mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 02:54:20 +00:00
c0e45b63d8
* reproduce #5808 Add an integration test that imports and gets N amount of human users. - With N set to 1-10 the operation seems to succeed always - With N set to 100 the operation seems to fail between 1 and 7 times. * fix merge issue * fix: reset the call timestamp after a bulk trigger With the use of `AS OF SYSTEM TIME` in queries, there was a change for the query package not finding the latest projection verson after a bulk trigger. If events where processed in the bulk trigger, the resulting row timestamp would be after the call start timestamp. This sometimes resulted in consistency issues when Set and Get API methods are called in short succession. For example a Import and Get user could sometimes result in a Not Found error. Although the issue was reported for the Management API user import, it is likely this bug contributed to the flaky integration and e2e tests. Fixes #5808 * trigger bulk action in GetSession * don't use the new context in handler schedule * disable reproduction test --------- Co-authored-by: Livio Spring <livio.a@gmail.com>
172 lines
4.8 KiB
Go
172 lines
4.8 KiB
Go
package query
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
errs "errors"
|
|
"time"
|
|
|
|
sq "github.com/Masterminds/squirrel"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
"github.com/zitadel/zitadel/internal/api/call"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/query/projection"
|
|
"github.com/zitadel/zitadel/internal/telemetry/tracing"
|
|
)
|
|
|
|
type PasswordAgePolicy struct {
|
|
ID string
|
|
Sequence uint64
|
|
CreationDate time.Time
|
|
ChangeDate time.Time
|
|
ResourceOwner string
|
|
State domain.PolicyState
|
|
|
|
ExpireWarnDays uint64
|
|
MaxAgeDays uint64
|
|
|
|
IsDefault bool
|
|
}
|
|
|
|
var (
|
|
passwordAgeTable = table{
|
|
name: projection.PasswordAgeTable,
|
|
instanceIDCol: projection.AgePolicyInstanceIDCol,
|
|
}
|
|
PasswordAgeColID = Column{
|
|
name: projection.AgePolicyIDCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColSequence = Column{
|
|
name: projection.AgePolicySequenceCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColCreationDate = Column{
|
|
name: projection.AgePolicyCreationDateCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColChangeDate = Column{
|
|
name: projection.AgePolicyChangeDateCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColResourceOwner = Column{
|
|
name: projection.AgePolicyResourceOwnerCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColInstanceID = Column{
|
|
name: projection.AgePolicyInstanceIDCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColWarnDays = Column{
|
|
name: projection.AgePolicyExpireWarnDaysCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColMaxAge = Column{
|
|
name: projection.AgePolicyMaxAgeDaysCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColIsDefault = Column{
|
|
name: projection.AgePolicyIsDefaultCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColState = Column{
|
|
name: projection.AgePolicyStateCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
PasswordAgeColOwnerRemoved = Column{
|
|
name: projection.AgePolicyOwnerRemovedCol,
|
|
table: passwordAgeTable,
|
|
}
|
|
)
|
|
|
|
func (q *Queries) PasswordAgePolicyByOrg(ctx context.Context, shouldTriggerBulk bool, orgID string, withOwnerRemoved bool) (_ *PasswordAgePolicy, err error) {
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
defer func() { span.EndWithError(err) }()
|
|
|
|
if shouldTriggerBulk {
|
|
ctx = projection.PasswordAgeProjection.Trigger(ctx)
|
|
}
|
|
eq := sq.Eq{PasswordAgeColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID()}
|
|
if !withOwnerRemoved {
|
|
eq[PasswordAgeColOwnerRemoved.identifier()] = false
|
|
}
|
|
stmt, scan := preparePasswordAgePolicyQuery(ctx, q.client)
|
|
query, args, err := stmt.Where(
|
|
sq.And{
|
|
eq,
|
|
sq.Or{
|
|
sq.Eq{PasswordAgeColID.identifier(): orgID},
|
|
sq.Eq{PasswordAgeColID.identifier(): authz.GetInstance(ctx).InstanceID()},
|
|
},
|
|
}).
|
|
OrderBy(PasswordAgeColIsDefault.identifier()).
|
|
Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-SKR6X", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
row := q.client.QueryRowContext(ctx, query, args...)
|
|
return scan(row)
|
|
}
|
|
|
|
func (q *Queries) DefaultPasswordAgePolicy(ctx context.Context, shouldTriggerBulk bool) (_ *PasswordAgePolicy, err error) {
|
|
ctx, span := tracing.NewSpan(ctx)
|
|
defer func() { span.EndWithError(err) }()
|
|
|
|
if shouldTriggerBulk {
|
|
ctx = projection.PasswordAgeProjection.Trigger(ctx)
|
|
}
|
|
|
|
stmt, scan := preparePasswordAgePolicyQuery(ctx, q.client)
|
|
query, args, err := stmt.Where(sq.Eq{
|
|
PasswordAgeColID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
}).
|
|
OrderBy(PasswordAgeColIsDefault.identifier()).
|
|
Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-mN0Ci", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
row := q.client.QueryRowContext(ctx, query, args...)
|
|
return scan(row)
|
|
}
|
|
|
|
func preparePasswordAgePolicyQuery(ctx context.Context, db prepareDatabase) (sq.SelectBuilder, func(*sql.Row) (*PasswordAgePolicy, error)) {
|
|
return sq.Select(
|
|
PasswordAgeColID.identifier(),
|
|
PasswordAgeColSequence.identifier(),
|
|
PasswordAgeColCreationDate.identifier(),
|
|
PasswordAgeColChangeDate.identifier(),
|
|
PasswordAgeColResourceOwner.identifier(),
|
|
PasswordAgeColWarnDays.identifier(),
|
|
PasswordAgeColMaxAge.identifier(),
|
|
PasswordAgeColIsDefault.identifier(),
|
|
PasswordAgeColState.identifier(),
|
|
).
|
|
From(passwordAgeTable.identifier() + db.Timetravel(call.Took(ctx))).
|
|
PlaceholderFormat(sq.Dollar),
|
|
func(row *sql.Row) (*PasswordAgePolicy, error) {
|
|
policy := new(PasswordAgePolicy)
|
|
err := row.Scan(
|
|
&policy.ID,
|
|
&policy.Sequence,
|
|
&policy.CreationDate,
|
|
&policy.ChangeDate,
|
|
&policy.ResourceOwner,
|
|
&policy.ExpireWarnDays,
|
|
&policy.MaxAgeDays,
|
|
&policy.IsDefault,
|
|
&policy.State,
|
|
)
|
|
if err != nil {
|
|
if errs.Is(err, sql.ErrNoRows) {
|
|
return nil, errors.ThrowNotFound(err, "QUERY-63mtI", "Errors.Org.PasswordComplexity.NotFound")
|
|
}
|
|
return nil, errors.ThrowInternal(err, "QUERY-uulCZ", "Errors.Internal")
|
|
}
|
|
return policy, nil
|
|
}
|
|
}
|