mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-16 12:58:00 +00:00
dab5d9e756
# Which Problems Are Solved If many events are written to the same aggregate id it can happen that zitadel [starts to retry the push transaction](48ffc902cc/internal/eventstore/eventstore.go (L101)
) because [the locking behaviour](48ffc902cc/internal/eventstore/v3/sequence.go (L25)
) during push does compute the wrong sequence because newly committed events are not visible to the transaction. These events impact the current sequence. In cases with high command traffic on a single aggregate id this can have severe impact on general performance of zitadel. Because many connections of the `eventstore pusher` database pool are blocked by each other. # How the Problems Are Solved To improve the performance this locking mechanism was removed and the business logic of push is moved to sql functions which reduce network traffic and can be analyzed by the database before the actual push. For clients of the eventstore framework nothing changed. # Additional Changes - after a connection is established prefetches the newly added database types - `eventstore.BaseEvent` now returns the correct revision of the event # Additional Context - part of https://github.com/zitadel/zitadel/issues/8931 --------- Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> Co-authored-by: Livio Spring <livio.a@gmail.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Elio Bischof <elio@zitadel.com> Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com> Co-authored-by: Miguel Cabrerizo <30386061+doncicuto@users.noreply.github.com> Co-authored-by: Joakim Lodén <Loddan@users.noreply.github.com> Co-authored-by: Yxnt <Yxnt@users.noreply.github.com> Co-authored-by: Stefan Benz <stefan@caos.ch> Co-authored-by: Harsha Reddy <harsha.reddy@klaviyo.com> Co-authored-by: Zach H <zhirschtritt@gmail.com>
83 lines
1.9 KiB
Go
83 lines
1.9 KiB
Go
package initialise
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"errors"
|
|
"testing"
|
|
)
|
|
|
|
func Test_verifyUser(t *testing.T) {
|
|
err := ReadStmts("cockroach") //TODO: check all dialects
|
|
if err != nil {
|
|
t.Errorf("unable to read stmts: %v", err)
|
|
t.FailNow()
|
|
}
|
|
|
|
type args struct {
|
|
db db
|
|
username string
|
|
password string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
targetErr error
|
|
}{
|
|
{
|
|
name: "doesn't exists, create fails",
|
|
args: args{
|
|
db: prepareDB(t,
|
|
expectExec("-- replace zitadel-user with the name of the user\nCREATE USER IF NOT EXISTS \"zitadel-user\"", sql.ErrTxDone),
|
|
),
|
|
username: "zitadel-user",
|
|
password: "",
|
|
},
|
|
targetErr: sql.ErrTxDone,
|
|
},
|
|
{
|
|
name: "correct without password",
|
|
args: args{
|
|
db: prepareDB(t,
|
|
expectExec("-- replace zitadel-user with the name of the user\nCREATE USER IF NOT EXISTS \"zitadel-user\"", nil),
|
|
),
|
|
username: "zitadel-user",
|
|
password: "",
|
|
},
|
|
targetErr: nil,
|
|
},
|
|
{
|
|
name: "correct with password",
|
|
args: args{
|
|
db: prepareDB(t,
|
|
expectExec("-- replace zitadel-user with the name of the user\nCREATE USER IF NOT EXISTS \"zitadel-user\" WITH PASSWORD 'password'", nil),
|
|
),
|
|
username: "zitadel-user",
|
|
password: "password",
|
|
},
|
|
targetErr: nil,
|
|
},
|
|
{
|
|
name: "already exists",
|
|
args: args{
|
|
db: prepareDB(t,
|
|
expectExec("-- replace zitadel-user with the name of the user\nCREATE USER IF NOT EXISTS \"zitadel-user\" WITH PASSWORD 'password'", nil),
|
|
),
|
|
username: "zitadel-user",
|
|
password: "",
|
|
},
|
|
targetErr: nil,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
if err := VerifyUser(tt.args.username, tt.args.password)(context.Background(), tt.args.db.db); !errors.Is(err, tt.targetErr) {
|
|
t.Errorf("VerifyGrant() error = %v, want: %v", err, tt.targetErr)
|
|
}
|
|
if err := tt.args.db.mock.ExpectationsWereMet(); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
}
|