mirror of
https://github.com/zitadel/zitadel.git
synced 2025-05-06 11:36:45 +00:00
feat: member queries (#2796)
* refactor(domain): add user type * fix(projections): start with login names * fix(login_policy): correct handling of user domain claimed event * fix(projections): add members * refactor: simplify member projections * add migration for members * add metadata to member projections * refactor: login name projection * fix: set correct suffixes on login name projections * test(projections): login name reduces * fix: correct cols in reduce member * test(projections): org, iam, project members * member additional cols and conds as opt, add project grant members * fix(migration): members * fix(migration): correct database name * migration version * migs * better naming for member cond and col * split project and project grant members * prepare member columns * feat(queries): membership query * test(queries): membership prepare * fix(queries): multiple projections for latest sequence * fix(api): use query for membership queries in auth and management * feat: org member queries * fix(api): use query for iam member calls * fix(queries): org members * fix(queries): project members * fix(queries): project grant members * fix(query): member queries and user avatar column * member cols * fix(queries): membership stmt * fix user test * fix user test * fix(membership): correct display name * fix(projection): additional member manipulation events * additional member tests * fix(projections): additional events of idp links * fix: use query for memberships (#2797) * fix(api): use query for memberships * remove comment * handle err * refactor(projections): idp user link user aggregate type * fix(projections): handle old user events * fix(api): add asset prefix * no image for iam members
This commit is contained in:
parent
fb43b13232
commit
d2ea9a1b8c
@ -225,12 +225,12 @@ func startAPI(ctx context.Context, conf *Config, verifier *internal_authz.TokenV
|
|||||||
apis := api.Create(conf.API, conf.InternalAuthZ, query, authZRepo, authRepo, repo, conf.SystemDefaults)
|
apis := api.Create(conf.API, conf.InternalAuthZ, query, authZRepo, authRepo, repo, conf.SystemDefaults)
|
||||||
|
|
||||||
if *adminEnabled {
|
if *adminEnabled {
|
||||||
apis.RegisterServer(ctx, admin.CreateServer(command, query, repo, conf.SystemDefaults.Domain))
|
apis.RegisterServer(ctx, admin.CreateServer(command, query, repo, conf.SystemDefaults.Domain, conf.Admin.APIDomain+"/assets/v1/"))
|
||||||
}
|
}
|
||||||
managementRepo, err := mgmt_es.Start(conf.Mgmt, conf.SystemDefaults, roles, query, static)
|
managementRepo, err := mgmt_es.Start(conf.Mgmt, conf.SystemDefaults, roles, query, static)
|
||||||
logging.Log("API-Gd2qq").OnError(err).Fatal("error starting management repo")
|
logging.Log("API-Gd2qq").OnError(err).Fatal("error starting management repo")
|
||||||
if *managementEnabled {
|
if *managementEnabled {
|
||||||
apis.RegisterServer(ctx, management.CreateServer(command, query, managementRepo, conf.SystemDefaults))
|
apis.RegisterServer(ctx, management.CreateServer(command, query, managementRepo, conf.SystemDefaults, conf.Mgmt.APIDomain+"/assets/v1/"))
|
||||||
}
|
}
|
||||||
if *authEnabled {
|
if *authEnabled {
|
||||||
apis.RegisterServer(ctx, auth.CreateServer(command, query, authRepo, conf.SystemDefaults))
|
apis.RegisterServer(ctx, auth.CreateServer(command, query, authRepo, conf.SystemDefaults))
|
||||||
|
@ -18,13 +18,18 @@ func (s *Server) ListIAMMemberRoles(ctx context.Context, req *admin_pb.ListIAMMe
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) ListIAMMembers(ctx context.Context, req *admin_pb.ListIAMMembersRequest) (*admin_pb.ListIAMMembersResponse, error) {
|
func (s *Server) ListIAMMembers(ctx context.Context, req *admin_pb.ListIAMMembersRequest) (*admin_pb.ListIAMMembersResponse, error) {
|
||||||
res, err := s.iam.SearchIAMMembers(ctx, ListIAMMemberRequestToModel(req))
|
queries, err := ListIAMMembersRequestToQuery(req)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
res, err := s.query.IAMMembers(ctx, queries)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &admin_pb.ListIAMMembersResponse{
|
return &admin_pb.ListIAMMembersResponse{
|
||||||
Details: object.ToListDetails(res.TotalResult, res.Sequence, res.Timestamp),
|
Details: object.ToListDetails(res.Count, res.Sequence, res.Timestamp),
|
||||||
Result: member.IAMMembersToPb(res.Result),
|
//TODO: resource owner of user of the member instead of the membership resource owner
|
||||||
|
Result: member.MembersToPb("", res.Members),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@ import (
|
|||||||
member_grpc "github.com/caos/zitadel/internal/api/grpc/member"
|
member_grpc "github.com/caos/zitadel/internal/api/grpc/member"
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
"github.com/caos/zitadel/internal/api/grpc/object"
|
||||||
"github.com/caos/zitadel/internal/domain"
|
"github.com/caos/zitadel/internal/domain"
|
||||||
"github.com/caos/zitadel/internal/iam/model"
|
"github.com/caos/zitadel/internal/query"
|
||||||
admin_pb "github.com/caos/zitadel/pkg/grpc/admin"
|
admin_pb "github.com/caos/zitadel/pkg/grpc/admin"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -22,13 +22,21 @@ func UpdateIAMMemberToDomain(req *admin_pb.UpdateIAMMemberRequest) *domain.Membe
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func ListIAMMemberRequestToModel(req *admin_pb.ListIAMMembersRequest) *model.IAMMemberSearchRequest {
|
func ListIAMMembersRequestToQuery(req *admin_pb.ListIAMMembersRequest) (*query.IAMMembersQuery, error) {
|
||||||
offset, limit, asc := object.ListQueryToModel(req.Query)
|
offset, limit, asc := object.ListQueryToModel(req.Query)
|
||||||
return &model.IAMMemberSearchRequest{
|
queries, err := member_grpc.MemberQueriesToQuery(req.Queries)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &query.IAMMembersQuery{
|
||||||
|
MembersQuery: query.MembersQuery{
|
||||||
|
SearchRequest: query.SearchRequest{
|
||||||
Offset: offset,
|
Offset: offset,
|
||||||
Limit: limit,
|
Limit: limit,
|
||||||
Asc: asc,
|
Asc: asc,
|
||||||
// SortingColumn: model.IAMMemberSearchKey, //TOOD: not implemented in proto
|
// SortingColumn: model.IAMMemberSearchKey, //TOOD: not implemented in proto
|
||||||
Queries: member_grpc.MemberQueriesToIAMMember(req.Queries),
|
},
|
||||||
}
|
Queries: queries,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
|
@ -27,13 +27,14 @@ type Server struct {
|
|||||||
repo repository.Repository
|
repo repository.Repository
|
||||||
users repository.UserRepository
|
users repository.UserRepository
|
||||||
iamDomain string
|
iamDomain string
|
||||||
|
assetsAPIDomain string
|
||||||
}
|
}
|
||||||
|
|
||||||
type Config struct {
|
type Config struct {
|
||||||
Repository eventsourcing.Config
|
Repository eventsourcing.Config
|
||||||
}
|
}
|
||||||
|
|
||||||
func CreateServer(command *command.Commands, query *query.Queries, repo repository.Repository, iamDomain string) *Server {
|
func CreateServer(command *command.Commands, query *query.Queries, repo repository.Repository, iamDomain, assetsAPIDomain string) *Server {
|
||||||
return &Server{
|
return &Server{
|
||||||
command: command,
|
command: command,
|
||||||
query: query,
|
query: query,
|
||||||
@ -42,6 +43,7 @@ func CreateServer(command *command.Commands, query *query.Queries, repo reposito
|
|||||||
repo: repo,
|
repo: repo,
|
||||||
users: repo,
|
users: repo,
|
||||||
iamDomain: iamDomain,
|
iamDomain: iamDomain,
|
||||||
|
assetsAPIDomain: assetsAPIDomain,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -11,7 +11,6 @@ import (
|
|||||||
policy_grpc "github.com/caos/zitadel/internal/api/grpc/policy"
|
policy_grpc "github.com/caos/zitadel/internal/api/grpc/policy"
|
||||||
"github.com/caos/zitadel/internal/domain"
|
"github.com/caos/zitadel/internal/domain"
|
||||||
"github.com/caos/zitadel/internal/eventstore/v1/models"
|
"github.com/caos/zitadel/internal/eventstore/v1/models"
|
||||||
org_model "github.com/caos/zitadel/internal/org/model"
|
|
||||||
"github.com/caos/zitadel/internal/query"
|
"github.com/caos/zitadel/internal/query"
|
||||||
usr_model "github.com/caos/zitadel/internal/user/model"
|
usr_model "github.com/caos/zitadel/internal/user/model"
|
||||||
mgmt_pb "github.com/caos/zitadel/pkg/grpc/management"
|
mgmt_pb "github.com/caos/zitadel/pkg/grpc/management"
|
||||||
@ -216,36 +215,24 @@ func (s *Server) ListOrgMemberRoles(ctx context.Context, req *mgmt_pb.ListOrgMem
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) ListOrgMembers(ctx context.Context, req *mgmt_pb.ListOrgMembersRequest) (*mgmt_pb.ListOrgMembersResponse, error) {
|
func (s *Server) ListOrgMembers(ctx context.Context, req *mgmt_pb.ListOrgMembersRequest) (*mgmt_pb.ListOrgMembersResponse, error) {
|
||||||
queries, err := ListOrgMembersRequestToModel(req)
|
queries, err := ListOrgMembersRequestToModel(ctx, req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
members, err := s.org.SearchMyOrgMembers(ctx, queries)
|
members, err := s.query.OrgMembers(ctx, queries)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &mgmt_pb.ListOrgMembersResponse{
|
return &mgmt_pb.ListOrgMembersResponse{
|
||||||
Result: member_grpc.OrgMembersToPb(members.Result),
|
Result: member_grpc.MembersToPb(s.assetAPIPrefix, members.Members),
|
||||||
Details: object.ToListDetails(
|
Details: object.ToListDetails(
|
||||||
members.TotalResult,
|
members.Count,
|
||||||
members.Sequence,
|
members.Sequence,
|
||||||
members.Timestamp,
|
members.Timestamp,
|
||||||
),
|
),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func ListOrgMembersRequestToModel(req *mgmt_pb.ListOrgMembersRequest) (*org_model.OrgMemberSearchRequest, error) {
|
|
||||||
offset, limit, asc := object.ListQueryToModel(req.Query)
|
|
||||||
queries := member_grpc.MemberQueriesToOrgMember(req.Queries)
|
|
||||||
return &org_model.OrgMemberSearchRequest{
|
|
||||||
Offset: offset,
|
|
||||||
Limit: limit,
|
|
||||||
Asc: asc,
|
|
||||||
//SortingColumn: //TODO: sorting
|
|
||||||
Queries: queries,
|
|
||||||
}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *Server) AddOrgMember(ctx context.Context, req *mgmt_pb.AddOrgMemberRequest) (*mgmt_pb.AddOrgMemberResponse, error) {
|
func (s *Server) AddOrgMember(ctx context.Context, req *mgmt_pb.AddOrgMemberRequest) (*mgmt_pb.AddOrgMemberResponse, error) {
|
||||||
addedMember, err := s.command.AddOrgMember(ctx, AddOrgMemberRequestToDomain(ctx, req))
|
addedMember, err := s.command.AddOrgMember(ctx, AddOrgMemberRequestToDomain(ctx, req))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -4,6 +4,7 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
|
|
||||||
"github.com/caos/zitadel/internal/api/authz"
|
"github.com/caos/zitadel/internal/api/authz"
|
||||||
|
member_grpc "github.com/caos/zitadel/internal/api/grpc/member"
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
"github.com/caos/zitadel/internal/api/grpc/object"
|
||||||
org_grpc "github.com/caos/zitadel/internal/api/grpc/org"
|
org_grpc "github.com/caos/zitadel/internal/api/grpc/org"
|
||||||
"github.com/caos/zitadel/internal/domain"
|
"github.com/caos/zitadel/internal/domain"
|
||||||
@ -72,3 +73,29 @@ func AddOrgMemberRequestToDomain(ctx context.Context, req *mgmt_pb.AddOrgMemberR
|
|||||||
func UpdateOrgMemberRequestToDomain(ctx context.Context, req *mgmt_pb.UpdateOrgMemberRequest) *domain.Member {
|
func UpdateOrgMemberRequestToDomain(ctx context.Context, req *mgmt_pb.UpdateOrgMemberRequest) *domain.Member {
|
||||||
return domain.NewMember(authz.GetCtxData(ctx).OrgID, req.UserId, req.Roles...)
|
return domain.NewMember(authz.GetCtxData(ctx).OrgID, req.UserId, req.Roles...)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func ListOrgMembersRequestToModel(ctx context.Context, req *mgmt_pb.ListOrgMembersRequest) (*query.OrgMembersQuery, error) {
|
||||||
|
ctxData := authz.GetCtxData(ctx)
|
||||||
|
offset, limit, asc := object.ListQueryToModel(req.Query)
|
||||||
|
queries, err := member_grpc.MemberQueriesToQuery(req.Queries)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
ownerQuery, err := query.NewMemberResourceOwnerSearchQuery(ctxData.OrgID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
queries = append(queries, ownerQuery)
|
||||||
|
return &query.OrgMembersQuery{
|
||||||
|
MembersQuery: query.MembersQuery{
|
||||||
|
SearchRequest: query.SearchRequest{
|
||||||
|
Offset: offset,
|
||||||
|
Limit: limit,
|
||||||
|
Asc: asc,
|
||||||
|
//SortingColumn: //TODO: sorting
|
||||||
|
},
|
||||||
|
Queries: queries,
|
||||||
|
},
|
||||||
|
OrgID: ctxData.OrgID,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
@ -279,19 +279,18 @@ func (s *Server) ListProjectMemberRoles(ctx context.Context, _ *mgmt_pb.ListProj
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) ListProjectMembers(ctx context.Context, req *mgmt_pb.ListProjectMembersRequest) (*mgmt_pb.ListProjectMembersResponse, error) {
|
func (s *Server) ListProjectMembers(ctx context.Context, req *mgmt_pb.ListProjectMembersRequest) (*mgmt_pb.ListProjectMembersResponse, error) {
|
||||||
queries, err := ListProjectMembersRequestToModel(req)
|
queries, err := ListProjectMembersRequestToModel(ctx, req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
queries.AppendProjectQuery(req.ProjectId)
|
members, err := s.query.ProjectMembers(ctx, queries)
|
||||||
members, err := s.project.SearchProjectMembers(ctx, queries)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &mgmt_pb.ListProjectMembersResponse{
|
return &mgmt_pb.ListProjectMembersResponse{
|
||||||
Result: member_grpc.ProjectMembersToPb(members.Result),
|
Result: member_grpc.MembersToPb(s.assetAPIPrefix, members.Members),
|
||||||
Details: object_grpc.ToListDetails(
|
Details: object_grpc.ToListDetails(
|
||||||
members.TotalResult,
|
members.Count,
|
||||||
members.Sequence,
|
members.Sequence,
|
||||||
members.Timestamp,
|
members.Timestamp,
|
||||||
),
|
),
|
||||||
|
@ -1,12 +1,14 @@
|
|||||||
package management
|
package management
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"github.com/caos/zitadel/internal/api/authz"
|
||||||
member_grpc "github.com/caos/zitadel/internal/api/grpc/member"
|
member_grpc "github.com/caos/zitadel/internal/api/grpc/member"
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
"github.com/caos/zitadel/internal/api/grpc/object"
|
||||||
proj_grpc "github.com/caos/zitadel/internal/api/grpc/project"
|
proj_grpc "github.com/caos/zitadel/internal/api/grpc/project"
|
||||||
"github.com/caos/zitadel/internal/domain"
|
"github.com/caos/zitadel/internal/domain"
|
||||||
"github.com/caos/zitadel/internal/eventstore/v1/models"
|
"github.com/caos/zitadel/internal/eventstore/v1/models"
|
||||||
proj_model "github.com/caos/zitadel/internal/project/model"
|
|
||||||
"github.com/caos/zitadel/internal/query"
|
"github.com/caos/zitadel/internal/query"
|
||||||
mgmt_pb "github.com/caos/zitadel/pkg/grpc/management"
|
mgmt_pb "github.com/caos/zitadel/pkg/grpc/management"
|
||||||
proj_pb "github.com/caos/zitadel/pkg/grpc/project"
|
proj_pb "github.com/caos/zitadel/pkg/grpc/project"
|
||||||
@ -163,14 +165,27 @@ func listGrantedProjectRolesRequestToModel(req *mgmt_pb.ListGrantedProjectRolesR
|
|||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func ListProjectMembersRequestToModel(req *mgmt_pb.ListProjectMembersRequest) (*proj_model.ProjectMemberSearchRequest, error) {
|
func ListProjectMembersRequestToModel(ctx context.Context, req *mgmt_pb.ListProjectMembersRequest) (*query.ProjectMembersQuery, error) {
|
||||||
offset, limit, asc := object.ListQueryToModel(req.Query)
|
offset, limit, asc := object.ListQueryToModel(req.Query)
|
||||||
queries := member_grpc.MemberQueriesToProjectMember(req.Queries)
|
queries, err := member_grpc.MemberQueriesToQuery(req.Queries)
|
||||||
return &proj_model.ProjectMemberSearchRequest{
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
ownerQuery, err := query.NewMemberResourceOwnerSearchQuery(authz.GetCtxData(ctx).OrgID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
queries = append(queries, ownerQuery)
|
||||||
|
return &query.ProjectMembersQuery{
|
||||||
|
MembersQuery: query.MembersQuery{
|
||||||
|
SearchRequest: query.SearchRequest{
|
||||||
Offset: offset,
|
Offset: offset,
|
||||||
Limit: limit,
|
Limit: limit,
|
||||||
Asc: asc,
|
Asc: asc,
|
||||||
//SortingColumn: //TODO: sorting
|
//SortingColumn: //TODO: sorting
|
||||||
|
},
|
||||||
Queries: queries,
|
Queries: queries,
|
||||||
|
},
|
||||||
|
ProjectID: req.ProjectId,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
@ -134,14 +134,18 @@ func (s *Server) ListProjectGrantMemberRoles(ctx context.Context, req *mgmt_pb.L
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) ListProjectGrantMembers(ctx context.Context, req *mgmt_pb.ListProjectGrantMembersRequest) (*mgmt_pb.ListProjectGrantMembersResponse, error) {
|
func (s *Server) ListProjectGrantMembers(ctx context.Context, req *mgmt_pb.ListProjectGrantMembersRequest) (*mgmt_pb.ListProjectGrantMembersResponse, error) {
|
||||||
