Skip to content

Commit 22dafc1

Browse files
committed
Formatting
1 parent 67b991c commit 22dafc1

File tree

2 files changed

+13
-7
lines changed

2 files changed

+13
-7
lines changed

packages-exp/auth-exp/src/platform_browser/popup_redirect.test.ts

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -251,16 +251,20 @@ describe('src/platform_browser/popup_redirect', () => {
251251
const manager = (await resolver._initialize(auth)) as AuthEventManager;
252252
sinon.stub(manager, 'onEvent').returns(true);
253253

254-
expect(() => onIframeMessage({
255-
type: 'authEvent',
256-
authEvent: null as unknown as AuthEvent,
257-
})).to.throw(FirebaseError, 'auth/invalid-auth-event');
254+
expect(() =>
255+
onIframeMessage({
256+
type: 'authEvent',
257+
authEvent: (null as unknown) as AuthEvent
258+
})
259+
).to.throw(FirebaseError, 'auth/invalid-auth-event');
258260
});
259261

260262
it('errors with invalid event if everything is null', async () => {
261263
const manager = (await resolver._initialize(auth)) as AuthEventManager;
262264
sinon.stub(manager, 'onEvent').returns(true);
263-
expect(() => onIframeMessage(null as unknown as GapiAuthEvent)).to.throw(FirebaseError, 'auth/invalid-auth-event');
265+
expect(() =>
266+
onIframeMessage((null as unknown) as GapiAuthEvent)
267+
).to.throw(FirebaseError, 'auth/invalid-auth-event');
264268
});
265269

266270
it('returns error to the iframe if the event was not handled', async () => {

packages-exp/auth-exp/src/platform_browser/popup_redirect.ts

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,8 +111,10 @@ class BrowserPopupRedirectResolver implements PopupRedirectResolver {
111111
const manager = new AuthEventManager(auth.name);
112112
iframe.register<GapiAuthEvent>(
113113
'authEvent',
114-
(iframeEvent: GapiAuthEvent|null) => {
115-
assert(iframeEvent?.authEvent, AuthErrorCode.INVALID_AUTH_EVENT, {appName: auth.name});
114+
(iframeEvent: GapiAuthEvent | null) => {
115+
assert(iframeEvent?.authEvent, AuthErrorCode.INVALID_AUTH_EVENT, {
116+
appName: auth.name
117+
});
116118
// TODO: Consider splitting redirect and popup events earlier on
117119

118120
const handled = manager.onEvent(iframeEvent.authEvent);

0 commit comments

Comments
 (0)