Compare commits
5 Commits
feature/in
...
feature/fi
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
99715d0d14 | ||
|
|
ffa6b3f623 | ||
|
|
9fa7446487 | ||
|
|
33c485b691 | ||
|
|
88fe7ca6c5 |
@@ -23,6 +23,8 @@ repositories {
|
|||||||
mavenCentral()
|
mavenCentral()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
dependencies {
|
dependencies {
|
||||||
implementation("org.springframework.boot:spring-boot-starter-data-jpa")
|
implementation("org.springframework.boot:spring-boot-starter-data-jpa")
|
||||||
implementation("org.springframework.boot:spring-boot-starter-security")
|
implementation("org.springframework.boot:spring-boot-starter-security")
|
||||||
@@ -30,15 +32,14 @@ dependencies {
|
|||||||
implementation("org.springframework.boot:spring-boot-starter-web")
|
implementation("org.springframework.boot:spring-boot-starter-web")
|
||||||
implementation("org.springframework.boot:spring-boot-starter-actuator")
|
implementation("org.springframework.boot:spring-boot-starter-actuator")
|
||||||
implementation("org.springframework.boot:spring-boot-starter-log4j2")
|
implementation("org.springframework.boot:spring-boot-starter-log4j2")
|
||||||
implementation("org.projectlombok:lombok:1.18.24")
|
implementation("org.projectlombok:lombok:1.18.20")
|
||||||
implementation("io.springfox:springfox-boot-starter:3.0.0")
|
implementation("io.springfox:springfox-boot-starter:3.0.0")
|
||||||
implementation("io.springfox:springfox-swagger-ui:3.0.0")
|
implementation("io.springfox:springfox-swagger-ui:3.0.0")
|
||||||
implementation("com.github.ulisesbocchio:jasypt-spring-boot-starter:3.0.4")
|
implementation("com.github.ulisesbocchio:jasypt-spring-boot-starter:3.0.4")
|
||||||
implementation("com.lmax:disruptor:3.4.4")
|
implementation("com.lmax:disruptor:3.4.2")
|
||||||
implementation("io.jsonwebtoken:jjwt-api:0.11.5")
|
implementation("io.jsonwebtoken:jjwt-api:0.11.2")
|
||||||
implementation("com.googlecode.json-simple:json-simple:1.1.1")
|
implementation("com.googlecode.json-simple:json-simple:1.1.1")
|
||||||
implementation("org.springframework.boot:spring-boot-starter-data-redis")
|
implementation("org.springframework.boot:spring-boot-starter-data-redis")
|
||||||
implementation("com.google.code.findbugs:jsr305:3.0.2")
|
|
||||||
|
|
||||||
modules {
|
modules {
|
||||||
module("org.springframework.boot:spring-boot-starter-logging") {
|
module("org.springframework.boot:spring-boot-starter-logging") {
|
||||||
@@ -46,14 +47,18 @@ dependencies {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
testImplementation("org.springframework.boot:spring-boot-starter-test")
|
||||||
|
testImplementation("org.springframework.security:spring-security-test")
|
||||||
|
testImplementation("org.junit.jupiter:junit-jupiter-api:5.8.1")
|
||||||
|
|
||||||
compileOnly("org.projectlombok:lombok")
|
compileOnly("org.projectlombok:lombok")
|
||||||
runtimeOnly("mysql:mysql-connector-java")
|
runtimeOnly("mysql:mysql-connector-java")
|
||||||
runtimeOnly("io.jsonwebtoken:jjwt-impl:0.11.5")
|
runtimeOnly("io.jsonwebtoken:jjwt-impl:0.11.2")
|
||||||
runtimeOnly("io.jsonwebtoken:jjwt-jackson:0.11.5")
|
runtimeOnly("io.jsonwebtoken:jjwt-jackson:0.11.2")
|
||||||
annotationProcessor("org.projectlombok:lombok")
|
annotationProcessor("org.projectlombok:lombok")
|
||||||
annotationProcessor("org.springframework.boot:spring-boot-configuration-processor")
|
annotationProcessor("org.springframework.boot:spring-boot-configuration-processor")
|
||||||
|
|
||||||
testImplementation("org.junit.jupiter:junit-jupiter-api:5.8.1")
|
testRuntimeOnly("org.junit.jupiter:junit-jupiter-engine:5.8.1")
|
||||||
testImplementation("org.springframework.boot:spring-boot-starter-test")
|
testImplementation("org.springframework.boot:spring-boot-starter-test")
|
||||||
testImplementation("org.springframework.security:spring-security-test")
|
testImplementation("org.springframework.security:spring-security-test")
|
||||||
}
|
}
|
||||||
@@ -61,28 +66,3 @@ dependencies {
|
|||||||
tasks.withType<Test> {
|
tasks.withType<Test> {
|
||||||
useJUnitPlatform()
|
useJUnitPlatform()
|
||||||
}
|
}
|
||||||
|
|
||||||
sourceSets {
|
|
||||||
create("intTest") {
|
|
||||||
compileClasspath += sourceSets.main.get().output
|
|
||||||
runtimeClasspath += sourceSets.main.get().output
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
val intTestImplementation by configurations.getting {
|
|
||||||
extendsFrom(configurations.implementation.get())
|
|
||||||
}
|
|
||||||
|
|
||||||
configurations["intTestRuntimeOnly"].extendsFrom(configurations.runtimeOnly.get())
|
|
||||||
configurations["intTestImplementation"].extendsFrom(configurations.testImplementation.get())
|
|
||||||
|
|
||||||
val integrationTest = task<Test>("integrationTest") {
|
|
||||||
description = "Runs integration tests."
|
|
||||||
group = "verification"
|
|
||||||
|
|
||||||
testClassesDirs = sourceSets["intTest"].output.classesDirs
|
|
||||||
classpath = sourceSets["intTest"].runtimeClasspath
|
|
||||||
shouldRunAfter("test")
|
|
||||||
}
|
|
||||||
|
|
||||||
tasks.check { dependsOn(integrationTest) }
|
|
||||||
|
|||||||
@@ -1,7 +0,0 @@
|
|||||||
package com.ticketing.server.user.application;
|
|
||||||
|
|
||||||
import static org.junit.jupiter.api.Assertions.*;
|
|
||||||
|
|
||||||
class UserControllerTest {
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,37 +0,0 @@
|
|||||||
spring:
|
|
||||||
datasource:
|
|
||||||
url: jdbc:mysql://localhost:3306/ticketing_test?serverTimezone=Asia/Seoul&characterEncoding=UTF-8
|
|
||||||
username: ENC(LowN1n4w0Ep/DqLD8+q5Bq6AXM4b8e3V)
|
|
||||||
password: ENC(OMvGcpZLpggFTiGNkqNe66Zq/SmJXF6o)
|
|
||||||
driver-class-name: com.mysql.cj.jdbc.Driver
|
|
||||||
redis:
|
|
||||||
host: localhost
|
|
||||||
port: 6379
|
|
||||||
|
|
||||||
jpa:
|
|
||||||
properties:
|
|
||||||
hibernate:
|
|
||||||
show_sql: true
|
|
||||||
format_sql: true
|
|
||||||
hibernate:
|
|
||||||
ddl-auto: create
|
|
||||||
|
|
||||||
mvc:
|
|
||||||
pathmatch:
|
|
||||||
matching-strategy: ant_path_matcher
|
|
||||||
|
|
||||||
jasypt:
|
|
||||||
encryptor:
|
|
||||||
bean: jasyptStringEncryptor
|
|
||||||
|
|
||||||
jwt:
|
|
||||||
access-header: Authorization
|
|
||||||
refresh-header: REFRESH_TOKEN
|
|
||||||
prefix: Bearer
|
|
||||||
secret-key: Zi1sYWItdGlja2V0aW5nLXByb2plY3Qtc3ByaW5nLWJvb3Qtc2VjdXJpdHktand0LXNlY3JldC1rZXktZi1sYWItdGlja2V0aW5nLXByb2plY3Qtc3ByaW5nLWJvb3Qtc2VjdXJpdHktand0LXNlY3JldC1rZXkK
|
|
||||||
access-token-validity-in-seconds: 60
|
|
||||||
refresh-token-validity-in-seconds: 259200
|
|
||||||
|
|
||||||
tmdb:
|
|
||||||
api-key: 0d1503b6dcbfe1c514299b5564c649b8
|
|
||||||
read-access-token: eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiIwZDE1MDNiNmRjYmZlMWM1MTQyOTliNTU2NGM2NDliOCIsInN1YiI6IjYyOWYwODRlNzI2ZmIxMTA2NDA4MjI2NCIsInNjb3BlcyI6WyJhcGlfcmVhZCJdLCJ2ZXJzaW9uIjoxfQ.rs8KZea8QLyashILiggWFx2s46lgUtzo-xSWoDgE58A
|
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
package com.ticketing.server.global.exception;
|
||||||
|
|
||||||
|
public class AlreadyDeletedException extends RuntimeException {
|
||||||
|
|
||||||
|
public AlreadyDeletedException(String message) {
|
||||||
|
super(message);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,11 @@
|
|||||||
|
package com.ticketing.server.global.exception;
|
||||||
|
|
||||||
|
public class EmailNotFoundException extends IllegalArgumentException {
|
||||||
|
|
||||||
|
private static final String MESSAGE = "존재하지 않는 이메일 입니다.";
|
||||||
|
|
||||||
|
public EmailNotFoundException() {
|
||||||
|
super(MESSAGE);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -1,31 +0,0 @@
|
|||||||
package com.ticketing.server.global.exception;
|
|
||||||
|
|
||||||
import static org.springframework.http.HttpStatus.BAD_REQUEST;
|
|
||||||
import static org.springframework.http.HttpStatus.CONFLICT;
|
|
||||||
import static org.springframework.http.HttpStatus.NOT_FOUND;
|
|
||||||
|
|
||||||
import lombok.AllArgsConstructor;
|
|
||||||
import lombok.Getter;
|
|
||||||
import org.springframework.http.HttpStatus;
|
|
||||||
|
|
||||||
@Getter
|
|
||||||
@AllArgsConstructor
|
|
||||||
public enum ErrorCode {
|
|
||||||
|
|
||||||
/* 400 BAD_REQUEST : 잘못된 요청 */
|
|
||||||
MISMATCH_PASSWORD(BAD_REQUEST, "비밀번호가 일치하지 않습니다."),
|
|
||||||
TOKEN_TYPE(BAD_REQUEST, "토큰 타입이 올바르지 않습니다."),
|
|
||||||
UNAVAILABLE_REFRESH_TOKEN(BAD_REQUEST, "사용할 수 없는 토큰 입니다."),
|
|
||||||
|
|
||||||
/* 404 NOT_FOUND : Resource 를 찾을 수 없음 */
|
|
||||||
EMAIL_NOT_FOUND(NOT_FOUND, "해당 이메일을 찾을 수 없습니다."),
|
|
||||||
REFRESH_TOKEN_NOT_FOUND(NOT_FOUND, "리프레쉬 토큰을 찾을 수 없습니다."),
|
|
||||||
|
|
||||||
/* 409 CONFLICT : Resource 의 현재 상태와 충돌. 보통 중복된 데이터 존재 */
|
|
||||||
DUPLICATE_EMAIL(CONFLICT, "이메일이 이미 존재합니다."),
|
|
||||||
DELETED_EMAIL(CONFLICT, "이미 삭제된 이메일 입니다.");
|
|
||||||
|
|
||||||
private final HttpStatus httpStatus;
|
|
||||||
private final String detail;
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,35 +0,0 @@
|
|||||||
package com.ticketing.server.global.exception;
|
|
||||||
|
|
||||||
import java.util.List;
|
|
||||||
import lombok.EqualsAndHashCode;
|
|
||||||
import lombok.Getter;
|
|
||||||
import org.springframework.http.HttpStatus;
|
|
||||||
|
|
||||||
@Getter
|
|
||||||
@EqualsAndHashCode
|
|
||||||
public class ErrorResponse {
|
|
||||||
|
|
||||||
private final HttpStatus status;
|
|
||||||
private final String message;
|
|
||||||
private final List<String> errors;
|
|
||||||
|
|
||||||
public ErrorResponse(HttpStatus status, String message, List<String> errors) {
|
|
||||||
this.status = status;
|
|
||||||
this.message = message;
|
|
||||||
this.errors = errors;
|
|
||||||
}
|
|
||||||
|
|
||||||
public ErrorResponse(HttpStatus status, String message, String error) {
|
|
||||||
this.status = status;
|
|
||||||
this.message = message;
|
|
||||||
this.errors = List.of(error);
|
|
||||||
}
|
|
||||||
|
|
||||||
public static ErrorResponse toErrorResponse(ErrorCode errorCode) {
|
|
||||||
return new ErrorResponse(
|
|
||||||
errorCode.getHttpStatus(),
|
|
||||||
errorCode.name(),
|
|
