mirror of
https://github.com/immich-app/immich.git
synced 2026-01-14 05:56:38 -08:00
* feat: add a `maintenance.enabled` config flag
* feat: implement graceful restart
feat: restart when maintenance config is toggled
* feat: boot a stripped down maintenance api if enabled
* feat: cli command to toggle maintenance mode
* chore: fallback IMMICH_SERVER_URL environment variable in process
* chore: add additional routes to maintenance controller
* fix: don't wait for nest application to close to finish request response
* chore: add a failsafe on restart to prevent other exit codes from preventing restart
* feat: redirect into/from maintenance page
* refactor: use system metadata for maintenance status
* refactor: wait on WebSocket connection to refresh
* feat: broadcast websocket event on server restart
refactor: listen to WS instead of polling
* refactor: bubble up maintenance information instead of hijacking in fetch function
feat: show modal when server is restarting
* chore: increase timeout for ungraceful restart
* refactor: deduplicate code between api/maintenance workers
* fix: skip config check if database is not initialised
* fix: add `maintenanceMode` field to system config test
* refactor: move maintenance resolution code to static method in service
* chore: clean up linter issues
* chore: generate dart openapi
* refactor: use try{} block for maintenance mode check
* fix: logic error in server redirect
* chore: include `maintenanceMode` key in e2e test
* chore: add i18n entries for maintenance screens
* chore: remove negated condition from hook
* fix: should set default value not override in service
* fix: minor error in page
* feat: initial draft of maintenance module, repo., worker controller, worker service
* refactor: move broadcast code into notification service
* chore: connect websocket on client if in maintenance
* chore: set maintenance module app name
* refactor: rename repository to include worker
chore: configure websocket adapter
* feat: reimplement maintenance mode exit with new module
* refactor: add a constant enum for ExitCode
* refactor: remove redundant route for maintenance
* refactor: only spin up kysely on boot (rather than a Nest app)
* refactor(web): move redirect logic into +layout file where modal is setup
* feat: add Maintenance permission
* refactor: merge common code between api/maintenance
* fix: propagate changes from the CLI to servers
* feat: maintenance authentication guard
* refactor: unify maintenance code into repository
feat: add a step to generate maintenance mode token
* feat: jwt auth for maintenance
* refactor: switch from nest jwt to just jsonwebtokens
* feat: log into maintenance mode from CLI command
* refactor: use `secret` instead of `token` in jwt terminology
chore: log maintenance mode login URL on boot
chore: don't make CLI actions reload if already in target state
* docs: initial draft for maintenance mode page
* refactor: always validate the maintenance auth on the server
* feat: add a link to maintenance mode documentation
* feat: redirect users back to the last page they were on when exiting maintenance
* refactor: provide closeFn in both maintenance repos.
* refactor: ensure the user is also redirected by the server
* chore: swap jsonwebtoken for jose
* refactor: introduce AppRestartEvent w/o secret passing
* refactor: use navigation goto
* refactor: use `continue` instead of `next`
* chore: lint fixes for server
* chore: lint fixes for web
* test: add mock for maintenance repository
* test: add base service dependency to maintenance
* chore: remove @types/jsonwebtoken
* refactor: close database connection after startup check
