mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 19:14:23 +00:00
c5b99274d7
* commander * commander * selber! * move to packages * fix(errors): implement Is interface * test: command * test: commands * add init steps * setup tenant * add default step yaml * possibility to set password * merge v2 into v2-commander * fix: rename iam command side to instance * fix: rename iam command side to instance * fix: rename iam command side to instance * fix: rename iam command side to instance * fix: search query builder can filter events in memory * fix: filters for add member * fix(setup): add `ExternalSecure` to config * chore: name iam to instance * fix: matching * remove unsued func * base url * base url * test(command): filter funcs * test: commands * fix: rename orgiampolicy to domain policy * start from init * commands * config * fix indexes and add constraints * fixes * fix: merge conflicts * fix: protos * fix: md files * setup * add deprecated org iam policy again * typo * fix search query * fix filter * Apply suggestions from code review * remove custom org from org setup * add todos for verification * change apps creation * simplify package structure * fix error * move preparation helper for tests * fix unique constraints * fix config mapping in setup * fix error handling in encryption_keys.go * fix projection config * fix query from old views to projection * fix setup of mgmt api * set iam project and fix instance projection * imports Co-authored-by: Livio Amstutz <livio.a@gmail.com> Co-authored-by: fabi <fabienne.gerschwiler@gmail.com>
291 lines
7.9 KiB
Go
291 lines
7.9 KiB
Go
package command
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
"github.com/caos/zitadel/internal/api/authz"
|
|
"github.com/caos/zitadel/internal/api/ui/console"
|
|
"github.com/caos/zitadel/internal/command/v2/preparation"
|
|
"github.com/caos/zitadel/internal/domain"
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
"github.com/caos/zitadel/internal/id"
|
|
"github.com/caos/zitadel/internal/repository/instance"
|
|
"github.com/caos/zitadel/internal/repository/org"
|
|
"github.com/caos/zitadel/internal/repository/project"
|
|
"github.com/caos/zitadel/internal/repository/user"
|
|
)
|
|
|
|
const (
|
|
zitadelProjectName = "ZITADEL"
|
|
mgmtAppName = "Management-API"
|
|
adminAppName = "Admin-API"
|
|
authAppName = "Auth-API"
|
|
consoleAppName = "Console"
|
|
consoleRedirectPath = console.HandlerPrefix + "/auth/callback"
|
|
consolePostLogoutPath = console.HandlerPrefix + "/signedout"
|
|
)
|
|
|
|
type InstanceSetup struct {
|
|
Org OrgSetup
|
|
Zitadel ZitadelConfig
|
|
PasswordComplexityPolicy struct {
|
|
MinLength uint64
|
|
HasLowercase bool
|
|
HasUppercase bool
|
|
HasNumber bool
|
|
HasSymbol bool
|
|
}
|
|
PasswordAgePolicy struct {
|
|
ExpireWarnDays uint64
|
|
MaxAgeDays uint64
|
|
}
|
|
DomainPolicy struct {
|
|
UserLoginMustBeDomain bool
|
|
}
|
|
LoginPolicy struct {
|
|
AllowUsernamePassword bool
|
|
AllowRegister bool
|
|
AllowExternalIDP bool
|
|
ForceMFA bool
|
|
HidePasswordReset bool
|
|
PasswordlessType domain.PasswordlessType
|
|
PasswordCheckLifetime time.Duration
|
|
ExternalLoginCheckLifetime time.Duration
|
|
MfaInitSkipLifetime time.Duration
|
|
SecondFactorCheckLifetime time.Duration
|
|
MultiFactorCheckLifetime time.Duration
|
|
}
|
|
PrivacyPolicy struct {
|
|
TOSLink string
|
|
PrivacyLink string
