zitadel/internal/query/password_complexity_policy.go
Silvan 0187487f26
chore: correct tracing of trigger function (#6825)
* chore: correct tracing of trigger function

* refactor: remove import
2023-10-26 17:07:56 +02:00

209 lines
6.6 KiB
Go

package query
import (
"context"
"database/sql"
errs "errors"
"time"
sq "github.com/Masterminds/squirrel"
"github.com/zitadel/logging"
"github.com/zitadel/zitadel/internal/api/authz"
"github.com/zitadel/zitadel/internal/api/call"
"github.com/zitadel/zitadel/internal/domain"
"github.com/zitadel/zitadel/internal/errors"
"github.com/zitadel/zitadel/internal/eventstore/handler/v2"
"github.com/zitadel/zitadel/internal/query/projection"
"github.com/zitadel/zitadel/internal/telemetry/tracing"
)
type PasswordComplexityPolicy struct {
ID string
Sequence uint64
CreationDate time.Time
ChangeDate time.Time
ResourceOwner string
State domain.PolicyState
MinLength uint64
HasLowercase bool
HasUppercase bool
HasNumber bool
HasSymbol bool
IsDefault bool
}
func (q *Queries) PasswordComplexityPolicyByOrg(ctx context.Context, shouldTriggerBulk bool, orgID string, withOwnerRemoved bool) (policy *PasswordComplexityPolicy, err error) {
ctx, span := tracing.NewSpan(ctx)
defer func() { span.EndWithError(err) }()
if shouldTriggerBulk {
_, traceSpan := tracing.NewNamedSpan(ctx, "TriggerPasswordComplexityProjection")
ctx, err = projection.PasswordComplexityProjection.Trigger(ctx, handler.WithAwaitRunning())
logging.OnError(err).Debug("trigger failed")
traceSpan.EndWithError(err)
}
eq := sq.Eq{PasswordComplexityColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID()}
if !withOwnerRemoved {
eq[PasswordComplexityColOwnerRemoved.identifier()] = false
}
stmt, scan := preparePasswordComplexityPolicyQuery(ctx, q.client)
query, args, err := stmt.Where(
sq.And{
eq,
sq.Or{
sq.Eq{PasswordComplexityColID.identifier(): orgID},
sq.Eq{PasswordComplexityColID.identifier(): authz.GetInstance(ctx).InstanceID()},
},
}).
OrderBy(PasswordComplexityColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, errors.ThrowInternal(err, "QUERY-lDnrk", "Errors.Query.SQLStatement")
}
err = q.client.QueryRowContext(ctx, func(row *sql.Row) error {
policy, err = scan(row)
return err
}, query, args...)
return policy, err
}
func (q *Queries) DefaultPasswordComplexityPolicy(ctx context.Context, shouldTriggerBulk bool) (policy *PasswordComplexityPolicy, err error) {
ctx, span := tracing.NewSpan(ctx)
defer func() { span.EndWithError(err) }()
if shouldTriggerBulk {
_, traceSpan := tracing.NewNamedSpan(ctx, "TriggerPasswordComplexityProjection")
ctx, err = projection.PasswordComplexityProjection.Trigger(ctx, handler.WithAwaitRunning())
logging.OnError(err).Debug("trigger failed")
traceSpan.EndWithError(err)
}
stmt, scan := preparePasswordComplexityPolicyQuery(ctx, q.client)
query, args, err := stmt.Where(sq.Eq{
PasswordComplexityColID.identifier(): authz.GetInstance(ctx).InstanceID(),
PasswordComplexityColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID(),
}).
OrderBy(PasswordComplexityColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, errors.ThrowInternal(err, "QUERY-h4Uyr", "Errors.Query.SQLStatement")
}
err = q.client.QueryRowContext(ctx, func(row *sql.Row) error {
policy, err = scan(row)
return err
}, query, args...)
