mirror of
https://github.com/zitadel/zitadel.git
synced 2025-05-06 20:16:47 +00:00

* refactor(domain): add user type * fix(projections): start with login names * fix(login_policy): correct handling of user domain claimed event * fix(projections): add members * refactor: simplify member projections * add migration for members * add metadata to member projections * refactor: login name projection * fix: set correct suffixes on login name projections * test(projections): login name reduces * fix: correct cols in reduce member * test(projections): org, iam, project members * member additional cols and conds as opt, add project grant members * fix(migration): members * fix(migration): correct database name * migration version * migs * better naming for member cond and col * split project and project grant members * prepare member columns * feat(queries): membership query * test(queries): membership prepare * fix(queries): multiple projections for latest sequence * fix(api): use query for membership queries in auth and management * feat: org member queries * fix(api): use query for iam member calls * fix(queries): org members * fix(queries): project members * fix(queries): project grant members * fix(query): member queries and user avatar column * member cols * fix(queries): membership stmt * fix user test * fix user test * fix(membership): correct display name * fix(projection): additional member manipulation events * additional member tests * fix(projections): additional events of idp links * fix: use query for memberships (#2797) * fix(api): use query for memberships * remove comment * handle err * refactor(projections): idp user link user aggregate type * fix(projections): handle old user events * fix(api): add asset prefix * no image for iam members
323 lines
8.7 KiB
Go
323 lines
8.7 KiB
Go
package projection
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/caos/zitadel/internal/domain"
|
|
"github.com/caos/zitadel/internal/errors"
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
|
"github.com/caos/zitadel/internal/repository/iam"
|
|
"github.com/caos/zitadel/internal/repository/org"
|
|
)
|
|
|
|
func TestIDPLoginPolicyLinkProjection_reduces(t *testing.T) {
|
|
type args struct {
|
|
event func(t *testing.T) eventstore.EventReader
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
reduce func(event eventstore.EventReader) (*handler.Statement, error)
|
|
want wantReduce
|
|
}{
|
|
{
|
|
name: "iam.reduceAdded",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(iam.LoginPolicyIDPProviderAddedEventType),
|
|
iam.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id",
|
|
"idpProviderType": 1
|
|
}`),
|
|
), iam.IdentityProviderAddedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceAdded,
|
|
want: wantReduce{
|
|
aggregateType: iam.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "INSERT INTO zitadel.projections.idp_login_policy_links (idp_id, aggregate_id, creation_date, change_date, sequence, resource_owner, provider_type) VALUES ($1, $2, $3, $4, $5, $6, $7)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"agg-id",
|
|
anyArg{},
|
|
anyArg{},
|
|
uint64(15),
|
|
"ro-id",
|
|
domain.IdentityProviderTypeSystem,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "iam.reduceRemoved",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(iam.LoginPolicyIDPProviderRemovedEventType),
|
|
iam.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id",
|
|
"idpProviderType": 1
|
|
}`),
|
|
), iam.IdentityProviderRemovedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceRemoved,
|
|
want: wantReduce{
|
|
aggregateType: iam.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (aggregate_id = $2)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"agg-id",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "iam.reduceCascadeRemoved",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(iam.LoginPolicyIDPProviderCascadeRemovedEventType),
|
|
iam.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id",
|
|
"idpProviderType": 1
|
|
}`),
|
|
), iam.IdentityProviderCascadeRemovedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceCascadeRemoved,
|
|
want: wantReduce{
|
|
aggregateType: iam.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (aggregate_id = $2)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"agg-id",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "org.reduceAdded",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(org.LoginPolicyIDPProviderAddedEventType),
|
|
org.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id",
|
|
"idpProviderType": 1
|
|
}`),
|
|
), org.IdentityProviderAddedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceAdded,
|
|
want: wantReduce{
|
|
aggregateType: org.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "INSERT INTO zitadel.projections.idp_login_policy_links (idp_id, aggregate_id, creation_date, change_date, sequence, resource_owner, provider_type) VALUES ($1, $2, $3, $4, $5, $6, $7)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"agg-id",
|
|
anyArg{},
|
|
anyArg{},
|
|
uint64(15),
|
|
"ro-id",
|
|
domain.IdentityProviderTypeOrg,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "org.reduceRemoved",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(org.LoginPolicyIDPProviderRemovedEventType),
|
|
org.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id",
|
|
"idpProviderType": 1
|
|
}`),
|
|
), org.IdentityProviderRemovedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceRemoved,
|
|
want: wantReduce{
|
|
aggregateType: org.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (aggregate_id = $2)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"agg-id",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "org.reduceCascadeRemoved",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(org.LoginPolicyIDPProviderCascadeRemovedEventType),
|
|
org.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id",
|
|
"idpProviderType": 1
|
|
}`),
|
|
), org.IdentityProviderCascadeRemovedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceCascadeRemoved,
|
|
want: wantReduce{
|
|
aggregateType: org.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (aggregate_id = $2)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"agg-id",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "reduceOrgRemoved",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(org.OrgRemovedEventType),
|
|
org.AggregateType,
|
|
[]byte(`{}`),
|
|
), org.OrgRemovedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceOrgRemoved,
|
|
want: wantReduce{
|
|
aggregateType: org.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (resource_owner = $1)",
|
|
expectedArgs: []interface{}{
|
|
"agg-id",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "org.IDPConfigRemovedEvent",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(org.IDPConfigRemovedEventType),
|
|
org.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id"
|
|
}`),
|
|
), org.IDPConfigRemovedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceIDPConfigRemoved,
|
|
want: wantReduce{
|
|
aggregateType: org.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (resource_owner = $2)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"ro-id",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "iam.IDPConfigRemovedEvent",
|
|
args: args{
|
|
event: getEvent(testEvent(
|
|
repository.EventType(iam.IDPConfigRemovedEventType),
|
|
iam.AggregateType,
|
|
[]byte(`{
|
|
"idpConfigId": "idp-config-id"
|
|
}`),
|
|
), iam.IDPConfigRemovedEventMapper),
|
|
},
|
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceIDPConfigRemoved,
|
|
want: wantReduce{
|
|
aggregateType: iam.AggregateType,
|
|
sequence: 15,
|
|
previousSequence: 10,
|
|
projection: IDPLoginPolicyLinkTable,
|
|
executer: &testExecuter{
|
|
executions: []execution{
|
|
{
|
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (resource_owner = $2)",
|
|
expectedArgs: []interface{}{
|
|
"idp-config-id",
|
|
"ro-id",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
event := baseEvent(t)
|
|
got, err := tt.reduce(event)
|
|
if _, ok := err.(errors.InvalidArgument); !ok {
|
|
t.Errorf("no wrong event mapping: %v, got: %v", err, got)
|
|
}
|
|
|
|
event = tt.args.event(t)
|
|
got, err = tt.reduce(event)
|
|
assertReduce(t, got, err, tt.want)
|
|
})
|
|
}
|
|
}
|