@@ -5,10 +5,12 @@ import { AppModule } from '../src/app.module';
5
5
import { PrismaService } from '../src/prisma/prisma.service' ;
6
6
import { sign } from 'jsonwebtoken' ;
7
7
import { ConfigService } from '@nestjs/config' ;
8
+ import { v4 as uuid } from 'uuid' ;
8
9
9
10
describe ( 'AppController (e2e)' , ( ) => {
10
11
let app : INestApplication ;
11
12
let configService : ConfigService ;
13
+ let testUserUuid : string ;
12
14
13
15
beforeAll ( async ( ) => {
14
16
const moduleFixture : TestingModule = await Test . createTestingModule ( {
@@ -23,17 +25,12 @@ describe('AppController (e2e)', () => {
23
25
const prisma : PrismaService =
24
26
moduleFixture . get < PrismaService > ( PrismaService ) ;
25
27
26
- const testUser = { email :
'[email protected] ' , provider :
'kakao' } ;
27
- prisma . user . upsert ( {
28
- where : {
29
- email_provider : { email : testUser . email , provider : testUser . provider } ,
30
- } ,
31
- update : { } ,
32
- create : {
33
- uuid : 'test uuid' ,
34
- email : testUser . email ,
35
- provider : testUser . provider ,
36
- } ,
28
+ await prisma . kakaoUser . deleteMany ( { } ) ;
29
+ await prisma . user . deleteMany ( { } ) ;
30
+
31
+ testUserUuid = uuid ( ) ;
32
+ await prisma . user . create ( {
33
+ data : { uuid : testUserUuid } ,
37
34
} ) ;
38
35
} ) ;
39
36
@@ -55,23 +52,9 @@ describe('AppController (e2e)', () => {
55
52
. expect ( { message : 'Unauthorized' , statusCode : 401 } ) ;
56
53
} ) ;
57
54
58
- it ( '/login-test (GET) expired access token' , ( ) => {
59
- const invalidToken = sign (
60
- { sub : 'test uuid' } ,
61
- configService . get < string > ( 'JWT_ACCESS_SECRET' ) ,
62
- { expiresIn : '-5m' } ,
63
- ) ;
64
-
65
- return request ( app . getHttpServer ( ) )
66
- . get ( '/login-test' )
67
- . auth ( invalidToken , { type : 'bearer' } )
68
- . expect ( HttpStatus . UNAUTHORIZED )
69
- . expect ( { message : 'Unauthorized' , statusCode : 401 } ) ;
70
- } ) ;
71
-
72
55
it ( '/login-test (GET) expired access token' , ( ) => {
73
56
const expiredToken = sign (
74
- { sub : 'test uuid' } ,
57
+ { sub : testUserUuid } ,
75
58
configService . get < string > ( 'JWT_ACCESS_SECRET' ) ,
76
59
{ expiresIn : '-5m' } ,
77
60
) ;
@@ -99,7 +82,7 @@ describe('AppController (e2e)', () => {
99
82
} ) ;
100
83
101
84
it ( '/login-test (GET) wrong secret access token' , ( ) => {
102
- const invalidToken = sign ( { sub : 'test uuid' } , 'wrong jwt access token' , {
85
+ const invalidToken = sign ( { sub : testUserUuid } , 'wrong jwt access token' , {
103
86
expiresIn : '5m' ,
104
87
} ) ;
105
88
@@ -112,7 +95,7 @@ describe('AppController (e2e)', () => {
112
95
113
96
it ( '/login-test (GET) logged in' , async ( ) => {
114
97
const testToken = sign (
115
- { sub : 'test uuid' } ,
98
+ { sub : testUserUuid } ,
116
99
configService . get < string > ( 'JWT_ACCESS_SECRET' ) ,
117
100
{ expiresIn : '5m' } ,
118
101
) ;
0 commit comments