mirror of
https://github.com/zitadel/zitadel.git
synced 2025-05-06 07:56:47 +00:00

* refactor(domain): add user type * fix(projections): start with login names * fix(login_policy): correct handling of user domain claimed event * fix(projections): add members * refactor: simplify member projections * add migration for members * add metadata to member projections * refactor: login name projection * fix: set correct suffixes on login name projections * test(projections): login name reduces * fix: correct cols in reduce member * test(projections): org, iam, project members * member additional cols and conds as opt, add project grant members * fix(migration): members * fix(migration): correct database name * migration version * migs * better naming for member cond and col * split project and project grant members * prepare member columns * feat(queries): membership query * test(queries): membership prepare * fix(queries): multiple projections for latest sequence * fix(api): use query for membership queries in auth and management * feat: org member queries * fix(api): use query for iam member calls * fix(queries): org members * fix(queries): project members * fix(queries): project grant members * fix(query): member queries and user avatar column * member cols * fix(queries): membership stmt * fix user test * fix user test * fix(membership): correct display name * fix(projection): additional member manipulation events * additional member tests * fix(projections): additional events of idp links * fix: use query for memberships (#2797) * fix(api): use query for memberships * remove comment * handle err * refactor(projections): idp user link user aggregate type * fix(projections): handle old user events * fix(api): add asset prefix * no image for iam members
361 lines
12 KiB
Go
361 lines
12 KiB
Go
package projection
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/caos/logging"
|
|
"github.com/caos/zitadel/internal/errors"
|
|
"github.com/caos/zitadel/internal/eventstore"
|
|
"github.com/caos/zitadel/internal/eventstore/handler"
|
|
"github.com/caos/zitadel/internal/eventstore/handler/crdb"
|
|
"github.com/caos/zitadel/internal/repository/iam"
|
|
"github.com/caos/zitadel/internal/repository/org"
|
|
"github.com/caos/zitadel/internal/repository/policy"
|
|
"github.com/caos/zitadel/internal/repository/user"
|
|
)
|
|
|
|
type LoginNameProjection struct {
|
|
crdb.StatementHandler
|
|
}
|
|
|
|
const (
|
|
LoginNameProjectionTable = "zitadel.projections.login_names"
|
|
LoginNameUserProjectionTable = LoginNameProjectionTable + "_" + loginNameUserSuffix
|
|
LoginNamePolicyProjectionTable = LoginNameProjectionTable + "_" + loginNamePolicySuffix
|
|
LoginNameDomainProjectionTable = LoginNameProjectionTable + "_" + loginNameDomainSuffix
|
|
)
|
|
|
|
func NewLoginNameProjection(ctx context.Context, config crdb.StatementHandlerConfig) *LoginNameProjection {
|
|
p := &LoginNameProjection{}
|
|
config.ProjectionName = LoginNameProjectionTable
|
|
config.Reducers = p.reducers()
|
|
p.StatementHandler = crdb.NewStatementHandler(ctx, config)
|
|
return p
|
|
}
|
|
|
|
func (p *LoginNameProjection) reducers() []handler.AggregateReducer {
|
|
return []handler.AggregateReducer{
|
|
{
|
|
Aggregate: user.AggregateType,
|
|
EventRedusers: []handler.EventReducer{
|
|
{
|
|
Event: user.UserV1AddedType,
|
|
Reduce: p.reduceUserCreated,
|
|
},
|
|
{
|
|
Event: user.HumanAddedType,
|
|
Reduce: p.reduceUserCreated,
|
|
},
|
|
{
|
|
Event: user.HumanRegisteredType,
|
|
Reduce: p.reduceUserCreated,
|
|
},
|
|
{
|
|
Event: user.UserV1RegisteredType,
|
|
Reduce: p.reduceUserCreated,
|
|
},
|
|
{
|
|
Event: user.MachineAddedEventType,
|
|
Reduce: p.reduceUserCreated,
|
|
},
|
|
{
|
|
Event: user.UserRemovedType,
|
|
Reduce: p.reduceUserRemoved,
|
|
},
|
|
{
|
|
Event: user.UserUserNameChangedType,
|
|
Reduce: p.reduceUserNameChanged,
|
|
},
|
|
{
|
|
// changes the username of the user
|
|
// this event occures in orgs
|
|
// where policy.must_be_domain=false
|
|
Event: user.UserDomainClaimedType,
|
|
Reduce: p.reduceUserDomainClaimed,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Aggregate: org.AggregateType,
|
|
EventRedusers: []handler.EventReducer{
|
|
{
|
|
Event: org.OrgIAMPolicyAddedEventType,
|
|
Reduce: p.reduceOrgIAMPolicyAdded,
|
|
},
|
|
{
|
|
Event: org.OrgIAMPolicyChangedEventType,
|
|
Reduce: p.reduceOrgIAMPolicyChanged,
|
|
},
|
|
{
|
|
Event: org.OrgIAMPolicyRemovedEventType,
|
|
Reduce: p.reduceOrgIAMPolicyRemoved,
|
|
},
|
|
{
|
|
Event: org.OrgDomainPrimarySetEventType,
|
|
Reduce: p.reducePrimaryDomainSet,
|
|
},
|
|
{
|
|
