Skip to content

Commit 6b08d00

Browse files
committed
Add granting user for OnBoardUser command
1 parent 6f6d5d2 commit 6b08d00

10 files changed

+211
-56
lines changed

cmd/goauth2/main.go

+27-19
Original file line numberDiff line numberDiff line change
@@ -123,32 +123,40 @@ func initDB(goauth2App *goauth2.App, store rangedb.Store, goAuth2Host string) er
123123
clientSecret = "c1e847aef925467290b4302e64f3de4e"
124124
)
125125

126-
goauth2App.Dispatch(goauth2.OnBoardUser{
127-
UserID: userID,
128-
Username: email,
129-
Password: password,
130-
})
131-
132-
goauth2App.Dispatch(goauth2.OnBoardUser{
133-
UserID: userID2,
134-
Username: email2,
135-
Password: password2,
136-
})
137-
138126
ctx := context.Background()
139-
_, err := store.Save(ctx, &rangedb.EventRecord{
140-
Event: goauth2.UserWasGrantedAdministratorRole{
141-
UserID: userID,
142-
GrantingUserID: userID,
127+
_, err := store.Save(ctx,
128+
&rangedb.EventRecord{
129+
Event: goauth2.UserWasOnBoarded{
130+
UserID: userID,
131+
Username: email,
132+
PasswordHash: goauth2.GeneratePasswordHash(password),
133+
GrantingUserID: userID,
134+
},
135+
Metadata: map[string]string{
136+
"message": "epoch event",
137+
},
143138
},
144-
Metadata: map[string]string{
145-
"message": "epoch event",
139+
&rangedb.EventRecord{
140+
Event: goauth2.UserWasGrantedAdministratorRole{
141+
UserID: userID,
142+
GrantingUserID: userID,
143+
},
144+
Metadata: map[string]string{
145+
"message": "epoch event",
146+
},
146147
},
147-
})
148+
)
148149
if err != nil {
149150
return err
150151
}
151152

153+
goauth2App.Dispatch(goauth2.OnBoardUser{
154+
UserID: userID2,
155+
Username: email2,
156+
Password: password2,
157+
GrantingUserID: userID,
158+
})
159+
152160
goauth2App.Dispatch(goauth2.AuthorizeUserToOnBoardClientApplications{
153161
UserID: userID,
154162
AuthorizingUserID: userID,

go.mod

+1
Original file line numberDiff line numberDiff line change
@@ -22,5 +22,6 @@ require (
2222

2323
require (
2424
github.com/dustin/go-humanize v1.0.0 // indirect
25+
github.com/fatih/structtag v1.2.0 // indirect
2526
github.com/gorilla/websocket v1.4.2 // indirect
2627
)

go.sum

+1
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymF
1313
github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
1414
github.com/envoyproxy/go-control-plane v0.9.7/go.mod h1:cwu0lG7PUMfa9snN8LXBig5ynNVH9qI8YYLbd1fK2po=
1515
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
16+
github.com/fatih/structtag v1.2.0 h1:/OdNE99OxoI/PqaW/SuSK9uxxT3f/tcSZgon/ssNSx4=
1617
github.com/fatih/structtag v1.2.0/go.mod h1:mBJUNpUnHmRKrKlQQlmCrh5PuhftFbNv8Ys4/aAZl94=
1718
github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
1819
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=

goauth2_test.go

+117-22
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,11 @@ const (
2727
invalidRedirectURI = "://invalid-uri"
2828
insecureRedirectURI = "http://example.com/oauth2/callback"
2929
userID = "d904f8dbd4684a6591a24c8e67ea4a77"
30+
userID2 = "e9de5c5ca4364fcb84ac2efc26382dbf"
3031
adminUserID = "7dd7157576e5426ebf44e387d80f0538"
32+
notFoundUserID = "92338d7f50df48f9b3d0ba4250b12e7a"
3133
34+
email2 = "[email protected]"
3235
adminEmail = "[email protected]"
3336
passwordHash = "$2a$10$U6ej0p2d9Y8OO2635R7l/O4oEBvxgc9o6gCaQ1wjMZ77dr4qGl8nu"
3437
password = "Pass123!"
@@ -48,44 +51,124 @@ var (
4851

4952
func Test_OnBoardUser(t *testing.T) {
5053
t.Run("on-boards user", goauth2TestCase().
51-
Given().
54+
Given(
55+
goauth2.UserWasOnBoarded{
56+
UserID: adminUserID,
57+
Username: email,
58+
PasswordHash: passwordHash,
59+
GrantingUserID: adminUserID,
60+
},
61+
goauth2.UserWasGrantedAdministratorRole{
62+
UserID: adminUserID,
63+
GrantingUserID: adminUserID,
64+
},
65+
).
5266
When(goauth2.OnBoardUser{
53-
UserID: userID,
54-
Username: email,
55-
Password: password,
67+
UserID: userID,
68+
Username: email,
69+
Password: password,
70+
GrantingUserID: adminUserID,
5671
}).
5772
ThenInspectEvents(func(t *testing.T, events []rangedb.Event) {
5873
require.Equal(t, 1, len(events))
5974
event := events[0].(goauth2.UserWasOnBoarded)
6075
assert.Equal(t, userID, event.UserID)
6176
assert.Equal(t, email, event.Username)
77+
assert.Equal(t, adminUserID, event.GrantingUserID)
6278
assert.True(t, goauth2.VerifyPassword(event.PasswordHash, password))
6379
}))
6480

