mirror of
https://github.com/zitadel/zitadel.git
synced 2025-07-13 01:00:51 +00:00

This PR summarizes multiple changes specifically only available with ZITADEL v3: - feat: Web Keys management (https://github.com/zitadel/zitadel/pull/9526) - fix(cmd): ensure proper working of mirror (https://github.com/zitadel/zitadel/pull/9509) - feat(Authz): system user support for permission check v2 (https://github.com/zitadel/zitadel/pull/9640) - chore(license): change from Apache to AGPL (https://github.com/zitadel/zitadel/pull/9597) - feat(console): list v2 sessions (https://github.com/zitadel/zitadel/pull/9539) - fix(console): add loginV2 feature flag (https://github.com/zitadel/zitadel/pull/9682) - fix(feature flags): allow reading "own" flags (https://github.com/zitadel/zitadel/pull/9649) - feat(console): add Actions V2 UI (https://github.com/zitadel/zitadel/pull/9591) BREAKING CHANGE - feat(webkey): migrate to v2beta API (https://github.com/zitadel/zitadel/pull/9445) - chore!: remove CockroachDB Support (https://github.com/zitadel/zitadel/pull/9444) - feat(actions): migrate to v2beta API (https://github.com/zitadel/zitadel/pull/9489) --------- Co-authored-by: Livio Spring <livio.a@gmail.com> Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com> Co-authored-by: Silvan <27845747+adlerhurst@users.noreply.github.com> Co-authored-by: Ramon <mail@conblem.me> Co-authored-by: Elio Bischof <elio@zitadel.com> Co-authored-by: Kenta Yamaguchi <56732734+KEY60228@users.noreply.github.com> Co-authored-by: Harsha Reddy <harsha.reddy@klaviyo.com> Co-authored-by: Livio Spring <livio@zitadel.com> Co-authored-by: Max Peintner <max@caos.ch> Co-authored-by: Iraq <66622793+kkrime@users.noreply.github.com> Co-authored-by: Florian Forster <florian@zitadel.com> Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> Co-authored-by: Max Peintner <peintnerm@gmail.com>
185 lines
5.3 KiB
Go
185 lines
5.3 KiB
Go
package query
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"errors"
|
|
"time"
|
|
|
|
sq "github.com/Masterminds/squirrel"
|
|
"github.com/zitadel/logging"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/eventstore/handler/v2"
|
|
"github.com/zitadel/zitadel/internal/query/projection"
|
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
|
"github.com/zitadel/zitadel/internal/zerrors"
|
|
)
|
|
|
|
type PasswordAgePolicy struct {
|
|
ID string
|
|
Sequence uint64
|
|
CreationDate time.Time
|
|
ChangeDate time.Time
|
|
ResourceOwner string
|
|
State domain.PolicyState
|
|
|
|
ExpireWarnDays uint64
|
|
MaxAgeDays uint64
|
|
|
|
IsDefault bool
|
|
}
|
|
|
|
var (
|
|
passwordAgeTable = table{
|
|
name: projection.PasswordAgeTable,
|
|
instanceIDCol: projection.AgePolicyInstanceIDCol,
|
|
}
|
|
PasswordAgeColID = Column{
|
|
name: projection.AgePolicyIDCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColSequence = Column{
|
|
name: projection.AgePolicySequenceCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColCreationDate = Column{
|
|
name: projection.AgePolicyCreationDateCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColChangeDate = Column{
|
|
name: projection.AgePolicyChangeDateCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColResourceOwner = Column{
|
|
name: projection.AgePolicyResourceOwnerCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColInstanceID = Column{
|
|
name: projection.AgePolicyInstanceIDCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColWarnDays = Column{
|
|
name: projection.AgePolicyExpireWarnDaysCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColMaxAge = Column{
|
|
name: projection.AgePolicyMaxAgeDaysCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColIsDefault = Column{
|
|
name: projection.AgePolicyIsDefaultCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColState = Column{
|
|
name: projection.AgePolicyStateCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColOwnerRemoved = Column{
|
|
name: projection.AgePolicyOwnerRemovedCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
)
|
|
|
|
func (q *Queries) PasswordAgePolicyByOrg(ctx context.Context, shouldTriggerBulk bool, orgID string, withOwnerRemoved bool) (policy *PasswordAgePolicy, err error) {
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
defer func() { span.EndWithError(err) }()
|
|
|
|
if shouldTriggerBulk {
|
|
_, traceSpan := tracing.NewNamedSpan(ctx, "TriggerPasswordAgeProjection")
|
|
ctx, err = projection.PasswordAgeProjection.Trigger(ctx, handler.WithAwaitRunning())
|
|
logging.OnError(err).Debug("trigger failed")
|
|
traceSpan.EndWithError(err)
|
|
}
|
|
eq := sq.Eq{PasswordAgeColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID()}
|
|
if !withOwnerRemoved {
|
|
eq[PasswordAgeColOwnerRemoved.identifier()] = false
|
|
}
|
|
stmt, scan := preparePasswordAgePolicyQuery()
|
|
query, args, err := stmt.Where(
|
|
sq.And{
|
|
eq,
|
|
sq.Or{
|
|
sq.Eq{PasswordAgeColID.identifier(): orgID},
|
|
sq.Eq{PasswordAgeColID.identifier(): authz.GetInstance(ctx).InstanceID()},
|
|
},
|
|
}).
