mirror of
https://github.com/zitadel/zitadel.git
synced 2025-05-30 02:38:21 +00:00
fix(machine): delete domain policy dependency and restructure functions (#4605)
* fix(machine): delete domain policy dependency and restructure functions * fix(machine): delete domain policy dependency and restructure functions * fix(machine): move check for username and name * fix: correct unit test for machine Co-authored-by: Livio Spring <livio.a@gmail.com>
This commit is contained in:
parent
27e7dc68a8
commit
71fb5c526f
@ -565,7 +565,7 @@ func (s *Server) importData(ctx context.Context, orgs []*admin_pb.DataOrg) (*adm
|
|||||||
if org.MachineUsers != nil {
|
if org.MachineUsers != nil {
|
||||||
for _, user := range org.GetMachineUsers() {
|
for _, user := range org.GetMachineUsers() {
|
||||||
logging.Debugf("import user: %s", user.GetUserId())
|
logging.Debugf("import user: %s", user.GetUserId())
|
||||||
_, err := s.command.AddMachineWithID(ctx, org.GetOrgId(), user.GetUserId(), management.AddMachineUserRequestToDomain(user.GetUser()))
|
_, err := s.command.AddMachine(ctx, management.AddMachineUserRequestToCommand(user.GetUser(), org.GetOrgId()))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errors = append(errors, &admin_pb.ImportDataError{Type: "machine_user", Id: user.GetUserId(), Message: err.Error()})
|
errors = append(errors, &admin_pb.ImportDataError{Type: "machine_user", Id: user.GetUserId(), Message: err.Error()})
|
||||||
if isCtxTimeout(ctx) {
|
if isCtxTimeout(ctx) {
|
||||||
|
@ -271,17 +271,14 @@ func (s *Server) ImportHumanUser(ctx context.Context, req *mgmt_pb.ImportHumanUs
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) AddMachineUser(ctx context.Context, req *mgmt_pb.AddMachineUserRequest) (*mgmt_pb.AddMachineUserResponse, error) {
|
func (s *Server) AddMachineUser(ctx context.Context, req *mgmt_pb.AddMachineUserRequest) (*mgmt_pb.AddMachineUserResponse, error) {
|
||||||
machine, err := s.command.AddMachine(ctx, authz.GetCtxData(ctx).OrgID, AddMachineUserRequestToDomain(req))
|
machine := AddMachineUserRequestToCommand(req, authz.GetCtxData(ctx).OrgID)
|
||||||
|
objectDetails, err := s.command.AddMachine(ctx, machine)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &mgmt_pb.AddMachineUserResponse{
|
return &mgmt_pb.AddMachineUserResponse{
|
||||||
UserId: machine.AggregateID,
|
UserId: machine.AggregateID,
|
||||||
Details: obj_grpc.AddToDetailsPb(
|
Details: obj_grpc.DomainToChangeDetailsPb(objectDetails),
|
||||||
machine.Sequence,
|
|
||||||
machine.ChangeDate,
|
|
||||||
machine.ResourceOwner,
|
|
||||||
),
|
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -682,16 +679,13 @@ func (s *Server) RemoveHumanPasswordless(ctx context.Context, req *mgmt_pb.Remov
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) UpdateMachine(ctx context.Context, req *mgmt_pb.UpdateMachineRequest) (*mgmt_pb.UpdateMachineResponse, error) {
|
func (s *Server) UpdateMachine(ctx context.Context, req *mgmt_pb.UpdateMachineRequest) (*mgmt_pb.UpdateMachineResponse, error) {
|
||||||
machine, err := s.command.ChangeMachine(ctx, UpdateMachineRequestToDomain(ctx, req))
|
machine := UpdateMachineRequestToCommand(req, authz.GetCtxData(ctx).OrgID)
|
||||||
|
objectDetails, err := s.command.ChangeMachine(ctx, machine)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &mgmt_pb.UpdateMachineResponse{
|
return &mgmt_pb.UpdateMachineResponse{
|
||||||
Details: obj_grpc.ChangeToDetailsPb(
|
Details: obj_grpc.DomainToChangeDetailsPb(objectDetails),
|
||||||
machine.Sequence,
|
|
||||||
machine.ChangeDate,
|
|
||||||
machine.ResourceOwner,
|
|
||||||
),
|
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -7,6 +7,7 @@ import (
|
|||||||
"github.com/zitadel/logging"
|
"github.com/zitadel/logging"
|
||||||
"golang.org/x/text/language"
|
"golang.org/x/text/language"
|
||||||
|
|
||||||
|
"github.com/zitadel/zitadel/internal/command"
|
||||||
"github.com/zitadel/zitadel/pkg/grpc/user"
