mirror of
https://github.com/immich-app/immich.git
synced 2024-11-17 02:49:01 -07:00
8d5bf93360
* feat: asset e2e with job option * feat: checkout test assets * feat: library e2e tests * fix: use node 21 in e2e * fix: tests * fix: use normalized external path * feat: more external path tests * chore: use parametrized tests * chore: remove unused test code * chore: refactor test asset path * feat: centralize test app creation * fix: correct error message for missing assets * feat: test file formats * fix: don't compare checksum * feat: build libvips * fix: install meson * fix: use immich test asset repo * feat: test nikon raw files * fix: set Z timezone * feat: test offline library files * feat: richer metadata tests * feat: e2e tests in docker * feat: e2e test with arm64 docker * fix: manual docker compose run * fix: remove metadata processor import * fix: run e2e tests in test.yml * fix: checkout e2e assets * fix: typo * fix: checkout files in app directory * fix: increase e2e memory * fix: rm submodules * fix: revert action name * test: mark file offline when external path changes * feat: rename env var to TEST_ENV * docs: new test procedures * feat: can run docker e2e tests manually if needed * chore: use new node 20.8 for e2e * chore: bump exiftool-vendored * feat: simplify test launching * fix: rename env vars to use immich_ prefix * feat: asset folder is submodule * chore: cleanup after 20.8 upgrade * fix: don't log postgres in e2e * fix: better warning about not running all tests --------- Co-authored-by: Jonathan Jogenfors <jonathan@jogenfors.se>
143 lines
4.8 KiB
TypeScript
143 lines
4.8 KiB
TypeScript
import { IPartnerRepository, LoginResponseDto, PartnerDirection } from '@app/domain';
|
|
import { PartnerController } from '@app/immich';
|
|
import { INestApplication } from '@nestjs/common';
|
|
import { api } from '@test/api';
|
|
import { db } from '@test/db';
|
|
import { errorStub } from '@test/fixtures';
|
|
import { createTestApp } from '@test/test-utils';
|
|
import request from 'supertest';
|
|
|
|
const user1Dto = {
|
|
email: 'user1@immich.app',
|
|
password: 'Password123',
|
|
firstName: 'User 1',
|
|
lastName: 'Test',
|
|
};
|
|
|
|
const user2Dto = {
|
|
email: 'user2@immich.app',
|
|
password: 'Password123',
|
|
firstName: 'User 2',
|
|
lastName: 'Test',
|
|
};
|
|
|
|
describe(`${PartnerController.name} (e2e)`, () => {
|
|
let app: INestApplication;
|
|
let server: any;
|
|
let loginResponse: LoginResponseDto;
|
|
let accessToken: string;
|
|
let repository: IPartnerRepository;
|
|
let user1: LoginResponseDto;
|
|
let user2: LoginResponseDto;
|
|
|
|
beforeAll(async () => {
|
|
app = await createTestApp();
|
|
server = app.getHttpServer();
|
|
repository = app.get<IPartnerRepository>(IPartnerRepository);
|
|
});
|
|
|
|
beforeEach(async () => {
|
|
await db.reset();
|
|
await api.authApi.adminSignUp(server);
|
|
loginResponse = await api.authApi.adminLogin(server);
|
|
accessToken = loginResponse.accessToken;
|
|
|
|
await api.userApi.create(server, accessToken, user1Dto);
|
|
user1 = await api.authApi.login(server, { email: user1Dto.email, password: user1Dto.password });
|
|
|
|
await api.userApi.create(server, accessToken, user2Dto);
|
|
user2 = await api.authApi.login(server, { email: user2Dto.email, password: user2Dto.password });
|
|
});
|
|
|
|
afterAll(async () => {
|
|
await db.disconnect();
|
|
await app.close();
|
|
});
|
|
|
|
describe('GET /partner', () => {
|
|
it('should require authentication', async () => {
|
|
const { status, body } = await request(server).get('/partner');
|
|
|
|
expect(status).toBe(401);
|
|
expect(body).toEqual(errorStub.unauthorized);
|
|
});
|
|
|
|
it('should get all partners shared by user', async () => {
|
|
await repository.create({ sharedById: user1.userId, sharedWithId: user2.userId });
|
|
const { status, body } = await request(server)
|
|
.get('/partner')
|
|
.set('Authorization', `Bearer ${user1.accessToken}`)
|
|
.query({ direction: PartnerDirection.SharedBy });
|
|
|
|
expect(status).toBe(200);
|
|
expect(body).toEqual([expect.objectContaining({ id: user2.userId })]);
|
|
});
|
|
|
|
it('should get all partners that share with user', async () => {
|
|
await repository.create({ sharedById: user2.userId, sharedWithId: user1.userId });
|
|
const { status, body } = await request(server)
|
|
.get('/partner')
|
|
.set('Authorization', `Bearer ${user1.accessToken}`)
|
|
.query({ direction: PartnerDirection.SharedWith });
|
|
|
|
expect(status).toBe(200);
|
|
expect(body).toEqual([expect.objectContaining({ id: user2.userId })]);
|
|
});
|
|
});
|
|
|
|
describe('POST /partner/:id', () => {
|
|
it('should require authentication', async () => {
|
|
const { status, body } = await request(server).post(`/partner/${user2.userId}`);
|
|
|
|
expect(status).toBe(401);
|
|
expect(body).toEqual(errorStub.unauthorized);
|
|
});
|
|
|
|
it('should share with new partner', async () => {
|
|
const { status, body } = await request(server)
|
|
.post(`/partner/${user2.userId}`)
|
|
.set('Authorization', `Bearer ${user1.accessToken}`);
|
|
|
|
expect(status).toBe(201);
|
|
expect(body).toEqual(expect.objectContaining({ id: user2.userId }));
|
|
});
|
|
|
|
it('should not share with new partner if already sharing with this partner', async () => {
|
|
await repository.create({ sharedById: user1.userId, sharedWithId: user2.userId });
|
|
const { status, body } = await request(server)
|
|
.post(`/partner/${user2.userId}`)
|
|
.set('Authorization', `Bearer ${user1.accessToken}`);
|
|
|
|
expect(status).toBe(400);
|
|
expect(body).toEqual(expect.objectContaining({ message: 'Partner already exists' }));
|
|
});
|
|
});
|
|
|
|
describe('DELETE /partner/:id', () => {
|
|
it('should require authentication', async () => {
|
|
const { status, body } = await request(server).delete(`/partner/${user2.userId}`);
|
|
|
|
expect(status).toBe(401);
|
|
expect(body).toEqual(errorStub.unauthorized);
|
|
});
|
|
|
|
it('should delete partner', async () => {
|
|
await repository.create({ sharedById: user1.userId, sharedWithId: user2.userId });
|
|
const { status } = await request(server)
|
|
.delete(`/partner/${user2.userId}`)
|
|
.set('Authorization', `Bearer ${user1.accessToken}`);
|
|
|
|
expect(status).toBe(200);
|
|
});
|
|
|
|
it('should throw a bad request if partner not found', async () => {
|
|
const { status, body } = await request(server)
|
|
.delete(`/partner/${user2.userId}`)
|
|
.set('Authorization', `Bearer ${user1.accessToken}`);
|
|
|
|
expect(status).toBe(400);
|
|
expect(body).toEqual(expect.objectContaining({ message: 'Partner not found' }));
|
|
});
|
|
});
|
|
});
|