response, err := s.project.SearchProjectGrantMembers(ctx, ListProjectGrantMembersRequestToModel(req))
|
queries, err := ListProjectGrantMembersRequestToModel(ctx, req)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
response, err := s.query.ProjectGrantMembers(ctx, queries)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &mgmt_pb.ListProjectGrantMembersResponse{
|
return &mgmt_pb.ListProjectGrantMembersResponse{
|
||||||
Result: member_grpc.ProjectGrantMembersToPb(response.Result),
|
Result: member_grpc.MembersToPb(s.assetAPIPrefix, response.Members),
|
||||||
Details: object_grpc.ToListDetails(
|
Details: object_grpc.ToListDetails(
|
||||||
response.TotalResult,
|
response.Count,
|
||||||
response.Sequence,
|
response.Sequence,
|
||||||
response.Timestamp,
|
response.Timestamp,
|
||||||
),
|
),
|
||||||
|
@ -1,12 +1,14 @@
|
|||||||
package management
|
package management
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"github.com/caos/zitadel/internal/api/authz"
|
||||||
member_grpc "github.com/caos/zitadel/internal/api/grpc/member"
|
member_grpc "github.com/caos/zitadel/internal/api/grpc/member"
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
"github.com/caos/zitadel/internal/api/grpc/object"
|
||||||
"github.com/caos/zitadel/internal/domain"
|
"github.com/caos/zitadel/internal/domain"
|
||||||
"github.com/caos/zitadel/internal/errors"
|
"github.com/caos/zitadel/internal/errors"
|
||||||
"github.com/caos/zitadel/internal/eventstore/v1/models"
|
"github.com/caos/zitadel/internal/eventstore/v1/models"
|
||||||
proj_model "github.com/caos/zitadel/internal/project/model"
|
|
||||||
"github.com/caos/zitadel/internal/query"
|
"github.com/caos/zitadel/internal/query"
|
||||||
mgmt_pb "github.com/caos/zitadel/pkg/grpc/management"
|
mgmt_pb "github.com/caos/zitadel/pkg/grpc/management"
|
||||||
proj_pb "github.com/caos/zitadel/pkg/grpc/project"
|
proj_pb "github.com/caos/zitadel/pkg/grpc/project"
|
||||||
@ -118,27 +120,30 @@ func UpdateProjectGrantRequestToDomain(req *mgmt_pb.UpdateProjectGrantRequest) *
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func ListProjectGrantMembersRequestToModel(req *mgmt_pb.ListProjectGrantMembersRequest) *proj_model.ProjectGrantMemberSearchRequest {
|
func ListProjectGrantMembersRequestToModel(ctx context.Context, req *mgmt_pb.ListProjectGrantMembersRequest) (*query.ProjectGrantMembersQuery, error) {
|
||||||
offset, limit, asc := object.ListQueryToModel(req.Query)
|
offset, limit, asc := object.ListQueryToModel(req.Query)
|
||||||
queries := member_grpc.MemberQueriesToProjectGrantMember(req.Queries)
|
queries, err := member_grpc.MemberQueriesToQuery(req.Queries)
|
||||||
queries = append(queries,
|
if err != nil {
|
||||||
&proj_model.ProjectGrantMemberSearchQuery{
|
return nil, err
|
||||||
Key: proj_model.ProjectGrantMemberSearchKeyProjectID,
|
}
|
||||||
Method: domain.SearchMethodEquals,
|
ownerQuery, err := query.NewMemberResourceOwnerSearchQuery(authz.GetCtxData(ctx).OrgID)
|
||||||
Value: req.ProjectId,
|
if err != nil {
|
||||||
},
|
return nil, err
|
||||||
&proj_model.ProjectGrantMemberSearchQuery{
|
}
|
||||||
Key: proj_model.ProjectGrantMemberSearchKeyGrantID,
|
queries = append(queries, ownerQuery)
|
||||||
Method: domain.SearchMethodEquals,
|
return &query.ProjectGrantMembersQuery{
|
||||||
Value: req.GrantId,
|
MembersQuery: query.MembersQuery{
|
||||||
})
|
SearchRequest: query.SearchRequest{
|
||||||
return &proj_model.ProjectGrantMemberSearchRequest{
|
|
||||||
Offset: offset,
|
Offset: offset,
|
||||||
Limit: limit,
|
Limit: limit,
|
||||||
Asc: asc,
|
Asc: asc,
|
||||||
//SortingColumn: //TODO: sorting
|
//SortingColumn: //TODO: sorting
|
||||||
|
},
|
||||||
Queries: queries,
|
Queries: queries,
|
||||||
}
|
},
|
||||||
|
ProjectID: req.ProjectId,
|
||||||
|
GrantID: req.GrantId,
|
||||||
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func AddProjectGrantMemberRequestToDomain(req *mgmt_pb.AddProjectGrantMemberRequest) *domain.ProjectGrantMember {
|
func AddProjectGrantMemberRequestToDomain(req *mgmt_pb.AddProjectGrantMemberRequest) *domain.ProjectGrantMember {
|
||||||
|
@ -30,13 +30,14 @@ type Server struct {
|
|||||||
iam repository.IamRepository
|
iam repository.IamRepository
|
||||||
authZ authz.Config
|
authZ authz.Config
|
||||||
systemDefaults systemdefaults.SystemDefaults
|
systemDefaults systemdefaults.SystemDefaults
|
||||||
|
assetAPIPrefix string
|
||||||
}
|
}
|
||||||
|
|
||||||
type Config struct {
|
type Config struct {
|
||||||
Repository eventsourcing.Config
|
Repository eventsourcing.Config
|
||||||
}
|
}
|
||||||
|
|
||||||
func CreateServer(command *command.Commands, query *query.Queries, repo repository.Repository, sd systemdefaults.SystemDefaults) *Server {
|
func CreateServer(command *command.Commands, query *query.Queries, repo repository.Repository, sd systemdefaults.SystemDefaults, assetAPIPrefix string) *Server {
|
||||||
return &Server{
|
return &Server{
|
||||||
command: command,
|
command: command,
|
||||||
query: query,
|
query: query,
|
||||||
@ -46,6 +47,7 @@ func CreateServer(command *command.Commands, query *query.Queries, repo reposito
|
|||||||
usergrant: repo,
|
usergrant: repo,
|
||||||
iam: repo,
|
iam: repo,
|
||||||
systemDefaults: sd,
|
systemDefaults: sd,
|
||||||
|
assetAPIPrefix: assetAPIPrefix,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,7 +1,10 @@
|
|||||||
package member
|
package member
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/caos/zitadel/internal/api/grpc/object"
|
||||||
"github.com/caos/zitadel/internal/domain"
|
"github.com/caos/zitadel/internal/domain"
|
||||||
|
"github.com/caos/zitadel/internal/errors"
|
||||||
|
"github.com/caos/zitadel/internal/query"
|
||||||
member_pb "github.com/caos/zitadel/pkg/grpc/member"
|
member_pb "github.com/caos/zitadel/pkg/grpc/member"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -11,3 +14,56 @@ func MemberToDomain(member *member_pb.Member) *domain.Member {
|
|||||||
Roles: member.Roles,
|
Roles: member.Roles,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func MembersToPb(assetAPIPrefix string, members []*query.Member) []*member_pb.Member {
|
||||||
|
m := make([]*member_pb.Member, len(members))
|
||||||
|
for i, member := range members {
|
||||||
|
m[i] = MemberToPb(assetAPIPrefix, member)
|
||||||
|
}
|
||||||
|
return m
|
||||||
|
}
|
||||||
|
|
||||||
|
func MemberToPb(assetAPIPrefix string, m *query.Member) *member_pb.Member {
|
||||||
|
return &member_pb.Member{
|
||||||
|
UserId: m.UserID,
|
||||||
|
Roles: m.Roles,
|
||||||
|
PreferredLoginName: m.PreferredLoginName,
|
||||||
|
Email: m.Email,
|
||||||
|
FirstName: m.FirstName,
|
||||||
|
LastName: m.LastName,
|
||||||
|
DisplayName: m.DisplayName,
|
||||||
|
AvatarUrl: domain.AvatarURL(assetAPIPrefix, m.ResourceOwner, m.AvatarURL),
|
||||||
|
Details: object.ToViewDetailsPb(
|
||||||
|
m.Sequence,
|
||||||
|
m.CreationDate,
|
||||||
|
m.ChangeDate,
|
||||||
|
m.ResourceOwner,
|
||||||
|
),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func MemberQueriesToQuery(queries []*member_pb.SearchQuery) (q []query.SearchQuery, err error) {
|
||||||
|
q = make([]query.SearchQuery, len(queries))
|
||||||
|
for i, query := range queries {
|
||||||
|
q[i], err = MemberQueryToMember(query)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return q, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func MemberQueryToMember(search *member_pb.SearchQuery) (query.SearchQuery, error) {
|
||||||
|
switch q := search.Query.(type) {
|
||||||
|
case *member_pb.SearchQuery_EmailQuery:
|
||||||
|
return query.NewMemberEmailSearchQuery(object.TextMethodToQuery(q.EmailQuery.Method), q.EmailQuery.Email)
|
||||||
|
case *member_pb.SearchQuery_FirstNameQuery:
|
||||||
|
return query.NewMemberFirstNameSearchQuery(object.TextMethodToQuery(q.FirstNameQuery.Method), q.FirstNameQuery.FirstName)
|
||||||
|
case *member_pb.SearchQuery_LastNameQuery:
|
||||||
|
return query.NewMemberLastNameSearchQuery(object.TextMethodToQuery(q.LastNameQuery.Method), q.LastNameQuery.LastName)
|
||||||
|
case *member_pb.SearchQuery_UserIdQuery:
|
||||||
|
return query.NewMemberUserIDSearchQuery(q.UserIdQuery.UserId)
|
||||||
|
default:
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "MEMBE-7Bb92", "Errors.Query.InvalidRequest")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -1,90 +0,0 @@
|
|||||||
package member
|
|
||||||
|
|
||||||
import (
|
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
|
||||||
"github.com/caos/zitadel/internal/domain"
|
|
||||||
iam_model "github.com/caos/zitadel/internal/iam/model"
|
|
||||||
member_pb "github.com/caos/zitadel/pkg/grpc/member"
|
|
||||||
)
|
|
||||||
|
|
||||||
func IAMMembersToPb(members []*iam_model.IAMMemberView) []*member_pb.Member {
|
|
||||||
m := make([]*member_pb.Member, len(members))
|
|
||||||
for i, member := range members {
|
|
||||||
m[i] = IAMMemberToPb(member)
|
|
||||||
}
|
|
||||||
return m
|
|
||||||
}
|
|
||||||
|
|
||||||
func IAMMemberToPb(m *iam_model.IAMMemberView) *member_pb.Member {
|
|
||||||
return &member_pb.Member{
|
|
||||||
UserId: m.UserID,
|
|
||||||
Roles: m.Roles,
|
|
||||||
PreferredLoginName: m.PreferredLoginName,
|
|
||||||
Email: m.Email,
|
|
||||||
FirstName: m.FirstName,
|
|
||||||
LastName: m.LastName,
|
|
||||||
DisplayName: m.DisplayName,
|
|
||||||
AvatarUrl: m.AvatarURL,
|
|
||||||
Details: object.ToViewDetailsPb(
|
|
||||||
m.Sequence,
|
|
||||||
m.CreationDate,
|
|
||||||
m.ChangeDate,
|
|
||||||
"", //TODO: not returnd
|
|
||||||
),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueriesToIAMMember(queries []*member_pb.SearchQuery) []*iam_model.IAMMemberSearchQuery {
|
|
||||||
q := make([]*iam_model.IAMMemberSearchQuery, len(queries))
|
|
||||||
for i, query := range queries {
|
|
||||||
q[i] = MemberQueryToIAMMember(query)
|
|
||||||
}
|
|
||||||
return q
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueryToIAMMember(query *member_pb.SearchQuery) *iam_model.IAMMemberSearchQuery {
|
|
||||||
switch q := query.Query.(type) {
|
|
||||||
case *member_pb.SearchQuery_EmailQuery:
|
|
||||||
return EmailQueryToIAMMemberQuery(q.EmailQuery)
|
|
||||||
case *member_pb.SearchQuery_FirstNameQuery:
|
|
||||||
return FirstNameQueryToIAMMemberQuery(q.FirstNameQuery)
|
|
||||||
case *member_pb.SearchQuery_LastNameQuery:
|
|
||||||
return LastNameQueryToIAMMemberQuery(q.LastNameQuery)
|
|
||||||
case *member_pb.SearchQuery_UserIdQuery:
|
|
||||||
return UserIDQueryToIAMMemberQuery(q.UserIdQuery)
|
|
||||||
default:
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func FirstNameQueryToIAMMemberQuery(query *member_pb.FirstNameQuery) *iam_model.IAMMemberSearchQuery {
|
|
||||||
return &iam_model.IAMMemberSearchQuery{
|
|
||||||
Key: iam_model.IAMMemberSearchKeyFirstName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.FirstName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func LastNameQueryToIAMMemberQuery(query *member_pb.LastNameQuery) *iam_model.IAMMemberSearchQuery {
|
|
||||||
return &iam_model.IAMMemberSearchQuery{
|
|
||||||
Key: iam_model.IAMMemberSearchKeyLastName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.LastName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func EmailQueryToIAMMemberQuery(query *member_pb.EmailQuery) *iam_model.IAMMemberSearchQuery {
|
|
||||||
return &iam_model.IAMMemberSearchQuery{
|
|
||||||
Key: iam_model.IAMMemberSearchKeyEmail,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.Email,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func UserIDQueryToIAMMemberQuery(query *member_pb.UserIDQuery) *iam_model.IAMMemberSearchQuery {
|
|
||||||
return &iam_model.IAMMemberSearchQuery{
|
|
||||||
Key: iam_model.IAMMemberSearchKeyUserID,
|
|
||||||
Method: domain.SearchMethodEquals,
|
|
||||||
Value: query.UserId,
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,90 +0,0 @@
|
|||||||
package member
|
|
||||||
|
|
||||||
import (
|
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
|
||||||
"github.com/caos/zitadel/internal/domain"
|
|
||||||
org_model "github.com/caos/zitadel/internal/org/model"
|
|
||||||
member_pb "github.com/caos/zitadel/pkg/grpc/member"
|
|
||||||
)
|
|
||||||
|
|
||||||
func OrgMembersToPb(members []*org_model.OrgMemberView) []*member_pb.Member {
|
|
||||||
m := make([]*member_pb.Member, len(members))
|
|
||||||
for i, member := range members {
|
|
||||||
m[i] = OrgMemberToPb(member)
|
|
||||||
}
|
|
||||||
return m
|
|
||||||
}
|
|
||||||
|
|
||||||
func OrgMemberToPb(m *org_model.OrgMemberView) *member_pb.Member {
|
|
||||||
return &member_pb.Member{
|
|
||||||
UserId: m.UserID,
|
|
||||||
Roles: m.Roles,
|
|
||||||
PreferredLoginName: m.PreferredLoginName,
|
|
||||||
Email: m.Email,
|
|
||||||
FirstName: m.FirstName,
|
|
||||||
LastName: m.LastName,
|
|
||||||
DisplayName: m.DisplayName,
|
|
||||||
AvatarUrl: m.AvatarURL,
|
|
||||||
Details: object.ToViewDetailsPb(
|
|
||||||
m.Sequence,
|
|
||||||
m.CreationDate,
|
|
||||||
m.ChangeDate,
|
|
||||||
"", //TODO: not returnd
|
|
||||||
),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueriesToOrgMember(queries []*member_pb.SearchQuery) []*org_model.OrgMemberSearchQuery {
|
|
||||||
q := make([]*org_model.OrgMemberSearchQuery, len(queries))
|
|
||||||
for i, query := range queries {
|
|
||||||
q[i] = MemberQueryToOrgMember(query)
|
|
||||||
}
|
|
||||||
return q
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueryToOrgMember(query *member_pb.SearchQuery) *org_model.OrgMemberSearchQuery {
|
|
||||||
switch q := query.Query.(type) {
|
|
||||||
case *member_pb.SearchQuery_EmailQuery:
|
|
||||||
return EmailQueryToOrgMemberQuery(q.EmailQuery)
|
|
||||||
case *member_pb.SearchQuery_FirstNameQuery:
|
|
||||||
return FirstNameQueryToOrgMemberQuery(q.FirstNameQuery)
|
|
||||||
case *member_pb.SearchQuery_LastNameQuery:
|
|
||||||
return LastNameQueryToOrgMemberQuery(q.LastNameQuery)
|
|
||||||
case *member_pb.SearchQuery_UserIdQuery:
|
|
||||||
return UserIDQueryToOrgMemberQuery(q.UserIdQuery)
|
|
||||||
default:
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func FirstNameQueryToOrgMemberQuery(query *member_pb.FirstNameQuery) *org_model.OrgMemberSearchQuery {
|
|
||||||
return &org_model.OrgMemberSearchQuery{
|
|
||||||
Key: org_model.OrgMemberSearchKeyFirstName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.FirstName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func LastNameQueryToOrgMemberQuery(query *member_pb.LastNameQuery) *org_model.OrgMemberSearchQuery {
|
|
||||||
return &org_model.OrgMemberSearchQuery{
|
|
||||||
Key: org_model.OrgMemberSearchKeyLastName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.LastName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func EmailQueryToOrgMemberQuery(query *member_pb.EmailQuery) *org_model.OrgMemberSearchQuery {
|
|
||||||
return &org_model.OrgMemberSearchQuery{
|
|
||||||
Key: org_model.OrgMemberSearchKeyEmail,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.Email,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func UserIDQueryToOrgMemberQuery(query *member_pb.UserIDQuery) *org_model.OrgMemberSearchQuery {
|
|
||||||
return &org_model.OrgMemberSearchQuery{
|
|
||||||
Key: org_model.OrgMemberSearchKeyUserID,
|
|
||||||
Method: domain.SearchMethodEquals,
|
|
||||||
Value: query.UserId,
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,90 +0,0 @@
|
|||||||
package member
|
|
||||||
|
|
||||||
import (
|
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
|
||||||
"github.com/caos/zitadel/internal/domain"
|
|
||||||
proj_model "github.com/caos/zitadel/internal/project/model"
|
|
||||||
member_pb "github.com/caos/zitadel/pkg/grpc/member"
|
|
||||||
)
|
|
||||||
|
|
||||||
func ProjectGrantMembersToPb(members []*proj_model.ProjectGrantMemberView) []*member_pb.Member {
|
|
||||||
m := make([]*member_pb.Member, len(members))
|
|
||||||
for i, member := range members {
|
|
||||||
m[i] = ProjectGrantMemberToPb(member)
|
|
||||||
}
|
|
||||||
return m
|
|
||||||
}
|
|
||||||
|
|
||||||
func ProjectGrantMemberToPb(m *proj_model.ProjectGrantMemberView) *member_pb.Member {
|
|
||||||
return &member_pb.Member{
|
|
||||||
UserId: m.UserID,
|
|
||||||
Roles: m.Roles,
|
|
||||||
PreferredLoginName: m.PreferredLoginName,
|
|
||||||
Email: m.Email,
|
|
||||||
FirstName: m.FirstName,
|
|
||||||
LastName: m.LastName,
|
|
||||||
DisplayName: m.DisplayName,
|
|
||||||
AvatarUrl: m.AvatarURL,
|
|
||||||
Details: object.ToViewDetailsPb(
|
|
||||||
m.Sequence,
|
|
||||||
m.CreationDate,
|
|
||||||
m.ChangeDate,
|
|
||||||
"", //TODO: not returnd
|
|
||||||
),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueriesToProjectGrantMember(queries []*member_pb.SearchQuery) []*proj_model.ProjectGrantMemberSearchQuery {
|
|
||||||
q := make([]*proj_model.ProjectGrantMemberSearchQuery, len(queries))
|
|
||||||
for i, query := range queries {
|
|
||||||
q[i] = MemberQueryToProjectGrantMember(query)
|
|
||||||
}
|
|
||||||
return q
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueryToProjectGrantMember(query *member_pb.SearchQuery) *proj_model.ProjectGrantMemberSearchQuery {
|
|
||||||
switch q := query.Query.(type) {
