mirror of
https://github.com/zitadel/zitadel.git
synced 2025-04-07 14:14:31 +00:00
495 lines
14 KiB
Go
495 lines
14 KiB
Go
![]() |
package projection
|
||
|
|
||
|
import (
|
||
|
"testing"
|
||
|
|
||
|
"github.com/caos/zitadel/internal/domain"
|
||
|
"github.com/caos/zitadel/internal/errors"
|
||
|
"github.com/caos/zitadel/internal/eventstore"
|
||
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
||
|
"github.com/caos/zitadel/internal/repository/iam"
|
||
|
"github.com/caos/zitadel/internal/repository/org"
|
||
|
)
|
||
|
|
||
|
func TestLoginPolicyProjection_reduces(t *testing.T) {
|
||
|
type args struct {
|
||
|
event func(t *testing.T) eventstore.EventReader
|
||
|
}
|
||
|
tests := []struct {
|
||
|
name string
|
||
|
args args
|
||
|
reduce func(event eventstore.EventReader) (*handler.Statement, error)
|
||
|
want wantReduce
|
||
|
}{
|
||
|
{
|
||
|
name: "org.reduceLoginPolicyAdded",
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(org.LoginPolicyAddedEventType),
|
||
|
org.AggregateType,
|
||
|
[]byte(`{
|
||
|
"allowUsernamePassword": true,
|
||
|
"allowRegister": true,
|
||
|
"allowExternalIdp": false,
|
||
|
"forceMFA": false,
|
||
|
"hidePasswordReset": true,
|
||
|
"passwordlessType": 1
|
||
|
}`),
|
||
|
), org.LoginPolicyAddedEventMapper),
|
||
|
},
|
||
|
reduce: (&LoginPolicyProjection{}).reduceLoginPolicyAdded,
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("org"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "INSERT INTO zitadel.projections.login_policies (aggregate_id, creation_date, change_date, sequence, allow_register, allow_username_password, allow_external_idps, force_mfa, passwordless_type, is_default, hide_password_reset) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11)",
|
||
|
expectedArgs: []interface{}{
|
||
|
"agg-id",
|
||
|
anyArg{},
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
true,
|
||
|
true,
|
||
|
false,
|
||
|
false,
|
||
|
domain.PasswordlessTypeAllowed,
|
||
|
false,
|
||
|
true,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "org.reduceLoginPolicyChanged",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceLoginPolicyChanged,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(org.LoginPolicyChangedEventType),
|
||
|
org.AggregateType,
|
||
|
[]byte(`{
|
||
|
"allowUsernamePassword": true,
|
||
|
"allowRegister": true,
|
||
|
"allowExternalIdp": true,
|
||
|
"forceMFA": true,
|
||
|
"hidePasswordReset": true,
|
||
|
"passwordlessType": 1
|
||
|
}`),
|
||
|
), org.LoginPolicyChangedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("org"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, allow_register, allow_username_password, allow_external_idps, force_mfa, passwordless_type, hide_password_reset) = ($1, $2, $3, $4, $5, $6, $7, $8) WHERE (aggregate_id = $9)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
true,
|
||
|
true,
|
||
|
true,
|
||
|
true,
|
||
|
domain.PasswordlessTypeAllowed,
|
||
|
true,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "org.reduceMFAAdded",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceMFAAdded,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(org.LoginPolicyMultiFactorAddedEventType),
|
||
|
org.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 1
|
||
|
}`),
|
||
|
), org.MultiFactorAddedEventEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("org"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, multi_factors) = ($1, $2, array_append(multi_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.MultiFactorTypeU2FWithPIN,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "org.reduceMFARemoved",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceMFARemoved,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(org.LoginPolicyMultiFactorRemovedEventType),
|
||
|
org.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 1
|
||
|
}`),
|
||
|
), org.MultiFactorRemovedEventEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("org"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, multi_factors) = ($1, $2, array_remove(multi_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.MultiFactorTypeU2FWithPIN,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "org.reduceLoginPolicyRemoved",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceLoginPolicyRemoved,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(org.LoginPolicyRemovedEventType),
|
||
|
org.AggregateType,
|
||
|
nil,
|
||
|
), org.LoginPolicyRemovedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("org"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "DELETE FROM zitadel.projections.login_policies WHERE (aggregate_id = $1)",
|
||
|
expectedArgs: []interface{}{
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "org.reduce2FAAdded",
|
||
|
reduce: (&LoginPolicyProjection{}).reduce2FAAdded,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(org.LoginPolicySecondFactorAddedEventType),
|
||
|
org.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 2
|
||
|
}`),
|
||
|
), org.SecondFactorAddedEventEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("org"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, second_factors) = ($1, $2, array_append(second_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.SecondFactorTypeU2F,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "org.reduce2FARemoved",
|
||
|
reduce: (&LoginPolicyProjection{}).reduce2FARemoved,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(org.LoginPolicySecondFactorRemovedEventType),
|
||
|
org.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 2
