@@ -327,8 +327,8 @@ public void testInvalidateNotValidAccessTokens() throws Exception {
327327 ResponseException .class ,
328328 () -> invalidateAccessToken (
329329 tokenService .prependVersionAndEncodeAccessToken (
330- TransportVersions .V_7_3_2 ,
331- tokenService .getRandomTokenBytes (TransportVersions .V_7_3_2 , randomBoolean ()).v1 ()
330+ TransportVersions .MINIMUM_COMPATIBLE ,
331+ tokenService .getRandomTokenBytes (TransportVersions .MINIMUM_COMPATIBLE , randomBoolean ()).v1 ()
332332 )
333333 )
334334 );
@@ -347,7 +347,7 @@ public void testInvalidateNotValidAccessTokens() throws Exception {
347347 byte [] longerAccessToken = new byte [randomIntBetween (17 , 24 )];
348348 random ().nextBytes (longerAccessToken );
349349 invalidateResponse = invalidateAccessToken (
350- tokenService .prependVersionAndEncodeAccessToken (TransportVersions .V_7_3_2 , longerAccessToken )
350+ tokenService .prependVersionAndEncodeAccessToken (TransportVersions .MINIMUM_COMPATIBLE , longerAccessToken )
351351 );
352352 assertThat (invalidateResponse .invalidated (), equalTo (0 ));
353353 assertThat (invalidateResponse .previouslyInvalidated (), equalTo (0 ));
@@ -365,7 +365,7 @@ public void testInvalidateNotValidAccessTokens() throws Exception {
365365 byte [] shorterAccessToken = new byte [randomIntBetween (12 , 15 )];
366366 random ().nextBytes (shorterAccessToken );
367367 invalidateResponse = invalidateAccessToken (
368- tokenService .prependVersionAndEncodeAccessToken (TransportVersions .V_7_3_2 , shorterAccessToken )
368+ tokenService .prependVersionAndEncodeAccessToken (TransportVersions .MINIMUM_COMPATIBLE , shorterAccessToken )
369369 );
370370 assertThat (invalidateResponse .invalidated (), equalTo (0 ));
371371 assertThat (invalidateResponse .previouslyInvalidated (), equalTo (0 ));
@@ -394,8 +394,8 @@ public void testInvalidateNotValidAccessTokens() throws Exception {
394394
395395 invalidateResponse = invalidateAccessToken (
396396 tokenService .prependVersionAndEncodeAccessToken (
397- TransportVersions .V_7_3_2 ,
398- tokenService .getRandomTokenBytes (TransportVersions .V_7_3_2 , randomBoolean ()).v1 ()
397+ TransportVersions .MINIMUM_COMPATIBLE ,
398+ tokenService .getRandomTokenBytes (TransportVersions .MINIMUM_COMPATIBLE , randomBoolean ()).v1 ()
399399 )
400400 );
401401 assertThat (invalidateResponse .invalidated (), equalTo (0 ));
@@ -420,8 +420,8 @@ public void testInvalidateNotValidRefreshTokens() throws Exception {
420420 ResponseException .class ,
421421 () -> invalidateRefreshToken (
422422 TokenService .prependVersionAndEncodeRefreshToken (
423- TransportVersions .V_7_3_2 ,
424- tokenService .getRandomTokenBytes (TransportVersions .V_7_3_2 , true ).v2 ()
423+ TransportVersions .MINIMUM_COMPATIBLE ,
424+ tokenService .getRandomTokenBytes (TransportVersions .MINIMUM_COMPATIBLE , true ).v2 ()
425425 )
426426 )
427427 );
@@ -441,7 +441,7 @@ public void testInvalidateNotValidRefreshTokens() throws Exception {
441441 byte [] longerRefreshToken = new byte [randomIntBetween (17 , 24 )];
442442 random ().nextBytes (longerRefreshToken );
443443 invalidateResponse = invalidateRefreshToken (
444- TokenService .prependVersionAndEncodeRefreshToken (TransportVersions .V_7_3_2 , longerRefreshToken )
444+ TokenService .prependVersionAndEncodeRefreshToken (TransportVersions .MINIMUM_COMPATIBLE , longerRefreshToken )
445445 );
446446 assertThat (invalidateResponse .invalidated (), equalTo (0 ));
447447 assertThat (invalidateResponse .previouslyInvalidated (), equalTo (0 ));
@@ -459,7 +459,7 @@ public void testInvalidateNotValidRefreshTokens() throws Exception {
459459 byte [] shorterRefreshToken = new byte [randomIntBetween (12 , 15 )];
460460 random ().nextBytes (shorterRefreshToken );
461461 invalidateResponse = invalidateRefreshToken (
462- TokenService .prependVersionAndEncodeRefreshToken (TransportVersions .V_7_3_2 , shorterRefreshToken )
462+ TokenService .prependVersionAndEncodeRefreshToken (TransportVersions .MINIMUM_COMPATIBLE , shorterRefreshToken )
463463 );
464464 assertThat (invalidateResponse .invalidated (), equalTo (0 ));
465465 assertThat (invalidateResponse .previouslyInvalidated (), equalTo (0 ));
@@ -488,8 +488,8 @@ public void testInvalidateNotValidRefreshTokens() throws Exception {
488488
489489 invalidateResponse = invalidateRefreshToken (
490490 TokenService .prependVersionAndEncodeRefreshToken (
491- TransportVersions .V_7_3_2 ,
492- tokenService .getRandomTokenBytes (TransportVersions .V_7_3_2 , true ).v2 ()
491+ TransportVersions .MINIMUM_COMPATIBLE ,
492+ tokenService .getRandomTokenBytes (TransportVersions .MINIMUM_COMPATIBLE , true ).v2 ()
493493 )
494494 );
495495 assertThat (invalidateResponse .invalidated (), equalTo (0 ));
@@ -758,18 +758,11 @@ public void testAuthenticateWithWrongToken() throws Exception {
758758 assertAuthenticateWithToken (response .accessToken (), TEST_USER_NAME );
759759 // Now attempt to authenticate with an invalid access token string
760760 assertUnauthorizedToken (randomAlphaOfLengthBetween (0 , 128 ));
761- // Now attempt to authenticate with an invalid access token with valid structure (pre 7.2 )
761+ // Now attempt to authenticate with an invalid access token with valid structure (after 8.0 pre 8.10 )
762762 assertUnauthorizedToken (
763763 tokenService .prependVersionAndEncodeAccessToken (
764- TransportVersions .V_7_1_0 ,
765- tokenService .getRandomTokenBytes (TransportVersions .V_7_1_0 , randomBoolean ()).v1 ()
766- )
767- );
768- // Now attempt to authenticate with an invalid access token with valid structure (after 7.2 pre 8.10)
769- assertUnauthorizedToken (
770- tokenService .prependVersionAndEncodeAccessToken (
771- TransportVersions .V_7_4_0 ,
772- tokenService .getRandomTokenBytes (TransportVersions .V_7_4_0 , randomBoolean ()).v1 ()
764+ TransportVersions .V_8_0_0 ,
765+ tokenService .getRandomTokenBytes (TransportVersions .V_8_0_0 , randomBoolean ()).v1 ()
773766 )
774767 );
775768 // Now attempt to authenticate with an invalid access token with valid structure (current version)
0 commit comments