2021-09-21 02:53:40 +00:00
|
|
|
package resolvers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-08-14 06:31:37 +00:00
|
|
|
"encoding/json"
|
2022-07-29 14:19:50 +00:00
|
|
|
"errors"
|
2021-09-21 02:53:40 +00:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2022-05-24 07:12:29 +00:00
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
|
2021-10-13 16:41:41 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
2021-09-21 02:53:40 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/db"
|
2022-01-21 08:04:04 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/db/models"
|
2022-01-17 06:02:13 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/email"
|
2021-09-21 02:53:40 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
2022-05-27 17:50:38 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/memorystore"
|
2022-05-30 06:24:16 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/parsers"
|
2022-07-23 09:56:44 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/refs"
|
2022-01-22 19:54:41 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/token"
|
2021-09-21 02:53:40 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/utils"
|
2022-05-30 06:24:16 +00:00
|
|
|
"github.com/authorizerdev/authorizer/server/validators"
|
2021-09-21 02:53:40 +00:00
|
|
|
)
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
// UpdateUserResolver is a resolver for update user mutation
|
|
|
|
// This is admin only mutation
|
|
|
|
func UpdateUserResolver(ctx context.Context, params model.UpdateUserInput) (*model.User, error) {
|
2021-09-21 02:53:40 +00:00
|
|
|
var res *model.User
|
2022-05-24 07:12:29 +00:00
|
|
|
|
|
|
|
gc, err := utils.GinContextFromContext(ctx)
|
2021-09-21 02:53:40 +00:00
|
|
|
if err != nil {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Failed to get GinContext: ", err)
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
2022-01-22 19:54:41 +00:00
|
|
|
if !token.IsSuperAdmin(gc) {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Not logged in as super admin")
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, fmt.Errorf("unauthorized")
|
|
|
|
}
|
|
|
|
|
2022-05-24 07:12:29 +00:00
|
|
|
if params.ID == "" {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("UserID is empty")
|
2022-05-24 07:12:29 +00:00
|
|
|
return res, fmt.Errorf("User ID is required")
|
|
|
|
}
|
|
|
|
|
|
|
|
log := log.WithFields(log.Fields{
|
|
|
|
"user_id": params.ID,
|
|
|
|
})
|
|
|
|
|
2024-03-28 08:27:47 +00:00
|
|
|
if params.GivenName == nil &&
|
|
|
|
params.FamilyName == nil &&
|
|
|
|
params.Picture == nil &&
|
|
|
|
params.MiddleName == nil &&
|
|
|
|
params.Nickname == nil &&
|
|
|
|
params.Email == nil &&
|
|
|
|
params.Birthdate == nil &&
|
|
|
|
params.Gender == nil &&
|
|
|
|
params.PhoneNumber == nil &&
|
|
|
|
params.Roles == nil &&
|
|
|
|
params.IsMultiFactorAuthEnabled == nil &&
|
|
|
|
params.AppData == nil {
|
2022-05-24 07:12:29 +00:00
|
|
|
log.Debug("No params to update")
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, fmt.Errorf("please enter atleast one param to update")
|
|
|
|
}
|
|
|
|
|
2022-07-10 16:19:33 +00:00
|
|
|
user, err := db.Provider.GetUserByID(ctx, params.ID)
|
2021-09-21 02:53:40 +00:00
|
|
|
if err != nil {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Failed to get user by id: ", err)
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, fmt.Errorf(`User not found`)
|
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.GivenName != nil && refs.StringValue(user.GivenName) != refs.StringValue(params.GivenName) {
|
2021-12-22 10:01:45 +00:00
|
|
|
user.GivenName = params.GivenName
|
2021-09-21 02:53:40 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.FamilyName != nil && refs.StringValue(user.FamilyName) != refs.StringValue(params.FamilyName) {
|
2021-12-22 10:01:45 +00:00
|
|
|
