mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-15 20:38:00 +00:00
fb162a7d75
# Which Problems Are Solved During the implementation of #7486 it was noticed, that projections in the `auth` database schema could be blocked. Investigations suggested, that this is due to the use of [GORM](https://gorm.io/index.html) and it's inability to use an existing (sql) transaction. With the improved / simplified handling (see below) there should also be a minimal improvement in performance, resp. reduced database update statements. # How the Problems Are Solved The handlers in `auth` are exchanged to proper (sql) statements and gorm usage is removed for any writing part. To further improve / simplify the handling of the users, a new `auth.users3` table is created, where only attributes are handled, which are not yet available from the `projections.users`, `projections.login_name` and `projections.user_auth_methods` do not provide. This reduces the events handled in that specific handler by a lot. # Additional Changes None # Additional Context relates to #7486
362 lines
12 KiB
Go
362 lines
12 KiB
Go
package handler
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/muhlemmer/gu"
|
|
"github.com/zitadel/logging"
|
|
|
|
auth_view "github.com/zitadel/zitadel/internal/auth/repository/eventsourcing/view"
|
|
"github.com/zitadel/zitadel/internal/eventstore"
|
|
"github.com/zitadel/zitadel/internal/eventstore/handler/v2"
|
|
es_models "github.com/zitadel/zitadel/internal/eventstore/v1/models"
|
|
proj_model "github.com/zitadel/zitadel/internal/project/model"
|
|
project_es_model "github.com/zitadel/zitadel/internal/project/repository/eventsourcing/model"
|
|
proj_view "github.com/zitadel/zitadel/internal/project/repository/view"
|
|
"github.com/zitadel/zitadel/internal/repository/instance"
|
|
"github.com/zitadel/zitadel/internal/repository/org"
|
|
"github.com/zitadel/zitadel/internal/repository/project"
|
|
"github.com/zitadel/zitadel/internal/repository/user"
|
|
view_model "github.com/zitadel/zitadel/internal/user/repository/view/model"
|
|
"github.com/zitadel/zitadel/internal/zerrors"
|
|
)
|
|
|
|
const (
|
|
tokenTable = "auth.tokens"
|
|
)
|
|
|
|
var _ handler.Projection = (*Token)(nil)
|
|
|
|
type Token struct {
|
|
view *auth_view.View
|
|
es handler.EventStore
|
|
}
|
|
|
|
func newToken(
|
|
ctx context.Context,
|
|
config handler.Config,
|
|
view *auth_view.View,
|
|
) *handler.Handler {
|
|
return handler.NewHandler(
|
|
ctx,
|
|
&config,
|
|
&Token{
|
|
view: view,
|
|
es: config.Eventstore,
|
|
},
|
|
)
|
|
}
|
|
|
|
// Name implements [handler.Projection]
|
|
func (*Token) Name() string {
|
|
return tokenTable
|
|
}
|
|
|
|
// Reducers implements [handler.Projection]
|
|
func (t *Token) Reducers() []handler.AggregateReducer {
|
|
return []handler.AggregateReducer{
|
|
{
|
|
Aggregate: user.AggregateType,
|
|
EventReducers: []handler.EventReducer{
|
|
{
|
|
Event: user.PersonalAccessTokenAddedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.UserTokenAddedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.UserV1ProfileChangedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.HumanProfileChangedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.UserV1SignedOutType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.HumanSignedOutType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.UserLockedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.UserDeactivatedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.UserRemovedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.UserTokenRemovedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.PersonalAccessTokenRemovedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: user.HumanRefreshTokenRemovedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Aggregate: project.AggregateType,
|
|
EventReducers: []handler.EventReducer{
|
|
{
|
|
Event: project.ApplicationDeactivatedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: project.ApplicationRemovedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: project.ProjectDeactivatedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
{
|
|
