03a45753e9
* chore(plugins): remove the old plugins system implementation Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implement new plugin system with using Extism Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add capability detection for plugins based on exported functions Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add auto-reload functionality for plugins with file watcher support Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add auto-reload functionality for plugins with file watcher support Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): standardize variable names and remove superfluous wrapper functions Signed-off-by: Deluan <deluan@navidrome.org> * fix(plugins): improve error handling and logging in plugin manager Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): implement plugin function call helper and refactor MetadataAgent methods Signed-off-by: Deluan <deluan@navidrome.org> * fix(plugins): race condition in plugin manager * tests(plugins): change BeforeEach to BeforeAll in MetadataAgent tests Signed-off-by: Deluan <deluan@navidrome.org> * tests(plugins): optimize tests Signed-off-by: Deluan <deluan@navidrome.org> * tests(plugins): more optimizations Signed-off-by: Deluan <deluan@navidrome.org> * test(plugins): ignore goroutine leaks from notify library in tests Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add Wikimedia plugin for Navidrome to fetch artist metadata Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): enhance plugin logging and set User-Agent header Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implement scrobbler plugin with authorization and scrobbling capabilities Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): integrate logs Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): clean up manifest struct and improve plugin loading logic Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add metadata agent and scrobbler schemas for bootstrapping plugins Signed-off-by: Deluan <deluan@navidrome.org> * feat(hostgen): add hostgen tool for generating Extism host function wrappers - Implemented hostgen tool to generate wrappers from annotated Go interfaces. - Added command-line flags for input/output directories and package name. - Introduced parsing and code generation logic for host services. - Created test data for various service interfaces and expected generated code. - Added documentation for host services and annotations for code generation. - Implemented SubsonicAPI service with corresponding generated code. * feat(subsonicapi): update Call method to return JSON string response Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implement SubsonicAPI host function integration with permissions Signed-off-by: Deluan <deluan@navidrome.org> * fix(generator): error-only methods in response handling Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): generate client wrappers for host functions Signed-off-by: Deluan <deluan@navidrome.org> * refactor(generator): remove error handling for response.Error in client templates Signed-off-by: Deluan <deluan@navidrome.org> * feat(scheduler): add Scheduler service interface with host function wrappers for scheduling tasks * feat(plugins): add WASI build constraints to client wrapper templates, to avoid lint errors Signed-off-by: Deluan <deluan@navidrome.org> * feat(scheduler): implement Scheduler service with one-time and recurring scheduling capabilities Signed-off-by: Deluan <deluan@navidrome.org> * refactor(manifest): remove unused ConfigPermission from permissions schema Signed-off-by: Deluan <deluan@navidrome.org> * feat(scheduler): add scheduler callback schema and implementation for plugins Signed-off-by: Deluan <deluan@navidrome.org> * refactor(scheduler): streamline scheduling logic and remove unused callback tracking Signed-off-by: Deluan <deluan@navidrome.org> * refactor(scheduler): add Close method for resource cleanup on plugin unload Signed-off-by: Deluan <deluan@navidrome.org> * docs(scheduler): clarify SchedulerCallback requirement for scheduling functions Signed-off-by: Deluan <deluan@navidrome.org> * fix: update wasm build rule to include all Go files in the directory Signed-off-by: Deluan <deluan@navidrome.org> * feat: rewrite the wikimedia plugin using the XTP CLI Signed-off-by: Deluan <deluan@navidrome.org> * refactor(scheduler): replace uuid with id.NewRandom for schedule ID generation Signed-off-by: Deluan <deluan@navidrome.org> * refactor: capabilities registration Signed-off-by: Deluan <deluan@navidrome.org> * test: add scheduler service isolation test for plugin instances Signed-off-by: Deluan <deluan@navidrome.org> * refactor: update plugin manager initialization and encapsulate logic Signed-off-by: Deluan <deluan@navidrome.org> * feat: add WebSocket service definitions for plugin communication Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement WebSocket service for plugin integration and connection management Signed-off-by: Deluan <deluan@navidrome.org> * feat: add Crypto Ticker example plugin for real-time cryptocurrency price updates via Coinbase WebSocket API Also add the lifecycle capability Signed-off-by: Deluan <deluan@navidrome.org> * fix: use context.Background() in invokeCallback for scheduled tasks Signed-off-by: Deluan <deluan@navidrome.org> * refactor: rename plugin.create() to plugin.instance() Signed-off-by: Deluan <deluan@navidrome.org> * refactor: rename pluginInstance to plugin for consistency across the codebase Signed-off-by: Deluan <deluan@navidrome.org> * refactor: simplify schedule cloning in Close method and enhance plugin cleanup error handling Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement Artwork service for generating artwork URLs in Navidrome plugins - WIP Signed-off-by: Deluan <deluan@navidrome.org> * refactor: moved public URL builders to avoid import cycles Signed-off-by: Deluan <deluan@navidrome.org> * feat: add Cache service for in-memory TTL-based caching in plugins Signed-off-by: Deluan <deluan@navidrome.org> * feat: add Discord Rich Presence example plugin for Navidrome integration Signed-off-by: Deluan <deluan@navidrome.org> * refactor: host function wrappers to use structured request and response types - Updated the host function signatures in `nd_host_artwork.go`, `nd_host_scheduler.go`, `nd_host_subsonicapi.go`, and `nd_host_websocket.go` to accept a single parameter