forked from opendatahub-io/opendatahub-tests
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathtest_evalhub_providers.py
More file actions
232 lines (210 loc) · 8.51 KB
/
test_evalhub_providers.py
File metadata and controls
232 lines (210 loc) · 8.51 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
import pytest
import requests
from ocp_resources.namespace import Namespace
from ocp_resources.role_binding import RoleBinding
from ocp_resources.route import Route
from tests.model_explainability.evalhub.utils import (
get_evalhub_provider,
list_evalhub_providers,
)
@pytest.mark.parametrize(
"model_namespace",
[
pytest.param(
{"name": "test-evalhub-providers"},
),
],
indirect=True,
)
@pytest.mark.sanity
@pytest.mark.model_explainability
class TestEvalHubProviders:
"""Tests for the EvalHub providers API using a scoped non-admin ServiceAccount."""
def test_list_providers_returns_paginated_response(
self,
model_namespace: Namespace,
evalhub_scoped_token: str,
evalhub_providers_role_binding: RoleBinding,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that a scoped user with providers access can list providers."""
data = list_evalhub_providers(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
tenant=model_namespace.name,
)
assert "items" in data, "Response missing 'items' field"
assert isinstance(data["items"], list), "'items' must be a list"
assert "total_count" in data, "Response missing 'total_count' field"
assert "limit" in data, "Response missing 'limit' field"
def test_list_providers_has_registered_providers(
self,
model_namespace: Namespace,
evalhub_scoped_token: str,
evalhub_providers_role_binding: RoleBinding,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that at least one provider is registered."""
data = list_evalhub_providers(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
tenant=model_namespace.name,
)
assert data["total_count"] > 0, "Expected at least one registered provider"
assert len(data["items"]) > 0, "Expected at least one provider in items"
def test_provider_has_required_fields(
self,
model_namespace: Namespace,
evalhub_scoped_token: str,
evalhub_providers_role_binding: RoleBinding,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that each provider contains the expected resource metadata and config fields."""
data = list_evalhub_providers(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
tenant=model_namespace.name,
)
for provider in data["items"]:
assert "resource" in provider, f"Provider missing 'resource': {provider}"
assert "id" in provider["resource"], f"Provider resource missing 'id': {provider}"
assert provider["resource"]["id"], "Provider ID must not be empty"
assert "name" in provider, f"Provider missing 'name': {provider}"
assert "benchmarks" in provider, f"Provider missing 'benchmarks': {provider}"
def test_provider_benchmarks_have_required_fields(
self,
model_namespace: Namespace,
evalhub_scoped_token: str,
evalhub_providers_role_binding: RoleBinding,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that benchmarks within each provider have id, name, and category."""
data = list_evalhub_providers(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
tenant=model_namespace.name,
)
for provider in data["items"]:
provider_name = provider.get("name", "unknown")
for benchmark in provider.get("benchmarks", []):
assert "id" in benchmark, f"Benchmark in provider '{provider_name}' missing 'id'"
assert "name" in benchmark, f"Benchmark in provider '{provider_name}' missing 'name'"
assert "category" in benchmark, f"Benchmark in provider '{provider_name}' missing 'category'"
def test_lm_evaluation_harness_provider_exists(
self,
model_namespace: Namespace,
evalhub_scoped_token: str,
evalhub_providers_role_binding: RoleBinding,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that the lm_evaluation_harness provider is registered and has benchmarks."""
data = list_evalhub_providers(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
tenant=model_namespace.name,
)
provider_ids = [p["resource"]["id"] for p in data["items"]]
assert "lm_evaluation_harness" in provider_ids, (
f"Expected 'lm_evaluation_harness' in providers, got: {provider_ids}"
)
lmeval_provider = next(p for p in data["items"] if p["resource"]["id"] == "lm_evaluation_harness")
assert len(lmeval_provider["benchmarks"]) > 0, (
"lm_evaluation_harness provider should have at least one benchmark"
)
def test_get_single_provider(
self,
model_namespace: Namespace,
evalhub_scoped_token: str,
evalhub_providers_role_binding: RoleBinding,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that a single provider can be retrieved by ID."""
providers = list_evalhub_providers(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
tenant=model_namespace.name,
)
first_provider_id = providers["items"][0]["resource"]["id"]
data = get_evalhub_provider(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
provider_id=first_provider_id,
tenant=model_namespace.name,
)
assert data["resource"]["id"] == first_provider_id
assert "name" in data
assert "benchmarks" in data
def test_get_nonexistent_provider_returns_error(
self,
model_namespace: Namespace,
evalhub_scoped_token: str,
evalhub_providers_role_binding: RoleBinding,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that requesting a non-existent provider ID returns an HTTP error."""
with pytest.raises(requests.exceptions.HTTPError):
get_evalhub_provider(
host=evalhub_route.host,
token=evalhub_scoped_token,
ca_bundle_file=evalhub_ca_bundle_file,
provider_id="nonexistent-provider-id",
tenant=model_namespace.name,
)
@pytest.mark.parametrize(
"model_namespace",
[
pytest.param(
{"name": "test-evalhub-providers"},
),
],
indirect=True,
)
@pytest.mark.sanity
@pytest.mark.model_explainability
class TestEvalHubProvidersUnauthorised:
"""Tests verifying that a user without providers RBAC is denied access."""
def test_list_providers_denied_without_role_binding(
self,
model_namespace: Namespace,
evalhub_unauthorised_token: str,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that a user without providers ClusterRole binding gets 403."""
with pytest.raises(requests.exceptions.HTTPError, match="403"):
list_evalhub_providers(
host=evalhub_route.host,
token=evalhub_unauthorised_token,
ca_bundle_file=evalhub_ca_bundle_file,
tenant=model_namespace.name,
)
def test_get_provider_denied_without_role_binding(
self,
model_namespace: Namespace,
evalhub_unauthorised_token: str,
evalhub_ca_bundle_file: str,
evalhub_route: Route,
) -> None:
"""Verify that a user without providers ClusterRole binding cannot get a provider."""
with pytest.raises(requests.exceptions.HTTPError, match="403"):
get_evalhub_provider(
host=evalhub_route.host,
token=evalhub_unauthorised_token,
ca_bundle_file=evalhub_ca_bundle_file,
provider_id="lm_evaluation_harness",
tenant=model_namespace.name,
)