user.FamilyName = params.FamilyName
|
2021-09-21 02:53:40 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.MiddleName != nil && refs.StringValue(user.MiddleName) != refs.StringValue(params.MiddleName) {
|
2021-12-22 10:01:45 +00:00
|
|
|
user.MiddleName = params.MiddleName
|
2021-12-22 05:21:12 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.Nickname != nil && refs.StringValue(user.Nickname) != refs.StringValue(params.Nickname) {
|
2021-12-22 10:01:45 +00:00
|
|
|
user.Nickname = params.Nickname
|
2021-12-22 05:21:12 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.Birthdate != nil && refs.StringValue(user.Birthdate) != refs.StringValue(params.Birthdate) {
|
2021-12-22 10:01:45 +00:00
|
|
|
user.Birthdate = params.Birthdate
|
2021-12-22 05:21:12 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.Gender != nil && refs.StringValue(user.Gender) != refs.StringValue(params.Gender) {
|
2021-12-22 10:01:45 +00:00
|
|
|
user.Gender = params.Gender
|
2021-12-22 05:21:12 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.PhoneNumber != nil && refs.StringValue(user.PhoneNumber) != refs.StringValue(params.PhoneNumber) {
|
2022-12-24 21:52:42 +00:00
|
|
|
// verify if phone number is unique
|
|
|
|
if _, err := db.Provider.GetUserByPhoneNumber(ctx, strings.TrimSpace(refs.StringValue(params.PhoneNumber))); err == nil {
|
|
|
|
log.Debug("user with given phone number already exists")
|
|
|
|
return nil, errors.New("user with given phone number already exists")
|
|
|
|
}
|
2021-12-22 10:01:45 +00:00
|
|
|
user.PhoneNumber = params.PhoneNumber
|
2021-12-22 05:21:12 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.Picture != nil && refs.StringValue(user.Picture) != refs.StringValue(params.Picture) {
|
2021-12-22 10:01:45 +00:00
|
|
|
user.Picture = params.Picture
|
2021-09-21 02:53:40 +00:00
|
|
|
}
|
|
|
|
|
2023-08-14 06:31:37 +00:00
|
|
|
if params.AppData != nil {
|
|
|
|
appDataString := ""
|
|
|
|
appDataBytes, err := json.Marshal(params.AppData)
|
|
|
|
if err != nil {
|
|
|
|
log.Debug("failed to marshall source app_data: ", err)
|
|
|
|
return nil, errors.New("malformed app_data")
|
|
|
|
}
|
|
|
|
appDataString = string(appDataBytes)
|
|
|
|
user.AppData = &appDataString
|
|
|
|
}
|
|
|
|
|
2022-07-23 09:56:44 +00:00
|
|
|
if params.IsMultiFactorAuthEnabled != nil && refs.BoolValue(user.IsMultiFactorAuthEnabled) != refs.BoolValue(params.IsMultiFactorAuthEnabled) {
|
|
|
|
user.IsMultiFactorAuthEnabled = params.IsMultiFactorAuthEnabled
|
2022-07-29 14:19:50 +00:00
|
|
|
if refs.BoolValue(params.IsMultiFactorAuthEnabled) {
|
2023-11-16 13:00:54 +00:00
|
|
|
// Check if totp, email or sms is enabled
|
|
|
|
isMailOTPEnvServiceDisabled, err := memorystore.Provider.GetBoolStoreEnvVariable(constants.EnvKeyDisableMailOTPLogin)
|
|
|
|
if err != nil {
|
|
|
|
log.Debug("Error getting mail otp disabled: ", err)
|
|
|
|
isMailOTPEnvServiceDisabled = false
|
|
|
|
}
|
|
|
|
isTOTPEnvServiceDisabled, _ := memorystore.Provider.GetBoolStoreEnvVariable(constants.EnvKeyDisableTOTPLogin)
|
|
|
|
if err != nil {
|
|
|
|
log.Debug("Error getting totp disabled: ", err)
|
|
|
|
isTOTPEnvServiceDisabled = false
|
|
|
|
}
|
|
|
|
isSMSOTPEnvServiceDisabled, _ := memorystore.Provider.GetBoolStoreEnvVariable(constants.EnvKeyDisablePhoneVerification)
|
|
|
|
if err != nil {
|
|
|
|
log.Debug("Error getting sms otp disabled: ", err)
|
|
|
|
isSMSOTPEnvServiceDisabled = false
|
|
|
|
}
|
|
|
|
// Initialize a flag to check if enabling Mail OTP is required
|
|
|
|
if isMailOTPEnvServiceDisabled && isTOTPEnvServiceDisabled && isSMSOTPEnvServiceDisabled {
|
|
|
|
log.Debug("Cannot enable mfa service as all mfa services are disabled")
|
|
|
|
return nil, errors.New("cannot enable multi factor authentication as all mfa services are disabled")
|
2022-07-29 14:19:50 +00:00
|
|
|
}
|
|
|
|
}
|
