mirror of
https://github.com/immich-app/immich.git
synced 2025-01-25 05:02:46 +01:00
33529d1d9b
* refactor: AuthUserDto => AuthDto * refactor: reorganize auth-dto * refactor: AuthUser() => Auth()
89 lines
2.8 KiB
TypeScript
89 lines
2.8 KiB
TypeScript
import { DatabaseAction, EntityType } from '@app/infra/entities';
|
|
import {
|
|
IAccessRepositoryMock,
|
|
auditStub,
|
|
authStub,
|
|
newAccessRepositoryMock,
|
|
newAssetRepositoryMock,
|
|
newAuditRepositoryMock,
|
|
newCryptoRepositoryMock,
|
|
newPersonRepositoryMock,
|
|
newStorageRepositoryMock,
|
|
newUserRepositoryMock,
|
|
} from '@test';
|
|
import {
|
|
IAssetRepository,
|
|
IAuditRepository,
|
|
ICryptoRepository,
|
|
IPersonRepository,
|
|
IStorageRepository,
|
|
IUserRepository,
|
|
} from '../repositories';
|
|
import { AuditService } from './audit.service';
|
|
|
|
describe(AuditService.name, () => {
|
|
let sut: AuditService;
|
|
let accessMock: IAccessRepositoryMock;
|
|
let assetMock: jest.Mocked<IAssetRepository>;
|
|
let auditMock: jest.Mocked<IAuditRepository>;
|
|
let cryptoMock: jest.Mocked<ICryptoRepository>;
|
|
let personMock: jest.Mocked<IPersonRepository>;
|
|
let storageMock: jest.Mocked<IStorageRepository>;
|
|
let userMock: jest.Mocked<IUserRepository>;
|
|
|
|
beforeEach(async () => {
|
|
accessMock = newAccessRepositoryMock();
|
|
assetMock = newAssetRepositoryMock();
|
|
cryptoMock = newCryptoRepositoryMock();
|
|
auditMock = newAuditRepositoryMock();
|
|
personMock = newPersonRepositoryMock();
|
|
storageMock = newStorageRepositoryMock();
|
|
userMock = newUserRepositoryMock();
|
|
sut = new AuditService(accessMock, assetMock, cryptoMock, personMock, auditMock, storageMock, userMock);
|
|
});
|
|
|
|
it('should work', () => {
|
|
expect(sut).toBeDefined();
|
|
});
|
|
|
|
describe('handleCleanup', () => {
|
|
it('should delete old audit entries', async () => {
|
|
await expect(sut.handleCleanup()).resolves.toBe(true);
|
|
expect(auditMock.removeBefore).toBeCalledWith(expect.any(Date));
|
|
});
|
|
});
|
|
|
|
describe('getDeletes', () => {
|
|
it('should require full sync if the request is older than 100 days', async () => {
|
|
auditMock.getAfter.mockResolvedValue([]);
|
|
|
|
const date = new Date(2022, 0, 1);
|
|
await expect(sut.getDeletes(authStub.admin, { after: date, entityType: EntityType.ASSET })).resolves.toEqual({
|
|
needsFullSync: true,
|
|
ids: [],
|
|
});
|
|
|
|
expect(auditMock.getAfter).toHaveBeenCalledWith(date, {
|
|
action: DatabaseAction.DELETE,
|
|
ownerId: authStub.admin.user.id,
|
|
entityType: EntityType.ASSET,
|
|
});
|
|
});
|
|
|
|
it('should get any new or updated assets and deleted ids', async () => {
|
|
auditMock.getAfter.mockResolvedValue([auditStub.delete]);
|
|
|
|
const date = new Date();
|
|
await expect(sut.getDeletes(authStub.admin, { after: date, entityType: EntityType.ASSET })).resolves.toEqual({
|
|
needsFullSync: false,
|
|
ids: ['asset-deleted'],
|
|
});
|
|
|
|
expect(auditMock.getAfter).toHaveBeenCalledWith(date, {
|
|
action: DatabaseAction.DELETE,
|
|
ownerId: authStub.admin.user.id,
|
|
entityType: EntityType.ASSET,
|
|
});
|
|
});
|
|
});
|
|
});
|