new pkg structure (#1150)

* fix: split command query side

* fix: split command query side

* fix: members in correct pkg structure

* fix: label policy in correct pkg structure

* fix: structure

* fix: structure of login policy

* fix: identityprovider structure

* fix: org iam policy structure

* fix: password age policy structure

* fix: password complexity policy structure

* fix: password lockout policy structure

* fix: idp structure

* fix: user events structure

* fix: user write model

* fix: profile email changed command

* fix: address changed command

* fix: user states

* fix: user

* fix: org structure and add human

* begin iam setup command side

* setup

* step2

* step2

* fix: add user

* step2

* isvalid

* fix: folder structure v2 business

Co-authored-by: Fabiennne <fabienne.gerschwiler@gmail.com>
This commit is contained in:
Livio Amstutz
2021-01-04 14:52:13 +01:00
committed by GitHub
parent 762941f0ea
commit 21ffe1b0cb
260 changed files with 7917 additions and 6570 deletions

View File

@@ -161,8 +161,8 @@ func startSetup(configPaths []string, localDevMode bool) {
ctx := context.Background()
setup, err := setup.StartSetup(conf.Eventstore, conf.SystemDefaults)
setup, err := setup.StartSetupV2(conf.Eventstore, conf.SystemDefaults)
logging.Log("SERVE-fD252").OnError(err).Panic("failed to start setup")
err = setup.Execute(ctx, conf.SetUp)
err = setup.ExecuteV2(ctx, conf.SetUp)
logging.Log("SERVE-djs3R").OnError(err).Panic("failed to execute setup")
}

View File

@@ -26,53 +26,53 @@ SetUp:
Step1:
GlobalOrg: 'Global'
IAMProject: 'Zitadel'
DefaultLoginPolicy:
AllowUsernamePassword: true
AllowRegister: true
AllowExternalIdp: true
Orgs:
- Name: 'Global'
Domain: 'global.caos.ch'
Default: true
OrgIamPolicy: true
Users:
- FirstName: 'Global Org'
LastName: 'Administrator'
UserName: 'zitadel-global-org-admin@caos.ch'
Email: 'zitadel-global-org-admin@caos.ch'
Password: 'Password1!'
Owners:
- 'zitadel-global-org-admin@caos.ch'
- Name: 'CAOS AG'
Domain: 'caos.ch'
Users:
- FirstName: 'Zitadel'
LastName: 'Administrator'
UserName: 'zitadel-admin'
Email: 'zitadel-admin@caos.ch'
Password: 'Password1!'
Owners:
- 'zitadel-admin@caos.ch'
Projects:
- Name: 'Zitadel'
OIDCApps:
- Name: 'Management-API'
- Name: 'Auth-API'
- Name: 'Admin-API'
- Name: 'Zitadel Console'
RedirectUris:
- '$ZITADEL_CONSOLE/auth/callback'
PostLogoutRedirectUris:
- '$ZITADEL_CONSOLE/signedout'
ResponseTypes:
- $ZITADEL_CONSOLE_RESPONSE_TYPE
GrantTypes:
- $ZITADEL_CONSOLE_GRANT_TYPE
ApplicationType: 'USER_AGENT'
AuthMethodType: 'NONE'
DevMode: $ZITADEL_CONSOLE_DEV_MODE
Owners:
- 'zitadel-admin@caos.ch'
# DefaultLoginPolicy:
# AllowUsernamePassword: true
# AllowRegister: true
# AllowExternalIdp: true
# Orgs:
# - Name: 'Global'
# Domain: 'global.caos.ch'
# Default: true
# OrgIamPolicy: true
# Users:
# - FirstName: 'Global Org'
# LastName: 'Administrator'
# UserName: 'zitadel-global-org-admin@caos.ch'
# Email: 'zitadel-global-org-admin@caos.ch'
# Password: 'Password1!'
# Owners:
# - 'zitadel-global-org-admin@caos.ch'
# - Name: 'CAOS AG'
# Domain: 'caos.ch'
# Users:
# - FirstName: 'Zitadel'
# LastName: 'Administrator'
# UserName: 'zitadel-admin'
# Email: 'zitadel-admin@caos.ch'
# Password: 'Password1!'
# Owners:
# - 'zitadel-admin@caos.ch'
# Projects:
# - Name: 'Zitadel'
# OIDCApps:
# - Name: 'Management-API'
# - Name: 'Auth-API'
# - Name: 'Admin-API'
# - Name: 'Zitadel Console'
# RedirectUris:
# - '$ZITADEL_CONSOLE/auth/callback'
# PostLogoutRedirectUris:
# - '$ZITADEL_CONSOLE/signedout'
# ResponseTypes:
# - $ZITADEL_CONSOLE_RESPONSE_TYPE
# GrantTypes:
# - $ZITADEL_CONSOLE_GRANT_TYPE
# ApplicationType: 'USER_AGENT'
# AuthMethodType: 'NONE'
# DevMode: $ZITADEL_CONSOLE_DEV_MODE
# Owners:
# - 'zitadel-admin@caos.ch'
Step2:
DefaultPasswordComplexityPolicy:
MinLength: 8