8
8
type SDKHeaderOverrideOptions ,
9
9
} from '../../../sdk/oauth2-flows' ;
10
10
11
- import {
12
- KindeSDKError , KindeSDKErrorCode
13
- } from '../../../sdk/exceptions' ;
11
+ import { KindeSDKError , KindeSDKErrorCode } from '../../../sdk/exceptions' ;
14
12
15
13
describe ( 'AuthorizationCode' , ( ) => {
16
14
const { sessionManager } = mocks ;
@@ -39,9 +37,7 @@ describe('AuthorizationCode', () => {
39
37
const client = new AuthorizationCode ( clientConfig , clientSecret ) ;
40
38
const authURL = await client . createAuthorizationURL ( sessionManager ) ;
41
39
const searchParams = new URLSearchParams ( authURL . search ) ;
42
- expect ( searchParams . get ( 'scope' ) ) . toBe (
43
- AuthorizationCode . DEFAULT_TOKEN_SCOPES
44
- ) ;
40
+ expect ( searchParams . get ( 'scope' ) ) . toBe ( AuthorizationCode . DEFAULT_TOKEN_SCOPES ) ;
45
41
} ) ;
46
42
47
43
it ( 'uses provided scope and audience if given in url options' , async ( ) => {
@@ -86,9 +82,7 @@ describe('AuthorizationCode', () => {
86
82
const searchParams = new URLSearchParams ( authURL . search ) ;
87
83
const state = searchParams . get ( 'state' ) ;
88
84
const stateKey = AuthorizationCode . STATE_KEY ;
89
- const storedState = ( await sessionManager . getSessionItem (
90
- stateKey
91
- ) ) as string ;
85
+ const storedState = ( await sessionManager . getSessionItem ( stateKey ) ) as string ;
92
86
expect ( storedState ) . toBe ( state ) ;
93
87
} ) ;
94
88
@@ -173,12 +167,8 @@ describe('AuthorizationCode', () => {
173
167
await client . handleRedirectFromAuthDomain ( sessionManager , callbackURL ) ;
174
168
expect ( mocks . fetchClient ) . toHaveBeenCalledTimes ( 1 ) ;
175
169
176
- const foundRefreshToken = await sessionManager . getSessionItem (
177
- 'refresh_token'
178
- ) ;
179
- const foundAccessToken = await sessionManager . getSessionItem (
180
- 'access_token'
181
- ) ;
170
+ const foundRefreshToken = await sessionManager . getSessionItem ( 'refresh_token' ) ;
171
+ const foundAccessToken = await sessionManager . getSessionItem ( 'access_token' ) ;
182
172
const foundIdToken = await sessionManager . getSessionItem ( 'id_token' ) ;
183
173
184
174
expect ( foundAccessToken ) . toBe ( mockAccessToken . token ) ;
@@ -195,10 +185,7 @@ describe('AuthorizationCode', () => {
195
185
196
186
it ( 'return an existing token if an unexpired token is available' , async ( ) => {
197
187
const mockAccessToken = mocks . getMockAccessToken ( clientConfig . authDomain ) ;
198
- await sessionManager . setSessionItem (
199
- 'access_token' ,
200
- mockAccessToken . token
201
- ) ;
188
+ await sessionManager . setSessionItem ( 'access_token' , mockAccessToken . token ) ;
202
189
const client = new AuthorizationCode ( clientConfig , clientSecret ) ;
203
190
const token = await client . getToken ( sessionManager ) ;
204
191
expect ( token ) . toBe ( mockAccessToken . token ) ;
@@ -217,10 +204,7 @@ describe('AuthorizationCode', () => {
217
204
clientConfig . authDomain ,
218
205
true
219
206
) ;
220
- await sessionManager . setSessionItem (
221
- 'access_token' ,
222
- mockAccessToken . token
223
- ) ;
207
+ await sessionManager . setSessionItem ( 'access_token' , mockAccessToken . token ) ;
224
208
await expect ( async ( ) => {
225
209
const client = new AuthorizationCode ( clientConfig , clientSecret ) ;
226
210
await client . getToken ( sessionManager ) ;
@@ -240,10 +224,7 @@ describe('AuthorizationCode', () => {
240
224
clientConfig . authDomain ,
241
225
true
242
226
) ;
243
- await sessionManager . setSessionItem (
244
- 'access_token' ,
245
- expiredAccessToken . token
246
- ) ;
227
+ await sessionManager . setSessionItem ( 'access_token' , expiredAccessToken . token ) ;
247
228
await sessionManager . setSessionItem ( 'refresh_token' , 'refresh_token' ) ;
248
229
249
230
await expect ( async ( ) => {
@@ -268,10 +249,7 @@ describe('AuthorizationCode', () => {
268
249
clientConfig . authDomain ,
269
250
true
270
251
) ;
271
- await sessionManager . setSessionItem (
272
- 'access_token' ,
273
- expiredAccessToken . token
