mirror of
https://github.com/zitadel/zitadel.git
synced 2025-05-07 08:26:49 +00:00

* refactor(domain): add user type * fix(projections): start with login names * fix(login_policy): correct handling of user domain claimed event * fix(projections): add members * refactor: simplify member projections * add migration for members * add metadata to member projections * refactor: login name projection * fix: set correct suffixes on login name projections * test(projections): login name reduces * fix: correct cols in reduce member * test(projections): org, iam, project members * member additional cols and conds as opt, add project grant members * fix(migration): members * fix(migration): correct database name * migration version * migs * better naming for member cond and col * split project and project grant members * prepare member columns * feat(queries): membership query * test(queries): membership prepare * fix(queries): multiple projections for latest sequence * fix(api): use query for membership queries in auth and management * feat: org member queries * fix(api): use query for iam member calls * fix(queries): org members * fix(queries): project members * fix(queries): project grant members * fix(query): member queries and user avatar column * member cols * fix(queries): membership stmt * fix user test * fix user test * fix(membership): correct display name * fix(projection): additional member manipulation events * additional member tests * fix(projections): additional events of idp links * fix: use query for memberships (#2797) * fix(api): use query for memberships * remove comment * handle err * refactor(projections): idp user link user aggregate type * fix(projections): handle old user events * fix(api): add asset prefix * no image for iam members
200 lines
6.9 KiB
Go
200 lines
6.9 KiB
Go
package projection
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/caos/logging"
|
|
"github.com/caos/zitadel/internal/domain"
|
|
"github.com/caos/zitadel/internal/errors"
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
|
"github.com/caos/zitadel/internal/repository/iam"
|
|
"github.com/caos/zitadel/internal/repository/org"
|
|
"github.com/caos/zitadel/internal/repository/policy"
|
|
)
|
|
|
|
type IDPLoginPolicyLinkProjection struct {
|
|
crdb.StatementHandler
|
|
}
|
|
|
|
const (
|
|
IDPLoginPolicyLinkTable = "zitadel.projections.idp_login_policy_links"
|
|
)
|
|
|
|
func NewIDPLoginPolicyLinkProjection(ctx context.Context, config crdb.StatementHandlerConfig) *IDPLoginPolicyLinkProjection {
|
|
p := &IDPLoginPolicyLinkProjection{}
|
|
config.ProjectionName = IDPLoginPolicyLinkTable
|
|
config.Reducers = p.reducers()
|
|
p.StatementHandler = crdb.NewStatementHandler(ctx, config)
|
|
return p
|
|
}
|
|
|
|
func (p *IDPLoginPolicyLinkProjection) reducers() []handler.AggregateReducer {
|
|
return []handler.AggregateReducer{
|
|
{
|
|
Aggregate: org.AggregateType,
|
|
EventRedusers: []handler.EventReducer{
|
|
{
|
|
Event: org.LoginPolicyIDPProviderAddedEventType,
|
|
Reduce: p.reduceAdded,
|
|
},
|
|
{
|
|
Event: org.LoginPolicyIDPProviderCascadeRemovedEventType,
|
|
Reduce: p.reduceCascadeRemoved,
|
|
},
|
|
{
|
|
Event: org.LoginPolicyIDPProviderRemovedEventType,
|
|
Reduce: p.reduceRemoved,
|
|
},
|
|
{
|
|
Event: org.OrgRemovedEventType,
|
|
Reduce: p.reduceOrgRemoved,
|
|
},
|
|
{
|
|
Event: org.IDPConfigRemovedEventType,
|
|
Reduce: p.reduceIDPConfigRemoved,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Aggregate: iam.AggregateType,
|
|
EventRedusers: []handler.EventReducer{
|
|
{
|
|
Event: iam.LoginPolicyIDPProviderAddedEventType,
|
|
Reduce: p.reduceAdded,
|
|
},
|
|
{
|
|
Event: iam.LoginPolicyIDPProviderCascadeRemovedEventType,
|
|
Reduce: p.reduceCascadeRemoved,
|
|
},
|
|
{
|
|
Event: iam.LoginPolicyIDPProviderRemovedEventType,
|
|
Reduce: p.reduceRemoved,
|
|
},
|
|
{
|
|
Event: iam.IDPConfigRemovedEventType,
|
|
Reduce: p.reduceIDPConfigRemoved,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
const (
|
|
IDPLoginPolicyLinkIDPIDCol = "idp_id"
|
|
IDPLoginPolicyLinkAggregateIDCol = "aggregate_id"
|
|
IDPLoginPolicyLinkCreationDateCol = "creation_date"
|
|
IDPLoginPolicyLinkChangeDateCol = "change_date"
|
|
IDPLoginPolicyLinkSequenceCol = "sequence"
|
|
IDPLoginPolicyLinkResourceOwnerCol = "resource_owner"
|
|
IDPLoginPolicyLinkProviderTypeCol = "provider_type"
|
|
)
|
|
|
|