Event: project.ProjectRemovedType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Aggregate: org.AggregateType,
|
|
EventReducers: []handler.EventReducer{
|
|
{
|
|
Event: org.OrgRemovedEventType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Aggregate: instance.AggregateType,
|
|
EventReducers: []handler.EventReducer{
|
|
{
|
|
Event: instance.InstanceRemovedEventType,
|
|
Reduce: t.Reduce,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func (t *Token) Reduce(event eventstore.Event) (_ *handler.Statement, err error) { //nolint:gocognit
|
|
// in case anything needs to be change here check if appendEvent function needs the change as well
|
|
switch event.Type() {
|
|
case user.UserTokenAddedType:
|
|
e, ok := event.(*user.UserTokenAddedEvent)
|
|
if !ok {
|
|
return nil, zerrors.ThrowInvalidArgumentf(nil, "MODEL-W4tnq", "reduce.wrong.event.type %s", user.UserTokenAddedType)
|
|
}
|
|
return handler.NewCreateStatement(event,
|
|
[]handler.Column{
|
|
handler.NewCol(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCol(view_model.TokenKeyUserID, event.Aggregate().ID),
|
|
handler.NewCol(view_model.TokenKeyResourceOwner, event.Aggregate().ResourceOwner),
|
|
handler.NewCol(view_model.TokenKeyID, e.TokenID),
|
|
handler.NewCol(view_model.TokenKeyCreationDate, event.CreatedAt()),
|
|
handler.NewCol(view_model.TokenKeyChangeDate, event.CreatedAt()),
|
|
handler.NewCol(view_model.TokenKeySequence, event.Sequence()),
|
|
handler.NewCol(view_model.TokenKeyApplicationID, e.ApplicationID),
|
|
handler.NewCol(view_model.TokenKeyUserAgentID, e.UserAgentID),
|
|
handler.NewCol(view_model.TokenKeyAudience, e.Audience),
|
|
handler.NewCol(view_model.TokenKeyScopes, e.Scopes),
|
|
handler.NewCol(view_model.TokenKeyExpiration, e.Expiration),
|
|
handler.NewCol(view_model.TokenKeyPreferredLanguage, e.PreferredLanguage),
|
|
handler.NewCol(view_model.TokenKeyRefreshTokenID, e.RefreshTokenID),
|
|
handler.NewCol(view_model.TokenKeyActor, view_model.TokenActor{TokenActor: e.Actor}),
|
|
handler.NewCol(view_model.TokenKeyIsPat, false),
|
|
},
|
|
), nil
|
|
case user.PersonalAccessTokenAddedType:
|
|
e, ok := event.(*user.PersonalAccessTokenAddedEvent)
|
|
if !ok {
|
|
return nil, zerrors.ThrowInvalidArgumentf(nil, "MODEL-zF3rb", "reduce.wrong.event.type %s", user.PersonalAccessTokenAddedType)
|
|
}
|
|
return handler.NewCreateStatement(event,
|
|
[]handler.Column{
|
|
handler.NewCol(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCol(view_model.TokenKeyUserID, event.Aggregate().ID),
|
|
handler.NewCol(view_model.TokenKeyResourceOwner, event.Aggregate().ResourceOwner),
|
|
handler.NewCol(view_model.TokenKeyID, e.TokenID),
|
|
handler.NewCol(view_model.TokenKeyCreationDate, event.CreatedAt()),
|
|
handler.NewCol(view_model.TokenKeyChangeDate, event.CreatedAt()),
|
|
handler.NewCol(view_model.TokenKeySequence, event.Sequence()),
|
|
handler.NewCol(view_model.TokenKeyScopes, e.Scopes),
|
|
handler.NewCol(view_model.TokenKeyExpiration, e.Expiration),
|
|
handler.NewCol(view_model.TokenKeyIsPat, true),
|
|
},
|
|
), nil
|
|
case user.UserV1ProfileChangedType,
|
|
user.HumanProfileChangedType:
|
|
e, ok := event.(*user.HumanProfileChangedEvent)
|
|
if !ok {
|
|
return nil, zerrors.ThrowInvalidArgumentf(nil, "MODEL-ASF2t", "reduce.wrong.event.type %s", user.HumanProfileChangedType)
|
|
}
|
|
if e.PreferredLanguage == nil {
|
|
return handler.NewNoOpStatement(event), nil
|
|
}
|
|
return handler.NewUpdateStatement(event,
|
|
[]handler.Column{
|
|
handler.NewCol(view_model.TokenKeyPreferredLanguage, gu.Value(e.PreferredLanguage).String()),
|
|
handler.NewCol(view_model.TokenKeyChangeDate, event.CreatedAt()),
|
|
handler.NewCol(view_model.TokenKeySequence, event.Sequence()),
|
|
},
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, e.Aggregate().InstanceID),
|
|
handler.NewCond(view_model.TokenKeyUserID, e.Aggregate().ID),
|
|
},
|
|
), nil
|
|
case user.UserV1SignedOutType,
|
|
user.HumanSignedOutType:
|
|
e, ok := event.(*user.HumanSignedOutEvent)
|
|
if !ok {
|
|
return nil, zerrors.ThrowInvalidArgumentf(nil, "MODEL-Wtn2q", "reduce.wrong.event.type %s", user.HumanSignedOutType)
|
|
}
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCond(view_model.TokenKeyUserID, event.Aggregate().ID),