for JSON requests. - Introduced structured request and response types for various cache operations in `nd_host_cache.go`. - Modified cache functions to marshal requests to JSON and unmarshal responses, improving error handling and code clarity. - Removed redundant memory allocation for string parameters in favor of JSON marshaling. - Enhanced error handling in WebSocket and cache operations to return structured error responses. * refactor: error handling in various plugins to convert response.Error to Go errors - Updated error handling in `nd_host_scheduler.go`, `nd_host_websocket.go`, `nd_host_artwork.go`, `nd_host_cache.go`, and `nd_host_subsonicapi.go` to convert string errors from responses into Go errors. - Removed redundant error checks in test data plugins for cleaner code. - Ensured consistent error handling across all plugins to improve reliability and maintainability. * refactor: rename fake plugins to test plugins for clarity in integration tests Signed-off-by: Deluan <deluan@navidrome.org> * feat: add help target to Makefile for plugin usage instructions Signed-off-by: Deluan <deluan@navidrome.org> * feat: add Cover Art Archive plugin as an example of Python plugin Signed-off-by: Deluan <deluan@navidrome.org> * feat: update Makefile and README to clarify Go plugin usage Signed-off-by: Deluan <deluan@navidrome.org> * feat: include plugin capabilities in loading log message Signed-off-by: Deluan <deluan@navidrome.org> * feat: add trace logging for plugin availability and error handling in agents Signed-off-by: Deluan <deluan@navidrome.org> * feat: add Now Playing Logger plugin to showcase calling host functions from Python plugins Signed-off-by: Deluan <deluan@navidrome.org> * feat: generate Python client wrappers for various host services Signed-off-by: Deluan <deluan@navidrome.org> * feat: add generated host function wrappers for Scheduler and SubsonicAPI services Signed-off-by: Deluan <deluan@navidrome.org> * feat: update Python plugin documentation and usage instructions for host function wrappers Signed-off-by: Deluan <deluan@navidrome.org> * feat: add Webhook Scrobbler plugin in Rust to send HTTP notifications on scrobble events Signed-off-by: Deluan <deluan@navidrome.org> * feat: enable parallel loading of plugins during startup Signed-off-by: Deluan <deluan@navidrome.org> * docs: update README to include WebSocket callback schema in plugin documentation Signed-off-by: Deluan <deluan@navidrome.org> * feat: extend plugin watcher with improved logging and debounce duration adjustment Signed-off-by: Deluan <deluan@navidrome.org> * add trace message for plugin recompiles Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement plugin cache purging functionality Signed-off-by: Deluan <deluan@navidrome.org> * test: move purgeCacheBySize unit tests Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins UI): add plugin repository and database support Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins UI): add plugin management routes and middleware Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins UI): implement plugin synchronization with database for add, update, and remove actions Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins UI): add PluginList and PluginShow components with plugin management functionality Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): optimize plugin change detection Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins UI): improve PluginList structure Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins UI): enhance PluginShow with author, website, and permissions display Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins UI): refactor to use MUI and RA components Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins UI): add error handling for plugin enable/disable actions Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): inject PluginManager into native API Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update GetManager to accept DataStore parameter Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add subsonicRouter to Manager and refactor host service registration Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): enhance debug logging for plugin actions and recompile logic Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): break manager.go into smaller, focused files Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): streamline error handling and improve plugin retrieval logic Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update newWebSocketService to use WebSocketPermission for allowed hosts Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): introduce ToggleEnabledSwitch for managing plugin enable/disable state Signed-off-by: Deluan <deluan@navidrome.org> * docs: update READMEs Signed-off-by: Deluan <deluan@navidrome.org> * feat(library): add Library service for metadata access and filesystem integration Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add Library Inspector plugin for periodic library inspection and file size logging Signed-off-by: Deluan <deluan@navidrome.org> * docs: update README to reflect JSON configuration format for plugins Signed-off-by: Deluan <deluan@navidrome.org> * fix(build): update target to wasm32-wasip1 for improved WASI support Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implement configuration management UI with key-value pairs support Signed-off-by: Deluan <deluan@navidrome.org> * feat(ui): adjust grid layout in InfoRow component for improved responsiveness Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): rename ErrorIndicator to EnabledOrErrorField and enhance error handling logic Signed-off-by: Deluan <deluan@navidrome.org> * feat(i18n): add Portuguese translations for plugin management and notifications Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add support for .ndp plugin packages and update build process Signed-off-by: Deluan <deluan@navidrome.org> * docs: update README for .ndp plugin packaging and installation instructions Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implement KVStore service for persistent key-value storage Signed-off-by: Deluan <deluan@navidrome.org> * docs: enhance README with Extism plugin development resources and recommendations Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): integrate event broker into plugin manager Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): update