Files
medusa-store/integration-tests/api/__tests__/admin/analytics-config.js
David Preininger 2caff2efc7 feat(medusa): Authentication overhaul (#4064)
* implemented bearer auth

* changed naming strat

* changed session auth to not use jwt

* typo

* changed auth header prefix for admin api token auth

* fixed supporting functions to work with new session type

* removed database calls for bearer auth improving performance

* removed unused deps

* changed auth in tests

* added integration tests

* Accepted suggested change

Co-authored-by: Carlos R. L. Rodrigues <37986729+carlos-r-l-rodrigues@users.noreply.github.com>

* Typo

Co-authored-by: Oliver Windall Juhl <59018053+olivermrbl@users.noreply.github.com>

* more typos

Co-authored-by: Oliver Windall Juhl <59018053+olivermrbl@users.noreply.github.com>

* proper formatting

Co-authored-by: Oliver Windall Juhl <59018053+olivermrbl@users.noreply.github.com>

* removed endregion

Co-authored-by: Oliver Windall Juhl <59018053+olivermrbl@users.noreply.github.com>

* removed startregion

Co-authored-by: Oliver Windall Juhl <59018053+olivermrbl@users.noreply.github.com>

* fixed admin JWT integration test

* added more fixes to integration tests

* Update OAS

* Create fluffy-donkeys-hope.md

* created API reference for new auth

* implemented getToken in medusa-js

* Apply suggestions from code review

Co-authored-by: Shahed Nasser <shahednasser@gmail.com>

* Apply suggestions from code review

Co-authored-by: Shahed Nasser <shahednasser@gmail.com>

* deleted files which should be autogenerated

* Update fluffy-donkeys-hope.md

* JSDoc update

Co-authored-by: Oli Juhl <59018053+olivermrbl@users.noreply.github.com>

* added missing route exports

* implemented runtime domain safety in jwt token manager

* fixed jwt manager

* lint get-token files

* Update fluffy-donkeys-hope.md

* Revert "deleted files which should be autogenerated"

This reverts commit cd5e86623b822e6a6ac37322b952143ccc493df9.

* Revert "Apply suggestions from code review"

This reverts commit f02f07ce58fd9fcc2dfc80cadbb9df2665108d65.

* Revert "created API reference for new auth"

This reverts commit c9eafbb36453f5cf8047c79e94f470cb2d023c7d.

* renamed header for sending api access tokens

* medusa-js - changed apiKey header

---------

Co-authored-by: Oliver Windall Juhl <59018053+olivermrbl@users.noreply.github.com>
Co-authored-by: Carlos R. L. Rodrigues <37986729+carlos-r-l-rodrigues@users.noreply.github.com>
Co-authored-by: olivermrbl <oliver@mrbltech.com>
Co-authored-by: Shahed Nasser <shahednasser@gmail.com>
2023-09-25 13:57:44 -04:00

206 lines
5.1 KiB
JavaScript

const path = require("path")
const startServerWithEnvironment =
require("../../../environment-helpers/start-server-with-environment").default
const { useApi } = require("../../../environment-helpers/use-api")
const { useDb } = require("../../../environment-helpers/use-db")
const {
simpleAnalyticsConfigFactory,
} = require("../../../factories/simple-analytics-config-factory")
const adminSeeder = require("../../../helpers/admin-seeder")
const adminReqConfig = {
headers: {
"x-medusa-access-token": "test_token",
},
}
jest.setTimeout(30000)
describe("[MEDUSA_FF_ANALYTICS] /admin/analytics-config", () => {
let medusaProcess
let dbConnection
beforeAll(async () => {
const cwd = path.resolve(path.join(__dirname, "..", ".."))
const [process, connection] = await startServerWithEnvironment({
cwd,
env: { MEDUSA_FF_ANALYTICS: true },
})
dbConnection = connection
medusaProcess = process
})
afterAll(async () => {
const db = useDb()
await db.shutdown()
medusaProcess.kill()
})
describe("GET /admin/analytics-config", () => {
beforeEach(async () => {
await adminSeeder(dbConnection)
})
afterEach(async () => {
const db = useDb()
await db.teardown()
})
it("should retrieve config for logged in user if it exists", async () => {
// Create config
await simpleAnalyticsConfigFactory(dbConnection)
const api = useApi()
const response = await api.get(`/admin/analytics-configs`, adminReqConfig)
expect(response.data).toMatchSnapshot({
analytics_config: {
id: expect.any(String),
user_id: "admin_user",
opt_out: false,
anonymize: false,
created_at: expect.any(String),
updated_at: expect.any(String),
},
})
})
it("should return 404 if no config exists", async () => {
const api = useApi()
const err = await api
.get(`/admin/analytics-configs`, adminReqConfig)
.catch((err) => err)
expect(err).toBeTruthy()
expect(err.response.status).toEqual(404)
expect(err.response.data.message).toEqual(
"No analytics config found for user with id: admin_user"
)
})
})
describe("POST /admin/analytics-config", () => {
beforeEach(async () => {
await adminSeeder(dbConnection)
})
afterEach(async () => {
const db = useDb()
await db.teardown()
})
it("should create a new config for logged in user", async () => {
const api = useApi()
const response = await api
.post(
`/admin/analytics-configs`,
{
opt_out: true,
anonymize: true,
},
adminReqConfig
)
.catch((e) => console.log(e))
expect(response.data).toMatchSnapshot({
analytics_config: {
id: expect.any(String),
user_id: "admin_user",
opt_out: true,
anonymize: true,
created_at: expect.any(String),
updated_at: expect.any(String),
},
})
})
})
describe("POST /admin/analytics-config/update", () => {
beforeEach(async () => {
await adminSeeder(dbConnection)
})
afterEach(async () => {
const db = useDb()
await db.teardown()
})
it("should update the config of the logged in user", async () => {
// Create config
await simpleAnalyticsConfigFactory(dbConnection)
const api = useApi()
const response = await api.post(
`/admin/analytics-configs/update`,
{
opt_out: true,
},
adminReqConfig
)
expect(response.data).toMatchSnapshot({
analytics_config: {
id: expect.any(String),
user_id: "admin_user",
opt_out: true,
anonymize: false,
created_at: expect.any(String),
updated_at: expect.any(String),
},
})
})
it("should create a config for the user is no config exists", async () => {
const api = useApi()
const res = await api.post(
`/admin/analytics-configs/update`,
{
opt_out: true,
},
adminReqConfig
)
expect(res.data).toMatchSnapshot({
analytics_config: {
id: expect.any(String),
user_id: "admin_user",
opt_out: true,
anonymize: false,
created_at: expect.any(String),
updated_at: expect.any(String),
},
})
})
})
describe("DELETE /admin/analytics-config", () => {
beforeEach(async () => {
await adminSeeder(dbConnection)
})
afterEach(async () => {
const db = useDb()
await db.teardown()
})
it("should delete the config of the logged in user", async () => {
// Create config
await simpleAnalyticsConfigFactory(dbConnection)
const api = useApi()
const response = await api.delete(
`/admin/analytics-configs`,
adminReqConfig
)
expect(response.status).toEqual(200)
expect(response.data).toEqual({
user_id: "admin_user",
object: "analytics_config",
deleted: true,
})
})
})
})