65-
t.Run("rejected due to existing user", goauth2TestCase().
66-
Given(goauth2.UserWasOnBoarded{
67-
UserID: userID,
68-
Username: email,
69-
PasswordHash: passwordHash,
81+
t.Run("rejected due to not found administrator", goauth2TestCase().
82+
Given().
83+
When(goauth2.OnBoardUser{
84+
UserID: userID,
85+
Username: email,
86+
Password: password,
87+
GrantingUserID: notFoundUserID,
7088
}).
89+
Then(goauth2.OnBoardUserWasRejectedDueToNonAdministrator{
90+
UserID: userID,
91+
GrantingUserID: notFoundUserID,
92+
}))
93+
94+
t.Run("rejected due to non-administrator", goauth2TestCase().
95+
Given(
96+
goauth2.UserWasOnBoarded{
97+
UserID: userID,
98+
Username: email,
99+
PasswordHash: passwordHash,
100+
GrantingUserID: adminUserID,
101+
},
102+
goauth2.UserWasOnBoarded{
103+
UserID: userID2,
104+
Username: email2,
105+
PasswordHash: passwordHash,
106+
GrantingUserID: adminUserID,
107+
},
108+
).
71109
When(goauth2.OnBoardUser{
72-
UserID: userID,
73-
Username: email,
74-
Password: password,
110+
UserID: userID,
111+
Username: email,
112+
Password: password,
113+
GrantingUserID: userID2,
114+
}).
115+
Then(goauth2.OnBoardUserWasRejectedDueToNonAdministrator{
116+
UserID: userID,
117+
GrantingUserID: userID2,
118+
}))
119+
120+
t.Run("rejected due to existing user", goauth2TestCase().
121+
Given(
122+
goauth2.UserWasOnBoarded{
123+
UserID: adminUserID,
124+
Username: email,
125+
PasswordHash: passwordHash,
126+
GrantingUserID: adminUserID,
127+
},
128+
goauth2.UserWasGrantedAdministratorRole{
129+
UserID: adminUserID,
130+
GrantingUserID: adminUserID,
131+
},
132+
goauth2.UserWasOnBoarded{
133+
UserID: userID,
134+
Username: email,
135+
PasswordHash: passwordHash,
136+
GrantingUserID: adminUserID,
137+
},
138+
).
139+
When(goauth2.OnBoardUser{
140+
UserID: userID,
141+
Username: email,
142+
Password: password,
143+
GrantingUserID: adminUserID,
75144
}).
76145
Then(goauth2.OnBoardUserWasRejectedDueToExistingUser{
77-
UserID: userID,
146+
UserID: userID,
147+
GrantingUserID: adminUserID,
78148
}))
79149

80150
t.Run("rejected due to insecure password", goauth2TestCase().
81-
Given().
151+
Given(
152+
goauth2.UserWasOnBoarded{
153+
UserID: adminUserID,
154+
Username: email,
155+
PasswordHash: passwordHash,
156+
GrantingUserID: adminUserID,
157+
},
158+
goauth2.UserWasGrantedAdministratorRole{
159+
UserID: adminUserID,
160+
GrantingUserID: adminUserID,
161+
},
162+
).
82163
When(goauth2.OnBoardUser{
83-
UserID: userID,
84-
Username: email,
85-
Password: "password",
164+
UserID: userID,
165+
Username: email,
166+
Password: "password",
167+
GrantingUserID: adminUserID,
86168
}).
87169
Then(goauth2.OnBoardUserWasRejectedDueToInsecurePassword{
88-
UserID: userID,
170+
UserID: userID,
171+
GrantingUserID: adminUserID,
89172
}))
90173

91174
var logBuffer bytes.Buffer
@@ -94,11 +177,23 @@ func Test_OnBoardUser(t *testing.T) {
94177
goauth2.WithStore(rangedbtest.NewFailingEventStore()),
95178
goauth2.WithLogger(logger),
96179
).
97-
Given().
180+
Given(
181+
goauth2.UserWasOnBoarded{
182+
UserID: adminUserID,
183+
Username: email,
184+
PasswordHash: passwordHash,
185+
GrantingUserID: adminUserID,
186+
},
187+
goauth2.UserWasGrantedAdministratorRole{
188+
UserID: adminUserID,
189+
GrantingUserID: adminUserID,
190+
},
191+
).
98192
When(goauth2.OnBoardUser{
99-
UserID: userID,
100-
Username: email,
101-
Password: password,
193+
UserID: userID,
194+
Username: email,
195+
Password: password,
196+
GrantingUserID: adminUserID,
102197
}).
103198
ThenInspectEvents(func(t *testing.T, events []rangedb.Event) {
104199
require.Equal(t, 0, len(events))

projection/users.go

+13-2
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ import (
1212
type user struct {
1313
UserID string
1414
Username string
15+
GrantingUserID string
1516
CreateTimestamp uint64
1617
IsAdmin bool
1718
CanOnboardAdminApplications bool
@@ -38,14 +39,19 @@ func (a *Users) Accept(record *rangedb.Record) {
3839
a.users[event.UserID] = &user{
3940
UserID: event.UserID,
4041
Username: event.Username,
42+
GrantingUserID: event.GrantingUserID,
4143
CreateTimestamp: record.InsertTimestamp,
4244
}
4345

