mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-14 11:58:02 +00:00
fca6b28a97
Some checks are pending
ZITADEL CI/CD / core (push) Waiting to run
ZITADEL CI/CD / console (push) Waiting to run
ZITADEL CI/CD / version (push) Waiting to run
ZITADEL CI/CD / core-integration-test (push) Blocked by required conditions
ZITADEL CI/CD / lint (push) Blocked by required conditions
ZITADEL CI/CD / compile (push) Blocked by required conditions
ZITADEL CI/CD / core-unit-test (push) Blocked by required conditions
ZITADEL CI/CD / container (push) Blocked by required conditions
ZITADEL CI/CD / e2e (push) Blocked by required conditions
ZITADEL CI/CD / release (push) Blocked by required conditions
Code Scanning / CodeQL-Build (go) (push) Waiting to run
Code Scanning / CodeQL-Build (javascript) (push) Waiting to run
# Which Problems Are Solved Eventual consistency is handled wrongly in the newly improved integration tests. # How the Problems Are Solved Correct the usage of the require package with the assert package where necessary, to remove the panics where the EventuallyWithT functions can rerun. # Additional Changes Modify the timeout values for some EventuallyWithT which can vary when a instance is freshly setup. # Additional Context None
328 lines
7.5 KiB
Go
328 lines
7.5 KiB
Go
//go:build integration
|
|
|
|
package admin_test
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/brianvoe/gofakeit/v6"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"google.golang.org/protobuf/types/known/timestamppb"
|
|
|
|
"github.com/zitadel/zitadel/internal/integration"
|
|
admin_pb "github.com/zitadel/zitadel/pkg/grpc/admin"
|
|
"github.com/zitadel/zitadel/pkg/grpc/member"
|
|
"github.com/zitadel/zitadel/pkg/grpc/object"
|
|
)
|
|
|
|
var iamRoles = []string{
|
|
"IAM_OWNER",
|
|
"IAM_OWNER_VIEWER",
|
|
"IAM_ORG_MANAGER",
|
|
"IAM_USER_MANAGER",
|
|
"IAM_ADMIN_IMPERSONATOR",
|
|
"IAM_END_USER_IMPERSONATOR",
|
|
}
|
|
|
|
func TestServer_ListIAMMemberRoles(t *testing.T) {
|
|
got, err := Client.ListIAMMemberRoles(AdminCTX, &admin_pb.ListIAMMemberRolesRequest{})
|
|
assert.NoError(t, err)
|
|
assert.ElementsMatch(t, iamRoles, got.GetRoles())
|
|
}
|
|
|
|
func TestServer_ListIAMMembers(t *testing.T) {
|
|
user := Instance.CreateHumanUserVerified(AdminCTX, Instance.DefaultOrg.Id, gofakeit.Email())
|
|
_, err := Client.AddIAMMember(AdminCTX, &admin_pb.AddIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: iamRoles,
|
|
})
|
|
require.NoError(t, err)
|
|
type args struct {
|
|
ctx context.Context
|
|
req *admin_pb.ListIAMMembersRequest
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want *admin_pb.ListIAMMembersResponse
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "permission error",
|
|
args: args{
|
|
ctx: Instance.WithAuthorization(CTX, integration.UserTypeOrgOwner),
|
|
req: &admin_pb.ListIAMMembersRequest{
|
|
Query: &object.ListQuery{},
|
|
Queries: []*member.SearchQuery{{
|
|
Query: &member.SearchQuery_UserIdQuery{
|
|
UserIdQuery: &member.UserIDQuery{
|
|
UserId: user.GetUserId(),
|
|
},
|
|
},
|
|
}},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "success",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.ListIAMMembersRequest{
|
|
Query: &object.ListQuery{},
|
|
Queries: []*member.SearchQuery{{
|
|
Query: &member.SearchQuery_UserIdQuery{
|
|
UserIdQuery: &member.UserIDQuery{
|
|
UserId: user.GetUserId(),
|
|
},
|
|
},
|
|
}},
|
|
},
|
|
},
|
|
want: &admin_pb.ListIAMMembersResponse{
|
|
Result: []*member.Member{{
|
|
UserId: user.GetUserId(),
|
|
Roles: iamRoles,
|
|
}},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
retryDuration, tick := integration.WaitForAndTickWithMaxDuration(tt.args.ctx, time.Minute)
|
|
assert.EventuallyWithT(t, func(ct *assert.CollectT) {
|
|
got, err := Client.ListIAMMembers(tt.args.ctx, tt.args.req)
|
|
if tt.wantErr {
|
|
require.Error(ct, err)
|
|
return
|
|
}
|
|
require.NoError(ct, err)
|
|
wantResult := tt.want.GetResult()
|
|
gotResult := got.GetResult()
|
|
|
|
if assert.Len(ct, gotResult, len(wantResult)) {
|
|
for i, want := range wantResult {
|
|
assert.Equal(ct, want.GetUserId(), gotResult[i].GetUserId())
|
|
assert.ElementsMatch(ct, want.GetRoles(), gotResult[i].GetRoles())
|
|
}
|
|
}
|
|
}, retryDuration, tick)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestServer_AddIAMMember(t *testing.T) {
|
|
user := Instance.CreateHumanUserVerified(AdminCTX, Instance.DefaultOrg.Id, gofakeit.Email())
|
|
type args struct {
|
|
ctx context.Context
|
|
req *admin_pb.AddIAMMemberRequest
