11package com .digitalsanctuary .spring .user .service ;
22
3- import com .digitalsanctuary .spring .user .dto .UserDto ;
4- import com .digitalsanctuary .spring .user .exceptions .UserAlreadyExistException ;
5- import com .digitalsanctuary .spring .user .persistence .model .Role ;
6- import com .digitalsanctuary .spring .user .persistence .model .User ;
7- import com .digitalsanctuary .spring .user .persistence .repository .PasswordResetTokenRepository ;
8- import com .digitalsanctuary .spring .user .persistence .repository .RoleRepository ;
9- import com .digitalsanctuary .spring .user .persistence .repository .UserRepository ;
10- import com .digitalsanctuary .spring .user .persistence .repository .VerificationTokenRepository ;
3+ import static org .mockito .ArgumentMatchers .anyString ;
4+ import static org .mockito .Mockito .when ;
5+ import java .util .Collections ;
116import org .junit .jupiter .api .Assertions ;
127import org .junit .jupiter .api .BeforeEach ;
138import org .junit .jupiter .api .Disabled ;
149import org .junit .jupiter .api .Test ;
1510import org .junit .jupiter .api .extension .ExtendWith ;
1611import org .mockito .Mock ;
1712import org .mockito .junit .jupiter .MockitoExtension ;
13+ import org .springframework .context .ApplicationEventPublisher ;
1814import org .springframework .security .core .session .SessionRegistry ;
1915import org .springframework .security .crypto .password .PasswordEncoder ;
20-
21- import java .util .Collections ;
22-
23- import static org .mockito .ArgumentMatchers .*;
24- import static org .mockito .Mockito .when ;
16+ import com .digitalsanctuary .spring .user .dto .UserDto ;
17+ import com .digitalsanctuary .spring .user .exceptions .UserAlreadyExistException ;
18+ import com .digitalsanctuary .spring .user .persistence .model .Role ;
19+ import com .digitalsanctuary .spring .user .persistence .model .User ;
20+ import com .digitalsanctuary .spring .user .persistence .repository .PasswordResetTokenRepository ;
21+ import com .digitalsanctuary .spring .user .persistence .repository .RoleRepository ;
22+ import com .digitalsanctuary .spring .user .persistence .repository .UserRepository ;
23+ import com .digitalsanctuary .spring .user .persistence .repository .VerificationTokenRepository ;
2524
2625@ ExtendWith (MockitoExtension .class )
2726@ Disabled ("Temporarily disabled due to OAuth2 dependency issues" )
@@ -46,6 +45,8 @@ public class UserServiceTest {
4645 public UserVerificationService userVerificationService ;
4746 @ Mock
4847 private DSUserDetailsService dsUserDetailsService ;
48+ @ Mock
49+ private ApplicationEventPublisher eventPublisher ;
4950
5051 @ Mock
5152 private AuthorityService authorityService ;
@@ -72,7 +73,7 @@ void setUp() {
7273 testUserDto .setRole (1 );
7374
7475 userService = new UserService (userRepository , tokenRepository , passwordTokenRepository , passwordEncoder , roleRepository , sessionRegistry ,
75- userEmailService , userVerificationService , authorityService , dsUserDetailsService );
76+ userEmailService , userVerificationService , authorityService , dsUserDetailsService , eventPublisher );
7677 }
7778
7879 @ Test
@@ -103,25 +104,25 @@ void checkIfValidOldPassword_returnTrueIfValid() {
103104 when (passwordEncoder .matches (anyString (), anyString ())).thenReturn (true );
104105 Assertions .assertTrue (userService .checkIfValidOldPassword (testUser , testUser .getPassword ()));
105106 }
106-
107+
107108 // Tests temporarily disabled until OAuth2 dependency issue is resolved
108- // @Test
109- // void checkIfValidOldPassword_returnFalseIfInvalid() {
110- // when(passwordEncoder.matches(anyString(), anyString())).thenReturn(false);
111- // Assertions.assertFalse(userService.checkIfValidOldPassword(testUser, "wrongPassword"));
112- // }
113- //
114- // @Test
115- // void changeUserPassword_encodesAndSavesNewPassword() {
116- // String newPassword = "newTestPassword";
117- // String encodedPassword = "encodedNewPassword";
118- //
119- // when(passwordEncoder.encode(newPassword)).thenReturn(encodedPassword);
120- // when(userRepository.save(any(User.class))).thenReturn(testUser);
121- //
122- // userService.changeUserPassword(testUser, newPassword);
123- //
124- // Assertions.assertEquals(encodedPassword, testUser.getPassword());
125- // }
109+ // @Test
110+ // void checkIfValidOldPassword_returnFalseIfInvalid() {
111+ // when(passwordEncoder.matches(anyString(), anyString())).thenReturn(false);
112+ // Assertions.assertFalse(userService.checkIfValidOldPassword(testUser, "wrongPassword"));
113+ // }
114+ //
115+ // @Test
116+ // void changeUserPassword_encodesAndSavesNewPassword() {
117+ // String newPassword = "newTestPassword";
118+ // String encodedPassword = "encodedNewPassword";
119+ //
120+ // when(passwordEncoder.encode(newPassword)).thenReturn(encodedPassword);
121+ // when(userRepository.save(any(User.class))).thenReturn(testUser);
122+ //
123+ // userService.changeUserPassword(testUser, newPassword);
124+ //
125+ // Assertions.assertEquals(encodedPassword, testUser.getPassword());
126+ // }
126127
127128}
0 commit comments