File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed
app/credential-account/[token] Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -221,12 +221,10 @@ export default function CredentialAccountInvitePage() {
221221 label : 'Create an account' ,
222222 onClick : ( ) =>
223223 router . push ( `/signup?callbackUrl=${ callbackUrl } &invite_flow=true&new=true` ) ,
224- variant : 'outline' as const ,
225224 } ,
226225 {
227226 label : 'Return to Home' ,
228227 onClick : ( ) => router . push ( '/' ) ,
229- variant : 'ghost' as const ,
230228 } ,
231229 ] }
232230 />
@@ -260,7 +258,6 @@ export default function CredentialAccountInvitePage() {
260258 {
261259 label : 'Return to Home' ,
262260 onClick : ( ) => router . push ( '/' ) ,
263- variant : 'ghost' as const ,
264261 } ,
265262 ] }
266263 />
Original file line number Diff line number Diff line change @@ -351,7 +351,10 @@ describe('API key lifecycle', () => {
351351
352352 it ( 'should reject key if storage is tampered' , async ( ) => {
353353 const key = generateApiKey ( )
354- const tamperedStorage = `${ key . slice ( 0 , - 1 ) } X` // Change last character
354+ const lastChar = key . slice ( - 1 )
355+ // Ensure tampered character is different from original (handles edge case where key ends in 'X')
356+ const tamperedChar = lastChar === 'X' ? 'Y' : 'X'
357+ const tamperedStorage = `${ key . slice ( 0 , - 1 ) } ${ tamperedChar } `
355358 const result = await authenticateApiKey ( key , tamperedStorage )
356359 expectApiKeyInvalid ( result )
357360 } )
You can’t perform that action at this time.
0 commit comments