-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #36 from talon-one/sc-45373-sdk-add-basic-test-wor…
…kflow-to-golang-sdk add test workflow
- Loading branch information
Showing
5 changed files
with
259 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
module example | ||
|
||
go 1.23.3 | ||
|
||
replace github.com/talon-one/talon_go/v8 => ../.. | ||
|
||
require github.com/talon-one/talon_go/v8 v8.0.0 | ||
|
||
require golang.org/x/oauth2 v0.23.0 // indirect |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
cloud.google.com/go/compute/metadata v0.3.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k= | ||
github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38= | ||
github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= | ||
golang.org/x/oauth2 v0.23.0 h1:PbgcYx2W7i4LvjJWEbf0ngHV6qJYr86PkAV3bXdLEbs= | ||
golang.org/x/oauth2 v0.23.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI= |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,123 @@ | ||
package main | ||
|
||
import ( | ||
"context" | ||
"encoding/json" | ||
"fmt" | ||
"os" | ||
|
||
talon "github.com/talon-one/talon_go/v8" | ||
) | ||
|
||
func main() { | ||
configuration := talon.NewConfiguration() | ||
// Set API base path | ||
configuration.Servers = talon.ServerConfigurations{ | ||
{ | ||
// Notice that there is no trailing '/' | ||
URL: "http://localhost:9000", | ||
Description: "Talon.One's API base URL", | ||
}, | ||
} | ||
// If you wish to inject a custom implementation of HTTPClient | ||
// configuration.HTTPClient = &customHTTPClient | ||
|
||
integrationClient := talon.NewAPIClient(configuration) | ||
|
||
// Create integration authentication context using api key | ||
integrationAuthContext := context.WithValue(context.Background(), talon.ContextAPIKeys, map[string]talon.APIKey{ | ||
"Authorization": { | ||
Prefix: "ApiKey-v1", | ||
Key: os.Getenv("TALON_API_KEY"), | ||
}, | ||
}) | ||
|
||
// Instantiating a NewCustomerSessionV2 struct | ||
newCustomerSession := talon.NewCustomerSessionV2{ | ||
// You can use either struct literals | ||
ProfileId: talon.PtrString("DEADBEEF"), | ||
CouponCodes: &[]string{"Cool-Stuff!"}, | ||
} | ||
|
||
// Or alternatively, using the relevant setter in a later stage in the code | ||
newCustomerSession.SetCartItems([]talon.CartItem{ | ||
{ | ||
Name: talon.PtrString("Pad Thai - Veggie"), | ||
Sku: "pad-332", | ||
Quantity: 1, | ||
Price: talon.PtrFloat32(5.5), | ||
Category: talon.PtrString("Noodles"), | ||
}, | ||
{ | ||
Name: talon.PtrString("Chang"), | ||
Sku: "chang-br-42", | ||
Quantity: 1, | ||
Price: talon.PtrFloat32(2.3), | ||
Category: talon.PtrString("Beverages"), | ||
}, | ||
}) | ||
|
||
// Instantiating a new IntegrationRequest | ||
integrationRequest := talon.IntegrationRequest{ | ||
CustomerSession: newCustomerSession, | ||
} | ||
|
||
// Optional list of requested information to be present on the response. | ||
// See docs/IntegrationRequest.md for full list of supported values | ||
// integrationRequest.SetResponseContent([]string{ | ||
// "customerSession", | ||
// "customerProfile", | ||
// "loyalty", | ||
// }) | ||
|
||
// Create/update a customer session using `UpdateCustomerSessionV2` function | ||
integrationState, _, err := integrationClient.IntegrationApi. | ||
UpdateCustomerSessionV2(integrationAuthContext, "deetdoot_2"). | ||
Body(integrationRequest). | ||
Execute() | ||
|
||
if err != nil { | ||
fmt.Printf("ERROR while calling UpdateCustomerSessionV2: %s\n", err) | ||
return | ||
} | ||
fmt.Printf("%#v\n", integrationState) | ||
|
||
// Parsing the returned effects list, please consult https://developers.talon.one/Integration-API/handling-effects-v2 for the full list of effects and their corresponding properties | ||
for _, effect := range integrationState.GetEffects() { | ||
effectType := effect.GetEffectType() | ||
switch { | ||
case "setDiscount" == effectType: | ||
// Initiating right props instance according to the effect type | ||
effectProps := talon.SetDiscountEffectProps{} | ||
if err := decodeHelper(effect.GetProps(), &effectProps); err != nil { | ||
fmt.Printf("ERROR while decoding 'setDiscount' props: %s\n", err) | ||
continue | ||
} | ||
|
||
// Access the specific effect's properties | ||
fmt.Printf("Set a discount '%s' of %2.3f\n", effectProps.GetName(), effectProps.GetValue()) | ||
case "acceptCoupon" == effectType: | ||
// Initiating right props instance according to the effect type | ||
effectProps := talon.AcceptCouponEffectProps{} | ||
if err := decodeHelper(effect.GetProps(), &effectProps); err != nil { | ||
fmt.Printf("ERROR while decoding props: %s\n", err) | ||
continue | ||
} | ||
|
||
