mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-15 12:27:59 +00:00
21c38b061d
# Which Problems Are Solved Send Email messages as a HTTP call to a relay, for own logic on handling different Email providers # How the Problems Are Solved Create endpoints under Email provider to manage SMTP and HTTP in the notification handlers. # Additional Changes Clean up old logic in command and query side to handle the general Email providers with deactivate, activate and remove. # Additional Context Partially closes #8270 --------- Co-authored-by: Livio Spring <livio.a@gmail.com>
199 lines
7.7 KiB
Go
199 lines
7.7 KiB
Go
package admin
|
|
|
|
import (
|
|
"context"
|
|
|
|
"google.golang.org/protobuf/types/known/durationpb"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
"github.com/zitadel/zitadel/internal/api/grpc/object"
|
|
obj_grpc "github.com/zitadel/zitadel/internal/api/grpc/object"
|
|
"github.com/zitadel/zitadel/internal/command"
|
|
"github.com/zitadel/zitadel/internal/crypto"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/query"
|
|
"github.com/zitadel/zitadel/internal/zerrors"
|
|
admin_pb "github.com/zitadel/zitadel/pkg/grpc/admin"
|
|
settings_pb "github.com/zitadel/zitadel/pkg/grpc/settings"
|
|
)
|
|
|
|
func listSecretGeneratorToModel(req *admin_pb.ListSecretGeneratorsRequest) (*query.SecretGeneratorSearchQueries, error) {
|
|
offset, limit, asc := object.ListQueryToModel(req.Query)
|
|
queries, err := SecretGeneratorQueriesToModel(req.Queries)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &query.SecretGeneratorSearchQueries{
|
|
SearchRequest: query.SearchRequest{
|
|
Offset: offset,
|
|
Limit: limit,
|
|
Asc: asc,
|
|
},
|
|
Queries: queries,
|
|
}, nil
|
|
}
|
|
|
|
func SecretGeneratorQueriesToModel(queries []*settings_pb.SecretGeneratorQuery) (_ []query.SearchQuery, err error) {
|
|
q := make([]query.SearchQuery, len(queries))
|
|
for i, query := range queries {
|
|
q[i], err = SecretGeneratorQueryToModel(query)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
return q, nil
|
|
}
|
|
|
|
func SecretGeneratorQueryToModel(apiQuery *settings_pb.SecretGeneratorQuery) (query.SearchQuery, error) {
|
|
switch q := apiQuery.Query.(type) {
|
|
case *settings_pb.SecretGeneratorQuery_TypeQuery:
|
|
domainType := SecretGeneratorTypeToDomain(q.TypeQuery.GeneratorType)
|
|
return query.NewSecretGeneratorTypeSearchQuery(int32(domainType))
|
|
default:
|
|
return nil, zerrors.ThrowInvalidArgument(nil, "ORG-fm9es", "List.Query.Invalid")
|
|
}
|
|
}
|
|
|
|
func UpdateSecretGeneratorToConfig(req *admin_pb.UpdateSecretGeneratorRequest) *crypto.GeneratorConfig {
|
|
return &crypto.GeneratorConfig{
|
|
Length: uint(req.Length),
|
|
Expiry: req.Expiry.AsDuration(),
|
|
IncludeUpperLetters: req.IncludeUpperLetters,
|
|
IncludeLowerLetters: req.IncludeLowerLetters,
|
|
IncludeDigits: req.IncludeDigits,
|
|
IncludeSymbols: req.IncludeSymbols,
|
|
}
|
|
}
|
|
|
|
func SecretGeneratorsToPb(generators []*query.SecretGenerator) []*settings_pb.SecretGenerator {
|
|
list := make([]*settings_pb.SecretGenerator, len(generators))
|
|
for i, generator := range generators {
|
|
list[i] = SecretGeneratorToPb(generator)
|
|
}
|
|
return list
|
|
}
|
|
|
|
func SecretGeneratorToPb(generator *query.SecretGenerator) *settings_pb.SecretGenerator {
|
|
mapped := &settings_pb.SecretGenerator{
|
|
GeneratorType: SecretGeneratorTypeToPb(generator.GeneratorType),
|
|
Length: uint32(generator.Length),
|
|
Expiry: durationpb.New(generator.Expiry),
|
|
IncludeUpperLetters: generator.IncludeUpperLetters,
|
|
IncludeLowerLetters: generator.IncludeLowerLetters,
|
|
IncludeDigits: generator.IncludeDigits,
|
|
IncludeSymbols: generator.IncludeSymbols,
|
|
Details: obj_grpc.ToViewDetailsPb(generator.Sequence, generator.CreationDate, generator.ChangeDate, generator.AggregateID),
|
|
}
|
|
return mapped
|
|
}
|
|
|
|
func SecretGeneratorTypeToPb(generatorType domain.SecretGeneratorType) settings_pb.SecretGeneratorType {
|
|
switch generatorType {
|
|
case domain.SecretGeneratorTypeInitCode:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_INIT_CODE
|
|
case domain.SecretGeneratorTypeVerifyEmailCode:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_VERIFY_EMAIL_CODE
|
|