||||||
errorCode.getDetail());
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,246 +0,0 @@
|
|||||||
package com.ticketing.server.global.exception;
|
|
||||||
|
|
||||||
import static org.springframework.http.HttpStatus.BAD_REQUEST;
|
|
||||||
import static org.springframework.http.HttpStatus.FORBIDDEN;
|
|
||||||
import static org.springframework.http.HttpStatus.INTERNAL_SERVER_ERROR;
|
|
||||||
import static org.springframework.http.HttpStatus.METHOD_NOT_ALLOWED;
|
|
||||||
import static org.springframework.http.HttpStatus.NOT_FOUND;
|
|
||||||
import static org.springframework.http.HttpStatus.UNAUTHORIZED;
|
|
||||||
import static org.springframework.http.HttpStatus.UNSUPPORTED_MEDIA_TYPE;
|
|
||||||
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Objects;
|
|
||||||
import java.util.Set;
|
|
||||||
import javax.validation.ConstraintViolation;
|
|
||||||
import javax.validation.ConstraintViolationException;
|
|
||||||
import lombok.extern.slf4j.Slf4j;
|
|
||||||
import org.springframework.beans.TypeMismatchException;
|
|
||||||
import org.springframework.http.HttpHeaders;
|
|
||||||
import org.springframework.http.HttpMethod;
|
|
||||||
import org.springframework.http.HttpStatus;
|
|
||||||
import org.springframework.http.ResponseEntity;
|
|
||||||
import org.springframework.security.access.AccessDeniedException;
|
|
||||||
import org.springframework.security.core.AuthenticationException;
|
|
||||||
import org.springframework.validation.BindException;
|
|
||||||
import org.springframework.validation.FieldError;
|
|
||||||
import org.springframework.validation.ObjectError;
|
|
||||||
import org.springframework.web.HttpMediaTypeNotSupportedException;
|
|
||||||
import org.springframework.web.HttpRequestMethodNotSupportedException;
|
|
||||||
import org.springframework.web.bind.MethodArgumentNotValidException;
|
|
||||||
import org.springframework.web.bind.MissingServletRequestParameterException;
|
|
||||||
import org.springframework.web.bind.annotation.ExceptionHandler;
|
|
||||||
import org.springframework.web.bind.annotation.RestControllerAdvice;
|
|
||||||
import org.springframework.web.context.request.WebRequest;
|
|
||||||
import org.springframework.web.method.annotation.MethodArgumentTypeMismatchException;
|
|
||||||
import org.springframework.web.multipart.support.MissingServletRequestPartException;
|
|
||||||
import org.springframework.web.servlet.NoHandlerFoundException;
|
|
||||||
import org.springframework.web.servlet.mvc.method.annotation.ResponseEntityExceptionHandler;
|
|
||||||
|
|
||||||
@Slf4j
|
|
||||||
@RestControllerAdvice
|
|
||||||
public class GlobalExceptionHandler extends ResponseEntityExceptionHandler {
|
|
||||||
|
|
||||||
/* 400 START */
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Valid 유효성 검사 실패
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleMethodArgumentNotValid(
|
|
||||||
MethodArgumentNotValidException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("MethodArgumentNotValidException :: ", ex);
|
|
||||||
|
|
||||||
List<String> errors = generateErrors(ex);
|
|
||||||
ErrorResponse response = new ErrorResponse(BAD_REQUEST, ex.getLocalizedMessage(), errors);
|
|
||||||
return handleExceptionInternal(ex, response, headers, response.getStatus(), request);
|
|
||||||
}
|
|
||||||
|
|
||||||
/***
|
|
||||||
* ModelAttribute 으로 binding error 발생
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleBindException(
|
|
||||||
BindException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("BindException :: ", ex);
|
|
||||||
|
|
||||||
List<String> errors = generateErrors(ex);
|
|
||||||
ErrorResponse response = new ErrorResponse(BAD_REQUEST, ex.getLocalizedMessage(), errors);
|
|
||||||
return handleExceptionInternal(ex, response, headers, response.getStatus(), request);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 잘못된 유형으로 Bean 속성 설정
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleTypeMismatch(
|
|
||||||
TypeMismatchException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("TypeMismatchException :: ", ex);
|
|
||||||
|
|
||||||
String error = ex.getValue() + " value for " + ex.getPropertyName() + " should be of type " + ex.getRequiredType();
|
|
||||||
ErrorResponse response = new ErrorResponse(BAD_REQUEST, ex.getLocalizedMessage(), error);
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(headers).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* multipart/form-data 요청 실패
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleMissingServletRequestPart(
|
|
||||||
MissingServletRequestPartException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("MissingServletRequestPartException :: ", ex);
|
|
||||||
|
|
||||||
String error = ex.getRequestPartName() + " part is missing";
|
|
||||||
ErrorResponse response = new ErrorResponse(BAD_REQUEST, ex.getLocalizedMessage(), error);
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(headers).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 필수 인수 누락
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleMissingServletRequestParameter(
|
|
||||||
MissingServletRequestParameterException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("MissingServletRequestParameterException :: ", ex);
|
|
||||||
|
|
||||||
String error = ex.getParameterName() + " parameter is missing";
|
|
||||||
ErrorResponse response = new ErrorResponse(BAD_REQUEST, ex.getLocalizedMessage(), error);
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(headers).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 인수가 예상한 형식이 아닐 시
|
|
||||||
*/
|
|
||||||
@ExceptionHandler(value = MethodArgumentTypeMismatchException.class)
|
|
||||||
protected ResponseEntity<Object> handleMethodArgumentTypeMismatch(MethodArgumentTypeMismatchException ex) {
|
|
||||||
log.error("MethodArgumentTypeMismatchException :: ", ex);
|
|
||||||
|
|
||||||
String error = ex.getName() + " should be of type " + Objects.requireNonNull(ex.getRequiredType()).getName();
|
|
||||||
ErrorResponse response = new ErrorResponse(BAD_REQUEST, ex.getLocalizedMessage(), error);
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(new HttpHeaders()).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 제약 조건 위반
|
|
||||||
*/
|
|
||||||
@ExceptionHandler(value = ConstraintViolationException.class)
|
|
||||||
protected ResponseEntity<Object> handleConstraintViolation(ConstraintViolationException ex) {
|
|
||||||
log.error("ConstraintViolationException :: ", ex);
|
|
||||||
|
|
||||||
List<String> errors = new ArrayList<>();
|
|
||||||
for (ConstraintViolation<?> violation : ex.getConstraintViolations()) {
|
|
||||||
errors.add(violation.getRootBeanClass().getName() + " " + violation.getPropertyPath() + ": " + violation.getMessage());
|
|
||||||
}
|
|
||||||
|
|
||||||
ErrorResponse response = new ErrorResponse(BAD_REQUEST, ex.getLocalizedMessage(), errors);
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(new HttpHeaders()).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* 400 END */
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 404 발생
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleNoHandlerFoundException(
|
|
||||||
NoHandlerFoundException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("NoHandlerFoundException :: ", ex);
|
|
||||||
|
|
||||||
String error = "No handler found for " + ex.getHttpMethod() + " " + ex.getRequestURL();
|
|
||||||
ErrorResponse response = new ErrorResponse(NOT_FOUND, ex.getLocalizedMessage(), error);
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(headers).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 지원하지 않는 HTTP 메서드로 요청 405
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleHttpRequestMethodNotSupported(
|
|
||||||
HttpRequestMethodNotSupportedException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("HttpRequestMethodNotSupportedException :: ", ex);
|
|
||||||
|
|
||||||
StringBuilder builder = new StringBuilder();
|
|
||||||
builder.append(ex.getMethod());
|
|
||||||
builder.append(" method is not supported for this request. Supported methods are ");
|
|
||||||
|
|
||||||
Set<HttpMethod> supportedHttpMethods = ex.getSupportedHttpMethods();
|
|
||||||
if (supportedHttpMethods != null) {
|
|
||||||
supportedHttpMethods.forEach(t -> builder.append(t).append(" "));
|
|
||||||
}
|
|
||||||
|
|
||||||
ErrorResponse response = new ErrorResponse(METHOD_NOT_ALLOWED, ex.getLocalizedMessage(), builder.toString());
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(new HttpHeaders()).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 지원되지 않는 미디어 유형으로 요청 415
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
protected ResponseEntity<Object> handleHttpMediaTypeNotSupported(
|
|
||||||
HttpMediaTypeNotSupportedException ex, HttpHeaders headers, HttpStatus status, WebRequest request) {
|
|
||||||
log.error("HttpMediaTypeNotSupportedException :: ", ex);
|
|
||||||
|
|
||||||
StringBuilder builder = new StringBuilder();
|
|
||||||
builder.append(ex.getContentType());
|
|
||||||
builder.append(" media type is not supported. Supported media types are ");
|
|
||||||
ex.getSupportedMediaTypes().forEach(t -> builder.append(t).append(" "));
|
|
||||||
|
|
||||||
ErrorResponse response = new ErrorResponse(UNSUPPORTED_MEDIA_TYPE, ex.getLocalizedMessage(), builder.substring(0, builder.length() - 2));
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(new HttpHeaders()).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 특정 핸들러 없는 모든 예외 500
|
|
||||||
*/
|
|
||||||
@ExceptionHandler(value = Exception.class)
|
|
||||||
protected ResponseEntity<Object> handleAll(Exception ex) {
|
|
||||||
log.error("Exception :: ", ex);
|
|
||||||
|
|
||||||
ErrorResponse response = new ErrorResponse(INTERNAL_SERVER_ERROR, ex.getLocalizedMessage(), "오류가 발생했습니다.");
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(new HttpHeaders()).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 접근 권한이 없을 때
|
|
||||||
*/
|
|
||||||
@ExceptionHandler(value = AccessDeniedException.class)
|
|
||||||
protected ResponseEntity<ErrorResponse> handleAccessDeniedException(Exception ex) {
