Skip to content

Commit 05cc62d

Browse files
committed
Function name fix
1 parent 01764fb commit 05cc62d

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

MSAL/test/integration/native_auth/end_to_end/sign_in/MSALNativeAuthSignInUserNameAndPasswordEndToEndTests.swift

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ final class MSALNativeAuthSignInUsernameAndPasswordEndToEndTests: MSALNativeAuth
8686
}
8787

8888
// User Case 1.2.4. Sign In - User signs in with account A, while data for account A already exists in SDK persistence
89-
func test_signInWithAccountSigned() async throws {
89+
func test_signInWithSameAccountSigned() async throws {
9090
guard let sut = initialisePublicClientApplication(), let username = retrieveUsernameForSignInUsernameAndPassword(), let password = await retrievePasswordForSignInUsername() else {
9191
XCTFail("Missing information")
9292
return
@@ -109,12 +109,12 @@ final class MSALNativeAuthSignInUsernameAndPasswordEndToEndTests: MSALNativeAuth
109109

110110
sut.signIn(username: username, password: password, correlationId: correlationId, delegate: signInDelegateSpy2)
111111

112-
XCTAssertTrue(signInDelegateSpy2.error!.description, "An account is already signed in.")
112+
XCTAssertEqual(signInDelegateSpy2.error!.description, "An account is already signed in.")
113113
}
114114

115115
// User Case 1.2.5. Sign In - User signs in with account B, while data for account A already exists in SDK persistence
116-
func test_signInWithAccountSigned() async throws {
117-
guard let sut = initialisePublicClientApplication(), let username = retrieveUsernameForSignInUsernameAndPassword(), let password = await retrievePasswordForSignInUsername() else {
116+
func test_signInWithDifferentAccountSigned() async throws {
117+
guard let sut = initialisePublicClientApplication(), let username = retrieveUsernameForSignInUsernameAndPassword(), let uesrname2 = retrieveUsernameForSignInCode(), let password = await retrievePasswordForSignInUsername() else {
118118
XCTFail("Missing information")
119119
return
120120
}
@@ -133,12 +133,10 @@ final class MSALNativeAuthSignInUsernameAndPasswordEndToEndTests: MSALNativeAuth
133133
// Now signed in the account again
134134
let signInExpectation2 = expectation(description: "signing in")
135135
let signInDelegateSpy2 = SignInPasswordStartDelegateSpy(expectation: signInExpectation2)
136-
137-
let uesrname2 = retrieveUsernameForSignInCode()
138136

139137
sut.signIn(username: uesrname2, password: password, correlationId: correlationId, delegate: signInDelegateSpy2)
140138

141-
XCTAssertTrue(signInDelegateSpy2.error!.description, "An account is already signed in.")
139+
XCTAssertEqual(signInDelegateSpy2.error!.description, "An account is already signed in.")
142140
}
143141

144142
/* User Case 1.2.6. Sign In - Ability to provide scope to control auth strength of the token

0 commit comments

Comments
 (0)