|
|
||||||
case *member_pb.SearchQuery_EmailQuery:
|
|
||||||
return EmailQueryToProjectGrantMemberQuery(q.EmailQuery)
|
|
||||||
case *member_pb.SearchQuery_FirstNameQuery:
|
|
||||||
return FirstNameQueryToProjectGrantMemberQuery(q.FirstNameQuery)
|
|
||||||
case *member_pb.SearchQuery_LastNameQuery:
|
|
||||||
return LastNameQueryToProjectGrantMemberQuery(q.LastNameQuery)
|
|
||||||
case *member_pb.SearchQuery_UserIdQuery:
|
|
||||||
return UserIDQueryToProjectGrantMemberQuery(q.UserIdQuery)
|
|
||||||
default:
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func FirstNameQueryToProjectGrantMemberQuery(query *member_pb.FirstNameQuery) *proj_model.ProjectGrantMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectGrantMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectGrantMemberSearchKeyFirstName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.FirstName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func LastNameQueryToProjectGrantMemberQuery(query *member_pb.LastNameQuery) *proj_model.ProjectGrantMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectGrantMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectGrantMemberSearchKeyLastName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.LastName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func EmailQueryToProjectGrantMemberQuery(query *member_pb.EmailQuery) *proj_model.ProjectGrantMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectGrantMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectGrantMemberSearchKeyEmail,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.Email,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func UserIDQueryToProjectGrantMemberQuery(query *member_pb.UserIDQuery) *proj_model.ProjectGrantMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectGrantMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectGrantMemberSearchKeyUserID,
|
|
||||||
Method: domain.SearchMethodEquals,
|
|
||||||
Value: query.UserId,
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,90 +0,0 @@
|
|||||||
package member
|
|
||||||
|
|
||||||
import (
|
|
||||||
"github.com/caos/zitadel/internal/api/grpc/object"
|
|
||||||
"github.com/caos/zitadel/internal/domain"
|
|
||||||
proj_model "github.com/caos/zitadel/internal/project/model"
|
|
||||||
member_pb "github.com/caos/zitadel/pkg/grpc/member"
|
|
||||||
)
|
|
||||||
|
|
||||||
func ProjectMembersToPb(members []*proj_model.ProjectMemberView) []*member_pb.Member {
|
|
||||||
m := make([]*member_pb.Member, len(members))
|
|
||||||
for i, member := range members {
|
|
||||||
m[i] = ProjectMemberToPb(member)
|
|
||||||
}
|
|
||||||
return m
|
|
||||||
}
|
|
||||||
|
|
||||||
func ProjectMemberToPb(m *proj_model.ProjectMemberView) *member_pb.Member {
|
|
||||||
return &member_pb.Member{
|
|
||||||
UserId: m.UserID,
|
|
||||||
Roles: m.Roles,
|
|
||||||
PreferredLoginName: m.PreferredLoginName,
|
|
||||||
Email: m.Email,
|
|
||||||
FirstName: m.FirstName,
|
|
||||||
LastName: m.LastName,
|
|
||||||
DisplayName: m.DisplayName,
|
|
||||||
AvatarUrl: m.AvatarURL,
|
|
||||||
Details: object.ToViewDetailsPb(
|
|
||||||
m.Sequence,
|
|
||||||
m.CreationDate,
|
|
||||||
m.ChangeDate,
|
|
||||||
"", //TODO: not returnd
|
|
||||||
),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueriesToProjectMember(queries []*member_pb.SearchQuery) []*proj_model.ProjectMemberSearchQuery {
|
|
||||||
q := make([]*proj_model.ProjectMemberSearchQuery, len(queries))
|
|
||||||
for i, query := range queries {
|
|
||||||
q[i] = MemberQueryToProjectMember(query)
|
|
||||||
}
|
|
||||||
return q
|
|
||||||
}
|
|
||||||
|
|
||||||
func MemberQueryToProjectMember(query *member_pb.SearchQuery) *proj_model.ProjectMemberSearchQuery {
|
|
||||||
switch q := query.Query.(type) {
|
|
||||||
case *member_pb.SearchQuery_EmailQuery:
|
|
||||||
return EmailQueryToProjectMemberQuery(q.EmailQuery)
|
|
||||||
case *member_pb.SearchQuery_FirstNameQuery:
|
|
||||||
return FirstNameQueryToProjectMemberQuery(q.FirstNameQuery)
|
|
||||||
case *member_pb.SearchQuery_LastNameQuery:
|
|
||||||
return LastNameQueryToProjectMemberQuery(q.LastNameQuery)
|
|
||||||
case *member_pb.SearchQuery_UserIdQuery:
|
|
||||||
return UserIDQueryToProjectMemberQuery(q.UserIdQuery)
|
|
||||||
default:
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func FirstNameQueryToProjectMemberQuery(query *member_pb.FirstNameQuery) *proj_model.ProjectMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectMemberSearchKeyFirstName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.FirstName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func LastNameQueryToProjectMemberQuery(query *member_pb.LastNameQuery) *proj_model.ProjectMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectMemberSearchKeyLastName,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.LastName,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func EmailQueryToProjectMemberQuery(query *member_pb.EmailQuery) *proj_model.ProjectMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectMemberSearchKeyEmail,
|
|
||||||
Method: object.TextMethodToModel(query.Method),
|
|
||||||
Value: query.Email,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func UserIDQueryToProjectMemberQuery(query *member_pb.UserIDQuery) *proj_model.ProjectMemberSearchQuery {
|
|
||||||
return &proj_model.ProjectMemberSearchQuery{
|
|
||||||
Key: proj_model.ProjectMemberSearchKeyUserID,
|
|
||||||
Method: domain.SearchMethodEquals,
|
|
||||||
Value: query.UserId,
|
|
||||||
}
|
|
||||||
}
|
|
@ -101,10 +101,11 @@ func MembershipsToMembershipsPb(memberships []*query.Membership) []*user_pb.Memb
|
|||||||
}
|
}
|
||||||
|
|
||||||
func MembershipToMembershipPb(membership *query.Membership) *user_pb.Membership {
|
func MembershipToMembershipPb(membership *query.Membership) *user_pb.Membership {
|
||||||
|
typ, name := memberTypeToPb(membership)
|
||||||
return &user_pb.Membership{
|
return &user_pb.Membership{
|
||||||
UserId: membership.UserID,
|
UserId: membership.UserID,
|
||||||
Type: memberTypeToPb(membership),
|
Type: typ,
|
||||||
DisplayName: membership.DisplayName,
|
DisplayName: name,
|
||||||
Roles: membership.Roles,
|
Roles: membership.Roles,
|
||||||
Details: object.ToViewDetailsPb(
|
Details: object.ToViewDetailsPb(
|
||||||
membership.Sequence,
|
membership.Sequence,
|
||||||
@ -115,23 +116,23 @@ func MembershipToMembershipPb(membership *query.Membership) *user_pb.Membership
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func memberTypeToPb(membership *query.Membership) user_pb.MembershipType {
|
func memberTypeToPb(membership *query.Membership) (user_pb.MembershipType, string) {
|
||||||
if membership.Org != nil {
|
if membership.Org != nil {
|
||||||
return &user_pb.Membership_OrgId{
|
return &user_pb.Membership_OrgId{
|
||||||
OrgId: membership.Org.OrgID,
|
OrgId: membership.Org.OrgID,
|
||||||
}
|
}, membership.Org.Name
|
||||||
} else if membership.Project != nil {
|
} else if membership.Project != nil {
|
||||||
return &user_pb.Membership_ProjectId{
|
return &user_pb.Membership_ProjectId{
|
||||||
ProjectId: membership.Project.ProjectID,
|
ProjectId: membership.Project.ProjectID,
|
||||||
}
|
}, membership.Project.Name
|
||||||
} else if membership.ProjectGrant != nil {
|
} else if membership.ProjectGrant != nil {
|
||||||
return &user_pb.Membership_ProjectGrantId{
|
return &user_pb.Membership_ProjectGrantId{
|
||||||
ProjectGrantId: membership.ProjectGrant.GrantID,
|
ProjectGrantId: membership.ProjectGrant.GrantID,
|
||||||
}
|
}, membership.ProjectGrant.ProjectName
|
||||||
} else if membership.IAM != nil {
|
} else if membership.IAM != nil {
|
||||||
return &user_pb.Membership_Iam{
|
return &user_pb.Membership_Iam{
|
||||||
Iam: true,
|
Iam: true,
|
||||||
|
}, membership.IAM.Name
|
||||||
}
|
}
|
||||||
}
|
return nil, ""
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
@ -90,15 +90,21 @@ func (repo *UserGrantRepo) SearchMyProjectOrgs(ctx context.Context, request *gra
|
|||||||
return repo.userOrg(ctxData)
|
return repo.userOrg(ctxData)
|
||||||
}
|
}
|
||||||
|
|
||||||
func membershipsToOrgResp(memberships []*user_view_model.UserMembershipView, count uint64) *grant_model.ProjectOrgSearchResponse {
|
func (repo *UserGrantRepo) membershipsToOrgResp(memberships *query.Memberships) *grant_model.ProjectOrgSearchResponse {
|
||||||
orgs := make([]*grant_model.Org, 0, len(memberships))
|
orgs := make([]*grant_model.Org, 0, len(memberships.Memberships))
|
||||||
for _, m := range memberships {
|
for _, m := range memberships.Memberships {
|
||||||
if !containsOrg(orgs, m.ResourceOwner) {
|
if !containsOrg(orgs, m.ResourceOwner) {
|
||||||
orgs = append(orgs, &grant_model.Org{OrgID: m.ResourceOwner, OrgName: m.ResourceOwnerName})
|
org, err := repo.Query.OrgByID(context.TODO(), m.ResourceOwner)
|
||||||
|
if err != nil {
|
||||||
|
logging.LogWithFields("EVENT-k8Ikl", "owner", m.ResourceOwner).WithError(err).Warn("org not found")
|
||||||
|
orgs = append(orgs, &grant_model.Org{OrgID: m.ResourceOwner})
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
orgs = append(orgs, &grant_model.Org{OrgID: m.ResourceOwner, OrgName: org.Name})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return &grant_model.ProjectOrgSearchResponse{
|
return &grant_model.ProjectOrgSearchResponse{
|
||||||
TotalResult: count,
|
TotalResult: memberships.Count,
|
||||||
Result: orgs,
|
Result: orgs,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -143,50 +149,42 @@ func (repo *UserGrantRepo) SearchMyZitadelPermissions(ctx context.Context) ([]st
|
|||||||
return permissions.Permissions, nil
|
return permissions.Permissions, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (repo *UserGrantRepo) searchUserMemberships(ctx context.Context) ([]*user_view_model.UserMembershipView, error) {
|
func (repo *UserGrantRepo) searchUserMemberships(ctx context.Context) ([]*query.Membership, error) {
|
||||||
ctxData := authz.GetCtxData(ctx)
|
ctxData := authz.GetCtxData(ctx)
|
||||||
orgMemberships, orgCount, err := repo.View.SearchUserMemberships(&user_model.UserMembershipSearchRequest{
|
userQuery, err := query.NewMembershipUserIDQuery(ctxData.UserID)
|
||||||
Queries: []*user_model.UserMembershipSearchQuery{
|
if err != nil {
|
||||||
{
|
return nil, err
|
||||||
Key: user_model.UserMembershipSearchKeyUserID,
|
}
|
||||||
Method: domain.SearchMethodEquals,
|
ownerQuery, err := query.NewMembershipResourceOwnerQuery(ctxData.OrgID)
|
||||||
Value: ctxData.UserID,
|
if err != nil {
|
||||||
},
|
return nil, err
|
||||||
{
|
}
|
||||||
Key: user_model.UserMembershipSearchKeyResourceOwner,
|
|
||||||
Method: domain.SearchMethodEquals,
|
orgMemberships, err := repo.Query.Memberships(ctx, &query.MembershipSearchQuery{
|
||||||
Value: ctxData.OrgID,
|
Queries: []query.SearchQuery{userQuery, ownerQuery},
|
||||||
},
|
|
||||||
},
|
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
iamMemberships, iamCount, err := repo.View.SearchUserMemberships(&user_model.UserMembershipSearchRequest{
|
iamQuery, err := query.NewMembershipIsIAMQuery()
|
||||||
Queries: []*user_model.UserMembershipSearchQuery{
|
if err != nil {
|
||||||
{
|
return nil, err
|
||||||
Key: user_model.UserMembershipSearchKeyUserID,
|
}
|
||||||
Method: domain.SearchMethodEquals,
|
iamMemberships, err := repo.Query.Memberships(ctx, &query.MembershipSearchQuery{
|
||||||
Value: ctxData.UserID,
|
Queries: []query.SearchQuery{userQuery, iamQuery},
|
||||||
},
|
|
||||||
{
|
|
||||||
Key: user_model.UserMembershipSearchKeyAggregateID,
|
|
||||||
Method: domain.SearchMethodEquals,
|
|
||||||
Value: repo.IamID,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if orgCount == 0 && iamCount == 0 {
|
if orgMemberships.Count == 0 && iamMemberships.Count == 0 {
|
||||||
return []*user_view_model.UserMembershipView{}, nil
|
return []*query.Membership{}, nil
|
||||||
}
|
}
|
||||||
return append(orgMemberships, iamMemberships...), nil
|
return append(orgMemberships.Memberships, iamMemberships.Memberships...), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (repo *UserGrantRepo) SearchMyProjectPermissions(ctx context.Context) ([]string, error) {
|
func (repo *UserGrantRepo) SearchMyProjectPermissions(ctx context.Context) ([]string, error) {
|
||||||
ctxData := authz.GetCtxData(ctx)
|
ctxData := authz.GetCtxData(ctx)
|
||||||
|
//TODO: blocked until user grants moved to query-pkg
|
||||||
usergrant, err := repo.View.UserGrantByIDs(ctxData.OrgID, ctxData.ProjectID, ctxData.UserID)
|
usergrant, err := repo.View.UserGrantByIDs(ctxData.OrgID, ctxData.ProjectID, ctxData.UserID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -224,6 +222,7 @@ func (repo *UserGrantRepo) SearchAdminOrgs(request *grant_model.UserGrantSearchR
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (repo *UserGrantRepo) IsIamAdmin(ctx context.Context) (bool, error) {
|
func (repo *UserGrantRepo) IsIamAdmin(ctx context.Context) (bool, error) {
|
||||||
|
//TODO: blocked until user grants moved to query
|
||||||
grantSearch := &grant_model.UserGrantSearchRequest{
|
grantSearch := &grant_model.UserGrantSearchRequest{
|
||||||
Queries: []*grant_model.UserGrantSearchQuery{
|
Queries: []*grant_model.UserGrantSearchQuery{
|
||||||
{Key: grant_model.UserGrantSearchKeyResourceOwner, Method: domain.SearchMethodEquals, Value: repo.IamID},
|
{Key: grant_model.UserGrantSearchKeyResourceOwner, Method: domain.SearchMethodEquals, Value: repo.IamID},
|
||||||
@ -247,6 +246,7 @@ func (repo *UserGrantRepo) UserGrantsByProjectAndUserID(projectID, userID string
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (repo *UserGrantRepo) userOrg(ctxData authz.CtxData) (*grant_model.ProjectOrgSearchResponse, error) {
|
func (repo *UserGrantRepo) userOrg(ctxData authz.CtxData) (*grant_model.ProjectOrgSearchResponse, error) {
|
||||||
|
//TODO: blocked until user moved to query pkg
|
||||||
user, err := repo.View.UserByID(ctxData.UserID)
|
user, err := repo.View.UserByID(ctxData.UserID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -255,40 +255,43 @@ func (repo *UserGrantRepo) userOrg(ctxData authz.CtxData) (*grant_model.ProjectO
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &grant_model.ProjectOrgSearchResponse{Result: []*grant_model.Org{&grant_model.Org{
|
return &grant_model.ProjectOrgSearchResponse{Result: []*grant_model.Org{{
|
||||||
OrgID: org.ID,
|
OrgID: org.ID,
|
||||||
OrgName: org.Name,
|
OrgName: org.Name,
|
||||||
}}}, nil
|
}}}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (repo *UserGrantRepo) searchZitadelOrgs(ctxData authz.CtxData, request *grant_model.UserGrantSearchRequest) (*grant_model.ProjectOrgSearchResponse, error) {
|
func (repo *UserGrantRepo) searchZitadelOrgs(ctxData authz.CtxData, request *grant_model.UserGrantSearchRequest) (*grant_model.ProjectOrgSearchResponse, error) {
|
||||||
memberships, count, err := repo.View.SearchUserMemberships(&user_model.UserMembershipSearchRequest{
|
userQuery, err := query.NewMembershipUserIDQuery(ctxData.UserID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
memberships, err := repo.Query.Memberships(context.TODO(), &query.MembershipSearchQuery{
|
||||||
|
SearchRequest: query.SearchRequest{
|
||||||
Offset: request.Offset,
|
Offset: request.Offset,
|
||||||
Limit: request.Limit,
|
Limit: request.Limit,
|
||||||
Asc: request.Asc,
|
Asc: request.Asc,
|
||||||
Queries: []*user_model.UserMembershipSearchQuery{
|
//TODO: sorting column
|
||||||
{
|
|
||||||
Key: user_model.UserMembershipSearchKeyUserID,
|
|
||||||
Method: domain.SearchMethodEquals,
|
|
||||||
Value: ctxData.UserID,
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
|
Queries: []query.SearchQuery{userQuery},
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
if len(memberships) > 0 {
|
if len(memberships.Memberships) > 0 {
|
||||||
return membershipsToOrgResp(memberships, count), nil
|
return repo.membershipsToOrgResp(memberships), nil
|
||||||
}
|
}
|
||||||
return repo.userOrg(ctxData)
|
return repo.userOrg(ctxData)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (repo *UserGrantRepo) mapRoleToPermission(permissions *grant_model.Permissions, membership *user_view_model.UserMembershipView, role string) *grant_model.Permissions {
|
func (repo *UserGrantRepo) mapRoleToPermission(permissions *grant_model.Permissions, membership *query.Membership, role string) *grant_model.Permissions {
|
||||||
for _, mapping := range repo.Auth.RolePermissionMappings {
|
for _, mapping := range repo.Auth.RolePermissionMappings {
|
||||||
if mapping.Role == role {
|
if mapping.Role == role {
|
||||||
ctxID := ""
|
ctxID := ""
|
||||||
if membership.MemberType == int32(user_model.MemberTypeProject) || membership.MemberType == int32(user_model.MemberTypeProjectGrant) {
|
if membership.Project != nil {
|
||||||
ctxID = membership.ObjectID
|
ctxID = membership.Project.ProjectID
|
||||||
|
} else if membership.ProjectGrant != nil {
|
||||||
|
ctxID = membership.ProjectGrant.GrantID
|
||||||
}
|
}
|
||||||
permissions.AppendPermissions(ctxID, mapping.Permissions...)
|
permissions.AppendPermissions(ctxID, mapping.Permissions...)