func (p *IDPLoginPolicyLinkProjection) reduceAdded(event eventstore.EventReader) (*handler.Statement, error) {
|
|
var (
|
|
idp policy.IdentityProviderAddedEvent
|
|
providerType domain.IdentityProviderType
|
|
)
|
|
|
|
switch e := event.(type) {
|
|
case *org.IdentityProviderAddedEvent:
|
|
idp = e.IdentityProviderAddedEvent
|
|
providerType = domain.IdentityProviderTypeOrg
|
|
case *iam.IdentityProviderAddedEvent:
|
|
idp = e.IdentityProviderAddedEvent
|
|
providerType = domain.IdentityProviderTypeSystem
|
|
default:
|
|
logging.LogWithFields("HANDL-oce92", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderAddedEventType, iam.LoginPolicyIDPProviderAddedEventType}).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-Nlp55", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewCreateStatement(&idp,
|
|
[]handler.Column{
|
|
handler.NewCol(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
|
handler.NewCol(IDPLoginPolicyLinkAggregateIDCol, idp.Aggregate().ID),
|
|
handler.NewCol(IDPLoginPolicyLinkCreationDateCol, idp.CreationDate()),
|
|
handler.NewCol(IDPLoginPolicyLinkChangeDateCol, idp.CreationDate()),
|
|
handler.NewCol(IDPLoginPolicyLinkSequenceCol, idp.Sequence()),
|
|
handler.NewCol(IDPLoginPolicyLinkResourceOwnerCol, idp.Aggregate().ResourceOwner),
|
|
handler.NewCol(IDPLoginPolicyLinkProviderTypeCol, providerType),
|
|
},
|
|
), nil
|
|
}
|
|
|
|
func (p *IDPLoginPolicyLinkProjection) reduceRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
|
var idp policy.IdentityProviderRemovedEvent
|
|
|
|
switch e := event.(type) {
|
|
case *org.IdentityProviderRemovedEvent:
|
|
idp = e.IdentityProviderRemovedEvent
|
|
case *iam.IdentityProviderRemovedEvent:
|
|
idp = e.IdentityProviderRemovedEvent
|
|
default:
|
|
logging.LogWithFields("HANDL-vAH3I", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderRemovedEventType, iam.LoginPolicyIDPProviderRemovedEventType}).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-tUMYY", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewDeleteStatement(&idp,
|
|
[]handler.Condition{
|
|
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
|
handler.NewCond(IDPLoginPolicyLinkAggregateIDCol, idp.Aggregate().ID),
|
|
},
|
|
), nil
|
|
}
|
|
|
|
func (p *IDPLoginPolicyLinkProjection) reduceCascadeRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
|
var idp policy.IdentityProviderCascadeRemovedEvent
|
|
|
|
switch e := event.(type) {
|
|
case *org.IdentityProviderCascadeRemovedEvent:
|
|
idp = e.IdentityProviderCascadeRemovedEvent
|
|
case *iam.IdentityProviderCascadeRemovedEvent:
|
|
idp = e.IdentityProviderCascadeRemovedEvent
|
|
default:
|
|
logging.LogWithFields("HANDL-7lZaf", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.LoginPolicyIDPProviderCascadeRemovedEventType, iam.LoginPolicyIDPProviderCascadeRemovedEventType}).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-iCKSj", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewDeleteStatement(&idp,
|
|
[]handler.Condition{
|
|
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idp.IDPConfigID),
|
|
handler.NewCond(IDPLoginPolicyLinkAggregateIDCol, idp.Aggregate().ID),
|
|
},
|
|
), nil
|
|
}
|
|
|
|
func (p *IDPLoginPolicyLinkProjection) reduceIDPConfigRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
|
var idpID string
|
|
|
|
switch e := event.(type) {
|
|
case *org.IDPConfigRemovedEvent:
|
|
idpID = e.ConfigID
|
|
case *iam.IDPConfigRemovedEvent:
|
|
idpID = e.ConfigID
|
|
default:
|
|
logging.LogWithFields("HANDL-aJvob", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.IDPConfigRemovedEventType, iam.IDPConfigRemovedEventType}).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-u6tze", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewDeleteStatement(event,
|
|
[]handler.Condition{
|
|
handler.NewCond(IDPLoginPolicyLinkIDPIDCol, idpID),
|
|
handler.NewCond(IDPLoginPolicyLinkResourceOwnerCol, event.Aggregate().ResourceOwner),
|
|
},
|
|
), nil
|
|
}
|
|
|
|
func (p *IDPLoginPolicyLinkProjection) reduceOrgRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*org.OrgRemovedEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-WTYC1", "seq", event.Sequence(), "expectedType", org.OrgRemovedEventType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-QSoSe", "reduce.wrong.event.type")
|
|
}
|
|
return crdb.NewDeleteStatement(e,
|
|
[]handler.Condition{
|
|
handler.NewCond(IDPLoginPolicyLinkResourceOwnerCol, e.Aggregate().ID),
|
|
},
|
|
), nil
|
|
}
|