|
|
handler.NewCond(view_model.TokenKeyUserAgentID, e.UserAgentID),
|
|
},
|
|
), nil
|
|
case user.UserLockedType,
|
|
user.UserDeactivatedType,
|
|
user.UserRemovedType:
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCond(view_model.TokenKeyUserID, event.Aggregate().ID),
|
|
},
|
|
), nil
|
|
case user.UserTokenRemovedType,
|
|
user.PersonalAccessTokenRemovedType:
|
|
var tokenID string
|
|
switch e := event.(type) {
|
|
case *user.UserTokenRemovedEvent:
|
|
tokenID = e.TokenID
|
|
case *user.PersonalAccessTokenRemovedEvent:
|
|
tokenID = e.TokenID
|
|
default:
|
|
return nil, zerrors.ThrowInvalidArgumentf(nil, "MODEL-SF3ga", "reduce.wrong.event.type %s", user.UserTokenRemovedType)
|
|
}
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCond(view_model.TokenKeyID, tokenID),
|
|
},
|
|
), nil
|
|
case user.HumanRefreshTokenRemovedType:
|
|
e, ok := event.(*user.HumanRefreshTokenRemovedEvent)
|
|
if !ok {
|
|
return nil, zerrors.ThrowInvalidArgumentf(nil, "MODEL-Sfe11", "reduce.wrong.event.type %s", user.HumanRefreshTokenRemovedType)
|
|
}
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCond(view_model.TokenKeyRefreshTokenID, e.TokenID),
|
|
},
|
|
), nil
|
|
case project.ApplicationDeactivatedType,
|
|
project.ApplicationRemovedType:
|
|
var applicationID string
|
|
switch e := event.(type) {
|
|
case *project.ApplicationDeactivatedEvent:
|
|
applicationID = e.AppID
|
|
case *project.ApplicationRemovedEvent:
|
|
applicationID = e.AppID
|
|
default:
|
|
return nil, zerrors.ThrowInvalidArgumentf(nil, "MODEL-SF3fq", "reduce.wrong.event.type %v", []eventstore.EventType{project.ApplicationDeactivatedType, project.ApplicationRemovedType})
|
|
}
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCond(view_model.TokenKeyApplicationID, applicationID),
|
|
},
|
|
), nil
|
|
case project.ProjectDeactivatedType,
|
|
project.ProjectRemovedType:
|
|
project, err := t.getProjectByID(context.Background(), event.Aggregate().ID, event.Aggregate().InstanceID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
applicationIDs := make([]string, 0, len(project.Applications))
|
|
for _, app := range project.Applications {
|
|
if app.OIDCConfig != nil && app.OIDCConfig.ClientID != "" {
|
|
applicationIDs = append(applicationIDs, app.OIDCConfig.ClientID)
|
|
}
|
|
}
|
|
if len(applicationIDs) == 0 {
|
|
return handler.NewNoOpStatement(event), nil
|
|
}
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewOneOfTextCond(view_model.TokenKeyApplicationID, applicationIDs),
|
|
},
|
|
), nil
|
|
case instance.InstanceRemovedEventType:
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
},
|
|
), nil
|
|
case org.OrgRemovedEventType:
|
|
return handler.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(view_model.TokenKeyInstanceID, event.Aggregate().InstanceID),
|
|
handler.NewCond(view_model.TokenKeyResourceOwner, event.Aggregate().ResourceOwner),
|
|
},
|
|
), nil
|
|
default:
|
|
return handler.NewNoOpStatement(event), nil
|
|
}
|
|
}
|
|
|
|
type userAgentIDPayload struct {
|
|
ID string `json:"userAgentID"`
|
|
}
|
|
|
|
func agentIDFromSession(event eventstore.Event) (string, error) {
|
|
payload := new(userAgentIDPayload)
|
|
if err := event.Unmarshal(payload); err != nil {
|
|
logging.WithError(err).Error("could not unmarshal event data")
|
|
return "", zerrors.ThrowInternal(nil, "MODEL-sd325", "could not unmarshal data")
|
|
}
|
|
return payload.ID, nil
|
|
}
|
|
|
|
func (t *Token) getProjectByID(ctx context.Context, projID, instanceID string) (*proj_model.Project, error) {
|
|
query, err := proj_view.ProjectByIDQuery(projID, instanceID, 0)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
esProject := &project_es_model.Project{
|
|
ObjectRoot: es_models.ObjectRoot{
|
|
AggregateID: projID,
|
|
},
|
|
}
|
|
events, err := t.es.Filter(ctx, query)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err = esProject.AppendEvents(events...); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if esProject.Sequence == 0 {
|
|
return nil, zerrors.ThrowNotFound(nil, "EVENT-Dsdw2", "Errors.Project.NotFound")
|
|
}
|
|
return project_es_model.ProjectToModel(esProject), nil
|
|
}
|