zitadel/internal/query/projection/password_complexity_policy.go
Silvan b5564572bc
feat(eventstore): increase parallel write capabilities (#5940)
This implementation increases parallel write capabilities of the eventstore.
Please have a look at the technical advisories: [05](https://zitadel.com/docs/support/advisory/a10005) and  [06](https://zitadel.com/docs/support/advisory/a10006).
The implementation of eventstore.push is rewritten and stored events are migrated to a new table `eventstore.events2`.
If you are using cockroach: make sure that the database user of ZITADEL has `VIEWACTIVITY` grant. This is used to query events.
2023-10-19 12:19:10 +02:00

209 lines
8.4 KiB
Go

package projection
import (
"context"
"github.com/zitadel/zitadel/internal/domain"
"github.com/zitadel/zitadel/internal/errors"
"github.com/zitadel/zitadel/internal/eventstore"
old_handler "github.com/zitadel/zitadel/internal/eventstore/handler"
"github.com/zitadel/zitadel/internal/eventstore/handler/v2"
"github.com/zitadel/zitadel/internal/repository/instance"
"github.com/zitadel/zitadel/internal/repository/org"
"github.com/zitadel/zitadel/internal/repository/policy"
)
const (
PasswordComplexityTable = "projections.password_complexity_policies2"
ComplexityPolicyIDCol = "id"
ComplexityPolicyCreationDateCol = "creation_date"
ComplexityPolicyChangeDateCol = "change_date"
ComplexityPolicySequenceCol = "sequence"
ComplexityPolicyStateCol = "state"
ComplexityPolicyIsDefaultCol = "is_default"
ComplexityPolicyResourceOwnerCol = "resource_owner"
ComplexityPolicyInstanceIDCol = "instance_id"
ComplexityPolicyMinLengthCol = "min_length"
ComplexityPolicyHasLowercaseCol = "has_lowercase"
ComplexityPolicyHasUppercaseCol = "has_uppercase"
ComplexityPolicyHasSymbolCol = "has_symbol"
ComplexityPolicyHasNumberCol = "has_number"
ComplexityPolicyOwnerRemovedCol = "owner_removed"
)
type passwordComplexityProjection struct{}
func newPasswordComplexityProjection(ctx context.Context, config handler.Config) *handler.Handler {
return handler.NewHandler(ctx, &config, new(passwordComplexityProjection))
}
func (*passwordComplexityProjection) Name() string {
return PasswordComplexityTable
}
func (*passwordComplexityProjection) Init() *old_handler.Check {
return handler.NewTableCheck(
handler.NewTable([]*handler.InitColumn{
handler.NewColumn(ComplexityPolicyIDCol, handler.ColumnTypeText),
handler.NewColumn(ComplexityPolicyCreationDateCol, handler.ColumnTypeTimestamp),
handler.NewColumn(ComplexityPolicyChangeDateCol, handler.ColumnTypeTimestamp),
handler.NewColumn(ComplexityPolicySequenceCol, handler.ColumnTypeInt64),
handler.NewColumn(ComplexityPolicyStateCol, handler.ColumnTypeEnum),
handler.NewColumn(ComplexityPolicyIsDefaultCol, handler.ColumnTypeBool, handler.Default(false)),
handler.NewColumn(ComplexityPolicyResourceOwnerCol, handler.ColumnTypeText),
handler.NewColumn(ComplexityPolicyInstanceIDCol, handler.ColumnTypeText),
handler.NewColumn(ComplexityPolicyMinLengthCol, handler.ColumnTypeInt64),
handler.NewColumn(ComplexityPolicyHasLowercaseCol, handler.ColumnTypeBool),
handler.NewColumn(ComplexityPolicyHasUppercaseCol, handler.ColumnTypeBool),
handler.NewColumn(ComplexityPolicyHasSymbolCol, handler.ColumnTypeBool),
handler.NewColumn(ComplexityPolicyHasNumberCol, handler.ColumnTypeBool),
handler.NewColumn(ComplexityPolicyOwnerRemovedCol, handler.ColumnTypeBool, handler.Default(false)),
},
handler.NewPrimaryKey(ComplexityPolicyInstanceIDCol, ComplexityPolicyIDCol),
handler.WithIndex(handler.NewIndex("owner_removed", []string{ComplexityPolicyOwnerRemovedCol})),
),
)
}
func (p *passwordComplexityProjection) Reducers() []handler.AggregateReducer {
return []handler.AggregateReducer{
{
Aggregate: org.AggregateType,
EventReducers: []handler.EventReducer{
{
Event: org.PasswordComplexityPolicyAddedEventType,
Reduce: p.reduceAdded,
},
{
Event: org.PasswordComplexityPolicyChangedEventType,
Reduce: p.reduceChanged,
},
{
Event: org.PasswordComplexityPolicyRemovedEventType,
Reduce: p.reduceRemoved,
},
{
Event: org.OrgRemovedEventType,
Reduce: p.reduceOwnerRemoved,
},
},
},
{
Aggregate: instance.AggregateType,
EventReducers: []handler.EventReducer{
{
Event: instance.PasswordComplexityPolicyAddedEventType,
Reduce: p.reduceAdded,
},
{
Event: instance.PasswordComplexityPolicyChangedEventType,
Reduce: p.reduceChanged,
},
{
Event: instance.InstanceRemovedEventType,
Reduce: reduceInstanceRemovedHelper(ComplexityPolicyInstanceIDCol),
