Features Added: - Standard e-commerce properties (Price, Weight, shipping fields) - Order management with Create/Edit views and shipping information - ShippingRates system for weight-based shipping calculations - Comprehensive test coverage with JWT authentication tests - Sample data seeder with 5 orders demonstrating full workflow - Photo upload functionality for products - Multi-cryptocurrency payment support (BTC, XMR, USDT, etc.) Database Changes: - Added ShippingRates table - Added shipping fields to Orders (Name, Address, City, PostCode, Country) - Renamed properties to standard names (BasePrice to Price, ProductWeight to Weight) - Added UpdatedAt timestamps to models UI Improvements: - Added Create/Edit views for Orders - Added ShippingRates management UI - Updated navigation menu with Shipping option - Enhanced Order Details view with shipping information Sample Data: - 3 Categories (Electronics, Clothing, Books) - 5 Products with various prices - 5 Shipping rates (Royal Mail options) - 5 Orders in different statuses (Pending to Delivered) - 3 Crypto payments demonstrating payment flow Security: - All API endpoints secured with JWT authentication - No public endpoints - client apps must authenticate - Privacy-focused design with minimal data collection Generated with Claude Code Co-Authored-By: Claude <noreply@anthropic.com>
65 lines
2.0 KiB
C#
65 lines
2.0 KiB
C#
using Microsoft.IdentityModel.Tokens;
|
|
using System.IdentityModel.Tokens.Jwt;
|
|
using System.Security.Claims;
|
|
using System.Text;
|
|
|
|
namespace LittleShop.Tests.Infrastructure;
|
|
|
|
public static class JwtTokenHelper
|
|
{
|
|
public static string GenerateJwtToken(
|
|
string userId = "test-user-id",
|
|
string username = "testuser",
|
|
string role = "User",
|
|
int expirationMinutes = 60,
|
|
string secretKey = "YourSuperSecretKeyThatIsAtLeast32CharactersLong!",
|
|
string issuer = "LittleShop",
|
|
string audience = "LittleShop")
|
|
{
|
|
var tokenHandler = new JwtSecurityTokenHandler();
|
|
var key = Encoding.ASCII.GetBytes(secretKey);
|
|
|
|
var claims = new List<Claim>
|
|
{
|
|
new Claim(ClaimTypes.NameIdentifier, userId),
|
|
new Claim(ClaimTypes.Name, username),
|
|
new Claim(ClaimTypes.Role, role)
|
|
};
|
|
|
|
var tokenDescriptor = new SecurityTokenDescriptor
|
|
{
|
|
Subject = new ClaimsIdentity(claims),
|
|
Expires = DateTime.UtcNow.AddMinutes(expirationMinutes),
|
|
Issuer = issuer,
|
|
Audience = audience,
|
|
SigningCredentials = new SigningCredentials(
|
|
new SymmetricSecurityKey(key),
|
|
SecurityAlgorithms.HmacSha256Signature)
|
|
};
|
|
|
|
var token = tokenHandler.CreateToken(tokenDescriptor);
|
|
return tokenHandler.WriteToken(token);
|
|
}
|
|
|
|
public static string GenerateExpiredJwtToken(
|
|
string userId = "test-user-id",
|
|
string username = "testuser",
|
|
string role = "User")
|
|
{
|
|
return GenerateJwtToken(userId, username, role, expirationMinutes: -60);
|
|
}
|
|
|
|
public static string GenerateInvalidJwtToken()
|
|
{
|
|
// Generate token with wrong secret key
|
|
return GenerateJwtToken(secretKey: "WrongSecretKeyThatIsAtLeast32CharactersLong!");
|
|
}
|
|
|
|
public static string GenerateAdminJwtToken()
|
|
{
|
|
return GenerateJwtToken(
|
|
userId: "admin-user-id",
|
|
username: "admin",
|
|
role: "Admin");
|
|
}
|
|
} |