|
"github.com/zitadel/zitadel/pkg/grpc/user"
|
||||||
|
|
||||||
"github.com/zitadel/zitadel/internal/api/authz"
|
"github.com/zitadel/zitadel/internal/api/authz"
|
||||||
@ -156,8 +157,11 @@ func ImportHumanUserRequestToDomain(req *mgmt_pb.ImportHumanUserRequest) (human
|
|||||||
return human, req.RequestPasswordlessRegistration
|
return human, req.RequestPasswordlessRegistration
|
||||||
}
|
}
|
||||||
|
|
||||||
func AddMachineUserRequestToDomain(req *mgmt_pb.AddMachineUserRequest) *domain.Machine {
|
func AddMachineUserRequestToCommand(req *mgmt_pb.AddMachineUserRequest, resourceowner string) *command.Machine {
|
||||||
return &domain.Machine{
|
return &command.Machine{
|
||||||
|
ObjectRoot: models.ObjectRoot{
|
||||||
|
ResourceOwner: resourceowner,
|
||||||
|
},
|
||||||
Username: req.UserName,
|
Username: req.UserName,
|
||||||
Name: req.Name,
|
Name: req.Name,
|
||||||
Description: req.Description,
|
Description: req.Description,
|
||||||
@ -208,11 +212,11 @@ func notifyTypeToDomain(state mgmt_pb.SendHumanResetPasswordNotificationRequest_
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func UpdateMachineRequestToDomain(ctx context.Context, req *mgmt_pb.UpdateMachineRequest) *domain.Machine {
|
func UpdateMachineRequestToCommand(req *mgmt_pb.UpdateMachineRequest, orgID string) *command.Machine {
|
||||||
return &domain.Machine{
|
return &command.Machine{
|
||||||
ObjectRoot: models.ObjectRoot{
|
ObjectRoot: models.ObjectRoot{
|
||||||
AggregateID: req.UserId,
|
AggregateID: req.UserId,
|
||||||
ResourceOwner: authz.GetCtxData(ctx).OrgID,
|
ResourceOwner: orgID,
|
||||||
},
|
},
|
||||||
Name: req.Name,
|
Name: req.Name,
|
||||||
Description: req.Description,
|
Description: req.Description,
|
||||||
|
@ -2,108 +2,148 @@ package command
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
|
||||||
|
"github.com/zitadel/zitadel/internal/command/preparation"
|
||||||
"github.com/zitadel/zitadel/internal/domain"
|
"github.com/zitadel/zitadel/internal/domain"
|
||||||
caos_errs "github.com/zitadel/zitadel/internal/errors"
|
caos_errs "github.com/zitadel/zitadel/internal/errors"
|
||||||
|
"github.com/zitadel/zitadel/internal/eventstore"
|
||||||
|
"github.com/zitadel/zitadel/internal/eventstore/v1/models"
|
||||||
"github.com/zitadel/zitadel/internal/repository/user"
|
"github.com/zitadel/zitadel/internal/repository/user"
|
||||||
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func (c *Commands) AddMachine(ctx context.Context, orgID string, machine *domain.Machine) (*domain.Machine, error) {
|
type Machine struct {
|
||||||
if !machine.IsValid() {
|
models.ObjectRoot
|
||||||
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-bm9Ds", "Errors.User.Invalid")
|
|
||||||
|
Username string
|
||||||
|
Name string
|
||||||
|
Description string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *Machine) content() error {
|
||||||
|
if m.ResourceOwner == "" {
|
||||||
|
return caos_errs.ThrowInvalidArgument(nil, "COMMAND-xiown2", "Errors.ResourceOwnerMissing")
|
||||||
}
|
}
|
||||||
domainPolicy, err := c.getOrgDomainPolicy(ctx, orgID)
|
if m.AggregateID == "" {
|
||||||
|
return caos_errs.ThrowInvalidArgument(nil, "COMMAND-p0p2mi", "Errors.User.UserIDMissing")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Commands) AddMachine(ctx context.Context, machine *Machine) (*domain.ObjectDetails, error) {
|
||||||
|
if machine.AggregateID == "" {
|
||||||
|
userID, err := c.idGenerator.Next()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
machine.AggregateID = userID
|
||||||
|
}
|
||||||
|
domainPolicy, err := c.getOrgDomainPolicy(ctx, machine.ResourceOwner)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, caos_errs.ThrowPreconditionFailed(err, "COMMAND-3M9fs", "Errors.Org.DomainPolicy.NotFound")
|
return nil, caos_errs.ThrowPreconditionFailed(err, "COMMAND-3M9fs", "Errors.Org.DomainPolicy.NotFound")
|
||||||
}
|
}
