package projection import ( "context" "github.com/zitadel/zitadel/internal/domain" "github.com/zitadel/zitadel/internal/eventstore" old_handler "github.com/zitadel/zitadel/internal/eventstore/handler" "github.com/zitadel/zitadel/internal/eventstore/handler/v2" "github.com/zitadel/zitadel/internal/repository/instance" "github.com/zitadel/zitadel/internal/repository/org" "github.com/zitadel/zitadel/internal/repository/policy" "github.com/zitadel/zitadel/internal/zerrors" ) const ( PasswordComplexityTable = "projections.password_complexity_policies2" ComplexityPolicyIDCol = "id" ComplexityPolicyCreationDateCol = "creation_date" ComplexityPolicyChangeDateCol = "change_date" ComplexityPolicySequenceCol = "sequence" ComplexityPolicyStateCol = "state" ComplexityPolicyIsDefaultCol = "is_default" ComplexityPolicyResourceOwnerCol = "resource_owner" ComplexityPolicyInstanceIDCol = "instance_id" ComplexityPolicyMinLengthCol = "min_length" ComplexityPolicyHasLowercaseCol = "has_lowercase" ComplexityPolicyHasUppercaseCol = "has_uppercase" ComplexityPolicyHasSymbolCol = "has_symbol" ComplexityPolicyHasNumberCol = "has_number" ComplexityPolicyOwnerRemovedCol = "owner_removed" ) type passwordComplexityProjection struct{} func newPasswordComplexityProjection(ctx context.Context, config handler.Config) *handler.Handler { return handler.NewHandler(ctx, &config, new(passwordComplexityProjection)) } func (*passwordComplexityProjection) Name() string { return PasswordComplexityTable } func (*passwordComplexityProjection) Init() *old_handler.Check { return handler.NewTableCheck( handler.NewTable([]*handler.InitColumn{ handler.NewColumn(ComplexityPolicyIDCol, handler.ColumnTypeText), handler.NewColumn(ComplexityPolicyCreationDateCol, handler.ColumnTypeTimestamp), handler.NewColumn(ComplexityPolicyChangeDateCol, handler.ColumnTypeTimestamp), handler.NewColumn(ComplexityPolicySequenceCol, handler.ColumnTypeInt64), handler.NewColumn(ComplexityPolicyStateCol, handler.ColumnTypeEnum), handler.NewColumn(ComplexityPolicyIsDefaultCol, handler.ColumnTypeBool, handler.Default(false)), handler.NewColumn(ComplexityPolicyResourceOwnerCol, handler.ColumnTypeText), handler.NewColumn(ComplexityPolicyInstanceIDCol, handler.ColumnTypeText), handler.NewColumn(ComplexityPolicyMinLengthCol, handler.ColumnTypeInt64), handler.NewColumn(ComplexityPolicyHasLowercaseCol, handler.ColumnTypeBool), handler.NewColumn(ComplexityPolicyHasUppercaseCol, handler.ColumnTypeBool), handler.NewColumn(ComplexityPolicyHasSymbolCol, handler.ColumnTypeBool), handler.NewColumn(ComplexityPolicyHasNumberCol, handler.ColumnTypeBool), handler.NewColumn(ComplexityPolicyOwnerRemovedCol, handler.ColumnTypeBool, handler.Default(false)), }, handler.NewPrimaryKey(ComplexityPolicyInstanceIDCol, ComplexityPolicyIDCol), handler.WithIndex(handler.NewIndex("owner_removed", []string{ComplexityPolicyOwnerRemovedCol})), ), ) } func (p *passwordComplexityProjection) Reducers() []handler.AggregateReducer { return []handler.AggregateReducer{ { Aggregate: org.AggregateType, EventReducers: []handler.EventReducer{ { Event: org.PasswordComplexityPolicyAddedEventType, Reduce: p.reduceAdded, }, { Event: org.PasswordComplexityPolicyChangedEventType, Reduce: p.reduceChanged, }, { Event: org.PasswordComplexityPolicyRemovedEventType, Reduce: p.reduceRemoved, }, { Event: org.OrgRemovedEventType, Reduce: p.reduceOwnerRemoved, }, }, }, { Aggregate: instance.AggregateType, EventReducers: []handler.EventReducer{ { Event: instance.PasswordComplexityPolicyAddedEventType, Reduce: p.reduceAdded, }, { Event: instance.PasswordComplexityPolicyChangedEventType, Reduce: p.reduceChanged, }, { Event: instance.InstanceRemovedEventType, Reduce: reduceInstanceRemovedHelper(ComplexityPolicyInstanceIDCol), }, }, }, } } func (p *passwordComplexityProjection) reduceAdded(event eventstore.Event) (*handler.Statement, error) { var policyEvent policy.PasswordComplexityPolicyAddedEvent var isDefault bool switch e := event.