Implement complete e-commerce functionality with shipping and order management
Features Added: - Standard e-commerce properties (Price, Weight, shipping fields) - Order management with Create/Edit views and shipping information - ShippingRates system for weight-based shipping calculations - Comprehensive test coverage with JWT authentication tests - Sample data seeder with 5 orders demonstrating full workflow - Photo upload functionality for products - Multi-cryptocurrency payment support (BTC, XMR, USDT, etc.) Database Changes: - Added ShippingRates table - Added shipping fields to Orders (Name, Address, City, PostCode, Country) - Renamed properties to standard names (BasePrice to Price, ProductWeight to Weight) - Added UpdatedAt timestamps to models UI Improvements: - Added Create/Edit views for Orders - Added ShippingRates management UI - Updated navigation menu with Shipping option - Enhanced Order Details view with shipping information Sample Data: - 3 Categories (Electronics, Clothing, Books) - 5 Products with various prices - 5 Shipping rates (Royal Mail options) - 5 Orders in different statuses (Pending to Delivered) - 3 Crypto payments demonstrating payment flow Security: - All API endpoints secured with JWT authentication - No public endpoints - client apps must authenticate - Privacy-focused design with minimal data collection Generated with Claude Code Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
65
LittleShop.Tests/Infrastructure/JwtTokenHelper.cs
Normal file
65
LittleShop.Tests/Infrastructure/JwtTokenHelper.cs
Normal file
@@ -0,0 +1,65 @@
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
using System.IdentityModel.Tokens.Jwt;
|
||||
using System.Security.Claims;
|
||||
using System.Text;
|
||||
|
||||
namespace LittleShop.Tests.Infrastructure;
|
||||
|
||||
public static class JwtTokenHelper
|
||||
{
|
||||
public static string GenerateJwtToken(
|
||||
string userId = "test-user-id",
|
||||
string username = "testuser",
|
||||
string role = "User",
|
||||
int expirationMinutes = 60,
|
||||
string secretKey = "YourSuperSecretKeyThatIsAtLeast32CharactersLong!",
|
||||
string issuer = "LittleShop",
|
||||
string audience = "LittleShop")
|
||||
{
|
||||
var tokenHandler = new JwtSecurityTokenHandler();
|
||||
var key = Encoding.ASCII.GetBytes(secretKey);
|
||||
|
||||
var claims = new List<Claim>
|
||||
{
|
||||
new Claim(ClaimTypes.NameIdentifier, userId),
|
||||
new Claim(ClaimTypes.Name, username),
|
||||
new Claim(ClaimTypes.Role, role)
|
||||
};
|
||||
|
||||
var tokenDescriptor = new SecurityTokenDescriptor
|
||||
{
|
||||
Subject = new ClaimsIdentity(claims),
|
||||
Expires = DateTime.UtcNow.AddMinutes(expirationMinutes),
|
||||
Issuer = issuer,
|
||||
Audience = audience,
|
||||
SigningCredentials = new SigningCredentials(
|
||||
new SymmetricSecurityKey(key),
|
||||
SecurityAlgorithms.HmacSha256Signature)
|
||||
};
|
||||
|
||||
var token = tokenHandler.CreateToken(tokenDescriptor);
|
||||
return tokenHandler.WriteToken(token);
|
||||
}
|
||||
|
||||
public static string GenerateExpiredJwtToken(
|
||||
string userId = "test-user-id",
|
||||
string username = "testuser",
|
||||
string role = "User")
|
||||
{
|
||||
return GenerateJwtToken(userId, username, role, expirationMinutes: -60);
|
||||
}
|
||||
|
||||
public static string GenerateInvalidJwtToken()
|
||||
{
|
||||
// Generate token with wrong secret key
|
||||
return GenerateJwtToken(secretKey: "WrongSecretKeyThatIsAtLeast32CharactersLong!");
|
||||
}
|
||||
|
||||
public static string GenerateAdminJwtToken()
|
||||
{
|
||||
return GenerateJwtToken(
|
||||
userId: "admin-user-id",
|
||||
username: "admin",
|
||||
role: "Admin");
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user