mirror of
https://github.com/immich-app/immich.git
synced 2025-11-20 14:52:40 +09:00
Some checks are pending
CodeQL / Analyze (javascript) (push) Waiting to run
CodeQL / Analyze (python) (push) Waiting to run
Docker / pre-job (push) Waiting to run
Docker / Re-Tag ML () (push) Blocked by required conditions
Docker / Re-Tag ML (-armnn) (push) Blocked by required conditions
Docker / Re-Tag ML (-cuda) (push) Blocked by required conditions
Docker / Re-Tag ML (-openvino) (push) Blocked by required conditions
Docker / Re-Tag ML (-rknn) (push) Blocked by required conditions
Docker / Re-Tag ML (-rocm) (push) Blocked by required conditions
Docker / Re-Tag Server () (push) Blocked by required conditions
Docker / Build and Push ML (armnn, linux/arm64, -armnn) (push) Blocked by required conditions
Docker / Build and Push ML (cpu, ) (push) Blocked by required conditions
Docker / Build and Push ML (cuda, linux/amd64, -cuda) (push) Blocked by required conditions
Docker / Build and Push ML (openvino, linux/amd64, -openvino) (push) Blocked by required conditions
Docker / Build and Push ML (rknn, linux/arm64, -rknn) (push) Blocked by required conditions
Docker / Build and Push ML (rocm, linux/amd64, {"linux/amd64": "mich"}, -rocm) (push) Blocked by required conditions
Docker / Build and Push Server (push) Blocked by required conditions
Docker / Docker Build & Push Server Success (push) Blocked by required conditions
Docker / Docker Build & Push ML Success (push) Blocked by required conditions
Docs build / pre-job (push) Waiting to run
Docs build / Docs Build (push) Blocked by required conditions
Static Code Analysis / pre-job (push) Waiting to run
Static Code Analysis / Run Dart Code Analysis (push) Blocked by required conditions
Static Code Analysis / zizmor (push) Waiting to run
Test / pre-job (push) Waiting to run
Test / Test & Lint Server (push) Blocked by required conditions
Test / Unit Test CLI (push) Blocked by required conditions
Test / Unit Test CLI (Windows) (push) Blocked by required conditions
Test / Lint Web (push) Blocked by required conditions
Test / Test Web (push) Blocked by required conditions
Test / Test i18n (push) Blocked by required conditions
Test / End-to-End Lint (push) Blocked by required conditions
Test / Medium Tests (Server) (push) Blocked by required conditions
Test / End-to-End Tests (Server & CLI) (ubuntu-24.04-arm) (push) Blocked by required conditions
Test / End-to-End Tests (Server & CLI) (ubuntu-latest) (push) Blocked by required conditions
Test / End-to-End Tests (Web) (ubuntu-24.04-arm) (push) Blocked by required conditions
Test / End-to-End Tests (Web) (ubuntu-latest) (push) Blocked by required conditions
Test / End-to-End Tests Success (push) Blocked by required conditions
Test / Unit Test Mobile (push) Blocked by required conditions
Test / Unit Test ML (push) Blocked by required conditions
Test / .github Files Formatting (push) Blocked by required conditions
Test / ShellCheck (push) Waiting to run
Test / OpenAPI Clients (push) Waiting to run
Test / SQL Schema Checks (push) Waiting to run
295 lines
11 KiB
TypeScript
295 lines
11 KiB
TypeScript
import { Kysely } from 'kysely';
|
|
import { AlbumUserRole, SyncEntityType, SyncRequestType } from 'src/enum';
|
|
import { AlbumUserRepository } from 'src/repositories/album-user.repository';
|
|
import { DB } from 'src/schema';
|
|
import { SyncTestContext } from 'test/medium.factory';
|
|
import { getKyselyDB, wait } from 'test/utils';
|
|
|
|
let defaultDatabase: Kysely<DB>;
|
|
|
|
const setup = async (db?: Kysely<DB>) => {
|
|
const ctx = new SyncTestContext(db || defaultDatabase);
|
|
const { auth, user, session } = await ctx.newSyncAuthUser();
|
|
return { auth, user, session, ctx };
|
|
};
|
|
|
|
beforeAll(async () => {
|
|
defaultDatabase = await getKyselyDB();
|
|
});
|
|
|
|
describe(SyncRequestType.AlbumUsersV1, () => {
|
|
it('should sync an album user with the correct properties', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const { album } = await ctx.newAlbum({ ownerId: auth.user.id });
|
|
const { user } = await ctx.newUser();
|
|
const { albumUser } = await ctx.newAlbumUser({ albumId: album.id, userId: user.id, role: AlbumUserRole.Editor });
|
|
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: albumUser.albumId,
|
|
