|
7 | 7 | defaultMockUser, |
8 | 8 | mockAuth, |
9 | 9 | mockCryptoUuid, |
| 10 | + mockHybridAuth, |
10 | 11 | mockUuid, |
11 | 12 | setupCommonApiMocks, |
12 | 13 | } from '@sim/testing' |
@@ -54,12 +55,11 @@ describe('File Serve API Route', () => { |
54 | 55 | withUploadUtils: true, |
55 | 56 | }) |
56 | 57 |
|
57 | | - vi.doMock('@/lib/auth/hybrid', () => ({ |
58 | | - checkSessionOrInternalAuth: vi.fn().mockResolvedValue({ |
59 | | - success: true, |
60 | | - userId: 'test-user-id', |
61 | | - }), |
62 | | - })) |
| 58 | + const { mockCheckSessionOrInternalAuth: serveAuthMock } = mockHybridAuth() |
| 59 | + serveAuthMock.mockResolvedValue({ |
| 60 | + success: true, |
| 61 | + userId: 'test-user-id', |
| 62 | + }) |
63 | 63 |
|
64 | 64 | vi.doMock('@/app/api/files/authorization', () => ({ |
65 | 65 | verifyFileAccess: vi.fn().mockResolvedValue(true), |
@@ -164,12 +164,11 @@ describe('File Serve API Route', () => { |
164 | 164 | findLocalFile: vi.fn().mockReturnValue('/test/uploads/nested/path/file.txt'), |
165 | 165 | })) |
166 | 166 |
|
167 | | - vi.doMock('@/lib/auth/hybrid', () => ({ |
168 | | - checkSessionOrInternalAuth: vi.fn().mockResolvedValue({ |
169 | | - success: true, |
170 | | - userId: 'test-user-id', |
171 | | - }), |
172 | | - })) |
| 167 | + const { mockCheckSessionOrInternalAuth: serveAuthMock } = mockHybridAuth() |
| 168 | + serveAuthMock.mockResolvedValue({ |
| 169 | + success: true, |
| 170 | + userId: 'test-user-id', |
| 171 | + }) |
173 | 172 |
|
174 | 173 | vi.doMock('@/app/api/files/authorization', () => ({ |
175 | 174 | verifyFileAccess: vi.fn().mockResolvedValue(true), |
@@ -225,12 +224,11 @@ describe('File Serve API Route', () => { |
225 | 224 | USE_BLOB_STORAGE: false, |
226 | 225 | })) |
227 | 226 |
|
228 | | - vi.doMock('@/lib/auth/hybrid', () => ({ |
229 | | - checkSessionOrInternalAuth: vi.fn().mockResolvedValue({ |
230 | | - success: true, |
231 | | - userId: 'test-user-id', |
232 | | - }), |
233 | | - })) |
| 227 | + const { mockCheckSessionOrInternalAuth: serveAuthMock } = mockHybridAuth() |
| 228 | + serveAuthMock.mockResolvedValue({ |
| 229 | + success: true, |
| 230 | + userId: 'test-user-id', |
| 231 | + }) |
234 | 232 |
|
235 | 233 | vi.doMock('@/app/api/files/authorization', () => ({ |
236 | 234 | verifyFileAccess: vi.fn().mockResolvedValue(true), |
@@ -290,12 +288,11 @@ describe('File Serve API Route', () => { |
290 | 288 | readFile: vi.fn().mockRejectedValue(new Error('ENOENT: no such file or directory')), |
291 | 289 | })) |
292 | 290 |
|
293 | | - vi.doMock('@/lib/auth/hybrid', () => ({ |
294 | | - checkSessionOrInternalAuth: vi.fn().mockResolvedValue({ |
295 | | - success: true, |
296 | | - userId: 'test-user-id', |
297 | | - }), |
298 | | - })) |
| 291 | + const { mockCheckSessionOrInternalAuth: serveAuthMock } = mockHybridAuth() |
| 292 | + serveAuthMock.mockResolvedValue({ |
| 293 | + success: true, |
| 294 | + userId: 'test-user-id', |
| 295 | + }) |
299 | 296 |
|
300 | 297 | vi.doMock('@/app/api/files/authorization', () => ({ |
301 | 298 | verifyFileAccess: vi.fn().mockResolvedValue(false), // File not found = no access |
@@ -349,12 +346,11 @@ describe('File Serve API Route', () => { |
349 | 346 |
|
350 | 347 | for (const test of contentTypeTests) { |
351 | 348 | it(`should serve ${test.ext} file with correct content type`, async () => { |
352 | | - vi.doMock('@/lib/auth/hybrid', () => ({ |
353 | | - checkSessionOrInternalAuth: vi.fn().mockResolvedValue({ |
354 | | - success: true, |
355 | | - userId: 'test-user-id', |
356 | | - }), |
357 | | - })) |
| 349 | + const { mockCheckSessionOrInternalAuth: ctAuthMock } = mockHybridAuth() |
| 350 | + ctAuthMock.mockResolvedValue({ |
| 351 | + success: true, |
| 352 | + userId: 'test-user-id', |
| 353 | + }) |
358 | 354 |
|
359 | 355 | vi.doMock('@/app/api/files/authorization', () => ({ |
360 | 356 | verifyFileAccess: vi.fn().mockResolvedValue(true), |
|
0 commit comments