mirror of
https://github.com/immich-app/immich.git
synced 2025-12-24 01:11:32 +03:00
* feat: add a `maintenance.enabled` config flag
* feat: implement graceful restart
feat: restart when maintenance config is toggled
* feat: boot a stripped down maintenance api if enabled
* feat: cli command to toggle maintenance mode
* chore: fallback IMMICH_SERVER_URL environment variable in process
* chore: add additional routes to maintenance controller
* fix: don't wait for nest application to close to finish request response
* chore: add a failsafe on restart to prevent other exit codes from preventing restart
* feat: redirect into/from maintenance page
* refactor: use system metadata for maintenance status
* refactor: wait on WebSocket connection to refresh
* feat: broadcast websocket event on server restart
refactor: listen to WS instead of polling
* refactor: bubble up maintenance information instead of hijacking in fetch function
feat: show modal when server is restarting
* chore: increase timeout for ungraceful restart
* refactor: deduplicate code between api/maintenance workers
* fix: skip config check if database is not initialised
* fix: add `maintenanceMode` field to system config test
* refactor: move maintenance resolution code to static method in service
* chore: clean up linter issues
* chore: generate dart openapi
* refactor: use try{} block for maintenance mode check
* fix: logic error in server redirect
* chore: include `maintenanceMode` key in e2e test
* chore: add i18n entries for maintenance screens
* chore: remove negated condition from hook
* fix: should set default value not override in service
* fix: minor error in page
* feat: initial draft of maintenance module, repo., worker controller, worker service
* refactor: move broadcast code into notification service
* chore: connect websocket on client if in maintenance
* chore: set maintenance module app name
* refactor: rename repository to include worker
chore: configure websocket adapter
* feat: reimplement maintenance mode exit with new module
* refactor: add a constant enum for ExitCode
* refactor: remove redundant route for maintenance
* refactor: only spin up kysely on boot (rather than a Nest app)
* refactor(web): move redirect logic into +layout file where modal is setup
* feat: add Maintenance permission
* refactor: merge common code between api/maintenance
* fix: propagate changes from the CLI to servers
* feat: maintenance authentication guard
* refactor: unify maintenance code into repository
feat: add a step to generate maintenance mode token
* feat: jwt auth for maintenance
* refactor: switch from nest jwt to just jsonwebtokens
* feat: log into maintenance mode from CLI command
* refactor: use `secret` instead of `token` in jwt terminology
chore: log maintenance mode login URL on boot
chore: don't make CLI actions reload if already in target state
* docs: initial draft for maintenance mode page
* refactor: always validate the maintenance auth on the server
* feat: add a link to maintenance mode documentation
* feat: redirect users back to the last page they were on when exiting maintenance
* refactor: provide closeFn in both maintenance repos.
* refactor: ensure the user is also redirected by the server
* chore: swap jsonwebtoken for jose
* refactor: introduce AppRestartEvent w/o secret passing
* refactor: use navigation goto
* refactor: use `continue` instead of `next`
* chore: lint fixes for server
* chore: lint fixes for web
* test: add mock for maintenance repository
* test: add base service dependency to maintenance
* chore: remove @types/jsonwebtoken
* refactor: close database connection after startup check
* refactor: use `request#auth` key
* refactor: use service instead of repository
chore: read token from cookie if possible
chore: rename client event to AppRestartV1
