Skip to content

Commit 92e9baa

Browse files
authored
fix: update depreciated jest methods (#407)
1 parent 3b4f8a7 commit 92e9baa

File tree

5 files changed

+67
-71
lines changed

5 files changed

+67
-71
lines changed

src/partner-access/partner-access.service.spec.ts

+5-9
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ describe('PartnerAccessService', () => {
120120
);
121121

122122
await service.createPartnerAccess(createPartnerAccessDto, partnerId, partnerAdminId);
123-
expect(repoSpyCreateQueryBuilder).toBeCalledTimes(2);
123+
expect(repoSpyCreateQueryBuilder).toHaveBeenCalledTimes(2);
124124
repoSpyCreateQueryBuilder.mockRestore();
125125
});
126126
});
@@ -141,7 +141,7 @@ describe('PartnerAccessService', () => {
141141
activatedAt: partnerAccess.activatedAt, // need to just fudge this as it is test specific
142142
});
143143

144-
expect(crispApi.updateCrispProfileAccesses).toBeCalledWith(
144+
expect(crispApi.updateCrispProfileAccesses).toHaveBeenCalledWith(
145145
mockGetUserDto.user,
146146
[partnerAccess],
147147
[],
@@ -246,14 +246,10 @@ describe('PartnerAccessService', () => {
246246
}),
247247
}) as never,
248248
);
249-
await expect(service.getValidPartnerAccessCode('123456')).rejects.toThrowError(
250-
'CODE_EXPIRED',
251-
);
249+
await expect(service.getValidPartnerAccessCode('123456')).rejects.toThrow('CODE_EXPIRED');
252250
});
253251
it('when an partner access with too many letters is supplied, it should throw error', async () => {
254-
await expect(service.getValidPartnerAccessCode('1234567')).rejects.toThrowError(
255-
'INVALID_CODE',
256-
);
252+
await expect(service.getValidPartnerAccessCode('1234567')).rejects.toThrow('INVALID_CODE');
257253
});
258254
});
259255

@@ -295,7 +291,7 @@ describe('PartnerAccessService', () => {
295291
} as UpdatePartnerAccessDto);
296292
//if an access code exists then update it.
297293
expect(result).toEqual({ ...mockPartnerAccessEntity, therapySessionsRemaining: 10 });
298-
expect(partnerAccessRepositorySpy).toBeCalledTimes(1);
294+
expect(partnerAccessRepositorySpy).toHaveBeenCalled();
299295
});
300296
});
301297
});

src/partner-admin/partner-admin.service.spec.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ describe('PartnerAdminService', () => {
8181
const response = await service.createPartnerAdminUser(dto);
8282
expect(response).toHaveProperty('partnerId', dto.partnerId);
8383
expect(response).toHaveProperty('userId', mockUserEntity.id);
84-
expect(repoSpySave).toBeCalled();
84+
expect(repoSpySave).toHaveBeenCalled();
8585
});
8686
});
8787
it('when supplied with an email that already exists, it should throw', async () => {

src/partner-feature/partner-feature.service.spec.ts

+4-4
Original file line numberDiff line numberDiff line change
@@ -81,13 +81,13 @@ describe('PartnerFeatureService', () => {
8181
jest.spyOn(mockFeatureService, 'getFeature').mockImplementationOnce(() => {
8282
return undefined;
8383
});
84-
await expect(service.createPartnerFeature(createPartnerFeatureDto)).rejects.toThrowError();
84+
await expect(service.createPartnerFeature(createPartnerFeatureDto)).rejects.toThrow();
8585
});
8686
it('when supplied with incorrect partnerId should throw', async () => {
8787
jest.spyOn(mockPartnerService, 'getPartnerById').mockImplementationOnce(() => {
8888
return undefined;
8989
});
90-
await expect(service.createPartnerFeature(createPartnerFeatureDto)).rejects.toThrowError();
90+
await expect(service.createPartnerFeature(createPartnerFeatureDto)).rejects.toThrow();
9191
});
9292
});
9393
describe('getAutomaticAccessCodeFeatureForPartner', () => {
@@ -106,7 +106,7 @@ describe('PartnerFeatureService', () => {
106106
});
107107
it('when supplied with incorrect partner name, it should throw', async () => {
108108
jest.spyOn(mockPartnerService, 'getPartner').mockImplementationOnce(() => undefined);
109-
await expect(service.getAutomaticAccessCodeFeatureForPartner('Badoo')).rejects.toThrowError(
109+
await expect(service.getAutomaticAccessCodeFeatureForPartner('Badoo')).rejects.toThrow(
110110
'Unable to find partner with that name',
111111
);
112112
});
@@ -130,7 +130,7 @@ describe('PartnerFeatureService', () => {
130130

