mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-13 11:34:26 +00:00
4589ddad4a
* feat: use passwap for human user passwords * fix tests * passwap config * add the event mapper * cleanup query side and api * solve linting errors * regression test * try to fix linter errors again * pass systemdefaults into externalConfigChange migration * fix: user password set in auth view * pin passwap v0.2.0 * v2: validate hashed password hash based on prefix * resolve remaining comments * add error tag and translation for unsupported hash encoding * fix unit test --------- Co-authored-by: Livio Spring <livio.a@gmail.com>
77 lines
2.2 KiB
Go
77 lines
2.2 KiB
Go
package model
|
|
|
|
import (
|
|
"encoding/json"
|
|
"time"
|
|
|
|
"github.com/zitadel/logging"
|
|
|
|
"github.com/zitadel/zitadel/internal/crypto"
|
|
caos_errs "github.com/zitadel/zitadel/internal/errors"
|
|
es_models "github.com/zitadel/zitadel/internal/eventstore/v1/models"
|
|
)
|
|
|
|
type Password struct {
|
|
es_models.ObjectRoot
|
|
|
|
Secret *crypto.CryptoValue `json:"secret,omitempty"`
|
|
EncodedHash string `json:"encodedHash,omitempty"`
|
|
ChangeRequired bool `json:"changeRequired,omitempty"`
|
|
}
|
|
|
|
type PasswordCode struct {
|
|
es_models.ObjectRoot
|
|
|
|
Code *crypto.CryptoValue `json:"code,omitempty"`
|
|
Expiry time.Duration `json:"expiry,omitempty"`
|
|
NotificationType int32 `json:"notificationType,omitempty"`
|
|
}
|
|
|
|
type PasswordChange struct {
|
|
Password
|
|
UserAgentID string `json:"userAgentID,omitempty"`
|
|
}
|
|
|
|
func (u *Human) appendUserPasswordChangedEvent(event *es_models.Event) error {
|
|
u.Password = new(Password)
|
|
err := u.Password.setData(event)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
u.Password.ObjectRoot.CreationDate = event.CreationDate
|
|
return nil
|
|
}
|
|
|
|
func (u *Human) appendPasswordSetRequestedEvent(event *es_models.Event) error {
|
|
u.PasswordCode = new(PasswordCode)
|
|
return u.PasswordCode.SetData(event)
|
|
}
|
|
|
|
func (pw *Password) setData(event *es_models.Event) error {
|
|
pw.ObjectRoot.AppendEvent(event)
|
|
if err := json.Unmarshal(event.Data, pw); err != nil {
|
|
logging.Log("EVEN-dks93").WithError(err).Error("could not unmarshal event data")
|
|
return caos_errs.ThrowInternal(err, "MODEL-sl9xlo2rsw", "could not unmarshal event")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *PasswordCode) SetData(event *es_models.Event) error {
|
|
c.ObjectRoot.AppendEvent(event)
|
|
c.CreationDate = event.CreationDate
|
|
if err := json.Unmarshal(event.Data, c); err != nil {
|
|
logging.Log("EVEN-lo0y2").WithError(err).Error("could not unmarshal event data")
|
|
return caos_errs.ThrowInternal(err, "MODEL-q21dr", "could not unmarshal event")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (pw *PasswordChange) SetData(event *es_models.Event) error {
|
|
if err := json.Unmarshal(event.Data, pw); err != nil {
|
|
logging.Log("EVEN-ADs31").WithError(err).Error("could not unmarshal event data")
|
|
return caos_errs.ThrowInternal(err, "MODEL-BDd32", "could not unmarshal event")
|
|
}
|
|
pw.ObjectRoot.AppendEvent(event)
|
|
return nil
|
|
}
|