authorizer/server/env/env.go

386 lines
13 KiB
Go
Raw Normal View History

2021-12-20 12:03:11 +00:00
package env
2021-07-28 06:23:37 +00:00
import (
2022-02-26 04:36:26 +00:00
"errors"
2021-07-28 06:23:37 +00:00
"log"
"os"
"strings"
"github.com/authorizerdev/authorizer/server/constants"
2022-02-26 04:14:55 +00:00
"github.com/authorizerdev/authorizer/server/crypto"
2022-01-17 06:02:13 +00:00
"github.com/authorizerdev/authorizer/server/envstore"
"github.com/authorizerdev/authorizer/server/utils"
2022-02-05 03:30:56 +00:00
"github.com/gin-gonic/gin"
"github.com/google/uuid"
2021-07-28 06:23:37 +00:00
"github.com/joho/godotenv"
)
2022-02-26 04:14:55 +00:00
// InitRequiredEnv to initialize EnvData and through error if required env are not present
2022-02-26 04:36:26 +00:00
func InitRequiredEnv() error {
2022-02-26 04:14:55 +00:00
envPath := os.Getenv(constants.EnvKeyEnvPath)
if envPath == "" {
2022-02-28 02:25:01 +00:00
envPath = envstore.EnvStoreObj.GetStringStoreEnvVariable(constants.EnvKeyEnvPath)
if envPath == "" {
envPath = `.env`
}
2022-02-26 04:14:55 +00:00
}
if envstore.ARG_ENV_FILE != nil && *envstore.ARG_ENV_FILE != "" {
envPath = *envstore.ARG_ENV_FILE
}
err := godotenv.Load(envPath)
if err != nil {
log.Printf("using OS env instead of %s file", envPath)
}
dbURL := os.Getenv(constants.EnvKeyDatabaseURL)
dbType := os.Getenv(constants.EnvKeyDatabaseType)
dbName := os.Getenv(constants.EnvKeyDatabaseName)
2022-02-26 04:36:26 +00:00
if strings.TrimSpace(dbType) == "" {
2022-02-26 04:14:55 +00:00
if envstore.ARG_DB_TYPE != nil && *envstore.ARG_DB_TYPE != "" {
2022-02-26 04:36:26 +00:00
dbType = strings.TrimSpace(*envstore.ARG_DB_TYPE)
2022-02-26 04:14:55 +00:00
}
if dbType == "" {
2022-02-26 04:36:26 +00:00
return errors.New("invalid database type. DATABASE_TYPE is empty")
2022-02-26 04:14:55 +00:00
}
}
2022-02-28 02:25:01 +00:00
if strings.TrimSpace(dbURL) == "" && envstore.EnvStoreObj.GetStringStoreEnvVariable(constants.EnvKeyDatabaseURL) == "" {
2022-02-26 04:14:55 +00:00
if envstore.ARG_DB_URL != nil && *envstore.ARG_DB_URL != "" {
2022-02-26 04:36:26 +00:00
dbURL = strings.TrimSpace(*envstore.ARG_DB_URL)
2022-02-26 04:14:55 +00:00
}
if dbURL == "" {
2022-02-26 04:36:26 +00:00
return errors.New("invalid database url. DATABASE_URL is required")
2022-02-26 04:14:55 +00:00
}
}
if dbName == "" {
if dbName == "" {
dbName = "authorizer"
}
}
2022-02-28 02:25:01 +00:00
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyEnvPath, envPath)
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyDatabaseURL, dbURL)
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyDatabaseType, dbType)
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyDatabaseName, dbName)
2022-02-26 04:36:26 +00:00
return nil
2022-02-26 04:14:55 +00:00
}
2022-01-17 06:02:13 +00:00
// InitEnv to initialize EnvData and through error if required env are not present
2022-02-26 04:36:26 +00:00
func InitAllEnv() error {
2022-02-26 04:14:55 +00:00
envData, err := GetEnvData()
if err != nil {
log.Println("No env data found in db, using local clone of env data")
