mirror of
https://github.com/immich-app/immich.git
synced 2025-01-09 05:16:47 +01:00
50c9bc0336
* chore: jest => vitest * chore: replace jest-when
215 lines
8.6 KiB
TypeScript
215 lines
8.6 KiB
TypeScript
import { BadRequestException } from '@nestjs/common';
|
|
import { MemoryType } from 'src/entities/memory.entity';
|
|
import { IMemoryRepository } from 'src/interfaces/memory.interface';
|
|
import { MemoryService } from 'src/services/memory.service';
|
|
import { authStub } from 'test/fixtures/auth.stub';
|
|
import { memoryStub } from 'test/fixtures/memory.stub';
|
|
import { userStub } from 'test/fixtures/user.stub';
|
|
import { IAccessRepositoryMock, newAccessRepositoryMock } from 'test/repositories/access.repository.mock';
|
|
import { newMemoryRepositoryMock } from 'test/repositories/memory.repository.mock';
|
|
import { Mocked } from 'vitest';
|
|
|
|
describe(MemoryService.name, () => {
|
|
let accessMock: IAccessRepositoryMock;
|
|
let memoryMock: Mocked<IMemoryRepository>;
|
|
let sut: MemoryService;
|
|
|
|
beforeEach(() => {
|
|
accessMock = newAccessRepositoryMock();
|
|
memoryMock = newMemoryRepositoryMock();
|
|
|
|
sut = new MemoryService(accessMock, memoryMock);
|
|
});
|
|
|
|
it('should be defined', () => {
|
|
expect(sut).toBeDefined();
|
|
});
|
|
|
|
describe('search', () => {
|
|
it('should search memories', async () => {
|
|
memoryMock.search.mockResolvedValue([memoryStub.memory1, memoryStub.empty]);
|
|
await expect(sut.search(authStub.admin)).resolves.toEqual(
|
|
expect.arrayContaining([
|
|
expect.objectContaining({ id: 'memory1', assets: expect.any(Array) }),
|
|
expect.objectContaining({ id: 'memoryEmpty', assets: [] }),
|
|
]),
|
|
);
|
|
});
|
|
|
|
it('should map ', async () => {
|
|
await expect(sut.search(authStub.admin)).resolves.toEqual([]);
|
|
});
|
|
});
|
|
|
|
describe('get', () => {
|
|
it('should throw an error when no access', async () => {
|
|
await expect(sut.get(authStub.admin, 'not-found')).rejects.toBeInstanceOf(BadRequestException);
|
|
});
|
|
|
|
it('should throw an error when the memory is not found', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['race-condition']));
|
|
await expect(sut.get(authStub.admin, 'race-condition')).rejects.toBeInstanceOf(BadRequestException);
|
|
});
|
|
|
|
it('should get a memory by id', async () => {
|
|
memoryMock.get.mockResolvedValue(memoryStub.memory1);
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
await expect(sut.get(authStub.admin, 'memory1')).resolves.toMatchObject({ id: 'memory1' });
|
|
expect(memoryMock.get).toHaveBeenCalledWith('memory1');
|
|
expect(accessMock.memory.checkOwnerAccess).toHaveBeenCalledWith(userStub.admin.id, new Set(['memory1']));
|
|
});
|
|
});
|
|
|
|
describe('create', () => {
|
|
it('should skip assets the user does not have access to', async () => {
|
|
memoryMock.create.mockResolvedValue(memoryStub.empty);
|
|
await expect(
|
|
sut.create(authStub.admin, {
|
|
type: MemoryType.ON_THIS_DAY,
|
|
data: { year: 2024 },
|
|
assetIds: ['not-mine'],
|
|
memoryAt: new Date(2024),
|
|
}),
|
|
).resolves.toMatchObject({ assets: [] });
|
|
expect(memoryMock.create).toHaveBeenCalledWith(expect.objectContaining({ assets: [] }));
|
|
});
|
|
|
|
it('should create a memory', async () => {
|
|
accessMock.asset.checkOwnerAccess.mockResolvedValue(new Set(['asset1']));
|
|
memoryMock.create.mockResolvedValue(memoryStub.memory1);
|
|
await expect(
|
|
sut.create(authStub.admin, {
|
|
type: MemoryType.ON_THIS_DAY,
|
|
data: { year: 2024 },
|
|
assetIds: ['asset1'],
|
|
memoryAt: new Date(2024),
|
|
}),
|
|
).resolves.toBeDefined();
|
|
expect(memoryMock.create).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
ownerId: userStub.admin.id,
|
|
assets: [{ id: 'asset1' }],
|
|
}),
|
|
);
|
|
});
|
|
|
|
it('should create a memory without assets', async () => {
|
|
memoryMock.create.mockResolvedValue(memoryStub.memory1);
|
|
await expect(
|
|
sut.create(authStub.admin, {
|
|
type: MemoryType.ON_THIS_DAY,
|
|
data: { year: 2024 },
|
|
memoryAt: new Date(2024),
|
|
}),
|
|
).resolves.toBeDefined();
|
|
});
|
|
});
|
|
|
|
describe('update', () => {
|
|
it('should require access', async () => {
|
|
await expect(sut.update(authStub.admin, 'not-found', { isSaved: true })).rejects.toBeInstanceOf(
