mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 11:04:25 +00:00
effc2c23c2
* fix: query tests * fix: use prepare funcs * fix: go mod * fix: generate files * fix(eventstore): tests * fix(eventstore): rename modifier to editor * fix(migrations): add cluster migration, fix(migrations): fix typo of host in clean clsuter * fix(eventstore): move health * fix(eventstore): AggregateTypeFilter aggregateType as param * code quality * fix: go tests * feat: add member funcs * feat: add member model * feat: add member events * feat: add member repo model * fix: better error func testing * fix: project member funcs * fix: add tests * fix: add tests * feat: implement member requests * fix: merge master * fix: merge master * fix: read existing in project repo * fix: fix tests * feat: add internal cache * feat: add cache mock * fix: return values of cache mock * feat: add project role * fix: add cache config * fix: add role to eventstore * fix: use eventstore sdk * fix: use eventstore sdk * fix: add project role grpc requests * fix: fix getby id * fix: changes for mr * fix: change value to interface * feat: add app event creations * fix: searchmethods * Update internal/project/model/project_member.go Co-Authored-By: Silvan <silvan.reusser@gmail.com> * fix: use get project func * fix: append events * fix: check if value is string on equal ignore case * fix: add changes test * fix: add go mod * fix: add some tests * fix: return err not nil * fix: return err not nil * fix: add aggregate funcs and tests * fix: add oidc aggregate funcs and tests * fix: add oidc * fix: add some tests * fix: tests * feat: eventstore repository * fix: remove gorm * version * feat: pkg * feat: eventstore without eventstore-lib * rename files * gnueg * fix: global model * feat: add global view functions * feat(eventstore): sdk * fix(eventstore): rename app to eventstore * delete empty test * fix(models): delete unused struct * feat(eventstore): overwrite context data * fix: use global sql config * fix: oidc validation * fix: generate client secret * fix: generate client id * fix: test change app * fix: deactivate/reactivate application * fix: change oidc config * fix: change oidc config secret * begin models * begin repo * fix: implement grpc app funcs * fix: add application requests * fix: converter * fix: converter * fix: converter and generate clientid * fix: tests * feat: project grant aggregate * feat: project grant * fix: project grant check if role existing * fix: project grant requests * fix: project grant fixes * fix: project grant member model * fix: project grant member aggregate * fix: project grant member eventstore * fix: project grant member requests * feat: user model * begin repo * repo models and more * feat: user command side * lots of functions * user command side * profile requests * commit before rebase on user * save * local config with gopass and more * begin new auth command (user centric) * Update internal/user/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/address.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/address.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/mfa.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/mfa.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/model/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/model/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/user_test.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/eventstore_mock_test.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * changes from mr review * save files into basedir * changes from mr review * changes from mr review * move to auth request * Update internal/usergrant/repository/eventsourcing/cache.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * Update internal/usergrant/repository/eventsourcing/cache.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * changes requested on mr * fix generate codes * fix return if no events * password code * email verification step * more steps * lot of mfa * begin tests * more next steps * auth api * auth api (user) * auth api (user) * auth api (user) * differ requests * merge * tests * fix compilation error * mock for id generator * Update internal/user/repository/eventsourcing/model/password.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * requests of mr * check email * begin separation of command and query * otp * change packages * some cleanup and fixes * tests for auth request / next steps * add VerificationLifetimes to config and make it run * tests * fix code challenge validation * cleanup * fix merge * begin view * repackaging tests and configs * fix startup config for auth * add migration * add PromptSelectAccount * fix copy / paste * remove user_agent files * fixes * fix sequences in user_session * token commands * token queries and signout * fix * fix set password test * add token handler and table * handle session init * add session state * add user view test cases * change VerifyMyMfaOTP * some fixes * fix user repo in auth api * cleanup * add user session view test * fix merge * fixes * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * extract method usersForUserSelection * add todo for policy check * id on auth req * fix enum name Co-authored-by: Fabiennne <fabienne.gerschwiler@gmail.com> Co-authored-by: adlerhurst <silvan.reusser@gmail.com> Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
307 lines
6.4 KiB
Go
307 lines
6.4 KiB
Go
package crypto
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/golang/mock/gomock"
|
|
)
|
|
|
|
func TestIsCodeExpired(t *testing.T) {
|
|
type args struct {
|
|
creationDate time.Time
|
|
expiry time.Duration
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want bool
|
|
}{
|
|
{
|
|
"not expired",
|
|
args{
|
|
creationDate: time.Now(),
|
|
expiry: time.Duration(5 * time.Minute),
