2021-01-04 13:52:13 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
2021-01-12 11:59:51 +00:00
|
|
|
"strings"
|
|
|
|
|
2021-01-07 15:06:45 +00:00
|
|
|
caos_errors "github.com/caos/zitadel/internal/errors"
|
2021-01-04 13:52:13 +00:00
|
|
|
"github.com/caos/zitadel/internal/eventstore/v2"
|
|
|
|
"github.com/caos/zitadel/internal/v2/domain"
|
|
|
|
"github.com/caos/zitadel/internal/v2/repository/user"
|
|
|
|
)
|
|
|
|
|
|
|
|
type UserWriteModel struct {
|
|
|
|
eventstore.WriteModel
|
|
|
|
|
|
|
|
UserName string
|
|
|
|
UserState domain.UserState
|
|
|
|
}
|
|
|
|
|
2021-01-12 11:59:51 +00:00
|
|
|
func NewUserWriteModel(userID, resourceOwner string) *UserWriteModel {
|
2021-01-04 13:52:13 +00:00
|
|
|
return &UserWriteModel{
|
|
|
|
WriteModel: eventstore.WriteModel{
|
2021-01-12 11:59:51 +00:00
|
|
|
AggregateID: userID,
|
|
|
|
ResourceOwner: resourceOwner,
|
2021-01-04 13:52:13 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (wm *UserWriteModel) AppendEvents(events ...eventstore.EventReader) {
|
|
|
|
for _, event := range events {
|
|
|
|
switch e := event.(type) {
|
|
|
|
case *user.HumanAddedEvent, *user.HumanRegisteredEvent:
|
|
|
|
wm.AppendEvents(e)
|
|
|
|
case *user.MachineAddedEvent:
|
|
|
|
wm.AppendEvents(e)
|
2021-01-07 15:06:45 +00:00
|
|
|
case *user.UsernameChangedEvent:
|
|
|
|
wm.AppendEvents(e)
|
2021-01-04 13:52:13 +00:00
|
|
|
case *user.UserDeactivatedEvent:
|
|
|
|
wm.AppendEvents(e)
|
|
|
|
case *user.UserReactivatedEvent:
|
|
|
|
wm.AppendEvents(e)
|
|
|
|
case *user.UserLockedEvent:
|
|
|
|
wm.AppendEvents(e)
|
|
|
|
case *user.UserUnlockedEvent:
|
|
|
|
wm.AppendEvents(e)
|
|
|
|
case *user.UserRemovedEvent:
|
|
|
|
wm.AppendEvents(e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//TODO: Compute State? initial/active
|
|
|
|
func (wm *UserWriteModel) Reduce() error {
|
|
|
|
for _, event := range wm.Events {
|
|
|
|
switch e := event.(type) {
|
|
|
|
case *user.HumanAddedEvent:
|
|
|
|
wm.UserName = e.UserName
|
|
|
|
wm.UserState = domain.UserStateInitial
|
|
|
|
case *user.HumanRegisteredEvent:
|
|
|
|
wm.UserName = e.UserName
|
|
|
|
wm.UserState = domain.UserStateInitial
|
|
|
|
case *user.MachineAddedEvent:
|
|
|
|
wm.UserName = e.UserName
|
|
|
|
wm.UserState = domain.UserStateActive
|
2021-01-07 15:06:45 +00:00
|
|
|
case *user.UsernameChangedEvent:
|
|
|
|
wm.UserName = e.UserName
|
2021-01-04 13:52:13 +00:00
|
|
|
case *user.UserLockedEvent:
|
|
|
|
if wm.UserState != domain.UserStateDeleted {
|
|
|
|
wm.UserState = domain.UserStateLocked
|
|
|
|
}
|
|
|
|
case *user.UserUnlockedEvent:
|
|
|
|
if wm.UserState != domain.UserStateDeleted {
|
|
|
|
wm.UserState = domain.UserStateActive
|
|
|
|
}
|
|
|
|
case *user.UserDeactivatedEvent:
|
|
|
|
if wm.UserState != domain.UserStateDeleted {
|
|
|
|
wm.UserState = domain.UserStateInactive
|
|
|
|
}
|
|
|
|
case *user.UserReactivatedEvent:
|
|
|
|
if wm.UserState != domain.UserStateDeleted {
|
|
|
|
wm.UserState = domain.UserStateActive
|
|
|
|
}
|
|
|
|
case *user.UserRemovedEvent:
|
|
|
|
wm.UserState = domain.UserStateDeleted
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return wm.WriteModel.Reduce()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (wm *UserWriteModel) Query() *eventstore.SearchQueryBuilder {
|
|
|
|
return eventstore.NewSearchQueryBuilder(eventstore.ColumnsEvent, user.AggregateType).
|
2021-01-12 11:59:51 +00:00
|
|
|
AggregateIDs(wm.AggregateID).
|
|
|
|
ResourceOwner(wm.ResourceOwner)
|
2021-01-04 13:52:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func UserAggregateFromWriteModel(wm *eventstore.WriteModel) *user.Aggregate {
|
|
|
|
return &user.Aggregate{
|
|
|
|
Aggregate: *eventstore.AggregateFromWriteModel(wm, user.AggregateType, user.AggregateVersion),
|
|
|
|
}
|
|
|
|
}
|
2021-01-07 15:06:45 +00:00
|
|
|
|
|
|
|
func CheckOrgIAMPolicyForUserName(userName string, policy *domain.OrgIAMPolicy) error {
|
|
|
|
if policy == nil {
|
|
|
|
return caos_errors.ThrowPreconditionFailed(nil, "COMMAND-3Mb9s", "Errors.Users.OrgIamPolicyNil")
|
|
|
|
}
|
|
|
|
if policy.UserLoginMustBeDomain && strings.Contains(userName, "@") {
|
|
|
|
return caos_errors.ThrowPreconditionFailed(nil, "COMMAND-4M9vs", "Errors.User.EmailAsUsernameNotAllowed")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|