Files
authorizer/server/resolvers/delete_user.go

87 lines
2.4 KiB
Go
Raw Normal View History

2021-08-06 19:17:52 +05:30
package resolvers
import (
"context"
"fmt"
2022-05-23 11:52:51 +05:30
log "github.com/sirupsen/logrus"
2021-08-06 19:17:52 +05:30
"github.com/authorizerdev/authorizer/server/constants"
2021-08-06 19:17:52 +05:30
"github.com/authorizerdev/authorizer/server/db"
"github.com/authorizerdev/authorizer/server/graph/model"
2022-05-27 23:20:38 +05:30
"github.com/authorizerdev/authorizer/server/memorystore"
"github.com/authorizerdev/authorizer/server/token"
2021-08-06 19:17:52 +05:30
"github.com/authorizerdev/authorizer/server/utils"
)
2022-01-17 11:32:13 +05:30
// DeleteUserResolver is a resolver for delete user mutation
func DeleteUserResolver(ctx context.Context, params model.DeleteUserInput) (*model.Response, error) {
2021-08-06 19:17:52 +05:30
var res *model.Response
2022-05-24 12:42:29 +05:30
gc, err := utils.GinContextFromContext(ctx)
2021-08-06 19:17:52 +05:30
if err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to get GinContext: ", err)
2021-08-06 19:17:52 +05:30
return res, err
}
if !token.IsSuperAdmin(gc) {
2022-05-25 12:30:22 +05:30
log.Debug("Not logged in as super admin")
2021-08-06 19:17:52 +05:30
return res, fmt.Errorf("unauthorized")
}
2022-05-24 12:42:29 +05:30
log := log.WithFields(log.Fields{
"email": params.Email,
})
2022-07-10 21:49:33 +05:30
user, err := db.Provider.GetUserByEmail(ctx, params.Email)
2021-08-07 14:11:26 +05:30
if err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to get user from DB: ", err)
2021-08-07 14:11:26 +05:30
return res, err
}
2022-07-10 21:49:33 +05:30
err = db.Provider.DeleteUser(ctx, user)
2021-08-06 19:17:52 +05:30
if err != nil {
2022-05-25 12:30:22 +05:30
log.Debug("Failed to delete user: ", err)
2021-08-06 19:17:52 +05:30
return res, err
}
res = &model.Response{
Message: `user deleted successfully`,
}
2022-07-11 11:13:32 +05:30
go func() {
// delete otp for given email
otp, err := db.Provider.GetOTPByEmail(ctx, user.Email)
if err != nil {
2022-09-27 06:45:38 +05:30
log.Infof("No OTP found for email (%s): %v", user.Email, err)
// continue
} else {
err := db.Provider.DeleteOTP(ctx, otp)
if err != nil {
log.Debugf("Failed to delete otp for given email (%s): %v", user.Email, err)
// continue
}
}
// delete verification requests for given email
for _, vt := range constants.VerificationTypes {
verificationRequest, err := db.Provider.GetVerificationRequestByEmail(ctx, user.Email, vt)
if err != nil {
2022-09-27 06:45:38 +05:30
log.Infof("No verification verification request found for email: %s, verification_request_type: %s. %v", user.Email, vt, err)
// continue
} else {
err := db.Provider.DeleteVerificationRequest(ctx, verificationRequest)
if err != nil {
2022-09-27 06:45:38 +05:30
log.Debugf("Failed to DeleteVerificationRequest for email: %s, verification_request_type: %s. %v", user.Email, vt, err)
// continue
}
}
}
2022-07-11 11:13:32 +05:30
memorystore.Provider.DeleteAllUserSessions(user.ID)
utils.RegisterEvent(ctx, constants.UserDeletedWebhookEvent, "", user)
}()
2021-08-06 19:17:52 +05:30
return res, nil
}