Michael Waeger b9c938594c
feat: Policy (#79)
* policy added

* Make it executable

* Make it executable, corrections

* password age policy added

* password lockout policy added

* corrections

* policy added

* Make it executable

* Make it executable, corrections

* password age policy added

* password lockout policy added

* corrections

* fix(repository): remove second policy

* complaints corrected

* Init tests

* add some tests

* more tests added

* systemfefaults added

* default values load added

* check for default value added

* fixes

* fixed

* create policy if not exists

* eventstore tests added

Co-authored-by: adlerhurst <silvan.reusser@gmail.com>
2020-05-14 11:48:57 +02:00

84 lines
3.0 KiB
Go

package eventsourcing
import (
"context"
"strconv"
"github.com/caos/zitadel/internal/api/auth"
caos_errs "github.com/caos/zitadel/internal/errors"
es_sdk "github.com/caos/zitadel/internal/eventstore/sdk"
pol_model "github.com/caos/zitadel/internal/policy/model"
)
func (es *PolicyEventstore) GetPasswordLockoutPolicy(ctx context.Context, id string) (*pol_model.PasswordLockoutPolicy, error) {
policy := es.policyCache.getLockoutPolicy(id)
query := PasswordLockoutPolicyQuery(id, policy.Sequence)
err := es_sdk.Filter(ctx, es.FilterEvents, policy.AppendEvents, query)
if caos_errs.IsNotFound(err) && es.passwordLockoutPolicyDefault.Description != "" {
policy.Description = es.passwordLockoutPolicyDefault.Description
policy.MaxAttempts = es.passwordLockoutPolicyDefault.MaxAttempts
policy.ShowLockOutFailures = es.passwordLockoutPolicyDefault.ShowLockOutFailures
} else if err != nil {
return nil, err
}
es.policyCache.cacheLockoutPolicy(policy)
return PasswordLockoutPolicyToModel(policy), nil
}
func (es *PolicyEventstore) CreatePasswordLockoutPolicy(ctx context.Context, policy *pol_model.PasswordLockoutPolicy) (*pol_model.PasswordLockoutPolicy, error) {
if !policy.IsValid() {
return nil, caos_errs.ThrowPreconditionFailed(nil, "EVENT-9dk45", "Description is required")
}
ctxData := auth.GetCtxData(ctx)
existingPolicy, err := es.GetPasswordLockoutPolicy(ctx, ctxData.OrgID)
if err != nil && !caos_errs.IsNotFound(err) {
return nil, err
}
if existingPolicy != nil && existingPolicy.Sequence > 0 {
return nil, caos_errs.ThrowPreconditionFailed(nil, "EVENT-yDJ5I", "Policy allready exists")
}
id, err := idGenerator.NextID()
if err != nil {
return nil, err
}
policy.AggregateID = strconv.FormatUint(id, 10)
repoPolicy := PasswordLockoutPolicyFromModel(policy)
createAggregate := PasswordLockoutPolicyCreateAggregate(es.AggregateCreator(), repoPolicy)
err = es_sdk.Push(ctx, es.PushAggregates, repoPolicy.AppendEvents, createAggregate)
if err != nil {
return nil, err
}
es.policyCache.cacheLockoutPolicy(repoPolicy)
return PasswordLockoutPolicyToModel(repoPolicy), nil
}
func (es *PolicyEventstore) UpdatePasswordLockoutPolicy(ctx context.Context, policy *pol_model.PasswordLockoutPolicy) (*pol_model.PasswordLockoutPolicy, error) {
if !policy.IsValid() {
return nil, caos_errs.ThrowPreconditionFailed(nil, "EVENT-9dk45", "Description is required")
}
ctxData := auth.GetCtxData(ctx)
existingPolicy, err := es.GetPasswordLockoutPolicy(ctx, ctxData.OrgID)
if err != nil {
return nil, err
}
if existingPolicy.Sequence <= 0 {
return es.CreatePasswordLockoutPolicy(ctx, policy)
}
repoExisting := PasswordLockoutPolicyFromModel(existingPolicy)
repoNew := PasswordLockoutPolicyFromModel(policy)
updateAggregate := PasswordLockoutPolicyUpdateAggregate(es.AggregateCreator(), repoExisting, repoNew)
err = es_sdk.Push(ctx, es.PushAggregates, repoExisting.AppendEvents, updateAggregate)
if err != nil {
return nil, err
}
es.policyCache.cacheLockoutPolicy(repoExisting)
return PasswordLockoutPolicyToModel(repoExisting), nil
}