|
|
||||||
log.error("AccessDeniedException :: ", ex);
|
|
||||||
|
|
||||||
ErrorResponse response = new ErrorResponse(FORBIDDEN, ex.getLocalizedMessage(), "접근 권한이 없습니다.");
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(new HttpHeaders()).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 인증 정보가 없을 때
|
|
||||||
*/
|
|
||||||
@ExceptionHandler(value = AuthenticationException.class)
|
|
||||||
protected ResponseEntity<ErrorResponse> handleAuthenticationException(Exception ex) {
|
|
||||||
log.error("AuthenticationException :: ", ex);
|
|
||||||
|
|
||||||
ErrorResponse response = new ErrorResponse(UNAUTHORIZED, ex.getLocalizedMessage(), "로그인 후 이용하실 수 있습니다.");
|
|
||||||
return ResponseEntity.status(response.getStatus()).headers(new HttpHeaders()).body(response);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* 커스텀 예외 발생 시
|
|
||||||
*/
|
|
||||||
@ExceptionHandler(value = TicketingException.class)
|
|
||||||
protected ResponseEntity<ErrorResponse> ticketingException(TicketingException ex) {
|
|
||||||
log.error("TicketingException :: ", ex);
|
|
||||||
|
|
||||||
ErrorCode errorCode = ex.getErrorCode();
|
|
||||||
return ResponseEntity.status(errorCode.getHttpStatus()).body(ErrorResponse.toErrorResponse(errorCode));
|
|
||||||
}
|
|
||||||
|
|
||||||
private List<String> generateErrors(BindException ex) {
|
|
||||||
List<String> errors = new ArrayList<>();
|
|
||||||
List<ObjectError> allErrors = ex.getBindingResult().getAllErrors();
|
|
||||||
|
|
||||||
for (ObjectError error : allErrors) {
|
|
||||||
errors.add(((FieldError) error).getField() + ": " + error.getDefaultMessage());
|
|
||||||
}
|
|
||||||
return errors;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -0,0 +1,11 @@
|
|||||||
|
package com.ticketing.server.global.exception;
|
||||||
|
|
||||||
|
public class PasswordMismatchException extends RuntimeException {
|
||||||
|
|
||||||
|
private static final String MESSAGE = "패스워드가 일치하지 않습니다";
|
||||||
|
|
||||||
|
public PasswordMismatchException() {
|
||||||
|
super(MESSAGE);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
package com.ticketing.server.global.exception;
|
|
||||||
|
|
||||||
import lombok.AllArgsConstructor;
|
|
||||||
import lombok.Getter;
|
|
||||||
|
|
||||||
@Getter
|
|
||||||
@AllArgsConstructor
|
|
||||||
public class TicketingException extends RuntimeException {
|
|
||||||
|
|
||||||
private final ErrorCode errorCode;
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
package com.ticketing.server.global.exception.token;
|
||||||
|
|
||||||
|
public class TokenException extends RuntimeException {
|
||||||
|
|
||||||
|
public TokenException(String message) {
|
||||||
|
super(message);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
package com.ticketing.server.global.exception.token;
|
||||||
|
|
||||||
|
public class TokenNotFindException extends TokenException {
|
||||||
|
|
||||||
|
private static final String MESSAGE = "일치하는 토큰을 찾지 못하였습니다.";
|
||||||
|
|
||||||
|
public TokenNotFindException() {
|
||||||
|
super(MESSAGE);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
package com.ticketing.server.global.exception.token;
|
||||||
|
|
||||||
|
public class TokenTypeException extends TokenException {
|
||||||
|
|
||||||
|
private static final String MESSAGE = "토큰 타입이 일치하지 않습니다.";
|
||||||
|
|
||||||
|
public TokenTypeException() {
|
||||||
|
super(MESSAGE);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,11 @@
|
|||||||
|
package com.ticketing.server.global.exception.token;
|
||||||
|
|
||||||
|
public class UnavailableRefreshTokenException extends TokenException {
|
||||||
|
|
||||||
|
private static final String MESSAGE = "사용할 수 없는 refresh Token 입니다.";
|
||||||
|
|
||||||
|
public UnavailableRefreshTokenException() {
|
||||||
|
super(MESSAGE);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -1,56 +0,0 @@
|
|||||||
package com.ticketing.server.global.security;
|
|
||||||
|
|
||||||
import com.ticketing.server.user.domain.UserGrade;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
import org.springframework.context.annotation.Bean;
|
|
||||||
import org.springframework.context.annotation.Configuration;
|
|
||||||
import org.springframework.security.access.AccessDecisionManager;
|
|
||||||
import org.springframework.security.access.AccessDecisionVoter;
|
|
||||||
import org.springframework.security.access.annotation.Jsr250Voter;
|
|
||||||
import org.springframework.security.access.expression.method.ExpressionBasedPreInvocationAdvice;
|
|
||||||
import org.springframework.security.access.hierarchicalroles.RoleHierarchy;
|
|
||||||
import org.springframework.security.access.hierarchicalroles.RoleHierarchyImpl;
|
|
||||||
import org.springframework.security.access.prepost.PreInvocationAuthorizationAdviceVoter;
|
|
||||||
import org.springframework.security.access.vote.AffirmativeBased;
|
|
||||||
import org.springframework.security.access.vote.AuthenticatedVoter;
|
|
||||||
import org.springframework.security.access.vote.RoleHierarchyVoter;
|
|
||||||
import org.springframework.security.access.vote.RoleVoter;
|
|
||||||
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
|
|
||||||
import org.springframework.security.config.annotation.method.configuration.GlobalMethodSecurityConfiguration;
|
|
||||||
|
|
||||||
@EnableGlobalMethodSecurity(
|
|
||||||
securedEnabled = true,
|
|
||||||
jsr250Enabled = true,
|
|
||||||
prePostEnabled = true
|
|
||||||
)
|
|
||||||
@Configuration
|
|
||||||
public class RoleConfig extends GlobalMethodSecurityConfiguration {
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected AccessDecisionManager accessDecisionManager() {
|
|
||||||
List<AccessDecisionVoter<?>> decisionVoters = new ArrayList<>();
|
|
||||||
ExpressionBasedPreInvocationAdvice expressionAdvice = new ExpressionBasedPreInvocationAdvice();
|
|
||||||
expressionAdvice.setExpressionHandler(getExpressionHandler());
|
|
||||||
decisionVoters.add(new PreInvocationAuthorizationAdviceVoter(expressionAdvice));
|
|
||||||
decisionVoters.add(new Jsr250Voter());
|
|
||||||
|
|
||||||
decisionVoters.add(new RoleVoter());
|
|
||||||
decisionVoters.add(roleHierarchyVoter());
|
|
||||||
decisionVoters.add(new AuthenticatedVoter());
|
|
||||||
return new AffirmativeBased(decisionVoters);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Bean
|
|
||||||
public RoleHierarchyVoter roleHierarchyVoter() {
|
|
||||||
return new RoleHierarchyVoter(roleHierarchy());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Bean
|
|
||||||
public RoleHierarchy roleHierarchy() {
|
|
||||||
RoleHierarchyImpl roleHierarchy = new RoleHierarchyImpl();
|
|
||||||
roleHierarchy.setHierarchy(UserGrade.getRoleHierarchy());
|
|
||||||
return roleHierarchy;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -8,7 +8,9 @@ import lombok.RequiredArgsConstructor;
|
|||||||
import org.springframework.context.annotation.Bean;
|
import org.springframework.context.annotation.Bean;
|
||||||
import org.springframework.context.annotation.Configuration;
|
import org.springframework.context.annotation.Configuration;
|
||||||
import org.springframework.http.HttpMethod;
|
import org.springframework.http.HttpMethod;
|
||||||
|
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
|
||||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.builders.WebSecurity;
|
||||||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
||||||
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
|
||||||
import org.springframework.security.config.http.SessionCreationPolicy;
|
import org.springframework.security.config.http.SessionCreationPolicy;
|
||||||
@@ -17,6 +19,7 @@ import org.springframework.security.crypto.password.PasswordEncoder;
|
|||||||
|
|
||||||
@Configuration
|
@Configuration
|
||||||
@EnableWebSecurity
|
@EnableWebSecurity
|
||||||
|
@EnableGlobalMethodSecurity(securedEnabled = true)
|
||||||
@RequiredArgsConstructor
|
@RequiredArgsConstructor
|
||||||
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
|
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
|
||||||
|
|
||||||
@@ -50,9 +53,9 @@ public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
|
|||||||
|
|
||||||
.and()
|
.and()
|
||||||
.authorizeRequests()
|
.authorizeRequests()
|
||||||
.antMatchers(HttpMethod.POST, "/api/auth/token").permitAll()
|
.antMatchers(HttpMethod.POST, "/api/user/login").permitAll()
|
||||||
.antMatchers(HttpMethod.POST, "/api/auth/refresh").permitAll()
|
.antMatchers(HttpMethod.POST, "/api/user/refresh").permitAll()
|
||||||
.antMatchers(HttpMethod.POST, "/api/users").permitAll()
|
.antMatchers(HttpMethod.POST, "/api/user").permitAll()
|
||||||
.antMatchers("/api/movies/**").permitAll()
|
.antMatchers("/api/movies/**").permitAll()
|
||||||
.antMatchers("/l7check").permitAll()
|
.antMatchers("/l7check").permitAll()
|
||||||
.antMatchers("/actuator/**").permitAll()
|
.antMatchers("/actuator/**").permitAll()
|
||||||
|
|||||||
@@ -3,24 +3,15 @@ package com.ticketing.server.global.security.jwt.handle;
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
import javax.servlet.http.HttpServletResponse;
|
import javax.servlet.http.HttpServletResponse;
|
||||||
import org.springframework.beans.factory.annotation.Qualifier;
|
|
||||||
import org.springframework.security.access.AccessDeniedException;
|
import org.springframework.security.access.AccessDeniedException;
|
||||||
import org.springframework.security.web.access.AccessDeniedHandler;
|
import org.springframework.security.web.access.AccessDeniedHandler;
|
||||||
import org.springframework.stereotype.Component;
|
import org.springframework.stereotype.Component;
|
||||||
import org.springframework.web.servlet.HandlerExceptionResolver;
|
|
||||||
|
|
||||||
@Component("JwtAccessDeniedHandler")
|
@Component
|
||||||
public class JwtAccessDeniedHandler implements AccessDeniedHandler {
|
public class JwtAccessDeniedHandler implements AccessDeniedHandler {
|
||||||
|
|
||||||
private final HandlerExceptionResolver resolver;
|
|
||||||
|
|
||||||
