2021-08-06 19:17:52 +05:30
|
|
|
package resolvers
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
2022-05-23 11:52:51 +05:30
|
|
|
|
|
|
|
log "github.com/sirupsen/logrus"
|
2021-08-06 19:17:52 +05:30
|
|
|
|
2022-07-11 11:12:30 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/constants"
|
2021-08-06 19:17:52 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/db"
|
|
|
|
"github.com/authorizerdev/authorizer/server/graph/model"
|
2022-05-27 23:20:38 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/memorystore"
|
2022-01-23 01:24:41 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/token"
|
2021-08-06 19:17:52 +05:30
|
|
|
"github.com/authorizerdev/authorizer/server/utils"
|
|
|
|
)
|
|
|
|
|
2022-01-17 11:32:13 +05:30
|
|
|
// DeleteUserResolver is a resolver for delete user mutation
|
|
|
|
func DeleteUserResolver(ctx context.Context, params model.DeleteUserInput) (*model.Response, error) {
|
2021-08-06 19:17:52 +05:30
|
|
|
var res *model.Response
|
2022-05-24 12:42:29 +05:30
|
|
|
|
|
|
|
gc, err := utils.GinContextFromContext(ctx)
|
2021-08-06 19:17:52 +05:30
|
|
|
if err != nil {
|
2022-05-25 12:30:22 +05:30
|
|
|
log.Debug("Failed to get GinContext: ", err)
|
2021-08-06 19:17:52 +05:30
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
2022-01-23 01:24:41 +05:30
|
|
|
if !token.IsSuperAdmin(gc) {
|
2022-05-25 12:30:22 +05:30
|
|
|
log.Debug("Not logged in as super admin")
|
2021-08-06 19:17:52 +05:30
|
|
|
return res, fmt.Errorf("unauthorized")
|
|
|
|
}
|
|
|
|
|
2022-05-24 12:42:29 +05:30
|
|
|
log := log.WithFields(log.Fields{
|
|
|
|
"email": params.Email,
|
|
|
|
})
|
|
|
|
|
2022-07-10 21:49:33 +05:30
|
|
|
user, err := db.Provider.GetUserByEmail(ctx, params.Email)
|
2021-08-07 14:11:26 +05:30
|
|
|
if err != nil {
|
2022-05-25 12:30:22 +05:30
|
|
|
log.Debug("Failed to get user from DB: ", err)
|
2021-08-07 14:11:26 +05:30
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
2022-07-10 21:49:33 +05:30
|
|
|
err = db.Provider.DeleteUser(ctx, user)
|
2021-08-06 19:17:52 +05:30
|
|
|
if err != nil {
|
2022-05-25 12:30:22 +05:30
|
|
|
log.Debug("Failed to delete user: ", err)
|
2021-08-06 19:17:52 +05:30
|
|
|
return res, err
|
|
|
|
}
|
|
|
|
|
|
|
|
res = &model.Response{
|
|
|
|
Message: `user deleted successfully`,
|
|
|
|
}
|
|
|
|
|
2022-07-11 11:13:32 +05:30
|
|
|
go func() {
|
2022-09-27 00:27:36 +05:30
|
|
|
// delete otp for given email
|
|
|
|
otp, err := db.Provider.GetOTPByEmail(ctx, user.Email)
|
|
|
|
if err != nil {
|
2022-09-27 06:45:38 +05:30
|
|
|
log.Infof("No OTP found for email (%s): %v", user.Email, err)
|
2022-09-27 00:27:36 +05:30
|
|
|
// continue
|
|
|
|
} else {
|
|
|
|
err := db.Provider.DeleteOTP(ctx, otp)
|
|
|
|
if err != nil {
|
|
|
|
log.Debugf("Failed to delete otp for given email (%s): %v", user.Email, err)
|
|
|
|
// continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// delete verification requests for given email
|
|
|
|
for _, vt := range constants.VerificationTypes {
|
|
|
|
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, user.Email, vt)
|
|
|
|
if err != nil {
|
2022-09-27 06:45:38 +05:30
|
|
|
log.Infof("No verification verification request found for email: %s, verification_request_type: %s. %v", user.Email, vt, err)
|
2022-09-27 00:27:36 +05:30
|
|
|
// continue
|
|
|
|
} else {
|
|
|
|
err := db.Provider.DeleteVerificationRequest(ctx, verificationRequest)
|
|
|
|
if err != nil {
|
2022-09-27 06:45:38 +05:30
|
|
|
log.Debugf("Failed to DeleteVerificationRequest for email: %s, verification_request_type: %s. %v", user.Email, vt, err)
|
2022-09-27 00:27:36 +05:30
|
|
|
// continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-11 11:13:32 +05:30
|
|
|
memorystore.Provider.DeleteAllUserSessions(user.ID)
|
|
|
|
utils.RegisterEvent(ctx, constants.UserDeletedWebhookEvent, "", user)
|
|
|
|
}()
|
2022-07-11 11:12:30 +05:30
|
|
|
|
2021-08-06 19:17:52 +05:30
|
|
|
return res, nil
|
|
|
|
}
|