2022-07-28 13:42:35 +00:00
|
|
|
package query
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-12-01 08:18:53 +00:00
|
|
|
|
2022-07-28 13:42:35 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/crypto"
|
|
|
|
"github.com/zitadel/zitadel/internal/domain"
|
2022-12-01 08:18:53 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/errors"
|
2022-07-28 13:42:35 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/eventstore"
|
|
|
|
"github.com/zitadel/zitadel/internal/repository/user"
|
|
|
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
|
|
|
)
|
|
|
|
|
2022-12-01 08:18:53 +00:00
|
|
|
func (q *Queries) GetHumanOTPSecret(ctx context.Context, userID, resourceowner string) (_ string, err error) {
|
|
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
|
|
defer func() { span.EndWithError(err) }()
|
|
|
|
|
2022-07-28 13:42:35 +00:00
|
|
|
if userID == "" {
|
2022-12-01 08:18:53 +00:00
|
|
|
return "", errors.ThrowPreconditionFailed(nil, "QUERY-8N9ds", "Errors.User.UserIDMissing")
|
2022-07-28 13:42:35 +00:00
|
|
|
}
|
|
|
|
existingOTP, err := q.otpWriteModelByID(ctx, userID, resourceowner)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if existingOTP.State != domain.MFAStateReady {
|
2022-12-01 08:18:53 +00:00
|
|
|
return "", errors.ThrowNotFound(nil, "QUERY-01982h", "Errors.User.NotFound")
|
2022-07-28 13:42:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return crypto.DecryptString(existingOTP.Secret, q.multifactors.OTP.CryptoMFA)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (q *Queries) otpWriteModelByID(ctx context.Context, userID, resourceOwner string) (writeModel *HumanOTPWriteModel, err error) {
|
|
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
|
|
defer func() { span.EndWithError(err) }()
|
|
|
|
|
|
|
|
writeModel = NewHumanOTPWriteModel(userID, resourceOwner)
|
|
|
|
err = q.eventstore.FilterToQueryReducer(ctx, writeModel)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return writeModel, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type HumanOTPWriteModel struct {
|
|
|
|
eventstore.WriteModel
|
|
|
|
|
|
|
|
State domain.MFAState
|
|
|
|
Secret *crypto.CryptoValue
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewHumanOTPWriteModel(userID, resourceOwner string) *HumanOTPWriteModel {
|
|
|
|
return &HumanOTPWriteModel{
|
|
|
|
WriteModel: eventstore.WriteModel{
|
|
|
|
AggregateID: userID,
|
|
|
|
ResourceOwner: resourceOwner,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (wm *HumanOTPWriteModel) Reduce() error {
|
|
|
|
for _, event := range wm.Events {
|
|
|
|
switch e := event.(type) {
|
|
|
|
case *user.HumanOTPAddedEvent:
|
|
|
|
wm.Secret = e.Secret
|
|
|
|
wm.State = domain.MFAStateNotReady
|
|
|
|
case *user.HumanOTPVerifiedEvent:
|
|
|
|
wm.State = domain.MFAStateReady
|
|
|
|
case *user.HumanOTPRemovedEvent:
|
|
|
|
wm.State = domain.MFAStateRemoved
|
|
|
|
case *user.UserRemovedEvent:
|
|
|
|
wm.State = domain.MFAStateRemoved
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return wm.WriteModel.Reduce()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (wm *HumanOTPWriteModel) Query() *eventstore.SearchQueryBuilder {
|
|
|
|
query := eventstore.NewSearchQueryBuilder(eventstore.ColumnsEvent).
|
|
|
|
AddQuery().
|
|
|
|
AggregateTypes(user.AggregateType).
|
|
|
|
AggregateIDs(wm.AggregateID).
|
|
|
|
EventTypes(user.HumanMFAOTPAddedType,
|
|
|
|
user.HumanMFAOTPVerifiedType,
|
|
|
|
user.HumanMFAOTPRemovedType,
|
|
|
|
user.UserRemovedType,
|
|
|
|
user.UserV1MFAOTPAddedType,
|
|
|
|
user.UserV1MFAOTPVerifiedType,
|
|
|
|
user.UserV1MFAOTPRemovedType).
|
|
|
|
Builder()
|
|
|
|
|
|
|
|
if wm.ResourceOwner != "" {
|
|
|
|
query.ResourceOwner(wm.ResourceOwner)
|
|
|
|
}
|
|
|
|
return query
|
|
|
|
}
|