2021-03-15 11:51:15 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-08-18 08:49:04 +00:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
|
2021-03-15 11:51:15 +00:00
|
|
|
"github.com/caos/zitadel/internal/domain"
|
|
|
|
caos_errs "github.com/caos/zitadel/internal/errors"
|
|
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
|
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
|
|
|
"github.com/caos/zitadel/internal/eventstore/v1/models"
|
|
|
|
"github.com/caos/zitadel/internal/id"
|
|
|
|
id_mock "github.com/caos/zitadel/internal/id/mock"
|
2022-03-24 16:21:34 +00:00
|
|
|
"github.com/caos/zitadel/internal/repository/instance"
|
2021-03-15 11:51:15 +00:00
|
|
|
"github.com/caos/zitadel/internal/repository/member"
|
|
|
|
"github.com/caos/zitadel/internal/repository/project"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestCommandSide_AddProject(t *testing.T) {
|
|
|
|
type fields struct {
|
|
|
|
eventstore *eventstore.Eventstore
|
|
|
|
idGenerator id.Generator
|
|
|
|
}
|
|
|
|
type args struct {
|
|
|
|
ctx context.Context
|
|
|
|
project *domain.Project
|
|
|
|
resourceOwner string
|
|
|
|
ownerID string
|
|
|
|
}
|
|
|
|
type res struct {
|
|
|
|
want *domain.Project
|
|
|
|
err func(error) bool
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
fields fields
|
|
|
|
args args
|
|
|
|
res res
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "invalid project, error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "org with project owner, error already exists",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
2022-03-24 16:21:34 +00:00
|
|
|
instance.NewGlobalOrgSetEventEvent(context.Background(),
|
|
|
|
&instance.NewAggregate().Aggregate,
|
2021-03-15 11:51:15 +00:00
|
|
|
"globalorg",
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPushFailed(caos_errs.ThrowAlreadyExists(nil, "ERROR", "internl"),
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(project.NewProjectAddedEvent(
|
|
|
|
context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-18 08:49:04 +00:00
|
|
|
"project", true, true, true,
|
2021-08-24 06:34:10 +00:00
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
eventFromEventPusher(project.NewProjectMemberAddedEvent(
|
|
|
|
context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
|
|
|
"user1",
|
|
|
|
[]string{domain.RoleProjectOwner}...,
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
uniqueConstraintsFromEventConstraint(project.NewAddProjectNameUniqueConstraint("project", "org1")),
|
|
|
|
uniqueConstraintsFromEventConstraint(member.NewAddMemberUniqueConstraint("project1", "user1")),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "project1"),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: true,
|
|
|
|
ProjectRoleCheck: true,
|
|
|
|
HasProjectCheck: true,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
ownerID: "user1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorAlreadyExists,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "global org with project owner global, ok",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
2022-03-24 16:21:34 +00:00
|
|
|
instance.NewGlobalOrgSetEventEvent(context.Background(),
|
|
|
|
&instance.NewAggregate().Aggregate,
|
2021-03-15 11:51:15 +00:00
|
|
|
"globalorg",
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPush(
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(project.NewProjectAddedEvent(
|
|
|
|
context.Background(),
|
|
|
|
&project.NewAggregate("project1", "globalorg").Aggregate,
|
2021-08-18 08:49:04 +00:00
|
|
|
"project", true, true, true,
|
2021-08-24 06:34:10 +00:00
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
eventFromEventPusher(project.NewProjectMemberAddedEvent(
|
|
|
|
context.Background(),
|
|
|
|
&project.NewAggregate("project1", "globalorg").Aggregate,
|
|
|
|
"user1",
|
|
|
|
[]string{domain.RoleProjectOwnerGlobal}...,
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
uniqueConstraintsFromEventConstraint(project.NewAddProjectNameUniqueConstraint("project", "globalorg")),
|
|
|
|
uniqueConstraintsFromEventConstraint(member.NewAddMemberUniqueConstraint("project1", "user1")),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "project1"),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: true,
|
|
|
|
ProjectRoleCheck: true,
|
|
|
|
HasProjectCheck: true,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
resourceOwner: "globalorg",
|
|
|
|
ownerID: "user1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
want: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
ResourceOwner: "globalorg",
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: true,
|
|
|
|
ProjectRoleCheck: true,
|
|
|
|