* refactor: more concise redirect logic on web
* refactor: move redirect check into utils
refactor: update translation strings to be more sensible
* refactor: always validate login (i.e. check cookie)
* refactor: lint, open-api, remove old dto
* refactor: encode at point of usage
* refactor: remove business logic from repositories
* chore: fix server/web lints
* refactor: remove repository mock
* chore: fix formatting
* test: write service mocks for maintenance mode
* test: write cli service tests
* fix: catch errors when closing app
* fix: always report no maintenance when usual API is available
* test: api e2e maintenance spec
* chore: add response builder
* chore: add helper to set maint. auth cookie
* feat: add SSR to maintenance API
* test(e2e): write web spec for maintenance
* chore: clean up lint issues
* chore: format files
* feat: perform 302 redirect at server level during maintenance
* fix: keep trying to stop immich until it succeeds (CLI issue)
* chore: lint/format
* refactor: annotate references to other services in worker service
* chore: lint
* refactor: remove unnecessary await
Co-authored-by: Daniel Dietzler <36593685+danieldietzler@users.noreply.github.com>
* refactor: move static methods into util
* refactor: assert secret exists in maintenance worker
* refactor: remove assertion which isn't necessary anymore
* refactor: remove assertion
* refactor: remove outer try {} catch block from loadMaintenanceAuth
* refactor: undo earlier change to vite.config.ts
* chore: update tests due to refactors
* revert: vite.config.ts
* test: expect string jwt
* chore: move blanket exceptions into controllers
* test: update tests according with last change
* refactor: use respondWithCookie
refactor: merge start/end into one route
refactor: rename MaintenanceRepository to AppRepository
chore: use new ApiTag/Endpoint
refactor: apply other requested changes
* chore: regenerate openapi
* chore: lint/format
* chore: remove secureOnly for maint. cookie
* refactor: move maintenance worker code into src/maintenance\nfix: various test fixes
* refactor: use `action` property for setting maint. mode
* refactor: remove Websocket#restartApp in favour of individual methods
* chore: incomplete commit
* chore: remove stray log
* fix: call exitApp from maintenance worker on exit
* fix: add app repository mock
* fix: ensure maintenance cookies are secure
* fix: run playwright tests over secure context (localhost)
* test: update other references to 127.0.0.1
* refactor: use serverSideEmitWithAck
* chore: correct the logic in tryTerminate
* test: juggle cookies ourselves
* chore: fix lint error for e2e spec
* chore: format e2e test
* fix: set cookie secure/non-secure depending on context
* chore: format files
---------
Co-authored-by: Daniel Dietzler <36593685+danieldietzler@users.noreply.github.com>
479 lines
16 KiB
TypeScript
479 lines
16 KiB
TypeScript
import { BadRequestException, Injectable } from '@nestjs/common';
|
|
import { OnEvent, OnJob } from 'src/decorators';
|
|
import { MapAlbumDto } from 'src/dtos/album.dto';
|
|
import { mapAsset } from 'src/dtos/asset-response.dto';
|
|
import { AuthDto } from 'src/dtos/auth.dto';
|
|
import {
|
|
mapNotification,
|
|
NotificationDeleteAllDto,
|
|
NotificationDto,
|
|
NotificationSearchDto,
|
|
NotificationUpdateAllDto,
|
|
NotificationUpdateDto,
|
|
} from 'src/dtos/notification.dto';
|
|
import { SystemConfigSmtpDto } from 'src/dtos/system-config.dto';
|
|
import {
|
|
AssetFileType,
|
|
JobName,
|
|
JobStatus,
|
|
NotificationLevel,
|
|
NotificationType,
|
|
Permission,
|
|
QueueName,
|
|
} from 'src/enum';
|
|
import { EmailTemplate } from 'src/repositories/email.repository';
|
|
import { ArgOf } from 'src/repositories/event.repository';
|
|
import { BaseService } from 'src/services/base.service';
|
|
