import os
from datetime import datetime
from typing import Any, Dict, Optional
from fastapi import APIRouter, Depends, File, Form, HTTPException, UploadFile, status
from fastapi.responses import FileResponse
from pydantic import BaseModel
# Import SeriesApp for business logic
from src.core.SeriesApp import SeriesApp
# FastAPI dependencies and models
from src.server.fastapi_app import get_current_user, settings
logger = logging.getLogger(__name__)
# Create FastAPI router for config management endpoints
router = APIRouter(prefix='/api/v1/config', tags=['config'])
# Pydantic models for requests and responses
class ConfigResponse(BaseModel):
"""Response model for configuration data."""
success: bool = True
config: Dict[str, Any]
schema: Optional[Dict[str, Any]] = None
class ConfigUpdateRequest(BaseModel):
"""Request model for configuration updates."""
config: Dict[str, Any]
validate: bool = True
class ConfigImportResponse(BaseModel):
"""Response model for configuration import operations."""
success: bool
message: str
imported_keys: Optional[list] = None
skipped_keys: Optional[list] = None
# Dependency to get SeriesApp instance
def get_series_app() -> SeriesApp:
"""Get SeriesApp instance for business logic operations."""
if not settings.anime_directory:
raise HTTPException(
status_code=status.HTTP_503_SERVICE_UNAVAILABLE,
detail="Anime directory not configured"
)
return SeriesApp(settings.anime_directory)
@router.get('/', response_model=ConfigResponse)
async def get_full_config(
current_user: Optional[Dict] = Depends(get_current_user)
) -> ConfigResponse:
"""Get complete configuration (without sensitive data)."""
try:
# For now, return a basic config structure
# TODO: Replace with actual config management logic
config_data = {
"anime_directory": settings.anime_directory if hasattr(settings, 'anime_directory') else None,
"download_settings": {},
"display_settings": {},
"security_settings": {}
}
schema = {
"anime_directory": {"type": "string", "required": True},
"download_settings": {"type": "object"},
"display_settings": {"type": "object"},
"security_settings": {"type": "object"}
}
return ConfigResponse(
success=True,
config=config_data,
schema=schema
)
except Exception as e:
logger.error(f"Error getting configuration: {e}")
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=str(e)
)
@router.post('/', response_model=ConfigImportResponse)
async def update_config(
config_update: ConfigUpdateRequest,
current_user: Optional[Dict] = Depends(get_current_user)
) -> ConfigImportResponse:
"""Update configuration with validation."""
try:
# For now, just return success
# TODO: Replace with actual config management logic
logger.info("Configuration updated successfully")
return ConfigImportResponse(
success=True,
message="Configuration updated successfully",
imported_keys=list(config_update.config.keys()),
skipped_keys=[]
)
except Exception as e:
logger.error(f"Error updating configuration: {e}")
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=str(e)
)
@config_bp.route('/validate', methods=['POST'])
@require_auth
def validate_config():
"""Validate configuration without saving."""
try:
data = request.get_json() or {}
validation_result = config.validate_config(data)
return jsonify({
'success': True,
'validation': validation_result
})
except Exception as e:
logger.error(f"Error validating configuration: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@config_bp.route('/section/<section_name>', methods=['GET'])
@require_auth
def get_config_section(section_name):
"""Get specific configuration section."""
try:
section_data = config.get(section_name, {})
return jsonify({
'success': True,
'section': section_name,
'config': section_data
})
except Exception as e:
logger.error(f"Error getting config section {section_name}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@config_bp.route('/section/<section_name>', methods=['POST'])
@require_auth
def update_config_section(section_name):
"""Update specific configuration section."""
try:
data = request.get_json() or {}
# Get current config
current_config = config.export_config(include_sensitive=True)
# Update the specific section
current_config[section_name] = data
# Validate and save
result = config.import_config(current_config, validate=True)
if result['success']:
logger.info(f"Configuration section '{section_name}' updated successfully")
return jsonify({
'success': True,
'message': f'Configuration section "{section_name}" updated successfully',
'warnings': result.get('warnings', [])
})
else:
return jsonify({
'success': False,
'error': 'Configuration validation failed',
'errors': result['errors'],
'warnings': result.get('warnings', [])
}), 400
except Exception as e:
logger.error(f"Error updating config section {section_name}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@config_bp.route('/backup', methods=['POST'])
@require_auth
def create_backup():
"""Create configuration backup."""
try:
data = request.get_json() or {}
backup_name = data.get('name', '')
# Generate backup filename
timestamp = datetime.now().strftime("%Y%m%d_%H%M%S")
if backup_name:
# Sanitize backup name
backup_name = secure_filename(backup_name)
filename = f"config_backup_{backup_name}_{timestamp}.json"
else:
filename = f"config_backup_{timestamp}.json"
backup_path = config.backup_config(filename)
logger.info(f"Configuration backup created: {backup_path}")
return jsonify({
'success': True,
'message': 'Backup created successfully',
'backup_path': backup_path,
'filename': filename
})
except Exception as e:
logger.error(f"Error creating backup: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@config_bp.route('/backups', methods=['GET'])
@require_auth
def list_backups():
"""List available configuration backups."""
try:
backups = []
# Scan current directory for backup files
for filename in os.listdir('.'):
if filename.startswith('config_backup_') and filename.endswith('.json'):
file_path = os.path.abspath(filename)
file_size = os.path.getsize(filename)
file_modified = datetime.fromtimestamp(os.path.getmtime(filename))
backups.append({
'filename': filename,
'path': file_path,
'size': file_size,
'size_kb': round(file_size / 1024, 2),
'modified': file_modified.isoformat(),
'modified_display': file_modified.strftime('%Y-%m-%d %H:%M:%S')
})
# Sort by modification date (newest first)
backups.sort(key=lambda x: x['modified'], reverse=True)
return jsonify({
'success': True,
'backups': backups
})
except Exception as e:
logger.error(f"Error listing backups: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@config_bp.route('/backup/<filename>/restore', methods=['POST'])
@require_auth
def restore_backup(filename):
"""Restore configuration from backup."""
try:
# Security: Only allow config backup files
if not filename.startswith('config_backup_') or not filename.endswith('.json'):
return jsonify({
'success': False,
'error': 'Invalid backup file'
}), 400
# Security: Check if file exists
if not os.path.exists(filename):
return jsonify({
'success': False,
'error': 'Backup file not found'
}), 404
success = config.restore_config(filename)
if success:
logger.info(f"Configuration restored from backup: {filename}")
return jsonify({
'success': True,
'message': 'Configuration restored successfully'
})
else:
return jsonify({
'success': False,
'error': 'Failed to restore configuration'
}), 500
except Exception as e:
logger.error(f"Error restoring backup {filename}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@config_bp.route('/backup/<filename>/download', methods=['GET'])
@require_auth
def download_backup(filename):
"""Download configuration backup file."""
try:
# Security: Only allow config backup files
if not filename.startswith('config_backup_') or not filename.endswith('.json'):
return jsonify({
'success': False,
'error': 'Invalid backup file'
}), 400
# Security: Check if file exists
if not os.path.exists(filename):
return jsonify({
'success': False,
'error': 'Backup file not found'
}), 404
return send_file(
filename,
as_attachment=True,
download_name=filename
)
except Exception as e:
logger.error(f"Error downloading backup {filename}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@config_bp.route('/export', methods=['POST'])
@require_auth
def export_config():
"""Export current configuration to JSON."""
try:
data = request.get_json() or {}
include_sensitive = data.get('include_sensitive', False)
config_data = config.export_config(include_sensitive=include_sensitive)
# Create filename with timestamp
timestamp = datetime.now().strftime("%Y%m%d_%H%M%S")
filename = f"aniworld_config_export_{timestamp}.json"
# Write to temporary file
with open(filename, 'w', encoding='utf-8') as f:
json.dump(config_data, f, indent=4)
return send_file(
filename,
as_attachment=True,
download_name=filename,
mimetype='application/json'
)
except Exception as e:
logger.error(f"Error exporting configuration: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@router.post('/import', response_model=ConfigImportResponse)
async def import_config(
config_file: UploadFile = File(...),
current_user: Optional[Dict] = Depends(get_current_user)
) -> ConfigImportResponse:
"""Import configuration from uploaded JSON file."""
try:
# Validate file type
if not config_file.filename:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail="No file selected"
)
if not config_file.filename.endswith('.json'):
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail="Invalid file type. Only JSON files are allowed."
)
# Read and parse JSON
try:
content = await config_file.read()
config_data = json.loads(content.decode('utf-8'))
except json.JSONDecodeError as e:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail=f"Invalid JSON format: {e}"
)
# For now, just return success with the keys that would be imported
# TODO: Replace with actual config management logic
logger.info(f"Configuration imported from file: {config_file.filename}")
return ConfigImportResponse(
success=True,
message="Configuration imported successfully",
imported_keys=list(config_data.keys()) if isinstance(config_data, dict) else [],
skipped_keys=[]
)
except HTTPException:
raise
except Exception as e:
logger.error(f"Error importing configuration: {e}")
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail=str(e)
)
@config_bp.route('/reset', methods=['POST'])
@require_auth
def reset_config():
"""Reset configuration to defaults (preserves security settings)."""
try:
data = request.get_json() or {}
preserve_security = data.get('preserve_security', True)
# Get current security settings
current_security = config.get('security', {}) if preserve_security else {}
# Reset to defaults
config._config = config.default_config.copy()
# Restore security settings if requested
if preserve_security and current_security:
config._config['security'] = current_security
success = config.save_config()
if success:
logger.info("Configuration reset to defaults")
return jsonify({
'success': True,
'message': 'Configuration reset to defaults'
})
else:
return jsonify({
'success': False,
'error': 'Failed to save configuration'
}), 500
except Exception as e:
logger.error(f"Error resetting configuration: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500

View File

@ -1,649 +0,0 @@
"""
Database & Storage Management API Endpoints
This module provides REST API endpoints for database operations,
backup management, and storage monitoring.
"""
from flask import Blueprint, request, jsonify, send_file
from auth import require_auth, optional_auth
from error_handler import handle_api_errors, RetryableError, NonRetryableError
from database_manager import (
database_manager, anime_repository, backup_manager, storage_manager,
AnimeMetadata
)
import uuid
from datetime import datetime
import os
# Blueprint for database management endpoints
database_bp = Blueprint('database', __name__)
# Database Information Endpoints
@database_bp.route('/api/database/info')
@handle_api_errors
@optional_auth
def get_database_info():
"""Get database information and statistics."""
try:
# Get schema version
schema_version = database_manager.get_current_version()
# Get table statistics
stats_query = """
SELECT
(SELECT COUNT(*) FROM anime_metadata) as anime_count,
(SELECT COUNT(*) FROM episode_metadata) as episode_count,
(SELECT COUNT(*) FROM episode_metadata WHERE is_downloaded = 1) as downloaded_count,
(SELECT COUNT(*) FROM download_history) as download_history_count
"""
results = database_manager.execute_query(stats_query)
stats = dict(results[0]) if results else {}
# Get database file size
db_size = os.path.getsize(database_manager.db_path) if os.path.exists(database_manager.db_path) else 0
return jsonify({
'status': 'success',
'data': {
'schema_version': schema_version,
'database_path': database_manager.db_path,
'database_size_mb': round(db_size / (1024 * 1024), 2),
'statistics': {
'anime_count': stats.get('anime_count', 0),
'episode_count': stats.get('episode_count', 0),
'downloaded_count': stats.get('downloaded_count', 0),
'download_history_count': stats.get('download_history_count', 0)
}
}
})
except Exception as e:
raise RetryableError(f"Failed to get database info: {e}")
# Anime Metadata Endpoints
@database_bp.route('/api/database/anime')
@handle_api_errors
@optional_auth
def get_all_anime():
"""Get all anime from database."""
try:
status_filter = request.args.get('status')
anime_list = anime_repository.get_all_anime(status_filter)
# Convert to serializable format
anime_data = []
for anime in anime_list:
anime_data.append({
'anime_id': anime.anime_id,
'name': anime.name,
'folder': anime.folder,
'key': anime.key,
'description': anime.description,
'genres': anime.genres,
'release_year': anime.release_year,
'status': anime.status,
'total_episodes': anime.total_episodes,
'poster_url': anime.poster_url,
'last_updated': anime.last_updated.isoformat(),
'created_at': anime.created_at.isoformat(),
'custom_metadata': anime.custom_metadata
})
return jsonify({
'status': 'success',
'data': {
'anime': anime_data,
'count': len(anime_data)
}
})
except Exception as e:
raise RetryableError(f"Failed to get anime list: {e}")
@database_bp.route('/api/database/anime/<anime_id>')
@handle_api_errors
@optional_auth
def get_anime_by_id(anime_id):
"""Get specific anime by ID."""
try:
query = "SELECT * FROM anime_metadata WHERE anime_id = ?"
results = database_manager.execute_query(query, (anime_id,))
if not results:
return jsonify({
'status': 'error',
'message': 'Anime not found'
}), 404
row = results[0]
anime_data = {
'anime_id': row['anime_id'],
'name': row['name'],
'folder': row['folder'],
'key': row['key'],
'description': row['description'],
'genres': row['genres'],
'release_year': row['release_year'],
'status': row['status'],
'total_episodes': row['total_episodes'],
'poster_url': row['poster_url'],
'last_updated': row['last_updated'],
'created_at': row['created_at'],
'custom_metadata': row['custom_metadata']
}
return jsonify({
'status': 'success',
'data': anime_data
})
except Exception as e:
raise RetryableError(f"Failed to get anime: {e}")
@database_bp.route('/api/database/anime', methods=['POST'])
@handle_api_errors
@require_auth
def create_anime():
"""Create new anime record."""
try:
data = request.get_json()
# Validate required fields
required_fields = ['name', 'folder']
for field in required_fields:
if field not in data:
return jsonify({
'status': 'error',
'message': f'Missing required field: {field}'
}), 400
# Create anime metadata
anime = AnimeMetadata(
anime_id=str(uuid.uuid4()),
name=data['name'],
folder=data['folder'],
key=data.get('key'),
description=data.get('description'),
genres=data.get('genres', []),
release_year=data.get('release_year'),
status=data.get('status', 'ongoing'),
total_episodes=data.get('total_episodes'),
poster_url=data.get('poster_url'),
custom_metadata=data.get('custom_metadata', {})
)
success = anime_repository.create_anime(anime)
if success:
return jsonify({
'status': 'success',
'message': 'Anime created successfully',
'data': {
'anime_id': anime.anime_id
}
}), 201
else:
return jsonify({
'status': 'error',
'message': 'Failed to create anime'
}), 500
except Exception as e:
raise RetryableError(f"Failed to create anime: {e}")
@database_bp.route('/api/database/anime/<anime_id>', methods=['PUT'])
@handle_api_errors
@require_auth
def update_anime(anime_id):
"""Update anime metadata."""
try:
data = request.get_json()
# Get existing anime
existing = anime_repository.get_anime_by_folder(data.get('folder', ''))
if not existing or existing.anime_id != anime_id:
return jsonify({
'status': 'error',
'message': 'Anime not found'
}), 404
# Update fields
if 'name' in data:
existing.name = data['name']
if 'key' in data:
existing.key = data['key']
if 'description' in data:
existing.description = data['description']
if 'genres' in data:
existing.genres = data['genres']
if 'release_year' in data:
existing.release_year = data['release_year']
if 'status' in data:
existing.status = data['status']
if 'total_episodes' in data:
existing.total_episodes = data['total_episodes']
if 'poster_url' in data:
existing.poster_url = data['poster_url']
if 'custom_metadata' in data:
existing.custom_metadata.update(data['custom_metadata'])
success = anime_repository.update_anime(existing)
if success:
return jsonify({
'status': 'success',
'message': 'Anime updated successfully'
})
else:
return jsonify({
'status': 'error',
'message': 'Failed to update anime'
}), 500
except Exception as e:
raise RetryableError(f"Failed to update anime: {e}")
@database_bp.route('/api/database/anime/<anime_id>', methods=['DELETE'])
@handle_api_errors
@require_auth
def delete_anime(anime_id):
"""Delete anime and related data."""
try:
success = anime_repository.delete_anime(anime_id)
if success:
return jsonify({
'status': 'success',
'message': 'Anime deleted successfully'
})
else:
return jsonify({
'status': 'error',
'message': 'Anime not found'
}), 404
except Exception as e:
raise RetryableError(f"Failed to delete anime: {e}")
@database_bp.route('/api/database/anime/search')
@handle_api_errors
@optional_auth
def search_anime():
"""Search anime by name or description."""
try:
search_term = request.args.get('q', '').strip()
if not search_term:
return jsonify({
'status': 'error',
'message': 'Search term is required'
}), 400
results = anime_repository.search_anime(search_term)
# Convert to serializable format
anime_data = []
for anime in results:
anime_data.append({
'anime_id': anime.anime_id,
'name': anime.name,
'folder': anime.folder,
'key': anime.key,
'description': anime.description,
'genres': anime.genres,
'release_year': anime.release_year,
'status': anime.status
})
return jsonify({
'status': 'success',
'data': {
'results': anime_data,
'count': len(anime_data),
'search_term': search_term
}
})
except Exception as e:
raise RetryableError(f"Failed to search anime: {e}")
# Backup Management Endpoints
@database_bp.route('/api/database/backups')
@handle_api_errors
@optional_auth
def list_backups():
"""List all available backups."""
try:
backups = backup_manager.list_backups()
backup_data = []
for backup in backups:
backup_data.append({
'backup_id': backup.backup_id,
'backup_type': backup.backup_type,
'created_at': backup.created_at.isoformat(),
'size_mb': round(backup.size_bytes / (1024 * 1024), 2),
'description': backup.description,
'tables_included': backup.tables_included
})
return jsonify({
'status': 'success',
'data': {
'backups': backup_data,
'count': len(backup_data)
}
})
except Exception as e:
raise RetryableError(f"Failed to list backups: {e}")
@database_bp.route('/api/database/backups/create', methods=['POST'])
@handle_api_errors
@require_auth
def create_backup():
"""Create a new database backup."""
try:
data = request.get_json() or {}
backup_type = data.get('backup_type', 'full')
description = data.get('description')
if backup_type not in ['full', 'metadata_only']:
return jsonify({
'status': 'error',
'message': 'Backup type must be "full" or "metadata_only"'
}), 400
if backup_type == 'full':
backup_info = backup_manager.create_full_backup(description)
else:
backup_info = backup_manager.create_metadata_backup(description)
if backup_info:
return jsonify({
'status': 'success',
'message': f'{backup_type.title()} backup created successfully',
'data': {
'backup_id': backup_info.backup_id,
'backup_type': backup_info.backup_type,
'size_mb': round(backup_info.size_bytes / (1024 * 1024), 2),
'created_at': backup_info.created_at.isoformat()
}
}), 201
else:
return jsonify({
'status': 'error',
'message': 'Failed to create backup'
}), 500
except Exception as e:
raise RetryableError(f"Failed to create backup: {e}")
@database_bp.route('/api/database/backups/<backup_id>/restore', methods=['POST'])
@handle_api_errors
@require_auth
def restore_backup(backup_id):
"""Restore from a backup."""
try:
success = backup_manager.restore_backup(backup_id)
if success:
return jsonify({
'status': 'success',
'message': 'Backup restored successfully'
})
else:
return jsonify({
'status': 'error',
'message': 'Failed to restore backup'
}), 500
except Exception as e:
raise RetryableError(f"Failed to restore backup: {e}")
@database_bp.route('/api/database/backups/<backup_id>/download')
@handle_api_errors
@require_auth
def download_backup(backup_id):
"""Download a backup file."""
try:
backups = backup_manager.list_backups()
target_backup = None
for backup in backups:
if backup.backup_id == backup_id:
target_backup = backup
break
if not target_backup:
return jsonify({
'status': 'error',
'message': 'Backup not found'
}), 404
if not os.path.exists(target_backup.backup_path):
return jsonify({
'status': 'error',
'message': 'Backup file not found'
}), 404
filename = os.path.basename(target_backup.backup_path)
return send_file(target_backup.backup_path, as_attachment=True, download_name=filename)
except Exception as e:
raise RetryableError(f"Failed to download backup: {e}")
@database_bp.route('/api/database/backups/cleanup', methods=['POST'])
@handle_api_errors
@require_auth
def cleanup_backups():
"""Clean up old backup files."""
try:
data = request.get_json() or {}
keep_days = data.get('keep_days', 30)
keep_count = data.get('keep_count', 10)
if keep_days < 1 or keep_count < 1:
return jsonify({
'status': 'error',
'message': 'keep_days and keep_count must be positive integers'
}), 400
backup_manager.cleanup_old_backups(keep_days, keep_count)
return jsonify({
'status': 'success',
'message': f'Backup cleanup completed (keeping {keep_count} backups, max {keep_days} days old)'
})
except Exception as e:
raise RetryableError(f"Failed to cleanup backups: {e}")
# Storage Management Endpoints
@database_bp.route('/api/database/storage/summary')
@handle_api_errors
@optional_auth
def get_storage_summary():
"""Get storage usage summary."""
try:
summary = storage_manager.get_storage_summary()
return jsonify({
'status': 'success',
'data': summary
})
except Exception as e:
raise RetryableError(f"Failed to get storage summary: {e}")
@database_bp.route('/api/database/storage/locations')
@handle_api_errors
@optional_auth
def get_storage_locations():
"""Get all storage locations."""
try:
query = """
SELECT sl.*, am.name as anime_name
FROM storage_locations sl
LEFT JOIN anime_metadata am ON sl.anime_id = am.anime_id
WHERE sl.is_active = 1
ORDER BY sl.location_type, sl.path
"""
results = database_manager.execute_query(query)
locations = []
for row in results:
locations.append({
'location_id': row['location_id'],
'anime_id': row['anime_id'],
'anime_name': row['anime_name'],
'path': row['path'],
'location_type': row['location_type'],
'free_space_gb': (row['free_space_bytes'] / (1024**3)) if row['free_space_bytes'] else None,
'total_space_gb': (row['total_space_bytes'] / (1024**3)) if row['total_space_bytes'] else None,
'usage_percent': ((row['total_space_bytes'] - row['free_space_bytes']) / row['total_space_bytes'] * 100) if row['total_space_bytes'] and row['free_space_bytes'] else None,
'last_checked': row['last_checked']
})
return jsonify({
'status': 'success',
'data': {
'locations': locations,
'count': len(locations)
}
})
except Exception as e:
raise RetryableError(f"Failed to get storage locations: {e}")
@database_bp.route('/api/database/storage/locations', methods=['POST'])
@handle_api_errors
@require_auth
def add_storage_location():
"""Add a new storage location."""
try:
data = request.get_json()
path = data.get('path')
location_type = data.get('location_type', 'primary')
anime_id = data.get('anime_id')
if not path:
return jsonify({
'status': 'error',
'message': 'Path is required'
}), 400
if location_type not in ['primary', 'backup', 'cache']:
return jsonify({
'status': 'error',
'message': 'Location type must be primary, backup, or cache'
}), 400
location_id = storage_manager.add_storage_location(path, location_type, anime_id)
return jsonify({
'status': 'success',
'message': 'Storage location added successfully',
'data': {
'location_id': location_id
}
}), 201
except Exception as e:
raise RetryableError(f"Failed to add storage location: {e}")
@database_bp.route('/api/database/storage/locations/<location_id>/update', methods=['POST'])
@handle_api_errors
@require_auth
def update_storage_location(location_id):
"""Update storage location statistics."""
try:
storage_manager.update_storage_stats(location_id)
return jsonify({
'status': 'success',
'message': 'Storage statistics updated successfully'
})
except Exception as e:
raise RetryableError(f"Failed to update storage location: {e}")
# Database Maintenance Endpoints
@database_bp.route('/api/database/maintenance/vacuum', methods=['POST'])
@handle_api_errors
@require_auth
def vacuum_database():
"""Perform database VACUUM operation to reclaim space."""
try:
with database_manager.get_connection() as conn:
conn.execute("VACUUM")
return jsonify({
'status': 'success',
'message': 'Database vacuum completed successfully'
})
except Exception as e:
raise RetryableError(f"Failed to vacuum database: {e}")
@database_bp.route('/api/database/maintenance/analyze', methods=['POST'])
@handle_api_errors
@require_auth
def analyze_database():
"""Perform database ANALYZE operation to update statistics."""
try:
with database_manager.get_connection() as conn:
conn.execute("ANALYZE")
return jsonify({
'status': 'success',
'message': 'Database analysis completed successfully'
})
except Exception as e:
raise RetryableError(f"Failed to analyze database: {e}")
@database_bp.route('/api/database/maintenance/integrity-check', methods=['POST'])
@handle_api_errors
@require_auth
def integrity_check():
"""Perform database integrity check."""
try:
with database_manager.get_connection() as conn:
cursor = conn.execute("PRAGMA integrity_check")
results = cursor.fetchall()
# Check if database is OK
is_ok = len(results) == 1 and results[0][0] == 'ok'
return jsonify({
'status': 'success',
'data': {
'integrity_ok': is_ok,
'results': [row[0] for row in results]
}
})
except Exception as e:
raise RetryableError(f"Failed to check database integrity: {e}")
# Export the blueprint
__all__ = ['database_bp']

View File

@ -1,581 +0,0 @@
"""
Diagnostics API endpoints.
This module handles all diagnostic and monitoring operations including:
- System health checks
- Performance monitoring
- Error reporting
- Network diagnostics
"""
from flask import Blueprint, request, jsonify
from typing import Dict, List, Any, Optional, Tuple
import logging
import psutil
import socket
import requests
import time
import platform
import sys
import os
from datetime import datetime, timedelta
# Import shared utilities
try:
from src.server.web.controllers.shared.auth_decorators import require_auth, optional_auth
from src.server.web.controllers.shared.error_handlers import handle_api_errors
from src.server.web.controllers.shared.validators import validate_query_params
from src.server.web.controllers.shared.response_helpers import (
create_success_response, create_error_response, format_datetime, format_file_size
)
except ImportError:
# Fallback imports for development
def require_auth(f): return f
def optional_auth(f): return f
def handle_api_errors(f): return f
def validate_query_params(**kwargs): return lambda f: f
def create_success_response(msg, code=200, data=None): return jsonify({'success': True, 'message': msg, 'data': data}), code
def create_error_response(msg, code=400, details=None): return jsonify({'error': msg, 'details': details}), code
def format_datetime(dt): return str(dt) if dt else None
def format_file_size(size): return f"{size} bytes"
# Import diagnostic components
try:
from src.server.data.error_manager import ErrorManager
from src.server.data.performance_manager import PerformanceManager
from src.server.data.system_manager import SystemManager
except ImportError:
# Fallback for development
class ErrorManager:
def get_recent_errors(self, **kwargs): return []
def get_error_stats(self): return {}
def clear_errors(self): return True
def report_error(self, **kwargs): return 1
class PerformanceManager:
def get_performance_metrics(self): return {}
def get_performance_history(self, **kwargs): return []
def record_metric(self, **kwargs): return True
class SystemManager:
def get_system_info(self): return {}
def get_disk_usage(self): return {}
def get_network_status(self): return {}
def test_network_connectivity(self, url): return {'success': True, 'response_time': 0.1}
# Create blueprint
diagnostics_bp = Blueprint('diagnostics', __name__)
# Initialize managers
error_manager = ErrorManager()
performance_manager = PerformanceManager()
system_manager = SystemManager()
logger = logging.getLogger(__name__)
@diagnostics_bp.route('/diagnostics/health', methods=['GET'])
@optional_auth
@handle_api_errors
def health_check() -> Tuple[Any, int]:
"""
Perform comprehensive system health check.
Returns:
JSON response with system health status
"""
try:
health_status = {
'status': 'healthy',
'timestamp': datetime.now().isoformat(),
'checks': {},
'overall_score': 100
}
# System resource checks
cpu_percent = psutil.cpu_percent(interval=1)
memory = psutil.virtual_memory()
disk = psutil.disk_usage('/')
# CPU check
health_status['checks']['cpu'] = {
'status': 'healthy' if cpu_percent < 80 else 'warning' if cpu_percent < 95 else 'critical',
'usage_percent': cpu_percent,
'details': f"CPU usage: {cpu_percent}%"
}
# Memory check
memory_percent = memory.percent
health_status['checks']['memory'] = {
'status': 'healthy' if memory_percent < 80 else 'warning' if memory_percent < 95 else 'critical',
'usage_percent': memory_percent,
'total': format_file_size(memory.total),
'available': format_file_size(memory.available),
'details': f"Memory usage: {memory_percent}%"
}
# Disk check
disk_percent = disk.percent
health_status['checks']['disk'] = {
'status': 'healthy' if disk_percent < 80 else 'warning' if disk_percent < 95 else 'critical',
'usage_percent': disk_percent,
'total': format_file_size(disk.total),
'free': format_file_size(disk.free),
'details': f"Disk usage: {disk_percent}%"
}
# Database connectivity check
try:
# This would test actual database connection
health_status['checks']['database'] = {
'status': 'healthy',
'details': 'Database connection successful'
}
except Exception as e:
health_status['checks']['database'] = {
'status': 'critical',
'details': f'Database connection failed: {str(e)}'
}
# Network connectivity check
try:
response = requests.get('https://httpbin.org/status/200', timeout=5)
if response.status_code == 200:
health_status['checks']['network'] = {
'status': 'healthy',
'details': 'Internet connectivity available'
}
else:
health_status['checks']['network'] = {
'status': 'warning',
'details': f'Network response: {response.status_code}'
}
except Exception as e:
health_status['checks']['network'] = {
'status': 'warning',
'details': f'Network connectivity issues: {str(e)}'
}
# Calculate overall health score
check_statuses = [check['status'] for check in health_status['checks'].values()]
critical_count = check_statuses.count('critical')
warning_count = check_statuses.count('warning')
if critical_count > 0:
health_status['status'] = 'critical'
health_status['overall_score'] = max(0, 100 - (critical_count * 30) - (warning_count * 10))
elif warning_count > 0:
health_status['status'] = 'warning'
health_status['overall_score'] = max(50, 100 - (warning_count * 15))
return create_success_response("Health check completed", 200, health_status)
except Exception as e:
logger.error(f"Error during health check: {str(e)}")
return create_error_response("Health check failed", 500)
@diagnostics_bp.route('/diagnostics/system', methods=['GET'])
@require_auth
@handle_api_errors
def get_system_info() -> Tuple[Any, int]:
"""
Get detailed system information.
Returns:
JSON response with system information
"""
try:
system_info = {
'platform': {
'system': platform.system(),
'release': platform.release(),
'version': platform.version(),
'machine': platform.machine(),
'processor': platform.processor(),
'architecture': platform.architecture()
},
'python': {
'version': sys.version,
'executable': sys.executable,
'path': sys.path[:5] # First 5 paths only
},
'resources': {
'cpu': {
'count_logical': psutil.cpu_count(logical=True),
'count_physical': psutil.cpu_count(logical=False),
'frequency': psutil.cpu_freq()._asdict() if psutil.cpu_freq() else None,
'usage_percent': psutil.cpu_percent(interval=1),
'usage_per_cpu': psutil.cpu_percent(interval=1, percpu=True)
},
'memory': {
**psutil.virtual_memory()._asdict(),
'swap': psutil.swap_memory()._asdict()
},
'disk': {
'usage': psutil.disk_usage('/')._asdict(),
'io_counters': psutil.disk_io_counters()._asdict() if psutil.disk_io_counters() else None
},
'network': {
'io_counters': psutil.net_io_counters()._asdict(),
'connections': len(psutil.net_connections()),
'interfaces': {name: addr._asdict() for name, addr in psutil.net_if_addrs().items()}
}
},
'process': {
'pid': os.getpid(),
'memory_info': psutil.Process().memory_info()._asdict(),
'cpu_percent': psutil.Process().cpu_percent(),
'num_threads': psutil.Process().num_threads(),
'create_time': format_datetime(datetime.fromtimestamp(psutil.Process().create_time())),
'open_files': len(psutil.Process().open_files())
},
'uptime': {
'boot_time': format_datetime(datetime.fromtimestamp(psutil.boot_time())),
'uptime_seconds': time.time() - psutil.boot_time()
}
}
return create_success_response("System information retrieved", 200, system_info)
except Exception as e:
logger.error(f"Error getting system info: {str(e)}")
return create_error_response("Failed to get system information", 500)
@diagnostics_bp.route('/diagnostics/performance', methods=['GET'])
@require_auth
@handle_api_errors
@validate_query_params(
allowed_params=['hours', 'metric'],
param_types={'hours': int}
)
def get_performance_metrics() -> Tuple[Any, int]:
"""
Get performance metrics and history.
Query Parameters:
- hours: Hours of history to retrieve (default: 24, max: 168)
- metric: Specific metric to retrieve (optional)
Returns:
JSON response with performance metrics
"""
hours = min(request.args.get('hours', 24, type=int), 168) # Max 1 week
metric = request.args.get('metric')
try:
# Current performance metrics
current_metrics = {
'timestamp': datetime.now().isoformat(),
'cpu': {
'usage_percent': psutil.cpu_percent(interval=1),
'load_average': os.getloadavg() if hasattr(os, 'getloadavg') else None
},
'memory': {
'usage_percent': psutil.virtual_memory().percent,
'available_gb': psutil.virtual_memory().available / (1024**3)
},
'disk': {
'usage_percent': psutil.disk_usage('/').percent,
'free_gb': psutil.disk_usage('/').free / (1024**3)
},
'network': {
'bytes_sent': psutil.net_io_counters().bytes_sent,
'bytes_recv': psutil.net_io_counters().bytes_recv,
'packets_sent': psutil.net_io_counters().packets_sent,
'packets_recv': psutil.net_io_counters().packets_recv
}
}
# Historical data
historical_data = performance_manager.get_performance_history(
hours=hours,
metric=metric
)
response_data = {
'current': current_metrics,
'history': historical_data,
'summary': {
'period_hours': hours,
'data_points': len(historical_data),
'metric_filter': metric
}
}
return create_success_response("Performance metrics retrieved", 200, response_data)
except Exception as e:
logger.error(f"Error getting performance metrics: {str(e)}")
return create_error_response("Failed to get performance metrics", 500)
@diagnostics_bp.route('/diagnostics/errors', methods=['GET'])
@require_auth
@handle_api_errors
@validate_query_params(
allowed_params=['hours', 'level', 'limit'],
param_types={'hours': int, 'limit': int}
)
def get_recent_errors() -> Tuple[Any, int]:
"""
Get recent errors and error statistics.
Query Parameters:
- hours: Hours of errors to retrieve (default: 24, max: 168)
- level: Error level filter (error, warning, critical)
- limit: Maximum number of errors to return (default: 100, max: 1000)
Returns:
JSON response with recent errors
"""
hours = min(request.args.get('hours', 24, type=int), 168)
level = request.args.get('level')
limit = min(request.args.get('limit', 100, type=int), 1000)
try:
# Get recent errors
errors = error_manager.get_recent_errors(
hours=hours,
level=level,
limit=limit
)
# Get error statistics
error_stats = error_manager.get_error_stats()
response_data = {
'errors': errors,
'statistics': error_stats,
'summary': {
'period_hours': hours,
'level_filter': level,
'total_returned': len(errors),
'limit': limit
}
}
return create_success_response("Recent errors retrieved", 200, response_data)
except Exception as e:
logger.error(f"Error getting recent errors: {str(e)}")
return create_error_response("Failed to get recent errors", 500)
@diagnostics_bp.route('/diagnostics/errors', methods=['DELETE'])
@require_auth
@handle_api_errors
def clear_errors() -> Tuple[Any, int]:
"""
Clear error log.
Returns:
JSON response with clear operation result
"""
try:
success = error_manager.clear_errors()
if success:
logger.info("Error log cleared")
return create_success_response("Error log cleared successfully")
else:
return create_error_response("Failed to clear error log", 500)
except Exception as e:
logger.error(f"Error clearing error log: {str(e)}")
return create_error_response("Failed to clear error log", 500)
@diagnostics_bp.route('/diagnostics/network', methods=['GET'])
@require_auth
@handle_api_errors
def test_network_connectivity() -> Tuple[Any, int]:
"""
Test network connectivity to various services.
Returns:
JSON response with network connectivity results
"""
try:
test_urls = [
'https://google.com',
'https://github.com',
'https://pypi.org',
'https://httpbin.org/status/200'
]
results = []
for url in test_urls:
try:
start_time = time.time()
response = requests.get(url, timeout=10)
response_time = time.time() - start_time
results.append({
'url': url,
'status': 'success',
'status_code': response.status_code,
'response_time_ms': round(response_time * 1000, 2),
'accessible': response.status_code == 200
})
except requests.exceptions.Timeout:
results.append({
'url': url,
'status': 'timeout',
'error': 'Request timed out',
'accessible': False
})
except Exception as e:
results.append({
'url': url,
'status': 'error',
'error': str(e),
'accessible': False
})
# Network interface information
interfaces = {}
for interface, addresses in psutil.net_if_addrs().items():
interfaces[interface] = [addr._asdict() for addr in addresses]
# Network I/O statistics
net_io = psutil.net_io_counters()._asdict()
response_data = {
'connectivity_tests': results,
'interfaces': interfaces,
'io_statistics': net_io,
'summary': {
'total_tests': len(results),
'successful': len([r for r in results if r['accessible']]),
'failed': len([r for r in results if not r['accessible']])
}
}
return create_success_response("Network connectivity test completed", 200, response_data)
except Exception as e:
logger.error(f"Error testing network connectivity: {str(e)}")
return create_error_response("Failed to test network connectivity", 500)
@diagnostics_bp.route('/diagnostics/logs', methods=['GET'])
@require_auth
@handle_api_errors
@validate_query_params(
allowed_params=['lines', 'level', 'component'],
param_types={'lines': int}
)
def get_application_logs() -> Tuple[Any, int]:
"""
Get recent application logs.
Query Parameters:
- lines: Number of log lines to retrieve (default: 100, max: 1000)
- level: Log level filter (debug, info, warning, error, critical)
- component: Component filter (optional)
Returns:
JSON response with application logs
"""
lines = min(request.args.get('lines', 100, type=int), 1000)
level = request.args.get('level')
component = request.args.get('component')
try:
# This would read from actual log files
log_entries = []
# For demonstration, return sample log structure
response_data = {
'logs': log_entries,
'summary': {
'lines_requested': lines,
'level_filter': level,
'component_filter': component,
'total_returned': len(log_entries)
}
}
return create_success_response("Application logs retrieved", 200, response_data)
except Exception as e:
logger.error(f"Error getting application logs: {str(e)}")
return create_error_response("Failed to get application logs", 500)
@diagnostics_bp.route('/diagnostics/report', methods=['POST'])
@require_auth
@handle_api_errors
def generate_diagnostic_report() -> Tuple[Any, int]:
"""
Generate comprehensive diagnostic report.
Returns:
JSON response with diagnostic report
"""
try:
report = {
'generated_at': datetime.now().isoformat(),
'report_id': f"diag_{int(time.time())}",
'sections': {}
}
# System information
report['sections']['system'] = {
'platform': platform.platform(),
'python_version': sys.version,
'cpu_count': psutil.cpu_count(),
'memory_total_gb': round(psutil.virtual_memory().total / (1024**3), 2),
'disk_total_gb': round(psutil.disk_usage('/').total / (1024**3), 2)
}
# Current resource usage
report['sections']['resources'] = {
'cpu_percent': psutil.cpu_percent(interval=1),
'memory_percent': psutil.virtual_memory().percent,
'disk_percent': psutil.disk_usage('/').percent,
'load_average': os.getloadavg() if hasattr(os, 'getloadavg') else None
}
# Error summary
error_stats = error_manager.get_error_stats()
report['sections']['errors'] = error_stats
# Performance summary
performance_metrics = performance_manager.get_performance_metrics()
report['sections']['performance'] = performance_metrics
# Network status
report['sections']['network'] = {
'interfaces_count': len(psutil.net_if_addrs()),
'connections_count': len(psutil.net_connections()),
'bytes_sent': psutil.net_io_counters().bytes_sent,
'bytes_recv': psutil.net_io_counters().bytes_recv
}
logger.info(f"Diagnostic report generated: {report['report_id']}")
return create_success_response("Diagnostic report generated", 200, report)
except Exception as e:
logger.error(f"Error generating diagnostic report: {str(e)}")
return create_error_response("Failed to generate diagnostic report", 500)
@diagnostics_bp.route('/diagnostics/ping', methods=['GET'])
@optional_auth
@handle_api_errors
def ping() -> Tuple[Any, int]:
"""
Simple ping endpoint for health monitoring.
Returns:
JSON response with ping result
"""
return create_success_response("pong", 200, {
'timestamp': datetime.now().isoformat(),
'status': 'alive'
})

View File

@ -1,640 +0,0 @@
"""
Download Management API Endpoints
This module provides REST API endpoints for download operations,
including queue management, progress tracking, and download history.
"""
from flask import Blueprint, request
from typing import Dict, List, Any, Optional
import uuid
from datetime import datetime
from ...shared.auth_decorators import require_auth, optional_auth
from ...shared.error_handlers import handle_api_errors, APIException, NotFoundError, ValidationError
from ...shared.validators import validate_json_input, validate_id_parameter, validate_pagination_params
from ...shared.response_helpers import (
create_success_response, create_paginated_response, format_download_response,
extract_pagination_params, create_batch_response
)
# Import download components (these imports would need to be adjusted based on actual structure)
try:
from download_manager import download_queue, download_manager, DownloadItem
from database_manager import episode_repository, anime_repository
except ImportError:
# Fallback for development/testing
download_queue = None
download_manager = None
DownloadItem = None
episode_repository = None
anime_repository = None
# Blueprint for download management endpoints
downloads_bp = Blueprint('downloads', __name__, url_prefix='/api/v1/downloads')
@downloads_bp.route('', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def list_downloads() -> Dict[str, Any]:
"""
Get all downloads with optional filtering and pagination.
Query Parameters:
- status: Filter by download status (pending, downloading, completed, failed, paused)
- anime_id: Filter by anime ID
- episode_id: Filter by episode ID
- active_only: Show only active downloads (true/false)
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated list of downloads
"""
if not download_manager:
raise APIException("Download manager not available", 503)
# Extract filters
status_filter = request.args.get('status')
anime_id = request.args.get('anime_id')
episode_id = request.args.get('episode_id')
active_only = request.args.get('active_only', 'false').lower() == 'true'
# Validate filters
valid_statuses = ['pending', 'downloading', 'completed', 'failed', 'paused', 'cancelled']
if status_filter and status_filter not in valid_statuses:
raise ValidationError(f"Status must be one of: {', '.join(valid_statuses)}")
if anime_id:
try:
anime_id = int(anime_id)
except ValueError:
raise ValidationError("anime_id must be a valid integer")
if episode_id:
try:
episode_id = int(episode_id)
except ValueError:
raise ValidationError("episode_id must be a valid integer")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Get downloads with filters
downloads = download_manager.get_downloads(
status_filter=status_filter,
anime_id=anime_id,
episode_id=episode_id,
active_only=active_only
)
# Format download data
formatted_downloads = [format_download_response(download.__dict__) for download in downloads]
# Apply pagination
total = len(formatted_downloads)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_downloads = formatted_downloads[start_idx:end_idx]
return create_paginated_response(
data=paginated_downloads,
page=page,
per_page=per_page,
total=total,
endpoint='downloads.list_downloads'
)
@downloads_bp.route('/<int:download_id>', methods=['GET'])
@handle_api_errors
@validate_id_parameter('download_id')
@optional_auth
def get_download(download_id: int) -> Dict[str, Any]:
"""
Get specific download by ID.
Args:
download_id: Unique identifier for the download
Returns:
Download details with progress information
"""
if not download_manager:
raise APIException("Download manager not available", 503)
download = download_manager.get_download_by_id(download_id)
if not download:
raise NotFoundError("Download not found")
# Format download data
download_data = format_download_response(download.__dict__)
# Add detailed progress information
progress_info = download_manager.get_download_progress(download_id)
if progress_info:
download_data['progress_details'] = progress_info
return create_success_response(download_data)
@downloads_bp.route('', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['episode_id'],
optional_fields=['priority', 'quality', 'subtitle_language', 'download_path'],
field_types={
'episode_id': int,
'priority': int,
'quality': str,
'subtitle_language': str,
'download_path': str
}
)
@require_auth
def create_download() -> Dict[str, Any]:
"""
Create a new download request.
Required Fields:
- episode_id: ID of the episode to download
Optional Fields:
- priority: Download priority (1-10, higher is more priority)
- quality: Preferred quality (720p, 1080p, etc.)
- subtitle_language: Preferred subtitle language
- download_path: Custom download path
Returns:
Created download details
"""
if not download_manager or not episode_repository:
raise APIException("Download manager not available", 503)
data = request.get_json()
episode_id = data['episode_id']
# Validate episode exists
episode = episode_repository.get_episode_by_id(episode_id)
if not episode:
raise ValidationError("Episode not found")
# Check if episode is already downloaded
if episode.status == 'downloaded':
raise ValidationError("Episode is already downloaded")
# Check if download already exists for this episode
existing_download = download_manager.get_download_by_episode(episode_id)
if existing_download and existing_download.status in ['pending', 'downloading']:
raise ValidationError("Download already in progress for this episode")
# Validate priority
priority = data.get('priority', 5)
if not 1 <= priority <= 10:
raise ValidationError("Priority must be between 1 and 10")
# Create download item
try:
download_item = DownloadItem(
download_id=str(uuid.uuid4()),
episode_id=episode_id,
anime_id=episode.anime_id,
priority=priority,
quality=data.get('quality'),
subtitle_language=data.get('subtitle_language'),
download_path=data.get('download_path'),
status='pending',
created_at=datetime.utcnow()
)
except Exception as e:
raise ValidationError(f"Invalid download data: {str(e)}")
# Add to download queue
success = download_queue.add_download(download_item)
if not success:
raise APIException("Failed to create download", 500)
# Return created download
download_data = format_download_response(download_item.__dict__)
return create_success_response(
data=download_data,
message="Download queued successfully",
status_code=201
)
@downloads_bp.route('/<int:download_id>/pause', methods=['POST'])
@handle_api_errors
@validate_id_parameter('download_id')
@require_auth
def pause_download(download_id: int) -> Dict[str, Any]:
"""
Pause a download.
Args:
download_id: Unique identifier for the download
Returns:
Updated download status
"""
if not download_manager:
raise APIException("Download manager not available", 503)
download = download_manager.get_download_by_id(download_id)
if not download:
raise NotFoundError("Download not found")
if download.status not in ['pending', 'downloading']:
raise ValidationError(f"Cannot pause download with status '{download.status}'")
success = download_manager.pause_download(download_id)
if not success:
raise APIException("Failed to pause download", 500)
# Get updated download
updated_download = download_manager.get_download_by_id(download_id)
download_data = format_download_response(updated_download.__dict__)
return create_success_response(
data=download_data,
message="Download paused successfully"
)
@downloads_bp.route('/<int:download_id>/resume', methods=['POST'])
@handle_api_errors
@validate_id_parameter('download_id')
@require_auth
def resume_download(download_id: int) -> Dict[str, Any]:
"""
Resume a paused download.
Args:
download_id: Unique identifier for the download
Returns:
Updated download status
"""
if not download_manager:
raise APIException("Download manager not available", 503)
download = download_manager.get_download_by_id(download_id)
if not download:
raise NotFoundError("Download not found")
if download.status != 'paused':
raise ValidationError(f"Cannot resume download with status '{download.status}'")
success = download_manager.resume_download(download_id)
if not success:
raise APIException("Failed to resume download", 500)
# Get updated download
updated_download = download_manager.get_download_by_id(download_id)
download_data = format_download_response(updated_download.__dict__)
return create_success_response(
data=download_data,
message="Download resumed successfully"
)
@downloads_bp.route('/<int:download_id>/cancel', methods=['POST'])
@handle_api_errors
@validate_id_parameter('download_id')
@require_auth
def cancel_download(download_id: int) -> Dict[str, Any]:
"""
Cancel a download.
Args:
download_id: Unique identifier for the download
Query Parameters:
- delete_partial: Set to 'true' to delete partially downloaded files
Returns:
Cancellation confirmation
"""
if not download_manager:
raise APIException("Download manager not available", 503)
download = download_manager.get_download_by_id(download_id)
if not download:
raise NotFoundError("Download not found")
if download.status in ['completed', 'cancelled']:
raise ValidationError(f"Cannot cancel download with status '{download.status}'")
delete_partial = request.args.get('delete_partial', 'false').lower() == 'true'
success = download_manager.cancel_download(download_id, delete_partial=delete_partial)
if not success:
raise APIException("Failed to cancel download", 500)
message = "Download cancelled successfully"
if delete_partial:
message += " (partial files deleted)"
return create_success_response(message=message)
@downloads_bp.route('/<int:download_id>/retry', methods=['POST'])
@handle_api_errors
@validate_id_parameter('download_id')
@require_auth
def retry_download(download_id: int) -> Dict[str, Any]:
"""
Retry a failed download.
Args:
download_id: Unique identifier for the download
Returns:
Updated download status
"""
if not download_manager:
raise APIException("Download manager not available", 503)
download = download_manager.get_download_by_id(download_id)
if not download:
raise NotFoundError("Download not found")
if download.status != 'failed':
raise ValidationError(f"Cannot retry download with status '{download.status}'")
success = download_manager.retry_download(download_id)
if not success:
raise APIException("Failed to retry download", 500)
# Get updated download
updated_download = download_manager.get_download_by_id(download_id)
download_data = format_download_response(updated_download.__dict__)
return create_success_response(
data=download_data,
message="Download queued for retry"
)
@downloads_bp.route('/bulk', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['action', 'download_ids'],
optional_fields=['delete_partial'],
field_types={
'action': str,
'download_ids': list,
'delete_partial': bool
}
)
@require_auth
def bulk_download_operation() -> Dict[str, Any]:
"""
Perform bulk operations on multiple downloads.
Required Fields:
- action: Operation to perform (pause, resume, cancel, retry)
- download_ids: List of download IDs to operate on
Optional Fields:
- delete_partial: For cancel action, whether to delete partial files
Returns:
Results of the bulk operation
"""
if not download_manager:
raise APIException("Download manager not available", 503)
data = request.get_json()
action = data['action']
download_ids = data['download_ids']
delete_partial = data.get('delete_partial', False)
# Validate action
valid_actions = ['pause', 'resume', 'cancel', 'retry']
if action not in valid_actions:
raise ValidationError(f"Invalid action. Must be one of: {', '.join(valid_actions)}")
# Validate download_ids
if not isinstance(download_ids, list) or not download_ids:
raise ValidationError("download_ids must be a non-empty list")
if len(download_ids) > 50:
raise ValidationError("Cannot operate on more than 50 downloads at once")
# Validate download IDs are integers
try:
download_ids = [int(did) for did in download_ids]
except ValueError:
raise ValidationError("All download_ids must be valid integers")
# Perform bulk operation
successful_items = []
failed_items = []
for download_id in download_ids:
try:
if action == 'pause':
success = download_manager.pause_download(download_id)
elif action == 'resume':
success = download_manager.resume_download(download_id)
elif action == 'cancel':
success = download_manager.cancel_download(download_id, delete_partial=delete_partial)
elif action == 'retry':
success = download_manager.retry_download(download_id)
if success:
successful_items.append({'download_id': download_id, 'action': action})
else:
failed_items.append({'download_id': download_id, 'error': 'Operation failed'})
except Exception as e:
failed_items.append({'download_id': download_id, 'error': str(e)})
return create_batch_response(
successful_items=successful_items,
failed_items=failed_items,
message=f"Bulk {action} operation completed"
)
@downloads_bp.route('/queue', methods=['GET'])
@handle_api_errors
@optional_auth
def get_download_queue() -> Dict[str, Any]:
"""
Get current download queue status.
Returns:
Download queue information including active downloads and queue statistics
"""
if not download_queue:
raise APIException("Download queue not available", 503)
queue_info = download_queue.get_queue_status()
return create_success_response(
data={
'queue_size': queue_info.get('queue_size', 0),
'active_downloads': queue_info.get('active_downloads', 0),
'max_concurrent': queue_info.get('max_concurrent', 0),
'paused_downloads': queue_info.get('paused_downloads', 0),
'failed_downloads': queue_info.get('failed_downloads', 0),
'completed_today': queue_info.get('completed_today', 0),
'queue_items': queue_info.get('queue_items', [])
}
)
@downloads_bp.route('/queue/pause', methods=['POST'])
@handle_api_errors
@require_auth
def pause_download_queue() -> Dict[str, Any]:
"""
Pause the entire download queue.
Returns:
Queue pause confirmation
"""
if not download_queue:
raise APIException("Download queue not available", 503)
success = download_queue.pause_queue()
if not success:
raise APIException("Failed to pause download queue", 500)
return create_success_response(message="Download queue paused")
@downloads_bp.route('/queue/resume', methods=['POST'])
@handle_api_errors
@require_auth
def resume_download_queue() -> Dict[str, Any]:
"""
Resume the download queue.
Returns:
Queue resume confirmation
"""
if not download_queue:
raise APIException("Download queue not available", 503)
success = download_queue.resume_queue()
if not success:
raise APIException("Failed to resume download queue", 500)
return create_success_response(message="Download queue resumed")
@downloads_bp.route('/queue/clear', methods=['POST'])
@handle_api_errors
@require_auth
def clear_download_queue() -> Dict[str, Any]:
"""
Clear completed and failed downloads from the queue.
Query Parameters:
- include_failed: Set to 'true' to also clear failed downloads
Returns:
Queue clear confirmation
"""
if not download_queue:
raise APIException("Download queue not available", 503)
include_failed = request.args.get('include_failed', 'false').lower() == 'true'
cleared_count = download_queue.clear_completed(include_failed=include_failed)
message = f"Cleared {cleared_count} completed downloads"
if include_failed:
message += " and failed downloads"
return create_success_response(
data={'cleared_count': cleared_count},
message=message
)
@downloads_bp.route('/history', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def get_download_history() -> Dict[str, Any]:
"""
Get download history with optional filtering.
Query Parameters:
- status: Filter by status (completed, failed)
- anime_id: Filter by anime ID
- date_from: Filter from date (ISO format)
- date_to: Filter to date (ISO format)
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated download history
"""
if not download_manager:
raise APIException("Download manager not available", 503)
# Extract filters
status_filter = request.args.get('status')
anime_id = request.args.get('anime_id')
date_from = request.args.get('date_from')
date_to = request.args.get('date_to')
# Validate filters
if status_filter and status_filter not in ['completed', 'failed']:
raise ValidationError("Status filter must be 'completed' or 'failed'")
if anime_id:
try:
anime_id = int(anime_id)
except ValueError:
raise ValidationError("anime_id must be a valid integer")
# Validate dates
if date_from:
try:
datetime.fromisoformat(date_from.replace('Z', '+00:00'))
except ValueError:
raise ValidationError("date_from must be in ISO format")
if date_to:
try:
datetime.fromisoformat(date_to.replace('Z', '+00:00'))
except ValueError:
raise ValidationError("date_to must be in ISO format")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Get download history
history = download_manager.get_download_history(
status_filter=status_filter,
anime_id=anime_id,
date_from=date_from,
date_to=date_to
)
# Format history data
formatted_history = [format_download_response(download.__dict__) for download in history]
# Apply pagination
total = len(formatted_history)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_history = formatted_history[start_idx:end_idx]
return create_paginated_response(
data=paginated_history,
page=page,
per_page=per_page,
total=total,
endpoint='downloads.get_download_history'
)

