mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-13 19:44:21 +00:00
8f6cb47567
* take baseurl if saved on event * refactor: make es mocks reusable * Revert "refactor: make es mocks reusable" This reverts commit434ce12a6a
. * make messages testable * test asset url * fmt * fmt * simplify notification.Start * test url combinations * support init code added * support password changed * support reset pw * support user domain claimed * support add pwless login * support verify phone * Revert "support verify phone" This reverts commite40503303e
. * save trigger origin from ctx * add ready for review check * camel * test email otp * fix variable naming * fix DefaultOTPEmailURLV2 * Revert "fix DefaultOTPEmailURLV2" This reverts commitfa34d4d2a8
. * fix email otp challenged test * fix email otp challenged test * pass origin in login and gateway requests * take origin from header * take x-forwarded if present * Update internal/notification/handlers/queries.go Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> * Update internal/notification/handlers/commands.go Co-authored-by: Tim Möhlmann <tim+github@zitadel.com> * move origin header to ctx if available * generate * cleanup * use forwarded header * support X-Forwarded-* headers * standardize context handling * fix linting --------- Co-authored-by: Tim Möhlmann <tim+github@zitadel.com>
215 lines
5.8 KiB
Go
215 lines
5.8 KiB
Go
package user
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"time"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/http"
|
|
"github.com/zitadel/zitadel/internal/crypto"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/eventstore"
|
|
"github.com/zitadel/zitadel/internal/eventstore/repository"
|
|
)
|
|
|
|
const (
|
|
emailEventPrefix = humanEventPrefix + "email."
|
|
HumanEmailChangedType = emailEventPrefix + "changed"
|
|
HumanEmailVerifiedType = emailEventPrefix + "verified"
|
|
HumanEmailVerificationFailedType = emailEventPrefix + "verification.failed"
|
|
HumanEmailCodeAddedType = emailEventPrefix + "code.added"
|
|
HumanEmailCodeSentType = emailEventPrefix + "code.sent"
|
|
HumanEmailConfirmURLAddedType = emailEventPrefix + "confirm_url.added"
|
|
)
|
|
|
|
type HumanEmailChangedEvent struct {
|
|
eventstore.BaseEvent `json:"-"`
|
|
|
|
EmailAddress domain.EmailAddress `json:"email,omitempty"`
|
|
}
|
|
|
|
func (e *HumanEmailChangedEvent) Data() interface{} {
|
|
return e
|
|
}
|
|
|
|
func (e *HumanEmailChangedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
return nil
|
|
}
|
|
|
|
func NewHumanEmailChangedEvent(ctx context.Context, aggregate *eventstore.Aggregate, emailAddress domain.EmailAddress) *HumanEmailChangedEvent {
|
|
return &HumanEmailChangedEvent{
|
|
BaseEvent: *eventstore.NewBaseEventForPush(
|
|
ctx,
|
|
aggregate,
|
|
HumanEmailChangedType,
|
|
),
|
|
EmailAddress: emailAddress,
|
|
}
|
|
}
|
|
|
|
func HumanEmailChangedEventMapper(event *repository.Event) (eventstore.Event, error) {
|
|
emailChangedEvent := &HumanEmailChangedEvent{
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
}
|
|
err := json.Unmarshal(event.Data, emailChangedEvent)
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "USER-4M0sd", "unable to unmarshal human password changed")
|
|
}
|
|
|
|
return emailChangedEvent, nil
|
|
}
|
|
|
|
type HumanEmailVerifiedEvent struct {
|
|
eventstore.BaseEvent `json:"-"`
|
|
|
|
IsEmailVerified bool `json:"-"`
|
|
}
|
|
|
|
func (e *HumanEmailVerifiedEvent) Data() interface{} {
|
|
return nil
|
|
}
|
|
|
|
func (e *HumanEmailVerifiedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
return nil
|
|
}
|
|
|
|
func NewHumanEmailVerifiedEvent(ctx context.Context, aggregate *eventstore.Aggregate) *HumanEmailVerifiedEvent {
|
|
return &HumanEmailVerifiedEvent{
|
|
BaseEvent: *eventstore.NewBaseEventForPush(
|
|
ctx,
|
|
aggregate,