config handling in PluginShow to track last record state Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add Rust host function library and example implementation of Discord Rich Presence plugin in Rust Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): generate Rust lib.rs file to expose host function wrappers Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update JSON field names to camelCase for consistency Signed-off-by: Deluan <deluan@navidrome.org> * refactor: reduce cyclomatic complexity by refactoring main function Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): enhance Rust code generation with typed struct support and improved type handling Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add Go client library with host function wrappers and documentation Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): generate Go client stubs for non-WASM platforms Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): update client template file names for consistency Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): add initial implementation of the Navidrome Plugin Development Kit code generator - Pahse 1 Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implementation of the Navidrome Plugin Development Kit with generated client wrappers and service interfaces - Phase 2 Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implementation of the Navidrome Plugin Development Kit with generated client wrappers and service interfaces - Phase 2 (2) Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implementation of the Navidrome Plugin Development Kit with generated client wrappers and service interfaces - Phase 3 Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implementation of the Navidrome Plugin Development Kit with generated client wrappers and service interfaces - Phase 4 Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implementation of the Navidrome Plugin Development Kit with generated client wrappers and service interfaces - Phase 5 Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): consistent naming/types across PDK Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): streamline plugin function signatures and error handling Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update scrobbler interface to return errors directly instead of response structs Signed-off-by: Deluan <deluan@navidrome.org> * test: make all test plugins use the PDK Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): reorganize and sort type definitions for consistency Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update error handling for methods to return errors directly Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update function signatures to return values directly instead of response structs Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update request/response types to use private naming conventions Signed-off-by: Deluan <deluan@navidrome.org> * build: mark .wasm files as intermediate for cleanup after building .ndp Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): consolidate PDK module path and update Go version to 1.25 Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement Rust PDK Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): reorganize Rust output structure to follow standard conventions Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update Discord Rich Presence and Library Inspector plugins to use nd-pdk for service calls and implement lifecycle management Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update macro names for websocket and metadata registration to improve clarity and consistency Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): rename scheduler callback methods for consistency and clarity Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update export wrappers to use `//go:wasmexport` for WebAssembly compatibility Signed-off-by: Deluan <deluan@navidrome.org> * docs: update plugin registration docs Signed-off-by: Deluan <deluan@navidrome.org> * fix(plugins): generate host wrappers Signed-off-by: Deluan <deluan@navidrome.org> * test(plugins): conditionally run goleak checks based on CI environment Signed-off-by: Deluan <deluan@navidrome.org> * docs: update README to reflect changes in plugin import paths Signed-off-by: Deluan <deluan@navidrome.org> * refactor(plugins): update plugin instance creation to accept context for cancellation support Signed-off-by: Deluan <deluan@navidrome.org> * fix(plugins): update return types in metadata interfaces to use pointers Signed-off-by: Deluan <deluan@navidrome.org> * fix(plugins): enhance type handling for Rust and XTP output in capability generation Signed-off-by: Deluan <deluan@navidrome.org> * fix(plugins): update IsAuthorized method to return boolean instead of response object Signed-off-by: Deluan <deluan@navidrome.org> * test(plugins): add unit tests for rustOutputType and isPrimitiveRustType functions Signed-off-by: Deluan <deluan@navidrome.org> * feat(plugins): implement XTP JSONSchema validation for generated schemas Signed-off-by: Deluan <deluan@navidrome.org> * fix(plugins): update response types in testMetadataAgent methods to use pointers Signed-off-by: Deluan <deluan@navidrome.org> * docs: update Go and Rust plugin developer sections for clarity Signed-off-by: Deluan <deluan@navidrome.org> * docs: correct example link for library inspector in README Signed-off-by: Deluan <deluan@navidrome.org> * docs: clarify artwork URL generation capabilities in service descriptions Signed-off-by: Deluan <deluan@navidrome.org> * docs: update README to include Rust PDK crate information for plugin developers Signed-off-by: Deluan <deluan@navidrome.org> * fix: handle URL parsing errors and use atomic upsert in plugin repository Added proper error handling for url.Parse calls in PublicURL and AbsoluteURL functions. When parsing fails, PublicURL now falls back to AbsoluteURL, and AbsoluteURL logs the error and returns an empty string, preventing malformed URLs from being generated. Replaced the non-atomic UPDATE-then-INSERT pattern in plugin repository Put method with a single atomic INSERT ... ON CONFLICT statement. This eliminates potential race conditions and improves consistency with the upsert pattern already used in host_kvstore.go. * feat: implement mock service instances for non-WASM builds using testify/mock