View File

@ -1,584 +0,0 @@
"""
Episode Management API Endpoints
This module provides REST API endpoints for episode CRUD operations,
including episode status management and metadata operations.
"""
from flask import Blueprint, request
from typing import Dict, List, Any, Optional
import uuid
from ...shared.auth_decorators import require_auth, optional_auth
from ...shared.error_handlers import handle_api_errors, APIException, NotFoundError, ValidationError
from ...shared.validators import validate_json_input, validate_id_parameter, validate_pagination_params
from ...shared.response_helpers import (
create_success_response, create_paginated_response, format_episode_response,
extract_pagination_params, create_batch_response
)
# Import database components (these imports would need to be adjusted based on actual structure)
try:
from database_manager import episode_repository, anime_repository, EpisodeMetadata
except ImportError:
# Fallback for development/testing
episode_repository = None
anime_repository = None
EpisodeMetadata = None
# Blueprint for episode management endpoints
episodes_bp = Blueprint('episodes', __name__, url_prefix='/api/v1/episodes')
@episodes_bp.route('', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def list_episodes() -> Dict[str, Any]:
"""
Get all episodes with optional filtering and pagination.
Query Parameters:
- anime_id: Filter by anime ID
- status: Filter by episode status
- downloaded: Filter by download status (true/false)
- episode_number: Filter by episode number
- search: Search in episode title
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated list of episodes
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
# Extract filters
anime_id = request.args.get('anime_id')
status_filter = request.args.get('status')
downloaded_filter = request.args.get('downloaded')
episode_number = request.args.get('episode_number')
search_term = request.args.get('search', '').strip()
# Validate filters
if anime_id:
try:
anime_id = int(anime_id)
except ValueError:
raise ValidationError("anime_id must be a valid integer")
if downloaded_filter and downloaded_filter.lower() not in ['true', 'false']:
raise ValidationError("downloaded filter must be 'true' or 'false'")
if episode_number:
try:
episode_number = int(episode_number)
if episode_number < 1:
raise ValidationError("episode_number must be positive")
except ValueError:
raise ValidationError("episode_number must be a valid integer")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Get episodes with filters
episodes = episode_repository.get_all_episodes(
anime_id=anime_id,
status_filter=status_filter,
downloaded_filter=downloaded_filter.lower() == 'true' if downloaded_filter else None,
episode_number=episode_number,
search_term=search_term
)
# Format episode data
formatted_episodes = [format_episode_response(episode.__dict__) for episode in episodes]
# Apply pagination
total = len(formatted_episodes)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_episodes = formatted_episodes[start_idx:end_idx]
return create_paginated_response(
data=paginated_episodes,
page=page,
per_page=per_page,
total=total,
endpoint='episodes.list_episodes'
)
@episodes_bp.route('/<int:episode_id>', methods=['GET'])
@handle_api_errors
@validate_id_parameter('episode_id')
@optional_auth
def get_episode(episode_id: int) -> Dict[str, Any]:
"""
Get specific episode by ID.
Args:
episode_id: Unique identifier for the episode
Returns:
Episode details with download information
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
episode = episode_repository.get_episode_by_id(episode_id)
if not episode:
raise NotFoundError("Episode not found")
# Format episode data
episode_data = format_episode_response(episode.__dict__)
# Add download information if available
download_info = episode_repository.get_download_info(episode_id)
if download_info:
episode_data['download_info'] = download_info
return create_success_response(episode_data)
@episodes_bp.route('', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['anime_id', 'episode_number', 'title', 'url'],
optional_fields=['description', 'status', 'duration', 'air_date', 'custom_metadata'],
field_types={
'anime_id': int,
'episode_number': int,
'title': str,
'url': str,
'description': str,
'status': str,
'duration': int,
'air_date': str,
'custom_metadata': dict
}
)
@require_auth
def create_episode() -> Dict[str, Any]:
"""
Create a new episode record.
Required Fields:
- anime_id: ID of the anime this episode belongs to
- episode_number: Episode number
- title: Episode title
- url: Episode URL
Optional Fields:
- description: Episode description
- status: Episode status (available, unavailable, coming_soon)
- duration: Episode duration in minutes
- air_date: Air date in ISO format
- custom_metadata: Additional metadata as key-value pairs
Returns:
Created episode details
"""
if not episode_repository or not anime_repository:
raise APIException("Episode repository not available", 503)
data = request.get_json()
# Validate anime exists
anime = anime_repository.get_anime_by_id(data['anime_id'])
if not anime:
raise ValidationError("Anime not found")
# Validate status if provided
valid_statuses = ['available', 'unavailable', 'coming_soon', 'downloaded']
if 'status' in data and data['status'] not in valid_statuses:
raise ValidationError(f"Status must be one of: {', '.join(valid_statuses)}")
# Check if episode already exists for this anime
existing_episode = episode_repository.get_episode_by_anime_and_number(
data['anime_id'], data['episode_number']
)
if existing_episode:
raise ValidationError(f"Episode {data['episode_number']} already exists for this anime")
# Validate episode number
if data['episode_number'] < 1:
raise ValidationError("Episode number must be positive")
# Create episode metadata object
try:
episode = EpisodeMetadata(
episode_id=str(uuid.uuid4()),
anime_id=data['anime_id'],
episode_number=data['episode_number'],
title=data['title'],
url=data['url'],
description=data.get('description'),
status=data.get('status', 'available'),
duration=data.get('duration'),
air_date=data.get('air_date'),
custom_metadata=data.get('custom_metadata', {})
)
except Exception as e:
raise ValidationError(f"Invalid episode data: {str(e)}")
# Save to database
success = episode_repository.create_episode(episode)
if not success:
raise APIException("Failed to create episode", 500)
# Return created episode
episode_data = format_episode_response(episode.__dict__)
return create_success_response(
data=episode_data,
message="Episode created successfully",
status_code=201
)
@episodes_bp.route('/<int:episode_id>', methods=['PUT'])
@handle_api_errors
@validate_id_parameter('episode_id')
@validate_json_input(
optional_fields=['title', 'url', 'description', 'status', 'duration', 'air_date', 'custom_metadata'],
field_types={
'title': str,
'url': str,
'description': str,
'status': str,
'duration': int,
'air_date': str,
'custom_metadata': dict
}
)
@require_auth
def update_episode(episode_id: int) -> Dict[str, Any]:
"""
Update an existing episode record.
Args:
episode_id: Unique identifier for the episode
Optional Fields:
- title: Episode title
- url: Episode URL
- description: Episode description
- status: Episode status (available, unavailable, coming_soon, downloaded)
- duration: Episode duration in minutes
- air_date: Air date in ISO format
- custom_metadata: Additional metadata as key-value pairs
Returns:
Updated episode details
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
data = request.get_json()
# Get existing episode
existing_episode = episode_repository.get_episode_by_id(episode_id)
if not existing_episode:
raise NotFoundError("Episode not found")
# Validate status if provided
valid_statuses = ['available', 'unavailable', 'coming_soon', 'downloaded']
if 'status' in data and data['status'] not in valid_statuses:
raise ValidationError(f"Status must be one of: {', '.join(valid_statuses)}")
# Update fields
update_fields = {}
for field in ['title', 'url', 'description', 'status', 'duration', 'air_date']:
if field in data:
update_fields[field] = data[field]
# Handle custom metadata update (merge instead of replace)
if 'custom_metadata' in data:
existing_metadata = existing_episode.custom_metadata or {}
existing_metadata.update(data['custom_metadata'])
update_fields['custom_metadata'] = existing_metadata
# Perform update
success = episode_repository.update_episode(episode_id, update_fields)
if not success:
raise APIException("Failed to update episode", 500)
# Get updated episode
updated_episode = episode_repository.get_episode_by_id(episode_id)
episode_data = format_episode_response(updated_episode.__dict__)
return create_success_response(
data=episode_data,
message="Episode updated successfully"
)
@episodes_bp.route('/<int:episode_id>', methods=['DELETE'])
@handle_api_errors
@validate_id_parameter('episode_id')
@require_auth
def delete_episode(episode_id: int) -> Dict[str, Any]:
"""
Delete an episode record.
Args:
episode_id: Unique identifier for the episode
Query Parameters:
- delete_file: Set to 'true' to also delete the downloaded file
Returns:
Deletion confirmation
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
# Check if episode exists
existing_episode = episode_repository.get_episode_by_id(episode_id)
if not existing_episode:
raise NotFoundError("Episode not found")
# Check if we should also delete the file
delete_file = request.args.get('delete_file', 'false').lower() == 'true'
# Perform deletion
success = episode_repository.delete_episode(episode_id, delete_file=delete_file)
if not success:
raise APIException("Failed to delete episode", 500)
message = f"Episode {existing_episode.episode_number} deleted successfully"
if delete_file:
message += " (including downloaded file)"
return create_success_response(message=message)
@episodes_bp.route('/bulk/status', methods=['PUT'])
@handle_api_errors
@validate_json_input(
required_fields=['episode_ids', 'status'],
field_types={
'episode_ids': list,
'status': str
}
)
@require_auth
def bulk_update_status() -> Dict[str, Any]:
"""
Update status for multiple episodes.
Required Fields:
- episode_ids: List of episode IDs to update
- status: New status for all episodes
Returns:
Results of the bulk operation
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
data = request.get_json()
episode_ids = data['episode_ids']
new_status = data['status']
# Validate status
valid_statuses = ['available', 'unavailable', 'coming_soon', 'downloaded']
if new_status not in valid_statuses:
raise ValidationError(f"Status must be one of: {', '.join(valid_statuses)}")
# Validate episode_ids
if not isinstance(episode_ids, list) or not episode_ids:
raise ValidationError("episode_ids must be a non-empty list")
if len(episode_ids) > 100:
raise ValidationError("Cannot operate on more than 100 episodes at once")
# Validate episode IDs are integers
try:
episode_ids = [int(eid) for eid in episode_ids]
except ValueError:
raise ValidationError("All episode_ids must be valid integers")
# Perform bulk update
successful_items = []
failed_items = []
for episode_id in episode_ids:
try:
success = episode_repository.update_episode(episode_id, {'status': new_status})
if success:
successful_items.append({'episode_id': episode_id, 'new_status': new_status})
else:
failed_items.append({'episode_id': episode_id, 'error': 'Episode not found'})
except Exception as e:
failed_items.append({'episode_id': episode_id, 'error': str(e)})
return create_batch_response(
successful_items=successful_items,
failed_items=failed_items,
message=f"Bulk status update to '{new_status}' completed"
)
@episodes_bp.route('/anime/<int:anime_id>/sync', methods=['POST'])
@handle_api_errors
@validate_id_parameter('anime_id')
@require_auth
def sync_anime_episodes(anime_id: int) -> Dict[str, Any]:
"""
Synchronize episodes for an anime by scanning the source.
Args:
anime_id: Unique identifier for the anime
Returns:
Synchronization results
"""
if not episode_repository or not anime_repository:
raise APIException("Episode repository not available", 503)
# Check if anime exists
anime = anime_repository.get_anime_by_id(anime_id)
if not anime:
raise NotFoundError("Anime not found")
# This would trigger the episode scanning/syncing process
try:
sync_result = episode_repository.sync_episodes_for_anime(anime_id)
return create_success_response(
data={
'anime_id': anime_id,
'episodes_found': sync_result.get('episodes_found', 0),
'episodes_added': sync_result.get('episodes_added', 0),
'episodes_updated': sync_result.get('episodes_updated', 0),
'episodes_removed': sync_result.get('episodes_removed', 0)
},
message=f"Episode sync completed for '{anime.name}'"
)
except Exception as e:
raise APIException(f"Failed to sync episodes: {str(e)}", 500)
@episodes_bp.route('/<int:episode_id>/download', methods=['POST'])
@handle_api_errors
@validate_id_parameter('episode_id')
@require_auth
def queue_episode_download(episode_id: int) -> Dict[str, Any]:
"""
Queue an episode for download.
Args:
episode_id: Unique identifier for the episode
Returns:
Download queue confirmation
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
# Check if episode exists
episode = episode_repository.get_episode_by_id(episode_id)
if not episode:
raise NotFoundError("Episode not found")
# Check if episode is already downloaded
if episode.status == 'downloaded':
raise ValidationError("Episode is already downloaded")
# Check if episode is available for download
if episode.status not in ['available']:
raise ValidationError(f"Episode status '{episode.status}' is not available for download")
# Queue for download (this would integrate with the download system)
try:
from ...download_manager import download_queue
download_id = download_queue.add_episode_download(episode_id)
return create_success_response(
data={'download_id': download_id},
message=f"Episode {episode.episode_number} queued for download"
)
except Exception as e:
raise APIException(f"Failed to queue download: {str(e)}", 500)
@episodes_bp.route('/search', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def search_episodes() -> Dict[str, Any]:
"""
Search episodes by title or other criteria.
Query Parameters:
- q: Search query (required)
- anime_id: Limit search to specific anime
- status: Filter by episode status
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated search results
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
search_term = request.args.get('q', '').strip()
if not search_term:
raise ValidationError("Search term 'q' is required")
if len(search_term) < 2:
raise ValidationError("Search term must be at least 2 characters long")
# Get additional filters
anime_id = request.args.get('anime_id')
status_filter = request.args.get('status')
# Validate anime_id if provided
if anime_id:
try:
anime_id = int(anime_id)
except ValueError:
raise ValidationError("anime_id must be a valid integer")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Perform search
search_results = episode_repository.search_episodes(
search_term=search_term,
anime_id=anime_id,
status_filter=status_filter
)
# Format results
formatted_results = [format_episode_response(episode.__dict__) for episode in search_results]
# Apply pagination
total = len(formatted_results)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_results = formatted_results[start_idx:end_idx]
# Create response with search metadata
response = create_paginated_response(
data=paginated_results,
page=page,
per_page=per_page,
total=total,
endpoint='episodes.search_episodes',
q=search_term
)
# Add search metadata
response['search'] = {
'query': search_term,
'total_results': total,
'filters': {
'anime_id': anime_id,
'status': status_filter
}
}
return response

View File

@ -1,436 +0,0 @@
"""
Health Check Endpoints
This module provides basic health check endpoints for monitoring
the AniWorld application's status.
"""
from flask import Blueprint, jsonify
import time
import os
import psutil
from datetime import datetime
# Blueprint for health check endpoints
health_bp = Blueprint('health_check', __name__, url_prefix='/api/health')
@health_bp.route('/status')
def get_basic_health():
"""Get basic application health status."""
try:
# Basic system metrics
memory = psutil.virtual_memory()
disk = psutil.disk_usage('/')
return jsonify({
'status': 'healthy',
'timestamp': datetime.now().isoformat(),
'system': {
'memory_usage_percent': memory.percent,
'disk_usage_percent': disk.percent,
'uptime': time.time()
},
'application': {
'status': 'running',
'version': '1.0.0'
}
})
except Exception as e:
return jsonify({
'status': 'error',
'message': str(e),
'timestamp': datetime.now().isoformat()
}), 500
@health_bp.route('/ping')
def ping():
"""Simple ping endpoint."""
return jsonify({
'status': 'ok',
'timestamp': datetime.now().isoformat()
})
@health_bp.route('/api/health')
def basic_health():
"""Basic health check endpoint for load balancers."""
return jsonify({
'status': 'healthy',
'timestamp': datetime.utcnow().isoformat(),
'service': 'aniworld-web'
})
@health_bp.route('/api/health/system')
def system_health():
"""Comprehensive system health check."""
def check_system_health():
try:
# System metrics
cpu_percent = psutil.cpu_percent(interval=1)
memory = psutil.virtual_memory()
disk = psutil.disk_usage('/')
# Process metrics
process = psutil.Process()
process_memory = process.memory_info()
return {
'status': 'healthy',
'timestamp': datetime.utcnow().isoformat(),
'system': {
'cpu_percent': cpu_percent,
'memory': {
'total_mb': memory.total / 1024 / 1024,
'available_mb': memory.available / 1024 / 1024,
'percent': memory.percent
},
'disk': {
'total_gb': disk.total / 1024 / 1024 / 1024,
'free_gb': disk.free / 1024 / 1024 / 1024,
'percent': (disk.used / disk.total) * 100
}
},
'process': {
'memory_mb': process_memory.rss / 1024 / 1024,
'threads': process.num_threads(),
'cpu_percent': process.cpu_percent()
}
}
except Exception as e:
return {
'status': 'unhealthy',
'error': str(e),
'timestamp': datetime.utcnow().isoformat()
}
return jsonify(get_cached_health_data('system', check_system_health))
@health_bp.route('/api/health/database')
def database_health():
"""Database connectivity and health check."""
def check_database_health():
try:
# Test database connection
start_time = time.time()
with database_manager.get_connection() as conn:
cursor = conn.execute("SELECT 1")
result = cursor.fetchone()
connection_time = (time.time() - start_time) * 1000 # ms
# Get database size and basic stats
db_size = os.path.getsize(database_manager.db_path) if os.path.exists(database_manager.db_path) else 0
# Check schema version
schema_version = database_manager.get_current_version()
# Get table counts
with database_manager.get_connection() as conn:
anime_count = conn.execute("SELECT COUNT(*) FROM anime_metadata").fetchone()[0]
episode_count = conn.execute("SELECT COUNT(*) FROM episode_metadata").fetchone()[0]
return {
'status': 'healthy',
'timestamp': datetime.utcnow().isoformat(),
'database': {
'connected': True,
'connection_time_ms': connection_time,
'size_mb': db_size / 1024 / 1024,
'schema_version': schema_version,
'tables': {
'anime_count': anime_count,
'episode_count': episode_count
}
}
}
except Exception as e:
return {
'status': 'unhealthy',
'timestamp': datetime.utcnow().isoformat(),
'database': {
'connected': False,
'error': str(e)
}
}
return jsonify(get_cached_health_data('database', check_database_health, ttl=60))
@health_bp.route('/api/health/dependencies')
def dependencies_health():
"""Check health of external dependencies."""
def check_dependencies():
dependencies = {
'status': 'healthy',
'timestamp': datetime.utcnow().isoformat(),
'dependencies': {}
}
# Check filesystem access
try:
anime_directory = getattr(config, 'anime_directory', '/app/data')
if os.path.exists(anime_directory):
# Test read/write access
test_file = os.path.join(anime_directory, '.health_check')
with open(test_file, 'w') as f:
f.write('test')
os.remove(test_file)
dependencies['dependencies']['filesystem'] = {
'status': 'healthy',
'path': anime_directory,
'accessible': True
}
else:
dependencies['dependencies']['filesystem'] = {
'status': 'unhealthy',
'path': anime_directory,
'accessible': False,
'error': 'Directory does not exist'
}
dependencies['status'] = 'degraded'
except Exception as e:
dependencies['dependencies']['filesystem'] = {
'status': 'unhealthy',
'error': str(e)
}
dependencies['status'] = 'degraded'
# Check network connectivity (basic)
try:
import socket
socket.create_connection(("8.8.8.8", 53), timeout=3)
dependencies['dependencies']['network'] = {
'status': 'healthy',
'connectivity': True
}
except Exception as e:
dependencies['dependencies']['network'] = {
'status': 'unhealthy',
'connectivity': False,
'error': str(e)
}
dependencies['status'] = 'degraded'
return dependencies
return jsonify(get_cached_health_data('dependencies', check_dependencies, ttl=120))
@health_bp.route('/api/health/performance')
def performance_health():
"""Performance metrics and health indicators."""
def check_performance():
try:
# Memory usage
memory_usage = memory_monitor.get_current_memory_usage() if memory_monitor else 0
is_memory_high = memory_monitor.is_memory_usage_high() if memory_monitor else False
# Thread count
process = psutil.Process()
thread_count = process.num_threads()
# Load average (if available)
load_avg = None
try:
load_avg = os.getloadavg()
except (AttributeError, OSError):
# Not available on all platforms
pass
# Check if performance is within acceptable limits
performance_status = 'healthy'
warnings = []
if is_memory_high:
performance_status = 'degraded'
warnings.append('High memory usage detected')
if thread_count > 100: # Arbitrary threshold
performance_status = 'degraded'
warnings.append(f'High thread count: {thread_count}')
if load_avg and load_avg[0] > 4: # Load average > 4
performance_status = 'degraded'
warnings.append(f'High system load: {load_avg[0]:.2f}')
return {
'status': performance_status,
'timestamp': datetime.utcnow().isoformat(),
'performance': {
'memory_usage_mb': memory_usage,
'memory_high': is_memory_high,
'thread_count': thread_count,
'load_average': load_avg,
'warnings': warnings
}
}
except Exception as e:
return {
'status': 'error',
'timestamp': datetime.utcnow().isoformat(),
'error': str(e)
}
return jsonify(get_cached_health_data('performance', check_performance, ttl=10))
@health_bp.route('/api/health/detailed')
def detailed_health():
"""Comprehensive health check combining all metrics."""
def check_detailed_health():
try:
# Get all health checks
system = get_cached_health_data('system', lambda: system_health().json)
database = get_cached_health_data('database', lambda: database_health().json)
dependencies = get_cached_health_data('dependencies', lambda: dependencies_health().json)
performance = get_cached_health_data('performance', lambda: performance_health().json)
# Determine overall status
statuses = [
system.get('status', 'unknown'),
database.get('status', 'unknown'),
dependencies.get('status', 'unknown'),
performance.get('status', 'unknown')
]
if 'unhealthy' in statuses or 'error' in statuses:
overall_status = 'unhealthy'
elif 'degraded' in statuses:
overall_status = 'degraded'
else:
overall_status = 'healthy'
return {
'status': overall_status,
'timestamp': datetime.utcnow().isoformat(),
'components': {
'system': system,
'database': database,
'dependencies': dependencies,
'performance': performance
}
}
except Exception as e:
return {
'status': 'error',
'timestamp': datetime.utcnow().isoformat(),
'error': str(e)
}
# Don't cache detailed health - always get fresh data
return jsonify(check_detailed_health())
@health_bp.route('/api/health/ready')
def readiness_probe():
"""Kubernetes readiness probe endpoint."""
try:
# Check critical dependencies
with database_manager.get_connection() as conn:
conn.execute("SELECT 1")
# Check if anime directory is accessible
anime_directory = getattr(config, 'anime_directory', '/app/data')
if not os.path.exists(anime_directory):
raise Exception(f"Anime directory not accessible: {anime_directory}")
return jsonify({
'status': 'ready',
'timestamp': datetime.utcnow().isoformat()
})
except Exception as e:
return jsonify({
'status': 'not_ready',
'timestamp': datetime.utcnow().isoformat(),
'error': str(e)
}), 503
@health_bp.route('/api/health/live')
def liveness_probe():
"""Kubernetes liveness probe endpoint."""
try:
# Basic liveness check - just verify the application is responding
return jsonify({
'status': 'alive',
'timestamp': datetime.utcnow().isoformat(),
'uptime_seconds': time.time() - psutil.Process().create_time()
})
except Exception as e:
return jsonify({
'status': 'dead',
'timestamp': datetime.utcnow().isoformat(),
'error': str(e)
}), 503
@health_bp.route('/api/health/metrics')
def prometheus_metrics():
"""Prometheus-compatible metrics endpoint."""
try:
# Generate Prometheus-format metrics
metrics = []
# System metrics
cpu_percent = psutil.cpu_percent()
memory = psutil.virtual_memory()
disk = psutil.disk_usage('/')
metrics.extend([
f"# HELP aniworld_cpu_usage_percent CPU usage percentage",
f"# TYPE aniworld_cpu_usage_percent gauge",
f"aniworld_cpu_usage_percent {cpu_percent}",
f"",
f"# HELP aniworld_memory_usage_percent Memory usage percentage",
f"# TYPE aniworld_memory_usage_percent gauge",
f"aniworld_memory_usage_percent {memory.percent}",
f"",
f"# HELP aniworld_disk_usage_percent Disk usage percentage",
f"# TYPE aniworld_disk_usage_percent gauge",
f"aniworld_disk_usage_percent {(disk.used / disk.total) * 100}",
f"",
])
# Database metrics
try:
with database_manager.get_connection() as conn:
anime_count = conn.execute("SELECT COUNT(*) FROM anime_metadata").fetchone()[0]
episode_count = conn.execute("SELECT COUNT(*) FROM episode_metadata").fetchone()[0]
metrics.extend([
f"# HELP aniworld_anime_total Total number of anime in database",
f"# TYPE aniworld_anime_total counter",
f"aniworld_anime_total {anime_count}",
f"",
f"# HELP aniworld_episodes_total Total number of episodes in database",
f"# TYPE aniworld_episodes_total counter",
f"aniworld_episodes_total {episode_count}",
f"",
])
except Exception:
pass
# Process metrics
process = psutil.Process()
metrics.extend([
f"# HELP aniworld_process_threads Number of threads in process",
f"# TYPE aniworld_process_threads gauge",
f"aniworld_process_threads {process.num_threads()}",
f"",
f"# HELP aniworld_process_memory_bytes Memory usage in bytes",
f"# TYPE aniworld_process_memory_bytes gauge",
f"aniworld_process_memory_bytes {process.memory_info().rss}",
f"",
])
return "\n".join(metrics), 200, {'Content-Type': 'text/plain; charset=utf-8'}
except Exception as e:
return f"# Error generating metrics: {e}", 500, {'Content-Type': 'text/plain'}
# Export the blueprint
__all__ = ['health_bp']

View File

@ -1,701 +0,0 @@
"""
Integrations API endpoints.
This module handles all external integration operations including:
- API key management
- Webhook configuration
- External service integrations
- Third-party API management
"""
from flask import Blueprint, request, jsonify
from typing import Dict, List, Any, Optional, Tuple
import logging
import requests
import json
import hmac
import hashlib
import time
from datetime import datetime, timedelta
# Import shared utilities
try:
from src.server.web.controllers.shared.auth_decorators import require_auth, optional_auth
from src.server.web.controllers.shared.error_handlers import handle_api_errors
from src.server.web.controllers.shared.validators import (
validate_json_input, validate_query_params, validate_pagination_params,
validate_id_parameter, is_valid_url
)
from src.server.web.controllers.shared.response_helpers import (
create_success_response, create_error_response, create_paginated_response
)
except ImportError:
# Fallback imports for development
def require_auth(f): return f
def optional_auth(f): return f
def handle_api_errors(f): return f
def validate_json_input(**kwargs): return lambda f: f
def validate_query_params(**kwargs): return lambda f: f
def validate_pagination_params(f): return f
def validate_id_parameter(param): return lambda f: f
def is_valid_url(url): return url.startswith(('http://', 'https://'))
def create_success_response(msg, code=200, data=None): return jsonify({'success': True, 'message': msg, 'data': data}), code
def create_error_response(msg, code=400, details=None): return jsonify({'error': msg, 'details': details}), code
def create_paginated_response(items, page, per_page, total, endpoint=None): return jsonify({'data': items, 'pagination': {'page': page, 'per_page': per_page, 'total': total}}), 200
# Import integration components
try:
from src.server.data.integration_manager import IntegrationManager
from src.server.data.webhook_manager import WebhookManager
from src.data.api_key_manager import APIKeyManager
except ImportError:
# Fallback for development
class IntegrationManager:
def get_all_integrations(self, **kwargs): return []
def get_integrations_count(self, **kwargs): return 0
def get_integration_by_id(self, id): return None
def create_integration(self, **kwargs): return 1
def update_integration(self, id, **kwargs): return True
def delete_integration(self, id): return True
def test_integration(self, id): return {'success': True, 'response_time': 0.1}
def get_integration_logs(self, id, **kwargs): return []
def trigger_integration(self, id, data): return {'success': True}
class WebhookManager:
def get_all_webhooks(self, **kwargs): return []
def get_webhooks_count(self, **kwargs): return 0
def get_webhook_by_id(self, id): return None
def create_webhook(self, **kwargs): return 1
def update_webhook(self, id, **kwargs): return True
def delete_webhook(self, id): return True
def test_webhook(self, id): return {'success': True, 'response_time': 0.1}
def get_webhook_deliveries(self, id, **kwargs): return []
def redeliver_webhook(self, delivery_id): return True
def trigger_webhook(self, event, data): return True
class APIKeyManager:
def get_external_api_keys(self, **kwargs): return []
def get_external_api_key_by_id(self, id): return None
def create_external_api_key(self, **kwargs): return 1
def update_external_api_key(self, id, **kwargs): return True
def delete_external_api_key(self, id): return True
def test_external_api_key(self, id): return {'success': True}
def rotate_external_api_key(self, id): return {'new_key': 'new_api_key'}
# Create blueprint
integrations_bp = Blueprint('integrations', __name__)
# Initialize managers
integration_manager = IntegrationManager()
webhook_manager = WebhookManager()
api_key_manager = APIKeyManager()
logger = logging.getLogger(__name__)
@integrations_bp.route('/integrations', methods=['GET'])
@require_auth
@handle_api_errors
@validate_query_params(
allowed_params=['page', 'per_page', 'type', 'status', 'sort_by', 'sort_order'],
param_types={'page': int, 'per_page': int}
)
@validate_pagination_params
def list_integrations() -> Tuple[Any, int]:
"""
List integrations with pagination and filtering.
Query Parameters:
- page: Page number (default: 1)
- per_page: Items per page (default: 20, max: 100)
- type: Filter by integration type
- status: Filter by integration status
- sort_by: Sort field (default: created_at)
- sort_order: Sort order (asc/desc, default: desc)
Returns:
JSON response with paginated integration list
"""
page = request.args.get('page', 1, type=int)
per_page = min(request.args.get('per_page', 20, type=int), 100)
integration_type = request.args.get('type')
status = request.args.get('status')
sort_by = request.args.get('sort_by', 'created_at')
sort_order = request.args.get('sort_order', 'desc')
offset = (page - 1) * per_page
# Get integrations
integrations = integration_manager.get_all_integrations(
offset=offset,
limit=per_page,
integration_type=integration_type,
status=status,
sort_by=sort_by,
sort_order=sort_order
)
# Get total count
total = integration_manager.get_integrations_count(
integration_type=integration_type,
status=status
)
return create_paginated_response(
integrations,
page,
per_page,
total,
endpoint='/api/v1/integrations'
)
@integrations_bp.route('/integrations/<int:integration_id>', methods=['GET'])
@require_auth
@handle_api_errors
@validate_id_parameter('integration_id')
def get_integration(integration_id: int) -> Tuple[Any, int]:
"""
Get specific integration by ID.
Args:
integration_id: Integration ID
Returns:
JSON response with integration data
"""
integration = integration_manager.get_integration_by_id(integration_id)
if not integration:
return create_error_response("Integration not found", 404)
return create_success_response("Integration retrieved successfully", 200, integration)
@integrations_bp.route('/integrations', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
required_fields=['name', 'type', 'config'],
optional_fields=['description', 'enabled'],
field_types={'name': str, 'type': str, 'config': dict, 'description': str, 'enabled': bool}
)
def create_integration() -> Tuple[Any, int]:
"""
Create a new integration.
Request Body:
- name: Integration name (required)
- type: Integration type (required)
- config: Integration configuration (required)
- description: Integration description (optional)
- enabled: Whether integration is enabled (optional, default: true)
Returns:
JSON response with created integration data
"""
data = request.get_json()
# Validate integration type
allowed_types = ['webhook', 'api', 'discord', 'slack', 'email', 'custom']
if data['type'] not in allowed_types:
return create_error_response(f"Invalid integration type. Must be one of: {', '.join(allowed_types)}", 400)
# Validate configuration based on type
config_errors = _validate_integration_config(data['type'], data['config'])
if config_errors:
return create_error_response("Configuration validation failed", 400, config_errors)
try:
# Create integration
integration_id = integration_manager.create_integration(
name=data['name'],
integration_type=data['type'],
config=data['config'],
description=data.get('description', ''),
enabled=data.get('enabled', True)
)
# Get created integration
integration = integration_manager.get_integration_by_id(integration_id)
logger.info(f"Created integration {integration_id}: {data['name']} ({data['type']})")
return create_success_response("Integration created successfully", 201, integration)
except Exception as e:
logger.error(f"Error creating integration: {str(e)}")
return create_error_response("Failed to create integration", 500)
@integrations_bp.route('/integrations/<int:integration_id>', methods=['PUT'])
@require_auth
@handle_api_errors
@validate_id_parameter('integration_id')
@validate_json_input(
optional_fields=['name', 'config', 'description', 'enabled'],
field_types={'name': str, 'config': dict, 'description': str, 'enabled': bool}
)
def update_integration(integration_id: int) -> Tuple[Any, int]:
"""
Update an integration.
Args:
integration_id: Integration ID
Request Body:
- name: Integration name (optional)
- config: Integration configuration (optional)
- description: Integration description (optional)
- enabled: Whether integration is enabled (optional)
Returns:
JSON response with update result
"""
integration = integration_manager.get_integration_by_id(integration_id)
if not integration:
return create_error_response("Integration not found", 404)
data = request.get_json()
# Validate configuration if provided
if 'config' in data:
config_errors = _validate_integration_config(integration['type'], data['config'])
if config_errors:
return create_error_response("Configuration validation failed", 400, config_errors)
try:
# Update integration
success = integration_manager.update_integration(integration_id, **data)
if success:
# Get updated integration
updated_integration = integration_manager.get_integration_by_id(integration_id)
logger.info(f"Updated integration {integration_id}")
return create_success_response("Integration updated successfully", 200, updated_integration)
else:
return create_error_response("Failed to update integration", 500)
except Exception as e:
logger.error(f"Error updating integration {integration_id}: {str(e)}")
return create_error_response("Failed to update integration", 500)
@integrations_bp.route('/integrations/<int:integration_id>', methods=['DELETE'])
@require_auth
@handle_api_errors
@validate_id_parameter('integration_id')
def delete_integration(integration_id: int) -> Tuple[Any, int]:
"""
Delete an integration.
Args:
integration_id: Integration ID
Returns:
JSON response with deletion result
"""
integration = integration_manager.get_integration_by_id(integration_id)
if not integration:
return create_error_response("Integration not found", 404)
try:
success = integration_manager.delete_integration(integration_id)
if success:
logger.info(f"Deleted integration {integration_id}: {integration['name']}")
return create_success_response("Integration deleted successfully")
else:
return create_error_response("Failed to delete integration", 500)
except Exception as e:
logger.error(f"Error deleting integration {integration_id}: {str(e)}")
return create_error_response("Failed to delete integration", 500)
@integrations_bp.route('/integrations/<int:integration_id>/test', methods=['POST'])
@require_auth
@handle_api_errors
@validate_id_parameter('integration_id')
def test_integration(integration_id: int) -> Tuple[Any, int]:
"""
Test an integration.
Args:
integration_id: Integration ID
Returns:
JSON response with test result
"""
integration = integration_manager.get_integration_by_id(integration_id)
if not integration:
return create_error_response("Integration not found", 404)
try:
test_result = integration_manager.test_integration(integration_id)
logger.info(f"Tested integration {integration_id}: {test_result}")
return create_success_response("Integration test completed", 200, test_result)
except Exception as e:
logger.error(f"Error testing integration {integration_id}: {str(e)}")
return create_error_response("Failed to test integration", 500)
@integrations_bp.route('/integrations/<int:integration_id>/trigger', methods=['POST'])
@require_auth
@handle_api_errors
@validate_id_parameter('integration_id')
@validate_json_input(
optional_fields=['data'],
field_types={'data': dict}
)
def trigger_integration(integration_id: int) -> Tuple[Any, int]:
"""
Manually trigger an integration.
Args:
integration_id: Integration ID
Request Body:
- data: Custom data to send with trigger (optional)
Returns:
JSON response with trigger result
"""
integration = integration_manager.get_integration_by_id(integration_id)
if not integration:
return create_error_response("Integration not found", 404)
if not integration['enabled']:
return create_error_response("Integration is disabled", 400)
data = request.get_json() or {}
trigger_data = data.get('data', {})
try:
result = integration_manager.trigger_integration(integration_id, trigger_data)
logger.info(f"Triggered integration {integration_id}")
return create_success_response("Integration triggered successfully", 200, result)
except Exception as e:
logger.error(f"Error triggering integration {integration_id}: {str(e)}")
return create_error_response("Failed to trigger integration", 500)
@integrations_bp.route('/integrations/<int:integration_id>/logs', methods=['GET'])
@require_auth
@handle_api_errors
@validate_id_parameter('integration_id')
@validate_query_params(
allowed_params=['page', 'per_page', 'level'],
param_types={'page': int, 'per_page': int}
)
@validate_pagination_params
def get_integration_logs(integration_id: int) -> Tuple[Any, int]:
"""
Get integration execution logs.
Args:
integration_id: Integration ID
Query Parameters:
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 200)
- level: Log level filter (optional)
Returns:
JSON response with integration logs
"""
integration = integration_manager.get_integration_by_id(integration_id)
if not integration:
return create_error_response("Integration not found", 404)
page = request.args.get('page', 1, type=int)
per_page = min(request.args.get('per_page', 50, type=int), 200)
level = request.args.get('level')
offset = (page - 1) * per_page
try:
logs = integration_manager.get_integration_logs(
integration_id,
offset=offset,
limit=per_page,
level=level
)
# For pagination, we'd need a count method
total = len(logs) # Simplified for this example
return create_paginated_response(
logs,
page,
per_page,
total,
endpoint=f'/api/v1/integrations/{integration_id}/logs'
)
except Exception as e:
logger.error(f"Error getting integration logs for {integration_id}: {str(e)}")
return create_error_response("Failed to get integration logs", 500)
@integrations_bp.route('/webhooks', methods=['GET'])
@require_auth
@handle_api_errors
@validate_query_params(
allowed_params=['page', 'per_page', 'event', 'status'],
param_types={'page': int, 'per_page': int}
)
@validate_pagination_params
def list_webhooks() -> Tuple[Any, int]:
"""
List webhooks with pagination and filtering.
Query Parameters:
- page: Page number (default: 1)
- per_page: Items per page (default: 20, max: 100)
- event: Filter by event type
- status: Filter by webhook status
Returns:
JSON response with paginated webhook list
"""
page = request.args.get('page', 1, type=int)
per_page = min(request.args.get('per_page', 20, type=int), 100)
event = request.args.get('event')
status = request.args.get('status')
offset = (page - 1) * per_page
# Get webhooks
webhooks = webhook_manager.get_all_webhooks(
offset=offset,
limit=per_page,
event=event,
status=status
)
# Get total count
total = webhook_manager.get_webhooks_count(
event=event,
status=status
)
return create_paginated_response(
webhooks,
page,
per_page,
total,
endpoint='/api/v1/webhooks'
)
@integrations_bp.route('/webhooks', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
required_fields=['url', 'events'],
optional_fields=['name', 'secret', 'enabled', 'retry_config'],
field_types={'url': str, 'events': list, 'name': str, 'secret': str, 'enabled': bool, 'retry_config': dict}
)
def create_webhook() -> Tuple[Any, int]:
"""
Create a new webhook.
Request Body:
- url: Webhook URL (required)
- events: List of events to subscribe to (required)
- name: Webhook name (optional)
- secret: Webhook secret for signature verification (optional)
- enabled: Whether webhook is enabled (optional, default: true)
- retry_config: Retry configuration (optional)
Returns:
JSON response with created webhook data
"""
data = request.get_json()
# Validate URL
if not is_valid_url(data['url']):
return create_error_response("Invalid webhook URL", 400)
# Validate events
allowed_events = [
'anime.created', 'anime.updated', 'anime.deleted',
'episode.created', 'episode.updated', 'episode.deleted',
'download.started', 'download.completed', 'download.failed',
'backup.created', 'backup.restored', 'system.error'
]
invalid_events = [event for event in data['events'] if event not in allowed_events]
if invalid_events:
return create_error_response(f"Invalid events: {', '.join(invalid_events)}", 400)
try:
# Create webhook
webhook_id = webhook_manager.create_webhook(
url=data['url'],
events=data['events'],
name=data.get('name', ''),
secret=data.get('secret', ''),
enabled=data.get('enabled', True),
retry_config=data.get('retry_config', {})
)
# Get created webhook
webhook = webhook_manager.get_webhook_by_id(webhook_id)
logger.info(f"Created webhook {webhook_id}: {data['url']}")
return create_success_response("Webhook created successfully", 201, webhook)
except Exception as e:
logger.error(f"Error creating webhook: {str(e)}")
return create_error_response("Failed to create webhook", 500)
@integrations_bp.route('/webhooks/<int:webhook_id>/test', methods=['POST'])
@require_auth
@handle_api_errors
@validate_id_parameter('webhook_id')
def test_webhook(webhook_id: int) -> Tuple[Any, int]:
"""
Test a webhook.
Args:
webhook_id: Webhook ID
Returns:
JSON response with test result
"""
webhook = webhook_manager.get_webhook_by_id(webhook_id)
if not webhook:
return create_error_response("Webhook not found", 404)
try:
test_result = webhook_manager.test_webhook(webhook_id)
logger.info(f"Tested webhook {webhook_id}: {test_result}")
return create_success_response("Webhook test completed", 200, test_result)
except Exception as e:
logger.error(f"Error testing webhook {webhook_id}: {str(e)}")
return create_error_response("Failed to test webhook", 500)
@integrations_bp.route('/api-keys/external', methods=['GET'])
@require_auth
@handle_api_errors
@validate_pagination_params
def list_external_api_keys() -> Tuple[Any, int]:
"""
List external API keys.
Returns:
JSON response with external API keys
"""
try:
api_keys = api_key_manager.get_external_api_keys()
return create_success_response("External API keys retrieved successfully", 200, api_keys)
except Exception as e:
logger.error(f"Error getting external API keys: {str(e)}")
return create_error_response("Failed to get external API keys", 500)
@integrations_bp.route('/api-keys/external', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
required_fields=['service', 'key'],
optional_fields=['name', 'description'],
field_types={'service': str, 'key': str, 'name': str, 'description': str}
)
def create_external_api_key() -> Tuple[Any, int]:
"""
Store external API key.
Request Body:
- service: Service name (required)
- key: API key value (required)
- name: Key name (optional)
- description: Key description (optional)
Returns:
JSON response with created API key data
"""
data = request.get_json()
try:
# Create external API key
key_id = api_key_manager.create_external_api_key(
service=data['service'],
key=data['key'],
name=data.get('name', ''),
description=data.get('description', '')
)
# Get created key (without exposing the actual key)
api_key = api_key_manager.get_external_api_key_by_id(key_id)
logger.info(f"Created external API key {key_id} for service: {data['service']}")
return create_success_response("External API key created successfully", 201, api_key)
except Exception as e:
logger.error(f"Error creating external API key: {str(e)}")
return create_error_response("Failed to create external API key", 500)
def _validate_integration_config(integration_type: str, config: Dict[str, Any]) -> List[str]:
"""
Validate integration configuration based on type.
Args:
integration_type: Type of integration
config: Configuration dictionary
Returns:
List of validation errors (empty if valid)
"""
errors = []
if integration_type == 'webhook':
if 'url' not in config:
errors.append("Webhook URL is required")
elif not is_valid_url(config['url']):
errors.append("Invalid webhook URL")
elif integration_type == 'discord':
if 'webhook_url' not in config:
errors.append("Discord webhook URL is required")
elif not config['webhook_url'].startswith('https://discord.com/api/webhooks/'):
errors.append("Invalid Discord webhook URL")
elif integration_type == 'slack':
if 'webhook_url' not in config:
errors.append("Slack webhook URL is required")
elif not config['webhook_url'].startswith('https://hooks.slack.com/'):
errors.append("Invalid Slack webhook URL")
elif integration_type == 'email':
required_fields = ['smtp_host', 'smtp_port', 'from_email']
for field in required_fields:
if field not in config:
errors.append(f"{field} is required for email integration")
elif integration_type == 'api':
if 'base_url' not in config:
errors.append("Base URL is required for API integration")
elif not is_valid_url(config['base_url']):
errors.append("Invalid API base URL")
return errors

View File

@ -1,268 +0,0 @@
"""
API endpoints for logging configuration and management.
"""
from flask import Blueprint, jsonify, request, send_file
from web.controllers.auth_controller import require_auth
from config import config
import logging
import os
from datetime import datetime
logger = logging.getLogger(__name__)
logging_bp = Blueprint('logging', __name__, url_prefix='/api/logging')
@logging_bp.route('/config', methods=['GET'])
@require_auth
def get_logging_config():
"""Get current logging configuration."""
try:
# Import here to avoid circular imports
from src.infrastructure.logging.GlobalLogger import error_logger
config_data = {
'log_level': config.log_level,
'enable_console_logging': config.enable_console_logging,
'enable_console_progress': config.enable_console_progress,
'enable_fail2ban_logging': config.enable_fail2ban_logging,
'log_files': [
'./logs/aniworld.log',
'./logs/auth_failures.log',
'./logs/downloads.log'
]
}
return jsonify({
'success': True,
'config': config_data
})
except Exception as e:
logger.error(f"Error getting logging config: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@logging_bp.route('/config', methods=['POST'])
@require_auth
def update_logging_config():
"""Update logging configuration."""
try:
data = request.get_json() or {}
# Update log level
log_level = data.get('log_level', config.log_level)
if log_level in ['DEBUG', 'INFO', 'WARNING', 'ERROR', 'CRITICAL']:
config.log_level = log_level
# Update console logging settings
if 'enable_console_logging' in data:
config.enable_console_logging = bool(data['enable_console_logging'])
if 'enable_console_progress' in data:
config.enable_console_progress = bool(data['enable_console_progress'])
if 'enable_fail2ban_logging' in data:
config.enable_fail2ban_logging = bool(data['enable_fail2ban_logging'])
# Save configuration
config.save_config()
# Update runtime logging level
try:
from src.infrastructure.logging.GlobalLogger import error_logger
# Use standard logging level update
numeric_level = getattr(logging, config.log_level.upper(), logging.INFO)
logging.getLogger().setLevel(numeric_level)
except ImportError:
# Fallback for basic logging
numeric_level = getattr(logging, config.log_level.upper(), logging.INFO)
logging.getLogger().setLevel(numeric_level)
logger.info(f"Logging configuration updated: level={config.log_level}, console={config.enable_console_logging}")
return jsonify({
'success': True,
'message': 'Logging configuration updated successfully',
'config': {
'log_level': config.log_level,
'enable_console_logging': config.enable_console_logging,
'enable_console_progress': config.enable_console_progress,
'enable_fail2ban_logging': config.enable_fail2ban_logging
}
})
except Exception as e:
logger.error(f"Error updating logging config: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@logging_bp.route('/files', methods=['GET'])
@require_auth
def list_log_files():
"""Get list of available log files."""
try:
from src.infrastructure.logging.GlobalLogger import error_logger
# Return basic log files
log_files = [
'./logs/aniworld.log',
'./logs/auth_failures.log',
'./logs/downloads.log'
]
return jsonify({
'success': True,
'files': log_files
})
except Exception as e:
logger.error(f"Error listing log files: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@logging_bp.route('/files/<filename>/download', methods=['GET'])
@require_auth
def download_log_file(filename):
"""Download a specific log file."""
try:
# Security: Only allow log files
if not filename.endswith('.log'):
return jsonify({
'success': False,
'error': 'Invalid file type'
}), 400
log_directory = "logs"
file_path = os.path.join(log_directory, filename)
# Security: Check if file exists and is within log directory
if not os.path.exists(file_path) or not os.path.abspath(file_path).startswith(os.path.abspath(log_directory)):
return jsonify({
'success': False,
'error': 'File not found'
}), 404
return send_file(
file_path,
as_attachment=True,
download_name=f"{filename}_{datetime.now().strftime('%Y%m%d_%H%M%S')}"
)
except Exception as e:
logger.error(f"Error downloading log file {filename}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@logging_bp.route('/files/<filename>/tail', methods=['GET'])
@require_auth
def tail_log_file(filename):
"""Get the last N lines from a log file."""
try:
# Security: Only allow log files
if not filename.endswith('.log'):
return jsonify({
'success': False,
'error': 'Invalid file type'
}), 400
lines = int(request.args.get('lines', 100))
lines = min(lines, 1000) # Limit to 1000 lines max
log_directory = "logs"
file_path = os.path.join(log_directory, filename)
# Security: Check if file exists and is within log directory
if not os.path.exists(file_path) or not os.path.abspath(file_path).startswith(os.path.abspath(log_directory)):
return jsonify({
'success': False,
'error': 'File not found'
}), 404
# Read last N lines
with open(file_path, 'r', encoding='utf-8') as f:
all_lines = f.readlines()
tail_lines = all_lines[-lines:] if len(all_lines) > lines else all_lines
return jsonify({
'success': True,
'lines': [line.rstrip('\n\r') for line in tail_lines],
'total_lines': len(all_lines),
'showing_lines': len(tail_lines)
})
except Exception as e:
logger.error(f"Error tailing log file {filename}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@logging_bp.route('/cleanup', methods=['POST'])
@require_auth
def cleanup_logs():
"""Clean up old log files."""
try:
data = request.get_json() or {}
days = int(data.get('days', 30))
days = max(1, min(days, 365)) # Limit between 1-365 days
from src.infrastructure.logging.GlobalLogger import error_logger
# Since we don't have log_config.cleanup_old_logs(), simulate the cleanup
cleaned_files = [] # Would implement actual cleanup logic here
logger.info(f"Cleaned up {len(cleaned_files)} old log files (older than {days} days)")
return jsonify({
'success': True,
'message': f'Cleaned up {len(cleaned_files)} log files',
'cleaned_files': cleaned_files
})
except Exception as e:
logger.error(f"Error cleaning up logs: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@logging_bp.route('/test', methods=['POST'])
@require_auth
def test_logging():
"""Test logging at different levels."""
try:
test_message = "Test log message from web interface"
# Test different log levels
logger.debug(f"DEBUG: {test_message}")
logger.info(f"INFO: {test_message}")
logger.warning(f"WARNING: {test_message}")
logger.error(f"ERROR: {test_message}")
# Test fail2ban logging
try:
from src.infrastructure.logging.GlobalLogger import error_logger
# log_auth_failure would be implemented here
pass
except ImportError:
pass
# Test download progress logging
try:
from src.infrastructure.logging.GlobalLogger import error_logger
# log_download_progress would be implemented here
pass
except ImportError:
pass
return jsonify({
'success': True,
'message': 'Test messages logged successfully'
})
except Exception as e:
logger.error(f"Error testing logging: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500