Event: org.OrgDomainRemovedEventType,
|
|
Reduce: p.reduceDomainRemoved,
|
|
},
|
|
{
|
|
Event: org.OrgDomainVerifiedEventType,
|
|
Reduce: p.reduceDomainVerified,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Aggregate: iam.AggregateType,
|
|
EventRedusers: []handler.EventReducer{
|
|
{
|
|
Event: iam.OrgIAMPolicyAddedEventType,
|
|
Reduce: p.reduceOrgIAMPolicyAdded,
|
|
},
|
|
{
|
|
Event: iam.OrgIAMPolicyChangedEventType,
|
|
Reduce: p.reduceOrgIAMPolicyChanged,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
const (
|
|
LoginNameCol = "login_name"
|
|
|
|
loginNameUserSuffix = "users"
|
|
LoginNameUserIDCol = "id"
|
|
LoginNameUserUserNameCol = "user_name"
|
|
LoginNameUserResourceOwnerCol = "resource_owner"
|
|
|
|
loginNameDomainSuffix = "domains"
|
|
LoginNameDomainNameCol = "name"
|
|
LoginNameDomainIsPrimaryCol = "is_primary"
|
|
LoginNameDomainResourceOwnerCol = "resource_owner"
|
|
|
|
loginNamePolicySuffix = "policies"
|
|
LoginNamePoliciesMustBeDomainCol = "must_be_domain"
|
|
LoginNamePoliciesIsDefaultCol = "is_default"
|
|
LoginNamePoliciesResourceOwnerCol = "resource_owner"
|
|
)
|
|
|
|
func (p *LoginNameProjection) reduceUserCreated(event eventstore.EventReader) (*handler.Statement, error) {
|
|
var userName string
|
|
|
|
switch e := event.(type) {
|
|
case *user.HumanAddedEvent:
|
|
userName = e.UserName
|
|
case *user.HumanRegisteredEvent:
|
|
userName = e.UserName
|
|
case *user.MachineAddedEvent:
|
|
userName = e.UserName
|
|
default:
|
|
logging.LogWithFields("HANDL-tDUx3", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{user.UserV1AddedType, user.HumanAddedType, user.UserV1RegisteredType, user.HumanRegisteredType, user.MachineAddedEventType}).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-ayo69", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewCreateStatement(
|
|
event,
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNameUserIDCol, event.Aggregate().ID),
|
|
handler.NewCol(LoginNameUserUserNameCol, userName),
|
|
handler.NewCol(LoginNameUserResourceOwnerCol, event.Aggregate().ResourceOwner),
|
|
},
|
|
crdb.WithTableSuffix(loginNameUserSuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceUserRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*user.UserRemovedEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-8XEdC", "seq", event.Sequence(), "expectedType", user.UserRemovedType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-QIe3C", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewDeleteStatement(
|
|
event,
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNameUserIDCol, e.Aggregate().ID),
|
|
},
|
|
crdb.WithTableSuffix(loginNameUserSuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceUserNameChanged(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*user.UsernameChangedEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-UGo7U", "seq", event.Sequence(), "expectedType", user.UserUserNameChangedType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-QlwjC", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewUpdateStatement(
|
|
event,
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNameUserUserNameCol, e.UserName),
|
|
},
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNameUserIDCol, e.Aggregate().ID),
|
|
},
|
|
crdb.WithTableSuffix(loginNameUserSuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceUserDomainClaimed(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*user.DomainClaimedEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-zIbyU", "seq", event.Sequence(), "expectedType", user.UserDomainClaimedType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-AQMBY", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewUpdateStatement(
|
|
event,
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNameUserUserNameCol, e.UserName),
|
|
},
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNameUserIDCol, e.Aggregate().ID),
|
|
},
|
|
crdb.WithTableSuffix(loginNameUserSuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceOrgIAMPolicyAdded(event eventstore.EventReader) (*handler.Statement, error) {
|
|
var (
|
|
policyEvent *policy.OrgIAMPolicyAddedEvent
|
|
isDefault bool
|
|
)
|
|
|
|
switch e := event.(type) {
|
|
case *org.OrgIAMPolicyAddedEvent:
|
|
policyEvent = &e.OrgIAMPolicyAddedEvent
|
|
isDefault = false
|
|
case *iam.OrgIAMPolicyAddedEvent:
|
|
policyEvent = &e.OrgIAMPolicyAddedEvent
|
|
isDefault = true
|
|
default:
|
|
logging.LogWithFields("HANDL-PQluH", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.OrgIAMPolicyAddedEventType, iam.OrgIAMPolicyAddedEventType}).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-yCV6S", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewCreateStatement(
