zitadel/internal/query/projection/password_complexity_policy.go
Livio Amstutz 56b916a2b0
feat: projections auto create their tables (#3324)
* begin init checks for projections

* first projection checks

* debug notification providers with query fixes

* more projections and first index

* more projections

* more projections

* finish projections

* fix tests (remove db name)

* create tables in setup

* fix logging / error handling

* add tenant to views

* rename tenant to instance_id

* add instance_id to all projections

* add instance_id to all queries

* correct instance_id on projections

* add instance_id to failed_events

* use separate context for instance

* implement features projection

* implement features projection

* remove unique constraint from setup when migration failed

* add error to failed setup event

* add instance_id to primary keys

* fix IAM projection

* remove old migrations folder

* fix keysFromYAML test
2022-03-23 09:02:39 +01:00

180 lines
7.1 KiB
Go

package projection
import (
"context"
"github.com/caos/zitadel/internal/domain"
"github.com/caos/zitadel/internal/errors"
"github.com/caos/zitadel/internal/eventstore"
"github.com/caos/zitadel/internal/eventstore/handler"
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
"github.com/caos/zitadel/internal/repository/iam"
"github.com/caos/zitadel/internal/repository/org"
"github.com/caos/zitadel/internal/repository/policy"
)
const (
PasswordComplexityTable = "projections.password_complexity_policies"
ComplexityPolicyIDCol = "id"
ComplexityPolicyCreationDateCol = "creation_date"
ComplexityPolicyChangeDateCol = "change_date"
ComplexityPolicySequenceCol = "sequence"
ComplexityPolicyStateCol = "state"
ComplexityPolicyIsDefaultCol = "is_default"
ComplexityPolicyResourceOwnerCol = "resource_owner"
ComplexityPolicyInstanceIDCol = "instance_id"
ComplexityPolicyMinLengthCol = "min_length"
ComplexityPolicyHasLowercaseCol = "has_lowercase"
ComplexityPolicyHasUppercaseCol = "has_uppercase"
ComplexityPolicyHasSymbolCol = "has_symbol"
ComplexityPolicyHasNumberCol = "has_number"
)
type PasswordComplexityProjection struct {
crdb.StatementHandler
}
func NewPasswordComplexityProjection(ctx context.Context, config crdb.StatementHandlerConfig) *PasswordComplexityProjection {
p := new(PasswordComplexityProjection)
config.ProjectionName = PasswordComplexityTable
config.Reducers = p.reducers()
config.InitCheck = crdb.NewTableCheck(
crdb.NewTable([]*crdb.Column{
crdb.NewColumn(ComplexityPolicyIDCol, crdb.ColumnTypeText),
crdb.NewColumn(ComplexityPolicyCreationDateCol, crdb.ColumnTypeTimestamp),
crdb.NewColumn(ComplexityPolicyChangeDateCol, crdb.ColumnTypeTimestamp),
crdb.NewColumn(ComplexityPolicySequenceCol, crdb.ColumnTypeInt64),
crdb.NewColumn(ComplexityPolicyStateCol, crdb.ColumnTypeEnum),
crdb.NewColumn(ComplexityPolicyIsDefaultCol, crdb.ColumnTypeBool, crdb.Default(false)),
crdb.NewColumn(ComplexityPolicyResourceOwnerCol, crdb.ColumnTypeText),
crdb.NewColumn(ComplexityPolicyInstanceIDCol, crdb.ColumnTypeText),
crdb.NewColumn(ComplexityPolicyMinLengthCol, crdb.ColumnTypeInt64),
crdb.NewColumn(ComplexityPolicyHasLowercaseCol, crdb.ColumnTypeBool),
crdb.NewColumn(ComplexityPolicyHasUppercaseCol, crdb.ColumnTypeBool),
crdb.NewColumn(ComplexityPolicyHasSymbolCol, crdb.ColumnTypeBool),
crdb.NewColumn(ComplexityPolicyHasNumberCol, crdb.ColumnTypeBool),
},
crdb.NewPrimaryKey(ComplexityPolicyInstanceIDCol, ComplexityPolicyIDCol),
),
)
p.StatementHandler = crdb.NewStatementHandler(ctx, config)
return p
}
func (p *PasswordComplexityProjection) reducers() []handler.AggregateReducer {
return []handler.AggregateReducer{
{
Aggregate: org.AggregateType,
EventRedusers: []handler.EventReducer{
{
Event: org.PasswordComplexityPolicyAddedEventType,
Reduce: p.reduceAdded,
},
{
Event: org.PasswordComplexityPolicyChangedEventType,
Reduce: p.reduceChanged,
},
{
Event: org.PasswordComplexityPolicyRemovedEventType,
Reduce: p.reduceRemoved,