import { EmailImageAttachment, JobOf } from 'src/types';
|
|
import { getFilenameExtension } from 'src/utils/file';
|
|
import { getExternalDomain } from 'src/utils/misc';
|
|
import { isEqualObject } from 'src/utils/object';
|
|
import { getPreferences } from 'src/utils/preferences';
|
|
|
|
@Injectable()
|
|
export class NotificationService extends BaseService {
|
|
private static albumUpdateEmailDelayMs = 300_000;
|
|
|
|
async search(auth: AuthDto, dto: NotificationSearchDto): Promise<NotificationDto[]> {
|
|
const items = await this.notificationRepository.search(auth.user.id, dto);
|
|
return items.map((item) => mapNotification(item));
|
|
}
|
|
|
|
async updateAll(auth: AuthDto, dto: NotificationUpdateAllDto) {
|
|
await this.requireAccess({ auth, ids: dto.ids, permission: Permission.NotificationUpdate });
|
|
await this.notificationRepository.updateAll(dto.ids, {
|
|
readAt: dto.readAt,
|
|
});
|
|
}
|
|
|
|
async deleteAll(auth: AuthDto, dto: NotificationDeleteAllDto) {
|
|
await this.requireAccess({ auth, ids: dto.ids, permission: Permission.NotificationDelete });
|
|
await this.notificationRepository.deleteAll(dto.ids);
|
|
}
|
|
|
|
async get(auth: AuthDto, id: string) {
|
|
await this.requireAccess({ auth, ids: [id], permission: Permission.NotificationRead });
|
|
const item = await this.notificationRepository.get(id);
|
|
if (!item) {
|
|
throw new BadRequestException('Notification not found');
|
|
}
|
|
return mapNotification(item);
|
|
}
|
|
|
|
async update(auth: AuthDto, id: string, dto: NotificationUpdateDto) {
|
|
await this.requireAccess({ auth, ids: [id], permission: Permission.NotificationUpdate });
|
|
const item = await this.notificationRepository.update(id, {
|
|
readAt: dto.readAt,
|
|
});
|
|
return mapNotification(item);
|
|
}
|
|
|
|
async delete(auth: AuthDto, id: string) {
|
|
await this.requireAccess({ auth, ids: [id], permission: Permission.NotificationDelete });
|
|
await this.notificationRepository.delete(id);
|
|
}
|
|
|
|
@OnJob({ name: JobName.NotificationsCleanup, queue: QueueName.BackgroundTask })
|
|
async onNotificationsCleanup() {
|
|
await this.notificationRepository.cleanup();
|
|
}
|
|
|
|
@OnEvent({ name: 'JobError' })
|
|
async onJobError({ job, error }: ArgOf<'JobError'>) {
|
|
const admin = await this.userRepository.getAdmin();
|
|
if (!admin) {
|
|
return;
|
|
}
|
|
|
|
this.logger.error(`Unable to run job handler (${job.name}): ${error}`, error?.stack, JSON.stringify(job.data));
|
|
|
|
switch (job.name) {
|
|
case JobName.DatabaseBackup: {
|
|
const errorMessage = error instanceof Error ? error.message : error;
|
|
const item = await this.notificationRepository.create({
|
|
userId: admin.id,
|
|
type: NotificationType.JobFailed,
|
|
level: NotificationLevel.Error,
|
|
title: 'Job Failed',
|
|
description: `Job ${[job.name]} failed with error: ${errorMessage}`,
|
|
});
|
|
|
|
this.websocketRepository.clientSend('on_notification', admin.id, mapNotification(item));
|
|
break;
|
|
}
|
|
|
|
default: {
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
@OnEvent({ name: 'ConfigUpdate' })
|
|
onConfigUpdate({ oldConfig, newConfig }: ArgOf<'ConfigUpdate'>) {
|
|
this.websocketRepository.clientBroadcast('on_config_update');
|
|
this.websocketRepository.serverSend('ConfigUpdate', { oldConfig, newConfig });
|
|
}
|
|
|
|
@OnEvent({ name: 'AppRestart' })
|
|
onAppRestart(state: ArgOf<'AppRestart'>) {
|
|
this.websocketRepository.clientBroadcast('AppRestartV1', {
|
|
isMaintenanceMode: state.isMaintenanceMode,
|
|
});
|
|
|
|
this.websocketRepository.serverSend('AppRestart', state);
|
|
}
|
|
|
|
@OnEvent({ name: 'ConfigValidate', priority: -100 })
|
|
async onConfigValidate({ oldConfig, newConfig }: ArgOf<'ConfigValidate'>) {
|
|
try {
|
|
if (
|
|
newConfig.notifications.smtp.enabled &&
|
|
!isEqualObject(oldConfig.notifications.smtp, newConfig.notifications.smtp)
