feat: Check zitadel project (#191)

* feat: check if zitadel project is changed

* feat: check if zitadel project is changed
This commit is contained in:
Fabi 2020-06-09 14:41:09 +02:00 committed by GitHub
parent 9cd7f69e61
commit e87fca28e7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
9 changed files with 103 additions and 20 deletions

View File

@ -0,0 +1,15 @@
package eventstore
import (
"context"
iam_model "github.com/caos/zitadel/internal/iam/model"
"github.com/caos/zitadel/internal/iam/repository/eventsourcing"
)
type IamRepository struct {
IamEvents *eventsourcing.IamEventstore
}
func (repo *IamRepository) IamByID(ctx context.Context, id string) (*iam_model.Iam, error) {
return repo.IamEvents.IamByID(ctx, id)
}

View File

@ -2,6 +2,7 @@ package eventsourcing
import ( import (
"context" "context"
es_iam "github.com/caos/zitadel/internal/iam/repository/eventsourcing"
sd "github.com/caos/zitadel/internal/config/systemdefaults" sd "github.com/caos/zitadel/internal/config/systemdefaults"
"github.com/caos/zitadel/internal/config/types" "github.com/caos/zitadel/internal/config/types"
@ -32,6 +33,7 @@ type EsRepository struct {
eventstore.UserRepo eventstore.UserRepo
eventstore.UserGrantRepo eventstore.UserGrantRepo
eventstore.PolicyRepo eventstore.PolicyRepo
eventstore.IamRepository
} }
func Start(conf Config, systemDefaults sd.SystemDefaults, roles []string) (*EsRepository, error) { func Start(conf Config, systemDefaults sd.SystemDefaults, roles []string) (*EsRepository, error) {
@ -78,6 +80,13 @@ func Start(conf Config, systemDefaults sd.SystemDefaults, roles []string) (*EsRe
return nil, err return nil, err
} }
org := es_org.StartOrg(es_org.OrgConfig{Eventstore: es}) org := es_org.StartOrg(es_org.OrgConfig{Eventstore: es})
iam, err := es_iam.StartIam(es_iam.IamConfig{
Eventstore: es,
Cache: conf.Eventstore.Cache,
}, systemDefaults)
if err != nil {
return nil, err
}
eventstoreRepos := handler.EventstoreRepos{ProjectEvents: project, UserEvents: user, OrgEvents: org} eventstoreRepos := handler.EventstoreRepos{ProjectEvents: project, UserEvents: user, OrgEvents: org}
spool := spooler.StartSpooler(conf.Spooler, es, view, sqlClient, eventstoreRepos) spool := spooler.StartSpooler(conf.Spooler, es, view, sqlClient, eventstoreRepos)
@ -89,6 +98,7 @@ func Start(conf Config, systemDefaults sd.SystemDefaults, roles []string) (*EsRe
UserRepo: eventstore.UserRepo{conf.SearchLimit, user, policy, view}, UserRepo: eventstore.UserRepo{conf.SearchLimit, user, policy, view},
UserGrantRepo: eventstore.UserGrantRepo{conf.SearchLimit, usergrant, view}, UserGrantRepo: eventstore.UserGrantRepo{conf.SearchLimit, usergrant, view},
PolicyRepo: eventstore.PolicyRepo{policy}, PolicyRepo: eventstore.PolicyRepo{policy},
IamRepository: eventstore.IamRepository{iam},
}, nil }, nil
} }

View File

@ -0,0 +1,10 @@
package repository
import (
"context"
iam_model "github.com/caos/zitadel/internal/iam/model"
)
type IamRepository interface {
IamByID(ctx context.Context, id string) (*iam_model.Iam, error)
}

View File

@ -7,4 +7,5 @@ type Repository interface {
OrgRepository OrgRepository
UserRepository UserRepository
UserGrantRepository UserGrantRepository
IamRepository
} }

