zitadel/internal/query/password_age_policy.go
Stefan Benz 5e57d3bebb
fix: correct error messages for policy queries (#8722)
# Which Problems Are Solved

Errors messages are mixed up for some policies

# How the Problems Are Solved

Define new error IDs and correct the messages.

# Additional Changes

None

# Additional Context

None
2024-10-03 17:53:03 +02:00

186 lines
5.4 KiB
Go

package query
import (
"context"
"database/sql"
"errors"
"time"
sq "github.com/Masterminds/squirrel"
"github.com/zitadel/logging"
"github.com/zitadel/zitadel/internal/api/authz"
"github.com/zitadel/zitadel/internal/api/call"
"github.com/zitadel/zitadel/internal/domain"
"github.com/zitadel/zitadel/internal/eventstore/handler/v2"
"github.com/zitadel/zitadel/internal/query/projection"
"github.com/zitadel/zitadel/internal/telemetry/tracing"
"github.com/zitadel/zitadel/internal/zerrors"
)
type PasswordAgePolicy struct {
ID string
Sequence uint64
CreationDate time.Time
ChangeDate time.Time
ResourceOwner string
State domain.PolicyState
ExpireWarnDays uint64
MaxAgeDays uint64
IsDefault bool
}
var (
passwordAgeTable = table{
name: projection.PasswordAgeTable,
instanceIDCol: projection.AgePolicyInstanceIDCol,
}
PasswordAgeColID = Column{
name: projection.AgePolicyIDCol,
table: passwordAgeTable,
}
PasswordAgeColSequence = Column{
name: projection.AgePolicySequenceCol,
table: passwordAgeTable,
}
PasswordAgeColCreationDate = Column{
name: projection.AgePolicyCreationDateCol,
table: passwordAgeTable,
}
PasswordAgeColChangeDate = Column{
name: projection.AgePolicyChangeDateCol,
table: passwordAgeTable,
}
PasswordAgeColResourceOwner = Column{
name: projection.AgePolicyResourceOwnerCol,
table: passwordAgeTable,
}
PasswordAgeColInstanceID = Column{
name: projection.AgePolicyInstanceIDCol,
table: passwordAgeTable,
}
PasswordAgeColWarnDays = Column{
name: projection.AgePolicyExpireWarnDaysCol,
table: passwordAgeTable,
}
PasswordAgeColMaxAge = Column{
name: projection.AgePolicyMaxAgeDaysCol,
table: passwordAgeTable,
}
PasswordAgeColIsDefault = Column{
name: projection.AgePolicyIsDefaultCol,
table: passwordAgeTable,
}
PasswordAgeColState = Column{
name: projection.AgePolicyStateCol,
table: passwordAgeTable,
}
PasswordAgeColOwnerRemoved = Column{
name: projection.AgePolicyOwnerRemovedCol,
table: passwordAgeTable,
}
)
func (q *Queries) PasswordAgePolicyByOrg(ctx context.Context, shouldTriggerBulk bool, orgID string, withOwnerRemoved bool) (policy *PasswordAgePolicy, err error) {
ctx, span := tracing.NewSpan(ctx)
defer func() { span.EndWithError(err) }()
if shouldTriggerBulk {
_, traceSpan := tracing.NewNamedSpan(ctx, "TriggerPasswordAgeProjection")
ctx, err = projection.PasswordAgeProjection.Trigger(ctx, handler.WithAwaitRunning())
logging.OnError(err).Debug("trigger failed")
traceSpan.EndWithError(err)
}
eq := sq.Eq{PasswordAgeColInstanceID.identifier(): authz.GetInstance(ctx).InstanceID()}
if !withOwnerRemoved {
eq[PasswordAgeColOwnerRemoved.identifier()] = false
}
stmt, scan := preparePasswordAgePolicyQuery(ctx, q.client)
query, args, err := stmt.Where(
sq.And{
eq,
sq.Or{
sq.Eq{PasswordAgeColID.identifier(): orgID},
sq.Eq{PasswordAgeColID.identifier(): authz.GetInstance(ctx).InstanceID()},
},
}).
OrderBy(PasswordAgeColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, zerrors.ThrowInternal(err, "QUERY-SKR6X", "Errors.Query.SQLStatement")
}
err = q.client.QueryRowContext(ctx, func(row *sql.Row) error {
policy, err = scan(row)
return err
}, query, args...)
return policy, err
}
func (q *Queries) DefaultPasswordAgePolicy(ctx context.Context, shouldTriggerBulk bool) (policy *PasswordAgePolicy, err error) {
ctx, span := tracing.NewSpan(ctx)
defer func() { span.EndWithError(err) }()
if shouldTriggerBulk {
_, traceSpan := tracing.NewNamedSpan(ctx, "TriggerPasswordAgeProjection")
ctx, err = projection.PasswordAgeProjection.Trigger(ctx, handler.WithAwaitRunning())
logging.OnError(err).Debug("trigger failed")
traceSpan.EndWithError(err)
}
stmt, scan := preparePasswordAgePolicyQuery(ctx, q.client)
query, args, err := stmt.Where(sq.Eq{
PasswordAgeColID.identifier(): authz.GetInstance(ctx).InstanceID(),
}).
OrderBy(PasswordAgeColIsDefault.identifier()).
Limit(1).ToSql()
if err != nil {
return nil, zerrors.ThrowInternal(err, "QUERY-mN0Ci", "Errors.Query.SQLStatement")
}
err = q.client.QueryRowContext(ctx, func(row *sql.Row) error {
policy, err = scan(row)
return err
}, query, args...)
return policy, err
}
func preparePasswordAgePolicyQuery(ctx context.Context, db prepareDatabase) (sq.SelectBuilder, func(*sql.Row) (*PasswordAgePolicy, error)) {
return sq.Select(
PasswordAgeColID.identifier(),
PasswordAgeColSequence.identifier(),
PasswordAgeColCreationDate.identifier(),
PasswordAgeColChangeDate.identifier(),
PasswordAgeColResourceOwner.identifier(),
PasswordAgeColWarnDays.identifier(),
PasswordAgeColMaxAge.identifier(),
PasswordAgeColIsDefault.identifier(),
PasswordAgeColState.identifier(),
).
From(passwordAgeTable.identifier() + db.Timetravel(call.Took(ctx))).
PlaceholderFormat(sq.Dollar),
func(row *sql.Row) (*PasswordAgePolicy, error) {
policy := new(PasswordAgePolicy)
err := row.Scan(
&policy.ID,
&policy.Sequence,
&policy.CreationDate,
&policy.ChangeDate,
&policy.ResourceOwner,
&policy.ExpireWarnDays,
&policy.MaxAgeDays,
&policy.IsDefault,
&policy.State,
)
if err != nil {
if errors.Is(err, sql.ErrNoRows) {
return nil, zerrors.ThrowNotFound(err, "QUERY-ShCWRnWJfH", "Errors.IAM.PasswordAgePolicy.NotFound")
}
return nil, zerrors.ThrowInternal(err, "QUERY-6nj7Bm4fxT", "Errors.Internal")
}
return policy, nil
}
}