role: albumUser.role,
|
|
userId: albumUser.userId,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
]);
|
|
});
|
|
|
|
describe('owner', () => {
|
|
it('should detect and sync a new shared user', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const { user: user1 } = await ctx.newUser();
|
|
const { album } = await ctx.newAlbum({ ownerId: auth.user.id });
|
|
const { albumUser } = await ctx.newAlbumUser({ albumId: album.id, userId: user1.id, role: AlbumUserRole.Editor });
|
|
|
|
const response = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(response).toHaveLength(1);
|
|
expect(response).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: albumUser.albumId,
|
|
role: albumUser.role,
|
|
userId: albumUser.userId,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
]);
|
|
|
|
await ctx.syncAckAll(auth, response);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
});
|
|
|
|
it('should detect and sync an updated shared user', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const albumUserRepo = ctx.get(AlbumUserRepository);
|
|
const { user: user1 } = await ctx.newUser();
|
|
const { album } = await ctx.newAlbum({ ownerId: auth.user.id });
|
|
const { albumUser } = await ctx.newAlbumUser({ albumId: album.id, userId: user1.id, role: AlbumUserRole.Editor });
|
|
|
|
const response = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
await ctx.syncAckAll(auth, response);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
|
|
await albumUserRepo.update({ albumsId: album.id, usersId: user1.id }, { role: AlbumUserRole.Viewer });
|
|
const newResponse = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(newResponse).toHaveLength(1);
|
|
expect(newResponse).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: albumUser.albumId,
|
|
role: AlbumUserRole.Viewer,
|
|
userId: albumUser.userId,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
]);
|
|
|
|
await ctx.syncAckAll(auth, newResponse);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
});
|
|
|
|
it('should detect and sync a deleted shared user', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const albumUserRepo = ctx.get(AlbumUserRepository);
|
|
const { user: user1 } = await ctx.newUser();
|
|
const { album } = await ctx.newAlbum({ ownerId: auth.user.id });
|
|
const { albumUser } = await ctx.newAlbumUser({ albumId: album.id, userId: user1.id, role: AlbumUserRole.Editor });
|
|
|
|
const response = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(response).toHaveLength(1);
|
|
await ctx.syncAckAll(auth, response);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
|
|
await albumUserRepo.delete({ albumsId: album.id, usersId: user1.id });
|
|
const newResponse = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(newResponse).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: albumUser.albumId,
|
|
userId: albumUser.userId,
|
|
}),
|
|
type: SyncEntityType.AlbumUserDeleteV1,
|
|
},
|
|
]);
|
|
|
|
await ctx.syncAckAll(auth, newResponse);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
});
|
|
});
|
|
|
|
describe('shared user', () => {
|
|
it('should detect and sync a new shared user', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const { user: user1 } = await ctx.newUser();
|
|
const { album } = await ctx.newAlbum({ ownerId: user1.id });
|
|
const { albumUser } = await ctx.newAlbumUser({
|
|
albumId: album.id,
|
|
userId: auth.user.id,
|
|
role: AlbumUserRole.Editor,
|
|
});
|
|
|
|
const response = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(response).toHaveLength(1);
|
|
expect(response).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: albumUser.albumId,
|
|
role: albumUser.role,
|
|
userId: albumUser.userId,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
]);
|
|
|
|
await ctx.syncAckAll(auth, response);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
});
|
|
|
|
it('should detect and sync an updated shared user', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const albumUserRepo = ctx.get(AlbumUserRepository);
|
|
const { user: owner } = await ctx.newUser();
|
|
const { user: user } = await ctx.newUser();
|
|
const { album } = await ctx.newAlbum({ ownerId: owner.id });
|
|
await ctx.newAlbumUser({ albumId: album.id, userId: auth.user.id, role: AlbumUserRole.Editor });