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,14 @@
|
|||||||
package query
|
package query
|
||||||
|
|
||||||
import "github.com/caos/zitadel/internal/query/projection"
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
|
||||||
|
sq "github.com/Masterminds/squirrel"
|
||||||
|
"github.com/caos/zitadel/internal/errors"
|
||||||
|
"github.com/caos/zitadel/internal/query/projection"
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
iamMemberTable = table{
|
iamMemberTable = table{
|
||||||
@ -36,3 +44,127 @@ var (
|
|||||||
table: iamMemberTable,
|
table: iamMemberTable,
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type IAMMembersQuery struct {
|
||||||
|
MembersQuery
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *IAMMembersQuery) toQuery(query sq.SelectBuilder) sq.SelectBuilder {
|
||||||
|
return q.MembersQuery.
|
||||||
|
toQuery(query)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *Queries) IAMMembers(ctx context.Context, queries *IAMMembersQuery) (*Members, error) {
|
||||||
|
query, scan := prepareIAMMembersQuery()
|
||||||
|
stmt, args, err := queries.toQuery(query).ToSql()
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInvalidArgument(err, "QUERY-USNwM", "Errors.Query.InvalidRequest")
|
||||||
|
}
|
||||||
|
|
||||||
|
currentSequence, err := q.latestSequence(ctx, iamMemberTable)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rows, err := q.client.QueryContext(ctx, stmt, args...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-Pdg1I", "Errors.Internal")
|
||||||
|
}
|
||||||
|
members, err := scan(rows)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
members.LatestSequence = currentSequence
|
||||||
|
return members, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func prepareIAMMembersQuery() (sq.SelectBuilder, func(*sql.Rows) (*Members, error)) {
|
||||||
|
return sq.Select(
|
||||||
|
IAMMemberCreationDate.identifier(),
|
||||||
|
IAMMemberChangeDate.identifier(),
|
||||||
|
IAMMemberSequence.identifier(),
|
||||||
|
IAMMemberResourceOwner.identifier(),
|
||||||
|
IAMMemberUserID.identifier(),
|
||||||
|
IAMMemberRoles.identifier(),
|
||||||
|
LoginNameNameCol.identifier(),
|
||||||
|
HumanEmailCol.identifier(),
|
||||||
|
HumanFirstNameCol.identifier(),
|
||||||
|
HumanLastNameCol.identifier(),
|
||||||
|
HumanDisplayNameCol.identifier(),
|
||||||
|
MachineNameCol.identifier(),
|
||||||
|
HumanAvaterURLCol.identifier(),
|
||||||
|
countColumn.identifier(),
|
||||||
|
).From(iamMemberTable.identifier()).
|
||||||
|
LeftJoin(join(HumanUserIDCol, IAMMemberUserID)).
|
||||||
|
LeftJoin(join(MachineUserIDCol, IAMMemberUserID)).
|
||||||
|
LeftJoin(join(LoginNameUserIDCol, IAMMemberUserID)).
|
||||||
|
Where(
|
||||||
|
sq.Eq{LoginNameIsPrimaryCol.identifier(): true},
|
||||||
|
).PlaceholderFormat(sq.Dollar),
|
||||||
|
func(rows *sql.Rows) (*Members, error) {
|
||||||
|
members := make([]*Member, 0)
|
||||||
|
var count uint64
|
||||||
|
|
||||||
|
for rows.Next() {
|
||||||
|
member := new(Member)
|
||||||
|
roles := pq.StringArray{}
|
||||||
|
|
||||||
|
var (
|
||||||
|
preferredLoginName = sql.NullString{}
|
||||||
|
email = sql.NullString{}
|
||||||
|
firstName = sql.NullString{}
|
||||||
|
lastName = sql.NullString{}
|
||||||
|
displayName = sql.NullString{}
|
||||||
|
machineName = sql.NullString{}
|
||||||
|
avatarURL = sql.NullString{}
|
||||||
|
)
|
||||||
|
|
||||||
|
err := rows.Scan(
|
||||||
|
&member.CreationDate,
|
||||||
|
&member.ChangeDate,
|
||||||
|
&member.Sequence,
|
||||||
|
&member.ResourceOwner,
|
||||||
|
&member.UserID,
|
||||||
|
&roles,
|
||||||
|
&preferredLoginName,
|
||||||
|
&email,
|
||||||
|
&firstName,
|
||||||
|
&lastName,
|
||||||
|
&displayName,
|
||||||
|
&machineName,
|
||||||
|
&avatarURL,
|
||||||
|
|
||||||
|
&count,
|
||||||
|
)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
member.Roles = roles
|
||||||
|
member.PreferredLoginName = preferredLoginName.String
|
||||||
|
member.Email = email.String
|
||||||
|
member.FirstName = firstName.String
|
||||||
|
member.LastName = lastName.String
|
||||||
|
member.AvatarURL = avatarURL.String
|
||||||
|
if displayName.Valid {
|
||||||
|
member.DisplayName = displayName.String
|
||||||
|
} else {
|
||||||
|
member.DisplayName = machineName.String
|
||||||
|
}
|
||||||
|
|
||||||
|
members = append(members, member)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := rows.Close(); err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-EqJFc", "Errors.Query.CloseRows")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &Members{
|
||||||
|
Members: members,
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: count,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
277
internal/query/iam_member_test.go
Normal file
277
internal/query/iam_member_test.go
Normal file
@ -0,0 +1,277 @@
|
|||||||
|
package query
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"database/sql/driver"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"regexp"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
iamMembersQuery = regexp.QuoteMeta("SELECT" +
|
||||||
|
" members.creation_date" +
|
||||||
|
", members.change_date" +
|
||||||
|
", members.sequence" +
|
||||||
|
", members.resource_owner" +
|
||||||
|
", members.user_id" +
|
||||||
|
", members.roles" +
|
||||||
|
", zitadel.projections.login_names.login_name" +
|
||||||
|
", zitadel.projections.users_humans.email" +
|
||||||
|
", zitadel.projections.users_humans.first_name" +
|
||||||
|
", zitadel.projections.users_humans.last_name" +
|
||||||
|
", zitadel.projections.users_humans.display_name" +
|
||||||
|
", zitadel.projections.users_machines.name" +
|
||||||
|
", zitadel.projections.users_humans.avater_key" +
|
||||||
|
", COUNT(*) OVER () " +
|
||||||
|
"FROM zitadel.projections.iam_members as members " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_humans " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_humans.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_machines " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_machines.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.login_names " +
|
||||||
|
"ON members.user_id = zitadel.projections.login_names.user_id " +
|
||||||
|
"WHERE zitadel.projections.login_names.is_primary = $1")
|
||||||
|
iamMembersColumns = []string{
|
||||||
|
"creation_date",
|
||||||
|
"change_date",
|
||||||
|
"sequence",
|
||||||
|
"resource_owner",
|
||||||
|
"user_id",
|
||||||
|
"roles",
|
||||||
|
"login_name",
|
||||||
|
"email",
|
||||||
|
"first_name",
|
||||||
|
"last_name",
|
||||||
|
"display_name",
|
||||||
|
"name",
|
||||||
|
"avater_key",
|
||||||
|
"count",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func Test_IAMMemberPrepares(t *testing.T) {
|
||||||
|
type want struct {
|
||||||
|
sqlExpectations sqlExpectation
|
||||||
|
err checkErr
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
prepare interface{}
|
||||||
|
want want
|
||||||
|
object interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "prepareIAMMembersQuery no result",
|
||||||
|
prepare: prepareIAMMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
iamMembersQuery,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
Members: []*Member{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareIAMMembersQuery human found",
|
||||||
|
prepare: prepareIAMMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
iamMembersQuery,
|
||||||
|
iamMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareIAMMembersQuery machine found",
|
||||||
|
prepare: prepareIAMMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
iamMembersQuery,
|
||||||
|
iamMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareIAMMembersQuery multiple users",
|
||||||
|
prepare: prepareIAMMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
iamMembersQuery,
|
||||||
|
iamMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-1",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-2",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 2,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-1",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-2",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareIAMMembersQuery sql err",
|
||||||
|
prepare: prepareIAMMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueryErr(
|
||||||
|
iamMembersQuery,
|
||||||
|
sql.ErrConnDone,
|
||||||
|
),
|
||||||
|
err: func(err error) (error, bool) {
|
||||||
|
if !errors.Is(err, sql.ErrConnDone) {
|
||||||
|
return fmt.Errorf("err should be sql.ErrConnDone got: %w", err), false
|
||||||
|
}
|
||||||
|
return nil, true
|
||||||
|
},
|
||||||
|
},
|
||||||
|
object: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
21
internal/query/login_name.go
Normal file
21
internal/query/login_name.go
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
package query
|
||||||
|
|
||||||
|
import "github.com/caos/zitadel/internal/query/projection"
|
||||||
|
|
||||||
|
var (
|
||||||
|
loginNameTable = table{
|
||||||
|
name: projection.LoginNameProjectionTable,
|
||||||
|
}
|
||||||
|
LoginNameUserIDCol = Column{
|
||||||
|
name: "user_id",
|
||||||
|
table: loginNameTable,
|
||||||
|
}
|
||||||
|
LoginNameNameCol = Column{
|
||||||
|
name: projection.LoginNameCol,
|
||||||
|
table: loginNameTable,
|
||||||
|
}
|
||||||
|
LoginNameIsPrimaryCol = Column{
|
||||||
|
name: projection.LoginNameDomainIsPrimaryCol,
|
||||||
|
table: loginNameTable,
|
||||||
|
}
|
||||||
|
)
|
@ -4,10 +4,10 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
sq "github.com/Masterminds/squirrel"
|
|
||||||
|
|
||||||
"github.com/caos/zitadel/internal/query/projection"
|
"github.com/caos/zitadel/internal/query/projection"
|
||||||
"github.com/caos/zitadel/internal/telemetry/tracing"
|
"github.com/caos/zitadel/internal/telemetry/tracing"
|
||||||
|
|
||||||
|
sq "github.com/Masterminds/squirrel"
|
||||||
)
|
)
|
||||||
|
|
||||||
type MembersQuery struct {
|
type MembersQuery struct {
|
||||||
|
@ -1,6 +1,15 @@
|
|||||||
package query
|
package query
|
||||||
|
|
||||||
import "github.com/caos/zitadel/internal/query/projection"
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
|
||||||
|
"github.com/caos/zitadel/internal/errors"
|
||||||
|
"github.com/caos/zitadel/internal/query/projection"
|
||||||
|
|
||||||
|
sq "github.com/Masterminds/squirrel"
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
orgMemberTable = table{
|
orgMemberTable = table{
|
||||||
@ -36,3 +45,129 @@ var (
|
|||||||
table: orgMemberTable,
|
table: orgMemberTable,
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type OrgMembersQuery struct {
|
||||||
|
MembersQuery
|
||||||
|
OrgID string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *OrgMembersQuery) toQuery(query sq.SelectBuilder) sq.SelectBuilder {
|
||||||
|
return q.MembersQuery.
|
||||||
|
toQuery(query).
|
||||||
|
Where(sq.Eq{OrgMemberOrgID.identifier(): q.OrgID})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *Queries) OrgMembers(ctx context.Context, queries *OrgMembersQuery) (*Members, error) {
|
||||||
|
query, scan := prepareOrgMembersQuery()
|
||||||
|
stmt, args, err := queries.toQuery(query).ToSql()
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInvalidArgument(err, "QUERY-PDAVB", "Errors.Query.InvalidRequest")
|
||||||
|
}
|
||||||
|
|
||||||
|
currentSequence, err := q.latestSequence(ctx, orgsTable)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rows, err := q.client.QueryContext(ctx, stmt, args...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-5g4yV", "Errors.Internal")
|
||||||
|
}
|
||||||
|
members, err := scan(rows)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
members.LatestSequence = currentSequence
|
||||||
|
return members, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func prepareOrgMembersQuery() (sq.SelectBuilder, func(*sql.Rows) (*Members, error)) {
|
||||||
|
return sq.Select(
|
||||||
|
OrgMemberCreationDate.identifier(),
|
||||||
|
OrgMemberChangeDate.identifier(),
|
||||||
|
OrgMemberSequence.identifier(),
|
||||||
|
OrgMemberResourceOwner.identifier(),
|
||||||
|
OrgMemberUserID.identifier(),
|
||||||
|
OrgMemberRoles.identifier(),
|
||||||
|
LoginNameNameCol.identifier(),
|
||||||
|
HumanEmailCol.identifier(),
|
||||||
|
HumanFirstNameCol.identifier(),
|
||||||
|
HumanLastNameCol.identifier(),
|
||||||
|
HumanDisplayNameCol.identifier(),
|
||||||
|
MachineNameCol.identifier(),
|
||||||
|
HumanAvaterURLCol.identifier(),
|
||||||
|
countColumn.identifier(),
|
||||||
|
).From(orgMemberTable.identifier()).
|
||||||
|
LeftJoin(join(HumanUserIDCol, OrgMemberUserID)).
|
||||||
|
LeftJoin(join(MachineUserIDCol, OrgMemberUserID)).
|
||||||
|
LeftJoin(join(LoginNameUserIDCol, OrgMemberUserID)).
|
||||||
|
Where(
|
||||||
|
sq.Eq{LoginNameIsPrimaryCol.identifier(): true},
|
||||||
|
).PlaceholderFormat(sq.Dollar),
|
||||||
|
func(rows *sql.Rows) (*Members, error) {
|
||||||
|
members := make([]*Member, 0)
|
||||||
|
var count uint64
|
||||||
|
|
||||||
|
for rows.Next() {
|
||||||
|
member := new(Member)
|
||||||
|
roles := pq.StringArray{}
|
||||||
|
|
||||||
|
var (
|
||||||
|
preferredLoginName = sql.NullString{}
|
||||||
|
email = sql.NullString{}
|
||||||
|
firstName = sql.NullString{}
|
||||||
|
lastName = sql.NullString{}
|
||||||
|
displayName = sql.NullString{}
|
||||||
|
machineName = sql.NullString{}
|
||||||
|
avatarURL = sql.NullString{}
|
||||||
|
)
|
||||||
|
|
||||||
|
err := rows.Scan(
|
||||||
|
&member.CreationDate,
|
||||||
|
&member.ChangeDate,
|
||||||
|
&member.Sequence,
|
||||||
|
&member.ResourceOwner,
|
||||||
|
&member.UserID,
|
||||||
|
&roles,
|
||||||
|
&preferredLoginName,
|
||||||
|
&email,
|
||||||
|
&firstName,
|
||||||
|
&lastName,
|
||||||
|
&displayName,
|
||||||
|
&machineName,
|
||||||
|
&avatarURL,
|
||||||
|
|
||||||
|
&count,
|
||||||
|
)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
member.Roles = roles
|
||||||
|
member.PreferredLoginName = preferredLoginName.String
|
||||||
|
member.Email = email.String
|
||||||
|
member.FirstName = firstName.String
|
||||||
|
member.LastName = lastName.String
|
||||||
|
member.AvatarURL = avatarURL.String
|
||||||
|
if displayName.Valid {
|
||||||
|
member.DisplayName = displayName.String
|
||||||
|
} else {
|
||||||
|
member.DisplayName = machineName.String
|
||||||
|
}
|
||||||
|
|
||||||
|
members = append(members, member)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := rows.Close(); err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-N34NV", "Errors.Query.CloseRows")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &Members{
|
||||||
|
Members: members,
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: count,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
277
internal/query/org_member_test.go
Normal file
277
internal/query/org_member_test.go
Normal file
@ -0,0 +1,277 @@
|
|||||||
|
package query
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"database/sql/driver"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"regexp"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
orgMembersQuery = regexp.QuoteMeta("SELECT" +
|
||||||
|
" members.creation_date" +
|
||||||
|
", members.change_date" +
|
||||||
|
", members.sequence" +
|
||||||
|
", members.resource_owner" +
|
||||||
|
", members.user_id" +
|
||||||
|
", members.roles" +
|
||||||
|
", zitadel.projections.login_names.login_name" +
|
||||||
|
", zitadel.projections.users_humans.email" +
|
||||||
|
", zitadel.projections.users_humans.first_name" +
|
||||||
|
", zitadel.projections.users_humans.last_name" +
|
||||||
|
", zitadel.projections.users_humans.display_name" +
|
||||||
|
", zitadel.projections.users_machines.name" +
|
||||||
|
", zitadel.projections.users_humans.avater_key" +
|
||||||
|
", COUNT(*) OVER () " +
|
||||||
|
"FROM zitadel.projections.org_members as members " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_humans " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_humans.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_machines " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_machines.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.login_names " +
|
||||||
|
"ON members.user_id = zitadel.projections.login_names.user_id " +
|
||||||
|
"WHERE zitadel.projections.login_names.is_primary = $1")
|
||||||
|
orgMembersColumns = []string{
|
||||||
|
"creation_date",
|
||||||
|
"change_date",
|
||||||
|
"sequence",
|
||||||
|
"resource_owner",
|
||||||
|
"user_id",
|
||||||
|
"roles",
|
||||||
|
"login_name",
|
||||||
|
"email",
|
||||||
|
"first_name",
|
||||||
|
"last_name",
|
||||||
|
"display_name",
|
||||||
|
"name",
|
||||||
|
"avater_key",
|
||||||
|
"count",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func Test_OrgMemberPrepares(t *testing.T) {
|
||||||
|
type want struct {
|
||||||
|
sqlExpectations sqlExpectation
|
||||||
|
err checkErr
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
prepare interface{}
|
||||||
|
want want
|
||||||
|
object interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "prepareOrgMembersQuery no result",
|
||||||
|
prepare: prepareOrgMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
orgMembersQuery,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
Members: []*Member{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareOrgMembersQuery human found",
|
||||||
|
prepare: prepareOrgMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
orgMembersQuery,
|
||||||
|
orgMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareOrgMembersQuery machine found",
|
||||||
|
prepare: prepareOrgMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
orgMembersQuery,
|
||||||
|
orgMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareOrgMembersQuery multiple users",
|
||||||
|
prepare: prepareOrgMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
orgMembersQuery,
|
||||||
|
orgMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-1",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-2",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 2,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-1",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-2",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareOrgMembersQuery sql err",
|
||||||
|
prepare: prepareOrgMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueryErr(
|
||||||
|
orgMembersQuery,
|
||||||
|
sql.ErrConnDone,
|
||||||
|
),
|
||||||
|
err: func(err error) (error, bool) {
|
||||||
|
if !errors.Is(err, sql.ErrConnDone) {
|
||||||
|
return fmt.Errorf("err should be sql.ErrConnDone got: %w", err), false
|
||||||
|
}
|
||||||
|
return nil, true
|
||||||
|
},
|
||||||
|
},
|
||||||
|
object: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
@ -1,6 +1,14 @@
|
|||||||
package query
|
package query
|
||||||
|
|
||||||
import "github.com/caos/zitadel/internal/query/projection"
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
|
||||||
|
sq "github.com/Masterminds/squirrel"
|
||||||
|
"github.com/caos/zitadel/internal/errors"
|
||||||
|
"github.com/caos/zitadel/internal/query/projection"
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
projectGrantMemberTable = table{
|
projectGrantMemberTable = table{
|
||||||
@ -40,3 +48,132 @@ var (
|
|||||||
table: projectGrantMemberTable,
|
table: projectGrantMemberTable,
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type ProjectGrantMembersQuery struct {
|
||||||
|
MembersQuery
|
||||||
|
ProjectID, GrantID string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *ProjectGrantMembersQuery) toQuery(query sq.SelectBuilder) sq.SelectBuilder {
|
||||||
|
return q.MembersQuery.
|
||||||
|
toQuery(query).
