Files
authorizer/server/resolvers/admin_login.go

40 lines
1.0 KiB
Go
Raw Normal View History

2021-12-30 10:01:51 +05:30
package resolvers
import (
"context"
"fmt"
"github.com/authorizerdev/authorizer/server/constants"
"github.com/authorizerdev/authorizer/server/cookie"
2022-02-28 21:26:49 +05:30
"github.com/authorizerdev/authorizer/server/crypto"
2022-01-17 11:32:13 +05:30
"github.com/authorizerdev/authorizer/server/envstore"
2021-12-30 10:01:51 +05:30
"github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/utils"
)
2022-01-17 11:32:13 +05:30
// AdminLoginResolver is a resolver for admin login mutation
func AdminLoginResolver(ctx context.Context, params model.AdminLoginInput) (*model.Response, error) {
2021-12-30 10:01:51 +05:30
gc, err := utils.GinContextFromContext(ctx)
var res *model.Response
2021-12-31 14:28:00 +05:30
2021-12-30 10:01:51 +05:30
if err != nil {
return res, err
}
2021-12-31 14:28:00 +05:30
2022-02-28 07:55:01 +05:30
adminSecret := envstore.EnvStoreObj.GetStringStoreEnvVariable(constants.EnvKeyAdminSecret)
2022-01-17 11:32:13 +05:30
if params.AdminSecret != adminSecret {
2021-12-31 14:28:00 +05:30
return res, fmt.Errorf(`invalid admin secret`)
2021-12-30 10:01:51 +05:30
}
2022-02-28 21:26:49 +05:30
hashedKey, err := crypto.EncryptPassword(adminSecret)
2021-12-31 14:28:00 +05:30
if err != nil {
return res, err
}
cookie.SetAdminCookie(gc, hashedKey)
2021-12-30 10:01:51 +05:30
res = &model.Response{
2022-01-09 18:02:16 +05:30
Message: "admin logged in successfully",
2021-12-30 10:01:51 +05:30
}
return res, nil
}