mirror of
https://github.com/navidrome/navidrome.git
synced 2025-08-13 14:01:14 +03:00
* feat(database): add user_library table and library access methods Signed-off-by: Deluan <deluan@navidrome.org> # Conflicts: # tests/mock_library_repo.go * feat(database): enhance user retrieval with library associations Signed-off-by: Deluan <deluan@navidrome.org> * feat(api): implement library management and user-library association endpoints Signed-off-by: Deluan <deluan@navidrome.org> * feat(api): restrict access to library and config endpoints to admin users Signed-off-by: Deluan <deluan@navidrome.org> * refactor(library): implement library management service and update API routes Signed-off-by: Deluan <deluan@navidrome.org> * feat(database): add library filtering to album, folder, and media file queries Signed-off-by: Deluan <deluan@navidrome.org> * refactor library service to use REST repository pattern and remove CRUD operations Signed-off-by: Deluan <deluan@navidrome.org> * add total_duration column to library and update user_library table Signed-off-by: Deluan <deluan@navidrome.org> * fix migration file name Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): add library management features including create, edit, delete, and list functionalities - WIP Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): enhance library validation and management with path checks and normalization - WIP Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): improve library path validation and error handling - WIP Signed-off-by: Deluan <deluan@navidrome.org> * use utils/formatBytes Signed-off-by: Deluan <deluan@navidrome.org> * simplify DeleteLibraryButton.jsx Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): enhance validation messages and error handling for library paths Signed-off-by: Deluan <deluan@navidrome.org> * lint Signed-off-by: Deluan <deluan@navidrome.org> * test(scanner): add tests for multi-library scanning and validation Signed-off-by: Deluan <deluan@navidrome.org> * test(scanner): improve handling of filesystem errors and ensure warnings are returned Signed-off-by: Deluan <deluan@navidrome.org> * feat(controller): add function to retrieve the most recent scan time across all libraries Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): add additional fields and restructure LibraryEdit component for enhanced statistics display Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): enhance LibraryCreate and LibraryEdit components with additional props and styling Signed-off-by: Deluan <deluan@navidrome.org> * feat(mediafile): add LibraryName field and update queries to include library name Signed-off-by: Deluan <deluan@navidrome.org> * feat(missingfiles): add library filter and display in MissingFilesList component Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): implement scanner interface for triggering library scans on create/update Signed-off-by: Deluan <deluan@navidrome.org> # Conflicts: # cmd/wire_gen.go # cmd/wire_injectors.go # Conflicts: # cmd/wire_gen.go # Conflicts: # cmd/wire_gen.go # cmd/wire_injectors.go * feat(library): trigger scan after successful library deletion to clean up orphaned data Signed-off-by: Deluan <deluan@navidrome.org> * rename migration file for user library table to maintain versioning order Signed-off-by: Deluan <deluan@navidrome.org> * refactor: move scan triggering logic into a helper method for clarity Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): add library path and name fields to album and mediafile models Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): add/remove watchers on demand, not only when server starts Signed-off-by: Deluan <deluan@navidrome.org> * refactor(scanner): streamline library handling by using state-libraries for consistency Signed-off-by: Deluan <deluan@navidrome.org> * fix: track processed libraries by updating state with scan timestamps Signed-off-by: Deluan <deluan@navidrome.org> * prepend libraryID for track and album PIDs Signed-off-by: Deluan <deluan@navidrome.org> * feat(repository): apply library filtering in CountAll methods for albums, folders, and media files Signed-off-by: Deluan <deluan@navidrome.org> * feat(user): add library selection for user creation and editing Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): implement library selection functionality with reducer and UI component Signed-off-by: Deluan <deluan@navidrome.org> # Conflicts: # .github/copilot-instructions.md # Conflicts: # .gitignore * feat(library): add tests for LibrarySelector and library selection hooks Signed-off-by: Deluan <deluan@navidrome.org> * test: add unit tests for file utility functions Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): add library ID filtering for album resources Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): streamline library ID filtering in repositories and update resource filtering logic Signed-off-by: Deluan <deluan@navidrome.org> * fix(repository): add table name handling in filter functions for SQL queries Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): add refresh functionality on LibrarySelector close Signed-off-by: Deluan <deluan@navidrome.org> * feat(artist): add library ID filtering for artists in repository and update resource filtering logic Signed-off-by: Deluan <deluan@navidrome.org> # Conflicts: # persistence/artist_repository.go * Add library_id field support for smart playlists - Add library_id field to smart playlist criteria system - Supports Is and IsNot operators for filtering by library ID - Includes comprehensive test coverage for single values and lists - Enables creation of library-specific smart playlists * feat(subsonic): implement user-specific library access in GetMusicFolders Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): enhance LibrarySelectionField to extract library IDs from record Signed-off-by: Deluan <deluan@navidrome.org> * feat(subsonic): update GetIndexes and GetArtists method to support library ID filtering Signed-off-by: Deluan <deluan@navidrome.org> * fix: ensure LibrarySelector dropdown refreshes on button close Added refresh() call