|
||||||
|
Where(sq.Eq{
|
||||||
|
ProjectGrantMemberProjectID.identifier(): q.ProjectID,
|
||||||
|
ProjectGrantMemberGrantID.identifier(): q.GrantID,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *Queries) ProjectGrantMembers(ctx context.Context, queries *ProjectGrantMembersQuery) (*Members, error) {
|
||||||
|
query, scan := prepareProjectGrantMembersQuery()
|
||||||
|
stmt, args, err := queries.toQuery(query).ToSql()
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInvalidArgument(err, "QUERY-USNwM", "Errors.Query.InvalidRequest")
|
||||||
|
}
|
||||||
|
|
||||||
|
currentSequence, err := q.latestSequence(ctx, projectGrantMemberTable)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rows, err := q.client.QueryContext(ctx, stmt, args...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-Pdg1I", "Errors.Internal")
|
||||||
|
}
|
||||||
|
members, err := scan(rows)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
members.LatestSequence = currentSequence
|
||||||
|
return members, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func prepareProjectGrantMembersQuery() (sq.SelectBuilder, func(*sql.Rows) (*Members, error)) {
|
||||||
|
return sq.Select(
|
||||||
|
ProjectGrantMemberCreationDate.identifier(),
|
||||||
|
ProjectGrantMemberChangeDate.identifier(),
|
||||||
|
ProjectGrantMemberSequence.identifier(),
|
||||||
|
ProjectGrantMemberResourceOwner.identifier(),
|
||||||
|
ProjectGrantMemberUserID.identifier(),
|
||||||
|
ProjectGrantMemberRoles.identifier(),
|
||||||
|
LoginNameNameCol.identifier(),
|
||||||
|
HumanEmailCol.identifier(),
|
||||||
|
HumanFirstNameCol.identifier(),
|
||||||
|
HumanLastNameCol.identifier(),
|
||||||
|
HumanDisplayNameCol.identifier(),
|
||||||
|
MachineNameCol.identifier(),
|
||||||
|
HumanAvaterURLCol.identifier(),
|
||||||
|
countColumn.identifier(),
|
||||||
|
).From(projectGrantMemberTable.identifier()).
|
||||||
|
LeftJoin(join(HumanUserIDCol, ProjectGrantMemberUserID)).
|
||||||
|
LeftJoin(join(MachineUserIDCol, ProjectGrantMemberUserID)).
|
||||||
|
LeftJoin(join(LoginNameUserIDCol, ProjectGrantMemberUserID)).
|
||||||
|
Where(
|
||||||
|
sq.Eq{LoginNameIsPrimaryCol.identifier(): true},
|
||||||
|
).PlaceholderFormat(sq.Dollar),
|
||||||
|
func(rows *sql.Rows) (*Members, error) {
|
||||||
|
members := make([]*Member, 0)
|
||||||
|
var count uint64
|
||||||
|
|
||||||
|
for rows.Next() {
|
||||||
|
member := new(Member)
|
||||||
|
roles := pq.StringArray{}
|
||||||
|
|
||||||
|
var (
|
||||||
|
preferredLoginName = sql.NullString{}
|
||||||
|
email = sql.NullString{}
|
||||||
|
firstName = sql.NullString{}
|
||||||
|
lastName = sql.NullString{}
|
||||||
|
displayName = sql.NullString{}
|
||||||
|
machineName = sql.NullString{}
|
||||||
|
avatarURL = sql.NullString{}
|
||||||
|
)
|
||||||
|
|
||||||
|
err := rows.Scan(
|
||||||
|
&member.CreationDate,
|
||||||
|
&member.ChangeDate,
|
||||||
|
&member.Sequence,
|
||||||
|
&member.ResourceOwner,
|
||||||
|
&member.UserID,
|
||||||
|
&roles,
|
||||||
|
&preferredLoginName,
|
||||||
|
&email,
|
||||||
|
&firstName,
|
||||||
|
&lastName,
|
||||||
|
&displayName,
|
||||||
|
&machineName,
|
||||||
|
&avatarURL,
|
||||||
|
|
||||||
|
&count,
|
||||||
|
)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
member.Roles = roles
|
||||||
|
member.PreferredLoginName = preferredLoginName.String
|
||||||
|
member.Email = email.String
|
||||||
|
member.FirstName = firstName.String
|
||||||
|
member.LastName = lastName.String
|
||||||
|
member.AvatarURL = avatarURL.String
|
||||||
|
if displayName.Valid {
|
||||||
|
member.DisplayName = displayName.String
|
||||||
|
} else {
|
||||||
|
member.DisplayName = machineName.String
|
||||||
|
}
|
||||||
|
|
||||||
|
members = append(members, member)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := rows.Close(); err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-EqJFc", "Errors.Query.CloseRows")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &Members{
|
||||||
|
Members: members,
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: count,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
277
internal/query/project_grant_member_test.go
Normal file
277
internal/query/project_grant_member_test.go
Normal file
@ -0,0 +1,277 @@
|
|||||||
|
package query
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"database/sql/driver"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"regexp"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
projectGrantMembersQuery = regexp.QuoteMeta("SELECT" +
|
||||||
|
" members.creation_date" +
|
||||||
|
", members.change_date" +
|
||||||
|
", members.sequence" +
|
||||||
|
", members.resource_owner" +
|
||||||
|
", members.user_id" +
|
||||||
|
", members.roles" +
|
||||||
|
", zitadel.projections.login_names.login_name" +
|
||||||
|
", zitadel.projections.users_humans.email" +
|
||||||
|
", zitadel.projections.users_humans.first_name" +
|
||||||
|
", zitadel.projections.users_humans.last_name" +
|
||||||
|
", zitadel.projections.users_humans.display_name" +
|
||||||
|
", zitadel.projections.users_machines.name" +
|
||||||
|
", zitadel.projections.users_humans.avater_key" +
|
||||||
|
", COUNT(*) OVER () " +
|
||||||
|
"FROM zitadel.projections.project_grant_members as members " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_humans " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_humans.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_machines " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_machines.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.login_names " +
|
||||||
|
"ON members.user_id = zitadel.projections.login_names.user_id " +
|
||||||
|
"WHERE zitadel.projections.login_names.is_primary = $1")
|
||||||
|
projectGrantMembersColumns = []string{
|
||||||
|
"creation_date",
|
||||||
|
"change_date",
|
||||||
|
"sequence",
|
||||||
|
"resource_owner",
|
||||||
|
"user_id",
|
||||||
|
"roles",
|
||||||
|
"login_name",
|
||||||
|
"email",
|
||||||
|
"first_name",
|
||||||
|
"last_name",
|
||||||
|
"display_name",
|
||||||
|
"name",
|
||||||
|
"avater_key",
|
||||||
|
"count",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func Test_ProjectGrantMemberPrepares(t *testing.T) {
|
||||||
|
type want struct {
|
||||||
|
sqlExpectations sqlExpectation
|
||||||
|
err checkErr
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
prepare interface{}
|
||||||
|
want want
|
||||||
|
object interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "prepareProjectGrantMembersQuery no result",
|
||||||
|
prepare: prepareProjectGrantMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectGrantMembersQuery,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
Members: []*Member{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectGrantMembersQuery human found",
|
||||||
|
prepare: prepareProjectGrantMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectGrantMembersQuery,
|
||||||
|
projectGrantMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectGrantMembersQuery machine found",
|
||||||
|
prepare: prepareProjectGrantMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectGrantMembersQuery,
|
||||||
|
projectGrantMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectGrantMembersQuery multiple users",
|
||||||
|
prepare: prepareProjectGrantMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectGrantMembersQuery,
|
||||||
|
projectGrantMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-1",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-2",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 2,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-1",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-2",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectGrantMembersQuery sql err",
|
||||||
|
prepare: prepareProjectGrantMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueryErr(
|
||||||
|
projectGrantMembersQuery,
|
||||||
|
sql.ErrConnDone,
|
||||||
|
),
|
||||||
|
err: func(err error) (error, bool) {
|
||||||
|
if !errors.Is(err, sql.ErrConnDone) {
|
||||||
|
return fmt.Errorf("err should be sql.ErrConnDone got: %w", err), false
|
||||||
|
}
|
||||||
|
return nil, true
|
||||||
|
},
|
||||||
|
},
|
||||||
|
object: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
@ -1,6 +1,14 @@
|
|||||||
package query
|
package query
|
||||||
|
|
||||||
import "github.com/caos/zitadel/internal/query/projection"
|
import (
|
||||||
|
"context"
|
||||||
|
"database/sql"
|
||||||
|
|
||||||
|
sq "github.com/Masterminds/squirrel"
|
||||||
|
"github.com/caos/zitadel/internal/errors"
|
||||||
|
"github.com/caos/zitadel/internal/query/projection"
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
projectMemberTable = table{
|
projectMemberTable = table{
|
||||||
@ -36,3 +44,129 @@ var (
|
|||||||
table: projectMemberTable,
|
table: projectMemberTable,
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type ProjectMembersQuery struct {
|
||||||
|
MembersQuery
|
||||||
|
ProjectID string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *ProjectMembersQuery) toQuery(query sq.SelectBuilder) sq.SelectBuilder {
|
||||||
|
return q.MembersQuery.
|
||||||
|
toQuery(query).
|
||||||
|
Where(sq.Eq{ProjectMemberProjectID.identifier(): q.ProjectID})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (q *Queries) ProjectMembers(ctx context.Context, queries *ProjectMembersQuery) (*Members, error) {
|
||||||
|
query, scan := prepareProjectMembersQuery()
|
||||||
|
stmt, args, err := queries.toQuery(query).ToSql()
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInvalidArgument(err, "QUERY-T8CuT", "Errors.Query.InvalidRequest")
|
||||||
|
}
|
||||||
|
|
||||||
|
currentSequence, err := q.latestSequence(ctx, projectMemberTable)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rows, err := q.client.QueryContext(ctx, stmt, args...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-uh6pj", "Errors.Internal")
|
||||||
|
}
|
||||||
|
members, err := scan(rows)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
members.LatestSequence = currentSequence
|
||||||
|
return members, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func prepareProjectMembersQuery() (sq.SelectBuilder, func(*sql.Rows) (*Members, error)) {
|
||||||
|
return sq.Select(
|
||||||
|
ProjectMemberCreationDate.identifier(),
|
||||||
|
ProjectMemberChangeDate.identifier(),
|
||||||
|
ProjectMemberSequence.identifier(),
|
||||||
|
ProjectMemberResourceOwner.identifier(),
|
||||||
|
ProjectMemberUserID.identifier(),
|
||||||
|
ProjectMemberRoles.identifier(),
|
||||||
|
LoginNameNameCol.identifier(),
|
||||||
|
HumanEmailCol.identifier(),
|
||||||
|
HumanFirstNameCol.identifier(),
|
||||||
|
HumanLastNameCol.identifier(),
|
||||||
|
HumanDisplayNameCol.identifier(),
|
||||||
|
MachineNameCol.identifier(),
|
||||||
|
HumanAvaterURLCol.identifier(),
|
||||||
|
countColumn.identifier(),
|
||||||
|
).From(projectMemberTable.identifier()).
|
||||||
|
LeftJoin(join(HumanUserIDCol, ProjectMemberUserID)).
|
||||||
|
LeftJoin(join(MachineUserIDCol, ProjectMemberUserID)).
|
||||||
|
LeftJoin(join(LoginNameUserIDCol, ProjectMemberUserID)).
|
||||||
|
Where(
|
||||||
|
sq.Eq{LoginNameIsPrimaryCol.identifier(): true},
|
||||||
|
).PlaceholderFormat(sq.Dollar),
|
||||||
|
func(rows *sql.Rows) (*Members, error) {
|
||||||
|
members := make([]*Member, 0)
|
||||||
|
var count uint64
|
||||||
|
|
||||||
|
for rows.Next() {
|
||||||
|
member := new(Member)
|
||||||
|
roles := pq.StringArray{}
|
||||||
|
|
||||||
|
var (
|
||||||
|
preferredLoginName = sql.NullString{}
|
||||||
|
email = sql.NullString{}
|
||||||
|
firstName = sql.NullString{}
|
||||||
|
lastName = sql.NullString{}
|
||||||
|
displayName = sql.NullString{}
|
||||||
|
machineName = sql.NullString{}
|
||||||
|
avatarURL = sql.NullString{}
|
||||||
|
)
|
||||||
|
|
||||||
|
err := rows.Scan(
|
||||||
|
&member.CreationDate,
|
||||||
|
&member.ChangeDate,
|
||||||
|
&member.Sequence,
|
||||||
|
&member.ResourceOwner,
|
||||||
|
&member.UserID,
|
||||||
|
&roles,
|
||||||
|
&preferredLoginName,
|
||||||
|
&email,
|
||||||
|
&firstName,
|
||||||
|
&lastName,
|
||||||
|
&displayName,
|
||||||
|
&machineName,
|
||||||
|
&avatarURL,
|
||||||
|
|
||||||
|
&count,
|
||||||
|
)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
member.Roles = roles
|
||||||
|
member.PreferredLoginName = preferredLoginName.String
|
||||||
|
member.Email = email.String
|
||||||
|
member.FirstName = firstName.String
|
||||||
|
member.LastName = lastName.String
|
||||||
|
member.AvatarURL = avatarURL.String
|
||||||
|
if displayName.Valid {
|
||||||
|
member.DisplayName = displayName.String
|
||||||
|
} else {
|
||||||
|
member.DisplayName = machineName.String
|
||||||
|
}
|
||||||
|
|
||||||
|
members = append(members, member)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := rows.Close(); err != nil {
|
||||||
|
return nil, errors.ThrowInternal(err, "QUERY-ZJ1Ii", "Errors.Query.CloseRows")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &Members{
|
||||||
|
Members: members,
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: count,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
277
internal/query/project_member_test.go
Normal file
277
internal/query/project_member_test.go
Normal file
@ -0,0 +1,277 @@
|
|||||||
|
package query
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"database/sql/driver"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"regexp"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/lib/pq"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
projectMembersQuery = regexp.QuoteMeta("SELECT" +
|
||||||
|
" members.creation_date" +
|
||||||
|
", members.change_date" +
|
||||||
|
", members.sequence" +
|
||||||
|
", members.resource_owner" +
|
||||||
|
", members.user_id" +
|
||||||
|
", members.roles" +
|
||||||
|
", zitadel.projections.login_names.login_name" +
|
||||||
|
", zitadel.projections.users_humans.email" +
|
||||||
|
", zitadel.projections.users_humans.first_name" +
|
||||||
|
", zitadel.projections.users_humans.last_name" +
|
||||||
|
", zitadel.projections.users_humans.display_name" +
|
||||||
|
", zitadel.projections.users_machines.name" +
|
||||||
|
", zitadel.projections.users_humans.avater_key" +
|
||||||
|
", COUNT(*) OVER () " +
|
||||||
|
"FROM zitadel.projections.project_members as members " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_humans " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_humans.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.users_machines " +
|
||||||
|
"ON members.user_id = zitadel.projections.users_machines.user_id " +
|
||||||
|
"LEFT JOIN zitadel.projections.login_names " +
|
||||||
|
"ON members.user_id = zitadel.projections.login_names.user_id " +
|
||||||
|
"WHERE zitadel.projections.login_names.is_primary = $1")
|
||||||
|
projectMembersColumns = []string{
|
||||||
|
"creation_date",
|
||||||
|
"change_date",
|
||||||
|
"sequence",
|
||||||
|
"resource_owner",
|
||||||
|
"user_id",
|
||||||
|
"roles",
|
||||||
|
"login_name",
|
||||||
|
"email",
|
||||||
|
"first_name",
|
||||||
|
"last_name",
|
||||||
|
"display_name",
|
||||||
|
"name",
|
||||||
|
"avater_key",
|
||||||
|
"count",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func Test_ProjectMemberPrepares(t *testing.T) {
|
||||||
|
type want struct {
|
||||||
|
sqlExpectations sqlExpectation
|
||||||
|
err checkErr
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
prepare interface{}
|
||||||
|
want want
|
||||||
|
object interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "prepareProjectMembersQuery no result",
|
||||||
|
prepare: prepareProjectMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectMembersQuery,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
Members: []*Member{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectMembersQuery human found",
|
||||||
|
prepare: prepareProjectMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectMembersQuery,
|
||||||
|
projectMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectMembersQuery machine found",
|
||||||
|
prepare: prepareProjectMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectMembersQuery,
|
||||||
|
projectMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 1,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectMembersQuery multiple users",
|
||||||
|
prepare: prepareProjectMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueries(
|
||||||
|
projectMembersQuery,
|
||||||
|
projectMembersColumns,
|
||||||
|
[][]driver.Value{
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-1",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"gigi@caos-ag.zitadel.ch",
|
||||||
|
"gigi@caos.ch",
|
||||||
|
"first-name",
|
||||||
|
"last-name",
|
||||||
|
"display name",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
testNow,
|
||||||
|
testNow,
|
||||||
|
uint64(20211206),
|
||||||
|
"ro",
|
||||||
|
"user-id-2",
|
||||||
|
pq.StringArray{"role-1", "role-2"},
|
||||||
|
"machine@caos-ag.zitadel.ch",
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
nil,
|
||||||
|
"machine-name",
|
||||||
|
nil,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
|
},
|
||||||
|
object: &Members{
|
||||||
|
SearchResponse: SearchResponse{
|
||||||
|
Count: 2,
|
||||||
|
},
|
||||||
|
Members: []*Member{
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-1",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "gigi@caos-ag.zitadel.ch",
|
||||||
|
Email: "gigi@caos.ch",
|
||||||
|
FirstName: "first-name",
|
||||||
|
LastName: "last-name",
|
||||||
|
DisplayName: "display name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
CreationDate: testNow,
|
||||||
|
ChangeDate: testNow,
|
||||||
|
Sequence: 20211206,
|
||||||
|
ResourceOwner: "ro",
|
||||||
|
UserID: "user-id-2",
|
||||||
|
Roles: []string{"role-1", "role-2"},
|
||||||
|
PreferredLoginName: "machine@caos-ag.zitadel.ch",
|
||||||
|
Email: "",
|
||||||
|
FirstName: "",
|
||||||
|
LastName: "",
|
||||||
|
DisplayName: "machine-name",
|
||||||
|
AvatarURL: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "prepareProjectMembersQuery sql err",
|
||||||
|
prepare: prepareProjectMembersQuery,
|
||||||
|
want: want{
|
||||||
|
sqlExpectations: mockQueryErr(
|
||||||
|
projectMembersQuery,
|
||||||
|
sql.ErrConnDone,
|
||||||
|
),
|
||||||
|
err: func(err error) (error, bool) {
|
||||||
|
if !errors.Is(err, sql.ErrConnDone) {
|
||||||
|
return fmt.Errorf("err should be sql.ErrConnDone got: %w", err), false
|
||||||
|
}
|
||||||
|
return nil, true
|
||||||
|
},
|
||||||
|
},
|
||||||
|
object: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
assertPrepare(t, tt.prepare, tt.object, tt.want.sqlExpectations, tt.want.err)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
@ -10,6 +10,7 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
||||||
"github.com/caos/zitadel/internal/repository/iam"
|
"github.com/caos/zitadel/internal/repository/iam"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
)
|
)
|
||||||
|
|
||||||
type IAMMemberProjection struct {
|
type IAMMemberProjection struct {
|
||||||
@ -51,6 +52,15 @@ func (p *IAMMemberProjection) reducers() []handler.AggregateReducer {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Aggregate: user.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: user.UserRemovedType,
|
||||||
|
Reduce: p.reduceUserRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -75,7 +85,7 @@ func (p *IAMMemberProjection) reduceChanged(event eventstore.EventReader) (*hand
|
|||||||
logging.LogWithFields("HANDL-QsjwO", "seq", event.Sequence(), "expected", iam.MemberChangedEventType).Error("wrong event type")
|
logging.LogWithFields("HANDL-QsjwO", "seq", event.Sequence(), "expected", iam.MemberChangedEventType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-5WQcZ", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-5WQcZ", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
return reduceMemberChanged(e.MemberChangedEvent, withMemberCond(IAMMemberIAMIDCol, e.Aggregate().ID))
|
return reduceMemberChanged(e.MemberChangedEvent)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *IAMMemberProjection) reduceCascadeRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
func (p *IAMMemberProjection) reduceCascadeRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
@ -84,7 +94,7 @@ func (p *IAMMemberProjection) reduceCascadeRemoved(event eventstore.EventReader)
|
|||||||
logging.LogWithFields("HANDL-mOncs", "seq", event.Sequence(), "expected", iam.MemberCascadeRemovedEventType).Error("wrong event type")
|
logging.LogWithFields("HANDL-mOncs", "seq", event.Sequence(), "expected", iam.MemberCascadeRemovedEventType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-Dmdf2", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-Dmdf2", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
return reduceMemberCascadeRemoved(e.MemberCascadeRemovedEvent, withMemberCond(IAMMemberIAMIDCol, e.Aggregate().ID))
|
return reduceMemberCascadeRemoved(e.MemberCascadeRemovedEvent)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *IAMMemberProjection) reduceRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
func (p *IAMMemberProjection) reduceRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
@ -93,5 +103,14 @@ func (p *IAMMemberProjection) reduceRemoved(event eventstore.EventReader) (*hand
|
|||||||
logging.LogWithFields("HANDL-lW1Zv", "seq", event.Sequence(), "expected", iam.MemberRemovedEventType).Error("wrong event type")
|
logging.LogWithFields("HANDL-lW1Zv", "seq", event.Sequence(), "expected", iam.MemberRemovedEventType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-exVqy", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-exVqy", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
return reduceMemberRemoved(e.MemberRemovedEvent, withMemberCond(IAMMemberIAMIDCol, e.Aggregate().ID))
|
return reduceMemberRemoved(e, withMemberCond(MemberUserIDCol, e.UserID))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *IAMMemberProjection) reduceUserRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*user.UserRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-rBuvT", "seq", event.Sequence(), "expected", user.UserRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-mkDHF", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(MemberUserIDCol, e.Aggregate().ID))