},
},
},
{
Aggregate: iam.AggregateType,
EventRedusers: []handler.EventReducer{
{
Event: iam.PasswordComplexityPolicyAddedEventType,
Reduce: p.reduceAdded,
},
{
Event: iam.PasswordComplexityPolicyChangedEventType,
Reduce: p.reduceChanged,
},
},
},
}
}
func (p *PasswordComplexityProjection) reduceAdded(event eventstore.Event) (*handler.Statement, error) {
var policyEvent policy.PasswordComplexityPolicyAddedEvent
var isDefault bool
switch e := event.(type) {
case *org.PasswordComplexityPolicyAddedEvent:
policyEvent = e.PasswordComplexityPolicyAddedEvent
isDefault = false
case *iam.PasswordComplexityPolicyAddedEvent:
policyEvent = e.PasswordComplexityPolicyAddedEvent
isDefault = true
default:
return nil, errors.ThrowInvalidArgumentf(nil, "PROJE-KTHmJ", "reduce.wrong.event.type %v", []eventstore.EventType{org.PasswordComplexityPolicyAddedEventType, iam.PasswordComplexityPolicyAddedEventType})
}
return crdb.NewCreateStatement(
&policyEvent,
[]handler.Column{
handler.NewCol(ComplexityPolicyCreationDateCol, policyEvent.CreationDate()),
handler.NewCol(ComplexityPolicyChangeDateCol, policyEvent.CreationDate()),
handler.NewCol(ComplexityPolicySequenceCol, policyEvent.Sequence()),
handler.NewCol(ComplexityPolicyIDCol, policyEvent.Aggregate().ID),
handler.NewCol(ComplexityPolicyStateCol, domain.PolicyStateActive),
handler.NewCol(ComplexityPolicyMinLengthCol, policyEvent.MinLength),
handler.NewCol(ComplexityPolicyHasLowercaseCol, policyEvent.HasLowercase),
handler.NewCol(ComplexityPolicyHasUppercaseCol, policyEvent.HasUppercase),
handler.NewCol(ComplexityPolicyHasSymbolCol, policyEvent.HasSymbol),
handler.NewCol(ComplexityPolicyHasNumberCol, policyEvent.HasNumber),
handler.NewCol(ComplexityPolicyResourceOwnerCol, policyEvent.Aggregate().ResourceOwner),
handler.NewCol(ComplexityPolicyInstanceIDCol, policyEvent.Aggregate().InstanceID),
handler.NewCol(ComplexityPolicyIsDefaultCol, isDefault),
}), nil
}
func (p *PasswordComplexityProjection) reduceChanged(event eventstore.Event) (*handler.Statement, error) {
var policyEvent policy.PasswordComplexityPolicyChangedEvent
switch e := event.(type) {
case *org.PasswordComplexityPolicyChangedEvent:
policyEvent = e.PasswordComplexityPolicyChangedEvent
case *iam.PasswordComplexityPolicyChangedEvent:
policyEvent = e.PasswordComplexityPolicyChangedEvent
default:
return nil, errors.ThrowInvalidArgumentf(nil, "PROJE-cf3Xb", "reduce.wrong.event.type %v", []eventstore.EventType{org.PasswordComplexityPolicyChangedEventType, iam.PasswordComplexityPolicyChangedEventType})
}
cols := []handler.Column{
handler.NewCol(ComplexityPolicyChangeDateCol, policyEvent.CreationDate()),
handler.NewCol(ComplexityPolicySequenceCol, policyEvent.Sequence()),
}
if policyEvent.MinLength != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyMinLengthCol, *policyEvent.MinLength))
}
if policyEvent.HasLowercase != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasLowercaseCol, *policyEvent.HasLowercase))
}
if policyEvent.HasUppercase != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasUppercaseCol, *policyEvent.HasUppercase))
}
if policyEvent.HasSymbol != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasSymbolCol, *policyEvent.HasSymbol))
}
if policyEvent.HasNumber != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasNumberCol, *policyEvent.HasNumber))
}
return crdb.NewUpdateStatement(
&policyEvent,
cols,
[]handler.Condition{
handler.NewCond(ComplexityPolicyIDCol, policyEvent.Aggregate().ID),
}), nil
}
func (p *PasswordComplexityProjection) reduceRemoved(event eventstore.Event) (*handler.Statement, error) {
policyEvent, ok := event.(*org.PasswordComplexityPolicyRemovedEvent)
if !ok {
return nil, errors.ThrowInvalidArgumentf(nil, "PROJE-wttCd", "reduce.wrong.event.type %s", org.PasswordComplexityPolicyRemovedEventType)
}
return crdb.NewDeleteStatement(
policyEvent,
[]handler.Condition{
handler.NewCond(ComplexityPolicyIDCol, policyEvent.Aggregate().ID),
}), nil
}