(type) { case *org.PasswordComplexityPolicyAddedEvent: policyEvent = e.PasswordComplexityPolicyAddedEvent isDefault = false case *instance.PasswordComplexityPolicyAddedEvent: policyEvent = e.PasswordComplexityPolicyAddedEvent isDefault = true default: return nil, zerrors.ThrowInvalidArgumentf(nil, "PROJE-KTHmJ", "reduce.wrong.event.type %v", []eventstore.EventType{org.PasswordComplexityPolicyAddedEventType, instance.PasswordComplexityPolicyAddedEventType}) } return handler.NewCreateStatement( &policyEvent, []handler.Column{ handler.NewCol(ComplexityPolicyCreationDateCol, policyEvent.CreationDate()), handler.NewCol(ComplexityPolicyChangeDateCol, policyEvent.CreationDate()), handler.NewCol(ComplexityPolicySequenceCol, policyEvent.Sequence()), handler.NewCol(ComplexityPolicyIDCol, policyEvent.Aggregate().ID), handler.NewCol(ComplexityPolicyStateCol, domain.PolicyStateActive), handler.NewCol(ComplexityPolicyMinLengthCol, policyEvent.MinLength), handler.NewCol(ComplexityPolicyHasLowercaseCol, policyEvent.HasLowercase), handler.NewCol(ComplexityPolicyHasUppercaseCol, policyEvent.HasUppercase), handler.NewCol(ComplexityPolicyHasSymbolCol, policyEvent.HasSymbol), handler.NewCol(ComplexityPolicyHasNumberCol, policyEvent.HasNumber), handler.NewCol(ComplexityPolicyResourceOwnerCol, policyEvent.Aggregate().ResourceOwner), handler.NewCol(ComplexityPolicyInstanceIDCol, policyEvent.Aggregate().InstanceID), handler.NewCol(ComplexityPolicyIsDefaultCol, isDefault), }), nil } func (p *passwordComplexityProjection) reduceChanged(event eventstore.Event) (*handler.Statement, error) { var policyEvent policy.PasswordComplexityPolicyChangedEvent switch e := event.(type) { case *org.PasswordComplexityPolicyChangedEvent: policyEvent = e.PasswordComplexityPolicyChangedEvent case *instance.PasswordComplexityPolicyChangedEvent: policyEvent = e.PasswordComplexityPolicyChangedEvent default: return nil, zerrors.ThrowInvalidArgumentf(nil, "PROJE-cf3Xb", "reduce.wrong.event.type %v", []eventstore.EventType{org.PasswordComplexityPolicyChangedEventType, instance.PasswordComplexityPolicyChangedEventType}) } cols := []handler.Column{ handler.NewCol(ComplexityPolicyChangeDateCol, policyEvent.CreationDate()), handler.NewCol(ComplexityPolicySequenceCol, policyEvent.Sequence()), } if policyEvent.MinLength != nil { cols = append(cols, handler.NewCol(ComplexityPolicyMinLengthCol, *policyEvent.MinLength)) } if policyEvent.HasLowercase != nil { cols = append(cols, handler.NewCol(ComplexityPolicyHasLowercaseCol, *policyEvent.HasLowercase)) } if policyEvent.HasUppercase != nil { cols = append(cols, handler.NewCol(ComplexityPolicyHasUppercaseCol, *policyEvent.HasUppercase)) } if policyEvent.HasSymbol != nil { cols = append(cols, handler.NewCol(ComplexityPolicyHasSymbolCol, *policyEvent.HasSymbol)) } if policyEvent.HasNumber != nil { cols = append(cols, handler.NewCol(ComplexityPolicyHasNumberCol, *policyEvent.HasNumber)) } return handler.NewUpdateStatement( &policyEvent, cols, []handler.Condition{ handler.NewCond(ComplexityPolicyIDCol, policyEvent.Aggregate().ID), handler.NewCond(ComplexityPolicyInstanceIDCol, policyEvent.Aggregate().InstanceID), }), nil } func (p *passwordComplexityProjection) reduceRemoved(event eventstore.Event) (*handler.Statement, error) { policyEvent, ok := event.(*org.PasswordComplexityPolicyRemovedEvent) if !ok { return nil, zerrors.ThrowInvalidArgumentf(nil, "PROJE-wttCd", "reduce.wrong.event.type %s", org.PasswordComplexityPolicyRemovedEventType) } return handler.NewDeleteStatement( policyEvent, []handler.Condition{ handler.NewCond(ComplexityPolicyIDCol, policyEvent.Aggregate().ID), handler.NewCond(ComplexityPolicyInstanceIDCol, policyEvent.Aggregate().InstanceID), }), nil } func (p *passwordComplexityProjection) reduceOwnerRemoved(event eventstore.Event) (*handler.Statement, error) { e, ok := event.(*org.OrgRemovedEvent) if !ok { return nil, zerrors.ThrowInvalidArgumentf(nil, "PROJE-pGTz9", "reduce.wrong.event.type %s", org.OrgRemovedEventType) } return handler.NewDeleteStatement( e, []handler.Condition{ handler.NewCond(ComplexityPolicyInstanceIDCol, e.Aggregate().InstanceID), handler.NewCond(ComplexityPolicyResourceOwnerCol, e.Aggregate().ID), }, ), nil }