Files
authorizer/server/resolvers/admin_signup.go

91 lines
2.3 KiB
Go
Raw Normal View History

2022-01-09 17:35:37 +05:30
package resolvers
import (
"context"
"fmt"
"strings"
2022-05-24 12:42:29 +05:30
log "github.com/sirupsen/logrus"
2022-01-09 17:35:37 +05:30
"github.com/authorizerdev/authorizer/server/constants"
"github.com/authorizerdev/authorizer/server/cookie"
2022-02-28 21:26:49 +05:30
"github.com/authorizerdev/authorizer/server/crypto"
2022-01-09 17:35:37 +05:30
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
2022-05-30 09:19:55 +05:30
"github.com/authorizerdev/authorizer/server/memorystore"
2022-01-09 17:35:37 +05:30
"github.com/authorizerdev/authorizer/server/utils"
)
2022-01-17 11:32:13 +05:30
// AdminSignupResolver is a resolver for admin signup mutation
func AdminSignupResolver(ctx context.Context, params model.AdminSignupInput) (*model.Response, error) {
var res *model.Response
2022-01-09 17:35:37 +05:30
2022-05-24 12:42:29 +05:30
gc, err := utils.GinContextFromContext(ctx)
2022-01-09 17:35:37 +05:30
if err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to get GinContext: ", err)
2022-01-09 17:35:37 +05:30
return res, err
}
if strings.TrimSpace(params.AdminSecret) == "" {
2022-05-24 12:42:29 +05:30
log.Debug("Admin secret is empty")
2022-01-09 17:35:37 +05:30
err = fmt.Errorf("please select secure admin secret")
return res, err
}
if len(params.AdminSecret) < 6 {
2022-05-24 12:42:29 +05:30
log.Debug("Admin secret is too short")
2022-01-09 17:35:37 +05:30
err = fmt.Errorf("admin secret must be at least 6 characters")
return res, err
}
2022-05-30 09:19:55 +05:30
adminSecret, err := memorystore.Provider.GetStringStoreEnvVariable(constants.EnvKeyAdminSecret)
if err != nil {
log.Debug("Error getting admin secret: ", err)
adminSecret = ""
}
2022-01-17 11:32:13 +05:30
if adminSecret != "" {
2022-05-24 12:42:29 +05:30
log.Debug("Admin secret is already set")
2022-01-09 17:35:37 +05:30
err = fmt.Errorf("admin sign up already completed")
return res, err
}
2022-05-30 09:19:55 +05:30
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyAdminSecret, params.AdminSecret)
2022-01-09 17:35:37 +05:30
// consvert EnvData to JSON
2022-05-30 09:19:55 +05:30
storeData, err := memorystore.Provider.GetEnvStore()
2022-01-09 17:35:37 +05:30
if err != nil {
2022-05-30 09:19:55 +05:30
log.Debug("Error getting env store: ", err)
2022-01-09 17:35:37 +05:30
return res, err
}
2022-07-10 21:49:33 +05:30
env, err := db.Provider.GetEnv(ctx)
2022-01-09 17:35:37 +05:30
if err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to get env: ", err)
2022-01-09 17:35:37 +05:30
return res, err
}
2022-02-28 21:26:49 +05:30
envData, err := crypto.EncryptEnvData(storeData)
2022-01-09 17:35:37 +05:30
if err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to encrypt envstore: ", err)
2022-01-09 17:35:37 +05:30
return res, err
}
env.EnvData = envData
2022-07-10 21:49:33 +05:30
if _, err := db.Provider.UpdateEnv(ctx, env); err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to update env: ", err)
2022-01-09 17:35:37 +05:30
return res, err
}
2022-02-28 21:26:49 +05:30
hashedKey, err := crypto.EncryptPassword(params.AdminSecret)
2022-01-09 17:35:37 +05:30
if err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to encrypt admin session key: ", err)
2022-01-09 17:35:37 +05:30
return res, err
}
cookie.SetAdminCookie(gc, hashedKey)
2022-01-09 17:35:37 +05:30
res = &model.Response{
2022-01-09 18:02:16 +05:30
Message: "admin signed up successfully",
2022-01-09 17:35:37 +05:30
}
return res, nil
}