|
||||||
}
|
}
|
||||||
|
@ -8,6 +8,7 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/repository"
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
||||||
"github.com/caos/zitadel/internal/repository/iam"
|
"github.com/caos/zitadel/internal/repository/iam"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
"github.com/lib/pq"
|
"github.com/lib/pq"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -78,13 +79,12 @@ func TestIAMMemberProjection_reduces(t *testing.T) {
|
|||||||
executer: &testExecuter{
|
executer: &testExecuter{
|
||||||
executions: []execution{
|
executions: []execution{
|
||||||
{
|
{
|
||||||
expectedStmt: "UPDATE zitadel.projections.iam_members SET (roles, change_date, sequence) = ($1, $2, $3) WHERE (user_id = $4) AND (iam_id = $5)",
|
expectedStmt: "UPDATE zitadel.projections.iam_members SET (roles, change_date, sequence) = ($1, $2, $3) WHERE (user_id = $4)",
|
||||||
expectedArgs: []interface{}{
|
expectedArgs: []interface{}{
|
||||||
pq.StringArray{"role", "changed"},
|
pq.StringArray{"role", "changed"},
|
||||||
anyArg{},
|
anyArg{},
|
||||||
uint64(15),
|
uint64(15),
|
||||||
"user-id",
|
"user-id",
|
||||||
"agg-id",
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -111,10 +111,9 @@ func TestIAMMemberProjection_reduces(t *testing.T) {
|
|||||||
executer: &testExecuter{
|
executer: &testExecuter{
|
||||||
executions: []execution{
|
executions: []execution{
|
||||||
{
|
{
|
||||||
expectedStmt: "DELETE FROM zitadel.projections.iam_members WHERE (user_id = $1) AND (iam_id = $2)",
|
expectedStmt: "DELETE FROM zitadel.projections.iam_members WHERE (user_id = $1)",
|
||||||
expectedArgs: []interface{}{
|
expectedArgs: []interface{}{
|
||||||
"user-id",
|
"user-id",
|
||||||
"agg-id",
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -141,9 +140,35 @@ func TestIAMMemberProjection_reduces(t *testing.T) {
|
|||||||
executer: &testExecuter{
|
executer: &testExecuter{
|
||||||
executions: []execution{
|
executions: []execution{
|
||||||
{
|
{
|
||||||
expectedStmt: "DELETE FROM zitadel.projections.iam_members WHERE (user_id = $1) AND (iam_id = $2)",
|
expectedStmt: "DELETE FROM zitadel.projections.iam_members WHERE (user_id = $1)",
|
||||||
expectedArgs: []interface{}{
|
expectedArgs: []interface{}{
|
||||||
"user-id",
|
"user-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "user.UserRemoved",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(user.UserRemovedType),
|
||||||
|
user.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), user.UserRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IAMMemberProjection{}).reduceUserRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: user.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IAMMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.iam_members WHERE (user_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
"agg-id",
|
"agg-id",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -47,6 +47,14 @@ func (p *IDPLoginPolicyLinkProjection) reducers() []handler.AggregateReducer {
|
|||||||
Event: org.LoginPolicyIDPProviderRemovedEventType,
|
Event: org.LoginPolicyIDPProviderRemovedEventType,
|
||||||
Reduce: p.reduceRemoved,
|
Reduce: p.reduceRemoved,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Event: org.OrgRemovedEventType,
|
||||||
|
Reduce: p.reduceOrgRemoved,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Event: org.IDPConfigRemovedEventType,
|
||||||
|
Reduce: p.reduceIDPConfigRemoved,
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -64,6 +72,10 @@ func (p *IDPLoginPolicyLinkProjection) reducers() []handler.AggregateReducer {
|
|||||||
Event: iam.LoginPolicyIDPProviderRemovedEventType,
|
Event: iam.LoginPolicyIDPProviderRemovedEventType,
|
||||||
Reduce: p.reduceRemoved,
|
Reduce: p.reduceRemoved,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Event: iam.IDPConfigRemovedEventType,
|
||||||
|
Reduce: p.reduceIDPConfigRemoved,
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@ -96,6 +108,7 @@ func (p *IDPLoginPolicyLinkProjection) reduceAdded(event eventstore.EventReader)
|
|||||||
logging.LogWithFields("HANDL-oce92", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderAddedEventType, iam.LoginPolicyIDPProviderAddedEventType}).Error("wrong event type")
|
logging.LogWithFields("HANDL-oce92", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderAddedEventType, iam.LoginPolicyIDPProviderAddedEventType}).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-Nlp55", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-Nlp55", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
|
|
||||||
return crdb.NewCreateStatement(&idp,
|
return crdb.NewCreateStatement(&idp,
|
||||||
[]handler.Column{
|
[]handler.Column{
|
||||||
handler.NewCol(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
handler.NewCol(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
||||||
@ -111,6 +124,7 @@ func (p *IDPLoginPolicyLinkProjection) reduceAdded(event eventstore.EventReader)
|
|||||||
|
|
||||||
func (p *IDPLoginPolicyLinkProjection) reduceRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
func (p *IDPLoginPolicyLinkProjection) reduceRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
var idp policy.IdentityProviderRemovedEvent
|
var idp policy.IdentityProviderRemovedEvent
|
||||||
|
|
||||||
switch e := event.(type) {
|
switch e := event.(type) {
|
||||||
case *org.IdentityProviderRemovedEvent:
|
case *org.IdentityProviderRemovedEvent:
|
||||||
idp = e.IdentityProviderRemovedEvent
|
idp = e.IdentityProviderRemovedEvent
|
||||||
@ -120,6 +134,7 @@ func (p *IDPLoginPolicyLinkProjection) reduceRemoved(event eventstore.EventReade
|
|||||||
logging.LogWithFields("HANDL-vAH3I", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderRemovedEventType, iam.LoginPolicyIDPProviderRemovedEventType}).Error("wrong event type")
|
logging.LogWithFields("HANDL-vAH3I", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderRemovedEventType, iam.LoginPolicyIDPProviderRemovedEventType}).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-tUMYY", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-tUMYY", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
|
|
||||||
return crdb.NewDeleteStatement(&idp,
|
return crdb.NewDeleteStatement(&idp,
|
||||||
[]handler.Condition{
|
[]handler.Condition{
|
||||||
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
||||||
@ -130,6 +145,7 @@ func (p *IDPLoginPolicyLinkProjection) reduceRemoved(event eventstore.EventReade
|
|||||||
|
|
||||||
func (p *IDPLoginPolicyLinkProjection) reduceCascadeRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
func (p *IDPLoginPolicyLinkProjection) reduceCascadeRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
var idp policy.IdentityProviderCascadeRemovedEvent
|
var idp policy.IdentityProviderCascadeRemovedEvent
|
||||||
|
|
||||||
switch e := event.(type) {
|
switch e := event.(type) {
|
||||||
case *org.IdentityProviderCascadeRemovedEvent:
|
case *org.IdentityProviderCascadeRemovedEvent:
|
||||||
idp = e.IdentityProviderCascadeRemovedEvent
|
idp = e.IdentityProviderCascadeRemovedEvent
|
||||||
@ -139,6 +155,7 @@ func (p *IDPLoginPolicyLinkProjection) reduceCascadeRemoved(event eventstore.Eve
|
|||||||
logging.LogWithFields("HANDL-7lZaf", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderCascadeRemovedEventType, iam.LoginPolicyIDPProviderCascadeRemovedEventType}).Error("wrong event type")
|
logging.LogWithFields("HANDL-7lZaf", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderCascadeRemovedEventType, iam.LoginPolicyIDPProviderCascadeRemovedEventType}).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-iCKSj", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-iCKSj", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
|
|
||||||
return crdb.NewDeleteStatement(&idp,
|
return crdb.NewDeleteStatement(&idp,
|
||||||
[]handler.Condition{
|
[]handler.Condition{
|
||||||
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
||||||
@ -146,3 +163,37 @@ func (p *IDPLoginPolicyLinkProjection) reduceCascadeRemoved(event eventstore.Eve
|
|||||||
},
|
},
|
||||||
), nil
|
), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (p *IDPLoginPolicyLinkProjection) reduceIDPConfigRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
var idpID string
|
||||||
|
|
||||||
|
switch e := event.(type) {
|
||||||
|
case *org.IDPConfigRemovedEvent:
|
||||||
|
idpID = e.ConfigID
|
||||||
|
case *iam.IDPConfigRemovedEvent:
|
||||||
|
idpID = e.ConfigID
|
||||||
|
default:
|
||||||
|
logging.LogWithFields("HANDL-aJvob", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.IDPConfigRemovedEventType, iam.IDPConfigRemovedEventType}).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-u6tze", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return crdb.NewDeleteStatement(event,
|
||||||
|
[]handler.Condition{
|
||||||
|
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idpID),
|
||||||
|
handler.NewCond(IDPLoginPolicyLinkResourceOwnerCol, event.Aggregate().ResourceOwner),
|
||||||
|
},
|
||||||
|
), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *IDPLoginPolicyLinkProjection) reduceOrgRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*org.OrgRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-WTYC1", "seq", event.Sequence(), "expectedType", org.OrgRemovedEventType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-QSoSe", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return crdb.NewDeleteStatement(e,
|
||||||
|
[]handler.Condition{
|
||||||
|
handler.NewCond(IDPLoginPolicyLinkResourceOwnerCol, e.Aggregate().ID),
|
||||||
|
},
|
||||||
|
), nil
|
||||||
|
}
|
||||||
|
@ -218,6 +218,93 @@ func TestIDPLoginPolicyLinkProjection_reduces(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "reduceOrgRemoved",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(org.OrgRemovedEventType),
|
||||||
|
org.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), org.OrgRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceOrgRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: org.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IDPLoginPolicyLinkTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (resource_owner = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "org.IDPConfigRemovedEvent",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(org.IDPConfigRemovedEventType),
|
||||||
|
org.AggregateType,
|
||||||
|
[]byte(`{
|
||||||
|
"idpConfigId": "idp-config-id"
|
||||||
|
}`),
|
||||||
|
), org.IDPConfigRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceIDPConfigRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: org.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IDPLoginPolicyLinkTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (resource_owner = $2)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"idp-config-id",
|
||||||
|
"ro-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "iam.IDPConfigRemovedEvent",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(iam.IDPConfigRemovedEventType),
|
||||||
|
iam.AggregateType,
|
||||||
|
[]byte(`{
|
||||||
|
"idpConfigId": "idp-config-id"
|
||||||
|
}`),
|
||||||
|
), iam.IDPConfigRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IDPLoginPolicyLinkProjection{}).reduceIDPConfigRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: iam.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IDPLoginPolicyLinkTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.idp_login_policy_links WHERE (idp_id = $1) AND (resource_owner = $2)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"idp-config-id",
|
||||||
|
"ro-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
@ -8,6 +8,8 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore"
|
"github.com/caos/zitadel/internal/eventstore"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
||||||
|
"github.com/caos/zitadel/internal/repository/iam"
|
||||||
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
"github.com/caos/zitadel/internal/repository/user"
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -40,6 +42,32 @@ func (p *IDPUserLinkProjection) reducers() []handler.AggregateReducer {
|
|||||||
Event: user.UserIDPLinkRemovedType,
|
Event: user.UserIDPLinkRemovedType,
|
||||||
Reduce: p.reduceRemoved,
|
Reduce: p.reduceRemoved,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Event: user.UserRemovedType,
|
||||||
|
Reduce: p.reduceUserRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: org.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: org.IDPConfigRemovedEventType,
|
||||||
|
Reduce: p.reduceIDPConfigRemoved,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Event: org.OrgRemovedEventType,
|
||||||
|
Reduce: p.reduceOrgRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: iam.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: iam.IDPConfigRemovedEventType,
|
||||||
|
Reduce: p.reduceIDPConfigRemoved,
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@ -63,6 +91,7 @@ func (p *IDPUserLinkProjection) reduceAdded(event eventstore.EventReader) (*hand
|
|||||||
logging.LogWithFields("HANDL-v2qC3", "seq", event.Sequence(), "expectedType", user.UserIDPLinkAddedType).Error("wrong event type")
|
logging.LogWithFields("HANDL-v2qC3", "seq", event.Sequence(), "expectedType", user.UserIDPLinkAddedType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-DpmXq", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-DpmXq", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
|
|
||||||
return crdb.NewCreateStatement(e,
|
return crdb.NewCreateStatement(e,
|
||||||
[]handler.Column{
|
[]handler.Column{
|
||||||
handler.NewCol(IDPUserLinkIDPIDCol, e.IDPConfigID),
|
handler.NewCol(IDPUserLinkIDPIDCol, e.IDPConfigID),
|
||||||
@ -83,6 +112,7 @@ func (p *IDPUserLinkProjection) reduceRemoved(event eventstore.EventReader) (*ha
|
|||||||
logging.LogWithFields("HANDL-zX5m9", "seq", event.Sequence(), "expectedType", user.UserIDPLinkRemovedType).Error("wrong event type")
|
logging.LogWithFields("HANDL-zX5m9", "seq", event.Sequence(), "expectedType", user.UserIDPLinkRemovedType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-AZmfJ", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-AZmfJ", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
|
|
||||||
return crdb.NewDeleteStatement(e,
|
return crdb.NewDeleteStatement(e,
|
||||||
[]handler.Condition{
|
[]handler.Condition{
|
||||||
handler.NewCond(IDPUserLinkIDPIDCol, e.IDPConfigID),
|
handler.NewCond(IDPUserLinkIDPIDCol, e.IDPConfigID),
|
||||||
@ -98,6 +128,7 @@ func (p *IDPUserLinkProjection) reduceCascadeRemoved(event eventstore.EventReade
|
|||||||
logging.LogWithFields("HANDL-I0s2H", "seq", event.Sequence(), "expectedType", user.UserIDPLinkCascadeRemovedType).Error("wrong event type")
|
logging.LogWithFields("HANDL-I0s2H", "seq", event.Sequence(), "expectedType", user.UserIDPLinkCascadeRemovedType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-jQpv9", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-jQpv9", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
|
|
||||||
return crdb.NewDeleteStatement(e,
|
return crdb.NewDeleteStatement(e,
|
||||||
[]handler.Condition{
|
[]handler.Condition{
|
||||||
handler.NewCond(IDPUserLinkIDPIDCol, e.IDPConfigID),
|
handler.NewCond(IDPUserLinkIDPIDCol, e.IDPConfigID),
|
||||||
@ -106,3 +137,52 @@ func (p *IDPUserLinkProjection) reduceCascadeRemoved(event eventstore.EventReade
|
|||||||
},
|
},
|
||||||
), nil
|
), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (p *IDPUserLinkProjection) reduceOrgRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*org.OrgRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-zX5m9", "seq", event.Sequence(), "expectedType", org.OrgRemovedEventType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-AZmfJ", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return crdb.NewDeleteStatement(e,
|
||||||
|
[]handler.Condition{
|
||||||
|
handler.NewCond(IDPUserLinkResourceOwnerCol, e.Aggregate().ID),
|
||||||
|
},
|
||||||
|
), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *IDPUserLinkProjection) reduceUserRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*user.UserRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-yM6u6", "seq", event.Sequence(), "expectedType", user.UserRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-uwlWE", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return crdb.NewDeleteStatement(e,
|
||||||
|
[]handler.Condition{
|
||||||
|
handler.NewCond(IDPUserLinkUserIDCol, e.Aggregate().ID),
|
||||||
|
},
|
||||||
|
), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *IDPUserLinkProjection) reduceIDPConfigRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
var idpID string
|
||||||
|
|
||||||
|
switch e := event.(type) {
|
||||||
|
case *org.IDPConfigRemovedEvent:
|
||||||
|
idpID = e.ConfigID
|
||||||
|
case *iam.IDPConfigRemovedEvent:
|
||||||
|
idpID = e.ConfigID
|
||||||
|
default:
|
||||||
|
logging.LogWithFields("HANDL-7lZaf", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.IDPConfigRemovedEventType, iam.IDPConfigRemovedEventType}).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-iCKSj", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return crdb.NewDeleteStatement(event,
|
||||||
|
[]handler.Condition{
|
||||||
|
handler.NewCond(IDPUserLinkIDPIDCol, idpID),
|
||||||
|
handler.NewCond(IDPUserLinkResourceOwnerCol, event.Aggregate().ResourceOwner),
|
||||||
|
},
|
||||||
|
), nil
|
||||||
|
}
|
||||||
|
@ -7,6 +7,8 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore"
|
"github.com/caos/zitadel/internal/eventstore"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/repository"
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
||||||
|
"github.com/caos/zitadel/internal/repository/iam"
|
||||||
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
"github.com/caos/zitadel/internal/repository/user"
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -122,6 +124,120 @@ func TestIDPUserLinkProjection_reduces(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "reduceOrgRemoved",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(org.OrgRemovedEventType),
|
||||||
|
org.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), org.OrgRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IDPUserLinkProjection{}).reduceOrgRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: org.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IDPUserLinkTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.idp_user_links WHERE (resource_owner = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "reduceUserRemoved",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(user.UserRemovedType),
|
||||||
|
user.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), user.UserRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IDPUserLinkProjection{}).reduceUserRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: user.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IDPUserLinkTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.idp_user_links WHERE (user_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "org.IDPConfigRemovedEvent",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(org.IDPConfigRemovedEventType),
|
||||||
|
org.AggregateType,
|
||||||
|
[]byte(`{
|
||||||
|
"idpConfigId": "idp-config-id"
|
||||||
|
}`),
|
||||||
|
), org.IDPConfigRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IDPUserLinkProjection{}).reduceIDPConfigRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: org.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IDPUserLinkTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.idp_user_links WHERE (idp_id = $1) AND (resource_owner = $2)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"idp-config-id",
|
||||||
|
"ro-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "iam.IDPConfigRemovedEvent",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(iam.IDPConfigRemovedEventType),
|
||||||
|
iam.AggregateType,
|
||||||
|
[]byte(`{
|
||||||
|
"idpConfigId": "idp-config-id"
|
||||||
|
}`),
|
||||||
|
), iam.IDPConfigRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&IDPUserLinkProjection{}).reduceIDPConfigRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: iam.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: IDPUserLinkTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.idp_user_links WHERE (idp_id = $1) AND (resource_owner = $2)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"idp-config-id",
|
||||||
|
"ro-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
@ -38,6 +38,10 @@ func (p *LoginNameProjection) reducers() []handler.AggregateReducer {
|
|||||||
{
|
{
|
||||||
Aggregate: user.AggregateType,
|
Aggregate: user.AggregateType,
|
||||||
EventRedusers: []handler.EventReducer{
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: user.UserV1AddedType,
|
||||||
|
Reduce: p.reduceUserCreated,
|
||||||
|
},
|
||||||
{
|
{
|
||||||
Event: user.HumanAddedType,
|
Event: user.HumanAddedType,
|
||||||
Reduce: p.reduceUserCreated,
|
Reduce: p.reduceUserCreated,
|
||||||
@ -46,6 +50,10 @@ func (p *LoginNameProjection) reducers() []handler.AggregateReducer {
|
|||||||
Event: user.HumanRegisteredType,
|
Event: user.HumanRegisteredType,
|
||||||
Reduce: p.reduceUserCreated,
|
Reduce: p.reduceUserCreated,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Event: user.UserV1RegisteredType,
|
||||||
|
Reduce: p.reduceUserCreated,
|
||||||
|
},
|
||||||
{
|
{
|
||||||
Event: user.MachineAddedEventType,
|
Event: user.MachineAddedEventType,
|
||||||
Reduce: p.reduceUserCreated,
|
Reduce: p.reduceUserCreated,
|
||||||
@ -113,6 +121,8 @@ func (p *LoginNameProjection) reducers() []handler.AggregateReducer {
|
|||||||
}
|
}
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
LoginNameCol = "login_name"
|
||||||
|
|
||||||
loginNameUserSuffix = "users"
|
loginNameUserSuffix = "users"
|
||||||
LoginNameUserIDCol = "id"