2022-07-23 09:56:44 +00:00
|
|
|
}
|
|
|
|
|
2022-01-17 06:02:13 +00:00
|
|
|
if params.EmailVerified != nil {
|
|
|
|
if *params.EmailVerified {
|
|
|
|
now := time.Now().Unix()
|
|
|
|
user.EmailVerifiedAt = &now
|
|
|
|
} else {
|
|
|
|
user.EmailVerifiedAt = nil
|
|
|
|
}
|
|
|
|
}
|
2024-03-28 08:27:47 +00:00
|
|
|
if params.PhoneNumberVerified != nil {
|
|
|
|
if *params.PhoneNumberVerified {
|
|
|
|
now := time.Now().Unix()
|
|
|
|
user.PhoneNumberVerifiedAt = &now
|
|
|
|
} else {
|
|
|
|
user.PhoneNumberVerifiedAt = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2022-01-17 06:02:13 +00:00
|
|
|
|
2023-10-25 19:25:10 +00:00
|
|
|
if params.Email != nil && refs.StringValue(user.Email) != refs.StringValue(params.Email) {
|
2021-09-21 02:53:40 +00:00
|
|
|
// check if valid email
|
2022-05-30 06:24:16 +00:00
|
|
|
if !validators.IsValidEmail(*params.Email) {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Invalid email: ", *params.Email)
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, fmt.Errorf("invalid email address")
|
|
|
|
}
|
|
|
|
newEmail := strings.ToLower(*params.Email)
|
|
|
|
// check if user with new email exists
|
2022-07-10 16:19:33 +00:00
|
|
|
_, err = db.Provider.GetUserByEmail(ctx, newEmail)
|
2021-09-21 02:53:40 +00:00
|
|
|
// err = nil means user exists
|
|
|
|
if err == nil {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("User with email already exists: ", newEmail)
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, fmt.Errorf("user with this email address already exists")
|
|
|
|
}
|
|
|
|
|
2022-06-11 13:40:39 +00:00
|
|
|
go memorystore.Provider.DeleteAllUserSessions(user.ID)
|
2021-09-21 02:53:40 +00:00
|
|
|
|
2022-05-30 06:24:16 +00:00
|
|
|
hostname := parsers.GetHost(gc)
|
2023-10-25 19:25:10 +00:00
|
|
|
user.Email = &newEmail
|
2021-12-22 10:08:51 +00:00
|
|
|
user.EmailVerifiedAt = nil
|
2021-09-21 02:53:40 +00:00
|
|
|
// insert verification request
|
2022-03-08 07:06:26 +00:00
|
|
|
_, nonceHash, err := utils.GenerateNonce()
|
2022-03-02 12:12:31 +00:00
|
|
|
if err != nil {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Failed to generate nonce: ", err)
|
2022-03-02 12:12:31 +00:00
|
|
|
return res, err
|
|
|
|
}
|
2022-01-17 06:02:13 +00:00
|
|
|
verificationType := constants.VerificationTypeUpdateEmail
|
2022-05-30 06:24:16 +00:00
|
|
|
redirectURL := parsers.GetAppURL(gc)
|
2022-03-08 07:06:26 +00:00
|
|
|
verificationToken, err := token.CreateVerificationToken(newEmail, verificationType, hostname, nonceHash, redirectURL)
|
2021-09-21 02:53:40 +00:00
|
|
|
if err != nil {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Failed to create verification token: ", err)
|
2021-09-21 02:53:40 +00:00
|
|
|
}
|
2023-07-31 11:12:11 +00:00
|
|
|
_, err = db.Provider.AddVerificationRequest(ctx, &models.VerificationRequest{
|
2022-03-08 07:06:26 +00:00
|
|
|
Token: verificationToken,
|
|
|
|
Identifier: verificationType,
|
|
|
|
ExpiresAt: time.Now().Add(time.Minute * 30).Unix(),
|
|
|
|
Email: newEmail,
|
|
|
|
Nonce: nonceHash,
|
|
|
|
RedirectURI: redirectURL,
|
2021-09-21 02:53:40 +00:00
|
|
|
})
|
2022-05-24 07:12:29 +00:00
|
|
|
if err != nil {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Failed to add verification request: ", err)
|
2022-05-24 07:12:29 +00:00
|
|
|
return res, err
|
|
|
|
}
|
2021-09-21 02:53:40 +00:00
|
|
|
|
2022-08-08 20:13:37 +00:00
|
|
|
// exec it as go routine so that we can reduce the api latency
|
2023-10-25 19:25:10 +00:00
|
|
|
go email.SendEmail([]string{refs.StringValue(user.Email)}, constants.VerificationTypeBasicAuthSignup, map[string]interface{}{
|
2022-08-08 20:13:37 +00:00
|
|
|
"user": user.ToMap(),
|
|
|
|
"organization": utils.GetOrganization(),
|
2023-05-02 13:09:10 +00:00
|
|
|
"verification_url": utils.GetEmailVerificationURL(verificationToken, hostname, redirectURL),
|