public JwtAccessDeniedHandler(@Qualifier("handlerExceptionResolver") HandlerExceptionResolver resolver) {
|
|
||||||
this.resolver = resolver;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void handle(HttpServletRequest request, HttpServletResponse response, AccessDeniedException accessDeniedException) throws IOException {
|
public void handle(HttpServletRequest request, HttpServletResponse response, AccessDeniedException accessDeniedException) throws IOException {
|
||||||
response.sendError(HttpServletResponse.SC_FORBIDDEN);
|
response.sendError(HttpServletResponse.SC_FORBIDDEN);
|
||||||
resolver.resolveException(request, response, null, accessDeniedException);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,24 +3,15 @@ package com.ticketing.server.global.security.jwt.handle;
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
import javax.servlet.http.HttpServletResponse;
|
import javax.servlet.http.HttpServletResponse;
|
||||||
import org.springframework.beans.factory.annotation.Autowired;
|
|
||||||
import org.springframework.beans.factory.annotation.Qualifier;
|
|
||||||
import org.springframework.security.core.AuthenticationException;
|
import org.springframework.security.core.AuthenticationException;
|
||||||
import org.springframework.security.web.AuthenticationEntryPoint;
|
import org.springframework.security.web.AuthenticationEntryPoint;
|
||||||
import org.springframework.stereotype.Component;
|
import org.springframework.stereotype.Component;
|
||||||
import org.springframework.web.servlet.HandlerExceptionResolver;
|
|
||||||
|
|
||||||
@Component("JwtAuthenticationEntryPoint")
|
@Component
|
||||||
public class JwtAuthenticationEntryPoint implements AuthenticationEntryPoint {
|
public class JwtAuthenticationEntryPoint implements AuthenticationEntryPoint {
|
||||||
|
|
||||||
private final HandlerExceptionResolver resolver;
|
|
||||||
|
|
||||||
public JwtAuthenticationEntryPoint(@Qualifier("handlerExceptionResolver") HandlerExceptionResolver resolver) {
|
|
||||||
this.resolver = resolver;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authException) throws IOException {
|
public void commence(HttpServletRequest request, HttpServletResponse response, AuthenticationException authException) throws IOException {
|
||||||
resolver.resolveException(request, response, null, authException);
|
response.sendError(HttpServletResponse.SC_UNAUTHORIZED);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,8 +1,5 @@
|
|||||||
package com.ticketing.server.user.service;
|
package com.ticketing.server.global.security.service;
|
||||||
|
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.EMAIL_NOT_FOUND;
|
|
||||||
|
|
||||||
import com.ticketing.server.global.exception.TicketingException;
|
|
||||||
import com.ticketing.server.user.domain.User;
|
import com.ticketing.server.user.domain.User;
|
||||||
import com.ticketing.server.user.domain.repository.UserRepository;
|
import com.ticketing.server.user.domain.repository.UserRepository;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
@@ -23,7 +20,7 @@ public class CustomUserDetailsService implements UserDetailsService {
|
|||||||
public UserDetails loadUserByUsername(String email) throws UsernameNotFoundException {
|
public UserDetails loadUserByUsername(String email) throws UsernameNotFoundException {
|
||||||
return userRepository.findByEmailAndIsDeletedFalse(email)
|
return userRepository.findByEmailAndIsDeletedFalse(email)
|
||||||
.map(this::createUserDetails)
|
.map(this::createUserDetails)
|
||||||
.orElseThrow(() -> new TicketingException(EMAIL_NOT_FOUND));
|
.orElseThrow(() -> new UsernameNotFoundException("존재하지 않는 email 입니다. :: " + email));
|
||||||
}
|
}
|
||||||
|
|
||||||
private UserDetails createUserDetails(User user) {
|
private UserDetails createUserDetails(User user) {
|
||||||
@@ -1,28 +0,0 @@
|
|||||||
package com.ticketing.server.global.validator.constraints;
|
|
||||||
|
|
||||||
import com.ticketing.server.global.validator.constraintvalidators.FieldsValueNotMatchValidator;
|
|
||||||
import java.lang.annotation.Documented;
|
|
||||||
import java.lang.annotation.ElementType;
|
|
||||||
import java.lang.annotation.Retention;
|
|
||||||
import java.lang.annotation.RetentionPolicy;
|
|
||||||
import java.lang.annotation.Target;
|
|
||||||
import javax.validation.Constraint;
|
|
||||||
import javax.validation.Payload;
|
|
||||||
|
|
||||||
@Constraint(validatedBy = FieldsValueNotMatchValidator.class)
|
|
||||||
@Target(ElementType.TYPE)
|
|
||||||
@Retention(RetentionPolicy.RUNTIME)
|
|
||||||
@Documented
|
|
||||||
public @interface FieldsValueNotMatch {
|
|
||||||
|
|
||||||
String message();
|
|
||||||
|
|
||||||
String field();
|
|
||||||
|
|
||||||
String fieldMatch();
|
|
||||||
|
|
||||||
Class<?>[] groups() default {};
|
|
||||||
|
|
||||||
Class<? extends Payload>[] payload() default {};
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
package com.ticketing.server.global.validator.constraintvalidators;
|
|
||||||
|
|
||||||
import com.ticketing.server.global.validator.constraints.FieldsValueNotMatch;
|
|
||||||
import javax.validation.ConstraintValidator;
|
|
||||||
import javax.validation.ConstraintValidatorContext;
|
|
||||||
import org.springframework.beans.BeanWrapperImpl;
|
|
||||||
|
|
||||||
public class FieldsValueNotMatchValidator implements ConstraintValidator<FieldsValueNotMatch, Object> {
|
|
||||||
|
|
||||||
private String field;
|
|
||||||
private String fieldMatch;
|
|
||||||
|
|
||||||
public void initialize(FieldsValueNotMatch constraintAnnotation) {
|
|
||||||
this.field = constraintAnnotation.field();
|
|
||||||
this.fieldMatch = constraintAnnotation.fieldMatch();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean isValid(Object value, ConstraintValidatorContext context) {
|
|
||||||
Object fieldValue = new BeanWrapperImpl(value).getPropertyValue(field);
|
|
||||||
Object fieldMatchValue = new BeanWrapperImpl(value).getPropertyValue(fieldMatch);
|
|
||||||
|
|
||||||
if (fieldValue != null) {
|
|
||||||
return !fieldValue.equals(fieldMatchValue);
|
|
||||||
} else {
|
|
||||||
return fieldMatchValue != null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,63 +0,0 @@
|
|||||||
package com.ticketing.server.user.application;
|
|
||||||
|
|
||||||
import com.ticketing.server.user.application.request.LoginRequest;
|
|
||||||
import com.ticketing.server.user.application.response.LogoutResponse;
|
|
||||||
import com.ticketing.server.user.application.response.TokenDto;
|
|
||||||
import com.ticketing.server.user.service.interfaces.AuthenticationService;
|
|
||||||
import lombok.RequiredArgsConstructor;
|
|
||||||
import lombok.extern.slf4j.Slf4j;
|
|
||||||
import org.springframework.http.HttpHeaders;
|
|
||||||
import org.springframework.http.HttpStatus;
|
|
||||||
import org.springframework.http.ResponseEntity;
|
|
||||||
import org.springframework.security.core.annotation.AuthenticationPrincipal;
|
|
||||||
import org.springframework.security.core.userdetails.UserDetails;
|
|
||||||
import org.springframework.web.bind.annotation.PostMapping;
|
|
||||||
import org.springframework.web.bind.annotation.RequestBody;
|
|
||||||
import org.springframework.web.bind.annotation.RequestMapping;
|
|
||||||
import org.springframework.web.bind.annotation.RequestParam;
|
|
||||||
import org.springframework.web.bind.annotation.RestController;
|
|
||||||
|
|
||||||
@RestController
|
|
||||||
@RequiredArgsConstructor
|
|
||||||
@RequestMapping("/api/auth")
|
|
||||||
@Slf4j
|
|
||||||
public class AuthController {
|
|
||||||
|
|
||||||
private final AuthenticationService authenticationService;
|
|
||||||
|
|
||||||
@PostMapping("/token")
|
|
||||||
public ResponseEntity<TokenDto> login(@RequestBody LoginRequest loginRequest) {
|
|
||||||
TokenDto tokenDto = authenticationService.generateTokenDto(loginRequest.toAuthentication());
|
|
||||||
|
|
||||||
return ResponseEntity.status(HttpStatus.OK)
|
|
||||||
.headers(getHttpHeaders())
|
|
||||||
.body(tokenDto);
|
|
||||||
}
|
|
||||||
|
|
||||||
@PostMapping("/refresh")
|
|
||||||
public ResponseEntity<TokenDto> refreshToken(@RequestParam("refreshToken") String refreshToken) {
|
|
||||||
TokenDto tokenDto = authenticationService.reissueTokenDto(refreshToken);
|
|
||||||
|
|
||||||
return ResponseEntity.status(HttpStatus.OK)
|
|
||||||
.headers(getHttpHeaders())
|
|
||||||
.body(tokenDto);
|
|
||||||
}
|
|
||||||
|
|
||||||
@PostMapping("/logout")
|
|
||||||
public ResponseEntity<LogoutResponse> logout(@AuthenticationPrincipal UserDetails userRequest) {
|
|
||||||
LogoutResponse logoutResponse = authenticationService.deleteRefreshToken(userRequest.getUsername());
|
|
||||||
|
|
||||||
return ResponseEntity.status(HttpStatus.OK)
|
|
||||||
.body(logoutResponse);
|
|
||||||
}
|
|
||||||
|
|
||||||
private HttpHeaders getHttpHeaders() {
|
|
||||||
HttpHeaders httpHeaders = new HttpHeaders();
|
|
||||||
httpHeaders.set(HttpHeaders.CACHE_CONTROL, "no-cache, no-store, must-revalidate");
|
|
||||||
httpHeaders.set(HttpHeaders.PRAGMA, "no-store");
|
|
||||||
httpHeaders.set(HttpHeaders.EXPIRES, "0");
|
|
||||||
|
|
||||||
return httpHeaders;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,15 +1,19 @@
|
|||||||
package com.ticketing.server.user.application;
|
package com.ticketing.server.user.application;
|
||||||
|
|
||||||
|
import com.ticketing.server.global.security.jwt.JwtProperties;
|
||||||
|
import com.ticketing.server.user.application.request.LoginRequest;
|
||||||
import com.ticketing.server.user.application.request.SignUpRequest;
|
import com.ticketing.server.user.application.request.SignUpRequest;
|
||||||
import com.ticketing.server.user.application.request.UserChangePasswordRequest;
|
|
||||||
import com.ticketing.server.user.application.request.UserDeleteRequest;
|
import com.ticketing.server.user.application.request.UserDeleteRequest;
|
||||||
|
import com.ticketing.server.user.application.request.UserModifyPasswordRequest;
|
||||||
import com.ticketing.server.user.application.response.SignUpResponse;
|