// get clone of current store
2022-02-28 02:25:01 +00:00
envData = envstore.EnvStoreObj.GetEnvStoreClone()
2022-02-26 04:14:55 +00:00
}
2022-01-17 06:02:13 +00:00
clientID := envData.StringEnv[constants.EnvKeyClientID]
// unique client id for each instance
if clientID == "" {
clientID = uuid.New().String()
envData.StringEnv[constants.EnvKeyClientID] = clientID
}
2022-02-28 07:44:16 +00:00
clientSecret := envData.StringEnv[constants.EnvKeyClientSecret]
// unique client id for each instance
2022-03-07 06:53:45 +00:00
if clientSecret == "" {
2022-02-28 07:44:16 +00:00
clientSecret = uuid.New().String()
envData.StringEnv[constants.EnvKeyClientSecret] = clientSecret
}
if envData.StringEnv[constants.EnvKeyEnv] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyEnv] = os.Getenv(constants.EnvKeyEnv)
if envData.StringEnv[constants.EnvKeyEnv] == "" {
envData.StringEnv[constants.EnvKeyEnv] = "production"
2022-01-17 06:02:13 +00:00
}
if envData.StringEnv[constants.EnvKeyEnv] == "production" {
envData.BoolEnv[constants.EnvKeyIsProd] = true
2022-02-05 03:30:56 +00:00
gin.SetMode(gin.ReleaseMode)
2022-01-17 06:02:13 +00:00
} else {
envData.BoolEnv[constants.EnvKeyIsProd] = false
2022-01-17 06:02:13 +00:00
}
}
if envData.StringEnv[constants.EnvKeyAppURL] == "" {
envData.StringEnv[constants.EnvKeyAppURL] = os.Getenv(constants.EnvKeyAppURL)
2022-01-17 06:02:13 +00:00
}
if envData.StringEnv[constants.EnvKeyPort] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyPort] = os.Getenv(constants.EnvKeyPort)
if envData.StringEnv[constants.EnvKeyPort] == "" {
envData.StringEnv[constants.EnvKeyPort] = "8080"
2022-01-17 06:02:13 +00:00
}
2021-07-28 06:23:37 +00:00
}
if envData.StringEnv[constants.EnvKeyAccessTokenExpiryTime] == "" {
envData.StringEnv[constants.EnvKeyAccessTokenExpiryTime] = os.Getenv(constants.EnvKeyAccessTokenExpiryTime)
2022-03-25 14:59:00 +00:00
if envData.StringEnv[constants.EnvKeyAccessTokenExpiryTime] == "" {
envData.StringEnv[constants.EnvKeyAccessTokenExpiryTime] = "30m"
}
}
if envData.StringEnv[constants.EnvKeyAdminSecret] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyAdminSecret] = os.Getenv(constants.EnvKeyAdminSecret)
2022-01-17 06:02:13 +00:00
}
if envData.StringEnv[constants.EnvKeySmtpHost] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeySmtpHost] = os.Getenv(constants.EnvKeySmtpHost)
}
if envData.StringEnv[constants.EnvKeySmtpPort] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeySmtpPort] = os.Getenv(constants.EnvKeySmtpPort)
}
if envData.StringEnv[constants.EnvKeySmtpUsername] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeySmtpUsername] = os.Getenv(constants.EnvKeySmtpUsername)
}
if envData.StringEnv[constants.EnvKeySmtpPassword] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeySmtpPassword] = os.Getenv(constants.EnvKeySmtpPassword)
}
if envData.StringEnv[constants.EnvKeySenderEmail] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeySenderEmail] = os.Getenv(constants.EnvKeySenderEmail)
}
algo := envData.StringEnv[constants.EnvKeyJwtType]
if algo == "" {
2022-02-26 04:14:55 +00:00