|
|
event,
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNamePoliciesMustBeDomainCol, policyEvent.UserLoginMustBeDomain),
|
|
handler.NewCol(LoginNamePoliciesIsDefaultCol, isDefault),
|
|
handler.NewCol(LoginNamePoliciesResourceOwnerCol, policyEvent.Aggregate().ResourceOwner),
|
|
},
|
|
crdb.WithTableSuffix(loginNamePolicySuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceOrgIAMPolicyChanged(event eventstore.EventReader) (*handler.Statement, error) {
|
|
var policyEvent *policy.OrgIAMPolicyChangedEvent
|
|
|
|
switch e := event.(type) {
|
|
case *org.OrgIAMPolicyChangedEvent:
|
|
policyEvent = &e.OrgIAMPolicyChangedEvent
|
|
case *iam.OrgIAMPolicyChangedEvent:
|
|
policyEvent = &e.OrgIAMPolicyChangedEvent
|
|
default:
|
|
logging.LogWithFields("HANDL-Z27QN", "seq", event.Sequence(), "expectedTypes", []eventstore.EventType{org.OrgIAMPolicyChangedEventType, iam.OrgIAMPolicyChangedEventType}).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-ArFDd", "reduce.wrong.event.type")
|
|
}
|
|
|
|
if policyEvent.UserLoginMustBeDomain == nil {
|
|
return crdb.NewNoOpStatement(event), nil
|
|
}
|
|
|
|
return crdb.NewUpdateStatement(
|
|
event,
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNamePoliciesMustBeDomainCol, *policyEvent.UserLoginMustBeDomain),
|
|
},
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNamePoliciesResourceOwnerCol, policyEvent.Aggregate().ResourceOwner),
|
|
},
|
|
crdb.WithTableSuffix(loginNamePolicySuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceOrgIAMPolicyRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*org.OrgIAMPolicyRemovedEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-1ZFHL", "seq", event.Sequence(), "expectedType", org.OrgIAMPolicyRemovedEventType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-ysEeB", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewDeleteStatement(
|
|
event,
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNamePoliciesResourceOwnerCol, e.Aggregate().ResourceOwner),
|
|
},
|
|
crdb.WithTableSuffix(loginNamePolicySuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceDomainVerified(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*org.DomainVerifiedEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-Rr7Tq", "seq", event.Sequence(), "expectedType", org.OrgDomainVerifiedEventType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-weGAh", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewCreateStatement(
|
|
event,
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNameDomainNameCol, e.Domain),
|
|
handler.NewCol(LoginNameDomainResourceOwnerCol, e.Aggregate().ResourceOwner),
|
|
},
|
|
crdb.WithTableSuffix(loginNameDomainSuffix),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reducePrimaryDomainSet(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*org.DomainPrimarySetEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-0L5tW", "seq", event.Sequence(), "expectedType", org.OrgDomainPrimarySetEventType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-eOXPN", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewMultiStatement(
|
|
e,
|
|
crdb.AddUpdateStatement(
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNameDomainIsPrimaryCol, false),
|
|
},
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNameDomainResourceOwnerCol, e.Aggregate().ResourceOwner),
|
|
handler.NewCond(LoginNameDomainIsPrimaryCol, true),
|
|
},
|
|
crdb.WithTableSuffix(loginNameDomainSuffix),
|
|
),
|
|
crdb.AddUpdateStatement(
|
|
[]handler.Column{
|
|
handler.NewCol(LoginNameDomainIsPrimaryCol, true),
|
|
},
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNameDomainNameCol, e.Domain),
|
|
handler.NewCond(LoginNameDomainResourceOwnerCol, e.Aggregate().ResourceOwner),
|
|
},
|
|
crdb.WithTableSuffix(loginNameDomainSuffix),
|
|
),
|
|
), nil
|
|
}
|
|
|
|
func (p *LoginNameProjection) reduceDomainRemoved(event eventstore.EventReader) (*handler.Statement, error) {
|
|
e, ok := event.(*org.DomainRemovedEvent)
|
|
if !ok {
|
|
logging.LogWithFields("HANDL-reP2u", "seq", event.Sequence(), "expectedType", org.OrgDomainRemovedEventType).Error("wrong event type")
|
|
return nil, errors.ThrowInvalidArgument(nil, "HANDL-4RHYq", "reduce.wrong.event.type")
|
|
}
|
|
|
|
return crdb.NewDeleteStatement(
|
|
event,
|
|
[]handler.Condition{
|
|
handler.NewCond(LoginNameDomainNameCol, e.Domain),
|
|
handler.NewCond(LoginNameDomainResourceOwnerCol, e.Aggregate().ResourceOwner),
|
|
},
|
|
crdb.WithTableSuffix(loginNameDomainSuffix),
|
|
), nil
|
|
}
|