mirror of
https://github.com/zitadel/zitadel.git
synced 2025-03-04 14:17:39 +00:00

* feat(command): remove org * refactor: imports, unused code, error handling * reduce org removed in action * add org deletion to projections * add org removal to projections * add org removal to projections * org removed projection * lint import * projections * fix: table names in tests * fix: table names in tests * logging * add org state * fix(domain): add Owner removed to object details * feat(ListQuery): add with owner removed * fix(org-delete): add bool to functions to select with owner removed * fix(org-delete): add bools to user grants with events to determine if dependencies lost owner * fix(org-delete): add unit tests for owner removed and org removed events * fix(org-delete): add handling of org remove for grants and members * fix(org-delete): correction of unit tests for owner removed * fix(org-delete): update projections, unit tests and get functions * fix(org-delete): add change date to authnkeys and owner removed to org metadata * fix(org-delete): include owner removed for login names * fix(org-delete): some column fixes in projections and build for queries with owner removed * indexes * fix(org-delete): include review changes * fix(org-delete): change user projection name after merge * fix(org-delete): include review changes for project grant where no project owner is necessary * fix(org-delete): include auth and adminapi tables with owner removed information * fix(org-delete): cleanup username and orgdomain uniqueconstraints when org is removed * fix(org-delete): add permissions for org.remove * remove unnecessary unique constraints * fix column order in primary keys * fix(org-delete): include review changes * fix(org-delete): add owner removed indexes and chang setup step to create tables * fix(org-delete): move PK order of instance_id and change added user_grant from review * fix(org-delete): no params for prepareUserQuery * change to step 6 * merge main * fix(org-delete): OldUserName rename to private * fix linting * cleanup * fix: remove org test * create prerelease * chore: delete org-delete as prerelease Co-authored-by: Stefan Benz <stefan@caos.ch> Co-authored-by: Livio Spring <livio.a@gmail.com> Co-authored-by: Fabi <38692350+hifabienne@users.noreply.github.com> Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com>
179 lines
4.7 KiB
Go
179 lines
4.7 KiB
Go
package query
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
errs "errors"
|
|
"time"
|
|
|
|
sq "github.com/Masterminds/squirrel"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/query/projection"
|
|
)
|
|
|
|
type PrivacyPolicy struct {
|
|
ID string
|
|
Sequence uint64
|
|
CreationDate time.Time
|
|
ChangeDate time.Time
|
|
ResourceOwner string
|
|
State domain.PolicyState
|
|
|
|
TOSLink string
|
|
PrivacyLink string
|
|
HelpLink string
|
|
|
|
IsDefault bool
|
|
}
|
|
|
|
var (
|
|
privacyTable = table{
|
|
name: projection.PrivacyPolicyTable,
|
|
instanceIDCol: projection.PrivacyPolicyInstanceIDCol,
|
|
}
|
|
PrivacyColID = Column{
|
|
name: projection.PrivacyPolicyIDCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColSequence = Column{
|
|
name: projection.PrivacyPolicySequenceCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColCreationDate = Column{
|
|
name: projection.PrivacyPolicyCreationDateCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColChangeDate = Column{
|
|
name: projection.PrivacyPolicyChangeDateCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColResourceOwner = Column{
|
|
name: projection.PrivacyPolicyResourceOwnerCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColInstanceID = Column{
|
|
name: projection.PrivacyPolicyInstanceIDCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColPrivacyLink = Column{
|
|
name: projection.PrivacyPolicyPrivacyLinkCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColTOSLink = Column{
|
|
name: projection.PrivacyPolicyTOSLinkCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColHelpLink = Column{
|
|
name: projection.PrivacyPolicyHelpLinkCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColIsDefault = Column{
|
|
name: projection.PrivacyPolicyIsDefaultCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColState = Column{
|
|
name: projection.PrivacyPolicyStateCol,
|
|
table: privacyTable,
|
|
}
|
|
PrivacyColOwnerRemoved = Column{
|
|
name: projection.PrivacyPolicyOwnerRemovedCol,
|
|
table: privacyTable,
|
|
}
|
|
)
|
|
|
|
func (q *Queries) PrivacyPolicyByOrg(ctx context.Context, shouldTriggerBulk bool, orgID string, withOwnerRemoved bool) (*PrivacyPolicy, error) {
|
|
if shouldTriggerBulk {
|
|
projection.PrivacyPolicyProjection.Trigger(ctx)
|
|
}
|
|
eq := sq.Eq{PrivacyColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID()}
|
|
if !withOwnerRemoved {
|
|
eq[PrivacyColOwnerRemoved.identifier()] = false
|
|
}
|
|
stmt, scan := preparePrivacyPolicyQuery()
|
|
query, args, err := stmt.Where(
|
|
sq.And{
|
|
eq,
|
|
sq.Or{
|
|
sq.Eq{PrivacyColID.identifier(): orgID},
|
|
sq.Eq{PrivacyColID.identifier(): authz.GetInstance(ctx).InstanceID()},
|
|
},
|
|
}).