envData.StringEnv[constants.EnvKeyJwtType] = os.Getenv(constants.EnvKeyJwtType)
if envData.StringEnv[constants.EnvKeyJwtType] == "" {
envData.StringEnv[constants.EnvKeyJwtType] = "RS256"
algo = envData.StringEnv[constants.EnvKeyJwtType]
} else {
algo = envData.StringEnv[constants.EnvKeyJwtType]
if !crypto.IsHMACA(algo) && !crypto.IsRSA(algo) && !crypto.IsECDSA(algo) {
2022-02-26 04:36:26 +00:00
return errors.New("invalid JWT_TYPE")
2022-02-26 04:14:55 +00:00
}
}
}
2022-02-26 15:06:22 +00:00
if crypto.IsHMACA(algo) {
if envData.StringEnv[constants.EnvKeyJwtSecret] == "" {
2022-02-26 15:06:22 +00:00
envData.StringEnv[constants.EnvKeyJwtSecret] = os.Getenv(constants.EnvKeyJwtSecret)
if envData.StringEnv[constants.EnvKeyJwtSecret] == "" {
envData.StringEnv[constants.EnvKeyJwtSecret], _, err = crypto.NewHMACKey(algo, clientID)
if err != nil {
return err
}
}
2021-12-31 08:22:10 +00:00
}
}
2022-02-26 04:14:55 +00:00
if crypto.IsRSA(algo) || crypto.IsECDSA(algo) {
2022-02-26 15:06:22 +00:00
privateKey, publicKey := "", ""
2022-02-26 04:14:55 +00:00
if envData.StringEnv[constants.EnvKeyJwtPrivateKey] == "" {
privateKey = os.Getenv(constants.EnvKeyJwtPrivateKey)
}
2022-02-12 10:24:23 +00:00
2022-02-26 04:14:55 +00:00
if envData.StringEnv[constants.EnvKeyJwtPublicKey] == "" {
publicKey = os.Getenv(constants.EnvKeyJwtPublicKey)
}
2022-02-12 10:24:23 +00:00
2022-02-26 04:14:55 +00:00
// if algo is RSA / ECDSA, then we need to have both private and public key
// if either of them is not present generate new keys
if privateKey == "" || publicKey == "" {
if crypto.IsRSA(algo) {
2022-02-26 15:06:22 +00:00
_, privateKey, publicKey, _, err = crypto.NewRSAKey(algo, clientID)
2022-02-26 04:14:55 +00:00
if err != nil {
2022-02-26 04:36:26 +00:00
return err
2022-02-26 04:14:55 +00:00
}
} else if crypto.IsECDSA(algo) {
2022-02-26 15:06:22 +00:00
_, privateKey, publicKey, _, err = crypto.NewECDSAKey(algo, clientID)
2022-02-26 04:14:55 +00:00
if err != nil {
2022-02-26 04:36:26 +00:00
return err
2022-02-26 04:14:55 +00:00
}
}
} else {
// parse keys to make sure they are valid
if crypto.IsRSA(algo) {
_, err = crypto.ParseRsaPrivateKeyFromPemStr(privateKey)
if err != nil {
2022-02-26 04:36:26 +00:00
return err
2022-02-26 04:14:55 +00:00
}
2022-02-26 15:06:22 +00:00
_, err := crypto.ParseRsaPublicKeyFromPemStr(publicKey)
if err != nil {
return err
}
2022-02-26 04:14:55 +00:00
} else if crypto.IsECDSA(algo) {
_, err = crypto.ParseEcdsaPrivateKeyFromPemStr(privateKey)
if err != nil {
2022-02-26 04:36:26 +00:00
return err
2022-02-26 04:14:55 +00:00
}
2022-02-26 15:06:22 +00:00
_, err := crypto.ParseEcdsaPublicKeyFromPemStr(publicKey)
2022-02-26 04:14:55 +00:00
if err != nil {
2022-02-26 04:36:26 +00:00
return err
2022-02-26 04:14:55 +00:00
}
}
2021-12-31 08:22:10 +00:00
}
2022-02-26 04:36:26 +00:00
2022-02-26 04:14:55 +00:00
envData.StringEnv[constants.EnvKeyJwtPrivateKey] = privateKey
envData.StringEnv[constants.EnvKeyJwtPublicKey] = publicKey
}
if envData.StringEnv[constants.EnvKeyJwtRoleClaim] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyJwtRoleClaim] = os.Getenv(constants.EnvKeyJwtRoleClaim)
