@@ -32,7 +32,11 @@ const expect = chai.expect;
32
32
33
33
const newUserUid = generateRandomString ( 20 ) ;
34
34
const nonexistentUid = generateRandomString ( 20 ) ;
35
- const sessionCookieUid = generateRandomString ( 20 ) ;
35
+ const sessionCookieUids = [
36
+ generateRandomString ( 20 ) ,
37
+ generateRandomString ( 20 ) ,
38
+ generateRandomString ( 20 ) ,
39
+ ] ;
36
40
const testPhoneNumber = '+11234567890' ;
37
41
const testPhoneNumber2 = '+16505550101' ;
38
42
const nonexistentPhoneNumber = '+18888888888' ;
@@ -329,7 +333,9 @@ describe('admin.auth', () => {
329
333
const expiresIn = 24 * 60 * 60 * 1000 ;
330
334
let payloadClaims : any ;
331
335
let currentIdToken : string ;
332
- const uid = sessionCookieUid ;
336
+ const uid = sessionCookieUids [ 0 ] ;
337
+ const uid2 = sessionCookieUids [ 1 ] ;
338
+ const uid3 = sessionCookieUids [ 2 ] ;
333
339
334
340
it ( 'creates a valid Firebase session cookie' , ( ) => {
335
341
return admin . auth ( ) . createCustomToken ( uid , { admin : true , groupId : '1234' } )
@@ -365,7 +371,7 @@ describe('admin.auth', () => {
365
371
366
372
it ( 'creates a revocable session cookie' , ( ) => {
367
373
let currentSessionCookie : string ;
368
- return admin . auth ( ) . createCustomToken ( uid )
374
+ return admin . auth ( ) . createCustomToken ( uid2 )
369
375
. then ( ( customToken ) => firebase . auth ( ) . signInWithCustomToken ( customToken ) )
370
376
. then ( ( { user} ) => user . getIdToken ( ) )
371
377
. then ( ( idToken ) => {
@@ -375,7 +381,7 @@ describe('admin.auth', () => {
375
381
. then ( ( sessionCookie ) => {
376
382
currentSessionCookie = sessionCookie ;
377
383
return new Promise ( ( resolve ) => setTimeout ( ( ) => resolve (
378
- admin . auth ( ) . revokeRefreshTokens ( uid ) ,
384
+ admin . auth ( ) . revokeRefreshTokens ( uid2 ) ,
379
385
) , 1000 ) ) ;
380
386
} )
381
387
. then ( ( ) => {
@@ -389,13 +395,13 @@ describe('admin.auth', () => {
389
395
} ) ;
390
396
391
397
it ( 'fails when called with a revoked ID token' , ( ) => {
392
- return admin . auth ( ) . createCustomToken ( uid , { admin : true , groupId : '1234' } )
398
+ return admin . auth ( ) . createCustomToken ( uid3 , { admin : true , groupId : '1234' } )
393
399
. then ( ( customToken ) => firebase . auth ( ) . signInWithCustomToken ( customToken ) )
394
400
. then ( ( { user} ) => user . getIdToken ( ) )
395
401
. then ( ( idToken ) => {
396
402
currentIdToken = idToken ;
397
403
return new Promise ( ( resolve ) => setTimeout ( ( ) => resolve (
398
- admin . auth ( ) . revokeRefreshTokens ( uid ) ,
404
+ admin . auth ( ) . revokeRefreshTokens ( uid3 ) ,
399
405
) , 1000 ) ) ;
400
406
} )
401
407
. then ( ( ) => {
@@ -407,7 +413,7 @@ describe('admin.auth', () => {
407
413
} ) ;
408
414
409
415
describe ( 'verifySessionCookie()' , ( ) => {
410
- const uid = sessionCookieUid ;
416
+ const uid = sessionCookieUids [ 0 ] ;
411
417
it ( 'fails when called with an invalid session cookie' , ( ) => {
412
418
return admin . auth ( ) . verifySessionCookie ( 'invalid-token' )
413
419
. should . eventually . be . rejected . and . have . property ( 'code' , 'auth/argument-error' ) ;
@@ -727,8 +733,8 @@ function cleanup() {
727
733
deletePhoneNumberUser ( nonexistentPhoneNumber ) ,
728
734
deletePhoneNumberUser ( updatedPhone ) ,
729
735
] ;
730
- // Delete user created for session cookie tests.
731
- uids . push ( sessionCookieUid ) ;
736
+ // Delete users created for session cookie tests.
737
+ sessionCookieUids . forEach ( ( uid ) => uids . push ( uid ) ) ;
732
738
// Delete list of users for testing listUsers.
733
739
uids . forEach ( ( uid ) => {
734
740
// Use safeDelete to avoid getting throttled.
0 commit comments