feat: rebuild auth identity foundation flow
This commit is contained in:
124
backend/ent/schema/auth_identity_schema_test.go
Normal file
124
backend/ent/schema/auth_identity_schema_test.go
Normal file
@@ -0,0 +1,124 @@
|
||||
package schema
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"entgo.io/ent/entc/load"
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
func TestAuthIdentityFoundationSchemas(t *testing.T) {
|
||||
spec, err := (&load.Config{Path: "."}).Load()
|
||||
require.NoError(t, err)
|
||||
|
||||
schemas := map[string]*load.Schema{}
|
||||
for _, schema := range spec.Schemas {
|
||||
schemas[schema.Name] = schema
|
||||
}
|
||||
|
||||
authIdentity := requireSchema(t, schemas, "AuthIdentity")
|
||||
requireSchemaFields(t, authIdentity,
|
||||
"user_id",
|
||||
"provider_type",
|
||||
"provider_key",
|
||||
"provider_subject",
|
||||
"verified_at",
|
||||
"issuer",
|
||||
"metadata",
|
||||
)
|
||||
requireHasUniqueIndex(t, authIdentity, "provider_type", "provider_key", "provider_subject")
|
||||
|
||||
authIdentityChannel := requireSchema(t, schemas, "AuthIdentityChannel")
|
||||
requireSchemaFields(t, authIdentityChannel,
|
||||
"identity_id",
|
||||
"provider_type",
|
||||
"provider_key",
|
||||
"channel",
|
||||
"channel_app_id",
|
||||
"channel_subject",
|
||||
"metadata",
|
||||
)
|
||||
requireHasUniqueIndex(t, authIdentityChannel, "provider_type", "provider_key", "channel", "channel_app_id", "channel_subject")
|
||||
|
||||
pendingAuthSession := requireSchema(t, schemas, "PendingAuthSession")
|
||||
requireSchemaFields(t, pendingAuthSession,
|
||||
"intent",
|
||||
"provider_type",
|
||||
"provider_key",
|
||||
"provider_subject",
|
||||
"target_user_id",
|
||||
"redirect_to",
|
||||
"resolved_email",
|
||||
"registration_password_hash",
|
||||
"upstream_identity_claims",
|
||||
"local_flow_state",
|
||||
"browser_session_key",
|
||||
"completion_code_hash",
|
||||
"completion_code_expires_at",
|
||||
"email_verified_at",
|
||||
"password_verified_at",
|
||||
"totp_verified_at",
|
||||
"expires_at",
|
||||
"consumed_at",
|
||||
)
|
||||
|
||||
adoptionDecision := requireSchema(t, schemas, "IdentityAdoptionDecision")
|
||||
requireSchemaFields(t, adoptionDecision,
|
||||
"pending_auth_session_id",
|
||||
"identity_id",
|
||||
"adopt_display_name",
|
||||
"adopt_avatar",
|
||||
"decided_at",
|
||||
)
|
||||
requireHasUniqueIndex(t, adoptionDecision, "pending_auth_session_id")
|
||||
|
||||
userSchema := requireSchema(t, schemas, "User")
|
||||
requireSchemaFields(t, userSchema, "signup_source", "last_login_at", "last_active_at")
|
||||
}
|
||||
|
||||
func requireSchema(t *testing.T, schemas map[string]*load.Schema, name string) *load.Schema {
|
||||
t.Helper()
|
||||
|
||||
schema, ok := schemas[name]
|
||||
require.True(t, ok, "schema %s should exist", name)
|
||||
return schema
|
||||
}
|
||||
|
||||
func requireSchemaFields(t *testing.T, schema *load.Schema, names ...string) {
|
||||
t.Helper()
|
||||
|
||||
fields := map[string]struct{}{}
|
||||
for _, field := range schema.Fields {
|
||||
fields[field.Name] = struct{}{}
|
||||
}
|
||||
|
||||
for _, name := range names {
|
||||
_, ok := fields[name]
|
||||
require.True(t, ok, "schema %s should include field %s", schema.Name, name)
|
||||
}
|
||||
}
|
||||
|
||||
func requireHasUniqueIndex(t *testing.T, schema *load.Schema, fields ...string) {
|
||||
t.Helper()
|
||||
|
||||
for _, index := range schema.Indexes {
|
||||
if !index.Unique {
|
||||
continue
|
||||
}
|
||||
if len(index.Fields) != len(fields) {
|
||||
continue
|
||||
}
|
||||
match := true
|
||||
for i := range fields {
|
||||
if index.Fields[i] != fields[i] {
|
||||
match = false
|
||||
break
|
||||
}
|
||||
}
|
||||
if match {
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
require.Failf(t, "missing unique index", "schema %s should include unique index on %v", schema.Name, fields)
|
||||
}
|
||||
Reference in New Issue
Block a user