EROPE4N3524GDVGL2ZKWXI3IZCPQDOQMRYX34K23QPFVO3GG6HTAC defmodule Chklst.AccountsFixtures do@moduledoc """This module defines test helpers for creatingentities via the `Chklst.Accounts` context."""def unique_user_email, do: "user#{System.unique_integer()}@example.com"def valid_user_password, do: "hello world!"def valid_user_attributes(attrs \\ %{}) doEnum.into(attrs, %{email: unique_user_email(),password: valid_user_password()})enddef user_fixture(attrs \\ %{}) do{:ok, user} =attrs|> valid_user_attributes()|> Chklst.Accounts.register_user()userenddef extract_user_token(fun) do{:ok, captured_email} = fun.(&"[TOKEN]#{&1}[TOKEN]")[_, token | _] = String.split(captured_email.text_body, "[TOKEN]")tokenendend
end@doc """Setup helper that registers and logs in users.setup :register_and_log_in_userIt stores an updated connection and a registered user in thetest context."""def register_and_log_in_user(%{conn: conn}) douser = Chklst.AccountsFixtures.user_fixture()%{conn: log_in_user(conn, user), user: user}
@doc """Logs the given `user` into the `conn`.It returns an updated `conn`."""def log_in_user(conn, user) dotoken = Chklst.Accounts.generate_user_session_token(user)conn|> Phoenix.ConnTest.init_test_session(%{})|> Plug.Conn.put_session(:user_token, token)end
defmodule ChklstWeb.Accounts.UserSettingsLiveTest douse ChklstWeb.ConnCase, async: truealias Chklst.Accountsimport Phoenix.LiveViewTestimport Chklst.AccountsFixturesdescribe "Settings page" dotest "renders settings page", %{conn: conn} do{:ok, _lv, html} =conn|> log_in_user(user_fixture())|> live(~p"/accounts/users/settings")assert html =~ "Change Email"assert html =~ "Change Password"endtest "redirects if user is not logged in", %{conn: conn} doassert {:error, redirect} = live(conn, ~p"/accounts/users/settings")assert {:redirect, %{to: path, flash: flash}} = redirectassert path == ~p"/accounts/users/log_in"assert %{"error" => "You must log in to access this page."} = flashendenddescribe "update email form" dosetup %{conn: conn} dopassword = valid_user_password()user = user_fixture(%{password: password})%{conn: log_in_user(conn, user), user: user, password: password}endtest "updates the user email", %{conn: conn, password: password, user: user} donew_email = unique_user_email(){:ok, lv, _html} = live(conn, ~p"/accounts/users/settings")result =lv|> form("#email_form", %{"current_password" => password,"user" => %{"email" => new_email}})|> render_submit()assert result =~ "A link to confirm your email"assert Accounts.get_user_by_email(user.email)endtest "renders errors with invalid data (phx-change)", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/settings")result =lv|> element("#email_form")|> render_change(%{"action" => "update_email","current_password" => "invalid","user" => %{"email" => "with spaces"}})assert result =~ "Change Email"assert result =~ "must have the @ sign and no spaces"endtest "renders errors with invalid data (phx-submit)", %{conn: conn, user: user} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/settings")result =lv|> form("#email_form", %{"current_password" => "invalid","user" => %{"email" => user.email}})|> render_submit()assert result =~ "Change Email"assert result =~ "did not change"assert result =~ "is not valid"endenddescribe "update password form" dosetup %{conn: conn} dopassword = valid_user_password()user = user_fixture(%{password: password})%{conn: log_in_user(conn, user), user: user, password: password}endtest "updates the user password", %{conn: conn, user: user, password: password} donew_password = valid_user_password(){:ok, lv, _html} = live(conn, ~p"/accounts/users/settings")form =form(lv, "#password_form", %{"current_password" => password,"user" => %{"email" => user.email,"password" => new_password,"password_confirmation" => new_password}})render_submit(form)new_password_conn = follow_trigger_action(form, conn)assert redirected_to(new_password_conn) == ~p"/accounts/users/settings"assert get_session(new_password_conn, :user_token) != get_session(conn, :user_token)assert Phoenix.Flash.get(new_password_conn.assigns.flash, :info) =~"Password updated successfully"assert Accounts.get_user_by_email_and_password(user.email, new_password)endtest "renders errors with invalid data (phx-change)", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/settings")result =lv|> element("#password_form")|> render_change(%{"current_password" => "invalid","user" => %{"password" => "too short","password_confirmation" => "does not match"}})assert result =~ "Change Password"assert result =~ "should be at least 12 character(s)"assert result =~ "does not match password"endtest "renders errors with invalid data (phx-submit)", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/settings")result =lv|> form("#password_form", %{"current_password" => "invalid","user" => %{"password" => "too short","password_confirmation" => "does not match"}})|> render_submit()assert result =~ "Change Password"assert result =~ "should be at least 12 character(s)"assert result =~ "does not match password"assert result =~ "is not valid"endenddescribe "confirm email" dosetup %{conn: conn} douser = user_fixture()email = unique_user_email()token =extract_user_token(fn url ->Accounts.deliver_user_update_email_instructions(%{user | email: email}, user.email, url)end)%{conn: log_in_user(conn, user), token: token, email: email, user: user}endtest "updates the user email once", %{conn: conn, user: user, token: token, email: email} do{:error, redirect} = live(conn, ~p"/accounts/users/settings/confirm_email/#{token}")assert {:live_redirect, %{to: path, flash: flash}} = redirectassert path == ~p"/accounts/users/settings"assert %{"info" => message} = flashassert message == "Email changed successfully."refute Accounts.get_user_by_email(user.email)assert Accounts.get_user_by_email(email)# use confirm token again{:error, redirect} = live(conn, ~p"/accounts/users/settings/confirm_email/#{token}")assert {:live_redirect, %{to: path, flash: flash}} = redirectassert path == ~p"/accounts/users/settings"assert %{"error" => message} = flashassert message == "Email change link is invalid or it has expired."endtest "does not update email with invalid token", %{conn: conn, user: user} do{:error, redirect} = live(conn, ~p"/accounts/users/settings/confirm_email/oops")assert {:live_redirect, %{to: path, flash: flash}} = redirectassert path == ~p"/accounts/users/settings"assert %{"error" => message} = flashassert message == "Email change link is invalid or it has expired."assert Accounts.get_user_by_email(user.email)endtest "redirects if user is not logged in", %{token: token} doconn = build_conn(){:error, redirect} = live(conn, ~p"/accounts/users/settings/confirm_email/#{token}")assert {:redirect, %{to: path, flash: flash}} = redirectassert path == ~p"/accounts/users/log_in"assert %{"error" => message} = flashassert message == "You must log in to access this page."endendend
defmodule ChklstWeb.Accounts.UserResetPasswordLiveTest douse ChklstWeb.ConnCase, async: trueimport Phoenix.LiveViewTestimport Chklst.AccountsFixturesalias Chklst.Accountssetup douser = user_fixture()token =extract_user_token(fn url ->Accounts.deliver_user_reset_password_instructions(user, url)end)%{token: token, user: user}enddescribe "Reset password page" dotest "renders reset password with valid token", %{conn: conn, token: token} do{:ok, _lv, html} = live(conn, ~p"/accounts/users/reset_password/#{token}")assert html =~ "Reset Password"endtest "does not render reset password with invalid token", %{conn: conn} do{:error, {:redirect, to}} = live(conn, ~p"/accounts/users/reset_password/invalid")assert to == %{flash: %{"error" => "Reset password link is invalid or it has expired."