// Work with AcceptCouponEffectProps' properties | ||
// ... | ||
default: | ||
fmt.Printf("Encounter unknown effect type: %s\n", effectType) | ||
} | ||
} | ||
} | ||
|
||
// quick decoding of props-map into our library structures using JSON marshaling, | ||
// or alternatively using a library like https://github.com/mitchellh/mapstructure | ||
func decodeHelper(propsMap map[string]interface{}, v interface{}) error { | ||
propsJSON, err := json.Marshal(propsMap) | ||
if err != nil { | ||
return err | ||
} | ||
return json.Unmarshal(propsJSON, v) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,74 @@ | ||
name: run tests | ||
|
||
on: [push] | ||
|
||
jobs: | ||
test: | ||
runs-on: ubuntu-latest | ||
permissions: | ||
contents: 'read' | ||
id-token: 'write' | ||
|
||
steps: | ||
- uses: actions/checkout@v4 | ||
- name: Authenticate to Google Cloud | ||
id: auth | ||
uses: google-github-actions/auth@v1 | ||
with: | ||
token_format: access_token | ||
workload_identity_provider: projects/949875736540/locations/global/workloadIdentityPools/external-pool/providers/github-provider | ||
service_account: [email protected] | ||
- name: Login to GAR | ||
uses: docker/login-action@v3 | ||
with: | ||
registry: europe-west3-docker.pkg.dev | ||
username: oauth2accesstoken | ||
password: ${{ steps.auth.outputs.access_token }} | ||
- uses: hoverkraft-tech/[email protected] | ||
- name: Set up Golang | ||
uses: actions/setup-go@v5 | ||
with: | ||
go-version: 1.23.3 | ||
- name: Install dependencies | ||
run: | | ||
sudo apt-get install jq curl | ||
- name: Run example | ||
working-directory: .github/.example | ||
run: | | ||
sleep 5; | ||
ACCOUNT_RESPONSE=$(curl -s --location "http://localhost:9000/v1/accounts" \ | ||
--header "Content-Type: application/json" \ | ||
--data-raw '{ | ||
"companyName": "demo", | ||
"email": "[email protected]", | ||
"password": "Password1234!" | ||
}'); | ||
export TALON_USER_ID=$(echo $ACCOUNT_RESPONSE | jq ".userId"); | ||
export TALON_USER_TOKEN=$(echo $ACCOUNT_RESPONSE | jq ".token" | tr -d '"'); | ||
USER_RESPONSE=$(curl -s --location "http://localhost:9000/v1/users/$TALON_USER_ID" \ | ||
--header "Authorization: Bearer $TALON_USER_TOKEN"); | ||
export TALON_ACCOUNT_ID=$(echo $USER_RESPONSE | jq ".accountId"); | ||
echo "User with ID $TALON_USER_ID and Token $TALON_USER_TOKEN was created for application $TALON_ACCOUNT_ID"; | ||
APPLICATION_RESPONSE=$(curl -s --location "http://localhost:9000/v1/applications" \ | ||
--header "Content-Type: application/json" \ | ||
--header "Authorization: Bearer $TALON_USER_TOKEN" \ | ||
--data-raw '{ | ||
"name": "demo", | ||
"currency": "EUR", | ||
"timezone": "Europe/Berlin", | ||
"enableFlattenedCartItems": false | ||
}'); | ||
export TALON_APPLICATION_ID=$(echo $USER_RESPONSE | jq ".id"); | ||
echo "Application with ID $TALON_APPLICATION_ID was created" | ||
API_KEY_RESPONSE=$(curl -s -v --location "http://localhost:9000/v1/applications/$TALON_APPLICATION_ID/apikeys" \ | ||
--header "Content-Type: application/json" \ | ||
--header "Authorization: Bearer $TALON_USER_TOKEN" \ | ||
--data-raw '{ | ||
"title": "Application HIT KEY", | ||
"expires": "2099-01-01T0:00:00Z" | ||
}'); | ||
echo "Api-Key-Response: $API_KEY_RESPONSE"; | ||
export TALON_API_KEY=$(echo $API_KEY_RESPONSE | jq ".key" | tr -d '"'); | ||
echo "Api-Key $TALON_API_KEY created" | ||
go run main.go; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
services: | ||
api-service: | ||
image: europe-west3-docker.pkg.dev/talon-artifacts/talon-images/talon-service:master | ||
depends_on: | ||
- database-service | ||
ports: | ||
- "9000:9000" | ||
environment: | ||
- TALON_DB_NAME=talon | ||
- TALON_DB_USER=talon | ||
- TALON_DB_PASSWORD=talon.one.9000 | ||
- TALON_DB_HOST=database-service | ||
- TALON_DB_PORT=5432 | ||
- TALON_ENABLE_WEBHOOK_WORKER_POOL=false | ||
- TZ=UTC | ||
- RELEASE_STAGE=ci | ||
- TALON_CH_ENABLED=false | ||
- TALON_DISABLE_PROFILER=true | ||
- USE_REPLICA_DB=false | ||
command: | ||
- /talon/talon | ||
healthcheck: | ||
test: ["CMD", "curl", "-f", "http://localhost:9000/v1/status/health"] | ||
interval: 10s | ||
timeout: 5s | ||
retries: 10 | ||
restart: "on-failure:10" | ||
|
||
database-service: | ||
image: docker.io/bitnami/postgresql:15 | ||
volumes: | ||
- 'postgresql_master_data:/bitnami/postgresql' | ||
ports: | ||
- "5433:5432" | ||
environment: | ||
- POSTGRESQL_DATABASE=talon | ||
- POSTGRESQL_USERNAME=talon | ||
- POSTGRESQL_PASSWORD=talon.one.9000 | ||
healthcheck: | ||
test: ["CMD-SHELL", "pg_isready -U talon -d talon"] | ||
interval: 10s | ||
timeout: 5s | ||
retries: 5 | ||
restart: "on-failure:10" | ||
|
||
volumes: | ||
postgresql_master_data: | ||
|