Skip to content

Commit 268c92b

Browse files
committed
simplify test
1 parent 45a490d commit 268c92b

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

integration/tests/machine-auth/m2m.test.ts

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -33,26 +33,26 @@ test.describe('machine-to-machine auth @machine', () => {
3333
'src/server/main.ts',
3434
() => `
3535
import 'dotenv/config';
36-
import { clerkMiddleware, getAuth } from '@clerk/express';
36+
import { clerkClient } from '@clerk/express';
3737
import express from 'express';
3838
import ViteExpress from 'vite-express';
3939
4040
const app = express();
4141
42-
app.use(
43-
clerkMiddleware({
44-
publishableKey: process.env.VITE_CLERK_PUBLISHABLE_KEY,
45-
machineSecretKey: process.env.CLERK_MACHINE_SECRET_KEY,
46-
}),
47-
);
48-
49-
app.get('/api/protected', (req, res) => {
50-
const { machineId } = getAuth(req, { acceptsToken: 'm2m_token' });
51-
if (!machineId) {
42+
app.use(async (req, res, next) => {
43+
const secret = req.get('Authorization')?.split(' ')[1] || '';
44+
45+
try {
46+
await clerkClient.m2mTokens.verifySecret({ secret });
47+
} catch (error) {
5248
res.status(401).send('Unauthorized');
5349
return;
5450
}
5551
52+
next();
53+
});
54+
55+
app.get('/api/protected', (req, res) => {
5656
res.send('Protected response');
5757
});
5858
@@ -70,41 +70,41 @@ test.describe('machine-to-machine auth @machine', () => {
7070
await app.withEnv(env);
7171
await app.dev();
7272

73-
const u = createTestUtils({ app });
74-
7573
// Email server can access primary API server
76-
emailServer = await u.services.clerk.machines.create({
74+
emailServer = await client.machines.create({
7775
name: `${fakeCompanyName} Email Server`,
7876
scopedMachines: [primaryApiServer.id],
7977
});
80-
emailServerM2MToken = await u.services.clerk.m2mTokens.create({
78+
emailServerM2MToken = await client.m2mTokens.create({
8179
machineSecretKey: emailServer.secretKey,
8280
secondsUntilExpiration: 60 * 30,
8381
});
8482

8583
// Analytics server cannot access primary API server
86-
analyticsServer = await u.services.clerk.machines.create({
84+
analyticsServer = await client.machines.create({
8785
name: `${fakeCompanyName} Analytics Server`,
8886
// No scoped machines
8987
});
90-
analyticsServerM2MToken = await u.services.clerk.m2mTokens.create({
88+
analyticsServerM2MToken = await client.m2mTokens.create({
9189
machineSecretKey: analyticsServer.secretKey,
9290
secondsUntilExpiration: 60 * 30,
9391
});
9492
});
9593

9694
test.afterAll(async () => {
97-
const u = createTestUtils({ app });
95+
const client = createClerkClient({
96+
secretKey: instanceKeys.get('with-api-keys').sk,
97+
});
9898

99-
await u.services.clerk.m2mTokens.revoke({
99+
await client.m2mTokens.revoke({
100100
m2mTokenId: emailServerM2MToken.id,
101101
});
102-
await u.services.clerk.m2mTokens.revoke({
102+
await client.m2mTokens.revoke({
103103
m2mTokenId: analyticsServerM2MToken.id,
104104
});
105-
await u.services.clerk.machines.delete(emailServer.id);
106-
await u.services.clerk.machines.delete(primaryApiServer.id);
107-
await u.services.clerk.machines.delete(analyticsServer.id);
105+
await client.machines.delete(emailServer.id);
106+
await client.machines.delete(primaryApiServer.id);
107+
await client.machines.delete(analyticsServer.id);
108108

109109
await app.teardown();
110110
});

0 commit comments

Comments
 (0)