2021-03-19 11:12:56 +01:00
|
|
|
package management
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"testing"
|
|
|
|
|
|
2025-08-27 11:07:13 +02:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
|
|
2022-04-27 01:01:45 +02:00
|
|
|
"github.com/zitadel/zitadel/internal/test"
|
|
|
|
|
"github.com/zitadel/zitadel/pkg/grpc/idp"
|
|
|
|
|
mgmt_pb "github.com/zitadel/zitadel/pkg/grpc/management"
|
2021-03-19 11:12:56 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
func Test_addOIDCIDPRequestToDomain(t *testing.T) {
|
|
|
|
|
type args struct {
|
|
|
|
|
req *mgmt_pb.AddOrgOIDCIDPRequest
|
|
|
|
|
}
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
args args
|
|
|
|
|
}{
|
|
|
|
|
{
|
|
|
|
|
name: "all fields filled",
|
|
|
|
|
args: args{
|
|
|
|
|
req: &mgmt_pb.AddOrgOIDCIDPRequest{
|
2021-07-13 16:06:17 +02:00
|
|
|
Name: "ZITADEL",
|
|
|
|
|
StylingType: idp.IDPStylingType_STYLING_TYPE_GOOGLE,
|
|
|
|
|
ClientId: "test1234",
|
|
|
|
|
ClientSecret: "test4321",
|
|
|
|
|
Issuer: "zitadel.ch",
|
|
|
|
|
Scopes: []string{"email", "profile"},
|
|
|
|
|
DisplayNameMapping: idp.OIDCMappingField_OIDC_MAPPING_FIELD_EMAIL,
|
|
|
|
|
UsernameMapping: idp.OIDCMappingField_OIDC_MAPPING_FIELD_PREFERRED_USERNAME,
|
2021-09-10 09:49:49 +02:00
|
|
|
AutoRegister: true,
|
2021-03-19 11:12:56 +01:00
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
2022-07-28 15:42:35 +02:00
|
|
|
got := AddOIDCIDPRequestToDomain(tt.args.req)
|
2021-03-19 11:12:56 +01:00
|
|
|
test.AssertFieldsMapped(t, got,
|
|
|
|
|
"ObjectRoot",
|
|
|
|
|
"OIDCConfig.ClientSecret",
|
|
|
|
|
"OIDCConfig.ObjectRoot",
|
|
|
|
|
"OIDCConfig.IDPConfigID",
|
|
|
|
|
"IDPConfigID",
|
|
|
|
|
"State",
|
2021-07-13 16:06:17 +02:00
|
|
|
"OIDCConfig.AuthorizationEndpoint",
|
|
|
|
|
"OIDCConfig.TokenEndpoint",
|
2022-05-16 16:35:49 +02:00
|
|
|
"Type",
|
2021-09-14 15:15:01 +02:00
|
|
|
"JWTConfig",
|
2021-03-19 11:12:56 +01:00
|
|
|
)
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func Test_addOIDCIDPRequestToDomainOIDCIDPConfig(t *testing.T) {
|
|
|
|
|
type args struct {
|
|
|
|
|
req *mgmt_pb.AddOrgOIDCIDPRequest
|
|
|
|
|
}
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
args args
|
|
|
|
|
}{
|
|
|
|
|
{
|
|
|
|
|
name: "all fields filled",
|
|
|
|
|
args: args{
|
|
|
|
|
req: &mgmt_pb.AddOrgOIDCIDPRequest{
|
2021-07-13 16:06:17 +02:00
|
|
|
ClientId: "test1234",
|
|
|
|
|
ClientSecret: "test4321",
|
|
|
|
|
Issuer: "zitadel.ch",
|
|
|
|
|
Scopes: []string{"email", "profile"},
|
|
|
|
|
DisplayNameMapping: idp.OIDCMappingField_OIDC_MAPPING_FIELD_EMAIL,
|
|
|
|
|
UsernameMapping: idp.OIDCMappingField_OIDC_MAPPING_FIELD_PREFERRED_USERNAME,
|
2021-03-19 11:12:56 +01:00
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
got := addOIDCIDPRequestToDomainOIDCIDPConfig(tt.args.req)
|
|
|
|
|
test.AssertFieldsMapped(t, got,
|
|
|
|
|
"ObjectRoot",
|
2022-05-16 16:35:49 +02:00
|
|
|
"ClientSecret",
|
2021-03-19 11:12:56 +01:00
|
|
|
"IDPConfigID",
|
2021-07-13 16:06:17 +02:00
|
|
|
"AuthorizationEndpoint",
|
|
|
|
|
"TokenEndpoint",
|
2021-03-19 11:12:56 +01:00
|
|
|
)
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func Test_updateIDPToDomain(t *testing.T) {
|
|
|
|
|
type args struct {
|
|
|
|
|
req *mgmt_pb.UpdateOrgIDPRequest
|
|
