mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 11:04:25 +00:00
699 lines
18 KiB
Go
699 lines
18 KiB
Go
|
package command
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/golang/mock/gomock"
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
|
||
|
"github.com/zitadel/zitadel/internal/crypto"
|
||
|
"github.com/zitadel/zitadel/internal/domain"
|
||
|
caos_errors "github.com/zitadel/zitadel/internal/errors"
|
||
|
"github.com/zitadel/zitadel/internal/eventstore"
|
||
|
"github.com/zitadel/zitadel/internal/id"
|
||
|
id_mock "github.com/zitadel/zitadel/internal/id/mock"
|
||
|
"github.com/zitadel/zitadel/internal/repository/idp"
|
||
|
"github.com/zitadel/zitadel/internal/repository/idpconfig"
|
||
|
"github.com/zitadel/zitadel/internal/repository/org"
|
||
|
)
|
||
|
|
||
|
func TestCommandSide_AddOrgLDAPIDP(t *testing.T) {
|
||
|
type fields struct {
|
||
|
eventstore *eventstore.Eventstore
|
||
|
idGenerator id.Generator
|
||
|
secretCrypto crypto.EncryptionAlgorithm
|
||
|
}
|
||
|
type args struct {
|
||
|
ctx context.Context
|
||
|
resourceOwner string
|
||
|
provider LDAPProvider
|
||
|
}
|
||
|
type res struct {
|
||
|
id string
|
||
|
want *domain.ObjectDetails
|
||
|
err func(error) bool
|
||
|
}
|
||
|
tests := []struct {
|
||
|
name string
|
||
|
fields fields
|
||
|
args args
|
||
|
res res
|
||
|
}{
|
||
|
{
|
||
|
"invalid name",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid host",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid baseDN",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid userObjectClass",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid userUniqueAttribute",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid admin",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
UserUniqueAttribute: "userUniqueAttribute",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid password",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
UserUniqueAttribute: "userUniqueAttribute",
|
||
|
Admin: "admin",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "ok",
|
||
|
fields: fields{
|
||
|
eventstore: eventstoreExpect(t,
|
||
|
expectFilter(),
|
||
|
expectPush(
|
||
|
eventPusherToEvents(
|
||
|
org.NewLDAPIDPAddedEvent(context.Background(), &org.NewAggregate("org1").Aggregate,
|
||
|
"id1",
|
||
|
"name",
|
||
|
"host",
|
||
|
"",
|
||
|
false,
|
||
|
"baseDN",
|
||
|
"userObjectClass",
|
||
|
"userUniqueAttribute",
|
||
|
"admin",
|
||
|
&crypto.CryptoValue{
|
||
|
CryptoType: crypto.TypeEncryption,
|
||
|
Algorithm: "enc",
|
||
|
KeyID: "id",
|
||
|
Crypted: []byte("password"),
|
||
|
},
|
||
|
idp.LDAPAttributes{},
|
||
|
idp.Options{},
|
||
|
)),
|
||
|
uniqueConstraintsFromEventConstraint(idpconfig.NewAddIDPConfigNameUniqueConstraint("name", "org1")),
|
||
|
),
|
||
|
),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
secretCrypto: crypto.CreateMockEncryptionAlg(gomock.NewController(t)),
|
||
|
},
|
||
|
args: args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
UserUniqueAttribute: "userUniqueAttribute",
|
||
|
Admin: "admin",
|
||
|
Password: "password",
|
||
|
},
|
||
|
},
|
||
|
res: res{
|
||
|
id: "id1",
|
||
|
want: &domain.ObjectDetails{ResourceOwner: "org1"},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "ok all set",
|
||
|
fields: fields{
|
||
|
eventstore: eventstoreExpect(t,
|
||
|
expectFilter(),
|
||
|
expectPush(
|
||
|
eventPusherToEvents(
|
||
|
org.NewLDAPIDPAddedEvent(context.Background(), &org.NewAggregate("org1").Aggregate,
|
||
|
"id1",
|
||
|
"name",
|
||
|
"host",
|
||
|
"port",
|
||
|
true,
|
||
|