if envData.StringEnv[constants.EnvKeyJwtRoleClaim] == "" {
envData.StringEnv[constants.EnvKeyJwtRoleClaim] = "role"
}
}
2022-02-26 04:14:55 +00:00
if envData.StringEnv[constants.EnvKeyCustomAccessTokenScript] == "" {
envData.StringEnv[constants.EnvKeyCustomAccessTokenScript] = os.Getenv(constants.EnvKeyCustomAccessTokenScript)
}
if envData.StringEnv[constants.EnvKeyRedisURL] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyRedisURL] = os.Getenv(constants.EnvKeyRedisURL)
}
if envData.StringEnv[constants.EnvKeyCookieName] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyCookieName] = os.Getenv(constants.EnvKeyCookieName)
if envData.StringEnv[constants.EnvKeyCookieName] == "" {
envData.StringEnv[constants.EnvKeyCookieName] = "authorizer"
}
}
if envData.StringEnv[constants.EnvKeyGoogleClientID] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyGoogleClientID] = os.Getenv(constants.EnvKeyGoogleClientID)
}
if envData.StringEnv[constants.EnvKeyGoogleClientSecret] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyGoogleClientSecret] = os.Getenv(constants.EnvKeyGoogleClientSecret)
}
if envData.StringEnv[constants.EnvKeyGithubClientID] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyGithubClientID] = os.Getenv(constants.EnvKeyGithubClientID)
}
if envData.StringEnv[constants.EnvKeyGithubClientSecret] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyGithubClientSecret] = os.Getenv(constants.EnvKeyGithubClientSecret)
}
if envData.StringEnv[constants.EnvKeyFacebookClientID] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyFacebookClientID] = os.Getenv(constants.EnvKeyFacebookClientID)
}
if envData.StringEnv[constants.EnvKeyFacebookClientSecret] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyFacebookClientSecret] = os.Getenv(constants.EnvKeyFacebookClientSecret)
}
if envData.StringEnv[constants.EnvKeyResetPasswordURL] == "" {
2022-02-12 10:24:23 +00:00
envData.StringEnv[constants.EnvKeyResetPasswordURL] = strings.TrimPrefix(os.Getenv(constants.EnvKeyResetPasswordURL), "/")
}
2022-02-12 10:24:23 +00:00
envData.BoolEnv[constants.EnvKeyDisableBasicAuthentication] = os.Getenv(constants.EnvKeyDisableBasicAuthentication) == "true"
envData.BoolEnv[constants.EnvKeyDisableEmailVerification] = os.Getenv(constants.EnvKeyDisableEmailVerification) == "true"
envData.BoolEnv[constants.EnvKeyDisableMagicLinkLogin] = os.Getenv(constants.EnvKeyDisableMagicLinkLogin) == "true"
envData.BoolEnv[constants.EnvKeyDisableLoginPage] = os.Getenv(constants.EnvKeyDisableLoginPage) == "true"
2022-03-16 17:19:18 +00:00
envData.BoolEnv[constants.EnvKeyDisableSignUp] = os.Getenv(constants.EnvKeyDisableSignUp) == "true"
2022-01-17 06:02:13 +00:00
// no need to add nil check as its already done above
if envData.StringEnv[constants.EnvKeySmtpHost] == "" || envData.StringEnv[constants.EnvKeySmtpUsername] == "" || envData.StringEnv[constants.EnvKeySmtpPassword] == "" || envData.StringEnv[constants.EnvKeySenderEmail] == "" && envData.StringEnv[constants.EnvKeySmtpPort] == "" {
envData.BoolEnv[constants.EnvKeyDisableEmailVerification] = true
