|
@@ -136,11 +136,11 @@ describe(UserService.name, () => {
|
|
when(userMock.get).calledWith(immichUser.id, undefined).mockResolvedValue(immichUser);
|
|
when(userMock.get).calledWith(immichUser.id, undefined).mockResolvedValue(immichUser);
|
|
});
|
|
});
|
|
|
|
|
|
- describe('getAllUsers', () => {
|
|
|
|
|
|
+ describe('getAll', () => {
|
|
it('should get all users', async () => {
|
|
it('should get all users', async () => {
|
|
userMock.getList.mockResolvedValue([adminUser]);
|
|
userMock.getList.mockResolvedValue([adminUser]);
|
|
|
|
|
|
- const response = await sut.getAllUsers(adminUserAuth, false);
|
|
|
|
|
|
+ const response = await sut.getAll(adminUserAuth, false);
|
|
|
|
|
|
expect(userMock.getList).toHaveBeenCalledWith({ withDeleted: true });
|
|
expect(userMock.getList).toHaveBeenCalledWith({ withDeleted: true });
|
|
expect(response).toEqual([
|
|
expect(response).toEqual([
|
|
@@ -163,11 +163,11 @@ describe(UserService.name, () => {
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
|
|
- describe('getUserById', () => {
|
|
|
|
|
|
+ describe('get', () => {
|
|
it('should get a user by id', async () => {
|
|
it('should get a user by id', async () => {
|
|
userMock.get.mockResolvedValue(adminUser);
|
|
userMock.get.mockResolvedValue(adminUser);
|
|
|
|
|
|
- const response = await sut.getUserById(adminUser.id);
|
|
|
|
|
|
+ const response = await sut.get(adminUser.id);
|
|
|
|
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, false);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, false);
|
|
expect(response).toEqual(adminUserResponse);
|
|
expect(response).toEqual(adminUserResponse);
|
|
@@ -176,17 +176,17 @@ describe(UserService.name, () => {
|
|
it('should throw an error if a user is not found', async () => {
|
|
it('should throw an error if a user is not found', async () => {
|
|
userMock.get.mockResolvedValue(null);
|
|
userMock.get.mockResolvedValue(null);
|
|
|
|
|
|
- await expect(sut.getUserById(adminUser.id)).rejects.toBeInstanceOf(NotFoundException);
|
|
|
|
|
|
+ await expect(sut.get(adminUser.id)).rejects.toBeInstanceOf(NotFoundException);
|
|
|
|
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, false);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, false);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
|
|
- describe('getUserInfo', () => {
|
|
|
|
|
|
+ describe('getMe', () => {
|
|
it("should get the auth user's info", async () => {
|
|
it("should get the auth user's info", async () => {
|
|
userMock.get.mockResolvedValue(adminUser);
|
|
userMock.get.mockResolvedValue(adminUser);
|
|
|
|
|
|
- const response = await sut.getUserInfo(adminUser);
|
|
|
|
|
|
+ const response = await sut.getMe(adminUser);
|
|
|
|
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, undefined);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, undefined);
|
|
expect(response).toEqual(adminUserResponse);
|
|
expect(response).toEqual(adminUserResponse);
|
|
@@ -195,17 +195,17 @@ describe(UserService.name, () => {
|
|
it('should throw an error if a user is not found', async () => {
|
|
it('should throw an error if a user is not found', async () => {
|
|
userMock.get.mockResolvedValue(null);
|
|
userMock.get.mockResolvedValue(null);
|
|
|
|
|
|
- await expect(sut.getUserInfo(adminUser)).rejects.toBeInstanceOf(BadRequestException);
|
|
|
|
|
|
+ await expect(sut.getMe(adminUser)).rejects.toBeInstanceOf(BadRequestException);
|
|
|
|
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, undefined);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, undefined);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
|
|
- describe('getUserCount', () => {
|
|
|
|
|
|