"baseDN",
|
||
|
"userObjectClass",
|
||
|
"userUniqueAttribute",
|
||
|
"admin",
|
||
|
&crypto.CryptoValue{
|
||
|
CryptoType: crypto.TypeEncryption,
|
||
|
Algorithm: "enc",
|
||
|
KeyID: "id",
|
||
|
Crypted: []byte("password"),
|
||
|
},
|
||
|
idp.LDAPAttributes{
|
||
|
IDAttribute: "id",
|
||
|
FirstNameAttribute: "firstName",
|
||
|
LastNameAttribute: "lastName",
|
||
|
DisplayNameAttribute: "displayName",
|
||
|
NickNameAttribute: "nickName",
|
||
|
PreferredUsernameAttribute: "preferredUsername",
|
||
|
EmailAttribute: "email",
|
||
|
EmailVerifiedAttribute: "emailVerified",
|
||
|
PhoneAttribute: "phone",
|
||
|
PhoneVerifiedAttribute: "phoneVerified",
|
||
|
PreferredLanguageAttribute: "preferredLanguage",
|
||
|
AvatarURLAttribute: "avatarURL",
|
||
|
ProfileAttribute: "profile",
|
||
|
},
|
||
|
idp.Options{
|
||
|
IsCreationAllowed: true,
|
||
|
IsLinkingAllowed: true,
|
||
|
IsAutoCreation: true,
|
||
|
IsAutoUpdate: true,
|
||
|
},
|
||
|
)),
|
||
|
uniqueConstraintsFromEventConstraint(idpconfig.NewAddIDPConfigNameUniqueConstraint("name", "org1")),
|
||
|
),
|
||
|
),
|
||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "id1"),
|
||
|
secretCrypto: crypto.CreateMockEncryptionAlg(gomock.NewController(t)),
|
||
|
},
|
||
|
args: args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
Port: "port",
|
||
|
TLS: true,
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
UserUniqueAttribute: "userUniqueAttribute",
|
||
|
Admin: "admin",
|
||
|
Password: "password",
|
||
|
LDAPAttributes: idp.LDAPAttributes{
|
||
|
IDAttribute: "id",
|
||
|
FirstNameAttribute: "firstName",
|
||
|
LastNameAttribute: "lastName",
|
||
|
DisplayNameAttribute: "displayName",
|
||
|
NickNameAttribute: "nickName",
|
||
|
PreferredUsernameAttribute: "preferredUsername",
|
||
|
EmailAttribute: "email",
|
||
|
EmailVerifiedAttribute: "emailVerified",
|
||
|
PhoneAttribute: "phone",
|
||
|
PhoneVerifiedAttribute: "phoneVerified",
|
||
|
PreferredLanguageAttribute: "preferredLanguage",
|
||
|
AvatarURLAttribute: "avatarURL",
|
||
|
ProfileAttribute: "profile",
|
||
|
},
|
||
|
IDPOptions: idp.Options{
|
||
|
IsCreationAllowed: true,
|
||
|
IsLinkingAllowed: true,
|
||
|
IsAutoCreation: true,
|
||
|
IsAutoUpdate: true,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
res: res{
|
||
|
id: "id1",
|
||
|
want: &domain.ObjectDetails{ResourceOwner: "org1"},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
for _, tt := range tests {
|
||
|
t.Run(tt.name, func(t *testing.T) {
|
||
|
c := &Commands{
|
||
|
eventstore: tt.fields.eventstore,
|
||
|
idGenerator: tt.fields.idGenerator,
|
||
|
idpConfigEncryption: tt.fields.secretCrypto,
|
||
|
}
|
||
|
id, got, err := c.AddOrgLDAPProvider(tt.args.ctx, tt.args.resourceOwner, tt.args.provider)
|
||
|
if tt.res.err == nil {
|
||
|
assert.NoError(t, err)
|
||
|
}
|
||
|
if tt.res.err != nil && !tt.res.err(err) {
|
||
|
t.Errorf("got wrong err: %v ", err)
|
||
|
}
|
||
|
if tt.res.err == nil {
|
||
|
assert.Equal(t, tt.res.id, id)
|
||
|
assert.Equal(t, tt.res.want, got)
|
||
|
}
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestCommandSide_UpdateOrgLDAPIDP(t *testing.T) {
|
||
|
type fields struct {
|
||
|
eventstore *eventstore.Eventstore
|
||
|
secretCrypto crypto.EncryptionAlgorithm
|
||
|
}
|
||
|
type args struct {
|
||
|
ctx context.Context
|
||
|
resourceOwner string
|
||
|
id string
|
||
|
provider LDAPProvider
|
||
|
}
|
||
|
type res struct {
|
||
|
want *domain.ObjectDetails
|
||
|
err func(error) bool
|
||
|
}
|
||
|
tests := []struct {
|
||
|
name string
|
||
|