|
||
|
}`),
|
||
|
), org.SecondFactorRemovedEventEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("org"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, second_factors) = ($1, $2, array_remove(second_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.SecondFactorTypeU2F,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "iam.reduceLoginPolicyAdded",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceLoginPolicyAdded,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(iam.LoginPolicyAddedEventType),
|
||
|
iam.AggregateType,
|
||
|
[]byte(`{
|
||
|
"allowUsernamePassword": true,
|
||
|
"allowRegister": true,
|
||
|
"allowExternalIdp": false,
|
||
|
"forceMFA": false,
|
||
|
"hidePasswordReset": true,
|
||
|
"passwordlessType": 1
|
||
|
}`),
|
||
|
), iam.LoginPolicyAddedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("iam"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "INSERT INTO zitadel.projections.login_policies (aggregate_id, creation_date, change_date, sequence, allow_register, allow_username_password, allow_external_idps, force_mfa, passwordless_type, is_default, hide_password_reset) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11)",
|
||
|
expectedArgs: []interface{}{
|
||
|
"agg-id",
|
||
|
anyArg{},
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
true,
|
||
|
true,
|
||
|
false,
|
||
|
false,
|
||
|
domain.PasswordlessTypeAllowed,
|
||
|
true,
|
||
|
true,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "iam.reduceLoginPolicyChanged",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceLoginPolicyChanged,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(iam.LoginPolicyChangedEventType),
|
||
|
iam.AggregateType,
|
||
|
[]byte(`{
|
||
|
"allowUsernamePassword": true,
|
||
|
"allowRegister": true,
|
||
|
"allowExternalIdp": true,
|
||
|
"forceMFA": true,
|
||
|
"hidePasswordReset": true,
|
||
|
"passwordlessType": 1
|
||
|
}`),
|
||
|
), iam.LoginPolicyChangedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("iam"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, allow_register, allow_username_password, allow_external_idps, force_mfa, passwordless_type, hide_password_reset) = ($1, $2, $3, $4, $5, $6, $7, $8) WHERE (aggregate_id = $9)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
true,
|
||
|
true,
|
||
|
true,
|
||
|
true,
|
||
|
domain.PasswordlessTypeAllowed,
|
||
|
true,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "iam.reduceMFAAdded",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceMFAAdded,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(iam.LoginPolicyMultiFactorAddedEventType),
|
||
|
iam.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 1
|
||
|
}`),
|
||
|
), iam.MultiFactorAddedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("iam"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, multi_factors) = ($1, $2, array_append(multi_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.MultiFactorTypeU2FWithPIN,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "iam.reduceMFARemoved",
|
||
|
reduce: (&LoginPolicyProjection{}).reduceMFARemoved,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(iam.LoginPolicyMultiFactorRemovedEventType),
|
||
|
iam.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 1
|
||
|
}`),
|
||
|
), iam.MultiFactorRemovedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("iam"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, multi_factors) = ($1, $2, array_remove(multi_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.MultiFactorTypeU2FWithPIN,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "iam.reduce2FAAdded",
|
||
|
reduce: (&LoginPolicyProjection{}).reduce2FAAdded,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(iam.LoginPolicySecondFactorAddedEventType),
|
||
|
iam.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 2
|
||
|
}`),
|
||
|
), iam.SecondFactorAddedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("iam"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, second_factors) = ($1, $2, array_append(second_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.SecondFactorTypeU2F,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
name: "iam.reduce2FARemoved",
|
||
|
reduce: (&LoginPolicyProjection{}).reduce2FARemoved,
|
||
|
args: args{
|
||
|
event: getEvent(testEvent(
|
||
|
repository.EventType(iam.LoginPolicySecondFactorRemovedEventType),
|
||
|
iam.AggregateType,
|
||
|
[]byte(`{
|
||
|
"mfaType": 2
|
||
|
}`),
|
||
|
), iam.SecondFactorRemovedEventMapper),
|
||
|
},
|
||
|
want: wantReduce{
|
||
|
aggregateType: eventstore.AggregateType("iam"),
|
||
|
sequence: 15,
|
||
|
previousSequence: 10,
|
||
|
projection: LoginPolicyTable,
|
||
|
executer: &testExecuter{
|
||
|
executions: []execution{
|
||
|
{
|
||
|
expectedStmt: "UPDATE zitadel.projections.login_policies SET (change_date, sequence, second_factors) = ($1, $2, array_remove(second_factors, $3)) WHERE (aggregate_id = $4)",
|
||
|
expectedArgs: []interface{}{
|
||
|
anyArg{},
|
||
|
uint64(15),
|
||
|
domain.SecondFactorTypeU2F,
|
||
|
"agg-id",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
for _, tt := range tests {
|
||
|
t.Run(tt.name, func(t *testing.T) {
|
||
|
event := baseEvent(t)
|
||
|
got, err := tt.reduce(event)
|
||
|
if _, ok := err.(errors.InvalidArgument); !ok {
|
||
|
t.Errorf("no wrong event mapping: %v, got: %v", err, got)
|
||
|
}
|
||
|
|
||
|
event = tt.args.event(t)
|
||
|
got, err = tt.reduce(event)
|
||
|
assertReduce(t, got, err, tt.want)
|
||
|
})
|
||
|
}
|
||
|
}
|