|
||||||
userID, err := c.idGenerator.Next()
|
|
||||||
|
validation := prepareAddUserMachine(machine, domainPolicy)
|
||||||
|
cmds, err := preparation.PrepareCommands(ctx, c.eventstore.Filter, validation)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return c.addMachineWithID(ctx, orgID, userID, machine, domainPolicy)
|
events, err := c.eventstore.Push(ctx, cmds...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &domain.ObjectDetails{
|
||||||
|
Sequence: events[len(events)-1].Sequence(),
|
||||||
|
EventDate: events[len(events)-1].CreationDate(),
|
||||||
|
ResourceOwner: events[len(events)-1].Aggregate().ResourceOwner,
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Commands) AddMachineWithID(ctx context.Context, orgID string, userID string, machine *domain.Machine) (*domain.Machine, error) {
|
func prepareAddUserMachine(machine *Machine, domainPolicy *domain.DomainPolicy) preparation.Validation {
|
||||||
existingMachine, err := c.machineWriteModelByID(ctx, userID, orgID)
|
return func() (_ preparation.CreateCommands, err error) {
|
||||||
if err != nil {
|
if err := machine.content(); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
}
|
||||||
|
if machine.Name == "" {
|
||||||
|
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-bs9Ds", "Errors.User.Invalid")
|
||||||
|
}
|
||||||
|
if machine.Username == "" {
|
||||||
|
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-bm9Ds", "Errors.User.Invalid")
|
||||||
|
}
|
||||||
|
return func(ctx context.Context, filter preparation.FilterToQueryReducer) ([]eventstore.Command, error) {
|
||||||
|
writeModel, err := getMachineWriteModelByID(ctx, filter, machine.AggregateID, machine.ResourceOwner)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if isUserStateExists(writeModel.UserState) {
|
||||||
|
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-k2una", "Errors.User.AlreadyExisting")
|
||||||
|
}
|
||||||
|
return []eventstore.Command{
|
||||||
|
user.NewMachineAddedEvent(
|
||||||
|
ctx,
|
||||||
|
UserAggregateFromWriteModel(&writeModel.WriteModel),
|
||||||
|
machine.Username,
|
||||||
|
machine.Name,
|
||||||
|
machine.Description,
|
||||||
|
domainPolicy.UserLoginMustBeDomain,
|
||||||
|
),
|
||||||
|
}, nil
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
if isUserStateExists(existingMachine.UserState) {
|
|
||||||
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-k2una", "Errors.User.AlreadyExisting")
|
|
||||||
}
|
|
||||||
domainPolicy, err := c.getOrgDomainPolicy(ctx, orgID)
|
|
||||||
if err != nil {
|
|
||||||
return nil, caos_errs.ThrowPreconditionFailed(err, "COMMAND-3M9fs", "Errors.Org.DomainPolicy.NotFound")
|
|
||||||
}
|
|
||||||
if !domainPolicy.UserLoginMustBeDomain {
|
|
||||||
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-6M0dd", "Errors.User.Invalid")
|
|
||||||
}
|
|
||||||
return c.addMachineWithID(ctx, orgID, userID, machine, domainPolicy)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Commands) addMachineWithID(ctx context.Context, orgID string, userID string, machine *domain.Machine, domainPolicy *domain.DomainPolicy) (*domain.Machine, error) {
|
func (c *Commands) ChangeMachine(ctx context.Context, machine *Machine) (*domain.ObjectDetails, error) {
|
||||||
|
validation := prepareChangeUserMachine(machine)
|
||||||
machine.AggregateID = userID
|
cmds, err := preparation.PrepareCommands(ctx, c.eventstore.Filter, validation)
|
||||||
addedMachine := NewMachineWriteModel(machine.AggregateID, orgID)
|
|
||||||
userAgg := UserAggregateFromWriteModel(&addedMachine.WriteModel)
|
|
||||||
events, err := c.eventstore.Push(ctx, user.NewMachineAddedEvent(
|
|
||||||
ctx,
|
|
||||||
userAgg,
|
|
||||||
machine.Username,
|
|
||||||
machine.Name,
|
|
||||||
machine.Description,
|
|
||||||
domainPolicy.UserLoginMustBeDomain,
|
|
||||||
))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
err = AppendAndReduce(addedMachine, events...)
