diff --git a/tests/resolvers/Query/getVolunteerRanks.spec.ts b/tests/resolvers/Query/getVolunteerRanks.spec.ts index c558bc4091..8b47e114d2 100644 --- a/tests/resolvers/Query/getVolunteerRanks.spec.ts +++ b/tests/resolvers/Query/getVolunteerRanks.spec.ts @@ -78,7 +78,7 @@ describe("resolvers -> Query -> getVolunteerRanks", () => { {}, )) as unknown as VolunteerRank[]; - expect(volunteerRanks[0].hoursVolunteered).toEqual(6); + expect(volunteerRanks[0].hoursVolunteered).toEqual(2); expect(volunteerRanks[0].user._id).toEqual(testUser1?._id); expect(volunteerRanks[0].rank).toEqual(1); }); diff --git a/tests/resolvers/Query/verifyRole.spec.ts b/tests/resolvers/Query/verifyRole.spec.ts index 375b37055a..4bcb5197c4 100644 --- a/tests/resolvers/Query/verifyRole.spec.ts +++ b/tests/resolvers/Query/verifyRole.spec.ts @@ -39,7 +39,7 @@ describe("verifyRole", () => { } }); test("should handle token without 'Bearer' prefix correctly", async () => { - const req = { headers: { authorization: "validToken" } }; + const req = { headers: { authorization: `${token}` } }; if (verifyRole !== undefined) { vi.spyOn(jwt, "verify").mockImplementationOnce(() => { @@ -228,13 +228,13 @@ describe("verifyRole", () => { }); test("should handle missing ACCESS_TOKEN_SECRET", async () => { - delete process.env.ACCESS_TOKEN_SECRET; + process.env.ACCESS_TOKEN_SECRET = undefined; if (verifyRole !== undefined) { const result = await verifyRole({}, {}, { req }); expect(result).toEqual({ role: "", isAuthorized: false, - error: "Authentication failed", + error: "Invalid token", }); // Restore ACCESS_TOKEN_SECRET process.env.ACCESS_TOKEN_SECRET = "test_secret";