View File

@ -1,656 +0,0 @@
"""
Maintenance API endpoints.
This module handles all system maintenance operations including:
- Database maintenance
- System optimization
- Cleanup operations
- Scheduled maintenance tasks
"""
from flask import Blueprint, request, jsonify
from typing import Dict, List, Any, Optional, Tuple
import logging
import os
import time
import sqlite3
from datetime import datetime, timedelta
# Import shared utilities
try:
from src.server.web.controllers.shared.auth_decorators import require_auth
from src.server.web.controllers.shared.error_handlers import handle_api_errors
from src.server.web.controllers.shared.validators import validate_json_input, validate_query_params
from src.server.web.controllers.shared.response_helpers import (
create_success_response, create_error_response, format_file_size, format_datetime
)
except ImportError:
# Fallback imports for development
def require_auth(f): return f
def handle_api_errors(f): return f
def validate_json_input(**kwargs): return lambda f: f
def validate_query_params(**kwargs): return lambda f: f
def create_success_response(msg, code=200, data=None): return jsonify({'success': True, 'message': msg, 'data': data}), code
def create_error_response(msg, code=400, details=None): return jsonify({'error': msg, 'details': details}), code
def format_file_size(size): return f"{size} bytes"
def format_datetime(dt): return str(dt) if dt else None
# Import maintenance components
try:
from src.server.data.database_manager import DatabaseManager
from src.server.data.cleanup_manager import CleanupManager
from src.server.data.scheduler_manager import SchedulerManager
except ImportError:
# Fallback for development
class DatabaseManager:
def vacuum_database(self): return {'size_before': 1000000, 'size_after': 800000, 'time_taken': 5.2}
def analyze_database(self): return {'tables_analyzed': 10, 'time_taken': 2.1}
def integrity_check(self): return {'status': 'ok', 'errors': [], 'warnings': []}
def reindex_database(self): return {'indexes_rebuilt': 15, 'time_taken': 3.5}
def get_database_stats(self): return {'size': 10000000, 'tables': 10, 'indexes': 15}
def optimize_database(self): return {'optimizations': ['vacuum', 'analyze', 'reindex'], 'time_taken': 10.7}
def backup_database(self, path): return {'backup_file': path, 'size': 5000000}
def get_slow_queries(self, **kwargs): return []
class CleanupManager:
def cleanup_temp_files(self): return {'files_deleted': 50, 'space_freed': 1048576}
def cleanup_logs(self, **kwargs): return {'logs_deleted': 100, 'space_freed': 2097152}
def cleanup_downloads(self, **kwargs): return {'downloads_cleaned': 25, 'space_freed': 5242880}
def cleanup_cache(self): return {'cache_cleared': True, 'space_freed': 10485760}
def cleanup_old_backups(self, **kwargs): return {'backups_deleted': 5, 'space_freed': 52428800}
def get_cleanup_stats(self): return {'temp_files': 100, 'log_files': 200, 'cache_size': 50000000}
class SchedulerManager:
def get_scheduled_tasks(self): return []
def create_scheduled_task(self, **kwargs): return 1
def update_scheduled_task(self, id, **kwargs): return True
def delete_scheduled_task(self, id): return True
def get_task_history(self, **kwargs): return []
# Create blueprint
maintenance_bp = Blueprint('maintenance', __name__)
# Initialize managers
database_manager = DatabaseManager()
cleanup_manager = CleanupManager()
scheduler_manager = SchedulerManager()
logger = logging.getLogger(__name__)
@maintenance_bp.route('/maintenance/database/vacuum', methods=['POST'])
@require_auth
@handle_api_errors
def vacuum_database() -> Tuple[Any, int]:
"""
Vacuum the database to reclaim space and optimize performance.
Returns:
JSON response with vacuum operation results
"""
try:
logger.info("Starting database vacuum operation")
start_time = time.time()
result = database_manager.vacuum_database()
operation_time = time.time() - start_time
result['operation_time'] = round(operation_time, 2)
space_saved = result.get('size_before', 0) - result.get('size_after', 0)
result['space_saved'] = format_file_size(space_saved)
logger.info(f"Database vacuum completed in {operation_time:.2f} seconds, saved {space_saved} bytes")
return create_success_response("Database vacuum completed successfully", 200, result)
except Exception as e:
logger.error(f"Error during database vacuum: {str(e)}")
return create_error_response("Database vacuum failed", 500)
@maintenance_bp.route('/maintenance/database/analyze', methods=['POST'])
@require_auth
@handle_api_errors
def analyze_database() -> Tuple[Any, int]:
"""
Analyze the database to update query planner statistics.
Returns:
JSON response with analyze operation results
"""
try:
logger.info("Starting database analyze operation")
start_time = time.time()
result = database_manager.analyze_database()
operation_time = time.time() - start_time
result['operation_time'] = round(operation_time, 2)
logger.info(f"Database analyze completed in {operation_time:.2f} seconds")
return create_success_response("Database analyze completed successfully", 200, result)
except Exception as e:
logger.error(f"Error during database analyze: {str(e)}")
return create_error_response("Database analyze failed", 500)
@maintenance_bp.route('/maintenance/database/integrity-check', methods=['POST'])
@require_auth
@handle_api_errors
def integrity_check() -> Tuple[Any, int]:
"""
Perform database integrity check.
Returns:
JSON response with integrity check results
"""
try:
logger.info("Starting database integrity check")
start_time = time.time()
result = database_manager.integrity_check()
operation_time = time.time() - start_time
result['operation_time'] = round(operation_time, 2)
result['timestamp'] = datetime.now().isoformat()
if result['status'] == 'ok':
logger.info(f"Database integrity check passed in {operation_time:.2f} seconds")
return create_success_response("Database integrity check passed", 200, result)
else:
logger.warning(f"Database integrity check found issues: {result['errors']}")
return create_success_response("Database integrity check completed with issues", 200, result)
except Exception as e:
logger.error(f"Error during database integrity check: {str(e)}")
return create_error_response("Database integrity check failed", 500)
@maintenance_bp.route('/maintenance/database/reindex', methods=['POST'])
@require_auth
@handle_api_errors
def reindex_database() -> Tuple[Any, int]:
"""
Rebuild database indexes for optimal performance.
Returns:
JSON response with reindex operation results
"""
try:
logger.info("Starting database reindex operation")
start_time = time.time()
result = database_manager.reindex_database()
operation_time = time.time() - start_time
result['operation_time'] = round(operation_time, 2)
logger.info(f"Database reindex completed in {operation_time:.2f} seconds, rebuilt {result.get('indexes_rebuilt', 0)} indexes")
return create_success_response("Database reindex completed successfully", 200, result)
except Exception as e:
logger.error(f"Error during database reindex: {str(e)}")
return create_error_response("Database reindex failed", 500)
@maintenance_bp.route('/maintenance/database/optimize', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
optional_fields=['operations', 'force'],
field_types={'operations': list, 'force': bool}
)
def optimize_database() -> Tuple[Any, int]:
"""
Perform comprehensive database optimization.
Request Body:
- operations: List of operations to perform (optional, default: all)
- force: Force optimization even if recently performed (optional, default: false)
Returns:
JSON response with optimization results
"""
data = request.get_json() or {}
operations = data.get('operations', ['vacuum', 'analyze', 'reindex'])
force = data.get('force', False)
# Validate operations
allowed_operations = ['vacuum', 'analyze', 'reindex', 'integrity_check']
invalid_operations = [op for op in operations if op not in allowed_operations]
if invalid_operations:
return create_error_response(f"Invalid operations: {', '.join(invalid_operations)}", 400)
try:
logger.info(f"Starting database optimization with operations: {operations}")
start_time = time.time()
result = database_manager.optimize_database(
operations=operations,
force=force
)
operation_time = time.time() - start_time
result['operation_time'] = round(operation_time, 2)
result['timestamp'] = datetime.now().isoformat()
logger.info(f"Database optimization completed in {operation_time:.2f} seconds")
return create_success_response("Database optimization completed successfully", 200, result)
except Exception as e:
logger.error(f"Error during database optimization: {str(e)}")
return create_error_response("Database optimization failed", 500)
@maintenance_bp.route('/maintenance/database/stats', methods=['GET'])
@require_auth
@handle_api_errors
def get_database_stats() -> Tuple[Any, int]:
"""
Get database statistics and health information.
Returns:
JSON response with database statistics
"""
try:
stats = database_manager.get_database_stats()
# Add formatted values
if 'size' in stats:
stats['size_formatted'] = format_file_size(stats['size'])
# Add slow queries
slow_queries = database_manager.get_slow_queries(limit=10)
stats['slow_queries'] = slow_queries
return create_success_response("Database statistics retrieved successfully", 200, stats)
except Exception as e:
logger.error(f"Error getting database stats: {str(e)}")
return create_error_response("Failed to get database statistics", 500)
@maintenance_bp.route('/maintenance/cleanup/temp-files', methods=['POST'])
@require_auth
@handle_api_errors
def cleanup_temp_files() -> Tuple[Any, int]:
"""
Clean up temporary files.
Returns:
JSON response with cleanup results
"""
try:
logger.info("Starting temporary files cleanup")
result = cleanup_manager.cleanup_temp_files()
result['space_freed_formatted'] = format_file_size(result.get('space_freed', 0))
result['timestamp'] = datetime.now().isoformat()
logger.info(f"Temporary files cleanup completed: {result['files_deleted']} files deleted, {result['space_freed']} bytes freed")
return create_success_response("Temporary files cleanup completed", 200, result)
except Exception as e:
logger.error(f"Error during temp files cleanup: {str(e)}")
return create_error_response("Temporary files cleanup failed", 500)
@maintenance_bp.route('/maintenance/cleanup/logs', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
optional_fields=['older_than_days', 'keep_recent'],
field_types={'older_than_days': int, 'keep_recent': int}
)
def cleanup_logs() -> Tuple[Any, int]:
"""
Clean up old log files.
Request Body:
- older_than_days: Delete logs older than this many days (optional, default: 30)
- keep_recent: Number of recent log files to keep (optional, default: 10)
Returns:
JSON response with cleanup results
"""
data = request.get_json() or {}
older_than_days = data.get('older_than_days', 30)
keep_recent = data.get('keep_recent', 10)
try:
logger.info(f"Starting log cleanup: older than {older_than_days} days, keep {keep_recent} recent")
result = cleanup_manager.cleanup_logs(
older_than_days=older_than_days,
keep_recent=keep_recent
)
result['space_freed_formatted'] = format_file_size(result.get('space_freed', 0))
result['timestamp'] = datetime.now().isoformat()
logger.info(f"Log cleanup completed: {result['logs_deleted']} logs deleted, {result['space_freed']} bytes freed")
return create_success_response("Log cleanup completed", 200, result)
except Exception as e:
logger.error(f"Error during log cleanup: {str(e)}")
return create_error_response("Log cleanup failed", 500)
@maintenance_bp.route('/maintenance/cleanup/downloads', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
optional_fields=['remove_failed', 'remove_incomplete', 'older_than_days'],
field_types={'remove_failed': bool, 'remove_incomplete': bool, 'older_than_days': int}
)
def cleanup_downloads() -> Tuple[Any, int]:
"""
Clean up download files and records.
Request Body:
- remove_failed: Remove failed downloads (optional, default: true)
- remove_incomplete: Remove incomplete downloads (optional, default: false)
- older_than_days: Remove downloads older than this many days (optional)
Returns:
JSON response with cleanup results
"""
data = request.get_json() or {}
remove_failed = data.get('remove_failed', True)
remove_incomplete = data.get('remove_incomplete', False)
older_than_days = data.get('older_than_days')
try:
logger.info(f"Starting download cleanup: failed={remove_failed}, incomplete={remove_incomplete}, older_than={older_than_days}")
result = cleanup_manager.cleanup_downloads(
remove_failed=remove_failed,
remove_incomplete=remove_incomplete,
older_than_days=older_than_days
)
result['space_freed_formatted'] = format_file_size(result.get('space_freed', 0))
result['timestamp'] = datetime.now().isoformat()
logger.info(f"Download cleanup completed: {result['downloads_cleaned']} downloads cleaned, {result['space_freed']} bytes freed")
return create_success_response("Download cleanup completed", 200, result)
except Exception as e:
logger.error(f"Error during download cleanup: {str(e)}")
return create_error_response("Download cleanup failed", 500)
@maintenance_bp.route('/maintenance/cleanup/cache', methods=['POST'])
@require_auth
@handle_api_errors
def cleanup_cache() -> Tuple[Any, int]:
"""
Clear application cache.
Returns:
JSON response with cleanup results
"""
try:
logger.info("Starting cache cleanup")
result = cleanup_manager.cleanup_cache()
result['space_freed_formatted'] = format_file_size(result.get('space_freed', 0))
result['timestamp'] = datetime.now().isoformat()
logger.info(f"Cache cleanup completed: {result['space_freed']} bytes freed")
return create_success_response("Cache cleanup completed", 200, result)
except Exception as e:
logger.error(f"Error during cache cleanup: {str(e)}")
return create_error_response("Cache cleanup failed", 500)
@maintenance_bp.route('/maintenance/cleanup/backups', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
optional_fields=['keep_count', 'older_than_days'],
field_types={'keep_count': int, 'older_than_days': int}
)
def cleanup_old_backups() -> Tuple[Any, int]:
"""
Clean up old backup files.
Request Body:
- keep_count: Number of recent backups to keep (optional, default: 10)
- older_than_days: Delete backups older than this many days (optional, default: 90)
Returns:
JSON response with cleanup results
"""
data = request.get_json() or {}
keep_count = data.get('keep_count', 10)
older_than_days = data.get('older_than_days', 90)
try:
logger.info(f"Starting backup cleanup: keep {keep_count} backups, older than {older_than_days} days")
result = cleanup_manager.cleanup_old_backups(
keep_count=keep_count,
older_than_days=older_than_days
)
result['space_freed_formatted'] = format_file_size(result.get('space_freed', 0))
result['timestamp'] = datetime.now().isoformat()
logger.info(f"Backup cleanup completed: {result['backups_deleted']} backups deleted, {result['space_freed']} bytes freed")
return create_success_response("Backup cleanup completed", 200, result)
except Exception as e:
logger.error(f"Error during backup cleanup: {str(e)}")
return create_error_response("Backup cleanup failed", 500)
@maintenance_bp.route('/maintenance/cleanup/stats', methods=['GET'])
@require_auth
@handle_api_errors
def get_cleanup_stats() -> Tuple[Any, int]:
"""
Get cleanup statistics and recommendations.
Returns:
JSON response with cleanup statistics
"""
try:
stats = cleanup_manager.get_cleanup_stats()
# Add formatted sizes
for key in ['temp_files_size', 'log_files_size', 'cache_size', 'old_backups_size']:
if key in stats:
stats[f"{key}_formatted"] = format_file_size(stats[key])
# Add recommendations
recommendations = []
if stats.get('temp_files', 0) > 100:
recommendations.append("Consider cleaning temporary files")
if stats.get('log_files_size', 0) > 100 * 1024 * 1024: # 100MB
recommendations.append("Consider cleaning old log files")
if stats.get('cache_size', 0) > 500 * 1024 * 1024: # 500MB
recommendations.append("Consider clearing cache")
stats['recommendations'] = recommendations
return create_success_response("Cleanup statistics retrieved successfully", 200, stats)
except Exception as e:
logger.error(f"Error getting cleanup stats: {str(e)}")
return create_error_response("Failed to get cleanup statistics", 500)
@maintenance_bp.route('/maintenance/scheduled-tasks', methods=['GET'])
@require_auth
@handle_api_errors
def get_scheduled_tasks() -> Tuple[Any, int]:
"""
Get scheduled maintenance tasks.
Returns:
JSON response with scheduled tasks
"""
try:
tasks = scheduler_manager.get_scheduled_tasks()
return create_success_response("Scheduled tasks retrieved successfully", 200, tasks)
except Exception as e:
logger.error(f"Error getting scheduled tasks: {str(e)}")
return create_error_response("Failed to get scheduled tasks", 500)
@maintenance_bp.route('/maintenance/scheduled-tasks', methods=['POST'])
@require_auth
@handle_api_errors
@validate_json_input(
required_fields=['name', 'task_type', 'schedule'],
optional_fields=['config', 'enabled'],
field_types={'name': str, 'task_type': str, 'schedule': str, 'config': dict, 'enabled': bool}
)
def create_scheduled_task() -> Tuple[Any, int]:
"""
Create a new scheduled maintenance task.
Request Body:
- name: Task name (required)
- task_type: Type of task (required)
- schedule: Cron-style schedule (required)
- config: Task configuration (optional)
- enabled: Whether task is enabled (optional, default: true)
Returns:
JSON response with created task
"""
data = request.get_json()
# Validate task type
allowed_task_types = [
'database_vacuum', 'database_analyze', 'cleanup_temp_files',
'cleanup_logs', 'cleanup_downloads', 'cleanup_cache', 'backup_database'
]
if data['task_type'] not in allowed_task_types:
return create_error_response(f"Invalid task type. Must be one of: {', '.join(allowed_task_types)}", 400)
try:
task_id = scheduler_manager.create_scheduled_task(
name=data['name'],
task_type=data['task_type'],
schedule=data['schedule'],
config=data.get('config', {}),
enabled=data.get('enabled', True)
)
logger.info(f"Created scheduled task {task_id}: {data['name']} ({data['task_type']})")
return create_success_response("Scheduled task created successfully", 201, {'id': task_id})
except Exception as e:
logger.error(f"Error creating scheduled task: {str(e)}")
return create_error_response("Failed to create scheduled task", 500)
@maintenance_bp.route('/maintenance/scheduled-tasks/<int:task_id>', methods=['PUT'])
@require_auth
@handle_api_errors
@validate_json_input(
optional_fields=['name', 'schedule', 'config', 'enabled'],
field_types={'name': str, 'schedule': str, 'config': dict, 'enabled': bool}
)
def update_scheduled_task(task_id: int) -> Tuple[Any, int]:
"""
Update a scheduled maintenance task.
Args:
task_id: Task ID
Request Body:
- name: Task name (optional)
- schedule: Cron-style schedule (optional)
- config: Task configuration (optional)
- enabled: Whether task is enabled (optional)
Returns:
JSON response with update result
"""
data = request.get_json()
try:
success = scheduler_manager.update_scheduled_task(task_id, **data)
if success:
logger.info(f"Updated scheduled task {task_id}")
return create_success_response("Scheduled task updated successfully")
else:
return create_error_response("Scheduled task not found", 404)
except Exception as e:
logger.error(f"Error updating scheduled task {task_id}: {str(e)}")
return create_error_response("Failed to update scheduled task", 500)
@maintenance_bp.route('/maintenance/scheduled-tasks/<int:task_id>', methods=['DELETE'])
@require_auth
@handle_api_errors
def delete_scheduled_task(task_id: int) -> Tuple[Any, int]:
"""
Delete a scheduled maintenance task.
Args:
task_id: Task ID
Returns:
JSON response with deletion result
"""
try:
success = scheduler_manager.delete_scheduled_task(task_id)
if success:
logger.info(f"Deleted scheduled task {task_id}")
return create_success_response("Scheduled task deleted successfully")
else:
return create_error_response("Scheduled task not found", 404)
except Exception as e:
logger.error(f"Error deleting scheduled task {task_id}: {str(e)}")
return create_error_response("Failed to delete scheduled task", 500)
@maintenance_bp.route('/maintenance/history', methods=['GET'])
@require_auth
@handle_api_errors
@validate_query_params(
allowed_params=['task_type', 'days', 'limit'],
param_types={'days': int, 'limit': int}
)
def get_maintenance_history() -> Tuple[Any, int]:
"""
Get maintenance task execution history.
Query Parameters:
- task_type: Filter by task type (optional)
- days: Number of days of history (optional, default: 30)
- limit: Maximum number of records (optional, default: 100)
Returns:
JSON response with maintenance history
"""
task_type = request.args.get('task_type')
days = request.args.get('days', 30, type=int)
limit = request.args.get('limit', 100, type=int)
try:
history = scheduler_manager.get_task_history(
task_type=task_type,
days=days,
limit=limit
)
return create_success_response("Maintenance history retrieved successfully", 200, history)
except Exception as e:
logger.error(f"Error getting maintenance history: {str(e)}")
return create_error_response("Failed to get maintenance history", 500)

View File

@ -1,406 +0,0 @@
"""
Performance Optimization API Endpoints
This module provides REST API endpoints for performance monitoring
and optimization features.
"""
from flask import Blueprint, request, jsonify
from auth import require_auth, optional_auth
from error_handler import handle_api_errors, RetryableError
from performance_optimizer import (
speed_limiter, download_cache, memory_monitor,
download_manager, resume_manager, DownloadTask
)
import uuid
from datetime import datetime
# Blueprint for performance optimization endpoints
performance_bp = Blueprint('performance', __name__)
@performance_bp.route('/api/performance/speed-limit', methods=['GET'])
@handle_api_errors
@optional_auth
def get_speed_limit():
"""Get current download speed limit."""
try:
return jsonify({
'status': 'success',
'data': {
'speed_limit_mbps': speed_limiter.max_speed_mbps,
'current_speed_mbps': speed_limiter.get_current_speed()
}
})
except Exception as e:
raise RetryableError(f"Failed to get speed limit: {e}")
@performance_bp.route('/api/performance/speed-limit', methods=['POST'])
@handle_api_errors
@require_auth
def set_speed_limit():
"""Set download speed limit."""
try:
data = request.get_json()
speed_mbps = data.get('speed_mbps', 0)
if speed_mbps < 0:
return jsonify({
'status': 'error',
'message': 'Speed limit must be non-negative (0 = unlimited)'
}), 400
speed_limiter.set_speed_limit(speed_mbps)
return jsonify({
'status': 'success',
'message': f'Speed limit set to {speed_mbps} MB/s' if speed_mbps > 0 else 'Speed limit removed',
'data': {
'speed_limit_mbps': speed_mbps
}
})
except Exception as e:
raise RetryableError(f"Failed to set speed limit: {e}")
@performance_bp.route('/api/performance/cache/stats')
@handle_api_errors
@optional_auth
def get_cache_stats():
"""Get cache statistics."""
try:
stats = download_cache.get_stats()
return jsonify({
'status': 'success',
'data': stats
})
except Exception as e:
raise RetryableError(f"Failed to get cache stats: {e}")
@performance_bp.route('/api/performance/cache/clear', methods=['POST'])
@handle_api_errors
@require_auth
def clear_cache():
"""Clear download cache."""
try:
download_cache.clear()
return jsonify({
'status': 'success',
'message': 'Cache cleared successfully'
})
except Exception as e:
raise RetryableError(f"Failed to clear cache: {e}")
@performance_bp.route('/api/performance/memory/stats')
@handle_api_errors
@optional_auth
def get_memory_stats():
"""Get memory usage statistics."""
try:
stats = memory_monitor.get_memory_stats()
return jsonify({
'status': 'success',
'data': stats
})
except Exception as e:
raise RetryableError(f"Failed to get memory stats: {e}")
@performance_bp.route('/api/performance/memory/gc', methods=['POST'])
@handle_api_errors
@require_auth
def force_garbage_collection():
"""Force garbage collection to free memory."""
try:
memory_monitor.force_garbage_collection()
stats = memory_monitor.get_memory_stats()
return jsonify({
'status': 'success',
'message': 'Garbage collection completed',
'data': stats
})
except Exception as e:
raise RetryableError(f"Failed to force garbage collection: {e}")
@performance_bp.route('/api/performance/downloads/workers', methods=['GET'])
@handle_api_errors
@optional_auth
def get_worker_count():
"""Get current number of download workers."""
try:
return jsonify({
'status': 'success',
'data': {
'max_workers': download_manager.max_workers,
'active_tasks': len(download_manager.active_tasks)
}
})
except Exception as e:
raise RetryableError(f"Failed to get worker count: {e}")
@performance_bp.route('/api/performance/downloads/workers', methods=['POST'])
@handle_api_errors
@require_auth
def set_worker_count():
"""Set number of download workers."""
try:
data = request.get_json()
max_workers = data.get('max_workers', 3)
if not isinstance(max_workers, int) or max_workers < 1 or max_workers > 10:
return jsonify({
'status': 'error',
'message': 'Worker count must be between 1 and 10'
}), 400
download_manager.set_max_workers(max_workers)
return jsonify({
'status': 'success',
'message': f'Worker count set to {max_workers}',
'data': {
'max_workers': max_workers
}
})
except Exception as e:
raise RetryableError(f"Failed to set worker count: {e}")
@performance_bp.route('/api/performance/downloads/stats')
@handle_api_errors
@optional_auth
def get_download_stats():
"""Get download manager statistics."""
try:
stats = download_manager.get_statistics()
return jsonify({
'status': 'success',
'data': stats
})
except Exception as e:
raise RetryableError(f"Failed to get download stats: {e}")
@performance_bp.route('/api/performance/downloads/tasks')
@handle_api_errors
@optional_auth
def get_all_download_tasks():
"""Get all download tasks."""
try:
tasks = download_manager.get_all_tasks()
return jsonify({
'status': 'success',
'data': tasks
})
except Exception as e:
raise RetryableError(f"Failed to get download tasks: {e}")
@performance_bp.route('/api/performance/downloads/tasks/<task_id>')
@handle_api_errors
@optional_auth
def get_download_task(task_id):
"""Get specific download task status."""
try:
task_status = download_manager.get_task_status(task_id)
if not task_status:
return jsonify({
'status': 'error',
'message': 'Task not found'
}), 404
return jsonify({
'status': 'success',
'data': task_status
})
except Exception as e:
raise RetryableError(f"Failed to get task status: {e}")
@performance_bp.route('/api/performance/downloads/add-task', methods=['POST'])
@handle_api_errors
@require_auth
def add_download_task():
"""Add a new download task to the queue."""
try:
data = request.get_json()
required_fields = ['serie_name', 'season', 'episode', 'key', 'output_path', 'temp_path']
for field in required_fields:
if field not in data:
return jsonify({
'status': 'error',
'message': f'Missing required field: {field}'
}), 400
# Create download task
task = DownloadTask(
task_id=str(uuid.uuid4()),
serie_name=data['serie_name'],
season=int(data['season']),
episode=int(data['episode']),
key=data['key'],
language=data.get('language', 'German Dub'),
output_path=data['output_path'],
temp_path=data['temp_path'],
priority=data.get('priority', 0)
)
task_id = download_manager.add_task(task)
return jsonify({
'status': 'success',
'message': 'Download task added successfully',
'data': {
'task_id': task_id
}
})
except Exception as e:
raise RetryableError(f"Failed to add download task: {e}")
@performance_bp.route('/api/performance/resume/tasks')
@handle_api_errors
@optional_auth
def get_resumable_tasks():
"""Get list of tasks that can be resumed."""
try:
resumable_tasks = resume_manager.get_resumable_tasks()
# Get detailed info for each resumable task
tasks_info = []
for task_id in resumable_tasks:
resume_info = resume_manager.load_resume_info(task_id)
if resume_info:
tasks_info.append({
'task_id': task_id,
'resume_info': resume_info
})
return jsonify({
'status': 'success',
'data': {
'resumable_tasks': tasks_info,
'count': len(tasks_info)
}
})
except Exception as e:
raise RetryableError(f"Failed to get resumable tasks: {e}")
@performance_bp.route('/api/performance/resume/clear/<task_id>', methods=['POST'])
@handle_api_errors
@require_auth
def clear_resume_info(task_id):
"""Clear resume information for a specific task."""
try:
resume_manager.clear_resume_info(task_id)
return jsonify({
'status': 'success',
'message': f'Resume information cleared for task: {task_id}'
})
except Exception as e:
raise RetryableError(f"Failed to clear resume info: {e}")
@performance_bp.route('/api/performance/system/optimize', methods=['POST'])
@handle_api_errors
@require_auth
def optimize_system():
"""Perform system optimization tasks."""
try:
optimization_results = {}
# Force garbage collection
memory_monitor.force_garbage_collection()
memory_stats = memory_monitor.get_memory_stats()
optimization_results['memory_gc'] = {
'completed': True,
'memory_mb': memory_stats.get('rss_mb', 0)
}
# Clean up cache expired entries
download_cache._cleanup_expired()
cache_stats = download_cache.get_stats()
optimization_results['cache_cleanup'] = {
'completed': True,
'entries': cache_stats.get('entry_count', 0),
'size_mb': cache_stats.get('total_size_mb', 0)
}
# Clean up old resume files (older than 7 days)
import os
import time
resume_dir = resume_manager.resume_dir
cleaned_files = 0
try:
for filename in os.listdir(resume_dir):
file_path = os.path.join(resume_dir, filename)
if os.path.isfile(file_path):
file_age = time.time() - os.path.getmtime(file_path)
if file_age > 7 * 24 * 3600: # 7 days in seconds
os.remove(file_path)
cleaned_files += 1
except Exception as e:
pass # Ignore errors in cleanup
optimization_results['resume_cleanup'] = {
'completed': True,
'files_removed': cleaned_files
}
return jsonify({
'status': 'success',
'message': 'System optimization completed',
'data': optimization_results
})
except Exception as e:
raise RetryableError(f"System optimization failed: {e}")
@performance_bp.route('/api/performance/config')
@handle_api_errors
@optional_auth
def get_performance_config():
"""Get current performance configuration."""
try:
config = {
'speed_limit': {
'current_mbps': speed_limiter.max_speed_mbps,
'unlimited': speed_limiter.max_speed_mbps == 0
},
'downloads': {
'max_workers': download_manager.max_workers,
'active_tasks': len(download_manager.active_tasks)
},
'cache': {
'max_size_mb': download_cache.max_size_bytes / (1024 * 1024),
**download_cache.get_stats()
},
'memory': {
'warning_threshold_mb': memory_monitor.warning_threshold / (1024 * 1024),
'critical_threshold_mb': memory_monitor.critical_threshold / (1024 * 1024),
**memory_monitor.get_memory_stats()
}
}
return jsonify({
'status': 'success',
'data': config
})
except Exception as e:
raise RetryableError(f"Failed to get performance config: {e}")
# Export the blueprint
__all__ = ['performance_bp']

View File

@ -1,280 +0,0 @@
from flask import Blueprint, jsonify, request
from web.controllers.auth_controller import require_auth
from shared.utils.process_utils import (
process_lock_manager,
RESCAN_LOCK,
DOWNLOAD_LOCK,
SEARCH_LOCK,
check_process_locks,
get_process_status,
update_process_progress,
is_process_running,
episode_deduplicator,
ProcessLockError
)
import logging
logger = logging.getLogger(__name__)
process_bp = Blueprint('process', __name__, url_prefix='/api/process')
@process_bp.route('/locks/status', methods=['GET'])
@require_auth
def get_all_locks_status():
"""Get status of all process locks."""
try:
# Clean up expired locks first
cleaned = check_process_locks()
if cleaned > 0:
logger.info(f"Cleaned up {cleaned} expired locks")
status = process_lock_manager.get_all_locks_status()
# Add queue deduplication info
status['queue_info'] = {
'active_episodes': episode_deduplicator.get_count(),
'episodes': episode_deduplicator.get_active_episodes()
}
return jsonify({
'success': True,
'locks': status
})
except Exception as e:
logger.error(f"Error getting locks status: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/locks/<lock_name>/status', methods=['GET'])
@require_auth
def get_lock_status(lock_name):
"""Get status of a specific process lock."""
try:
if lock_name not in [RESCAN_LOCK, DOWNLOAD_LOCK, SEARCH_LOCK]:
return jsonify({
'success': False,
'error': 'Invalid lock name'
}), 400
status = get_process_status(lock_name)
return jsonify({
'success': True,
'status': status
})
except Exception as e:
logger.error(f"Error getting lock status for {lock_name}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/locks/<lock_name>/acquire', methods=['POST'])
@require_auth
def acquire_lock(lock_name):
"""Manually acquire a process lock."""
try:
if lock_name not in [RESCAN_LOCK, DOWNLOAD_LOCK, SEARCH_LOCK]:
return jsonify({
'success': False,
'error': 'Invalid lock name'
}), 400
data = request.get_json() or {}
locked_by = data.get('locked_by', 'manual')
timeout_minutes = data.get('timeout_minutes', 60)
success = process_lock_manager.acquire_lock(lock_name, locked_by, timeout_minutes)
if success:
return jsonify({
'success': True,
'message': f'Lock {lock_name} acquired successfully'
})
else:
return jsonify({
'success': False,
'error': f'Lock {lock_name} is already held'
}), 409
except Exception as e:
logger.error(f"Error acquiring lock {lock_name}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/locks/<lock_name>/release', methods=['POST'])
@require_auth
def release_lock(lock_name):
"""Manually release a process lock."""
try:
if lock_name not in [RESCAN_LOCK, DOWNLOAD_LOCK, SEARCH_LOCK]:
return jsonify({
'success': False,
'error': 'Invalid lock name'
}), 400
success = process_lock_manager.release_lock(lock_name)
if success:
return jsonify({
'success': True,
'message': f'Lock {lock_name} released successfully'
})
else:
return jsonify({
'success': False,
'error': f'Lock {lock_name} was not held'
}), 404
except Exception as e:
logger.error(f"Error releasing lock {lock_name}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/locks/cleanup', methods=['POST'])
@require_auth
def cleanup_expired_locks():
"""Manually clean up expired locks."""
try:
cleaned = check_process_locks()
return jsonify({
'success': True,
'cleaned_count': cleaned,
'message': f'Cleaned up {cleaned} expired locks'
})
except Exception as e:
logger.error(f"Error cleaning up locks: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/locks/force-release-all', methods=['POST'])
@require_auth
def force_release_all_locks():
"""Force release all process locks (emergency use)."""
try:
data = request.get_json() or {}
confirm = data.get('confirm', False)
if not confirm:
return jsonify({
'success': False,
'error': 'Confirmation required for force release'
}), 400
released = process_lock_manager.force_release_all()
# Also clear queue deduplication
episode_deduplicator.clear_all()
return jsonify({
'success': True,
'released_count': released,
'message': f'Force released {released} locks and cleared queue deduplication'
})
except Exception as e:
logger.error(f"Error force releasing locks: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/locks/<lock_name>/progress', methods=['POST'])
@require_auth
def update_lock_progress(lock_name):
"""Update progress for a running process."""
try:
if lock_name not in [RESCAN_LOCK, DOWNLOAD_LOCK, SEARCH_LOCK]:
return jsonify({
'success': False,
'error': 'Invalid lock name'
}), 400
if not is_process_running(lock_name):
return jsonify({
'success': False,
'error': f'Process {lock_name} is not running'
}), 404
data = request.get_json() or {}
progress_data = data.get('progress', {})
update_process_progress(lock_name, progress_data)
return jsonify({
'success': True,
'message': 'Progress updated successfully'
})
except Exception as e:
logger.error(f"Error updating progress for {lock_name}: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/queue/deduplication', methods=['GET'])
@require_auth
def get_queue_deduplication():
"""Get current queue deduplication status."""
try:
return jsonify({
'success': True,
'deduplication': {
'active_count': episode_deduplicator.get_count(),
'active_episodes': episode_deduplicator.get_active_episodes()
}
})
except Exception as e:
logger.error(f"Error getting queue deduplication: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/queue/deduplication/clear', methods=['POST'])
@require_auth
def clear_queue_deduplication():
"""Clear all queue deduplication entries."""
try:
episode_deduplicator.clear_all()
return jsonify({
'success': True,
'message': 'Queue deduplication cleared successfully'
})
except Exception as e:
logger.error(f"Error clearing queue deduplication: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@process_bp.route('/is-running/<process_name>', methods=['GET'])
@require_auth
def check_if_process_running(process_name):
"""Quick check if a specific process is running."""
try:
if process_name not in [RESCAN_LOCK, DOWNLOAD_LOCK, SEARCH_LOCK]:
return jsonify({
'success': False,
'error': 'Invalid process name'
}), 400
is_running = is_process_running(process_name)
return jsonify({
'success': True,
'is_running': is_running,
'process_name': process_name
})
except Exception as e:
logger.error(f"Error checking if process {process_name} is running: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500

View File

@ -1,187 +0,0 @@
from flask import Blueprint, jsonify, request
from web.controllers.auth_controller import require_auth
from application.services.scheduler_service import get_scheduler
import logging
logger = logging.getLogger(__name__)
scheduler_bp = Blueprint('scheduler', __name__, url_prefix='/api/scheduler')
@scheduler_bp.route('/config', methods=['GET'])
@require_auth
def get_scheduler_config():
"""Get current scheduler configuration."""
try:
scheduler = get_scheduler()
if not scheduler:
return jsonify({
'success': False,
'error': 'Scheduler not initialized'
}), 500
config = scheduler.get_scheduled_rescan_config()
return jsonify({
'success': True,
'config': config
})
except Exception as e:
logger.error(f"Error getting scheduler config: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@scheduler_bp.route('/config', methods=['POST'])
@require_auth
def update_scheduler_config():
"""Update scheduler configuration."""
try:
data = request.get_json() or {}
enabled = data.get('enabled', False)
time_str = data.get('time', '03:00')
auto_download = data.get('auto_download_after_rescan', False)
# Validate inputs
if enabled and not time_str:
return jsonify({
'success': False,
'error': 'Time is required when scheduling is enabled'
}), 400
scheduler = get_scheduler()
if not scheduler:
return jsonify({
'success': False,
'error': 'Scheduler not initialized'
}), 500
# Update configuration
scheduler.update_scheduled_rescan_config(enabled, time_str, auto_download)
# Get updated config
updated_config = scheduler.get_scheduled_rescan_config()
return jsonify({
'success': True,
'message': 'Scheduler configuration updated successfully',
'config': updated_config
})
except ValueError as e:
return jsonify({
'success': False,
'error': str(e)
}), 400
except Exception as e:
logger.error(f"Error updating scheduler config: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@scheduler_bp.route('/status', methods=['GET'])
@require_auth
def get_scheduler_status():
"""Get current scheduler status and next jobs."""
try:
scheduler = get_scheduler()
if not scheduler:
return jsonify({
'success': False,
'error': 'Scheduler not initialized'
}), 500
config = scheduler.get_scheduled_rescan_config()
jobs = scheduler.get_next_scheduled_jobs()
return jsonify({
'success': True,
'status': {
'running': config['is_running'],
'config': config,
'scheduled_jobs': jobs
}
})
except Exception as e:
logger.error(f"Error getting scheduler status: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@scheduler_bp.route('/start', methods=['POST'])
@require_auth
def start_scheduler():
"""Start the scheduler."""
try:
scheduler = get_scheduler()
if not scheduler:
return jsonify({
'success': False,
'error': 'Scheduler not initialized'
}), 500
scheduler.start_scheduler()
return jsonify({
'success': True,
'message': 'Scheduler started successfully'
})
except Exception as e:
logger.error(f"Error starting scheduler: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@scheduler_bp.route('/stop', methods=['POST'])
@require_auth
def stop_scheduler():
"""Stop the scheduler."""
try:
scheduler = get_scheduler()
if not scheduler:
return jsonify({
'success': False,
'error': 'Scheduler not initialized'
}), 500
scheduler.stop_scheduler()
return jsonify({
'success': True,
'message': 'Scheduler stopped successfully'
})
except Exception as e:
logger.error(f"Error stopping scheduler: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500
@scheduler_bp.route('/trigger-rescan', methods=['POST'])
@require_auth
def trigger_manual_rescan():
"""Manually trigger a scheduled rescan for testing."""
try:
scheduler = get_scheduler()
if not scheduler:
return jsonify({
'success': False,
'error': 'Scheduler not initialized'
}), 500
scheduler.trigger_manual_scheduled_rescan()
return jsonify({
'success': True,
'message': 'Manual scheduled rescan triggered'
})
except Exception as e:
logger.error(f"Error triggering manual rescan: {e}")
return jsonify({
'success': False,
'error': str(e)
}), 500

View File

@ -1,637 +0,0 @@
"""
Search API Endpoints
This module provides REST API endpoints for advanced search functionality
across anime, episodes, and other content.
"""
from flask import Blueprint, request
from typing import Dict, List, Any, Optional
import re
from ...shared.auth_decorators import require_auth, optional_auth
from ...shared.error_handlers import handle_api_errors, APIException, ValidationError
from ...shared.validators import validate_pagination_params
from ...shared.response_helpers import (
create_success_response, create_paginated_response, format_anime_response,
format_episode_response, extract_pagination_params
)
# Import search components (these imports would need to be adjusted based on actual structure)
try:
from search_manager import search_engine, SearchResult
from database_manager import anime_repository, episode_repository
except ImportError:
# Fallback for development/testing
search_engine = None
SearchResult = None
anime_repository = None
episode_repository = None
# Blueprint for search endpoints
search_bp = Blueprint('search', __name__, url_prefix='/api/v1/search')
@search_bp.route('', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def global_search() -> Dict[str, Any]:
"""
Perform a global search across all content types.
Query Parameters:
- q: Search query (required)
- types: Comma-separated list of content types (anime,episodes,all)
- categories: Comma-separated list of categories to search
- min_score: Minimum relevance score (0.0-1.0)
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated search results grouped by content type
"""
if not search_engine:
raise APIException("Search engine not available", 503)
search_query = request.args.get('q', '').strip()
if not search_query:
raise ValidationError("Search query 'q' is required")
if len(search_query) < 2:
raise ValidationError("Search query must be at least 2 characters long")
# Parse search types
search_types = request.args.get('types', 'all').split(',')
valid_types = ['anime', 'episodes', 'all']
search_types = [t.strip() for t in search_types if t.strip() in valid_types]
if not search_types or 'all' in search_types:
search_types = ['anime', 'episodes']
# Parse categories
categories = request.args.get('categories', '').split(',')
categories = [c.strip() for c in categories if c.strip()]
# Parse minimum score
min_score = request.args.get('min_score', '0.0')
try:
min_score = float(min_score)
if not 0.0 <= min_score <= 1.0:
raise ValueError()
except ValueError:
raise ValidationError("min_score must be a number between 0.0 and 1.0")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Perform search
search_results = search_engine.search_all(
query=search_query,
content_types=search_types,
categories=categories,
min_score=min_score
)
# Group results by type
grouped_results = {
'anime': [],
'episodes': [],
'total_results': 0
}
for result in search_results:
if result.content_type == 'anime':
grouped_results['anime'].append({
'id': result.content_id,
'type': 'anime',
'title': result.title,
'description': result.description,
'score': result.relevance_score,
'data': format_anime_response(result.content_data)
})
elif result.content_type == 'episode':
grouped_results['episodes'].append({
'id': result.content_id,
'type': 'episode',
'title': result.title,
'description': result.description,
'score': result.relevance_score,
'data': format_episode_response(result.content_data)
})
grouped_results['total_results'] += 1
# Apply pagination to combined results
all_results = []
for result_type in ['anime', 'episodes']:
all_results.extend(grouped_results[result_type])
# Sort by relevance score
all_results.sort(key=lambda x: x['score'], reverse=True)
total = len(all_results)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_results = all_results[start_idx:end_idx]
response = create_paginated_response(
data=paginated_results,
page=page,
per_page=per_page,
total=total,
endpoint='search.global_search',
q=search_query
)
# Add search metadata
response['search'] = {
'query': search_query,
'types': search_types,
'categories': categories,
'min_score': min_score,
'results_by_type': {
'anime': len(grouped_results['anime']),
'episodes': len(grouped_results['episodes'])
}
}
return response
@search_bp.route('/anime', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def search_anime() -> Dict[str, Any]:
"""
Search anime with advanced filters.
Query Parameters:
- q: Search query (required)
- genres: Comma-separated list of genres
- status: Anime status filter
- year_from: Starting year filter
- year_to: Ending year filter
- min_episodes: Minimum episode count
- max_episodes: Maximum episode count
- sort_by: Sort field (name, year, episodes, relevance)
- sort_order: Sort order (asc, desc)
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated anime search results
"""
if not anime_repository:
raise APIException("Anime repository not available", 503)
search_query = request.args.get('q', '').strip()
if not search_query:
raise ValidationError("Search query 'q' is required")
# Parse filters
genres = request.args.get('genres', '').split(',')
genres = [g.strip() for g in genres if g.strip()]
status_filter = request.args.get('status')
# Parse year filters
year_from = request.args.get('year_from')
year_to = request.args.get('year_to')
if year_from:
try:
year_from = int(year_from)
if year_from < 1900 or year_from > 2100:
raise ValueError()
except ValueError:
raise ValidationError("year_from must be a valid year between 1900 and 2100")
if year_to:
try:
year_to = int(year_to)
if year_to < 1900 or year_to > 2100:
raise ValueError()
except ValueError:
raise ValidationError("year_to must be a valid year between 1900 and 2100")
# Parse episode count filters
min_episodes = request.args.get('min_episodes')
max_episodes = request.args.get('max_episodes')
if min_episodes:
try:
min_episodes = int(min_episodes)
if min_episodes < 0:
raise ValueError()
except ValueError:
raise ValidationError("min_episodes must be a non-negative integer")
if max_episodes:
try:
max_episodes = int(max_episodes)
if max_episodes < 0:
raise ValueError()
except ValueError:
raise ValidationError("max_episodes must be a non-negative integer")
# Parse sorting
sort_by = request.args.get('sort_by', 'relevance')
sort_order = request.args.get('sort_order', 'desc')
valid_sort_fields = ['name', 'year', 'episodes', 'relevance', 'created_at']
if sort_by not in valid_sort_fields:
raise ValidationError(f"sort_by must be one of: {', '.join(valid_sort_fields)}")
if sort_order not in ['asc', 'desc']:
raise ValidationError("sort_order must be 'asc' or 'desc'")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Perform advanced search
search_results = anime_repository.advanced_search(
query=search_query,
genres=genres,
status=status_filter,
year_from=year_from,
year_to=year_to,
min_episodes=min_episodes,
max_episodes=max_episodes,
sort_by=sort_by,
sort_order=sort_order
)
# Format results
formatted_results = []
for anime in search_results:
anime_data = format_anime_response(anime.__dict__)
# Add search relevance score if available
if hasattr(anime, 'relevance_score'):
anime_data['relevance_score'] = anime.relevance_score
formatted_results.append(anime_data)
# Apply pagination
total = len(formatted_results)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_results = formatted_results[start_idx:end_idx]
response = create_paginated_response(
data=paginated_results,
page=page,
per_page=per_page,
total=total,
endpoint='search.search_anime',
q=search_query
)
# Add search metadata
response['search'] = {
'query': search_query,
'filters': {
'genres': genres,
'status': status_filter,
'year_from': year_from,
'year_to': year_to,
'min_episodes': min_episodes,
'max_episodes': max_episodes
},
'sorting': {
'sort_by': sort_by,
'sort_order': sort_order
}
}
return response
@search_bp.route('/episodes', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def search_episodes() -> Dict[str, Any]:
"""
Search episodes with advanced filters.
Query Parameters:
- q: Search query (required)
- anime_id: Filter by anime ID
- status: Episode status filter
- downloaded: Filter by download status (true/false)
- episode_range: Episode range filter (e.g., "1-10", "5+")
- duration_min: Minimum duration in minutes
- duration_max: Maximum duration in minutes
- sort_by: Sort field (episode_number, title, duration, relevance)
- sort_order: Sort order (asc, desc)
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated episode search results
"""
if not episode_repository:
raise APIException("Episode repository not available", 503)
search_query = request.args.get('q', '').strip()
if not search_query:
raise ValidationError("Search query 'q' is required")
# Parse filters
anime_id = request.args.get('anime_id')
if anime_id:
try:
anime_id = int(anime_id)
except ValueError:
raise ValidationError("anime_id must be a valid integer")
status_filter = request.args.get('status')
downloaded_filter = request.args.get('downloaded')
if downloaded_filter and downloaded_filter.lower() not in ['true', 'false']:
raise ValidationError("downloaded filter must be 'true' or 'false'")
# Parse episode range
episode_range = request.args.get('episode_range')
episode_min = None
episode_max = None
if episode_range:
range_pattern = r'^(\d+)(?:-(\d+)|\+)?$'
match = re.match(range_pattern, episode_range)
if not match:
raise ValidationError("episode_range must be in format 'N', 'N-M', or 'N+'")
episode_min = int(match.group(1))
if match.group(2):
episode_max = int(match.group(2))
elif episode_range.endswith('+'):
episode_max = None # No upper limit
else:
episode_max = episode_min # Single episode
# Parse duration filters
duration_min = request.args.get('duration_min')
duration_max = request.args.get('duration_max')
if duration_min:
try:
duration_min = int(duration_min)
if duration_min < 0:
raise ValueError()
except ValueError:
raise ValidationError("duration_min must be a non-negative integer")
if duration_max:
try:
duration_max = int(duration_max)
if duration_max < 0:
raise ValueError()
except ValueError:
raise ValidationError("duration_max must be a non-negative integer")
# Parse sorting
sort_by = request.args.get('sort_by', 'relevance')
sort_order = request.args.get('sort_order', 'desc')
valid_sort_fields = ['episode_number', 'title', 'duration', 'relevance', 'created_at']
if sort_by not in valid_sort_fields:
raise ValidationError(f"sort_by must be one of: {', '.join(valid_sort_fields)}")
if sort_order not in ['asc', 'desc']:
raise ValidationError("sort_order must be 'asc' or 'desc'")
# Get pagination parameters
page, per_page = extract_pagination_params()
# Perform advanced search
search_results = episode_repository.advanced_search(
query=search_query,
anime_id=anime_id,
status=status_filter,
downloaded=downloaded_filter.lower() == 'true' if downloaded_filter else None,
episode_min=episode_min,
episode_max=episode_max,
duration_min=duration_min,
duration_max=duration_max,
sort_by=sort_by,
sort_order=sort_order
)
# Format results
formatted_results = []
for episode in search_results:
episode_data = format_episode_response(episode.__dict__)
# Add search relevance score if available
if hasattr(episode, 'relevance_score'):
episode_data['relevance_score'] = episode.relevance_score
formatted_results.append(episode_data)
# Apply pagination
total = len(formatted_results)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_results = formatted_results[start_idx:end_idx]
response = create_paginated_response(
data=paginated_results,
page=page,
per_page=per_page,
total=total,
endpoint='search.search_episodes',
q=search_query
)
# Add search metadata
response['search'] = {
'query': search_query,
'filters': {
'anime_id': anime_id,
'status': status_filter,
'downloaded': downloaded_filter,
'episode_range': episode_range,
'duration_min': duration_min,
'duration_max': duration_max
},
'sorting': {
'sort_by': sort_by,
'sort_order': sort_order
}
}
return response
@search_bp.route('/suggestions', methods=['GET'])
@handle_api_errors
@optional_auth
def get_search_suggestions() -> Dict[str, Any]:
"""
Get search suggestions based on partial query.
Query Parameters:
- q: Partial search query (required)
- type: Content type (anime, episodes, all)
- limit: Maximum suggestions to return (default: 10, max: 50)
Returns:
List of search suggestions
"""
if not search_engine:
raise APIException("Search engine not available", 503)
query = request.args.get('q', '').strip()
if not query:
raise ValidationError("Query 'q' is required")
if len(query) < 1:
return create_success_response(data=[])
content_type = request.args.get('type', 'all')
if content_type not in ['anime', 'episodes', 'all']:
raise ValidationError("type must be 'anime', 'episodes', or 'all'")
limit = request.args.get('limit', '10')
try:
limit = int(limit)
if limit < 1 or limit > 50:
raise ValueError()
except ValueError:
raise ValidationError("limit must be an integer between 1 and 50")
# Get suggestions
suggestions = search_engine.get_suggestions(
query=query,
content_type=content_type,
limit=limit
)
return create_success_response(
data={
'suggestions': suggestions,
'query': query,
'count': len(suggestions)
}
)
@search_bp.route('/autocomplete', methods=['GET'])
@handle_api_errors
@optional_auth
def autocomplete() -> Dict[str, Any]:
"""
Get autocomplete suggestions for search fields.
Query Parameters:
- field: Field to autocomplete (name, genre, status)
- q: Partial value
- limit: Maximum suggestions (default: 10, max: 20)
Returns:
List of autocomplete suggestions
"""
field = request.args.get('field', '').strip()
query = request.args.get('q', '').strip()
if not field:
raise ValidationError("Field parameter is required")
if field not in ['name', 'genre', 'status', 'year']:
raise ValidationError("field must be one of: name, genre, status, year")
limit = request.args.get('limit', '10')
try:
limit = int(limit)
if limit < 1 or limit > 20:
raise ValueError()
except ValueError:
raise ValidationError("limit must be an integer between 1 and 20")
# Get autocomplete suggestions based on field
suggestions = []
if field == 'name':
# Get anime/episode name suggestions
if anime_repository:
anime_names = anime_repository.get_name_suggestions(query, limit)
suggestions.extend(anime_names)
elif field == 'genre':
# Get genre suggestions
if anime_repository:
genres = anime_repository.get_genre_suggestions(query, limit)
suggestions.extend(genres)
elif field == 'status':
# Get status suggestions
valid_statuses = ['ongoing', 'completed', 'planned', 'dropped', 'paused']
suggestions = [s for s in valid_statuses if query.lower() in s.lower()][:limit]
elif field == 'year':
# Get year suggestions
if anime_repository:
years = anime_repository.get_year_suggestions(query, limit)
suggestions.extend(years)
return create_success_response(
data={
'suggestions': suggestions,
'field': field,
'query': query,
'count': len(suggestions)
}
)
@search_bp.route('/trending', methods=['GET'])
@handle_api_errors
@optional_auth
def get_trending_searches() -> Dict[str, Any]:
"""
Get trending search queries.
Query Parameters:
- period: Time period (day, week, month)
- type: Content type (anime, episodes, all)
- limit: Maximum results (default: 10, max: 50)
Returns:
List of trending search queries
"""
if not search_engine:
raise APIException("Search engine not available", 503)
period = request.args.get('period', 'week')
content_type = request.args.get('type', 'all')
if period not in ['day', 'week', 'month']:
raise ValidationError("period must be 'day', 'week', or 'month'")
if content_type not in ['anime', 'episodes', 'all']:
raise ValidationError("type must be 'anime', 'episodes', or 'all'")
limit = request.args.get('limit', '10')
try:
limit = int(limit)
if limit < 1 or limit > 50:
raise ValueError()
except ValueError:
raise ValidationError("limit must be an integer between 1 and 50")
# Get trending searches
trending = search_engine.get_trending_searches(
period=period,
content_type=content_type,
limit=limit
)
return create_success_response(
data={
'trending': trending,
'period': period,
'type': content_type,
'count': len(trending)
}
)

View File

@ -1,332 +0,0 @@
"""
Simple Master Password Authentication Controller for AniWorld.
This module implements a simple authentication system using:
- Single master password (no user registration)
- JWT tokens for session management
- Environment-based configuration
- No email system required
"""
import os
import hashlib
import jwt
from datetime import datetime, timedelta
from flask import Blueprint, request, jsonify
from functools import wraps
import logging
from typing import Dict, Any, Optional, Tuple
# Configure logging
logger = logging.getLogger(__name__)
# Create blueprint
simple_auth_bp = Blueprint('simple_auth', __name__)
# Configuration from environment
JWT_SECRET_KEY = os.getenv('JWT_SECRET_KEY', 'default_jwt_secret')
PASSWORD_SALT = os.getenv('PASSWORD_SALT', 'default_salt')
MASTER_PASSWORD_HASH = os.getenv('MASTER_PASSWORD_HASH')
TOKEN_EXPIRY_HOURS = int(os.getenv('SESSION_TIMEOUT_HOURS', '24'))
def hash_password(password: str) -> str:
"""Hash password with salt using SHA-256."""
salted_password = password + PASSWORD_SALT
return hashlib.sha256(salted_password.encode()).hexdigest()
def verify_master_password(password: str) -> bool:
"""Verify password against master password hash."""
if not MASTER_PASSWORD_HASH:
# If no hash is set, check against environment variable (development only)
dev_password = os.getenv('MASTER_PASSWORD')
if dev_password:
return password == dev_password
return False
password_hash = hash_password(password)
return password_hash == MASTER_PASSWORD_HASH
def generate_jwt_token() -> str:
"""Generate JWT token for authentication."""
payload = {
'user': 'master',
'exp': datetime.utcnow() + timedelta(hours=TOKEN_EXPIRY_HOURS),
'iat': datetime.utcnow(),
'iss': 'aniworld-server'
}
return jwt.encode(payload, JWT_SECRET_KEY, algorithm='HS256')
def verify_jwt_token(token: str) -> Optional[Dict[str, Any]]:
"""Verify and decode JWT token."""
try:
payload = jwt.decode(token, JWT_SECRET_KEY, algorithms=['HS256'])
return payload
except jwt.ExpiredSignatureError:
logger.warning("Token has expired")
return None
except jwt.InvalidTokenError as e:
logger.warning(f"Invalid token: {str(e)}")
return None
def require_auth(f):
"""Decorator to require authentication for API endpoints."""
@wraps(f)
def decorated_function(*args, **kwargs):
auth_header = request.headers.get('Authorization')
if not auth_header:
return jsonify({
'success': False,
'error': 'Authorization header required',
'code': 'AUTH_REQUIRED'
}), 401
try:
# Expected format: "Bearer <token>"
token = auth_header.split(' ')[1]
except IndexError:
return jsonify({
'success': False,
'error': 'Invalid authorization header format',
'code': 'INVALID_AUTH_FORMAT'
}), 401
payload = verify_jwt_token(token)
if not payload:
return jsonify({
'success': False,
'error': 'Invalid or expired token',
'code': 'INVALID_TOKEN'
}), 401
# Add user info to request context
request.current_user = payload
return f(*args, **kwargs)
return decorated_function
# Auth endpoints
@simple_auth_bp.route('/auth/login', methods=['POST'])
def login() -> Tuple[Any, int]:
"""
Authenticate with master password and receive JWT token.
Request Body:
{
"password": "master_password"
}
Response:
{
"success": true,
"message": "Login successful",
"data": {
"token": "jwt_token_here",
"expires_at": "2025-01-01T00:00:00Z",
"user": "master"
}
}
"""
try:
data = request.get_json()
if not data:
return jsonify({
'success': False,
'error': 'JSON body required',
'code': 'MISSING_JSON'
}), 400
password = data.get('password')
if not password:
return jsonify({
'success': False,
'error': 'Password required',
'code': 'MISSING_PASSWORD'
}), 400
# Verify master password
if not verify_master_password(password):
logger.warning(f"Failed login attempt from IP: {request.remote_addr}")
return jsonify({
'success': False,
'error': 'Invalid master password',
'code': 'INVALID_CREDENTIALS'
}), 401
# Generate JWT token
token = generate_jwt_token()
expires_at = datetime.utcnow() + timedelta(hours=TOKEN_EXPIRY_HOURS)
logger.info(f"Successful login from IP: {request.remote_addr}")
return jsonify({
'success': True,
'message': 'Login successful',
'data': {
'token': token,
'expires_at': expires_at.isoformat() + 'Z',
'user': 'master',
'token_type': 'Bearer'
}
}), 200
except Exception as e:
logger.error(f"Login error: {str(e)}")
return jsonify({
'success': False,
'error': 'Internal server error',
'code': 'SERVER_ERROR'
}), 500
@simple_auth_bp.route('/auth/verify', methods=['GET'])
@require_auth
def verify_token() -> Tuple[Any, int]:
"""
Verify if the current JWT token is valid.
Headers:
Authorization: Bearer <token>
Response:
{
"success": true,
"message": "Token is valid",
"data": {
"user": "master",
"expires_at": "2025-01-01T00:00:00Z",
"issued_at": "2025-01-01T00:00:00Z"
}
}
"""
try:
payload = request.current_user
return jsonify({
'success': True,
'message': 'Token is valid',
'data': {
'user': payload.get('user'),
'expires_at': datetime.utcfromtimestamp(payload.get('exp')).isoformat() + 'Z',
'issued_at': datetime.utcfromtimestamp(payload.get('iat')).isoformat() + 'Z',
'issuer': payload.get('iss')
}
}), 200
except Exception as e:
logger.error(f"Token verification error: {str(e)}")
return jsonify({
'success': False,
'error': 'Internal server error',
'code': 'SERVER_ERROR'
}), 500
@simple_auth_bp.route('/auth/logout', methods=['POST'])
@require_auth
def logout() -> Tuple[Any, int]:
"""
Logout (client-side token clearing).
Since JWT tokens are stateless, logout is handled client-side
by removing the token. This endpoint confirms logout action.
Headers:
Authorization: Bearer <token>
Response:
{
"success": true,
"message": "Logout successful"
}
"""
try:
logger.info(f"User logged out from IP: {request.remote_addr}")
return jsonify({
'success': True,
'message': 'Logout successful. Please remove the token on client side.',
'data': {
'action': 'clear_token'
}
}), 200
except Exception as e:
logger.error(f"Logout error: {str(e)}")
return jsonify({
'success': False,
'error': 'Internal server error',
'code': 'SERVER_ERROR'
}), 500
@simple_auth_bp.route('/auth/status', methods=['GET'])
def auth_status() -> Tuple[Any, int]:
"""
Check authentication system status.
Response:
{
"success": true,
"message": "Authentication system status",
"data": {
"auth_type": "master_password",
"jwt_enabled": true,
"password_configured": true
}
}
"""
try:
password_configured = bool(MASTER_PASSWORD_HASH or os.getenv('MASTER_PASSWORD'))
return jsonify({
'success': True,
'message': 'Authentication system status',
'data': {
'auth_type': 'master_password',
'jwt_enabled': True,
'password_configured': password_configured,
'token_expiry_hours': TOKEN_EXPIRY_HOURS
}
}), 200
except Exception as e:
logger.error(f"Auth status error: {str(e)}")
return jsonify({
'success': False,
'error': 'Internal server error',
'code': 'SERVER_ERROR'
}), 500
# Utility function to set master password hash
def set_master_password(password: str) -> str:
"""
Generate hash for master password.
This should be used to set MASTER_PASSWORD_HASH in environment.
Args:
password: The master password to hash
Returns:
The hashed password that should be stored in environment
"""
return hash_password(password)
# Health check endpoint
@simple_auth_bp.route('/auth/health', methods=['GET'])
def health_check() -> Tuple[Any, int]:
"""Health check for auth system."""
return jsonify({
'success': True,
'message': 'Auth system is healthy',
'timestamp': datetime.utcnow().isoformat() + 'Z'
}), 200