return policy, err
}
var (
passwordComplexityTable = table{
name: projection.PasswordComplexityTable,
instanceIDCol: projection.ComplexityPolicyInstanceIDCol,
}
PasswordComplexityColID = Column{
name: projection.ComplexityPolicyIDCol,
table: passwordComplexityTable,
}
PasswordComplexityColSequence = Column{
name: projection.ComplexityPolicySequenceCol,
table: passwordComplexityTable,
}
PasswordComplexityColCreationDate = Column{
name: projection.ComplexityPolicyCreationDateCol,
table: passwordComplexityTable,
}
PasswordComplexityColChangeDate = Column{
name: projection.ComplexityPolicyChangeDateCol,
table: passwordComplexityTable,
}
PasswordComplexityColResourceOwner = Column{
name: projection.ComplexityPolicyResourceOwnerCol,
table: passwordComplexityTable,
}
PasswordComplexityColInstanceID = Column{
name: projection.ComplexityPolicyInstanceIDCol,
table: passwordComplexityTable,
}
PasswordComplexityColMinLength = Column{
name: projection.ComplexityPolicyMinLengthCol,
table: passwordComplexityTable,
}
PasswordComplexityColHasLowercase = Column{
name: projection.ComplexityPolicyHasLowercaseCol,
table: passwordComplexityTable,
}
PasswordComplexityColHasUpperCase = Column{
name: projection.ComplexityPolicyHasUppercaseCol,
table: passwordComplexityTable,
}
PasswordComplexityColHasNumber = Column{
name: projection.ComplexityPolicyHasNumberCol,
table: passwordComplexityTable,
}
PasswordComplexityColHasSymbol = Column{
name: projection.ComplexityPolicyHasSymbolCol,
table: passwordComplexityTable,
}
PasswordComplexityColIsDefault = Column{
name: projection.ComplexityPolicyIsDefaultCol,
table: passwordComplexityTable,
}
PasswordComplexityColState = Column{
name: projection.ComplexityPolicyStateCol,
table: passwordComplexityTable,
}
PasswordComplexityColOwnerRemoved = Column{
name: projection.ComplexityPolicyOwnerRemovedCol,
table: passwordComplexityTable,
}
)
func preparePasswordComplexityPolicyQuery(ctx context.Context, db prepareDatabase) (sq.SelectBuilder, func(*sql.Row) (*PasswordComplexityPolicy, error)) {
return sq.Select(
PasswordComplexityColID.identifier(),
PasswordComplexityColSequence.identifier(),
PasswordComplexityColCreationDate.identifier(),
PasswordComplexityColChangeDate.identifier(),
PasswordComplexityColResourceOwner.identifier(),
PasswordComplexityColMinLength.identifier(),
PasswordComplexityColHasLowercase.identifier(),
PasswordComplexityColHasUpperCase.identifier(),
PasswordComplexityColHasNumber.identifier(),
PasswordComplexityColHasSymbol.identifier(),
PasswordComplexityColIsDefault.identifier(),
PasswordComplexityColState.identifier(),
).
From(passwordComplexityTable.identifier() + db.Timetravel(call.Took(ctx))).
PlaceholderFormat(sq.Dollar),
func(row *sql.Row) (*PasswordComplexityPolicy, error) {
policy := new(PasswordComplexityPolicy)
err := row.Scan(
&policy.ID,
&policy.Sequence,
&policy.CreationDate,
&policy.ChangeDate,
&policy.ResourceOwner,
&policy.MinLength,
&policy.HasLowercase,
&policy.HasUppercase,
&policy.HasNumber,
&policy.HasSymbol,
&policy.IsDefault,
&policy.State,
)
if err != nil {
if errs.Is(err, sql.ErrNoRows) {
return nil, errors.ThrowNotFound(err, "QUERY-63mtI", "Errors.PasswordComplexity.NotFound")
}
return nil, errors.ThrowInternal(err, "QUERY-uulCZ", "Errors.Internal")
}
return policy, nil
}
}