fix(machine): delete domain policy dependency and restructure functions (#4605)

* fix(machine): delete domain policy dependency and restructure functions

* fix(machine): delete domain policy dependency and restructure functions

* fix(machine): move check for username and name

* fix: correct unit test for machine

Co-authored-by: Livio Spring <livio.a@gmail.com>
This commit is contained in:
Stefan Benz 2022-10-26 09:39:56 +01:00 committed by GitHub
parent 27e7dc68a8
commit 71fb5c526f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 218 additions and 144 deletions

View File

@ -565,7 +565,7 @@ func (s *Server) importData(ctx context.Context, orgs []*admin_pb.DataOrg) (*adm
if org.MachineUsers != nil { if org.MachineUsers != nil {
for _, user := range org.GetMachineUsers() { for _, user := range org.GetMachineUsers() {
logging.Debugf("import user: %s", user.GetUserId()) logging.Debugf("import user: %s", user.GetUserId())
_, err := s.command.AddMachineWithID(ctx, org.GetOrgId(), user.GetUserId(), management.AddMachineUserRequestToDomain(user.GetUser())) _, err := s.command.AddMachine(ctx, management.AddMachineUserRequestToCommand(user.GetUser(), org.GetOrgId()))
if err != nil { if err != nil {
errors = append(errors, &admin_pb.ImportDataError{Type: "machine_user", Id: user.GetUserId(), Message: err.Error()}) errors = append(errors, &admin_pb.ImportDataError{Type: "machine_user", Id: user.GetUserId(), Message: err.Error()})
if isCtxTimeout(ctx) { if isCtxTimeout(ctx) {

View File

@ -271,17 +271,14 @@ func (s *Server) ImportHumanUser(ctx context.Context, req *mgmt_pb.ImportHumanUs
} }
func (s *Server) AddMachineUser(ctx context.Context, req *mgmt_pb.AddMachineUserRequest) (*mgmt_pb.AddMachineUserResponse, error) { func (s *Server) AddMachineUser(ctx context.Context, req *mgmt_pb.AddMachineUserRequest) (*mgmt_pb.AddMachineUserResponse, error) {
machine, err := s.command.AddMachine(ctx, authz.GetCtxData(ctx).OrgID, AddMachineUserRequestToDomain(req)) machine := AddMachineUserRequestToCommand(req, authz.GetCtxData(ctx).OrgID)
objectDetails, err := s.command.AddMachine(ctx, machine)
if err != nil { if err != nil {
return nil, err return nil, err
} }
return &mgmt_pb.AddMachineUserResponse{ return &mgmt_pb.AddMachineUserResponse{
UserId: machine.AggregateID, UserId: machine.AggregateID,
Details: obj_grpc.AddToDetailsPb( Details: obj_grpc.DomainToChangeDetailsPb(objectDetails),
machine.Sequence,
machine.ChangeDate,
machine.ResourceOwner,
),
}, nil }, nil
} }
@ -682,16 +679,13 @@ func (s *Server) RemoveHumanPasswordless(ctx context.Context, req *mgmt_pb.Remov
} }
func (s *Server) UpdateMachine(ctx context.Context, req *mgmt_pb.UpdateMachineRequest) (*mgmt_pb.UpdateMachineResponse, error) { func (s *Server) UpdateMachine(ctx context.Context, req *mgmt_pb.UpdateMachineRequest) (*mgmt_pb.UpdateMachineResponse, error) {
machine, err := s.command.ChangeMachine(ctx, UpdateMachineRequestToDomain(ctx, req)) machine := UpdateMachineRequestToCommand(req, authz.GetCtxData(ctx).OrgID)
objectDetails, err := s.command.ChangeMachine(ctx, machine)
if err != nil { if err != nil {
return nil, err return nil, err
} }
return &mgmt_pb.UpdateMachineResponse{ return &mgmt_pb.UpdateMachineResponse{
Details: obj_grpc.ChangeToDetailsPb( Details: obj_grpc.DomainToChangeDetailsPb(objectDetails),
machine.Sequence,
machine.ChangeDate,
machine.ResourceOwner,
),
}, nil }, nil
} }

