Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 11 additions & 0 deletions crates/transcribe-proxy/src/config.rs
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@ pub struct SttProxyConfig {
pub default_provider: Provider,
pub connect_timeout: Duration,
pub analytics: Option<Arc<dyn SttAnalyticsReporter>>,
pub upstream_urls: HashMap<Provider, String>,
}

impl SttProxyConfig {
Expand All @@ -23,6 +24,7 @@ impl SttProxyConfig {
default_provider: Provider::Deepgram,
connect_timeout: Duration::from_millis(DEFAULT_CONNECT_TIMEOUT_MS),
analytics: None,
upstream_urls: HashMap::new(),
}
}

Expand All @@ -41,7 +43,16 @@ impl SttProxyConfig {
self
}

pub fn with_upstream_url(mut self, provider: Provider, url: impl Into<String>) -> Self {
self.upstream_urls.insert(provider, url.into());
self
}

pub fn api_key_for(&self, provider: Provider) -> Option<&str> {
self.api_keys.get(&provider).map(|s| s.as_str())
}

pub fn upstream_url_for(&self, provider: Provider) -> Option<&str> {
self.upstream_urls.get(&provider).map(|s| s.as_str())
}
}
102 changes: 46 additions & 56 deletions crates/transcribe-proxy/src/routes/streaming.rs
Original file line number Diff line number Diff line change
Expand Up @@ -38,20 +38,24 @@ pub async fn handler(

let provider = resolved.provider();

let proxy = match provider.auth() {
Auth::SessionInit { header_name } => {
let url = match init_session(&state, &resolved, header_name, &params).await {
Ok(url) => url,
Err(e) => {
tracing::error!(error = %e, "failed to init session");
return (StatusCode::BAD_GATEWAY, e).into_response();
}
};
build_proxy_with_url(&resolved, &url, &state.config)
}
_ => {
let base = url::Url::parse(&provider.default_ws_url()).unwrap();
build_proxy_with_components(&resolved, base, params, &state.config)
let proxy = if let Some(custom_url) = state.config.upstream_url_for(provider) {
build_proxy_with_url(&resolved, custom_url, &state.config)
} else {
match provider.auth() {
Auth::SessionInit { header_name } => {
let url = match init_session(&state, &resolved, header_name, &params).await {
Ok(url) => url,
Err(e) => {
tracing::error!(error = %e, "failed to init session");
return (StatusCode::BAD_GATEWAY, e).into_response();
}
};
build_proxy_with_url(&resolved, &url, &state.config)
}
_ => {
let base = url::Url::parse(&provider.default_ws_url()).unwrap();
build_proxy_with_components(&resolved, base, params, &state.config)
}
}
};

Expand Down Expand Up @@ -114,6 +118,32 @@ async fn init_session(
Ok(init.url)
}

macro_rules! finalize_proxy_builder {
($builder:expr, $provider:expr, $config:expr) => {
match &$config.analytics {
Some(analytics) => {
let analytics = analytics.clone();
let provider_name = format!("{:?}", $provider).to_lowercase();
$builder
.on_close(move |duration| {
let analytics = analytics.clone();
let provider_name = provider_name.clone();
async move {
analytics
.report_stt(SttEvent {
provider: provider_name,
duration,
})
.await;
}
})
.build()
}
None => $builder.build(),
}
};
}

fn build_proxy_with_url(
resolved: &ResolvedProvider,
upstream_url: &str,
Expand All @@ -126,27 +156,7 @@ fn build_proxy_with_url(
.control_message_types(provider.control_message_types())
.apply_auth(resolved);

match &config.analytics {
Some(analytics) => {
let analytics = analytics.clone();
let provider_name = format!("{:?}", provider).to_lowercase();
builder
.on_close(move |duration| {
let analytics = analytics.clone();
let provider_name = provider_name.clone();
async move {
analytics
.report_stt(SttEvent {
provider: provider_name,
duration,
})
.await;
}
})
.build()
}
None => builder.build(),
}
finalize_proxy_builder!(builder, provider, config)
}

fn build_proxy_with_components(
Expand All @@ -162,25 +172,5 @@ fn build_proxy_with_components(
.control_message_types(provider.control_message_types())
.apply_auth(resolved);

match &config.analytics {
Some(analytics) => {
let analytics = analytics.clone();
let provider_name = format!("{:?}", provider).to_lowercase();
builder
.on_close(move |duration| {
let analytics = analytics.clone();
let provider_name = provider_name.clone();
async move {
analytics
.report_stt(SttEvent {
provider: provider_name,
duration,
})
.await;
}
})
.build()
}
None => builder.build(),
}
finalize_proxy_builder!(builder, provider, config)
}
14 changes: 14 additions & 0 deletions crates/transcribe-proxy/tests/common/fixtures.rs
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
use std::path::PathBuf;

use super::recording::WsRecording;

pub fn fixtures_dir() -> PathBuf {
PathBuf::from(env!("CARGO_MANIFEST_DIR"))
.join("tests")
.join("fixtures")
}

pub fn load_fixture(name: &str) -> WsRecording {
let path = fixtures_dir().join(name);
WsRecording::from_jsonl_file(&path).unwrap()
}
199 changes: 199 additions & 0 deletions crates/transcribe-proxy/tests/common/mock_upstream.rs
Original file line number Diff line number Diff line change
@@ -0,0 +1,199 @@
use std::net::SocketAddr;
use std::time::Duration;

use futures_util::{SinkExt, StreamExt};
use tokio::net::{TcpListener, TcpStream};
use tokio_tungstenite::tungstenite::Message;
use tokio_tungstenite::tungstenite::protocol::CloseFrame;
use tokio_tungstenite::tungstenite::protocol::frame::coding::CloseCode;
use tokio_tungstenite::{WebSocketStream, accept_async};

use super::recording::{MessageKind, WsMessage, WsRecording};

