zitadel/internal/query/restrictions.go
Fabienne Bühler 07ce3b6905
chore!: Introduce ZITADEL v3 (#9645)
This PR summarizes multiple changes specifically only available with
ZITADEL v3:

- feat: Web Keys management
(https://github.com/zitadel/zitadel/pull/9526)
- fix(cmd): ensure proper working of mirror
(https://github.com/zitadel/zitadel/pull/9509)
- feat(Authz): system user support for permission check v2
(https://github.com/zitadel/zitadel/pull/9640)
- chore(license): change from Apache to AGPL
(https://github.com/zitadel/zitadel/pull/9597)
- feat(console): list v2 sessions
(https://github.com/zitadel/zitadel/pull/9539)
- fix(console): add loginV2 feature flag
(https://github.com/zitadel/zitadel/pull/9682)
- fix(feature flags): allow reading "own" flags
(https://github.com/zitadel/zitadel/pull/9649)
- feat(console): add Actions V2 UI
(https://github.com/zitadel/zitadel/pull/9591)

BREAKING CHANGE
- feat(webkey): migrate to v2beta API
(https://github.com/zitadel/zitadel/pull/9445)
- chore!: remove CockroachDB Support
(https://github.com/zitadel/zitadel/pull/9444)
- feat(actions): migrate to v2beta API
(https://github.com/zitadel/zitadel/pull/9489)

---------

Co-authored-by: Livio Spring <livio.a@gmail.com>
Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com>
Co-authored-by: Silvan <27845747+adlerhurst@users.noreply.github.com>
Co-authored-by: Ramon <mail@conblem.me>
Co-authored-by: Elio Bischof <elio@zitadel.com>
Co-authored-by: Kenta Yamaguchi <56732734+KEY60228@users.noreply.github.com>
Co-authored-by: Harsha Reddy <harsha.reddy@klaviyo.com>
Co-authored-by: Livio Spring <livio@zitadel.com>
Co-authored-by: Max Peintner <max@caos.ch>
Co-authored-by: Iraq <66622793+kkrime@users.noreply.github.com>
Co-authored-by: Florian Forster <florian@zitadel.com>
Co-authored-by: Tim Möhlmann <tim+github@zitadel.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Co-authored-by: Max Peintner <peintnerm@gmail.com>
2025-04-02 16:53:06 +02:00

123 lines
3.7 KiB
Go

package query
import (
"context"
"database/sql"
"errors"
"time"
sq "github.com/Masterminds/squirrel"
"golang.org/x/text/language"
"github.com/zitadel/zitadel/internal/api/authz"
"github.com/zitadel/zitadel/internal/database"
"github.com/zitadel/zitadel/internal/domain"
"github.com/zitadel/zitadel/internal/query/projection"
"github.com/zitadel/zitadel/internal/telemetry/tracing"
zitade_errors "github.com/zitadel/zitadel/internal/zerrors"
)
var (
restrictionsTable = table{
name: projection.RestrictionsProjectionTable,
instanceIDCol: projection.RestrictionsColumnInstanceID,
}
RestrictionsColumnAggregateID = Column{
name: projection.RestrictionsColumnAggregateID,
table: restrictionsTable,
}
RestrictionsColumnCreationDate = Column{
name: projection.RestrictionsColumnCreationDate,
table: restrictionsTable,
}
RestrictionsColumnChangeDate = Column{
name: projection.RestrictionsColumnChangeDate,
table: restrictionsTable,
}
RestrictionsColumnResourceOwner = Column{
name: projection.RestrictionsColumnResourceOwner,
table: restrictionsTable,
}
RestrictionsColumnInstanceID = Column{
name: projection.RestrictionsColumnInstanceID,
table: restrictionsTable,
}
RestrictionsColumnSequence = Column{
name: projection.RestrictionsColumnSequence,
table: restrictionsTable,
}
RestrictionsColumnDisallowPublicOrgRegistration = Column{
name: projection.RestrictionsColumnDisallowPublicOrgRegistration,
table: restrictionsTable,
}
RestrictionsColumnAllowedLanguages = Column{
name: projection.RestrictionsColumnAllowedLanguages,
table: restrictionsTable,
}
)
type Restrictions struct {
AggregateID string
CreationDate time.Time
ChangeDate time.Time
ResourceOwner string
Sequence uint64
DisallowPublicOrgRegistration bool
AllowedLanguages []language.Tag
}
func (q *Queries) GetInstanceRestrictions(ctx context.Context) (restrictions Restrictions, err error) {
ctx, span := tracing.NewSpan(ctx)
defer func() { span.EndWithError(err) }()
stmt, scan := prepareRestrictionsQuery()
instanceID := authz.GetInstance(ctx).InstanceID()
query, args, err := stmt.Where(sq.Eq{
RestrictionsColumnInstanceID.identifier(): instanceID,
RestrictionsColumnResourceOwner.identifier(): instanceID,
}).ToSql()
if err != nil {
return restrictions, zitade_errors.ThrowInternal(err, "QUERY-XnLMQ", "Errors.Query.SQLStatment")
}
err = q.client.QueryRowContext(ctx, func(row *sql.Row) error {
restrictions, err = scan(row)
return err
}, query, args...)
if errors.Is(err, sql.ErrNoRows) {
// not found is not an error
err = nil
}
return restrictions, err
}
func prepareRestrictionsQuery() (sq.SelectBuilder, func(*sql.Row) (Restrictions, error)) {
return sq.Select(
RestrictionsColumnAggregateID.identifier(),
RestrictionsColumnCreationDate.identifier(),
RestrictionsColumnChangeDate.identifier(),
RestrictionsColumnResourceOwner.identifier(),
RestrictionsColumnSequence.identifier(),
RestrictionsColumnDisallowPublicOrgRegistration.identifier(),
RestrictionsColumnAllowedLanguages.identifier(),
).
From(restrictionsTable.identifier()).
PlaceholderFormat(sq.Dollar),
func(row *sql.Row) (restrictions Restrictions, err error) {
allowedLanguages := database.TextArray[string](make([]string, 0))
disallowPublicOrgRegistration := sql.NullBool{}
err = row.Scan(
&restrictions.AggregateID,
&restrictions.CreationDate,
&restrictions.ChangeDate,
&restrictions.ResourceOwner,
&restrictions.Sequence,
&disallowPublicOrgRegistration,
&allowedLanguages,
)
restrictions.DisallowPublicOrgRegistration = disallowPublicOrgRegistration.Bool
restrictions.AllowedLanguages = domain.StringsToLanguages(allowedLanguages)
return restrictions, err
}
}