mirror of
https://github.com/zitadel/zitadel.git
synced 2025-06-10 18:48:35 +00:00

* feat(command): remove org * refactor: imports, unused code, error handling * reduce org removed in action * add org deletion to projections * add org removal to projections * add org removal to projections * org removed projection * lint import * projections * fix: table names in tests * fix: table names in tests * logging * add org state * fix(domain): add Owner removed to object details * feat(ListQuery): add with owner removed * fix(org-delete): add bool to functions to select with owner removed * fix(org-delete): add bools to user grants with events to determine if dependencies lost owner * fix(org-delete): add unit tests for owner removed and org removed events * fix(org-delete): add handling of org remove for grants and members * fix(org-delete): correction of unit tests for owner removed * fix(org-delete): update projections, unit tests and get functions * fix(org-delete): add change date to authnkeys and owner removed to org metadata * fix(org-delete): include owner removed for login names * fix(org-delete): some column fixes in projections and build for queries with owner removed * indexes * fix(org-delete): include review changes * fix(org-delete): change user projection name after merge * fix(org-delete): include review changes for project grant where no project owner is necessary * fix(org-delete): include auth and adminapi tables with owner removed information * fix(org-delete): cleanup username and orgdomain uniqueconstraints when org is removed * fix(org-delete): add permissions for org.remove * remove unnecessary unique constraints * fix column order in primary keys * fix(org-delete): include review changes * fix(org-delete): add owner removed indexes and chang setup step to create tables * fix(org-delete): move PK order of instance_id and change added user_grant from review * fix(org-delete): no params for prepareUserQuery * change to step 6 * merge main * fix(org-delete): OldUserName rename to private * fix linting * cleanup * fix: remove org test * create prerelease * chore: delete org-delete as prerelease Co-authored-by: Stefan Benz <stefan@caos.ch> Co-authored-by: Livio Spring <livio.a@gmail.com> Co-authored-by: Fabi <38692350+hifabienne@users.noreply.github.com> Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com>
156 lines
4.3 KiB
Go
156 lines
4.3 KiB
Go
package query
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
|
|
sq "github.com/Masterminds/squirrel"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
"github.com/zitadel/zitadel/internal/domain"
|
|
"github.com/zitadel/zitadel/internal/errors"
|
|
"github.com/zitadel/zitadel/internal/query/projection"
|
|
)
|
|
|
|
type IDPLoginPolicyLink struct {
|
|
IDPID string
|
|
IDPName string
|
|
IDPType domain.IDPConfigType
|
|
}
|
|
|
|
type IDPLoginPolicyLinks struct {
|
|
SearchResponse
|
|
Links []*IDPLoginPolicyLink
|
|
}
|
|
|
|
type IDPLoginPolicyLinksSearchQuery struct {
|
|
SearchRequest
|
|
Queries []SearchQuery
|
|
}
|
|
|
|
func (q *IDPLoginPolicyLinksSearchQuery) toQuery(query sq.SelectBuilder) sq.SelectBuilder {
|
|
query = q.SearchRequest.toQuery(query)
|
|
for _, q := range q.Queries {
|
|
query = q.toQuery(query)
|
|
}
|
|
return query
|
|
}
|
|
|
|
var (
|
|
idpLoginPolicyLinkTable = table{
|
|
name: projection.IDPLoginPolicyLinkTable,
|
|
instanceIDCol: projection.IDPLoginPolicyLinkInstanceIDCol,
|
|
}
|
|
IDPLoginPolicyLinkIDPIDCol = Column{
|
|