View File

@ -1,661 +0,0 @@
"""
Storage Management API Endpoints
This module provides REST API endpoints for storage management operations,
including storage monitoring, location management, and disk usage tracking.
"""
from flask import Blueprint, request
from typing import Dict, List, Any, Optional
import os
import shutil
from datetime import datetime
from ...shared.auth_decorators import require_auth, optional_auth
from ...shared.error_handlers import handle_api_errors, APIException, NotFoundError, ValidationError
from ...shared.validators import validate_json_input, validate_id_parameter, validate_pagination_params
from ...shared.response_helpers import (
create_success_response, create_paginated_response, extract_pagination_params
)
# Import storage components (these imports would need to be adjusted based on actual structure)
try:
from database_manager import storage_manager, database_manager, StorageLocation
except ImportError:
# Fallback for development/testing
storage_manager = None
database_manager = None
StorageLocation = None
# Blueprint for storage management endpoints
storage_bp = Blueprint('storage', __name__, url_prefix='/api/v1/storage')
@storage_bp.route('/summary', methods=['GET'])
@handle_api_errors
@optional_auth
def get_storage_summary() -> Dict[str, Any]:
"""
Get overall storage usage summary.
Returns:
Storage summary with usage statistics
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
try:
summary = storage_manager.get_storage_summary()
return create_success_response(
data={
'total_storage_gb': round(summary.get('total_bytes', 0) / (1024**3), 2),
'used_storage_gb': round(summary.get('used_bytes', 0) / (1024**3), 2),
'free_storage_gb': round(summary.get('free_bytes', 0) / (1024**3), 2),
'usage_percentage': summary.get('usage_percentage', 0),
'anime_storage_gb': round(summary.get('anime_bytes', 0) / (1024**3), 2),
'backup_storage_gb': round(summary.get('backup_bytes', 0) / (1024**3), 2),
'cache_storage_gb': round(summary.get('cache_bytes', 0) / (1024**3), 2),
'temp_storage_gb': round(summary.get('temp_bytes', 0) / (1024**3), 2),
'location_count': summary.get('location_count', 0),
'active_locations': summary.get('active_locations', 0),
'last_updated': summary.get('last_updated', datetime.utcnow()).isoformat()
}
)
except Exception as e:
raise APIException(f"Failed to get storage summary: {str(e)}", 500)
@storage_bp.route('/locations', methods=['GET'])
@handle_api_errors
@validate_pagination_params
@optional_auth
def get_storage_locations() -> Dict[str, Any]:
"""
Get all storage locations with optional filtering.
Query Parameters:
- location_type: Filter by location type (primary, backup, cache, temp)
- anime_id: Filter by anime ID
- status: Filter by status (active, inactive, error)
- min_free_gb: Minimum free space in GB
- max_usage_percent: Maximum usage percentage
- page: Page number (default: 1)
- per_page: Items per page (default: 50, max: 1000)
Returns:
Paginated list of storage locations
"""
if not storage_manager or not database_manager:
raise APIException("Storage manager not available", 503)
# Extract filters
location_type_filter = request.args.get('location_type')
anime_id = request.args.get('anime_id')
status_filter = request.args.get('status')
min_free_gb = request.args.get('min_free_gb')
max_usage_percent = request.args.get('max_usage_percent')
# Validate filters
valid_types = ['primary', 'backup', 'cache', 'temp']
if location_type_filter and location_type_filter not in valid_types:
raise ValidationError(f"location_type must be one of: {', '.join(valid_types)}")
if anime_id:
try:
anime_id = int(anime_id)
except ValueError:
raise ValidationError("anime_id must be a valid integer")
valid_statuses = ['active', 'inactive', 'error']
if status_filter and status_filter not in valid_statuses:
raise ValidationError(f"status must be one of: {', '.join(valid_statuses)}")
if min_free_gb:
try:
min_free_gb = float(min_free_gb)
if min_free_gb < 0:
raise ValueError()
except ValueError:
raise ValidationError("min_free_gb must be a non-negative number")
if max_usage_percent:
try:
max_usage_percent = float(max_usage_percent)
if not 0 <= max_usage_percent <= 100:
raise ValueError()
except ValueError:
raise ValidationError("max_usage_percent must be between 0 and 100")
# Get pagination parameters
page, per_page = extract_pagination_params()
try:
# Query storage locations
query = """
SELECT sl.*, am.name as anime_name
FROM storage_locations sl
LEFT JOIN anime_metadata am ON sl.anime_id = am.anime_id
WHERE 1=1
"""
params = []
if location_type_filter:
query += " AND sl.location_type = ?"
params.append(location_type_filter)
if anime_id:
query += " AND sl.anime_id = ?"
params.append(anime_id)
if status_filter:
query += " AND sl.status = ?"
params.append(status_filter)
query += " ORDER BY sl.location_type, sl.path"
results = database_manager.execute_query(query, params)
# Format and filter results
locations = []
for row in results:
free_space_gb = (row['free_space_bytes'] / (1024**3)) if row['free_space_bytes'] else None
total_space_gb = (row['total_space_bytes'] / (1024**3)) if row['total_space_bytes'] else None
usage_percent = None
if row['total_space_bytes'] and row['free_space_bytes']:
usage_percent = ((row['total_space_bytes'] - row['free_space_bytes']) / row['total_space_bytes'] * 100)
# Apply additional filters
if min_free_gb and (free_space_gb is None or free_space_gb < min_free_gb):
continue
if max_usage_percent and (usage_percent is None or usage_percent > max_usage_percent):
continue
location_data = {
'location_id': row['location_id'],
'anime_id': row['anime_id'],
'anime_name': row['anime_name'],
'path': row['path'],
'location_type': row['location_type'],
'status': row['status'],
'free_space_gb': free_space_gb,
'total_space_gb': total_space_gb,
'used_space_gb': (total_space_gb - free_space_gb) if (total_space_gb and free_space_gb) else None,
'usage_percent': usage_percent,
'last_checked': row['last_checked'],
'created_at': row['created_at'],
'is_active': row['is_active'],
'mount_point': row.get('mount_point'),
'filesystem': row.get('filesystem')
}
locations.append(location_data)
# Apply pagination
total = len(locations)
start_idx = (page - 1) * per_page
end_idx = start_idx + per_page
paginated_locations = locations[start_idx:end_idx]
return create_paginated_response(
data=paginated_locations,
page=page,
per_page=per_page,
total=total,
endpoint='storage.get_storage_locations'
)
except Exception as e:
raise APIException(f"Failed to get storage locations: {str(e)}", 500)
@storage_bp.route('/locations', methods=['POST'])
@handle_api_errors
@validate_json_input(
required_fields=['path', 'location_type'],
optional_fields=['anime_id', 'description', 'mount_point', 'auto_create'],
field_types={
'path': str,
'location_type': str,
'anime_id': int,
'description': str,
'mount_point': str,
'auto_create': bool
}
)
@require_auth
def add_storage_location() -> Dict[str, Any]:
"""
Add a new storage location.
Required Fields:
- path: Storage path
- location_type: Type of storage (primary, backup, cache, temp)
Optional Fields:
- anime_id: Associated anime ID (for anime-specific storage)
- description: Location description
- mount_point: Mount point information
- auto_create: Automatically create directory if it doesn't exist
Returns:
Created storage location information
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
data = request.get_json()
path = data['path']
location_type = data['location_type']
anime_id = data.get('anime_id')
description = data.get('description')
mount_point = data.get('mount_point')
auto_create = data.get('auto_create', False)
# Validate location type
valid_types = ['primary', 'backup', 'cache', 'temp']
if location_type not in valid_types:
raise ValidationError(f"location_type must be one of: {', '.join(valid_types)}")
# Validate path
if not path or not isinstance(path, str):
raise ValidationError("path must be a valid string")
# Normalize path
path = os.path.abspath(path)
# Check if path already exists as a storage location
existing_location = storage_manager.get_location_by_path(path)
if existing_location:
raise ValidationError("Storage location with this path already exists")
# Check if directory exists or create it
if not os.path.exists(path):
if auto_create:
try:
os.makedirs(path, exist_ok=True)
except Exception as e:
raise ValidationError(f"Failed to create directory: {str(e)}")
else:
raise ValidationError("Directory does not exist. Set auto_create=true to create it.")
# Check if it's a directory
if not os.path.isdir(path):
raise ValidationError("Path must be a directory")
# Check if it's writable
if not os.access(path, os.W_OK):
raise ValidationError("Directory is not writable")
try:
location_id = storage_manager.add_storage_location(
path=path,
location_type=location_type,
anime_id=anime_id,
description=description,
mount_point=mount_point
)
# Get the created location details
location = storage_manager.get_location_by_id(location_id)
location_data = {
'location_id': location.location_id,
'path': location.path,
'location_type': location.location_type,
'anime_id': location.anime_id,
'description': location.description,
'mount_point': location.mount_point,
'status': location.status,
'created_at': location.created_at.isoformat(),
'is_active': location.is_active
}
return create_success_response(
data=location_data,
message="Storage location added successfully",
status_code=201
)
except Exception as e:
raise APIException(f"Failed to add storage location: {str(e)}", 500)
@storage_bp.route('/locations/<int:location_id>', methods=['GET'])
@handle_api_errors
@validate_id_parameter('location_id')
@optional_auth
def get_storage_location(location_id: int) -> Dict[str, Any]:
"""
Get detailed information about a specific storage location.
Args:
location_id: Unique identifier for the storage location
Returns:
Detailed storage location information
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
location = storage_manager.get_location_by_id(location_id)
if not location:
raise NotFoundError("Storage location not found")
try:
# Get detailed storage statistics
stats = storage_manager.get_location_stats(location_id)
location_data = {
'location_id': location.location_id,
'path': location.path,
'location_type': location.location_type,
'anime_id': location.anime_id,
'description': location.description,
'mount_point': location.mount_point,
'status': location.status,
'created_at': location.created_at.isoformat(),
'last_checked': location.last_checked.isoformat() if location.last_checked else None,
'is_active': location.is_active,
'free_space_gb': round(stats.get('free_bytes', 0) / (1024**3), 2),
'total_space_gb': round(stats.get('total_bytes', 0) / (1024**3), 2),
'used_space_gb': round(stats.get('used_bytes', 0) / (1024**3), 2),
'usage_percent': stats.get('usage_percentage', 0),
'file_count': stats.get('file_count', 0),
'directory_count': stats.get('directory_count', 0),
'largest_file_mb': round(stats.get('largest_file_bytes', 0) / (1024**2), 2),
'filesystem': stats.get('filesystem'),
'mount_options': stats.get('mount_options'),
'health_status': stats.get('health_status', 'unknown')
}
return create_success_response(location_data)
except Exception as e:
raise APIException(f"Failed to get storage location: {str(e)}", 500)
@storage_bp.route('/locations/<int:location_id>', methods=['PUT'])
@handle_api_errors
@validate_id_parameter('location_id')
@validate_json_input(
optional_fields=['description', 'location_type', 'is_active', 'mount_point'],
field_types={
'description': str,
'location_type': str,
'is_active': bool,
'mount_point': str
}
)
@require_auth
def update_storage_location(location_id: int) -> Dict[str, Any]:
"""
Update a storage location.
Args:
location_id: Unique identifier for the storage location
Optional Fields:
- description: Updated description
- location_type: Updated location type
- is_active: Active status
- mount_point: Mount point information
Returns:
Updated storage location information
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
data = request.get_json()
# Check if location exists
location = storage_manager.get_location_by_id(location_id)
if not location:
raise NotFoundError("Storage location not found")
# Validate location type if provided
if 'location_type' in data:
valid_types = ['primary', 'backup', 'cache', 'temp']
if data['location_type'] not in valid_types:
raise ValidationError(f"location_type must be one of: {', '.join(valid_types)}")
try:
# Update location
success = storage_manager.update_location(location_id, data)
if not success:
raise APIException("Failed to update storage location", 500)
# Get updated location
updated_location = storage_manager.get_location_by_id(location_id)
location_data = {
'location_id': updated_location.location_id,
'path': updated_location.path,
'location_type': updated_location.location_type,
'anime_id': updated_location.anime_id,
'description': updated_location.description,
'mount_point': updated_location.mount_point,
'status': updated_location.status,
'is_active': updated_location.is_active,
'updated_at': datetime.utcnow().isoformat()
}
return create_success_response(
data=location_data,
message="Storage location updated successfully"
)
except Exception as e:
raise APIException(f"Failed to update storage location: {str(e)}", 500)
@storage_bp.route('/locations/<int:location_id>', methods=['DELETE'])
@handle_api_errors
@validate_id_parameter('location_id')
@require_auth
def delete_storage_location(location_id: int) -> Dict[str, Any]:
"""
Delete a storage location.
Args:
location_id: Unique identifier for the storage location
Query Parameters:
- force: Force deletion even if location contains files
- delete_files: Also delete files in the location
Returns:
Deletion confirmation
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
# Check if location exists
location = storage_manager.get_location_by_id(location_id)
if not location:
raise NotFoundError("Storage location not found")
force = request.args.get('force', 'false').lower() == 'true'
delete_files = request.args.get('delete_files', 'false').lower() == 'true'
try:
# Check if location has files (unless force is used)
if not force:
stats = storage_manager.get_location_stats(location_id)
if stats.get('file_count', 0) > 0:
raise ValidationError(
f"Storage location contains {stats['file_count']} files. "
"Use force=true to delete anyway."
)
# Delete location
success = storage_manager.delete_location(location_id, delete_files=delete_files)
if not success:
raise APIException("Failed to delete storage location", 500)
message = f"Storage location deleted successfully"
if delete_files:
message += " (including all files)"
return create_success_response(message=message)
except Exception as e:
raise APIException(f"Failed to delete storage location: {str(e)}", 500)
@storage_bp.route('/locations/<int:location_id>/refresh', methods=['POST'])
@handle_api_errors
@validate_id_parameter('location_id')
@require_auth
def refresh_storage_location(location_id: int) -> Dict[str, Any]:
"""
Refresh storage statistics for a location.
Args:
location_id: Unique identifier for the storage location
Returns:
Updated storage statistics
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
# Check if location exists
location = storage_manager.get_location_by_id(location_id)
if not location:
raise NotFoundError("Storage location not found")
try:
# Update storage statistics
stats = storage_manager.update_location_stats(location_id)
return create_success_response(
data={
'location_id': location_id,
'free_space_gb': round(stats.get('free_bytes', 0) / (1024**3), 2),
'total_space_gb': round(stats.get('total_bytes', 0) / (1024**3), 2),
'used_space_gb': round(stats.get('used_bytes', 0) / (1024**3), 2),
'usage_percent': stats.get('usage_percentage', 0),
'file_count': stats.get('file_count', 0),
'directory_count': stats.get('directory_count', 0),
'last_updated': datetime.utcnow().isoformat()
},
message="Storage statistics updated successfully"
)
except Exception as e:
raise APIException(f"Failed to refresh storage location: {str(e)}", 500)
@storage_bp.route('/cleanup', methods=['POST'])
@handle_api_errors
@validate_json_input(
optional_fields=['location_type', 'target_usage_percent', 'cleanup_temp', 'cleanup_cache', 'dry_run'],
field_types={
'location_type': str,
'target_usage_percent': float,
'cleanup_temp': bool,
'cleanup_cache': bool,
'dry_run': bool
}
)
@require_auth
def cleanup_storage() -> Dict[str, Any]:
"""
Perform storage cleanup operations.
Optional Fields:
- location_type: Type of locations to clean (temp, cache, backup)
- target_usage_percent: Target usage percentage after cleanup
- cleanup_temp: Clean temporary files
- cleanup_cache: Clean cache files
- dry_run: Preview what would be cleaned without actually doing it
Returns:
Cleanup results
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
data = request.get_json() or {}
location_type = data.get('location_type', 'temp')
target_usage_percent = data.get('target_usage_percent', 80.0)
cleanup_temp = data.get('cleanup_temp', True)
cleanup_cache = data.get('cleanup_cache', False)
dry_run = data.get('dry_run', False)
# Validate parameters
valid_types = ['temp', 'cache', 'backup']
if location_type not in valid_types:
raise ValidationError(f"location_type must be one of: {', '.join(valid_types)}")
if not 0 <= target_usage_percent <= 100:
raise ValidationError("target_usage_percent must be between 0 and 100")
try:
cleanup_result = storage_manager.cleanup_storage(
location_type=location_type,
target_usage_percent=target_usage_percent,
cleanup_temp=cleanup_temp,
cleanup_cache=cleanup_cache,
dry_run=dry_run
)
return create_success_response(
data={
'dry_run': dry_run,
'location_type': location_type,
'files_deleted': cleanup_result.get('files_deleted', 0),
'directories_deleted': cleanup_result.get('directories_deleted', 0),
'space_freed_gb': round(cleanup_result.get('space_freed_bytes', 0) / (1024**3), 2),
'cleanup_summary': cleanup_result.get('summary', {}),
'target_usage_percent': target_usage_percent,
'final_usage_percent': cleanup_result.get('final_usage_percent')
},
message=f"Storage cleanup {'simulated' if dry_run else 'completed'}"
)
except Exception as e:
raise APIException(f"Failed to cleanup storage: {str(e)}", 500)
@storage_bp.route('/health', methods=['GET'])
@handle_api_errors
@optional_auth
def get_storage_health() -> Dict[str, Any]:
"""
Get storage health status across all locations.
Returns:
Storage health information
"""
if not storage_manager:
raise APIException("Storage manager not available", 503)
try:
health_status = storage_manager.get_storage_health()
return create_success_response(
data={
'overall_status': health_status.get('overall_status', 'unknown'),
'total_locations': health_status.get('total_locations', 0),
'healthy_locations': health_status.get('healthy_locations', 0),
'warning_locations': health_status.get('warning_locations', 0),
'error_locations': health_status.get('error_locations', 0),
'average_usage_percent': health_status.get('average_usage_percent', 0),
'locations_near_full': health_status.get('locations_near_full', []),
'locations_with_errors': health_status.get('locations_with_errors', []),
'recommendations': health_status.get('recommendations', []),
'last_check': health_status.get('last_check', datetime.utcnow()).isoformat()
}
)
except Exception as e:
raise APIException(f"Failed to get storage health: {str(e)}", 500)

View File

@ -1,352 +0,0 @@
"""
Base controller with common functionality for all controllers.
This module provides a base controller class that eliminates common duplications
across different controller modules by providing standardized error handling,
validation, and response formatting.
"""
from abc import ABC
from typing import Any, Dict, Optional, List, Union, Tuple, Callable
try:
from flask import jsonify, request
from werkzeug.exceptions import HTTPException
except ImportError:
# Fallback for environments without Flask
def jsonify(data):
import json
return json.dumps(data)
class HTTPException(Exception):
def __init__(self, status_code, detail):
self.status_code = status_code
self.detail = detail
super().__init__(detail)
class request:
is_json = False
@staticmethod
def get_json():
return {}
headers = {}
args = {}
form = {}
try:
from pydantic import BaseModel
except ImportError:
# Fallback BaseModel
class BaseModel:
pass
import logging
import functools
class BaseController(ABC):
"""Base controller with common functionality for all controllers."""
def __init__(self):
self.logger = logging.getLogger(self.__class__.__name__)
def handle_error(self, error: Exception, status_code: int = 500) -> HTTPException:
"""
Standardized error handling across all controllers.
Args:
error: The exception that occurred
status_code: HTTP status code to return
Returns:
HTTPException with standardized format
"""
self.logger.error(f"Controller error: {str(error)}", exc_info=True)
return HTTPException(status_code, str(error))
def validate_request(self, data: BaseModel) -> bool:
"""
Common validation logic for request data.
Args:
data: Pydantic model to validate
Returns:
True if validation passes
Raises:
ValidationError if validation fails
"""
try:
# Pydantic models automatically validate on instantiation
return True
except Exception as e:
self.logger.warning(f"Validation failed: {str(e)}")
raise
def format_response(self, data: Any, message: str = "Success") -> Dict[str, Any]:
"""
Standardized response format for successful operations.
Args:
data: Data to include in response
message: Success message
Returns:
Standardized success response dictionary
"""
return {
"status": "success",
"message": message,
"data": data
}
def format_error_response(self, message: str, status_code: int = 400, details: Any = None) -> Tuple[Dict[str, Any], int]:
"""
Standardized error response format.
Args:
message: Error message
status_code: HTTP status code
details: Additional error details
Returns:
Tuple of (error_response_dict, status_code)
"""
response = {
"status": "error",
"message": message,
"error_code": status_code
}
if details:
response["details"] = details
return response, status_code
def create_success_response(
self,
data: Any = None,
message: str = "Operation successful",
status_code: int = 200,
pagination: Optional[Dict[str, Any]] = None,
meta: Optional[Dict[str, Any]] = None
) -> Tuple[Dict[str, Any], int]:
"""
Create a standardized success response.
Args:
data: Data to include in response
message: Success message
status_code: HTTP status code
pagination: Pagination information
meta: Additional metadata
Returns:
Tuple of (response_dict, status_code)
"""
response = {
'status': 'success',
'message': message
}
if data is not None:
response['data'] = data
if pagination:
response['pagination'] = pagination
if meta:
response['meta'] = meta
return response, status_code
def create_error_response(
self,
message: str,
status_code: int = 400,
details: Any = None,
error_code: Optional[str] = None
) -> Tuple[Dict[str, Any], int]:
"""
Create a standardized error response.
Args:
message: Error message
status_code: HTTP status code
details: Additional error details
error_code: Specific error code
Returns:
Tuple of (response_dict, status_code)
"""
response = {
'status': 'error',
'message': message,
'error_code': error_code or status_code
}
if details:
response['details'] = details
return response, status_code
def handle_api_errors(f: Callable) -> Callable:
"""
Decorator for standardized API error handling.
This decorator should be used on all API endpoints to ensure
consistent error handling and response formatting.
"""
@functools.wraps(f)
def decorated_function(*args, **kwargs):
try:
return f(*args, **kwargs)
except HTTPException:
# Re-raise HTTP exceptions as they are already properly formatted
raise
except ValueError as e:
# Handle validation errors
return jsonify({
'status': 'error',
'message': 'Invalid input data',
'details': str(e),
'error_code': 400
}), 400
except PermissionError as e:
# Handle authorization errors
return jsonify({
'status': 'error',
'message': 'Access denied',
'details': str(e),
'error_code': 403
}), 403
except FileNotFoundError as e:
# Handle not found errors
return jsonify({
'status': 'error',
'message': 'Resource not found',
'details': str(e),
'error_code': 404
}), 404
except Exception as e:
# Handle all other errors
logging.getLogger(__name__).error(f"Unhandled error in {f.__name__}: {str(e)}", exc_info=True)
return jsonify({
'status': 'error',
'message': 'Internal server error',
'details': str(e) if logging.getLogger().isEnabledFor(logging.DEBUG) else 'An unexpected error occurred',
'error_code': 500
}), 500
return decorated_function
def require_auth(f: Callable) -> Callable:
"""
Decorator to require authentication for API endpoints.
This decorator should be applied to endpoints that require
user authentication.
"""
@functools.wraps(f)
def decorated_function(*args, **kwargs):
# Implementation would depend on your authentication system
# For now, this is a placeholder that should be implemented
# based on your specific authentication requirements
# Example implementation:
# auth_header = request.headers.get('Authorization')
# if not auth_header or not validate_auth_token(auth_header):
# return jsonify({
# 'status': 'error',
# 'message': 'Authentication required',
# 'error_code': 401
# }), 401
return f(*args, **kwargs)
return decorated_function
def optional_auth(f: Callable) -> Callable:
"""
Decorator for optional authentication.
This decorator allows endpoints to work with or without authentication,
but provides additional functionality when authenticated.
"""
@functools.wraps(f)
def decorated_function(*args, **kwargs):
# Implementation would depend on your authentication system
# This would set user context if authenticated, but not fail if not
return f(*args, **kwargs)
return decorated_function
def validate_json_input(
required_fields: Optional[List[str]] = None,
optional_fields: Optional[List[str]] = None,
**field_validators
) -> Callable:
"""
Decorator for JSON input validation.
Args:
required_fields: List of required field names
optional_fields: List of optional field names
**field_validators: Field-specific validation functions
Returns:
Decorator function
"""
def decorator(f: Callable) -> Callable:
@functools.wraps(f)
def decorated_function(*args, **kwargs):
if not request.is_json:
return jsonify({
'status': 'error',
'message': 'Request must contain JSON data',
'error_code': 400
}), 400
data = request.get_json()
if not data:
return jsonify({
'status': 'error',
'message': 'Invalid JSON data',
'error_code': 400
}), 400
# Check required fields
if required_fields:
missing_fields = [field for field in required_fields if field not in data]
if missing_fields:
return jsonify({
'status': 'error',
'message': f'Missing required fields: {", ".join(missing_fields)}',
'error_code': 400
}), 400
# Apply field validators
for field, validator in field_validators.items():
if field in data:
try:
if not validator(data[field]):
return jsonify({
'status': 'error',
'message': f'Invalid value for field: {field}',
'error_code': 400
}), 400
except Exception as e:
return jsonify({
'status': 'error',
'message': f'Validation error for field {field}: {str(e)}',
'error_code': 400
}), 400
return f(*args, **kwargs)
return decorated_function
return decorator

View File

@ -1 +0,0 @@
"""Shared utilities and helpers for web controllers."""

View File

@ -1,150 +0,0 @@
"""
Authentication decorators and utilities for API endpoints.
This module provides authentication decorators that can be used across
all controller modules for consistent authentication handling.
"""
import logging
from functools import wraps
from typing import Optional, Dict, Any, Callable
from flask import session, request, jsonify, redirect, url_for
# Import session manager from auth controller
from ..auth_controller import session_manager
def require_auth(f: Callable) -> Callable:
"""
Decorator to require authentication for Flask routes.
Args:
f: The function to decorate
Returns:
Decorated function that requires authentication
Usage:
@require_auth
def protected_endpoint():
return "This requires authentication"
"""
@wraps(f)
def decorated_function(*args, **kwargs):
if not session_manager.is_authenticated():
# Check if this is an AJAX request (JSON, XMLHttpRequest, or fetch API request)
is_ajax = (
request.is_json or
request.headers.get('X-Requested-With') == 'XMLHttpRequest' or
request.headers.get('Accept', '').startswith('application/json') or
'/api/' in request.path # API endpoints should return JSON
)
if is_ajax:
return jsonify({
'status': 'error',
'message': 'Authentication required',
'code': 'AUTH_REQUIRED'
}), 401
else:
return redirect(url_for('auth.login'))
return f(*args, **kwargs)
return decorated_function
def optional_auth(f: Callable) -> Callable:
"""
Decorator that checks auth but doesn't require it.
This decorator will only require authentication if a master password
has been configured in the system.
Args:
f: The function to decorate
Returns:
Decorated function that optionally requires authentication
Usage:
@optional_auth
def maybe_protected_endpoint():
return "This may require authentication"
"""
@wraps(f)
def decorated_function(*args, **kwargs):
# Import config here to avoid circular imports
from config import config
# Check if master password is configured
if config.has_master_password():
# If configured, require authentication
if not session_manager.is_authenticated():
# Check if this is an AJAX request (JSON, XMLHttpRequest, or fetch API request)
is_ajax = (
request.is_json or
request.headers.get('X-Requested-With') == 'XMLHttpRequest' or
request.headers.get('Accept', '').startswith('application/json') or
'/api/' in request.path # API endpoints should return JSON
)
if is_ajax:
return jsonify({
'status': 'error',
'message': 'Authentication required',
'code': 'AUTH_REQUIRED'
}), 401
else:
return redirect(url_for('auth.login'))
return f(*args, **kwargs)
return decorated_function
def get_current_user() -> Optional[Dict[str, Any]]:
"""
Get current authenticated user information.
Returns:
Dictionary containing user information if authenticated, None otherwise
"""
if session_manager.is_authenticated():
return session_manager.get_session_info()
return None
def get_client_ip() -> str:
"""
Get client IP address with proxy support.
Returns:
Client IP address as string
"""
# Check for forwarded IP (in case of reverse proxy)
forwarded_ip = request.headers.get('X-Forwarded-For')
if forwarded_ip:
return forwarded_ip.split(',')[0].strip()
real_ip = request.headers.get('X-Real-IP')
if real_ip:
return real_ip
return request.remote_addr or 'unknown'
def is_authenticated() -> bool:
"""
Check if current request is from an authenticated user.
Returns:
True if authenticated, False otherwise
"""
return session_manager.is_authenticated()
def logout_current_user() -> bool:
"""
Logout the current user.
Returns:
True if logout was successful, False otherwise
"""
return session_manager.logout()

View File

@ -1,286 +0,0 @@
"""
Error handling decorators and utilities for API endpoints.
This module provides standardized error handling decorators and utilities
that can be used across all controller modules for consistent error responses.
"""
import logging
import traceback
from functools import wraps
from typing import Dict, Any, Callable, Tuple, Optional, Union
from flask import jsonify, request
logger = logging.getLogger(__name__)
def handle_api_errors(f: Callable) -> Callable:
"""
Decorator to handle API errors consistently across all endpoints.
This decorator catches exceptions and returns standardized error responses
with appropriate HTTP status codes.
Args:
f: The function to decorate
Returns:
Decorated function with error handling
Usage:
@handle_api_errors
def my_endpoint():
# This will automatically handle any exceptions
return {"data": "success"}
"""
@wraps(f)
def decorated_function(*args, **kwargs):
try:
result = f(*args, **kwargs)
# If result is already a Response object, return it
if hasattr(result, 'status_code'):
return result
# If result is a tuple (data, status_code), handle it
if isinstance(result, tuple) and len(result) == 2:
data, status_code = result
if isinstance(data, dict) and 'status' not in data:
data['status'] = 'success' if 200 <= status_code < 300 else 'error'
return jsonify(data), status_code
# If result is a dict, wrap it in success response
if isinstance(result, dict):
if 'status' not in result:
result['status'] = 'success'
return jsonify(result)
# For other types, wrap in success response
return jsonify({
'status': 'success',
'data': result
})
except ValueError as e:
logger.warning(f"Validation error in {f.__name__}: {str(e)}")
return create_error_response(
message=str(e),
status_code=400,
error_code='VALIDATION_ERROR'
)
except PermissionError as e:
logger.warning(f"Permission error in {f.__name__}: {str(e)}")
return create_error_response(
message="Access denied",
status_code=403,
error_code='ACCESS_DENIED'
)
except FileNotFoundError as e:
logger.warning(f"File not found in {f.__name__}: {str(e)}")
return create_error_response(
message="Resource not found",
status_code=404,
error_code='NOT_FOUND'
)
except Exception as e:
logger.error(f"Unexpected error in {f.__name__}: {str(e)}")
logger.error(f"Traceback: {traceback.format_exc()}")
# Don't expose internal errors in production
return create_error_response(
message="Internal server error",
status_code=500,
error_code='INTERNAL_ERROR'
)
return decorated_function
def handle_database_errors(f: Callable) -> Callable:
"""
Decorator specifically for database-related operations.
Args:
f: The function to decorate
Returns:
Decorated function with database error handling
"""
@wraps(f)
def decorated_function(*args, **kwargs):
try:
return f(*args, **kwargs)
except Exception as e:
logger.error(f"Database error in {f.__name__}: {str(e)}")
return create_error_response(
message="Database operation failed",
status_code=500,
error_code='DATABASE_ERROR'
)
return decorated_function
def handle_file_operations(f: Callable) -> Callable:
"""
Decorator for file operation error handling.
Args:
f: The function to decorate
Returns:
Decorated function with file operation error handling
"""
@wraps(f)
def decorated_function(*args, **kwargs):
try:
return f(*args, **kwargs)
except FileNotFoundError as e:
logger.warning(f"File not found in {f.__name__}: {str(e)}")
return create_error_response(
message="File not found",
status_code=404,
error_code='FILE_NOT_FOUND'
)
except PermissionError as e:
logger.warning(f"File permission error in {f.__name__}: {str(e)}")
return create_error_response(
message="Permission denied",
status_code=403,
error_code='PERMISSION_DENIED'
)
except OSError as e:
logger.error(f"File system error in {f.__name__}: {str(e)}")
return create_error_response(
message="File system error",
status_code=500,
error_code='FILE_SYSTEM_ERROR'
)
return decorated_function
def create_error_response(
message: str,
status_code: int = 400,
error_code: Optional[str] = None,
errors: Optional[list] = None,
data: Optional[Dict[str, Any]] = None
) -> Tuple[Dict[str, Any], int]:
"""
Create a standardized error response.
Args:
message: Error message to display
status_code: HTTP status code
error_code: Optional error code for client handling
errors: Optional list of detailed errors
data: Optional additional data
Returns:
Tuple of (response_dict, status_code)
"""
response = {
'status': 'error',
'message': message
}
if error_code:
response['error_code'] = error_code
if errors:
response['errors'] = errors
if data:
response['data'] = data
return response, status_code
def create_success_response(
data: Any = None,
message: str = "Operation successful",
status_code: int = 200
) -> Tuple[Dict[str, Any], int]:
"""
Create a standardized success response.
Args:
data: Data to include in response
message: Success message
status_code: HTTP status code
Returns:
Tuple of (response_dict, status_code)
"""
response = {
'status': 'success',
'message': message
}
if data is not None:
response['data'] = data
return response, status_code
def log_request_info():
"""Log request information for debugging."""
logger.info(f"Request: {request.method} {request.path}")
if request.is_json:
logger.debug(f"Request JSON: {request.get_json()}")
if request.args:
logger.debug(f"Request args: {dict(request.args)}")
class APIException(Exception):
"""Custom exception for API errors."""
def __init__(
self,
message: str,
status_code: int = 400,
error_code: Optional[str] = None,
errors: Optional[list] = None
):
self.message = message
self.status_code = status_code
self.error_code = error_code
self.errors = errors
super().__init__(message)
class ValidationError(APIException):
"""Exception for validation errors."""
def __init__(self, message: str, errors: Optional[list] = None):
super().__init__(
message=message,
status_code=400,
error_code='VALIDATION_ERROR',
errors=errors
)
class NotFoundError(APIException):
"""Exception for not found errors."""
def __init__(self, message: str = "Resource not found"):
super().__init__(
message=message,
status_code=404,
error_code='NOT_FOUND'
)
class PermissionError(APIException):
"""Exception for permission errors."""
def __init__(self, message: str = "Access denied"):
super().__init__(
message=message,
status_code=403,
error_code='ACCESS_DENIED'
)

View File

@ -1,406 +0,0 @@
"""
Response formatting utilities for API endpoints.
This module provides utilities for creating consistent response formats
across all controller modules.
"""
from typing import Any, Dict, List, Optional, Union, Tuple
from flask import jsonify, url_for, request
import math
def create_success_response(
data: Any = None,
message: str = "Operation successful",
status_code: int = 200,
pagination: Optional[Dict[str, Any]] = None,
meta: Optional[Dict[str, Any]] = None
) -> Tuple[Dict[str, Any], int]:
"""
Create a standardized success response.
Args:
data: Data to include in response
message: Success message
status_code: HTTP status code
pagination: Pagination information
meta: Additional metadata
Returns:
Tuple of (response_dict, status_code)
"""
response = {
'status': 'success',
'message': message
}
if data is not None:
response['data'] = data
if pagination:
response['pagination'] = pagination
if meta:
response['meta'] = meta
return response, status_code
def create_error_response(
message: str,
status_code: int = 400,
error_code: Optional[str] = None,
errors: Optional[List[str]] = None,
data: Optional[Dict[str, Any]] = None
) -> Tuple[Dict[str, Any], int]:
"""
Create a standardized error response.
Args:
message: Error message to display
status_code: HTTP status code
error_code: Optional error code for client handling
errors: Optional list of detailed errors
data: Optional additional data
Returns:
Tuple of (response_dict, status_code)
"""
response = {
'status': 'error',
'message': message
}
if error_code:
response['error_code'] = error_code
if errors:
response['errors'] = errors
if data:
response['data'] = data
return response, status_code
def create_paginated_response(
data: List[Any],
page: int,
per_page: int,
total: int,
endpoint: Optional[str] = None,
**kwargs
) -> Dict[str, Any]:
"""
Create a paginated response with navigation links.
Args:
data: List of data items for current page
page: Current page number (1-based)
per_page: Items per page
total: Total number of items
endpoint: Flask endpoint name for pagination links
**kwargs: Additional parameters for pagination links
Returns:
Dictionary containing paginated response
"""
total_pages = math.ceil(total / per_page) if per_page > 0 else 1
pagination_info = {
'page': page,
'per_page': per_page,
'total': total,
'total_pages': total_pages,
'has_next': page < total_pages,
'has_prev': page > 1
}
# Add navigation links if endpoint is provided
if endpoint:
base_url = request.url_root.rstrip('/')
# Current page
pagination_info['current_url'] = url_for(endpoint, page=page, per_page=per_page, **kwargs)
# First page
pagination_info['first_url'] = url_for(endpoint, page=1, per_page=per_page, **kwargs)
# Last page
pagination_info['last_url'] = url_for(endpoint, page=total_pages, per_page=per_page, **kwargs)
# Previous page
if pagination_info['has_prev']:
pagination_info['prev_url'] = url_for(endpoint, page=page-1, per_page=per_page, **kwargs)
# Next page
if pagination_info['has_next']:
pagination_info['next_url'] = url_for(endpoint, page=page+1, per_page=per_page, **kwargs)
return {
'status': 'success',
'data': data,
'pagination': pagination_info
}
def paginate_query_results(
items: List[Any],
page: Optional[int] = None,
per_page: Optional[int] = None,
default_per_page: int = 50,
max_per_page: int = 1000
) -> Tuple[List[Any], int, int, int]:
"""
Paginate a list of items based on query parameters.
Args:
items: List of items to paginate
page: Page number (from query params)
per_page: Items per page (from query params)
default_per_page: Default items per page
max_per_page: Maximum allowed items per page
Returns:
Tuple of (paginated_items, page, per_page, total)
"""
total = len(items)
# Parse pagination parameters
if page is None:
page = int(request.args.get('page', 1))
if per_page is None:
per_page = int(request.args.get('per_page', default_per_page))
# Validate parameters
page = max(1, page)
per_page = min(max(1, per_page), max_per_page)
# Calculate offset
offset = (page - 1) * per_page
# Slice the items
paginated_items = items[offset:offset + per_page]
return paginated_items, page, per_page, total
def format_anime_response(anime_data: Dict[str, Any]) -> Dict[str, Any]:
"""
Format anime data for API response.
Args:
anime_data: Raw anime data from database
Returns:
Formatted anime data
"""
formatted = {
'id': anime_data.get('id'),
'name': anime_data.get('name'),
'url': anime_data.get('url'),
'description': anime_data.get('description'),
'episodes': anime_data.get('episodes'),
'status': anime_data.get('status', 'planned'),
'created_at': anime_data.get('created_at'),
'updated_at': anime_data.get('updated_at')
}
# Remove None values
return {k: v for k, v in formatted.items() if v is not None}
def format_episode_response(episode_data: Dict[str, Any]) -> Dict[str, Any]:
"""
Format episode data for API response.
Args:
episode_data: Raw episode data from database
Returns:
Formatted episode data
"""
formatted = {
'id': episode_data.get('id'),
'anime_id': episode_data.get('anime_id'),
'episode_number': episode_data.get('episode_number'),
'title': episode_data.get('title'),
'url': episode_data.get('url'),
'status': episode_data.get('status', 'available'),
'download_path': episode_data.get('download_path'),
'file_size': episode_data.get('file_size'),
'created_at': episode_data.get('created_at'),
'updated_at': episode_data.get('updated_at')
}
# Remove None values
return {k: v for k, v in formatted.items() if v is not None}
def format_download_response(download_data: Dict[str, Any]) -> Dict[str, Any]:
"""
Format download data for API response.
Args:
download_data: Raw download data
Returns:
Formatted download data
"""
formatted = {
'id': download_data.get('id'),
'anime_id': download_data.get('anime_id'),
'episode_id': download_data.get('episode_id'),
'status': download_data.get('status', 'pending'),
'progress': download_data.get('progress', 0),
'speed': download_data.get('speed'),
'eta': download_data.get('eta'),
'error_message': download_data.get('error_message'),
'started_at': download_data.get('started_at'),
'completed_at': download_data.get('completed_at')
}
# Remove None values
return {k: v for k, v in formatted.items() if v is not None}
def format_bulk_operation_response(operation_data: Dict[str, Any]) -> Dict[str, Any]:
"""
Format bulk operation data for API response.
Args:
operation_data: Raw bulk operation data
Returns:
Formatted bulk operation data
"""
formatted = {
'id': operation_data.get('id'),
'type': operation_data.get('type'),
'status': operation_data.get('status', 'pending'),
'total_items': operation_data.get('total_items', 0),
'completed_items': operation_data.get('completed_items', 0),
'failed_items': operation_data.get('failed_items', 0),
'progress_percentage': operation_data.get('progress_percentage', 0),
'started_at': operation_data.get('started_at'),
'completed_at': operation_data.get('completed_at'),
'error_message': operation_data.get('error_message')
}
# Remove None values
return {k: v for k, v in formatted.items() if v is not None}
def format_health_response(health_data: Dict[str, Any]) -> Dict[str, Any]:
"""
Format health check data for API response.
Args:
health_data: Raw health check data
Returns:
Formatted health data
"""
formatted = {
'status': health_data.get('status', 'unknown'),
'uptime': health_data.get('uptime'),
'version': health_data.get('version'),
'components': health_data.get('components', {}),
'timestamp': health_data.get('timestamp')
}
# Remove None values
return {k: v for k, v in formatted.items() if v is not None}
def add_resource_links(data: Dict[str, Any], resource_type: str, resource_id: Any) -> Dict[str, Any]:
"""
Add HATEOAS-style links to a resource response.
Args:
data: Resource data
resource_type: Type of resource (anime, episode, etc.)
resource_id: Resource identifier
Returns:
Data with added links
"""
if '_links' not in data:
data['_links'] = {}
# Self link
data['_links']['self'] = url_for(f'api.get_{resource_type}', id=resource_id)
# Collection link
data['_links']['collection'] = url_for(f'api.list_{resource_type}s')
return data
def create_batch_response(
successful_items: List[Dict[str, Any]],
failed_items: List[Dict[str, Any]],
message: Optional[str] = None
) -> Dict[str, Any]:
"""
Create response for batch operations.
Args:
successful_items: List of successfully processed items
failed_items: List of failed items with errors
message: Optional message
Returns:
Batch operation response
"""
total_items = len(successful_items) + len(failed_items)
success_count = len(successful_items)
failure_count = len(failed_items)
response = {
'status': 'success' if failure_count == 0 else 'partial_success',
'message': message or f"Processed {success_count}/{total_items} items successfully",
'summary': {
'total': total_items,
'successful': success_count,
'failed': failure_count
},
'data': {
'successful': successful_items,
'failed': failed_items
}
}
return response
def extract_pagination_params(
default_page: int = 1,
default_per_page: int = 50,
max_per_page: int = 1000
) -> Tuple[int, int]:
"""
Extract and validate pagination parameters from request.
Args:
default_page: Default page number
default_per_page: Default items per page
max_per_page: Maximum allowed items per page
Returns:
Tuple of (page, per_page)
"""
try:
page = int(request.args.get('page', default_page))
page = max(1, page)
except (ValueError, TypeError):
page = default_page
try:
per_page = int(request.args.get('per_page', default_per_page))
per_page = min(max(1, per_page), max_per_page)
except (ValueError, TypeError):
per_page = default_per_page
return page, per_page

View File

@ -1,446 +0,0 @@
"""
Input validation utilities for API endpoints.
This module provides validation functions and decorators for consistent
input validation across all controller modules.
"""
import re
import os
from typing import Any, Dict, List, Optional, Union, Callable, Tuple
from functools import wraps
from flask import request, jsonify
from .error_handlers import ValidationError, create_error_response
def validate_json_input(required_fields: Optional[List[str]] = None,
optional_fields: Optional[List[str]] = None,
field_types: Optional[Dict[str, type]] = None) -> Callable:
"""
Decorator to validate JSON input for API endpoints.
Args:
required_fields: List of required field names
optional_fields: List of optional field names
field_types: Dictionary mapping field names to expected types
Returns:
Decorator function
Usage:
@validate_json_input(
required_fields=['name', 'url'],
optional_fields=['description'],
field_types={'name': str, 'url': str, 'episodes': int}
)
def create_anime():
data = request.get_json()
# data is now validated
"""
def decorator(f: Callable) -> Callable:
@wraps(f)
def decorated_function(*args, **kwargs):
if not request.is_json:
return create_error_response(
message="Request must be JSON",
status_code=400,
error_code='INVALID_CONTENT_TYPE'
)
try:
data = request.get_json()
except Exception:
return create_error_response(
message="Invalid JSON format",
status_code=400,
error_code='INVALID_JSON'
)
if data is None:
return create_error_response(
message="Request body cannot be empty",
status_code=400,
error_code='EMPTY_BODY'
)
# Validate required fields
if required_fields:
missing_fields = []
for field in required_fields:
if field not in data or data[field] is None:
missing_fields.append(field)
if missing_fields:
return create_error_response(
message=f"Missing required fields: {', '.join(missing_fields)}",
status_code=400,
error_code='MISSING_FIELDS',
errors=missing_fields
)
# Validate field types
if field_types:
type_errors = []
for field, expected_type in field_types.items():
if field in data and data[field] is not None:
if not isinstance(data[field], expected_type):
type_errors.append(f"{field} must be of type {expected_type.__name__}")
if type_errors:
return create_error_response(
message="Type validation failed",
status_code=400,
error_code='TYPE_ERROR',
errors=type_errors
)
# Check for unexpected fields
all_allowed = (required_fields or []) + (optional_fields or [])
if all_allowed:
unexpected_fields = [field for field in data.keys() if field not in all_allowed]
if unexpected_fields:
return create_error_response(
message=f"Unexpected fields: {', '.join(unexpected_fields)}",
status_code=400,
error_code='UNEXPECTED_FIELDS',
errors=unexpected_fields
)
return f(*args, **kwargs)
return decorated_function
return decorator
def validate_query_params(allowed_params: Optional[List[str]] = None,
required_params: Optional[List[str]] = None,
param_types: Optional[Dict[str, type]] = None) -> Callable:
"""
Decorator to validate query parameters.
Args:
allowed_params: List of allowed parameter names
required_params: List of required parameter names
param_types: Dictionary mapping parameter names to expected types
Returns:
Decorator function
"""
def decorator(f: Callable) -> Callable:
@wraps(f)
def decorated_function(*args, **kwargs):
# Check required parameters
if required_params:
missing_params = []
for param in required_params:
if param not in request.args:
missing_params.append(param)
if missing_params:
return create_error_response(
message=f"Missing required parameters: {', '.join(missing_params)}",
status_code=400,
error_code='MISSING_PARAMS'
)
# Check allowed parameters
if allowed_params:
unexpected_params = [param for param in request.args.keys() if param not in allowed_params]
if unexpected_params:
return create_error_response(
message=f"Unexpected parameters: {', '.join(unexpected_params)}",
status_code=400,
error_code='UNEXPECTED_PARAMS'
)
# Validate parameter types
if param_types:
type_errors = []
for param, expected_type in param_types.items():
if param in request.args:
value = request.args.get(param)
try:
if expected_type == int:
int(value)
elif expected_type == float:
float(value)
elif expected_type == bool:
if value.lower() not in ['true', 'false', '1', '0']:
raise ValueError()
except ValueError:
type_errors.append(f"{param} must be of type {expected_type.__name__}")
if type_errors:
return create_error_response(
message="Parameter type validation failed",
status_code=400,
error_code='PARAM_TYPE_ERROR',
errors=type_errors
)
return f(*args, **kwargs)
return decorated_function
return decorator
def validate_pagination_params(f: Callable) -> Callable:
"""
Decorator to validate pagination parameters (page, per_page, limit, offset).
Args:
f: The function to decorate
Returns:
Decorated function with pagination validation
"""
@wraps(f)
def decorated_function(*args, **kwargs):
errors = []
# Validate page parameter
page = request.args.get('page')
if page is not None:
try:
page_int = int(page)
if page_int < 1:
errors.append("page must be greater than 0")
except ValueError:
errors.append("page must be an integer")
# Validate per_page parameter
per_page = request.args.get('per_page')
if per_page is not None:
try:
per_page_int = int(per_page)
if per_page_int < 1:
errors.append("per_page must be greater than 0")
elif per_page_int > 1000:
errors.append("per_page cannot exceed 1000")
except ValueError:
errors.append("per_page must be an integer")
# Validate limit parameter
limit = request.args.get('limit')
if limit is not None:
try:
limit_int = int(limit)
if limit_int < 1:
errors.append("limit must be greater than 0")
elif limit_int > 1000:
errors.append("limit cannot exceed 1000")
except ValueError:
errors.append("limit must be an integer")
# Validate offset parameter
offset = request.args.get('offset')
if offset is not None:
try:
offset_int = int(offset)
if offset_int < 0:
errors.append("offset must be greater than or equal to 0")
except ValueError:
errors.append("offset must be an integer")
if errors:
return create_error_response(
message="Pagination parameter validation failed",
status_code=400,
error_code='PAGINATION_ERROR',
errors=errors
)
return f(*args, **kwargs)
return decorated_function
def validate_anime_data(data: Dict[str, Any]) -> List[str]:
"""
Validate anime data structure.
Args:
data: Dictionary containing anime data
Returns:
List of validation errors (empty if valid)
"""
errors = []
# Required fields
required_fields = ['name', 'url']
for field in required_fields:
if field not in data or not data[field]:
errors.append(f"Missing required field: {field}")
# Validate name
if 'name' in data:
name = data['name']
if not isinstance(name, str):
errors.append("name must be a string")
elif len(name.strip()) == 0:
errors.append("name cannot be empty")
elif len(name) > 500:
errors.append("name cannot exceed 500 characters")
# Validate URL
if 'url' in data:
url = data['url']
if not isinstance(url, str):
errors.append("url must be a string")
elif not is_valid_url(url):
errors.append("url must be a valid URL")
# Validate optional fields
if 'description' in data and data['description'] is not None:
if not isinstance(data['description'], str):
errors.append("description must be a string")
elif len(data['description']) > 2000:
errors.append("description cannot exceed 2000 characters")
if 'episodes' in data and data['episodes'] is not None:
if not isinstance(data['episodes'], int):
errors.append("episodes must be an integer")
elif data['episodes'] < 0:
errors.append("episodes must be non-negative")
if 'status' in data and data['status'] is not None:
valid_statuses = ['ongoing', 'completed', 'planned', 'dropped', 'paused']
if data['status'] not in valid_statuses:
errors.append(f"status must be one of: {', '.join(valid_statuses)}")
return errors
def validate_file_upload(file, allowed_extensions: Optional[List[str]] = None,
max_size_mb: Optional[int] = None) -> List[str]:
"""
Validate file upload.
Args:
file: Uploaded file object
allowed_extensions: List of allowed file extensions
max_size_mb: Maximum file size in MB
Returns:
List of validation errors (empty if valid)
"""
errors = []
if not file:
errors.append("No file provided")
return errors
if file.filename == '':
errors.append("No file selected")
return errors
# Check file extension
if allowed_extensions:
file_ext = os.path.splitext(file.filename)[1].lower()
if file_ext not in [f".{ext.lower()}" for ext in allowed_extensions]:
errors.append(f"File type not allowed. Allowed: {', '.join(allowed_extensions)}")
# Check file size (if we can determine it)
if max_size_mb and hasattr(file, 'content_length') and file.content_length:
max_size_bytes = max_size_mb * 1024 * 1024
if file.content_length > max_size_bytes:
errors.append(f"File size exceeds maximum of {max_size_mb}MB")
return errors
def is_valid_url(url: str) -> bool:
"""
Check if a string is a valid URL.
Args:
url: URL string to validate
Returns:
True if valid URL, False otherwise
"""
url_pattern = re.compile(
r'^https?://' # http:// or https://
r'(?:(?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+[A-Z]{2,6}\.?|' # domain...
r'localhost|' # localhost...
r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})' # ...or ip
r'(?::\d+)?' # optional port
r'(?:/?|[/?]\S+)$', re.IGNORECASE)
return url_pattern.match(url) is not None
def is_valid_email(email: str) -> bool:
"""
Check if a string is a valid email address.
Args:
email: Email string to validate
Returns:
True if valid email, False otherwise
"""
email_pattern = re.compile(
r'^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$'
)
return email_pattern.match(email) is not None
def sanitize_string(value: str, max_length: Optional[int] = None) -> str:
"""
Sanitize string input by removing dangerous characters.
Args:
value: String to sanitize
max_length: Maximum allowed length
Returns:
Sanitized string
"""
if not isinstance(value, str):
return str(value)
# Remove null bytes and control characters
sanitized = ''.join(char for char in value if ord(char) >= 32 or char in '\t\n\r')
# Trim whitespace
sanitized = sanitized.strip()
# Truncate if necessary
if max_length and len(sanitized) > max_length:
sanitized = sanitized[:max_length]
return sanitized
def validate_id_parameter(param_name: str = 'id') -> Callable:
"""
Decorator to validate ID parameters in URLs.
Args:
param_name: Name of the ID parameter
Returns:
Decorator function
"""
def decorator(f: Callable) -> Callable:
@wraps(f)
def decorated_function(*args, **kwargs):
if param_name in kwargs:
try:
id_value = int(kwargs[param_name])
if id_value <= 0:
return create_error_response(
message=f"{param_name} must be a positive integer",
status_code=400,
error_code='INVALID_ID'
)
kwargs[param_name] = id_value
except ValueError:
return create_error_response(
message=f"{param_name} must be an integer",
status_code=400,
error_code='INVALID_ID'
)
return f(*args, **kwargs)
return decorated_function
return decorator

View File

@ -1,146 +0,0 @@
"""
Pytest configuration file for AniWorld application tests.
"""
import os
import sys
from unittest.mock import Mock
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..'))
@pytest.fixture(scope="session")
def test_config():
"""Test configuration settings."""
return {
"jwt_secret_key": "test-secret-key",
"password_salt": "test-salt",
"master_password": "test_password",
"master_password_hash": "hashed_test_password",
"token_expiry_hours": 1,
"database_url": "sqlite:///:memory:",
"anime_directory": "./test_data",
"log_level": "DEBUG"
}
@pytest.fixture
def mock_settings(test_config):
"""Mock settings for testing."""
from unittest.mock import Mock
settings = Mock()
for key, value in test_config.items():
setattr(settings, key, value)
return settings
@pytest.fixture
def mock_database():
"""Mock database connection."""
return Mock()
@pytest.fixture
def mock_logger():
"""Mock logger for testing."""
return Mock()
@pytest.fixture
def sample_anime_data():
"""Sample anime data for testing."""
return {
"id": 1,
"title": "Test Anime",
"genre": "Action",
"year": 2023,
"episodes": [
{"id": 1, "title": "Episode 1", "season": 1, "episode": 1},
{"id": 2, "title": "Episode 2", "season": 1, "episode": 2}
]
}
@pytest.fixture
def sample_episode_data():
"""Sample episode data for testing."""
return {
"id": 1,
"title": "Test Episode",
"season": 1,
"episode": 1,
"anime_id": 1,
"download_url": "https://example.com/episode1.mp4"
}
@pytest.fixture
def valid_jwt_token():
"""Valid JWT token for testing."""
from datetime import datetime, timedelta
import jwt
payload = {
"user": "test_user",
"exp": datetime.utcnow() + timedelta(hours=1)
}
return jwt.encode(payload, "test-secret-key", algorithm="HS256")
@pytest.fixture
def expired_jwt_token():
"""Expired JWT token for testing."""
from datetime import datetime, timedelta
import jwt
payload = {
"user": "test_user",
"exp": datetime.utcnow() - timedelta(hours=1)
}
return jwt.encode(payload, "test-secret-key", algorithm="HS256")
@pytest.fixture
def mock_request():
"""Mock FastAPI request object."""
request = Mock()
request.headers = {}
request.client = Mock()
request.client.host = "127.0.0.1"
return request
@pytest.fixture
def mock_file_system():
"""Mock file system operations."""
return Mock()
# Pytest configuration
def pytest_configure(config):
"""Configure pytest with custom markers."""
config.addinivalue_line(
"markers", "unit: marks tests as unit tests"
)
config.addinivalue_line(
"markers", "integration: marks tests as integration tests"
)
config.addinivalue_line(
"markers", "e2e: marks tests as end-to-end tests"
)
config.addinivalue_line(
"markers", "slow: marks tests as slow running"
)
# Test collection configuration
collect_ignore = [
"test_auth.ps1",
"test_auth_flow.ps1",
"test_database.ps1"
]

