mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-13 03:24:26 +00:00
aed7010508
* fix: improve scheduling * build pre-release * fix: locker * fix: user handler and print stack in case of panic in reducer * chore: remove sentry * fix: improve handler projection and implement tests * more tests * fix: race condition in tests * Update internal/eventstore/repository/sql/query.go Co-authored-by: Silvan <silvan.reusser@gmail.com> * fix: implemented suggested changes * fix: lock statement Co-authored-by: Silvan <silvan.reusser@gmail.com>
159 lines
4.1 KiB
Go
159 lines
4.1 KiB
Go
package query
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
errs "errors"
|
|
"time"
|
|
|
|
sq "github.com/Masterminds/squirrel"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/query/projection"
|
|
)
|
|
|
|
type LockoutPolicy struct {
|
|
ID string
|
|
Sequence uint64
|
|
CreationDate time.Time
|
|
ChangeDate time.Time
|
|
ResourceOwner string
|
|
State domain.PolicyState
|
|
|
|
MaxPasswordAttempts uint64
|
|
ShowFailures bool
|
|
|
|
IsDefault bool
|
|
}
|
|
|
|
var (
|
|
lockoutTable = table{
|
|
name: projection.LockoutPolicyTable,
|
|
}
|
|
LockoutColID = Column{
|
|
name: projection.LockoutPolicyIDCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColInstanceID = Column{
|
|
name: projection.LockoutPolicyInstanceIDCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColSequence = Column{
|
|
name: projection.LockoutPolicySequenceCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColCreationDate = Column{
|
|
name: projection.LockoutPolicyCreationDateCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColChangeDate = Column{
|
|
name: projection.LockoutPolicyChangeDateCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColResourceOwner = Column{
|
|
name: projection.LockoutPolicyResourceOwnerCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColShowFailures = Column{
|
|
name: projection.LockoutPolicyShowLockOutFailuresCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColMaxPasswordAttempts = Column{
|
|
name: projection.LockoutPolicyMaxPasswordAttemptsCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColIsDefault = Column{
|
|
name: projection.LockoutPolicyIsDefaultCol,
|
|
table: lockoutTable,
|
|
}
|
|
LockoutColState = Column{
|
|
name: projection.LockoutPolicyStateCol,
|
|
table: lockoutTable,
|
|
}
|
|
)
|
|
|
|
func (q *Queries) LockoutPolicyByOrg(ctx context.Context, shouldTriggerBulk bool, orgID string) (*LockoutPolicy, error) {
|
|
if shouldTriggerBulk {
|
|
projection.LockoutPolicyProjection.Trigger(ctx)
|
|
}
|
|
|
|
stmt, scan := prepareLockoutPolicyQuery()
|
|
query, args, err := stmt.Where(
|
|
sq.And{
|
|
sq.Eq{
|
|
LockoutColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
},
|
|
sq.Or{
|
|
sq.Eq{
|
|
LockoutColID.identifier(): orgID,
|
|
},
|
|
sq.Eq{
|
|
LockoutColID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
},
|
|
},
|
|
}).
|
|
OrderBy(LockoutColIsDefault.identifier()).
|
|
Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-SKR6X", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
row := q.client.QueryRowContext(ctx, query, args...)
|
|
return scan(row)
|
|
}
|
|
|
|
func (q *Queries) DefaultLockoutPolicy(ctx context.Context) (*LockoutPolicy, error) {
|
|
stmt, scan := prepareLockoutPolicyQuery()
|
|
query, args, err := stmt.Where(sq.Eq{
|
|
LockoutColID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
LockoutColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
}).
|
|
OrderBy(LockoutColIsDefault.identifier()).
|
|
Limit(1).ToSql()
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-mN0Ci", "Errors.Query.SQLStatement")
|
|
}
|
|
|
|
row := q.client.QueryRowContext(ctx, query, args...)
|
|
return scan(row)
|
|
}
|
|
|
|
func prepareLockoutPolicyQuery() (sq.SelectBuilder, func(*sql.Row) (*LockoutPolicy, error)) {
|
|
return sq.Select(
|
|
LockoutColID.identifier(),
|
|
LockoutColSequence.identifier(),
|
|
LockoutColCreationDate.identifier(),
|
|
LockoutColChangeDate.identifier(),
|
|
LockoutColResourceOwner.identifier(),
|
|
LockoutColShowFailures.identifier(),
|
|
LockoutColMaxPasswordAttempts.identifier(),
|
|
LockoutColIsDefault.identifier(),
|
|
LockoutColState.identifier(),
|
|
).
|
|
From(lockoutTable.identifier()).PlaceholderFormat(sq.Dollar),
|
|
func(row *sql.Row) (*LockoutPolicy, error) {
|
|
policy := new(LockoutPolicy)
|
|
err := row.Scan(
|
|
&policy.ID,
|
|
&policy.Sequence,
|
|
&policy.CreationDate,
|
|
&policy.ChangeDate,
|
|
&policy.ResourceOwner,
|
|
&policy.ShowFailures,
|
|
&policy.MaxPasswordAttempts,
|
|
&policy.IsDefault,
|
|
&policy.State,
|
|
)
|
|
if err != nil {
|
|
if errs.Is(err, sql.ErrNoRows) {
|
|
return nil, errors.ThrowNotFound(err, "QUERY-63mtI", "Errors.PasswordComplexityPolicy.NotFound")
|
|
}
|
|
return nil, errors.ThrowInternal(err, "QUERY-uulCZ", "Errors.Internal")
|
|
}
|
|
return policy, nil
|
|
}
|
|
}
|