mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-14 03:54:21 +00:00
c5b99274d7
* commander * commander * selber! * move to packages * fix(errors): implement Is interface * test: command * test: commands * add init steps * setup tenant * add default step yaml * possibility to set password * merge v2 into v2-commander * fix: rename iam command side to instance * fix: rename iam command side to instance * fix: rename iam command side to instance * fix: rename iam command side to instance * fix: search query builder can filter events in memory * fix: filters for add member * fix(setup): add `ExternalSecure` to config * chore: name iam to instance * fix: matching * remove unsued func * base url * base url * test(command): filter funcs * test: commands * fix: rename orgiampolicy to domain policy * start from init * commands * config * fix indexes and add constraints * fixes * fix: merge conflicts * fix: protos * fix: md files * setup * add deprecated org iam policy again * typo * fix search query * fix filter * Apply suggestions from code review * remove custom org from org setup * add todos for verification * change apps creation * simplify package structure * fix error * move preparation helper for tests * fix unique constraints * fix config mapping in setup * fix error handling in encryption_keys.go * fix projection config * fix query from old views to projection * fix setup of mgmt api * set iam project and fix instance projection * imports Co-authored-by: Livio Amstutz <livio.a@gmail.com> Co-authored-by: fabi <fabienne.gerschwiler@gmail.com>
98 lines
2.7 KiB
Go
98 lines
2.7 KiB
Go
package command
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
|
|
"golang.org/x/text/language"
|
|
|
|
"github.com/caos/zitadel/internal/command/v2/preparation"
|
|
"github.com/caos/zitadel/internal/crypto"
|
|
"github.com/caos/zitadel/internal/domain"
|
|
"github.com/caos/zitadel/internal/errors"
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
"github.com/caos/zitadel/internal/repository/user"
|
|
)
|
|
|
|
type AddHuman struct {
|
|
// Username is required
|
|
Username string
|
|
// FirstName is required
|
|
FirstName string
|
|
// LastName is required
|
|
LastName string
|
|
// NickName is required
|
|
NickName string
|
|
// DisplayName is required
|
|
DisplayName string
|
|
// Email is required
|
|
Email string
|
|
// PreferredLang is required
|
|
PreferredLang language.Tag
|
|
// Gender is required
|
|
Gender domain.Gender
|
|
//TODO: can it also be verified?
|
|
Phone string
|
|
//Password is optional
|
|
Password string
|
|
//PasswordChangeRequired is used if the `Password`-field is set
|
|
PasswordChangeRequired bool
|
|
}
|
|
|
|
func AddHumanCommand(a *user.Aggregate, human *AddHuman, passwordAlg crypto.HashAlgorithm) preparation.Validation {
|
|
return func() (preparation.CreateCommands, error) {
|
|
if !domain.EmailRegex.MatchString(human.Email) {
|
|
return nil, errors.ThrowInvalidArgument(nil, "USER-Ec7dM", "Errors.Invalid.Argument")
|
|
}
|
|
if human.FirstName = strings.TrimSpace(human.FirstName); human.FirstName == "" {
|
|
return nil, errors.ThrowInvalidArgument(nil, "USER-UCej2", "Errors.Invalid.Argument")
|
|
}
|
|
if human.LastName = strings.TrimSpace(human.LastName); human.LastName == "" {
|
|
return nil, errors.ThrowInvalidArgument(nil, "USER-DiAq8", "Errors.Invalid.Argument")
|
|
}
|
|
human.Phone = strings.TrimSpace(human.Phone)
|
|
|
|
return func(ctx context.Context, filter preparation.FilterToQueryReducer) ([]eventstore.Command, error) {
|
|
domainPolicy, err := domainPolicyWriteModel(ctx, filter)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
cmd := user.NewHumanAddedEvent(
|
|
ctx,
|
|
&a.Aggregate,
|
|
human.Username,
|
|
human.FirstName,
|
|
human.LastName,
|
|
human.NickName,
|
|
human.DisplayName,
|
|
human.PreferredLang,
|
|
human.Gender,
|
|
human.Email, //TODO: pass if verified
|
|
domainPolicy.UserLoginMustBeDomain,
|
|
)
|
|
if human.Phone != "" {
|
|
cmd.AddPhoneData(human.Phone) //TODO: pass if verified
|
|
}
|
|
if human.Password != "" {
|
|
passwordComplexity, err := passwordComplexityPolicyWriteModel(ctx, filter)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err = passwordComplexity.Validate(human.Password); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
secret, err := crypto.Hash([]byte(human.Password), passwordAlg)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
cmd.AddPasswordData(secret, human.PasswordChangeRequired)
|
|
}
|
|
|
|
return []eventstore.Command{cmd}, nil
|
|
}, nil
|
|
}
|
|
}
|