},to: ~p"/"}endtest "renders errors for invalid data", %{conn: conn, token: token} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/reset_password/#{token}")result =lv|> element("#reset_password_form")|> render_change(user: %{"password" => "secret12", "password_confirmation" => "secret123456"})assert result =~ "should be at least 12 character"assert result =~ "does not match password"endenddescribe "Reset Password" dotest "resets password once", %{conn: conn, token: token, user: user} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/reset_password/#{token}"){:ok, conn} =lv|> form("#reset_password_form",user: %{"password" => "new valid password","password_confirmation" => "new valid password"})|> render_submit()|> follow_redirect(conn, ~p"/accounts/users/log_in")refute get_session(conn, :user_token)assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "Password reset successfully"assert Accounts.get_user_by_email_and_password(user.email, "new valid password")endtest "does not reset password on invalid data", %{conn: conn, token: token} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/reset_password/#{token}")result =lv|> form("#reset_password_form",user: %{"password" => "too short","password_confirmation" => "does not match"})|> render_submit()assert result =~ "Reset Password"assert result =~ "should be at least 12 character(s)"assert result =~ "does not match password"endenddescribe "Reset password navigation" dotest "redirects to login page when the Log in button is clicked", %{conn: conn, token: token} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/reset_password/#{token}"){:ok, conn} =lv|> element(~s|main a:fl-contains("Log in")|)|> render_click()|> follow_redirect(conn, ~p"/accounts/users/log_in")assert conn.resp_body =~ "Log in"endtest "redirects to registration page when the Register button is clicked", %{conn: conn,token: token} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/reset_password/#{token}"){:ok, conn} =lv|> element(~s|main a:fl-contains("Register")|)|> render_click()|> follow_redirect(conn, ~p"/accounts/users/register")assert conn.resp_body =~ "Register"endendend
defmodule ChklstWeb.Accounts.UserRegistrationLiveTest douse ChklstWeb.ConnCase, async: trueimport Phoenix.LiveViewTestimport Chklst.AccountsFixturesdescribe "Registration page" dotest "renders registration page", %{conn: conn} do{:ok, _lv, html} = live(conn, ~p"/accounts/users/register")assert html =~ "Register"assert html =~ "Log in"endtest "redirects if already logged in", %{conn: conn} doresult =conn|> log_in_user(user_fixture())|> live(~p"/accounts/users/register")|> follow_redirect(conn, "/")assert {:ok, _conn} = resultendtest "renders errors for invalid data", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/register")result =lv|> element("#registration_form")|> render_change(user: %{"email" => "with spaces", "password" => "too short"})assert result =~ "Register"assert result =~ "must have the @ sign and no spaces"assert result =~ "should be at least 12 character"endenddescribe "register user" dotest "creates account and logs the user in", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/register")email = unique_user_email()form = form(lv, "#registration_form", user: valid_user_attributes(email: email))render_submit(form)conn = follow_trigger_action(form, conn)assert redirected_to(conn) == ~p"/"# Now do a logged in request and assert on the menuconn = get(conn, "/")response = html_response(conn, 200)assert response =~ emailassert response =~ "Settings"assert response =~ "Log out"endtest "renders errors for duplicated email", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/register")user = user_fixture(%{email: "test@email.com"})result =lv|> form("#registration_form",user: %{"email" => user.email, "password" => "valid_password"})|> render_submit()assert result =~ "has already been taken"endenddescribe "registration navigation" dotest "redirects to login page when the Log in button is clicked", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/register"){:ok, _login_live, login_html} =lv|> element(~s|main a:fl-contains("Sign in")|)|> render_click()|> follow_redirect(conn, ~p"/accounts/users/log_in")assert login_html =~ "Log in"endendend
defmodule ChklstWeb.Accounts.UserLoginLiveTest douse ChklstWeb.ConnCase, async: trueimport Phoenix.LiveViewTestimport Chklst.AccountsFixturesdescribe "Log in page" dotest "renders log in page", %{conn: conn} do{:ok, _lv, html} = live(conn, ~p"/accounts/users/log_in")assert html =~ "Log in"assert html =~ "Register"assert html =~ "Forgot your password?"endtest "redirects if already logged in", %{conn: conn} doresult =conn|> log_in_user(user_fixture())|> live(~p"/accounts/users/log_in")|> follow_redirect(conn, "/")assert {:ok, _conn} = resultendenddescribe "user login" dotest "redirects if user login with valid credentials", %{conn: conn} dopassword = "123456789abcd"user = user_fixture(%{password: password}){:ok, lv, _html} = live(conn, ~p"/accounts/users/log_in")form =form(lv, "#login_form", user: %{email: user.email, password: password, remember_me: true})conn = submit_form(form, conn)assert redirected_to(conn) == ~p"/"endtest "redirects to login page with a flash error if there are no valid credentials", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/log_in")form =form(lv, "#login_form",user: %{email: "test@email.com", password: "123456", remember_me: true})conn = submit_form(form, conn)assert Phoenix.Flash.get(conn.assigns.flash, :error) == "Invalid email or password"assert redirected_to(conn) == "/accounts/users/log_in"endenddescribe "login navigation" dotest "redirects to registration page when the Register button is clicked", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/log_in"){:ok, _login_live, login_html} =lv|> element(~s|main a:fl-contains("Sign up")|)|> render_click()|> follow_redirect(conn, ~p"/accounts/users/register")assert login_html =~ "Register"endtest "redirects to forgot password page when the Forgot Password button is clicked", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/log_in"){:ok, conn} =lv|> element(~s|main a:fl-contains("Forgot your password?")|)|> render_click()|> follow_redirect(conn, ~p"/accounts/users/reset_password")assert conn.resp_body =~ "Forgot your password?"endendend
defmodule ChklstWeb.Accounts.UserForgotPasswordLiveTest douse ChklstWeb.ConnCase, async: trueimport Phoenix.LiveViewTestimport Chklst.AccountsFixturesalias Chklst.Accountsalias Chklst.Repodescribe "Forgot password page" dotest "renders email page", %{conn: conn} do{:ok, lv, html} = live(conn, ~p"/accounts/users/reset_password")assert html =~ "Forgot your password?"assert has_element?(lv, ~s|a[href="#{~p"/accounts/users/register"}"]|, "Register")assert has_element?(lv, ~s|a[href="#{~p"/accounts/users/log_in"}"]|, "Log in")endtest "redirects if already logged in", %{conn: conn} doresult =conn|> log_in_user(user_fixture())|> live(~p"/accounts/users/reset_password")|> follow_redirect(conn, ~p"/")assert {:ok, _conn} = resultendenddescribe "Reset link" dosetup do%{user: user_fixture()}endtest "sends a new reset password token", %{conn: conn, user: user} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/reset_password"){:ok, conn} =lv|> form("#reset_password_form", user: %{"email" => user.email})|> render_submit()|> follow_redirect(conn, "/")assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "If your email is in our system"assert Repo.get_by!(Accounts.UserToken, user_id: user.id).context =="reset_password"endtest "does not send reset password token if email is invalid", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/reset_password"){:ok, conn} =lv|> form("#reset_password_form", user: %{"email" => "unknown@example.com"})|> render_submit()|> follow_redirect(conn, "/")assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "If your email is in our system"assert Repo.all(Accounts.UserToken) == []endendend
