mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-11 21:27:42 +00:00
feat: projections auto create their tables (#3324)
* begin init checks for projections * first projection checks * debug notification providers with query fixes * more projections and first index * more projections * more projections * finish projections * fix tests (remove db name) * create tables in setup * fix logging / error handling * add tenant to views * rename tenant to instance_id * add instance_id to all projections * add instance_id to all queries * correct instance_id on projections * add instance_id to failed_events * use separate context for instance * implement features projection * implement features projection * remove unique constraint from setup when migration failed * add error to failed setup event * add instance_id to primary keys * fix IAM projection * remove old migrations folder * fix keysFromYAML test
This commit is contained in:
@@ -7,6 +7,8 @@ import (
|
||||
"time"
|
||||
|
||||
sq "github.com/Masterminds/squirrel"
|
||||
|
||||
"github.com/caos/zitadel/internal/api/authz"
|
||||
"github.com/caos/zitadel/internal/domain"
|
||||
|
||||
"github.com/caos/zitadel/internal/crypto"
|
||||
@@ -23,6 +25,10 @@ var (
|
||||
name: projection.SecretGeneratorColumnAggregateID,
|
||||
table: secretGeneratorsTable,
|
||||
}
|
||||
SecretGeneratorColumnInstanceID = Column{
|
||||
name: projection.SecretGeneratorColumnInstanceID,
|
||||
table: secretGeneratorsTable,
|
||||
}
|
||||
SecretGeneratorColumnGeneratorType = Column{
|
||||
name: projection.SecretGeneratorColumnGeneratorType,
|
||||
table: secretGeneratorsTable,
|
||||
@@ -131,6 +137,7 @@ func (q *Queries) SecretGeneratorByType(ctx context.Context, generatorType domai
|
||||
stmt, scan := prepareSecretGeneratorQuery()
|
||||
query, args, err := stmt.Where(sq.Eq{
|
||||
SecretGeneratorColumnGeneratorType.identifier(): generatorType,
|
||||
SecretGeneratorColumnInstanceID.identifier(): authz.GetInstance(ctx).ID,
|
||||
}).ToSql()
|
||||
if err != nil {
|
||||
return nil, errors.ThrowInternal(err, "QUERY-3k99f", "Errors.Query.SQLStatment")
|
||||
@@ -142,7 +149,10 @@ func (q *Queries) SecretGeneratorByType(ctx context.Context, generatorType domai
|
||||
|
||||
func (q *Queries) SearchSecretGenerators(ctx context.Context, queries *SecretGeneratorSearchQueries) (secretGenerators *SecretGenerators, err error) {
|
||||
query, scan := prepareSecretGeneratorsQuery()
|
||||
stmt, args, err := queries.toQuery(query).ToSql()
|
||||
stmt, args, err := queries.toQuery(query).
|
||||
Where(sq.Eq{
|
||||
SecretGeneratorColumnInstanceID.identifier(): authz.GetInstance(ctx).ID,
|
||||
}).ToSql()
|
||||
if err != nil {
|
||||
return nil, errors.ThrowInvalidArgument(err, "QUERY-sn9lw", "Errors.Query.InvalidRequest")
|
||||
}
|
||||
|
Reference in New Issue
Block a user