+ describe('getCount', () => {
|
|
it('should get the user count', async () => {
|
|
it('should get the user count', async () => {
|
|
userMock.getList.mockResolvedValue([adminUser]);
|
|
userMock.getList.mockResolvedValue([adminUser]);
|
|
|
|
|
|
- const response = await sut.getUserCount({});
|
|
|
|
|
|
+ const response = await sut.getCount({});
|
|
|
|
|
|
expect(userMock.getList).toHaveBeenCalled();
|
|
expect(userMock.getList).toHaveBeenCalled();
|
|
expect(response).toEqual({ userCount: 1 });
|
|
expect(response).toEqual({ userCount: 1 });
|
|
@@ -221,14 +221,14 @@ describe(UserService.name, () => {
|
|
|
|
|
|
when(userMock.update).calledWith(update.id, update).mockResolvedValueOnce(updatedImmichUser);
|
|
when(userMock.update).calledWith(update.id, update).mockResolvedValueOnce(updatedImmichUser);
|
|
|
|
|
|
- const updatedUser = await sut.updateUser(immichUserAuth, update);
|
|
|
|
|
|
+ const updatedUser = await sut.update(immichUserAuth, update);
|
|
expect(updatedUser.shouldChangePassword).toEqual(true);
|
|
expect(updatedUser.shouldChangePassword).toEqual(true);
|
|
});
|
|
});
|
|
|
|
|
|
it('should not set an empty string for storage label', async () => {
|
|
it('should not set an empty string for storage label', async () => {
|
|
userMock.update.mockResolvedValue(updatedImmichUser);
|
|
userMock.update.mockResolvedValue(updatedImmichUser);
|
|
|
|
|
|
- await sut.updateUser(adminUserAuth, { id: immichUser.id, storageLabel: '' });
|
|
|
|
|
|
+ await sut.update(adminUserAuth, { id: immichUser.id, storageLabel: '' });
|
|
|
|
|
|
expect(userMock.update).toHaveBeenCalledWith(immichUser.id, { id: immichUser.id, storageLabel: null });
|
|
expect(userMock.update).toHaveBeenCalledWith(immichUser.id, { id: immichUser.id, storageLabel: null });
|
|
});
|
|
});
|
|
@@ -236,7 +236,7 @@ describe(UserService.name, () => {
|
|
it('should omit a storage label set by non-admin users', async () => {
|
|
it('should omit a storage label set by non-admin users', async () => {
|
|
userMock.update.mockResolvedValue(updatedImmichUser);
|
|
userMock.update.mockResolvedValue(updatedImmichUser);
|
|
|
|
|
|
- await sut.updateUser(immichUserAuth, { id: immichUser.id, storageLabel: 'admin' });
|
|
|
|
|
|
+ await sut.update(immichUserAuth, { id: immichUser.id, storageLabel: 'admin' });
|
|
|
|
|
|
expect(userMock.update).toHaveBeenCalledWith(immichUser.id, { id: immichUser.id });
|
|
expect(userMock.update).toHaveBeenCalledWith(immichUser.id, { id: immichUser.id });
|
|
});
|
|
});
|
|
@@ -249,7 +249,7 @@ describe(UserService.name, () => {
|
|
id: 'not_immich_auth_user_id',
|
|
id: 'not_immich_auth_user_id',
|
|
});
|
|
});
|
|
|
|
|
|
- const result = sut.updateUser(immichUserAuth, {
|
|
|
|
|
|
+ const result = sut.update(immichUserAuth, {
|
|
id: 'not_immich_auth_user_id',
|
|
id: 'not_immich_auth_user_id',
|
|
password: 'I take over your account now',
|
|
password: 'I take over your account now',
|
|
});
|
|
});
|
|
@@ -262,7 +262,7 @@ describe(UserService.name, () => {
|
|
userMock.get.mockResolvedValue(immichUser);
|
|
userMock.get.mockResolvedValue(immichUser);
|
|
userMock.update.mockResolvedValue(immichUser);
|
|
userMock.update.mockResolvedValue(immichUser);
|
|
|
|
|
|
- await sut.updateUser(immichUser, dto);
|
|
|
|
|
|
+ await sut.update(immichUser, dto);
|
|
|
|
|
|
expect(userMock.update).toHaveBeenCalledWith(immichUser.id, {
|
|
expect(userMock.update).toHaveBeenCalledWith(immichUser.id, {
|
|
id: 'user-id',
|
|
id: 'user-id',
|
|
@@ -276,7 +276,7 @@ describe(UserService.name, () => {
|
|
userMock.get.mockResolvedValue(immichUser);
|
|
userMock.get.mockResolvedValue(immichUser);
|
|
userMock.getByEmail.mockResolvedValue(adminUser);