when closing the dropdown via button click to maintain consistency with the ClickAwayListener behavior. This ensures the UI updates properly regardless of how the dropdown is closed, fixing an inconsistent refresh behavior between different closing methods. The fix tracks the previous open state and calls refresh() only when the dropdown was open and is being closed by the button click. * refactor: simplify getUserAccessibleLibraries function and update related tests Signed-off-by: Deluan <deluan@navidrome.org> * feat: enhance selectedMusicFolderIds function to handle valid music folder IDs and improve fallback logic Signed-off-by: Deluan <deluan@navidrome.org> * refactor: change ArtistRepository.GetIndex to accept multiple library IDs Updated the GetIndex method signature to accept a slice of library IDs instead of a single ID, enabling support for filtering artists across multiple libraries simultaneously. Changes include: - Modified ArtistRepository interface in model/artist.go - Updated implementation in persistence/artist_repository.go with improved library filtering logic - Refactored Subsonic API browsing.go to use new selectedMusicFolderIds helper - Added comprehensive test coverage for multiple library scenarios - Updated mock repository implementation for testing This change improves flexibility for multi-library operations while maintaining backward compatibility through the selectedMusicFolderIds helper function. * feat: add library access validation to selectedMusicFolderIds Enhanced the selectedMusicFolderIds function to validate musicFolderId parameters against the user's accessible libraries. Invalid library IDs (those the user doesn't have access to) are now silently filtered out, improving security by preventing users from accessing libraries they don't have permission for. Changes include: - Added validation logic to check musicFolderId parameters against user's accessible libraries - Added slices package import for efficient validation - Enhanced function documentation to clarify validation behavior - Added comprehensive test cases covering validation scenarios - Maintains backward compatibility with existing behavior * feat: implement multi-library support for GetAlbumList and GetAlbumList2 endpoints - Enhanced selectedMusicFolderIds helper to validate and filter library IDs - Added ApplyLibraryFilter function in filter/filters.go for library filtering - Updated getAlbumList to support musicFolderId parameter filtering - Added comprehensive tests for multi-library functionality - Supports single and multiple musicFolderId values - Falls back to all accessible libraries when no musicFolderId provided - Validates library access permissions for user security * feat: implement multi-library support for GetRandomSongs, GetSongsByGenre, GetStarred, and GetStarred2 - Added multi-library filtering to GetRandomSongs endpoint using musicFolderId parameter - Added multi-library filtering to GetSongsByGenre endpoint using musicFolderId parameter - Enhanced GetStarred and GetStarred2 to filter artists, albums, and songs by library - Added Options field to MockMediaFileRepo and MockArtistRepo for test compatibility - Added comprehensive Ginkgo/Gomega tests for all new multi-library functionality - All tests verify proper SQL filter generation and library access validation - Supports single/multiple musicFolderId values with fallback to all accessible libraries * refactor: optimize starred items queries with parallel execution and fix test isolation Refactored starred items functionality by extracting common logic into getStarredItems() method that executes artist, album, and media file queries in parallel for better performance. This eliminates code duplication between GetStarred and GetStarred2 methods while improving response times through concurrent database queries using run.Parallel(). Also fixed test isolation issues by adding missing auth.Init(ds) call in album lists test setup. This resolves nil pointer dereference errors in GetStarred and GetStarred2 tests when run independently. * fix: add ApplyArtistLibraryFilter to filter artists by associated music folders Signed-off-by: Deluan <deluan@navidrome.org> * feat: add library access methods to User model Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement library access filtering for artist queries based on user permissions Signed-off-by: Deluan <deluan@navidrome.org> * feat: enhance artist library filtering based on user permissions and optimize library ID retrieval Signed-off-by: Deluan <deluan@navidrome.org> * fix: return error when any musicFolderId is invalid or inaccessible Changed behavior from silently filtering invalid library IDs to returning ErrorDataNotFound (code 70) when any provided musicFolderId parameter is invalid or the user doesn't have access to it. The error message includes the specific library number for better debugging. This affects album/song list endpoints (getAlbumList, getRandomSongs, getSongsByGenre, getStarred) to provide consistent error handling across all Subsonic API endpoints. Updated corresponding tests to expect errors instead of silent filtering. * feat: add musicFolderId parameter support to Search2 and Search3 endpoints Implemented musicFolderId parameter support for Subsonic API Search2 and Search3 endpoints, completing multi-library functionality across all Subsonic endpoints. Key changes: - Added musicFolderId parameter handling to Search2 and Search3 endpoints - Updated search logic to filter results by specified library or all accessible libraries when parameter not provided - Added proper error handling for invalid/inaccessible musicFolderId values - Refactored SearchableRepository interface to support library filtering with variadic QueryOptions - Updated repository implementations (Album, Artist, MediaFile) to handle library filtering in search operations - Added comprehensive test coverage with robust assertions verifying library filtering works correctly - Enhanced mock repositories to capture QueryOptions for test validation Signed-off-by: Deluan <deluan@navidrome.org> * feat: refresh