defmodule ChklstWeb.Accounts.UserConfirmationLiveTest douse ChklstWeb.ConnCase, async: trueimport Phoenix.LiveViewTestimport Chklst.AccountsFixturesalias Chklst.Accountsalias Chklst.Reposetup do%{user: user_fixture()}enddescribe "Confirm user" dotest "renders confirmation page", %{conn: conn} do{:ok, _lv, html} = live(conn, ~p"/accounts/users/confirm/some-token")assert html =~ "Confirm Account"endtest "confirms the given token once", %{conn: conn, user: user} dotoken =extract_user_token(fn url ->Accounts.deliver_user_confirmation_instructions(user, url)end){:ok, lv, _html} = live(conn, ~p"/accounts/users/confirm/#{token}")result =lv|> form("#confirmation_form")|> render_submit()|> follow_redirect(conn, "/")assert {:ok, conn} = resultassert Phoenix.Flash.get(conn.assigns.flash, :info) =~"User confirmed successfully"assert Accounts.get_user!(user.id).confirmed_atrefute get_session(conn, :user_token)assert Repo.all(Accounts.UserToken) == []# when not logged in{:ok, lv, _html} = live(conn, ~p"/accounts/users/confirm/#{token}")result =lv|> form("#confirmation_form")|> render_submit()|> follow_redirect(conn, "/")assert {:ok, conn} = resultassert Phoenix.Flash.get(conn.assigns.flash, :error) =~"User confirmation link is invalid or it has expired"# when logged inconn =build_conn()|> log_in_user(user){:ok, lv, _html} = live(conn, ~p"/accounts/users/confirm/#{token}")result =lv|> form("#confirmation_form")|> render_submit()|> follow_redirect(conn, "/")assert {:ok, conn} = resultrefute Phoenix.Flash.get(conn.assigns.flash, :error)endtest "does not confirm email with invalid token", %{conn: conn, user: user} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/confirm/invalid-token"){:ok, conn} =lv|> form("#confirmation_form")|> render_submit()|> follow_redirect(conn, ~p"/")assert Phoenix.Flash.get(conn.assigns.flash, :error) =~"User confirmation link is invalid or it has expired"refute Accounts.get_user!(user.id).confirmed_atendendend
defmodule ChklstWeb.Accounts.UserConfirmationInstructionsLiveTest douse ChklstWeb.ConnCase, async: trueimport Phoenix.LiveViewTestimport Chklst.AccountsFixturesalias Chklst.Accountsalias Chklst.Reposetup do%{user: user_fixture()}enddescribe "Resend confirmation" dotest "renders the resend confirmation page", %{conn: conn} do{:ok, _lv, html} = live(conn, ~p"/accounts/users/confirm")assert html =~ "Resend confirmation instructions"endtest "sends a new confirmation token", %{conn: conn, user: user} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/confirm"){:ok, conn} =lv|> form("#resend_confirmation_form", user: %{email: user.email})|> render_submit()|> follow_redirect(conn, ~p"/")assert Phoenix.Flash.get(conn.assigns.flash, :info) =~"If your email is in our system"assert Repo.get_by!(Accounts.UserToken, user_id: user.id).context == "confirm"endtest "does not send confirmation token if user is confirmed", %{conn: conn, user: user} doRepo.update!(Accounts.User.confirm_changeset(user)){:ok, lv, _html} = live(conn, ~p"/accounts/users/confirm"){:ok, conn} =lv|> form("#resend_confirmation_form", user: %{email: user.email})|> render_submit()|> follow_redirect(conn, ~p"/")assert Phoenix.Flash.get(conn.assigns.flash, :info) =~"If your email is in our system"refute Repo.get_by(Accounts.UserToken, user_id: user.id)endtest "does not send confirmation token if email is invalid", %{conn: conn} do{:ok, lv, _html} = live(conn, ~p"/accounts/users/confirm"){:ok, conn} =lv|> form("#resend_confirmation_form", user: %{email: "unknown@example.com"})|> render_submit()|> follow_redirect(conn, ~p"/")assert Phoenix.Flash.get(conn.assigns.flash, :info) =~"If your email is in our system"assert Repo.all(Accounts.UserToken) == []endendend
defmodule ChklstWeb.Accounts.UserSessionControllerTest douse ChklstWeb.ConnCase, async: trueimport Chklst.AccountsFixturessetup do%{user: user_fixture()}enddescribe "POST /accounts/users/log_in" dotest "logs the user in", %{conn: conn, user: user} doconn =post(conn, ~p"/accounts/users/log_in", %{"user" => %{"email" => user.email, "password" => valid_user_password()}})assert get_session(conn, :user_token)assert redirected_to(conn) == ~p"/"# Now do a logged in request and assert on the menuconn = get(conn, ~p"/")response = html_response(conn, 200)assert response =~ user.emailassert response =~ ~p"/accounts/users/settings"assert response =~ ~p"/accounts/users/log_out"endtest "logs the user in with remember me", %{conn: conn, user: user} doconn =post(conn, ~p"/accounts/users/log_in", %{"user" => %{"email" => user.email,"password" => valid_user_password(),"remember_me" => "true"}})assert conn.resp_cookies["_chklst_web_user_remember_me"]assert redirected_to(conn) == ~p"/"endtest "logs the user in with return to", %{conn: conn, user: user} doconn =conn|> init_test_session(user_return_to: "/foo/bar")|> post(~p"/accounts/users/log_in", %{"user" => %{"email" => user.email,"password" => valid_user_password()}})assert redirected_to(conn) == "/foo/bar"assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "Welcome back!"endtest "login following registration", %{conn: conn, user: user} doconn =conn|> post(~p"/accounts/users/log_in", %{"_action" => "registered","user" => %{"email" => user.email,"password" => valid_user_password()}})assert redirected_to(conn) == ~p"/"assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "Account created successfully"endtest "login following password update", %{conn: conn, user: user} doconn =conn|> post(~p"/accounts/users/log_in", %{"_action" => "password_updated","user" => %{"email" => user.email,"password" => valid_user_password()}})assert redirected_to(conn) == ~p"/accounts/users/settings"assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "Password updated successfully"endtest "redirects to login page with invalid credentials", %{conn: conn} doconn =post(conn, ~p"/accounts/users/log_in", %{"user" => %{"email" => "invalid@email.com", "password" => "invalid_password"}})assert Phoenix.Flash.get(conn.assigns.flash, :error) == "Invalid email or password"assert redirected_to(conn) == ~p"/accounts/users/log_in"endenddescribe "DELETE /accounts/users/log_out" dotest "logs the user out", %{conn: conn, user: user} doconn = conn |> log_in_user(user) |> delete(~p"/accounts/users/log_out")assert redirected_to(conn) == ~p"/"refute get_session(conn, :user_token)assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "Logged out successfully"endtest "succeeds even if the user is not logged in", %{conn: conn} doconn = delete(conn, ~p"/accounts/users/log_out")assert redirected_to(conn) == ~p"/"refute get_session(conn, :user_token)assert Phoenix.Flash.get(conn.assigns.flash, :info) =~ "Logged out successfully"endendend
defmodule ChklstWeb.Accounts.UserAuthTest douse ChklstWeb.ConnCase, async: truealias Phoenix.LiveViewalias Chklst.Accountsalias ChklstWeb.Accounts.UserAuthimport Chklst.AccountsFixtures@remember_me_cookie "_chklst_web_user_remember_me"setup %{conn: conn} doconn =conn|> Map.replace!(:secret_key_base, ChklstWeb.Endpoint.config(:secret_key_base))|> init_test_session(%{})%{user: user_fixture(), conn: conn}enddescribe "log_in_user/3" dotest "stores the user token in the session", %{conn: conn, user: user} doconn = UserAuth.log_in_user(conn, user)assert token = get_session(conn, :user_token)assert get_session(conn, :live_socket_id) == "users_sessions:#{Base.url_encode64(token)}"assert redirected_to(conn) == ~p"/"assert Accounts.get_user_by_session_token(token)endtest "clears everything previously stored in the session", %{conn: conn, user: user} doconn = conn |> put_session(:to_be_removed, "value") |> UserAuth.log_in_user(user)refute get_session(conn, :to_be_removed)endtest "redirects to the configured path", %{conn: conn, user: user} doconn = conn |> put_session(:user_return_to, "/hello") |> UserAuth.log_in_user(user)assert redirected_to(conn) == "/hello"endtest "writes a cookie if remember_me is configured", %{conn: conn, user: user} doconn = conn |> fetch_cookies() |> UserAuth.log_in_user(user, %{"remember_me" => "true"})assert get_session(conn, :user_token) == conn.cookies[@remember_me_cookie]assert %{value: signed_token, max_age: max_age} = conn.resp_cookies[@remember_me_cookie]assert signed_token != get_session(conn, :user_token)assert max_age == 5_184_000endenddescribe "logout_user/1" dotest "erases session and cookies", %{conn: conn, user: user} douser_token = Accounts.generate_user_session_token(user)conn =conn|> put_session(:user_token, user_token)|> put_req_cookie(@remember_me_cookie, user_token)|> fetch_cookies()|> UserAuth.log_out_user()refute get_session(conn, :user_token)refute conn.cookies[@remember_me_cookie]assert %{max_age: 0} = conn.resp_cookies[@remember_me_cookie]assert redirected_to(conn) == ~p"/"refute Accounts.get_user_by_session_token(user_token)endtest "broadcasts to the given live_socket_id", %{conn: conn} dolive_socket_id = "users_sessions:abcdef-token"ChklstWeb.Endpoint.subscribe(live_socket_id)conn|> put_session(:live_socket_id, live_socket_id)|> UserAuth.log_out_user()assert_receive %Phoenix.Socket.Broadcast{event: "disconnect", topic: ^live_socket_id}endtest "works even if user is already logged out", %{conn: conn} doconn = conn |> fetch_cookies() |> UserAuth.log_out_user()refute get_session(conn, :user_token)assert %{max_age: 0} = conn.resp_cookies[@remember_me_cookie]assert redirected_to(conn) == ~p"/"endenddescribe "fetch_current_user/2" dotest "authenticates user from session", %{conn: conn, user: user} douser_token = Accounts.generate_user_session_token(user)conn = conn |> put_session(:user_token, user_token) |> UserAuth.fetch_current_user([])assert conn.assigns.current_user.id == user.idendtest "authenticates user from cookies", %{conn: conn, user: user} dologged_in_conn =conn |> fetch_cookies() |> UserAuth.log_in_user(user, %{"remember_me" => "true"})user_token = logged_in_conn.cookies[@remember_me_cookie]%{value: signed_token} = logged_in_conn.resp_cookies[@remember_me_cookie]conn =conn|> put_req_cookie(@remember_me_cookie, signed_token)|> UserAuth.fetch_current_user([])assert conn.assigns.current_user.id == user.idassert get_session(conn, :user_token) == user_tokenassert get_session(conn, :live_socket_id) =="users_sessions:#{Base.url_encode64(user_token)}"endtest "does not authenticate if data is missing", %{conn: conn, user: user} do_ = Accounts.generate_user_session_token(user)conn = UserAuth.fetch_current_user(conn, [])refute get_session(conn, :user_token)refute conn.assigns.current_userendenddescribe "on_mount :mount_current_user" dotest "assigns current_user based on a valid user_token", %{conn: conn, user: user} douser_token = Accounts.generate_user_session_token(user)session = conn |> put_session(:user_token, user_token) |> get_session(){:cont, updated_socket} =UserAuth.on_mount(:mount_current_user, %{}, session, %LiveView.Socket{})assert updated_socket.assigns.current_user.id == user.idendtest "assigns nil to current_user assign if there isn't a valid user_token", %{conn: conn} douser_token = "invalid_token"session = conn |> put_session(:user_token, user_token) |> get_session(){:cont, updated_socket} =UserAuth.on_mount(:mount_current_user, %{}, session, %LiveView.Socket{})assert updated_socket.assigns.current_user == nilendtest "assigns nil to current_user assign if there isn't a user_token", %{conn: conn} dosession = conn |> get_session(){:cont, updated_socket} =UserAuth.on_mount(:mount_current_user, %{}, session, %LiveView.Socket{})assert updated_socket.assigns.current_user == nilendenddescribe "on_mount :ensure_authenticated" dotest "authenticates current_user based on a valid user_token", %{conn: conn, user: user} douser_token = Accounts.generate_user_session_token(user)session = conn |> put_session(:user_token, user_token) |> get_session(){:cont, updated_socket} =UserAuth.on_mount(:ensure_authenticated, %{}, session, %LiveView.Socket{})assert updated_socket.assigns.current_user.id == user.idendtest "redirects to login page if there isn't a valid user_token", %{conn: conn} douser_token = "invalid_token"session = conn |> put_session(:user_token, user_token) |> get_session()socket = %LiveView.Socket{endpoint: ChklstWeb.Endpoint,assigns: %{__changed__: %{}, flash: %{}}}{:halt, updated_socket} = UserAuth.on_mount(:ensure_authenticated, %{}, session, socket)assert updated_socket.assigns.current_user == nilendtest "redirects to login page if there isn't a user_token", %{conn: conn} dosession = conn |> get_session()socket = %LiveView.Socket{endpoint: ChklstWeb.Endpoint,assigns: %{__changed__: %{}, flash: %{}}}{:halt, updated_socket} = UserAuth.on_mount(:ensure_authenticated, %{}, session, socket)assert updated_socket.assigns.current_user == nilendenddescribe "on_mount :redirect_if_user_is_authenticated" dotest "redirects if there is an authenticated user ", %{conn: conn, user: user} douser_token = Accounts.generate_user_session_token(user)session = conn |> put_session(:user_token, user_token) |> get_session()assert {:halt, _updated_socket} =UserAuth.on_mount(:redirect_if_user_is_authenticated,%{},session,%LiveView.Socket{})endtest "doesn't redirect if there is no authenticated user", %{conn: conn} dosession = conn |> get_session()assert {:cont, _updated_socket} =UserAuth.on_mount(:redirect_if_user_is_authenticated,%{},session,%LiveView.Socket{})endenddescribe "redirect_if_user_is_authenticated/2" dotest "redirects if user is authenticated", %{conn: conn, user: user} doconn = conn |> assign(:current_user, user) |> UserAuth.redirect_if_user_is_authenticated([])assert conn.haltedassert redirected_to(conn) == ~p"/"endtest "does not redirect if user is not authenticated", %{conn: conn} doconn = UserAuth.redirect_if_user_is_authenticated(conn, [])refute conn.haltedrefute conn.statusendenddescribe "require_authenticated_user/2" dotest "redirects if user is not authenticated", %{conn: conn} doconn = conn |> fetch_flash() |> UserAuth.require_authenticated_user([])assert conn.haltedassert redirected_to(conn) == ~p"/accounts/users/log_in"assert Phoenix.Flash.get(conn.assigns.flash, :error) =="You must log in to access this page."endtest "stores the path to redirect to on GET", %{conn: conn} dohalted_conn =%{conn | path_info: ["foo"], query_string: ""}|> fetch_flash()|> UserAuth.require_authenticated_user([])assert halted_conn.haltedassert get_session(halted_conn, :user_return_to) == "/foo"halted_conn =%{conn | path_info: ["foo"], query_string: "bar=baz"}|> fetch_flash()|> UserAuth.require_authenticated_user([])assert halted_conn.haltedassert get_session(halted_conn, :user_return_to) == "/foo?bar=baz"halted_conn =%{conn | path_info: ["foo"], query_string: "bar", method: "POST"}|> fetch_flash()|> UserAuth.require_authenticated_user([])assert halted_conn.haltedrefute get_session(halted_conn, :user_return_to)endtest "does not redirect if user is authenticated", %{conn: conn, user: user} doconn = conn |> assign(:current_user, user) |> UserAuth.require_authenticated_user([])refute conn.haltedrefute conn.statusendendend
defmodule Chklst.AccountsTest douse Chklst.DataCasealias Chklst.Accountsimport Chklst.AccountsFixturesalias Chklst.Accounts.{User, UserToken}describe "get_user_by_email/1" dotest "does not return the user if the email does not exist" dorefute Accounts.get_user_by_email("unknown@example.com")endtest "returns the user if the email exists" do%{id: id} = user = user_fixture()assert %User{id: ^id} = Accounts.get_user_by_email(user.email)endenddescribe "get_user_by_email_and_password/2" dotest "does not return the user if the email does not exist" dorefute Accounts.get_user_by_email_and_password("unknown@example.com", "hello world!")endtest "does not return the user if the password is not valid" douser = user_fixture()refute Accounts.get_user_by_email_and_password(user.email, "invalid")endtest "returns the user if the email and password are valid" do%{id: id} = user = user_fixture()assert %User{id: ^id} =Accounts.get_user_by_email_and_password(user.email, valid_user_password())endenddescribe "get_user!/1" dotest "raises if id is invalid" doassert_raise Ecto.NoResultsError, fn ->Accounts.get_user!("11111111-1111-1111-1111-111111111111")endendtest "returns the user with the given id" do%{id: id} = user = user_fixture()assert %User{id: ^id} = Accounts.get_user!(user.id)endenddescribe "register_user/1" dotest "requires email and password to be set" do{:error, changeset} = Accounts.register_user(%{})assert %{password: ["can't be blank"],email: ["can't be blank"]} = errors_on(changeset)endtest "validates email and password when given" do{:error, changeset} = Accounts.register_user(%{email: "not valid", password: "not valid"})assert %{email: ["must have the @ sign and no spaces"],password: ["should be at least 12 character(s)"]} = errors_on(changeset)endtest "validates maximum values for email and password for security" dotoo_long = String.duplicate("db", 100){:error, changeset} = Accounts.register_user(%{email: too_long, password: too_long})assert "should be at most 160 character(s)" in errors_on(changeset).emailassert "should be at most 72 character(s)" in errors_on(changeset).passwordendtest "validates email uniqueness" do%{email: email} = user_fixture(){:error, changeset} = Accounts.register_user(%{email: email})assert "has already been taken" in errors_on(changeset).email# Now try with the upper cased email too, to check that email case is ignored.