Signed-off-by: Deluan <deluan@navidrome.org> * refactor: Discord RPC struct to encapsulate WebSocket logic Signed-off-by: Deluan <deluan@navidrome.org> * feat: add support for experimental WebAssembly threads Signed-off-by: Deluan <deluan@navidrome.org> * feat: add PDK abstraction layer with mock support for non-WASM builds Signed-off-by: Deluan <deluan@navidrome.org> * feat: add unit tests for Discord plugin and RPC functionality Signed-off-by: Deluan <deluan@navidrome.org> * fix: update return types in minimalPlugin and wikimediaPlugin methods to use pointers Signed-off-by: Deluan <deluan@navidrome.org> * fix: context cancellation and implement WebSocket callback timeout for improved error handling Signed-off-by: Deluan <deluan@navidrome.org> * feat: conditionally include error handling in generated client code templates Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement ConfigService for plugin configuration management Signed-off-by: Deluan <deluan@navidrome.org> * feat: enhance plugin manager to support metrics recording Signed-off-by: Deluan <deluan@navidrome.org> * refactor: make MockPDK private Signed-off-by: Deluan <deluan@navidrome.org> * refactor: update interface types to use 'any' in plugin repository methods Signed-off-by: Deluan <deluan@navidrome.org> * refactor: rename List method to Keys for clarity in configuration management Signed-off-by: Deluan <deluan@navidrome.org> * test: add ndpgen plugin tests in the pipeline and update Makefile Signed-off-by: Deluan <deluan@navidrome.org> * feat: add users permission management to plugin system Signed-off-by: Deluan <deluan@navidrome.org> * refactor: streamline users integration tests and enhance plugin user management Signed-off-by: Deluan <deluan@navidrome.org> * refactor: remove UserID from scrobbler request structure Signed-off-by: Deluan <deluan@navidrome.org> * test: add integration tests for UsersService enable gate behavior Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement user permissions for SubsonicAPI and scrobbler plugins Signed-off-by: Deluan <deluan@navidrome.org> * fix: show proper error in the UI when enabling a plugin fails Signed-off-by: Deluan <deluan@navidrome.org> * feat: add library permission management to plugin system Signed-off-by: Deluan <deluan@navidrome.org> * feat: add user permission for processing scrobbles in Discord Rich Presence plugin Signed-off-by: Deluan <deluan@navidrome.org> * fix: implement dynamic loading for buffered scrobbler plugins Signed-off-by: Deluan <deluan@navidrome.org> * feat: add GetAdmins method to retrieve admin users from the plugin Signed-off-by: Deluan <deluan@navidrome.org> * feat: update Portuguese translations for user and library permissions Signed-off-by: Deluan <deluan@navidrome.org> * reorder migrations Signed-off-by: Deluan <deluan@navidrome.org> * fix: remove unnecessary bulkActionButtons prop from PluginList component * feat: add manual plugin rescan functionality and corresponding UI action Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement user/library and plugin management integration with cleanup on deletion Signed-off-by: Deluan <deluan@navidrome.org> * feat: replace core mock services with test-specific implementations to avoid import cycles * feat: add ID fields to Artist and Song structs and enhance track loading logic by prioritizing ID matches Signed-off-by: Deluan <deluan@navidrome.org> * feat: update plugin permissions from allowedHosts to requiredHosts for better clarity and consistency * feat: refactor plugin host permissions to use RequiredHosts directly for improved clarity * fix: don't record metrics for plugin calls that aren't implemented at all Signed-off-by: Deluan <deluan@navidrome.org> * fix: enhance connection management with improved error handling and cleanup logic Signed-off-by: Deluan <deluan@navidrome.org> * feat: introduce ArtistRef struct for better artist representation and update track metadata handling Signed-off-by: Deluan <deluan@navidrome.org> * feat: update user configuration handling to use user key prefix for improved clarity Signed-off-by: Deluan <deluan@navidrome.org> * feat: enhance ConfigCard input fields with multiline support and vertical resizing Signed-off-by: Deluan <deluan@navidrome.org> * fix: rust plugin compilation error Signed-off-by: Deluan <deluan@navidrome.org> * feat: implement IsOptionPattern method for better return type handling in Rust PDK generation Signed-off-by: Deluan <deluan@navidrome.org> --------- Signed-off-by: Deluan <deluan@navidrome.org>
999 lines
31 KiB
Go
999 lines
31 KiB
Go
package core_test
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"sync"
|
|
|
|
"github.com/deluan/rest"
|
|
_ "github.com/navidrome/navidrome/adapters/taglib" // Register taglib extractor
|
|
"github.com/navidrome/navidrome/conf/configtest"
|
|
"github.com/navidrome/navidrome/core"
|
|
_ "github.com/navidrome/navidrome/core/storage/local" // Register local storage
|
|
"github.com/navidrome/navidrome/model"
|
|
"github.com/navidrome/navidrome/model/request"
|
|
"github.com/navidrome/navidrome/server/events"
|
|
"github.com/navidrome/navidrome/tests"
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
// These tests require the local storage adapter and the taglib extractor to be registered.
|
|
var _ = Describe("Library Service", func() {
|
|
var service core.Library
|
|
var ds *tests.MockDataStore
|
|
var libraryRepo *tests.MockLibraryRepo
|
|
var userRepo *tests.MockedUserRepo
|
|
var ctx context.Context
|
|
var tempDir string
|
|
var scanner *tests.MockScanner
|
|
var watcherManager *mockWatcherManager
|
|
var broker *mockEventBroker
|
|
var pluginManager *mockPluginUnloader
|
|
|
|
BeforeEach(func() {
|
|
DeferCleanup(configtest.SetupConfig())
|
|
|
|
ds = &tests.MockDataStore{}
|
|
libraryRepo = &tests.MockLibraryRepo{}
|
|
userRepo = tests.CreateMockUserRepo()
|
|
ds.MockedLibrary = libraryRepo
|
|
ds.MockedUser = userRepo
|
|
|
|
// Create a mock scanner that tracks calls
|
|
scanner = tests.NewMockScanner()
|
|
// Create a mock watcher manager
|
|
watcherManager = &mockWatcherManager{
|
|
libraryStates: make(map[int]model.Library),
|
|
}
|
|
// Create a mock event broker
|
|
broker = &mockEventBroker{}
|
|
// Create a mock plugin unloader
|
|
pluginManager = &mockPluginUnloader{}
|
|
service = core.NewLibrary(ds, scanner, watcherManager, broker, pluginManager)
|
|