|
|
) {
|
|
await this.emailRepository.verifySmtp(newConfig.notifications.smtp.transport);
|
|
}
|
|
} catch (error: Error | any) {
|
|
this.logger.error(`Failed to validate SMTP configuration: ${error}`, error?.stack);
|
|
throw new Error(`Invalid SMTP configuration: ${error}`);
|
|
}
|
|
}
|
|
|
|
@OnEvent({ name: 'AssetHide' })
|
|
onAssetHide({ assetId, userId }: ArgOf<'AssetHide'>) {
|
|
this.websocketRepository.clientSend('on_asset_hidden', userId, assetId);
|
|
}
|
|
|
|
@OnEvent({ name: 'AssetShow' })
|
|
async onAssetShow({ assetId }: ArgOf<'AssetShow'>) {
|
|
await this.jobRepository.queue({ name: JobName.AssetGenerateThumbnails, data: { id: assetId, notify: true } });
|
|
}
|
|
|
|
@OnEvent({ name: 'AssetTrash' })
|
|
onAssetTrash({ assetId, userId }: ArgOf<'AssetTrash'>) {
|
|
this.websocketRepository.clientSend('on_asset_trash', userId, [assetId]);
|
|
}
|
|
|
|
@OnEvent({ name: 'AssetDelete' })
|
|
onAssetDelete({ assetId, userId }: ArgOf<'AssetDelete'>) {
|
|
this.websocketRepository.clientSend('on_asset_delete', userId, assetId);
|
|
}
|
|
|
|
@OnEvent({ name: 'AssetTrashAll' })
|
|
onAssetsTrash({ assetIds, userId }: ArgOf<'AssetTrashAll'>) {
|
|
this.websocketRepository.clientSend('on_asset_trash', userId, assetIds);
|
|
}
|
|
|
|
@OnEvent({ name: 'AssetMetadataExtracted' })
|
|
async onAssetMetadataExtracted({ assetId, userId, source }: ArgOf<'AssetMetadataExtracted'>) {
|
|
if (source !== 'sidecar-write') {
|
|
return;
|
|
}
|
|
|
|
const [asset] = await this.assetRepository.getByIdsWithAllRelationsButStacks([assetId]);
|
|
if (asset) {
|
|
this.websocketRepository.clientSend(
|
|
'on_asset_update',
|
|
userId,
|
|
mapAsset(asset, { auth: { user: { id: userId } } as AuthDto }),
|
|
);
|
|
}
|
|
}
|
|
|
|
@OnEvent({ name: 'AssetRestoreAll' })
|
|
onAssetsRestore({ assetIds, userId }: ArgOf<'AssetRestoreAll'>) {
|
|
this.websocketRepository.clientSend('on_asset_restore', userId, assetIds);
|
|
}
|
|
|
|
@OnEvent({ name: 'StackCreate' })
|
|
onStackCreate({ userId }: ArgOf<'StackCreate'>) {
|
|
this.websocketRepository.clientSend('on_asset_stack_update', userId);
|
|
}
|
|
|
|
@OnEvent({ name: 'StackUpdate' })
|
|
onStackUpdate({ userId }: ArgOf<'StackUpdate'>) {
|
|
this.websocketRepository.clientSend('on_asset_stack_update', userId);
|
|
}
|
|
|
|
@OnEvent({ name: 'StackDelete' })
|
|
onStackDelete({ userId }: ArgOf<'StackDelete'>) {
|
|
this.websocketRepository.clientSend('on_asset_stack_update', userId);
|
|
}
|
|
|
|
@OnEvent({ name: 'StackDeleteAll' })
|
|
onStacksDelete({ userId }: ArgOf<'StackDeleteAll'>) {
|
|
this.websocketRepository.clientSend('on_asset_stack_update', userId);
|
|
}
|
|
|
|
@OnEvent({ name: 'UserSignup' })
|
|
async onUserSignup({ notify, id, password: password }: ArgOf<'UserSignup'>) {
|
|
if (notify) {
|
|
await this.jobRepository.queue({ name: JobName.NotifyUserSignup, data: { id, password } });
|
|
}
|
|
}
|
|
|
|
@OnEvent({ name: 'UserDelete' })
|
|
onUserDelete({ id }: ArgOf<'UserDelete'>) {
|
|
this.websocketRepository.clientBroadcast('on_user_delete', id);
|
|
}
|
|
|
|
@OnEvent({ name: 'AlbumUpdate' })
|
|
async onAlbumUpdate({ id, recipientId }: ArgOf<'AlbumUpdate'>) {
|
|
await this.jobRepository.removeJob(JobName.NotifyAlbumUpdate, `${id}/${recipientId}`);
|
|
await this.jobRepository.queue({
|
|
name: JobName.NotifyAlbumUpdate,
|
|
data: { id, recipientId, delay: NotificationService.albumUpdateEmailDelayMs },
|
|
});
|
|
}
|
|
|
|
@OnEvent({ name: 'AlbumInvite' })
|
|
async onAlbumInvite({ id, userId }: ArgOf<'AlbumInvite'>) {
|
|
await this.jobRepository.queue({ name: JobName.NotifyAlbumInvite, data: { id, recipientId: userId } });
|
|
}
|
|
|
|
@OnEvent({ name: 'SessionDelete' })
|
|
onSessionDelete({ sessionId }: ArgOf<'SessionDelete'>) {
|
|
// after the response is sent