|
LoginNameUserIDCol = "id"
|
||||||
LoginNameUserUserNameCol = "user_name"
|
LoginNameUserUserNameCol = "user_name"
|
||||||
@ -140,7 +150,7 @@ func (p *LoginNameProjection) reduceUserCreated(event eventstore.EventReader) (*
|
|||||||
case *user.MachineAddedEvent:
|
case *user.MachineAddedEvent:
|
||||||
userName = e.UserName
|
userName = e.UserName
|
||||||
default:
|
default:
|
||||||
logging.LogWithFields("HANDL-tDUx3", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{user.HumanAddedType, user.HumanRegisteredType, user.MachineAddedEventType}).Error("wrong event type")
|
logging.LogWithFields("HANDL-tDUx3", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{user.UserV1AddedType, user.HumanAddedType, user.UserV1RegisteredType, user.HumanRegisteredType, user.MachineAddedEventType}).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-ayo69", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-ayo69", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
package projection
|
package projection
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/caos/zitadel/internal/eventstore"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
||||||
"github.com/caos/zitadel/internal/repository/member"
|
"github.com/caos/zitadel/internal/repository/member"
|
||||||
@ -86,14 +87,13 @@ func reduceMemberCascadeRemoved(e member.MemberCascadeRemovedEvent, opts ...redu
|
|||||||
return crdb.NewDeleteStatement(&e, config.conds), nil
|
return crdb.NewDeleteStatement(&e, config.conds), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func reduceMemberRemoved(e member.MemberRemovedEvent, opts ...reduceMemberOpt) (*handler.Statement, error) {
|
func reduceMemberRemoved(e eventstore.EventReader, opts ...reduceMemberOpt) (*handler.Statement, error) {
|
||||||
config := reduceMemberConfig{
|
config := reduceMemberConfig{
|
||||||
conds: []handler.Condition{
|
conds: []handler.Condition{},
|
||||||
handler.NewCond(MemberUserIDCol, e.UserID),
|
}
|
||||||
}}
|
|
||||||
|
|
||||||
for _, opt := range opts {
|
for _, opt := range opts {
|
||||||
config = opt(config)
|
config = opt(config)
|
||||||
}
|
}
|
||||||
return crdb.NewDeleteStatement(&e, config.conds), nil
|
return crdb.NewDeleteStatement(e, config.conds), nil
|
||||||
}
|
}
|
||||||
|
@ -10,6 +10,7 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
||||||
"github.com/caos/zitadel/internal/repository/org"
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
)
|
)
|
||||||
|
|
||||||
type OrgMemberProjection struct {
|
type OrgMemberProjection struct {
|
||||||
@ -51,6 +52,24 @@ func (p *OrgMemberProjection) reducers() []handler.AggregateReducer {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Aggregate: user.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: user.UserRemovedType,
|
||||||
|
Reduce: p.reduceUserRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: org.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: org.OrgRemovedEventType,
|
||||||
|
Reduce: p.reduceOrgRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -93,5 +112,30 @@ func (p *OrgMemberProjection) reduceRemoved(event eventstore.EventReader) (*hand
|
|||||||
logging.LogWithFields("HANDL-KPyxE", "seq", event.Sequence(), "expected", org.MemberRemovedEventType).Error("wrong event type")
|
logging.LogWithFields("HANDL-KPyxE", "seq", event.Sequence(), "expected", org.MemberRemovedEventType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-avatH", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-avatH", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
return reduceMemberRemoved(e.MemberRemovedEvent, withMemberCond(OrgMemberOrgIDCol, e.Aggregate().ID))
|
return reduceMemberRemoved(e,
|
||||||
|
withMemberCond(MemberUserIDCol, e.UserID),
|
||||||
|
withMemberCond(OrgMemberOrgIDCol, e.Aggregate().ID),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *OrgMemberProjection) reduceUserRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*user.UserRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-f5pgn", "seq", event.Sequence(), "expected", user.UserRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-eBMqH", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(MemberUserIDCol, e.Aggregate().ID))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *OrgMemberProjection) reduceOrgRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
//TODO: as soon as org deletion is implemented:
|
||||||
|
// Case: The user has resource owner A and an org has resource owner B
|
||||||
|
// if org B deleted it works
|
||||||
|
// if org A is deleted, the membership wouldn't be deleted
|
||||||
|
e, ok := event.(*org.OrgRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-E5lDs", "seq", event.Sequence(), "expected", org.OrgRemovedEventType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-jnGAV", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(OrgMemberOrgIDCol, e.Aggregate().ID))
|
||||||
}
|
}
|
||||||
|
@ -8,6 +8,7 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/repository"
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
||||||
"github.com/caos/zitadel/internal/repository/org"
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
"github.com/lib/pq"
|
"github.com/lib/pq"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -151,6 +152,60 @@ func TestOrgMemberProjection_reduces(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "user.UserRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(user.UserRemovedType),
|
||||||
|
user.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), user.UserRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&OrgMemberProjection{}).reduceUserRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: user.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: OrgMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.org_members WHERE (user_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "org.OrgRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(org.OrgRemovedEventType),
|
||||||
|
org.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), org.OrgRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&OrgMemberProjection{}).reduceOrgRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: org.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: OrgMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.org_members WHERE (org_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
@ -10,7 +10,9 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
||||||
"github.com/caos/zitadel/internal/repository/member"
|
"github.com/caos/zitadel/internal/repository/member"
|
||||||
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
"github.com/caos/zitadel/internal/repository/project"
|
"github.com/caos/zitadel/internal/repository/project"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
)
|
)
|
||||||
|
|
||||||
type ProjectGrantMemberProjection struct {
|
type ProjectGrantMemberProjection struct {
|
||||||
@ -52,6 +54,42 @@ func (p *ProjectGrantMemberProjection) reducers() []handler.AggregateReducer {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Aggregate: user.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: user.UserRemovedType,
|
||||||
|
Reduce: p.reduceUserRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: org.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: org.OrgRemovedEventType,
|
||||||
|
Reduce: p.reduceOrgRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: project.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: project.ProjectRemovedType,
|
||||||
|
Reduce: p.reduceProjectRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: project.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: project.GrantRemovedType,
|
||||||
|
Reduce: p.reduceProjectGrantRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -107,9 +145,52 @@ func (p *ProjectGrantMemberProjection) reduceRemoved(event eventstore.EventReade
|
|||||||
logging.LogWithFields("HANDL-6Z4dH", "seq", event.Sequence(), "expectedType", project.GrantMemberRemovedType).Error("wrong event type")
|
logging.LogWithFields("HANDL-6Z4dH", "seq", event.Sequence(), "expectedType", project.GrantMemberRemovedType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-MGNnA", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-MGNnA", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
return reduceMemberRemoved(
|
return reduceMemberRemoved(e,
|
||||||
*member.NewRemovedEvent(&e.BaseEvent, e.UserID),
|
withMemberCond(MemberUserIDCol, e.UserID),
|
||||||
withMemberCond(ProjectGrantMemberProjectIDCol, e.Aggregate().ID),
|
withMemberCond(ProjectGrantMemberProjectIDCol, e.Aggregate().ID),
|
||||||
withMemberCond(ProjectGrantMemberGrantIDCol, e.GrantID),
|
withMemberCond(ProjectGrantMemberGrantIDCol, e.GrantID),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (p *ProjectGrantMemberProjection) reduceUserRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*user.UserRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-UVMmT", "seq", event.Sequence(), "expected", user.UserRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-rufJr", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(MemberUserIDCol, e.Aggregate().ID))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ProjectGrantMemberProjection) reduceOrgRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
//TODO: as soon as org deletion is implemented:
|
||||||
|
// Case: The user has resource owner A and project has resource owner B
|
||||||
|
// if org B deleted it works
|
||||||
|
// if org A is deleted, the membership wouldn't be deleted
|
||||||
|
e, ok := event.(*org.OrgRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-Sq9FV", "seq", event.Sequence(), "expected", org.OrgRemovedEventType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-Zzp6o", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(MemberResourceOwner, e.Aggregate().ID))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ProjectGrantMemberProjection) reduceProjectRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*project.ProjectRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-sGmCA", "seq", event.Sequence(), "expected", project.ProjectRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-JLODy", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(ProjectGrantMemberProjectIDCol, e.Aggregate().ID))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ProjectGrantMemberProjection) reduceProjectGrantRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*project.GrantRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-sHabO", "seq", event.Sequence(), "expected", project.GrantRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-D1J9R", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e,
|
||||||
|
withMemberCond(ProjectGrantMemberGrantIDCol, e.GrantID),
|
||||||
|
withMemberCond(ProjectGrantMemberProjectIDCol, e.Aggregate().ID),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
@ -7,7 +7,9 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore"
|
"github.com/caos/zitadel/internal/eventstore"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/repository"
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
||||||
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
"github.com/caos/zitadel/internal/repository/project"
|
"github.com/caos/zitadel/internal/repository/project"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
"github.com/lib/pq"
|
"github.com/lib/pq"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -159,6 +161,115 @@ func TestProjectGrantMemberProjection_reduces(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "user.UserRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(user.UserRemovedType),
|
||||||
|
user.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), user.UserRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&ProjectGrantMemberProjection{}).reduceUserRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: user.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: ProjectGrantMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.project_grant_members WHERE (user_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "org.OrgRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(org.OrgRemovedEventType),
|
||||||
|
org.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), org.OrgRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&ProjectGrantMemberProjection{}).reduceOrgRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: org.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: ProjectGrantMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.project_grant_members WHERE (resource_owner = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "project.ProjectRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(project.ProjectRemovedType),
|
||||||
|
project.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), project.ProjectRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&ProjectGrantMemberProjection{}).reduceProjectRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: project.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: ProjectGrantMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.project_grant_members WHERE (project_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "project.GrantRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(project.GrantRemovedType),
|
||||||
|
project.AggregateType,
|
||||||
|
[]byte(`{"grantId": "grant-id"}`),
|
||||||
|
), project.GrantRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&ProjectGrantMemberProjection{}).reduceProjectGrantRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: project.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: ProjectGrantMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.project_grant_members WHERE (grant_id = $1) AND (project_id = $2)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"grant-id",
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
@ -10,7 +10,9 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
||||||
"github.com/caos/zitadel/internal/repository/member"
|
"github.com/caos/zitadel/internal/repository/member"
|
||||||
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
"github.com/caos/zitadel/internal/repository/project"
|
"github.com/caos/zitadel/internal/repository/project"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
)
|
)
|
||||||
|
|
||||||
type ProjectMemberProjection struct {
|
type ProjectMemberProjection struct {
|
||||||
@ -52,6 +54,33 @@ func (p *ProjectMemberProjection) reducers() []handler.AggregateReducer {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Aggregate: user.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: user.UserRemovedType,
|
||||||
|
Reduce: p.reduceUserRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: org.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: org.OrgRemovedEventType,
|
||||||
|
Reduce: p.reduceOrgRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Aggregate: project.AggregateType,
|
||||||
|
EventRedusers: []handler.EventReducer{
|
||||||
|
{
|
||||||
|
Event: project.ProjectRemovedType,
|
||||||
|
Reduce: p.reduceProjectRemoved,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -103,8 +132,39 @@ func (p *ProjectMemberProjection) reduceRemoved(event eventstore.EventReader) (*
|
|||||||
logging.LogWithFields("HANDL-X0yvM", "seq", event.Sequence(), "expectedType", project.MemberRemovedType).Error("wrong event type")
|
logging.LogWithFields("HANDL-X0yvM", "seq", event.Sequence(), "expectedType", project.MemberRemovedType).Error("wrong event type")
|
||||||
return nil, errors.ThrowInvalidArgument(nil, "HANDL-eJZPh", "reduce.wrong.event.type")
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-eJZPh", "reduce.wrong.event.type")
|
||||||
}
|
}
|
||||||
return reduceMemberRemoved(
|
return reduceMemberRemoved(e,
|
||||||
*member.NewRemovedEvent(&e.BaseEvent, e.UserID),
|
withMemberCond(MemberUserIDCol, e.UserID),
|
||||||
withMemberCond(ProjectMemberProjectIDCol, e.Aggregate().ID),
|
withMemberCond(ProjectMemberProjectIDCol, e.Aggregate().ID),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (p *ProjectMemberProjection) reduceUserRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*user.UserRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-g8eWd", "seq", event.Sequence(), "expected", user.UserRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-aYA60", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(MemberUserIDCol, e.Aggregate().ID))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ProjectMemberProjection) reduceOrgRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
//TODO: as soon as org deletion is implemented:
|
||||||
|
// Case: The user has resource owner A and project has resource owner B
|
||||||
|
// if org B deleted it works
|
||||||
|
// if org A is deleted, the membership wouldn't be deleted
|
||||||
|
e, ok := event.(*org.OrgRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-q7H8D", "seq", event.Sequence(), "expected", org.OrgRemovedEventType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-NGUEL", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(MemberResourceOwner, e.Aggregate().ID))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ProjectMemberProjection) reduceProjectRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
||||||
|
e, ok := event.(*project.ProjectRemovedEvent)
|
||||||
|
if !ok {
|
||||||
|
logging.LogWithFields("HANDL-q7H8D", "seq", event.Sequence(), "expected", project.ProjectRemovedType).Error("wrong event type")
|
||||||
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-NGUEL", "reduce.wrong.event.type")
|
||||||
|
}
|
||||||
|
return reduceMemberRemoved(e, withMemberCond(ProjectMemberProjectIDCol, e.Aggregate().ID))
|
||||||
|
}
|
||||||
|
@ -7,7 +7,9 @@ import (
|
|||||||
"github.com/caos/zitadel/internal/eventstore"
|
"github.com/caos/zitadel/internal/eventstore"
|
||||||
"github.com/caos/zitadel/internal/eventstore/handler"
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
||||||
"github.com/caos/zitadel/internal/eventstore/repository"
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
||||||
|
"github.com/caos/zitadel/internal/repository/org"
|
||||||
"github.com/caos/zitadel/internal/repository/project"
|
"github.com/caos/zitadel/internal/repository/project"
|
||||||
|
"github.com/caos/zitadel/internal/repository/user"
|
||||||
"github.com/lib/pq"
|
"github.com/lib/pq"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -151,6 +153,87 @@ func TestProjectMemberProjection_reduces(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "user.UserRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(user.UserRemovedType),
|
||||||
|
user.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), user.UserRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&ProjectMemberProjection{}).reduceUserRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: user.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: ProjectMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.project_members WHERE (user_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "org.OrgRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(org.OrgRemovedEventType),
|
||||||
|
org.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), org.OrgRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&ProjectMemberProjection{}).reduceOrgRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: org.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: ProjectMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.project_members WHERE (resource_owner = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "project.ProjectRemovedEventType",
|
||||||
|
args: args{
|
||||||
|
event: getEvent(testEvent(
|
||||||
|
repository.EventType(project.ProjectRemovedType),
|
||||||
|
project.AggregateType,
|
||||||
|
[]byte(`{}`),
|
||||||
|
), project.ProjectRemovedEventMapper),
|
||||||
|
},
|
||||||
|
reduce: (&ProjectMemberProjection{}).reduceProjectRemoved,
|
||||||
|
want: wantReduce{
|
||||||
|
aggregateType: project.AggregateType,
|
||||||
|
sequence: 15,
|
||||||
|
previousSequence: 10,
|
||||||
|
projection: ProjectMemberProjectionTable,
|
||||||
|
executer: &testExecuter{
|
||||||
|
executions: []execution{
|
||||||
|
{
|
||||||
|
expectedStmt: "DELETE FROM zitadel.projections.project_members WHERE (project_id = $1)",
|
||||||
|
expectedArgs: []interface{}{
|
||||||
|
"agg-id",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
@ -23,7 +23,6 @@ type Membership struct {
|
|||||||
ChangeDate time.Time
|
ChangeDate time.Time
|
||||||
Sequence uint64
|
Sequence uint64
|
||||||
ResourceOwner string
|
ResourceOwner string
|
||||||
DisplayName string
|
|
||||||
|
|
||||||
Org *OrgMembership
|
Org *OrgMembership
|
||||||
IAM *IAMMembership
|
IAM *IAMMembership
|
||||||
@ -33,18 +32,22 @@ type Membership struct {
|
|||||||
|
|
||||||
type OrgMembership struct {
|
type OrgMembership struct {
|
||||||
OrgID string
|
OrgID string
|
||||||
|
Name string
|
||||||
}
|
}
|
||||||
|
|
||||||
type IAMMembership struct {
|
type IAMMembership struct {
|
||||||
IAMID string
|
IAMID string
|
||||||
|
Name string
|
||||||
}
|
}
|
||||||
|
|
||||||
type ProjectMembership struct {
|
type ProjectMembership struct {
|
||||||
ProjectID string
|
ProjectID string
|
||||||
|
Name string
|
||||||
}
|
}
|
||||||
|
|
||||||
type ProjectGrantMembership struct {
|
type ProjectGrantMembership struct {
|
||||||
ProjectID string
|
ProjectID string
|
||||||
|
ProjectName string
|
||||||
GrantID string
|
GrantID string
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -177,12 +180,12 @@ func prepareMembershipsQuery() (sq.SelectBuilder, func(*sql.Rows) (*Memberships,
|
|||||||
membershipIAMID.identifier(),
|
membershipIAMID.identifier(),
|
||||||
membershipProjectID.identifier(),
|
membershipProjectID.identifier(),
|
||||||
membershipGrantID.identifier(),
|
membershipGrantID.identifier(),
|
||||||
HumanDisplayNameCol.identifier(),
|
ProjectColumnName.identifier(),
|
||||||
MachineNameCol.identifier(),
|
OrgColumnName.identifier(),
|
||||||
countColumn.identifier(),
|
countColumn.identifier(),
|
||||||
).From(membershipFrom).
