2021-01-04 13:52:13 +00:00
|
|
|
package command
|
2020-12-11 14:49:19 +00:00
|
|
|
|
|
|
|
import (
|
2021-02-23 14:13:04 +00:00
|
|
|
"github.com/caos/zitadel/internal/domain"
|
|
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
|
|
"github.com/caos/zitadel/internal/repository/policy"
|
2020-12-11 14:49:19 +00:00
|
|
|
)
|
|
|
|
|
2021-01-04 13:52:13 +00:00
|
|
|
type PasswordLockoutPolicyWriteModel struct {
|
2020-12-11 14:49:19 +00:00
|
|
|
eventstore.WriteModel
|
|
|
|
|
|
|
|
MaxAttempts uint64
|
|
|
|
ShowLockOutFailures bool
|
2021-01-07 15:06:45 +00:00
|
|
|
State domain.PolicyState
|
2020-12-11 14:49:19 +00:00
|
|
|
}
|
|
|
|
|
2021-01-04 13:52:13 +00:00
|
|
|
func (wm *PasswordLockoutPolicyWriteModel) Reduce() error {
|
2020-12-11 14:49:19 +00:00
|
|
|
for _, event := range wm.Events {
|
|
|
|
switch e := event.(type) {
|
2021-01-04 13:52:13 +00:00
|
|
|
case *policy.PasswordLockoutPolicyAddedEvent:
|
2020-12-11 14:49:19 +00:00
|
|
|
wm.MaxAttempts = e.MaxAttempts
|
|
|
|
wm.ShowLockOutFailures = e.ShowLockOutFailures
|
2021-01-07 15:06:45 +00:00
|
|
|
wm.State = domain.PolicyStateActive
|
2021-01-04 13:52:13 +00:00
|
|
|
case *policy.PasswordLockoutPolicyChangedEvent:
|
2021-01-06 10:12:56 +00:00
|
|
|
if e.MaxAttempts != nil {
|
|
|
|
wm.MaxAttempts = *e.MaxAttempts
|
|
|
|
}
|
|
|
|
if e.ShowLockOutFailures != nil {
|
|
|
|
wm.ShowLockOutFailures = *e.ShowLockOutFailures
|
|
|
|
}
|
2021-01-04 13:52:13 +00:00
|
|
|
case *policy.PasswordLockoutPolicyRemovedEvent:
|
2021-01-07 15:06:45 +00:00
|
|
|
wm.State = domain.PolicyStateRemoved
|
2020-12-11 14:49:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return wm.WriteModel.Reduce()
|
|
|
|
}
|