{:error, changeset} = Accounts.register_user(%{email: String.upcase(email)})assert "has already been taken" in errors_on(changeset).emailendtest "registers users with a hashed password" doemail = unique_user_email(){:ok, user} = Accounts.register_user(valid_user_attributes(email: email))assert user.email == emailassert is_binary(user.hashed_password)assert is_nil(user.confirmed_at)assert is_nil(user.password)endenddescribe "change_user_registration/2" dotest "returns a changeset" doassert %Ecto.Changeset{} = changeset = Accounts.change_user_registration(%User{})assert changeset.required == [:password, :email]endtest "allows fields to be set" doemail = unique_user_email()password = valid_user_password()changeset =Accounts.change_user_registration(%User{},valid_user_attributes(email: email, password: password))assert changeset.valid?assert get_change(changeset, :email) == emailassert get_change(changeset, :password) == passwordassert is_nil(get_change(changeset, :hashed_password))endenddescribe "change_user_email/2" dotest "returns a user changeset" doassert %Ecto.Changeset{} = changeset = Accounts.change_user_email(%User{})assert changeset.required == [:email]endenddescribe "apply_user_email/3" dosetup do%{user: user_fixture()}endtest "requires email to change", %{user: user} do{:error, changeset} = Accounts.apply_user_email(user, valid_user_password(), %{})assert %{email: ["did not change"]} = errors_on(changeset)endtest "validates email", %{user: user} do{:error, changeset} =Accounts.apply_user_email(user, valid_user_password(), %{email: "not valid"})assert %{email: ["must have the @ sign and no spaces"]} = errors_on(changeset)endtest "validates maximum value for email for security", %{user: user} dotoo_long = String.duplicate("db", 100){:error, changeset} =Accounts.apply_user_email(user, valid_user_password(), %{email: too_long})assert "should be at most 160 character(s)" in errors_on(changeset).emailendtest "validates email uniqueness", %{user: user} do%{email: email} = user_fixture()password = valid_user_password(){:error, changeset} = Accounts.apply_user_email(user, password, %{email: email})assert "has already been taken" in errors_on(changeset).emailendtest "validates current password", %{user: user} do{:error, changeset} =Accounts.apply_user_email(user, "invalid", %{email: unique_user_email()})assert %{current_password: ["is not valid"]} = errors_on(changeset)endtest "applies the email without persisting it", %{user: user} doemail = unique_user_email(){:ok, user} = Accounts.apply_user_email(user, valid_user_password(), %{email: email})assert user.email == emailassert Accounts.get_user!(user.id).email != emailendenddescribe "deliver_user_update_email_instructions/3" dosetup do%{user: user_fixture()}endtest "sends token through notification", %{user: user} dotoken =extract_user_token(fn url ->Accounts.deliver_user_update_email_instructions(user, "current@example.com", url)end){:ok, token} = Base.url_decode64(token, padding: false)assert user_token = Repo.get_by(UserToken, token: :crypto.hash(:sha256, token))assert user_token.user_id == user.idassert user_token.sent_to == user.emailassert user_token.context == "change:current@example.com"endenddescribe "update_user_email/2" dosetup douser = user_fixture()email = unique_user_email()token =extract_user_token(fn url ->Accounts.deliver_user_update_email_instructions(%{user | email: email}, user.email, url)end)%{user: user, token: token, email: email}endtest "updates the email with a valid token", %{user: user, token: token, email: email} doassert Accounts.update_user_email(user, token) == :okchanged_user = Repo.get!(User, user.id)assert changed_user.email != user.emailassert changed_user.email == emailassert changed_user.confirmed_atassert changed_user.confirmed_at != user.confirmed_atrefute Repo.get_by(UserToken, user_id: user.id)endtest "does not update email with invalid token", %{user: user} doassert Accounts.update_user_email(user, "oops") == :errorassert Repo.get!(User, user.id).email == user.emailassert Repo.get_by(UserToken, user_id: user.id)endtest "does not update email if user email changed", %{user: user, token: token} doassert Accounts.update_user_email(%{user | email: "current@example.com"}, token) == :errorassert Repo.get!(User, user.id).email == user.emailassert Repo.get_by(UserToken, user_id: user.id)endtest "does not update email if token expired", %{user: user, token: token} do{1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])assert Accounts.update_user_email(user, token) == :errorassert Repo.get!(User, user.id).email == user.emailassert Repo.get_by(UserToken, user_id: user.id)endenddescribe "change_user_password/2" dotest "returns a user changeset" doassert %Ecto.Changeset{} = changeset = Accounts.change_user_password(%User{})assert changeset.required == [:password]endtest "allows fields to be set" dochangeset =Accounts.change_user_password(%User{}, %{"password" => "new valid password"})assert changeset.valid?assert get_change(changeset, :password) == "new valid password"assert is_nil(get_change(changeset, :hashed_password))endenddescribe "update_user_password/3" dosetup do%{user: user_fixture()}endtest "validates password", %{user: user} do{:error, changeset} =Accounts.update_user_password(user, valid_user_password(), %{password: "not valid",password_confirmation: "another"})assert %{password: ["should be at least 12 character(s)"],password_confirmation: ["does not match password"]} = errors_on(changeset)endtest "validates maximum values for password for security", %{user: user} dotoo_long = String.duplicate("db", 100){:error, changeset} =Accounts.update_user_password(user, valid_user_password(), %{password: too_long})assert "should be at most 72 character(s)" in errors_on(changeset).passwordendtest "validates current password", %{user: user} do{:error, changeset} =Accounts.update_user_password(user, "invalid", %{password: valid_user_password()})assert %{current_password: ["is not valid"]} = errors_on(changeset)endtest "updates the password", %{user: user} do{:ok, user} =Accounts.update_user_password(user, valid_user_password(), %{password: "new valid password"})assert is_nil(user.password)assert Accounts.get_user_by_email_and_password(user.email, "new valid password")endtest "deletes all tokens for the given user", %{user: user} do_ = Accounts.generate_user_session_token(user){:ok, _} =Accounts.update_user_password(user, valid_user_password(), %{password: "new valid password"})refute Repo.get_by(UserToken, user_id: user.id)endenddescribe "generate_user_session_token/1" dosetup do%{user: user_fixture()}endtest "generates a token", %{user: user} dotoken = Accounts.generate_user_session_token(user)assert user_token = Repo.get_by(UserToken, token: token)assert user_token.context == "session"# Creating the same token for another user should failassert_raise Ecto.ConstraintError, fn ->Repo.insert!(%UserToken{token: user_token.token,user_id: user_fixture().id,context: "session"})endendenddescribe "get_user_by_session_token/1" dosetup douser = user_fixture()token = Accounts.generate_user_session_token(user)%{user: user, token: token}endtest "returns user by token", %{user: user, token: token} doassert session_user = Accounts.get_user_by_session_token(token)assert session_user.id == user.idendtest "does not return user for invalid token" dorefute Accounts.get_user_by_session_token("oops")endtest "does not return user for expired token", %{token: token} do{1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])refute Accounts.get_user_by_session_token(token)endenddescribe "delete_user_session_token/1" dotest "deletes the token" douser = user_fixture()token = Accounts.generate_user_session_token(user)assert Accounts.delete_user_session_token(token) == :okrefute Accounts.get_user_by_session_token(token)endenddescribe "deliver_user_confirmation_instructions/2" dosetup do%{user: user_fixture()}endtest "sends token through notification", %{user: user} dotoken =extract_user_token(fn url ->Accounts.deliver_user_confirmation_instructions(user, url)end){:ok, token} = Base.url_decode64(token, padding: false)assert user_token = Repo.get_by(UserToken, token: :crypto.hash(:sha256, token))assert user_token.user_id == user.idassert user_token.sent_to == user.emailassert user_token.context == "confirm"endenddescribe "confirm_user/1" dosetup douser = user_fixture()token =extract_user_token(fn url ->Accounts.deliver_user_confirmation_instructions(user, url)end)%{user: user, token: token}endtest "confirms the email with a valid token", %{user: user, token: token} doassert {:ok, confirmed_user} = Accounts.confirm_user(token)assert confirmed_user.confirmed_atassert confirmed_user.confirmed_at != user.confirmed_atassert Repo.get!