Skip to content

Commit 7285da9

Browse files
committed
Refactor UserServiceTest imports and add eventPublisher mock for improved test setup
1 parent 1c42d60 commit 7285da9

File tree

1 file changed

+34
-33
lines changed

1 file changed

+34
-33
lines changed

src/test/java/com/digitalsanctuary/spring/user/service/UserServiceTest.java

Lines changed: 34 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,26 @@
11
package com.digitalsanctuary.spring.user.service;
22

3-
import com.digitalsanctuary.spring.user.dto.UserDto;
4-
import com.digitalsanctuary.spring.user.exceptions.UserAlreadyExistException;
5-
import com.digitalsanctuary.spring.user.persistence.model.Role;
6-
import com.digitalsanctuary.spring.user.persistence.model.User;
7-
import com.digitalsanctuary.spring.user.persistence.repository.PasswordResetTokenRepository;
8-
import com.digitalsanctuary.spring.user.persistence.repository.RoleRepository;
9-
import com.digitalsanctuary.spring.user.persistence.repository.UserRepository;
10-
import com.digitalsanctuary.spring.user.persistence.repository.VerificationTokenRepository;
3+
import static org.mockito.ArgumentMatchers.anyString;
4+
import static org.mockito.Mockito.when;
5+
import java.util.Collections;
116
import org.junit.jupiter.api.Assertions;
127
import org.junit.jupiter.api.BeforeEach;
138
import org.junit.jupiter.api.Disabled;
149
import org.junit.jupiter.api.Test;
1510
import org.junit.jupiter.api.extension.ExtendWith;
1611
import org.mockito.Mock;
1712
import org.mockito.junit.jupiter.MockitoExtension;
13+
import org.springframework.context.ApplicationEventPublisher;
1814
import org.springframework.security.core.session.SessionRegistry;
1915
import org.springframework.security.crypto.password.PasswordEncoder;
20-
21-
import java.util.Collections;
22-
23-
import static org.mockito.ArgumentMatchers.*;
24-
import static org.mockito.Mockito.when;
16+
import com.digitalsanctuary.spring.user.dto.UserDto;
17+
import com.digitalsanctuary.spring.user.exceptions.UserAlreadyExistException;
18+
import com.digitalsanctuary.spring.user.persistence.model.Role;
19+
import com.digitalsanctuary.spring.user.persistence.model.User;
20+
import com.digitalsanctuary.spring.user.persistence.repository.PasswordResetTokenRepository;
21+
import com.digitalsanctuary.spring.user.persistence.repository.RoleRepository;
22+
import com.digitalsanctuary.spring.user.persistence.repository.UserRepository;
23+
import com.digitalsanctuary.spring.user.persistence.repository.VerificationTokenRepository;
2524

2625
@ExtendWith(MockitoExtension.class)
2726
@Disabled("Temporarily disabled due to OAuth2 dependency issues")
@@ -46,6 +45,8 @@ public class UserServiceTest {
4645
public UserVerificationService userVerificationService;
4746
@Mock
4847
private DSUserDetailsService dsUserDetailsService;
48+
@Mock
49+
private ApplicationEventPublisher eventPublisher;
4950

5051
@Mock
5152
private AuthorityService authorityService;
@@ -72,7 +73,7 @@ void setUp() {
7273
testUserDto.setRole(1);
7374

7475
userService = new UserService(userRepository, tokenRepository, passwordTokenRepository, passwordEncoder, roleRepository, sessionRegistry,
75-
userEmailService, userVerificationService, authorityService, dsUserDetailsService);
76+
userEmailService, userVerificationService, authorityService, dsUserDetailsService, eventPublisher);
7677
}
7778

7879
@Test
@@ -103,25 +104,25 @@ void checkIfValidOldPassword_returnTrueIfValid() {
103104
when(passwordEncoder.matches(anyString(), anyString())).thenReturn(true);
104105
Assertions.assertTrue(userService.checkIfValidOldPassword(testUser, testUser.getPassword()));
105106
}
106-
107+
107108
// Tests temporarily disabled until OAuth2 dependency issue is resolved
108-
// @Test
109-
// void checkIfValidOldPassword_returnFalseIfInvalid() {
110-
// when(passwordEncoder.matches(anyString(), anyString())).thenReturn(false);
111-
// Assertions.assertFalse(userService.checkIfValidOldPassword(testUser, "wrongPassword"));
112-
// }
113-
//
114-
// @Test
115-
// void changeUserPassword_encodesAndSavesNewPassword() {
116-
// String newPassword = "newTestPassword";
117-
// String encodedPassword = "encodedNewPassword";
118-
//
119-
// when(passwordEncoder.encode(newPassword)).thenReturn(encodedPassword);
120-
// when(userRepository.save(any(User.class))).thenReturn(testUser);
121-
//
122-
// userService.changeUserPassword(testUser, newPassword);
123-
//
124-
// Assertions.assertEquals(encodedPassword, testUser.getPassword());
125-
// }
109+
// @Test
110+
// void checkIfValidOldPassword_returnFalseIfInvalid() {
111+
// when(passwordEncoder.matches(anyString(), anyString())).thenReturn(false);
112+
// Assertions.assertFalse(userService.checkIfValidOldPassword(testUser, "wrongPassword"));
113+
// }
114+
//
115+
// @Test
116+
// void changeUserPassword_encodesAndSavesNewPassword() {
117+
// String newPassword = "newTestPassword";
118+
// String encodedPassword = "encodedNewPassword";
119+
//
120+
// when(passwordEncoder.encode(newPassword)).thenReturn(encodedPassword);
121+
// when(userRepository.save(any(User.class))).thenReturn(testUser);
122+
//
123+
// userService.changeUserPassword(testUser, newPassword);
124+
//
125+
// Assertions.assertEquals(encodedPassword, testUser.getPassword());
126+
// }
126127

127128
}

0 commit comments

Comments
 (0)