authorizer/server/env/persist_env.go

193 lines
5.2 KiB
Go
Raw Normal View History

2021-12-31 08:22:10 +00:00
package env
import (
"encoding/json"
"log"
"os"
"strconv"
2021-12-31 08:22:10 +00:00
"strings"
2022-02-26 15:06:22 +00:00
"github.com/google/uuid"
2021-12-31 08:22:10 +00:00
"github.com/authorizerdev/authorizer/server/constants"
2022-02-26 15:06:22 +00:00
"github.com/authorizerdev/authorizer/server/crypto"
2021-12-31 08:22:10 +00:00
"github.com/authorizerdev/authorizer/server/db"
2022-01-21 08:04:04 +00:00
"github.com/authorizerdev/authorizer/server/db/models"
2022-01-17 06:02:13 +00:00
"github.com/authorizerdev/authorizer/server/envstore"
2021-12-31 08:22:10 +00:00
"github.com/authorizerdev/authorizer/server/utils"
)
2022-02-26 04:14:55 +00:00
// GetEnvData returns the env data from database
func GetEnvData() (envstore.Store, error) {
var result envstore.Store
env, err := db.Provider.GetEnv()
// config not found in db
if err != nil {
return result, err
}
encryptionKey := env.Hash
2022-02-28 15:56:49 +00:00
decryptedEncryptionKey, err := crypto.DecryptB64(encryptionKey)
2022-02-26 04:14:55 +00:00
if err != nil {
return result, err
}
2022-02-28 02:25:01 +00:00
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyEncryptionKey, decryptedEncryptionKey)
2022-02-26 04:14:55 +00:00
2022-03-07 10:05:33 +00:00
b64DecryptedConfig, err := crypto.DecryptB64(env.EnvData)
if err != nil {
return result, err
}
decryptedConfigs, err := crypto.DecryptAESEnv([]byte(b64DecryptedConfig))
2022-02-26 04:14:55 +00:00
if err != nil {
return result, err
}
2022-03-07 09:59:37 +00:00
err = json.Unmarshal(decryptedConfigs, &result)
2022-02-26 04:14:55 +00:00
if err != nil {
return result, err
}
return result, err
}
2022-01-17 06:02:13 +00:00
// PersistEnv persists the environment variables to the database
2021-12-31 08:22:10 +00:00
func PersistEnv() error {
2022-01-21 08:04:04 +00:00
env, err := db.Provider.GetEnv()
2021-12-31 08:22:10 +00:00
// config not found in db
if err != nil {
// AES encryption needs 32 bit key only, so we chop off last 4 characters from 36 bit uuid
hash := uuid.New().String()[:36-4]
2022-02-28 02:25:01 +00:00
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyEncryptionKey, hash)
2022-02-28 15:56:49 +00:00
encodedHash := crypto.EncryptB64(hash)
2021-12-31 08:22:10 +00:00
2022-02-28 15:56:49 +00:00
encryptedConfig, err := crypto.EncryptEnvData(envstore.EnvStoreObj.GetEnvStoreClone())
2021-12-31 08:22:10 +00:00
if err != nil {
return err
}
2022-01-21 08:04:04 +00:00
env = models.Env{
Hash: encodedHash,
EnvData: encryptedConfig,
2021-12-31 08:22:10 +00:00
}
2022-02-26 04:14:55 +00:00
env, err = db.Provider.AddEnv(env)
if err != nil {
return err
}
2021-12-31 08:22:10 +00:00
} else {
// decrypt the config data from db
// decryption can be done using the hash stored in db
encryptionKey := env.Hash
2022-02-28 15:56:49 +00:00
decryptedEncryptionKey, err := crypto.DecryptB64(encryptionKey)
2021-12-31 08:22:10 +00:00
if err != nil {
return err
}
2022-01-17 06:02:13 +00:00
2022-02-28 02:25:01 +00:00
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyEncryptionKey, decryptedEncryptionKey)
2022-01-29 11:32:44 +00:00
2022-03-07 10:03:39 +00:00
b64DecryptedConfig, err := crypto.DecryptB64(env.EnvData)
if err != nil {
return err