|
|
BadRequestException,
|
|
);
|
|
expect(memoryMock.update).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should update a memory', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
memoryMock.update.mockResolvedValue(memoryStub.memory1);
|
|
await expect(sut.update(authStub.admin, 'memory1', { isSaved: true })).resolves.toBeDefined();
|
|
expect(memoryMock.update).toHaveBeenCalledWith(
|
|
expect.objectContaining({
|
|
id: 'memory1',
|
|
isSaved: true,
|
|
}),
|
|
);
|
|
});
|
|
});
|
|
|
|
describe('remove', () => {
|
|
it('should require access', async () => {
|
|
await expect(sut.remove(authStub.admin, 'not-found')).rejects.toBeInstanceOf(BadRequestException);
|
|
expect(memoryMock.delete).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should delete a memory', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
await expect(sut.remove(authStub.admin, 'memory1')).resolves.toBeUndefined();
|
|
expect(memoryMock.delete).toHaveBeenCalledWith('memory1');
|
|
});
|
|
});
|
|
|
|
describe('addAssets', () => {
|
|
it('should require memory access', async () => {
|
|
await expect(sut.addAssets(authStub.admin, 'not-found', { ids: ['asset1'] })).rejects.toBeInstanceOf(
|
|
BadRequestException,
|
|
);
|
|
expect(memoryMock.addAssetIds).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should require asset access', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
memoryMock.get.mockResolvedValue(memoryStub.memory1);
|
|
await expect(sut.addAssets(authStub.admin, 'memory1', { ids: ['not-found'] })).resolves.toEqual([
|
|
{ error: 'no_permission', id: 'not-found', success: false },
|
|
]);
|
|
expect(memoryMock.addAssetIds).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should skip assets already in the memory', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
memoryMock.get.mockResolvedValue(memoryStub.memory1);
|
|
memoryMock.getAssetIds.mockResolvedValue(new Set(['asset1']));
|
|
await expect(sut.addAssets(authStub.admin, 'memory1', { ids: ['asset1'] })).resolves.toEqual([
|
|
{ error: 'duplicate', id: 'asset1', success: false },
|
|
]);
|
|
expect(memoryMock.addAssetIds).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should add assets', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
accessMock.asset.checkOwnerAccess.mockResolvedValue(new Set(['asset1']));
|
|
memoryMock.get.mockResolvedValue(memoryStub.memory1);
|
|
await expect(sut.addAssets(authStub.admin, 'memory1', { ids: ['asset1'] })).resolves.toEqual([
|
|
{ id: 'asset1', success: true },
|
|
]);
|
|
expect(memoryMock.addAssetIds).toHaveBeenCalledWith('memory1', ['asset1']);
|
|
});
|
|
});
|
|
|
|
describe('removeAssets', () => {
|
|
it('should require memory access', async () => {
|
|
await expect(sut.removeAssets(authStub.admin, 'not-found', { ids: ['asset1'] })).rejects.toBeInstanceOf(
|
|
BadRequestException,
|
|
);
|
|
expect(memoryMock.removeAssetIds).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should skip assets not in the memory', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
await expect(sut.removeAssets(authStub.admin, 'memory1', { ids: ['not-found'] })).resolves.toEqual([
|
|
{ error: 'not_found', id: 'not-found', success: false },
|
|
]);
|
|
expect(memoryMock.removeAssetIds).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should require asset access', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
memoryMock.getAssetIds.mockResolvedValue(new Set(['asset1']));
|
|
await expect(sut.removeAssets(authStub.admin, 'memory1', { ids: ['asset1'] })).resolves.toEqual([
|
|
{ error: 'no_permission', id: 'asset1', success: false },
|
|
]);
|
|
expect(memoryMock.removeAssetIds).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('should remove assets', async () => {
|
|
accessMock.memory.checkOwnerAccess.mockResolvedValue(new Set(['memory1']));
|
|
accessMock.asset.checkOwnerAccess.mockResolvedValue(new Set(['asset1']));
|
|
memoryMock.getAssetIds.mockResolvedValue(new Set(['asset1']));
|
|
await expect(sut.removeAssets(authStub.admin, 'memory1', { ids: ['asset1'] })).resolves.toEqual([
|
|
{ id: 'asset1', success: true },
|
|
]);
|
|
expect(memoryMock.removeAssetIds).toHaveBeenCalledWith('memory1', ['asset1']);
|
|
});
|
|
});
|
|
});
|