|
|
HelpLink string
|
|
}
|
|
LockoutPolicy struct {
|
|
MaxAttempts uint64
|
|
ShouldShowLockoutFailure bool
|
|
}
|
|
EmailTemplate []byte
|
|
MessageTexts []*domain.CustomMessageText
|
|
}
|
|
|
|
type ZitadelConfig struct {
|
|
IsDevMode bool
|
|
BaseURL string
|
|
|
|
projectID string
|
|
mgmtID string
|
|
mgmtClientID string
|
|
adminID string
|
|
adminClientID string
|
|
authID string
|
|
authClientID string
|
|
consoleID string
|
|
consoleClientID string
|
|
}
|
|
|
|
func (s *InstanceSetup) generateIDs() (err error) {
|
|
s.Zitadel.projectID, err = id.SonyFlakeGenerator.Next()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
s.Zitadel.mgmtID, err = id.SonyFlakeGenerator.Next()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.Zitadel.mgmtClientID, err = domain.NewClientID(id.SonyFlakeGenerator, zitadelProjectName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
s.Zitadel.adminID, err = id.SonyFlakeGenerator.Next()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.Zitadel.adminClientID, err = domain.NewClientID(id.SonyFlakeGenerator, zitadelProjectName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
s.Zitadel.authID, err = id.SonyFlakeGenerator.Next()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.Zitadel.authClientID, err = domain.NewClientID(id.SonyFlakeGenerator, zitadelProjectName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
s.Zitadel.consoleID, err = id.SonyFlakeGenerator.Next()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.Zitadel.consoleClientID, err = domain.NewClientID(id.SonyFlakeGenerator, zitadelProjectName)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (command *Command) SetUpInstance(ctx context.Context, setup *InstanceSetup) (*domain.ObjectDetails, error) {
|
|
// TODO
|
|
// instanceID, err := id.SonyFlakeGenerator.Next()
|
|
// if err != nil {
|
|
// return nil, err
|
|
// }
|
|
ctx = authz.SetCtxData(authz.WithInstance(ctx, authz.Instance{ID: "system"}), authz.CtxData{OrgID: domain.IAMID, ResourceOwner: domain.IAMID})
|
|
|
|
orgID, err := id.SonyFlakeGenerator.Next()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
userID, err := id.SonyFlakeGenerator.Next()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err = setup.generateIDs(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
setup.Org.Human.PasswordChangeRequired = true
|
|
|
|
instanceAgg := instance.NewAggregate()
|
|
orgAgg := org.NewAggregate(orgID, orgID)
|
|
userAgg := user.NewAggregate(userID, orgID)
|
|
projectAgg := project.NewAggregate(setup.Zitadel.projectID, orgID)
|
|
|
|
validations := []preparation.Validation{
|
|
AddPasswordComplexityPolicy(
|
|
instanceAgg,
|
|
setup.PasswordComplexityPolicy.MinLength,
|
|
setup.PasswordComplexityPolicy.HasLowercase,
|
|
setup.PasswordComplexityPolicy.HasUppercase,
|
|
setup.PasswordComplexityPolicy.HasNumber,
|
|
setup.PasswordComplexityPolicy.HasSymbol,
|
|
),
|
|
AddPasswordAgePolicy(
|
|
instanceAgg,
|
|
setup.PasswordAgePolicy.ExpireWarnDays,
|
|
setup.PasswordAgePolicy.MaxAgeDays,
|
|
),
|
|
AddDefaultDomainPolicy(
|
|
instanceAgg,
|
|
setup.DomainPolicy.UserLoginMustBeDomain,
|
|
),
|
|
AddDefaultLoginPolicy(
|
|
instanceAgg,
|
|
setup.LoginPolicy.AllowUsernamePassword,
|
|
setup.LoginPolicy.AllowRegister,
|
|
setup.LoginPolicy.AllowExternalIDP,
|
|
setup.LoginPolicy.ForceMFA,
|
|
setup.LoginPolicy.HidePasswordReset,
|
|
