mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-19 06:17:32 +00:00
effc2c23c2
* fix: query tests * fix: use prepare funcs * fix: go mod * fix: generate files * fix(eventstore): tests * fix(eventstore): rename modifier to editor * fix(migrations): add cluster migration, fix(migrations): fix typo of host in clean clsuter * fix(eventstore): move health * fix(eventstore): AggregateTypeFilter aggregateType as param * code quality * fix: go tests * feat: add member funcs * feat: add member model * feat: add member events * feat: add member repo model * fix: better error func testing * fix: project member funcs * fix: add tests * fix: add tests * feat: implement member requests * fix: merge master * fix: merge master * fix: read existing in project repo * fix: fix tests * feat: add internal cache * feat: add cache mock * fix: return values of cache mock * feat: add project role * fix: add cache config * fix: add role to eventstore * fix: use eventstore sdk * fix: use eventstore sdk * fix: add project role grpc requests * fix: fix getby id * fix: changes for mr * fix: change value to interface * feat: add app event creations * fix: searchmethods * Update internal/project/model/project_member.go Co-Authored-By: Silvan <silvan.reusser@gmail.com> * fix: use get project func * fix: append events * fix: check if value is string on equal ignore case * fix: add changes test * fix: add go mod * fix: add some tests * fix: return err not nil * fix: return err not nil * fix: add aggregate funcs and tests * fix: add oidc aggregate funcs and tests * fix: add oidc * fix: add some tests * fix: tests * feat: eventstore repository * fix: remove gorm * version * feat: pkg * feat: eventstore without eventstore-lib * rename files * gnueg * fix: global model * feat: add global view functions * feat(eventstore): sdk * fix(eventstore): rename app to eventstore * delete empty test * fix(models): delete unused struct * feat(eventstore): overwrite context data * fix: use global sql config * fix: oidc validation * fix: generate client secret * fix: generate client id * fix: test change app * fix: deactivate/reactivate application * fix: change oidc config * fix: change oidc config secret * begin models * begin repo * fix: implement grpc app funcs * fix: add application requests * fix: converter * fix: converter * fix: converter and generate clientid * fix: tests * feat: project grant aggregate * feat: project grant * fix: project grant check if role existing * fix: project grant requests * fix: project grant fixes * fix: project grant member model * fix: project grant member aggregate * fix: project grant member eventstore * fix: project grant member requests * feat: user model * begin repo * repo models and more * feat: user command side * lots of functions * user command side * profile requests * commit before rebase on user * save * local config with gopass and more * begin new auth command (user centric) * Update internal/user/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/address.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/address.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/email.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/mfa.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/mfa.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/password.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/phone.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/model/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/model/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/usergrant/repository/eventsourcing/user_grant.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/user_test.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * Update internal/user/repository/eventsourcing/eventstore_mock_test.go Co-Authored-By: Livio Amstutz <livio.a@gmail.com> * changes from mr review * save files into basedir * changes from mr review * changes from mr review * move to auth request * Update internal/usergrant/repository/eventsourcing/cache.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * Update internal/usergrant/repository/eventsourcing/cache.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * changes requested on mr * fix generate codes * fix return if no events * password code * email verification step * more steps * lot of mfa * begin tests * more next steps * auth api * auth api (user) * auth api (user) * auth api (user) * differ requests * merge * tests * fix compilation error * mock for id generator * Update internal/user/repository/eventsourcing/model/password.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * Update internal/user/repository/eventsourcing/model/user.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * requests of mr * check email * begin separation of command and query * otp * change packages * some cleanup and fixes * tests for auth request / next steps * add VerificationLifetimes to config and make it run * tests * fix code challenge validation * cleanup * fix merge * begin view * repackaging tests and configs * fix startup config for auth * add migration * add PromptSelectAccount * fix copy / paste * remove user_agent files * fixes * fix sequences in user_session * token commands * token queries and signout * fix * fix set password test * add token handler and table * handle session init * add session state * add user view test cases * change VerifyMyMfaOTP * some fixes * fix user repo in auth api * cleanup * add user session view test * fix merge * fixes * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * Update internal/auth/repository/eventsourcing/eventstore/auth_request.go Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com> * extract method usersForUserSelection * add todo for policy check * id on auth req * fix enum name Co-authored-by: Fabiennne <fabienne.gerschwiler@gmail.com> Co-authored-by: adlerhurst <silvan.reusser@gmail.com> Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