}
decryptedConfigs, err := crypto.DecryptAESEnv([]byte(b64DecryptedConfig))
2021-12-31 08:22:10 +00:00
if err != nil {
return err
}
// temp store variable
var storeData envstore.Store
2021-12-31 08:22:10 +00:00
2022-03-07 09:59:37 +00:00
err = json.Unmarshal(decryptedConfigs, &storeData)
2021-12-31 08:22:10 +00:00
if err != nil {
return err
}
// if env is changed via env file or OS env
// give that higher preference and update db, but we don't recommend it
hasChanged := false
for key, value := range storeData.StringEnv {
2022-02-26 15:06:22 +00:00
// don't override unexposed envs
2022-03-07 13:19:18 +00:00
if key != constants.EnvKeyEncryptionKey {
// check only for derivative keys
// No need to check for ENCRYPTION_KEY which special key we use for encrypting config data
// as we have removed it from json
envValue := strings.TrimSpace(os.Getenv(key))
2021-12-31 08:22:10 +00:00
// env is not empty
if envValue != "" {
2021-12-31 08:22:10 +00:00
if value != envValue {
storeData.StringEnv[key] = envValue
2021-12-31 08:22:10 +00:00
hasChanged = true
}
}
}
}
2021-12-31 08:22:10 +00:00
for key, value := range storeData.BoolEnv {
envValue := strings.TrimSpace(os.Getenv(key))
// env is not empty
if envValue != "" {
envValueBool, _ := strconv.ParseBool(envValue)
if value != envValueBool {
storeData.BoolEnv[key] = envValueBool
hasChanged = true
2021-12-31 08:22:10 +00:00
}
}
}
2021-12-31 08:22:10 +00:00
for key, value := range storeData.SliceEnv {
envValue := strings.TrimSpace(os.Getenv(key))
// env is not empty
if envValue != "" {
envStringArr := strings.Split(envValue, ",")
if !utils.IsStringArrayEqual(value, envStringArr) {
storeData.SliceEnv[key] = envStringArr
hasChanged = true
2021-12-31 08:22:10 +00:00
}
}
}
// handle derivative cases like disabling email verification & magic login
// in case SMTP is off but env is set to true
if storeData.StringEnv[constants.EnvKeySmtpHost] == "" || storeData.StringEnv[constants.EnvKeySmtpUsername] == "" || storeData.StringEnv[constants.EnvKeySmtpPassword] == "" || storeData.StringEnv[constants.EnvKeySenderEmail] == "" && storeData.StringEnv[constants.EnvKeySmtpPort] == "" {
if !storeData.BoolEnv[constants.EnvKeyDisableEmailVerification] {
storeData.BoolEnv[constants.EnvKeyDisableEmailVerification] = true
2021-12-31 08:22:10 +00:00
hasChanged = true
}
if !storeData.BoolEnv[constants.EnvKeyDisableMagicLinkLogin] {
storeData.BoolEnv[constants.EnvKeyDisableMagicLinkLogin] = true
2021-12-31 08:22:10 +00:00
hasChanged = true
}
}
2022-02-28 02:25:01 +00:00
envstore.EnvStoreObj.UpdateEnvStore(storeData)
2022-02-26 15:06:22 +00:00
jwk, err := crypto.GenerateJWKBasedOnEnv()
if err != nil {
return err
}
// updating jwk
2022-02-28 02:25:01 +00:00
envstore.EnvStoreObj.UpdateEnvVariable(constants.StringStoreIdentifier, constants.EnvKeyJWK, jwk)
2022-02-26 04:14:55 +00:00
2021-12-31 08:22:10 +00:00
if hasChanged {
2022-02-28 15:56:49 +00:00
encryptedConfig, err := crypto.EncryptEnvData(storeData)
2021-12-31 11:33:37 +00:00
if err != nil {
return err
}
2021-12-31 08:22:10 +00:00
env.EnvData = encryptedConfig
2022-01-21 08:04:04 +00:00
_, err = db.Provider.UpdateEnv(env)
2021-12-31 11:33:37 +00:00
if err != nil {
log.Println("error updating config:", err)
return err
}
2021-12-31 08:22:10 +00:00
}
}
return nil
}