ctx = context.Background()
|
|
|
|
// Create a temporary directory for testing valid paths
|
|
var err error
|
|
tempDir, err = os.MkdirTemp("", "navidrome-library-test-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() {
|
|
os.RemoveAll(tempDir)
|
|
})
|
|
})
|
|
|
|
Describe("Library CRUD Operations", func() {
|
|
var repo rest.Persistable
|
|
|
|
BeforeEach(func() {
|
|
r := service.NewRepository(ctx)
|
|
repo = r.(rest.Persistable)
|
|
})
|
|
|
|
Describe("Create", func() {
|
|
It("creates a new library successfully", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data[1].Name).To(Equal("New Library"))
|
|
Expect(libraryRepo.Data[1].Path).To(Equal(tempDir))
|
|
})
|
|
|
|
It("fails when library name is empty", func() {
|
|
library := &model.Library{Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("ra.validation.required"))
|
|
})
|
|
|
|
It("fails when library path is empty", func() {
|
|
library := &model.Library{Name: "Test"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("ra.validation.required"))
|
|
})
|
|
|
|
It("fails when library path is not absolute", func() {
|
|
library := &model.Library{Name: "Test", Path: "relative/path"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
|
|
Context("Database constraint violations", func() {
|
|
BeforeEach(func() {
|
|
// Set up an existing library that will cause constraint violations
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Existing Library", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
AfterEach(func() {
|
|
// Reset custom PutFn after each test
|
|
libraryRepo.PutFn = nil
|
|
})
|
|
|
|
It("handles name uniqueness constraint violation from database", func() {
|
|
// Create the directory that will be used for the test
|
|
otherTempDir, err := os.MkdirTemp("", "navidrome-other-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(otherTempDir) })
|
|
|
|
// Try to create another library with the same name
|
|
library := &model.Library{ID: 2, Name: "Existing Library", Path: otherTempDir}
|
|
|
|
// Mock the repository to return a UNIQUE constraint error
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.name")
|
|
}
|
|
|
|
_, err = repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
|
|
It("handles path uniqueness constraint violation from database", func() {
|
|
// Try to create another library with the same path
|
|
library := &model.Library{ID: 2, Name: "Different Library", Path: tempDir}
|
|
|
|
// Mock the repository to return a UNIQUE constraint error
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.path")
|
|
}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Update", func() {
|
|
BeforeEach(func() {
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
It("updates an existing library successfully", func() {
|
|
newTempDir, err := os.MkdirTemp("", "navidrome-library-update-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(newTempDir) })
|
|
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: newTempDir}
|
|
|
|
err = repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data[1].Name).To(Equal("Updated Library"))
|
|
Expect(libraryRepo.Data[1].Path).To(Equal(newTempDir))
|
|
})
|
|
|
|
It("fails when library doesn't exist", func() {
|
|
// Create a unique temporary directory to avoid path conflicts
|
|
uniqueTempDir, err := os.MkdirTemp("", "navidrome-nonexistent-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(uniqueTempDir) })
|
|
|
|
library := &model.Library{ID: 999, Name: "Non-existent", Path: uniqueTempDir}
|
|
|
|
err = repo.Update("999", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
|
|
It("fails when library name is empty", func() {
|
|
library := &model.Library{ID: 1, Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("ra.validation.required"))
|
|
})
|
|
|
|
It("cleans and normalizes the path on update", func() {
|
|
unnormalizedPath := tempDir + "//../" + filepath.Base(tempDir)
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: unnormalizedPath}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data[1].Path).To(Equal(filepath.Clean(unnormalizedPath)))
|
|
})
|
|
|
|
It("allows updating library with same name (no change)", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library keeping the same name (should be allowed)
|
|
library := &model.Library{ID: 1, Name: "Test Library", Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("allows updating library with same path (no change)", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library keeping the same path (should be allowed)
|
|
library := &model.Library{ID: 1, Name: "Test Library", Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
Context("Database constraint violations during update", func() {
|
|
BeforeEach(func() {
|
|
// Reset any custom PutFn from previous tests
|
|
libraryRepo.PutFn = nil
|
|
})
|
|
|
|
It("handles name uniqueness constraint violation during update", func() {
|
|
// Create additional temp directory for the test
|
|
otherTempDir, err := os.MkdirTemp("", "navidrome-other-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(otherTempDir) })
|
|
|
|
// Set up two libraries
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library One", Path: tempDir},
|
|
{ID: 2, Name: "Library Two", Path: otherTempDir},
|
|
})
|
|
|
|
// Mock database constraint violation
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.name")
|
|
}
|
|
|
|
// Try to update library 2 to have the same name as library 1
|
|
library := &model.Library{ID: 2, Name: "Library One", Path: otherTempDir}
|
|
|
|
err = repo.Update("2", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
|
|
It("handles path uniqueness constraint violation during update", func() {
|
|
// Create additional temp directory for the test
|
|
otherTempDir, err := os.MkdirTemp("", "navidrome-other-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(otherTempDir) })
|
|
|
|
// Set up two libraries
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library One", Path: tempDir},
|
|
{ID: 2, Name: "Library Two", Path: otherTempDir},
|
|
})
|
|
|
|
// Mock database constraint violation
|
|
libraryRepo.PutFn = func(library *model.Library) error {
|
|
return errors.New("UNIQUE constraint failed: library.path")
|
|
}
|
|
|
|
// Try to update library 2 to have the same path as library 1
|
|
library := &model.Library{ID: 2, Name: "Library Two", Path: tempDir}
|
|
|
|
