@@ -208,7 +208,7 @@ async fn test_device_auth_flow(cptestctx: &ControlPlaneTestContext) {
208
208
let token_id = tokens_unpriv_after[ 0 ] . id ;
209
209
210
210
// Priv user cannot delete unpriv's token through this endpoint by ID
211
- let token_url = format ! ( "/v1/me/device -tokens/{}" , token_id) ;
211
+ let token_url = format ! ( "/v1/me/access -tokens/{}" , token_id) ;
212
212
object_delete_error ( testctx, & token_url, StatusCode :: NOT_FOUND ) . await ;
213
213
214
214
// Test deleting the token as the owner
@@ -434,7 +434,7 @@ async fn test_device_token_expiration(cptestctx: &ControlPlaneTestContext) {
434
434
async fn get_tokens_priv (
435
435
testctx : & ClientTestContext ,
436
436
) -> Vec < views:: DeviceAccessToken > {
437
- NexusRequest :: object_get ( testctx, "/v1/me/device -tokens" )
437
+ NexusRequest :: object_get ( testctx, "/v1/me/access -tokens" )
438
438
. authn_as ( AuthnMode :: PrivilegedUser )
439
439
. execute_and_parse_unwrap :: < ResultsPage < views:: DeviceAccessToken > > ( )
440
440
. await
@@ -444,7 +444,7 @@ async fn get_tokens_priv(
444
444
async fn get_tokens_unpriv (
445
445
testctx : & ClientTestContext ,
446
446
) -> Vec < views:: DeviceAccessToken > {
447
- NexusRequest :: object_get ( testctx, "/v1/me/device -tokens" )
447
+ NexusRequest :: object_get ( testctx, "/v1/me/access -tokens" )
448
448
. authn_as ( AuthnMode :: UnprivilegedUser )
449
449
. execute_and_parse_unwrap :: < ResultsPage < views:: DeviceAccessToken > > ( )
450
450
. await
0 commit comments