@@ -40,7 +40,7 @@ describe('M2MToken', () => {
4040 ) ,
4141 ) ;
4242
43- const response = await apiClient . m2mTokens . create ( {
43+ const response = await apiClient . m2m . createToken ( {
4444 secondsUntilExpiration : 3600 ,
4545 } ) ;
4646
@@ -65,7 +65,7 @@ describe('M2MToken', () => {
6565 ) ,
6666 ) ;
6767
68- const response = await apiClient . m2mTokens . create ( {
68+ const response = await apiClient . m2m . createToken ( {
6969 machineSecretKey : 'ak_xxxxx' ,
7070 secondsUntilExpiration : 3600 ,
7171 } ) ;
@@ -102,7 +102,7 @@ describe('M2MToken', () => {
102102 ) ,
103103 ) ;
104104
105- const errResponse = await apiClient . m2mTokens . create ( ) . catch ( err => err ) ;
105+ const errResponse = await apiClient . m2m . createToken ( ) . catch ( err => err ) ;
106106
107107 expect ( errResponse . status ) . toBe ( 401 ) ;
108108 expect ( errResponse . errors [ 0 ] . code ) . toBe ( 'machine_secret_key_invalid' ) ;
@@ -143,7 +143,7 @@ describe('M2MToken', () => {
143143 ) ,
144144 ) ;
145145
146- const response = await apiClient . m2mTokens . revoke ( {
146+ const response = await apiClient . m2m . revokeToken ( {
147147 m2mTokenId : m2mId ,
148148 revocationReason : 'revoked by test' ,
149149 } ) ;
@@ -171,7 +171,7 @@ describe('M2MToken', () => {
171171 ) ,
172172 ) ;
173173
174- const response = await apiClient . m2mTokens . revoke ( {
174+ const response = await apiClient . m2m . revokeToken ( {
175175 m2mTokenId : m2mId ,
176176 revocationReason : 'revoked by test' ,
177177 } ) ;
@@ -195,8 +195,8 @@ describe('M2MToken', () => {
195195 ) ,
196196 ) ;
197197
198- const errResponse = await apiClient . m2mTokens
199- . revoke ( {
198+ const errResponse = await apiClient . m2m
199+ . revokeToken ( {
200200 m2mTokenId : m2mId ,
201201 revocationReason : 'revoked by test' ,
202202 } )
@@ -223,7 +223,7 @@ describe('M2MToken', () => {
223223 ) ,
224224 ) ;
225225
226- const response = await apiClient . m2mTokens . verifyToken ( {
226+ const response = await apiClient . m2m . verifyToken ( {
227227 token : m2mSecret ,
228228 } ) ;
229229
@@ -249,7 +249,7 @@ describe('M2MToken', () => {
249249 ) ,
250250 ) ;
251251
252- const response = await apiClient . m2mTokens . verifyToken ( {
252+ const response = await apiClient . m2m . verifyToken ( {
253253 token : m2mSecret ,
254254 } ) ;
255255
@@ -273,7 +273,7 @@ describe('M2MToken', () => {
273273 ) ,
274274 ) ;
275275
276- const errResponse = await apiClient . m2mTokens
276+ const errResponse = await apiClient . m2m
277277 . verifyToken ( {
278278 token : m2mSecret ,
279279 } )
@@ -282,81 +282,4 @@ describe('M2MToken', () => {
282282 expect ( errResponse . status ) . toBe ( 401 ) ;
283283 } ) ;
284284 } ) ;
285-
286- describe ( 'verifySecret (deprecated)' , ( ) => {
287- it ( 'verifies a m2m token using machine secret' , async ( ) => {
288- const apiClient = createBackendApiClient ( {
289- apiUrl : 'https://api.clerk.test' ,
290- machineSecretKey : 'ak_xxxxx' ,
291- } ) ;
292-
293- server . use (
294- http . post (
295- 'https://api.clerk.test/m2m_tokens/verify' ,
296- validateHeaders ( ( { request } ) => {
297- expect ( request . headers . get ( 'Authorization' ) ) . toBe ( 'Bearer ak_xxxxx' ) ;
298- return HttpResponse . json ( mockM2MToken ) ;
299- } ) ,
300- ) ,
301- ) ;
302-
303- const response = await apiClient . m2mTokens . verifySecret ( {
304- secret : m2mSecret ,
305- } ) ;
306-
307- expect ( response . id ) . toBe ( m2mId ) ;
308- expect ( response . token ) . toBe ( m2mSecret ) ;
309- expect ( response . scopes ) . toEqual ( [ 'mch_1xxxxx' , 'mch_2xxxxx' ] ) ;
310- expect ( response . claims ) . toEqual ( { foo : 'bar' } ) ;
311- } ) ;
312-
313- it ( 'verifies a m2m token using instance secret' , async ( ) => {
314- const apiClient = createBackendApiClient ( {
315- apiUrl : 'https://api.clerk.test' ,
316- secretKey : 'sk_xxxxx' ,
317- } ) ;
318-
319- server . use (
320- http . post (
321- 'https://api.clerk.test/m2m_tokens/verify' ,
322- validateHeaders ( ( { request } ) => {
323- expect ( request . headers . get ( 'Authorization' ) ) . toBe ( 'Bearer sk_xxxxx' ) ;
324- return HttpResponse . json ( mockM2MToken ) ;
325- } ) ,
326- ) ,
327- ) ;
328-
329- const response = await apiClient . m2mTokens . verifySecret ( {
330- secret : m2mSecret ,
331- } ) ;
332-
333- expect ( response . id ) . toBe ( m2mId ) ;
334- expect ( response . token ) . toBe ( m2mSecret ) ;
335- expect ( response . scopes ) . toEqual ( [ 'mch_1xxxxx' , 'mch_2xxxxx' ] ) ;
336- expect ( response . claims ) . toEqual ( { foo : 'bar' } ) ;
337- } ) ;
338-
339- it ( 'requires a machine secret or instance secret to verify a m2m token' , async ( ) => {
340- const apiClient = createBackendApiClient ( {
341- apiUrl : 'https://api.clerk.test' ,
342- } ) ;
343-
344- server . use (
345- http . post (
346- 'https://api.clerk.test/m2m_tokens/verify' ,
347- validateHeaders ( ( ) => {
348- return HttpResponse . json ( mockM2MToken ) ;
349- } ) ,
350- ) ,
351- ) ;
352-
353- const errResponse = await apiClient . m2mTokens
354- . verifySecret ( {
355- secret : m2mSecret ,
356- } )
357- . catch ( err => err ) ;
358-
359- expect ( errResponse . status ) . toBe ( 401 ) ;
360- } ) ;
361- } ) ;
362285} ) ;
0 commit comments