* refactor: use `request#auth` key
* refactor: use service instead of repository
chore: read token from cookie if possible
chore: rename client event to AppRestartV1
* refactor: more concise redirect logic on web
* refactor: move redirect check into utils
refactor: update translation strings to be more sensible
* refactor: always validate login (i.e. check cookie)
* refactor: lint, open-api, remove old dto
* refactor: encode at point of usage
* refactor: remove business logic from repositories
* chore: fix server/web lints
* refactor: remove repository mock
* chore: fix formatting
* test: write service mocks for maintenance mode
* test: write cli service tests
* fix: catch errors when closing app
* fix: always report no maintenance when usual API is available
* test: api e2e maintenance spec
* chore: add response builder
* chore: add helper to set maint. auth cookie
* feat: add SSR to maintenance API
* test(e2e): write web spec for maintenance
* chore: clean up lint issues
* chore: format files
* feat: perform 302 redirect at server level during maintenance
* fix: keep trying to stop immich until it succeeds (CLI issue)
* chore: lint/format
* refactor: annotate references to other services in worker service
* chore: lint
* refactor: remove unnecessary await
Co-authored-by: Daniel Dietzler <36593685+danieldietzler@users.noreply.github.com>
* refactor: move static methods into util
* refactor: assert secret exists in maintenance worker
* refactor: remove assertion which isn't necessary anymore
* refactor: remove assertion
* refactor: remove outer try {} catch block from loadMaintenanceAuth
* refactor: undo earlier change to vite.config.ts
* chore: update tests due to refactors
* revert: vite.config.ts
* test: expect string jwt
* chore: move blanket exceptions into controllers
* test: update tests according with last change
* refactor: use respondWithCookie
refactor: merge start/end into one route
refactor: rename MaintenanceRepository to AppRepository
chore: use new ApiTag/Endpoint
refactor: apply other requested changes
* chore: regenerate openapi
* chore: lint/format
* chore: remove secureOnly for maint. cookie
* refactor: move maintenance worker code into src/maintenance\nfix: various test fixes
* refactor: use `action` property for setting maint. mode
* refactor: remove Websocket#restartApp in favour of individual methods
* chore: incomplete commit
* chore: remove stray log
* fix: call exitApp from maintenance worker on exit
* fix: add app repository mock
* fix: ensure maintenance cookies are secure
* fix: run playwright tests over secure context (localhost)
* test: update other references to 127.0.0.1
* refactor: use serverSideEmitWithAck
* chore: correct the logic in tryTerminate
* test: juggle cookies ourselves
* chore: fix lint error for e2e spec
* chore: format e2e test
* fix: set cookie secure/non-secure depending on context
* chore: format files
---------
Co-authored-by: Daniel Dietzler <36593685+danieldietzler@users.noreply.github.com>
283 lines
8.4 KiB
TypeScript
283 lines
8.4 KiB
TypeScript
import { SystemMetadataKey } from 'src/enum';
|
|
import { ServerService } from 'src/services/server.service';
|
|
import { newTestService, ServiceMocks } from 'test/utils';
|
|
|
|
describe(ServerService.name, () => {
|
|
let sut: ServerService;
|
|
let mocks: ServiceMocks;
|
|
|
|
beforeEach(() => {
|
|
({ sut, mocks } = newTestService(ServerService));
|
|
});
|
|
|
|
it('should work', () => {
|
|
expect(sut).toBeDefined();
|
|
});
|
|
|
|
describe('getStorage', () => {
|
|
it('should return the disk space as B', async () => {
|
|
mocks.storage.checkDiskUsage.mockResolvedValue({ free: 200, available: 300, total: 500 });