|
).From(membershipFrom).
|
||||||
LeftJoin(join(HumanUserIDCol, membershipUserID)).
|
LeftJoin(join(ProjectColumnID, membershipProjectID)).
|
||||||
LeftJoin(join(MachineUserIDCol, membershipUserID)).
|
LeftJoin(join(OrgColumnID, membershipOrgID)).
|
||||||
PlaceholderFormat(sq.Dollar),
|
PlaceholderFormat(sq.Dollar),
|
||||||
func(rows *sql.Rows) (*Memberships, error) {
|
func(rows *sql.Rows) (*Memberships, error) {
|
||||||
memberships := make([]*Membership, 0)
|
memberships := make([]*Membership, 0)
|
||||||
@ -196,8 +199,8 @@ func prepareMembershipsQuery() (sq.SelectBuilder, func(*sql.Rows) (*Memberships,
|
|||||||
projectID = sql.NullString{}
|
projectID = sql.NullString{}
|
||||||
grantID = sql.NullString{}
|
grantID = sql.NullString{}
|
||||||
roles = pq.StringArray{}
|
roles = pq.StringArray{}
|
||||||
displayName = sql.NullString{}
|
projectName = sql.NullString{}
|
||||||
machineName = sql.NullString{}
|
orgName = sql.NullString{}
|
||||||
)
|
)
|
||||||
|
|
||||||
err := rows.Scan(
|
err := rows.Scan(
|
||||||
@ -211,8 +214,8 @@ func prepareMembershipsQuery() (sq.SelectBuilder, func(*sql.Rows) (*Memberships,
|
|||||||
&iamID,
|
&iamID,
|
||||||
&projectID,
|
&projectID,
|
||||||
&grantID,
|
&grantID,
|
||||||
&displayName,
|
&projectName,
|
||||||
&machineName,
|
&orgName,
|
||||||
&count,
|
&count,
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -222,28 +225,26 @@ func prepareMembershipsQuery() (sq.SelectBuilder, func(*sql.Rows) (*Memberships,
|
|||||||
|
|
||||||
membership.Roles = roles
|
membership.Roles = roles
|
||||||
|
|
||||||
if displayName.Valid {
|
|
||||||
membership.DisplayName = displayName.String
|
|
||||||
} else if machineName.Valid {
|
|
||||||
membership.DisplayName = machineName.String
|
|
||||||
}
|
|
||||||
|
|
||||||
if orgID.Valid {
|
if orgID.Valid {
|
||||||
membership.Org = &OrgMembership{
|
membership.Org = &OrgMembership{
|
||||||
OrgID: orgID.String,
|
OrgID: orgID.String,
|
||||||
|
Name: orgName.String,
|
||||||
}
|
}
|
||||||
} else if iamID.Valid {
|
} else if iamID.Valid {
|
||||||
membership.IAM = &IAMMembership{
|
membership.IAM = &IAMMembership{
|
||||||
IAMID: iamID.String,
|
IAMID: iamID.String,
|
||||||
|
Name: iamID.String,
|
||||||
}
|
}
|
||||||
} else if projectID.Valid && grantID.Valid {
|
} else if projectID.Valid && grantID.Valid {
|
||||||
membership.ProjectGrant = &ProjectGrantMembership{
|
membership.ProjectGrant = &ProjectGrantMembership{
|
||||||
ProjectID: projectID.String,
|
ProjectID: projectID.String,
|
||||||
|
ProjectName: projectName.String,
|
||||||
GrantID: grantID.String,
|
GrantID: grantID.String,
|
||||||
}
|
}
|
||||||
} else if projectID.Valid {
|
} else if projectID.Valid {
|
||||||
membership.Project = &ProjectMembership{
|
membership.Project = &ProjectMembership{
|
||||||
ProjectID: projectID.String,
|
ProjectID: projectID.String,
|
||||||
|
Name: projectName.String,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -23,8 +23,8 @@ var (
|
|||||||
", memberships.iam_id" +
|
", memberships.iam_id" +
|
||||||
", memberships.project_id" +
|
", memberships.project_id" +
|
||||||
", memberships.grant_id" +
|
", memberships.grant_id" +
|
||||||
", zitadel.projections.users_humans.display_name" +
|
", zitadel.projections.projects.name" +
|
||||||
", zitadel.projections.users_machines.name" +
|
", zitadel.projections.orgs.name" +
|
||||||
", COUNT(*) OVER ()" +
|
", COUNT(*) OVER ()" +
|
||||||
" FROM (" +
|
" FROM (" +
|
||||||
"SELECT members.user_id" +
|
"SELECT members.user_id" +
|
||||||
@ -75,8 +75,8 @@ var (
|
|||||||
", members.grant_id" +
|
", members.grant_id" +
|
||||||
" FROM zitadel.projections.project_grant_members as members" +
|
" FROM zitadel.projections.project_grant_members as members" +
|
||||||
") AS memberships" +
|
") AS memberships" +
|
||||||
" LEFT JOIN zitadel.projections.users_humans ON memberships.user_id = zitadel.projections.users_humans.user_id" +
|
" LEFT JOIN zitadel.projections.projects ON memberships.project_id = zitadel.projections.projects.id" +
|
||||||
" LEFT JOIN zitadel.projections.users_machines ON memberships.user_id = zitadel.projections.users_machines.user_id")
|
" LEFT JOIN zitadel.projections.orgs ON memberships.org_id = zitadel.projections.orgs.id")
|
||||||
membershipCols = []string{
|
membershipCols = []string{
|
||||||
"user_id",
|
"user_id",
|
||||||
"roles",
|
"roles",
|
||||||
@ -88,8 +88,8 @@ var (
|
|||||||
"iam_id",
|
"iam_id",
|
||||||
"project_id",
|
"project_id",
|
||||||
"grant_id",
|
"grant_id",
|
||||||
"display_name",
|
"name", //project name
|
||||||
"name",
|
"name", //org name
|
||||||
"count",
|
"count",
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
@ -118,50 +118,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
object: &Memberships{Memberships: []*Membership{}},
|
object: &Memberships{Memberships: []*Membership{}},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "prepareMembershipsQuery one org member human",
|
name: "prepareMembershipsQuery one org member",
|
||||||
prepare: prepareMembershipsQuery,
|
|
||||||
want: want{
|
|
||||||
sqlExpectations: mockQueries(
|
|
||||||
membershipsStmt,
|
|
||||||
membershipCols,
|
|
||||||
[][]driver.Value{
|
|
||||||
{
|
|
||||||
"user-id",
|
|
||||||
pq.StringArray{"role1", "role2"},
|
|
||||||
testNow,
|
|
||||||
testNow,
|
|
||||||
uint64(20211202),
|
|
||||||
"ro",
|
|
||||||
"org-id",
|
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
"display name",
|
|
||||||
nil,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
),
|
|
||||||
},
|
|
||||||
object: &Memberships{
|
|
||||||
SearchResponse: SearchResponse{
|
|
||||||
Count: 1,
|
|
||||||
},
|
|
||||||
Memberships: []*Membership{
|
|
||||||
{
|
|
||||||
UserID: "user-id",
|
|
||||||
Roles: []string{"role1", "role2"},
|
|
||||||
CreationDate: testNow,
|
|
||||||
ChangeDate: testNow,
|
|
||||||
Sequence: 20211202,
|
|
||||||
ResourceOwner: "ro",
|
|
||||||
Org: &OrgMembership{OrgID: "org-id"},
|
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "prepareMembershipsQuery one org member machine",
|
|
||||||
prepare: prepareMembershipsQuery,
|
prepare: prepareMembershipsQuery,
|
||||||
want: want{
|
want: want{
|
||||||
sqlExpectations: mockQueries(
|
sqlExpectations: mockQueries(
|
||||||
@ -180,7 +137,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
nil,
|
nil,
|
||||||
nil,
|
nil,
|
||||||
"machine-name",
|
"org-name",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
),
|
),
|
||||||
@ -197,57 +154,13 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ChangeDate: testNow,
|
ChangeDate: testNow,
|
||||||
Sequence: 20211202,
|
Sequence: 20211202,
|
||||||
ResourceOwner: "ro",
|
ResourceOwner: "ro",
|
||||||
Org: &OrgMembership{OrgID: "org-id"},
|
Org: &OrgMembership{OrgID: "org-id", Name: "org-name"},
|
||||||
DisplayName: "machine-name",
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "prepareMembershipsQuery one iam member human",
|
name: "prepareMembershipsQuery one iam member",
|
||||||
prepare: prepareMembershipsQuery,
|
|
||||||
want: want{
|
|
||||||
sqlExpectations: mockQueries(
|
|
||||||
membershipsStmt,
|
|
||||||
membershipCols,
|
|
||||||
[][]driver.Value{
|
|
||||||
{
|
|
||||||
"user-id",
|
|
||||||
pq.StringArray{"role1", "role2"},
|
|
||||||
testNow,
|
|
||||||
testNow,
|
|
||||||
uint64(20211202),
|
|
||||||
"ro",
|
|
||||||
nil,
|
|
||||||
"iam-id",
|
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
"display name",
|
|
||||||
nil,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
),
|
|
||||||
},
|
|
||||||
object: &Memberships{
|
|
||||||
SearchResponse: SearchResponse{
|
|
||||||
Count: 1,
|
|
||||||
},
|
|
||||||
Memberships: []*Membership{
|
|
||||||
{
|
|
||||||
UserID: "user-id",
|
|
||||||
Roles: []string{"role1", "role2"},
|
|
||||||
CreationDate: testNow,
|
|
||||||
ChangeDate: testNow,
|
|
||||||
Sequence: 20211202,
|
|
||||||
ResourceOwner: "ro",
|
|
||||||
IAM: &IAMMembership{IAMID: "iam-id"},
|
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "prepareMembershipsQuery one iam member machine",
|
|
||||||
prepare: prepareMembershipsQuery,
|
prepare: prepareMembershipsQuery,
|
||||||
want: want{
|
want: want{
|
||||||
sqlExpectations: mockQueries(
|
sqlExpectations: mockQueries(
|
||||||
@ -266,7 +179,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
nil,
|
nil,
|
||||||
nil,
|
nil,
|
||||||
"machine-name",
|
nil,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
),
|
),
|
||||||
@ -283,14 +196,13 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ChangeDate: testNow,
|
ChangeDate: testNow,
|
||||||
Sequence: 20211202,
|
Sequence: 20211202,
|
||||||
ResourceOwner: "ro",
|
ResourceOwner: "ro",
|
||||||
IAM: &IAMMembership{IAMID: "iam-id"},
|
IAM: &IAMMembership{IAMID: "iam-id", Name: "iam-id"},
|
||||||
DisplayName: "machine-name",
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "prepareMembershipsQuery one project member human",
|
name: "prepareMembershipsQuery one project member",
|
||||||
prepare: prepareMembershipsQuery,
|
prepare: prepareMembershipsQuery,
|
||||||
want: want{
|
want: want{
|
||||||
sqlExpectations: mockQueries(
|
sqlExpectations: mockQueries(
|
||||||
@ -308,7 +220,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
"project-id",
|
"project-id",
|
||||||
nil,
|
nil,
|
||||||
"display name",
|
"project-name",
|
||||||
nil,
|
nil,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -326,57 +238,13 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ChangeDate: testNow,
|
ChangeDate: testNow,
|
||||||
Sequence: 20211202,
|
Sequence: 20211202,
|
||||||
ResourceOwner: "ro",
|
ResourceOwner: "ro",
|
||||||
Project: &ProjectMembership{ProjectID: "project-id"},
|
Project: &ProjectMembership{ProjectID: "project-id", Name: "project-name"},
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "prepareMembershipsQuery one project member machine",
|
name: "prepareMembershipsQuery one project grant member",
|
||||||
prepare: prepareMembershipsQuery,
|
|
||||||
want: want{
|
|
||||||
sqlExpectations: mockQueries(
|
|
||||||
membershipsStmt,
|
|
||||||
membershipCols,
|
|
||||||
[][]driver.Value{
|
|
||||||
{
|
|
||||||
"user-id",
|
|
||||||
pq.StringArray{"role1", "role2"},
|
|
||||||
testNow,
|
|
||||||
testNow,
|
|
||||||
uint64(20211202),
|
|
||||||
"ro",
|
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
"project-id",
|
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
"machine-name",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
),
|
|
||||||
},
|
|
||||||
object: &Memberships{
|
|
||||||
SearchResponse: SearchResponse{
|
|
||||||
Count: 1,
|
|
||||||
},
|
|
||||||
Memberships: []*Membership{
|
|
||||||
{
|
|
||||||
UserID: "user-id",
|
|
||||||
Roles: []string{"role1", "role2"},
|
|
||||||
CreationDate: testNow,
|
|
||||||
ChangeDate: testNow,
|
|
||||||
Sequence: 20211202,
|
|
||||||
ResourceOwner: "ro",
|
|
||||||
Project: &ProjectMembership{ProjectID: "project-id"},
|
|
||||||
DisplayName: "machine-name",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "prepareMembershipsQuery one project grant member human",
|
|
||||||
prepare: prepareMembershipsQuery,
|
prepare: prepareMembershipsQuery,
|
||||||
want: want{
|
want: want{
|
||||||
sqlExpectations: mockQueries(
|
sqlExpectations: mockQueries(
|
||||||
@ -394,7 +262,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
"project-id",
|
"project-id",
|
||||||
"grant-id",
|
"grant-id",
|
||||||
"display name",
|
"project-name",
|
||||||
nil,
|
nil,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -415,54 +283,8 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ProjectGrant: &ProjectGrantMembership{
|
ProjectGrant: &ProjectGrantMembership{
|
||||||
GrantID: "grant-id",
|
GrantID: "grant-id",
|
||||||
ProjectID: "project-id",
|
ProjectID: "project-id",
|
||||||
|
ProjectName: "project-name",
|
||||||
},
|
},
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "prepareMembershipsQuery one project grant member machine",
|
|
||||||
prepare: prepareMembershipsQuery,
|
|
||||||
want: want{
|
|
||||||
sqlExpectations: mockQueries(
|
|
||||||
membershipsStmt,
|
|
||||||
membershipCols,
|
|
||||||
[][]driver.Value{
|
|
||||||
{
|
|
||||||
"user-id",
|
|
||||||
pq.StringArray{"role1", "role2"},
|
|
||||||
testNow,
|
|
||||||
testNow,
|
|
||||||
uint64(20211202),
|
|
||||||
"ro",
|
|
||||||
nil,
|
|
||||||
nil,
|
|
||||||
"project-id",
|
|
||||||
"grant-id",
|
|
||||||
nil,
|
|
||||||
"machine-name",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
),
|
|
||||||
},
|
|
||||||
object: &Memberships{
|
|
||||||
SearchResponse: SearchResponse{
|
|
||||||
Count: 1,
|
|
||||||
},
|
|
||||||
Memberships: []*Membership{
|
|
||||||
{
|
|
||||||
UserID: "user-id",
|
|
||||||
Roles: []string{"role1", "role2"},
|
|
||||||
CreationDate: testNow,
|
|
||||||
ChangeDate: testNow,
|
|
||||||
Sequence: 20211202,
|
|
||||||
ResourceOwner: "ro",
|
|
||||||
ProjectGrant: &ProjectGrantMembership{
|
|
||||||
GrantID: "grant-id",
|
|
||||||
ProjectID: "project-id",
|
|
||||||
},
|
|
||||||
DisplayName: "machine-name",
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -486,8 +308,8 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
nil,
|
nil,
|
||||||
nil,
|
nil,
|
||||||
"display name",
|
|
||||||
nil,
|
nil,
|
||||||
|
"org-name",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"user-id",
|
"user-id",
|
||||||
@ -500,7 +322,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
"iam-id",
|
"iam-id",
|
||||||
nil,
|
nil,
|
||||||
nil,
|
nil,
|
||||||
"display name",
|
nil,
|
||||||
nil,
|
nil,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -514,7 +336,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
"project-id",
|
"project-id",
|
||||||
nil,
|
nil,
|
||||||
"display name",
|
"project-name",
|
||||||
nil,
|
nil,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -528,7 +350,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
nil,
|
nil,
|
||||||
"project-id",
|
"project-id",
|
||||||
"grant-id",
|
"grant-id",
|
||||||
"display name",
|
"project-name",
|
||||||
nil,
|
nil,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@ -546,8 +368,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ChangeDate: testNow,
|
ChangeDate: testNow,
|
||||||
Sequence: 20211202,
|
Sequence: 20211202,
|
||||||
ResourceOwner: "ro",
|
ResourceOwner: "ro",
|
||||||
Org: &OrgMembership{OrgID: "org-id"},
|
Org: &OrgMembership{OrgID: "org-id", Name: "org-name"},
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
UserID: "user-id",
|
UserID: "user-id",
|
||||||
@ -556,8 +377,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ChangeDate: testNow,
|
ChangeDate: testNow,
|
||||||
Sequence: 20211202,
|
Sequence: 20211202,
|
||||||
ResourceOwner: "ro",
|
ResourceOwner: "ro",
|
||||||
IAM: &IAMMembership{IAMID: "iam-id"},
|
IAM: &IAMMembership{IAMID: "iam-id", Name: "iam-id"},
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
UserID: "user-id",
|
UserID: "user-id",
|
||||||
@ -566,8 +386,7 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ChangeDate: testNow,
|
ChangeDate: testNow,
|
||||||
Sequence: 20211202,
|
Sequence: 20211202,
|
||||||
ResourceOwner: "ro",
|
ResourceOwner: "ro",
|
||||||
Project: &ProjectMembership{ProjectID: "project-id"},
|
Project: &ProjectMembership{ProjectID: "project-id", Name: "project-name"},
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
UserID: "user-id",
|
UserID: "user-id",
|
||||||
@ -579,8 +398,8 @@ func Test_MembershipPrepares(t *testing.T) {
|
|||||||
ProjectGrant: &ProjectGrantMembership{
|
ProjectGrant: &ProjectGrantMembership{
|
||||||
ProjectID: "project-id",
|
ProjectID: "project-id",
|
||||||
GrantID: "grant-id",
|
GrantID: "grant-id",
|
||||||
|
ProjectName: "project-name",
|
||||||
},
|
},
|
||||||
DisplayName: "display name",
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user