name: projection.IDPLoginPolicyLinkIDPIDCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkCreationDateCol = Column{
|
|
name: projection.IDPLoginPolicyLinkCreationDateCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkChangeDateCol = Column{
|
|
name: projection.IDPLoginPolicyLinkChangeDateCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkSequenceCol = Column{
|
|
name: projection.IDPLoginPolicyLinkSequenceCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkAggregateIDCol = Column{
|
|
name: projection.IDPLoginPolicyLinkAggregateIDCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkResourceOwnerCol = Column{
|
|
name: projection.IDPLoginPolicyLinkResourceOwnerCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkInstanceIDCol = Column{
|
|
name: projection.IDPLoginPolicyLinkInstanceIDCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkProviderTypeCol = Column{
|
|
name: projection.IDPLoginPolicyLinkProviderTypeCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
IDPLoginPolicyLinkOwnerRemovedCol = Column{
|
|
name: projection.IDPLoginPolicyLinkOwnerRemovedCol,
|
|
table: idpLoginPolicyLinkTable,
|
|
}
|
|
)
|
|
|
|
func (q *Queries) IDPLoginPolicyLinks(ctx context.Context, resourceOwner string, queries *IDPLoginPolicyLinksSearchQuery, withOwnerRemoved bool) (idps *IDPLoginPolicyLinks, err error) {
|
|
query, scan := prepareIDPLoginPolicyLinksQuery()
|
|
eq := sq.Eq{
|
|
IDPLoginPolicyLinkResourceOwnerCol.identifier(): resourceOwner,
|
|
IDPLoginPolicyLinkInstanceIDCol.identifier(): authz.GetInstance(ctx).InstanceID(),
|
|
}
|
|
if !withOwnerRemoved {
|
|
eq[IDPLoginPolicyLinkOwnerRemovedCol.identifier()] = false
|
|
}
|
|
stmt, args, err := queries.toQuery(query).Where(eq).ToSql()
|
|
if err != nil {
|
|
return nil, errors.ThrowInvalidArgument(err, "QUERY-FDbKW", "Errors.Query.InvalidRequest")
|
|
}
|
|
|
|
rows, err := q.client.QueryContext(ctx, stmt, args...)
|
|
if err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-ZkKUc", "Errors.Internal")
|
|
}
|
|
idps, err = scan(rows)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
idps.LatestSequence, err = q.latestSequence(ctx, idpLoginPolicyLinkTable)
|
|
return idps, err
|
|
}
|
|
|
|
func prepareIDPLoginPolicyLinksQuery() (sq.SelectBuilder, func(*sql.Rows) (*IDPLoginPolicyLinks, error)) {
|
|
return sq.Select(
|
|
IDPLoginPolicyLinkIDPIDCol.identifier(),
|
|
IDPNameCol.identifier(),
|
|
IDPTypeCol.identifier(),
|
|
countColumn.identifier()).
|
|
From(idpLoginPolicyLinkTable.identifier()).
|
|
LeftJoin(join(IDPIDCol, IDPLoginPolicyLinkIDPIDCol)).PlaceholderFormat(sq.Dollar),
|
|
func(rows *sql.Rows) (*IDPLoginPolicyLinks, error) {
|
|
links := make([]*IDPLoginPolicyLink, 0)
|
|
var count uint64
|
|
for rows.Next() {
|
|
var (
|
|
idpName = sql.NullString{}
|
|
idpType = sql.NullInt16{}
|
|
link = new(IDPLoginPolicyLink)
|
|
)
|
|
err := rows.Scan(
|
|
&link.IDPID,
|
|
&idpName,
|
|
&idpType,
|
|
&count,
|
|
)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
link.IDPName = idpName.String
|
|
//IDPType 0 is oidc so we have to set unspecified manually
|
|
if idpType.Valid {
|
|
link.IDPType = domain.IDPConfigType(idpType.Int16)
|
|
} else {
|
|
link.IDPType = domain.IDPConfigTypeUnspecified
|
|
}
|
|
links = append(links, link)
|
|
}
|
|
|
|
if err := rows.Close(); err != nil {
|
|
return nil, errors.ThrowInternal(err, "QUERY-vOLFG", "Errors.Query.CloseRows")
|
|
}
|
|
|
|
return &IDPLoginPolicyLinks{
|
|
Links: links,
|
|
SearchResponse: SearchResponse{
|
|
Count: count,
|
|
},
|
|
}, nil
|
|
}
|
|
}
|