|
|
userMock.getByEmail.mockResolvedValue(adminUser);
|
|
|
|
|
|
- await expect(sut.updateUser(immichUser, dto)).rejects.toBeInstanceOf(BadRequestException);
|
|
|
|
|
|
+ await expect(sut.update(immichUser, dto)).rejects.toBeInstanceOf(BadRequestException);
|
|
|
|
|
|
expect(userMock.update).not.toHaveBeenCalled();
|
|
expect(userMock.update).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
@@ -287,7 +287,7 @@ describe(UserService.name, () => {
|
|
userMock.get.mockResolvedValue(immichUser);
|
|
userMock.get.mockResolvedValue(immichUser);
|
|
userMock.getByStorageLabel.mockResolvedValue(adminUser);
|
|
userMock.getByStorageLabel.mockResolvedValue(adminUser);
|
|
|
|
|
|
- await expect(sut.updateUser(adminUser, dto)).rejects.toBeInstanceOf(BadRequestException);
|
|
|
|
|
|
+ await expect(sut.update(adminUser, dto)).rejects.toBeInstanceOf(BadRequestException);
|
|
|
|
|
|
expect(userMock.update).not.toHaveBeenCalled();
|
|
expect(userMock.update).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
@@ -300,7 +300,7 @@ describe(UserService.name, () => {
|
|
|
|
|
|
when(userMock.update).calledWith(immichUser.id, update).mockResolvedValueOnce(updatedImmichUser);
|
|
when(userMock.update).calledWith(immichUser.id, update).mockResolvedValueOnce(updatedImmichUser);
|
|
|
|
|
|
- const result = await sut.updateUser(adminUserAuth, update);
|
|
|
|
|
|
+ const result = await sut.update(adminUserAuth, update);
|
|
|
|
|
|
expect(result).toBeDefined();
|
|
expect(result).toBeDefined();
|
|
expect(result.id).toEqual(updatedImmichUser.id);
|
|
expect(result.id).toEqual(updatedImmichUser.id);
|
|
@@ -310,7 +310,7 @@ describe(UserService.name, () => {
|
|
it('update user information should throw error if user not found', async () => {
|
|
it('update user information should throw error if user not found', async () => {
|
|
when(userMock.get).calledWith(immichUser.id, undefined).mockResolvedValueOnce(null);
|
|
when(userMock.get).calledWith(immichUser.id, undefined).mockResolvedValueOnce(null);
|
|
|
|
|
|
- const result = sut.updateUser(adminUser, {
|
|
|
|
|
|
+ const result = sut.update(adminUser, {
|
|
id: immichUser.id,
|
|
id: immichUser.id,
|
|
shouldChangePassword: true,
|
|
shouldChangePassword: true,
|
|
});
|
|
});
|
|
@@ -324,7 +324,7 @@ describe(UserService.name, () => {
|
|
when(userMock.get).calledWith(adminUser.id).mockResolvedValueOnce(null);
|
|
when(userMock.get).calledWith(adminUser.id).mockResolvedValueOnce(null);
|
|
when(userMock.update).calledWith(adminUser.id, dto).mockResolvedValueOnce(adminUser);
|
|
when(userMock.update).calledWith(adminUser.id, dto).mockResolvedValueOnce(adminUser);
|
|
|
|
|
|
- await sut.updateUser(adminUser, dto);
|
|
|
|
|
|
+ await sut.update(adminUser, dto);
|
|
|
|
|
|
expect(userMock.update).toHaveBeenCalledWith(adminUser.id, dto);
|
|
expect(userMock.update).toHaveBeenCalledWith(adminUser.id, dto);
|
|
});
|
|
});
|
|
@@ -334,31 +334,31 @@ describe(UserService.name, () => {
|
|
|
|
|
|
when(userMock.get).calledWith(immichUser.id).mockResolvedValueOnce(immichUser);
|
|
when(userMock.get).calledWith(immichUser.id).mockResolvedValueOnce(immichUser);
|
|
|
|
|
|
- await expect(sut.updateUser(adminUser, dto)).rejects.toBeInstanceOf(BadRequestException);
|
|
|
|
|
|
+ await expect(sut.update(adminUser, dto)).rejects.toBeInstanceOf(BadRequestException);
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
|
|
- describe('restoreUser', () => {
|
|
|
|
|
|
+ describe('restore', () => {
|
|
it('should require an admin', async () => {
|
|
it('should require an admin', async () => {
|
|
when(userMock.get).calledWith(adminUser.id, true).mockResolvedValue(adminUser);
|
|
