Skip to content

Commit 96b3c98

Browse files
committed
Merge branch 'main' of github.com:rawilk/profile-filament-plugin
wip
2 parents cd39eac + 79bda01 commit 96b3c98

File tree

4 files changed

+26
-26
lines changed

4 files changed

+26
-26
lines changed

tests/Feature/Http/Middleware/RequiresSudoModeTest.php

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,13 @@
2525
});
2626

2727
it('redirects to a sudo mode challenge', function () {
28-
get('/requires-sudo')
29-
->assertRedirectToRoute('filament.admin.auth.sudo-challenge');
28+
get('/requires-sudo')
29+
->assertRedirectToRoute('filament.admin.auth.sudo-challenge');
3030

3131
Event::assertDispatched(SudoModeChallenged::class);
3232

3333
expect(session()->get('url.intended'))->toBe('https://acme.test/requires-sudo');
34-
});
34+
});
3535

3636
it('extends sudo mode if it is already active', function () {
3737
Sudo::activate();

tests/Feature/Http/Middleware/RequiresTwoFactorAuthenticationTest.php

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,13 @@
3838
});
3939

4040
it('redirects to the mfa challenge', function () {
41-
get('/requires-mfa')
42-
->assertRedirectToRoute('filament.admin.auth.mfa.challenge');
41+
get('/requires-mfa')
42+
->assertRedirectToRoute('filament.admin.auth.mfa.challenge');
4343

4444
Event::assertDispatched(TwoFactorAuthenticationChallenged::class);
4545

4646
expect(session()->get('url.intended'))->toBe('https://acme.test/requires-mfa');
47-
});
47+
});
4848

4949
it('does nothing for guests', function () {
5050
auth()->logout();

tests/Feature/Livewire/MfaOverviewTest.php

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -110,15 +110,15 @@
110110
});
111111

112112
it('shows how many keys a user has registered', function () {
113-
get('/_test')
114-
->assertElementExists('[data-test="webauthn-container"]', function (AssertElement $div) {
115-
$div
116-
->containsText(__('profile-filament::pages/security.mfa.method_configured'))
117-
->containsText('1 key')
118-
// keys are not shown initially
119-
->doesntContainText('my key');
120-
});
121-
})->skip('Skip until dom assertions dep is updated.');
113+
get('/_test')
114+
->assertElementExists('[data-test="webauthn-container"]', function (AssertElement $div) {
115+
$div
116+
->containsText(__('profile-filament::pages/security.mfa.method_configured'))
117+
->containsText('1 key')
118+
// keys are not shown initially
119+
->doesntContainText('my key');
120+
});
121+
})->skip('Skip until dom assertions dep is updated.');
122122

123123
it('does not show a badge if keys are not registered', function () {
124124
$this->user->webauthnKeys()->delete();
@@ -183,14 +183,14 @@
183183
});
184184

185185
it('shows how many apps are registered for a user', function () {
186-
get('/_test')
187-
->assertElementExists('[data-test="totp-container"]', function (AssertElement $div) {
188-
$div
189-
->containsText(__('profile-filament::pages/security.mfa.method_configured'))
190-
->containsText('1 app')
191-
->doesntContainText('my app');
192-
});
193-
})->skip('Skip until dom assertions dep is updated.');
186+
get('/_test')
187+
->assertElementExists('[data-test="totp-container"]', function (AssertElement $div) {
188+
$div
189+
->containsText(__('profile-filament::pages/security.mfa.method_configured'))
190+
->containsText('1 app')
191+
->doesntContainText('my app');
192+
});
193+
})->skip('Skip until dom assertions dep is updated.');
194194

195195
it('does not show a badge if no apps are registered', function () {
196196
$this->user->authenticatorApps()->delete();

tests/Feature/RoutesTest.php

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,10 +60,10 @@
6060
});
6161

6262
test('guests are not allowed to see this view', function () {
63-
get(route('filament.admin.auth.mfa.recovery-codes.print'))
64-
->assertRedirect('/admin/login');
63+
get(route('filament.admin.auth.mfa.recovery-codes.print'))
64+
->assertRedirect('/admin/login');
6565

6666
Event::assertNotDispatched(RecoveryCodesViewed::class);
6767
Event::assertNotDispatched(SudoModeChallenged::class);
68-
});
68+
});
6969
});

0 commit comments

Comments
 (0)