diff --git a/packages/cli/test/integration/passwordReset.api.test.ts b/packages/cli/test/integration/passwordReset.api.test.ts index 61a7c891f5..5140820b30 100644 --- a/packages/cli/test/integration/passwordReset.api.test.ts +++ b/packages/cli/test/integration/passwordReset.api.test.ts @@ -157,7 +157,7 @@ describe('GET /resolve-password-token', () => { }); test('should fail if user is not found', async () => { - const token = jwtService.signData({ sub: 'test' }); + const token = jwtService.signData({ sub: uuid() }); const response = await testServer.authlessAgent .get('/resolve-password-token') diff --git a/packages/cli/test/integration/publicApi/credentials.test.ts b/packages/cli/test/integration/publicApi/credentials.test.ts index 30ea0dbf2d..aa611d0d78 100644 --- a/packages/cli/test/integration/publicApi/credentials.test.ts +++ b/packages/cli/test/integration/publicApi/credentials.test.ts @@ -82,12 +82,10 @@ describe('POST /credentials', () => { }); test('should fail with invalid inputs', async () => { - await Promise.all( - INVALID_PAYLOADS.map(async (invalidPayload) => { - const response = await authOwnerAgent.post('/credentials').send(invalidPayload); - expect(response.statusCode === 400 || response.statusCode === 415).toBe(true); - }), - ); + for (const invalidPayload of INVALID_PAYLOADS) { + const response = await authOwnerAgent.post('/credentials').send(invalidPayload); + expect(response.statusCode === 400 || response.statusCode === 415).toBe(true); + } }); test('should fail with missing encryption key', async () => {