2022-03-24 17:21:34 +01:00
|
|
|
package instance
|
2021-01-04 14:52:13 +01:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-02-21 16:05:02 +01:00
|
|
|
"time"
|
2022-01-03 09:19:07 +01:00
|
|
|
|
2022-04-27 01:01:45 +02:00
|
|
|
"github.com/zitadel/zitadel/internal/eventstore"
|
2021-02-18 14:48:27 +01:00
|
|
|
|
2022-04-27 01:01:45 +02:00
|
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
|
|
"github.com/zitadel/zitadel/internal/eventstore/repository"
|
|
|
|
"github.com/zitadel/zitadel/internal/repository/policy"
|
2021-01-04 14:52:13 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2022-03-24 17:21:34 +01:00
|
|
|
LoginPolicyAddedEventType = instanceEventTypePrefix + policy.LoginPolicyAddedEventType
|
|
|
|
LoginPolicyChangedEventType = instanceEventTypePrefix + policy.LoginPolicyChangedEventType
|
2021-01-04 14:52:13 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
type LoginPolicyAddedEvent struct {
|
|
|
|
policy.LoginPolicyAddedEvent
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewLoginPolicyAddedEvent(
|
|
|
|
ctx context.Context,
|
2021-02-18 14:48:27 +01:00
|
|
|
aggregate *eventstore.Aggregate,
|
2021-01-04 14:52:13 +01:00
|
|
|
allowUsernamePassword,
|
|
|
|
allowRegister,
|
|
|
|
allowExternalIDP,
|
2021-06-03 11:53:30 +02:00
|
|
|
forceMFA,
|
2022-05-16 15:39:09 +02:00
|
|
|
hidePasswordReset,
|
2022-10-06 13:30:14 +02:00
|
|
|
ignoreUnknownUsernames,
|
|
|
|
allowDomainDiscovery bool,
|
2021-01-04 14:52:13 +01:00
|
|
|
passwordlessType domain.PasswordlessType,
|
2022-05-16 15:39:09 +02:00
|
|
|
defaultRedirectURI string,
|
2022-02-21 16:05:02 +01:00
|
|
|
passwordCheckLifetime,
|
|
|
|
externalLoginCheckLifetime,
|
|
|
|
mfaInitSkipLifetime,
|
|
|
|
secondFactorCheckLifetime,
|
|
|
|
multiFactorCheckLifetime time.Duration,
|
2021-01-04 14:52:13 +01:00
|
|
|
) *LoginPolicyAddedEvent {
|
|
|
|
return &LoginPolicyAddedEvent{
|
|
|
|
LoginPolicyAddedEvent: *policy.NewLoginPolicyAddedEvent(
|
2021-02-18 14:48:27 +01:00
|
|
|
eventstore.NewBaseEventForPush(
|
|
|
|
ctx,
|
|
|
|
aggregate,
|
|
|
|
LoginPolicyAddedEventType),
|
2021-01-04 14:52:13 +01:00
|
|
|
allowUsernamePassword,
|
|
|
|
allowRegister,
|
|
|
|
allowExternalIDP,
|
|
|
|
forceMFA,
|
2021-06-03 11:53:30 +02:00
|
|
|
hidePasswordReset,
|
2022-05-16 15:39:09 +02:00
|
|
|
ignoreUnknownUsernames,
|
2022-10-06 13:30:14 +02:00
|
|
|
allowDomainDiscovery,
|
2022-02-21 16:05:02 +01:00
|
|
|
passwordlessType,
|
2022-05-16 15:39:09 +02:00
|
|
|
defaultRedirectURI,
|
2022-02-21 16:05:02 +01:00
|
|
|
passwordCheckLifetime,
|
|
|
|
externalLoginCheckLifetime,
|
|
|
|
mfaInitSkipLifetime,
|
|
|
|
secondFactorCheckLifetime,
|
|
|
|
multiFactorCheckLifetime),
|
2021-01-04 14:52:13 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-03 09:19:07 +01:00
|
|
|
func LoginPolicyAddedEventMapper(event *repository.Event) (eventstore.Event, error) {
|
2021-01-04 14:52:13 +01:00
|
|
|
e, err := policy.LoginPolicyAddedEventMapper(event)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &LoginPolicyAddedEvent{LoginPolicyAddedEvent: *e.(*policy.LoginPolicyAddedEvent)}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type LoginPolicyChangedEvent struct {
|
|
|
|
policy.LoginPolicyChangedEvent
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewLoginPolicyChangedEvent(
|
|
|
|
ctx context.Context,
|
2021-02-18 14:48:27 +01:00
|
|
|
aggregate *eventstore.Aggregate,
|
2021-01-18 11:24:15 +01:00
|
|
|
changes []policy.LoginPolicyChanges,
|
|
|
|
) (*LoginPolicyChangedEvent, error) {
|
|
|
|
changedEvent, err := policy.NewLoginPolicyChangedEvent(
|
2021-02-18 14:48:27 +01:00
|
|
|
eventstore.NewBaseEventForPush(
|
|
|
|
ctx,
|
|
|
|
aggregate,
|
|
|
|
LoginPolicyChangedEventType),
|
2021-01-18 11:24:15 +01:00
|
|
|
changes,
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2021-01-04 14:52:13 +01:00
|
|
|
}
|
2021-01-18 11:24:15 +01:00
|
|
|
return &LoginPolicyChangedEvent{LoginPolicyChangedEvent: *changedEvent}, nil
|
2021-01-04 14:52:13 +01:00
|
|
|
}
|
|
|
|
|
2022-01-03 09:19:07 +01:00
|
|
|
func LoginPolicyChangedEventMapper(event *repository.Event) (eventstore.Event, error) {
|
2021-01-04 14:52:13 +01:00
|
|
|
e, err := policy.LoginPolicyChangedEventMapper(event)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &LoginPolicyChangedEvent{LoginPolicyChangedEvent: *e.(*policy.LoginPolicyChangedEvent)}, nil
|
|
|
|
}
|