authorizer/server/resolvers/resend_otp.go

163 lines
5.6 KiB
Go
Raw Permalink Normal View History

2022-07-29 08:19:46 +00:00
package resolvers
import (
"context"
2022-07-29 14:19:50 +00:00
"errors"
2022-07-29 08:19:46 +00:00
"fmt"
"strings"
"time"
2024-03-28 08:27:47 +00:00
"github.com/google/uuid"
2022-07-29 08:19:46 +00:00
log "github.com/sirupsen/logrus"
"github.com/authorizerdev/authorizer/server/constants"
2024-03-28 08:27:47 +00:00
"github.com/authorizerdev/authorizer/server/cookie"
2022-07-29 08:19:46 +00:00
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/db/models"
2024-03-28 08:27:47 +00:00
mailService "github.com/authorizerdev/authorizer/server/email"
2022-07-29 08:19:46 +00:00
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/memorystore"
2022-07-29 08:19:46 +00:00
"github.com/authorizerdev/authorizer/server/refs"
2023-07-23 04:33:37 +00:00
"github.com/authorizerdev/authorizer/server/smsproviders"
2022-07-29 08:19:46 +00:00
"github.com/authorizerdev/authorizer/server/utils"
)
// ResendOTPResolver is a resolver for resend otp mutation
func ResendOTPResolver(ctx context.Context, params model.ResendOTPRequest) (*model.Response, error) {
2023-07-23 04:33:37 +00:00
email := strings.ToLower(strings.Trim(refs.StringValue(params.Email), " "))
phoneNumber := strings.Trim(refs.StringValue(params.PhoneNumber), " ")
2022-07-29 08:19:46 +00:00
log := log.WithFields(log.Fields{
2023-07-23 04:33:37 +00:00
"email": email,
"phone_number": phoneNumber,
2022-07-29 08:19:46 +00:00
})
2023-07-23 04:33:37 +00:00
if email == "" && phoneNumber == "" {
log.Debug("Email or phone number is required")
return nil, errors.New("email or phone number is required")
}
2024-03-28 08:27:47 +00:00
gc, err := utils.GinContextFromContext(ctx)
if err != nil {
log.Debug("Failed to get GinContext: ", err)
return nil, err
}
var user *models.User
2024-03-28 08:27:47 +00:00
var isEmailServiceEnabled, isSMSServiceEnabled bool
2023-07-23 04:33:37 +00:00
if email != "" {
2024-03-28 08:27:47 +00:00
isEmailServiceEnabled, err = memorystore.Provider.GetBoolStoreEnvVariable(constants.EnvKeyIsEmailServiceEnabled)
2023-07-23 04:33:37 +00:00
if err != nil || !isEmailServiceEnabled {
log.Debug("Email service not enabled: ", err)
return nil, errors.New("email service not enabled")
}
user, err = db.Provider.GetUserByEmail(ctx, email)
2024-03-28 08:27:47 +00:00
if err != nil {
log.Debug("Failed to get user by email: ", err)
return nil, fmt.Errorf(`user with this email/phone not found`)
}
2023-07-23 04:33:37 +00:00
} else {
2024-03-28 08:27:47 +00:00
isSMSServiceEnabled, err = memorystore.Provider.GetBoolStoreEnvVariable(constants.EnvKeyIsEmailServiceEnabled)
2023-07-23 04:33:37 +00:00
if err != nil || !isSMSServiceEnabled {
log.Debug("Email service not enabled: ", err)
return nil, errors.New("email service not enabled")
}
user, err = db.Provider.GetUserByPhoneNumber(ctx, phoneNumber)
2024-03-28 08:27:47 +00:00
if err != nil {
log.Debug("Failed to get user by phone: ", err)
return nil, fmt.Errorf(`user with this email/phone not found`)
}
2023-07-23 04:33:37 +00:00
}
2022-07-29 08:19:46 +00:00
if user.RevokedTimestamp != nil {
log.Debug("User access is revoked")
2022-07-29 14:19:50 +00:00
return nil, fmt.Errorf(`user access has been revoked`)
2022-07-29 08:19:46 +00:00
}
2024-03-28 08:27:47 +00:00
if !refs.BoolValue(user.IsMultiFactorAuthEnabled) && user.EmailVerifiedAt != nil && user.PhoneNumberVerifiedAt != nil {
