@@ -39,24 +39,19 @@ test.describe('machine-to-machine auth @machine', () => {
39
39
40
40
const app = express();
41
41
42
- app.use( async (req, res, next ) => {
43
- const secret = req.get('Authorization')?.split(' ')[1] || '' ;
42
+ app.get('/api/protected', async (req, res) => {
43
+ const secret = req.get('Authorization')?.split(' ')[1];
44
44
45
45
try {
46
- await clerkClient.m2mTokens.verifySecret({ secret });
47
- } catch (error) {
46
+ const m2mToken = await clerkClient.m2mTokens.verifySecret({ secret });
47
+ res.send('Protected response ' + m2mToken.id);
48
+ } catch {
48
49
res.status(401).send('Unauthorized');
49
- return;
50
50
}
51
-
52
- next();
53
- });
54
-
55
- app.get('/api/protected', (req, res) => {
56
- res.send('Protected response');
57
51
});
58
52
59
- ViteExpress.listen(app, process.env.PORT, () => console.log('Server started'));
53
+ const port = parseInt(process.env.PORT as string) || 3002;
54
+ ViteExpress.listen(app, port, () => console.log('Server started'));
60
55
` ,
61
56
)
62
57
. commit ( ) ;
@@ -154,7 +149,7 @@ test.describe('machine-to-machine auth @machine', () => {
154
149
} ,
155
150
} ) ;
156
151
expect ( res . status ( ) ) . toBe ( 200 ) ;
157
- expect ( await res . text ( ) ) . toBe ( 'Protected response' ) ;
152
+ expect ( await res . text ( ) ) . toBe ( 'Protected response ' + emailServerM2MToken . id ) ;
158
153
159
154
// Analytics server can access primary API server after adding scope
160
155
await u . services . clerk . machines . createScope ( analyticsServer . id , primaryApiServer . id ) ;
@@ -169,7 +164,7 @@ test.describe('machine-to-machine auth @machine', () => {
169
164
} ,
170
165
} ) ;
171
166
expect ( res2 . status ( ) ) . toBe ( 200 ) ;
172
- expect ( await res2 . text ( ) ) . toBe ( 'Protected response' ) ;
167
+ expect ( await res2 . text ( ) ) . toBe ( 'Protected response ' + m2mToken . id ) ;
173
168
await u . services . clerk . m2mTokens . revoke ( {
174
169
m2mTokenId : m2mToken . id ,
175
170
} ) ;
0 commit comments