4446
case *goauth2.UserWasGrantedAdministratorRole:
45-
a.users[event.UserID].IsAdmin = true
47+
if a.userExists(event.UserID) {
48+
a.users[event.UserID].IsAdmin = true
49+
}
4650

4751
case *goauth2.UserWasAuthorizedToOnBoardClientApplications:
48-
a.users[event.UserID].CanOnboardAdminApplications = true
52+
if a.userExists(event.UserID) {
53+
a.users[event.UserID].CanOnboardAdminApplications = true
54+
}
4955

5056
}
5157
}
@@ -67,3 +73,8 @@ func (a *Users) GetAll() []*user {
6773

6874
return users
6975
}
76+
77+
func (a *Users) userExists(userID string) bool {
78+
_, ok := a.users[userID]
79+
return ok
80+
}

resource_owner.go

+8-5
Original file line numberDiff line numberDiff line change
@@ -100,22 +100,25 @@ func (a *resourceOwner) Handle(command Command) {
100100
func (a *resourceOwner) OnBoardUser(c OnBoardUser) {
101101
if a.IsOnBoarded {
102102
a.raise(OnBoardUserWasRejectedDueToExistingUser{
103-
UserID: c.UserID,
103+
UserID: c.UserID,
104+
GrantingUserID: c.GrantingUserID,
104105
})
105106
return
106107
}
107108

108109
if securepass.IsInsecure(c.Password) {
109110
a.raise(OnBoardUserWasRejectedDueToInsecurePassword{
110-
UserID: c.UserID,
111+
UserID: c.UserID,
112+
GrantingUserID: c.GrantingUserID,
111113
})
112114
return
113115
}
114116

115117
a.raise(UserWasOnBoarded{
116-
UserID: c.UserID,
117-
Username: c.Username,
118-
PasswordHash: GeneratePasswordHash(c.Password),
118+
UserID: c.UserID,
119+
Username: c.Username,
120+
PasswordHash: GeneratePasswordHash(c.Password),
121+
GrantingUserID: c.GrantingUserID,
119122
})
120123
}
121124

resource_owner_command_authorization.go

+26
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ func (a *resourceOwnerCommandAuthorization) CommandTypes() []string {
3535
GrantUserAdministratorRole{}.CommandType(),
3636
AuthorizeUserToOnBoardClientApplications{}.CommandType(),
3737
OnBoardClientApplication{}.CommandType(),
38+
OnBoardUser{}.CommandType(),
3839
}
3940
}
4041

@@ -50,6 +51,9 @@ func (a *resourceOwnerCommandAuthorization) Handle(command Command) bool {
5051
case OnBoardClientApplication:
5152
return a.OnBoardClientApplication(c)
5253

54+
case OnBoardUser:
55+
return a.OnBoardUser(c)
56+
5357
}
5458

5559
return true
@@ -121,6 +125,28 @@ func (a *resourceOwnerCommandAuthorization) OnBoardClientApplication(c OnBoardCl
121125
return true
122126
}
123127

128+
func (a *resourceOwnerCommandAuthorization) OnBoardUser(c OnBoardUser) bool {
129+
resourceOwner := a.loadResourceOwnerAggregate(c.GrantingUserID)
130+
131+
if !resourceOwner.IsOnBoarded {
132+
a.raise(OnBoardUserWasRejectedDueToNonAdministrator{
133+
UserID: c.UserID,
134+
GrantingUserID: c.GrantingUserID,
135+
})
136+
return false
137+
}
138+
139+
if !resourceOwner.IsAdministrator {
140+
a.raise(OnBoardUserWasRejectedDueToNonAdministrator{
141+
UserID: c.UserID,
142+
GrantingUserID: c.GrantingUserID,
143+
})
144+
return false
145+
}
146+
147+
return true
148+
}
149+
124150
func (a *resourceOwnerCommandAuthorization) raise(events ...rangedb.Event) {
125151
a.pendingEvents = append(a.pendingEvents, events...)
126152
}

resource_owner_commands.go

+4-3
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@ package goauth2
33
//go:generate go run github.com/inklabs/rangedb/gen/commandgenerator -id UserID -aggregateType resource-owner
44

55
type OnBoardUser struct {
6-
UserID string `json:"userID"`
7-
Username string `json:"username"`
8-
Password string `json:"password"`
6+
UserID string `json:"userID"`
7+
Username string `json:"username"`
8+
Password string `json:"password"`
9+
GrantingUserID string `json:"grantingUserID"`
910
}
1011
type GrantUserAdministratorRole struct {
1112
UserID string `json:"userID"`

0 commit comments

Comments
 (0)