err = repo.Update("2", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("ra.validation.unique"))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Path Validation", func() {
|
|
Context("Create operation", func() {
|
|
It("fails when path is not absolute", func() {
|
|
library := &model.Library{Name: "Test", Path: "relative/path"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
|
|
It("fails when path does not exist", func() {
|
|
nonExistentPath := filepath.Join(tempDir, "nonexistent")
|
|
library := &model.Library{Name: "Test", Path: nonExistentPath}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathInvalid"))
|
|
})
|
|
|
|
It("fails when path is a file instead of directory", func() {
|
|
testFile := filepath.Join(tempDir, "testfile.txt")
|
|
err := os.WriteFile(testFile, []byte("test"), 0600)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
library := &model.Library{Name: "Test", Path: testFile}
|
|
|
|
_, err = repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathNotDirectory"))
|
|
})
|
|
|
|
It("fails when path is not accessible due to permissions", func() {
|
|
Skip("Permission tests are environment-dependent and may fail in CI")
|
|
// This test is skipped because creating a directory with no read permissions
|
|
// is complex and may not work consistently across different environments
|
|
})
|
|
|
|
It("handles multiple validation errors", func() {
|
|
library := &model.Library{Name: "", Path: "relative/path"}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors).To(HaveKey("name"))
|
|
Expect(validationErr.Errors).To(HaveKey("path"))
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.required"))
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
})
|
|
|
|
Context("Update operation", func() {
|
|
BeforeEach(func() {
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
It("fails when updated path is not absolute", func() {
|
|
library := &model.Library{ID: 1, Name: "Test", Path: "relative/path"}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
|
|
It("allows updating library with same name (no change)", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library keeping the same name (should be allowed)
|
|
library := &model.Library{ID: 1, Name: "Test Library", Path: tempDir}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("fails when updated path does not exist", func() {
|
|
nonExistentPath := filepath.Join(tempDir, "nonexistent")
|
|
library := &model.Library{ID: 1, Name: "Test", Path: nonExistentPath}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathInvalid"))
|
|
})
|
|
|
|
It("fails when updated path is a file instead of directory", func() {
|
|
testFile := filepath.Join(tempDir, "updatefile.txt")
|
|
err := os.WriteFile(testFile, []byte("test"), 0600)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
library := &model.Library{ID: 1, Name: "Test", Path: testFile}
|
|
|
|
err = repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors["path"]).To(Equal("resources.library.validation.pathNotDirectory"))
|
|
})
|
|
|
|
It("handles multiple validation errors on update", func() {
|
|
// Try to update with empty name and invalid path
|
|
library := &model.Library{ID: 1, Name: "", Path: "relative/path"}
|
|
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
var validationErr *rest.ValidationError
|
|
Expect(errors.As(err, &validationErr)).To(BeTrue())
|
|
Expect(validationErr.Errors).To(HaveKey("name"))
|
|
Expect(validationErr.Errors).To(HaveKey("path"))
|
|
Expect(validationErr.Errors["name"]).To(Equal("ra.validation.required"))
|
|
Expect(validationErr.Errors["path"]).To(Equal("library path must be absolute"))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Delete", func() {
|
|
BeforeEach(func() {
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library to Delete", Path: tempDir},
|
|
})
|
|
})
|
|
|
|
It("deletes an existing library successfully", func() {
|
|
err := repo.Delete("1")
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(libraryRepo.Data).To(HaveLen(0))
|
|
})
|
|
|
|
It("fails when library doesn't exist", func() {
|
|
err := repo.Delete("999")
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("User-Library Association Operations", func() {
|
|
var regularUser, adminUser *model.User
|
|
|
|
BeforeEach(func() {
|
|
regularUser = &model.User{ID: "user1", UserName: "regular", IsAdmin: false}
|
|
adminUser = &model.User{ID: "admin1", UserName: "admin", IsAdmin: true}
|
|
|
|
userRepo.Data = map[string]*model.User{
|
|
"regular": regularUser,
|
|
"admin": adminUser,
|
|
}
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library 1", Path: "/music1"},
|
|
{ID: 2, Name: "Library 2", Path: "/music2"},
|
|
{ID: 3, Name: "Library 3", Path: "/music3"},
|
|
})
|
|
})
|
|
|
|
Describe("GetUserLibraries", func() {
|
|
It("returns user's libraries", func() {
|
|
userRepo.UserLibraries = map[string][]int{
|
|
"user1": {1},
|
|
}
|
|
|
|
result, err := service.GetUserLibraries(ctx, "user1")
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(result).To(HaveLen(1))
|
|
Expect(result[0].ID).To(Equal(1))
|
|
})
|
|
|
|
It("fails when user doesn't exist", func() {
|
|
_, err := service.GetUserLibraries(ctx, "nonexistent")
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
})
|
|
|
|
Describe("SetUserLibraries", func() {
|
|
It("sets libraries for regular user successfully", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{1, 2})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
libraries := userRepo.UserLibraries["user1"]
|
|
Expect(libraries).To(HaveLen(2))
|
|
})
|
|
|
|
It("fails when user doesn't exist", func() {
|
|
err := service.SetUserLibraries(ctx, "nonexistent", []int{1})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err).To(Equal(model.ErrNotFound))
|
|
})
|
|
|
|
It("fails when trying to set libraries for admin user", func() {
|
|
err := service.SetUserLibraries(ctx, "admin1", []int{1})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("cannot manually assign libraries to admin users"))
|
|
})
|
|
|
|
It("fails when no libraries provided for regular user", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("at least one library must be assigned to non-admin users"))
|
|
})
|
|
|
|
It("fails when library doesn't exist", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{999})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("one or more library IDs are invalid"))
|
|
})
|
|
|
|
It("fails when some libraries don't exist", func() {