131131
await expect(
132132
service.updatePartnerFeature('partnerFeatureId', { active: false }),
133-
).rejects.toThrowError('Error unable to update');
133+
).rejects.toThrow('Error unable to update');
134134
});
135135
});
136136
});

src/user/user.service.spec.ts

+14-14
Original file line numberDiff line numberDiff line change
@@ -124,9 +124,9 @@ describe('UserService', () => {
124124
expect(user.user.email).toBe('[email protected]');
125125
expect(user.partnerAdmin).toBeUndefined();
126126
expect(user.partnerAccesses).toBe(undefined);
127-
expect(repoSpyCreate).toBeCalledWith(createUserRepositoryDto);
128-
expect(repoSpySave).toBeCalled();
129-
expect(addCrispProfile).toBeCalledWith({
127+
expect(repoSpyCreate).toHaveBeenCalledWith(createUserRepositoryDto);
128+
expect(repoSpySave).toHaveBeenCalled();
129+
expect(addCrispProfile).toHaveBeenCalledWith({
130130
email: user.user.email,
131131
person: { nickname: 'name' },
132132
segments: ['public'],
@@ -155,11 +155,11 @@ describe('UserService', () => {
155155
{ ...partnerAccessData, therapySessions: therapySession },
156156
]);
157157

158-
expect(repoSpyCreate).toBeCalledWith(createUserRepositoryDto);
159-
expect(partnerAccessSpy).toBeCalled();
160-
expect(repoSpySave).toBeCalled();
158+
expect(repoSpyCreate).toHaveBeenCalledWith(createUserRepositoryDto);
159+
expect(partnerAccessSpy).toHaveBeenCalled();
160+
expect(repoSpySave).toHaveBeenCalled();
161161

162-
expect(addCrispProfile).toBeCalledWith({
162+
expect(addCrispProfile).toHaveBeenCalledWith({
163163
email: user.user.email,
164164
person: { nickname: 'name' },
165165
segments: ['bumble'],
@@ -177,8 +177,8 @@ describe('UserService', () => {
177177
await expect(async () => {
178178
await service.createUser({ ...createUserDto, partnerAccessCode: '123456' });
179179
}).rejects.toThrow(PartnerAccessCodeStatusEnum.ALREADY_IN_USE);
180-
expect(userRepoSpy).toBeCalledTimes(0);
181-
expect(assignCodeSpy).toBeCalledTimes(0);
180+
expect(userRepoSpy).not.toHaveBeenCalled();
181+
expect(assignCodeSpy).not.toHaveBeenCalled();
182182
});
183183
// TODO - what do we want to happen here?
184184
it('when supplied with user dto and partner access that is incorrect, it should throw an error', async () => {
@@ -190,8 +190,8 @@ describe('UserService', () => {
190190
});
191191
await expect(
192192
service.createUser({ ...createUserDto, partnerAccessCode: 'incorrect code' }),
193-
).rejects.toThrowError('Access code invalid');
194-
expect(userRepoSpy).toBeCalledTimes(0);
193+
).rejects.toThrow('Access code invalid');
194+
expect(userRepoSpy).not.toHaveBeenCalled();
195195
});
196196

197197
it('when supplied with user dto and partnerId but no partner access code, it should return a user with partner access', async () => {
@@ -250,8 +250,8 @@ describe('UserService', () => {
250250
expect(user.contactPermission).toBe(true);
251251
expect(user.serviceEmailsPermission).toBe(false);
252252

253-
expect(repoSpySave).toBeCalledWith({ ...mockUserEntity, ...updateUserDto });
254-
expect(repoSpySave).toBeCalled();
253+
expect(repoSpySave).toHaveBeenCalledWith({ ...mockUserEntity, ...updateUserDto });
254+
expect(repoSpySave).toHaveBeenCalled();
255255
});
256256
});
257257

@@ -274,7 +274,7 @@ describe('UserService', () => {
274274
expect(user.name).not.toBe(mockUserEntity.name);
275275
expect(user.email).not.toBe(mockUserEntity.email);
276276

277-
expect(repoSpySave).toBeCalled();
277+
expect(repoSpySave).toHaveBeenCalled();
278278
});
279279
});
280280

0 commit comments

Comments
 (0)