diff --git a/apps/web/test/unit-tests/toasts/SetupEncryptionToast-test.tsx b/apps/web/test/unit-tests/toasts/SetupEncryptionToast-test.tsx index 6a589d32ef..c9e58c5921 100644 --- a/apps/web/test/unit-tests/toasts/SetupEncryptionToast-test.tsx +++ b/apps/web/test/unit-tests/toasts/SetupEncryptionToast-test.tsx @@ -120,7 +120,9 @@ describe("SetupEncryptionToast", () => { const crypto = client.getCrypto()!; - jest.spyOn(SecurityManager, "accessSecretStorage").mockImplementation(async (func = async (): Promise => {}) => func()); + jest.spyOn(SecurityManager, "accessSecretStorage").mockImplementation( + async (func = async (): Promise => {}) => func(), + ); // Given we throw when trying to load the backup decrption key mocked(crypto.loadSessionBackupPrivateKeyFromSecretStorage).mockRejectedValue( @@ -216,7 +218,9 @@ describe("SetupEncryptionToast", () => { }); it("should go to change recovery key when recovering fails inside loadSessionBackup...", async () => { - jest.spyOn(SecurityManager, "accessSecretStorage").mockImplementation(async (func = async (): Promise => {}) => func()); + jest.spyOn(SecurityManager, "accessSecretStorage").mockImplementation( + async (func = async (): Promise => {}) => func(), + ); jest.spyOn(DeviceListener.sharedInstance(), "keyStorageOutOfSyncNeedsCrossSigningReset").mockResolvedValue( true,