|
|
setTimeout(() => this.websocketRepository.clientSend('on_session_delete', sessionId, sessionId), 500);
|
|
}
|
|
|
|
async sendTestEmail(id: string, dto: SystemConfigSmtpDto, tempTemplate?: string) {
|
|
const user = await this.userRepository.get(id, { withDeleted: false });
|
|
if (!user) {
|
|
throw new Error('User not found');
|
|
}
|
|
|
|
try {
|
|
await this.emailRepository.verifySmtp(dto.transport);
|
|
} catch (error) {
|
|
throw new BadRequestException('Failed to verify SMTP configuration', { cause: error });
|
|
}
|
|
|
|
const { server } = await this.getConfig({ withCache: false });
|
|
const { html, text } = await this.emailRepository.renderEmail({
|
|
template: EmailTemplate.TEST_EMAIL,
|
|
data: {
|
|
baseUrl: getExternalDomain(server),
|
|
displayName: user.name,
|
|
},
|
|
customTemplate: tempTemplate!,
|
|
});
|
|
const { messageId } = await this.emailRepository.sendEmail({
|
|
to: user.email,
|
|
subject: 'Test email from Immich',
|
|
html,
|
|
text,
|
|
from: dto.from,
|
|
replyTo: dto.replyTo || dto.from,
|
|
smtp: dto.transport,
|
|
});
|
|
|
|
return { messageId };
|
|
}
|
|
|
|
@OnJob({ name: JobName.NotifyUserSignup, queue: QueueName.Notification })
|
|
async handleUserSignup({ id, password }: JobOf<JobName.NotifyUserSignup>) {
|
|
const user = await this.userRepository.get(id, { withDeleted: false });
|
|
if (!user) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
const { server, templates } = await this.getConfig({ withCache: true });
|
|
const { html, text } = await this.emailRepository.renderEmail({
|
|
template: EmailTemplate.WELCOME,
|
|
data: {
|
|
baseUrl: getExternalDomain(server),
|
|
displayName: user.name,
|
|
username: user.email,
|
|
password,
|
|
},
|
|
customTemplate: templates.email.welcomeTemplate,
|
|
});
|
|
|
|
await this.jobRepository.queue({
|
|
name: JobName.SendMail,
|
|
data: {
|
|
to: user.email,
|
|
subject: 'Welcome to Immich',
|
|
html,
|
|
text,
|
|
},
|
|
});
|
|
|
|
return JobStatus.Success;
|
|
}
|
|
|
|
@OnJob({ name: JobName.NotifyAlbumInvite, queue: QueueName.Notification })
|
|
async handleAlbumInvite({ id, recipientId }: JobOf<JobName.NotifyAlbumInvite>) {
|
|
const album = await this.albumRepository.getById(id, { withAssets: false });
|
|
if (!album) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
const recipient = await this.userRepository.get(recipientId, { withDeleted: false });
|
|
if (!recipient) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
await this.sendAlbumLocalNotification(album, recipientId, NotificationType.AlbumInvite, album.owner.name);
|
|
|
|
const { emailNotifications } = getPreferences(recipient.metadata);
|
|
|
|
if (!emailNotifications.enabled || !emailNotifications.albumInvite) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
const attachment = await this.getAlbumThumbnailAttachment(album);
|
|
|
|
const { server, templates } = await this.getConfig({ withCache: false });
|
|
const { html, text } = await this.emailRepository.renderEmail({
|
|
template: EmailTemplate.ALBUM_INVITE,
|
|
data: {
|
|
baseUrl: getExternalDomain(server),
|
|
albumId: album.id,
|
|
albumName: album.albumName,
|
|
senderName: album.owner.name,
|
|
recipientName: recipient.name,
|
|
cid: attachment ? attachment.cid : undefined,
|
|
},
|
|
customTemplate: templates.email.albumInviteTemplate,
|
|
});
|
|
|
|
await this.jobRepository.queue({
|
|
name: JobName.SendMail,
|
|
data: {
|
|
to: recipient.email,
|
|
subject: `You have been added to a shared album - ${album.albumName}`,
|
|
html,
|
|
text,
|
|
imageAttachments: attachment ? [attachment] : undefined,
|
|
},
|
|
});
|
|
|
|
return JobStatus.Success;
|
|
}
|
|
|
|
@OnJob({ name: JobName.NotifyAlbumUpdate, queue: QueueName.Notification })
|
|
async handleAlbumUpdate({ id, recipientId }: JobOf<JobName.NotifyAlbumUpdate>) {