View File

@ -4,6 +4,7 @@ import (
"context" "context"
"github.com/caos/zitadel/internal/api/auth" "github.com/caos/zitadel/internal/api/auth"
authz_repo "github.com/caos/zitadel/internal/authz/repository/eventsourcing" authz_repo "github.com/caos/zitadel/internal/authz/repository/eventsourcing"
"github.com/caos/zitadel/internal/config/systemdefaults"
"github.com/caos/zitadel/internal/management/repository" "github.com/caos/zitadel/internal/management/repository"
grpc_util "github.com/caos/zitadel/internal/api/grpc" grpc_util "github.com/caos/zitadel/internal/api/grpc"
@ -15,8 +16,8 @@ type Config struct {
GRPC grpc_util.Config GRPC grpc_util.Config
} }
func Start(ctx context.Context, conf Config, authZRepo *authz_repo.EsRepository, authZ auth.Config, repo repository.Repository) { func Start(ctx context.Context, conf Config, authZRepo *authz_repo.EsRepository, authZ auth.Config, sd systemdefaults.SystemDefaults, repo repository.Repository) {
grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig(), authZRepo, authZ, repo) grpcServer := grpc.StartServer(conf.GRPC.ToServerConfig(), authZRepo, authZ, sd, repo)
grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig()) grpcGateway := grpc.StartGateway(conf.GRPC.ToGatewayConfig())
server.StartServer(ctx, grpcServer) server.StartServer(ctx, grpcServer)

View File

@ -37,6 +37,9 @@ func (s *Server) UpdateApplication(ctx context.Context, in *ApplicationUpdate) (
return appFromModel(app), nil return appFromModel(app), nil
} }
func (s *Server) DeactivateApplication(ctx context.Context, in *ApplicationID) (*Application, error) { func (s *Server) DeactivateApplication(ctx context.Context, in *ApplicationID) (*Application, error) {
if s.IsZitadel(ctx, in.ProjectId) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-LSped", "Zitadel Project Applications should not be deactivated")
}
app, err := s.project.DeactivateApplication(ctx, in.ProjectId, in.Id) app, err := s.project.DeactivateApplication(ctx, in.ProjectId, in.Id)
if err != nil { if err != nil {
return nil, err return nil, err
@ -52,11 +55,17 @@ func (s *Server) ReactivateApplication(ctx context.Context, in *ApplicationID) (
} }
func (s *Server) RemoveApplication(ctx context.Context, in *ApplicationID) (*empty.Empty, error) { func (s *Server) RemoveApplication(ctx context.Context, in *ApplicationID) (*empty.Empty, error) {
if s.IsZitadel(ctx, in.ProjectId) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-LSpee", "Zitadel Project Applications should not be removed")
}
err := s.project.RemoveApplication(ctx, in.ProjectId, in.Id) err := s.project.RemoveApplication(ctx, in.ProjectId, in.Id)
return &empty.Empty{}, err return &empty.Empty{}, err
} }
func (s *Server) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate) (*OIDCConfig, error) { func (s *Server) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfigUpdate) (*OIDCConfig, error) {
if s.IsZitadel(ctx, in.ProjectId) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-LSpee", "Zitadel Project Applications OIdc Config should not be changed")
}
config, err := s.project.ChangeOIDCConfig(ctx, oidcConfigUpdateToModel(in)) config, err := s.project.ChangeOIDCConfig(ctx, oidcConfigUpdateToModel(in))
if err != nil { if err != nil {
return nil, err return nil, err
@ -65,6 +74,9 @@ func (s *Server) UpdateApplicationOIDCConfig(ctx context.Context, in *OIDCConfig
} }
func (s *Server) RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID) (*ClientSecret, error) { func (s *Server) RegenerateOIDCClientSecret(ctx context.Context, in *ApplicationID) (*ClientSecret, error) {
if s.IsZitadel(ctx, in.ProjectId) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-Lps4d", "Zitadel Project Applications OIdc Config should not be changed")
}
config, err := s.project.ChangeOIDConfigSecret(ctx, in.ProjectId, in.Id) config, err := s.project.ChangeOIDConfigSecret(ctx, in.ProjectId, in.Id)
if err != nil { if err != nil {
return nil, err return nil, err

