mirror of
https://github.com/immich-app/immich
synced 2025-11-07 17:27:20 +00:00
* Refactor controller methods, non-breaking change * Remove getAllAssets * used imports * sync:sql * missing mock * Removing remaining references * chore: remove unused code --------- Co-authored-by: Jason Rasmussen <jrasm91@gmail.com>
95 lines
3.6 KiB
TypeScript
95 lines
3.6 KiB
TypeScript
import { LoginResponseDto, getAssetInfo, getAssetStatistics } from '@immich/sdk';
|
|
import { Socket } from 'socket.io-client';
|
|
import { errorDto } from 'src/responses';
|
|
import { app, asBearerAuth, utils } from 'src/utils';
|
|
import request from 'supertest';
|
|
import { afterAll, beforeAll, describe, expect, it } from 'vitest';
|
|
|
|
describe('/trash', () => {
|
|
let admin: LoginResponseDto;
|
|
let ws: Socket;
|
|
|
|
beforeAll(async () => {
|
|
await utils.resetDatabase();
|
|
admin = await utils.adminSetup({ onboarding: false });
|
|
ws = await utils.connectWebsocket(admin.accessToken);
|
|
});
|
|
|
|
afterAll(() => {
|
|
utils.disconnectWebsocket(ws);
|
|
});
|
|
|
|
describe('POST /trash/empty', () => {
|
|
it('should require authentication', async () => {
|
|
const { status, body } = await request(app).post('/trash/empty');
|
|
|
|
expect(status).toBe(401);
|
|
expect(body).toEqual(errorDto.unauthorized);
|
|
});
|
|
|
|
it('should empty the trash', async () => {
|
|
const { id: assetId } = await utils.createAsset(admin.accessToken);
|
|
await utils.deleteAssets(admin.accessToken, [assetId]);
|
|
|
|
const before = await getAssetInfo({ id: assetId }, { headers: asBearerAuth(admin.accessToken) });
|
|
expect(before).toStrictEqual(expect.objectContaining({ id: assetId, isTrashed: true }));
|
|
|
|
const { status } = await request(app).post('/trash/empty').set('Authorization', `Bearer ${admin.accessToken}`);
|
|
expect(status).toBe(204);
|
|
|
|
await utils.waitForWebsocketEvent({ event: 'assetDelete', id: assetId });
|
|
|
|
const after = await getAssetStatistics({ isTrashed: true }, { headers: asBearerAuth(admin.accessToken) });
|
|
expect(after.total).toBe(0);
|
|
});
|
|
});
|
|
|
|
describe('POST /trash/restore', () => {
|
|
it('should require authentication', async () => {
|
|
const { status, body } = await request(app).post('/trash/restore');
|
|
|
|
expect(status).toBe(401);
|
|
expect(body).toEqual(errorDto.unauthorized);
|
|
});
|
|
|
|
it('should restore all trashed assets', async () => {
|
|
const { id: assetId } = await utils.createAsset(admin.accessToken);
|
|
await utils.deleteAssets(admin.accessToken, [assetId]);
|
|
|
|
const before = await getAssetInfo({ id: assetId }, { headers: asBearerAuth(admin.accessToken) });
|
|
expect(before).toStrictEqual(expect.objectContaining({ id: assetId, isTrashed: true }));
|
|
|
|
const { status } = await request(app).post('/trash/restore').set('Authorization', `Bearer ${admin.accessToken}`);
|
|
expect(status).toBe(204);
|
|
|
|
const after = await getAssetInfo({ id: assetId }, { headers: asBearerAuth(admin.accessToken) });
|
|
expect(after).toStrictEqual(expect.objectContaining({ id: assetId, isTrashed: false }));
|
|
});
|
|
});
|
|
|
|
describe('POST /trash/restore/assets', () => {
|
|
it('should require authentication', async () => {
|
|
const { status, body } = await request(app).post('/trash/restore/assets');
|
|
|
|
expect(status).toBe(401);
|
|
expect(body).toEqual(errorDto.unauthorized);
|
|
});
|
|
|
|
it('should restore a trashed asset by id', async () => {
|
|
const { id: assetId } = await utils.createAsset(admin.accessToken);
|
|
await utils.deleteAssets(admin.accessToken, [assetId]);
|
|
|
|
const before = await utils.getAssetInfo(admin.accessToken, assetId);
|
|
expect(before.isTrashed).toBe(true);
|
|
|
|
const { status } = await request(app)
|
|
.post('/trash/restore/assets')
|
|
.set('Authorization', `Bearer ${admin.accessToken}`)
|
|
.send({ ids: [assetId] });
|
|
expect(status).toBe(204);
|
|
|
|
const after = await utils.getAssetInfo(admin.accessToken, assetId);
|
|
expect(after.isTrashed).toBe(false);
|
|
});
|
|
});
|
|
});
|