2022-07-29 08:19:46 +00:00
log.Debug("User multi factor authentication is not enabled")
2022-07-29 14:19:50 +00:00
return nil, fmt.Errorf(`multi factor authentication not enabled`)
}
2022-08-03 17:50:23 +00:00
isMFADisabled, err := memorystore.Provider.GetBoolStoreEnvVariable(constants.EnvKeyDisableMultiFactorAuthentication)
if err != nil || isMFADisabled {
log.Debug("MFA service not enabled: ", err)
return nil, errors.New("multi factor authentication is disabled for this instance")
}
2023-07-23 04:33:37 +00:00
// get otp by email or phone number
var otpData *models.OTP
if email != "" {
otpData, err = db.Provider.GetOTPByEmail(ctx, refs.StringValue(params.Email))
} else {
otpData, err = db.Provider.GetOTPByPhoneNumber(ctx, refs.StringValue(params.PhoneNumber))
}
2022-07-29 14:19:50 +00:00
if err != nil {
log.Debug("Failed to get otp for given email: ", err)
return nil, err
}
if otpData == nil {
log.Debug("No otp found for given email: ", params.Email)
return &model.Response{
Message: "Failed to get for given email",
}, errors.New("failed to get otp for given email")
2022-07-29 08:19:46 +00:00
}
2024-03-28 08:27:47 +00:00
// If multi factor authentication is enabled and we need to generate OTP for mail / sms based MFA
generateOTP := func(expiresAt int64) (*models.OTP, error) {
otp := utils.GenerateOTP()
otpData, err := db.Provider.UpsertOTP(ctx, &models.OTP{
Email: refs.StringValue(user.Email),
PhoneNumber: refs.StringValue(user.PhoneNumber),
Otp: otp,
ExpiresAt: expiresAt,
})
if err != nil {
log.Debug("Failed to add otp: ", err)
return nil, err
}
return otpData, nil
}
setOTPMFaSession := func(expiresAt int64) error {
mfaSession := uuid.NewString()
err = memorystore.Provider.SetMfaSession(user.ID, mfaSession, expiresAt)
if err != nil {
log.Debug("Failed to add mfasession: ", err)
return err
}
cookie.SetMfaSession(gc, mfaSession)
return nil
}
expiresAt := time.Now().Add(1 * time.Minute).Unix()
otpData, err = generateOTP(expiresAt)
if err != nil {
log.Debug("Failed to generate otp: ", err)
return nil, err
}
if err := setOTPMFaSession(expiresAt); err != nil {
log.Debug("Failed to set mfa session: ", err)
2022-07-29 14:19:50 +00:00
return nil, err
2022-07-29 08:19:46 +00:00
}
2023-07-23 04:33:37 +00:00
if email != "" {
2024-03-28 08:27:47 +00:00
go func() {
// exec it as go routine so that we can reduce the api latency
if err := mailService.SendEmail([]string{email}, constants.VerificationTypeOTP, map[string]interface{}{
"user": user.ToMap(),
"organization": utils.GetOrganization(),
"otp": otpData.Otp,
}); err != nil {
log.Debug("Failed to send otp email: ", err)
}
utils.RegisterEvent(ctx, constants.UserLoginWebhookEvent, constants.AuthRecipeMethodBasicAuth, user)
}()
2023-07-23 04:33:37 +00:00
} else {
2024-03-28 08:27:47 +00:00
go func() {
smsBody := strings.Builder{}
smsBody.WriteString("Your verification code is: ")
smsBody.WriteString(otpData.Otp)
utils.RegisterEvent(ctx, constants.UserLoginWebhookEvent, constants.AuthRecipeMethodMobileBasicAuth, user)
if err := smsproviders.SendSMS(phoneNumber, smsBody.String()); err != nil {
log.Debug("Failed to send sms: ", err)
}
}()
2023-07-23 04:33:37 +00:00
}
log.Info("OTP has been resent")
2022-07-29 14:19:50 +00:00
return &model.Response{
Message: `OTP has been sent. Please check your inbox`,
}, nil
2022-07-29 08:19:46 +00:00
}