#[derive(Debug, Clone)]
pub struct MockUpstreamConfig {
pub use_timing: bool,
pub max_delay_ms: u64,
}

impl Default for MockUpstreamConfig {
fn default() -> Self {
Self {
use_timing: false,
max_delay_ms: 1000,
}
}
}

impl MockUpstreamConfig {
pub fn use_timing(mut self, use_timing: bool) -> Self {
self.use_timing = use_timing;
self
}

pub fn max_delay_ms(mut self, max_delay_ms: u64) -> Self {
self.max_delay_ms = max_delay_ms;
self
}
}

struct MockUpstreamServer {
recording: WsRecording,
config: MockUpstreamConfig,
listener: TcpListener,
}

impl MockUpstreamServer {
async fn with_config(
recording: WsRecording,
config: MockUpstreamConfig,
) -> std::io::Result<Self> {
let listener = TcpListener::bind("127.0.0.1:0").await?;
Ok(Self {
recording,
config,
listener,
})
}

fn addr(&self) -> SocketAddr {
self.listener.local_addr().unwrap()
}

async fn accept_one(&self) -> Result<(), MockUpstreamError> {
let (stream, _) = self.listener.accept().await?;
let ws_stream = accept_async(stream).await?;
self.handle_connection(ws_stream).await
}

async fn handle_connection(
&self,
ws_stream: WebSocketStream<TcpStream>,
) -> Result<(), MockUpstreamError> {
let (mut sender, mut receiver) = ws_stream.split();

let server_messages: Vec<&WsMessage> = self
.recording
.messages
.iter()
.filter(|m| m.is_from_upstream())
.collect();

let mut last_timestamp = 0u64;
let mut msg_index = 0;

loop {
if msg_index >= server_messages.len() {
break;
}

let msg = server_messages[msg_index];

if self.config.use_timing && msg.timestamp_ms > last_timestamp {
let delay = (msg.timestamp_ms - last_timestamp).min(self.config.max_delay_ms);
tokio::time::sleep(Duration::from_millis(delay)).await;
}
last_timestamp = msg.timestamp_ms;

let ws_msg = ws_message_from_recorded(msg)?;
let is_close = matches!(msg.kind, MessageKind::Close { .. });

sender.send(ws_msg).await?;
msg_index += 1;

if is_close {
break;
}

while let Ok(Some(_)) =
tokio::time::timeout(Duration::from_millis(1), receiver.next()).await
{}
}

Ok(())
}
}

fn ws_message_from_recorded(msg: &WsMessage) -> Result<Message, MockUpstreamError> {
match &msg.kind {
MessageKind::Text => Ok(Message::Text(msg.content.clone().into())),
MessageKind::Binary => {
let data = msg.decode_binary()?;
Ok(Message::Binary(data.into()))
}
MessageKind::Close { code, reason } => Ok(Message::Close(Some(CloseFrame {
code: CloseCode::from(*code),
reason: reason.clone().into(),
}))),
MessageKind::Ping => {
let data = if msg.content.is_empty() {
vec![]
} else {
msg.decode_binary()?
};
Ok(Message::Ping(data.into()))
}
MessageKind::Pong => {
let data = if msg.content.is_empty() {
vec![]
} else {
msg.decode_binary()?
};
Ok(Message::Pong(data.into()))
}
}
}

#[derive(Debug, thiserror::Error)]
pub enum MockUpstreamError {
#[error("IO error: {0}")]
Io(#[from] std::io::Error),
#[error("WebSocket error: {0}")]
WebSocket(#[from] tokio_tungstenite::tungstenite::Error),
#[error("Base64 decode error: {0}")]
Base64(#[from] base64::DecodeError),
}

pub struct MockServerHandle {
addr: SocketAddr,
#[allow(dead_code)]
shutdown_tx: tokio::sync::oneshot::Sender<()>,
}

impl MockServerHandle {
pub fn ws_url(&self) -> String {
format!("ws://{}", self.addr)
}
}

/// Starts a mock upstream server that replays recorded WebSocket messages.
///
/// Note: This server only accepts a single connection. After one client connects
/// and the recording is replayed, the server will shut down. This is intentional
/// for test isolation - each test should create its own mock server instance.
pub async fn start_mock_server_with_config(
recording: WsRecording,
config: MockUpstreamConfig,
) -> std::io::Result<MockServerHandle> {
let server = MockUpstreamServer::with_config(recording, config).await?;
let addr = server.addr();

let (shutdown_tx, shutdown_rx) = tokio::sync::oneshot::channel();

tokio::spawn(async move {
tokio::select! {
result = server.accept_one() => {
if let Err(e) = result {
tracing::warn!("mock_server_error: {:?}", e);
}
}
_ = shutdown_rx => {
tracing::debug!("mock_server_shutdown");
}
}
});

tokio::time::sleep(Duration::from_millis(10)).await;

Ok(MockServerHandle { addr, shutdown_tx })
}
Loading
Loading