|
import {
|
|
resolve_root,
|
|
get_jwt,
|
|
determine_protocol,
|
|
parse_and_set_cookies
|
|
} from "../helpers/init_helpers";
|
|
import { initialise_server } from "./server";
|
|
import { beforeAll, afterEach, afterAll, it, expect, describe } from "vitest";
|
|
import { Client } from "../client";
|
|
import { INVALID_CREDENTIALS_MSG, MISSING_CREDENTIALS_MSG } from "../constants";
|
|
|
|
const server = initialise_server();
|
|
|
|
beforeAll(() => server.listen());
|
|
afterEach(() => server.resetHandlers());
|
|
afterAll(() => server.close());
|
|
|
|
describe("resolve_root", () => {
|
|
it('should return the base URL if the root path starts with "http://"', () => {
|
|
const base_url = "https://huggingface.co";
|
|
const root_path = "https://hmb-hello-world.hf.space";
|
|
const prioritize_base = true;
|
|
const result = resolve_root(base_url, root_path, prioritize_base);
|
|
expect(result).toBe(base_url);
|
|
});
|
|
|
|
it('should return the base URL if the root path starts with "https://"', () => {
|
|
const base_url = "https://huggingface.co";
|
|
const root_path = "https://hmb-hello-world.hf.space";
|
|
const prioritize_base = true;
|
|
const result = resolve_root(base_url, root_path, prioritize_base);
|
|
expect(result).toBe(base_url);
|
|
});
|
|
});
|
|
|
|
describe("get_jwt", () => {
|
|
it("should return a valid JWT token when the API call is successful", async () => {
|
|
const space = "hmb/hello_world";
|
|
const token = "hf_123";
|
|
const expected_jwt = "jwt_123";
|
|
|
|
const result = await get_jwt(space, token);
|
|
|
|
expect(result).toBe(expected_jwt);
|
|
});
|
|
|
|
it("should return false when the API call fails", async () => {
|
|
const space = "hmb/bye_world";
|
|
const token = "hf_123";
|
|
|
|
const result = await get_jwt(space, token);
|
|
|
|
expect(result).toBe(false);
|
|
});
|
|
});
|
|
|
|
describe("determine_protocol", () => {
|
|
it('should return the correct protocols and host when the endpoint starts with "http"', () => {
|
|
const endpoint = "http://huggingface.co";
|
|
const result = determine_protocol(endpoint);
|
|
expect(result).toEqual({
|
|
ws_protocol: "ws",
|
|
http_protocol: "http:",
|
|
host: "huggingface.co"
|
|
});
|
|
});
|
|
|
|
it('should return the correct protocols and host when the endpoint starts with "https"', () => {
|
|
const endpoint = "https://huggingface.co";
|
|
const result = determine_protocol(endpoint);
|
|
expect(result).toEqual({
|
|
ws_protocol: "wss",
|
|
http_protocol: "https:",
|
|
host: "huggingface.co"
|
|
});
|
|
});
|
|
|
|
it('should return the correct protocols and host when the endpoint starts with "file"', () => {
|
|
const endpoint = "file:///path/to/app.html";
|
|
const result = determine_protocol(endpoint);
|
|
expect(result).toEqual({
|
|
ws_protocol: "ws",
|
|
http_protocol: "http:",
|
|
host: "lite.local"
|
|
});
|
|
});
|
|
|
|
it('should return the default protocols and host when the endpoint does not start with "http" or "file"', () => {
|
|
const endpoint = "huggingface.co";
|
|
const result = determine_protocol(endpoint);
|
|
expect(result).toEqual({
|
|
ws_protocol: "wss",
|
|
http_protocol: "https:",
|
|
host: "huggingface.co"
|
|
});
|
|
});
|
|
});
|
|
|
|
describe("parse_and_set_cookies", () => {
|
|
it("should return an empty array when the cookie header is empty", () => {
|
|
const cookie_header = "";
|
|
const result = parse_and_set_cookies(cookie_header);
|
|
expect(result).toEqual([]);
|
|
});
|
|
|
|
it("should parse the cookie header and return an array of cookies", () => {
|
|
const cookie_header = "access-token-123=abc;access-token-unsecured-456=def";
|
|
const result = parse_and_set_cookies(cookie_header);
|
|
expect(result).toEqual(["access-token-123=abc"]);
|
|
});
|
|
});
|
|
|
|
describe("resolve_cookies", () => {
|
|
it("should set the cookies when correct auth credentials are provided", async () => {
|
|
const client = await Client.connect("hmb/auth_space", {
|
|
auth: ["admin", "pass1234"]
|
|
});
|
|
|
|
const api = client.view_api();
|
|
expect((await api).named_endpoints["/predict"]).toBeDefined();
|
|
});
|
|
|
|
it("should connect to a private and authenticated space", async () => {
|
|
const client = await Client.connect("hmb/private_auth_space", {
|
|
hf_token: "hf_123",
|
|
auth: ["admin", "pass1234"]
|
|
});
|
|
|
|
const api = client.view_api();
|
|
expect((await api).named_endpoints["/predict"]).toBeDefined();
|
|
});
|
|
|
|
it("should not set the cookies when auth credentials are invalid", async () => {
|
|
await expect(
|
|
Client.connect("hmb/invalid_auth_space", {
|
|
auth: ["admin", "wrong_password"]
|
|
})
|
|
).rejects.toThrowError(INVALID_CREDENTIALS_MSG);
|
|
});
|
|
|
|
it("should not set the cookies when auth option is not provided in an auth space", async () => {
|
|
await expect(Client.connect("hmb/unauth_space")).rejects.toThrowError(
|
|
MISSING_CREDENTIALS_MSG
|
|
);
|
|
});
|
|
});
|
|
|