View File

@ -16,6 +16,9 @@ func (s *Server) CreateProject(ctx context.Context, in *ProjectCreateRequest) (*
return projectFromModel(project), nil return projectFromModel(project), nil
} }
func (s *Server) UpdateProject(ctx context.Context, in *ProjectUpdateRequest) (*Project, error) { func (s *Server) UpdateProject(ctx context.Context, in *ProjectUpdateRequest) (*Project, error) {
if s.IsZitadel(ctx, in.Id) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-SFH8d", "Zitadel Project should not be updated")
}
project, err := s.project.UpdateProject(ctx, projectUpdateToModel(in)) project, err := s.project.UpdateProject(ctx, projectUpdateToModel(in))
if err != nil { if err != nil {
return nil, err return nil, err
@ -23,6 +26,9 @@ func (s *Server) UpdateProject(ctx context.Context, in *ProjectUpdateRequest) (*
return projectFromModel(project), nil return projectFromModel(project), nil
} }
func (s *Server) DeactivateProject(ctx context.Context, in *ProjectID) (*Project, error) { func (s *Server) DeactivateProject(ctx context.Context, in *ProjectID) (*Project, error) {
if s.IsZitadel(ctx, in.Id) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-PS9cs", "Zitadel Project should not be deactivated")
}
project, err := s.project.DeactivateProject(ctx, in.Id) project, err := s.project.DeactivateProject(ctx, in.Id)
if err != nil { if err != nil {
return nil, err return nil, err
@ -30,6 +36,9 @@ func (s *Server) DeactivateProject(ctx context.Context, in *ProjectID) (*Project
return projectFromModel(project), nil return projectFromModel(project), nil
} }
func (s *Server) ReactivateProject(ctx context.Context, in *ProjectID) (*Project, error) { func (s *Server) ReactivateProject(ctx context.Context, in *ProjectID) (*Project, error) {
if s.IsZitadel(ctx, in.Id) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-LSpe2", "Zitadel Project should not be reactivated")
}
project, err := s.project.ReactivateProject(ctx, in.Id) project, err := s.project.ReactivateProject(ctx, in.Id)
if err != nil { if err != nil {
return nil, err return nil, err
@ -65,6 +74,9 @@ func (s *Server) GetGrantedProjectGrantByID(ctx context.Context, in *ProjectGran
} }
func (s *Server) AddProjectRole(ctx context.Context, in *ProjectRoleAdd) (*ProjectRole, error) { func (s *Server) AddProjectRole(ctx context.Context, in *ProjectRoleAdd) (*ProjectRole, error) {
if s.IsZitadel(ctx, in.Id) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-PS9cs", "Zitadel Project should not get new role")
}
role, err := s.project.AddProjectRole(ctx, projectRoleAddToModel(in)) role, err := s.project.AddProjectRole(ctx, projectRoleAddToModel(in))
if err != nil { if err != nil {
return nil, err return nil, err
@ -72,6 +84,9 @@ func (s *Server) AddProjectRole(ctx context.Context, in *ProjectRoleAdd) (*Proje
return projectRoleFromModel(role), nil return projectRoleFromModel(role), nil
} }
func (s *Server) ChangeProjectRole(ctx context.Context, in *ProjectRoleChange) (*ProjectRole, error) { func (s *Server) ChangeProjectRole(ctx context.Context, in *ProjectRoleChange) (*ProjectRole, error) {
if s.IsZitadel(ctx, in.Id) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-LASj8", "Zitadel Project should not change roles")
}
role, err := s.project.ChangeProjectRole(ctx, projectRoleChangeToModel(in)) role, err := s.project.ChangeProjectRole(ctx, projectRoleChangeToModel(in))
if err != nil { if err != nil {
return nil, err return nil, err
@ -80,6 +95,9 @@ func (s *Server) ChangeProjectRole(ctx context.Context, in *ProjectRoleChange) (
} }
func (s *Server) RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove) (*empty.Empty, error) { func (s *Server) RemoveProjectRole(ctx context.Context, in *ProjectRoleRemove) (*empty.Empty, error) {
if s.IsZitadel(ctx, in.Id) {
return nil, errors.ThrowInvalidArgument(nil, "GRPC-Psn7s", "do not remove roles from Zitadel Project")
}
err := s.project.RemoveProjectRole(ctx, in.Id, in.Key) err := s.project.RemoveProjectRole(ctx, in.Id, in.Key)
return &empty.Empty{}, err return &empty.Empty{}, err
} }
@ -98,3 +116,14 @@ func (s *Server) SearchProjectRoles(ctx context.Context, in *ProjectRoleSearchRe
func (s *Server) ProjectChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) { func (s *Server) ProjectChanges(ctx context.Context, changesRequest *ChangeRequest) (*Changes, error) {
return nil, errors.ThrowUnimplemented(nil, "GRPC-mci3f", "Not implemented") return nil, errors.ThrowUnimplemented(nil, "GRPC-mci3f", "Not implemented")
} }
func (s *Server) IsZitadel(ctx context.Context, projectID string) bool {
iam, err := s.iam.IamByID(ctx, s.systemDefaults.IamID)
if err != nil {
return false
}
if iam.IamProjectID == projectID {
return true
}
return false
}