(User, user.id).confirmed_atrefute Repo.get_by(UserToken, user_id: user.id)endtest "does not confirm with invalid token", %{user: user} doassert Accounts.confirm_user("oops") == :errorrefute Repo.get!(User, user.id).confirmed_atassert Repo.get_by(UserToken, user_id: user.id)endtest "does not confirm email if token expired", %{user: user, token: token} do{1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])assert Accounts.confirm_user(token) == :errorrefute Repo.get!(User, user.id).confirmed_atassert Repo.get_by(UserToken, user_id: user.id)endenddescribe "deliver_user_reset_password_instructions/2" dosetup do%{user: user_fixture()}endtest "sends token through notification", %{user: user} dotoken =extract_user_token(fn url ->Accounts.deliver_user_reset_password_instructions(user, url)end){:ok, token} = Base.url_decode64(token, padding: false)assert user_token = Repo.get_by(UserToken, token: :crypto.hash(:sha256, token))assert user_token.user_id == user.idassert user_token.sent_to == user.emailassert user_token.context == "reset_password"endenddescribe "get_user_by_reset_password_token/1" dosetup douser = user_fixture()token =extract_user_token(fn url ->Accounts.deliver_user_reset_password_instructions(user, url)end)%{user: user, token: token}endtest "returns the user with valid token", %{user: %{id: id}, token: token} doassert %User{id: ^id} = Accounts.get_user_by_reset_password_token(token)assert Repo.get_by(UserToken, user_id: id)endtest "does not return the user with invalid token", %{user: user} dorefute Accounts.get_user_by_reset_password_token("oops")assert Repo.get_by(UserToken, user_id: user.id)endtest "does not return the user if token expired", %{user: user, token: token} do{1, nil} = Repo.update_all(UserToken, set: [inserted_at: ~N[2020-01-01 00:00:00]])refute Accounts.get_user_by_reset_password_token(token)assert Repo.get_by(UserToken, user_id: user.id)endenddescribe "reset_user_password/2" dosetup do%{user: user_fixture()}endtest "validates password", %{user: user} do{:error, changeset} =Accounts.reset_user_password(user, %{password: "not valid",password_confirmation: "another"})assert %{password: ["should be at least 12 character(s)"],password_confirmation: ["does not match password"]} = errors_on(changeset)endtest "validates maximum values for password for security", %{user: user} dotoo_long = String.duplicate("db", 100){:error, changeset} = Accounts.reset_user_password(user, %{password: too_long})assert "should be at most 72 character(s)" in errors_on(changeset).passwordendtest "updates the password", %{user: user} do{:ok, updated_user} = Accounts.reset_user_password(user, %{password: "new valid password"})assert is_nil(updated_user.password)assert Accounts.get_user_by_email_and_password(user.email, "new valid password")endtest "deletes all tokens for the given user", %{user: user} do_ = Accounts.generate_user_session_token(user){:ok, _} = Accounts.reset_user_password(user, %{password: "new valid password"})refute Repo.get_by(UserToken, user_id: user.id)endenddescribe "inspect/2 for the User module" dotest "does not include password" dorefute inspect(%User{password: "123456"}) =~ "password: \"123456\""endendend
defmodule Chklst.Repo.Migrations.CreateUsersAuthTables douse Ecto.Migrationdef change doexecute "CREATE EXTENSION IF NOT EXISTS citext", ""create table(:users, primary_key: false) doadd :id, :binary_id, primary_key: trueadd :email, :citext, null: falseadd :hashed_password, :string, null: falseadd :confirmed_at, :naive_datetimetimestamps(type: :utc_datetime)endcreate unique_index(:users, [:email])create table(:users_tokens, primary_key: false) doadd :id, :binary_id, primary_key: trueadd :user_id, references(:users, type: :binary_id, on_delete: :delete_all), null: falseadd :token, :binary, null: falseadd :context, :string, null: falseadd :sent_to, :stringtimestamps(updated_at: false)endcreate index(:users_tokens, [:user_id])create unique_index(:users_tokens, [:context, :token])endend
"argon2_elixir": {:hex, :argon2_elixir, "4.0.0", "7f6cd2e4a93a37f61d58a367d82f830ad9527082ff3c820b8197a8a736648941", [:make, :mix], [{:comeonin, "~> 5.3", [hex: :comeonin, repo: "hexpm", optional: false]}, {:elixir_make, "~> 0.6", [hex: :elixir_make, repo: "hexpm", optional: false]}], "hexpm", "f9da27cf060c9ea61b1bd47837a28d7e48a8f6fa13a745e252556c14f9132c7f"},
"elixir_make": {:hex, :elixir_make, "0.8.3", "d38d7ee1578d722d89b4d452a3e36bcfdc644c618f0d063b874661876e708683", [:mix], [{:castore, "~> 0.1 or ~> 1.0", [hex: :castore, repo: "hexpm", optional: true]}, {:certifi, "~> 2.0", [hex: :certifi, repo: "hexpm", optional: true]}], "hexpm", "5c99a18571a756d4af7a4d89ca75c28ac899e6103af6f223982f09ce44942cc9"},
## Authentication routesscope "/accounts", ChklstWeb.Accounts, as: :accounts dopipe_through [:browser, :redirect_if_user_is_authenticated]live_session :redirect_if_user_is_authenticated,on_mount: [{ChklstWeb.Accounts.UserAuth, :redirect_if_user_is_authenticated}] dolive "/users/register", UserRegistrationLive, :newlive "/users/log_in", UserLoginLive, :newlive "/users/reset_password", UserForgotPasswordLive, :newlive "/users/reset_password/:token", UserResetPasswordLive, :editendpost "/users/log_in", UserSessionController, :createendscope "/accounts", ChklstWeb.Accounts, as: :accounts dopipe_through [:browser, :require_authenticated_user]live_session :require_authenticated_user,on_mount: [{ChklstWeb.Accounts.UserAuth, :ensure_authenticated}] dolive "/users/settings", UserSettingsLive, :editlive "/users/settings/confirm_email/:token", UserSettingsLive, :confirm_emailendendscope "/accounts", ChklstWeb.Accounts, as: :accounts dopipe_through [:browser]delete "/users/log_out", UserSessionController, :deletelive_session :current_user,on_mount: [{ChklstWeb.Accounts.UserAuth, :mount_current_user}] dolive "/users/confirm/:token", UserConfirmationLive, :editlive "/users/confirm", UserConfirmationInstructionsLive, :newendend
defmodule ChklstWeb.Accounts.UserSettingsLive douse ChklstWeb, :live_viewalias Chklst.Accountsdef render(assigns) do~H"""<.header class="text-center">Account Settings<:subtitle>Manage your account email address and password settings</:subtitle></.header><div class="space-y-12 divide-y"><div><.simple_formfor={@email_form}id="email_form"phx-submit="update_email"phx-change="validate_email"><.input field={@email_form[:email]} type="email" label="Email" required /><.inputfield={@email_form[:current_password]}name="current_password"id="current_password_for_email"type="password"label="Current password"value={@email_form_current_password}required/><:actions><.button phx-disable-with="Changing...">Change Email</.button></:actions></.simple_form></div><div><.simple_formfor={@password_form}id="password_form"action={~p"/accounts/users/log_in?