mirror of
https://github.com/zitadel/zitadel.git
synced 2025-01-10 23:03:40 +00:00
a3d80f93ff
# Which Problems Are Solved The v2 api currently has no endpoint the get all second factors of a user. # How the Problems Are Solved Our v1 api has the ListHumanAuthFactors which got added to the v2 api under the User resource. # Additional Changes # Additional Context Closes #8833 --------- Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com>
176 lines
5.4 KiB
Go
176 lines
5.4 KiB
Go
package object
|
|
|
|
import (
|
|
"context"
|
|
|
|
"google.golang.org/protobuf/types/known/timestamppb"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/query"
|
|
"github.com/zitadel/zitadel/pkg/grpc/object/v2"
|
|
user_pb "github.com/zitadel/zitadel/pkg/grpc/user/v2"
|
|
)
|
|
|
|
func DomainToDetailsPb(objectDetail *domain.ObjectDetails) *object.Details {
|
|
details := &object.Details{
|
|
Sequence: objectDetail.Sequence,
|
|
ResourceOwner: objectDetail.ResourceOwner,
|
|
}
|
|
if !objectDetail.EventDate.IsZero() {
|
|
details.ChangeDate = timestamppb.New(objectDetail.EventDate)
|
|
}
|
|
return details
|
|
}
|
|
|
|
func ToListDetails(response query.SearchResponse) *object.ListDetails {
|
|
details := &object.ListDetails{
|
|
TotalResult: response.Count,
|
|
ProcessedSequence: response.Sequence,
|
|
Timestamp: timestamppb.New(response.EventCreatedAt),
|
|
}
|
|
|
|
return details
|
|
}
|
|
func ListQueryToQuery(query *object.ListQuery) (offset, limit uint64, asc bool) {
|
|
if query == nil {
|
|
return 0, 0, false
|
|
}
|
|
return query.Offset, uint64(query.Limit), query.Asc
|
|
}
|
|
|
|
func ResourceOwnerFromReq(ctx context.Context, req *object.RequestContext) string {
|
|
if req.GetInstance() {
|
|
return authz.GetInstance(ctx).InstanceID()
|
|
}
|
|
if req.GetOrgId() != "" {
|
|
return req.GetOrgId()
|
|
}
|
|
return authz.GetCtxData(ctx).OrgID
|
|
}
|
|
|
|
func TextMethodToQuery(method object.TextQueryMethod) query.TextComparison {
|
|
switch method {
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_EQUALS:
|
|
return query.TextEquals
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_EQUALS_IGNORE_CASE:
|
|
return query.TextEqualsIgnoreCase
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_STARTS_WITH:
|
|
return query.TextStartsWith
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_STARTS_WITH_IGNORE_CASE:
|
|
return query.TextStartsWithIgnoreCase
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_CONTAINS:
|
|
return query.TextContains
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_CONTAINS_IGNORE_CASE:
|
|
return query.TextContainsIgnoreCase
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_ENDS_WITH:
|
|
return query.TextEndsWith
|
|
case object.TextQueryMethod_TEXT_QUERY_METHOD_ENDS_WITH_IGNORE_CASE:
|
|
return query.TextEndsWithIgnoreCase
|
|
default:
|
|
return -1
|
|
}
|
|
}
|
|
|
|
func AuthMethodsToPb(mfas *query.AuthMethods) []*user_pb.AuthFactor {
|
|
factors := make([]*user_pb.AuthFactor, len(mfas.AuthMethods))
|
|
for i, mfa := range mfas.AuthMethods {
|
|
factors[i] = AuthMethodToPb(mfa)
|
|
}
|
|
return factors
|
|
}
|
|
|
|
func AuthMethodToPb(mfa *query.AuthMethod) *user_pb.AuthFactor {