HasProjectCheck: true,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "org with project owner, ok",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
2022-03-24 16:21:34 +00:00
|
|
|
instance.NewGlobalOrgSetEventEvent(context.Background(),
|
|
|
|
&instance.NewAggregate().Aggregate,
|
2021-03-15 11:51:15 +00:00
|
|
|
"globalorg",
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPush(
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(project.NewProjectAddedEvent(
|
|
|
|
context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-18 08:49:04 +00:00
|
|
|
"project", true, true, true,
|
2021-08-24 06:34:10 +00:00
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
eventFromEventPusher(project.NewProjectMemberAddedEvent(
|
|
|
|
context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
|
|
|
"user1",
|
|
|
|
[]string{domain.RoleProjectOwner}...,
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
uniqueConstraintsFromEventConstraint(project.NewAddProjectNameUniqueConstraint("project", "org1")),
|
|
|
|
uniqueConstraintsFromEventConstraint(member.NewAddMemberUniqueConstraint("project1", "user1")),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "project1"),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: true,
|
|
|
|
ProjectRoleCheck: true,
|
|
|
|
HasProjectCheck: true,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
ownerID: "user1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
want: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
ResourceOwner: "org1",
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: true,
|
|
|
|
ProjectRoleCheck: true,
|
|
|
|
HasProjectCheck: true,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
r := &Commands{
|
|
|
|
eventstore: tt.fields.eventstore,
|
|
|
|
idGenerator: tt.fields.idGenerator,
|
|
|
|
}
|
|
|
|
got, err := r.AddProject(tt.args.ctx, tt.args.project, tt.args.resourceOwner, tt.args.ownerID)
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
|
|
|
if tt.res.err != nil && !tt.res.err(err) {
|
|
|
|
t.Errorf("got wrong err: %v ", err)
|
|
|
|
}
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.Equal(t, tt.res.want, got)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCommandSide_ChangeProject(t *testing.T) {
|
|
|
|
type fields struct {
|
|
|
|
eventstore *eventstore.Eventstore
|
|
|
|
}
|
|
|
|
type args struct {
|
|
|
|
ctx context.Context
|
|
|
|
project *domain.Project
|
|
|
|
resourceOwner string
|
|
|
|
}
|
|
|
|
type res struct {
|
|
|
|
want *domain.Project
|
|
|
|
err func(error) bool
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
fields fields
|
|
|
|
args args
|
|
|
|
res res
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "invalid project, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid project empty aggregateid, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
|
|
|
Name: "project",
|
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project not existing, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
|
|
|
Name: "project change",
|
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project removed, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectRemovedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
|
|
|
"project"),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
|
|
|
Name: "project change",
|
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no changes, precondition error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: true,
|
|
|
|
ProjectRoleCheck: true,
|
|
|
|
HasProjectCheck: true,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsPreconditionFailed,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project change with name and unique constraints, ok",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPush(
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(
|
|
|
|
newProjectChangedEvent(context.Background(),
|
|
|
|
"project1",
|
|
|
|
"org1",
|
|
|
|
"project",
|
|
|
|
"project-new",
|
2021-08-18 08:49:04 +00:00
|
|
|
false,
|
|
|
|
false,
|
2021-08-24 06:34:10 +00:00
|
|
|
false,
|
|
|
|
domain.PrivateLabelingSettingEnforceProjectResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
},
|
|
|
|
uniqueConstraintsFromEventConstraint(project.NewRemoveProjectNameUniqueConstraint("project", "org1")),
|
|
|
|
uniqueConstraintsFromEventConstraint(project.NewAddProjectNameUniqueConstraint("project-new", "org1")),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project-new",
|
|
|
|
ProjectRoleAssertion: false,
|
|
|
|
ProjectRoleCheck: false,
|
|
|
|
HasProjectCheck: false,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingEnforceProjectResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
want: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
ResourceOwner: "org1",
|
|
|
|
},