},
},
},
}
}
func (p *passwordComplexityProjection) reduceAdded(event eventstore.Event) (*handler.Statement, error) {
var policyEvent policy.PasswordComplexityPolicyAddedEvent
var isDefault bool
switch e := event.(type) {
case *org.PasswordComplexityPolicyAddedEvent:
policyEvent = e.PasswordComplexityPolicyAddedEvent
isDefault = false
case *instance.PasswordComplexityPolicyAddedEvent:
policyEvent = e.PasswordComplexityPolicyAddedEvent
isDefault = true
default:
return nil, errors.ThrowInvalidArgumentf(nil, "PROJE-KTHmJ", "reduce.wrong.event.type %v", []eventstore.EventType{org.PasswordComplexityPolicyAddedEventType, instance.PasswordComplexityPolicyAddedEventType})
}
return handler.NewCreateStatement(
&policyEvent,
[]handler.Column{
handler.NewCol(ComplexityPolicyCreationDateCol, policyEvent.CreationDate()),
handler.NewCol(ComplexityPolicyChangeDateCol, policyEvent.CreationDate()),
handler.NewCol(ComplexityPolicySequenceCol, policyEvent.Sequence()),
handler.NewCol(ComplexityPolicyIDCol, policyEvent.Aggregate().ID),
handler.NewCol(ComplexityPolicyStateCol, domain.PolicyStateActive),
handler.NewCol(ComplexityPolicyMinLengthCol, policyEvent.MinLength),
handler.NewCol(ComplexityPolicyHasLowercaseCol, policyEvent.HasLowercase),
handler.NewCol(ComplexityPolicyHasUppercaseCol, policyEvent.HasUppercase),
handler.NewCol(ComplexityPolicyHasSymbolCol, policyEvent.HasSymbol),
handler.NewCol(ComplexityPolicyHasNumberCol, policyEvent.HasNumber),
handler.NewCol(ComplexityPolicyResourceOwnerCol, policyEvent.Aggregate().ResourceOwner),
handler.NewCol(ComplexityPolicyInstanceIDCol, policyEvent.Aggregate().InstanceID),
handler.NewCol(ComplexityPolicyIsDefaultCol, isDefault),
}), nil
}
func (p *passwordComplexityProjection) reduceChanged(event eventstore.Event) (*handler.Statement, error) {
var policyEvent policy.PasswordComplexityPolicyChangedEvent
switch e := event.(type) {
case *org.PasswordComplexityPolicyChangedEvent:
policyEvent = e.PasswordComplexityPolicyChangedEvent
case *instance.PasswordComplexityPolicyChangedEvent:
policyEvent = e.PasswordComplexityPolicyChangedEvent
default:
return nil, errors.ThrowInvalidArgumentf(nil, "PROJE-cf3Xb", "reduce.wrong.event.type %v", []eventstore.EventType{org.PasswordComplexityPolicyChangedEventType, instance.PasswordComplexityPolicyChangedEventType})
}
cols := []handler.Column{
handler.NewCol(ComplexityPolicyChangeDateCol, policyEvent.CreationDate()),
handler.NewCol(ComplexityPolicySequenceCol, policyEvent.Sequence()),
}
if policyEvent.MinLength != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyMinLengthCol, *policyEvent.MinLength))
}
if policyEvent.HasLowercase != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasLowercaseCol, *policyEvent.HasLowercase))
}
if policyEvent.HasUppercase != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasUppercaseCol, *policyEvent.HasUppercase))
}
if policyEvent.HasSymbol != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasSymbolCol, *policyEvent.HasSymbol))
}
if policyEvent.HasNumber != nil {
cols = append(cols, handler.NewCol(ComplexityPolicyHasNumberCol, *policyEvent.HasNumber))
}
return handler.NewUpdateStatement(
&policyEvent,
cols,
[]handler.Condition{
handler.NewCond(ComplexityPolicyIDCol, policyEvent.Aggregate().ID),
handler.NewCond(ComplexityPolicyInstanceIDCol, policyEvent.Aggregate().InstanceID),
}), nil
}
func (p *passwordComplexityProjection) reduceRemoved(event eventstore.Event) (*handler.Statement, error) {
policyEvent, ok := event.(*org.PasswordComplexityPolicyRemovedEvent)
if !ok {
return nil, errors.ThrowInvalidArgumentf(nil, "PROJE-wttCd", "reduce.wrong.event.type %s", org.PasswordComplexityPolicyRemovedEventType)
}
return handler.NewDeleteStatement(
policyEvent,
[]handler.Condition{
handler.NewCond(ComplexityPolicyIDCol, policyEvent.Aggregate().ID),
handler.NewCond(ComplexityPolicyInstanceIDCol, policyEvent.Aggregate().InstanceID),
}), nil
}
func (p *passwordComplexityProjection) reduceOwnerRemoved(event eventstore.Event) (*handler.Statement, error) {
e, ok := event.(*org.OrgRemovedEvent)
if !ok {
return nil, errors.ThrowInvalidArgumentf(nil, "PROJE-pGTz9", "reduce.wrong.event.type %s", org.OrgRemovedEventType)
}
return handler.NewDeleteStatement(
e,
[]handler.Condition{
handler.NewCond(ComplexityPolicyInstanceIDCol, e.Aggregate().InstanceID),
handler.NewCond(ComplexityPolicyResourceOwnerCol, e.Aggregate().ID),
},
), nil
}