zitadel/internal/query/org_iam_policy.go
Silvan ed547ee1d4
test(queries): policies prepare funcs (#2651)
* chore(queries): test suite for prepare stmt funcs

* test(queries): prepare project funcs

* refactor: add comments

* test: simlify expected sql, added possibility to add args to expected queries

* test(queries): prepare funcs in org

* chore(backend): correct modules

* test(queries): org domain prepare funcs

* test: correct name

* refactor: file name

* refactor: add table to login policy columns

* chore(prepare_test): only add row to result if columns

* test(queries): login policy prepare funcs

* chore: add comments for configs

* test(queries): prepare idp funcs

* fix(queries): add table to password complexity policy cols

* test(queries): password complexity policy prepare funcs

* fix(queries): add table to password age policy cols

* test(queries): password age policy prepare func

* fix(queries): set cols on lockout policy

* test(queries): lockout policy prepare funs

* fix(queries): set table on privacy policy cols

* test(queries): privacy policy prepare funcs

* fix(queries): set table on org iam policy cols

* fix(queries): correct table in org iam policy cols

* test(queries): org iam policy prepare funcs
2021-11-16 08:24:30 +00:00

135 lines
3.3 KiB
Go

package query
import (
"context"
"database/sql"
errs "errors"
"time"
sq "github.com/Masterminds/squirrel"
"github.com/caos/zitadel/internal/domain"
"github.com/caos/zitadel/internal/errors"
"github.com/caos/zitadel/internal/query/projection"
)
type OrgIAMPolicy struct {
ID string
Sequence uint64
CreationDate time.Time
ChangeDate time.Time
ResourceOwner string
State domain.PolicyState
UserLoginMustBeDomain bool
IsDefault bool
}
var (
orgIAMTable = table{
name: projection.OrgIAMPolicyTable,
}
OrgIAMColID = Column{
name: projection.OrgIAMPolicyIDCol,
table: orgIAMTable,
}
OrgIAMColSequence = Column{
name: projection.OrgIAMPolicySequenceCol,
table: orgIAMTable,
}
OrgIAMColCreationDate = Column{
name: projection.OrgIAMPolicyCreationDateCol,
table: orgIAMTable,
}
OrgIAMColChangeDate = Column{
name: projection.OrgIAMPolicyChangeDateCol,
table: orgIAMTable,
}
OrgIAMColResourceOwner = Column{
name: projection.OrgIAMPolicyResourceOwnerCol,
table: orgIAMTable,
}
OrgIAMColUserLoginMustBeDomain = Column{
name: projection.OrgIAMPolicyUserLoginMustBeDomainCol,
table: orgIAMTable,
}
OrgIAMColIsDefault = Column{
name: projection.OrgIAMPolicyIsDefaultCol,
table: orgIAMTable,
}
OrgIAMColState = Column{
name: projection.OrgIAMPolicyStateCol,
table: orgIAMTable,
}
)
func (q *Queries) OrgIAMPolicyByOrg(ctx context.Context, orgID string) (*OrgIAMPolicy, error) {
stmt, scan := prepareOrgIAMPolicyQuery()
query, args, err := stmt.Where(
sq.Or{
sq.Eq{
OrgIAMColID.identifier(): orgID,
},
sq.Eq{
OrgIAMColID.identifier(): q.iamID,
},
}).
OrderBy(OrgIAMColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, errors.ThrowInternal(err, "QUERY-D3CqT", "Errors.Query.SQLStatement")
}
row := q.client.QueryRowContext(ctx, query, args...)
return scan(row)
}
func (q *Queries) DefaultOrgIAMPolicy(ctx context.Context) (*OrgIAMPolicy, error) {
stmt, scan := prepareOrgIAMPolicyQuery()
query, args, err := stmt.Where(sq.Eq{
OrgIAMColID.identifier(): q.iamID,
}).
OrderBy(OrgIAMColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, errors.ThrowInternal(err, "QUERY-pM7lP", "Errors.Query.SQLStatement")
}
row := q.client.QueryRowContext(ctx, query, args...)
return scan(row)
}
func prepareOrgIAMPolicyQuery() (sq.SelectBuilder, func(*sql.Row) (*OrgIAMPolicy, error)) {
return sq.Select(
OrgIAMColID.identifier(),
OrgIAMColSequence.identifier(),
OrgIAMColCreationDate.identifier(),
OrgIAMColChangeDate.identifier(),
OrgIAMColResourceOwner.identifier(),
OrgIAMColUserLoginMustBeDomain.identifier(),
OrgIAMColIsDefault.identifier(),
OrgIAMColState.identifier(),
).
From(orgIAMTable.identifier()).PlaceholderFormat(sq.Dollar),
func(row *sql.Row) (*OrgIAMPolicy, error) {
policy := new(OrgIAMPolicy)
err := row.Scan(
&policy.ID,
&policy.Sequence,
&policy.CreationDate,
&policy.ChangeDate,
&policy.ResourceOwner,
&policy.UserLoginMustBeDomain,
&policy.IsDefault,
&policy.State,
)
if err != nil {
if errs.Is(err, sql.ErrNoRows) {
return nil, errors.ThrowNotFound(err, "QUERY-K0Jr5", "Errors.OrgIAMPolicy.NotFound")
}
return nil, errors.ThrowInternal(err, "QUERY-rIy6j", "Errors.Internal")
}
return policy, nil
}
}