View File

@ -1,232 +0,0 @@
"""
End-to-end tests for authentication flow.
Tests complete user authentication scenarios including login/logout flow
and session management.
"""
import os
import sys
from unittest.mock import patch
import pytest
from fastapi.testclient import TestClient
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.server.fastapi_app import app # noqa: E402
@pytest.fixture
def client():
"""Test client for E2E authentication tests."""
return TestClient(app)
@pytest.mark.e2e
class TestAuthenticationE2E:
"""End-to-end authentication tests."""
def test_full_authentication_workflow(self, client, mock_settings):
"""Test complete authentication workflow from user perspective."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Scenario: User wants to access protected resource
# Step 1: Try to access protected endpoint without authentication
protected_response = client.get("/api/anime/search?query=test")
assert protected_response.status_code in [401, 403] # Should be unauthorized
# Step 2: User logs in with correct password
login_response = client.post(
"/auth/login",
json={"password": "test_password"}
)
assert login_response.status_code == 200
login_data = login_response.json()
assert login_data["success"] is True
token = login_data["token"]
# Step 3: Verify token is working
verify_response = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {token}"}
)
assert verify_response.status_code == 200
assert verify_response.json()["valid"] is True
# Step 4: Access protected resource with token
# Note: This test assumes anime search endpoint exists and requires auth
protected_response_with_auth = client.get(
"/api/anime/search?query=test",
headers={"Authorization": f"Bearer {token}"}
)
# Should not be 401/403 (actual response depends on implementation)
assert protected_response_with_auth.status_code != 403
# Step 5: User logs out
logout_response = client.post(
"/auth/logout",
headers={"Authorization": f"Bearer {token}"}
)
assert logout_response.status_code == 200
assert logout_response.json()["success"] is True
# Step 6: Verify token behavior after logout
# Note: This depends on implementation - some systems invalidate tokens,
# others rely on expiry
# Just verify the logout endpoint worked
assert logout_response.json()["success"] is True
def test_authentication_with_wrong_password_flow(self, client, mock_settings):
"""Test authentication flow with wrong password."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Step 1: User tries to login with wrong password
login_response = client.post(
"/auth/login",
json={"password": "wrong_password"}
)
assert login_response.status_code == 401
login_data = login_response.json()
assert login_data["success"] is False
assert "token" not in login_data
# Step 2: User tries to access protected resource without valid token
protected_response = client.get("/api/anime/search?query=test")
assert protected_response.status_code in [401, 403]
# Step 3: User tries again with correct password
correct_login_response = client.post(
"/auth/login",
json={"password": "test_password"}
)
assert correct_login_response.status_code == 200
assert correct_login_response.json()["success"] is True
def test_session_expiry_simulation(self, client, mock_settings):
"""Test session expiry behavior."""
# Set very short token expiry for testing
mock_settings.token_expiry_hours = 0.001 # About 3.6 seconds
with patch('src.server.fastapi_app.settings', mock_settings):
# Login to get token
login_response = client.post(
"/auth/login",
json={"password": "test_password"}
)
assert login_response.status_code == 200
token = login_response.json()["token"]
# Token should be valid immediately
verify_response = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {token}"}
)
assert verify_response.status_code == 200
# Wait for token to expire (in real implementation)
# For testing, we'll just verify the token structure is correct
import jwt
payload = jwt.decode(token, options={"verify_signature": False})
assert "exp" in payload
assert payload["exp"] > 0
def test_multiple_session_management(self, client, mock_settings):
"""Test managing multiple concurrent sessions."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Create multiple sessions (simulate multiple browser tabs/devices)
sessions = []
for i in range(3):
login_response = client.post(
"/auth/login",
json={"password": "test_password"}
)
assert login_response.status_code == 200
sessions.append(login_response.json()["token"])
# All sessions should be valid
for token in sessions:
verify_response = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {token}"}
)
assert verify_response.status_code == 200
# Logout from one session
logout_response = client.post(
"/auth/logout",
headers={"Authorization": f"Bearer {sessions[0]}"}
)
assert logout_response.status_code == 200
# Other sessions should still be valid (depending on implementation)
for token in sessions[1:]:
verify_response = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {token}"}
)
# Should still be valid unless implementation invalidates all sessions
assert verify_response.status_code == 200
def test_authentication_error_handling(self, client, mock_settings):
"""Test error handling in authentication flow."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test various error scenarios
# Invalid JSON
invalid_json_response = client.post(
"/auth/login",
data="invalid json",
headers={"Content-Type": "application/json"}
)
assert invalid_json_response.status_code == 422
# Missing password field
missing_field_response = client.post(
"/auth/login",
json={}
)
assert missing_field_response.status_code == 422
# Empty password
empty_password_response = client.post(
"/auth/login",
json={"password": ""}
)
assert empty_password_response.status_code == 422
# Malformed authorization header
malformed_auth_response = client.get(
"/auth/verify",
headers={"Authorization": "InvalidFormat"}
)
assert malformed_auth_response.status_code == 403
def test_security_headers_and_responses(self, client, mock_settings):
"""Test security-related headers and response formats."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test login response format
login_response = client.post(
"/auth/login",
json={"password": "test_password"}
)
# Check response doesn't leak sensitive information
login_data = login_response.json()
assert "password" not in str(login_data)
assert "secret" not in str(login_data).lower()
# Test error responses don't leak sensitive information
error_response = client.post(
"/auth/login",
json={"password": "wrong_password"}
)
error_data = error_response.json()
assert "password" not in str(error_data)
assert "hash" not in str(error_data).lower()
assert "secret" not in str(error_data).lower()

View File

@ -1,440 +0,0 @@
"""
End-to-End tests for bulk download and export flows.
This module tests complete user workflows for bulk operations including
download flows, export processes, and error handling scenarios.
"""
import asyncio
import time
from unittest.mock import AsyncMock, patch
import pytest
from fastapi.testclient import TestClient
from src.server.fastapi_app import app
@pytest.fixture
def client():
"""Create a test client for the FastAPI application."""
return TestClient(app)
@pytest.fixture
def auth_headers(client):
"""Provide authentication headers for protected endpoints."""
# Login to get token
login_data = {"password": "testpassword"}
with patch('src.server.fastapi_app.settings.master_password_hash') as mock_hash:
mock_hash.return_value = "5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8" # 'password' hash
response = client.post("/auth/login", json=login_data)
if response.status_code == 200:
token = response.json()["access_token"]
return {"Authorization": f"Bearer {token}"}
return {}
class TestBulkDownloadFlow:
"""End-to-end tests for bulk download workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_complete_bulk_download_workflow(self, mock_user, client):
"""Test complete bulk download workflow from search to completion."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Search for anime to download
search_response = client.get("/api/anime/search?q=test&limit=5")
if search_response.status_code == 200:
anime_list = search_response.json()
anime_ids = [anime["id"] for anime in anime_list[:3]] # Select first 3
else:
# Mock anime IDs if search endpoint not working
anime_ids = ["anime1", "anime2", "anime3"]
# Step 2: Initiate bulk download
download_request = {
"anime_ids": anime_ids,
"quality": "1080p",
"format": "mp4",
"include_subtitles": True,
"organize_by": "series"
}
download_response = client.post("/api/bulk/download", json=download_request)
# Expected 404 since bulk endpoints not implemented yet
assert download_response.status_code in [200, 202, 404]
if download_response.status_code in [200, 202]:
download_data = download_response.json()
task_id = download_data.get("task_id")
# Step 3: Monitor download progress
if task_id:
progress_response = client.get(f"/api/bulk/download/{task_id}/status")
assert progress_response.status_code in [200, 404]
if progress_response.status_code == 200:
progress_data = progress_response.json()
assert "status" in progress_data
assert "progress_percent" in progress_data
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_download_with_retry_logic(self, mock_user, client):
"""Test bulk download with retry logic for failed items."""
mock_user.return_value = {"user_id": "test_user"}
# Start bulk download
download_request = {
"anime_ids": ["anime1", "anime2", "anime3"],
"quality": "720p",
"retry_failed": True,
"max_retries": 3
}
download_response = client.post("/api/bulk/download", json=download_request)
assert download_response.status_code in [200, 202, 404]
if download_response.status_code in [200, 202]:
task_id = download_response.json().get("task_id")
# Simulate checking for failed items and retrying
if task_id:
failed_response = client.get(f"/api/bulk/download/{task_id}/failed")
assert failed_response.status_code in [200, 404]
if failed_response.status_code == 200:
failed_data = failed_response.json()
if failed_data.get("failed_items"):
# Retry failed items
retry_response = client.post(f"/api/bulk/download/{task_id}/retry")
assert retry_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_download_cancellation(self, mock_user, client):
"""Test cancelling an ongoing bulk download."""
mock_user.return_value = {"user_id": "test_user"}
# Start bulk download
download_request = {
"anime_ids": ["anime1", "anime2", "anime3", "anime4", "anime5"],
"quality": "1080p"
}
download_response = client.post("/api/bulk/download", json=download_request)
assert download_response.status_code in [200, 202, 404]
if download_response.status_code in [200, 202]:
task_id = download_response.json().get("task_id")
if task_id:
# Cancel the download
cancel_response = client.post(f"/api/bulk/download/{task_id}/cancel")
assert cancel_response.status_code in [200, 404]
if cancel_response.status_code == 200:
cancel_data = cancel_response.json()
assert cancel_data.get("status") == "cancelled"
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_download_with_insufficient_space(self, mock_user, client):
"""Test bulk download when there's insufficient disk space."""
mock_user.return_value = {"user_id": "test_user"}
# Try to download large amount of content
download_request = {
"anime_ids": [f"anime{i}" for i in range(100)], # Large number
"quality": "1080p",
"check_disk_space": True
}
download_response = client.post("/api/bulk/download", json=download_request)
# Should either work or return appropriate error
assert download_response.status_code in [200, 202, 400, 404, 507] # 507 = Insufficient Storage
class TestBulkExportFlow:
"""End-to-end tests for bulk export workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_complete_bulk_export_workflow(self, mock_user, client):
"""Test complete bulk export workflow."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Get list of available anime for export
anime_response = client.get("/api/anime/search?limit=10")
if anime_response.status_code == 200:
anime_list = anime_response.json()
anime_ids = [anime["id"] for anime in anime_list[:5]]
else:
anime_ids = ["anime1", "anime2", "anime3"]
# Step 2: Request bulk export
export_request = {
"anime_ids": anime_ids,
"format": "json",
"include_metadata": True,
"include_episode_info": True,
"include_download_history": False
}
export_response = client.post("/api/bulk/export", json=export_request)
assert export_response.status_code in [200, 202, 404]
if export_response.status_code in [200, 202]:
export_data = export_response.json()
# Step 3: Check export status or get download URL
if "export_id" in export_data:
export_id = export_data["export_id"]
status_response = client.get(f"/api/bulk/export/{export_id}/status")
assert status_response.status_code in [200, 404]
elif "download_url" in export_data:
# Direct download available
download_url = export_data["download_url"]
assert download_url.startswith("http")
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_export_csv_format(self, mock_user, client):
"""Test bulk export in CSV format."""
mock_user.return_value = {"user_id": "test_user"}
export_request = {
"anime_ids": ["anime1", "anime2"],
"format": "csv",
"include_metadata": True,
"csv_options": {
"delimiter": ",",
"include_headers": True,
"encoding": "utf-8"
}
}
export_response = client.post("/api/bulk/export", json=export_request)
assert export_response.status_code in [200, 202, 404]
if export_response.status_code == 200:
# Check if response is CSV content or redirect
content_type = export_response.headers.get("content-type", "")
assert "csv" in content_type or "json" in content_type
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_export_with_filters(self, mock_user, client):
"""Test bulk export with filtering options."""
mock_user.return_value = {"user_id": "test_user"}
export_request = {
"anime_ids": ["anime1", "anime2", "anime3"],
"format": "json",
"filters": {
"completed_only": True,
"include_watched": False,
"min_rating": 7.0,
"genres": ["Action", "Adventure"]
},
"include_metadata": True
}
export_response = client.post("/api/bulk/export", json=export_request)
assert export_response.status_code in [200, 202, 404]
class TestBulkOrganizeFlow:
"""End-to-end tests for bulk organize workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_organize_by_genre(self, mock_user, client):
"""Test bulk organizing anime by genre."""
mock_user.return_value = {"user_id": "test_user"}
organize_request = {
"anime_ids": ["anime1", "anime2", "anime3"],
"organize_by": "genre",
"create_subdirectories": True,
"move_files": True,
"update_database": True
}
organize_response = client.post("/api/bulk/organize", json=organize_request)
assert organize_response.status_code in [200, 202, 404]
if organize_response.status_code in [200, 202]:
organize_data = organize_response.json()
if "task_id" in organize_data:
task_id = organize_data["task_id"]
# Monitor organization progress
status_response = client.get(f"/api/bulk/organize/{task_id}/status")
assert status_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_organize_by_year(self, mock_user, client):
"""Test bulk organizing anime by release year."""
mock_user.return_value = {"user_id": "test_user"}
organize_request = {
"anime_ids": ["anime1", "anime2"],
"organize_by": "year",
"year_format": "YYYY",
"create_subdirectories": True,
"dry_run": True # Test without actually moving files
}
organize_response = client.post("/api/bulk/organize", json=organize_request)
assert organize_response.status_code in [200, 404]
if organize_response.status_code == 200:
organize_data = organize_response.json()
# Dry run should return what would be moved
assert "preview" in organize_data or "operations" in organize_data
class TestBulkDeleteFlow:
"""End-to-end tests for bulk delete workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_delete_with_confirmation(self, mock_user, client):
"""Test bulk delete with proper confirmation flow."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Request deletion (should require confirmation)
delete_request = {
"anime_ids": ["anime_to_delete1", "anime_to_delete2"],
"delete_files": True,
"confirm": False # First request without confirmation
}
delete_response = client.delete("/api/bulk/delete", json=delete_request)
# Should require confirmation
assert delete_response.status_code in [400, 404, 422]
# Step 2: Confirm deletion
delete_request["confirm"] = True
confirmed_response = client.delete("/api/bulk/delete", json=delete_request)
assert confirmed_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_delete_database_only(self, mock_user, client):
"""Test bulk delete from database only (keep files)."""
mock_user.return_value = {"user_id": "test_user"}
delete_request = {
"anime_ids": ["anime1", "anime2"],
"delete_files": False, # Keep files, remove from database only
"confirm": True
}
delete_response = client.delete("/api/bulk/delete", json=delete_request)
assert delete_response.status_code in [200, 404]
class TestBulkOperationsErrorHandling:
"""End-to-end tests for error handling in bulk operations."""
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_operation_with_mixed_results(self, mock_user, client):
"""Test bulk operation where some items succeed and others fail."""
mock_user.return_value = {"user_id": "test_user"}
# Mix of valid and invalid anime IDs
download_request = {
"anime_ids": ["valid_anime1", "invalid_anime", "valid_anime2"],
"quality": "1080p",
"continue_on_error": True
}
download_response = client.post("/api/bulk/download", json=download_request)
assert download_response.status_code in [200, 202, 404]
if download_response.status_code in [200, 202]:
result_data = download_response.json()
# Should have information about successes and failures
if "partial_success" in result_data:
assert "successful" in result_data
assert "failed" in result_data
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_operation_timeout_handling(self, mock_user, client):
"""Test handling of bulk operation timeouts."""
mock_user.return_value = {"user_id": "test_user"}
# Large operation that might timeout
large_request = {
"anime_ids": [f"anime{i}" for i in range(50)],
"quality": "1080p",
"timeout_seconds": 30
}
download_response = client.post("/api/bulk/download", json=large_request)
# Should either succeed, be accepted for background processing, or timeout
assert download_response.status_code in [200, 202, 404, 408, 504]
@patch('src.server.fastapi_app.get_current_user')
def test_concurrent_bulk_operations(self, mock_user, client):
"""Test handling of concurrent bulk operations."""
mock_user.return_value = {"user_id": "test_user"}
# Start first operation
first_request = {
"anime_ids": ["anime1", "anime2"],
"quality": "1080p"
}
first_response = client.post("/api/bulk/download", json=first_request)
# Start second operation while first is running
second_request = {
"anime_ids": ["anime3", "anime4"],
"quality": "720p"
}
second_response = client.post("/api/bulk/download", json=second_request)
# Both operations should be handled appropriately
assert first_response.status_code in [200, 202, 404]
assert second_response.status_code in [200, 202, 404, 429] # 429 = Too Many Requests
class TestBulkOperationsPerformance:
"""Performance tests for bulk operations."""
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_operation_response_time(self, mock_user, client):
"""Test that bulk operations respond within reasonable time."""
mock_user.return_value = {"user_id": "test_user"}
start_time = time.time()
download_request = {
"anime_ids": ["anime1", "anime2", "anime3"],
"quality": "1080p"
}
response = client.post("/api/bulk/download", json=download_request)
response_time = time.time() - start_time
# Response should be quick (< 5 seconds) even if processing is background
assert response_time < 5.0
assert response.status_code in [200, 202, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_operation_memory_usage(self, mock_user, client):
"""Test bulk operations don't cause excessive memory usage."""
mock_user.return_value = {"user_id": "test_user"}
# Large bulk operation
large_request = {
"anime_ids": [f"anime{i}" for i in range(100)],
"quality": "1080p"
}
# This test would need actual memory monitoring in real implementation
response = client.post("/api/bulk/download", json=large_request)
assert response.status_code in [200, 202, 404, 413] # 413 = Payload Too Large
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,407 +0,0 @@
"""
End-to-end tests for CLI flows.
Tests complete CLI workflows including progress bar functionality,
retry logic, user interactions, and error scenarios.
"""
import os
import sys
import tempfile
from unittest.mock import Mock, patch
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.cli.Main import SeriesApp # noqa: E402
@pytest.fixture
def temp_directory():
"""Create a temporary directory for testing."""
with tempfile.TemporaryDirectory() as temp_dir:
yield temp_dir
@pytest.mark.e2e
class TestCLICompleteWorkflows:
"""Test complete CLI workflows from user perspective."""
def test_search_and_download_workflow(self, temp_directory):
"""Test complete search -> select -> download workflow."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
# Mock search results
mock_search_results = [
{"name": "Test Anime", "link": "test_link"}
]
# Mock series for download
mock_episode_dict = {1: [1, 2, 3], 2: [1, 2]}
mock_series = Mock(
episodeDict=mock_episode_dict,
folder="test_anime",
key="test_key"
)
app.series_list = [mock_series]
# Mock loader
mock_loader = Mock()
mock_loader.Search.return_value = mock_search_results
mock_loader.IsLanguage.return_value = True
mock_loader.Download.return_value = None
app.Loaders.GetLoader.return_value = mock_loader
# Test search workflow
with patch('builtins.input', side_effect=['test query', '1']), \
patch('builtins.print'):
app.search_mode()
# Should have called search and add
mock_loader.Search.assert_called_with('test query')
app.List.add.assert_called_once()
# Test download workflow
with patch('rich.progress.Progress') as mock_progress_class, \
patch('time.sleep'), \
patch('builtins.input', return_value='1'):
mock_progress = Mock()
mock_progress_class.return_value = mock_progress
selected_series = app.get_user_selection()
assert selected_series is not None
app.download_series(selected_series)
# Should have set up progress tracking
mock_progress.start.assert_called_once()
mock_progress.stop.assert_called_once()
# Should have attempted downloads for all episodes
expected_downloads = sum(len(episodes) for episodes in mock_episode_dict.values())
assert mock_loader.Download.call_count == expected_downloads
def test_init_and_rescan_workflow(self, temp_directory):
"""Test initialization and rescanning workflow."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner') as mock_scanner_class, \
patch('src.cli.Main.SerieList') as mock_list_class:
mock_scanner = Mock()
mock_scanner_class.return_value = mock_scanner
mock_list = Mock()
mock_list_class.return_value = mock_list
app = SeriesApp(temp_directory)
app.SerieScanner = mock_scanner
# Test rescan workflow
with patch('rich.progress.Progress') as mock_progress_class, \
patch('builtins.print'):
mock_progress = Mock()
mock_progress_class.return_value = mock_progress
# Simulate init action
app.progress = mock_progress
app.task1 = "task1_id"
# Call reinit workflow
app.SerieScanner.Reinit()
app.SerieScanner.Scan(app.updateFromReinit)
# Should have called scanner methods
mock_scanner.Reinit.assert_called_once()
mock_scanner.Scan.assert_called_once()
def test_error_recovery_workflow(self, temp_directory):
"""Test error recovery in CLI workflows."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
# Test retry mechanism with eventual success
mock_func = Mock(side_effect=[
Exception("First failure"),
Exception("Second failure"),
None # Success on third try
])
with patch('time.sleep'), patch('builtins.print'):
result = app.retry(mock_func, max_retries=3, delay=0)
assert result is True
assert mock_func.call_count == 3
# Test retry mechanism with persistent failure
mock_func_fail = Mock(side_effect=Exception("Persistent error"))
with patch('time.sleep'), patch('builtins.print'):
result = app.retry(mock_func_fail, max_retries=2, delay=0)
assert result is False
assert mock_func_fail.call_count == 2
@pytest.mark.e2e
class TestCLIUserInteractionFlows:
"""Test CLI user interaction flows."""
def test_user_selection_validation_flow(self, temp_directory):
"""Test user selection with various invalid inputs before success."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
app.series_list = [
Mock(name="Anime 1", folder="anime1"),
Mock(name="Anime 2", folder="anime2")
]
# Test sequence: invalid text -> invalid number -> valid selection
input_sequence = ['invalid_text', '999', '1']
with patch('builtins.input', side_effect=input_sequence), \
patch('builtins.print'):
selected = app.get_user_selection()
assert selected is not None
assert len(selected) == 1
assert selected[0].name == "Anime 1"
def test_search_interaction_flow(self, temp_directory):
"""Test search interaction with various user inputs."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
mock_search_results = [
{"name": "Result 1", "link": "link1"},
{"name": "Result 2", "link": "link2"}
]
mock_loader = Mock()
mock_loader.Search.return_value = mock_search_results
app.Loaders.GetLoader.return_value = mock_loader
# Test sequence: search -> invalid selection -> valid selection
with patch('builtins.input', side_effect=['test search', '999', '1']), \
patch('builtins.print'):
app.search_mode()
# Should have added the selected item
app.List.add.assert_called_once()
def test_main_loop_interaction_flow(self, temp_directory):
"""Test main application loop with user interactions."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
app.series_list = [Mock(name="Test Anime", folder="test")]
# Mock various components
with patch.object(app, 'search_mode') as mock_search, \
patch.object(app, 'get_user_selection', return_value=[Mock()]), \
patch.object(app, 'download_series') as mock_download, \
patch('rich.progress.Progress'), \
patch('builtins.print'):
# Test sequence: search -> download -> exit
with patch('builtins.input', side_effect=['s', 'd', KeyboardInterrupt()]):
try:
app.run()
except KeyboardInterrupt:
pass
mock_search.assert_called_once()
mock_download.assert_called_once()
@pytest.mark.e2e
class TestCLIProgressAndFeedback:
"""Test CLI progress indicators and user feedback."""
def test_download_progress_flow(self, temp_directory):
"""Test download progress tracking throughout workflow."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
# Mock series with episodes
mock_series = [
Mock(
episodeDict={1: [1, 2], 2: [1]},
folder="anime1",
key="key1"
)
]
# Mock loader
mock_loader = Mock()
mock_loader.IsLanguage.return_value = True
mock_loader.Download.return_value = None
app.Loaders.GetLoader.return_value = mock_loader
with patch('rich.progress.Progress') as mock_progress_class, \
patch('time.sleep'):
mock_progress = Mock()
mock_progress_class.return_value = mock_progress
app.download_series(mock_series)
# Verify progress setup
assert mock_progress.add_task.call_count >= 3 # At least 3 tasks
mock_progress.start.assert_called_once()
mock_progress.stop.assert_called_once()
# Verify progress updates
assert mock_progress.update.call_count > 0
def test_progress_callback_integration(self, temp_directory):
"""Test progress callback integration with download system."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
app.progress = Mock()
app.task3 = "download_task"
# Test various progress states
progress_states = [
{
'status': 'downloading',
'total_bytes': 1000000,
'downloaded_bytes': 250000
},
{
'status': 'downloading',
'total_bytes': 1000000,
'downloaded_bytes': 750000
},
{
'status': 'finished'
}
]
for state in progress_states:
app.print_Download_Progress(state)
# Should have updated progress for each state
assert app.progress.update.call_count == len(progress_states)
# Last call should indicate completion
last_call = app.progress.update.call_args_list[-1]
assert last_call[1].get('completed') == 100
def test_scan_progress_integration(self, temp_directory):
"""Test scanning progress integration."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
app.progress = Mock()
app.task1 = "scan_task"
# Simulate scan progress updates
for i in range(5):
app.updateFromReinit("folder", i)
# Should have updated progress for each folder
assert app.progress.update.call_count == 5
# Each call should advance by 1
for call in app.progress.update.call_args_list:
assert call[1].get('advance') == 1
@pytest.mark.e2e
class TestCLIErrorScenarios:
"""Test CLI error scenarios and recovery."""
def test_network_error_recovery(self, temp_directory):
"""Test recovery from network errors during operations."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
# Mock network failures
network_error = Exception("Network connection failed")
mock_func = Mock(side_effect=[network_error, network_error, None])
with patch('time.sleep'), patch('builtins.print'):
result = app.retry(mock_func, max_retries=3, delay=0)
assert result is True
assert mock_func.call_count == 3
def test_invalid_directory_handling(self):
"""Test handling of invalid directory paths."""
invalid_directory = "/nonexistent/path/that/does/not/exist"
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
# Should not raise exception during initialization
app = SeriesApp(invalid_directory)
assert app.directory_to_search == invalid_directory
def test_empty_search_results_handling(self, temp_directory):
"""Test handling of empty search results."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
# Mock empty search results
mock_loader = Mock()
mock_loader.Search.return_value = []
app.Loaders.GetLoader.return_value = mock_loader
with patch('builtins.input', return_value='nonexistent anime'), \
patch('builtins.print') as mock_print:
app.search_mode()
# Should print "No results found" message
print_calls = [call[0][0] for call in mock_print.call_args_list]
assert any("No results found" in call for call in print_calls)
def test_keyboard_interrupt_handling(self, temp_directory):
"""Test graceful handling of keyboard interrupts."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp(temp_directory)
# Test that KeyboardInterrupt propagates correctly
with patch('builtins.input', side_effect=KeyboardInterrupt()):
with pytest.raises(KeyboardInterrupt):
app.run()

View File

@ -1,550 +0,0 @@
"""
End-to-End tests for user preferences workflows and UI response verification.
This module tests complete user workflows for changing preferences and verifying
that the UI responds appropriately to preference changes.
"""
import time
from unittest.mock import patch
import pytest
from fastapi.testclient import TestClient
from src.server.fastapi_app import app
@pytest.fixture
def client():
"""Create a test client for the FastAPI application."""
return TestClient(app)
@pytest.fixture
def auth_headers(client):
"""Provide authentication headers for protected endpoints."""
# Login to get token
login_data = {"password": "testpassword"}
with patch('src.server.fastapi_app.settings.master_password_hash') as mock_hash:
mock_hash.return_value = "5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8" # 'password' hash
response = client.post("/auth/login", json=login_data)
if response.status_code == 200:
token = response.json()["access_token"]
return {"Authorization": f"Bearer {token}"}
return {}
class TestThemeChangeWorkflow:
"""End-to-end tests for theme changing workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_complete_theme_change_workflow(self, mock_user, client):
"""Test complete workflow of changing theme and verifying UI updates."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Get current theme
current_theme_response = client.get("/api/preferences/themes/current")
initial_theme = None
if current_theme_response.status_code == 200:
initial_theme = current_theme_response.json().get("theme", {}).get("name")
# Step 2: Get available themes
themes_response = client.get("/api/preferences/themes")
available_themes = []
if themes_response.status_code == 200:
available_themes = [theme["name"] for theme in themes_response.json().get("themes", [])]
# Step 3: Change to different theme
new_theme = "dark" if initial_theme != "dark" else "light"
if not available_themes:
available_themes = ["light", "dark"] # Default themes
if new_theme in available_themes:
theme_change_data = {"theme_name": new_theme}
change_response = client.post("/api/preferences/themes/set", json=theme_change_data)
if change_response.status_code == 200:
# Step 4: Verify theme was changed
updated_theme_response = client.get("/api/preferences/themes/current")
if updated_theme_response.status_code == 200:
updated_theme = updated_theme_response.json().get("theme", {}).get("name")
assert updated_theme == new_theme
# Step 5: Verify UI reflects theme change (mock check)
ui_response = client.get("/api/preferences/ui")
if ui_response.status_code == 200:
ui_data = ui_response.json()
# UI should reflect the theme change
assert "theme" in str(ui_data).lower() or "current" in str(ui_data).lower()
# Test passes if endpoints respond appropriately (200 or 404)
assert themes_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_custom_theme_creation_and_application(self, mock_user, client):
"""Test creating custom theme and applying it."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Create custom theme
custom_theme_data = {
"name": "my_test_theme",
"display_name": "My Test Theme",
"colors": {
"primary": "#007acc",
"secondary": "#6c757d",
"background": "#ffffff",
"text": "#333333",
"accent": "#28a745"
},
"is_dark": False
}
create_response = client.post("/api/preferences/themes/custom", json=custom_theme_data)
if create_response.status_code == 201:
theme_data = create_response.json()
theme_id = theme_data.get("theme_id")
# Step 2: Apply the custom theme
apply_data = {"theme_name": "my_test_theme"}
apply_response = client.post("/api/preferences/themes/set", json=apply_data)
if apply_response.status_code == 200:
# Step 3: Verify custom theme is active
current_response = client.get("/api/preferences/themes/current")
if current_response.status_code == 200:
current_theme = current_response.json().get("theme", {})
assert current_theme.get("name") == "my_test_theme"
# Test endpoints exist and respond appropriately
assert create_response.status_code in [201, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_theme_persistence_across_sessions(self, mock_user, client):
"""Test that theme preference persists across sessions."""
mock_user.return_value = {"user_id": "test_user"}
# Set theme
theme_data = {"theme_name": "dark"}
set_response = client.post("/api/preferences/themes/set", json=theme_data)
if set_response.status_code == 200:
# Simulate new session by getting current theme
current_response = client.get("/api/preferences/themes/current")
if current_response.status_code == 200:
current_theme = current_response.json().get("theme", {}).get("name")
assert current_theme == "dark"
assert set_response.status_code in [200, 404]
class TestLanguageChangeWorkflow:
"""End-to-end tests for language changing workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_complete_language_change_workflow(self, mock_user, client):
"""Test complete workflow of changing language and verifying UI updates."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Get available languages
languages_response = client.get("/api/preferences/languages")
available_languages = []
if languages_response.status_code == 200:
available_languages = [lang["code"] for lang in languages_response.json().get("languages", [])]
# Step 2: Get current language
current_response = client.get("/api/preferences/languages/current")
current_language = None
if current_response.status_code == 200:
current_language = current_response.json().get("language", {}).get("code")
# Step 3: Change to different language
new_language = "de" if current_language != "de" else "en"
if not available_languages:
available_languages = ["en", "de", "fr", "es"] # Default languages
if new_language in available_languages:
language_data = {"language_code": new_language}
change_response = client.post("/api/preferences/languages/set", json=language_data)
if change_response.status_code == 200:
# Step 4: Verify language was changed
updated_response = client.get("/api/preferences/languages/current")
if updated_response.status_code == 200:
updated_language = updated_response.json().get("language", {}).get("code")
assert updated_language == new_language
# Step 5: Verify UI text reflects language change (mock check)
# In real implementation, this would check translated text
ui_response = client.get("/") # Main page
assert ui_response.status_code in [200, 404]
assert languages_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_language_fallback_behavior(self, mock_user, client):
"""Test language fallback when preferred language is unavailable."""
mock_user.return_value = {"user_id": "test_user"}
# Try to set unsupported language
unsupported_language_data = {"language_code": "xyz"} # Non-existent language
change_response = client.post("/api/preferences/languages/set", json=unsupported_language_data)
# Should either reject or fallback to default
assert change_response.status_code in [400, 404, 422]
# Verify fallback to default language
current_response = client.get("/api/preferences/languages/current")
if current_response.status_code == 200:
current_language = current_response.json().get("language", {}).get("code")
# Should be a valid language code (en, de, etc.)
assert len(current_language) >= 2 if current_language else True
class TestAccessibilityWorkflow:
"""End-to-end tests for accessibility settings workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_accessibility_settings_workflow(self, mock_user, client):
"""Test complete accessibility settings workflow."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Get current accessibility settings
current_response = client.get("/api/preferences/accessibility")
initial_settings = {}
if current_response.status_code == 200:
initial_settings = current_response.json()
# Step 2: Update accessibility settings
new_settings = {
"high_contrast": True,
"large_text": True,
"reduced_motion": False,
"screen_reader_support": True,
"keyboard_navigation": True,
"font_size_multiplier": 1.5
}
update_response = client.put("/api/preferences/accessibility", json=new_settings)
if update_response.status_code == 200:
# Step 3: Verify settings were updated
updated_response = client.get("/api/preferences/accessibility")
if updated_response.status_code == 200:
updated_settings = updated_response.json()
# Check that key settings were updated
for key, value in new_settings.items():
if key in updated_settings:
assert updated_settings[key] == value
# Step 4: Verify UI reflects accessibility changes
# Check main page with accessibility features
main_page_response = client.get("/app")
if main_page_response.status_code == 200:
# In real implementation, would check for accessibility features
assert main_page_response.status_code == 200
assert current_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_high_contrast_mode_workflow(self, mock_user, client):
"""Test high contrast mode workflow."""
mock_user.return_value = {"user_id": "test_user"}
# Enable high contrast mode
accessibility_data = {
"high_contrast": True,
"large_text": True
}
update_response = client.put("/api/preferences/accessibility", json=accessibility_data)
if update_response.status_code == 200:
# Verify theme reflects high contrast
theme_response = client.get("/api/preferences/themes/current")
if theme_response.status_code == 200:
theme_data = theme_response.json()
# High contrast should influence theme colors
assert "theme" in theme_data
assert update_response.status_code in [200, 404]
class TestUISettingsWorkflow:
"""End-to-end tests for UI settings workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_view_mode_change_workflow(self, mock_user, client):
"""Test changing view mode from grid to list and back."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Get current UI settings
ui_response = client.get("/api/preferences/ui")
current_view_mode = None
if ui_response.status_code == 200:
current_view_mode = ui_response.json().get("view_mode")
# Step 2: Change view mode
new_view_mode = "list" if current_view_mode != "list" else "grid"
view_data = {
"view_mode": new_view_mode,
"show_thumbnails": True if new_view_mode == "grid" else False
}
if new_view_mode == "grid":
view_data["grid_columns"] = 4
change_response = client.post("/api/preferences/ui/view-mode", json=view_data)
if change_response.status_code == 200:
# Step 3: Verify view mode changed
updated_response = client.get("/api/preferences/ui")
if updated_response.status_code == 200:
updated_ui = updated_response.json()
assert updated_ui.get("view_mode") == new_view_mode
# Step 4: Verify anime list reflects view mode
anime_response = client.get("/api/anime/search?limit=5")
if anime_response.status_code == 200:
# In real implementation, response format might differ based on view mode
assert anime_response.status_code == 200
assert ui_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_ui_density_change_workflow(self, mock_user, client):
"""Test changing UI density settings."""
mock_user.return_value = {"user_id": "test_user"}
# Test different density settings
density_options = ["compact", "comfortable", "spacious"]
for density in density_options:
density_data = {
"density": density,
"compact_mode": density == "compact"
}
density_response = client.post("/api/preferences/ui/density", json=density_data)
if density_response.status_code == 200:
# Verify density was set
ui_response = client.get("/api/preferences/ui")
if ui_response.status_code == 200:
ui_data = ui_response.json()
assert ui_data.get("density") == density
# All density changes should be valid
assert density_response.status_code in [200, 404]
class TestKeyboardShortcutsWorkflow:
"""End-to-end tests for keyboard shortcuts workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_keyboard_shortcuts_customization(self, mock_user, client):
"""Test customizing keyboard shortcuts."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Get current shortcuts
shortcuts_response = client.get("/api/preferences/shortcuts")
if shortcuts_response.status_code == 200:
current_shortcuts = shortcuts_response.json().get("shortcuts", {})
# Step 2: Update a shortcut
shortcut_data = {
"action": "search",
"shortcut": "Ctrl+Shift+F",
"description": "Global search"
}
update_response = client.put("/api/preferences/shortcuts", json=shortcut_data)
if update_response.status_code == 200:
# Step 3: Verify shortcut was updated
updated_response = client.get("/api/preferences/shortcuts")
if updated_response.status_code == 200:
updated_shortcuts = updated_response.json().get("shortcuts", {})
if "search" in updated_shortcuts:
assert updated_shortcuts["search"]["shortcut"] == "Ctrl+Shift+F"
assert shortcuts_response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_shortcuts_reset_workflow(self, mock_user, client):
"""Test resetting shortcuts to defaults."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Modify some shortcuts
custom_shortcut = {
"action": "download",
"shortcut": "Ctrl+Alt+D"
}
modify_response = client.put("/api/preferences/shortcuts", json=custom_shortcut)
# Step 2: Reset to defaults
reset_response = client.post("/api/preferences/shortcuts/reset")
if reset_response.status_code == 200:
# Step 3: Verify shortcuts were reset
shortcuts_response = client.get("/api/preferences/shortcuts")
if shortcuts_response.status_code == 200:
shortcuts = shortcuts_response.json().get("shortcuts", {})
# Should have default shortcuts
assert len(shortcuts) > 0
assert reset_response.status_code in [200, 404]
class TestPreferencesIntegrationWorkflow:
"""End-to-end tests for integrated preferences workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_complete_preferences_setup_workflow(self, mock_user, client):
"""Test complete new user preferences setup workflow."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Set theme
theme_data = {"theme_name": "dark"}
theme_response = client.post("/api/preferences/themes/set", json=theme_data)
# Step 2: Set language
language_data = {"language_code": "en"}
language_response = client.post("/api/preferences/languages/set", json=language_data)
# Step 3: Configure accessibility
accessibility_data = {
"high_contrast": False,
"large_text": False,
"reduced_motion": True
}
accessibility_response = client.put("/api/preferences/accessibility", json=accessibility_data)
# Step 4: Set UI preferences
ui_data = {
"view_mode": "grid",
"grid_columns": 4,
"show_thumbnails": True
}
ui_response = client.post("/api/preferences/ui/view-mode", json=ui_data)
# Step 5: Verify all preferences were set
all_prefs_response = client.get("/api/preferences")
if all_prefs_response.status_code == 200:
prefs_data = all_prefs_response.json()
# Should contain all preference sections
expected_sections = ["theme", "language", "accessibility", "ui_settings"]
for section in expected_sections:
if section in prefs_data:
assert prefs_data[section] is not None
# All steps should complete successfully or return 404 (not implemented)
responses = [theme_response, language_response, accessibility_response, ui_response]
for response in responses:
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_preferences_export_import_workflow(self, mock_user, client):
"""Test exporting and importing preferences."""
mock_user.return_value = {"user_id": "test_user"}
# Step 1: Set some preferences
preferences_data = {
"theme": {"name": "dark"},
"language": {"code": "de"},
"ui_settings": {"view_mode": "list", "density": "compact"}
}
bulk_response = client.put("/api/preferences", json=preferences_data)
if bulk_response.status_code == 200:
# Step 2: Export preferences
export_response = client.get("/api/preferences/export")
if export_response.status_code == 200:
exported_data = export_response.json()
# Step 3: Reset preferences
reset_response = client.post("/api/preferences/reset")
if reset_response.status_code == 200:
# Step 4: Import preferences back
import_response = client.post("/api/preferences/import", json=exported_data)
if import_response.status_code == 200:
# Step 5: Verify preferences were restored
final_response = client.get("/api/preferences")
if final_response.status_code == 200:
final_prefs = final_response.json()
# Should match original preferences
assert final_prefs is not None
# Test that export/import endpoints exist
export_test_response = client.get("/api/preferences/export")
assert export_test_response.status_code in [200, 404]
class TestPreferencesPerformance:
"""Performance tests for preferences workflows."""
@patch('src.server.fastapi_app.get_current_user')
def test_preferences_response_time(self, mock_user, client):
"""Test that preference changes respond quickly."""
mock_user.return_value = {"user_id": "test_user"}
start_time = time.time()
# Quick preference change
theme_data = {"theme_name": "light"}
response = client.post("/api/preferences/themes/set", json=theme_data)
response_time = time.time() - start_time
# Should respond quickly (< 2 seconds)
assert response_time < 2.0
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_preferences_update_performance(self, mock_user, client):
"""Test performance of bulk preferences update."""
mock_user.return_value = {"user_id": "test_user"}
start_time = time.time()
# Large preferences update
bulk_data = {
"theme": {"name": "dark", "custom_colors": {"primary": "#007acc"}},
"language": {"code": "en"},
"accessibility": {
"high_contrast": True,
"large_text": True,
"reduced_motion": False,
"font_size_multiplier": 1.2
},
"ui_settings": {
"view_mode": "grid",
"grid_columns": 6,
"density": "comfortable",
"show_thumbnails": True
},
"shortcuts": {
"search": {"shortcut": "Ctrl+K"},
"download": {"shortcut": "Ctrl+D"}
}
}
response = client.put("/api/preferences", json=bulk_data)
response_time = time.time() - start_time
# Should handle bulk update efficiently (< 3 seconds)
assert response_time < 3.0
assert response.status_code in [200, 404]
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,402 +0,0 @@
"""
Integration tests for anime and episode management API endpoints.
Tests anime search, anime details, episode retrieval with pagination,
valid/invalid IDs, and search filtering functionality.
"""
import os
import sys
from unittest.mock import patch
import pytest
from fastapi.testclient import TestClient
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.server.fastapi_app import app # noqa: E402
@pytest.fixture
def client():
"""Test client for anime API tests."""
return TestClient(app)
@pytest.mark.integration
class TestAnimeSearchEndpoint:
"""Test anime search API endpoint."""
def test_anime_search_requires_auth(self, client):
"""Test anime search endpoint requires authentication."""
response = client.get("/api/anime/search?query=test")
assert response.status_code == 403 # Should require authentication
def test_anime_search_with_auth(self, client, mock_settings, valid_jwt_token):
"""Test anime search with valid authentication."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/anime/search?query=sample",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert isinstance(data, list)
for anime in data:
assert "id" in anime
assert "title" in anime
assert "description" in anime
assert "episodes" in anime
assert "status" in anime
assert "sample" in anime["title"].lower()
def test_anime_search_pagination(self, client, mock_settings, valid_jwt_token):
"""Test anime search with pagination parameters."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test with limit and offset
response = client.get(
"/api/anime/search?query=anime&limit=5&offset=0",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert isinstance(data, list)
assert len(data) <= 5 # Should respect limit
def test_anime_search_invalid_params(self, client, mock_settings, valid_jwt_token):
"""Test anime search with invalid parameters."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test missing query parameter
response = client.get(
"/api/anime/search",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 422 # Validation error
# Test invalid limit (too high)
response = client.get(
"/api/anime/search?query=test&limit=200",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 422
# Test negative offset
response = client.get(
"/api/anime/search?query=test&offset=-1",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 422
def test_anime_search_empty_query(self, client, mock_settings, valid_jwt_token):
"""Test anime search with empty query."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/anime/search?query=",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Empty query should be rejected due to min_length validation
assert response.status_code == 422
def test_anime_search_no_results(self, client, mock_settings, valid_jwt_token):
"""Test anime search with query that returns no results."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/anime/search?query=nonexistent_anime_title_xyz",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert isinstance(data, list)
assert len(data) == 0 # Should return empty list
@pytest.mark.integration
class TestAnimeDetailsEndpoint:
"""Test anime details API endpoint."""
def test_get_anime_requires_auth(self, client):
"""Test anime details endpoint requires authentication."""
response = client.get("/api/anime/test_anime_id")
assert response.status_code == 403
def test_get_anime_with_auth(self, client, mock_settings, valid_jwt_token):
"""Test anime details with valid authentication."""
anime_id = "test_anime_123"
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
f"/api/anime/{anime_id}",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert data["id"] == anime_id
assert "title" in data
assert "description" in data
assert "episodes" in data
assert "status" in data
assert isinstance(data["episodes"], int)
def test_get_anime_invalid_id(self, client, mock_settings, valid_jwt_token):
"""Test anime details with various ID formats."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test with special characters in ID
response = client.get(
"/api/anime/anime@#$%",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Should still return 200 since it's just an ID string
assert response.status_code == 200
def test_get_anime_empty_id(self, client, mock_settings, valid_jwt_token):
"""Test anime details with empty ID."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Empty ID should result in 404 or 422
response = client.get(
"/api/anime/",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [404, 405] # Method not allowed or not found
@pytest.mark.integration
class TestEpisodeEndpoints:
"""Test episode-related API endpoints."""
def test_get_anime_episodes_requires_auth(self, client):
"""Test anime episodes endpoint requires authentication."""
response = client.get("/api/anime/test_anime/episodes")
assert response.status_code == 403
def test_get_anime_episodes_with_auth(self, client, mock_settings, valid_jwt_token):
"""Test anime episodes with valid authentication."""
anime_id = "test_anime_456"
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
f"/api/anime/{anime_id}/episodes",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert isinstance(data, list)
for episode in data:
assert "id" in episode
assert "anime_id" in episode
assert "episode_number" in episode
assert "title" in episode
assert "description" in episode
assert "duration" in episode
assert episode["anime_id"] == anime_id
assert isinstance(episode["episode_number"], int)
assert episode["episode_number"] > 0
def test_get_episode_details_requires_auth(self, client):
"""Test episode details endpoint requires authentication."""
response = client.get("/api/episodes/test_episode_id")
assert response.status_code == 403
def test_get_episode_details_with_auth(self, client, mock_settings, valid_jwt_token):
"""Test episode details with valid authentication."""
episode_id = "test_episode_789"
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
f"/api/episodes/{episode_id}",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert data["id"] == episode_id
assert "anime_id" in data
assert "episode_number" in data
assert "title" in data
assert "description" in data
assert "duration" in data
assert isinstance(data["episode_number"], int)
assert isinstance(data["duration"], int)
def test_episode_endpoints_with_invalid_auth(self, client):
"""Test episode endpoints with invalid authentication."""
invalid_token = "invalid.token.here"
endpoints = [
"/api/anime/test/episodes",
"/api/episodes/test_episode"
]
for endpoint in endpoints:
response = client.get(
endpoint,
headers={"Authorization": f"Bearer {invalid_token}"}
)
assert response.status_code == 401
@pytest.mark.integration
class TestAnimeAPIErrorHandling:
"""Test error handling in anime API endpoints."""
def test_anime_endpoints_malformed_auth(self, client):
"""Test anime endpoints with malformed authorization headers."""
malformed_headers = [
{"Authorization": "Bearer"}, # Missing token
{"Authorization": "Basic token"}, # Wrong type
{"Authorization": "token"}, # Missing Bearer
]
endpoints = [
"/api/anime/search?query=test",
"/api/anime/test_id",
"/api/anime/test_id/episodes",
"/api/episodes/test_id"
]
for headers in malformed_headers:
for endpoint in endpoints:
response = client.get(endpoint, headers=headers)
assert response.status_code in [401, 403]
def test_anime_search_parameter_validation(self, client, mock_settings, valid_jwt_token):
"""Test anime search parameter validation."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test various invalid parameter combinations
invalid_params = [
"query=test&limit=0", # limit too low
"query=test&limit=101", # limit too high
"query=test&offset=-5", # negative offset
"query=&limit=10", # empty query
]
for params in invalid_params:
response = client.get(
f"/api/anime/search?{params}",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 422
def test_anime_endpoints_content_type_handling(self, client, mock_settings, valid_jwt_token):
"""Test anime endpoints with different content types."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test with different Accept headers
accept_headers = [
"application/json",
"application/xml",
"text/plain",
"*/*"
]
for accept_header in accept_headers:
response = client.get(
"/api/anime/search?query=test",
headers={
"Authorization": f"Bearer {valid_jwt_token}",
"Accept": accept_header
}
)
# Should always return JSON regardless of Accept header
assert response.status_code == 200
assert response.headers.get("content-type", "").startswith("application/json")
@pytest.mark.integration
class TestAnimeAPIDataIntegrity:
"""Test data integrity and consistency in anime API responses."""
def test_anime_search_response_structure(self, client, mock_settings, valid_jwt_token):
"""Test anime search response has consistent structure."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/anime/search?query=anime",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
required_fields = ["id", "title", "description", "episodes", "status"]
for anime in data:
for field in required_fields:
assert field in anime, f"Missing field {field} in anime response"
# Validate field types
assert isinstance(anime["id"], str)
assert isinstance(anime["title"], str)
assert isinstance(anime["episodes"], int)
assert isinstance(anime["status"], str)
assert anime["episodes"] >= 0
def test_episode_response_structure(self, client, mock_settings, valid_jwt_token):
"""Test episode response has consistent structure."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/anime/test_anime/episodes",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
required_fields = ["id", "anime_id", "episode_number", "title", "description", "duration"]
for episode in data:
for field in required_fields:
assert field in episode, f"Missing field {field} in episode response"
# Validate field types and ranges
assert isinstance(episode["id"], str)
assert isinstance(episode["anime_id"], str)
assert isinstance(episode["episode_number"], int)
assert isinstance(episode["title"], str)
assert isinstance(episode["duration"], int)
assert episode["episode_number"] > 0
assert episode["duration"] > 0
def test_episode_numbering_consistency(self, client, mock_settings, valid_jwt_token):
"""Test episode numbering is consistent and sequential."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/anime/test_anime/episodes",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
episodes = response.json()
if len(episodes) > 1:
# Check that episode numbers are sequential
episode_numbers = [ep["episode_number"] for ep in episodes]
episode_numbers.sort()
for i in range(len(episode_numbers) - 1):
assert episode_numbers[i + 1] == episode_numbers[i] + 1, \
"Episode numbers should be sequential"

View File

@ -1,314 +0,0 @@
"""
Integration tests for authentication API endpoints.
Tests POST /auth/login, GET /auth/verify, POST /auth/logout endpoints
with valid/invalid credentials and tokens.
"""
import os
import sys
from unittest.mock import Mock, patch
import pytest
from fastapi.testclient import TestClient
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.server.fastapi_app import app # noqa: E402
@pytest.fixture
def client():
"""Test client for FastAPI app."""
return TestClient(app)
@pytest.fixture
def mock_auth_settings():
"""Mock settings for authentication tests."""
settings = Mock()
settings.jwt_secret_key = "test-secret-key"
settings.password_salt = "test-salt"
settings.master_password = "test_password"
settings.master_password_hash = None
settings.token_expiry_hours = 1
return settings
@pytest.mark.integration
class TestAuthLogin:
"""Test authentication login endpoint."""
def test_login_valid_credentials(self, client, mock_auth_settings):
"""Test login with valid credentials."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.post(
"/auth/login",
json={"password": "test_password"}
)
assert response.status_code == 200
data = response.json()
assert data["success"] is True
assert "token" in data
assert "expires_at" in data
assert data["message"] == "Login successful"
def test_login_invalid_credentials(self, client, mock_auth_settings):
"""Test login with invalid credentials."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.post(
"/auth/login",
json={"password": "wrong_password"}
)
assert response.status_code == 401
data = response.json()
assert data["success"] is False
assert "token" not in data
assert "Invalid password" in data["message"]
def test_login_missing_password(self, client):
"""Test login with missing password field."""
response = client.post(
"/auth/login",
json={}
)
assert response.status_code == 422 # Validation error
def test_login_empty_password(self, client, mock_auth_settings):
"""Test login with empty password."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.post(
"/auth/login",
json={"password": ""}
)
assert response.status_code == 422 # Validation error (min_length=1)
def test_login_invalid_json(self, client):
"""Test login with invalid JSON payload."""
response = client.post(
"/auth/login",
data="invalid json",
headers={"Content-Type": "application/json"}
)
assert response.status_code == 422
def test_login_wrong_content_type(self, client):
"""Test login with wrong content type."""
response = client.post(
"/auth/login",
data="password=test_password"
)
assert response.status_code == 422
@pytest.mark.integration
class TestAuthVerify:
"""Test authentication token verification endpoint."""
def test_verify_valid_token(self, client, mock_auth_settings, valid_jwt_token):
"""Test token verification with valid token."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert data["valid"] is True
assert data["user"] == "test_user"
assert "expires_at" in data
def test_verify_expired_token(self, client, mock_auth_settings, expired_jwt_token):
"""Test token verification with expired token."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {expired_jwt_token}"}
)
assert response.status_code == 401
data = response.json()
assert data["valid"] is False
assert "expired" in data["message"].lower()
def test_verify_invalid_token(self, client, mock_auth_settings):
"""Test token verification with invalid token."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.get(
"/auth/verify",
headers={"Authorization": "Bearer invalid.token.here"}
)
assert response.status_code == 401
data = response.json()
assert data["valid"] is False
def test_verify_missing_token(self, client):
"""Test token verification without token."""
response = client.get("/auth/verify")
assert response.status_code == 403 # Forbidden - no credentials
def test_verify_malformed_header(self, client):
"""Test token verification with malformed authorization header."""
response = client.get(
"/auth/verify",
headers={"Authorization": "InvalidFormat token"}
)
assert response.status_code == 403
def test_verify_empty_token(self, client):
"""Test token verification with empty token."""
response = client.get(
"/auth/verify",
headers={"Authorization": "Bearer "}
)
assert response.status_code == 401
@pytest.mark.integration
class TestAuthLogout:
"""Test authentication logout endpoint."""
def test_logout_valid_token(self, client, mock_auth_settings, valid_jwt_token):
"""Test logout with valid token."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.post(
"/auth/logout",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert data["success"] is True
assert "logged out" in data["message"].lower()
def test_logout_invalid_token(self, client, mock_auth_settings):
"""Test logout with invalid token."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.post(
"/auth/logout",
headers={"Authorization": "Bearer invalid.token"}
)
assert response.status_code == 401
def test_logout_missing_token(self, client):
"""Test logout without token."""
response = client.post("/auth/logout")
assert response.status_code == 403
def test_logout_expired_token(self, client, mock_auth_settings, expired_jwt_token):
"""Test logout with expired token."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
response = client.post(
"/auth/logout",
headers={"Authorization": f"Bearer {expired_jwt_token}"}
)
assert response.status_code == 401
@pytest.mark.integration
class TestAuthFlow:
"""Test complete authentication flow."""
def test_complete_login_verify_logout_flow(self, client, mock_auth_settings):
"""Test complete authentication flow: login -> verify -> logout."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
# Step 1: Login
login_response = client.post(
"/auth/login",
json={"password": "test_password"}
)
assert login_response.status_code == 200
login_data = login_response.json()
token = login_data["token"]
# Step 2: Verify token
verify_response = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {token}"}
)
assert verify_response.status_code == 200
verify_data = verify_response.json()
assert verify_data["valid"] is True
# Step 3: Logout
logout_response = client.post(
"/auth/logout",
headers={"Authorization": f"Bearer {token}"}
)
assert logout_response.status_code == 200
logout_data = logout_response.json()
assert logout_data["success"] is True
def test_multiple_login_attempts(self, client, mock_auth_settings):
"""Test multiple login attempts with rate limiting consideration."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
# Multiple successful logins should work
for _ in range(3):
response = client.post(
"/auth/login",
json={"password": "test_password"}
)
assert response.status_code == 200
# Failed login attempts
for _ in range(3):
response = client.post(
"/auth/login",
json={"password": "wrong_password"}
)
assert response.status_code == 401
def test_concurrent_sessions(self, client, mock_auth_settings):
"""Test that multiple valid tokens can exist simultaneously."""
with patch('src.server.fastapi_app.settings', mock_auth_settings):
# Get first token
response1 = client.post(
"/auth/login",
json={"password": "test_password"}
)
token1 = response1.json()["token"]
# Get second token
response2 = client.post(
"/auth/login",
json={"password": "test_password"}
)
token2 = response2.json()["token"]
# Both tokens should be valid
verify1 = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {token1}"}
)
verify2 = client.get(
"/auth/verify",
headers={"Authorization": f"Bearer {token2}"}
)
assert verify1.status_code == 200
assert verify2.status_code == 200

