package query import ( "database/sql" "database/sql/driver" "errors" "fmt" "regexp" "testing" "github.com/zitadel/zitadel/internal/domain" "github.com/zitadel/zitadel/internal/zerrors" ) var ( preparePasswordComplexityPolicyStmt = `SELECT projections.password_complexity_policies2.id,` + ` projections.password_complexity_policies2.sequence,` + ` projections.password_complexity_policies2.creation_date,` + ` projections.password_complexity_policies2.change_date,` + ` projections.password_complexity_policies2.resource_owner,` + ` projections.password_complexity_policies2.min_length,` + ` projections.password_complexity_policies2.has_lowercase,` + ` projections.password_complexity_policies2.has_uppercase,` + ` projections.password_complexity_policies2.has_number,` + ` projections.password_complexity_policies2.has_symbol,` + ` projections.password_complexity_policies2.is_default,` + ` projections.password_complexity_policies2.state` + ` FROM projections.password_complexity_policies2` + ` AS OF SYSTEM TIME '-1 ms'` preparePasswordComplexityPolicyCols = []string{ "id", "sequence", "creation_date", "change_date", "resource_owner", "min_length", "has_lowercase", "has_uppercase", "has_number", "has_symbol", "is_default", "state", } ) func Test_PasswordComplexityPolicyPrepares(t *testing.T) { type want struct { sqlExpectations sqlExpectation err checkErr } tests := []struct { name string prepare interface{} want want object interface{} }{ { name: "preparePasswordComplexityPolicyQuery no result", prepare: preparePasswordComplexityPolicyQuery, want: want{ sqlExpectations: mockQueriesScanErr( regexp.QuoteMeta(preparePasswordComplexityPolicyStmt), nil, nil, ), err: func(err error) (error, bool) { if !zerrors.IsNotFound(err) { return fmt.Errorf("err should be zitadel.NotFoundError got: %w", err), false } return nil, true }, }, object: (*PasswordComplexityPolicy)(nil), }, { name: "preparePasswordComplexityPolicyQuery found", prepare: preparePasswordComplexityPolicyQuery, want: want{ sqlExpectations: mockQuery( regexp.QuoteMeta(preparePasswordComplexityPolicyStmt), preparePasswordComplexityPolicyCols, []driver.Value{ "pol-id", uint64(20211109), testNow, testNow, "ro", 8, true, true, true, true, true, domain.PolicyStateActive, }, ), }, object: &PasswordComplexityPolicy{ ID: "pol-id", CreationDate: testNow, ChangeDate: testNow, Sequence: 20211109, ResourceOwner: "ro", State: domain.PolicyStateActive, MinLength: 8, HasLowercase: true, HasUppercase: true, HasNumber: true, HasSymbol: true, IsDefault: true, }, }, { name: "preparePasswordComplexityPolicyQuery sql err", prepare: preparePasswordComplexityPolicyQuery, want: want{ sqlExpectations: mockQueryErr( regexp.QuoteMeta(preparePasswordComplexityPolicyStmt), sql.ErrConnDone, ), err: func(err error) (error, bool) { if !errors.Is(err, sql.ErrConnDone) { return fmt.Errorf("err should be sql.ErrConnDone got: %w", err), false } return nil, true }, }, object: (*PasswordComplexityPolicy)(nil), }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err, defaultPrepareArgs...) }) } }