Skip to content

Commit e3bd79f

Browse files
committed
test: refactor import
1 parent 0b10e58 commit e3bd79f

File tree

1 file changed

+1
-8
lines changed

1 file changed

+1
-8
lines changed

src/lib/__tests__/auth.test.ts

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
import crypto from "crypto";
22
import { afterEach, beforeEach, describe, expect, it, vi } from "vitest";
33
import type { OidcTokenData } from "../auth";
4+
import { clearOidcProviderToken, getOidcProviderAccessToken } from "../auth";
45

56
// Mock next/headers
67
const mockCookies = vi.hoisted(() => ({
@@ -100,7 +101,6 @@ describe("auth.ts", () => {
100101
it("should return null when cookie is not present", async () => {
101102
mockCookies.get.mockReturnValue(undefined);
102103

103-
const { getOidcProviderAccessToken } = await import("../auth");
104104
const token = await getOidcProviderAccessToken("user-123");
105105

106106
expect(token).toBeNull();
@@ -110,7 +110,6 @@ describe("auth.ts", () => {
110110
it("should return null when cookie value is empty", async () => {
111111
mockCookies.get.mockReturnValue({ value: "" });
112112

113-
const { getOidcProviderAccessToken } = await import("../auth");
114113
const token = await getOidcProviderAccessToken("user-123");
115114

116115
expect(token).toBeNull();
@@ -128,7 +127,6 @@ describe("auth.ts", () => {
128127
);
129128
mockCookies.get.mockReturnValue({ value: encryptedPayload });
130129

131-
const { getOidcProviderAccessToken } = await import("../auth");
132130
const token = await getOidcProviderAccessToken("user-123");
133131

134132
expect(token).toBeNull();
@@ -145,7 +143,6 @@ describe("auth.ts", () => {
145143
const encryptedPayload = encryptTestData(JSON.stringify(tokenData));
146144
mockCookies.get.mockReturnValue({ value: encryptedPayload });
147145

148-
const { getOidcProviderAccessToken } = await import("../auth");
149146
const token = await getOidcProviderAccessToken("user-123");
150147

151148
expect(token).toBeNull();
@@ -161,7 +158,6 @@ describe("auth.ts", () => {
161158
const encryptedPayload = encryptTestData(JSON.stringify(tokenData));
162159
mockCookies.get.mockReturnValue({ value: encryptedPayload });
163160

164-
const { getOidcProviderAccessToken } = await import("../auth");
165161
const token = await getOidcProviderAccessToken("user-123");
166162

167163
expect(token).toBe("valid-access-token-123");
@@ -177,7 +173,6 @@ describe("auth.ts", () => {
177173
const encryptedPayload = encryptTestData(JSON.stringify(invalidData));
178174
mockCookies.get.mockReturnValue({ value: encryptedPayload });
179175

180-
const { getOidcProviderAccessToken } = await import("../auth");
181176
const token = await getOidcProviderAccessToken("user-123");
182177

183178
expect(token).toBeNull();
@@ -190,7 +185,6 @@ describe("auth.ts", () => {
190185
it("should handle decryption errors gracefully", async () => {
191186
mockCookies.get.mockReturnValue({ value: "invalid-encrypted-data" });
192187

193-
const { getOidcProviderAccessToken } = await import("../auth");
194188
const token = await getOidcProviderAccessToken("user-123");
195189

196190
expect(token).toBeNull();
@@ -203,7 +197,6 @@ describe("auth.ts", () => {
203197

204198
describe("clearOidcProviderToken", () => {
205199
it("should delete the oidc_token cookie", async () => {
206-
const { clearOidcProviderToken } = await import("../auth");
207200
await clearOidcProviderToken();
208201

209202
expect(mockCookies.delete).toHaveBeenCalledWith("oidc_token");

0 commit comments

Comments
 (0)