|
|
|
|
await expect(sut.getStorage()).resolves.toEqual({
|
|
diskAvailable: '300 B',
|
|
diskAvailableRaw: 300,
|
|
diskSize: '500 B',
|
|
diskSizeRaw: 500,
|
|
diskUsagePercentage: 60,
|
|
diskUse: '300 B',
|
|
diskUseRaw: 300,
|
|
});
|
|
|
|
expect(mocks.storage.checkDiskUsage).toHaveBeenCalledWith(expect.stringContaining('/data/library'));
|
|
});
|
|
|
|
it('should return the disk space as KiB', async () => {
|
|
mocks.storage.checkDiskUsage.mockResolvedValue({ free: 200_000, available: 300_000, total: 500_000 });
|
|
|
|
await expect(sut.getStorage()).resolves.toEqual({
|
|
diskAvailable: '293.0 KiB',
|
|
diskAvailableRaw: 300_000,
|
|
diskSize: '488.3 KiB',
|
|
diskSizeRaw: 500_000,
|
|
diskUsagePercentage: 60,
|
|
diskUse: '293.0 KiB',
|
|
diskUseRaw: 300_000,
|
|
});
|
|
|
|
expect(mocks.storage.checkDiskUsage).toHaveBeenCalledWith(expect.stringContaining('/data/library'));
|
|
});
|
|
|
|
it('should return the disk space as MiB', async () => {
|
|
mocks.storage.checkDiskUsage.mockResolvedValue({ free: 200_000_000, available: 300_000_000, total: 500_000_000 });
|
|
|
|
await expect(sut.getStorage()).resolves.toEqual({
|
|
diskAvailable: '286.1 MiB',
|
|
diskAvailableRaw: 300_000_000,
|
|
diskSize: '476.8 MiB',
|
|
diskSizeRaw: 500_000_000,
|
|
diskUsagePercentage: 60,
|
|
diskUse: '286.1 MiB',
|
|
diskUseRaw: 300_000_000,
|
|
});
|
|
|
|
expect(mocks.storage.checkDiskUsage).toHaveBeenCalledWith(expect.stringContaining('/data/library'));
|
|
});
|
|
|
|
it('should return the disk space as GiB', async () => {
|
|
mocks.storage.checkDiskUsage.mockResolvedValue({
|
|
free: 200_000_000_000,
|
|
available: 300_000_000_000,
|
|
total: 500_000_000_000,
|
|
});
|
|
|
|
await expect(sut.getStorage()).resolves.toEqual({
|
|
diskAvailable: '279.4 GiB',
|
|
diskAvailableRaw: 300_000_000_000,
|
|
diskSize: '465.7 GiB',
|
|
diskSizeRaw: 500_000_000_000,
|
|
diskUsagePercentage: 60,
|
|
diskUse: '279.4 GiB',
|
|
diskUseRaw: 300_000_000_000,
|
|
});
|
|
|
|
expect(mocks.storage.checkDiskUsage).toHaveBeenCalledWith(expect.stringContaining('/data/library'));
|
|
});
|
|
|
|
it('should return the disk space as TiB', async () => {
|
|
mocks.storage.checkDiskUsage.mockResolvedValue({
|
|
free: 200_000_000_000_000,
|
|
available: 300_000_000_000_000,
|
|
total: 500_000_000_000_000,
|
|
});
|
|
|
|
await expect(sut.getStorage()).resolves.toEqual({
|
|
diskAvailable: '272.8 TiB',
|
|
diskAvailableRaw: 300_000_000_000_000,
|
|
diskSize: '454.7 TiB',
|
|
diskSizeRaw: 500_000_000_000_000,
|
|
diskUsagePercentage: 60,
|
|
diskUse: '272.8 TiB',
|
|
diskUseRaw: 300_000_000_000_000,
|
|
});
|
|
|
|
expect(mocks.storage.checkDiskUsage).toHaveBeenCalledWith(expect.stringContaining('/data/library'));
|
|
});
|
|
|
|
it('should return the disk space as PiB', async () => {
|
|
mocks.storage.checkDiskUsage.mockResolvedValue({
|
|
free: 200_000_000_000_000_000,
|
|
available: 300_000_000_000_000_000,
|
|
total: 500_000_000_000_000_000,
|
|
});
|
|
|
|
await expect(sut.getStorage()).resolves.toEqual({
|
|
diskAvailable: '266.5 PiB',
|
|
diskAvailableRaw: 300_000_000_000_000_000,
|
|
diskSize: '444.1 PiB',
|
|
diskSizeRaw: 500_000_000_000_000_000,
|
|
diskUsagePercentage: 60,
|
|
diskUse: '266.5 PiB',
|
|
diskUseRaw: 300_000_000_000_000_000,
|
|
});
|
|
|
|
expect(mocks.storage.checkDiskUsage).toHaveBeenCalledWith(expect.stringContaining('/data/library'));
|
|
});
|
|
});
|
|
|
|
describe('ping', () => {
|
|
it('should respond with pong', () => {
|
|
expect(sut.ping()).toEqual({ res: 'pong' });
|
|
});
|
|
});
|
|
|
|
describe('getFeatures', () => {
|
|
it('should respond the server features', async () => {