|
|
const album = await this.albumRepository.getById(id, { withAssets: false });
|
|
|
|
if (!album) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
const owner = await this.userRepository.get(album.ownerId, { withDeleted: false });
|
|
if (!owner) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
await this.sendAlbumLocalNotification(album, recipientId, NotificationType.AlbumUpdate);
|
|
|
|
const attachment = await this.getAlbumThumbnailAttachment(album);
|
|
|
|
const { server, templates } = await this.getConfig({ withCache: false });
|
|
|
|
const user = await this.userRepository.get(recipientId, { withDeleted: false });
|
|
if (!user) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
const { emailNotifications } = getPreferences(user.metadata);
|
|
|
|
if (!emailNotifications.enabled || !emailNotifications.albumUpdate) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
const { html, text } = await this.emailRepository.renderEmail({
|
|
template: EmailTemplate.ALBUM_UPDATE,
|
|
data: {
|
|
baseUrl: getExternalDomain(server),
|
|
albumId: album.id,
|
|
albumName: album.albumName,
|
|
recipientName: user.name,
|
|
cid: attachment ? attachment.cid : undefined,
|
|
},
|
|
customTemplate: templates.email.albumUpdateTemplate,
|
|
});
|
|
|
|
await this.jobRepository.queue({
|
|
name: JobName.SendMail,
|
|
data: {
|
|
to: user.email,
|
|
subject: `New media has been added to an album - ${album.albumName}`,
|
|
html,
|
|
text,
|
|
imageAttachments: attachment ? [attachment] : undefined,
|
|
},
|
|
});
|
|
|
|
return JobStatus.Success;
|
|
}
|
|
|
|
@OnJob({ name: JobName.SendMail, queue: QueueName.Notification })
|
|
async handleSendEmail(data: JobOf<JobName.SendMail>): Promise<JobStatus> {
|
|
const { notifications } = await this.getConfig({ withCache: false });
|
|
if (!notifications.smtp.enabled) {
|
|
return JobStatus.Skipped;
|
|
}
|
|
|
|
const { to, subject, html, text: plain } = data;
|
|
const response = await this.emailRepository.sendEmail({
|
|
to,
|
|
subject,
|
|
html,
|
|
text: plain,
|
|
from: notifications.smtp.from,
|
|
replyTo: notifications.smtp.replyTo || notifications.smtp.from,
|
|
smtp: notifications.smtp.transport,
|
|
imageAttachments: data.imageAttachments,
|
|
});
|
|
|
|
this.logger.log(`Sent mail with id: ${response.messageId} status: ${response.response}`);
|
|
|
|
return JobStatus.Success;
|
|
}
|
|
|
|
private async getAlbumThumbnailAttachment(album: {
|
|
albumThumbnailAssetId: string | null;
|
|
}): Promise<EmailImageAttachment | undefined> {
|
|
if (!album.albumThumbnailAssetId) {
|
|
return;
|
|
}
|
|
|
|
const albumThumbnailFiles = await this.assetJobRepository.getAlbumThumbnailFiles(
|
|
album.albumThumbnailAssetId,
|
|
AssetFileType.Thumbnail,
|
|
);
|
|
|
|
if (albumThumbnailFiles.length !== 1) {
|
|
return;
|
|
}
|
|
|
|
return {
|
|
filename: `album-thumbnail${getFilenameExtension(albumThumbnailFiles[0].path)}`,
|
|
path: albumThumbnailFiles[0].path,
|
|
cid: 'album-thumbnail',
|
|
};
|
|
}
|
|
|
|
private async sendAlbumLocalNotification(
|
|
album: MapAlbumDto,
|
|
userId: string,
|
|
type: NotificationType.AlbumInvite | NotificationType.AlbumUpdate,
|
|
senderName?: string,
|
|
) {
|
|
const isInvite = type === NotificationType.AlbumInvite;
|
|
const item = await this.notificationRepository.create({
|
|
userId,
|
|
type,
|
|
level: isInvite ? NotificationLevel.Success : NotificationLevel.Info,
|
|
title: isInvite ? 'Shared Album Invitation' : 'Shared Album Update',
|
|
description: isInvite
|
|
? `${senderName} shared an album (${album.albumName}) with you`
|
|
: `New media has been added to the album (${album.albumName})`,
|
|
data: JSON.stringify({ albumId: album.id }),
|
|
});
|
|
|
|
this.websocketRepository.clientSend('on_notification', userId, mapNotification(item));
|
|
}
|
|
}
|