case domain.SecretGeneratorTypeVerifyPhoneCode:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_VERIFY_PHONE_CODE
|
|
case domain.SecretGeneratorTypePasswordResetCode:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_PASSWORD_RESET_CODE
|
|
case domain.SecretGeneratorTypePasswordlessInitCode:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_PASSWORDLESS_INIT_CODE
|
|
case domain.SecretGeneratorTypeAppSecret:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_APP_SECRET
|
|
case domain.SecretGeneratorTypeOTPSMS:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_OTP_SMS
|
|
case domain.SecretGeneratorTypeOTPEmail:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_OTP_EMAIL
|
|
default:
|
|
return settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_UNSPECIFIED
|
|
}
|
|
}
|
|
|
|
func SecretGeneratorTypeToDomain(generatorType settings_pb.SecretGeneratorType) domain.SecretGeneratorType {
|
|
switch generatorType {
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_INIT_CODE:
|
|
return domain.SecretGeneratorTypeInitCode
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_VERIFY_EMAIL_CODE:
|
|
return domain.SecretGeneratorTypeVerifyEmailCode
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_VERIFY_PHONE_CODE:
|
|
return domain.SecretGeneratorTypeVerifyPhoneCode
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_PASSWORD_RESET_CODE:
|
|
return domain.SecretGeneratorTypePasswordResetCode
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_PASSWORDLESS_INIT_CODE:
|
|
return domain.SecretGeneratorTypePasswordlessInitCode
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_APP_SECRET:
|
|
return domain.SecretGeneratorTypeAppSecret
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_OTP_SMS:
|
|
return domain.SecretGeneratorTypeOTPSMS
|
|
case settings_pb.SecretGeneratorType_SECRET_GENERATOR_TYPE_OTP_EMAIL:
|
|
return domain.SecretGeneratorTypeOTPEmail
|
|
default:
|
|
return domain.SecretGeneratorTypeUnspecified
|
|
}
|
|
}
|
|
|
|
func addSMTPToConfig(ctx context.Context, req *admin_pb.AddSMTPConfigRequest) *command.AddSMTPConfig {
|
|
return &command.AddSMTPConfig{
|
|
ResourceOwner: authz.GetInstance(ctx).InstanceID(),
|
|
Description: req.Description,
|
|
Tls: req.Tls,
|
|
From: req.SenderAddress,
|
|
FromName: req.SenderName,
|
|
ReplyToAddress: req.ReplyToAddress,
|
|
Host: req.Host,
|
|
User: req.User,
|
|
Password: req.Password,
|
|
}
|
|
}
|
|
|
|
func updateSMTPToConfig(ctx context.Context, req *admin_pb.UpdateSMTPConfigRequest) *command.ChangeSMTPConfig {
|
|
return &command.ChangeSMTPConfig{
|
|
ResourceOwner: authz.GetInstance(ctx).InstanceID(),
|
|
ID: req.Id,
|
|
Description: req.Description,
|
|
Tls: req.Tls,
|
|
From: req.SenderAddress,
|
|
FromName: req.SenderName,
|
|
ReplyToAddress: req.ReplyToAddress,
|
|
Host: req.Host,
|
|
User: req.User,
|
|
Password: req.Password,
|
|
}
|
|
}
|
|
|
|
func SMTPConfigToPb(smtp *query.SMTPConfig) *settings_pb.SMTPConfig {
|
|
if smtp.SMTPConfig != nil {
|
|
return &settings_pb.SMTPConfig{
|
|
Description: smtp.Description,
|
|
Tls: smtp.SMTPConfig.TLS,
|
|
SenderAddress: smtp.SMTPConfig.SenderAddress,
|
|
SenderName: smtp.SMTPConfig.SenderName,
|
|
ReplyToAddress: smtp.SMTPConfig.ReplyToAddress,
|
|
Host: smtp.SMTPConfig.Host,
|
|
User: smtp.SMTPConfig.User,
|
|
Details: obj_grpc.ToViewDetailsPb(smtp.Sequence, smtp.CreationDate, smtp.ChangeDate, smtp.ResourceOwner),
|
|
Id: smtp.ID,
|
|
State: settings_pb.SMTPConfigState(smtp.State),
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func SecurityPolicyToPb(policy *query.SecurityPolicy) *settings_pb.SecurityPolicy {
|
|
return &settings_pb.SecurityPolicy{
|
|
Details: obj_grpc.ToViewDetailsPb(policy.Sequence, policy.CreationDate, policy.ChangeDate, policy.AggregateID),
|
|
EnableIframeEmbedding: policy.EnableIframeEmbedding,
|
|
AllowedOrigins: policy.AllowedOrigins,
|
|
EnableImpersonation: policy.EnableImpersonation,
|
|
}
|
|
}
|
|
|
|
func securityPolicyToCommand(req *admin_pb.SetSecurityPolicyRequest) *command.SecurityPolicy {
|
|
return &command.SecurityPolicy{
|
|
EnableIframeEmbedding: req.GetEnableIframeEmbedding(),
|
|
AllowedOrigins: req.GetAllowedOrigins(),
|
|
EnableImpersonation: req.GetEnableImpersonation(),
|
|
}
|
|
}
|