|
|
await expect(sut.getFeatures()).resolves.toEqual({
|
|
smartSearch: true,
|
|
duplicateDetection: true,
|
|
facialRecognition: true,
|
|
importFaces: false,
|
|
map: true,
|
|
reverseGeocoding: true,
|
|
oauth: false,
|
|
oauthAutoLaunch: false,
|
|
ocr: true,
|
|
passwordLogin: true,
|
|
search: true,
|
|
sidecar: true,
|
|
configFile: false,
|
|
trash: true,
|
|
email: false,
|
|
});
|
|
expect(mocks.systemMetadata.get).toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('getSystemConfig', () => {
|
|
it('should respond the server configuration', async () => {
|
|
await expect(sut.getSystemConfig()).resolves.toEqual({
|
|
loginPageMessage: '',
|
|
oauthButtonText: 'Login with OAuth',
|
|
trashDays: 30,
|
|
userDeleteDelay: 7,
|
|
isInitialized: undefined,
|
|
isOnboarded: false,
|
|
externalDomain: '',
|
|
publicUsers: true,
|
|
mapDarkStyleUrl: 'https://tiles.immich.cloud/v1/style/dark.json',
|
|
mapLightStyleUrl: 'https://tiles.immich.cloud/v1/style/light.json',
|
|
maintenanceMode: false,
|
|
});
|
|
expect(mocks.systemMetadata.get).toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('getStats', () => {
|
|
it('should total up usage by user', async () => {
|
|
mocks.user.getUserStats.mockResolvedValue([
|
|
{
|
|
userId: 'user1',
|
|
userName: '1 User',
|
|
photos: 10,
|
|
videos: 11,
|
|
usage: 12_345,
|
|
usagePhotos: 1,
|
|
usageVideos: 11_345,
|
|
quotaSizeInBytes: 0,
|
|
},
|
|
{
|
|
userId: 'user2',
|
|
userName: '2 User',
|
|
photos: 10,
|
|
videos: 20,
|
|
usage: 123_456,
|
|
usagePhotos: 100,
|
|
usageVideos: 23_456,
|
|
quotaSizeInBytes: 0,
|
|
},
|
|
{
|
|
userId: 'user3',
|
|
userName: '3 User',
|
|
photos: 100,
|
|
videos: 0,
|
|
usage: 987_654,
|
|
usagePhotos: 900,
|
|
usageVideos: 87_654,
|
|
quotaSizeInBytes: 0,
|
|
},
|
|
]);
|
|
|
|
await expect(sut.getStatistics()).resolves.toEqual({
|
|
photos: 120,
|
|
videos: 31,
|
|
usage: 1_123_455,
|
|
usagePhotos: 1001,
|
|
usageVideos: 122_455,
|
|
usageByUser: [
|
|
{
|
|
photos: 10,
|
|
quotaSizeInBytes: 0,
|
|
usage: 12_345,
|
|
usagePhotos: 1,
|
|
usageVideos: 11_345,
|
|
userName: '1 User',
|
|
userId: 'user1',
|
|
videos: 11,
|
|
},
|
|
{
|
|
photos: 10,
|
|
quotaSizeInBytes: 0,
|
|
usage: 123_456,
|
|
usagePhotos: 100,
|
|
usageVideos: 23_456,
|
|
userName: '2 User',
|
|
userId: 'user2',
|
|
videos: 20,
|
|
},
|
|
{
|
|
photos: 100,
|
|
quotaSizeInBytes: 0,
|
|
usage: 987_654,
|
|
usagePhotos: 900,
|
|
usageVideos: 87_654,
|
|
userName: '3 User',
|
|
userId: 'user3',
|
|
videos: 0,
|
|
},
|
|
],
|
|
});
|
|
|
|
expect(mocks.user.getUserStats).toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('setLicense', () => {
|
|
it('should save license if valid', async () => {
|
|
mocks.systemMetadata.set.mockResolvedValue();
|
|
|
|
const license = { licenseKey: 'IMSV-license-key', activationKey: 'activation-key' };
|
|
await sut.setLicense(license);
|
|
|
|
expect(mocks.systemMetadata.set).toHaveBeenCalledWith(SystemMetadataKey.License, expect.any(Object));
|
|
});
|
|
|
|
it('should not save license if invalid', async () => {
|
|
mocks.user.upsertMetadata.mockResolvedValue();
|
|
|
|
const license = { licenseKey: 'license-key', activationKey: 'activation-key' };
|
|
const call = sut.setLicense(license);
|
|
await expect(call).rejects.toThrowError('Invalid license key');
|
|
expect(mocks.user.upsertMetadata).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('deleteLicense', () => {
|
|
it('should delete license', async () => {
|
|
mocks.user.upsertMetadata.mockResolvedValue();
|
|
|
|
await sut.deleteLicense();
|
|
expect(mocks.user.upsertMetadata).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
});
|