envData.BoolEnv[constants.EnvKeyDisableMagicLinkLogin] = true
}
if envData.BoolEnv[constants.EnvKeyDisableEmailVerification] {
envData.BoolEnv[constants.EnvKeyDisableMagicLinkLogin] = true
2021-07-28 06:23:37 +00:00
}
2022-02-12 10:24:23 +00:00
allowedOriginsSplit := strings.Split(os.Getenv(constants.EnvKeyAllowedOrigins), ",")
allowedOrigins := []string{}
hasWildCard := false
for _, val := range allowedOriginsSplit {
trimVal := strings.TrimSpace(val)
if trimVal != "" {
if trimVal != "*" {
host, port := utils.GetHostParts(trimVal)
allowedOrigins = append(allowedOrigins, host+":"+port)
} else {
hasWildCard = true
allowedOrigins = append(allowedOrigins, trimVal)
break
}
}
}
if len(allowedOrigins) > 1 && hasWildCard {
allowedOrigins = []string{"*"}
}
if len(allowedOrigins) == 0 {
allowedOrigins = []string{"*"}
}
envData.SliceEnv[constants.EnvKeyAllowedOrigins] = allowedOrigins
2021-11-14 22:42:28 +00:00
2022-02-12 10:24:23 +00:00
rolesEnv := strings.TrimSpace(os.Getenv(constants.EnvKeyRoles))
2021-12-24 13:12:32 +00:00
rolesSplit := strings.Split(rolesEnv, ",")
roles := []string{}
2021-12-24 13:12:32 +00:00
if len(rolesEnv) == 0 {
roles = []string{"user"}
}
2022-02-12 10:24:23 +00:00
defaultRolesEnv := strings.TrimSpace(os.Getenv(constants.EnvKeyDefaultRoles))
2021-12-24 13:12:32 +00:00
defaultRoleSplit := strings.Split(defaultRolesEnv, ",")
defaultRoles := []string{}
2021-12-24 13:12:32 +00:00
if len(defaultRolesEnv) == 0 {
defaultRoles = []string{"user"}
}
2022-02-12 10:24:23 +00:00
protectedRolesEnv := strings.TrimSpace(os.Getenv(constants.EnvKeyProtectedRoles))
2021-12-24 13:12:32 +00:00
protectedRolesSplit := strings.Split(protectedRolesEnv, ",")
protectedRoles := []string{}
2021-12-24 13:12:32 +00:00
if len(protectedRolesEnv) > 0 {
for _, val := range protectedRolesSplit {
trimVal := strings.TrimSpace(val)
protectedRoles = append(protectedRoles, trimVal)
}
}
for _, val := range rolesSplit {
trimVal := strings.TrimSpace(val)
if trimVal != "" {
roles = append(roles, trimVal)
2022-01-31 06:05:24 +00:00
if utils.StringSliceContains(defaultRoleSplit, trimVal) {
defaultRoles = append(defaultRoles, trimVal)
}
}
}
2021-12-31 08:22:10 +00:00
if len(roles) > 0 && len(defaultRoles) == 0 && len(defaultRolesEnv) > 0 {
2022-02-26 04:36:26 +00:00
return errors.New(`invalid DEFAULT_ROLE environment variable. It can be one from give ROLES environment variable value`)
}
envData.SliceEnv[constants.EnvKeyRoles] = roles
envData.SliceEnv[constants.EnvKeyDefaultRoles] = defaultRoles
envData.SliceEnv[constants.EnvKeyProtectedRoles] = protectedRoles
2022-02-12 10:24:23 +00:00
if os.Getenv(constants.EnvKeyOrganizationName) != "" {
envData.StringEnv[constants.EnvKeyOrganizationName] = os.Getenv(constants.EnvKeyOrganizationName)
}
2022-02-12 10:24:23 +00:00
if os.Getenv(constants.EnvKeyOrganizationLogo) != "" {
envData.StringEnv[constants.EnvKeyOrganizationLogo] = os.Getenv(constants.EnvKeyOrganizationLogo)
}
2022-01-17 06:02:13 +00:00
2022-02-28 02:25:01 +00:00
envstore.EnvStoreObj.UpdateEnvStore(envData)
2022-02-26 04:36:26 +00:00
return nil
2021-07-28 06:23:37 +00:00
}