274
- ) ;
252
+ await sessionManager . setSessionItem ( 'access_token' , expiredAccessToken . token ) ;
275
253
await sessionManager . setSessionItem ( 'refresh_token' , 'refresh_token' ) ;
276
254
277
255
const body = new URLSearchParams ( {
@@ -311,10 +289,7 @@ describe('AuthorizationCode', () => {
311
289
clientConfig . authDomain ,
312
290
true
313
291
) ;
314
- await sessionManager . setSessionItem (
315
- 'access_token' ,
316
- expiredAccessToken . token
317
- ) ;
292
+ await sessionManager . setSessionItem ( 'access_token' , expiredAccessToken . token ) ;
318
293
await sessionManager . setSessionItem ( 'refresh_token' , 'refresh_token' ) ;
319
294
320
295
const headerOverrides : SDKHeaderOverrideOptions = {
@@ -360,22 +335,15 @@ describe('AuthorizationCode', () => {
360
335
clientConfig . authDomain ,
361
336
true
362
337
) ;
363
- await sessionManager . setSessionItem (
364
- 'access_token' ,
365
- expiredAccessToken . token
366
- ) ;
338
+ await sessionManager . setSessionItem ( 'access_token' , expiredAccessToken . token ) ;
367
339
await sessionManager . setSessionItem ( 'refresh_token' , 'refresh_token' ) ;
368
340
369
341
const client = new AuthorizationCode ( clientConfig , clientSecret ) ;
370
342
await client . getToken ( sessionManager ) ;
371
343
expect ( mocks . fetchClient ) . toHaveBeenCalledTimes ( 1 ) ;
372
344
373
- const foundRefreshToken = await sessionManager . getSessionItem (
374
- 'refresh_token'
375
- ) ;
376
- const foundAccessToken = await sessionManager . getSessionItem (
377
- 'access_token'
378
- ) ;
345
+ const foundRefreshToken = await sessionManager . getSessionItem ( 'refresh_token' ) ;
346
+ const foundAccessToken = await sessionManager . getSessionItem ( 'access_token' ) ;
379
347
const foundIdToken = await sessionManager . getSessionItem ( 'id_token' ) ;
380
348
381
349
expect ( foundAccessToken ) . toBe ( newAccessToken . token ) ;
@@ -395,7 +363,8 @@ describe('AuthorizationCode', () => {
395
363
const getTokenFn = async ( ) => await client . getToken ( sessionManager ) ;
396
364
await expect ( getTokenFn ) . rejects . toBeInstanceOf ( KindeSDKError ) ;
397
365
await expect ( getTokenFn ) . rejects . toHaveProperty (
398
- 'errorCode' , KindeSDKErrorCode . FAILED_TOKENS_REFRESH_ATTEMPT
366
+ 'errorCode' ,
367
+ KindeSDKErrorCode . FAILED_TOKENS_REFRESH_ATTEMPT
399
368
) ;
400
369
} ) ;
401
370
} ) ;
@@ -408,10 +377,7 @@ describe('AuthorizationCode', () => {
408
377
409
378
it ( 'fetches user profile using the available access token' , async ( ) => {
410
379
const mockAccessToken = mocks . getMockAccessToken ( clientConfig . authDomain ) ;
411
- await sessionManager . setSessionItem (
412
- 'access_token' ,
413
- mockAccessToken . token
414
- ) ;
380
+ await sessionManager . setSessionItem ( 'access_token' , mockAccessToken . token ) ;
415
381
416
382
const headers = new Headers ( ) ;
417
383
headers . append ( 'Authorization' , `Bearer ${ mockAccessToken . token } ` ) ;
@@ -437,10 +403,7 @@ describe('AuthorizationCode', () => {
437
403
438
404
it ( 'commits fetched user details to memory store' , async ( ) => {
439
405
const mockAccessToken = mocks . getMockAccessToken ( clientConfig . authDomain ) ;
440
- await sessionManager . setSessionItem (
441
- 'access_token' ,
442
- mockAccessToken . token
443
- ) ;
406
+ await sessionManager . setSessionItem ( 'access_token' , mockAccessToken . token ) ;
444
407
const userDetails = {
445
408
family_name : 'family_name' ,
446
409
given_name : 'give_name' ,
@@ -456,9 +419,7 @@ describe('AuthorizationCode', () => {
456
419
const client = new AuthorizationCode ( clientConfig , clientSecret ) ;
457
420
await client . getUserProfile ( sessionManager ) ;
458
421
expect ( mocks . fetchClient ) . toHaveBeenCalledTimes ( 1 ) ;
459
- expect ( await sessionManager . getSessionItem ( 'user' ) ) . toStrictEqual (
460
- userDetails
461
- ) ;
422
+ expect ( await sessionManager . getSessionItem ( 'user' ) ) . toStrictEqual ( userDetails ) ;
462
423
} ) ;
463
424
} ) ;
464
425
} ) ;
0 commit comments