264 lines
5.2 KiB
Go
264 lines
5.2 KiB
Go
package model
|
|
|
|
import (
|
|
"net"
|
|
"reflect"
|
|
"testing"
|
|
)
|
|
|
|
func TestAuthRequest_IsValid(t *testing.T) {
|
|
type fields struct {
|
|
ID string
|
|
AgentID string
|
|
BrowserInfo *BrowserInfo
|
|
ApplicationID string
|
|
CallbackURI string
|
|
Request Request
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
want bool
|
|
}{
|
|
{
|
|
"missing id, false",
|
|
fields{},
|
|
false,
|
|
},
|
|
{
|
|
"missing agent id, false",
|
|
fields{
|
|
ID: "id",
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"missing browser info, false",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"browser info invalid, false",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{},
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"missing application id, false",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "user agent",
|
|
AcceptLanguage: "accept language",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"missing callback uri, false",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "user agent",
|
|
AcceptLanguage: "accept language",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
ApplicationID: "appID",
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"missing request, false",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "user agent",
|
|
AcceptLanguage: "accept language",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
ApplicationID: "appID",
|
|
CallbackURI: "schema://callback",
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"request invalid, false",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "user agent",
|
|
AcceptLanguage: "accept language",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
ApplicationID: "appID",
|
|
CallbackURI: "schema://callback",
|
|
Request: &AuthRequestOIDC{},
|
|
},
|
|
false,
|
|
},
|
|
{
|
|
"valid auth request, true",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "user agent",
|
|
AcceptLanguage: "accept language",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
ApplicationID: "appID",
|
|
CallbackURI: "schema://callback",
|
|
Request: &AuthRequestOIDC{
|
|
Scopes: []string{"openid"},
|
|
CodeChallenge: &OIDCCodeChallenge{
|
|
Challenge: "challenge",
|
|
Method: CodeChallengeMethodS256,
|
|
},
|
|
},
|
|
},
|
|
true,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
a := &AuthRequest{
|
|
ID: tt.fields.ID,
|
|
AgentID: tt.fields.AgentID,
|
|
BrowserInfo: tt.fields.BrowserInfo,
|
|
ApplicationID: tt.fields.ApplicationID,
|
|
CallbackURI: tt.fields.CallbackURI,
|
|
Request: tt.fields.Request,
|
|
}
|
|
if got := a.IsValid(); got != tt.want {
|
|
t.Errorf("IsValid() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAuthRequest_MfaLevel(t *testing.T) {
|
|
type fields struct {
|
|
Prompt Prompt
|
|
PossibleLOAs []LevelOfAssurance
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
want MfaLevel
|
|
}{
|
|
//PLANNED: Add / replace test cases when LOA is set
|
|
{"-1",
|
|
fields{},
|
|
-1,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
a := &AuthRequest{
|
|
Prompt: tt.fields.Prompt,
|
|
PossibleLOAs: tt.fields.PossibleLOAs,
|
|
}
|
|
if got := a.MfaLevel(); got != tt.want {
|
|
t.Errorf("MfaLevel() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAuthRequest_WithCurrentInfo(t *testing.T) {
|
|
type fields struct {
|
|
ID string
|
|
AgentID string
|
|
BrowserInfo *BrowserInfo
|
|
}
|
|
type args struct {
|
|
info *BrowserInfo
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
fields fields
|
|
args args
|
|
want *AuthRequest
|
|
}{
|
|
{
|
|
"unchanged",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "ua",
|
|
AcceptLanguage: "de",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
},
|
|
args{
|
|
&BrowserInfo{
|
|
UserAgent: "ua",
|
|
AcceptLanguage: "de",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
},
|
|
&AuthRequest{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "ua",
|
|
AcceptLanguage: "de",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
"changed",
|
|
fields{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "ua",
|
|
AcceptLanguage: "de",
|
|
RemoteIP: net.IPv4(29, 4, 20, 19),
|
|
},
|
|
},
|
|
args{
|
|
&BrowserInfo{
|
|
UserAgent: "ua",
|
|
AcceptLanguage: "de",
|
|
RemoteIP: net.IPv4(16, 12, 20, 19),
|
|
},
|
|
},
|
|
&AuthRequest{
|
|
ID: "id",
|
|
AgentID: "agentID",
|
|
BrowserInfo: &BrowserInfo{
|
|
UserAgent: "ua",
|
|
AcceptLanguage: "de",
|
|
RemoteIP: net.IPv4(16, 12, 20, 19),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
a := &AuthRequest{
|
|
ID: tt.fields.ID,
|
|
AgentID: tt.fields.AgentID,
|
|
BrowserInfo: tt.fields.BrowserInfo,
|
|
}
|
|
if got := a.WithCurrentInfo(tt.args.info); !reflect.DeepEqual(got, tt.want) {
|
|
t.Errorf("WithCurrentInfo() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|