View File

@ -7,6 +7,7 @@ import (
"github.com/zitadel/logging" "github.com/zitadel/logging"
"golang.org/x/text/language" "golang.org/x/text/language"
"github.com/zitadel/zitadel/internal/command"
"github.com/zitadel/zitadel/pkg/grpc/user" "github.com/zitadel/zitadel/pkg/grpc/user"
"github.com/zitadel/zitadel/internal/api/authz" "github.com/zitadel/zitadel/internal/api/authz"
@ -156,8 +157,11 @@ func ImportHumanUserRequestToDomain(req *mgmt_pb.ImportHumanUserRequest) (human
return human, req.RequestPasswordlessRegistration return human, req.RequestPasswordlessRegistration
} }
func AddMachineUserRequestToDomain(req *mgmt_pb.AddMachineUserRequest) *domain.Machine { func AddMachineUserRequestToCommand(req *mgmt_pb.AddMachineUserRequest, resourceowner string) *command.Machine {
return &domain.Machine{ return &command.Machine{
ObjectRoot: models.ObjectRoot{
ResourceOwner: resourceowner,
},
Username: req.UserName, Username: req.UserName,
Name: req.Name, Name: req.Name,
Description: req.Description, Description: req.Description,
@ -208,11 +212,11 @@ func notifyTypeToDomain(state mgmt_pb.SendHumanResetPasswordNotificationRequest_
} }
} }
func UpdateMachineRequestToDomain(ctx context.Context, req *mgmt_pb.UpdateMachineRequest) *domain.Machine { func UpdateMachineRequestToCommand(req *mgmt_pb.UpdateMachineRequest, orgID string) *command.Machine {
return &domain.Machine{ return &command.Machine{
ObjectRoot: models.ObjectRoot{ ObjectRoot: models.ObjectRoot{
AggregateID: req.UserId, AggregateID: req.UserId,
ResourceOwner: authz.GetCtxData(ctx).OrgID, ResourceOwner: orgID,
}, },
Name: req.Name, Name: req.Name,
Description: req.Description, Description: req.Description,

