mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 11:04:25 +00:00
08bfec6652
* fix: handle ListMyProjectOrgsRequestToModel queries * fix: sort orgs for admin org list by org name * fix: features converters * fix: remove last role from user grant * fix: ensure limit * fix: ensure limit Co-authored-by: Livio Amstutz <livio.a@gmail.com>
170 lines
4.9 KiB
Go
170 lines
4.9 KiB
Go
package features
|
|
|
|
import (
|
|
"encoding/json"
|
|
"time"
|
|
|
|
"github.com/caos/zitadel/internal/domain"
|
|
"github.com/caos/zitadel/internal/errors"
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
"github.com/caos/zitadel/internal/eventstore/repository"
|
|
)
|
|
|
|
const (
|
|
featuresPrefix = "features."
|
|
FeaturesSetEventType = featuresPrefix + "set"
|
|
FeaturesRemovedEventType = featuresPrefix + "removed"
|
|
)
|
|
|
|
type FeaturesSetEvent struct {
|
|
eventstore.BaseEvent `json:"-"`
|
|
|
|
TierName *string `json:"tierName,omitempty"`
|
|
TierDescription *string `json:"tierDescription,omitempty"`
|
|
State *domain.FeaturesState `json:"state,omitempty"`
|
|
StateDescription *string `json:"stateDescription,omitempty"`
|
|
AuditLogRetention *time.Duration `json:"auditLogRetention,omitempty"`
|
|
LoginPolicyFactors *bool `json:"loginPolicyFactors,omitempty"`
|
|
LoginPolicyIDP *bool `json:"loginPolicyIDP,omitempty"`
|
|
LoginPolicyPasswordless *bool `json:"loginPolicyPasswordless,omitempty"`
|
|
LoginPolicyRegistration *bool `json:"loginPolicyRegistration,omitempty"`
|
|
LoginPolicyUsernameLogin *bool `json:"loginPolicyUsernameLogin,omitempty"`
|
|
PasswordComplexityPolicy *bool `json:"passwordComplexityPolicy,omitempty"`
|
|
LabelPolicy *bool `json:"labelPolicy,omitempty"`
|
|
}
|
|
|
|
func (e *FeaturesSetEvent) Data() interface{} {
|
|
return e
|
|
}
|
|
|
|
func (e *FeaturesSetEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
return nil
|
|
}
|
|
|
|
func NewFeaturesSetEvent(
|
|
base *eventstore.BaseEvent,
|
|
changes []FeaturesChanges,
|
|
) (*FeaturesSetEvent, error) {
|
|
if len(changes) == 0 {
|
|
return nil, errors.ThrowPreconditionFailed(nil, "FEATURES-d34F4", "Errors.NoChangesFound")
|
|
}
|
|
changeEvent := &FeaturesSetEvent{
|
|
BaseEvent: *base,
|
|
}
|
|
for _, change := range changes {
|
|
change(changeEvent)
|
|
}
|
|
return changeEvent, nil
|
|
}
|
|
|
|
type FeaturesChanges func(*FeaturesSetEvent)
|
|
|
|
func ChangeTierName(tierName string) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.TierName = &tierName
|
|
}
|
|
}
|
|
|
|
func ChangeTierDescription(tierDescription string) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.TierDescription = &tierDescription
|
|
}
|
|
}
|
|
|
|
func ChangeState(State domain.FeaturesState) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.State = &State
|
|
}
|
|
}
|
|
|
|
func ChangeStateDescription(statusDescription string) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.StateDescription = &statusDescription
|
|
}
|
|
}
|
|
|
|
func ChangeAuditLogRetention(retention time.Duration) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.AuditLogRetention = &retention
|
|
}
|
|
}
|
|
|
|
func ChangeLoginPolicyFactors(loginPolicyFactors bool) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.LoginPolicyFactors = &loginPolicyFactors
|
|
}
|
|
}
|
|
|
|
func ChangeLoginPolicyIDP(loginPolicyIDP bool) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.LoginPolicyIDP = &loginPolicyIDP
|
|
}
|
|
}
|
|
|
|
func ChangeLoginPolicyPasswordless(loginPolicyPasswordless bool) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.LoginPolicyPasswordless = &loginPolicyPasswordless
|
|
}
|
|
}
|
|
|
|
func ChangeLoginPolicyRegistration(loginPolicyRegistration bool) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.LoginPolicyRegistration = &loginPolicyRegistration
|
|
}
|
|
}
|
|
|
|
func ChangeLoginPolicyUsernameLogin(loginPolicyUsernameLogin bool) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.LoginPolicyUsernameLogin = &loginPolicyUsernameLogin
|
|
}
|
|
}
|
|
|
|
func ChangePasswordComplexityPolicy(passwordComplexityPolicy bool) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.PasswordComplexityPolicy = &passwordComplexityPolicy
|
|
}
|
|
}
|
|
|
|
func ChangeLabelPolicy(labelPolicy bool) func(event *FeaturesSetEvent) {
|
|
return func(e *FeaturesSetEvent) {
|
|
e.LabelPolicy = &labelPolicy
|
|
}
|
|
}
|
|
|
|
func FeaturesSetEventMapper(event *repository.Event) (eventstore.EventReader, error) {
|
|
e := &FeaturesSetEvent{
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
}
|
|
|
|
err := json.Unmarshal(event.Data, e)
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "FEATURES-fdgDg", "unable to unmarshal features")
|
|
}
|
|
|
|
return e, nil
|
|
}
|
|
|
|
type FeaturesRemovedEvent struct {
|
|
eventstore.BaseEvent `json:"-"`
|
|
}
|
|
|
|
func (e *FeaturesRemovedEvent) Data() interface{} {
|
|
return nil
|
|
}
|
|
|
|
func (e *FeaturesRemovedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
return nil
|
|
}
|
|
|
|
func NewFeaturesRemovedEvent(base *eventstore.BaseEvent) *FeaturesRemovedEvent {
|
|
return &FeaturesRemovedEvent{
|
|
BaseEvent: *base,
|
|
}
|
|
}
|
|
|
|
func FeaturesRemovedEventMapper(event *repository.Event) (eventstore.EventReader, error) {
|
|
return &FeaturesRemovedEvent{
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
}, nil
|
|
}
|