Skip to content

Commit 3363257

Browse files
committed
formatting
1 parent fb09304 commit 3363257

File tree

3 files changed

+14
-8
lines changed

3 files changed

+14
-8
lines changed

src/audit-logs/audit-logs.spec.ts

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -281,9 +281,9 @@ describe('AuditLogs', () => {
281281

282282
const workos = new WorkOS('invalid apikey');
283283

284-
await expect(
285-
workos.auditLogs.createExport(options),
286-
).rejects.toThrow(UnauthorizedException);
284+
await expect(workos.auditLogs.createExport(options)).rejects.toThrow(
285+
UnauthorizedException,
286+
);
287287
});
288288
});
289289
});

src/user-management/session.spec.ts

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,8 @@ describe('Session', () => {
104104
});
105105

106106
it('returns a successful response if the sessionData is valid', async () => {
107-
jest.mocked(jose.jwtVerify)
107+
jest
108+
.mocked(jose.jwtVerify)
108109
.mockResolvedValue({} as jose.JWTVerifyResult & jose.ResolvedKey);
109110

110111
const cookiePassword = 'alongcookiesecretmadefortestingsessions';
@@ -339,7 +340,8 @@ describe('Session', () => {
339340

340341
describe('getLogoutUrl', () => {
341342
it('returns a logout URL for the user', async () => {
342-
jest.mocked(jose.jwtVerify)
343+
jest
344+
.mocked(jose.jwtVerify)
343345
.mockResolvedValue({} as jose.JWTVerifyResult & jose.ResolvedKey);
344346

345347
const cookiePassword = 'alongcookiesecretmadefortestingsessions';

src/user-management/user-management.spec.ts

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -891,7 +891,9 @@ describe('UserManagement', () => {
891891
});
892892
beforeEach(() => {
893893
// Mock createRemoteJWKSet
894-
jest.mocked(jose.createRemoteJWKSet).mockImplementation(
894+
jest
895+
.mocked(jose.createRemoteJWKSet)
896+
.mockImplementation(
895897
(_url: URL, _options?: jose.RemoteJWKSetOptions) => {
896898
// This function simulates the token verification process
897899
const verifyFunction = (
@@ -1002,7 +1004,8 @@ describe('UserManagement', () => {
10021004
});
10031005

10041006
it('returns the JWT claims when provided a valid JWT', async () => {
1005-
jest.mocked(jose.jwtVerify)
1007+
jest
1008+
.mocked(jose.jwtVerify)
10061009
.mockResolvedValue({} as jose.JWTVerifyResult & jose.ResolvedKey);
10071010

10081011
const cookiePassword = 'alongcookiesecretmadefortestingsessions';
@@ -1043,7 +1046,8 @@ describe('UserManagement', () => {
10431046
});
10441047

10451048
it('returns the JWT claims when provided a valid JWT with multiple roles', async () => {
1046-
jest.mocked(jose.jwtVerify)
1049+
jest
1050+
.mocked(jose.jwtVerify)
10471051
.mockResolvedValue({} as jose.JWTVerifyResult & jose.ResolvedKey);
10481052

10491053
const cookiePassword = 'alongcookiesecretmadefortestingsessions';

0 commit comments

Comments
 (0)