mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 19:14:23 +00:00
21ffe1b0cb
* fix: split command query side * fix: split command query side * fix: members in correct pkg structure * fix: label policy in correct pkg structure * fix: structure * fix: structure of login policy * fix: identityprovider structure * fix: org iam policy structure * fix: password age policy structure * fix: password complexity policy structure * fix: password lockout policy structure * fix: idp structure * fix: user events structure * fix: user write model * fix: profile email changed command * fix: address changed command * fix: user states * fix: user * fix: org structure and add human * begin iam setup command side * setup * step2 * step2 * fix: add user * step2 * isvalid * fix: folder structure v2 business Co-authored-by: Fabiennne <fabienne.gerschwiler@gmail.com>
116 lines
3.1 KiB
Go
116 lines
3.1 KiB
Go
package command
|
|
|
|
import (
|
|
"context"
|
|
"github.com/caos/zitadel/internal/crypto"
|
|
"github.com/caos/zitadel/internal/eventstore/v2"
|
|
"github.com/caos/zitadel/internal/v2/domain"
|
|
"github.com/caos/zitadel/internal/v2/repository/iam"
|
|
"reflect"
|
|
)
|
|
|
|
type IDPOIDCConfigWriteModel struct {
|
|
OIDCConfigWriteModel
|
|
}
|
|
|
|
func NewIDPOIDCConfigWriteModel(iamID, idpConfigID string) *IDPOIDCConfigWriteModel {
|
|
return &IDPOIDCConfigWriteModel{
|
|
OIDCConfigWriteModel{
|
|
WriteModel: eventstore.WriteModel{
|
|
AggregateID: iamID,
|
|
},
|
|
IDPConfigID: idpConfigID,
|
|
},
|
|
}
|
|
}
|
|
|
|
func (wm *IDPOIDCConfigWriteModel) AppendEvents(events ...eventstore.EventReader) {
|
|
for _, event := range events {
|
|
switch e := event.(type) {
|
|
case *iam.IDPOIDCConfigAddedEvent:
|
|
if wm.IDPConfigID != e.IDPConfigID {
|
|
continue
|
|
}
|
|
wm.OIDCConfigWriteModel.AppendEvents(&e.OIDCConfigAddedEvent)
|
|
case *iam.IDPOIDCConfigChangedEvent:
|
|
if wm.IDPConfigID != e.IDPConfigID {
|
|
continue
|
|
}
|
|
wm.OIDCConfigWriteModel.AppendEvents(&e.OIDCConfigChangedEvent)
|
|
case *iam.IDPConfigReactivatedEvent:
|
|
if wm.IDPConfigID != e.ConfigID {
|
|
continue
|
|
}
|
|
wm.OIDCConfigWriteModel.AppendEvents(&e.IDPConfigReactivatedEvent)
|
|
case *iam.IDPConfigDeactivatedEvent:
|
|
if wm.IDPConfigID != e.ConfigID {
|
|
continue
|
|
}
|
|
wm.OIDCConfigWriteModel.AppendEvents(&e.IDPConfigDeactivatedEvent)
|
|
case *iam.IDPConfigRemovedEvent:
|
|
if wm.IDPConfigID != e.ConfigID {
|
|
continue
|
|
}
|
|
wm.OIDCConfigWriteModel.AppendEvents(&e.IDPConfigRemovedEvent)
|
|
default:
|
|
wm.OIDCConfigWriteModel.AppendEvents(e)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (wm *IDPOIDCConfigWriteModel) Reduce() error {
|
|
if err := wm.OIDCConfigWriteModel.Reduce(); err != nil {
|
|
return err
|
|
}
|
|
return wm.WriteModel.Reduce()
|
|
}
|
|
|
|
func (wm *IDPOIDCConfigWriteModel) Query() *eventstore.SearchQueryBuilder {
|
|
return eventstore.NewSearchQueryBuilder(eventstore.ColumnsEvent, iam.AggregateType).
|
|
AggregateIDs(wm.AggregateID)
|
|
}
|
|
|
|
func (wm *IDPOIDCConfigWriteModel) NewChangedEvent(
|
|
ctx context.Context,
|
|
clientID,
|
|
issuer,
|
|
clientSecretString string,
|
|
secretCrypto crypto.Crypto,
|
|
idpDisplayNameMapping,
|
|
userNameMapping domain.OIDCMappingField,
|
|
scopes ...string,
|
|
) (*iam.IDPOIDCConfigChangedEvent, bool, error) {
|
|
hasChanged := false
|
|
changedEvent := iam.NewIDPOIDCConfigChangedEvent(ctx)
|
|
var clientSecret *crypto.CryptoValue
|
|
var err error
|
|
if clientSecretString != "" {
|
|
clientSecret, err = crypto.Crypt([]byte(clientSecretString), secretCrypto)
|
|
if err != nil {
|
|
return nil, false, err
|
|
}
|
|
changedEvent.ClientSecret = clientSecret
|
|
}
|
|
if wm.ClientID != clientID {
|
|
hasChanged = true
|
|
changedEvent.ClientID = clientID
|
|
}
|
|
if wm.Issuer != issuer {
|
|
hasChanged = true
|
|
changedEvent.Issuer = issuer
|
|
}
|
|
if idpDisplayNameMapping.Valid() && wm.IDPDisplayNameMapping != idpDisplayNameMapping {
|
|
hasChanged = true
|
|
changedEvent.IDPDisplayNameMapping = idpDisplayNameMapping
|
|
}
|
|
if userNameMapping.Valid() && wm.UserNameMapping != userNameMapping {
|
|
hasChanged = true
|
|
changedEvent.UserNameMapping = userNameMapping
|
|
}
|
|
if reflect.DeepEqual(wm.Scopes, scopes) {
|
|
hasChanged = true
|
|
changedEvent.Scopes = scopes
|
|
}
|
|
return changedEvent, hasChanged, nil
|
|
}
|