| import fs from 'fs'; | |
| import parser from '@automattic/calypso-config/parser'; | |
| jest.mock( 'fs', () => ( { | |
| existsSync: jest.fn(), | |
| readFileSync: jest.fn(), | |
| } ) ); | |
| function mockFs( files ) { | |
| fs.existsSync.mockImplementation( ( path ) => !! files[ path ] ); | |
| fs.readFileSync.mockImplementation( ( path ) => files[ path ] ); | |
| } | |
| const withEnv = ( env = {} ) => { | |
| for ( const [ k, v ] of Object.entries( env ) ) { | |
| process.env[ k ] = v; | |
| } | |
| }; | |
| function setValidSecrets() { | |
| mockFs( { | |
| '/valid-path/secrets.json': JSON.stringify( { | |
| secret: 'very', | |
| wpcom_calypso_rest_api_key: 'rest_api', | |
| wpcom_calypso_support_session_rest_api_key: 'session_api', | |
| } ), | |
| '/valid-path/empty-secrets.json': JSON.stringify( { | |
| secret: 'fromempty', | |
| } ), | |
| } ); | |
| } | |
| function setValidEnvFiles() { | |
| mockFs( { | |
| '/valid-path/_shared.json': JSON.stringify( { | |
| shared_only: 'shared', | |
| myenv_override: 'shared', | |
| features: { | |
| enabledFeature1: true, | |
| disabledFeature1: false, | |
| enabledFeature2: true, | |
| disabledFeature2: false, | |
| }, | |
| } ), | |
| '/valid-path/myenv.json': JSON.stringify( { | |
| myenv_only: 'myenv', | |
| myenv_override: 'myenv', | |
| myenvlocal_override: 'myenv', | |
| } ), | |
| '/valid-path/myenv.local.json': JSON.stringify( { | |
| myenvlocal_only: 'myenvlocal', | |
| myenvlocal_override: 'myenvlocal', | |
| } ), | |
| } ); | |
| } | |
| function setEmptySecrets() { | |
| mockFs( { | |
| '/valid-path/secrets.json': JSON.stringify( { | |
| secret: 'very', | |
| } ), | |
| '/valid-path/_shared.json': JSON.stringify( { | |
| features: { | |
| 'wpcom-user-bootstrap': true, | |
| }, | |
| } ), | |
| } ); | |
| } | |
| describe( 'parser', () => { | |
| let realProcessEnv; | |
| beforeEach( () => { | |
| realProcessEnv = { ...process.env }; | |
| } ); | |
| afterEach( () => { | |
| fs.readFileSync.mockReset(); | |
| fs.readFileSync.mockReset(); | |
| process.env = { ...realProcessEnv }; | |
| } ); | |
| test( 'should return empty objects for an invalid path', () => { | |
| const data = parser( '/invalid-path' ); | |
| expect( data ).toEqual( { serverData: {}, clientData: {} } ); | |
| } ); | |
| test( 'server should have secrets and client should not', () => { | |
| setValidSecrets(); | |
| const data = parser( '/valid-path' ); | |
| expect( data.clientData ).not.toHaveProperty( 'secret' ); | |
| expect( data.serverData ).toHaveProperty( 'secret' ); | |
| } ); | |
| test( 'should cascade configs', () => { | |
| setValidEnvFiles(); | |
| const { serverData: data } = parser( '/valid-path', { | |
| env: 'myenv', | |
| } ); | |
| expect( data ).toHaveProperty( 'shared_only', 'shared' ); | |
| expect( data ).toHaveProperty( 'myenv_only', 'myenv' ); | |
| expect( data ).toHaveProperty( 'myenvlocal_only', 'myenvlocal' ); | |
| expect( data ).toHaveProperty( 'myenv_override', 'myenv' ); | |
| expect( data ).toHaveProperty( 'myenvlocal_override', 'myenvlocal' ); | |
| expect( data ).toHaveProperty( 'features', { | |
| enabledFeature1: true, | |
| enabledFeature2: true, | |
| disabledFeature1: false, | |
| disabledFeature2: false, | |
| } ); | |
| } ); | |
| test( 'should override enabled feature when disabledFeatures set', () => { | |
| setValidEnvFiles(); | |
| const { serverData: data } = parser( '/valid-path', { | |
| env: 'myenv', | |
| disabledFeatures: 'enabledFeature2', | |
| } ); | |
| expect( data ).toHaveProperty( 'features.enabledFeature2', false ); | |
| } ); | |
| test( 'should override disabled feature when enabledFeatures set', () => { | |
| setValidEnvFiles(); | |
| const { serverData: data } = parser( '/valid-path', { | |
| env: 'myenv', | |
| enabledFeatures: 'disabledFeature2', | |
| } ); | |
| expect( data ).toHaveProperty( 'features.disabledFeature2', true ); | |
| } ); | |
| test( 'should override secrets with env vars', () => { | |
| withEnv( { | |
| WPCOM_CALYPSO_REST_API_KEY: 'foo', | |
| WPCOM_CALYPSO_SUPPORT_SESSION_REST_API_KEY: 'bar', | |
| } ); | |
| setValidSecrets(); | |
| const { serverData } = parser( '/valid-path' ); | |
| expect( serverData.wpcom_calypso_rest_api_key ).toBe( 'foo' ); | |
| expect( serverData.wpcom_calypso_support_session_rest_api_key ).toBe( 'bar' ); | |
| } ); | |
| test( 'should explicitly set user-bootstrapping to false if there are no real secrets', () => { | |
| setEmptySecrets(); | |
| const errorSpy = jest.fn(); | |
| global.console = { error: errorSpy }; | |
| const { serverData, clientData } = parser( '/valid-path' ); | |
| expect( serverData.features[ 'wpcom-user-bootstrap' ] ).toBe( false ); | |
| expect( clientData.features[ 'wpcom-user-bootstrap' ] ).toBe( false ); | |
| expect( errorSpy ).toHaveBeenCalledTimes( 1 ); | |
| } ); | |
| } ); | |