package query import ( "database/sql" "database/sql/driver" "errors" "fmt" "regexp" "testing" "github.com/caos/zitadel/internal/domain" errs "github.com/caos/zitadel/internal/errors" ) func Test_PasswordComplexityPolicyPrepares(t *testing.T) { type want struct { sqlExpectations sqlExpectation err checkErr } tests := []struct { name string prepare interface{} want want object interface{} }{ { name: "preparePasswordComplexityPolicyQuery no result", prepare: preparePasswordComplexityPolicyQuery, want: want{ sqlExpectations: mockQueries( regexp.QuoteMeta(`SELECT projections.password_complexity_policies.id,`+ ` projections.password_complexity_policies.sequence,`+ ` projections.password_complexity_policies.creation_date,`+ ` projections.password_complexity_policies.change_date,`+ ` projections.password_complexity_policies.resource_owner,`+ ` projections.password_complexity_policies.min_length,`+ ` projections.password_complexity_policies.has_lowercase,`+ ` projections.password_complexity_policies.has_uppercase,`+ ` projections.password_complexity_policies.has_number,`+ ` projections.password_complexity_policies.has_symbol,`+ ` projections.password_complexity_policies.is_default,`+ ` projections.password_complexity_policies.state`+ ` FROM projections.password_complexity_policies`), nil, nil, ), err: func(err error) (error, bool) { if !errs.IsNotFound(err) { return fmt.Errorf("err should be zitadel.NotFoundError got: %w", err), false } return nil, true }, }, object: (*PasswordComplexityPolicy)(nil), }, { name: "preparePasswordComplexityPolicyQuery found", prepare: preparePasswordComplexityPolicyQuery, want: want{ sqlExpectations: mockQuery( regexp.QuoteMeta(`SELECT projections.password_complexity_policies.id,`+ ` projections.password_complexity_policies.sequence,`+ ` projections.password_complexity_policies.creation_date,`+ ` projections.password_complexity_policies.change_date,`+ ` projections.password_complexity_policies.resource_owner,`+ ` projections.password_complexity_policies.min_length,`+ ` projections.password_complexity_policies.has_lowercase,`+ ` projections.password_complexity_policies.has_uppercase,`+ ` projections.password_complexity_policies.has_number,`+ ` projections.password_complexity_policies.has_symbol,`+ ` projections.password_complexity_policies.is_default,`+ ` projections.password_complexity_policies.state`+ ` FROM projections.password_complexity_policies`), []string{ "id", "sequence", "creation_date", "change_date", "resource_owner", "min_length", "has_lowercase", "has_uppercase", "has_number", "has_symbol", "is_default", "state", }, []driver.Value{ "pol-id", uint64(20211109), testNow, testNow, "ro", 8, true, true, true, true, true, domain.PolicyStateActive, }, ), }, object: &PasswordComplexityPolicy{ ID: "pol-id", CreationDate: testNow, ChangeDate: testNow, Sequence: 20211109, ResourceOwner: "ro", State: domain.PolicyStateActive, MinLength: 8, HasLowercase: true, HasUppercase: true, HasNumber: true, HasSymbol: true, IsDefault: true, }, }, { name: "preparePasswordComplexityPolicyQuery sql err", prepare: preparePasswordComplexityPolicyQuery, want: want{ sqlExpectations: mockQueryErr( regexp.QuoteMeta(`SELECT projections.password_complexity_policies.id,`+ ` projections.password_complexity_policies.sequence,`+ ` projections.password_complexity_policies.creation_date,`+ ` projections.password_complexity_policies.change_date,`+ ` projections.password_complexity_policies.resource_owner,`+ ` projections.password_complexity_policies.min_length,`+ ` projections.password_complexity_policies.has_lowercase,`+ ` projections.password_complexity_policies.has_uppercase,`+ ` projections.password_complexity_policies.has_number,`+ ` projections.password_complexity_policies.has_symbol,`+ ` projections.password_complexity_policies.is_default,`+ ` projections.password_complexity_policies.state`+ ` FROM projections.password_complexity_policies`), sql.ErrConnDone, ), err: func(err error) (error, bool) { if !errors.Is(err, sql.ErrConnDone) { return fmt.Errorf("err should be sql.ErrConnDone got: %w", err), false } return nil, true }, }, object: nil, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err) }) } }