** What
- Allow auto-loaded Medusa files to export a config object.
- Currently supports isDisabled to control loading.
- new instance `FeatureFlag` exported by `@medusajs/framework/utils`
- `feature-flags` is now a supported folder for medusa projects, modules, providers and plugins. They will be loaded and added to `FeatureFlag`
** Why
- Enables conditional loading of routes, migrations, jobs, subscribers, workflows, and other files based on feature flags.
```ts
// /src/feature-flags
import { FlagSettings } from "@medusajs/framework/feature-flags"
const CustomFeatureFlag: FlagSettings = {
key: "custom_feature",
default_val: false,
env_key: "FF_MY_CUSTOM_FEATURE",
description: "Enable xyz",
}
export default CustomFeatureFlag
```
```ts
// /src/modules/my-custom-module/migration/Migration20250822135845.ts
import { FeatureFlag } from "@medusajs/framework/utils"
export class Migration20250822135845 extends Migration {
override async up(){ }
override async down(){ }
}
defineFileConfig({
isDisabled: () => !FeatureFlag.isFeatureEnabled("custom_feature")
})
```
127 lines
3.6 KiB
TypeScript
127 lines
3.6 KiB
TypeScript
import { medusaIntegrationTestRunner } from "@medusajs/test-utils"
|
|
import { IUserModuleService } from "@medusajs/types"
|
|
import { Modules } from "@medusajs/utils"
|
|
import { createAdminUser } from "../../../helpers/create-admin-user"
|
|
|
|
jest.setTimeout(50000)
|
|
|
|
const env = {}
|
|
const adminHeaders = {
|
|
headers: { "x-medusa-access-token": "test_token" },
|
|
}
|
|
|
|
medusaIntegrationTestRunner({
|
|
env,
|
|
testSuite: ({ dbConnection, getContainer, api }) => {
|
|
describe("GET /admin/invites/:id", () => {
|
|
let appContainer
|
|
let userModuleService: IUserModuleService
|
|
|
|
beforeAll(async () => {
|
|
appContainer = getContainer()
|
|
userModuleService = appContainer.resolve(Modules.USER)
|
|
})
|
|
|
|
beforeEach(async () => {
|
|
await createAdminUser(dbConnection, adminHeaders, appContainer)
|
|
})
|
|
|
|
it("should fail to accept an invite with an invalid invite token", async () => {
|
|
const authResponse = await api.post(`/auth/user/emailpass/register`, {
|
|
email: "potential_member@test.com",
|
|
password: "supersecret",
|
|
})
|
|
|
|
expect(authResponse.status).toEqual(200)
|
|
const token = authResponse.data.token
|
|
|
|
const acceptResponse = await api
|
|
.post(
|
|
`/admin/invites/accept?token=${"non-existing-token"}`,
|
|
{
|
|
first_name: "John",
|
|
},
|
|
{
|
|
headers: {
|
|
Authorization: `Bearer ${token}`,
|
|
},
|
|
}
|
|
)
|
|
.catch((e) => e)
|
|
|
|
expect(acceptResponse.response.status).toEqual(401)
|
|
expect(acceptResponse.response.data.message).toEqual("Unauthorized")
|
|
})
|
|
|
|
it("should accept an invite", async () => {
|
|
const invite = await userModuleService.createInvites({
|
|
email: "potential_member@test.com",
|
|
})
|
|
|
|
const authResponse = await api.post(`/auth/user/emailpass/register`, {
|
|
email: "potential_member@test.com",
|
|
password: "supersecret",
|
|
})
|
|
|
|
expect(authResponse.status).toEqual(200)
|
|
const token = authResponse.data.token
|
|
|
|
const acceptResponse = await api.post(
|
|
`/admin/invites/accept?token=${invite.token}`,
|
|
{
|
|
first_name: "John",
|
|
},
|
|
{
|
|
headers: {
|
|
Authorization: `Bearer ${token}`,
|
|
},
|
|
}
|
|
)
|
|
|
|
expect(acceptResponse.status).toEqual(200)
|
|
expect(acceptResponse.data.user).toEqual(
|
|
expect.objectContaining({
|
|
email: "potential_member@test.com",
|
|
first_name: "John",
|
|
})
|
|
)
|
|
})
|
|
|
|
it("should accept an invite with email different from invite", async () => {
|
|
const invite = await userModuleService.createInvites({
|
|
email: "potential_member@test.com",
|
|
})
|
|
|
|
const authResponse = await api.post(`/auth/user/emailpass/register`, {
|
|
email: "some-email@test.com",
|
|
password: "supersecret",
|
|
})
|
|
|
|
expect(authResponse.status).toEqual(200)
|
|
const token = authResponse.data.token
|
|
|
|
const acceptResponse = await api.post(
|
|
`/admin/invites/accept?token=${invite.token}`,
|
|
{
|
|
first_name: "John",
|
|
email: "some-email@test.com",
|
|
},
|
|
{
|
|
headers: {
|
|
Authorization: `Bearer ${token}`,
|
|
},
|
|
}
|
|
)
|
|
|
|
expect(acceptResponse.status).toEqual(200)
|
|
expect(acceptResponse.data.user).toEqual(
|
|
expect.objectContaining({
|
|
email: "some-email@test.com",
|
|
first_name: "John",
|
|
})
|
|
)
|
|
})
|
|
})
|
|
},
|
|
})
|