LibraryList on scan end Signed-off-by: Deluan <deluan@navidrome.org> * fix: allow editing name of main library Signed-off-by: Deluan <deluan@navidrome.org> * refactor: implement SendBroadcastMessage method for event broadcasting Signed-off-by: Deluan <deluan@navidrome.org> * feat: add event broadcasting for library creation, update, and deletion Signed-off-by: Deluan <deluan@navidrome.org> * feat: add useRefreshOnEvents hook for custom refresh logic on event changes Signed-off-by: Deluan <deluan@navidrome.org> * feat: enhance library management with refresh event broadcasting Signed-off-by: Deluan <deluan@navidrome.org> * feat: replace AddUserLibrary and RemoveUserLibrary with SetUserLibraries for better library management Signed-off-by: Deluan <deluan@navidrome.org> * chore: remove commented-out genre repository code from persistence tests * feat: enhance library selection with master checkbox functionality Added a master checkbox to the SelectLibraryInput component, allowing users to select or deselect all libraries at once. This improves user experience by simplifying the selection process when multiple libraries are available. Additionally, updated translations in the en.json file to include a new message for selecting all libraries, ensuring consistency in user interface messaging. Signed-off-by: Deluan <deluan@navidrome.org> * feat: add default library assignment for new users Introduced a new column `default_new_users` in the library table to facilitate automatic assignment of default libraries to new regular users. When a new user is created, they will now be assigned to libraries marked as default, enhancing user experience by ensuring they have immediate access to essential resources. Additionally, updated the user repository logic to handle this new functionality and modified the user creation validation to reflect that library selection is optional for non-admin users. Signed-off-by: Deluan <deluan@navidrome.org> * fix: correct updated_at assignment in library repository Signed-off-by: Deluan <deluan@navidrome.org> * fix: improve cache buffering logic Refactored the cache buffering logic to ensure thread safety when checking the buffer length Signed-off-by: Deluan <deluan@navidrome.org> * fix formating Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement per-library artist statistics with automatic aggregation Implemented comprehensive multi-library support for artist statistics that automatically aggregates stats from user-accessible libraries. This fundamental change moves artist statistics from global scope to per-library granularity while maintaining backward compatibility and transparent operation. Key changes include: - Migrated artist statistics from global artist.stats to per-library library_artist.stats - Added automatic library filtering and aggregation in existing Get/GetAll methods - Updated role-based filtering to work with per-library statistics storage - Enhanced statistics calculation to process and store stats per library - Implemented user permission-aware aggregation that respects library access control - Added comprehensive test coverage for library filtering and restricted user access - Created helper functions to ensure proper library associations in tests This enables users to see statistics that accurately reflect only the content from libraries they have access to, providing proper multi-tenant behavior while maintaining the existing API surface and UI functionality. Signed-off-by: Deluan <deluan@navidrome.org> * feat: add multi-library support with per-library tag statistics - WIP Signed-off-by: Deluan <deluan@navidrome.org> * refactor: genre and tag repositories. add comprehensive tests Signed-off-by: Deluan <deluan@navidrome.org> * feat: add multi-library support to tag repository system Implemented comprehensive library filtering for tag repositories to support the multi-library feature. This change ensures that users only see tags from libraries they have access to, while admin users can see all tags. Key changes: - Enhanced TagRepository.Add() method to accept libraryID parameter for proper library association - Updated baseTagRepository to implement library-aware queries with proper joins - Added library_tag table integration for per-library tag statistics - Implemented user permission-based filtering through user_library associations - Added comprehensive test coverage for library filtering scenarios - Updated UI data provider to include tag filtering by selected libraries - Modified scanner to pass library ID when adding tags during folder processing The implementation maintains backward compatibility while providing proper isolation between libraries for tag-based operations like genres and other metadata tags. * refactor: simplify artist repository library filtering Removed conditional admin logic from applyLibraryFilterToArtistQuery method and unified the library filtering approach to match the tag repository pattern. The method now always uses the same SQL join structure regardless of user role, with admin access handled automatically through user_library associations. Added artistLibraryIdFilter function to properly qualify library_id column references and prevent SQL ambiguity errors when multiple tables contain library_id columns. This ensures the filter targets library_artist.library_id specifically rather than causing ambiguous column name conflicts. * fix: resolve LibrarySelectionField validation error for non-admin users Fixed validation error 'At least one library must be selected for non-admin users' that appeared even when libraries were selected. The issue was caused by a data format mismatch between backend and frontend. The backend sends user data with libraries as an array of objects, but the LibrarySelectionField component expects libraryIds as an array of IDs. Added data transformation in the data provider's getOne method to automatically convert libraries array to libraryIds format when fetching user records. Also extracted validation logic into a separate userValidation module for better code organization and added comprehensive test