mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 19:14:23 +00:00
54 lines
2.0 KiB
Go
54 lines
2.0 KiB
Go
|
package eventsourcing
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
|
||
|
"github.com/caos/zitadel/internal/errors"
|
||
|
es_models "github.com/caos/zitadel/internal/eventstore/models"
|
||
|
"github.com/caos/zitadel/internal/policy/model"
|
||
|
)
|
||
|
|
||
|
func PasswordLockoutPolicyQuery(recourceOwner string, latestSequence uint64) *es_models.SearchQuery {
|
||
|
return es_models.NewSearchQuery().
|
||
|
AggregateTypeFilter(model.PasswordLockoutPolicyAggregate).
|
||
|
LatestSequenceFilter(latestSequence).
|
||
|
ResourceOwnerFilter(recourceOwner)
|
||
|
|
||
|
}
|
||
|
|
||
|
func PasswordLockoutPolicyAggregate(ctx context.Context, aggCreator *es_models.AggregateCreator, policy *PasswordLockoutPolicy) (*es_models.Aggregate, error) {
|
||
|
if policy == nil {
|
||
|
return nil, errors.ThrowPreconditionFailed(nil, "EVENT-aTRlj", "existing policy should not be nil")
|
||
|
}
|
||
|
return aggCreator.NewAggregate(ctx, policy.AggregateID, model.PasswordLockoutPolicyAggregate, policyLockoutVersion, policy.Sequence)
|
||
|
}
|
||
|
|
||
|
func PasswordLockoutPolicyCreateAggregate(aggCreator *es_models.AggregateCreator, policy *PasswordLockoutPolicy) func(ctx context.Context) (*es_models.Aggregate, error) {
|
||
|
return func(ctx context.Context) (*es_models.Aggregate, error) {
|
||
|
if policy == nil {
|
||
|
return nil, errors.ThrowPreconditionFailed(nil, "EVENT-kdie6", "policy should not be nil")
|
||
|
}
|
||
|
|
||
|
agg, err := PasswordLockoutPolicyAggregate(ctx, aggCreator, policy)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
return agg.AppendEvent(model.PasswordLockoutPolicyAdded, policy)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func PasswordLockoutPolicyUpdateAggregate(aggCreator *es_models.AggregateCreator, existing *PasswordLockoutPolicy, new *PasswordLockoutPolicy) func(ctx context.Context) (*es_models.Aggregate, error) {
|
||
|
return func(ctx context.Context) (*es_models.Aggregate, error) {
|
||
|
if new == nil {
|
||
|
return nil, errors.ThrowPreconditionFailed(nil, "EVENT-dhr74", "new policy should not be nil")
|
||
|
}
|
||
|
agg, err := PasswordLockoutPolicyAggregate(ctx, aggCreator, existing)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
changes := existing.LockoutChanges(new)
|
||
|
return agg.AppendEvent(model.PasswordLockoutPolicyChanged, changes)
|
||
|
}
|
||
|
}
|