import com.ticketing.server.user.application.response.SignUpResponse;
|
||||||
|
import com.ticketing.server.user.application.response.TokenDto;
|
||||||
import com.ticketing.server.user.application.response.UserChangePasswordResponse;
|
import com.ticketing.server.user.application.response.UserChangePasswordResponse;
|
||||||
import com.ticketing.server.user.application.response.UserDeleteResponse;
|
import com.ticketing.server.user.application.response.UserDeleteResponse;
|
||||||
import com.ticketing.server.user.application.response.UserDetailResponse;
|
import com.ticketing.server.user.application.response.UserDetailResponse;
|
||||||
import com.ticketing.server.user.domain.User;
|
import com.ticketing.server.user.domain.User;
|
||||||
import com.ticketing.server.user.domain.UserGrade;
|
|
||||||
import com.ticketing.server.user.service.UserServiceImpl;
|
import com.ticketing.server.user.service.UserServiceImpl;
|
||||||
|
import com.ticketing.server.user.service.interfaces.AuthenticationService;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
import javax.validation.Valid;
|
import javax.validation.Valid;
|
||||||
import lombok.RequiredArgsConstructor;
|
import lombok.RequiredArgsConstructor;
|
||||||
import lombok.extern.slf4j.Slf4j;
|
import lombok.extern.slf4j.Slf4j;
|
||||||
@@ -25,16 +29,19 @@ import org.springframework.web.bind.annotation.PostMapping;
|
|||||||
import org.springframework.web.bind.annotation.PutMapping;
|
import org.springframework.web.bind.annotation.PutMapping;
|
||||||
import org.springframework.web.bind.annotation.RequestBody;
|
import org.springframework.web.bind.annotation.RequestBody;
|
||||||
import org.springframework.web.bind.annotation.RequestMapping;
|
import org.springframework.web.bind.annotation.RequestMapping;
|
||||||
|
import org.springframework.web.bind.annotation.RequestParam;
|
||||||
import org.springframework.web.bind.annotation.RestController;
|
import org.springframework.web.bind.annotation.RestController;
|
||||||
|
|
||||||
@RestController
|
@RestController
|
||||||
@RequiredArgsConstructor
|
@RequiredArgsConstructor
|
||||||
@RequestMapping("/api/users")
|
@RequestMapping("/api/user")
|
||||||
@Slf4j
|
@Slf4j
|
||||||
public class UserController {
|
public class UserController {
|
||||||
|
|
||||||
private final UserServiceImpl userService;
|
private final UserServiceImpl userService;
|
||||||
|
private final AuthenticationService authenticationService;
|
||||||
private final PasswordEncoder passwordEncoder;
|
private final PasswordEncoder passwordEncoder;
|
||||||
|
private final JwtProperties jwtProperties;
|
||||||
|
|
||||||
@PostMapping
|
@PostMapping
|
||||||
public ResponseEntity<SignUpResponse> register(@RequestBody @Valid SignUpRequest request) {
|
public ResponseEntity<SignUpResponse> register(@RequestBody @Valid SignUpRequest request) {
|
||||||
@@ -42,27 +49,48 @@ public class UserController {
|
|||||||
return ResponseEntity.status(HttpStatus.CREATED).body(SignUpResponse.from(user));
|
return ResponseEntity.status(HttpStatus.CREATED).body(SignUpResponse.from(user));
|
||||||
}
|
}
|
||||||
|
|
||||||
@GetMapping("/details")
|
@GetMapping("/info")
|
||||||
@Secured("ROLE_GUEST")
|
@Secured("ROLE_GUEST")
|
||||||
public ResponseEntity<UserDetailResponse> details(@AuthenticationPrincipal UserDetails userRequest) {
|
public ResponseEntity<UserDetailResponse> myInfo(@AuthenticationPrincipal UserDetails userRequest) {
|
||||||
User user = userService.findByEmail(userRequest.getUsername());
|
User user = userService.findByEmail(userRequest.getUsername());
|
||||||
return ResponseEntity.status(HttpStatus.OK).body(UserDetailResponse.from(user));
|
return ResponseEntity.status(HttpStatus.OK).body(UserDetailResponse.from(user));
|
||||||
}
|
}
|
||||||
|
|
||||||
@DeleteMapping
|
@DeleteMapping
|
||||||
@Secured(UserGrade.ROLES.GUEST)
|
@Secured("ROLE_GUEST")
|
||||||
public ResponseEntity<UserDeleteResponse> deleteUser(@RequestBody @Valid UserDeleteRequest request) {
|
public ResponseEntity<UserDeleteResponse> deleteUser(@RequestBody @Valid UserDeleteRequest request) {
|
||||||
User user = userService.delete(request.toDeleteUserDto(passwordEncoder));
|
User user = userService.delete(request.toDeleteUserDto(passwordEncoder));
|
||||||
return ResponseEntity.status(HttpStatus.OK).body(UserDeleteResponse.from(user));
|
return ResponseEntity.status(HttpStatus.OK).body(UserDeleteResponse.from(user));
|
||||||
}
|
}
|
||||||
|
|
||||||
@PutMapping("/password")
|
@PutMapping("/password")
|
||||||
@Secured(UserGrade.ROLES.GUEST)
|
@Secured("ROLE_GUEST")
|
||||||
public ResponseEntity<UserChangePasswordResponse> changePassword(
|
public ResponseEntity<UserChangePasswordResponse> changePassword(@RequestBody @Valid UserModifyPasswordRequest request) {
|
||||||
@AuthenticationPrincipal UserDetails userRequest,
|
if (request.oldEqualNew()) {
|
||||||
@RequestBody @Valid UserChangePasswordRequest request) {
|
log.error("기존 패스워드와 동일한 패스워드로 변경할 수 없습니다.");
|
||||||
User user = userService.changePassword(request.toChangePasswordDto(userRequest.getUsername(), passwordEncoder));
|
return ResponseEntity.status(HttpStatus.BAD_REQUEST).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
User user = userService.changePassword(request.toChangePasswordDto(passwordEncoder));
|
||||||
return ResponseEntity.status(HttpStatus.OK).body(UserChangePasswordResponse.from(user));
|
return ResponseEntity.status(HttpStatus.OK).body(UserChangePasswordResponse.from(user));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@PostMapping("/login")
|
||||||
|
public ResponseEntity<TokenDto> login(@RequestBody LoginRequest loginRequest, HttpServletResponse response) {
|
||||||
|
TokenDto tokenDto = authenticationService.login(loginRequest.toAuthentication());
|
||||||
|
|
||||||
|
response.setHeader("Cache-Control", "no-store");
|
||||||
|
response.setHeader("Pragma", "no-store");
|
||||||
|
return ResponseEntity.status(HttpStatus.OK).body(tokenDto);
|
||||||
|
}
|
||||||
|
|
||||||
|
@PostMapping("/refresh")
|
||||||
|
public ResponseEntity<TokenDto> refreshToken(@RequestParam("refreshToken") String refreshToken, HttpServletResponse response) {
|
||||||
|
TokenDto tokenDto = authenticationService.reissueAccessToken(refreshToken);
|
||||||
|
|
||||||
|
response.setHeader(jwtProperties.getAccessHeader(), tokenDto.getAccessToken());
|
||||||
|
response.setHeader(jwtProperties.getRefreshHeader(), tokenDto.getRefreshToken());
|
||||||
|
return ResponseEntity.status(HttpStatus.OK).body(tokenDto);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
package com.ticketing.server.user.application.request;
|
package com.ticketing.server.user.application.request;
|
||||||
|
|
||||||
import com.ticketing.server.global.validator.constraints.FieldsValueNotMatch;
|
|
||||||
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
||||||
|
import javax.validation.constraints.Email;
|
||||||
import javax.validation.constraints.NotEmpty;
|
import javax.validation.constraints.NotEmpty;
|
||||||
import lombok.AllArgsConstructor;
|
import lombok.AllArgsConstructor;
|
||||||
import lombok.Getter;
|
import lombok.Getter;
|
||||||
@@ -11,12 +11,11 @@ import org.springframework.security.crypto.password.PasswordEncoder;
|
|||||||
@Getter
|
@Getter
|
||||||
@NoArgsConstructor
|
@NoArgsConstructor
|
||||||
@AllArgsConstructor
|
@AllArgsConstructor
|
||||||
@FieldsValueNotMatch(
|
public class UserModifyPasswordRequest {
|
||||||
field = "oldPassword",
|
|
||||||
fieldMatch = "newPassword",
|
@NotEmpty(message = "{validation.not.empty.email}")
|
||||||
message = "{validation.password.not.change}"
|
@Email(message = "{validation.email}")
|
||||||
)
|
private String email;
|
||||||
public class UserChangePasswordRequest {
|
|
||||||
|
|
||||||
@NotEmpty(message = "{validation.not.empty.oldpassword}")
|
@NotEmpty(message = "{validation.not.empty.oldpassword}")
|
||||||
private String oldPassword;
|
private String oldPassword;
|
||||||
@@ -24,8 +23,12 @@ public class UserChangePasswordRequest {
|
|||||||
@NotEmpty(message = "{validation.not.empty.newpassword}")
|
@NotEmpty(message = "{validation.not.empty.newpassword}")
|
||||||
private String newPassword;
|
private String newPassword;
|
||||||
|
|
||||||
public ChangePasswordDTO toChangePasswordDto(String email, PasswordEncoder passwordEncoder) {
|
public ChangePasswordDTO toChangePasswordDto(PasswordEncoder passwordEncoder) {
|
||||||
return new ChangePasswordDTO(email, oldPassword, newPassword, passwordEncoder);
|
return new ChangePasswordDTO(email, oldPassword, newPassword, passwordEncoder);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public boolean oldEqualNew() {
|
||||||
|
return oldPassword.equals(newPassword);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
@@ -1,28 +0,0 @@
|
|||||||
package com.ticketing.server.user.application.response;
|
|
||||||
|
|
||||||
import com.ticketing.server.global.redis.RefreshToken;
|
|
||||||
import lombok.AccessLevel;
|
|
||||||
import lombok.AllArgsConstructor;
|
|
||||||
import lombok.Getter;
|
|
||||||
|
|
||||||
@Getter
|
|
||||||
@AllArgsConstructor(access = AccessLevel.PRIVATE)
|
|
||||||
public class LogoutResponse {
|
|
||||||
|
|
||||||
private Long refreshTokenId;
|
|
||||||
private String email;
|
|
||||||
private String refreshToken;
|
|
||||||
|
|
||||||
private LogoutResponse(String email) {
|
|
||||||
this.email = email;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static LogoutResponse from(String email) {
|
|
||||||
return new LogoutResponse(email);
|
|
||||||
}
|
|
||||||
|
|
||||||
public static LogoutResponse from(RefreshToken refreshToken) {
|
|
||||||
return new LogoutResponse(refreshToken.getId(), refreshToken.getEmail(), refreshToken.getToken());
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,10 +1,8 @@
|
|||||||
package com.ticketing.server.user.domain;
|
package com.ticketing.server.user.domain;
|
||||||
|
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.DELETED_EMAIL;
|
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.MISMATCH_PASSWORD;
|
|
||||||
|
|
||||||