_action=password_updated"}method="post"phx-change="validate_password"phx-submit="update_password"phx-trigger-action={@trigger_submit}><.inputfield={@password_form[:email]}type="hidden"id="hidden_user_email"value={@current_email}/><.input field={@password_form[:password]} type="password" label="New password" required /><.inputfield={@password_form[:password_confirmation]}type="password"label="Confirm new password"/><.inputfield={@password_form[:current_password]}name="current_password"type="password"label="Current password"id="current_password_for_password"value={@current_password}required/><:actions><.button phx-disable-with="Changing...">Change Password</.button></:actions></.simple_form></div></div>"""enddef mount(%{"token" => token}, _session, socket) dosocket =case Accounts.update_user_email(socket.assigns.current_user, token) do:ok ->put_flash(socket, :info, "Email changed successfully."):error ->put_flash(socket, :error, "Email change link is invalid or it has expired.")end{:ok, push_navigate(socket, to: ~p"/accounts/users/settings")}enddef mount(_params, _session, socket) douser = socket.assigns.current_useremail_changeset = Accounts.change_user_email(user)password_changeset = Accounts.change_user_password(user)socket =socket|> assign(:current_password, nil)|> assign(:email_form_current_password, nil)|> assign(:current_email, user.email)|> assign(:email_form, to_form(email_changeset))|> assign(:password_form, to_form(password_changeset))|> assign(:trigger_submit, false){:ok, socket}enddef handle_event("validate_email", params, socket) do%{"current_password" => password, "user" => user_params} = paramsemail_form =socket.assigns.current_user|> Accounts.change_user_email(user_params)|> Map.put(:action, :validate)|> to_form(){:noreply, assign(socket, email_form: email_form, email_form_current_password: password)}enddef handle_event("update_email", params, socket) do%{"current_password" => password, "user" => user_params} = paramsuser = socket.assigns.current_usercase Accounts.apply_user_email(user, password, user_params) do{:ok, applied_user} ->Accounts.deliver_user_update_email_instructions(applied_user,user.email,&url(~p"/accounts/users/settings/confirm_email/#{&1}"))info = "A link to confirm your email change has been sent to the new address."{:noreply, socket |> put_flash(:info, info) |> assign(email_form_current_password: nil)}{:error, changeset} ->{:noreply, assign(socket, :email_form, to_form(Map.put(changeset, :action, :insert)))}endenddef handle_event("validate_password", params, socket) do%{"current_password" => password, "user" => user_params} = paramspassword_form =socket.assigns.current_user|> Accounts.change_user_password(user_params)|> Map.put(:action, :validate)|> to_form(){:noreply, assign(socket, password_form: password_form, current_password: password)}enddef handle_event("update_password", params, socket) do%{"current_password" => password, "user" => user_params} = paramsuser = socket.assigns.current_usercase Accounts.update_user_password(user, password, user_params) do{:ok, user} ->password_form =user|> Accounts.change_user_password(user_params)|> to_form(){:noreply, assign(socket, trigger_submit: true, password_form: password_form)}{:error, changeset} ->{:noreply, assign(socket, password_form: to_form(changeset))}endendend
defmodule ChklstWeb.Accounts.UserResetPasswordLive douse ChklstWeb, :live_viewalias Chklst.Accountsdef render(assigns) do~H"""<div class="mx-auto max-w-sm"><.header class="text-center">Reset Password</.header><.simple_formfor={@form}id="reset_password_form"phx-submit="reset_password"phx-change="validate"><.error :if={@form.errors != []}>Oops, something went wrong! Please check the errors below.</.error><.input field={@form[:password]} type="password" label="New password" required /><.inputfield={@form[:password_confirmation]}type="password"label="Confirm new password"required/><:actions><.button phx-disable-with="Resetting..." class="w-full">Reset Password</.button></:actions></.simple_form><p class="text-center text-sm mt-4"><.link href={~p"/accounts/users/register"}>Register</.link>| <.link href={~p"/accounts/users/log_in"}>Log in</.link></p></div>"""enddef mount(params, _session, socket) dosocket = assign_user_and_token(socket, params)form_source =case socket.assigns do%{user: user} ->Accounts.change_user_password(user)_ ->%{}end{:ok, assign_form(socket, form_source), temporary_assigns: [form: nil]}end# Do not log in the user after reset password to avoid a# leaked token giving the user access to the account.def handle_event("reset_password", %{"user" => user_params}, socket) docase Accounts.reset_user_password(socket.assigns.user, user_params) do{:ok, _} ->{:noreply,socket|> put_flash(:info, "Password reset successfully.")|> redirect(to: ~p"/accounts/users/log_in")}{:error, changeset} ->{:noreply, assign_form(socket, Map.put(changeset, :action, :insert))}endenddef handle_event("validate", %{"user" => user_params}, socket) dochangeset = Accounts.change_user_password(socket.assigns.user, user_params){:noreply, assign_form(socket, Map.put(changeset, :action, :validate))}enddefp assign_user_and_token(socket, %{"token" => token}) doif user = Accounts.get_user_by_reset_password_token(token) doassign(socket, user: user, token: token)elsesocket|> put_flash(:error, "Reset password link is invalid or it has expired.")|> redirect(to: ~p"/")endenddefp assign_form(socket, %{} = source) doassign(socket, :form, to_form(source, as: "user"))endend
defmodule ChklstWeb.Accounts.UserRegistrationLive douse ChklstWeb, :live_viewalias Chklst.Accountsalias Chklst.Accounts.Userdef render(assigns) do~H"""<div class="mx-auto max-w-sm"><.header class="text-center">Register for an account<:subtitle>Already registered?<.link navigate={~p"/accounts/users/log_in"} class="font-semibold text-brand hover:underline">Sign in</.link>to your account now.</:subtitle></.header><.simple_formfor={@form}id="registration_form"phx-submit="save"phx-change="validate"phx-trigger-action={@trigger_submit}action={~p"/accounts/users/log_in?_action=registered"}method="post"><.error :if={@check_errors}>Oops, something went wrong! Please check the errors below.</.error><.input field={@form[:email]} type="email" label="Email" required /><.input field={@form[:password]} type="password" label="Password" required /><:actions><.button phx-disable-with="Creating account..." class="w-full">Create an account</.button></:actions></.simple_form></div>"""enddef mount(_params, _session, socket) dochangeset = Accounts.change_user_registration(%User{})socket =socket|> assign(trigger_submit: false, check_errors: false)|> assign_form(changeset){:ok, socket, temporary_assigns: [form: nil]}enddef handle_event("save", %{"user" => user_params}, socket) docase Accounts.register_user(user_params) do{:ok, user} ->{:ok, _} =Accounts.deliver_user_confirmation_instructions(user,&url(~p"/accounts/users/confirm/#{&1}"))changeset = Accounts.change_user_registration(user){:noreply, socket |> assign(trigger_submit: true) |> assign_form(changeset)}{:error, %Ecto.Changeset{} = changeset} ->{:noreply, socket |> assign(check_errors: true) |> assign_form(changeset)}endenddef handle_event("validate", %{"user" => user_params}, socket) dochangeset = Accounts.change_user_registration(%User{}, user_params){:noreply, assign_form(socket, Map.put(changeset, :action, :validate))}enddefp assign_form(socket, %Ecto.Changeset{} = changeset) doform = to_form(changeset, as: "user")if changeset.valid? doassign(socket, form: form, check_errors: false)elseassign(socket, form: form)endendend
defmodule ChklstWeb.Accounts.UserLoginLive douse ChklstWeb, :live_viewdef render(assigns) do~H"""<div class="mx-auto max-w-sm"><.header class="text-center">Sign in to account<:subtitle>Don't have an account?<.link navigate={~p"/accounts/users/register"} class="font-semibold text-brand hover:underline">Sign up</.link>for an account now.</:subtitle></.header><.simple_form for={@form} id="login_form" action={~p"/accounts/users/log_in"} phx-update="ignore"><.input field={@form[:email]} type="email" label="Email" required /><.input field={@form[:password]} type="password" label="Password" required /><:actions><.input field={@form[:remember_me]} type="checkbox" label="Keep me logged in" /><.link href={~p"/accounts/users/reset_password"} class="text-sm font-semibold">Forgot your password?</.link></:actions><:actions><.button phx-disable-with="Signing in..." class="w-full">Sign in <span aria-hidden="true">→</span></.button></:actions></.simple_form></div>"""enddef mount(_params, _session, socket) doemail = live_flash(socket.assigns.flash, :email)form = to_form(%{"email" => email}, as: "user"){:ok, assign(socket, form: form), temporary_assigns: [form: form]}endend
defmodule ChklstWeb.Accounts.UserForgotPasswordLive douse ChklstWeb, :live_viewalias Chklst.Accountsdef render(assigns) do~H"""<div class="mx-auto max-w-sm"><.header class="text-center">Forgot your password?<:subtitle>We'll send a password reset link to your inbox</:subtitle></.header><.simple_form for={@form} id="reset_password_form" phx-submit="send_email"><.input field={@form[:email]} type="email" placeholder="Email" required /><:actions><.button phx-disable-with="Sending..." class="w-full">Send password reset instructions</.button></:actions></.simple_form><p class="text-center text-sm mt-4"><.link href={~p"/accounts/users/register"}>Register</.link>| <.link href={~p"/accounts/users/log_in"}>Log in</.link></p></div>"""enddef mount(_params, _session, socket) do{:ok, assign(socket, form: to_form(%{}, as: "user"))}enddef handle_event("send_email", %{"user" => %{"email" => email}}, socket) doif user = Accounts.get_user_by_email(email) doAccounts.deliver_user_reset_password_instructions(user,&url(~p"/accounts/users/reset_password/#{&1}"))endinfo ="If your email is in our system, you will receive instructions to reset your password shortly."{:noreply,socket|> put_flash(:info, info)|> redirect(to: ~p"/")}endend