|
|
await ctx.newAlbumUser({ albumId: album.id, userId: user.id, role: AlbumUserRole.Editor });
|
|
|
|
const response = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(response).toHaveLength(2);
|
|
|
|
await ctx.syncAckAll(auth, response);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
|
|
await albumUserRepo.update({ albumsId: album.id, usersId: user.id }, { role: AlbumUserRole.Viewer });
|
|
const newResponse = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(newResponse).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: album.id,
|
|
role: AlbumUserRole.Viewer,
|
|
userId: user.id,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
]);
|
|
|
|
await ctx.syncAckAll(auth, newResponse);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
});
|
|
|
|
it('should detect and sync a deleted shared user', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const albumUserRepo = ctx.get(AlbumUserRepository);
|
|
const { user: owner } = await ctx.newUser();
|
|
const { user: user } = await ctx.newUser();
|
|
const { album } = await ctx.newAlbum({ ownerId: owner.id });
|
|
await ctx.newAlbumUser({ albumId: album.id, userId: auth.user.id, role: AlbumUserRole.Editor });
|
|
await ctx.newAlbumUser({ albumId: album.id, userId: user.id, role: AlbumUserRole.Editor });
|
|
|
|
const response = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(response).toHaveLength(2);
|
|
await ctx.syncAckAll(auth, response);
|
|
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
await albumUserRepo.delete({ albumsId: album.id, usersId: user.id });
|
|
|
|
const newResponse = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(newResponse).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: album.id,
|
|
userId: user.id,
|
|
}),
|
|
type: SyncEntityType.AlbumUserDeleteV1,
|
|
},
|
|
]);
|
|
|
|
await ctx.syncAckAll(auth, newResponse);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
});
|
|
|
|
it('should backfill album users when a user shares an album with you', async () => {
|
|
const { auth, ctx } = await setup();
|
|
const { user: user1 } = await ctx.newUser();
|
|
const { user: user2 } = await ctx.newUser();
|
|
const { album: album1 } = await ctx.newAlbum({ ownerId: user1.id });
|
|
const { album: album2 } = await ctx.newAlbum({ ownerId: user1.id });
|
|
// backfill album user
|
|
await ctx.newAlbumUser({ albumId: album1.id, userId: user1.id, role: AlbumUserRole.Editor });
|
|
await wait(2);
|
|
// initial album user
|
|
await ctx.newAlbumUser({ albumId: album2.id, userId: auth.user.id, role: AlbumUserRole.Editor });
|
|
await wait(2);
|
|
// post checkpoint album user
|
|
await ctx.newAlbumUser({ albumId: album1.id, userId: user2.id, role: AlbumUserRole.Editor });
|
|
|
|
const response = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(response).toHaveLength(1);
|
|
expect(response).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: album2.id,
|
|
role: AlbumUserRole.Editor,
|
|
userId: auth.user.id,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
]);
|
|
|
|
// ack initial user
|
|
await ctx.syncAckAll(auth, response);
|
|
// get access to the backfill album user
|
|
await ctx.newAlbumUser({ albumId: album1.id, userId: auth.user.id, role: AlbumUserRole.Editor });
|
|
|
|
// should backfill the album user
|
|
const newResponse = await ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1]);
|
|
expect(newResponse).toEqual([
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: album1.id,
|
|
role: AlbumUserRole.Editor,
|
|
userId: user1.id,
|
|
}),
|
|
type: SyncEntityType.AlbumUserBackfillV1,
|
|
},
|
|
{
|
|
ack: expect.stringContaining(SyncEntityType.AlbumUserBackfillV1),
|
|
data: {},
|
|
type: SyncEntityType.SyncAckV1,
|
|
},
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: album1.id,
|
|
role: AlbumUserRole.Editor,
|
|
userId: user2.id,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
{
|
|
ack: expect.any(String),
|
|
data: expect.objectContaining({
|
|
albumId: album1.id,
|
|
role: AlbumUserRole.Editor,
|
|
userId: auth.user.id,
|
|
}),
|
|
type: SyncEntityType.AlbumUserV1,
|
|
},
|
|
]);
|
|
|
|
await ctx.syncAckAll(auth, newResponse);
|
|
await expect(ctx.syncStream(auth, [SyncRequestType.AlbumUsersV1])).resolves.toEqual([]);
|
|
});
|
|
});
|
|
});
|