fields fields
|
||
|
args args
|
||
|
res res
|
||
|
}{
|
||
|
{
|
||
|
"invalid id",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
provider: LDAPProvider{},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid name",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid host",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid baseDN",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid userObjectClass",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid userUniqueAttribute",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
"invalid admin",
|
||
|
fields{
|
||
|
eventstore: eventstoreExpect(t),
|
||
|
},
|
||
|
args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
UserUniqueAttribute: "userUniqueAttribute",
|
||
|
},
|
||
|
},
|
||
|
res{
|
||
|
err: caos_errors.IsErrorInvalidArgument,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "not found",
|
||
|
fields: fields{
|
||
|
eventstore: eventstoreExpect(t,
|
||
|
expectFilter(),
|
||
|
),
|
||
|
},
|
||
|
args: args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
UserUniqueAttribute: "userUniqueAttribute",
|
||
|
Admin: "admin",
|
||
|
},
|
||
|
},
|
||
|
res: res{
|
||
|
err: caos_errors.IsNotFound,
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "no changes",
|
||
|
fields: fields{
|
||
|
eventstore: eventstoreExpect(t,
|
||
|
expectFilter(
|
||
|
eventFromEventPusher(
|
||
|
org.NewLDAPIDPAddedEvent(context.Background(), &org.NewAggregate("org1").Aggregate,
|
||
|
"id1",
|
||
|
"name",
|
||
|
"host",
|
||
|
"",
|
||
|
false,
|
||
|
"baseDN",
|
||
|
"userObjectClass",
|
||
|
"userUniqueAttribute",
|
||
|
"admin",
|
||
|
&crypto.CryptoValue{
|
||
|
CryptoType: crypto.TypeEncryption,
|
||
|
Algorithm: "enc",
|
||
|
KeyID: "id",
|
||
|
Crypted: []byte("password"),
|
||
|
},
|
||
|
idp.LDAPAttributes{},
|
||
|
idp.Options{},
|
||
|
)),
|
||
|
),
|
||
|
),
|
||
|
},
|
||
|
args: args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "name",
|
||
|
Host: "host",
|
||
|
BaseDN: "baseDN",
|
||
|
UserObjectClass: "userObjectClass",
|
||
|
UserUniqueAttribute: "userUniqueAttribute",
|
||
|
Admin: "admin",
|
||
|
},
|
||
|
},
|
||
|
res: res{
|
||
|
want: &domain.ObjectDetails{},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "change ok",
|
||
|
fields: fields{
|
||
|
eventstore: eventstoreExpect(t,
|
||
|
expectFilter(
|
||
|
eventFromEventPusher(
|
||
|
org.NewLDAPIDPAddedEvent(context.Background(), &org.NewAggregate("org1").Aggregate,
|
||
|
"id1",
|
||
|
"name",
|
||
|
"host",
|
||
|
"port",
|
||
|
false,
|
||
|
"baseDN",
|
||
|
"userObjectClass",
|
||
|
"userUniqueAttribute",
|
||
|
"admin",
|
||
|
&crypto.CryptoValue{
|
||
|
CryptoType: crypto.TypeEncryption,
|
||
|
Algorithm: "enc",
|
||
|
KeyID: "id",
|
||
|
Crypted: []byte("password"),
|
||
|
},
|
||
|
idp.LDAPAttributes{},
|
||
|
idp.Options{},
|
||
|
)),
|
||
|
),
|
||
|
expectPush(
|
||
|
eventPusherToEvents(
|
||
|
func() eventstore.Command {
|
||
|
t := true
|
||
|
event, _ := org.NewLDAPIDPChangedEvent(context.Background(), &org.NewAggregate("org1").Aggregate,
|
||
|
"id1",
|
||
|
"name",
|
||
|
[]idp.LDAPIDPChanges{
|
||
|
idp.ChangeLDAPName("new name"),
|
||
|
idp.ChangeLDAPHost("new host"),
|
||
|
idp.ChangeLDAPPort("new port"),
|
||
|
idp.ChangeLDAPTLS(true),
|
||
|
idp.ChangeLDAPBaseDN("new baseDN"),
|
||
|
idp.ChangeLDAPUserObjectClass("new userObjectClass"),
|
||
|
idp.ChangeLDAPUserUniqueAttribute("new userUniqueAttribute"),
|
||
|
idp.ChangeLDAPAdmin("new admin"),
|
||
|
idp.ChangeLDAPPassword(&crypto.CryptoValue{
|
||
|
CryptoType: crypto.TypeEncryption,