coverage to prevent similar issues. * refactor: remove unused library access functions and related tests Signed-off-by: Deluan <deluan@navidrome.org> * refactor: rename search_test.go to searching_test.go for consistency Signed-off-by: Deluan <deluan@navidrome.org> * fix: add user context to scrobble buffer getParticipants call Added user context handling to scrobbleBufferRepository.Next method to resolve SQL error 'no such column: library_artist.library_id' when processing scrobble entries in multi-library environments. The artist repository now requires user context for proper library filtering, so we fetch the user and temporarily inject it into the context before calling getParticipants. This ensures background scrobbling operations work correctly with multi-library support. * feat: add cross-library move detection for scanner Implemented cross-library move detection for the scanner phase 2 to properly handle files moved between libraries. This prevents users from losing play counts, ratings, and other metadata when moving files across library boundaries. Changes include: - Added MediaFileRepository methods for two-tier matching: FindRecentFilesByMBZTrackID (primary) and FindRecentFilesByProperties (fallback) - Extended scanner phase 2 pipeline with processCrossLibraryMoves stage that processes files unmatched within their library - Implemented findCrossLibraryMatch with MusicBrainz Release Track ID priority and intrinsic properties fallback - Updated producer logic to handle missing tracks without matches, ensuring cross-library processing - Updated tests to reflect new producer behavior and cross-library functionality The implementation uses existing moveMatched function for unified move operations, automatically preserving all user data through database foreign key relationships. Cross-library moves are detected using the same Equals() and IsEquivalent() matching logic as within-library moves for consistency. Signed-off-by: Deluan <deluan@navidrome.org> * feat: add album annotation reassignment for cross-library moves Implemented album annotation reassignment functionality for the scanner's missing tracks phase. When tracks move between libraries and change album IDs, the system now properly reassigns album annotations (starred status, ratings) from the old album to the new album. This prevents loss of user annotations when tracks are moved across library boundaries. The implementation includes: - Thread-safe annotation reassignment using mutex protection - Duplicate reassignment prevention through processed album tracking - Graceful error handling that doesn't fail the entire move operation - Comprehensive test coverage for various scenarios including error conditions This enhancement ensures data integrity and user experience continuity during cross-library media file movements. * fix: address PR review comments for multi-library support Fixed several issues identified in PR review: - Removed unnecessary artist stats initialization check since the map is already initialized in PostScan() - Improved code clarity in user repository by extracting isNewUser variable to avoid checking count == 0 twice - Fixed library selection logic to properly handle initial library state and prevent overriding user selections These changes address code quality and logic issues identified during the multi-library support PR review. * feat: add automatic playlist statistics refreshing Implemented automatic playlist statistics (duration, size, song count) refreshing when tracks are modified. Added new refreshStats() method to recalculate statistics from playlist tracks, and SetTracks() method to update tracks and refresh statistics atomically. Modified all track manipulation methods (RemoveTracks, AddTracks, AddMediaFiles) to automatically refresh statistics. Updated playlist repository to use the new SetTracks method for consistent statistics handling. * refactor: rename AddTracks to AddMediaFilesByID for clarity Renamed the AddTracks method to AddMediaFilesByID throughout the codebase to better reflect its purpose of adding media files to a playlist by their IDs. This change improves code readability and makes the method name more descriptive of its actual functionality. Updated all references in playlist model, tests, core playlist logic, and Subsonic API handlers to use the new method name. * refactor: consolidate user context access in persistence layer Removed duplicate helper functions userId() and isAdmin() from sql_base_repository.go and consolidated all user context access to use loggedUser(r.ctx).ID and loggedUser(r.ctx).IsAdmin consistently across the persistence layer. This change eliminates code duplication and provides a single, consistent pattern for accessing user context information in repository methods. All functionality remains unchanged - this is purely a code cleanup refactoring. * refactor: eliminate MockLibraryService duplication using embedded struct - Replace 235-line MockLibraryService with 40-line embedded struct pattern - Enhance MockLibraryRepo with service-layer methods (192→310 lines) - Maintain full compatibility with existing tests - All 72 nativeapi specs pass with proper error handling Signed-off-by: Deluan <deluan@navidrome.org> * refactor: cleanup Signed-off-by: Deluan <deluan@navidrome.org> --------- Signed-off-by: Deluan <deluan@navidrome.org>
981 lines
30 KiB
Go
981 lines
30 KiB
Go
package core_test
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"sync"
|
|
|
|
"github.com/deluan/rest"
|
|
_ "github.com/navidrome/navidrome/adapters/taglib" // Register taglib extractor
|
|
"github.com/navidrome/navidrome/conf/configtest"
|
|
"github.com/navidrome/navidrome/core"
|
|
_ "github.com/navidrome/navidrome/core/storage/local" // Register local storage
|
|
"github.com/navidrome/navidrome/model"
|
|
"github.com/navidrome/navidrome/model/request"
|
|
"github.com/navidrome/navidrome/server/events"
|
|
"github.com/navidrome/navidrome/tests"
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
// These tests require the local storage adapter and the taglib extractor to be registered.