|
|
err := service.SetUserLibraries(ctx, "user1", []int{1, 999, 2})
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("one or more library IDs are invalid"))
|
|
})
|
|
})
|
|
|
|
Describe("ValidateLibraryAccess", func() {
|
|
Context("admin user", func() {
|
|
BeforeEach(func() {
|
|
ctx = request.WithUser(ctx, *adminUser)
|
|
})
|
|
|
|
It("allows access to any library", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "admin1", 1)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
})
|
|
|
|
Context("regular user", func() {
|
|
BeforeEach(func() {
|
|
ctx = request.WithUser(ctx, *regularUser)
|
|
userRepo.UserLibraries = map[string][]int{
|
|
"user1": {1},
|
|
}
|
|
})
|
|
|
|
It("allows access to user's libraries", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "user1", 1)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("denies access to libraries user doesn't have", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "user1", 2)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("user does not have access to library 2"))
|
|
})
|
|
})
|
|
|
|
Context("no user in context", func() {
|
|
It("fails with user not found error", func() {
|
|
err := service.ValidateLibraryAccess(ctx, "user1", 1)
|
|
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(err.Error()).To(ContainSubstring("user not found in context"))
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Scan Triggering", func() {
|
|
var repo rest.Persistable
|
|
|
|
BeforeEach(func() {
|
|
r := service.NewRepository(ctx)
|
|
repo = r.(rest.Persistable)
|
|
})
|
|
|
|
It("triggers scan when creating a new library", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait briefly for the goroutine to complete
|
|
Eventually(func() int {
|
|
return scanner.GetScanAllCallCount()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
// Verify scan was called with correct parameters
|
|
calls := scanner.GetScanAllCalls()
|
|
Expect(calls[0].FullScan).To(BeFalse()) // Should be quick scan
|
|
})
|
|
|
|
It("triggers scan when updating library path", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Create a new temporary directory for the update
|
|
newTempDir, err := os.MkdirTemp("", "navidrome-library-update-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(newTempDir) })
|
|
|
|
// Update the library with a new path
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: newTempDir}
|
|
err = repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait briefly for the goroutine to complete
|
|
Eventually(func() int {
|
|
return scanner.GetScanAllCallCount()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
// Verify scan was called with correct parameters
|
|
calls := scanner.GetScanAllCalls()
|
|
Expect(calls[0].FullScan).To(BeFalse()) // Should be quick scan
|
|
})
|
|
|
|
It("does not trigger scan when updating library without path change", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Update the library name only (same path)
|
|
library := &model.Library{ID: 1, Name: "Updated Name", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait a bit to ensure no scan was triggered
|
|
Consistently(func() int {
|
|
return scanner.GetScanAllCallCount()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("does not trigger scan when library creation fails", func() {
|
|
// Try to create library with invalid data (empty name)
|
|
library := &model.Library{Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Ensure no scan was triggered since creation failed
|
|
Consistently(func() int {
|
|
return scanner.GetScanAllCallCount()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("does not trigger scan when library update fails", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Try to update with invalid data (empty name)
|
|
library := &model.Library{ID: 1, Name: "", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Ensure no scan was triggered since update failed
|
|
Consistently(func() int {
|
|
return scanner.GetScanAllCallCount()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("triggers scan when deleting a library", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Library to Delete", Path: tempDir},
|
|
})
|
|
|
|
// Delete the library
|
|
err := repo.Delete("1")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Wait briefly for the goroutine to complete
|
|
Eventually(func() int {
|
|
return scanner.GetScanAllCallCount()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
// Verify scan was called with correct parameters
|
|
calls := scanner.GetScanAllCalls()
|
|
Expect(calls[0].FullScan).To(BeFalse()) // Should be quick scan
|
|
})
|
|
|
|
It("does not trigger scan when library deletion fails", func() {
|
|
// Try to delete a non-existent library
|
|
err := repo.Delete("999")
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Ensure no scan was triggered since deletion failed
|
|
Consistently(func() int {
|
|
return scanner.GetScanAllCallCount()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
Context("Watcher Integration", func() {
|
|
It("starts watcher when creating a new library", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was started
|
|
Eventually(func() int {
|
|
return watcherManager.lenStarted()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
Expect(watcherManager.StartedWatchers[0].ID).To(Equal(1))
|
|
Expect(watcherManager.StartedWatchers[0].Name).To(Equal("New Library"))
|
|
Expect(watcherManager.StartedWatchers[0].Path).To(Equal(tempDir))
|
|
})
|
|
|
|
It("restarts watcher when library path is updated", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Simulate that this library already has a watcher
|
|
watcherManager.simulateExistingLibrary(model.Library{ID: 1, Name: "Original Library", Path: tempDir})
|
|
|
|
// Create a new temp directory for the update
|
|
newTempDir, err := os.MkdirTemp("", "navidrome-library-update-")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
DeferCleanup(func() { os.RemoveAll(newTempDir) })
|
|
|
|
// Update library with new path
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: newTempDir}
|
|
err = repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was restarted
|
|
Eventually(func() int {
|
|
return watcherManager.lenRestarted()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
Expect(watcherManager.RestartedWatchers[0].ID).To(Equal(1))
|
|
