authorizer/server/resolvers/delete_user.go

101 lines
2.9 KiB
Go
Raw Normal View History

2021-08-06 13:47:52 +00:00
package resolvers
import (
"context"
"fmt"
2022-05-23 06:22:51 +00:00
log "github.com/sirupsen/logrus"
2021-08-06 13:47:52 +00:00
"github.com/authorizerdev/authorizer/server/constants"
2021-08-06 13:47:52 +00:00
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
2022-05-27 17:50:38 +00:00
"github.com/authorizerdev/authorizer/server/memorystore"
2023-10-25 19:25:10 +00:00
"github.com/authorizerdev/authorizer/server/refs"
"github.com/authorizerdev/authorizer/server/token"
2021-08-06 13:47:52 +00:00
"github.com/authorizerdev/authorizer/server/utils"
)
2022-01-17 06:02:13 +00:00
// DeleteUserResolver is a resolver for delete user mutation
func DeleteUserResolver(ctx context.Context, params model.DeleteUserInput) (*model.Response, error) {
2021-08-06 13:47:52 +00:00
var res *model.Response
2022-05-24 07:12:29 +00:00
gc, err := utils.GinContextFromContext(ctx)
2021-08-06 13:47:52 +00:00
if err != nil {
2022-05-25 07:00:22 +00:00
log.Debug("Failed to get GinContext: ", err)
2021-08-06 13:47:52 +00:00
return res, err
}
if !token.IsSuperAdmin(gc) {
2022-05-25 07:00:22 +00:00
log.Debug("Not logged in as super admin")
2021-08-06 13:47:52 +00:00
return res, fmt.Errorf("unauthorized")
}
2022-05-24 07:12:29 +00:00
log := log.WithFields(log.Fields{
"email": params.Email,
})
2022-07-10 16:19:33 +00:00
user, err := db.Provider.GetUserByEmail(ctx, params.Email)
2021-08-07 08:41:26 +00:00
if err != nil {
2022-05-25 07:00:22 +00:00
log.Debug("Failed to get user from DB: ", err)
2021-08-07 08:41:26 +00:00
return res, err
}
2022-07-10 16:19:33 +00:00
err = db.Provider.DeleteUser(ctx, user)
2021-08-06 13:47:52 +00:00
if err != nil {
2022-05-25 07:00:22 +00:00
log.Debug("Failed to delete user: ", err)
2021-08-06 13:47:52 +00:00
return res, err
}
res = &model.Response{
Message: `user deleted successfully`,
}
2022-07-11 05:43:32 +00:00
go func() {
// delete otp for given email
2023-10-25 19:25:10 +00:00
otp, err := db.Provider.GetOTPByEmail(ctx, refs.StringValue(user.Email))
if err != nil {
2024-06-05 18:20:36 +00:00
log.Info("No OTP found for email (%s): %v", user.Email, err)
// continue
} else {
err := db.Provider.DeleteOTP(ctx, otp)
if err != nil {
2023-10-25 19:25:10 +00:00
log.Debugf("Failed to delete otp for given email (%s): %v", refs.StringValue(user.Email), err)
// continue
}
}
// delete otp for given phone number
otp, err = db.Provider.GetOTPByPhoneNumber(ctx, refs.StringValue(user.PhoneNumber))
if err != nil {
log.Infof("No OTP found for email (%s): %v", refs.StringValue(user.Email), err)
// continue
} else {
err := db.Provider.DeleteOTP(ctx, otp)
if err != nil {
log.Debugf("Failed to delete otp for given phone (%s): %v", refs.StringValue(user.PhoneNumber), err)
// continue
}
}
// delete verification requests for given email
for _, vt := range constants.VerificationTypes {
2023-10-25 19:25:10 +00:00
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, refs.StringValue(user.Email), vt)
if err != nil {
2023-10-25 19:25:10 +00:00
log.Infof("No verification verification request found for email: %s, verification_request_type: %s. %v", refs.StringValue(user.Email), vt, err)
// continue
} else {
err := db.Provider.DeleteVerificationRequest(ctx, verificationRequest)
if err != nil {
2023-10-25 19:25:10 +00:00
log.Debugf("Failed to DeleteVerificationRequest for email: %s, verification_request_type: %s. %v", refs.StringValue(user.Email), vt, err)
// continue
}
}
}
2022-07-11 05:43:32 +00:00
memorystore.Provider.DeleteAllUserSessions(user.ID)
utils.RegisterEvent(ctx, constants.UserDeletedWebhookEvent, "", user)
}()
2021-08-06 13:47:52 +00:00
return res, nil
}