|
|
var _ = Describe("Library Service", func() {
|
|
var service core.Library
|
|
var ds *tests.MockDataStore
|
|
var libraryRepo *tests.MockLibraryRepo
|
|
var userRepo *tests.MockedUserRepo
|
|
var ctx context.Context
|
|
var tempDir string
|
|
var scanner *mockScanner
|
|
var watcherManager *mockWatcherManager
|
|
var broker *mockEventBroker
|
|
|
|
BeforeEach(func() {
|
|
DeferCleanup(configtest.SetupConfig())
|
|
|
|
ds = &tests.MockDataStore{}
|
|
libraryRepo = &tests.MockLibraryRepo{}
|
|
userRepo = tests.CreateMockUserRepo()
|
|
ds.MockedLibrary = libraryRepo
|
|
ds.MockedUser = userRepo
|
|
|
|
// Create a mock scanner that tracks calls
|
|
scanner = &mockScanner{}
|
|
// Create a mock watcher manager
|
|
watcherManager = &mockWatcherManager{
|
|
libraryStates: make(map[int]model.Library),
|
|
}
|
|
// Create a mock event broker
|
|
broker = &mockEventBroker{}
|
|
service = core.NewLibrary(ds, scanner, watcherManager, broker)
|
|
ctx = context.Background()
|
|
|
|
// Create a temporary directory for testing valid paths
|
|
var err error
|
|
tempDir, err = os.MkdirTemp("", "navidrome-library-test-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() {
|
|
os.RemoveAll(tempDir)
|
|
})
|
|
})
|
|
|
|
Describe("Library CRUD Operations", func() {
|
|
var repo rest.Persistable
|
|
|
|
BeforeEach(func() {
|
|
r := service.NewRepository(ctx)
|
|
repo = r.(rest.Persistable)
|
|
})
|
|
|
|
Describe("Create", func() {
|
|
It("creates a new library successfully", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data[1].Name).To(Equal("New Library"))
|
|
Expect(libraryRepo.Data[1].Path).To(Equal(tempDir))
|
|
})
|
|
|
|
It("fails when library name is empty", func() {
|
|
library := &model.Library{Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("ra.validation.required"))
|
|
})
|
|
|
|
It("fails when library path is empty", func() {
|
|
library := &model.Library{Name: "Test"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("ra.validation.required"))
|
|
})
|
|
|
|
It("fails when library path is not absolute", func() {
|
|
library := &model.Library{Name: "Test", Path: "relative/path"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
|
|
Context("Database constraint violations", func() {
|
|
BeforeEach(func() {
|
|
// Set up an existing library that will cause constraint violations
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Existing Library", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
AfterEach(func() {
|
|
// Reset custom PutFn after each test
|
|
libraryRepo.PutFn = nil
|
|
})
|
|
|
|
It("handles name uniqueness constraint violation from database", func() {
|
|
// Create the directory that will be used for the test
|
|
otherTempDir, err := os.MkdirTemp("", "navidrome-other-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(otherTempDir) })
|
|
|
|
// Try to create another library with the same name
|
|
library := &model.Library{ID: 2, Name: "Existing Library", Path: otherTempDir}
|
|
|
|
// Mock the repository to return a UNIQUE constraint error
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.name")
|
|
}
|
|
|
|
_, err = repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
|
|
It("handles path uniqueness constraint violation from database", func() {
|
|
// Try to create another library with the same path
|
|
library := &model.Library{ID: 2, Name: "Different Library", Path: tempDir}
|
|
|
|
// Mock the repository to return a UNIQUE constraint error
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.path")
|
|
}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Update", func() {
|
|
BeforeEach(func() {
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
It("updates an existing library successfully", func() {
|
|
newTempDir, err := os.MkdirTemp("", "navidrome-library-update-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(newTempDir) })
|
|
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: newTempDir}
|
|
|
|
err = repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data[1].Name).To(Equal("Updated Library"))
|
|
Expect(libraryRepo.Data[1].Path).To(Equal(newTempDir))
|
|
})
|
|
|
|
It("fails when library doesn't exist", func() {
|
|
// Create a unique temporary directory to avoid path conflicts
|
|
uniqueTempDir, err := os.MkdirTemp("", "navidrome-nonexistent-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(uniqueTempDir) })
|
|
|
|
library := &model.Library{ID: 999, Name: "Non-existent", Path: uniqueTempDir}
|
|
|
|
err = repo.Update("999", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
|
|
It("fails when library name is empty", func() {
|
|
library := &model.Library{ID: 1, Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("ra.validation.required"))
|
|
})
|
|
|
|
It("cleans and normalizes the path on update", func() {
|
|
unnormalizedPath := tempDir + "//../" + filepath.Base(tempDir)
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: unnormalizedPath}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data[1].Path).To(Equal(filepath.Clean(unnormalizedPath)))
|
|
})
|
|
|
|
It("allows updating library with same name (no change)", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library keeping the same name (should be allowed)
|
|
library := &model.Library{ID: 1, Name: "Test Library", Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("allows updating library with same path (no change)", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library keeping the same path (should be allowed)
|
|
library := &model.Library{ID: 1, Name: "Test Library", Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
Context("Database constraint violations during update", func() {
|
|
BeforeEach(func() {
|
|
// Reset any custom PutFn from previous tests
|
|
libraryRepo.PutFn = nil
|
|
})
|
|
|
|
It("handles name uniqueness constraint violation during update", func() {
|
|
// Create additional temp directory for the test
|
|
otherTempDir, err := os.MkdirTemp("", "navidrome-other-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(otherTempDir) })
|
|
|
|
// Set up two libraries
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library One", Path: tempDir},
|
|
{ID: 2, Name: "Library Two", Path: otherTempDir},
