mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-16 04:48:04 +00:00
8f6cb47567
* take baseurl if saved on event * refactor: make es mocks reusable * Revert "refactor: make es mocks reusable" This reverts commit434ce12a6a
. * make messages testable * test asset url * fmt * fmt * simplify notification.Start * test url combinations * support init code added * support password changed * support reset pw * support user domain claimed * support add pwless login * support verify phone * Revert "support verify phone" This reverts commite40503303e
. * save trigger origin from ctx * add ready for review check * camel * test email otp * fix variable naming * fix DefaultOTPEmailURLV2 * Revert "fix DefaultOTPEmailURLV2" This reverts commitfa34d4d2a8
. * fix email otp challenged test * fix email otp challenged test * pass origin in login and gateway requests * take origin from header * take x-forwarded if present * Update internal/notification/handlers/queries.go Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> * Update internal/notification/handlers/commands.go Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> * move origin header to ctx if available * generate * cleanup * use forwarded header * support X-Forwarded-* headers * standardize context handling * fix linting --------- Co-authored-by: Tim Möhlmann <tim+github@zitadel.com>
58 lines
1.6 KiB
Go
58 lines
1.6 KiB
Go
package handlers
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net/url"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
http_utils "github.com/zitadel/zitadel/internal/api/http"
|
|
"github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/eventstore"
|
|
"github.com/zitadel/zitadel/internal/query"
|
|
)
|
|
|
|
type OriginEvent interface {
|
|
eventstore.Event
|
|
TriggerOrigin() string
|
|
}
|
|
|
|
func (n *NotificationQueries) Origin(ctx context.Context, e eventstore.Event) (context.Context, error) {
|
|
originEvent, ok := e.(OriginEvent)
|
|
if !ok {
|
|
return ctx, errors.ThrowInternal(fmt.Errorf("event of type %T doesn't implement OriginEvent", e), "NOTIF-3m9fs", "Errors.Internal")
|
|
}
|
|
origin := originEvent.TriggerOrigin()
|
|
if origin != "" {
|
|
originURL, err := url.Parse(origin)
|
|
if err != nil {
|
|
return ctx, err
|
|
}
|
|
return enrichCtx(ctx, originURL.Hostname(), origin), nil
|
|
}
|
|
primary, err := query.NewInstanceDomainPrimarySearchQuery(true)
|
|
if err != nil {
|
|
return ctx, err
|
|
}
|
|
domains, err := n.SearchInstanceDomains(ctx, &query.InstanceDomainSearchQueries{
|
|
Queries: []query.SearchQuery{primary},
|
|
})
|
|
if err != nil {
|
|
return ctx, err
|
|
}
|
|
if len(domains.Domains) < 1 {
|
|
return ctx, errors.ThrowInternal(nil, "NOTIF-Ef3r1", "Errors.Notification.NoDomain")
|
|
}
|
|
return enrichCtx(
|
|
ctx,
|
|
domains.Domains[0].Domain,
|
|
http_utils.BuildHTTP(domains.Domains[0].Domain, n.externalPort, n.externalSecure),
|
|
), nil
|
|
}
|
|
|
|
func enrichCtx(ctx context.Context, host, origin string) context.Context {
|
|
ctx = authz.WithRequestedDomain(ctx, host)
|
|
ctx = http_utils.WithComposedOrigin(ctx, origin)
|
|
return ctx
|
|
}
|