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want *admin_pb.AddIAMMemberResponse
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "permission error",
|
|
args: args{
|
|
ctx: Instance.WithAuthorization(CTX, integration.UserTypeOrgOwner),
|
|
req: &admin_pb.AddIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: iamRoles,
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "success",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.AddIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: iamRoles,
|
|
},
|
|
},
|
|
want: &admin_pb.AddIAMMemberResponse{
|
|
Details: &object.ObjectDetails{
|
|
ResourceOwner: Instance.ID(),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "unknown roles error",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.AddIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: []string{"FOO", "BAR"},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "org role error",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.AddIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: []string{"ORG_OWNER"},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got, err := Client.AddIAMMember(tt.args.ctx, tt.args.req)
|
|
if tt.wantErr {
|
|
require.Error(t, err)
|
|
return
|
|
}
|
|
require.NoError(t, err)
|
|
integration.AssertDetails(t, tt.want, got)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestServer_UpdateIAMMember(t *testing.T) {
|
|
user := Instance.CreateHumanUserVerified(AdminCTX, Instance.DefaultOrg.Id, gofakeit.Email())
|
|
_, err := Client.AddIAMMember(AdminCTX, &admin_pb.AddIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: []string{"IAM_OWNER"},
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
type args struct {
|
|
ctx context.Context
|
|
req *admin_pb.UpdateIAMMemberRequest
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want *admin_pb.UpdateIAMMemberResponse
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "permission error",
|
|
args: args{
|
|
ctx: Instance.WithAuthorization(CTX, integration.UserTypeOrgOwner),
|
|
req: &admin_pb.UpdateIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: iamRoles,
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "success",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.UpdateIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: iamRoles,
|
|
},
|
|
},
|
|
want: &admin_pb.UpdateIAMMemberResponse{
|
|
Details: &object.ObjectDetails{
|
|
ResourceOwner: Instance.ID(),
|
|
ChangeDate: timestamppb.Now(),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "unknown roles error",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.UpdateIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: []string{"FOO", "BAR"},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "org role error",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.UpdateIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: []string{"ORG_OWNER"},
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got, err := Client.UpdateIAMMember(tt.args.ctx, tt.args.req)
|
|
if tt.wantErr {
|
|
require.Error(t, err)
|
|
return
|
|
}
|
|
require.NoError(t, err)
|
|
integration.AssertDetails(t, tt.want, got)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestServer_RemoveIAMMember(t *testing.T) {
|
|
user := Instance.CreateHumanUserVerified(AdminCTX, Instance.DefaultOrg.Id, gofakeit.Email())
|
|
_, err := Client.AddIAMMember(AdminCTX, &admin_pb.AddIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
Roles: []string{"IAM_OWNER"},
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
type args struct {
|
|
ctx context.Context
|
|
req *admin_pb.RemoveIAMMemberRequest
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want *admin_pb.RemoveIAMMemberResponse
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "permission error",
|
|
args: args{
|
|
ctx: Instance.WithAuthorization(CTX, integration.UserTypeOrgOwner),
|
|
req: &admin_pb.RemoveIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
},
|
|
},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "success",
|
|
args: args{
|
|
ctx: AdminCTX,
|
|
req: &admin_pb.RemoveIAMMemberRequest{
|
|
UserId: user.GetUserId(),
|
|
},
|
|
},
|
|
want: &admin_pb.RemoveIAMMemberResponse{
|
|
Details: &object.ObjectDetails{
|
|
ResourceOwner: Instance.ID(),
|
|
ChangeDate: timestamppb.Now(),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got, err := Client.RemoveIAMMember(tt.args.ctx, tt.args.req)
|
|
if tt.wantErr {
|
|
require.Error(t, err)
|
|
return
|
|
}
|
|
require.NoError(t, err)
|
|
integration.AssertDetails(t, tt.want, got)
|
|
})
|
|
}
|
|
}
|