2022-08-08 20:13:37 +00:00
|
|
|
})
|
2022-03-02 12:12:31 +00:00
|
|
|
|
2021-09-21 02:53:40 +00:00
|
|
|
}
|
|
|
|
|
2024-03-28 08:27:47 +00:00
|
|
|
if params.PhoneNumber != nil && refs.StringValue(user.PhoneNumber) != refs.StringValue(params.PhoneNumber) {
|
|
|
|
phone := strings.TrimSpace(refs.StringValue(params.PhoneNumber))
|
|
|
|
if len(phone) < 10 || len(phone) > 15 {
|
|
|
|
log.Debug("Invalid phone number: ", *params.PhoneNumber)
|
|
|
|
return res, fmt.Errorf("invalid phone number")
|
|
|
|
}
|
|
|
|
// check if user with new phone number exists
|
|
|
|
_, err = db.Provider.GetUserByPhoneNumber(ctx, phone)
|
|
|
|
// err = nil means user exists
|
|
|
|
if err == nil {
|
|
|
|
log.Debug("User with phone number already exists: ", phone)
|
|
|
|
return res, fmt.Errorf("user with this phone number already exists")
|
|
|
|
}
|
|
|
|
go memorystore.Provider.DeleteAllUserSessions(user.ID)
|
|
|
|
user.PhoneNumber = &phone
|
|
|
|
user.PhoneNumberVerifiedAt = nil
|
|
|
|
}
|
|
|
|
|
2021-09-21 02:53:40 +00:00
|
|
|
rolesToSave := ""
|
|
|
|
if params.Roles != nil && len(params.Roles) > 0 {
|
|
|
|
currentRoles := strings.Split(user.Roles, ",")
|
|
|
|
inputRoles := []string{}
|
|
|
|
for _, item := range params.Roles {
|
|
|
|
inputRoles = append(inputRoles, *item)
|
|
|
|
}
|
|
|
|
|
2022-05-31 02:44:03 +00:00
|
|
|
rolesString, err := memorystore.Provider.GetStringStoreEnvVariable(constants.EnvKeyRoles)
|
|
|
|
roles := []string{}
|
2022-05-30 03:49:55 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Debug("Error getting roles: ", err)
|
2022-05-31 02:44:03 +00:00
|
|
|
rolesString = ""
|
|
|
|
} else {
|
|
|
|
roles = strings.Split(rolesString, ",")
|
2022-05-30 03:49:55 +00:00
|
|
|
}
|
2022-05-31 02:44:03 +00:00
|
|
|
protectedRolesString, err := memorystore.Provider.GetStringStoreEnvVariable(constants.EnvKeyProtectedRoles)
|
|
|
|
protectedRoles := []string{}
|
2022-05-30 03:49:55 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Debug("Error getting protected roles: ", err)
|
2022-05-31 02:44:03 +00:00
|
|
|
protectedRolesString = ""
|
|
|
|
} else {
|
|
|
|
protectedRoles = strings.Split(protectedRolesString, ",")
|
2022-05-30 03:49:55 +00:00
|
|
|
}
|
|
|
|
|
2022-05-30 06:24:16 +00:00
|
|
|
if !validators.IsValidRoles(inputRoles, append([]string{}, append(roles, protectedRoles...)...)) {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Invalid roles: ", params.Roles)
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, fmt.Errorf("invalid list of roles")
|
|
|
|
}
|
|
|
|
|
2022-05-30 06:24:16 +00:00
|
|
|
if !validators.IsStringArrayEqual(inputRoles, currentRoles) {
|
2021-09-21 02:53:40 +00:00
|
|
|
rolesToSave = strings.Join(inputRoles, ",")
|
|
|
|
}
|
|
|
|
|
2022-06-11 13:40:39 +00:00
|
|
|
go memorystore.Provider.DeleteAllUserSessions(user.ID)
|
2021-09-21 02:53:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if rolesToSave != "" {
|
|
|
|
user.Roles = rolesToSave
|
|
|
|
}
|
2022-07-10 16:19:33 +00:00
|
|
|
user, err = db.Provider.UpdateUser(ctx, user)
|
2021-09-21 02:53:40 +00:00
|
|
|
if err != nil {
|
2022-05-25 07:00:22 +00:00
|
|
|
log.Debug("Failed to update user: ", err)
|
2021-09-21 02:53:40 +00:00
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
2022-03-16 16:14:57 +00:00
|
|
|
createdAt := user.CreatedAt
|
|
|
|
updatedAt := user.UpdatedAt
|
2021-09-21 02:53:40 +00:00
|
|
|
res = &model.User{
|
2021-12-22 05:21:12 +00:00
|
|
|
ID: params.ID,
|
|
|
|
Email: user.Email,
|
2021-12-22 10:01:45 +00:00
|
|
|
Picture: user.Picture,
|
|
|
|
GivenName: user.GivenName,
|
|
|
|
FamilyName: user.FamilyName,
|
2021-12-22 05:21:12 +00:00
|
|
|
Roles: strings.Split(user.Roles, ","),
|
2022-03-16 16:14:57 +00:00
|
|
|
CreatedAt: &createdAt,
|
|
|
|
UpdatedAt: &updatedAt,
|
2021-09-21 02:53:40 +00:00
|
|
|
}
|
|
|
|
return res, nil
|
|
|
|
}
|