|
events, err := c.eventstore.Push(ctx, cmds...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return writeModelToMachine(addedMachine), nil
|
return &domain.ObjectDetails{
|
||||||
|
Sequence: events[len(events)-1].Sequence(),
|
||||||
|
EventDate: events[len(events)-1].CreationDate(),
|
||||||
|
ResourceOwner: events[len(events)-1].Aggregate().ResourceOwner,
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Commands) ChangeMachine(ctx context.Context, machine *domain.Machine) (*domain.Machine, error) {
|
func prepareChangeUserMachine(machine *Machine) preparation.Validation {
|
||||||
existingMachine, err := c.machineWriteModelByID(ctx, machine.AggregateID, machine.ResourceOwner)
|
return func() (_ preparation.CreateCommands, err error) {
|
||||||
if err != nil {
|
if err := machine.content(); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if !isUserStateExists(existingMachine.UserState) {
|
return func(ctx context.Context, filter preparation.FilterToQueryReducer) ([]eventstore.Command, error) {
|
||||||
return nil, caos_errs.ThrowNotFound(nil, "COMMAND-5M0od", "Errors.User.NotFound")
|
writeModel, err := getMachineWriteModelByID(ctx, filter, machine.AggregateID, machine.ResourceOwner)
|
||||||
}
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !isUserStateExists(writeModel.UserState) {
|
||||||
|
return nil, caos_errs.ThrowNotFound(nil, "COMMAND-5M0od", "Errors.User.NotFound")
|
||||||
|
}
|
||||||
|
|
||||||
userAgg := UserAggregateFromWriteModel(&existingMachine.WriteModel)
|
event, hasChanged, err := writeModel.NewChangedEvent(ctx, UserAggregateFromWriteModel(&writeModel.WriteModel), machine.Name, machine.Description)
|
||||||
changedEvent, hasChanged, err := existingMachine.NewChangedEvent(ctx, userAgg, machine.Name, machine.Description)
|
if err != nil {
|
||||||
if err != nil {
|
return nil, err
|
||||||
return nil, err
|
}
|
||||||
}
|
if !hasChanged {
|
||||||
if !hasChanged {
|
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-2n8vs", "Errors.User.NotChanged")
|
||||||
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-2n8vs", "Errors.User.NotChanged")
|
}
|
||||||
}
|
|
||||||
|
|
||||||
events, err := c.eventstore.Push(ctx, changedEvent)
|
return []eventstore.Command{
|
||||||
if err != nil {
|
event,
|
||||||
return nil, err
|
}, nil
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
err = AppendAndReduce(existingMachine, events...)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return writeModelToMachine(existingMachine), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Commands) machineWriteModelByID(ctx context.Context, userID, resourceOwner string) (writeModel *MachineWriteModel, err error) {
|
func getMachineWriteModelByID(ctx context.Context, filter preparation.FilterToQueryReducer, userID, resourceOwner string) (_ *MachineWriteModel, err error) {
|
||||||
if userID == "" {
|
writeModel := NewMachineWriteModel(userID, resourceOwner)
|
||||||
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-0Plof", "Errors.User.UserIDMissing")
|
events, err := filter(ctx, writeModel.Query())
|
||||||
}
|
|
||||||
ctx, span := tracing.NewSpan(ctx)
|
|
||||||
defer func() { span.EndWithError(err) }()
|
|
||||||
|
|
||||||
writeModel = NewMachineWriteModel(userID, resourceOwner)
|
|
||||||
err = c.eventstore.FilterToQueryReducer(ctx, writeModel)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return writeModel, nil
|
writeModel.AppendEvents(events...)
