@@ -40,7 +40,7 @@ describe('M2MToken', () => {
40
40
) ,
41
41
) ;
42
42
43
- const response = await apiClient . m2mTokens . create ( {
43
+ const response = await apiClient . m2m . createToken ( {
44
44
secondsUntilExpiration : 3600 ,
45
45
} ) ;
46
46
@@ -65,7 +65,7 @@ describe('M2MToken', () => {
65
65
) ,
66
66
) ;
67
67
68
- const response = await apiClient . m2mTokens . create ( {
68
+ const response = await apiClient . m2m . createToken ( {
69
69
machineSecretKey : 'ak_xxxxx' ,
70
70
secondsUntilExpiration : 3600 ,
71
71
} ) ;
@@ -102,7 +102,7 @@ describe('M2MToken', () => {
102
102
) ,
103
103
) ;
104
104
105
- const errResponse = await apiClient . m2mTokens . create ( ) . catch ( err => err ) ;
105
+ const errResponse = await apiClient . m2m . createToken ( ) . catch ( err => err ) ;
106
106
107
107
expect ( errResponse . status ) . toBe ( 401 ) ;
108
108
expect ( errResponse . errors [ 0 ] . code ) . toBe ( 'machine_secret_key_invalid' ) ;
@@ -143,7 +143,7 @@ describe('M2MToken', () => {
143
143
) ,
144
144
) ;
145
145
146
- const response = await apiClient . m2mTokens . revoke ( {
146
+ const response = await apiClient . m2m . revokeToken ( {
147
147
m2mTokenId : m2mId ,
148
148
revocationReason : 'revoked by test' ,
149
149
} ) ;
@@ -171,7 +171,7 @@ describe('M2MToken', () => {
171
171
) ,
172
172
) ;
173
173
174
- const response = await apiClient . m2mTokens . revoke ( {
174
+ const response = await apiClient . m2m . revokeToken ( {
175
175
m2mTokenId : m2mId ,
176
176
revocationReason : 'revoked by test' ,
177
177
} ) ;
@@ -195,8 +195,8 @@ describe('M2MToken', () => {
195
195
) ,
196
196
) ;
197
197
198
- const errResponse = await apiClient . m2mTokens
199
- . revoke ( {
198
+ const errResponse = await apiClient . m2m
199
+ . revokeToken ( {
200
200
m2mTokenId : m2mId ,
201
201
revocationReason : 'revoked by test' ,
202
202
} )
@@ -223,7 +223,7 @@ describe('M2MToken', () => {
223
223
) ,
224
224
) ;
225
225
226
- const response = await apiClient . m2mTokens . verifyToken ( {
226
+ const response = await apiClient . m2m . verifyToken ( {
227
227
token : m2mSecret ,
228
228
} ) ;
229
229
@@ -249,7 +249,7 @@ describe('M2MToken', () => {
249
249
) ,
250
250
) ;
251
251
252
- const response = await apiClient . m2mTokens . verifyToken ( {
252
+ const response = await apiClient . m2m . verifyToken ( {
253
253
token : m2mSecret ,
254
254
} ) ;
255
255
@@ -273,7 +273,7 @@ describe('M2MToken', () => {
273
273
) ,
274
274
) ;
275
275
276
- const errResponse = await apiClient . m2mTokens
276
+ const errResponse = await apiClient . m2m
277
277
. verifyToken ( {
278
278
token : m2mSecret ,
279
279
} )
@@ -282,81 +282,4 @@ describe('M2MToken', () => {
282
282
expect ( errResponse . status ) . toBe ( 401 ) ;
283
283
} ) ;
284
284
} ) ;
285
-
286
- describe ( 'verifySecret (deprecated)' , ( ) => {
287
- it ( 'verifies a m2m token using machine secret' , async ( ) => {
288
- const apiClient = createBackendApiClient ( {
289
- apiUrl : 'https://api.clerk.test' ,
290
- machineSecretKey : 'ak_xxxxx' ,
291
- } ) ;
292
-
293
- server . use (
294
- http . post (
295
- 'https://api.clerk.test/m2m_tokens/verify' ,
296
- validateHeaders ( ( { request } ) => {
297
- expect ( request . headers . get ( 'Authorization' ) ) . toBe ( 'Bearer ak_xxxxx' ) ;
298
- return HttpResponse . json ( mockM2MToken ) ;
299
- } ) ,
300
- ) ,
301
- ) ;
302
-
303
- const response = await apiClient . m2mTokens . verifySecret ( {
304
- secret : m2mSecret ,
305
- } ) ;
306
-
307
- expect ( response . id ) . toBe ( m2mId ) ;
308
- expect ( response . token ) . toBe ( m2mSecret ) ;
309
- expect ( response . scopes ) . toEqual ( [ 'mch_1xxxxx' , 'mch_2xxxxx' ] ) ;
310
- expect ( response . claims ) . toEqual ( { foo : 'bar' } ) ;
311
- } ) ;
312
-
313
- it ( 'verifies a m2m token using instance secret' , async ( ) => {
314
- const apiClient = createBackendApiClient ( {
315
- apiUrl : 'https://api.clerk.test' ,
316
- secretKey : 'sk_xxxxx' ,
317
- } ) ;
318
-
319
- server . use (
320
- http . post (
321
- 'https://api.clerk.test/m2m_tokens/verify' ,
322
- validateHeaders ( ( { request } ) => {
323
- expect ( request . headers . get ( 'Authorization' ) ) . toBe ( 'Bearer sk_xxxxx' ) ;
324
- return HttpResponse . json ( mockM2MToken ) ;
325
- } ) ,
326
- ) ,
327
- ) ;
328
-
329
- const response = await apiClient . m2mTokens . verifySecret ( {
330
- secret : m2mSecret ,
331
- } ) ;
332
-
333
- expect ( response . id ) . toBe ( m2mId ) ;
334
- expect ( response . token ) . toBe ( m2mSecret ) ;
335
- expect ( response . scopes ) . toEqual ( [ 'mch_1xxxxx' , 'mch_2xxxxx' ] ) ;
336
- expect ( response . claims ) . toEqual ( { foo : 'bar' } ) ;
337
- } ) ;
338
-
339
- it ( 'requires a machine secret or instance secret to verify a m2m token' , async ( ) => {
340
- const apiClient = createBackendApiClient ( {
341
- apiUrl : 'https://api.clerk.test' ,
342
- } ) ;
343
-
344
- server . use (
345
- http . post (
346
- 'https://api.clerk.test/m2m_tokens/verify' ,
347
- validateHeaders ( ( ) => {
348
- return HttpResponse . json ( mockM2MToken ) ;
349
- } ) ,
350
- ) ,
351
- ) ;
352
-
353
- const errResponse = await apiClient . m2mTokens
354
- . verifySecret ( {
355
- secret : m2mSecret ,
356
- } )
357
- . catch ( err => err ) ;
358
-
359
- expect ( errResponse . status ) . toBe ( 401 ) ;
360
- } ) ;
361
- } ) ;
362
285
} ) ;
0 commit comments