|
|
})
|
|
|
|
// Mock database constraint violation
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.name")
|
|
}
|
|
|
|
// Try to update library 2 to have the same name as library 1
|
|
library := &model.Library{ID: 2, Name: "Library One", Path: otherTempDir}
|
|
|
|
err = repo.Update("2", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
|
|
It("handles path uniqueness constraint violation during update", func() {
|
|
// Create additional temp directory for the test
|
|
otherTempDir, err := os.MkdirTemp("", "navidrome-other-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(otherTempDir) })
|
|
|
|
// Set up two libraries
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library One", Path: tempDir},
|
|
{ID: 2, Name: "Library Two", Path: otherTempDir},
|
|
})
|
|
|
|
// Mock database constraint violation
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.path")
|
|
}
|
|
|
|
// Try to update library 2 to have the same path as library 1
|
|
library := &model.Library{ID: 2, Name: "Library Two", Path: tempDir}
|
|
|
|
err = repo.Update("2", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Path Validation", func() {
|
|
Context("Create operation", func() {
|
|
It("fails when path is not absolute", func() {
|
|
library := &model.Library{Name: "Test", Path: "relative/path"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
|
|
It("fails when path does not exist", func() {
|
|
nonExistentPath := filepath.Join(tempDir, "nonexistent")
|
|
library := &model.Library{Name: "Test", Path: nonExistentPath}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathInvalid"))
|
|
})
|
|
|
|
It("fails when path is a file instead of directory", func() {
|
|
testFile := filepath.Join(tempDir, "testfile.txt")
|
|
err := os.WriteFile(testFile, []byte("test"), 0600)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
library := &model.Library{Name: "Test", Path: testFile}
|
|
|
|
_, err = repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathNotDirectory"))
|
|
})
|
|
|
|
It("fails when path is not accessible due to permissions", func() {
|
|
Skip("Permission tests are environment-dependent and may fail in CI")
|
|
// This test is skipped because creating a directory with no read permissions
|
|
// is complex and may not work consistently across different environments
|
|
})
|
|
|
|
It("handles multiple validation errors", func() {
|
|
library := &model.Library{Name: "", Path: "relative/path"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors).To(HaveKey("name"))
|
|
Expect(validationErr.Errors).To(HaveKey("path"))
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.required"))
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
})
|
|
|
|
Context("Update operation", func() {
|
|
BeforeEach(func() {
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
It("fails when updated path is not absolute", func() {
|
|
library := &model.Library{ID: 1, Name: "Test", Path: "relative/path"}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
|
|
It("allows updating library with same name (no change)", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library keeping the same name (should be allowed)
|
|
library := &model.Library{ID: 1, Name: "Test Library", Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("fails when updated path does not exist", func() {
|
|
nonExistentPath := filepath.Join(tempDir, "nonexistent")
|
|
library := &model.Library{ID: 1, Name: "Test", Path: nonExistentPath}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathInvalid"))
|
|
})
|
|
|
|
It("fails when updated path is a file instead of directory", func() {
|
|
testFile := filepath.Join(tempDir, "updatefile.txt")
|
|
err := os.WriteFile(testFile, []byte("test"), 0600)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
library := &model.Library{ID: 1, Name: "Test", Path: testFile}
|
|
|
|
err = repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathNotDirectory"))
|
|
})
|
|
|
|
It("handles multiple validation errors on update", func() {
|
|
// Try to update with empty name and invalid path
|
|
library := &model.Library{ID: 1, Name: "", Path: "relative/path"}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors).To(HaveKey("name"))
|
|
Expect(validationErr.Errors).To(HaveKey("path"))
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.required"))
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Delete", func() {
|
|
BeforeEach(func() {
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library to Delete", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
It("deletes an existing library successfully", func() {
|
|
err := repo.Delete("1")
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data).To(HaveLen(0))
|
|
})
|
|
|
|
It("fails when library doesn't exist", func() {
|
|
err := repo.Delete("999")
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("User-Library Association Operations", func() {
|
|
var regularUser, adminUser *model.User
|
|
|
|
BeforeEach(func() {
|
|
regularUser = &model.User{ID: "user1", UserName: "regular", IsAdmin: false}
|
|
adminUser = &model.User{ID: "admin1", UserName: "admin", IsAdmin: true}
|
|
|
|
userRepo.Data = map[string]*model.User{
|
|
"regular": regularUser,
|
|
"admin": adminUser,
|
|
}
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library 1", Path: "/music1"},
|
|
{ID: 2, Name: "Library 2", Path: "/music2"},
|
|
{ID: 3, Name: "Library 3", Path: "/music3"},
|
|
})
|
|
})
|
|
|
|
Describe("GetUserLibraries", func() {
|
|
It("returns user's libraries", func() {
|
|
userRepo.UserLibraries = map[string][]int{
|
|
"user1": {1},
|
|
}
|
|
|
|
result, err := service.GetUserLibraries(ctx, "user1")
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(HaveLen(1))
|
|
Expect(result[0].ID).To(Equal(1))
|
|
})
|
|
|
|
It("fails when user doesn't exist", func() {
|
|
_, err := service.GetUserLibraries(ctx, "nonexistent")
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
})
|
|
|
|
Describe("SetUserLibraries", func() {
|
|
It("sets libraries for regular user successfully", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{1, 2})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
libraries := userRepo.UserLibraries["user1"]
|
|