View File

@ -1,277 +0,0 @@
"""
Integration tests for bulk operations API endpoints.
This module tests the bulk operation endpoints for download, update, organize, delete, and export.
Tests include authentication, validation, and error handling.
"""
import json
from unittest.mock import Mock, patch
import pytest
from fastapi.testclient import TestClient
from src.server.fastapi_app import app
@pytest.fixture
def client():
"""Create a test client for the FastAPI application."""
return TestClient(app)
@pytest.fixture
def auth_headers(client):
"""Provide authentication headers for protected endpoints."""
# Login to get token
login_data = {"password": "testpassword"}
with patch('src.server.fastapi_app.settings.master_password_hash') as mock_hash:
mock_hash.return_value = "5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8" # 'password' hash
response = client.post("/auth/login", json=login_data)
if response.status_code == 200:
token = response.json()["access_token"]
return {"Authorization": f"Bearer {token}"}
return {}
class TestBulkDownloadEndpoint:
"""Test cases for /api/bulk/download endpoint."""
def test_bulk_download_requires_auth(self, client):
"""Test that bulk download requires authentication."""
response = client.post("/api/bulk/download", json={"anime_ids": ["1", "2"]})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_download_valid_request(self, mock_user, client):
"""Test bulk download with valid request."""
mock_user.return_value = {"user_id": "test_user"}
download_data = {
"anime_ids": ["anime1", "anime2"],
"quality": "1080p",
"format": "mp4"
}
with patch('src.server.fastapi_app.bulk_download_service') as mock_service:
mock_service.start_bulk_download.return_value = {
"task_id": "bulk_task_123",
"status": "started",
"anime_count": 2
}
response = client.post("/api/bulk/download", json=download_data)
# Note: This test assumes the endpoint will be implemented
# Currently returns 404 since endpoint doesn't exist
assert response.status_code in [200, 404]
def test_bulk_download_invalid_data(self, client, auth_headers):
"""Test bulk download with invalid data."""
invalid_data = {"anime_ids": []} # Empty list
response = client.post("/api/bulk/download", json=invalid_data, headers=auth_headers)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [400, 404, 422]
def test_bulk_download_missing_anime_ids(self, client, auth_headers):
"""Test bulk download without anime_ids field."""
invalid_data = {"quality": "1080p"}
response = client.post("/api/bulk/download", json=invalid_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestBulkUpdateEndpoint:
"""Test cases for /api/bulk/update endpoint."""
def test_bulk_update_requires_auth(self, client):
"""Test that bulk update requires authentication."""
response = client.post("/api/bulk/update", json={"anime_ids": ["1", "2"]})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_update_metadata(self, mock_user, client):
"""Test bulk metadata update."""
mock_user.return_value = {"user_id": "test_user"}
update_data = {
"anime_ids": ["anime1", "anime2"],
"operation": "update_metadata"
}
response = client.post("/api/bulk/update", json=update_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
def test_bulk_update_invalid_operation(self, client, auth_headers):
"""Test bulk update with invalid operation."""
invalid_data = {
"anime_ids": ["anime1"],
"operation": "invalid_operation"
}
response = client.post("/api/bulk/update", json=invalid_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestBulkOrganizeEndpoint:
"""Test cases for /api/bulk/organize endpoint."""
def test_bulk_organize_requires_auth(self, client):
"""Test that bulk organize requires authentication."""
response = client.post("/api/bulk/organize", json={"anime_ids": ["1", "2"]})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_organize_by_genre(self, mock_user, client):
"""Test bulk organize by genre."""
mock_user.return_value = {"user_id": "test_user"}
organize_data = {
"anime_ids": ["anime1", "anime2"],
"organize_by": "genre",
"create_subdirectories": True
}
response = client.post("/api/bulk/organize", json=organize_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
def test_bulk_organize_by_year(self, client, auth_headers):
"""Test bulk organize by year."""
organize_data = {
"anime_ids": ["anime1", "anime2"],
"organize_by": "year",
"create_subdirectories": False
}
response = client.post("/api/bulk/organize", json=organize_data, headers=auth_headers)
assert response.status_code in [200, 404]
class TestBulkDeleteEndpoint:
"""Test cases for /api/bulk/delete endpoint."""
def test_bulk_delete_requires_auth(self, client):
"""Test that bulk delete requires authentication."""
response = client.delete("/api/bulk/delete", json={"anime_ids": ["1", "2"]})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_delete_with_confirmation(self, mock_user, client):
"""Test bulk delete with confirmation."""
mock_user.return_value = {"user_id": "test_user"}
delete_data = {
"anime_ids": ["anime1", "anime2"],
"confirm": True,
"delete_files": True
}
response = client.delete("/api/bulk/delete", json=delete_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
def test_bulk_delete_without_confirmation(self, client, auth_headers):
"""Test bulk delete without confirmation should fail."""
delete_data = {
"anime_ids": ["anime1", "anime2"],
"confirm": False
}
response = client.delete("/api/bulk/delete", json=delete_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestBulkExportEndpoint:
"""Test cases for /api/bulk/export endpoint."""
def test_bulk_export_requires_auth(self, client):
"""Test that bulk export requires authentication."""
response = client.post("/api/bulk/export", json={"anime_ids": ["1", "2"]})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_export_to_json(self, mock_user, client):
"""Test bulk export to JSON format."""
mock_user.return_value = {"user_id": "test_user"}
export_data = {
"anime_ids": ["anime1", "anime2"],
"format": "json",
"include_metadata": True
}
response = client.post("/api/bulk/export", json=export_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
def test_bulk_export_to_csv(self, client, auth_headers):
"""Test bulk export to CSV format."""
export_data = {
"anime_ids": ["anime1", "anime2"],
"format": "csv",
"include_metadata": False
}
response = client.post("/api/bulk/export", json=export_data, headers=auth_headers)
assert response.status_code in [200, 404]
def test_bulk_export_invalid_format(self, client, auth_headers):
"""Test bulk export with invalid format."""
export_data = {
"anime_ids": ["anime1"],
"format": "invalid_format"
}
response = client.post("/api/bulk/export", json=export_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestBulkOperationsEdgeCases:
"""Test edge cases for bulk operations."""
def test_empty_anime_ids_list(self, client, auth_headers):
"""Test bulk operations with empty anime_ids list."""
empty_data = {"anime_ids": []}
endpoints = [
"/api/bulk/download",
"/api/bulk/update",
"/api/bulk/organize",
"/api/bulk/export"
]
for endpoint in endpoints:
if endpoint == "/api/bulk/delete":
response = client.delete(endpoint, json=empty_data, headers=auth_headers)
else:
response = client.post(endpoint, json=empty_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
def test_large_anime_ids_list(self, client, auth_headers):
"""Test bulk operations with large anime_ids list."""
large_data = {"anime_ids": [f"anime_{i}" for i in range(1000)]}
response = client.post("/api/bulk/download", json=large_data, headers=auth_headers)
# Endpoint should handle large requests or return appropriate error
assert response.status_code in [200, 400, 404, 413]
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_operations_concurrent_requests(self, mock_user, client):
"""Test multiple concurrent bulk operations."""
mock_user.return_value = {"user_id": "test_user"}
# This test would need actual implementation to test concurrency
# For now, just verify endpoints exist
data = {"anime_ids": ["anime1"]}
response = client.post("/api/bulk/download", json=data)
assert response.status_code in [200, 404]
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,350 +0,0 @@
"""
Integration tests for database and storage management API endpoints.
Tests database info, maintenance operations (vacuum, analyze, integrity-check,
reindex, optimize, stats), and storage management functionality.
"""
import os
import sys
from unittest.mock import patch
import pytest
from fastapi.testclient import TestClient
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.server.fastapi_app import app # noqa: E402
@pytest.fixture
def client():
"""Test client for database API tests."""
return TestClient(app)
@pytest.mark.integration
class TestDatabaseInfoEndpoints:
"""Test database information endpoints."""
def test_database_health_requires_auth(self, client):
"""Test database health endpoint requires authentication."""
response = client.get("/api/system/database/health")
assert response.status_code == 403
def test_database_health_with_auth(self, client, mock_settings, valid_jwt_token):
"""Test database health with valid authentication."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/system/database/health",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert "status" in data
assert "connection_pool" in data
assert "response_time_ms" in data
assert "last_check" in data
assert data["status"] == "healthy"
assert isinstance(data["response_time_ms"], (int, float))
assert data["response_time_ms"] > 0
def test_database_info_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /api/database/info endpoint (to be implemented)."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/database/info",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Endpoint may not be implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = ["database_type", "version", "size", "tables"]
for field in expected_fields:
if field in data:
assert isinstance(data[field], (str, int, float, dict, list))
@pytest.mark.integration
class TestDatabaseMaintenanceEndpoints:
"""Test database maintenance operation endpoints."""
def test_database_vacuum_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /maintenance/database/vacuum endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.post(
"/maintenance/database/vacuum",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Endpoint may not be implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "success" in data or "status" in data
def test_database_analyze_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /maintenance/database/analyze endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.post(
"/maintenance/database/analyze",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = ["tables_analyzed", "statistics_updated", "duration_ms"]
# Check if any expected fields are present
assert any(field in data for field in expected_fields)
def test_database_integrity_check_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /maintenance/database/integrity-check endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.post(
"/maintenance/database/integrity-check",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "integrity_status" in data or "status" in data
if "integrity_status" in data:
assert data["integrity_status"] in ["ok", "error", "warning"]
def test_database_reindex_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /maintenance/database/reindex endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.post(
"/maintenance/database/reindex",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = ["indexes_rebuilt", "duration_ms", "status"]
assert any(field in data for field in expected_fields)
def test_database_optimize_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /maintenance/database/optimize endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.post(
"/maintenance/database/optimize",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "optimization_status" in data or "status" in data
def test_database_stats_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /maintenance/database/stats endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/maintenance/database/stats",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_stats = ["table_count", "record_count", "database_size", "index_size"]
# At least some stats should be present
assert any(stat in data for stat in expected_stats)
@pytest.mark.integration
class TestDatabaseEndpointAuthentication:
"""Test authentication requirements for database endpoints."""
def test_database_endpoints_require_auth(self, client):
"""Test that database endpoints require authentication."""
database_endpoints = [
"/api/database/info",
"/api/system/database/health",
"/maintenance/database/vacuum",
"/maintenance/database/analyze",
"/maintenance/database/integrity-check",
"/maintenance/database/reindex",
"/maintenance/database/optimize",
"/maintenance/database/stats"
]
for endpoint in database_endpoints:
# Try GET for info endpoints
if "info" in endpoint or "health" in endpoint or "stats" in endpoint:
response = client.get(endpoint)
else:
# Try POST for maintenance endpoints
response = client.post(endpoint)
# Should require authentication (403) or not be found (404)
assert response.status_code in [403, 404]
def test_database_endpoints_with_invalid_auth(self, client):
"""Test database endpoints with invalid authentication."""
invalid_token = "invalid.token.here"
database_endpoints = [
("/api/system/database/health", "GET"),
("/maintenance/database/vacuum", "POST"),
("/maintenance/database/analyze", "POST")
]
for endpoint, method in database_endpoints:
if method == "GET":
response = client.get(
endpoint,
headers={"Authorization": f"Bearer {invalid_token}"}
)
else:
response = client.post(
endpoint,
headers={"Authorization": f"Bearer {invalid_token}"}
)
# Should be unauthorized (401) or not found (404)
assert response.status_code in [401, 404]
@pytest.mark.integration
class TestDatabaseMaintenanceOperations:
"""Test database maintenance operation workflows."""
def test_maintenance_operation_sequence(self, client, mock_settings, valid_jwt_token):
"""Test sequence of maintenance operations."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test sequence: analyze -> vacuum -> reindex -> optimize
maintenance_sequence = [
"/maintenance/database/analyze",
"/maintenance/database/vacuum",
"/maintenance/database/reindex",
"/maintenance/database/optimize"
]
for endpoint in maintenance_sequence:
response = client.post(
endpoint,
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Should either work (200) or not be implemented (404)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
# Should return some kind of status or success indication
assert isinstance(data, dict)
def test_maintenance_operation_parameters(self, client, mock_settings, valid_jwt_token):
"""Test maintenance operations with parameters."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test vacuum with parameters
response = client.post(
"/maintenance/database/vacuum?full=true",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404, 422]
# Test analyze with table parameter
response = client.post(
"/maintenance/database/analyze?tables=anime,episodes",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404, 422]
def test_concurrent_maintenance_operations(self, client, mock_settings, valid_jwt_token):
"""Test behavior of concurrent maintenance operations."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Simulate starting multiple operations
# In real implementation, this should be handled properly
# Start first operation
response1 = client.post(
"/maintenance/database/vacuum",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Try to start second operation while first might be running
response2 = client.post(
"/maintenance/database/analyze",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Both should either work or not be implemented
assert response1.status_code in [200, 404, 409] # 409 for conflict
assert response2.status_code in [200, 404, 409]
@pytest.mark.integration
class TestDatabaseErrorHandling:
"""Test error handling in database operations."""
def test_database_connection_errors(self, client, mock_settings, valid_jwt_token):
"""Test handling of database connection errors."""
# Mock database connection failure
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/system/database/health",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Health check should still return a response even if DB is down
assert response.status_code in [200, 503] # 503 for service unavailable
if response.status_code == 503:
data = response.json()
assert "error" in data or "status" in data
def test_maintenance_operation_errors(self, client, mock_settings, valid_jwt_token):
"""Test error handling in maintenance operations."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test with malformed requests
malformed_requests = [
("/maintenance/database/vacuum", {"invalid": "data"}),
("/maintenance/database/analyze", {"tables": ""}),
]
for endpoint, json_data in malformed_requests:
response = client.post(
endpoint,
json=json_data,
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Should handle gracefully
assert response.status_code in [200, 400, 404, 422]
def test_database_timeout_handling(self, client, mock_settings, valid_jwt_token):
"""Test handling of database operation timeouts."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test long-running operation (like full vacuum)
response = client.post(
"/maintenance/database/vacuum?full=true",
headers={"Authorization": f"Bearer {valid_jwt_token}"},
timeout=1 # Very short timeout to simulate timeout
)
# Should either complete quickly or handle timeout gracefully
# Note: This test depends on implementation details
assert response.status_code in [200, 404, 408, 504] # 408/504 for timeout

View File

@ -1,336 +0,0 @@
"""
Integration tests for diagnostics API endpoints.
This module tests the diagnostics endpoints for error reporting and system diagnostics.
"""
import os
import tempfile
from unittest.mock import Mock, patch
import pytest
from fastapi.testclient import TestClient
from src.server.fastapi_app import app
@pytest.fixture
def client():
"""Create a test client for the FastAPI application."""
return TestClient(app)
@pytest.fixture
def auth_headers(client):
"""Provide authentication headers for protected endpoints."""
# Login to get token
login_data = {"password": "testpassword"}
with patch('src.server.fastapi_app.settings.master_password_hash') as mock_hash:
mock_hash.return_value = "5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8" # 'password' hash
response = client.post("/auth/login", json=login_data)
if response.status_code == 200:
token = response.json()["access_token"]
return {"Authorization": f"Bearer {token}"}
return {}
class TestDiagnosticsReportEndpoint:
"""Test cases for /diagnostics/report endpoint."""
def test_diagnostics_report_requires_auth(self, client):
"""Test that diagnostics report requires authentication."""
response = client.get("/diagnostics/report")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_diagnostics_report(self, mock_user, client):
"""Test getting diagnostics report."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/diagnostics/report")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = [
"system_info", "memory_usage", "disk_usage",
"error_summary", "performance_metrics", "timestamp"
]
for field in expected_fields:
assert field in data
@patch('src.server.fastapi_app.get_current_user')
def test_get_diagnostics_report_with_filters(self, mock_user, client):
"""Test getting diagnostics report with time filters."""
mock_user.return_value = {"user_id": "test_user"}
# Test with time range
response = client.get("/diagnostics/report?since=2023-01-01&until=2023-12-31")
assert response.status_code in [200, 404]
# Test with severity filter
response = client.get("/diagnostics/report?severity=error")
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_generate_diagnostics_report(self, mock_user, client):
"""Test generating new diagnostics report."""
mock_user.return_value = {"user_id": "test_user"}
report_options = {
"include_logs": True,
"include_system_info": True,
"include_performance": True,
"time_range_hours": 24
}
response = client.post("/diagnostics/report", json=report_options)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "report_id" in data
assert "status" in data
def test_diagnostics_report_invalid_params(self, client, auth_headers):
"""Test diagnostics report with invalid parameters."""
invalid_params = [
"?since=invalid-date",
"?severity=invalid-severity",
"?time_range_hours=-1"
]
for param in invalid_params:
response = client.get(f"/diagnostics/report{param}", headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestDiagnosticsErrorReporting:
"""Test cases for error reporting functionality."""
@patch('src.server.fastapi_app.get_current_user')
def test_get_error_statistics(self, mock_user, client):
"""Test getting error statistics."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/diagnostics/errors/stats")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = [
"total_errors", "errors_by_type", "errors_by_severity",
"recent_errors", "error_trends"
]
for field in expected_fields:
assert field in data
@patch('src.server.fastapi_app.get_current_user')
def test_get_recent_errors(self, mock_user, client):
"""Test getting recent errors."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/diagnostics/errors/recent")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "errors" in data
assert isinstance(data["errors"], list)
@patch('src.server.fastapi_app.get_current_user')
def test_clear_error_logs(self, mock_user, client):
"""Test clearing error logs."""
mock_user.return_value = {"user_id": "test_user"}
response = client.delete("/diagnostics/errors/clear")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "cleared_count" in data
class TestDiagnosticsSystemHealth:
"""Test cases for system health diagnostics."""
@patch('src.server.fastapi_app.get_current_user')
def test_get_system_health_overview(self, mock_user, client):
"""Test getting system health overview."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/diagnostics/system/health")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = [
"overall_status", "cpu_usage", "memory_usage",
"disk_usage", "network_status", "service_status"
]
for field in expected_fields:
assert field in data
@patch('src.server.fastapi_app.get_current_user')
def test_run_system_diagnostics(self, mock_user, client):
"""Test running system diagnostics."""
mock_user.return_value = {"user_id": "test_user"}
diagnostic_options = {
"check_disk": True,
"check_memory": True,
"check_network": True,
"check_database": True
}
response = client.post("/diagnostics/system/run", json=diagnostic_options)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "diagnostic_id" in data
assert "status" in data
class TestDiagnosticsLogManagement:
"""Test cases for log management diagnostics."""
@patch('src.server.fastapi_app.get_current_user')
def test_get_log_file_info(self, mock_user, client):
"""Test getting log file information."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/diagnostics/logs/info")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = [
"log_files", "total_size_bytes", "oldest_entry",
"newest_entry", "rotation_status"
]
for field in expected_fields:
assert field in data
@patch('src.server.fastapi_app.get_current_user')
def test_get_log_entries(self, mock_user, client):
"""Test getting log entries."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/diagnostics/logs/entries")
assert response.status_code in [200, 404]
# Test with filters
response = client.get("/diagnostics/logs/entries?level=ERROR&limit=100")
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_export_logs(self, mock_user, client):
"""Test exporting logs."""
mock_user.return_value = {"user_id": "test_user"}
export_options = {
"format": "json",
"include_levels": ["ERROR", "WARNING", "INFO"],
"time_range_hours": 24
}
response = client.post("/diagnostics/logs/export", json=export_options)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_rotate_logs(self, mock_user, client):
"""Test log rotation."""
mock_user.return_value = {"user_id": "test_user"}
response = client.post("/diagnostics/logs/rotate")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "rotated_files" in data
assert "status" in data
class TestDiagnosticsIntegration:
"""Integration tests for diagnostics functionality."""
@patch('src.server.fastapi_app.get_current_user')
def test_diagnostics_workflow(self, mock_user, client):
"""Test typical diagnostics workflow."""
mock_user.return_value = {"user_id": "test_user"}
# 1. Get system health overview
response = client.get("/diagnostics/system/health")
assert response.status_code in [200, 404]
# 2. Get error statistics
response = client.get("/diagnostics/errors/stats")
assert response.status_code in [200, 404]
# 3. Generate full diagnostics report
response = client.get("/diagnostics/report")
assert response.status_code in [200, 404]
# 4. Check log file status
response = client.get("/diagnostics/logs/info")
assert response.status_code in [200, 404]
def test_diagnostics_error_handling(self, client, auth_headers):
"""Test error handling across diagnostics endpoints."""
endpoints = [
"/diagnostics/report",
"/diagnostics/errors/stats",
"/diagnostics/system/health",
"/diagnostics/logs/info"
]
for endpoint in endpoints:
response = client.get(endpoint, headers=auth_headers)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_diagnostics_concurrent_requests(self, mock_user, client):
"""Test handling of concurrent diagnostics requests."""
mock_user.return_value = {"user_id": "test_user"}
# Multiple simultaneous requests should be handled gracefully
response = client.get("/diagnostics/report")
assert response.status_code in [200, 404]
class TestDiagnosticsEdgeCases:
"""Test edge cases for diagnostics functionality."""
def test_diagnostics_with_missing_log_files(self, client, auth_headers):
"""Test diagnostics when log files are missing."""
response = client.get("/diagnostics/logs/info", headers=auth_headers)
# Should handle missing log files gracefully
assert response.status_code in [200, 404, 500]
def test_diagnostics_with_large_log_files(self, client, auth_headers):
"""Test diagnostics with very large log files."""
# Test with limit parameter for large files
response = client.get("/diagnostics/logs/entries?limit=10", headers=auth_headers)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_diagnostics_export_formats(self, mock_user, client):
"""Test different export formats for diagnostics."""
mock_user.return_value = {"user_id": "test_user"}
export_formats = ["json", "csv", "txt"]
for format_type in export_formats:
export_data = {"format": format_type}
response = client.post("/diagnostics/logs/export", json=export_data)
assert response.status_code in [200, 404, 400]
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,286 +0,0 @@
"""
Integration tests for health and system monitoring API endpoints.
Tests /health, /api/health/* endpoints including system metrics,
database health, dependencies, performance, and monitoring.
"""
import os
import sys
from datetime import datetime
from unittest.mock import patch
import pytest
from fastapi.testclient import TestClient
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.server.fastapi_app import app # noqa: E402
@pytest.fixture
def client():
"""Test client for health API tests."""
return TestClient(app)
@pytest.mark.integration
class TestBasicHealthEndpoints:
"""Test basic health check endpoints."""
def test_health_endpoint_structure(self, client):
"""Test basic health endpoint returns correct structure."""
response = client.get("/health")
assert response.status_code == 200
data = response.json()
assert "status" in data
assert "timestamp" in data
assert "version" in data
assert "services" in data
assert data["status"] == "healthy"
assert data["version"] == "1.0.0"
assert isinstance(data["services"], dict)
def test_health_endpoint_services(self, client):
"""Test health endpoint returns service status."""
response = client.get("/health")
assert response.status_code == 200
data = response.json()
services = data["services"]
expected_services = ["authentication", "anime_service", "episode_service"]
for service in expected_services:
assert service in services
assert services[service] == "online"
def test_health_endpoint_timestamp_format(self, client):
"""Test health endpoint timestamp is valid."""
response = client.get("/health")
assert response.status_code == 200
data = response.json()
# Should be able to parse timestamp
timestamp_str = data["timestamp"]
parsed_timestamp = datetime.fromisoformat(timestamp_str.replace('Z', '+00:00'))
assert isinstance(parsed_timestamp, datetime)
def test_database_health_requires_auth(self, client):
"""Test database health endpoint requires authentication."""
response = client.get("/api/system/database/health")
assert response.status_code == 403 # Should require authentication
def test_database_health_with_auth(self, client, mock_settings, valid_jwt_token):
"""Test database health endpoint with authentication."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/system/database/health",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code == 200
data = response.json()
assert "status" in data
assert "connection_pool" in data
assert "response_time_ms" in data
assert "last_check" in data
assert data["status"] == "healthy"
@pytest.mark.integration
class TestSystemHealthEndpoints:
"""Test system health monitoring endpoints (to be implemented)."""
def test_api_health_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /api/health endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
# This endpoint might not exist yet, so we test expected behavior
response = client.get(
"/api/health",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# If not implemented, should return 404
# If implemented, should return 200 with health data
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
def test_system_health_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /api/health/system endpoint for CPU, memory, disk metrics."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/health/system",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
# Endpoint may not be implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_metrics = ["cpu_usage", "memory_usage", "disk_usage"]
for metric in expected_metrics:
assert metric in data
def test_dependencies_health_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /api/health/dependencies endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/health/dependencies",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert isinstance(data, dict)
def test_performance_health_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /api/health/performance endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/health/performance",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
performance_metrics = ["response_time", "throughput", "error_rate"]
# At least some performance metrics should be present
assert any(metric in data for metric in performance_metrics)
def test_metrics_health_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /api/health/metrics endpoint."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/health/metrics",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert isinstance(data, (dict, list))
def test_ready_health_endpoint(self, client, mock_settings, valid_jwt_token):
"""Test /api/health/ready endpoint for readiness probe."""
with patch('src.server.fastapi_app.settings', mock_settings):
response = client.get(
"/api/health/ready",
headers={"Authorization": f"Bearer {valid_jwt_token}"}
)
assert response.status_code in [200, 404, 503]
if response.status_code in [200, 503]:
data = response.json()
assert "ready" in data or "status" in data
@pytest.mark.integration
class TestHealthEndpointAuthentication:
"""Test authentication requirements for health endpoints."""
def test_health_endpoints_without_auth(self, client):
"""Test which health endpoints require authentication."""
# Basic health should be public
response = client.get("/health")
assert response.status_code == 200
# System endpoints should require auth
protected_endpoints = [
"/api/health",
"/api/health/system",
"/api/health/database",
"/api/health/dependencies",
"/api/health/performance",
"/api/health/metrics",
"/api/health/ready"
]
for endpoint in protected_endpoints:
response = client.get(endpoint)
# Should either be not found (404) or require auth (403)
assert response.status_code in [403, 404]
def test_health_endpoints_with_invalid_auth(self, client):
"""Test health endpoints with invalid authentication."""
invalid_token = "invalid.token.here"
protected_endpoints = [
"/api/health",
"/api/health/system",
"/api/health/database",
"/api/health/dependencies",
"/api/health/performance",
"/api/health/metrics",
"/api/health/ready"
]
for endpoint in protected_endpoints:
response = client.get(
endpoint,
headers={"Authorization": f"Bearer {invalid_token}"}
)
# Should either be not found (404) or unauthorized (401)
assert response.status_code in [401, 404]
@pytest.mark.integration
class TestHealthEndpointErrorHandling:
"""Test error handling in health endpoints."""
def test_health_endpoint_resilience(self, client):
"""Test health endpoint handles errors gracefully."""
# Test with various malformed requests
malformed_requests = [
("/health", {"Content-Type": "application/xml"}),
("/health", {"Accept": "text/plain"}),
]
for endpoint, headers in malformed_requests:
response = client.get(endpoint, headers=headers)
# Should still return 200 for basic health
assert response.status_code == 200
def test_database_health_error_handling(self, client, mock_settings):
"""Test database health endpoint error handling."""
with patch('src.server.fastapi_app.settings', mock_settings):
# Test with expired token
expired_token = "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1c2VyIjoidGVzdCIsImV4cCI6MH0"
response = client.get(
"/api/system/database/health",
headers={"Authorization": f"Bearer {expired_token}"}
)
assert response.status_code == 401
def test_health_endpoint_malformed_auth_header(self, client):
"""Test health endpoints with malformed authorization headers."""
malformed_headers = [
{"Authorization": "Bearer"}, # Missing token
{"Authorization": "Basic token"}, # Wrong type
{"Authorization": "token"}, # Missing Bearer
]
for headers in malformed_headers:
response = client.get("/api/system/database/health", headers=headers)
assert response.status_code in [401, 403]

View File

@ -1,440 +0,0 @@
"""
Integration tests for API key management, webhooks, and third-party integrations.
This module tests the integration endpoints for managing API keys, webhook configurations,
and third-party service integrations.
"""
import json
import uuid
from unittest.mock import Mock, patch
import pytest
from fastapi.testclient import TestClient
from src.server.fastapi_app import app
@pytest.fixture
def client():
"""Create a test client for the FastAPI application."""
return TestClient(app)
@pytest.fixture
def auth_headers(client):
"""Provide authentication headers for protected endpoints."""
# Login to get token
login_data = {"password": "testpassword"}
with patch('src.server.fastapi_app.settings.master_password_hash') as mock_hash:
mock_hash.return_value = "5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8" # 'password' hash
response = client.post("/auth/login", json=login_data)
if response.status_code == 200:
token = response.json()["access_token"]
return {"Authorization": f"Bearer {token}"}
return {}
class TestAPIKeyManagement:
"""Test cases for API key management endpoints."""
def test_list_api_keys_requires_auth(self, client):
"""Test that listing API keys requires authentication."""
response = client.get("/api/integrations/api-keys")
assert response.status_code == 401
def test_create_api_key_requires_auth(self, client):
"""Test that creating API keys requires authentication."""
response = client.post("/api/integrations/api-keys", json={"name": "test_key"})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_list_api_keys(self, mock_user, client):
"""Test listing API keys."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/integrations/api-keys")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "api_keys" in data
assert isinstance(data["api_keys"], list)
@patch('src.server.fastapi_app.get_current_user')
def test_create_api_key(self, mock_user, client):
"""Test creating new API key."""
mock_user.return_value = {"user_id": "test_user"}
key_data = {
"name": "test_integration_key",
"description": "Key for testing integrations",
"permissions": ["read", "write"],
"expires_at": "2024-12-31T23:59:59Z"
}
response = client.post("/api/integrations/api-keys", json=key_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [201, 404]
if response.status_code == 201:
data = response.json()
assert "api_key_id" in data
assert "api_key" in data
assert "created_at" in data
@patch('src.server.fastapi_app.get_current_user')
def test_get_api_key_details(self, mock_user, client):
"""Test getting API key details."""
mock_user.return_value = {"user_id": "test_user"}
key_id = "test_key_123"
response = client.get(f"/api/integrations/api-keys/{key_id}")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "api_key_id" in data
assert "name" in data
assert "permissions" in data
assert "created_at" in data
@patch('src.server.fastapi_app.get_current_user')
def test_revoke_api_key(self, mock_user, client):
"""Test revoking API key."""
mock_user.return_value = {"user_id": "test_user"}
key_id = "test_key_123"
response = client.delete(f"/api/integrations/api-keys/{key_id}")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert data["status"] == "revoked"
def test_create_api_key_invalid_data(self, client, auth_headers):
"""Test creating API key with invalid data."""
invalid_data_sets = [
{}, # Empty data
{"name": ""}, # Empty name
{"name": "test", "permissions": []}, # Empty permissions
{"name": "test", "expires_at": "invalid_date"}, # Invalid date
]
for invalid_data in invalid_data_sets:
response = client.post("/api/integrations/api-keys", json=invalid_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
@patch('src.server.fastapi_app.get_current_user')
def test_update_api_key_permissions(self, mock_user, client):
"""Test updating API key permissions."""
mock_user.return_value = {"user_id": "test_user"}
key_id = "test_key_123"
update_data = {
"permissions": ["read"],
"description": "Updated description"
}
response = client.patch(f"/api/integrations/api-keys/{key_id}", json=update_data)
assert response.status_code in [200, 404]
class TestWebhookManagement:
"""Test cases for webhook configuration endpoints."""
def test_list_webhooks_requires_auth(self, client):
"""Test that listing webhooks requires authentication."""
response = client.get("/api/integrations/webhooks")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_list_webhooks(self, mock_user, client):
"""Test listing configured webhooks."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/integrations/webhooks")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "webhooks" in data
assert isinstance(data["webhooks"], list)
@patch('src.server.fastapi_app.get_current_user')
def test_create_webhook(self, mock_user, client):
"""Test creating new webhook."""
mock_user.return_value = {"user_id": "test_user"}
webhook_data = {
"name": "download_complete_webhook",
"url": "https://example.com/webhook",
"events": ["download_complete", "download_failed"],
"secret": "webhook_secret_123",
"active": True
}
response = client.post("/api/integrations/webhooks", json=webhook_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [201, 404]
if response.status_code == 201:
data = response.json()
assert "webhook_id" in data
assert "created_at" in data
@patch('src.server.fastapi_app.get_current_user')
def test_test_webhook(self, mock_user, client):
"""Test webhook endpoint."""
mock_user.return_value = {"user_id": "test_user"}
webhook_id = "webhook_123"
test_data = {
"event_type": "test",
"test_payload": {"message": "test webhook"}
}
response = client.post(f"/api/integrations/webhooks/{webhook_id}/test", json=test_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert "response_time_ms" in data
@patch('src.server.fastapi_app.get_current_user')
def test_update_webhook(self, mock_user, client):
"""Test updating webhook configuration."""
mock_user.return_value = {"user_id": "test_user"}
webhook_id = "webhook_123"
update_data = {
"active": False,
"events": ["download_complete"]
}
response = client.patch(f"/api/integrations/webhooks/{webhook_id}", json=update_data)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_delete_webhook(self, mock_user, client):
"""Test deleting webhook."""
mock_user.return_value = {"user_id": "test_user"}
webhook_id = "webhook_123"
response = client.delete(f"/api/integrations/webhooks/{webhook_id}")
assert response.status_code in [200, 404]
def test_create_webhook_invalid_url(self, client, auth_headers):
"""Test creating webhook with invalid URL."""
invalid_webhook_data = {
"name": "invalid_webhook",
"url": "not_a_valid_url",
"events": ["download_complete"]
}
response = client.post("/api/integrations/webhooks", json=invalid_webhook_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestThirdPartyIntegrations:
"""Test cases for third-party service integrations."""
def test_list_integrations_requires_auth(self, client):
"""Test that listing integrations requires authentication."""
response = client.get("/api/integrations/services")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_list_available_integrations(self, mock_user, client):
"""Test listing available third-party integrations."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/integrations/services")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "services" in data
assert isinstance(data["services"], list)
@patch('src.server.fastapi_app.get_current_user')
def test_configure_integration(self, mock_user, client):
"""Test configuring third-party integration."""
mock_user.return_value = {"user_id": "test_user"}
service_name = "discord"
config_data = {
"webhook_url": "https://discord.com/api/webhooks/...",
"notifications": ["download_complete", "series_added"],
"enabled": True
}
response = client.post(f"/api/integrations/services/{service_name}/configure", json=config_data)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_test_integration(self, mock_user, client):
"""Test third-party integration."""
mock_user.return_value = {"user_id": "test_user"}
service_name = "discord"
test_data = {
"message": "Test notification from AniWorld"
}
response = client.post(f"/api/integrations/services/{service_name}/test", json=test_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert "response" in data
@patch('src.server.fastapi_app.get_current_user')
def test_get_integration_status(self, mock_user, client):
"""Test getting integration status."""
mock_user.return_value = {"user_id": "test_user"}
service_name = "discord"
response = client.get(f"/api/integrations/services/{service_name}/status")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "service" in data
assert "status" in data
assert "last_tested" in data
@patch('src.server.fastapi_app.get_current_user')
def test_disable_integration(self, mock_user, client):
"""Test disabling integration."""
mock_user.return_value = {"user_id": "test_user"}
service_name = "discord"
response = client.post(f"/api/integrations/services/{service_name}/disable")
assert response.status_code in [200, 404]
class TestIntegrationEvents:
"""Test cases for integration event handling."""
@patch('src.server.fastapi_app.get_current_user')
def test_list_integration_events(self, mock_user, client):
"""Test listing integration events."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/integrations/events")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "events" in data
assert isinstance(data["events"], list)
@patch('src.server.fastapi_app.get_current_user')
def test_trigger_test_event(self, mock_user, client):
"""Test triggering test integration event."""
mock_user.return_value = {"user_id": "test_user"}
event_data = {
"event_type": "download_complete",
"payload": {
"anime_id": "test_anime",
"episode_count": 12,
"download_time": "2023-01-01T12:00:00Z"
}
}
response = client.post("/api/integrations/events/trigger", json=event_data)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_get_event_history(self, mock_user, client):
"""Test getting integration event history."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/integrations/events/history")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "events" in data
assert "pagination" in data
class TestIntegrationSecurity:
"""Test cases for integration security features."""
@patch('src.server.fastapi_app.get_current_user')
def test_api_key_validation(self, mock_user, client):
"""Test API key validation."""
mock_user.return_value = {"user_id": "test_user"}
# Test with valid API key format
validation_data = {
"api_key": "ak_test_" + str(uuid.uuid4()).replace("-", "")
}
response = client.post("/api/integrations/validate-key", json=validation_data)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_webhook_signature_validation(self, mock_user, client):
"""Test webhook signature validation."""
mock_user.return_value = {"user_id": "test_user"}
signature_data = {
"payload": {"test": "data"},
"signature": "sha256=test_signature",
"secret": "webhook_secret"
}
response = client.post("/api/integrations/validate-signature", json=signature_data)
assert response.status_code in [200, 404]
def test_integration_rate_limiting(self, client, auth_headers):
"""Test rate limiting for integration endpoints."""
# Make multiple rapid requests to test rate limiting
for i in range(10):
response = client.get("/api/integrations/api-keys", headers=auth_headers)
# Should either work or be rate limited
assert response.status_code in [200, 404, 429]
class TestIntegrationErrorHandling:
"""Test cases for integration error handling."""
def test_invalid_service_name(self, client, auth_headers):
"""Test handling of invalid service names."""
response = client.get("/api/integrations/services/invalid_service/status", headers=auth_headers)
assert response.status_code in [400, 404]
def test_malformed_webhook_payload(self, client, auth_headers):
"""Test handling of malformed webhook payloads."""
malformed_data = {
"url": "https://example.com",
"events": "not_a_list" # Should be a list
}
response = client.post("/api/integrations/webhooks", json=malformed_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
@patch('src.server.fastapi_app.get_current_user')
def test_integration_service_unavailable(self, mock_user, client):
"""Test handling when integration service is unavailable."""
mock_user.return_value = {"user_id": "test_user"}
# This would test actual service connectivity in real implementation
response = client.post("/api/integrations/services/discord/test", json={"message": "test"})
assert response.status_code in [200, 404, 503]
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,522 +0,0 @@
"""
Integration tests for miscellaneous components.
Tests configuration system integration, error handling pipelines,
and modular architecture component interactions.
"""
import json
import os
import sys
import tempfile
from pathlib import Path
from unittest.mock import Mock
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
@pytest.mark.integration
class TestConfigurationIntegration:
"""Test configuration system integration."""
def test_config_loading_chain(self):
"""Test complete configuration loading chain."""
# Create temporary config files
with tempfile.TemporaryDirectory() as temp_dir:
# Create default config
default_config = {
"anime_directory": "/default/path",
"log_level": "INFO",
"provider_timeout": 30
}
# Create user config that overrides some values
user_config = {
"anime_directory": "/user/path",
"log_level": "DEBUG"
}
default_file = Path(temp_dir) / "default.json"
user_file = Path(temp_dir) / "user.json"
with open(default_file, 'w') as f:
json.dump(default_config, f)
with open(user_file, 'w') as f:
json.dump(user_config, f)
# Mock configuration loader
def load_configuration(default_path, user_path):
"""Load configuration with precedence."""
config = {}
# Load default config
if os.path.exists(default_path):
with open(default_path, 'r') as f:
config.update(json.load(f))
# Load user config (overrides defaults)
if os.path.exists(user_path):
with open(user_path, 'r') as f:
config.update(json.load(f))
return config
# Test configuration loading
config = load_configuration(str(default_file), str(user_file))
# Verify precedence
assert config["anime_directory"] == "/user/path" # User override
assert config["log_level"] == "DEBUG" # User override
assert config["provider_timeout"] == 30 # Default value
def test_config_validation_integration(self):
"""Test configuration validation integration."""
def validate_config(config):
"""Validate configuration values."""
errors = []
# Validate required fields
required_fields = ["anime_directory", "log_level"]
for field in required_fields:
if field not in config:
errors.append(f"Missing required field: {field}")
# Validate specific values
if "log_level" in config:
valid_levels = ["DEBUG", "INFO", "WARNING", "ERROR", "FATAL"]
if config["log_level"] not in valid_levels:
errors.append(f"Invalid log level: {config['log_level']}")
if "provider_timeout" in config:
if config["provider_timeout"] <= 0:
errors.append("Provider timeout must be positive")
return errors
# Test valid configuration
valid_config = {
"anime_directory": "/valid/path",
"log_level": "INFO",
"provider_timeout": 30
}
errors = validate_config(valid_config)
assert len(errors) == 0
# Test invalid configuration
invalid_config = {
"log_level": "INVALID",
"provider_timeout": -5
}
errors = validate_config(invalid_config)
assert len(errors) == 3 # Missing anime_directory, invalid log level, negative timeout
assert "Missing required field: anime_directory" in errors
assert "Invalid log level: INVALID" in errors
assert "Provider timeout must be positive" in errors
def test_config_change_propagation(self):
"""Test configuration change propagation to components."""
class ConfigurableComponent:
def __init__(self, config_manager):
self.config_manager = config_manager
self.current_config = {}
self.config_manager.add_observer(self.on_config_change)
def on_config_change(self, key, old_value, new_value):
self.current_config[key] = new_value
# React to specific config changes
if key == "log_level":
self.update_log_level(new_value)
elif key == "provider_timeout":
self.update_timeout(new_value)
def update_log_level(self, level):
self.log_level_changed = level
def update_timeout(self, timeout):
self.timeout_changed = timeout
# Mock config manager
class ConfigManager:
def __init__(self):
self.config = {}
self.observers = []
def add_observer(self, observer):
self.observers.append(observer)
def set(self, key, value):
old_value = self.config.get(key)
self.config[key] = value
for observer in self.observers:
observer(key, old_value, value)
# Test configuration change propagation
config_manager = ConfigManager()
component = ConfigurableComponent(config_manager)
# Change configuration
config_manager.set("log_level", "DEBUG")
config_manager.set("provider_timeout", 60)
# Verify changes propagated
assert component.current_config["log_level"] == "DEBUG"
assert component.current_config["provider_timeout"] == 60
assert component.log_level_changed == "DEBUG"
assert component.timeout_changed == 60
@pytest.mark.integration
class TestErrorHandlingIntegration:
"""Test error handling system integration."""
def test_error_propagation_chain(self):
"""Test error propagation through component layers."""
class DataLayer:
def fetch_data(self, raise_error=False):
if raise_error:
raise ConnectionError("Database connection failed")
return {"data": "test"}
class ServiceLayer:
def __init__(self, data_layer, error_handler):
self.data_layer = data_layer
self.error_handler = error_handler
def get_data(self, raise_error=False):
try:
return self.data_layer.fetch_data(raise_error)
except Exception as e:
return self.error_handler.handle_error(e, context="service_layer")
class ApiLayer:
def __init__(self, service_layer, error_handler):
self.service_layer = service_layer
self.error_handler = error_handler
def api_get_data(self, raise_error=False):
try:
result = self.service_layer.get_data(raise_error)
if result.get("error"):
return {"success": False, "error": result["error"]}
return {"success": True, "data": result}
except Exception as e:
error_response = self.error_handler.handle_error(e, context="api_layer")
return {"success": False, "error": error_response["error"]}
# Mock error handler
class ErrorHandler:
def __init__(self):
self.handled_errors = []
def handle_error(self, error, context=None):
error_info = {
"error_type": type(error).__name__,
"error": str(error),
"context": context,
"handled": True
}
self.handled_errors.append(error_info)
return error_info
# Set up components
error_handler = ErrorHandler()
data_layer = DataLayer()
service_layer = ServiceLayer(data_layer, error_handler)
api_layer = ApiLayer(service_layer, error_handler)
# Test successful execution
result = api_layer.api_get_data(raise_error=False)
assert result["success"] is True
assert result["data"]["data"] == "test"
# Test error propagation
result = api_layer.api_get_data(raise_error=True)
assert result["success"] is False
assert "Database connection failed" in result["error"]
# Verify error was handled at service layer
assert len(error_handler.handled_errors) == 1
assert error_handler.handled_errors[0]["context"] == "service_layer"
assert error_handler.handled_errors[0]["error_type"] == "ConnectionError"
def test_error_recovery_integration(self):
"""Test error recovery integration across components."""
class RetryableService:
def __init__(self, max_retries=3):
self.max_retries = max_retries
self.attempt_count = 0
def unreliable_operation(self):
self.attempt_count += 1
if self.attempt_count < 3:
raise ConnectionError(f"Attempt {self.attempt_count} failed")
return f"Success on attempt {self.attempt_count}"
def execute_with_retry(service, operation_name, max_retries=3):
"""Execute operation with retry logic."""
last_error = None
for attempt in range(max_retries):
try:
operation = getattr(service, operation_name)
return operation()
except Exception as e:
last_error = e
if attempt == max_retries - 1:
raise e
raise last_error
# Test successful retry
service = RetryableService()
result = execute_with_retry(service, "unreliable_operation")
assert "Success on attempt 3" in result
# Test failure after max retries
service = RetryableService(max_retries=10) # Will fail more than 3 times
with pytest.raises(ConnectionError):
execute_with_retry(service, "unreliable_operation", max_retries=2)
@pytest.mark.integration
class TestModularArchitectureIntegration:
"""Test modular architecture integration."""
def test_provider_system_integration(self):
"""Test complete provider system integration."""
# Mock provider implementations
class BaseProvider:
def search(self, query):
raise NotImplementedError
class AniworldProvider(BaseProvider):
def search(self, query):
return [{"title": f"Aniworld: {query}", "source": "aniworld"}]
class BackupProvider(BaseProvider):
def search(self, query):
return [{"title": f"Backup: {query}", "source": "backup"}]
# Provider factory
class ProviderFactory:
def __init__(self):
self.providers = {}
def register(self, name, provider_class):
self.providers[name] = provider_class
def create(self, name):
if name not in self.providers:
raise ValueError(f"Provider {name} not found")
return self.providers[name]()
# Provider service with fallback
class ProviderService:
def __init__(self, factory, primary_provider, fallback_providers=None):
self.factory = factory
self.primary_provider = primary_provider
self.fallback_providers = fallback_providers or []
def search(self, query):
# Try primary provider
try:
provider = self.factory.create(self.primary_provider)
return provider.search(query)
except Exception:
# Try fallback providers
for fallback_name in self.fallback_providers:
try:
provider = self.factory.create(fallback_name)
return provider.search(query)
except Exception:
continue
raise Exception("All providers failed")
# Set up provider system
factory = ProviderFactory()
factory.register("aniworld", AniworldProvider)
factory.register("backup", BackupProvider)
service = ProviderService(
factory,
primary_provider="aniworld",
fallback_providers=["backup"]
)
# Test primary provider success
results = service.search("test anime")
assert len(results) == 1
assert results[0]["source"] == "aniworld"
# Test fallback when primary fails
factory.register("failing", lambda: None) # Will fail on search
service_with_failing_primary = ProviderService(
factory,
primary_provider="failing",
fallback_providers=["backup"]
)
results = service_with_failing_primary.search("test anime")
assert len(results) == 1
assert results[0]["source"] == "backup"
def test_repository_service_integration(self):
"""Test repository and service layer integration."""
# Mock repository
class AnimeRepository:
def __init__(self):
self.data = {}
self.next_id = 1
def save(self, anime):
anime_id = self.next_id
self.next_id += 1
anime_data = {**anime, "id": anime_id}
self.data[anime_id] = anime_data
return anime_data
def find_by_id(self, anime_id):
return self.data.get(anime_id)
def find_all(self):
return list(self.data.values())
def find_by_title(self, title):
return [anime for anime in self.data.values() if title.lower() in anime["title"].lower()]
# Service layer
class AnimeService:
def __init__(self, repository, provider_service):
self.repository = repository
self.provider_service = provider_service
def search_and_cache(self, query):
# Check cache first
cached = self.repository.find_by_title(query)
if cached:
return {"source": "cache", "results": cached}
# Search using provider
results = self.provider_service.search(query)
# Cache results
cached_results = []
for result in results:
saved = self.repository.save(result)
cached_results.append(saved)
return {"source": "provider", "results": cached_results}
# Mock provider service
mock_provider = Mock()
mock_provider.search.return_value = [
{"title": "Test Anime", "genre": "Action"}
]
# Set up service
repository = AnimeRepository()
service = AnimeService(repository, mock_provider)
# First search should use provider
result1 = service.search_and_cache("Test")
assert result1["source"] == "provider"
assert len(result1["results"]) == 1
assert result1["results"][0]["id"] == 1
# Second search should use cache
result2 = service.search_and_cache("Test")
assert result2["source"] == "cache"
assert len(result2["results"]) == 1
assert result2["results"][0]["id"] == 1
# Verify provider was only called once
mock_provider.search.assert_called_once_with("Test")
def test_event_driven_integration(self):
"""Test event-driven component integration."""
# Event bus
class EventBus:
def __init__(self):
self.subscribers = {}
def subscribe(self, event_type, handler):
if event_type not in self.subscribers:
self.subscribers[event_type] = []
self.subscribers[event_type].append(handler)
def publish(self, event_type, data):
if event_type in self.subscribers:
for handler in self.subscribers[event_type]:
handler(data)
# Components that publish/subscribe to events
class DownloadService:
def __init__(self, event_bus):
self.event_bus = event_bus
def download_anime(self, anime_id):
# Simulate download
self.event_bus.publish("download_started", {"anime_id": anime_id})
# Simulate completion
self.event_bus.publish("download_completed", {
"anime_id": anime_id,
"status": "success"
})
class NotificationService:
def __init__(self, event_bus):
self.event_bus = event_bus
self.notifications = []
# Subscribe to events
self.event_bus.subscribe("download_started", self.on_download_started)
self.event_bus.subscribe("download_completed", self.on_download_completed)
def on_download_started(self, data):
self.notifications.append(f"Download started for anime {data['anime_id']}")
def on_download_completed(self, data):
self.notifications.append(f"Download completed for anime {data['anime_id']}")
class StatisticsService:
def __init__(self, event_bus):
self.event_bus = event_bus
self.download_count = 0
self.completed_count = 0
# Subscribe to events
self.event_bus.subscribe("download_started", self.on_download_started)
self.event_bus.subscribe("download_completed", self.on_download_completed)
def on_download_started(self, data):
self.download_count += 1
def on_download_completed(self, data):
self.completed_count += 1
# Set up event-driven system
event_bus = EventBus()
download_service = DownloadService(event_bus)
notification_service = NotificationService(event_bus)
stats_service = StatisticsService(event_bus)
# Trigger download
download_service.download_anime(123)
# Verify events were handled
assert len(notification_service.notifications) == 2
assert "Download started for anime 123" in notification_service.notifications
assert "Download completed for anime 123" in notification_service.notifications
assert stats_service.download_count == 1
assert stats_service.completed_count == 1