View File

@ -2,108 +2,148 @@ package command
import ( import (
"context" "context"
"github.com/zitadel/zitadel/internal/command/preparation"
"github.com/zitadel/zitadel/internal/domain" "github.com/zitadel/zitadel/internal/domain"
caos_errs "github.com/zitadel/zitadel/internal/errors" caos_errs "github.com/zitadel/zitadel/internal/errors"
"github.com/zitadel/zitadel/internal/eventstore"
"github.com/zitadel/zitadel/internal/eventstore/v1/models"
"github.com/zitadel/zitadel/internal/repository/user" "github.com/zitadel/zitadel/internal/repository/user"
"github.com/zitadel/zitadel/internal/telemetry/tracing"
) )
func (c *Commands) AddMachine(ctx context.Context, orgID string, machine *domain.Machine) (*domain.Machine, error) { type Machine struct {
if !machine.IsValid() { models.ObjectRoot
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-bm9Ds", "Errors.User.Invalid")
Username string
Name string
Description string
}
func (m *Machine) content() error {
if m.ResourceOwner == "" {
return caos_errs.ThrowInvalidArgument(nil, "COMMAND-xiown2", "Errors.ResourceOwnerMissing")
} }
domainPolicy, err := c.getOrgDomainPolicy(ctx, orgID) if m.AggregateID == "" {
return caos_errs.ThrowInvalidArgument(nil, "COMMAND-p0p2mi", "Errors.User.UserIDMissing")
}
return nil
}
func (c *Commands) AddMachine(ctx context.Context, machine *Machine) (*domain.ObjectDetails, error) {
if machine.AggregateID == "" {
userID, err := c.idGenerator.Next()
if err != nil {
return nil, err
}
machine.AggregateID = userID
}
domainPolicy, err := c.getOrgDomainPolicy(ctx, machine.ResourceOwner)
if err != nil { if err != nil {
return nil, caos_errs.ThrowPreconditionFailed(err, "COMMAND-3M9fs", "Errors.Org.DomainPolicy.NotFound") return nil, caos_errs.ThrowPreconditionFailed(err, "COMMAND-3M9fs", "Errors.Org.DomainPolicy.NotFound")
} }
userID, err := c.idGenerator.Next()
validation := prepareAddUserMachine(machine, domainPolicy)
cmds, err := preparation.PrepareCommands(ctx, c.eventstore.Filter, validation)
if err != nil { if err != nil {
return nil, err return nil, err
} }
return c.addMachineWithID(ctx, orgID, userID, machine, domainPolicy) events, err := c.eventstore.Push(ctx, cmds...)
if err != nil {
return nil, err
}
return &domain.ObjectDetails{
Sequence: events[len(events)-1].Sequence(),
EventDate: events[len(events)-1].CreationDate(),
ResourceOwner: events[len(events)-1].Aggregate().ResourceOwner,
}, nil
} }
func (c *Commands) AddMachineWithID(ctx context.Context, orgID string, userID string, machine *domain.Machine) (*domain.Machine, error) { func prepareAddUserMachine(machine *Machine, domainPolicy *domain.DomainPolicy) preparation.Validation {
existingMachine, err := c.machineWriteModelByID(ctx, userID, orgID) return func() (_ preparation.CreateCommands, err error) {
if err != nil { if err := machine.content(); err != nil {
return nil, err return nil, err
}
if machine.Name == "" {
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-bs9Ds", "Errors.User.Invalid")
}
if machine.Username == "" {
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-bm9Ds", "Errors.User.Invalid")
}
return func(ctx context.Context, filter preparation.FilterToQueryReducer) ([]eventstore.Command, error) {
writeModel, err := getMachineWriteModelByID(ctx, filter, machine.AggregateID, machine.ResourceOwner)
if err != nil {
return nil, err
}
if isUserStateExists(writeModel.UserState) {
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-k2una", "Errors.User.AlreadyExisting")
}
return []eventstore.Command{
user.NewMachineAddedEvent(
ctx,
UserAggregateFromWriteModel(&writeModel.WriteModel),
machine.Username,
machine.Name,
machine.Description,
domainPolicy.UserLoginMustBeDomain,
),
}, nil
}, nil
} }
if isUserStateExists(existingMachine.UserState) {
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-k2una", "Errors.User.AlreadyExisting")
}
domainPolicy, err := c.getOrgDomainPolicy(ctx, orgID)
if err != nil {
return nil, caos_errs.ThrowPreconditionFailed(err, "COMMAND-3M9fs", "Errors.Org.DomainPolicy.NotFound")
}
if !domainPolicy.UserLoginMustBeDomain {