Expect(libraries).To(HaveLen(2))
|
|
})
|
|
|
|
It("fails when user doesn't exist", func() {
|
|
err := service.SetUserLibraries(ctx, "nonexistent", []int{1})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
|
|
It("fails when trying to set libraries for admin user", func() {
|
|
err := service.SetUserLibraries(ctx, "admin1", []int{1})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("cannot manually assign libraries to admin users"))
|
|
})
|
|
|
|
It("fails when no libraries provided for regular user", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("at least one library must be assigned to non-admin users"))
|
|
})
|
|
|
|
It("fails when library doesn't exist", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{999})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("one or more library IDs are invalid"))
|
|
})
|
|
|
|
It("fails when some libraries don't exist", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{1, 999, 2})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("one or more library IDs are invalid"))
|
|
})
|
|
})
|
|
|
|
Describe("ValidateLibraryAccess", func() {
|
|
Context("admin user", func() {
|
|
BeforeEach(func() {
|
|
ctx = request.WithUser(ctx, *adminUser)
|
|
})
|
|
|
|
It("allows access to any library", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "admin1", 1)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
})
|
|
|
|
Context("regular user", func() {
|
|
BeforeEach(func() {
|
|
ctx = request.WithUser(ctx, *regularUser)
|
|
userRepo.UserLibraries = map[string][]int{
|
|
"user1": {1},
|
|
}
|
|
})
|
|
|
|
It("allows access to user's libraries", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "user1", 1)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("denies access to libraries user doesn't have", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "user1", 2)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("user does not have access to library 2"))
|
|
})
|
|
})
|
|
|
|
Context("no user in context", func() {
|
|
It("fails with user not found error", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "user1", 1)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("user not found in context"))
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Scan Triggering", func() {
|
|
var repo rest.Persistable
|
|
|
|
BeforeEach(func() {
|
|
r := service.NewRepository(ctx)
|
|
repo = r.(rest.Persistable)
|
|
})
|
|
|
|
It("triggers scan when creating a new library", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait briefly for the goroutine to complete
|
|
Eventually(func() int {
|
|
return scanner.len()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
// Verify scan was called with correct parameters
|
|
Expect(scanner.ScanCalls[0].FullScan).To(BeFalse()) // Should be quick scan
|
|
})
|
|
|
|
It("triggers scan when updating library path", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Create a new temporary directory for the update
|
|
newTempDir, err := os.MkdirTemp("", "navidrome-library-update-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(newTempDir) })
|
|
|
|
// Update the library with a new path
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: newTempDir}
|
|
err = repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait briefly for the goroutine to complete
|
|
Eventually(func() int {
|
|
return scanner.len()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
// Verify scan was called with correct parameters
|
|
Expect(scanner.ScanCalls[0].FullScan).To(BeFalse()) // Should be quick scan
|
|
})
|
|
|
|
It("does not trigger scan when updating library without path change", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library name only (same path)
|
|
library := &model.Library{ID: 1, Name: "Updated Name", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait a bit to ensure no scan was triggered
|
|
Consistently(func() int {
|
|
return scanner.len()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("does not trigger scan when library creation fails", func() {
|
|
// Try to create library with invalid data (empty name)
|
|
library := &model.Library{Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Ensure no scan was triggered since creation failed
|
|
Consistently(func() int {
|
|
return scanner.len()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("does not trigger scan when library update fails", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Try to update with invalid data (empty name)
|
|
library := &model.Library{ID: 1, Name: "", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Ensure no scan was triggered since update failed
|
|
Consistently(func() int {
|
|
return scanner.len()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("triggers scan when deleting a library", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library to Delete", Path: tempDir},
|
|
})
|
|
|
|
// Delete the library
|
|
err := repo.Delete("1")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait briefly for the goroutine to complete
|
|
Eventually(func() int {
|
|
return scanner.len()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
// Verify scan was called with correct parameters
|
|
Expect(scanner.ScanCalls[0].FullScan).To(BeFalse()) // Should be quick scan
|
|
})
|
|
|
|
It("does not trigger scan when library deletion fails", func() {
|
|
// Try to delete a non-existent library
|
|
err := repo.Delete("999")
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Ensure no scan was triggered since deletion failed
|
|
Consistently(func() int {
|
|
return scanner.len()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
Context("Watcher Integration", func() {
|
|
It("starts watcher when creating a new library", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was started
|
|
Eventually(func() int {
|
|
return watcherManager.lenStarted()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
Expect(watcherManager.StartedWatchers[0].ID).To(Equal(1))
|
|
Expect(watcherManager.StartedWatchers[0].Name).To(Equal("New Library"))
|
|
Expect(watcherManager.StartedWatchers[0].Path).To(Equal(tempDir))
|
|
})
|
|
|
|