Expect(watcherManager.RestartedWatchers[0].Path).To(Equal(newTempDir))
|
|
})
|
|
|
|
It("does not restart watcher when only library name is updated", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
// Update library with same path but different name
|
|
library := &model.Library{ID: 1, Name: "Updated Name", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was NOT restarted (since path didn't change)
|
|
Consistently(func() int {
|
|
return watcherManager.lenRestarted()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
|
|
It("stops watcher when library is deleted", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
err := repo.Delete("1")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
// Verify watcher was stopped
|
|
Eventually(func() int {
|
|
return watcherManager.lenStopped()
|
|
}, "1s", "10ms").Should(Equal(1))
|
|
|
|
Expect(watcherManager.StoppedWatchers[0]).To(Equal(1))
|
|
})
|
|
|
|
It("does not stop watcher when library deletion fails", func() {
|
|
// Set up a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Test Library", Path: tempDir},
|
|
})
|
|
|
|
// Mock deletion to fail by trying to delete non-existent library
|
|
err := repo.Delete("999")
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
// Verify watcher was NOT stopped since deletion failed
|
|
Consistently(func() int {
|
|
return watcherManager.lenStopped()
|
|
}, "100ms", "10ms").Should(Equal(0))
|
|
})
|
|
})
|
|
})
|
|
|
|
Describe("Event Broadcasting", func() {
|
|
var repo rest.Persistable
|
|
|
|
BeforeEach(func() {
|
|
r := service.NewRepository(ctx)
|
|
repo = r.(rest.Persistable)
|
|
// Clear any events from broker
|
|
broker.Events = []events.Event{}
|
|
})
|
|
|
|
It("sends refresh event when creating a library", func() {
|
|
library := &model.Library{ID: 1, Name: "New Library", Path: tempDir}
|
|
|
|
_, err := repo.Save(library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(broker.Events).To(HaveLen(1))
|
|
})
|
|
|
|
It("sends refresh event when updating a library", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 1, Name: "Original Library", Path: tempDir},
|
|
})
|
|
|
|
library := &model.Library{ID: 1, Name: "Updated Library", Path: tempDir}
|
|
err := repo.Update("1", library)
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(broker.Events).To(HaveLen(1))
|
|
})
|
|
|
|
It("sends refresh event when deleting a library", func() {
|
|
// First create a library
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 2, Name: "Library to Delete", Path: tempDir},
|
|
})
|
|
|
|
err := repo.Delete("2")
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(broker.Events).To(HaveLen(1))
|
|
})
|
|
})
|
|
|
|
Describe("Plugin Manager Integration", func() {
|
|
var repo rest.Persistable
|
|
|
|
BeforeEach(func() {
|
|
// Reset the call count for each test
|
|
pluginManager.unloadCalls = 0
|
|
r := service.NewRepository(ctx)
|
|
repo = r.(rest.Persistable)
|
|
})
|
|
|
|
It("calls UnloadDisabledPlugins after successful library deletion", func() {
|
|
libraryRepo.SetData(model.Libraries{
|
|
{ID: 2, Name: "Library to Delete", Path: tempDir},
|
|
})
|
|
|
|
err := repo.Delete("2")
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(pluginManager.unloadCalls).To(Equal(1))
|
|
})
|
|
|
|
It("does not call UnloadDisabledPlugins when library deletion fails", func() {
|
|
// Try to delete non-existent library
|
|
err := repo.Delete("999")
|
|
Expect(err).To(HaveOccurred())
|
|
Expect(pluginManager.unloadCalls).To(Equal(0))
|
|
})
|
|
})
|
|
})
|
|
|
|
// mockPluginUnloader is a simple mock for testing UnloadDisabledPlugins calls
|
|
type mockPluginUnloader struct {
|
|
unloadCalls int
|
|
}
|
|
|
|
func (m *mockPluginUnloader) UnloadDisabledPlugins(ctx context.Context) {
|
|
m.unloadCalls++
|
|
}
|
|
|
|
// mockWatcherManager provides a simple mock implementation of core.Watcher for testing
|
|
type mockWatcherManager struct {
|
|
StartedWatchers []model.Library
|
|
StoppedWatchers []int
|
|
RestartedWatchers []model.Library
|
|
libraryStates map[int]model.Library // Track which libraries we know about
|
|
mu sync.RWMutex
|
|
}
|
|
|
|
func (m *mockWatcherManager) Watch(ctx context.Context, lib *model.Library) error {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
|
|
// Check if we already know about this library ID
|
|
if _, exists := m.libraryStates[lib.ID]; exists {
|
|
// This is a restart - the library already existed
|
|
// Update our tracking and record the restart
|
|
for i, startedLib := range m.StartedWatchers {
|
|
if startedLib.ID == lib.ID {
|
|
m.StartedWatchers[i] = *lib
|
|
break
|
|
}
|
|
}
|
|
m.RestartedWatchers = append(m.RestartedWatchers, *lib)
|
|
m.libraryStates[lib.ID] = *lib
|
|
return nil
|
|
}
|
|
|
|
// This is a new library - first time we're seeing it
|
|
m.StartedWatchers = append(m.StartedWatchers, *lib)
|
|
m.libraryStates[lib.ID] = *lib
|
|
return nil
|
|
}
|
|
|
|
func (m *mockWatcherManager) StopWatching(ctx context.Context, libraryID int) error {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.StoppedWatchers = append(m.StoppedWatchers, libraryID)
|
|
return nil
|
|
}
|
|
|
|
func (m *mockWatcherManager) lenStarted() int {
|
|
m.mu.RLock()
|
|
defer m.mu.RUnlock()
|
|
return len(m.StartedWatchers)
|
|
}
|
|
|
|
func (m *mockWatcherManager) lenStopped() int {
|
|
m.mu.RLock()
|
|
defer m.mu.RUnlock()
|
|
return len(m.StoppedWatchers)
|
|
}
|
|
|
|
func (m *mockWatcherManager) lenRestarted() int {
|
|
m.mu.RLock()
|
|
defer m.mu.RUnlock()
|
|
return len(m.RestartedWatchers)
|
|
}
|
|
|
|
// simulateExistingLibrary simulates the scenario where a library already exists
|
|
// and has a watcher running (used by tests to set up the initial state)
|
|
func (m *mockWatcherManager) simulateExistingLibrary(lib model.Library) {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.libraryStates[lib.ID] = lib
|
|
}
|
|
|
|
// mockEventBroker provides a mock implementation of events.Broker for testing
|
|
type mockEventBroker struct {
|
|
http.Handler
|
|
Events []events.Event
|
|
mu sync.RWMutex
|
|
}
|
|
|
|
func (m *mockEventBroker) SendMessage(ctx context.Context, event events.Event) {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.Events = append(m.Events, event)
|
|
}
|
|
|
|
func (m *mockEventBroker) SendBroadcastMessage(ctx context.Context, event events.Event) {
|
|
m.mu.Lock()
|
|
defer m.mu.Unlock()
|
|
m.Events = append(m.Events, event)
|
|
}
|