setup.LoginPolicy.PasswordlessType,
|
|
setup.LoginPolicy.PasswordCheckLifetime,
|
|
setup.LoginPolicy.ExternalLoginCheckLifetime,
|
|
setup.LoginPolicy.MfaInitSkipLifetime,
|
|
setup.LoginPolicy.SecondFactorCheckLifetime,
|
|
setup.LoginPolicy.MultiFactorCheckLifetime,
|
|
),
|
|
AddSecondFactorToDefaultLoginPolicy(instanceAgg, domain.SecondFactorTypeOTP),
|
|
AddSecondFactorToDefaultLoginPolicy(instanceAgg, domain.SecondFactorTypeU2F),
|
|
AddMultiFactorToDefaultLoginPolicy(instanceAgg, domain.MultiFactorTypeU2FWithPIN),
|
|
|
|
AddPrivacyPolicy(instanceAgg, setup.PrivacyPolicy.TOSLink, setup.PrivacyPolicy.PrivacyLink, setup.PrivacyPolicy.HelpLink),
|
|
AddDefaultLockoutPolicy(instanceAgg, setup.LockoutPolicy.MaxAttempts, setup.LockoutPolicy.ShouldShowLockoutFailure),
|
|
|
|
AddEmailTemplate(instanceAgg, setup.EmailTemplate),
|
|
}
|
|
|
|
for _, msg := range setup.MessageTexts {
|
|
validations = append(validations, SetInstanceCustomTexts(instanceAgg, msg))
|
|
}
|
|
|
|
validations = append(validations,
|
|
AddOrg(orgAgg, setup.Org.Name, command.iamDomain),
|
|
AddHumanCommand(userAgg, &setup.Org.Human, command.userPasswordAlg),
|
|
AddOrgMember(orgAgg, userID, domain.RoleOrgOwner),
|
|
|
|
AddProject(projectAgg, zitadelProjectName, userID, false, false, false, domain.PrivateLabelingSettingUnspecified),
|
|
|
|
SetIAMProject(instanceAgg, projectAgg.ID),
|
|
|
|
AddAPIApp(
|
|
*projectAgg,
|
|
setup.Zitadel.mgmtID,
|
|
mgmtAppName,
|
|
setup.Zitadel.mgmtClientID,
|
|
nil,
|
|
domain.APIAuthMethodTypePrivateKeyJWT,
|
|
),
|
|
|
|
AddAPIApp(
|
|
*projectAgg,
|
|
setup.Zitadel.adminID,
|
|
adminAppName,
|
|
setup.Zitadel.adminClientID,
|
|
nil,
|
|
domain.APIAuthMethodTypePrivateKeyJWT,
|
|
),
|
|
|
|
AddAPIApp(
|
|
*projectAgg,
|
|
setup.Zitadel.authID,
|
|
authAppName,
|
|
setup.Zitadel.authClientID,
|
|
nil,
|
|
domain.APIAuthMethodTypePrivateKeyJWT,
|
|
),
|
|
|
|
AddOIDCApp(
|
|
*projectAgg,
|
|
domain.OIDCVersionV1,
|
|
setup.Zitadel.consoleID,
|
|
consoleAppName,
|
|
setup.Zitadel.consoleClientID,
|
|
nil,
|
|
[]string{setup.Zitadel.BaseURL + consoleRedirectPath},
|
|
[]domain.OIDCResponseType{domain.OIDCResponseTypeCode},
|
|
[]domain.OIDCGrantType{domain.OIDCGrantTypeAuthorizationCode},
|
|
domain.OIDCApplicationTypeUserAgent,
|
|
domain.OIDCAuthMethodTypeNone,
|
|
[]string{setup.Zitadel.BaseURL + consolePostLogoutPath},
|
|
setup.Zitadel.IsDevMode,
|
|
domain.OIDCTokenTypeBearer,
|
|
false,
|
|
false,
|
|
false,
|
|
0,
|
|
nil,
|
|
),
|
|
)
|
|
|
|
cmds, err := preparation.PrepareCommands(ctx, command.es.Filter, validations...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
events, err := command.es.Push(ctx, cmds...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &domain.ObjectDetails{
|
|
Sequence: events[len(events)-1].Sequence(),
|
|
EventDate: events[len(events)-1].CreationDate(),
|
|
ResourceOwner: orgID,
|
|
}, nil
|
|
}
|
|
|
|
//SetIAMProject defines the commands to set the id of the IAM project onto the instance
|
|
func SetIAMProject(a *instance.Aggregate, projectID string) preparation.Validation {
|
|
return func() (preparation.CreateCommands, error) {
|
|
return func(ctx context.Context, filter preparation.FilterToQueryReducer) ([]eventstore.Command, error) {
|
|
return []eventstore.Command{
|
|
instance.NewIAMProjectSetEvent(ctx, &a.Aggregate, projectID),
|
|
}, nil
|
|
}, nil
|
|
}
|
|
}
|