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-6M0dd", "Errors.User.Invalid")
}
return c.addMachineWithID(ctx, orgID, userID, machine, domainPolicy)
} }
func (c *Commands) addMachineWithID(ctx context.Context, orgID string, userID string, machine *domain.Machine, domainPolicy *domain.DomainPolicy) (*domain.Machine, error) { func (c *Commands) ChangeMachine(ctx context.Context, machine *Machine) (*domain.ObjectDetails, error) {
validation := prepareChangeUserMachine(machine)
machine.AggregateID = userID cmds, err := preparation.PrepareCommands(ctx, c.eventstore.Filter, validation)
addedMachine := NewMachineWriteModel(machine.AggregateID, orgID)
userAgg := UserAggregateFromWriteModel(&addedMachine.WriteModel)
events, err := c.eventstore.Push(ctx, user.NewMachineAddedEvent(
ctx,
userAgg,
machine.Username,
machine.Name,
machine.Description,
domainPolicy.UserLoginMustBeDomain,
))
if err != nil { if err != nil {
return nil, err return nil, err
} }
err = AppendAndReduce(addedMachine, events...) events, err := c.eventstore.Push(ctx, cmds...)
if err != nil { if err != nil {
return nil, err return nil, err
} }
return writeModelToMachine(addedMachine), nil return &domain.ObjectDetails{
Sequence: events[len(events)-1].Sequence(),
EventDate: events[len(events)-1].CreationDate(),
ResourceOwner: events[len(events)-1].Aggregate().ResourceOwner,
}, nil
} }
func (c *Commands) ChangeMachine(ctx context.Context, machine *domain.Machine) (*domain.Machine, error) { func prepareChangeUserMachine(machine *Machine) preparation.Validation {
existingMachine, err := c.machineWriteModelByID(ctx, machine.AggregateID, machine.ResourceOwner) return func() (_ preparation.CreateCommands, err error) {
if err != nil { if err := machine.content(); err != nil {
return nil, err return nil, err
} }
if !isUserStateExists(existingMachine.UserState) { return func(ctx context.Context, filter preparation.FilterToQueryReducer) ([]eventstore.Command, error) {
return nil, caos_errs.ThrowNotFound(nil, "COMMAND-5M0od", "Errors.User.NotFound") writeModel, err := getMachineWriteModelByID(ctx, filter, machine.AggregateID, machine.ResourceOwner)
} if err != nil {
return nil, err
}
if !isUserStateExists(writeModel.UserState) {
return nil, caos_errs.ThrowNotFound(nil, "COMMAND-5M0od", "Errors.User.NotFound")
}
userAgg := UserAggregateFromWriteModel(&existingMachine.WriteModel) event, hasChanged, err := writeModel.NewChangedEvent(ctx, UserAggregateFromWriteModel(&writeModel.WriteModel), machine.Name, machine.Description)
changedEvent, hasChanged, err := existingMachine.NewChangedEvent(ctx, userAgg, machine.Name, machine.Description) if err != nil {
if err != nil { return nil, err
return nil, err }
} if !hasChanged {
if !hasChanged { return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-2n8vs", "Errors.User.NotChanged")
return nil, caos_errs.ThrowPreconditionFailed(nil, "COMMAND-2n8vs", "Errors.User.NotChanged") }
}
events, err := c.eventstore.Push(ctx, changedEvent) return []eventstore.Command{
if err != nil { event,
return nil, err }, nil
}, nil
} }
err = AppendAndReduce(existingMachine, events...)
if err != nil {
return nil, err
}
return writeModelToMachine(existingMachine), nil
} }
func (c *Commands) machineWriteModelByID(ctx context.Context, userID, resourceOwner string) (writeModel *MachineWriteModel, err error) { func getMachineWriteModelByID(ctx context.Context, filter preparation.FilterToQueryReducer, userID, resourceOwner string) (_ *MachineWriteModel, err error) {
if userID == "" { writeModel := NewMachineWriteModel(userID, resourceOwner)
return nil, caos_errs.ThrowInvalidArgument(nil, "COMMAND-0Plof", "Errors.User.UserIDMissing") events, err := filter(ctx, writeModel.Query())
}
ctx, span := tracing.NewSpan(ctx)
defer func() { span.EndWithError(err) }()
writeModel = NewMachineWriteModel(userID, resourceOwner)
err = c.eventstore.FilterToQueryReducer(ctx, writeModel)
if err != nil { if err != nil {
return nil, err return nil, err
} }
return writeModel, nil writeModel.AppendEvents(events...)
err = writeModel.Reduce()
return writeModel, err
} }