when(userMock.get).calledWith(adminUser.id, true).mockResolvedValue(adminUser);
|
|
- await expect(sut.restoreUser(immichUserAuth, adminUser.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
|
|
|
|
+ await expect(sut.restore(immichUserAuth, adminUser.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, true);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUser.id, true);
|
|
});
|
|
});
|
|
|
|
|
|
it('should require the auth user be an admin', async () => {
|
|
it('should require the auth user be an admin', async () => {
|
|
- await expect(sut.deleteUser(immichUserAuth, adminUserAuth.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
|
|
|
|
+ await expect(sut.delete(immichUserAuth, adminUserAuth.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
|
|
|
|
expect(userMock.delete).not.toHaveBeenCalled();
|
|
expect(userMock.delete).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
|
|
- describe('deleteUser', () => {
|
|
|
|
|
|
+ describe('delete', () => {
|
|
it('cannot delete admin user', async () => {
|
|
it('cannot delete admin user', async () => {
|
|
- await expect(sut.deleteUser(adminUserAuth, adminUserAuth.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
|
|
|
|
+ await expect(sut.delete(adminUserAuth, adminUserAuth.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
});
|
|
});
|
|
|
|
|
|
it('should require the auth user be an admin', async () => {
|
|
it('should require the auth user be an admin', async () => {
|
|
- await expect(sut.deleteUser(immichUserAuth, adminUserAuth.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
|
|
|
|
+ await expect(sut.delete(immichUserAuth, adminUserAuth.id)).rejects.toBeInstanceOf(ForbiddenException);
|
|
|
|
|
|
expect(userMock.delete).not.toHaveBeenCalled();
|
|
expect(userMock.delete).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
@@ -369,7 +369,7 @@ describe(UserService.name, () => {
|
|
when(userMock.getAdmin).calledWith().mockResolvedValueOnce(null);
|
|
when(userMock.getAdmin).calledWith().mockResolvedValueOnce(null);
|
|
|
|
|
|
await expect(
|
|
await expect(
|
|
- sut.createUser({
|
|
|
|
|
|
+ sut.create({
|
|
email: 'john_smith@email.com',
|
|
email: 'john_smith@email.com',
|
|
firstName: 'John',
|
|
firstName: 'John',
|
|
lastName: 'Smith',
|
|
lastName: 'Smith',
|
|
@@ -394,7 +394,7 @@ describe(UserService.name, () => {
|
|
it('should throw an error if the user does not exist', async () => {
|
|
it('should throw an error if the user does not exist', async () => {
|
|
userMock.get.mockResolvedValue(null);
|
|
userMock.get.mockResolvedValue(null);
|
|
|
|
|
|
- await expect(sut.getUserProfileImage(adminUserAuth.id)).rejects.toBeInstanceOf(NotFoundException);
|
|
|
|
|
|
+ await expect(sut.getProfileImage(adminUserAuth.id)).rejects.toBeInstanceOf(NotFoundException);
|
|
|
|
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUserAuth.id, undefined);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUserAuth.id, undefined);
|
|
});
|
|
});
|
|
@@ -402,7 +402,7 @@ describe(UserService.name, () => {
|
|
it('should throw an error if the user does not have a picture', async () => {
|
|
it('should throw an error if the user does not have a picture', async () => {
|
|
userMock.get.mockResolvedValue(adminUser);
|
|
userMock.get.mockResolvedValue(adminUser);
|
|
|
|
|
|
- await expect(sut.getUserProfileImage(adminUserAuth.id)).rejects.toBeInstanceOf(NotFoundException);
|
|
|
|
|
|
+ await expect(sut.getProfileImage(adminUserAuth.id)).rejects.toBeInstanceOf(NotFoundException);
|
|
|
|
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUserAuth.id, undefined);
|
|
expect(userMock.get).toHaveBeenCalledWith(adminUserAuth.id, undefined);
|
|
});
|
|
});
|