|
|
|
}
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
args args
|
|
|
|
|
}{
|
|
|
|
|
{
|
|
|
|
|
name: "all fields filled",
|
|
|
|
|
args: args{
|
|
|
|
|
req: &mgmt_pb.UpdateOrgIDPRequest{
|
2021-09-10 09:49:49 +02:00
|
|
|
IdpId: "13523",
|
|
|
|
|
Name: "new name",
|
|
|
|
|
StylingType: idp.IDPStylingType_STYLING_TYPE_GOOGLE,
|
|
|
|
|
AutoRegister: true,
|
2021-03-19 11:12:56 +01:00
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
got := updateIDPToDomain(tt.args.req)
|
|
|
|
|
test.AssertFieldsMapped(t, got,
|
|
|
|
|
"ObjectRoot",
|
|
|
|
|
"OIDCConfig",
|
2021-09-14 15:15:01 +02:00
|
|
|
"JWTConfig",
|
2021-03-19 11:12:56 +01:00
|
|
|
"State",
|
2022-05-16 16:35:49 +02:00
|
|
|
"Type",
|
2021-03-19 11:12:56 +01:00
|
|
|
)
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func Test_updateOIDCConfigToDomain(t *testing.T) {
|
|
|
|
|
type args struct {
|
|
|
|
|
req *mgmt_pb.UpdateOrgIDPOIDCConfigRequest
|
|
|
|
|
}
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
args args
|
|
|
|
|
}{
|
|
|
|
|
{
|
|
|
|
|
name: "all fields filled",
|
|
|
|
|
args: args{
|
|
|
|
|
req: &mgmt_pb.UpdateOrgIDPOIDCConfigRequest{
|
2021-07-13 16:06:17 +02:00
|
|
|
IdpId: "4208",
|
|
|
|
|
Issuer: "zitadel.ch",
|
|
|
|
|
ClientId: "ZITEADEL",
|
|
|
|
|
ClientSecret: "i'm so secret",
|
|
|
|
|
Scopes: []string{"profile"},
|
|
|
|
|
DisplayNameMapping: idp.OIDCMappingField_OIDC_MAPPING_FIELD_EMAIL,
|
|
|
|
|
UsernameMapping: idp.OIDCMappingField_OIDC_MAPPING_FIELD_PREFERRED_USERNAME,
|
2021-03-19 11:12:56 +01:00
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
got := updateOIDCConfigToDomain(tt.args.req)
|
|
|
|
|
test.AssertFieldsMapped(t, got,
|
|
|
|
|
"ObjectRoot",
|
|
|
|
|
"ClientSecret",
|
2021-07-13 16:06:17 +02:00
|
|
|
"AuthorizationEndpoint",
|
|
|
|
|
"TokenEndpoint",
|
2021-03-19 11:12:56 +01:00
|
|
|
)
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
2025-08-27 11:07:13 +02:00
|
|
|
|
|
|
|
|
func Test_signatureAlgorithmToCommand(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
tests := []struct {
|
|
|
|
|
name string
|
|
|
|
|
signatureAlgorithm idp.SAMLSignatureAlgorithm
|
|
|
|
|
wantSignatureAlgorithm string
|
|
|
|
|
}{
|
|
|
|
|
{
|
|
|
|
|
name: "signature algorithm default value",
|
|
|
|
|
signatureAlgorithm: 11,
|
|
|
|
|
wantSignatureAlgorithm: "",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "RSA_SHA1",
|
|
|
|
|
signatureAlgorithm: idp.SAMLSignatureAlgorithm_SAML_SIGNATURE_RSA_SHA1,
|
|
|
|
|
wantSignatureAlgorithm: "http://www.w3.org/2000/09/xmldsig#rsa-sha1",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "RSA_SHA256",
|
|
|
|
|
signatureAlgorithm: idp.SAMLSignatureAlgorithm_SAML_SIGNATURE_RSA_SHA256,
|
|
|
|
|
wantSignatureAlgorithm: "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256",
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
name: "RSA_SHA512",
|
|
|
|
|
signatureAlgorithm: idp.SAMLSignatureAlgorithm_SAML_SIGNATURE_RSA_SHA512,
|
|
|
|
|
wantSignatureAlgorithm: "http://www.w3.org/2001/04/xmldsig-more#rsa-sha512",
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
got := signatureAlgorithmToCommand(tt.signatureAlgorithm)
|
|
|
|
|
require.Equal(t, tt.wantSignatureAlgorithm, got)
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|