|
|
OrderBy(PasswordAgeColIsDefault.identifier()).
|
|
Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, zerrors.ThrowInternal(err, "QUERY-SKR6X", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
err = q.client.QueryRowContext(ctx, func(row *sql.Row) error {
|
|
policy, err = scan(row)
|
|
return err
|
|
}, query, args...)
|
|
return policy, err
|
|
}
|
|
|
|
func (q *Queries) DefaultPasswordAgePolicy(ctx context.Context, shouldTriggerBulk bool) (policy *PasswordAgePolicy, err error) {
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
defer func() { span.EndWithError(err) }()
|
|
|
|
if shouldTriggerBulk {
|
|
_, traceSpan := tracing.NewNamedSpan(ctx, "TriggerPasswordAgeProjection")
|
|
ctx, err = projection.PasswordAgeProjection.Trigger(ctx, handler.WithAwaitRunning())
|
|
logging.OnError(err).Debug("trigger failed")
|
|
traceSpan.EndWithError(err)
|
|
}
|
|
|
|
stmt, scan := preparePasswordAgePolicyQuery()
|
|
query, args, err := stmt.Where(sq.Eq{
|
|
PasswordAgeColID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
}).
|
|
OrderBy(PasswordAgeColIsDefault.identifier()).
|
|
Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, zerrors.ThrowInternal(err, "QUERY-mN0Ci", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
err = q.client.QueryRowContext(ctx, func(row *sql.Row) error {
|
|
policy, err = scan(row)
|
|
return err
|
|
}, query, args...)
|
|
return policy, err
|
|
}
|
|
|
|
func preparePasswordAgePolicyQuery() (sq.SelectBuilder, func(*sql.Row) (*PasswordAgePolicy, error)) {
|
|
return sq.Select(
|
|
PasswordAgeColID.identifier(),
|
|
PasswordAgeColSequence.identifier(),
|
|
PasswordAgeColCreationDate.identifier(),
|
|
PasswordAgeColChangeDate.identifier(),
|
|
PasswordAgeColResourceOwner.identifier(),
|
|
PasswordAgeColWarnDays.identifier(),
|
|
PasswordAgeColMaxAge.identifier(),
|
|
PasswordAgeColIsDefault.identifier(),
|
|
PasswordAgeColState.identifier(),
|
|
).
|
|
From(passwordAgeTable.identifier()).
|
|
PlaceholderFormat(sq.Dollar),
|
|
func(row *sql.Row) (*PasswordAgePolicy, error) {
|
|
policy := new(PasswordAgePolicy)
|
|
err := row.Scan(
|
|
&policy.ID,
|
|
&policy.Sequence,
|
|
&policy.CreationDate,
|
|
&policy.ChangeDate,
|
|
&policy.ResourceOwner,
|
|
&policy.ExpireWarnDays,
|
|
&policy.MaxAgeDays,
|
|
&policy.IsDefault,
|
|
&policy.State,
|
|
)
|
|
if err != nil {
|
|
if errors.Is(err, sql.ErrNoRows) {
|
|
return nil, zerrors.ThrowNotFound(err, "QUERY-ShCWRnWJfH", "Errors.IAM.PasswordAgePolicy.NotFound")
|
|
}
|
|
return nil, zerrors.ThrowInternal(err, "QUERY-6nj7Bm4fxT", "Errors.Internal")
|
|
}
|
|
return policy, nil
|
|
}
|
|
}
|