|
|
HumanEmailVerifiedType,
|
|
),
|
|
}
|
|
}
|
|
|
|
func HumanEmailVerifiedEventMapper(event *repository.Event) (eventstore.Event, error) {
|
|
emailVerified := &HumanEmailVerifiedEvent{
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
IsEmailVerified: true,
|
|
}
|
|
return emailVerified, nil
|
|
}
|
|
|
|
type HumanEmailVerificationFailedEvent struct {
|
|
eventstore.BaseEvent `json:"-"`
|
|
}
|
|
|
|
func (e *HumanEmailVerificationFailedEvent) Data() interface{} {
|
|
return nil
|
|
}
|
|
|
|
func (e *HumanEmailVerificationFailedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
return nil
|
|
}
|
|
|
|
func NewHumanEmailVerificationFailedEvent(ctx context.Context, aggregate *eventstore.Aggregate) *HumanEmailVerificationFailedEvent {
|
|
return &HumanEmailVerificationFailedEvent{
|
|
BaseEvent: *eventstore.NewBaseEventForPush(
|
|
ctx,
|
|
aggregate,
|
|
HumanEmailVerificationFailedType,
|
|
),
|
|
}
|
|
}
|
|
|
|
func HumanEmailVerificationFailedEventMapper(event *repository.Event) (eventstore.Event, error) {
|
|
return &HumanEmailVerificationFailedEvent{
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
}, nil
|
|
}
|
|
|
|
type HumanEmailCodeAddedEvent struct {
|
|
eventstore.BaseEvent `json:"-"`
|
|
|
|
Code *crypto.CryptoValue `json:"code,omitempty"`
|
|
Expiry time.Duration `json:"expiry,omitempty"`
|
|
URLTemplate string `json:"url_template,omitempty"`
|
|
CodeReturned bool `json:"code_returned,omitempty"`
|
|
TriggeredAtOrigin string `json:"triggerOrigin,omitempty"`
|
|
}
|
|
|
|
func (e *HumanEmailCodeAddedEvent) Data() interface{} {
|
|
return e
|
|
}
|
|
|
|
func (e *HumanEmailCodeAddedEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
return nil
|
|
}
|
|
|
|
func (e *HumanEmailCodeAddedEvent) TriggerOrigin() string {
|
|
return e.TriggeredAtOrigin
|
|
}
|
|
|
|
func NewHumanEmailCodeAddedEvent(
|
|
ctx context.Context,
|
|
aggregate *eventstore.Aggregate,
|
|
code *crypto.CryptoValue,
|
|
expiry time.Duration,
|
|
) *HumanEmailCodeAddedEvent {
|
|
return NewHumanEmailCodeAddedEventV2(ctx, aggregate, code, expiry, "", false)
|
|
}
|
|
|
|
func NewHumanEmailCodeAddedEventV2(
|
|
ctx context.Context,
|
|
aggregate *eventstore.Aggregate,
|
|
code *crypto.CryptoValue,
|
|
expiry time.Duration,
|
|
urlTemplate string,
|
|
codeReturned bool,
|
|
) *HumanEmailCodeAddedEvent {
|
|
return &HumanEmailCodeAddedEvent{
|
|
BaseEvent: *eventstore.NewBaseEventForPush(
|
|
ctx,
|
|
aggregate,
|
|
HumanEmailCodeAddedType,
|
|
),
|
|
Code: code,
|
|
Expiry: expiry,
|
|
URLTemplate: urlTemplate,
|
|
CodeReturned: codeReturned,
|
|
TriggeredAtOrigin: http.ComposedOrigin(ctx),
|
|
}
|
|
}
|
|
|
|
func HumanEmailCodeAddedEventMapper(event *repository.Event) (eventstore.Event, error) {
|
|
codeAdded := &HumanEmailCodeAddedEvent{
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
}
|
|
err := json.Unmarshal(event.Data, codeAdded)
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "USER-3M0sd", "unable to unmarshal human email code added")
|
|
}
|
|
|
|
return codeAdded, nil
|
|
}
|
|
|
|
type HumanEmailCodeSentEvent struct {
|
|
eventstore.BaseEvent `json:"-"`
|
|
}
|
|
|
|
func (e *HumanEmailCodeSentEvent) Data() interface{} {
|
|
return nil
|
|
}
|
|
|
|
func (e *HumanEmailCodeSentEvent) UniqueConstraints() []*eventstore.EventUniqueConstraint {
|
|
return nil
|
|
}
|
|
|
|
func NewHumanEmailCodeSentEvent(ctx context.Context, aggregate *eventstore.Aggregate) *HumanEmailCodeSentEvent {
|
|
return &HumanEmailCodeSentEvent{
|
|
BaseEvent: *eventstore.NewBaseEventForPush(
|
|
ctx,
|
|
aggregate,
|
|
HumanEmailCodeSentType,
|
|
),
|
|
}
|
|
}
|
|
|
|
func HumanEmailCodeSentEventMapper(event *repository.Event) (eventstore.Event, error) {
|
|
return &HumanEmailCodeSentEvent{
|
|
BaseEvent: *eventstore.BaseEventFromRepo(event),
|
|
}, nil
|
|
}
|