diff --git a/control-plane/src/modules/auth/auth.test.ts b/control-plane/src/modules/auth/auth.test.ts index b246dcd1..7600c998 100644 --- a/control-plane/src/modules/auth/auth.test.ts +++ b/control-plane/src/modules/auth/auth.test.ts @@ -513,7 +513,7 @@ describe("extractCustomAuthState", () => { const result = await extractCustomAuthState("abc123", owner.clusterId); expect(result).toMatchObject({ - type: "customer-provided", + type: "custom", organizationId: owner.organizationId, clusterId: owner.clusterId, canAccess: expect.any(Function), @@ -529,7 +529,7 @@ describe("extractCustomAuthState", () => { }); }); - it("should throw if customer auth is not enabled for cluster", async () => { + it("should throw if custom auth is not enabled for cluster", async () => { owner = await createOwner({ enableCustomAuth: false, }); @@ -538,7 +538,7 @@ describe("extractCustomAuthState", () => { someAuthValue: "someValue", }); - await expect(extractCustomAuthState("abc123", owner.clusterId)).rejects.toThrow("Customer auth is not enabled for this cluster"); + await expect(extractCustomAuthState("abc123", owner.clusterId)).rejects.toThrow("Custom auth is not enabled for this cluster"); }); diff --git a/control-plane/src/modules/service-definitions.ts b/control-plane/src/modules/service-definitions.ts index 2d252153..ddffe640 100644 --- a/control-plane/src/modules/service-definitions.ts +++ b/control-plane/src/modules/service-definitions.ts @@ -412,7 +412,7 @@ export const validateServiceRegistration = ({ } // Checks for customer auth handler - const VERIFY_FUNCTION_NAME = "handleCustomerAuth"; + const VERIFY_FUNCTION_NAME = "handleCustomAuth"; const VERIFY_FUNCTION_SERVICE = "default"; if (service === VERIFY_FUNCTION_SERVICE && fn.name === VERIFY_FUNCTION_NAME) { if (!fn.schema) {