It("restarts watcher when library path is updated", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Simulate that this library already has a watcher
|
|
watcherManager.simulateExistingLibrary(model.Library{ID: 1, Name: "Original Library", Path: tempDir})
|
|
|
|
// Create a new temp directory for the update
|
|
newTempDir, err := os.MkdirTemp("", "navidrome-library-update-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(newTempDir) })
|
|
|
|
// Update library with new path
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: newTempDir}
|
|
err = repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was restarted
|
|
Eventually(func() int {
|
|
return watcherManager.lenRestarted()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
Expect(watcherManager.RestartedWatchers[0].ID).To(Equal(1))
|
|
Expect(watcherManager.RestartedWatchers[0].Path).To(Equal(newTempDir))
|
|
})
|
|
|
|
It("does not restart watcher when only library name is updated", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Update library with same path but different name
|
|
library := &model.Library{ID: 1, Name: "Updated Name", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was NOT restarted (since path didn't change)
|
|
Consistently(func() int {
|
|
return watcherManager.lenRestarted()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("stops watcher when library is deleted", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
err := repo.Delete("1")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was stopped
|
|
Eventually(func() int {
|
|
return watcherManager.lenStopped()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
Expect(watcherManager.StoppedWatchers[0]).To(Equal(1))
|
|
})
|
|
|
|
It("does not stop watcher when library deletion fails", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Mock deletion to fail by trying to delete non-existent library
|
|
err := repo.Delete("999")
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Verify watcher was NOT stopped since deletion failed
|
|
Consistently(func() int {
|
|
return watcherManager.lenStopped()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Event Broadcasting", func() {
|
|
var repo rest.Persistable
|
|
|
|
BeforeEach(func() {
|
|
r := service.NewRepository(ctx)
|
|
repo = r.(rest.Persistable)
|
|
// Clear any events from broker
|
|
broker.Events = []events.Event{}
|
|
})
|
|
|
|
It("sends refresh event when creating a library", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(broker.Events).To(HaveLen(1))
|
|
})
|
|
|
|
It("sends refresh event when updating a library", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(broker.Events).To(HaveLen(1))
|
|
})
|
|
|
|
It("sends refresh event when deleting a library", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 2, Name: "Library to Delete", Path: tempDir},
|
|
})
|
|
|
|
err := repo.Delete("2")
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(broker.Events).To(HaveLen(1))
|
|
})
|
|
})
|
|
})
|
|
|
|
// mockScanner provides a simple mock implementation of core.Scanner for testing
|
|
type mockScanner struct {
|
|
ScanCalls []ScanCall
|
|
mu sync.RWMutex
|
|
}
|
|
|
|
type ScanCall struct {
|
|
FullScan bool
|
|
}
|
|
|
|
func (m *mockScanner) ScanAll(ctx context.Context, fullScan bool) (warnings []string, err error) {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.ScanCalls = append(m.ScanCalls, ScanCall{
|
|
FullScan: fullScan,
|
|
})
|
|
return []string{}, nil
|
|
}
|
|
|
|
func (m *mockScanner) len() int {
|
|
m.mu.RLock()
|
|
defer m.mu.RUnlock()
|
|
return len(m.ScanCalls)
|
|
}
|
|
|
|
// mockWatcherManager provides a simple mock implementation of core.Watcher for testing
|
|
type mockWatcherManager struct {
|
|
StartedWatchers []model.Library
|
|
StoppedWatchers []int
|
|
RestartedWatchers []model.Library
|
|
libraryStates map[int]model.Library // Track which libraries we know about
|
|
mu sync.RWMutex
|
|
}
|
|
|
|
func (m *mockWatcherManager) Watch(ctx context.Context, lib *model.Library) error {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
|
|
// Check if we already know about this library ID
|
|
if _, exists := m.libraryStates[lib.ID]; exists {
|
|
// This is a restart - the library already existed
|
|
// Update our tracking and record the restart
|
|
for i, startedLib := range m.StartedWatchers {
|
|
if startedLib.ID == lib.ID {
|
|
m.StartedWatchers[i] = *lib
|
|
break
|
|
}
|
|
}
|
|
m.RestartedWatchers = append(m.RestartedWatchers, *lib)
|
|
m.libraryStates[lib.ID] = *lib
|
|
return nil
|
|
}
|
|
|
|
// This is a new library - first time we're seeing it
|
|
m.StartedWatchers = append(m.StartedWatchers, *lib)
|
|
m.libraryStates[lib.ID] = *lib
|
|
return nil
|
|
}
|
|
|
|
func (m *mockWatcherManager) StopWatching(ctx context.Context, libraryID int) error {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.StoppedWatchers = append(m.StoppedWatchers, libraryID)
|
|
return nil
|
|
}
|
|
|
|
func (m *mockWatcherManager) lenStarted() int {
|
|
m.mu.RLock()
|
|
defer m.mu.RUnlock()
|
|
return len(m.StartedWatchers)
|
|
}
|
|
|
|
func (m *mockWatcherManager) lenStopped() int {
|
|
m.mu.RLock()
|
|
defer m.mu.RUnlock()
|
|
return len(m.StoppedWatchers)
|
|
}
|
|
|
|
func (m *mockWatcherManager) lenRestarted() int {
|
|
m.mu.RLock()
|
|
defer m.mu.RUnlock()
|
|
return len(m.RestartedWatchers)
|
|
}
|
|
|
|
// simulateExistingLibrary simulates the scenario where a library already exists
|
|
// and has a watcher running (used by tests to set up the initial state)
|
|
func (m *mockWatcherManager) simulateExistingLibrary(lib model.Library) {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.libraryStates[lib.ID] = lib
|
|
}
|
|
|
|
// mockEventBroker provides a mock implementation of events.Broker for testing
|
|
type mockEventBroker struct {
|
|
http.Handler
|
|
Events []events.Event
|
|
mu sync.RWMutex
|
|
}
|
|
|
|
func (m *mockEventBroker) SendMessage(ctx context.Context, event events.Event) {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.Events = append(m.Events, event)
|
|
}
|
|
|
|
func (m *mockEventBroker) SendBroadcastMessage(ctx context.Context, event events.Event) {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.Events = append(m.Events, event)
|
|
}
|