mirror of
https://github.com/zitadel/zitadel.git
synced 2025-03-03 16:35:15 +00:00

* fix: correct selectors for extended writemodel * fix: no previous checks in eventstore * start check previous * feat: auth user commands * feat: auth user commands * feat: auth user commands * feat: otp * feat: corrections from pr merge * feat: webauthn * feat: comment old webauthn * feat: refactor user, human, machine * feat: webauth command side * feat: command and query side in login * feat: fix user writemodel append events * fix: remove creation dates on command side * fix: remove previous sequence * previous sequence * fix: external idps * Update internal/api/grpc/management/user.go Co-authored-by: Livio Amstutz <livio.a@gmail.com> * Update internal/v2/command/user_human_email.go Co-authored-by: Livio Amstutz <livio.a@gmail.com> * fix: pr changes * fix: phone verification Co-authored-by: adlerhurst <silvan.reusser@gmail.com> Co-authored-by: Livio Amstutz <livio.a@gmail.com>
232 lines
8.3 KiB
Go
232 lines
8.3 KiB
Go
package auth
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/golang/protobuf/ptypes/empty"
|
|
|
|
"github.com/caos/zitadel/internal/api/authz"
|
|
"github.com/caos/zitadel/pkg/grpc/auth"
|
|
)
|
|
|
|
func (s *Server) GetMyUser(ctx context.Context, _ *empty.Empty) (*auth.UserView, error) {
|
|
user, err := s.repo.MyUser(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return userViewFromModel(user), nil
|
|
}
|
|
|
|
func (s *Server) GetMyUserProfile(ctx context.Context, _ *empty.Empty) (*auth.UserProfileView, error) {
|
|
profile, err := s.repo.MyProfile(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return profileViewFromModel(profile), nil
|
|
}
|
|
|
|
func (s *Server) GetMyUserEmail(ctx context.Context, _ *empty.Empty) (*auth.UserEmailView, error) {
|
|
email, err := s.repo.MyEmail(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return emailViewFromModel(email), nil
|
|
}
|
|
|
|
func (s *Server) GetMyUserPhone(ctx context.Context, _ *empty.Empty) (*auth.UserPhoneView, error) {
|
|
phone, err := s.repo.MyPhone(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return phoneViewFromModel(phone), nil
|
|
}
|
|
|
|
func (s *Server) RemoveMyUserPhone(ctx context.Context, _ *empty.Empty) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.RemoveHumanPhone(ctx, ctxData.UserID, ctxData.ResourceOwner)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) GetMyUserAddress(ctx context.Context, _ *empty.Empty) (*auth.UserAddressView, error) {
|
|
address, err := s.repo.MyAddress(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return addressViewFromModel(address), nil
|
|
}
|
|
|
|
func (s *Server) GetMyMfas(ctx context.Context, _ *empty.Empty) (*auth.MultiFactors, error) {
|
|
mfas, err := s.repo.MyUserMFAs(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &auth.MultiFactors{Mfas: mfasFromModel(mfas)}, nil
|
|
}
|
|
|
|
func (s *Server) UpdateMyUserProfile(ctx context.Context, request *auth.UpdateUserProfileRequest) (*auth.UserProfile, error) {
|
|
profile, err := s.command.ChangeHumanProfile(ctx, updateProfileToDomain(ctx, request))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return profileFromDomain(profile), nil
|
|
}
|
|
|
|
func (s *Server) ChangeMyUserName(ctx context.Context, request *auth.ChangeUserNameRequest) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
return &empty.Empty{}, s.command.ChangeUsername(ctx, ctxData.ResourceOwner, ctxData.UserID, request.UserName)
|
|
}
|
|
|
|
func (s *Server) ChangeMyUserEmail(ctx context.Context, request *auth.UpdateUserEmailRequest) (*auth.UserEmail, error) {
|
|
email, err := s.command.ChangeHumanEmail(ctx, updateEmailToDomain(ctx, request))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return emailFromDomain(email), nil
|
|
}
|
|
|
|
func (s *Server) VerifyMyUserEmail(ctx context.Context, request *auth.VerifyMyUserEmailRequest) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.VerifyHumanEmail(ctx, ctxData.UserID, request.Code, ctxData.OrgID)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) ResendMyEmailVerificationMail(ctx context.Context, _ *empty.Empty) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.CreateHumanEmailVerificationCode(ctx, ctxData.UserID, ctxData.ResourceOwner)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) ChangeMyUserPhone(ctx context.Context, request *auth.UpdateUserPhoneRequest) (*auth.UserPhone, error) {
|
|
phone, err := s.command.ChangeHumanPhone(ctx, updatePhoneToDomain(ctx, request))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return phoneFromDomain(phone), nil
|
|
}
|
|
|
|
func (s *Server) VerifyMyUserPhone(ctx context.Context, request *auth.VerifyUserPhoneRequest) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.VerifyHumanPhone(ctx, ctxData.UserID, request.Code, ctxData.ResourceOwner)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) ResendMyPhoneVerificationCode(ctx context.Context, _ *empty.Empty) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.CreateHumanPhoneVerificationCode(ctx, ctxData.UserID, ctxData.ResourceOwner)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) UpdateMyUserAddress(ctx context.Context, request *auth.UpdateUserAddressRequest) (*auth.UserAddress, error) {