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project-new",
|
|
|
|
ProjectRoleAssertion: false,
|
|
|
|
ProjectRoleCheck: false,
|
|
|
|
HasProjectCheck: false,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingEnforceProjectResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project change without name and unique constraints, ok",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPush(
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(
|
|
|
|
newProjectChangedEvent(context.Background(),
|
|
|
|
"project1",
|
|
|
|
"org1",
|
|
|
|
"project",
|
|
|
|
"",
|
2021-08-18 08:49:04 +00:00
|
|
|
false,
|
|
|
|
false,
|
2021-08-24 06:34:10 +00:00
|
|
|
false,
|
|
|
|
domain.PrivateLabelingSettingEnforceProjectResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
},
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
project: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
},
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: false,
|
|
|
|
ProjectRoleCheck: false,
|
|
|
|
HasProjectCheck: false,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingEnforceProjectResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
want: &domain.Project{
|
|
|
|
ObjectRoot: models.ObjectRoot{
|
|
|
|
AggregateID: "project1",
|
|
|
|
ResourceOwner: "org1",
|
|
|
|
},
|
2021-08-24 06:34:10 +00:00
|
|
|
Name: "project",
|
|
|
|
ProjectRoleAssertion: false,
|
|
|
|
ProjectRoleCheck: false,
|
|
|
|
HasProjectCheck: false,
|
|
|
|
PrivateLabelingSetting: domain.PrivateLabelingSettingEnforceProjectResourceOwnerPolicy,
|
2021-03-15 11:51:15 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
r := &Commands{
|
|
|
|
eventstore: tt.fields.eventstore,
|
|
|
|
}
|
|
|
|
got, err := r.ChangeProject(tt.args.ctx, tt.args.project, tt.args.resourceOwner)
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
|
|
|
if tt.res.err != nil && !tt.res.err(err) {
|
|
|
|
t.Errorf("got wrong err: %v ", err)
|
|
|
|
}
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.Equal(t, tt.res.want, got)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCommandSide_DeactivateProject(t *testing.T) {
|
|
|
|
type fields struct {
|
|
|
|
eventstore *eventstore.Eventstore
|
|
|
|
}
|
|
|
|
type args struct {
|
|
|
|
ctx context.Context
|
|
|
|
projectID string
|
|
|
|
resourceOwner string
|
|
|
|
}
|
|
|
|
type res struct {
|
|
|
|
want *domain.ObjectDetails
|
|
|
|
err func(error) bool
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
fields fields
|
|
|
|
args args
|
|
|
|
res res
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "invalid project id, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid resourceowner, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project not existing, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project removed, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectRemovedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
|
|
|
"project"),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project already inactive, precondition error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectDeactivatedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsPreconditionFailed,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project deactivate, ok",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPush(
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectDeactivatedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
want: &domain.ObjectDetails{
|
|
|
|
ResourceOwner: "org1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
r := &Commands{
|
|
|
|
eventstore: tt.fields.eventstore,
|
|
|
|
}
|
|
|
|
got, err := r.DeactivateProject(tt.args.ctx, tt.args.projectID, tt.args.resourceOwner)
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
|
|
|
if tt.res.err != nil && !tt.res.err(err) {
|
|
|
|
t.Errorf("got wrong err: %v ", err)
|
|
|
|
}
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.Equal(t, tt.res.want, got)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCommandSide_ReactivateProject(t *testing.T) {
|
|
|
|
type fields struct {
|
|
|
|
eventstore *eventstore.Eventstore
|
|
|
|
}
|
|
|
|
type args struct {
|
|
|
|
ctx context.Context
|
|
|
|
projectID string
|
|
|
|
resourceOwner string
|
|
|
|
}
|
|
|
|
type res struct {
|
|
|
|
want *domain.ObjectDetails
|
|
|
|
err func(error) bool
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
fields fields
|
|
|
|
args args
|
|
|
|
res res
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "invalid project id, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid resourceowner, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project not existing, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project removed, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectRemovedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