|
|
factor := &user_pb.AuthFactor{
|
|
State: MFAStateToPb(mfa.State),
|
|
}
|
|
switch mfa.Type {
|
|
case domain.UserAuthMethodTypeTOTP:
|
|
factor.Type = &user_pb.AuthFactor_Otp{
|
|
Otp: &user_pb.AuthFactorOTP{},
|
|
}
|
|
case domain.UserAuthMethodTypeU2F:
|
|
factor.Type = &user_pb.AuthFactor_U2F{
|
|
U2F: &user_pb.AuthFactorU2F{
|
|
Id: mfa.TokenID,
|
|
Name: mfa.Name,
|
|
},
|
|
}
|
|
case domain.UserAuthMethodTypeOTPSMS:
|
|
factor.Type = &user_pb.AuthFactor_OtpSms{
|
|
OtpSms: &user_pb.AuthFactorOTPSMS{},
|
|
}
|
|
case domain.UserAuthMethodTypeOTPEmail:
|
|
factor.Type = &user_pb.AuthFactor_OtpEmail{
|
|
OtpEmail: &user_pb.AuthFactorOTPEmail{},
|
|
}
|
|
case domain.UserAuthMethodTypeUnspecified:
|
|
case domain.UserAuthMethodTypePasswordless:
|
|
case domain.UserAuthMethodTypePassword:
|
|
case domain.UserAuthMethodTypeIDP:
|
|
case domain.UserAuthMethodTypeOTP:
|
|
case domain.UserAuthMethodTypePrivateKey:
|
|
}
|
|
return factor
|
|
}
|
|
|
|
func AuthFactorsToPb(authFactors []user_pb.AuthFactors) []domain.UserAuthMethodType {
|
|
factors := make([]domain.UserAuthMethodType, len(authFactors))
|
|
for i, authFactor := range authFactors {
|
|
factors[i] = AuthFactorToPb(authFactor)
|
|
}
|
|
return factors
|
|
}
|
|
|
|
func AuthFactorToPb(authFactor user_pb.AuthFactors) domain.UserAuthMethodType {
|
|
switch authFactor {
|
|
case user_pb.AuthFactors_OTP:
|
|
return domain.UserAuthMethodTypeTOTP
|
|
case user_pb.AuthFactors_OTP_SMS:
|
|
return domain.UserAuthMethodTypeOTPSMS
|
|
case user_pb.AuthFactors_OTP_EMAIL:
|
|
return domain.UserAuthMethodTypeOTPEmail
|
|
case user_pb.AuthFactors_U2F:
|
|
return domain.UserAuthMethodTypeU2F
|
|
default:
|
|
return domain.UserAuthMethodTypeUnspecified
|
|
}
|
|
}
|
|
|
|
func AuthFactorStatesToPb(authFactorStates []user_pb.AuthFactorState) []domain.MFAState {
|
|
factorStates := make([]domain.MFAState, len(authFactorStates))
|
|
for i, authFactorState := range authFactorStates {
|
|
factorStates[i] = AuthFactorStateToPb(authFactorState)
|
|
}
|
|
return factorStates
|
|
}
|
|
|
|
func AuthFactorStateToPb(authFactorState user_pb.AuthFactorState) domain.MFAState {
|
|
switch authFactorState {
|
|
case user_pb.AuthFactorState_AUTH_FACTOR_STATE_UNSPECIFIED:
|
|
return domain.MFAStateUnspecified
|
|
case user_pb.AuthFactorState_AUTH_FACTOR_STATE_NOT_READY:
|
|
return domain.MFAStateNotReady
|
|
case user_pb.AuthFactorState_AUTH_FACTOR_STATE_READY:
|
|
return domain.MFAStateReady
|
|
case user_pb.AuthFactorState_AUTH_FACTOR_STATE_REMOVED:
|
|
return domain.MFAStateRemoved
|
|
default:
|
|
return domain.MFAStateUnspecified
|
|
}
|
|
}
|
|
|
|
func MFAStateToPb(state domain.MFAState) user_pb.AuthFactorState {
|
|
switch state {
|
|
case domain.MFAStateNotReady:
|
|
return user_pb.AuthFactorState_AUTH_FACTOR_STATE_NOT_READY
|
|
case domain.MFAStateReady:
|
|
return user_pb.AuthFactorState_AUTH_FACTOR_STATE_READY
|
|
case domain.MFAStateUnspecified, domain.MFAStateRemoved:
|
|
// Handle all remaining cases so the linter succeeds
|
|
return user_pb.AuthFactorState_AUTH_FACTOR_STATE_UNSPECIFIED
|
|
default:
|
|
return user_pb.AuthFactorState_AUTH_FACTOR_STATE_UNSPECIFIED
|
|
}
|
|
}
|