import com.ticketing.server.global.dto.repository.AbstractEntity;
|
import com.ticketing.server.global.dto.repository.AbstractEntity;
|
||||||
import com.ticketing.server.global.exception.TicketingException;
|
import com.ticketing.server.global.exception.AlreadyDeletedException;
|
||||||
|
import com.ticketing.server.global.exception.PasswordMismatchException;
|
||||||
import com.ticketing.server.global.validator.constraints.Phone;
|
import com.ticketing.server.global.validator.constraints.Phone;
|
||||||
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
||||||
import com.ticketing.server.user.service.dto.DeleteUserDTO;
|
import com.ticketing.server.user.service.dto.DeleteUserDTO;
|
||||||
@@ -25,6 +23,14 @@ import lombok.NoArgsConstructor;
|
|||||||
@NoArgsConstructor
|
@NoArgsConstructor
|
||||||
public class User extends AbstractEntity {
|
public class User extends AbstractEntity {
|
||||||
|
|
||||||
|
public User(String name, String email, String password, UserGrade grade, String phone) {
|
||||||
|
this.name = name;
|
||||||
|
this.email = email;
|
||||||
|
this.password = password;
|
||||||
|
this.grade = grade;
|
||||||
|
this.phone = phone;
|
||||||
|
}
|
||||||
|
|
||||||
@Column(name = "name")
|
@Column(name = "name")
|
||||||
@NotEmpty(message = "{validation.not.empty.name}")
|
@NotEmpty(message = "{validation.not.empty.name}")
|
||||||
private String name;
|
private String name;
|
||||||
@@ -52,17 +58,9 @@ public class User extends AbstractEntity {
|
|||||||
|
|
||||||
private LocalDateTime deletedAt;
|
private LocalDateTime deletedAt;
|
||||||
|
|
||||||
public User(String name, String email, String password, UserGrade grade, String phone) {
|
|
||||||
this.name = name;
|
|
||||||
this.email = email;
|
|
||||||
this.password = password;
|
|
||||||
this.grade = grade;
|
|
||||||
this.phone = phone;
|
|
||||||
}
|
|
||||||
|
|
||||||
public User delete(DeleteUserDTO deleteUser) {
|
public User delete(DeleteUserDTO deleteUser) {
|
||||||
if (isDeleted) {
|
if (isDeleted) {
|
||||||
throw new TicketingException(DELETED_EMAIL);
|
throw new AlreadyDeletedException("이미 탈퇴된 회원 입니다.");
|
||||||
}
|
}
|
||||||
|
|
||||||
checkPassword(deleteUser);
|
checkPassword(deleteUser);
|
||||||
@@ -81,7 +79,7 @@ public class User extends AbstractEntity {
|
|||||||
|
|
||||||
public void checkPassword(PasswordMatches passwordMatches) {
|
public void checkPassword(PasswordMatches passwordMatches) {
|
||||||
if (!passwordMatches.passwordMatches(password)) {
|
if (!passwordMatches.passwordMatches(password)) {
|
||||||
throw new TicketingException(MISMATCH_PASSWORD);
|
throw new PasswordMismatchException();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,38 +1,5 @@
|
|||||||
package com.ticketing.server.user.domain;
|
package com.ticketing.server.user.domain;
|
||||||
|
|
||||||
import lombok.RequiredArgsConstructor;
|
|
||||||
|
|
||||||
@RequiredArgsConstructor
|
|
||||||
public enum UserGrade {
|
public enum UserGrade {
|
||||||
ADMIN(ROLES.ADMIN, null),
|
GUEST, STAFF
|
||||||
STAFF(ROLES.STAFF, ROLES.ADMIN),
|
|
||||||
GUEST(ROLES.GUEST, ROLES.STAFF);
|
|
||||||
|
|
||||||
private final String roleName;
|
|
||||||
private final String parentName;
|
|
||||||
|
|
||||||
public static class ROLES {
|
|
||||||
|
|
||||||
public static final String ADMIN = "ROLE_ADMIN";
|
|
||||||
public static final String STAFF = "ROLE_STAFF";
|
|
||||||
public static final String GUEST = "ROLE_GUEST";
|
|
||||||
|
|
||||||
private ROLES() {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public static String getRoleHierarchy() {
|
|
||||||
StringBuilder sb = new StringBuilder();
|
|
||||||
|
|
||||||
for (UserGrade grade : UserGrade.values()) {
|
|
||||||
if (grade.parentName != null) {
|
|
||||||
sb.append(grade.parentName);
|
|
||||||
sb.append(" > ");
|
|
||||||
sb.append(grade.roleName);
|
|
||||||
sb.append("\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return sb.toString();
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,15 +1,12 @@
|
|||||||
package com.ticketing.server.user.service;
|
package com.ticketing.server.user.service;
|
||||||
|
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.REFRESH_TOKEN_NOT_FOUND;
|
import com.ticketing.server.global.exception.token.TokenNotFindException;
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.TOKEN_TYPE;
|
import com.ticketing.server.global.exception.token.TokenTypeException;
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.UNAVAILABLE_REFRESH_TOKEN;
|
import com.ticketing.server.global.exception.token.UnavailableRefreshTokenException;
|
||||||
|
|
||||||
import com.ticketing.server.global.exception.TicketingException;
|
|
||||||
import com.ticketing.server.global.redis.RefreshRedisRepository;
|
import com.ticketing.server.global.redis.RefreshRedisRepository;
|
||||||
import com.ticketing.server.global.redis.RefreshToken;
|
import com.ticketing.server.global.redis.RefreshToken;
|
||||||
import com.ticketing.server.global.security.jwt.JwtProperties;
|
import com.ticketing.server.global.security.jwt.JwtProperties;
|
||||||
import com.ticketing.server.global.security.jwt.JwtProvider;
|
import com.ticketing.server.global.security.jwt.JwtProvider;
|
||||||
import com.ticketing.server.user.application.response.LogoutResponse;
|
|
||||||
import com.ticketing.server.user.application.response.TokenDto;
|
import com.ticketing.server.user.application.response.TokenDto;
|
||||||
import com.ticketing.server.user.service.interfaces.AuthenticationService;
|
import com.ticketing.server.user.service.interfaces.AuthenticationService;
|
||||||
import lombok.RequiredArgsConstructor;
|
import lombok.RequiredArgsConstructor;
|
||||||
@@ -32,7 +29,7 @@ public class AuthenticationServiceImpl implements AuthenticationService {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
@Transactional
|
@Transactional
|
||||||
public TokenDto generateTokenDto(UsernamePasswordAuthenticationToken authenticationToken) {
|
public TokenDto login(UsernamePasswordAuthenticationToken authenticationToken) {
|
||||||
// 회원인증
|
// 회원인증
|
||||||
Authentication authentication = authenticationManagerBuilder.getObject().authenticate(authenticationToken);
|
Authentication authentication = authenticationManagerBuilder.getObject().authenticate(authenticationToken);
|
||||||
|
|
||||||
@@ -53,7 +50,7 @@ public class AuthenticationServiceImpl implements AuthenticationService {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
@Transactional
|
@Transactional
|
||||||
public TokenDto reissueTokenDto(String bearerRefreshToken) {
|
public TokenDto reissueAccessToken(String bearerRefreshToken) {
|
||||||
String refreshToken = resolveToken(bearerRefreshToken);
|
String refreshToken = resolveToken(bearerRefreshToken);
|
||||||
|
|
||||||
// 토큰 검증
|
// 토큰 검증
|
||||||
@@ -63,11 +60,11 @@ public class AuthenticationServiceImpl implements AuthenticationService {
|
|||||||
|
|
||||||
// Redis 에 토큰이 있는지 검증
|
// Redis 에 토큰이 있는지 검증
|
||||||
RefreshToken findTokenEntity = refreshRedisRepository.findByEmail(authentication.getName())
|
RefreshToken findTokenEntity = refreshRedisRepository.findByEmail(authentication.getName())
|
||||||
.orElseThrow(() -> new TicketingException(REFRESH_TOKEN_NOT_FOUND));
|
.orElseThrow(TokenNotFindException::new);
|
||||||
|
|
||||||
// redis 토큰과 input 토큰이 일치한지 확인
|
// redis 토큰과 input 토큰이 일치한지 확인
|
||||||
if (!refreshToken.equals(findTokenEntity.getToken())) {
|
if (!refreshToken.equals(findTokenEntity.getToken())) {
|
||||||
throw new TicketingException(UNAVAILABLE_REFRESH_TOKEN);
|
throw new UnavailableRefreshTokenException();
|
||||||
}
|
}
|
||||||
|
|
||||||
// 토큰 발급
|
// 토큰 발급
|
||||||
@@ -80,21 +77,11 @@ public class AuthenticationServiceImpl implements AuthenticationService {
|
|||||||
return tokenDto;
|
return tokenDto;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
@Transactional
|
|
||||||
public LogoutResponse deleteRefreshToken(String email) {
|
|
||||||
return refreshRedisRepository.findByEmail(email)
|
|
||||||
.map(tokenDto -> {
|
|
||||||
refreshRedisRepository.delete(tokenDto);
|
|
||||||
return LogoutResponse.from(tokenDto);
|
|
||||||
}).orElseGet(() -> LogoutResponse.from(email));
|
|
||||||
}
|
|
||||||
|
|
||||||
private String resolveToken(String bearerToken) {
|
private String resolveToken(String bearerToken) {
|
||||||
if (StringUtils.hasText(bearerToken) && jwtProperties.hasTokenStartsWith(bearerToken)) {
|
if (StringUtils.hasText(bearerToken) && jwtProperties.hasTokenStartsWith(bearerToken)) {
|
||||||
return bearerToken.substring(7);
|
return bearerToken.substring(7);
|
||||||
}
|
}
|
||||||
throw new TicketingException(TOKEN_TYPE);
|
throw new TokenTypeException();
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,9 +1,6 @@
|
|||||||
package com.ticketing.server.user.service;
|
package com.ticketing.server.user.service;
|
||||||
|
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.DUPLICATE_EMAIL;
|
import com.ticketing.server.global.exception.EmailNotFoundException;
|
||||||
import static com.ticketing.server.global.exception.ErrorCode.EMAIL_NOT_FOUND;
|
|
||||||
|
|
||||||
import com.ticketing.server.global.exception.TicketingException;
|
|
||||||
import com.ticketing.server.user.domain.User;
|
import com.ticketing.server.user.domain.User;
|
||||||
import com.ticketing.server.user.domain.repository.UserRepository;
|
import com.ticketing.server.user.domain.repository.UserRepository;
|
||||||
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
||||||
@@ -31,17 +28,18 @@ public class UserServiceImpl implements UserService {
|
|||||||
@Transactional
|
@Transactional
|
||||||
public User register(@Valid SignUpDTO signUpDto) {
|
public User register(@Valid SignUpDTO signUpDto) {
|
||||||
Optional<User> user = userRepository.findByEmail(signUpDto.getEmail());
|
Optional<User> user = userRepository.findByEmail(signUpDto.getEmail());
|
||||||
if (user.isEmpty()) {
|
if (user.isPresent()) {
|
||||||
return userRepository.save(signUpDto.toUser());
|
log.error("이미 존재하는 이메일이기 때문에 신규 회원가입을 진행할 수 없습니다. :: {}", signUpDto);