|
|
|
"project"),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project not inactive, precondition error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsPreconditionFailed,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project reactivate, ok",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectDeactivatedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPush(
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectReactivatedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
want: &domain.ObjectDetails{
|
|
|
|
ResourceOwner: "org1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
r := &Commands{
|
|
|
|
eventstore: tt.fields.eventstore,
|
|
|
|
}
|
|
|
|
got, err := r.ReactivateProject(tt.args.ctx, tt.args.projectID, tt.args.resourceOwner)
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
|
|
|
if tt.res.err != nil && !tt.res.err(err) {
|
|
|
|
t.Errorf("got wrong err: %v ", err)
|
|
|
|
}
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.Equal(t, tt.res.want, got)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCommandSide_RemoveProject(t *testing.T) {
|
|
|
|
type fields struct {
|
|
|
|
eventstore *eventstore.Eventstore
|
|
|
|
}
|
|
|
|
type args struct {
|
|
|
|
ctx context.Context
|
|
|
|
projectID string
|
|
|
|
resourceOwner string
|
|
|
|
}
|
|
|
|
type res struct {
|
|
|
|
want *domain.ObjectDetails
|
|
|
|
err func(error) bool
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
fields fields
|
|
|
|
args args
|
|
|
|
res res
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "invalid project id, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid resourceowner, invalid error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsErrorInvalidArgument,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project not existing, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project removed, not found error",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectRemovedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
|
|
|
"project"),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
err: caos_errs.IsNotFound,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "project remove, ok",
|
|
|
|
fields: fields{
|
|
|
|
eventstore: eventstoreExpect(
|
|
|
|
t,
|
|
|
|
expectFilter(
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectAddedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
2021-08-24 06:34:10 +00:00
|
|
|
"project", true, true, true,
|
|
|
|
domain.PrivateLabelingSettingAllowLoginUserResourceOwnerPolicy),
|
2021-03-15 11:51:15 +00:00
|
|
|
),
|
|
|
|
),
|
|
|
|
expectPush(
|
|
|
|
[]*repository.Event{
|
|
|
|
eventFromEventPusher(
|
|
|
|
project.NewProjectRemovedEvent(context.Background(),
|
|
|
|
&project.NewAggregate("project1", "org1").Aggregate,
|
|
|
|
"project"),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
uniqueConstraintsFromEventConstraint(project.NewRemoveProjectNameUniqueConstraint("project", "org1")),
|
|
|
|
),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
args: args{
|
|
|
|
ctx: context.Background(),
|
|
|
|
projectID: "project1",
|
|
|
|
resourceOwner: "org1",
|
|
|
|
},
|
|
|
|
res: res{
|
|
|
|
want: &domain.ObjectDetails{
|
|
|
|
ResourceOwner: "org1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
r := &Commands{
|
|
|
|
eventstore: tt.fields.eventstore,
|
|
|
|
}
|
|
|
|
got, err := r.RemoveProject(tt.args.ctx, tt.args.projectID, tt.args.resourceOwner)
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
|
|
|
if tt.res.err != nil && !tt.res.err(err) {
|
|
|
|
t.Errorf("got wrong err: %v ", err)
|
|
|
|
}
|
|
|
|
if tt.res.err == nil {
|
|
|
|
assert.Equal(t, tt.res.want, got)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-24 06:34:10 +00:00
|
|
|
func newProjectChangedEvent(ctx context.Context, projectID, resourceOwner, oldName, newName string, roleAssertion, roleCheck, hasProjectCheck bool, privateLabelingSetting domain.PrivateLabelingSetting) *project.ProjectChangeEvent {
|
2021-03-15 11:51:15 +00:00
|
|
|
changes := []project.ProjectChanges{
|
|
|
|
project.ChangeProjectRoleAssertion(roleAssertion),
|
|
|
|
project.ChangeProjectRoleCheck(roleCheck),
|
2021-08-18 08:49:04 +00:00
|
|
|
project.ChangeHasProjectCheck(hasProjectCheck),
|
2021-08-24 06:34:10 +00:00
|
|
|
project.ChangePrivateLabelingSetting(privateLabelingSetting),
|
2021-03-15 11:51:15 +00:00
|
|
|
}
|
|
|
|
if newName != "" {
|
|
|
|
changes = append(changes, project.ChangeName(newName))
|
|
|
|
}
|
|
|
|
event, _ := project.NewProjectChangeEvent(ctx,
|
|
|
|
&project.NewAggregate(projectID, resourceOwner).Aggregate,
|
|
|
|
oldName,
|
|
|
|
changes,
|
|
|
|
)
|
|
|
|
return event
|
|
|
|
}
|