View File

@ -1,332 +0,0 @@
"""
Integration tests for performance optimization API endpoints.
This module tests the performance-related endpoints for speed limiting, cache management,
memory management, and download task handling.
"""
import time
from unittest.mock import Mock, patch
import pytest
from fastapi.testclient import TestClient
from src.server.fastapi_app import app
@pytest.fixture
def client():
"""Create a test client for the FastAPI application."""
return TestClient(app)
@pytest.fixture
def auth_headers(client):
"""Provide authentication headers for protected endpoints."""
# Login to get token
login_data = {"password": "testpassword"}
with patch('src.server.fastapi_app.settings.master_password_hash') as mock_hash:
mock_hash.return_value = "5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8" # 'password' hash
response = client.post("/auth/login", json=login_data)
if response.status_code == 200:
token = response.json()["access_token"]
return {"Authorization": f"Bearer {token}"}
return {}
class TestSpeedLimitEndpoint:
"""Test cases for /api/performance/speed-limit endpoint."""
def test_get_speed_limit_requires_auth(self, client):
"""Test that getting speed limit requires authentication."""
response = client.get("/api/performance/speed-limit")
assert response.status_code == 401
def test_set_speed_limit_requires_auth(self, client):
"""Test that setting speed limit requires authentication."""
response = client.post("/api/performance/speed-limit", json={"limit_mbps": 10})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_current_speed_limit(self, mock_user, client):
"""Test getting current speed limit."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/performance/speed-limit")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "limit_mbps" in data
assert "current_usage_mbps" in data
@patch('src.server.fastapi_app.get_current_user')
def test_set_speed_limit_valid(self, mock_user, client):
"""Test setting valid speed limit."""
mock_user.return_value = {"user_id": "test_user"}
limit_data = {"limit_mbps": 50}
response = client.post("/api/performance/speed-limit", json=limit_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
def test_set_speed_limit_invalid(self, client, auth_headers):
"""Test setting invalid speed limit."""
invalid_limits = [
{"limit_mbps": -1}, # Negative
{"limit_mbps": 0}, # Zero
{"limit_mbps": "invalid"}, # Non-numeric
]
for limit_data in invalid_limits:
response = client.post("/api/performance/speed-limit", json=limit_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestCacheStatsEndpoint:
"""Test cases for /api/performance/cache/stats endpoint."""
def test_cache_stats_requires_auth(self, client):
"""Test that cache stats requires authentication."""
response = client.get("/api/performance/cache/stats")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_cache_stats(self, mock_user, client):
"""Test getting cache statistics."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/performance/cache/stats")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = ["hit_rate", "miss_rate", "size_bytes", "entries_count", "evictions"]
for field in expected_fields:
assert field in data
@patch('src.server.fastapi_app.get_current_user')
def test_clear_cache(self, mock_user, client):
"""Test clearing cache."""
mock_user.return_value = {"user_id": "test_user"}
response = client.delete("/api/performance/cache/stats")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
class TestMemoryStatsEndpoint:
"""Test cases for /api/performance/memory/stats endpoint."""
def test_memory_stats_requires_auth(self, client):
"""Test that memory stats requires authentication."""
response = client.get("/api/performance/memory/stats")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_memory_stats(self, mock_user, client):
"""Test getting memory statistics."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/performance/memory/stats")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = ["used_bytes", "available_bytes", "percent_used", "process_memory"]
for field in expected_fields:
assert field in data
class TestMemoryGCEndpoint:
"""Test cases for /api/performance/memory/gc endpoint."""
def test_memory_gc_requires_auth(self, client):
"""Test that memory garbage collection requires authentication."""
response = client.post("/api/performance/memory/gc")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_trigger_garbage_collection(self, mock_user, client):
"""Test triggering garbage collection."""
mock_user.return_value = {"user_id": "test_user"}
response = client.post("/api/performance/memory/gc")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "collected_objects" in data
assert "memory_freed_bytes" in data
class TestDownloadTasksEndpoint:
"""Test cases for /api/performance/downloads/tasks endpoint."""
def test_download_tasks_requires_auth(self, client):
"""Test that download tasks requires authentication."""
response = client.get("/api/performance/downloads/tasks")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_download_tasks(self, mock_user, client):
"""Test getting download tasks."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/performance/downloads/tasks")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "tasks" in data
assert isinstance(data["tasks"], list)
@patch('src.server.fastapi_app.get_current_user')
def test_get_download_tasks_with_status_filter(self, mock_user, client):
"""Test getting download tasks with status filter."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/performance/downloads/tasks?status=active")
assert response.status_code in [200, 404]
response = client.get("/api/performance/downloads/tasks?status=completed")
assert response.status_code in [200, 404]
class TestAddDownloadTaskEndpoint:
"""Test cases for /api/performance/downloads/add-task endpoint."""
def test_add_download_task_requires_auth(self, client):
"""Test that adding download task requires authentication."""
response = client.post("/api/performance/downloads/add-task", json={"anime_id": "test"})
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_add_download_task_valid(self, mock_user, client):
"""Test adding valid download task."""
mock_user.return_value = {"user_id": "test_user"}
task_data = {
"anime_id": "anime123",
"episode_range": {"start": 1, "end": 12},
"quality": "1080p",
"priority": "normal"
}
response = client.post("/api/performance/downloads/add-task", json=task_data)
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "task_id" in data
assert "status" in data
def test_add_download_task_invalid(self, client, auth_headers):
"""Test adding invalid download task."""
invalid_tasks = [
{}, # Empty data
{"anime_id": ""}, # Empty anime_id
{"anime_id": "test", "episode_range": {"start": 5, "end": 2}}, # Invalid range
]
for task_data in invalid_tasks:
response = client.post("/api/performance/downloads/add-task", json=task_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestResumeTasksEndpoint:
"""Test cases for /api/performance/resume/tasks endpoint."""
def test_resume_tasks_requires_auth(self, client):
"""Test that resuming tasks requires authentication."""
response = client.post("/api/performance/resume/tasks")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_resume_all_tasks(self, mock_user, client):
"""Test resuming all paused tasks."""
mock_user.return_value = {"user_id": "test_user"}
response = client.post("/api/performance/resume/tasks")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "resumed_count" in data
@patch('src.server.fastapi_app.get_current_user')
def test_resume_specific_task(self, mock_user, client):
"""Test resuming specific task."""
mock_user.return_value = {"user_id": "test_user"}
task_data = {"task_id": "task123"}
response = client.post("/api/performance/resume/tasks", json=task_data)
assert response.status_code in [200, 404]
class TestPerformanceEndpointsIntegration:
"""Integration tests for performance endpoints."""
@patch('src.server.fastapi_app.get_current_user')
def test_performance_workflow(self, mock_user, client):
"""Test typical performance monitoring workflow."""
mock_user.return_value = {"user_id": "test_user"}
# 1. Check current memory stats
response = client.get("/api/performance/memory/stats")
assert response.status_code in [200, 404]
# 2. Check cache stats
response = client.get("/api/performance/cache/stats")
assert response.status_code in [200, 404]
# 3. Check download tasks
response = client.get("/api/performance/downloads/tasks")
assert response.status_code in [200, 404]
# 4. If needed, trigger garbage collection
response = client.post("/api/performance/memory/gc")
assert response.status_code in [200, 404]
def test_performance_endpoints_error_handling(self, client, auth_headers):
"""Test error handling across performance endpoints."""
# Test various endpoints with malformed requests
endpoints_methods = [
("GET", "/api/performance/memory/stats"),
("GET", "/api/performance/cache/stats"),
("GET", "/api/performance/downloads/tasks"),
("POST", "/api/performance/memory/gc"),
("POST", "/api/performance/resume/tasks"),
]
for method, endpoint in endpoints_methods:
if method == "GET":
response = client.get(endpoint, headers=auth_headers)
else:
response = client.post(endpoint, headers=auth_headers)
# Should either work (200) or not be implemented yet (404)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_concurrent_performance_requests(self, mock_user, client):
"""Test handling of concurrent performance requests."""
mock_user.return_value = {"user_id": "test_user"}
# This would test actual concurrency in a real implementation
# For now, just verify endpoints are accessible
response = client.get("/api/performance/memory/stats")
assert response.status_code in [200, 404]
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,514 +0,0 @@
"""
Integration tests for user preferences and UI settings API endpoints.
This module tests the user preferences endpoints for theme management, language selection,
accessibility settings, keyboard shortcuts, and UI density configurations.
"""
from unittest.mock import patch
import pytest
from fastapi.testclient import TestClient
from src.server.fastapi_app import app
@pytest.fixture
def client():
"""Create a test client for the FastAPI application."""
return TestClient(app)
@pytest.fixture
def auth_headers(client):
"""Provide authentication headers for protected endpoints."""
# Login to get token
login_data = {"password": "testpassword"}
with patch('src.server.fastapi_app.settings.master_password_hash') as mock_hash:
mock_hash.return_value = "5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8" # 'password' hash
response = client.post("/auth/login", json=login_data)
if response.status_code == 200:
token = response.json()["access_token"]
return {"Authorization": f"Bearer {token}"}
return {}
class TestThemeManagement:
"""Test cases for theme management endpoints."""
def test_get_themes_requires_auth(self, client):
"""Test that getting themes requires authentication."""
response = client.get("/api/preferences/themes")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_available_themes(self, mock_user, client):
"""Test getting available themes."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/themes")
# Expected 404 since endpoint not implemented yet
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "themes" in data
assert isinstance(data["themes"], list)
# Should include at least light and dark themes
theme_names = [theme["name"] for theme in data["themes"]]
assert "light" in theme_names or "dark" in theme_names
@patch('src.server.fastapi_app.get_current_user')
def test_get_current_theme(self, mock_user, client):
"""Test getting current theme."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/themes/current")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "theme" in data
assert "name" in data["theme"]
assert "colors" in data["theme"]
@patch('src.server.fastapi_app.get_current_user')
def test_set_theme(self, mock_user, client):
"""Test setting user theme."""
mock_user.return_value = {"user_id": "test_user"}
theme_data = {
"theme_name": "dark",
"custom_colors": {
"primary": "#007acc",
"secondary": "#6c757d",
"background": "#1a1a1a"
}
}
response = client.post("/api/preferences/themes/set", json=theme_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert data["status"] == "success"
@patch('src.server.fastapi_app.get_current_user')
def test_create_custom_theme(self, mock_user, client):
"""Test creating custom theme."""
mock_user.return_value = {"user_id": "test_user"}
custom_theme = {
"name": "my_custom_theme",
"display_name": "My Custom Theme",
"colors": {
"primary": "#ff6b6b",
"secondary": "#4ecdc4",
"background": "#2c3e50",
"text": "#ecf0f1",
"accent": "#e74c3c"
},
"is_dark": True
}
response = client.post("/api/preferences/themes/custom", json=custom_theme)
assert response.status_code in [201, 404]
if response.status_code == 201:
data = response.json()
assert "theme_id" in data
assert "name" in data
def test_set_invalid_theme(self, client, auth_headers):
"""Test setting invalid theme."""
invalid_data = {"theme_name": "nonexistent_theme"}
response = client.post("/api/preferences/themes/set", json=invalid_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestLanguageSelection:
"""Test cases for language selection endpoints."""
def test_get_languages_requires_auth(self, client):
"""Test that getting languages requires authentication."""
response = client.get("/api/preferences/languages")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_available_languages(self, mock_user, client):
"""Test getting available languages."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/languages")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "languages" in data
assert isinstance(data["languages"], list)
# Should include at least English
language_codes = [lang["code"] for lang in data["languages"]]
assert "en" in language_codes
@patch('src.server.fastapi_app.get_current_user')
def test_get_current_language(self, mock_user, client):
"""Test getting current language."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/languages/current")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "language" in data
assert "code" in data["language"]
assert "name" in data["language"]
@patch('src.server.fastapi_app.get_current_user')
def test_set_language(self, mock_user, client):
"""Test setting user language."""
mock_user.return_value = {"user_id": "test_user"}
language_data = {"language_code": "de"}
response = client.post("/api/preferences/languages/set", json=language_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert "language" in data
def test_set_invalid_language(self, client, auth_headers):
"""Test setting invalid language."""
invalid_data = {"language_code": "invalid_lang"}
response = client.post("/api/preferences/languages/set", json=invalid_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestAccessibilitySettings:
"""Test cases for accessibility settings endpoints."""
def test_get_accessibility_requires_auth(self, client):
"""Test that getting accessibility settings requires authentication."""
response = client.get("/api/preferences/accessibility")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_accessibility_settings(self, mock_user, client):
"""Test getting accessibility settings."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/accessibility")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = [
"high_contrast", "large_text", "reduced_motion",
"screen_reader_support", "keyboard_navigation"
]
for field in expected_fields:
assert field in data
@patch('src.server.fastapi_app.get_current_user')
def test_update_accessibility_settings(self, mock_user, client):
"""Test updating accessibility settings."""
mock_user.return_value = {"user_id": "test_user"}
accessibility_data = {
"high_contrast": True,
"large_text": True,
"reduced_motion": False,
"screen_reader_support": True,
"keyboard_navigation": True,
"font_size_multiplier": 1.2
}
response = client.put("/api/preferences/accessibility", json=accessibility_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert "updated_settings" in data
@patch('src.server.fastapi_app.get_current_user')
def test_reset_accessibility_settings(self, mock_user, client):
"""Test resetting accessibility settings to defaults."""
mock_user.return_value = {"user_id": "test_user"}
response = client.post("/api/preferences/accessibility/reset")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert data["status"] == "reset"
class TestKeyboardShortcuts:
"""Test cases for keyboard shortcuts endpoints."""
def test_get_shortcuts_requires_auth(self, client):
"""Test that getting shortcuts requires authentication."""
response = client.get("/api/preferences/shortcuts")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_keyboard_shortcuts(self, mock_user, client):
"""Test getting keyboard shortcuts."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/shortcuts")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "shortcuts" in data
assert isinstance(data["shortcuts"], dict)
@patch('src.server.fastapi_app.get_current_user')
def test_update_keyboard_shortcut(self, mock_user, client):
"""Test updating keyboard shortcut."""
mock_user.return_value = {"user_id": "test_user"}
shortcut_data = {
"action": "search",
"shortcut": "Ctrl+K",
"description": "Open search"
}
response = client.put("/api/preferences/shortcuts", json=shortcut_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert "shortcut" in data
@patch('src.server.fastapi_app.get_current_user')
def test_reset_shortcuts_to_default(self, mock_user, client):
"""Test resetting shortcuts to default."""
mock_user.return_value = {"user_id": "test_user"}
response = client.post("/api/preferences/shortcuts/reset")
assert response.status_code in [200, 404]
def test_invalid_shortcut_format(self, client, auth_headers):
"""Test updating shortcut with invalid format."""
invalid_data = {
"action": "search",
"shortcut": "InvalidKey++"
}
response = client.put("/api/preferences/shortcuts", json=invalid_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestUIDensitySettings:
"""Test cases for UI density and view settings endpoints."""
def test_get_ui_settings_requires_auth(self, client):
"""Test that getting UI settings requires authentication."""
response = client.get("/api/preferences/ui")
assert response.status_code == 401
@patch('src.server.fastapi_app.get_current_user')
def test_get_ui_density_settings(self, mock_user, client):
"""Test getting UI density settings."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/ui")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_fields = [
"density", "view_mode", "grid_columns",
"show_thumbnails", "compact_mode"
]
for field in expected_fields:
assert field in data
@patch('src.server.fastapi_app.get_current_user')
def test_set_view_mode(self, mock_user, client):
"""Test setting view mode (grid/list)."""
mock_user.return_value = {"user_id": "test_user"}
view_data = {
"view_mode": "grid",
"grid_columns": 4,
"show_thumbnails": True
}
response = client.post("/api/preferences/ui/view-mode", json=view_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert "view_mode" in data
@patch('src.server.fastapi_app.get_current_user')
def test_set_ui_density(self, mock_user, client):
"""Test setting UI density."""
mock_user.return_value = {"user_id": "test_user"}
density_data = {
"density": "comfortable", # compact, comfortable, spacious
"compact_mode": False
}
response = client.post("/api/preferences/ui/density", json=density_data)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_update_grid_settings(self, mock_user, client):
"""Test updating grid view settings."""
mock_user.return_value = {"user_id": "test_user"}
grid_data = {
"columns": 6,
"thumbnail_size": "medium",
"show_titles": True,
"show_episode_count": True
}
response = client.put("/api/preferences/ui/grid", json=grid_data)
assert response.status_code in [200, 404]
def test_invalid_view_mode(self, client, auth_headers):
"""Test setting invalid view mode."""
invalid_data = {"view_mode": "invalid_mode"}
response = client.post("/api/preferences/ui/view-mode", json=invalid_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
class TestPreferencesIntegration:
"""Integration tests for preferences functionality."""
@patch('src.server.fastapi_app.get_current_user')
def test_get_all_preferences(self, mock_user, client):
"""Test getting all user preferences."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
expected_sections = [
"theme", "language", "accessibility",
"shortcuts", "ui_settings"
]
for section in expected_sections:
assert section in data
@patch('src.server.fastapi_app.get_current_user')
def test_bulk_update_preferences(self, mock_user, client):
"""Test bulk updating multiple preferences."""
mock_user.return_value = {"user_id": "test_user"}
bulk_data = {
"theme": {"name": "dark"},
"language": {"code": "en"},
"accessibility": {"high_contrast": True},
"ui_settings": {"view_mode": "list", "density": "compact"}
}
response = client.put("/api/preferences", json=bulk_data)
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert "updated_sections" in data
@patch('src.server.fastapi_app.get_current_user')
def test_export_preferences(self, mock_user, client):
"""Test exporting user preferences."""
mock_user.return_value = {"user_id": "test_user"}
response = client.get("/api/preferences/export")
assert response.status_code in [200, 404]
if response.status_code == 200:
# Should return JSON or file download
assert response.headers.get("content-type") in [
"application/json",
"application/octet-stream"
]
@patch('src.server.fastapi_app.get_current_user')
def test_import_preferences(self, mock_user, client):
"""Test importing user preferences."""
mock_user.return_value = {"user_id": "test_user"}
import_data = {
"theme": {"name": "light"},
"language": {"code": "de"},
"ui_settings": {"view_mode": "grid"}
}
response = client.post("/api/preferences/import", json=import_data)
assert response.status_code in [200, 404]
@patch('src.server.fastapi_app.get_current_user')
def test_reset_all_preferences(self, mock_user, client):
"""Test resetting all preferences to defaults."""
mock_user.return_value = {"user_id": "test_user"}
response = client.post("/api/preferences/reset")
assert response.status_code in [200, 404]
if response.status_code == 200:
data = response.json()
assert "status" in data
assert data["status"] == "reset"
class TestPreferencesValidation:
"""Test cases for preferences validation."""
def test_theme_validation(self, client, auth_headers):
"""Test theme data validation."""
invalid_theme_data = {
"colors": {
"primary": "not_a_color", # Invalid color format
"background": "#xyz" # Invalid hex color
}
}
response = client.post("/api/preferences/themes/custom", json=invalid_theme_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
def test_accessibility_validation(self, client, auth_headers):
"""Test accessibility settings validation."""
invalid_accessibility_data = {
"font_size_multiplier": -1, # Invalid value
"high_contrast": "not_boolean" # Invalid type
}
response = client.put("/api/preferences/accessibility", json=invalid_accessibility_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
def test_ui_settings_validation(self, client, auth_headers):
"""Test UI settings validation."""
invalid_ui_data = {
"grid_columns": 0, # Invalid value
"density": "invalid_density" # Invalid enum value
}
response = client.post("/api/preferences/ui/density", json=invalid_ui_data, headers=auth_headers)
assert response.status_code in [400, 404, 422]
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,3 +0,0 @@
from src.server.web.middleware.fastapi_auth_middleware_new import AuthMiddleware
print("Success importing AuthMiddleware")

View File

@ -1,378 +0,0 @@
"""
Test application flow and setup functionality.
Tests for the application flow enforcement: setup auth main application.
"""
import json
import os
# Add parent directories to path for imports
import sys
from pathlib import Path
from unittest.mock import MagicMock, patch
import pytest
from fastapi.testclient import TestClient
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '../..'))
from src.server.fastapi_app import app
from src.server.services.setup_service import SetupService
class TestApplicationFlow:
"""Test cases for application flow enforcement."""
def setup_method(self):
"""Set up test environment before each test."""
self.client = TestClient(app, follow_redirects=False)
self.test_config_path = "test_config.json"
self.test_db_path = "test_db.db"
def teardown_method(self):
"""Clean up after each test."""
# Remove test files
for path in [self.test_config_path, self.test_db_path]:
if os.path.exists(path):
os.unlink(path)
def test_setup_page_displayed_when_configuration_missing(self):
"""Test that setup page is displayed when configuration is missing."""
with patch.object(SetupService, 'is_setup_complete', return_value=False):
response = self.client.get("/")
assert response.status_code == 302
assert response.headers["location"] == "/setup"
def test_setup_page_form_submission_creates_valid_configuration(self):
"""Test that setup page form submission creates valid configuration."""
setup_data = {
"password": "test_password_123",
"directory": "/test/anime/directory"
}
with patch.object(SetupService, 'is_setup_complete', return_value=False), \
patch.object(SetupService, 'mark_setup_complete', return_value=True), \
patch('pathlib.Path.mkdir'), \
patch('pathlib.Path.is_absolute', return_value=True):
response = self.client.post("/api/auth/setup", json=setup_data)
assert response.status_code == 200
data = response.json()
assert data["status"] == "success"
assert data["message"] == "Setup completed successfully"
assert data["redirect_url"] == "/login"
def test_setup_page_redirects_to_auth_after_successful_setup(self):
"""Test that setup page redirects to auth page after successful setup."""
setup_data = {
"password": "test_password_123",
"directory": "/test/anime/directory"
}
with patch.object(SetupService, 'is_setup_complete', return_value=False), \
patch.object(SetupService, 'mark_setup_complete', return_value=True), \
patch('pathlib.Path.mkdir'), \
patch('pathlib.Path.is_absolute', return_value=True):
response = self.client.post("/api/auth/setup", json=setup_data)
data = response.json()
assert data["redirect_url"] == "/login"
def test_setup_page_validation_for_required_fields(self):
"""Test that setup page validates required fields."""
# Test missing password
response = self.client.post("/api/auth/setup", json={"directory": "/test"})
assert response.status_code == 422 # Validation error
# Test missing directory
response = self.client.post("/api/auth/setup", json={"password": "test123"})
assert response.status_code == 422 # Validation error
# Test password too short
response = self.client.post("/api/auth/setup", json={
"password": "short",
"directory": "/test"
})
assert response.status_code == 422 # Validation error
def test_setup_page_handles_database_connection_errors_gracefully(self):
"""Test that setup page handles database connection errors gracefully."""
setup_data = {
"password": "test_password_123",
"directory": "/test/anime/directory"
}
with patch.object(SetupService, 'is_setup_complete', return_value=False), \
patch.object(SetupService, 'mark_setup_complete', return_value=False), \
patch('pathlib.Path.mkdir'), \
patch('pathlib.Path.is_absolute', return_value=True):
response = self.client.post("/api/auth/setup", json=setup_data)
assert response.status_code == 200
data = response.json()
assert data["status"] == "error"
assert "Failed to save configuration" in data["message"]
def test_setup_completion_flag_properly_set(self):
"""Test that setup completion flag is properly set in configuration."""
service = SetupService("test_config.json", "test_db.db")
# Create mock config data
config_data = {"test": "data"}
with patch.object(service, 'get_config', return_value=config_data), \
patch.object(service, '_save_config', return_value=True) as mock_save:
result = service.mark_setup_complete()
assert result is True
# Verify save was called with setup completion data
mock_save.assert_called_once()
saved_config = mock_save.call_args[0][0]
assert saved_config["setup"]["completed"] is True
assert "completed_at" in saved_config["setup"]
class TestAuthenticationFlow:
"""Test cases for authentication flow."""
def setup_method(self):
"""Set up test environment before each test."""
self.client = TestClient(app, follow_redirects=False)
def test_auth_page_displayed_when_token_invalid(self):
"""Test that auth page is displayed when authentication token is invalid."""
with patch.object(SetupService, 'is_setup_complete', return_value=True):
# Request with invalid token
headers = {"Authorization": "Bearer invalid_token"}
response = self.client.get("/app", headers=headers)
# Should redirect to login due to invalid token
assert response.status_code == 302
assert response.headers["location"] == "/login"
def test_auth_page_displayed_when_token_missing(self):
"""Test that auth page is displayed when authentication token is missing."""
with patch.object(SetupService, 'is_setup_complete', return_value=True):
response = self.client.get("/app")
# Should redirect to login due to missing token
assert response.status_code == 302
assert response.headers["location"] == "/login"
def test_successful_login_creates_valid_token(self):
"""Test that successful login creates a valid authentication token."""
login_data = {"password": "test_password"}
with patch('src.server.fastapi_app.verify_master_password', return_value=True):
response = self.client.post("/auth/login", json=login_data)
assert response.status_code == 200
data = response.json()
assert data["success"] is True
assert "token" in data
assert data["token"] is not None
assert "expires_at" in data
def test_failed_login_shows_error_message(self):
"""Test that failed login shows appropriate error messages."""
login_data = {"password": "wrong_password"}
with patch('src.server.fastapi_app.verify_master_password', return_value=False):
response = self.client.post("/auth/login", json=login_data)
assert response.status_code == 401
data = response.json()
assert "Invalid master password" in data["detail"]
def test_auth_page_redirects_to_main_after_authentication(self):
"""Test that auth page redirects to main application after successful authentication."""
with patch.object(SetupService, 'is_setup_complete', return_value=True):
# Simulate authenticated request
with patch('src.server.fastapi_app.verify_jwt_token') as mock_verify:
mock_verify.return_value = {"user": "master", "exp": 9999999999}
response = self.client.get("/login", headers={"Authorization": "Bearer valid_token"})
assert response.status_code == 302
assert response.headers["location"] == "/app"
def test_token_validation_middleware_correctly_identifies_tokens(self):
"""Test that token validation middleware correctly identifies valid/invalid tokens."""
# Test valid token
with patch('src.server.fastapi_app.verify_jwt_token') as mock_verify:
mock_verify.return_value = {"user": "master", "exp": 9999999999}
response = self.client.get("/auth/verify", headers={"Authorization": "Bearer valid_token"})
assert response.status_code == 200
data = response.json()
assert data["valid"] is True
assert data["user"] == "master"
# Test invalid token
with patch('src.server.fastapi_app.verify_jwt_token') as mock_verify:
mock_verify.return_value = None
response = self.client.get("/auth/verify", headers={"Authorization": "Bearer invalid_token"})
assert response.status_code == 401
def test_token_refresh_functionality(self):
"""Test token refresh functionality."""
# This would test automatic token refresh if implemented
# For now, just test that tokens have expiration
login_data = {"password": "test_password"}
with patch('src.server.fastapi_app.verify_master_password', return_value=True):
response = self.client.post("/auth/login", json=login_data)
data = response.json()
assert "expires_at" in data
assert data["expires_at"] is not None
def test_session_expiration_handling(self):
"""Test session expiration handling."""
# Test with expired token
with patch('src.server.fastapi_app.verify_jwt_token') as mock_verify:
mock_verify.return_value = None # Simulates expired token
response = self.client.get("/auth/verify", headers={"Authorization": "Bearer expired_token"})
assert response.status_code == 401
class TestMainApplicationAccess:
"""Test cases for main application access."""
def setup_method(self):
"""Set up test environment before each test."""
self.client = TestClient(app, follow_redirects=False)
def test_index_served_when_authentication_valid(self):
"""Test that index.html is served when authentication is valid."""
with patch.object(SetupService, 'is_setup_complete', return_value=True), \
patch('src.server.fastapi_app.verify_jwt_token') as mock_verify:
mock_verify.return_value = {"user": "master", "exp": 9999999999}
response = self.client.get("/app", headers={"Authorization": "Bearer valid_token"})
assert response.status_code == 200
assert "text/html" in response.headers.get("content-type", "")
def test_unauthenticated_users_redirected_to_auth(self):
"""Test that unauthenticated users are redirected to auth page."""
with patch.object(SetupService, 'is_setup_complete', return_value=True):
response = self.client.get("/app")
assert response.status_code == 302
assert response.headers["location"] == "/login"
def test_users_without_setup_redirected_to_setup(self):
"""Test that users without completed setup are redirected to setup page."""
with patch.object(SetupService, 'is_setup_complete', return_value=False):
response = self.client.get("/app")
assert response.status_code == 302
assert response.headers["location"] == "/setup"
def test_middleware_enforces_correct_flow_priority(self):
"""Test that middleware enforces correct flow priority (setup → auth → main)."""
# Test setup takes priority over auth
with patch.object(SetupService, 'is_setup_complete', return_value=False):
response = self.client.get("/app", headers={"Authorization": "Bearer valid_token"})
assert response.status_code == 302
assert response.headers["location"] == "/setup"
# Test auth required when setup complete but not authenticated
with patch.object(SetupService, 'is_setup_complete', return_value=True):
response = self.client.get("/app")
assert response.status_code == 302
assert response.headers["location"] == "/login"
def test_authenticated_user_session_persistence(self):
"""Test authenticated user session persistence."""
with patch.object(SetupService, 'is_setup_complete', return_value=True), \
patch('src.server.fastapi_app.verify_jwt_token') as mock_verify:
mock_verify.return_value = {"user": "master", "exp": 9999999999}
# Multiple requests with same token should work
headers = {"Authorization": "Bearer valid_token"}
response1 = self.client.get("/app", headers=headers)
assert response1.status_code == 200
response2 = self.client.get("/app", headers=headers)
assert response2.status_code == 200
def test_graceful_token_expiration_during_session(self):
"""Test graceful handling of token expiration during active session."""
with patch.object(SetupService, 'is_setup_complete', return_value=True), \
patch('src.server.fastapi_app.verify_jwt_token') as mock_verify:
# First request with valid token
mock_verify.return_value = {"user": "master", "exp": 9999999999}
response1 = self.client.get("/app", headers={"Authorization": "Bearer valid_token"})
assert response1.status_code == 200
# Second request with expired token
mock_verify.return_value = None
response2 = self.client.get("/app", headers={"Authorization": "Bearer expired_token"})
assert response2.status_code == 302
assert response2.headers["location"] == "/login"
class TestSetupStatusAPI:
"""Test cases for setup status API."""
def setup_method(self):
"""Set up test environment before each test."""
self.client = TestClient(app, follow_redirects=False)
def test_setup_status_api_returns_correct_status(self):
"""Test that setup status API returns correct status information."""
with patch.object(SetupService, 'is_setup_complete', return_value=True), \
patch.object(SetupService, 'get_setup_requirements') as mock_requirements, \
patch.object(SetupService, 'get_missing_requirements') as mock_missing:
mock_requirements.return_value = {
"config_file_exists": True,
"config_file_valid": True,
"database_exists": True,
"database_accessible": True,
"master_password_configured": True,
"setup_marked_complete": True
}
mock_missing.return_value = []
response = self.client.get("/api/auth/setup/status")
assert response.status_code == 200
data = response.json()
assert data["setup_complete"] is True
assert data["requirements"]["config_file_exists"] is True
assert len(data["missing_requirements"]) == 0
def test_setup_status_shows_missing_requirements(self):
"""Test that setup status shows missing requirements correctly."""
with patch.object(SetupService, 'is_setup_complete', return_value=False), \
patch.object(SetupService, 'get_setup_requirements') as mock_requirements, \
patch.object(SetupService, 'get_missing_requirements') as mock_missing:
mock_requirements.return_value = {
"config_file_exists": False,
"master_password_configured": False
}
mock_missing.return_value = [
"Configuration file is missing",
"Master password is not configured"
]
response = self.client.get("/api/auth/setup/status")
assert response.status_code == 200
data = response.json()
assert data["setup_complete"] is False
assert "Configuration file is missing" in data["missing_requirements"]
assert "Master password is not configured" in data["missing_requirements"]
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,14 +0,0 @@
$loginResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/auth/login" -Method POST -ContentType "application/json" -Body '{"password": "admin123"}'
$loginData = $loginResponse.Content | ConvertFrom-Json
$token = $loginData.token
Write-Host "Token: $token"
# Test the anime search with authentication
$headers = @{
"Authorization" = "Bearer $token"
"Content-Type" = "application/json"
}
$searchResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/api/anime/search?query=naruto" -Headers $headers
Write-Host "Search Response:"
Write-Host $searchResponse.Content

View File

@ -1,35 +0,0 @@
# Test complete authentication flow
# Step 1: Login
Write-Host "=== Testing Login ==="
$loginResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/auth/login" -Method POST -ContentType "application/json" -Body '{"password": "admin123"}'
$loginData = $loginResponse.Content | ConvertFrom-Json
$token = $loginData.token
Write-Host "Login successful. Token received: $($token.Substring(0,20))..."
# Step 2: Verify token
Write-Host "`n=== Testing Token Verification ==="
$headers = @{ "Authorization" = "Bearer $token" }
$verifyResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/auth/verify" -Headers $headers
Write-Host "Token verification response: $($verifyResponse.Content)"
# Step 3: Test protected endpoint
Write-Host "`n=== Testing Protected Endpoint ==="
$authStatusResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/api/auth/status" -Headers $headers
Write-Host "Auth status response: $($authStatusResponse.Content)"
# Step 4: Logout
Write-Host "`n=== Testing Logout ==="
$logoutResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/auth/logout" -Method POST -Headers $headers
Write-Host "Logout response: $($logoutResponse.Content)"
# Step 5: Test expired/invalid token
Write-Host "`n=== Testing Invalid Token ==="
try {
$invalidResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/auth/verify" -Headers @{ "Authorization" = "Bearer invalid_token" }
Write-Host "Invalid token response: $($invalidResponse.Content)"
} catch {
Write-Host "Invalid token correctly rejected: $($_.Exception.Message)"
}
Write-Host "`n=== Authentication Flow Test Complete ==="

View File

@ -1,17 +0,0 @@
# Test database connectivity
# Get token
$loginResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/auth/login" -Method POST -ContentType "application/json" -Body '{"password": "admin123"}'
$loginData = $loginResponse.Content | ConvertFrom-Json
$token = $loginData.token
# Test database health
$headers = @{ "Authorization" = "Bearer $token" }
$dbHealthResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/api/system/database/health" -Headers $headers
Write-Host "Database Health Response:"
Write-Host $dbHealthResponse.Content
# Test system config
$configResponse = Invoke-WebRequest -Uri "http://127.0.0.1:8000/api/system/config" -Headers $headers
Write-Host "`nSystem Config Response:"
Write-Host $configResponse.Content

View File

@ -1,15 +0,0 @@
import os
import sys
# Add parent directory to path
sys.path.insert(0, os.path.abspath('.'))
try:
from src.server.fastapi_app import app
print("✓ FastAPI app imported successfully")
except Exception as e:
print(f"✗ Error importing FastAPI app: {e}")
import traceback
traceback.print_exc()
print("Test completed.")

View File

@ -1,22 +0,0 @@
#!/usr/bin/env python3
try:
from src.server.web.middleware.fastapi_auth_middleware import AuthMiddleware
print("Auth middleware imported successfully")
except Exception as e:
print(f"Error importing auth middleware: {e}")
try:
from src.server.web.middleware.fastapi_logging_middleware import (
EnhancedLoggingMiddleware,
)
print("Logging middleware imported successfully")
except Exception as e:
print(f"Error importing logging middleware: {e}")
try:
from src.server.web.middleware.fastapi_validation_middleware import (
ValidationMiddleware,
)
print("Validation middleware imported successfully")
except Exception as e:
print(f"Error importing validation middleware: {e}")

View File

@ -1,423 +0,0 @@
"""
Unit tests for anime search and filtering logic.
Tests search algorithms, filtering functions, sorting mechanisms,
and data processing for anime and episode management.
"""
import os
import sys
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
@pytest.mark.unit
class TestAnimeSearchLogic:
"""Test anime search and filtering functionality."""
def test_basic_text_search(self):
"""Test basic text search functionality."""
def search_anime_by_title(anime_list, query):
"""Simple title search function."""
if not query:
return []
query_lower = query.lower()
return [
anime for anime in anime_list
if query_lower in anime.get("title", "").lower()
]
# Test data
anime_list = [
{"id": "1", "title": "Attack on Titan", "genre": "Action"},
{"id": "2", "title": "My Hero Academia", "genre": "Action"},
{"id": "3", "title": "Demon Slayer", "genre": "Action"},
{"id": "4", "title": "One Piece", "genre": "Adventure"}
]
# Test exact match
results = search_anime_by_title(anime_list, "Attack on Titan")
assert len(results) == 1
assert results[0]["title"] == "Attack on Titan"
# Test partial match
results = search_anime_by_title(anime_list, "attack")
assert len(results) == 1
# Test case insensitive
results = search_anime_by_title(anime_list, "ATTACK")
assert len(results) == 1
# Test multiple matches
results = search_anime_by_title(anime_list, "a")
assert len(results) >= 2 # Should match "Attack" and "Academia"
# Test no matches
results = search_anime_by_title(anime_list, "Nonexistent")
assert len(results) == 0
# Test empty query
results = search_anime_by_title(anime_list, "")
assert len(results) == 0
def test_advanced_search_with_filters(self):
"""Test advanced search with multiple filters."""
def advanced_anime_search(anime_list, query="", genre=None, year=None, status=None):
"""Advanced search with multiple filters."""
results = anime_list.copy()
# Text search
if query:
query_lower = query.lower()
results = [
anime for anime in results
if (query_lower in anime.get("title", "").lower() or
query_lower in anime.get("description", "").lower())
]
# Genre filter
if genre:
results = [
anime for anime in results
if anime.get("genre", "").lower() == genre.lower()
]
# Year filter
if year:
results = [
anime for anime in results
if anime.get("year") == year
]
# Status filter
if status:
results = [
anime for anime in results
if anime.get("status", "").lower() == status.lower()
]
return results
# Test data
anime_list = [
{
"id": "1",
"title": "Attack on Titan",
"description": "Humanity fights giants",
"genre": "Action",
"year": 2013,
"status": "Completed"
},
{
"id": "2",
"title": "My Hero Academia",
"description": "Superheroes in training",
"genre": "Action",
"year": 2016,
"status": "Ongoing"
},
{
"id": "3",
"title": "Your Name",
"description": "Body swapping romance",
"genre": "Romance",
"year": 2016,
"status": "Completed"
}
]
# Test genre filter
results = advanced_anime_search(anime_list, genre="Action")
assert len(results) == 2
# Test year filter
results = advanced_anime_search(anime_list, year=2016)
assert len(results) == 2
# Test status filter
results = advanced_anime_search(anime_list, status="Completed")
assert len(results) == 2
# Test combined filters
results = advanced_anime_search(anime_list, genre="Action", status="Ongoing")
assert len(results) == 1
assert results[0]["title"] == "My Hero Academia"
# Test text search in description
results = advanced_anime_search(anime_list, query="giants")
assert len(results) == 1
assert results[0]["title"] == "Attack on Titan"
def test_search_pagination(self):
"""Test search result pagination."""
def paginate_results(results, limit=20, offset=0):
"""Paginate search results."""
if limit <= 0:
return []
start = max(0, offset)
end = start + limit
return results[start:end]
# Test data
results = [{"id": str(i), "title": f"Anime {i}"} for i in range(100)]
# Test normal pagination
page_1 = paginate_results(results, limit=10, offset=0)
assert len(page_1) == 10
assert page_1[0]["id"] == "0"
page_2 = paginate_results(results, limit=10, offset=10)
assert len(page_2) == 10
assert page_2[0]["id"] == "10"
# Test edge cases
last_page = paginate_results(results, limit=10, offset=95)
assert len(last_page) == 5 # Only 5 items left
beyond_results = paginate_results(results, limit=10, offset=200)
assert len(beyond_results) == 0
# Test invalid parameters
invalid_limit = paginate_results(results, limit=0, offset=0)
assert len(invalid_limit) == 0
negative_offset = paginate_results(results, limit=10, offset=-5)
assert len(negative_offset) == 10 # Should start from 0
def test_search_sorting(self):
"""Test search result sorting."""
def sort_anime_results(anime_list, sort_by="title", sort_order="asc"):
"""Sort anime results by different criteria."""
if not anime_list:
return []
reverse = sort_order.lower() == "desc"
if sort_by == "title":
return sorted(anime_list, key=lambda x: x.get("title", "").lower(), reverse=reverse)
elif sort_by == "year":
return sorted(anime_list, key=lambda x: x.get("year", 0), reverse=reverse)
elif sort_by == "episodes":
return sorted(anime_list, key=lambda x: x.get("episodes", 0), reverse=reverse)
elif sort_by == "rating":
return sorted(anime_list, key=lambda x: x.get("rating", 0), reverse=reverse)
else:
return anime_list
# Test data
anime_list = [
{"title": "Zorro", "year": 2020, "episodes": 12, "rating": 8.5},
{"title": "Alpha", "year": 2018, "episodes": 24, "rating": 9.0},
{"title": "Beta", "year": 2022, "episodes": 6, "rating": 7.5}
]
# Test title sorting ascending
sorted_results = sort_anime_results(anime_list, "title", "asc")
titles = [anime["title"] for anime in sorted_results]
assert titles == ["Alpha", "Beta", "Zorro"]
# Test title sorting descending
sorted_results = sort_anime_results(anime_list, "title", "desc")
titles = [anime["title"] for anime in sorted_results]
assert titles == ["Zorro", "Beta", "Alpha"]
# Test year sorting
sorted_results = sort_anime_results(anime_list, "year", "asc")
years = [anime["year"] for anime in sorted_results]
assert years == [2018, 2020, 2022]
# Test episodes sorting
sorted_results = sort_anime_results(anime_list, "episodes", "desc")
episodes = [anime["episodes"] for anime in sorted_results]
assert episodes == [24, 12, 6]
# Test rating sorting
sorted_results = sort_anime_results(anime_list, "rating", "desc")
ratings = [anime["rating"] for anime in sorted_results]
assert ratings == [9.0, 8.5, 7.5]
@pytest.mark.unit
class TestEpisodeFilteringLogic:
"""Test episode filtering and management logic."""
def test_episode_filtering_by_status(self):
"""Test filtering episodes by watch status."""
def filter_episodes_by_status(episodes, status):
"""Filter episodes by watch status."""
if not status:
return episodes
return [ep for ep in episodes if ep.get("watch_status", "").lower() == status.lower()]
episodes = [
{"id": "1", "title": "Episode 1", "watch_status": "watched"},
{"id": "2", "title": "Episode 2", "watch_status": "unwatched"},
{"id": "3", "title": "Episode 3", "watch_status": "watching"},
{"id": "4", "title": "Episode 4", "watch_status": "watched"}
]
watched = filter_episodes_by_status(episodes, "watched")
assert len(watched) == 2
unwatched = filter_episodes_by_status(episodes, "unwatched")
assert len(unwatched) == 1
watching = filter_episodes_by_status(episodes, "watching")
assert len(watching) == 1
def test_episode_range_filtering(self):
"""Test filtering episodes by number range."""
def filter_episodes_by_range(episodes, start_ep=None, end_ep=None):
"""Filter episodes by episode number range."""
results = episodes.copy()
if start_ep is not None:
results = [ep for ep in results if ep.get("episode_number", 0) >= start_ep]
if end_ep is not None:
results = [ep for ep in results if ep.get("episode_number", 0) <= end_ep]
return results
episodes = [
{"id": "1", "episode_number": 1, "title": "Episode 1"},
{"id": "2", "episode_number": 5, "title": "Episode 5"},
{"id": "3", "episode_number": 10, "title": "Episode 10"},
{"id": "4", "episode_number": 15, "title": "Episode 15"},
{"id": "5", "episode_number": 20, "title": "Episode 20"}
]
# Test start range
results = filter_episodes_by_range(episodes, start_ep=10)
assert len(results) == 3
assert all(ep["episode_number"] >= 10 for ep in results)
# Test end range
results = filter_episodes_by_range(episodes, end_ep=10)
assert len(results) == 3
assert all(ep["episode_number"] <= 10 for ep in results)
# Test both start and end
results = filter_episodes_by_range(episodes, start_ep=5, end_ep=15)
assert len(results) == 3
assert all(5 <= ep["episode_number"] <= 15 for ep in results)
def test_missing_episodes_detection(self):
"""Test detection of missing episodes in a series."""
def find_missing_episodes(episodes, expected_total):
"""Find missing episode numbers in a series."""
episode_numbers = {ep.get("episode_number") for ep in episodes if ep.get("episode_number")}
expected_numbers = set(range(1, expected_total + 1))
missing = expected_numbers - episode_numbers
return sorted(list(missing))
# Test with some missing episodes
episodes = [
{"episode_number": 1}, {"episode_number": 3},
{"episode_number": 5}, {"episode_number": 7}
]
missing = find_missing_episodes(episodes, 10)
assert missing == [2, 4, 6, 8, 9, 10]
# Test with no missing episodes
complete_episodes = [{"episode_number": i} for i in range(1, 6)]
missing = find_missing_episodes(complete_episodes, 5)
assert missing == []
# Test with all episodes missing
missing = find_missing_episodes([], 3)
assert missing == [1, 2, 3]
@pytest.mark.unit
class TestSearchPerformance:
"""Test search performance and optimization."""
def test_search_index_creation(self):
"""Test search index creation for performance."""
def create_search_index(anime_list):
"""Create a search index for faster lookups."""
index = {
"by_title": {},
"by_genre": {},
"by_year": {}
}
for anime in anime_list:
title = anime.get("title", "").lower()
genre = anime.get("genre", "").lower()
year = anime.get("year")
# Index by title keywords
for word in title.split():
if word not in index["by_title"]:
index["by_title"][word] = []
index["by_title"][word].append(anime)
# Index by genre
if genre:
if genre not in index["by_genre"]:
index["by_genre"][genre] = []
index["by_genre"][genre].append(anime)
# Index by year
if year:
if year not in index["by_year"]:
index["by_year"][year] = []
index["by_year"][year].append(anime)
return index
anime_list = [
{"title": "Attack on Titan", "genre": "Action", "year": 2013},
{"title": "My Hero Academia", "genre": "Action", "year": 2016},
{"title": "Your Name", "genre": "Romance", "year": 2016}
]
index = create_search_index(anime_list)
# Test title index
assert "attack" in index["by_title"]
assert len(index["by_title"]["attack"]) == 1
# Test genre index
assert "action" in index["by_genre"]
assert len(index["by_genre"]["action"]) == 2
# Test year index
assert 2016 in index["by_year"]
assert len(index["by_year"][2016]) == 2
def test_search_result_caching(self):
"""Test search result caching mechanism."""
def cached_search(query, cache={}):
"""Simple search with caching."""
if query in cache:
return cache[query], True # Return cached result and cache hit flag
# Simulate expensive search operation
result = [{"id": "1", "title": f"Result for {query}"}]
cache[query] = result
return result, False # Return new result and cache miss flag
# Test cache miss
result, cache_hit = cached_search("test_query")
assert not cache_hit
assert len(result) == 1
# Test cache hit
result, cache_hit = cached_search("test_query")
assert cache_hit
assert len(result) == 1
# Test different query
result, cache_hit = cached_search("another_query")
assert not cache_hit

View File

@ -1,270 +0,0 @@
"""
Unit tests for authentication and security functionality.
Tests password hashing, JWT creation/validation, session timeout logic,
and secure environment variable management.
"""
import hashlib
import os
import sys
from datetime import datetime, timedelta
from unittest.mock import patch
import jwt
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
from src.server.fastapi_app import (
Settings,
generate_jwt_token,
hash_password,
verify_jwt_token,
verify_master_password,
)
@pytest.mark.unit
class TestPasswordHashing:
"""Test password hashing functionality."""
def test_hash_password_with_salt(self, mock_settings):
"""Test password hashing with salt."""
with patch('src.server.fastapi_app.settings', mock_settings):
password = "test_password"
expected_hash = hashlib.sha256(
(password + mock_settings.password_salt).encode()
).hexdigest()
result = hash_password(password)
assert result == expected_hash
assert len(result) == 64 # SHA-256 produces 64 character hex string
def test_hash_password_different_inputs(self, mock_settings):
"""Test that different passwords produce different hashes."""
with patch('src.server.fastapi_app.settings', mock_settings):
hash1 = hash_password("password1")
hash2 = hash_password("password2")
assert hash1 != hash2
def test_hash_password_consistent(self, mock_settings):
"""Test that same password always produces same hash."""
with patch('src.server.fastapi_app.settings', mock_settings):
password = "consistent_password"
hash1 = hash_password(password)
hash2 = hash_password(password)
assert hash1 == hash2
def test_hash_password_empty_string(self, mock_settings):
"""Test hashing empty string."""
with patch('src.server.fastapi_app.settings', mock_settings):
result = hash_password("")
assert isinstance(result, str)
assert len(result) == 64
@pytest.mark.unit
class TestMasterPasswordVerification:
"""Test master password verification functionality."""
def test_verify_master_password_with_hash(self, mock_settings):
"""Test password verification using stored hash."""
password = "test_password"
mock_settings.master_password_hash = hash_password(password)
mock_settings.master_password = None
with patch('src.server.fastapi_app.settings', mock_settings):
assert verify_master_password(password) is True
assert verify_master_password("wrong_password") is False
def test_verify_master_password_with_plain_text(self, mock_settings):
"""Test password verification using plain text (development mode)."""
password = "test_password"
mock_settings.master_password_hash = None
mock_settings.master_password = password
with patch('src.server.fastapi_app.settings', mock_settings):
assert verify_master_password(password) is True
assert verify_master_password("wrong_password") is False
def test_verify_master_password_no_config(self, mock_settings):
"""Test password verification when no password is configured."""
mock_settings.master_password_hash = None
mock_settings.master_password = None
with patch('src.server.fastapi_app.settings', mock_settings):
assert verify_master_password("any_password") is False
@pytest.mark.unit
class TestJWTGeneration:
"""Test JWT token generation functionality."""
def test_generate_jwt_token_structure(self, mock_settings):
"""Test JWT token generation returns correct structure."""
with patch('src.server.fastapi_app.settings', mock_settings):
result = generate_jwt_token()
assert "token" in result
assert "expires_at" in result
assert isinstance(result["token"], str)
assert isinstance(result["expires_at"], datetime)
def test_generate_jwt_token_expiry(self, mock_settings):
"""Test JWT token has correct expiry time."""
with patch('src.server.fastapi_app.settings', mock_settings):
before_generation = datetime.utcnow()
result = generate_jwt_token()
after_generation = datetime.utcnow()
expected_expiry_min = before_generation + timedelta(
hours=mock_settings.token_expiry_hours
)
expected_expiry_max = after_generation + timedelta(
hours=mock_settings.token_expiry_hours
)
assert expected_expiry_min <= result["expires_at"] <= expected_expiry_max
def test_generate_jwt_token_payload(self, mock_settings):
"""Test JWT token contains correct payload."""
with patch('src.server.fastapi_app.settings', mock_settings):
result = generate_jwt_token()
# Decode without verification to check payload
payload = jwt.decode(
result["token"],
options={"verify_signature": False}
)
assert payload["user"] == "master"
assert payload["iss"] == "aniworld-fastapi-server"
assert "exp" in payload
assert "iat" in payload
@pytest.mark.unit
class TestJWTVerification:
"""Test JWT token verification functionality."""
def test_verify_valid_jwt_token(self, mock_settings, valid_jwt_token):
"""Test verification of valid JWT token."""
with patch('src.server.fastapi_app.settings', mock_settings):
result = verify_jwt_token(valid_jwt_token)
assert result is not None
assert result["user"] == "test_user"
assert "exp" in result
def test_verify_expired_jwt_token(self, mock_settings, expired_jwt_token):
"""Test verification of expired JWT token."""
with patch('src.server.fastapi_app.settings', mock_settings):
result = verify_jwt_token(expired_jwt_token)
assert result is None
def test_verify_invalid_jwt_token(self, mock_settings):
"""Test verification of invalid JWT token."""
with patch('src.server.fastapi_app.settings', mock_settings):
result = verify_jwt_token("invalid.token.here")
assert result is None
def test_verify_jwt_token_wrong_secret(self, mock_settings):
"""Test verification with wrong secret key."""
# Generate token with different secret
payload = {
"user": "test_user",
"exp": datetime.utcnow() + timedelta(hours=1)
}
wrong_token = jwt.encode(payload, "wrong-secret", algorithm="HS256")
with patch('src.server.fastapi_app.settings', mock_settings):
result = verify_jwt_token(wrong_token)
assert result is None
@pytest.mark.unit
class TestSessionTimeout:
"""Test session timeout logic."""
def test_token_expiry_calculation(self, mock_settings):
"""Test that token expiry is calculated correctly."""
mock_settings.token_expiry_hours = 24
with patch('src.server.fastapi_app.settings', mock_settings):
before = datetime.utcnow()
result = generate_jwt_token()
after = datetime.utcnow()
# Check expiry is approximately 24 hours from now
expected_min = before + timedelta(hours=24)
expected_max = after + timedelta(hours=24)
assert expected_min <= result["expires_at"] <= expected_max
def test_custom_expiry_hours(self, mock_settings):
"""Test token generation with custom expiry hours."""
mock_settings.token_expiry_hours = 1
with patch('src.server.fastapi_app.settings', mock_settings):
result = generate_jwt_token()
# Decode token to check expiry
payload = jwt.decode(
result["token"],
mock_settings.jwt_secret_key,
algorithms=["HS256"]
)
token_exp = datetime.fromtimestamp(payload["exp"])
expected_exp = result["expires_at"]
# Should be approximately the same (within 1 second)
assert abs((token_exp - expected_exp).total_seconds()) < 1
@pytest.mark.unit
class TestSecurityConfiguration:
"""Test secure environment variable management."""
def test_settings_defaults(self):
"""Test that settings have secure defaults."""
settings = Settings()
# Should have default values
assert settings.jwt_secret_key is not None
assert settings.password_salt is not None
assert settings.token_expiry_hours > 0
def test_settings_from_env(self):
"""Test settings loading from environment variables."""
with patch.dict(os.environ, {
'JWT_SECRET_KEY': 'test-secret',
'PASSWORD_SALT': 'test-salt',
'SESSION_TIMEOUT_HOURS': '12'
}):
settings = Settings()
assert settings.jwt_secret_key == 'test-secret'
assert settings.password_salt == 'test-salt'
assert settings.token_expiry_hours == 12
def test_sensitive_data_not_logged(self, mock_settings, caplog):
"""Test that sensitive data is not logged."""
password = "sensitive_password"
with patch('src.server.fastapi_app.settings', mock_settings):
hash_password(password)
verify_master_password(password)
# Check that password doesn't appear in logs
for record in caplog.records:
assert password not in record.message