|
||
|
Algorithm: "enc",
|
||
|
KeyID: "id",
|
||
|
Crypted: []byte("new password"),
|
||
|
}),
|
||
|
idp.ChangeLDAPAttributes(idp.LDAPAttributeChanges{
|
||
|
IDAttribute: stringPointer("new id"),
|
||
|
FirstNameAttribute: stringPointer("new firstName"),
|
||
|
LastNameAttribute: stringPointer("new lastName"),
|
||
|
DisplayNameAttribute: stringPointer("new displayName"),
|
||
|
NickNameAttribute: stringPointer("new nickName"),
|
||
|
PreferredUsernameAttribute: stringPointer("new preferredUsername"),
|
||
|
EmailAttribute: stringPointer("new email"),
|
||
|
EmailVerifiedAttribute: stringPointer("new emailVerified"),
|
||
|
PhoneAttribute: stringPointer("new phone"),
|
||
|
PhoneVerifiedAttribute: stringPointer("new phoneVerified"),
|
||
|
PreferredLanguageAttribute: stringPointer("new preferredLanguage"),
|
||
|
AvatarURLAttribute: stringPointer("new avatarURL"),
|
||
|
ProfileAttribute: stringPointer("new profile"),
|
||
|
}),
|
||
|
idp.ChangeLDAPOptions(idp.OptionChanges{
|
||
|
IsCreationAllowed: &t,
|
||
|
IsLinkingAllowed: &t,
|
||
|
IsAutoCreation: &t,
|
||
|
IsAutoUpdate: &t,
|
||
|
}),
|
||
|
},
|
||
|
)
|
||
|
return event
|
||
|
}(),
|
||
|
),
|
||
|
uniqueConstraintsFromEventConstraint(idpconfig.NewRemoveIDPConfigNameUniqueConstraint("name", "org1")),
|
||
|
uniqueConstraintsFromEventConstraint(idpconfig.NewAddIDPConfigNameUniqueConstraint("new name", "org1")),
|
||
|
),
|
||
|
),
|
||
|
secretCrypto: crypto.CreateMockEncryptionAlg(gomock.NewController(t)),
|
||
|
},
|
||
|
args: args{
|
||
|
ctx: context.Background(),
|
||
|
resourceOwner: "org1",
|
||
|
id: "id1",
|
||
|
provider: LDAPProvider{
|
||
|
Name: "new name",
|
||
|
Host: "new host",
|
||
|
Port: "new port",
|
||
|
TLS: true,
|
||
|
BaseDN: "new baseDN",
|
||
|
UserObjectClass: "new userObjectClass",
|
||
|
UserUniqueAttribute: "new userUniqueAttribute",
|
||
|
Admin: "new admin",
|
||
|
Password: "new password",
|
||
|
LDAPAttributes: idp.LDAPAttributes{
|
||
|
IDAttribute: "new id",
|
||
|
FirstNameAttribute: "new firstName",
|
||
|
LastNameAttribute: "new lastName",
|
||
|
DisplayNameAttribute: "new displayName",
|
||
|
NickNameAttribute: "new nickName",
|
||
|
PreferredUsernameAttribute: "new preferredUsername",
|
||
|
EmailAttribute: "new email",
|
||
|
EmailVerifiedAttribute: "new emailVerified",
|
||
|
PhoneAttribute: "new phone",
|
||
|
PhoneVerifiedAttribute: "new phoneVerified",
|
||
|
PreferredLanguageAttribute: "new preferredLanguage",
|
||
|
AvatarURLAttribute: "new avatarURL",
|
||
|
ProfileAttribute: "new profile",
|
||
|
},
|
||
|
IDPOptions: idp.Options{
|
||
|
IsCreationAllowed: true,
|
||
|
IsLinkingAllowed: true,
|
||
|
IsAutoCreation: true,
|
||
|
IsAutoUpdate: true,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
res: res{
|
||
|
want: &domain.ObjectDetails{ResourceOwner: "org1"},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
for _, tt := range tests {
|
||
|
t.Run(tt.name, func(t *testing.T) {
|
||
|
c := &Commands{
|
||
|
eventstore: tt.fields.eventstore,
|
||
|
idpConfigEncryption: tt.fields.secretCrypto,
|
||
|
}
|
||
|
got, err := c.UpdateOrgLDAPProvider(tt.args.ctx, tt.args.resourceOwner, tt.args.id, tt.args.provider)
|
||
|
if tt.res.err == nil {
|
||
|
assert.NoError(t, err)
|
||
|
}
|
||
|
if tt.res.err != nil && !tt.res.err(err) {
|
||
|
t.Errorf("got wrong err: %v ", err)
|
||
|
}
|
||
|
if tt.res.err == nil {
|
||
|
assert.Equal(t, tt.res.want, got)
|
||
|
}
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func stringPointer(s string) *string {
|
||
|
return &s
|
||
|
}
|