View File

@ -5,6 +5,7 @@ import (
grpc_util "github.com/caos/zitadel/internal/api/grpc" grpc_util "github.com/caos/zitadel/internal/api/grpc"
"github.com/caos/zitadel/internal/api/grpc/server/middleware" "github.com/caos/zitadel/internal/api/grpc/server/middleware"
authz_repo "github.com/caos/zitadel/internal/authz/repository/eventsourcing" authz_repo "github.com/caos/zitadel/internal/authz/repository/eventsourcing"
"github.com/caos/zitadel/internal/config/systemdefaults"
mgmt_auth "github.com/caos/zitadel/internal/management/auth" mgmt_auth "github.com/caos/zitadel/internal/management/auth"
"github.com/caos/zitadel/internal/management/repository" "github.com/caos/zitadel/internal/management/repository"
grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware" grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware"
@ -14,26 +15,30 @@ import (
var _ ManagementServiceServer = (*Server)(nil) var _ ManagementServiceServer = (*Server)(nil)
type Server struct { type Server struct {
port string port string
project repository.ProjectRepository project repository.ProjectRepository
policy repository.PolicyRepository policy repository.PolicyRepository
org repository.OrgRepository org repository.OrgRepository
user repository.UserRepository user repository.UserRepository
usergrant repository.UserGrantRepository usergrant repository.UserGrantRepository
verifier *mgmt_auth.TokenVerifier iam repository.IamRepository
authZ auth.Config verifier *mgmt_auth.TokenVerifier
authZ auth.Config
systemDefaults systemdefaults.SystemDefaults
} }
func StartServer(conf grpc_util.ServerConfig, authZRepo *authz_repo.EsRepository, authZ auth.Config, repo repository.Repository) *Server { func StartServer(conf grpc_util.ServerConfig, authZRepo *authz_repo.EsRepository, authZ auth.Config, sd systemdefaults.SystemDefaults, repo repository.Repository) *Server {
return &Server{ return &Server{
port: conf.Port, port: conf.Port,
project: repo, project: repo,
policy: repo, policy: repo,
org: repo, org: repo,
user: repo, user: repo,
usergrant: repo, usergrant: repo,
authZ: authZ, iam: repo,
verifier: mgmt_auth.Start(authZRepo), authZ: authZ,
verifier: mgmt_auth.Start(authZRepo),
systemDefaults: sd,
} }
} }

View File

@ -24,5 +24,5 @@ func Start(ctx context.Context, config Config, authZRepo *authz_repo.EsRepositor
repo, err := eventsourcing.Start(config.Repository, systemDefaults, roles) repo, err := eventsourcing.Start(config.Repository, systemDefaults, roles)
logging.Log("MAIN-9uBxp").OnError(err).Panic("unable to start app") logging.Log("MAIN-9uBxp").OnError(err).Panic("unable to start app")
api.Start(ctx, config.API, authZRepo, authZ, repo) api.Start(ctx, config.API, authZRepo, authZ, systemDefaults, repo)
} }