|
||||||
|
err = writeModel.Reduce()
|
||||||
|
return writeModel, err
|
||||||
}
|
}
|
||||||
|
@ -24,11 +24,10 @@ func TestCommandSide_AddMachine(t *testing.T) {
|
|||||||
}
|
}
|
||||||
type args struct {
|
type args struct {
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
orgID string
|
machine *Machine
|
||||||
machine *domain.Machine
|
|
||||||
}
|
}
|
||||||
type res struct {
|
type res struct {
|
||||||
want *domain.Machine
|
want *domain.ObjectDetails
|
||||||
err func(error) bool
|
err func(error) bool
|
||||||
}
|
}
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
@ -38,16 +37,29 @@ func TestCommandSide_AddMachine(t *testing.T) {
|
|||||||
res res
|
res res
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "user invalid, invalid argument error",
|
name: "user invalid, invalid argument error name",
|
||||||
fields: fields{
|
fields: fields{
|
||||||
eventstore: eventstoreExpect(
|
eventstore: eventstoreExpect(
|
||||||
t,
|
t,
|
||||||
|
expectFilter(
|
||||||
|
eventFromEventPusher(
|
||||||
|
org.NewDomainPolicyAddedEvent(context.Background(),
|
||||||
|
&user.NewAggregate("user1", "org1").Aggregate,
|
||||||
|
true,
|
||||||
|
true,
|
||||||
|
true,
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
),
|
),
|
||||||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
|
||||||
},
|
},
|
||||||
args: args{
|
args: args{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
orgID: "org1",
|
machine: &Machine{
|
||||||
machine: &domain.Machine{
|
ObjectRoot: models.ObjectRoot{
|
||||||
|
ResourceOwner: "org1",
|
||||||
|
},
|
||||||
Username: "username",
|
Username: "username",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -55,6 +67,37 @@ func TestCommandSide_AddMachine(t *testing.T) {
|
|||||||
err: caos_errs.IsErrorInvalidArgument,
|
err: caos_errs.IsErrorInvalidArgument,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "user invalid, invalid argument error username",
|
||||||
|
fields: fields{
|
||||||
|
eventstore: eventstoreExpect(
|
||||||
|
t,
|
||||||
|
expectFilter(
|
||||||
|
eventFromEventPusher(
|
||||||
|
org.NewDomainPolicyAddedEvent(context.Background(),
|
||||||
|
&user.NewAggregate("user1", "org1").Aggregate,
|
||||||
|
true,
|
||||||
|
true,
|
||||||
|
true,
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
|
||||||
|
},
|
||||||
|
args: args{
|
||||||
|
ctx: context.Background(),
|
||||||
|
machine: &Machine{
|
||||||
|
ObjectRoot: models.ObjectRoot{
|
||||||
|
ResourceOwner: "org1",
|
||||||
|
},
|
||||||
|
Name: "name",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
res: res{
|
||||||
|
err: caos_errs.IsErrorInvalidArgument,
|
||||||
|
},
|
||||||
|
},
|
||||||
{
|
{
|
||||||
name: "org policy not found, precondition error",
|
name: "org policy not found, precondition error",
|
||||||
fields: fields{
|
fields: fields{
|
||||||
@ -63,13 +106,16 @@ func TestCommandSide_AddMachine(t *testing.T) {
|
|||||||
expectFilter(),
|
expectFilter(),
|
||||||
expectFilter(),
|
expectFilter(),
|
||||||
),
|
),
|
||||||
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
|
||||||
},
|
},
|
||||||
args: args{
|
args: args{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
orgID: "org1",
|
machine: &Machine{
|
||||||
machine: &domain.Machine{
|
ObjectRoot: models.ObjectRoot{
|
||||||
Username: "username",
|
ResourceOwner: "org1",
|
||||||
|
},
|
||||||
Name: "name",
|
Name: "name",
|
||||||
|
Username: "username",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
res: res{
|
res: res{
|
||||||
@ -91,6 +137,7 @@ func TestCommandSide_AddMachine(t *testing.T) {
|
|||||||
),
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
|
expectFilter(),
|
||||||
expectPush(
|
expectPush(
|
||||||
[]*repository.Event{
|
[]*repository.Event{
|
||||||
eventFromEventPusher(
|
eventFromEventPusher(
|
||||||
@ -109,24 +156,19 @@ func TestCommandSide_AddMachine(t *testing.T) {
|
|||||||
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
|
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
|
||||||
},
|
},
|
||||||
args: args{
|
args: args{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
orgID: "org1",
|
machine: &Machine{
|
||||||
machine: &domain.Machine{
|
ObjectRoot: models.ObjectRoot{
|
||||||
Username: "username",
|
ResourceOwner: "org1",
|
||||||
|
},
|
||||||
