package handler import ( "net/http" "regexp" "strconv" "github.com/caos/zitadel/internal/domain" iam_model "github.com/caos/zitadel/internal/iam/model" ) const ( LowerCaseRegex = `[a-z]` UpperCaseRegex = `[A-Z]` NumberRegex = `[0-9]` SymbolRegex = `[^A-Za-z0-9]` ) var ( hasStringLowerCase = regexp.MustCompile(LowerCaseRegex).MatchString hasStringUpperCase = regexp.MustCompile(UpperCaseRegex).MatchString hasNumber = regexp.MustCompile(NumberRegex).MatchString hasSymbol = regexp.MustCompile(SymbolRegex).MatchString ) func (l *Login) getPasswordComplexityPolicy(r *http.Request, authReq *domain.AuthRequest, orgID string) (*iam_model.PasswordComplexityPolicyView, string, error) { policy, err := l.authRepo.GetMyPasswordComplexityPolicy(setContext(r.Context(), orgID)) if err != nil { return nil, err.Error(), err } description, err := l.generatePolicyDescription(r, authReq, policy) return policy, description, nil } func (l *Login) getPasswordComplexityPolicyByUserID(r *http.Request, authReq *domain.AuthRequest, userID string) (*iam_model.PasswordComplexityPolicyView, string, error) { user, err := l.query.GetUserByID(r.Context(), userID) if err != nil { return nil, "", nil } policy, err := l.authRepo.GetMyPasswordComplexityPolicy(setContext(r.Context(), user.ResourceOwner)) if err != nil { return nil, err.Error(), err } description, err := l.generatePolicyDescription(r, authReq, policy) return policy, description, nil } func (l *Login) generatePolicyDescription(r *http.Request, authReq *domain.AuthRequest, policy *iam_model.PasswordComplexityPolicyView) (string, error) { description := "" return description, nil }