mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-11 10:37:44 +00:00
fix build error, remove test for backport
This commit is contained in:
@@ -426,78 +426,3 @@ func TestCreateUser_scopedExternalID(t *testing.T) {
|
|||||||
assert.Equal(tt, "701984", string(md.Metadata.Value))
|
assert.Equal(tt, "701984", string(md.Metadata.Value))
|
||||||
}, retryDuration, tick)
|
}, retryDuration, tick)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestCreateUser_ignorePasswordOnCreate(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
tests := []struct {
|
|
||||||
name string
|
|
||||||
ignorePassword string
|
|
||||||
scimErrorType string
|
|
||||||
scimErrorDetail string
|
|
||||||
wantUser *resources.ScimUser
|
|
||||||
wantErr bool
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
name: "ignorePasswordOnCreate set to false",
|
|
||||||
ignorePassword: "false",
|
|
||||||
wantErr: true,
|
|
||||||
scimErrorType: "invalidValue",
|
|
||||||
scimErrorDetail: "Password is too short",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "ignorePasswordOnCreate set to an invalid value",
|
|
||||||
ignorePassword: "random",
|
|
||||||
wantErr: true,
|
|
||||||
scimErrorType: "invalidValue",
|
|
||||||
scimErrorDetail: "Invalid value for metadata key urn:zitadel:scim:ignorePasswordOnCreate: random",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "ignorePasswordOnCreate set to true",
|
|
||||||
ignorePassword: "true",
|
|
||||||
wantUser: &resources.ScimUser{
|
|
||||||
UserName: "acmeUser1",
|
|
||||||
Name: &resources.ScimUserName{
|
|
||||||
FamilyName: "Ross",
|
|
||||||
GivenName: "Bethany",
|
|
||||||
},
|
|
||||||
Emails: []*resources.ScimEmail{
|
|
||||||
{
|
|
||||||
Value: "user1@example.com",
|
|
||||||
Primary: true,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tt := range tests {
|
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
// create a machine user
|
|
||||||
callingUserId, callingUserPat, err := Instance.CreateMachineUserPATWithMembership(CTX, "ORG_OWNER")
|
|
||||||
require.NoError(t, err)
|
|
||||||
ctx := integration.WithAuthorizationToken(CTX, callingUserPat)
|
|
||||||
|
|
||||||
// set urn:zitadel:scim:ignorePasswordOnCreate metadata for the machine user
|
|
||||||
setAndEnsureMetadata(t, callingUserId, "urn:zitadel:scim:ignorePasswordOnCreate", tt.ignorePassword)
|
|
||||||
|
|
||||||
// create a user with an invalid password
|
|
||||||
createdUser, err := Instance.Client.SCIM.Users.Create(ctx, Instance.DefaultOrg.Id, withUsername(invalidPasswordUserJson, "acmeUser1"))
|
|
||||||
require.Equal(t, tt.wantErr, err != nil)
|
|
||||||
if err != nil {
|
|
||||||
scimErr := scim.RequireScimError(t, http.StatusBadRequest, err)
|
|
||||||
assert.Equal(t, tt.scimErrorType, scimErr.Error.ScimType)
|
|
||||||
assert.Equal(t, tt.scimErrorDetail, scimErr.Error.Detail)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
retryDuration, tick := integration.WaitForAndTickWithMaxDuration(CTX, time.Minute)
|
|
||||||
require.EventuallyWithT(t, func(ttt *assert.CollectT) {
|
|
||||||
// ensure the user is really stored and not just returned to the caller
|
|
||||||
fetchedUser, err := Instance.Client.SCIM.Users.Get(CTX, Instance.DefaultOrg.Id, createdUser.ID)
|
|
||||||
require.NoError(ttt, err)
|
|
||||||
assert.True(ttt, test.PartiallyDeepEqual(tt.wantUser, fetchedUser))
|
|
||||||
}, retryDuration, tick)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
@@ -42,7 +42,7 @@ func initScimContext(ctx context.Context, q *query.Queries) (context.Context, er
|
|||||||
}
|
}
|
||||||
queries := sresources.BuildMetadataQueries(ctx, metadataKeys)
|
queries := sresources.BuildMetadataQueries(ctx, metadataKeys)
|
||||||
|
|
||||||
metadataList, err := q.SearchUserMetadata(ctx, false, userID, queries, nil)
|
metadataList, err := q.SearchUserMetadata(ctx, false, userID, queries, false)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if zerrors.IsNotFound(err) {
|
if zerrors.IsNotFound(err) {
|
||||||
return ctx, nil
|
return ctx, nil
|
||||||
|
Reference in New Issue
Block a user