feat: projections auto create their tables (#3324)

* begin init checks for projections

* first projection checks

* debug notification providers with query fixes

* more projections and first index

* more projections

* more projections

* finish projections

* fix tests (remove db name)

* create tables in setup

* fix logging / error handling

* add tenant to views

* rename tenant to instance_id

* add instance_id to all projections

* add instance_id to all queries

* correct instance_id on projections

* add instance_id to failed_events

* use separate context for instance

* implement features projection

* implement features projection

* remove unique constraint from setup when migration failed

* add error to failed setup event

* add instance_id to primary keys

* fix IAM projection

* remove old migrations folder

* fix keysFromYAML test
This commit is contained in:
Livio Amstutz
2022-03-23 09:02:39 +01:00
committed by GitHub
parent 9e13b70a3d
commit 56b916a2b0
400 changed files with 6508 additions and 8890 deletions

View File

@@ -7,6 +7,8 @@ import (
"time"
sq "github.com/Masterminds/squirrel"
"github.com/caos/zitadel/internal/api/authz"
"github.com/caos/zitadel/internal/domain"
"github.com/caos/zitadel/internal/errors"
"github.com/caos/zitadel/internal/query/projection"
@@ -32,12 +34,17 @@ type PasswordComplexityPolicy struct {
func (q *Queries) PasswordComplexityPolicyByOrg(ctx context.Context, orgID string) (*PasswordComplexityPolicy, error) {
stmt, scan := preparePasswordComplexityPolicyQuery()
query, args, err := stmt.Where(
sq.Or{
sq.And{
sq.Eq{
PasswordComplexityColID.identifier(): orgID,
PasswordComplexityColInstanceID.identifier(): authz.GetInstance(ctx).ID,
},
sq.Eq{
PasswordComplexityColID.identifier(): domain.IAMID,
sq.Or{
sq.Eq{
PasswordComplexityColID.identifier(): orgID,
},
sq.Eq{
PasswordComplexityColID.identifier(): domain.IAMID,
},
},
}).
OrderBy(PasswordComplexityColIsDefault.identifier()).
@@ -53,7 +60,8 @@ func (q *Queries) PasswordComplexityPolicyByOrg(ctx context.Context, orgID strin
func (q *Queries) DefaultPasswordComplexityPolicy(ctx context.Context) (*PasswordComplexityPolicy, error) {
stmt, scan := preparePasswordComplexityPolicyQuery()
query, args, err := stmt.Where(sq.Eq{
PasswordComplexityColID.identifier(): domain.IAMID,
PasswordComplexityColID.identifier(): domain.IAMID,
PasswordComplexityColInstanceID.identifier(): authz.GetInstance(ctx).ID,
}).
OrderBy(PasswordComplexityColIsDefault.identifier()).
Limit(1).ToSql()
@@ -89,6 +97,10 @@ var (
name: projection.ComplexityPolicyResourceOwnerCol,
table: passwordComplexityTable,
}
PasswordComplexityColInstanceID = Column{
name: projection.ComplexityPolicyInstanceIDCol,
table: passwordComplexityTable,
}
PasswordComplexityColMinLength = Column{
name: projection.ComplexityPolicyMinLengthCol,
table: passwordComplexityTable,