authorizer/server/resolvers/update_env.go

144 lines
4.2 KiB
Go
Raw Normal View History

2021-12-31 11:33:37 +00:00
package resolvers
import (
"context"
"encoding/json"
"errors"
2021-12-31 11:33:37 +00:00
"fmt"
"log"
"reflect"
"github.com/authorizerdev/authorizer/server/constants"
"github.com/authorizerdev/authorizer/server/cookie"
2021-12-31 11:33:37 +00:00
"github.com/authorizerdev/authorizer/server/db"
2022-01-17 06:02:13 +00:00
"github.com/authorizerdev/authorizer/server/envstore"
2021-12-31 11:33:37 +00:00
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/token"
2021-12-31 11:33:37 +00:00
"github.com/authorizerdev/authorizer/server/utils"
"golang.org/x/crypto/bcrypt"
2021-12-31 11:33:37 +00:00
)
2022-01-17 07:42:46 +00:00
// UpdateEnvResolver is a resolver for update config mutation
2022-01-17 06:02:13 +00:00
// This is admin only mutation
2022-01-17 07:42:46 +00:00
func UpdateEnvResolver(ctx context.Context, params model.UpdateEnvInput) (*model.Response, error) {
2021-12-31 11:33:37 +00:00
gc, err := utils.GinContextFromContext(ctx)
var res *model.Response
if err != nil {
return res, err
}
if !token.IsSuperAdmin(gc) {
2021-12-31 11:33:37 +00:00
return res, fmt.Errorf("unauthorized")
}
var data map[string]interface{}
byteData, err := json.Marshal(params)
if err != nil {
return res, fmt.Errorf("error marshalling params: %t", err)
}
err = json.Unmarshal(byteData, &data)
if err != nil {
return res, fmt.Errorf("error un-marshalling params: %t", err)
}
updatedData := envstore.EnvInMemoryStoreObj.GetEnvStoreClone()
2021-12-31 11:33:37 +00:00
for key, value := range data {
if value != nil {
fieldType := reflect.TypeOf(value).String()
if fieldType == "string" {
updatedData.StringEnv[key] = value.(string)
2021-12-31 11:33:37 +00:00
}
if fieldType == "bool" {
updatedData.BoolEnv[key] = value.(bool)
}
2021-12-31 11:33:37 +00:00
if fieldType == "[]interface {}" {
stringArr := []string{}
for _, v := range value.([]interface{}) {
stringArr = append(stringArr, v.(string))
}
updatedData.SliceEnv[key] = stringArr
2021-12-31 11:33:37 +00:00
}
}
}
// handle derivative cases like disabling email verification & magic login
// in case SMTP is off but env is set to true
if updatedData.StringEnv[constants.EnvKeySmtpHost] == "" || updatedData.StringEnv[constants.EnvKeySmtpUsername] == "" || updatedData.StringEnv[constants.EnvKeySmtpPassword] == "" || updatedData.StringEnv[constants.EnvKeySenderEmail] == "" && updatedData.StringEnv[constants.EnvKeySmtpPort] == "" {
if !updatedData.BoolEnv[constants.EnvKeyDisableEmailVerification] {
updatedData.BoolEnv[constants.EnvKeyDisableEmailVerification] = true
2021-12-31 11:33:37 +00:00
}
if !updatedData.BoolEnv[constants.EnvKeyDisableMagicLinkLogin] {
updatedData.BoolEnv[constants.EnvKeyDisableMagicLinkLogin] = true
2021-12-31 11:33:37 +00:00
}
}
// check the roles change
if len(params.Roles) > 0 {
if len(params.DefaultRoles) > 0 {
// should be subset of roles
for _, role := range params.DefaultRoles {
if !utils.StringSliceContains(params.Roles, role) {
return res, fmt.Errorf("default role %s is not in roles", role)
}
}
}
}
if len(params.ProtectedRoles) > 0 {
for _, role := range params.ProtectedRoles {
if utils.StringSliceContains(params.Roles, role) || utils.StringSliceContains(params.DefaultRoles, role) {
return res, fmt.Errorf("protected role %s found roles or default roles", role)
}
}
}
// Update local store
envstore.EnvInMemoryStoreObj.UpdateEnvStore(updatedData)
2021-12-31 11:33:37 +00:00
// Fetch the current db store and update it
2022-01-21 08:04:04 +00:00
env, err := db.Provider.GetEnv()
2021-12-31 11:33:37 +00:00
if err != nil {
return res, err
}
2022-01-17 06:02:13 +00:00
encryptedConfig, err := utils.EncryptEnvData(updatedData)
2021-12-31 11:33:37 +00:00
if err != nil {
return res, err
}
// in case of admin secret change update the cookie with new hash
if params.AdminSecret != nil {
if params.OldAdminSecret == nil {
return res, errors.New("admin secret and old admin secret are required for secret change")
}
err := bcrypt.CompareHashAndPassword([]byte(*params.OldAdminSecret), []byte(envstore.EnvInMemoryStoreObj.GetStringStoreEnvVariable(constants.EnvKeyAdminSecret)))
if err != nil {
return res, errors.New("old admin secret is not correct")
}
hashedKey, err := utils.EncryptPassword(envstore.EnvInMemoryStoreObj.GetStringStoreEnvVariable(constants.EnvKeyAdminSecret))
2021-12-31 11:33:37 +00:00
if err != nil {
return res, err
}
cookie.SetAdminCookie(gc, hashedKey)
2021-12-31 11:33:37 +00:00
}
env.EnvData = encryptedConfig
2022-01-21 08:04:04 +00:00
_, err = db.Provider.UpdateEnv(env)
2021-12-31 11:33:37 +00:00
if err != nil {
log.Println("error updating config:", err)
return res, err
}
res = &model.Response{
Message: "configurations updated successfully",
}
return res, nil
}