t/plugin/ai-aws-content-moderation.t (63 lines of code) (raw):

# # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to You under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # use t::APISIX 'no_plan'; log_level("info"); repeat_each(1); no_long_string(); no_root_location(); add_block_preprocessor(sub { my ($block) = @_; if (!defined $block->request) { $block->set_value("request", "GET /t"); } my $main_config = $block->main_config // <<_EOC_; env AWS_REGION=us-east-1; _EOC_ $block->set_value("main_config", $main_config); my $http_config = $block->http_config // <<_EOC_; server { listen 2668; default_type 'application/json'; location / { content_by_lua_block { local json = require("cjson.safe") local open = io.open local f = open('t/assets/content-moderation-responses.json', "r") local resp = f:read("*a") f:close() if not resp then ngx.status(503) ngx.say("[INTERNAL FAILURE]: failed to open response.json file") end local responses = json.decode(resp) if not responses then ngx.status(503) ngx.say("[INTERNAL FAILURE]: failed to decode response.json contents") end if ngx.req.get_method() ~= "POST" then ngx.status = 400 ngx.say("Unsupported request method: ", ngx.req.get_method()) end ngx.req.read_body() local body, err = ngx.req.get_body_data() if not body then ngx.status(503) ngx.say("[INTERNAL FAILURE]: failed to get request body: ", err) end body, err = json.decode(body) if not body then ngx.status(503) ngx.say("[INTERNAL FAILURE]: failed to decoded request body: ", err) end local result = body.TextSegments[1].Text local final_response = responses[result] or "invalid" if final_response == "invalid" then ngx.status = 500 end ngx.say(json.encode(final_response)) } } } _EOC_ $block->set_value("http_config", $http_config); }); run_tests(); __DATA__ === TEST 1: sanity --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "uri": "/echo", "plugins": { "ai-aws-content-moderation": { "comprehend": { "access_key_id": "access", "secret_access_key": "ea+secret", "region": "us-east-1", "endpoint": "http://localhost:2668" } } }, "upstream": { "type": "roundrobin", "nodes": { "127.0.0.1:1980": 1 } } }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 2: toxic request should fail --- request POST /echo toxic --- error_code: 400 --- response_body chomp request body exceeds toxicity threshold === TEST 3: good request should pass --- request POST /echo good_request --- error_code: 200 === TEST 4: profanity filter --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "uri": "/echo", "plugins": { "ai-aws-content-moderation": { "comprehend": { "access_key_id": "access", "secret_access_key": "ea+secret", "region": "us-east-1", "endpoint": "http://localhost:2668" }, "moderation_categories": { "PROFANITY": 0.5 } } }, "upstream": { "type": "roundrobin", "nodes": { "127.0.0.1:1980": 1 } } }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 5: profane request should fail --- request POST /echo profane --- error_code: 400 --- response_body chomp request body exceeds PROFANITY threshold === TEST 6: very profane request should also fail --- request POST /echo very_profane --- error_code: 400 --- response_body chomp request body exceeds PROFANITY threshold === TEST 7: good_request should pass --- request POST /echo good_request --- error_code: 200 === TEST 8: set profanity = 0.7 (allow profane request but disallow very_profane) --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "uri": "/echo", "plugins": { "ai-aws-content-moderation": { "comprehend": { "access_key_id": "access", "secret_access_key": "ea+secret", "region": "us-east-1", "endpoint": "http://localhost:2668" }, "moderation_categories": { "PROFANITY": 0.7 } } }, "upstream": { "type": "roundrobin", "nodes": { "127.0.0.1:1980": 1 } } }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- response_body passed === TEST 9: profane request should pass profanity check but fail toxicity check --- request POST /echo profane --- error_code: 400 --- response_body chomp request body exceeds toxicity threshold === TEST 10: profane_but_not_toxic request should pass --- request POST /echo profane_but_not_toxic --- error_code: 200 === TEST 11: but very profane request will fail --- request POST /echo very_profane --- error_code: 400 --- response_body chomp request body exceeds PROFANITY threshold === TEST 12: good_request should pass --- request POST /echo good_request --- error_code: 200