|
|
OrderBy(PrivacyColIsDefault.identifier()).Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-UXuPI", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
row := q.client.QueryRowContext(ctx, query, args...)
|
|
return scan(row)
|
|
}
|
|
|
|
func (q *Queries) DefaultPrivacyPolicy(ctx context.Context, shouldTriggerBulk bool) (*PrivacyPolicy, error) {
|
|
if shouldTriggerBulk {
|
|
projection.PrivacyPolicyProjection.Trigger(ctx)
|
|
}
|
|
|
|
stmt, scan := preparePrivacyPolicyQuery()
|
|
query, args, err := stmt.Where(sq.Eq{
|
|
PrivacyColID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
PrivacyColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
}).
|
|
OrderBy(PrivacyColIsDefault.identifier()).
|
|
Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-LkFZ7", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
row := q.client.QueryRowContext(ctx, query, args...)
|
|
return scan(row)
|
|
}
|
|
|
|
func preparePrivacyPolicyQuery() (sq.SelectBuilder, func(*sql.Row) (*PrivacyPolicy, error)) {
|
|
return sq.Select(
|
|
PrivacyColID.identifier(),
|
|
PrivacyColSequence.identifier(),
|
|
PrivacyColCreationDate.identifier(),
|
|
PrivacyColChangeDate.identifier(),
|
|
PrivacyColResourceOwner.identifier(),
|
|
PrivacyColPrivacyLink.identifier(),
|
|
PrivacyColTOSLink.identifier(),
|
|
PrivacyColHelpLink.identifier(),
|
|
PrivacyColIsDefault.identifier(),
|
|
PrivacyColState.identifier(),
|
|
).
|
|
From(privacyTable.identifier()).PlaceholderFormat(sq.Dollar),
|
|
func(row *sql.Row) (*PrivacyPolicy, error) {
|
|
policy := new(PrivacyPolicy)
|
|
err := row.Scan(
|
|
&policy.ID,
|
|
&policy.Sequence,
|
|
&policy.CreationDate,
|
|
&policy.ChangeDate,
|
|
&policy.ResourceOwner,
|
|
&policy.PrivacyLink,
|
|
&policy.TOSLink,
|
|
&policy.HelpLink,
|
|
&policy.IsDefault,
|
|
&policy.State,
|
|
)
|
|
if err != nil {
|
|
if errs.Is(err, sql.ErrNoRows) {
|
|
return nil, errors.ThrowNotFound(err, "QUERY-vNMHL", "Errors.PrivacyPolicy.NotFound")
|
|
}
|
|
return nil, errors.ThrowInternal(err, "QUERY-csrdo", "Errors.Internal")
|
|
}
|
|
return policy, nil
|
|
}
|
|
}
|
|
|
|
func (p *PrivacyPolicy) ToDomain() *domain.PrivacyPolicy {
|
|
return &domain.PrivacyPolicy{
|
|
TOSLink: p.TOSLink,
|
|
PrivacyLink: p.PrivacyLink,
|
|
HelpLink: p.HelpLink,
|
|
Default: p.IsDefault,
|
|
}
|
|
}
|