|
||||||
|
throw new IllegalArgumentException("이미 존재하는 이메일이기 때문에 신규 회원가입을 진행할 수 없습니다.");
|
||||||
}
|
}
|
||||||
|
|
||||||
throw new TicketingException(DUPLICATE_EMAIL);
|
return userRepository.save(signUpDto.toUser());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@Transactional
|
@Transactional
|
||||||
public User delete(@Valid DeleteUserDTO deleteUserDto) {
|
public User delete(@Valid DeleteUserDTO deleteUserDto) {
|
||||||
User user = findNotDeletedUserByEmail(deleteUserDto.getEmail());
|
User user = findByEmail(deleteUserDto.getEmail());
|
||||||
return user.delete(deleteUserDto);
|
return user.delete(deleteUserDto);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -55,16 +53,19 @@ public class UserServiceImpl implements UserService {
|
|||||||
@Override
|
@Override
|
||||||
public User findByEmail(String email) {
|
public User findByEmail(String email) {
|
||||||
return userRepository.findByEmail(email)
|
return userRepository.findByEmail(email)
|
||||||
.orElseThrow(UserServiceImpl::throwEmailNotFound);
|
.orElseThrow(() -> {
|
||||||
|
log.error("존재하지 않는 이메일 입니다. :: {}", email);
|
||||||
|
throw new EmailNotFoundException();
|
||||||
|
}
|
||||||
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
private User findNotDeletedUserByEmail(String email) {
|
private User findNotDeletedUserByEmail(String email) {
|
||||||
return userRepository.findByEmailAndIsDeletedFalse(email)
|
return userRepository.findByEmailAndIsDeletedFalse(email)
|
||||||
.orElseThrow(UserServiceImpl::throwEmailNotFound);
|
.orElseThrow(() -> {
|
||||||
}
|
log.error("존재하지 않는 이메일 입니다. :: {}", email);
|
||||||
|
throw new EmailNotFoundException();
|
||||||
private static RuntimeException throwEmailNotFound() {
|
});
|
||||||
throw new TicketingException(EMAIL_NOT_FOUND);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,15 +1,12 @@
|
|||||||
package com.ticketing.server.user.service.interfaces;
|
package com.ticketing.server.user.service.interfaces;
|
||||||
|
|
||||||
import com.ticketing.server.user.application.response.LogoutResponse;
|
|
||||||
import com.ticketing.server.user.application.response.TokenDto;
|
import com.ticketing.server.user.application.response.TokenDto;
|
||||||
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
|
||||||
|
|
||||||
public interface AuthenticationService {
|
public interface AuthenticationService {
|
||||||
|
|
||||||
TokenDto generateTokenDto(UsernamePasswordAuthenticationToken usernamePasswordAuthenticationToken);
|
TokenDto login(UsernamePasswordAuthenticationToken usernamePasswordAuthenticationToken);
|
||||||
|
|
||||||
TokenDto reissueTokenDto(String bearerRefreshToken);
|
TokenDto reissueAccessToken(String bearerRefreshToken);
|
||||||
|
|
||||||
LogoutResponse deleteRefreshToken(String email);
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -21,7 +21,6 @@ spring:
|
|||||||
mvc:
|
mvc:
|
||||||
pathmatch:
|
pathmatch:
|
||||||
matching-strategy: ant_path_matcher
|
matching-strategy: ant_path_matcher
|
||||||
throw-exception-if-no-handler-found: true
|
|
||||||
|
|
||||||
jasypt:
|
jasypt:
|
||||||
encryptor:
|
encryptor:
|
||||||
|
|||||||
@@ -1,10 +1,9 @@
|
|||||||
validation.not.empty.name=\uC774\uB984\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.name="\uC774\uB984\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.email=\uC774\uBA54\uC77C\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.email="\uC774\uBA54\uC77C\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.password=\uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.password="\uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.oldpassword=\uD604\uC7AC \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.oldpassword="\uD604\uC7AC \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.newpassword=\uBCC0\uACBD\uD560 \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.newpassword="\uBCC0\uACBD\uD560 \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.grade=\uC0AC\uC6A9\uC790 \uB4F1\uAE09\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.grade="\uC0AC\uC6A9\uC790 \uB4F1\uAE09\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.phone=\uD734\uB300\uBC88\uD638\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.phone="\uD734\uB300\uBC88\uD638\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.email=\uC774\uBA54\uC77C\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.
|
validation.email="\uC774\uBA54\uC77C\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4."
|
||||||
validation.phone=\uD734\uB300\uBC88\uD638\uAC00 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.
|
validation.phone="\uD734\uB300\uBC88\uD638\uAC00 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4."
|
||||||
validation.password.not.change=\uB3D9\uC77C\uD55C \uD328\uC2A4\uC6CC\uB4DC\uB85C \uBCC0\uACBD\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4.
|
|
||||||
|
|||||||
@@ -1,10 +1,9 @@
|
|||||||
validation.not.empty.name=name is required.
|
validation.not.empty.name="name is required."
|
||||||
validation.not.empty.email=email is required.
|
validation.not.empty.email="email is required."
|
||||||
validation.not.empty.password=password is required.
|
validation.not.empty.password="password is required."
|
||||||
validation.not.empty.oldpassword=Old Password is required.
|
validation.not.empty.oldpassword="Old Password is required."
|
||||||
validation.not.empty.newpassword=New Password is required.
|
validation.not.empty.newpassword="New Password is required."
|
||||||
validation.not.empty.grade=user grade is required.
|
validation.not.empty.grade="user grade is required."
|
||||||
validation.not.empty.phone=phone is required.
|
validation.not.empty.phone="phone is required."
|
||||||
validation.email=email is not valid.
|
validation.email="email is not valid."
|
||||||
validation.phone=phone is not valid.
|
validation.phone="phone is not valid."
|
||||||
validation.password.not.change=password not change.
|
|
||||||
|
|||||||
@@ -1,10 +1,9 @@
|
|||||||
validation.not.empty.name=\uC774\uB984\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.name="\uC774\uB984\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.email=\uC774\uBA54\uC77C\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.email="\uC774\uBA54\uC77C\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.password=\uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.password="\uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.oldpassword=\uD604\uC7AC \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.oldpassword="\uD604\uC7AC \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.newpassword=\uBCC0\uACBD\uD560 \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.newpassword="\uBCC0\uACBD\uD560 \uD328\uC2A4\uC6CC\uB4DC\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.grade=\uC0AC\uC6A9\uC790 \uB4F1\uAE09\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.grade="\uC0AC\uC6A9\uC790 \uB4F1\uAE09\uC740 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.not.empty.phone=\uD734\uB300\uBC88\uD638\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4.
|
validation.not.empty.phone="\uD734\uB300\uBC88\uD638\uB294 \uD544\uC218 \uC785\uB2C8\uB2E4."
|
||||||
validation.email=\uC774\uBA54\uC77C\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.
|
validation.email="\uC774\uBA54\uC77C\uC774 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4."
|
||||||
validation.phone=\uD734\uB300\uBC88\uD638\uAC00 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4.
|
validation.phone="\uD734\uB300\uBC88\uD638\uAC00 \uC62C\uBC14\uB974\uC9C0 \uC54A\uC2B5\uB2C8\uB2E4."
|
||||||
validation.password.not.change=\uB3D9\uC77C\uD55C \uD328\uC2A4\uC6CC\uB4DC\uB85C \uBCC0\uACBD\uD560 \uC218 \uC5C6\uC2B5\uB2C8\uB2E4.
|
|
||||||
|
|||||||
@@ -0,0 +1,13 @@
|
|||||||
|
package com.ticketing.server;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.springframework.boot.test.context.SpringBootTest;
|
||||||
|
|
||||||
|
@SpringBootTest
|
||||||
|
class ServerApplicationTests {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void contextLoads() {
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -27,11 +27,7 @@ import org.springframework.web.context.WebApplicationContext;
|
|||||||
|
|
||||||
@SpringBootTest
|
@SpringBootTest
|
||||||
@Transactional
|
@Transactional
|
||||||
class AuthControllerTest {
|
class UserControllerTest {
|
||||||
|
|
||||||
private static final String LOGIN_URL = "/api/auth/token";
|
|
||||||
private static final String REGISTER_URL = "/api/users";
|
|
||||||
private static final String USER_EMAIL = "ticketing@gmail.com";
|
|
||||||
|
|
||||||
@Autowired
|
@Autowired
|
||||||
WebApplicationContext context;
|
WebApplicationContext context;
|
||||||
@@ -54,10 +50,10 @@ class AuthControllerTest {
|
|||||||
@DisplayName("로그인 인증 성공")
|
@DisplayName("로그인 인증 성공")
|
||||||
void loginSuccess() throws Exception {
|
void loginSuccess() throws Exception {
|
||||||
// given
|
// given
|
||||||
LoginRequest request = new LoginRequest(USER_EMAIL, "qwe123");
|
LoginRequest request = new LoginRequest("ticketing@gmail.com", "qwe123");
|
||||||
|
|
||||||
// when
|
// when
|
||||||
ResultActions actions = mvc.perform(post(LOGIN_URL)
|
ResultActions actions = mvc.perform(post("/api/user/login")
|
||||||
.content(asJsonString(request))
|
.content(asJsonString(request))
|
||||||
.contentType(MediaType.APPLICATION_JSON));
|
.contentType(MediaType.APPLICATION_JSON));
|
||||||
|
|
||||||
@@ -70,10 +66,10 @@ class AuthControllerTest {
|
|||||||
@DisplayName("로그인 패스워드 인증 실패")
|
@DisplayName("로그인 패스워드 인증 실패")
|
||||||
void loginPasswordFail() throws Exception {
|
void loginPasswordFail() throws Exception {
|
||||||
// given
|
// given
|
||||||
LoginRequest request = new LoginRequest(USER_EMAIL, "qwe1234");
|
LoginRequest request = new LoginRequest("ticketing@gmail.com", "qwe1234");
|
||||||
|
|
||||||
// when
|
// when
|
||||||
ResultActions actions = mvc.perform(post(LOGIN_URL)
|
ResultActions actions = mvc.perform(post("/api/user/login")
|
||||||