|
|
address, err := s.command.ChangeHumanAddress(ctx, updateAddressToDomain(ctx, request))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return addressFromDomain(address), nil
|
|
}
|
|
|
|
func (s *Server) ChangeMyPassword(ctx context.Context, request *auth.PasswordChange) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.ChangePassword(ctx, ctxData.OrgID, ctxData.UserID, request.OldPassword, request.NewPassword, "")
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) SearchMyExternalIDPs(ctx context.Context, request *auth.ExternalIDPSearchRequest) (*auth.ExternalIDPSearchResponse, error) {
|
|
externalIDP, err := s.repo.SearchMyExternalIDPs(ctx, externalIDPSearchRequestToModel(request))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return externalIDPSearchResponseFromModel(externalIDP), nil
|
|
}
|
|
|
|
func (s *Server) RemoveMyExternalIDP(ctx context.Context, request *auth.ExternalIDPRemoveRequest) (*empty.Empty, error) {
|
|
err := s.command.RemoveHumanExternalIDP(ctx, externalIDPRemoveToDomain(ctx, request))
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) GetMyPasswordComplexityPolicy(ctx context.Context, _ *empty.Empty) (*auth.PasswordComplexityPolicy, error) {
|
|
policy, err := s.repo.GetMyPasswordComplexityPolicy(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return passwordComplexityPolicyFromModel(policy), nil
|
|
}
|
|
|
|
func (s *Server) AddMfaOTP(ctx context.Context, _ *empty.Empty) (_ *auth.MfaOtpResponse, err error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
otp, err := s.command.AddHumanOTP(ctx, ctxData.UserID, ctxData.OrgID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return otpFromDomain(otp), nil
|
|
}
|
|
|
|
func (s *Server) VerifyMfaOTP(ctx context.Context, request *auth.VerifyMfaOtp) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.CheckMFAOTPSetup(ctx, ctxData.UserID, request.Code, "", ctxData.ResourceOwner)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) RemoveMfaOTP(ctx context.Context, _ *empty.Empty) (_ *empty.Empty, err error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err = s.command.RemoveHumanOTP(ctx, ctxData.UserID, ctxData.OrgID)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) AddMyMfaU2F(ctx context.Context, _ *empty.Empty) (_ *auth.WebAuthNResponse, err error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
u2f, err := s.command.AddHumanU2F(ctx, ctxData.UserID, ctxData.ResourceOwner, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return verifyWebAuthNFromDomain(u2f), err
|
|
}
|
|
|
|
func (s *Server) VerifyMyMfaU2F(ctx context.Context, request *auth.VerifyWebAuthN) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.VerifyHumanU2F(ctx, ctxData.UserID, ctxData.OrgID, request.TokenName, "", request.PublicKeyCredential)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) RemoveMyMfaU2F(ctx context.Context, id *auth.WebAuthNTokenID) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.RemoveHumanU2F(ctx, ctxData.UserID, id.Id, ctxData.OrgID)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) GetMyPasswordless(ctx context.Context, _ *empty.Empty) (_ *auth.WebAuthNTokens, err error) {
|
|
tokens, err := s.repo.GetMyPasswordless(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return webAuthNTokensFromModel(tokens), err
|
|
}
|
|
|
|
func (s *Server) AddMyPasswordless(ctx context.Context, _ *empty.Empty) (_ *auth.WebAuthNResponse, err error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
u2f, err := s.command.AddHumanPasswordless(ctx, ctxData.UserID, ctxData.ResourceOwner, false)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return verifyWebAuthNFromDomain(u2f), err
|
|
}
|
|
|
|
func (s *Server) VerifyMyPasswordless(ctx context.Context, request *auth.VerifyWebAuthN) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.VerifyHumanPasswordless(ctx, ctxData.UserID, ctxData.OrgID, request.TokenName, "", request.PublicKeyCredential)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) RemoveMyPasswordless(ctx context.Context, id *auth.WebAuthNTokenID) (*empty.Empty, error) {
|
|
ctxData := authz.GetCtxData(ctx)
|
|
err := s.command.RemoveHumanPasswordless(ctx, ctxData.UserID, id.Id, ctxData.ResourceOwner)
|
|
return &empty.Empty{}, err
|
|
}
|
|
|
|
func (s *Server) GetMyUserChanges(ctx context.Context, request *auth.ChangesRequest) (*auth.Changes, error) {
|
|
changes, err := s.repo.MyUserChanges(ctx, request.SequenceOffset, request.Limit, request.Asc)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return userChangesToResponse(changes, request.GetSequenceOffset(), request.GetLimit()), nil
|
|
}
|