mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 02:54:20 +00:00
3539418a4a
* fix: handle UserLoginMustBeDomain changes correctly * fix: remove verified domains (and not only primary) as suffix * fix: ensure testability by changing map to slice * cleanup * reduce complexity of DomainPolicyUsernamesWriteModel.Reduce() * add test for removed org policy
80 lines
2.6 KiB
Go
80 lines
2.6 KiB
Go
package command
|
|
|
|
import (
|
|
"context"
|
|
|
|
caos_errs "github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/eventstore"
|
|
|
|
"github.com/zitadel/zitadel/internal/repository/org"
|
|
"github.com/zitadel/zitadel/internal/repository/policy"
|
|
)
|
|
|
|
type OrgDomainPolicyWriteModel struct {
|
|
PolicyDomainWriteModel
|
|
}
|
|
|
|
func NewOrgDomainPolicyWriteModel(orgID string) *OrgDomainPolicyWriteModel {
|
|
return &OrgDomainPolicyWriteModel{
|
|
PolicyDomainWriteModel{
|
|
WriteModel: eventstore.WriteModel{
|
|
AggregateID: orgID,
|
|
ResourceOwner: orgID,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func (wm *OrgDomainPolicyWriteModel) AppendEvents(events ...eventstore.Event) {
|
|
for _, event := range events {
|
|
switch e := event.(type) {
|
|
case *org.DomainPolicyAddedEvent:
|
|
wm.PolicyDomainWriteModel.AppendEvents(&e.DomainPolicyAddedEvent)
|
|
case *org.DomainPolicyChangedEvent:
|
|
wm.PolicyDomainWriteModel.AppendEvents(&e.DomainPolicyChangedEvent)
|
|
case *org.DomainPolicyRemovedEvent:
|
|
wm.PolicyDomainWriteModel.AppendEvents(&e.DomainPolicyRemovedEvent)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (wm *OrgDomainPolicyWriteModel) Reduce() error {
|
|
return wm.PolicyDomainWriteModel.Reduce()
|
|
}
|
|
|
|
func (wm *OrgDomainPolicyWriteModel) Query() *eventstore.SearchQueryBuilder {
|
|
return eventstore.NewSearchQueryBuilder(eventstore.ColumnsEvent).
|
|
ResourceOwner(wm.ResourceOwner).
|
|
AddQuery().
|
|
AggregateTypes(org.AggregateType).
|
|
AggregateIDs(wm.PolicyDomainWriteModel.AggregateID).
|
|
EventTypes(org.DomainPolicyAddedEventType,
|
|
org.DomainPolicyChangedEventType,
|
|
org.DomainPolicyRemovedEventType).
|
|
Builder()
|
|
}
|
|
|
|
func (wm *OrgDomainPolicyWriteModel) NewChangedEvent(
|
|
ctx context.Context,
|
|
aggregate *eventstore.Aggregate,
|
|
userLoginMustBeDomain,
|
|
validateOrgDomains,
|
|
smtpSenderAddressMatchesInstanceDomain bool) (changedEvent *org.DomainPolicyChangedEvent, usernameChange bool, err error) {
|
|
changes := make([]policy.DomainPolicyChanges, 0)
|
|
if wm.UserLoginMustBeDomain != userLoginMustBeDomain {
|
|
usernameChange = true
|
|
changes = append(changes, policy.ChangeUserLoginMustBeDomain(userLoginMustBeDomain))
|
|
}
|
|
if wm.ValidateOrgDomains != validateOrgDomains {
|
|
changes = append(changes, policy.ChangeValidateOrgDomains(validateOrgDomains))
|
|
}
|
|
if wm.SMTPSenderAddressMatchesInstanceDomain != smtpSenderAddressMatchesInstanceDomain {
|
|
changes = append(changes, policy.ChangeSMTPSenderAddressMatchesInstanceDomain(smtpSenderAddressMatchesInstanceDomain))
|
|
}
|
|
if len(changes) == 0 {
|
|
return nil, false, caos_errs.ThrowPreconditionFailed(nil, "ORG-3M9ds", "Errors.Org.LabelPolicy.NotChanged")
|
|
}
|
|
changedEvent, err = org.NewDomainPolicyChangedEvent(ctx, aggregate, changes)
|
|
return changedEvent, usernameChange, err
|
|
}
|