.content(asJsonString(request))
|
.content(asJsonString(request))
|
||||||
.contentType(MediaType.APPLICATION_JSON));
|
.contentType(MediaType.APPLICATION_JSON));
|
||||||
|
|
||||||
@@ -82,6 +78,10 @@ class AuthControllerTest {
|
|||||||
.andExpect(status().isUnauthorized());
|
.andExpect(status().isUnauthorized());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private String asJsonString(Object object) throws JsonProcessingException {
|
||||||
|
return objectMapper.writeValueAsString(object);
|
||||||
|
}
|
||||||
|
|
||||||
@BeforeEach
|
@BeforeEach
|
||||||
void init() throws Exception {
|
void init() throws Exception {
|
||||||
mvc = MockMvcBuilders
|
mvc = MockMvcBuilders
|
||||||
@@ -89,9 +89,9 @@ class AuthControllerTest {
|
|||||||
.apply(springSecurity())
|
.apply(springSecurity())
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
SignUpRequest signUpRequest = new SignUpRequest("ticketing", USER_EMAIL, "qwe123", "010-1234-5678");
|
SignUpRequest signUpRequest = new SignUpRequest("ticketing", "ticketing@gmail.com", "qwe123", "010-2240-7920");
|
||||||
|
|
||||||
mvc.perform(post(REGISTER_URL)
|
mvc.perform(post("/api/user")
|
||||||
.content(asJsonString(signUpRequest))
|
.content(asJsonString(signUpRequest))
|
||||||
.contentType(MediaType.APPLICATION_JSON));
|
.contentType(MediaType.APPLICATION_JSON));
|
||||||
}
|
}
|
||||||
@@ -101,8 +101,4 @@ class AuthControllerTest {
|
|||||||
refreshRedisRepository.deleteAll();
|
refreshRedisRepository.deleteAll();
|
||||||
}
|
}
|
||||||
|
|
||||||
private String asJsonString(Object object) throws JsonProcessingException {
|
|
||||||
return objectMapper.writeValueAsString(object);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
@@ -4,7 +4,8 @@ import static org.assertj.core.api.Assertions.assertThat;
|
|||||||
import static org.assertj.core.api.Assertions.assertThatThrownBy;
|
import static org.assertj.core.api.Assertions.assertThatThrownBy;
|
||||||
import static org.junit.jupiter.api.Assertions.assertAll;
|
import static org.junit.jupiter.api.Assertions.assertAll;
|
||||||
|
|
||||||
import com.ticketing.server.global.exception.TicketingException;
|
import com.ticketing.server.global.exception.AlreadyDeletedException;
|
||||||
|
import com.ticketing.server.global.exception.PasswordMismatchException;
|
||||||
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
import com.ticketing.server.user.service.dto.ChangePasswordDTO;
|
||||||
import com.ticketing.server.user.service.dto.DeleteUserDTO;
|
import com.ticketing.server.user.service.dto.DeleteUserDTO;
|
||||||
import com.ticketing.server.user.service.dto.DeleteUserDtoTest;
|
import com.ticketing.server.user.service.dto.DeleteUserDtoTest;
|
||||||
@@ -44,7 +45,7 @@ class UserTest {
|
|||||||
// when
|
// when
|
||||||
// then
|
// then
|
||||||
assertThatThrownBy(() -> user.delete(deleteUser))
|
assertThatThrownBy(() -> user.delete(deleteUser))
|
||||||
.isInstanceOf(TicketingException.class);
|
.isInstanceOf(PasswordMismatchException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ParameterizedTest
|
@ParameterizedTest
|
||||||
@@ -59,8 +60,7 @@ class UserTest {
|
|||||||
|
|
||||||
// then
|
// then
|
||||||
assertThatThrownBy(() -> user.delete(deleteUserDto))
|
assertThatThrownBy(() -> user.delete(deleteUserDto))
|
||||||
.isInstanceOf(TicketingException.class);
|
.isInstanceOf(AlreadyDeletedException.class);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@ParameterizedTest
|
@ParameterizedTest
|
||||||
@@ -90,7 +90,7 @@ class UserTest {
|
|||||||
// when
|
// when
|
||||||
// then
|
// then
|
||||||
assertThatThrownBy(() -> user.changePassword(changePasswordDto))
|
assertThatThrownBy(() -> user.changePassword(changePasswordDto))
|
||||||
.isInstanceOf(TicketingException.class);
|
.isInstanceOf(PasswordMismatchException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|||||||
@@ -0,0 +1,31 @@
|
|||||||
|
package com.ticketing.server.user.domain.repository;
|
||||||
|
|
||||||
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
|
|
||||||
|
import com.ticketing.server.user.domain.User;
|
||||||
|
import com.ticketing.server.user.domain.UserGrade;
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.boot.test.context.SpringBootTest;
|
||||||
|
import org.springframework.transaction.annotation.Transactional;
|
||||||
|
|
||||||
|
@SpringBootTest
|
||||||
|
@Transactional
|
||||||
|
class UserRepositoryTest {
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
UserRepository userRepository;
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void 유저레포지토리테스트() {
|
||||||
|
// given
|
||||||
|
User user = new User("유저1", "email@gmail.com", "testPassword01", UserGrade.GUEST, "010-1234-5678");
|
||||||
|
|
||||||
|
// when
|
||||||
|
userRepository.save(user);
|
||||||
|
|
||||||
|
// then
|
||||||
|
assertThat(user).isNotNull();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -70,7 +70,7 @@ class AuthenticationServiceImplTest {
|
|||||||
when(jwtProperties.hasTokenStartsWith(refreshToken)).thenReturn(true);
|
when(jwtProperties.hasTokenStartsWith(refreshToken)).thenReturn(true);
|
||||||
|
|
||||||
// when
|
// when
|
||||||
TokenDto tokenDto = authenticationService.reissueTokenDto(refreshToken);
|
TokenDto tokenDto = authenticationService.reissueAccessToken(refreshToken);
|
||||||
|
|
||||||
// then
|
// then
|
||||||
assertAll(
|
assertAll(
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ import static org.junit.jupiter.api.Assertions.assertAll;
|
|||||||
import static org.mockito.ArgumentMatchers.any;
|
import static org.mockito.ArgumentMatchers.any;
|
||||||
import static org.mockito.Mockito.when;
|
import static org.mockito.Mockito.when;
|
||||||
|
|
||||||
import com.ticketing.server.global.exception.TicketingException;
|
import com.ticketing.server.global.exception.EmailNotFoundException;
|
||||||
import com.ticketing.server.user.domain.User;
|
import com.ticketing.server.user.domain.User;
|
||||||
import com.ticketing.server.user.domain.UserGrade;
|
import com.ticketing.server.user.domain.UserGrade;
|
||||||
import com.ticketing.server.user.domain.repository.UserRepository;
|
import com.ticketing.server.user.domain.repository.UserRepository;
|
||||||
@@ -54,7 +54,7 @@ class UserServiceImplTest {
|
|||||||
// when
|
// when
|
||||||
// then
|
// then
|
||||||
assertThatThrownBy(() -> userService.register(signUpDto))
|
assertThatThrownBy(() -> userService.register(signUpDto))
|
||||||
.isInstanceOf(TicketingException.class);
|
.isInstanceOf(IllegalArgumentException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -75,19 +75,19 @@ class UserServiceImplTest {
|
|||||||
@DisplayName("회원탈퇴 시 이메일이 존재하지 않을 경우")
|
@DisplayName("회원탈퇴 시 이메일이 존재하지 않을 경우")
|
||||||
void deleteFail() {
|
void deleteFail() {
|
||||||
// given
|
// given
|
||||||
when(userRepository.findByEmailAndIsDeletedFalse("ticketing@gmail.com")).thenReturn(Optional.empty());
|
when(userRepository.findByEmail("ticketing@gmail.com")).thenReturn(Optional.empty());
|
||||||
|
|
||||||
// when
|
// when
|
||||||
// then
|
// then
|
||||||
assertThatThrownBy(() -> userService.delete(deleteUserDto))
|
assertThatThrownBy(() -> userService.delete(deleteUserDto))
|
||||||
.isInstanceOf(TicketingException.class);
|
.isInstanceOf(EmailNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@DisplayName("회원탈퇴 성공했을 경우")
|
@DisplayName("회원탈퇴 성공했을 경우")
|
||||||
void deleteSuccess() {
|
void deleteSuccess() {
|
||||||
// given
|
// given
|
||||||
when(userRepository.findByEmailAndIsDeletedFalse("ticketing@gmail.com")).thenReturn(Optional.of(user));
|
when(userRepository.findByEmail("ticketing@gmail.com")).thenReturn(Optional.of(user));
|
||||||
|
|
||||||
// when
|
// when
|
||||||
User user = userService.delete(deleteUserDto);
|
User user = userService.delete(deleteUserDto);
|
||||||
@@ -108,7 +108,7 @@ class UserServiceImplTest {
|
|||||||
// when
|
// when
|
||||||
// then
|
// then
|
||||||
assertThatThrownBy(() -> userService.changePassword(changePasswordDto))
|
assertThatThrownBy(() -> userService.changePassword(changePasswordDto))
|
||||||
.isInstanceOf(TicketingException.class);
|
.isInstanceOf(EmailNotFoundException.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|||||||
@@ -1,3 +1,28 @@
|
|||||||
|
spring:
|
||||||
|
datasource:
|
||||||
|
url: jdbc:mysql://localhost:3306/ticketing_test?serverTimezone=Asia/Seoul&characterEncoding=UTF-8
|
||||||
|
username: ENC(LowN1n4w0Ep/DqLD8+q5Bq6AXM4b8e3V)
|
||||||
|
password: ENC(OMvGcpZLpggFTiGNkqNe66Zq/SmJXF6o)
|
||||||
|
driver-class-name: com.mysql.cj.jdbc.Driver
|
||||||
|
redis:
|
||||||
|
host: localhost
|
||||||
|
port: 6379
|
||||||
|
|
||||||
|
jpa:
|
||||||
|
properties:
|
||||||
|
hibernate:
|
||||||
|
show_sql: true
|
||||||
|
format_sql: true
|
||||||
|
hibernate:
|
||||||
|
ddl-auto: create
|
||||||
|
|
||||||
|
mvc:
|
||||||
|
pathmatch:
|
||||||
|
matching-strategy: ant_path_matcher
|
||||||
|
|
||||||
|
jasypt:
|
||||||
|
encryptor:
|
||||||
|
bean: jasyptStringEncryptor
|
||||||
|
|
||||||
jwt:
|
jwt:
|
||||||
access-header: Authorization
|
access-header: Authorization
|
||||||
@@ -6,3 +31,7 @@ jwt:
|
|||||||
secret-key: Zi1sYWItdGlja2V0aW5nLXByb2plY3Qtc3ByaW5nLWJvb3Qtc2VjdXJpdHktand0LXNlY3JldC1rZXktZi1sYWItdGlja2V0aW5nLXByb2plY3Qtc3ByaW5nLWJvb3Qtc2VjdXJpdHktand0LXNlY3JldC1rZXkK
|
secret-key: Zi1sYWItdGlja2V0aW5nLXByb2plY3Qtc3ByaW5nLWJvb3Qtc2VjdXJpdHktand0LXNlY3JldC1rZXktZi1sYWItdGlja2V0aW5nLXByb2plY3Qtc3ByaW5nLWJvb3Qtc2VjdXJpdHktand0LXNlY3JldC1rZXkK
|
||||||
access-token-validity-in-seconds: 60
|
access-token-validity-in-seconds: 60
|
||||||
refresh-token-validity-in-seconds: 259200
|
refresh-token-validity-in-seconds: 259200
|
||||||
|
|
||||||
|
tmdb:
|
||||||
|
api-key: 0d1503b6dcbfe1c514299b5564c649b8
|
||||||
|
read-access-token: eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiIwZDE1MDNiNmRjYmZlMWM1MTQyOTliNTU2NGM2NDliOCIsInN1YiI6IjYyOWYwODRlNzI2ZmIxMTA2NDA4MjI2NCIsInNjb3BlcyI6WyJhcGlfcmVhZCJdLCJ2ZXJzaW9uIjoxfQ.rs8KZea8QLyashILiggWFx2s46lgUtzo-xSWoDgE58A
|
||||||
|
|||||||
Reference in New Issue
Block a user