2021-01-04 14:52:13 +01:00
|
|
|
package policy
|
2020-12-11 15:49:19 +01:00
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
2021-02-23 15:13:04 +01:00
|
|
|
"github.com/caos/zitadel/internal/domain"
|
2020-12-11 15:49:19 +01:00
|
|
|
"github.com/caos/zitadel/internal/errors"
|
2021-02-23 15:13:04 +01:00
|
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
|
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
2020-12-11 15:49:19 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2021-01-04 14:52:13 +01:00
|
|
|
loginPolicySecondFactorPrefix = loginPolicyPrefix + "secondfactor."
|
2020-12-11 15:49:19 +01:00
|
|
|
LoginPolicySecondFactorAddedEventType = loginPolicySecondFactorPrefix + "added"
|
|
|
|
LoginPolicySecondFactorRemovedEventType = loginPolicySecondFactorPrefix + "removed"
|
|
|
|
|
|
|
|
loginPolicyMultiFactorPrefix = "policy.login.multifactor."
|
|
|
|
LoginPolicyMultiFactorAddedEventType = loginPolicyMultiFactorPrefix + "added"
|
|
|
|
LoginPolicyMultiFactorRemovedEventType = loginPolicyMultiFactorPrefix + "removed"
|
|
|
|
)
|
|
|
|
|
|
|
|
type SecondFactorAddedEvent struct {
|
|
|
|
eventstore.BaseEvent `json:"-"`
|
|
|
|
|
2021-01-06 10:47:55 +01:00
|
|
|
MFAType domain.SecondFactorType `json:"mfaType,omitempty"`
|
2020-12-11 15:49:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewSecondFactorAddedEvent(
|
|
|
|
base *eventstore.BaseEvent,
|
2021-01-04 14:52:13 +01:00
|
|
|
mfaType domain.SecondFactorType,
|
2020-12-11 15:49:19 +01:00
|
|
|
) *SecondFactorAddedEvent {
|
|
|
|
return &SecondFactorAddedEvent{
|
|
|
|
BaseEvent: *base,
|
|
|
|
MFAType: mfaType,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func SecondFactorAddedEventMapper(event *repository.Event) (eventstore.EventReader, error) {
|
|
|
|
e := &SecondFactorAddedEvent{
|
|
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
|
|
}
|
|
|
|
|
|
|
|
err := json.Unmarshal(event.Data, e)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.ThrowInternal(err, "POLIC-Lp0dE", "unable to unmarshal policy")
|
|
|
|
}
|
|
|
|
|
|
|
|
return e, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *SecondFactorAddedEvent) Data() interface{} {
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
2021-01-21 10:49:38 +01:00
|
|
|
func (e *SecondFactorAddedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-04-27 12:58:18 +02:00
|
|
|
func (e *SecondFactorAddedEvent) Assets() []*eventstore.Asset {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-11 15:49:19 +01:00
|
|
|
type SecondFactorRemovedEvent struct {
|
|
|
|
eventstore.BaseEvent `json:"-"`
|
2021-01-04 14:52:13 +01:00
|
|
|
MFAType domain.SecondFactorType `json:"mfaType"`
|
2020-12-11 15:49:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewSecondFactorRemovedEvent(
|
|
|
|
base *eventstore.BaseEvent,
|
2021-01-04 14:52:13 +01:00
|
|
|
mfaType domain.SecondFactorType,
|
2020-12-11 15:49:19 +01:00
|
|
|
) *SecondFactorRemovedEvent {
|
|
|
|
return &SecondFactorRemovedEvent{
|
|
|
|
BaseEvent: *base,
|
|
|
|
MFAType: mfaType,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func SecondFactorRemovedEventMapper(event *repository.Event) (eventstore.EventReader, error) {
|
|
|
|
e := &SecondFactorRemovedEvent{
|
|
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
|
|
}
|
|
|
|
|
|
|
|
err := json.Unmarshal(event.Data, e)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.ThrowInternal(err, "POLIC-5M9gd", "unable to unmarshal policy")
|
|
|
|
}
|
|
|
|
|
|
|
|
return e, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *SecondFactorRemovedEvent) Data() interface{} {
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
2021-01-21 10:49:38 +01:00
|
|
|
func (e *SecondFactorRemovedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-04-27 12:58:18 +02:00
|
|
|
func (e *SecondFactorRemovedEvent) Assets() []*eventstore.Asset {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-11 15:49:19 +01:00
|
|
|
type MultiFactorAddedEvent struct {
|
|
|
|
eventstore.BaseEvent `json:"-"`
|
|
|
|
|
2021-01-04 14:52:13 +01:00
|
|
|
MFAType domain.MultiFactorType `json:"mfaType"`
|
2020-12-11 15:49:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewMultiFactorAddedEvent(
|
|
|
|
base *eventstore.BaseEvent,
|
2021-01-04 14:52:13 +01:00
|
|
|
mfaType domain.MultiFactorType,
|
2020-12-11 15:49:19 +01:00
|
|
|
) *MultiFactorAddedEvent {
|
|
|
|
return &MultiFactorAddedEvent{
|
|
|
|
BaseEvent: *base,
|
|
|
|
MFAType: mfaType,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func MultiFactorAddedEventMapper(event *repository.Event) (eventstore.EventReader, error) {
|
|
|
|
e := &MultiFactorAddedEvent{
|
|
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
|
|
}
|
|
|
|
|
|
|
|
err := json.Unmarshal(event.Data, e)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.ThrowInternal(err, "POLIC-5Ms90", "unable to unmarshal policy")
|
|
|
|
}
|
|
|
|
|
|
|
|
return e, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *MultiFactorAddedEvent) Data() interface{} {
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
2021-01-21 10:49:38 +01:00
|
|
|
func (e *MultiFactorAddedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-04-27 12:58:18 +02:00
|
|
|
func (e *MultiFactorAddedEvent) Assets() []*eventstore.Asset {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-11 15:49:19 +01:00
|
|
|
type MultiFactorRemovedEvent struct {
|
|
|
|
eventstore.BaseEvent `json:"-"`
|
2021-01-04 14:52:13 +01:00
|
|
|
MFAType domain.MultiFactorType `json:"mfaType"`
|
2020-12-11 15:49:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewMultiFactorRemovedEvent(
|
|
|
|
base *eventstore.BaseEvent,
|
2021-01-04 14:52:13 +01:00
|
|
|
mfaType domain.MultiFactorType,
|
2020-12-11 15:49:19 +01:00
|
|
|
) *MultiFactorRemovedEvent {
|
|
|
|
return &MultiFactorRemovedEvent{
|
|
|
|
BaseEvent: *base,
|
|
|
|
MFAType: mfaType,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func MultiFactorRemovedEventMapper(event *repository.Event) (eventstore.EventReader, error) {
|
|
|
|
e := &MultiFactorRemovedEvent{
|
|
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
|
|
}
|
|
|
|
|
|
|
|
err := json.Unmarshal(event.Data, e)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.ThrowInternal(err, "POLIC-1N8sd", "unable to unmarshal policy")
|
|
|
|
}
|
|
|
|
|
|
|
|
return e, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e *MultiFactorRemovedEvent) Data() interface{} {
|
|
|
|
return e
|
|
|
|
}
|
2021-01-21 10:49:38 +01:00
|
|
|
|
|
|
|
func (e *MultiFactorRemovedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
|
|
return nil
|
|
|
|
}
|
2021-04-27 12:58:18 +02:00
|
|
|
|
|
|
|
func (e *MultiFactorRemovedEvent) Assets() []*eventstore.Asset {
|
|
|
|
return nil
|
|
|
|
}
|