View File

@ -24,11 +24,10 @@ func TestCommandSide_AddMachine(t *testing.T) {
} }
type args struct { type args struct {
ctx context.Context ctx context.Context
orgID string machine *Machine
machine *domain.Machine
} }
type res struct { type res struct {
want *domain.Machine want *domain.ObjectDetails
err func(error) bool err func(error) bool
} }
tests := []struct { tests := []struct {
@ -38,16 +37,29 @@ func TestCommandSide_AddMachine(t *testing.T) {
res res res res
}{ }{
{ {
name: "user invalid, invalid argument error", name: "user invalid, invalid argument error name",
fields: fields{ fields: fields{
eventstore: eventstoreExpect( eventstore: eventstoreExpect(
t, t,
expectFilter(
eventFromEventPusher(
org.NewDomainPolicyAddedEvent(context.Background(),
&user.NewAggregate("user1", "org1").Aggregate,
true,
true,
true,
),
),
),
), ),
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
}, },
args: args{ args: args{
ctx: context.Background(), ctx: context.Background(),
orgID: "org1", machine: &Machine{
machine: &domain.Machine{ ObjectRoot: models.ObjectRoot{
ResourceOwner: "org1",
},
Username: "username", Username: "username",
}, },
}, },
@ -55,6 +67,37 @@ func TestCommandSide_AddMachine(t *testing.T) {
err: caos_errs.IsErrorInvalidArgument, err: caos_errs.IsErrorInvalidArgument,
}, },
}, },
{
name: "user invalid, invalid argument error username",
fields: fields{
eventstore: eventstoreExpect(
t,
expectFilter(
eventFromEventPusher(
org.NewDomainPolicyAddedEvent(context.Background(),
&user.NewAggregate("user1", "org1").Aggregate,
true,
true,
true,
),
),
),
),
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
},
args: args{
ctx: context.Background(),
machine: &Machine{
ObjectRoot: models.ObjectRoot{
ResourceOwner: "org1",
},
Name: "name",
},
},
res: res{
err: caos_errs.IsErrorInvalidArgument,
},
},
{ {
name: "org policy not found, precondition error", name: "org policy not found, precondition error",
fields: fields{ fields: fields{
@ -63,13 +106,16 @@ func TestCommandSide_AddMachine(t *testing.T) {
expectFilter(), expectFilter(),
expectFilter(), expectFilter(),
), ),
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
}, },
args: args{ args: args{
ctx: context.Background(), ctx: context.Background(),
orgID: "org1", machine: &Machine{
machine: &domain.Machine{ ObjectRoot: models.ObjectRoot{
Username: "username", ResourceOwner: "org1",
},
Name: "name", Name: "name",
Username: "username",
}, },
}, },
res: res{ res: res{
@ -91,6 +137,7 @@ func TestCommandSide_AddMachine(t *testing.T) {
), ),
), ),
), ),
expectFilter(),
expectPush( expectPush(
[]*repository.Event{ []*repository.Event{
eventFromEventPusher( eventFromEventPusher(
@ -109,24 +156,19 @@ func TestCommandSide_AddMachine(t *testing.T) {
idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"), idGenerator: id_mock.NewIDGeneratorExpectIDs(t, "user1"),
}, },
args: args{ args: args{
ctx: context.Background(), ctx: context.Background(),
orgID: "org1", machine: &Machine{
machine: &domain.Machine{ ObjectRoot: models.ObjectRoot{
Username: "username", ResourceOwner: "org1",
},
Description: "description", Description: "description",
Name: "name", Name: "name",
Username: "username",
}, },
}, },
res: res{ res: res{
want: &domain.Machine{ want: &domain.ObjectDetails{
ObjectRoot: models.ObjectRoot{ ResourceOwner: "org1",
AggregateID: "user1",
ResourceOwner: "org1",
},
Username: "username",
Name: "name",
Description: "description",
State: domain.UserStateActive,
}, },
}, },
}, },
@ -137,7 +179,7 @@ func TestCommandSide_AddMachine(t *testing.T) {
eventstore: tt.fields.eventstore, eventstore: tt.fields.eventstore,
idGenerator: tt.fields.idGenerator, idGenerator: tt.fields.idGenerator,
} }
got, err := r.AddMachine(tt.args.ctx, tt.args.orgID, tt.args.machine) got, err := r.AddMachine(tt.args.ctx, tt.args.machine)
if tt.res.err == nil { if tt.res.err == nil {
assert.NoError(t, err) assert.NoError(t, err)
} }
@ -157,11 +199,10 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
} }
type args struct { type args struct {
ctx context.Context ctx context.Context
orgID string machine *Machine
machine *domain.Machine
} }
type res struct { type res struct {
want *domain.Machine want *domain.ObjectDetails
err func(error) bool err func(error) bool
} }
tests := []struct { tests := []struct {
@ -178,9 +219,11 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
), ),
}, },
args: args{ args: args{
ctx: context.Background(), ctx: context.Background(),
orgID: "org1", machine: &Machine{
machine: &domain.Machine{ ObjectRoot: models.ObjectRoot{
ResourceOwner: "org1",
},
Username: "username", Username: "username",
}, },
}, },
@ -197,14 +240,14 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
), ),
}, },
args: args{ args: args{
ctx: context.Background(), ctx: context.Background(),
orgID: "org1", machine: &Machine{
machine: &domain.Machine{
ObjectRoot: models.ObjectRoot{ ObjectRoot: models.ObjectRoot{
AggregateID: "user1", ResourceOwner: "org1",
AggregateID: "user1",
}, },
Username: "username",
Name: "name", Name: "name",
Username: "username",
}, },
}, },
res: res{ res: res{
@ -230,11 +273,11 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
), ),
}, },
args: args{ args: args{
ctx: context.Background(), ctx: context.Background(),
orgID: "org1", machine: &Machine{
machine: &domain.Machine{
ObjectRoot: models.ObjectRoot{ ObjectRoot: models.ObjectRoot{
AggregateID: "user1", ResourceOwner: "org1",
AggregateID: "user1",
}, },
Name: "name", Name: "name",
Description: "description", Description: "description",
@ -270,26 +313,19 @@ func TestCommandSide_ChangeMachine(t *testing.T) {
), ),
}, },
args: args{ args: args{
ctx: context.Background(), ctx: context.Background(),
orgID: "org1", machine: &Machine{
machine: &domain.Machine{
ObjectRoot: models.ObjectRoot{ ObjectRoot: models.ObjectRoot{
AggregateID: "user1", ResourceOwner: "org1",
AggregateID: "user1",
}, },
Description: "description1",
Name: "name1", Name: "name1",
Description: "description1",
}, },
}, },
res: res{ res: res{
want: &domain.Machine{ want: &domain.ObjectDetails{
ObjectRoot: models.ObjectRoot{ ResourceOwner: "org1",
AggregateID: "user1",
ResourceOwner: "org1",
},
Username: "username",
Name: "name1",
Description: "description1",
State: domain.UserStateActive,
}, },
}, },
}, },