mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-11 19:07:30 +00:00
chore!: Introduce ZITADEL v3 (#9645)
This PR summarizes multiple changes specifically only available with ZITADEL v3: - feat: Web Keys management (https://github.com/zitadel/zitadel/pull/9526) - fix(cmd): ensure proper working of mirror (https://github.com/zitadel/zitadel/pull/9509) - feat(Authz): system user support for permission check v2 (https://github.com/zitadel/zitadel/pull/9640) - chore(license): change from Apache to AGPL (https://github.com/zitadel/zitadel/pull/9597) - feat(console): list v2 sessions (https://github.com/zitadel/zitadel/pull/9539) - fix(console): add loginV2 feature flag (https://github.com/zitadel/zitadel/pull/9682) - fix(feature flags): allow reading "own" flags (https://github.com/zitadel/zitadel/pull/9649) - feat(console): add Actions V2 UI (https://github.com/zitadel/zitadel/pull/9591) BREAKING CHANGE - feat(webkey): migrate to v2beta API (https://github.com/zitadel/zitadel/pull/9445) - chore!: remove CockroachDB Support (https://github.com/zitadel/zitadel/pull/9444) - feat(actions): migrate to v2beta API (https://github.com/zitadel/zitadel/pull/9489) --------- Co-authored-by: Livio Spring <livio.a@gmail.com> Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com> Co-authored-by: Silvan <27845747+adlerhurst@users.noreply.github.com> Co-authored-by: Ramon <mail@conblem.me> Co-authored-by: Elio Bischof <elio@zitadel.com> Co-authored-by: Kenta Yamaguchi <56732734+KEY60228@users.noreply.github.com> Co-authored-by: Harsha Reddy <harsha.reddy@klaviyo.com> Co-authored-by: Livio Spring <livio@zitadel.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Iraq <66622793+kkrime@users.noreply.github.com> Co-authored-by: Florian Forster <florian@zitadel.com> Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: Max Peintner <peintnerm@gmail.com>
This commit is contained in:
@@ -26,8 +26,7 @@ var (
|
||||
` projections.authn_keys2.expiration,` +
|
||||
` projections.authn_keys2.type,` +
|
||||
` COUNT(*) OVER ()` +
|
||||
` FROM projections.authn_keys2` +
|
||||
` AS OF SYSTEM TIME '-1 ms'`
|
||||
` FROM projections.authn_keys2`
|
||||
prepareAuthNKeysCols = []string{
|
||||
"id",
|
||||
"creation_date",
|
||||
@@ -49,8 +48,7 @@ var (
|
||||
` projections.authn_keys2.identifier,` +
|
||||
` projections.authn_keys2.public_key,` +
|
||||
` COUNT(*) OVER ()` +
|
||||
` FROM projections.authn_keys2` +
|
||||
` AS OF SYSTEM TIME '-1 ms'`
|
||||
` FROM projections.authn_keys2`
|
||||
prepareAuthNKeysDataCols = []string{
|
||||
"id",
|
||||
"creation_date",
|
||||
@@ -71,8 +69,7 @@ var (
|
||||
` projections.authn_keys2.sequence,` +
|
||||
` projections.authn_keys2.expiration,` +
|
||||
` projections.authn_keys2.type` +
|
||||
` FROM projections.authn_keys2` +
|
||||
` AS OF SYSTEM TIME '-1 ms'`
|
||||
` FROM projections.authn_keys2`
|
||||
prepareAuthNKeyCols = []string{
|
||||
"id",
|
||||
"creation_date",
|
||||
@@ -84,8 +81,7 @@ var (
|
||||
}
|
||||
|
||||
prepareAuthNKeyPublicKeyStmt = `SELECT projections.authn_keys2.public_key` +
|
||||
` FROM projections.authn_keys2` +
|
||||
` AS OF SYSTEM TIME '-1 ms'`
|
||||
` FROM projections.authn_keys2`
|
||||
prepareAuthNKeyPublicKeyCols = []string{
|
||||
"public_key",
|
||||
}
|
||||
@@ -471,7 +467,7 @@ func Test_AuthNKeyPrepares(t *testing.T) {
|
||||
}
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err, defaultPrepareArgs...)
|
||||
assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err)
|
||||
})
|
||||
}
|
||||
}
|
||||
@@ -525,8 +521,7 @@ low2kyJov38V4Uk2I8kuXpLcnrpw5Tio2ooiUE27b0vHZqBKOei9Uo88qCrn3EKx
|
||||
execMock(t, tt.mock, func(db *sql.DB) {
|
||||
q := &Queries{
|
||||
client: &database.DB{
|
||||
DB: db,
|
||||
Database: &prepareDB{},
|
||||
DB: db,
|
||||
},
|
||||
}
|
||||
ctx := authz.NewMockContext("instanceID", "orgID", "userID")
|
||||
|
Reference in New Issue
Block a user