View File

@ -1,429 +0,0 @@
"""
Unit tests for CLI commands and functionality.
Tests CLI commands (scan, search, download, rescan, display series),
user input handling, and command-line interface logic.
"""
import os
import sys
from unittest.mock import Mock, patch
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.cli.Main import ( # noqa: E402
MatchNotFoundError,
NoKeyFoundException,
SeriesApp,
)
@pytest.fixture
def mock_series_app():
"""Create a mock SeriesApp instance for testing."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'):
app = SeriesApp("/test/directory")
app.series_list = [
Mock(name="Test Anime 1", folder="test_anime_1"),
Mock(name="Test Anime 2", folder="test_anime_2"),
Mock(name=None, folder="unknown_anime")
]
return app
@pytest.mark.unit
class TestCLICommands:
"""Test CLI command functionality."""
def test_display_series_with_names(self, mock_series_app, capsys):
"""Test displaying series with proper names."""
mock_series_app.display_series()
captured = capsys.readouterr()
output = captured.out
assert "Current result:" in output
assert "1. Test Anime 1" in output
assert "2. Test Anime 2" in output
assert "3. unknown_anime" in output # Should show folder name when name is None
def test_search_command(self, mock_series_app):
"""Test search command functionality."""
mock_loader = Mock()
mock_loader.Search.return_value = [
{"name": "Found Anime 1", "link": "link1"},
{"name": "Found Anime 2", "link": "link2"}
]
mock_series_app.Loaders.GetLoader.return_value = mock_loader
results = mock_series_app.search("test query")
assert len(results) == 2
assert results[0]["name"] == "Found Anime 1"
mock_loader.Search.assert_called_once_with("test query")
def test_search_no_results(self, mock_series_app):
"""Test search command with no results."""
mock_loader = Mock()
mock_loader.Search.return_value = []
mock_series_app.Loaders.GetLoader.return_value = mock_loader
results = mock_series_app.search("nonexistent")
assert len(results) == 0
def test_user_selection_single(self, mock_series_app):
"""Test user selection with single series."""
with patch('builtins.input', return_value='1'):
selected = mock_series_app.get_user_selection()
assert selected is not None
assert len(selected) == 1
assert selected[0].name == "Test Anime 1"
def test_user_selection_multiple(self, mock_series_app):
"""Test user selection with multiple series."""
with patch('builtins.input', return_value='1,2'):
selected = mock_series_app.get_user_selection()
assert selected is not None
assert len(selected) == 2
assert selected[0].name == "Test Anime 1"
assert selected[1].name == "Test Anime 2"
def test_user_selection_all(self, mock_series_app):
"""Test user selection with 'all' option."""
with patch('builtins.input', return_value='all'):
selected = mock_series_app.get_user_selection()
assert selected is not None
assert len(selected) == 3 # All series
def test_user_selection_exit(self, mock_series_app):
"""Test user selection with exit command."""
with patch('builtins.input', return_value='exit'):
selected = mock_series_app.get_user_selection()
assert selected is None
def test_user_selection_invalid_input(self, mock_series_app):
"""Test user selection with invalid input followed by valid input."""
with patch('builtins.input', side_effect=['invalid', 'abc', '1']):
with patch('builtins.print'): # Suppress print output
selected = mock_series_app.get_user_selection()
assert selected is not None
assert len(selected) == 1
def test_retry_mechanism_success(self, mock_series_app):
"""Test retry mechanism with successful operation."""
mock_func = Mock()
result = mock_series_app.retry(mock_func, "arg1", max_retries=3, delay=0, key="value")
assert result is True
mock_func.assert_called_once_with("arg1", key="value")
def test_retry_mechanism_eventual_success(self, mock_series_app):
"""Test retry mechanism with failure then success."""
mock_func = Mock(side_effect=[Exception("Error"), Exception("Error"), None])
with patch('time.sleep'): # Speed up test
result = mock_series_app.retry(mock_func, max_retries=3, delay=0)
assert result is True
assert mock_func.call_count == 3
def test_retry_mechanism_failure(self, mock_series_app):
"""Test retry mechanism with persistent failure."""
mock_func = Mock(side_effect=Exception("Persistent error"))
with patch('time.sleep'), patch('builtins.print'): # Speed up test and suppress error output
result = mock_series_app.retry(mock_func, max_retries=3, delay=0)
assert result is False
assert mock_func.call_count == 3
@pytest.mark.unit
class TestCLISearchMode:
"""Test CLI search mode functionality."""
def test_search_mode_with_results(self, mock_series_app):
"""Test search mode with search results."""
mock_results = [
{"name": "Anime 1", "link": "link1"},
{"name": "Anime 2", "link": "link2"}
]
with patch('builtins.input', side_effect=['test search', '1']), \
patch.object(mock_series_app, 'search', return_value=mock_results), \
patch.object(mock_series_app.List, 'add') as mock_add, \
patch('builtins.print'):
mock_series_app.search_mode()
mock_add.assert_called_once()
def test_search_mode_no_results(self, mock_series_app):
"""Test search mode with no results."""
with patch('builtins.input', return_value='nonexistent'), \
patch.object(mock_series_app, 'search', return_value=[]), \
patch('builtins.print') as mock_print:
mock_series_app.search_mode()
# Should print "No results found"
print_calls = [call[0][0] for call in mock_print.call_args_list]
assert any("No results found" in call for call in print_calls)
def test_search_mode_empty_selection(self, mock_series_app):
"""Test search mode with empty selection (return)."""
mock_results = [{"name": "Anime 1", "link": "link1"}]
with patch('builtins.input', side_effect=['test', '']), \
patch.object(mock_series_app, 'search', return_value=mock_results), \
patch('builtins.print'):
# Should return without error
mock_series_app.search_mode()
def test_search_mode_invalid_selection(self, mock_series_app):
"""Test search mode with invalid then valid selection."""
mock_results = [{"name": "Anime 1", "link": "link1"}]
with patch('builtins.input', side_effect=['test', '999', '1']), \
patch.object(mock_series_app, 'search', return_value=mock_results), \
patch.object(mock_series_app.List, 'add'), \
patch('builtins.print'):
mock_series_app.search_mode()
@pytest.mark.unit
class TestCLIDownloadFunctionality:
"""Test CLI download functionality."""
def test_download_series_setup(self, mock_series_app):
"""Test download series initialization."""
mock_series = [
Mock(episodeDict={1: [1, 2], 2: [1]}, folder="anime1", key="key1"),
Mock(episodeDict={1: [1]}, folder="anime2", key="key2")
]
with patch('rich.progress.Progress') as mock_progress_class, \
patch('time.sleep'):
mock_progress = Mock()
mock_progress_class.return_value = mock_progress
mock_series_app.download_series(mock_series)
# Should create progress tracking
mock_progress.add_task.assert_called()
mock_progress.start.assert_called_once()
mock_progress.stop.assert_called_once()
def test_download_progress_callback(self, mock_series_app):
"""Test download progress callback functionality."""
mock_series_app.progress = Mock()
mock_series_app.task3 = "task3_id"
# Test downloading status
download_data = {
'status': 'downloading',
'total_bytes': 1000,
'downloaded_bytes': 500
}
mock_series_app.print_Download_Progress(download_data)
mock_series_app.progress.update.assert_called()
# Test finished status
download_data['status'] = 'finished'
mock_series_app.print_Download_Progress(download_data)
# Should update progress to 100%
update_calls = mock_series_app.progress.update.call_args_list
assert any(call[1].get('completed') == 100 for call in update_calls)
def test_download_progress_no_total(self, mock_series_app):
"""Test download progress with no total bytes."""
mock_series_app.progress = Mock()
mock_series_app.task3 = "task3_id"
download_data = {
'status': 'downloading',
'downloaded_bytes': 5242880 # 5MB
}
mock_series_app.print_Download_Progress(download_data)
# Should handle case where total_bytes is not available
mock_series_app.progress.update.assert_called()
@pytest.mark.unit
class TestCLIMainLoop:
"""Test CLI main application loop."""
def test_main_loop_search_action(self, mock_series_app):
"""Test main loop with search action."""
with patch('builtins.input', side_effect=['s', KeyboardInterrupt()]), \
patch.object(mock_series_app, 'search_mode') as mock_search:
try:
mock_series_app.run()
except KeyboardInterrupt:
pass
mock_search.assert_called_once()
def test_main_loop_init_action(self, mock_series_app):
"""Test main loop with init action."""
with patch('builtins.input', side_effect=['i', KeyboardInterrupt()]), \
patch('rich.progress.Progress'), \
patch('builtins.print'):
mock_series_app.SerieScanner = Mock()
mock_series_app.List = Mock()
try:
mock_series_app.run()
except KeyboardInterrupt:
pass
mock_series_app.SerieScanner.Reinit.assert_called_once()
mock_series_app.SerieScanner.Scan.assert_called_once()
def test_main_loop_download_action(self, mock_series_app):
"""Test main loop with download action."""
mock_selected = [Mock()]
with patch('builtins.input', side_effect=['d', KeyboardInterrupt()]), \
patch.object(mock_series_app, 'get_user_selection', return_value=mock_selected), \
patch.object(mock_series_app, 'download_series') as mock_download:
try:
mock_series_app.run()
except KeyboardInterrupt:
pass
mock_download.assert_called_once_with(mock_selected)
def test_main_loop_download_action_no_selection(self, mock_series_app):
"""Test main loop with download action but no series selected."""
with patch('builtins.input', side_effect=['d', KeyboardInterrupt()]), \
patch.object(mock_series_app, 'get_user_selection', return_value=None), \
patch.object(mock_series_app, 'download_series') as mock_download:
try:
mock_series_app.run()
except KeyboardInterrupt:
pass
mock_download.assert_not_called()
@pytest.mark.unit
class TestCLIExceptions:
"""Test CLI exception handling."""
def test_no_key_found_exception(self):
"""Test NoKeyFoundException creation and usage."""
exception = NoKeyFoundException("Test message")
assert str(exception) == "Test message"
assert isinstance(exception, Exception)
def test_match_not_found_error(self):
"""Test MatchNotFoundError creation and usage."""
error = MatchNotFoundError("No match found")
assert str(error) == "No match found"
assert isinstance(error, Exception)
def test_exception_handling_in_retry(self, mock_series_app):
"""Test exception handling in retry mechanism."""
def failing_function():
raise NoKeyFoundException("Key not found")
with patch('time.sleep'), patch('builtins.print'):
result = mock_series_app.retry(failing_function, max_retries=2, delay=0)
assert result is False
@pytest.mark.unit
class TestCLIInitialization:
"""Test CLI application initialization."""
def test_series_app_initialization(self):
"""Test SeriesApp initialization."""
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'), \
patch('builtins.print'):
app = SeriesApp("/test/directory")
assert app.directory_to_search == "/test/directory"
assert app.progress is None
assert hasattr(app, 'Loaders')
assert hasattr(app, 'SerieScanner')
assert hasattr(app, 'List')
def test_initialization_count_tracking(self):
"""Test that initialization count is tracked properly."""
initial_count = SeriesApp._initialization_count
with patch('src.cli.Main.Loaders'), \
patch('src.cli.Main.SerieScanner'), \
patch('src.cli.Main.SerieList'), \
patch('builtins.print'):
SeriesApp("/test1")
SeriesApp("/test2")
assert SeriesApp._initialization_count == initial_count + 2
def test_init_list_method(self, mock_series_app):
"""Test __InitList__ method."""
mock_missing_episodes = [Mock(), Mock()]
mock_series_app.List.GetMissingEpisode.return_value = mock_missing_episodes
mock_series_app._SeriesApp__InitList__()
assert mock_series_app.series_list == mock_missing_episodes
mock_series_app.List.GetMissingEpisode.assert_called_once()
@pytest.mark.unit
class TestCLIEnvironmentVariables:
"""Test CLI environment variable handling."""
def test_default_anime_directory(self):
"""Test default ANIME_DIRECTORY handling."""
with patch.dict(os.environ, {}, clear=True), \
patch('src.cli.Main.SeriesApp') as mock_app:
# Import and run main module simulation
import src.cli.Main
# The default should be the hardcoded path
default_path = "\\\\sshfs.r\\ubuntu@192.168.178.43\\media\\serien\\Serien"
result = os.getenv("ANIME_DIRECTORY", default_path)
assert result == default_path
def test_custom_anime_directory(self):
"""Test custom ANIME_DIRECTORY from environment."""
custom_path = "/custom/anime/directory"
with patch.dict(os.environ, {'ANIME_DIRECTORY': custom_path}):
result = os.getenv("ANIME_DIRECTORY", "default")
assert result == custom_path

View File

@ -1,485 +0,0 @@
"""
Unit tests for database maintenance operation logic.
Tests database maintenance functions, storage optimization,
integrity checking, and database management utilities.
"""
import os
import sys
from unittest.mock import Mock
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
@pytest.mark.unit
class TestDatabaseMaintenanceLogic:
"""Test database maintenance operation logic."""
def test_database_vacuum_operation(self):
"""Test database vacuum operation logic."""
def perform_vacuum(connection, full_vacuum=False):
"""Perform database vacuum operation."""
try:
cursor = connection.cursor()
if full_vacuum:
cursor.execute("VACUUM")
else:
cursor.execute("PRAGMA incremental_vacuum")
# Get database size before and after (simulated)
cursor.execute("PRAGMA page_count")
page_count = cursor.fetchone()[0]
cursor.execute("PRAGMA page_size")
page_size = cursor.fetchone()[0]
return {
"success": True,
"operation": "vacuum",
"type": "full" if full_vacuum else "incremental",
"pages_freed": 0, # Would be calculated in real implementation
"space_saved_bytes": 0,
"final_size_bytes": page_count * page_size
}
except Exception as e:
return {
"success": False,
"operation": "vacuum",
"error": str(e)
}
# Test with mock connection
mock_connection = Mock()
mock_cursor = Mock()
mock_connection.cursor.return_value = mock_cursor
mock_cursor.fetchone.side_effect = [[1000], [4096]] # page_count, page_size
# Test incremental vacuum
result = perform_vacuum(mock_connection, full_vacuum=False)
assert result["success"] is True
assert result["type"] == "incremental"
assert "final_size_bytes" in result
# Test full vacuum
result = perform_vacuum(mock_connection, full_vacuum=True)
assert result["success"] is True
assert result["type"] == "full"
# Test error handling
mock_cursor.execute.side_effect = Exception("Database locked")
result = perform_vacuum(mock_connection)
assert result["success"] is False
assert "error" in result
def test_database_analyze_operation(self):
"""Test database analyze operation logic."""
def perform_analyze(connection, tables=None):
"""Perform database analyze operation."""
try:
cursor = connection.cursor()
tables_analyzed = []
if tables:
# Analyze specific tables
for table in tables:
cursor.execute(f"ANALYZE {table}")
tables_analyzed.append(table)
else:
# Analyze all tables
cursor.execute("SELECT name FROM sqlite_master WHERE type='table'")
all_tables = [row[0] for row in cursor.fetchall()]
for table in all_tables:
cursor.execute(f"ANALYZE {table}")
tables_analyzed.append(table)
return {
"success": True,
"operation": "analyze",
"tables_analyzed": tables_analyzed,
"statistics_updated": len(tables_analyzed)
}
except Exception as e:
return {
"success": False,
"operation": "analyze",
"error": str(e)
}
# Test with mock connection
mock_connection = Mock()
mock_cursor = Mock()
mock_connection.cursor.return_value = mock_cursor
mock_cursor.fetchall.return_value = [("anime",), ("episodes",), ("users",)]
# Test analyze all tables
result = perform_analyze(mock_connection)
assert result["success"] is True
assert result["statistics_updated"] == 3
assert "anime" in result["tables_analyzed"]
# Test analyze specific tables
result = perform_analyze(mock_connection, tables=["anime", "episodes"])
assert result["success"] is True
assert result["statistics_updated"] == 2
assert set(result["tables_analyzed"]) == {"anime", "episodes"}
def test_database_integrity_check(self):
"""Test database integrity check logic."""
def check_database_integrity(connection):
"""Check database integrity."""
try:
cursor = connection.cursor()
# Run integrity check
cursor.execute("PRAGMA integrity_check")
integrity_results = cursor.fetchall()
# Run foreign key check
cursor.execute("PRAGMA foreign_key_check")
foreign_key_results = cursor.fetchall()
# Determine status
integrity_ok = len(integrity_results) == 1 and integrity_results[0][0] == "ok"
foreign_keys_ok = len(foreign_key_results) == 0
if integrity_ok and foreign_keys_ok:
status = "ok"
elif integrity_ok and not foreign_keys_ok:
status = "warning" # Foreign key violations
else:
status = "error" # Integrity issues
return {
"success": True,
"integrity_status": status,
"integrity_issues": [] if integrity_ok else integrity_results,
"foreign_key_issues": foreign_key_results,
"total_issues": len(foreign_key_results) + (0 if integrity_ok else len(integrity_results))
}
except Exception as e:
return {
"success": False,
"error": str(e)
}
# Test healthy database
mock_connection = Mock()
mock_cursor = Mock()
mock_connection.cursor.return_value = mock_cursor
mock_cursor.fetchall.side_effect = [[("ok",)], []] # integrity ok, no FK issues
result = check_database_integrity(mock_connection)
assert result["success"] is True
assert result["integrity_status"] == "ok"
assert result["total_issues"] == 0
# Test database with foreign key issues
mock_cursor.fetchall.side_effect = [[("ok",)], [("table", "row", "issue")]]
result = check_database_integrity(mock_connection)
assert result["success"] is True
assert result["integrity_status"] == "warning"
assert result["total_issues"] == 1
# Test database with integrity issues
mock_cursor.fetchall.side_effect = [[("error in table",)], []]
result = check_database_integrity(mock_connection)
assert result["success"] is True
assert result["integrity_status"] == "error"
assert result["total_issues"] == 1
def test_database_reindex_operation(self):
"""Test database reindex operation logic."""
def perform_reindex(connection, indexes=None):
"""Perform database reindex operation."""
try:
cursor = connection.cursor()
indexes_rebuilt = []
if indexes:
# Reindex specific indexes
for index in indexes:
cursor.execute(f"REINDEX {index}")
indexes_rebuilt.append(index)
else:
# Reindex all indexes
cursor.execute("SELECT name FROM sqlite_master WHERE type='index' AND name NOT LIKE 'sqlite_%'")
all_indexes = [row[0] for row in cursor.fetchall()]
for index in all_indexes:
cursor.execute(f"REINDEX {index}")
indexes_rebuilt.append(index)
return {
"success": True,
"operation": "reindex",
"indexes_rebuilt": indexes_rebuilt,
"count": len(indexes_rebuilt)
}
except Exception as e:
return {
"success": False,
"operation": "reindex",
"error": str(e)
}
# Test with mock connection
mock_connection = Mock()
mock_cursor = Mock()
mock_connection.cursor.return_value = mock_cursor
mock_cursor.fetchall.return_value = [("idx_anime_title",), ("idx_episode_number",)]
# Test reindex all
result = perform_reindex(mock_connection)
assert result["success"] is True
assert result["count"] == 2
assert "idx_anime_title" in result["indexes_rebuilt"]
# Test reindex specific indexes
result = perform_reindex(mock_connection, indexes=["idx_anime_title"])
assert result["success"] is True
assert result["count"] == 1
assert result["indexes_rebuilt"] == ["idx_anime_title"]
@pytest.mark.unit
class TestDatabaseStatistics:
"""Test database statistics collection."""
def test_collect_database_stats(self):
"""Test database statistics collection."""
def collect_database_stats(connection):
"""Collect comprehensive database statistics."""
try:
cursor = connection.cursor()
stats = {}
# Get table count
cursor.execute("SELECT COUNT(*) FROM sqlite_master WHERE type='table'")
stats["table_count"] = cursor.fetchone()[0]
# Get database size
cursor.execute("PRAGMA page_count")
page_count = cursor.fetchone()[0]
cursor.execute("PRAGMA page_size")
page_size = cursor.fetchone()[0]
stats["database_size_bytes"] = page_count * page_size
# Get free pages
cursor.execute("PRAGMA freelist_count")
free_pages = cursor.fetchone()[0]
stats["free_space_bytes"] = free_pages * page_size
# Get index count
cursor.execute("SELECT COUNT(*) FROM sqlite_master WHERE type='index' AND name NOT LIKE 'sqlite_%'")
stats["index_count"] = cursor.fetchone()[0]
# Calculate utilization
used_space = stats["database_size_bytes"] - stats["free_space_bytes"]
stats["space_utilization_percent"] = (used_space / stats["database_size_bytes"]) * 100 if stats["database_size_bytes"] > 0 else 0
return {
"success": True,
"stats": stats
}
except Exception as e:
return {
"success": False,
"error": str(e)
}
# Test with mock connection
mock_connection = Mock()
mock_cursor = Mock()
mock_connection.cursor.return_value = mock_cursor
mock_cursor.fetchone.side_effect = [
(5,), # table_count
(1000,), # page_count
(4096,), # page_size
(50,), # freelist_count
(3,) # index_count
]
result = collect_database_stats(mock_connection)
assert result["success"] is True
stats = result["stats"]
assert stats["table_count"] == 5
assert stats["database_size_bytes"] == 1000 * 4096
assert stats["free_space_bytes"] == 50 * 4096
assert stats["index_count"] == 3
assert 0 <= stats["space_utilization_percent"] <= 100
def test_table_specific_stats(self):
"""Test collection of table-specific statistics."""
def collect_table_stats(connection, table_name):
"""Collect statistics for a specific table."""
try:
cursor = connection.cursor()
# Get row count
cursor.execute(f"SELECT COUNT(*) FROM {table_name}")
row_count = cursor.fetchone()[0]
# Get table info
cursor.execute(f"PRAGMA table_info({table_name})")
columns = cursor.fetchall()
column_count = len(columns)
# Get table size (approximate)
cursor.execute(f"SELECT name FROM sqlite_master WHERE type='table' AND name='{table_name}'")
if cursor.fetchone():
# Table exists, calculate approximate size
# This is simplified - real implementation would be more complex
estimated_size = row_count * column_count * 100 # Rough estimate
else:
estimated_size = 0
return {
"table_name": table_name,
"row_count": row_count,
"column_count": column_count,
"estimated_size_bytes": estimated_size,
"columns": [col[1] for col in columns] # Column names
}
except Exception as e:
return {
"error": str(e),
"table_name": table_name
}
# Test with mock connection
mock_connection = Mock()
mock_cursor = Mock()
mock_connection.cursor.return_value = mock_cursor
mock_cursor.fetchone.side_effect = [
(1000,), # row count
("anime",) # table exists
]
mock_cursor.fetchall.return_value = [
(0, "id", "INTEGER", 0, None, 1),
(1, "title", "TEXT", 0, None, 0),
(2, "genre", "TEXT", 0, None, 0)
]
result = collect_table_stats(mock_connection, "anime")
assert result["table_name"] == "anime"
assert result["row_count"] == 1000
assert result["column_count"] == 3
assert "columns" in result
assert "id" in result["columns"]
@pytest.mark.unit
class TestDatabaseOptimization:
"""Test database optimization logic."""
def test_optimization_recommendations(self):
"""Test generation of database optimization recommendations."""
def generate_optimization_recommendations(stats):
"""Generate optimization recommendations based on stats."""
recommendations = []
# Check space utilization
if stats.get("space_utilization_percent", 100) < 70:
recommendations.append({
"type": "vacuum",
"priority": "medium",
"description": "Database has significant free space, consider running VACUUM",
"estimated_benefit": "Reduce database file size"
})
# Check if analyze is needed (simplified check)
if stats.get("table_count", 0) > 0:
recommendations.append({
"type": "analyze",
"priority": "low",
"description": "Update table statistics for better query planning",
"estimated_benefit": "Improve query performance"
})
# Check index count vs table count ratio
table_count = stats.get("table_count", 0)
index_count = stats.get("index_count", 0)
if table_count > 0 and (index_count / table_count) < 1:
recommendations.append({
"type": "indexing",
"priority": "medium",
"description": "Some tables may benefit from additional indexes",
"estimated_benefit": "Faster query execution"
})
return recommendations
# Test with stats indicating need for vacuum
stats = {
"table_count": 5,
"index_count": 3,
"space_utilization_percent": 60
}
recommendations = generate_optimization_recommendations(stats)
assert len(recommendations) >= 2
vacuum_rec = next((r for r in recommendations if r["type"] == "vacuum"), None)
assert vacuum_rec is not None
assert vacuum_rec["priority"] == "medium"
# Test with well-optimized database
optimized_stats = {
"table_count": 5,
"index_count": 8,
"space_utilization_percent": 95
}
recommendations = generate_optimization_recommendations(optimized_stats)
# Should still recommend analyze, but not vacuum
vacuum_rec = next((r for r in recommendations if r["type"] == "vacuum"), None)
assert vacuum_rec is None
def test_maintenance_scheduler(self):
"""Test maintenance operation scheduling logic."""
def should_run_maintenance(operation_type, last_run_timestamp, current_timestamp):
"""Determine if maintenance operation should run."""
intervals = {
"analyze": 24 * 3600, # 24 hours
"vacuum": 7 * 24 * 3600, # 7 days
"integrity_check": 30 * 24 * 3600, # 30 days
"reindex": 30 * 24 * 3600 # 30 days
}
if operation_type not in intervals:
return False
if last_run_timestamp is None:
return True # Never run before
time_since_last = current_timestamp - last_run_timestamp
return time_since_last >= intervals[operation_type]
current_time = 1000000
# Test never run before
assert should_run_maintenance("analyze", None, current_time) is True
# Test recent run
recent_run = current_time - (12 * 3600) # 12 hours ago
assert should_run_maintenance("analyze", recent_run, current_time) is False
# Test old run
old_run = current_time - (25 * 3600) # 25 hours ago
assert should_run_maintenance("analyze", old_run, current_time) is True
# Test vacuum timing
week_ago = current_time - (8 * 24 * 3600) # 8 days ago
assert should_run_maintenance("vacuum", week_ago, current_time) is True
day_ago = current_time - (24 * 3600) # 1 day ago
assert should_run_maintenance("vacuum", day_ago, current_time) is False

View File

@ -1,404 +0,0 @@
"""
Unit tests for logging functionality.
This module tests the logging configuration, log file management,
and error reporting components.
"""
import logging
import os
import tempfile
from pathlib import Path
from unittest.mock import Mock, mock_open, patch
import pytest
# Import logging components
try:
from src.infrastructure.logging.GlobalLogger import GlobalLogger
except ImportError:
# Mock GlobalLogger if not available
class MockGlobalLogger:
def __init__(self):
self.logger = logging.getLogger(__name__)
def get_logger(self, name):
return logging.getLogger(name)
def configure_logging(self, level=logging.INFO):
logging.basicConfig(level=level)
GlobalLogger = MockGlobalLogger
class TestGlobalLoggerConfiguration:
"""Test cases for global logger configuration."""
def test_logger_initialization(self):
"""Test logger initialization."""
global_logger = GlobalLogger()
assert global_logger is not None
logger = global_logger.get_logger("test_logger")
assert logger is not None
assert logger.name == "test_logger"
def test_logger_level_configuration(self):
"""Test logger level configuration."""
global_logger = GlobalLogger()
# Test different log levels
levels = [logging.DEBUG, logging.INFO, logging.WARNING, logging.ERROR]
for level in levels:
global_logger.configure_logging(level)
logger = global_logger.get_logger("test_level")
assert logger.level <= level or logger.parent.level <= level
def test_multiple_logger_instances(self):
"""Test multiple logger instances."""
global_logger = GlobalLogger()
logger1 = global_logger.get_logger("logger1")
logger2 = global_logger.get_logger("logger2")
logger3 = global_logger.get_logger("logger1") # Same name as logger1
assert logger1 != logger2
assert logger1 is logger3 # Should return same instance
@patch('logging.basicConfig')
def test_logging_configuration_calls(self, mock_basic_config):
"""Test that logging configuration is called correctly."""
global_logger = GlobalLogger()
global_logger.configure_logging(logging.DEBUG)
mock_basic_config.assert_called()
class TestLogFileManagement:
"""Test cases for log file management."""
def setUp(self):
"""Set up test environment."""
self.temp_dir = tempfile.mkdtemp()
self.log_file = os.path.join(self.temp_dir, "test.log")
def tearDown(self):
"""Clean up test environment."""
if os.path.exists(self.temp_dir):
import shutil
shutil.rmtree(self.temp_dir)
def test_log_file_creation(self):
"""Test log file creation."""
# Configure logger to write to test file
logger = logging.getLogger("test_file")
handler = logging.FileHandler(self.log_file)
logger.addHandler(handler)
logger.setLevel(logging.INFO)
# Write log message
logger.info("Test log message")
handler.close()
# Verify file was created and contains message
assert os.path.exists(self.log_file)
with open(self.log_file, 'r') as f:
content = f.read()
assert "Test log message" in content
def test_log_file_rotation(self):
"""Test log file rotation functionality."""
from logging.handlers import RotatingFileHandler
# Create rotating file handler
handler = RotatingFileHandler(
self.log_file,
maxBytes=100, # Small size for testing
backupCount=3
)
logger = logging.getLogger("test_rotation")
logger.addHandler(handler)
logger.setLevel(logging.INFO)
# Write enough messages to trigger rotation
for i in range(10):
logger.info(f"Long test message {i} that should trigger rotation when we write enough of them")
handler.close()
# Check that rotation occurred
assert os.path.exists(self.log_file)
@patch('builtins.open', mock_open(read_data="log content"))
def test_log_file_reading(self, mock_file):
"""Test reading log files."""
# Mock reading a log file
with open("test.log", 'r') as f:
content = f.read()
assert content == "log content"
mock_file.assert_called_once_with("test.log", 'r')
def test_log_file_permissions(self):
"""Test log file permissions."""
# Create log file
with open(self.log_file, 'w') as f:
f.write("test")
# Check file exists and is readable
assert os.path.exists(self.log_file)
assert os.access(self.log_file, os.R_OK)
assert os.access(self.log_file, os.W_OK)
class TestErrorReporting:
"""Test cases for error reporting functionality."""
def test_error_logging(self):
"""Test error message logging."""
logger = logging.getLogger("test_errors")
with patch.object(logger, 'error') as mock_error:
logger.error("Test error message")
mock_error.assert_called_once_with("Test error message")
def test_exception_logging(self):
"""Test exception logging with traceback."""
logger = logging.getLogger("test_exceptions")
with patch.object(logger, 'exception') as mock_exception:
try:
raise ValueError("Test exception")
except ValueError:
logger.exception("An error occurred")
mock_exception.assert_called_once_with("An error occurred")
def test_warning_logging(self):
"""Test warning message logging."""
logger = logging.getLogger("test_warnings")
with patch.object(logger, 'warning') as mock_warning:
logger.warning("Test warning message")
mock_warning.assert_called_once_with("Test warning message")
def test_info_logging(self):
"""Test info message logging."""
logger = logging.getLogger("test_info")
with patch.object(logger, 'info') as mock_info:
logger.info("Test info message")
mock_info.assert_called_once_with("Test info message")
def test_debug_logging(self):
"""Test debug message logging."""
logger = logging.getLogger("test_debug")
logger.setLevel(logging.DEBUG)
with patch.object(logger, 'debug') as mock_debug:
logger.debug("Test debug message")
mock_debug.assert_called_once_with("Test debug message")
class TestLogFormatter:
"""Test cases for log formatting."""
def test_log_format_structure(self):
"""Test log message format structure."""
formatter = logging.Formatter(
'%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
# Create a log record
record = logging.LogRecord(
name="test_logger",
level=logging.INFO,
pathname="test.py",
lineno=1,
msg="Test message",
args=(),
exc_info=None
)
formatted = formatter.format(record)
# Check format components
assert "test_logger" in formatted
assert "INFO" in formatted
assert "Test message" in formatted
def test_log_format_with_exception(self):
"""Test log formatting with exception information."""
formatter = logging.Formatter(
'%(asctime)s - %(name)s - %(levelname)s - %(message)s'
)
try:
raise ValueError("Test exception")
except ValueError:
import sys
exc_info = sys.exc_info()
record = logging.LogRecord(
name="test_logger",
level=logging.ERROR,
pathname="test.py",
lineno=1,
msg="Error occurred",
args=(),
exc_info=exc_info
)
formatted = formatter.format(record)
assert "ERROR" in formatted
assert "Error occurred" in formatted
# Exception info should be included
assert "ValueError" in formatted or "Traceback" in formatted
def test_custom_log_format(self):
"""Test custom log format."""
custom_formatter = logging.Formatter(
'[%(levelname)s] %(name)s: %(message)s'
)
record = logging.LogRecord(
name="custom_logger",
level=logging.WARNING,
pathname="test.py",
lineno=1,
msg="Custom message",
args=(),
exc_info=None
)
formatted = custom_formatter.format(record)
assert formatted.startswith("[WARNING]")
assert "custom_logger:" in formatted
assert "Custom message" in formatted
class TestLoggerIntegration:
"""Integration tests for logging functionality."""
def test_logger_with_multiple_handlers(self):
"""Test logger with multiple handlers."""
logger = logging.getLogger("multi_handler_test")
logger.setLevel(logging.INFO)
# Clear any existing handlers
logger.handlers = []
# Add console handler
console_handler = logging.StreamHandler()
console_handler.setLevel(logging.INFO)
logger.addHandler(console_handler)
# Add file handler
with tempfile.NamedTemporaryFile(mode='w', delete=False) as temp_file:
file_handler = logging.FileHandler(temp_file.name)
file_handler.setLevel(logging.WARNING)
logger.addHandler(file_handler)
# Log messages at different levels
with patch.object(console_handler, 'emit') as mock_console:
with patch.object(file_handler, 'emit') as mock_file:
logger.info("Info message") # Should go to console only
logger.warning("Warning message") # Should go to both
logger.error("Error message") # Should go to both
# Console handler should receive all messages
assert mock_console.call_count == 3
# File handler should receive only warning and error
assert mock_file.call_count == 2
file_handler.close()
os.unlink(temp_file.name)
def test_logger_hierarchy(self):
"""Test logger hierarchy and inheritance."""
parent_logger = logging.getLogger("parent")
child_logger = logging.getLogger("parent.child")
grandchild_logger = logging.getLogger("parent.child.grandchild")
# Set level on parent
parent_logger.setLevel(logging.WARNING)
# Child loggers should inherit level
assert child_logger.parent == parent_logger
assert grandchild_logger.parent == child_logger
def test_logger_configuration_persistence(self):
"""Test that logger configuration persists."""
logger_name = "persistent_test"
# Configure logger
logger1 = logging.getLogger(logger_name)
logger1.setLevel(logging.DEBUG)
# Get same logger instance
logger2 = logging.getLogger(logger_name)
# Should be same instance with same configuration
assert logger1 is logger2
assert logger2.level == logging.DEBUG
class TestLoggerErrorHandling:
"""Test error handling in logging functionality."""
def test_logging_with_invalid_level(self):
"""Test logging with invalid level."""
logger = logging.getLogger("invalid_level_test")
# Setting invalid level should not crash
try:
logger.setLevel("INVALID_LEVEL")
except (ValueError, TypeError):
# Expected to raise an exception
pass
def test_logging_to_readonly_file(self):
"""Test logging to read-only file."""
with tempfile.NamedTemporaryFile(delete=False) as temp_file:
temp_file.write(b"existing content")
temp_file_path = temp_file.name
try:
# Make file read-only
os.chmod(temp_file_path, 0o444)
# Try to create file handler - should handle gracefully
try:
handler = logging.FileHandler(temp_file_path)
handler.close()
except PermissionError:
# Expected behavior
pass
finally:
# Clean up
try:
os.chmod(temp_file_path, 0o666)
os.unlink(temp_file_path)
except:
pass
def test_logging_with_missing_directory(self):
"""Test logging to file in non-existent directory."""
non_existent_path = "/non/existent/directory/test.log"
# Should handle missing directory gracefully
try:
handler = logging.FileHandler(non_existent_path)
handler.close()
except (FileNotFoundError, OSError):
# Expected behavior
pass
if __name__ == "__main__":
pytest.main([__file__, "-v"])

View File

@ -1,551 +0,0 @@
"""
Unit tests for environment configuration, error handling, and modular architecture.
Tests configuration loading, centralized error handling, module structure,
and architectural component integration.
"""
import json
import os
import sys
import tempfile
from unittest.mock import Mock, patch
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
# Import after path setup
from src.server.fastapi_app import Settings # noqa: E402
@pytest.mark.unit
class TestEnvironmentConfiguration:
"""Test environment configuration loading and validation."""
def test_settings_default_values(self):
"""Test that settings have appropriate default values."""
settings = Settings()
# Test that defaults are set
assert settings.jwt_secret_key is not None
assert settings.password_salt is not None
assert settings.token_expiry_hours > 0
assert settings.database_url is not None
assert settings.log_level in ["DEBUG", "INFO", "WARNING", "ERROR", "FATAL"]
def test_settings_from_environment(self):
"""Test loading settings from environment variables."""
env_vars = {
'JWT_SECRET_KEY': 'test-jwt-secret',
'PASSWORD_SALT': 'test-salt',
'MASTER_PASSWORD_HASH': 'test-hash',
'SESSION_TIMEOUT_HOURS': '12',
'ANIME_DIRECTORY': '/test/anime',
'LOG_LEVEL': 'DEBUG',
'DATABASE_URL': 'sqlite:///test.db',
'CORS_ORIGINS': 'localhost:3000',
'API_RATE_LIMIT': '50',
'DEFAULT_PROVIDER': 'test.provider',
'PROVIDER_TIMEOUT': '15',
'RETRY_ATTEMPTS': '5'
}
with patch.dict(os.environ, env_vars):
settings = Settings()
assert settings.jwt_secret_key == 'test-jwt-secret'
assert settings.password_salt == 'test-salt'
assert settings.master_password_hash == 'test-hash'
assert settings.token_expiry_hours == 12
assert settings.anime_directory == '/test/anime'
assert settings.log_level == 'DEBUG'
assert settings.database_url == 'sqlite:///test.db'
assert settings.cors_origins == 'localhost:3000'
assert settings.api_rate_limit == 50
assert settings.default_provider == 'test.provider'
assert settings.provider_timeout == 15
assert settings.retry_attempts == 5
def test_settings_validation(self):
"""Test settings validation for invalid values."""
# Test with invalid timeout hours
with patch.dict(os.environ, {'SESSION_TIMEOUT_HOURS': '-1'}):
settings = Settings()
# Should handle invalid values gracefully or use defaults
assert settings.token_expiry_hours >= 0
# Test with invalid retry attempts
with patch.dict(os.environ, {'RETRY_ATTEMPTS': '0'}):
settings = Settings()
# Should ensure minimum retry attempts
assert settings.retry_attempts >= 0
def test_configuration_file_loading(self):
"""Test loading configuration from file."""
config_data = {
"jwt_secret_key": "file-secret",
"anime_directory": "/file/anime/path",
"log_level": "INFO"
}
with tempfile.NamedTemporaryFile(mode='w', suffix='.json', delete=False) as f:
json.dump(config_data, f)
config_file = f.name
try:
def load_config_from_file(file_path):
"""Mock function to load config from file."""
if os.path.exists(file_path):
with open(file_path, 'r') as f:
return json.load(f)
return {}
loaded_config = load_config_from_file(config_file)
assert loaded_config['jwt_secret_key'] == 'file-secret'
assert loaded_config['anime_directory'] == '/file/anime/path'
assert loaded_config['log_level'] == 'INFO'
finally:
os.unlink(config_file)
def test_configuration_precedence(self):
"""Test configuration precedence (env vars override defaults)."""
# Environment variable should override default
with patch.dict(os.environ, {'JWT_SECRET_KEY': 'env-override'}):
settings = Settings()
assert settings.jwt_secret_key == 'env-override'
# Default should be used when env var is not set
with patch.dict(os.environ, {}, clear=True):
settings = Settings()
assert settings.jwt_secret_key == "your-secret-key-here" # Default value
@pytest.mark.unit
class TestErrorHandling:
"""Test centralized error handling functionality."""
def test_custom_exception_creation(self):
"""Test creation and usage of custom exceptions."""
# Import custom exceptions if they exist
try:
from src.core.exceptions.Exceptions import ( # noqa: F401
MatchNotFoundError,
NoKeyFoundException,
)
# Test exception creation
key_error = NoKeyFoundException("Key not found")
assert str(key_error) == "Key not found"
assert isinstance(key_error, Exception)
match_error = MatchNotFoundError("No match found")
assert str(match_error) == "No match found"
assert isinstance(match_error, Exception)
except ImportError:
# If custom exceptions don't exist, test generic exception handling
class CustomError(Exception):
pass
error = CustomError("Test error")
assert str(error) == "Test error"
def test_error_logging_and_reporting(self):
"""Test error logging and reporting functionality."""
def log_error(error, context=None):
"""Mock error logging function."""
return {
"error_type": type(error).__name__,
"error_message": str(error),
"context": context or {},
"logged": True
}
# Test basic error logging
test_error = ValueError("Test value error")
result = log_error(test_error)
assert result["error_type"] == "ValueError"
assert result["error_message"] == "Test value error"
assert result["logged"] is True
# Test error logging with context
context = {"user": "test_user", "action": "download"}
result = log_error(test_error, context)
assert result["context"] == context
def test_error_response_formatting(self):
"""Test error response formatting for APIs."""
def format_error_response(error, status_code=500):
"""Format error for API response."""
return {
"success": False,
"error": str(error),
"code": type(error).__name__,
"status_code": status_code
}
# Test various error types
errors = [
(ValueError("Invalid input"), 400),
(FileNotFoundError("File not found"), 404),
(PermissionError("Access denied"), 403),
(Exception("Server error"), 500)
]
for error, expected_code in errors:
response = format_error_response(error, expected_code)
assert response["success"] is False
assert response["error"] == str(error)
assert response["code"] == type(error).__name__
assert response["status_code"] == expected_code
def test_error_recovery_strategies(self):
"""Test error recovery strategy implementation."""
def execute_with_recovery(func, recovery_strategies=None):
"""Execute function with recovery strategies."""
if recovery_strategies is None:
recovery_strategies = []
try:
return func()
except Exception as e:
for strategy in recovery_strategies:
try:
return strategy(e)
except Exception:
continue
raise e
# Test successful execution
success_func = lambda: "success"
result = execute_with_recovery(success_func)
assert result == "success"
# Test with recovery strategy
def failing_func():
raise ValueError("Test error")
def recovery_strategy(error):
return f"recovered from {type(error).__name__}"
result = execute_with_recovery(failing_func, [recovery_strategy])
assert result == "recovered from ValueError"
@pytest.mark.unit
class TestModularArchitecture:
"""Test modular architecture components and integration."""
def test_provider_factory_pattern(self):
"""Test provider factory pattern implementation."""
def create_provider_factory():
"""Mock provider factory implementation."""
class ProviderFactory:
def __init__(self):
self.providers = {}
def register_provider(self, name, provider_class):
self.providers[name] = provider_class
def get_provider(self, name):
if name not in self.providers:
raise ValueError(f"Provider {name} not found")
return self.providers[name]()
def list_providers(self):
return list(self.providers.keys())
return ProviderFactory()
# Test factory functionality
factory = create_provider_factory()
# Mock provider classes
class TestProvider:
def get_name(self):
return "test_provider"
class AnotherProvider:
def get_name(self):
return "another_provider"
# Register providers
factory.register_provider("test", TestProvider)
factory.register_provider("another", AnotherProvider)
# Test provider retrieval
provider = factory.get_provider("test")
assert provider.get_name() == "test_provider"
# Test provider listing
providers = factory.list_providers()
assert "test" in providers
assert "another" in providers
# Test error for unknown provider
with pytest.raises(ValueError):
factory.get_provider("unknown")
def test_dependency_injection_pattern(self):
"""Test dependency injection pattern implementation."""
class ServiceContainer:
def __init__(self):
self.services = {}
self.singletons = {}
def register(self, name, service_class, singleton=False):
self.services[name] = {
'class': service_class,
'singleton': singleton
}
def get(self, name):
if name not in self.services:
raise ValueError(f"Service {name} not registered")
service_info = self.services[name]
if service_info['singleton']:
if name not in self.singletons:
self.singletons[name] = service_info['class']()
return self.singletons[name]
else:
return service_info['class']()
# Test container functionality
container = ServiceContainer()
# Mock services
class DatabaseService:
def connect(self):
return "connected"
class LoggingService:
def log(self, message):
return f"logged: {message}"
# Register services
container.register("database", DatabaseService, singleton=True)
container.register("logging", LoggingService, singleton=False)
# Test singleton behavior
db1 = container.get("database")
db2 = container.get("database")
assert db1 is db2 # Same instance
# Test non-singleton behavior
log1 = container.get("logging")
log2 = container.get("logging")
assert log1 is not log2 # Different instances
def test_repository_pattern(self):
"""Test repository pattern implementation."""
class BaseRepository:
def __init__(self, data_source):
self.data_source = data_source
def find_all(self):
return self.data_source.get_all()
def find_by_id(self, entity_id):
return self.data_source.get_by_id(entity_id)
def save(self, entity):
return self.data_source.save(entity)
def delete(self, entity_id):
return self.data_source.delete(entity_id)
class AnimeRepository(BaseRepository):
def find_by_genre(self, genre):
all_anime = self.find_all()
return [anime for anime in all_anime if anime.get('genre') == genre]
# Mock data source
class MockDataSource:
def __init__(self):
self.data = {
1: {"id": 1, "title": "Anime 1", "genre": "Action"},
2: {"id": 2, "title": "Anime 2", "genre": "Romance"}
}
def get_all(self):
return list(self.data.values())
def get_by_id(self, entity_id):
return self.data.get(entity_id)
def save(self, entity):
entity_id = len(self.data) + 1
entity["id"] = entity_id
self.data[entity_id] = entity
return entity
def delete(self, entity_id):
return self.data.pop(entity_id, None)
# Test repository functionality
data_source = MockDataSource()
repo = AnimeRepository(data_source)
# Test find operations
all_anime = repo.find_all()
assert len(all_anime) == 2
anime = repo.find_by_id(1)
assert anime["title"] == "Anime 1"
action_anime = repo.find_by_genre("Action")
assert len(action_anime) == 1
assert action_anime[0]["title"] == "Anime 1"
# Test save operation
new_anime = {"title": "New Anime", "genre": "Comedy"}
saved = repo.save(new_anime)
assert saved["id"] == 3
# Test delete operation
deleted = repo.delete(1)
assert deleted["title"] == "Anime 1"
assert repo.find_by_id(1) is None
@pytest.mark.unit
class TestModuleIntegration:
"""Test integration between different modules."""
def test_service_layer_integration(self):
"""Test integration between service layer components."""
class AnimeService:
def __init__(self, repository, provider):
self.repository = repository
self.provider = provider
def search_and_save(self, query):
# Search using provider
results = self.provider.search(query)
# Save results using repository
saved_results = []
for result in results:
saved = self.repository.save(result)
saved_results.append(saved)
return saved_results
# Mock dependencies
mock_repository = Mock()
mock_repository.save.side_effect = lambda x: {**x, "id": 1}
mock_provider = Mock()
mock_provider.search.return_value = [
{"title": "Found Anime", "genre": "Action"}
]
# Test service integration
service = AnimeService(mock_repository, mock_provider)
results = service.search_and_save("test query")
assert len(results) == 1
assert results[0]["title"] == "Found Anime"
assert results[0]["id"] == 1
mock_provider.search.assert_called_once_with("test query")
mock_repository.save.assert_called_once()
def test_cross_module_event_handling(self):
"""Test event handling across modules."""
class EventBus:
def __init__(self):
self.listeners = {}
def subscribe(self, event_type, listener):
if event_type not in self.listeners:
self.listeners[event_type] = []
self.listeners[event_type].append(listener)
def publish(self, event_type, data):
if event_type in self.listeners:
for listener in self.listeners[event_type]:
listener(data)
# Test event bus functionality
event_bus = EventBus()
# Mock event listeners
listener1_calls = []
listener2_calls = []
def listener1(data):
listener1_calls.append(data)
def listener2(data):
listener2_calls.append(data)
# Subscribe to events
event_bus.subscribe("anime_downloaded", listener1)
event_bus.subscribe("anime_downloaded", listener2)
# Publish event
event_data = {"anime_id": 123, "status": "completed"}
event_bus.publish("anime_downloaded", event_data)
# Verify listeners were called
assert len(listener1_calls) == 1
assert len(listener2_calls) == 1
assert listener1_calls[0] == event_data
assert listener2_calls[0] == event_data
def test_configuration_module_integration(self):
"""Test integration with configuration module."""
class ConfigManager:
def __init__(self):
self.config = {}
self.observers = []
def set(self, key, value):
old_value = self.config.get(key)
self.config[key] = value
# Notify observers of change
for observer in self.observers:
observer(key, old_value, value)
def get(self, key, default=None):
return self.config.get(key, default)
def add_observer(self, observer):
self.observers.append(observer)
# Test configuration management
config_manager = ConfigManager()
# Mock observer
config_changes = []
def config_observer(key, old_value, new_value):
config_changes.append({
"key": key,
"old": old_value,
"new": new_value
})
config_manager.add_observer(config_observer)
# Test configuration changes
config_manager.set("anime_directory", "/old/path")
config_manager.set("anime_directory", "/new/path")
assert len(config_changes) == 2
assert config_changes[0]["key"] == "anime_directory"
assert config_changes[0]["old"] is None
assert config_changes[0]["new"] == "/old/path"
assert config_changes[1]["old"] == "/old/path"
assert config_changes[1]["new"] == "/new/path"

View File

@ -1,375 +0,0 @@
"""
Unit tests for system metrics gathering functionality.
Tests CPU, memory, disk usage collection, performance monitoring,
and system health assessment logic.
"""
import os
import sys
from datetime import datetime
from unittest.mock import Mock, patch
import pytest
# Add source directory to path
sys.path.insert(0, os.path.join(os.path.dirname(__file__), '..', '..', '..'))
@pytest.mark.unit
class TestSystemMetricsCollection:
"""Test system metrics collection functionality."""
def test_cpu_usage_collection(self):
"""Test CPU usage metrics collection."""
with patch('psutil.cpu_percent') as mock_cpu:
mock_cpu.return_value = 45.5
# Mock function that would collect CPU metrics
def get_cpu_usage():
import psutil
return psutil.cpu_percent(interval=1)
cpu_usage = get_cpu_usage()
assert isinstance(cpu_usage, (int, float))
assert 0 <= cpu_usage <= 100
mock_cpu.assert_called_once_with(interval=1)
def test_memory_usage_collection(self):
"""Test memory usage metrics collection."""
with patch('psutil.virtual_memory') as mock_memory:
mock_memory_obj = Mock()
mock_memory_obj.total = 8 * 1024**3 # 8GB
mock_memory_obj.available = 4 * 1024**3 # 4GB available
mock_memory_obj.percent = 50.0
mock_memory.return_value = mock_memory_obj
def get_memory_usage():
import psutil
mem = psutil.virtual_memory()
return {
'total': mem.total,
'available': mem.available,
'percent': mem.percent
}
memory_info = get_memory_usage()
assert 'total' in memory_info
assert 'available' in memory_info
assert 'percent' in memory_info
assert memory_info['total'] > 0
assert memory_info['available'] >= 0
assert 0 <= memory_info['percent'] <= 100
def test_disk_usage_collection(self):
"""Test disk usage metrics collection."""
with patch('psutil.disk_usage') as mock_disk:
mock_disk_obj = Mock()
mock_disk_obj.total = 500 * 1024**3 # 500GB
mock_disk_obj.used = 300 * 1024**3 # 300GB used
mock_disk_obj.free = 200 * 1024**3 # 200GB free
mock_disk.return_value = mock_disk_obj
def get_disk_usage(path="/"):
import psutil
disk = psutil.disk_usage(path)
return {
'total': disk.total,
'used': disk.used,
'free': disk.free,
'percent': (disk.used / disk.total) * 100
}
disk_info = get_disk_usage()
assert 'total' in disk_info
assert 'used' in disk_info
assert 'free' in disk_info
assert 'percent' in disk_info
assert disk_info['total'] > 0
assert disk_info['used'] >= 0
assert disk_info['free'] >= 0
assert 0 <= disk_info['percent'] <= 100
def test_network_metrics_collection(self):
"""Test network metrics collection."""
with patch('psutil.net_io_counters') as mock_net:
mock_net_obj = Mock()
mock_net_obj.bytes_sent = 1024 * 1024 * 100 # 100MB sent
mock_net_obj.bytes_recv = 1024 * 1024 * 200 # 200MB received
mock_net_obj.packets_sent = 1000
mock_net_obj.packets_recv = 2000
mock_net.return_value = mock_net_obj
def get_network_stats():
import psutil
net = psutil.net_io_counters()
return {
'bytes_sent': net.bytes_sent,
'bytes_recv': net.bytes_recv,
'packets_sent': net.packets_sent,
'packets_recv': net.packets_recv
}
net_stats = get_network_stats()
assert 'bytes_sent' in net_stats
assert 'bytes_recv' in net_stats
assert 'packets_sent' in net_stats
assert 'packets_recv' in net_stats
assert all(val >= 0 for val in net_stats.values())
@pytest.mark.unit
class TestPerformanceMonitoring:
"""Test performance monitoring functionality."""
def test_response_time_tracking(self):
"""Test response time measurement."""
def measure_response_time():
import time
start_time = time.time()
# Simulate some work
time.sleep(0.001) # 1ms
end_time = time.time()
return (end_time - start_time) * 1000 # Convert to milliseconds
response_time = measure_response_time()
assert isinstance(response_time, float)
assert response_time > 0
assert response_time < 1000 # Should be less than 1 second
def test_throughput_calculation(self):
"""Test throughput calculation."""
def calculate_throughput(requests_count, time_period):
if time_period <= 0:
return 0
return requests_count / time_period
# Test normal case
throughput = calculate_throughput(100, 10) # 100 requests in 10 seconds
assert throughput == 10.0
# Test edge cases
assert calculate_throughput(0, 10) == 0
assert calculate_throughput(100, 0) == 0
assert calculate_throughput(100, -1) == 0
def test_error_rate_calculation(self):
"""Test error rate calculation."""
def calculate_error_rate(error_count, total_requests):
if total_requests <= 0:
return 0
return (error_count / total_requests) * 100
# Test normal cases
error_rate = calculate_error_rate(5, 100) # 5 errors out of 100 requests
assert error_rate == 5.0
error_rate = calculate_error_rate(0, 100) # No errors
assert error_rate == 0.0
# Test edge cases
assert calculate_error_rate(5, 0) == 0 # No requests
assert calculate_error_rate(0, 0) == 0 # No requests, no errors
def test_health_status_determination(self):
"""Test health status determination logic."""
def determine_health_status(cpu_usage, memory_usage, disk_usage, error_rate):
if error_rate > 10:
return "unhealthy"
elif cpu_usage > 90 or memory_usage > 90 or disk_usage > 95:
return "degraded"
elif cpu_usage > 70 or memory_usage > 70 or disk_usage > 80:
return "warning"
else:
return "healthy"
# Test healthy status
status = determine_health_status(50, 60, 70, 1)
assert status == "healthy"
# Test warning status
status = determine_health_status(75, 60, 70, 1)
assert status == "warning"
# Test degraded status
status = determine_health_status(95, 60, 70, 1)
assert status == "degraded"
# Test unhealthy status
status = determine_health_status(50, 60, 70, 15)
assert status == "unhealthy"
@pytest.mark.unit
class TestSystemHealthAssessment:
"""Test system health assessment logic."""
def test_service_dependency_check(self):
"""Test service dependency health checking."""
def check_service_health(service_name, check_function):
try:
result = check_function()
return {
"service": service_name,
"status": "healthy" if result else "unhealthy",
"last_check": datetime.utcnow().isoformat()
}
except ConnectionError as e:
return {
"service": service_name,
"status": "error",
"error": str(e),
"last_check": datetime.utcnow().isoformat()
}
# Test healthy service
def healthy_service():
return True
result = check_service_health("test_service", healthy_service)
assert result["status"] == "healthy"
assert result["service"] == "test_service"
assert "last_check" in result
# Test unhealthy service
def unhealthy_service():
return False
result = check_service_health("test_service", unhealthy_service)
assert result["status"] == "unhealthy"
# Test service with error
def error_service():
raise ConnectionError("Service connection failed")
result = check_service_health("test_service", error_service)
assert result["status"] == "error"
assert "error" in result
def test_database_connection_health(self):
"""Test database connection health check."""
def check_database_connection(connection_string):
# Mock database connection check
if "invalid" in connection_string:
raise ConnectionError("Connection failed")
return {
"connected": True,
"response_time_ms": 15,
"connection_pool_size": 10,
"active_connections": 3
}
# Test successful connection
result = check_database_connection("sqlite:///test.db")
assert result["connected"] is True
assert result["response_time_ms"] > 0
assert result["connection_pool_size"] > 0
# Test failed connection
with pytest.raises(ConnectionError):
check_database_connection("invalid://connection")
def test_metrics_aggregation(self):
"""Test metrics aggregation functionality."""
def aggregate_metrics(metrics_list):
if not metrics_list:
return {}
# Simple aggregation - calculate averages
aggregated = {}
for key in metrics_list[0].keys():
if isinstance(metrics_list[0][key], (int, float)):
values = [m[key] for m in metrics_list if key in m]
aggregated[key] = {
"avg": sum(values) / len(values),
"min": min(values),
"max": max(values),
"count": len(values)
}
return aggregated
# Test metrics aggregation
metrics = [
{"cpu": 50, "memory": 60},
{"cpu": 60, "memory": 70},
{"cpu": 40, "memory": 50}
]
result = aggregate_metrics(metrics)
assert "cpu" in result
assert "memory" in result
assert result["cpu"]["avg"] == 50.0
assert result["cpu"]["min"] == 40
assert result["cpu"]["max"] == 60
assert result["memory"]["avg"] == 60.0
# Test empty metrics
empty_result = aggregate_metrics([])
assert empty_result == {}
@pytest.mark.unit
class TestHealthCheckUtilities:
"""Test health check utility functions."""
def test_format_bytes(self):
"""Test byte formatting utility."""
def format_bytes(bytes_value):
for unit in ['B', 'KB', 'MB', 'GB', 'TB']:
if bytes_value < 1024.0:
return f"{bytes_value:.1f} {unit}"
bytes_value /= 1024.0
return f"{bytes_value:.1f} PB"
assert format_bytes(512) == "512.0 B"
assert format_bytes(1024) == "1.0 KB"
assert format_bytes(1024 * 1024) == "1.0 MB"
assert format_bytes(1024 * 1024 * 1024) == "1.0 GB"
def test_timestamp_formatting(self):
"""Test timestamp formatting for health checks."""
def format_timestamp(dt=None):
if dt is None:
dt = datetime.utcnow()
return dt.isoformat() + "Z"
# Test with current time
timestamp = format_timestamp()
assert timestamp.endswith("Z")
assert "T" in timestamp
# Test with specific time
specific_time = datetime(2023, 1, 1, 12, 0, 0)
timestamp = format_timestamp(specific_time)
assert timestamp.startswith("2023-01-01T12:00:00")
def test_health_status_priority(self):
"""Test health status priority determination."""
def get_highest_priority_status(statuses):
priority = {
"healthy": 0,
"warning": 1,
"degraded": 2,
"unhealthy": 3,
"error": 4
}
if not statuses:
return "unknown"
highest = max(statuses, key=lambda s: priority.get(s, -1))
return highest
# Test various combinations
assert get_highest_priority_status(["healthy", "healthy"]) == "healthy"
assert get_highest_priority_status(["healthy", "warning"]) == "warning"
assert get_highest_priority_status(["warning", "degraded"]) == "degraded"
assert get_highest_priority_status(["healthy", "error"]) == "error"
assert get_highest_priority_status([]) == "unknown"