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"never expires",
|
|
args{
|
|
creationDate: time.Now().Add(-5 * time.Minute),
|
|
expiry: 0,
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"expired",
|
|
args{
|
|
creationDate: time.Now().Add(-5 * time.Minute),
|
|
expiry: time.Duration(5 * time.Minute),
|
|
},
|
|
true,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
if got := IsCodeExpired(tt.args.creationDate, tt.args.expiry); got != tt.want {
|
|
t.Errorf("IsCodeExpired() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestVerifyCode(t *testing.T) {
|
|
type args struct {
|
|
creationDate time.Time
|
|
expiry time.Duration
|
|
cryptoCode *CryptoValue
|
|
verificationCode string
|
|
g Generator
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
wantErr bool
|
|
}{
|
|
{
|
|
"expired",
|
|
args{
|
|
creationDate: time.Now().Add(-5 * time.Minute),
|
|
expiry: 5 * time.Minute,
|
|
cryptoCode: nil,
|
|
verificationCode: "",
|
|
g: nil,
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"unsupported alg err",
|
|
args{
|
|
creationDate: time.Now(),
|
|
expiry: 5 * time.Minute,
|
|
cryptoCode: nil,
|
|
verificationCode: "code",
|
|
g: createMockGenerator(t, createMockCrypto(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"encryption alg ok",
|
|
args{
|
|
creationDate: time.Now(),
|
|
expiry: 5 * time.Minute,
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeEncryption,
|
|
Algorithm: "enc",
|
|
KeyID: "id",
|
|
Crypted: []byte("code"),
|
|
},
|
|
verificationCode: "code",
|
|
g: createMockGenerator(t, CreateMockEncryptionAlg(gomock.NewController(t))),
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"hash alg ok",
|
|
args{
|
|
creationDate: time.Now(),
|
|
expiry: 5 * time.Minute,
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeHash,
|
|
Algorithm: "hash",
|
|
Crypted: []byte("code"),
|
|
},
|
|
verificationCode: "code",
|
|
g: createMockGenerator(t, CreateMockHashAlg(gomock.NewController(t))),
|
|
},
|
|
false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
if err := VerifyCode(tt.args.creationDate, tt.args.expiry, tt.args.cryptoCode, tt.args.verificationCode, tt.args.g); (err != nil) != tt.wantErr {
|
|
t.Errorf("VerifyCode() error = %v, wantErr %v", err, tt.wantErr)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func Test_verifyEncryptedCode(t *testing.T) {
|
|
type args struct {
|
|
cryptoCode *CryptoValue
|
|
verificationCode string
|
|
alg EncryptionAlgorithm
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
wantErr bool
|
|
}{
|
|
{
|
|
"nil error",
|
|
args{
|
|
cryptoCode: nil,
|
|
verificationCode: "",
|
|
alg: CreateMockEncryptionAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"wrong cryptotype error",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeHash,
|
|
Crypted: nil,
|
|
},
|
|
verificationCode: "",
|
|
alg: CreateMockEncryptionAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"wrong algorithm error",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeEncryption,
|
|
Algorithm: "enc2",
|
|
Crypted: nil,
|
|
},
|
|
verificationCode: "",
|
|
alg: CreateMockEncryptionAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"wrong key id error",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeEncryption,
|
|
Algorithm: "enc",
|
|
Crypted: nil,
|
|
},
|
|
verificationCode: "wrong",
|
|
alg: CreateMockEncryptionAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"wrong verification code error",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeEncryption,
|
|
Algorithm: "enc",
|
|
KeyID: "id",
|
|
Crypted: []byte("code"),
|
|
},
|
|
verificationCode: "wrong",
|
|
alg: CreateMockEncryptionAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"verification code ok",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeEncryption,
|
|
Algorithm: "enc",
|
|
KeyID: "id",
|
|
Crypted: []byte("code"),
|
|
},
|
|
verificationCode: "code",
|
|
alg: CreateMockEncryptionAlg(gomock.NewController(t)),
|
|
},
|
|
false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
if err := verifyEncryptedCode(tt.args.cryptoCode, tt.args.verificationCode, tt.args.alg); (err != nil) != tt.wantErr {
|
|
t.Errorf("verifyEncryptedCode() error = %v, wantErr %v", err, tt.wantErr)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func Test_verifyHashedCode(t *testing.T) {
|
|
type args struct {
|
|
cryptoCode *CryptoValue
|
|
verificationCode string
|
|
alg HashAlgorithm
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
wantErr bool
|
|
}{
|
|
|
|
{
|
|
"nil error",
|
|
args{
|
|
cryptoCode: nil,
|
|
verificationCode: "",
|
|
alg: CreateMockHashAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"wrong cryptotype error",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeEncryption,
|
|
Crypted: nil,
|
|
},
|
|
verificationCode: "",
|
|
alg: CreateMockHashAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"wrong algorithm error",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeHash,
|
|
Algorithm: "hash2",
|
|
Crypted: nil,
|
|
},
|
|
verificationCode: "",
|
|
alg: CreateMockHashAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"wrong verification code error",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeHash,
|
|
Algorithm: "hash",
|
|
Crypted: []byte("code"),
|
|
},
|
|
verificationCode: "wrong",
|
|
alg: CreateMockHashAlg(gomock.NewController(t)),
|
|
},
|
|
true,
|
|
},
|
|
{
|
|
"verification code ok",
|
|
args{
|
|
cryptoCode: &CryptoValue{
|
|
CryptoType: TypeHash,
|
|
Algorithm: "hash",
|
|
Crypted: []byte("code"),
|
|
},
|
|
verificationCode: "code",
|
|
alg: CreateMockHashAlg(gomock.NewController(t)),
|
|
},
|
|
false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
if err := verifyHashedCode(tt.args.cryptoCode, tt.args.verificationCode, tt.args.alg); (err != nil) != tt.wantErr {
|
|
t.Errorf("verifyHashedCode() error = %v, wantErr %v", err, tt.wantErr)
|
|
}
|
|
})
|
|
}
|
|
}
|