Description: "description",
|
Description: "description",
|
||||||
Name: "name",
|
Name: "name",
|
||||||
|
Username: "username",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
res: res{
|
res: res{
|
||||||
want: &domain.Machine{
|
want: &domain.ObjectDetails{
|
||||||
ObjectRoot: models.ObjectRoot{
|
ResourceOwner: "org1",
|
||||||
AggregateID: "user1",
|
|
||||||
ResourceOwner: "org1",
|
|
||||||
},
|
|
||||||
Username: "username",
|
|
||||||
Name: "name",
|
|
||||||
Description: "description",
|
|
||||||
State: domain.UserStateActive,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -137,7 +179,7 @@ func TestCommandSide_AddMachine(t *testing.T) {
|
|||||||
eventstore: tt.fields.eventstore,
|
eventstore: tt.fields.eventstore,
|
||||||
idGenerator: tt.fields.idGenerator,
|
idGenerator: tt.fields.idGenerator,
|
||||||
}
|
}
|
||||||
got, err := r.AddMachine(tt.args.ctx, tt.args.orgID, tt.args.machine)
|
got, err := r.AddMachine(tt.args.ctx, tt.args.machine)
|
||||||
if tt.res.err == nil {
|
if tt.res.err == nil {
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
}
|
}
|
||||||
@ -157,11 +199,10 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
|
|||||||
}
|
}
|
||||||
type args struct {
|
type args struct {
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
orgID string
|
machine *Machine
|
||||||
machine *domain.Machine
|
|
||||||
}
|
}
|
||||||
type res struct {
|
type res struct {
|
||||||
want *domain.Machine
|
want *domain.ObjectDetails
|
||||||
err func(error) bool
|
err func(error) bool
|
||||||
}
|
}
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
@ -178,9 +219,11 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
|
|||||||
),
|
),
|
||||||
},
|
},
|
||||||
args: args{
|
args: args{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
orgID: "org1",
|
machine: &Machine{
|
||||||
machine: &domain.Machine{
|
ObjectRoot: models.ObjectRoot{
|
||||||
|
ResourceOwner: "org1",
|
||||||
|
},
|
||||||
Username: "username",
|
Username: "username",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -197,14 +240,14 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
|
|||||||
),
|
),
|
||||||
},
|
},
|
||||||
args: args{
|
args: args{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
orgID: "org1",
|
machine: &Machine{
|
||||||
machine: &domain.Machine{
|
|
||||||
ObjectRoot: models.ObjectRoot{
|
ObjectRoot: models.ObjectRoot{
|
||||||
AggregateID: "user1",
|
ResourceOwner: "org1",
|
||||||
|
AggregateID: "user1",
|
||||||
},
|
},
|
||||||
Username: "username",
|
|
||||||
Name: "name",
|
Name: "name",
|
||||||
|
Username: "username",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
res: res{
|
res: res{
|
||||||
@ -230,11 +273,11 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
|
|||||||
),
|
),
|
||||||
},
|
},
|
||||||
args: args{
|
args: args{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
orgID: "org1",
|
machine: &Machine{
|
||||||
machine: &domain.Machine{
|
|
||||||
ObjectRoot: models.ObjectRoot{
|
ObjectRoot: models.ObjectRoot{
|
||||||
AggregateID: "user1",
|
ResourceOwner: "org1",
|
||||||
|
AggregateID: "user1",
|
||||||
},
|
},
|
||||||
Name: "name",
|
Name: "name",
|
||||||
Description: "description",
|
Description: "description",
|
||||||
@ -270,26 +313,19 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
|
|||||||
),
|
),
|
||||||
},
|
},
|
||||||
args: args{
|
args: args{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
orgID: "org1",
|
machine: &Machine{
|
||||||
machine: &domain.Machine{
|
|
||||||
ObjectRoot: models.ObjectRoot{
|
ObjectRoot: models.ObjectRoot{
|
||||||
AggregateID: "user1",
|
ResourceOwner: "org1",
|
||||||
|
AggregateID: "user1",
|
||||||
},
|
},
|
||||||
Description: "description1",
|
|
||||||
Name: "name1",
|
Name: "name1",
|
||||||
|
Description: "description1",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
res: res{
|
res: res{
|
||||||
want: &domain.Machine{
|
want: &domain.ObjectDetails{
|
||||||
ObjectRoot: models.ObjectRoot{
|
ResourceOwner: "org1",
|
||||||
AggregateID: "user1",
|
|
||||||
ResourceOwner: "org1",
|
|
||||||
},
|
|
||||||
Username: "username",
|
|
||||||
Name: "name1",
|
|
||||||
Description: "description1",
|
|
||||||
State: domain.UserStateActive,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user