zitadel/internal/query/password_age_policy.go
Livio Amstutz 958362e6c9
feat: handle instance from context (#3382)
* commander

* commander

* selber!

* move to packages

* fix(errors): implement Is interface

* test: command

* test: commands

* add init steps

* setup tenant

* add default step yaml

* possibility to set password

* merge v2 into v2-commander

* fix: rename iam command side to instance

* fix: rename iam command side to instance

* fix: rename iam command side to instance

* fix: rename iam command side to instance

* fix: search query builder can filter events in memory

* fix: filters for add member

* fix(setup): add `ExternalSecure` to config

* chore: name iam to instance

* fix: matching

* remove unsued func

* base url

* base url

* test(command): filter funcs

* test: commands

* fix: rename orgiampolicy to domain policy

* start from init

* commands

* config

* fix indexes and add constraints

* fixes

* fix: merge conflicts

* fix: protos

* fix: md files

* setup

* add deprecated org iam policy again

* typo

* fix search query

* fix filter

* Apply suggestions from code review

* remove custom org from org setup

* add todos for verification

* change apps creation

* simplify package structure

* fix error

* move preparation helper for tests

* fix unique constraints

* fix config mapping in setup

* fix error handling in encryption_keys.go

* fix projection config

* fix query from old views to projection

* fix setup of mgmt api

* set iam project and fix instance projection

* fix tokens view

* fix steps.yaml and defaults.yaml

* fix projections

* change instance context to interface

* instance interceptors and additional events in setup

* cleanup

* tests for interceptors

* fix label policy

* add todo

* single api endpoint in environment.json

Co-authored-by: adlerhurst <silvan.reusser@gmail.com>
Co-authored-by: fabi <fabienne.gerschwiler@gmail.com>
2022-03-29 11:53:19 +02:00

153 lines
3.9 KiB
Go

package query
import (
"context"
"database/sql"
errs "errors"
"time"
sq "github.com/Masterminds/squirrel"
"github.com/caos/zitadel/internal/api/authz"
"github.com/caos/zitadel/internal/domain"
"github.com/caos/zitadel/internal/errors"
"github.com/caos/zitadel/internal/query/projection"
)
type PasswordAgePolicy struct {
ID string
Sequence uint64
CreationDate time.Time
ChangeDate time.Time
ResourceOwner string
State domain.PolicyState
ExpireWarnDays uint64
MaxAgeDays uint64
IsDefault bool
}
var (
passwordAgeTable = table{
name: projection.PasswordAgeTable,
}
PasswordAgeColID = Column{
name: projection.AgePolicyIDCol,
table: passwordAgeTable,
}
PasswordAgeColSequence = Column{
name: projection.AgePolicySequenceCol,
table: passwordAgeTable,
}
PasswordAgeColCreationDate = Column{
name: projection.AgePolicyCreationDateCol,
table: passwordAgeTable,
}
PasswordAgeColChangeDate = Column{
name: projection.AgePolicyChangeDateCol,
table: passwordAgeTable,
}
PasswordAgeColResourceOwner = Column{
name: projection.AgePolicyResourceOwnerCol,
table: passwordAgeTable,
}
PasswordAgeColInstanceID = Column{
name: projection.AgePolicyInstanceIDCol,
table: passwordAgeTable,
}
PasswordAgeColWarnDays = Column{
name: projection.AgePolicyExpireWarnDaysCol,
table: passwordAgeTable,
}
PasswordAgeColMaxAge = Column{
name: projection.AgePolicyMaxAgeDaysCol,
table: passwordAgeTable,
}
PasswordAgeColIsDefault = Column{
name: projection.AgePolicyIsDefaultCol,
table: passwordAgeTable,
}
PasswordAgeColState = Column{
name: projection.AgePolicyStateCol,
table: passwordAgeTable,
}
)
func (q *Queries) PasswordAgePolicyByOrg(ctx context.Context, orgID string) (*PasswordAgePolicy, error) {
stmt, scan := preparePasswordAgePolicyQuery()
query, args, err := stmt.Where(
sq.And{
sq.Eq{
PasswordAgeColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID(),
},
sq.Or{
sq.Eq{
PasswordAgeColID.identifier(): orgID,
},
sq.Eq{
PasswordAgeColID.identifier(): domain.IAMID,
},
},
}).
OrderBy(PasswordAgeColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, errors.ThrowInternal(err, "QUERY-SKR6X", "Errors.Query.SQLStatement")
}
row := q.client.QueryRowContext(ctx, query, args...)
return scan(row)
}
func (q *Queries) DefaultPasswordAgePolicy(ctx context.Context) (*PasswordAgePolicy, error) {
stmt, scan := preparePasswordAgePolicyQuery()
query, args, err := stmt.Where(sq.Eq{
PasswordAgeColID.identifier(): domain.IAMID,
}).
OrderBy(PasswordAgeColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, errors.ThrowInternal(err, "QUERY-mN0Ci", "Errors.Query.SQLStatement")
}
row := q.client.QueryRowContext(ctx, query, args...)
return scan(row)
}
func preparePasswordAgePolicyQuery() (sq.SelectBuilder, func(*sql.Row) (*PasswordAgePolicy, error)) {
return sq.Select(
PasswordAgeColID.identifier(),
PasswordAgeColSequence.identifier(),
PasswordAgeColCreationDate.identifier(),
PasswordAgeColChangeDate.identifier(),
PasswordAgeColResourceOwner.identifier(),
PasswordAgeColWarnDays.identifier(),
PasswordAgeColMaxAge.identifier(),
PasswordAgeColIsDefault.identifier(),
PasswordAgeColState.identifier(),
).
From(passwordAgeTable.identifier()).PlaceholderFormat(sq.Dollar),
func(row *sql.Row) (*PasswordAgePolicy, error) {
policy := new(PasswordAgePolicy)
err := row.Scan(
&policy.ID,
&policy.Sequence,
&policy.CreationDate,
&policy.ChangeDate,
&policy.ResourceOwner,
&policy.ExpireWarnDays,
&policy.MaxAgeDays,
&policy.IsDefault,
&policy.State,
)
if err != nil {
if errs.Is(err, sql.ErrNoRows) {
return nil, errors.ThrowNotFound(err, "QUERY-63mtI", "Errors.Org.PasswordComplexity.NotFound")
}
return nil, errors.ThrowInternal(err, "QUERY-uulCZ", "Errors.Internal")
}
return policy, nil
}
}