defmodule ChklstWeb.Accounts.UserConfirmationLive douse ChklstWeb, :live_viewalias Chklst.Accountsdef render(%{live_action: :edit} = assigns) do~H"""<div class="mx-auto max-w-sm"><.header class="text-center">Confirm Account</.header><.simple_form for={@form} id="confirmation_form" phx-submit="confirm_account"><.input field={@form[:token]} type="hidden" /><:actions><.button phx-disable-with="Confirming..." class="w-full">Confirm my account</.button></:actions></.simple_form><p class="text-center mt-4"><.link href={~p"/accounts/users/register"}>Register</.link>| <.link href={~p"/accounts/users/log_in"}>Log in</.link></p></div>"""enddef mount(%{"token" => token}, _session, socket) doform = to_form(%{"token" => token}, as: "user"){:ok, assign(socket, form: form), temporary_assigns: [form: nil]}end# Do not log in the user after confirmation to avoid a# leaked token giving the user access to the account.def handle_event("confirm_account", %{"user" => %{"token" => token}}, socket) docase Accounts.confirm_user(token) do{:ok, _} ->{:noreply,socket|> put_flash(:info, "User confirmed successfully.")|> redirect(to: ~p"/")}:error -># If there is a current user and the account was already confirmed,# then odds are that the confirmation link was already visited, either# by some automation or by the user themselves, so we redirect without# a warning message.case socket.assigns do%{current_user: %{confirmed_at: confirmed_at}} when not is_nil(confirmed_at) ->{:noreply, redirect(socket, to: ~p"/")}%{} ->{:noreply,socket|> put_flash(:error, "User confirmation link is invalid or it has expired.")|> redirect(to: ~p"/")}endendendend
defmodule ChklstWeb.Accounts.UserConfirmationInstructionsLive douse ChklstWeb, :live_viewalias Chklst.Accountsdef render(assigns) do~H"""<div class="mx-auto max-w-sm"><.header class="text-center">No confirmation instructions received?<:subtitle>We'll send a new confirmation link to your inbox</:subtitle></.header><.simple_form for={@form} id="resend_confirmation_form" phx-submit="send_instructions"><.input field={@form[:email]} type="email" placeholder="Email" required /><:actions><.button phx-disable-with="Sending..." class="w-full">Resend confirmation instructions</.button></:actions></.simple_form><p class="text-center mt-4"><.link href={~p"/accounts/users/register"}>Register</.link>| <.link href={~p"/accounts/users/log_in"}>Log in</.link></p></div>"""enddef mount(_params, _session, socket) do{:ok, assign(socket, form: to_form(%{}, as: "user"))}enddef handle_event("send_instructions", %{"user" => %{"email" => email}}, socket) doif user = Accounts.get_user_by_email(email) doAccounts.deliver_user_confirmation_instructions(user,&url(~p"/accounts/users/confirm/#{&1}"))endinfo ="If your email is in our system and it has not been confirmed yet, you will receive an email with instructions shortly."{:noreply,socket|> put_flash(:info, info)|> redirect(to: ~p"/")}endend
defmodule ChklstWeb.Accounts.UserSessionController douse ChklstWeb, :controlleralias Chklst.Accountsalias ChklstWeb.Accounts.UserAuthdef create(conn, %{"_action" => "registered"} = params) docreate(conn, params, "Account created successfully!")enddef create(conn, %{"_action" => "password_updated"} = params) doconn|> put_session(:user_return_to, ~p"/accounts/users/settings")|> create(params, "Password updated successfully!")enddef create(conn, params) docreate(conn, params, "Welcome back!")enddefp create(conn, %{"user" => user_params}, info) do%{"email" => email, "password" => password} = user_paramsif user = Accounts.get_user_by_email_and_password(email, password) doconn|> put_flash(:info, info)|> UserAuth.log_in_user(user, user_params)else# In order to prevent user enumeration attacks, don't disclose whether the email is registered.conn|> put_flash(:error, "Invalid email or password")|> put_flash(:email, String.slice(email, 0, 160))|> redirect(to: ~p"/accounts/users/log_in")endenddef delete(conn, _params) doconn|> put_flash(:info, "Logged out successfully.")|> UserAuth.log_out_user()endend
<ul class="relative z-10 flex items-center gap-4 px-4 sm:px-6 lg:px-8 justify-end"><%= if @current_user do %><li class="text-[0.8125rem] leading-6 text-zinc-900"><%= @current_user.email %></li><li><.linkhref={~p"/accounts/users/settings"}class="text-[0.8125rem] leading-6 text-zinc-900 font-semibold hover:text-zinc-700">Settings</.link></li><li><.linkhref={~p"/accounts/users/log_out"}method="delete"class="text-[0.8125rem] leading-6 text-zinc-900 font-semibold hover:text-zinc-700">Log out</.link></li><% else %><li><.linkhref={~p"/accounts/users/register"}class="text-[0.8125rem] leading-6 text-zinc-900 font-semibold hover:text-zinc-700">Register</.link></li><li><.linkhref={~p"/accounts/users/log_in"}class="text-[0.8125rem] leading-6 text-zinc-900 font-semibold hover:text-zinc-700">Log in</.link></li><% end %></ul>
defmodule ChklstWeb.Accounts.UserAuth douse ChklstWeb, :verified_routesimport Plug.Connimport Phoenix.Controlleralias Chklst.Accounts# Make the remember me cookie valid for 60 days.# If you want bump or reduce this value, also change# the token expiry itself in UserToken.@max_age 60 * 60 * 24 * 60@remember_me_cookie "_chklst_web_user_remember_me"@remember_me_options [sign: true, max_age: @max_age, same_site: "Lax"]@doc """Logs the user in.It renews the session ID and clears the whole sessionto avoid fixation attacks. See the renew_sessionfunction to customize this behaviour.It also sets a `:live_socket_id` key in the session,so LiveView sessions are identified and automaticallydisconnected on log out. The line can be safely removedif you are not using LiveView."""def log_in_user(conn, user, params \\ %{}) dotoken = Accounts.generate_user_session_token(user)user_return_to = get_session(conn, :user_return_to)conn|> renew_session()|> put_token_in_session(token)|> maybe_write_remember_me_cookie(token, params)|> redirect(to: user_return_to || signed_in_path(conn))enddefp maybe_write_remember_me_cookie(conn, token, %{"remember_me" => "true"}) doput_resp_cookie(conn, @remember_me_cookie, token, @remember_me_options)enddefp maybe_write_remember_me_cookie(conn, _token, _params) doconnend# This function renews the session ID and erases the whole# session to avoid fixation attacks. If there is any data# in the session you may want to preserve after log in/log out,# you must explicitly fetch the session data before clearing# and then immediately set it after clearing, for example:## defp renew_session(conn) do# preferred_locale = get_session(conn, :preferred_locale)## conn# |> configure_session(renew: true)# |> clear_session()# |> put_session(:preferred_locale, preferred_locale)# end#defp renew_session(conn) doconn|> configure_session(renew: true)|> clear_session()end@doc """Logs the user out.It clears all session data for safety. See renew_session."""def log_out_user(conn) douser_token = get_session(conn, :user_token)user_token && Accounts.delete_user_session_token(user_token)if live_socket_id = get_session(conn, :live_socket_id) doChklstWeb.Endpoint.broadcast(live_socket_id, "disconnect", %{})endconn|> renew_session()|> delete_resp_cookie(@remember_me_cookie)|> redirect(to: ~p"/")end@doc """Authenticates the user by looking into the sessionand remember me token."""def fetch_current_user(conn, _opts) do{user_token, conn} = ensure_user_token(conn)user = user_token && Accounts.get_user_by_session_token(user_token)assign(conn, :current_user, user)enddefp ensure_user_token(conn) doif token = get_session(conn, :user_token) do{token, conn}elseconn = fetch_cookies(conn, signed: [@remember_me_cookie])if token = conn.cookies[@remember_me_cookie] do{token, put_token_in_session(conn, token)}else{nil, conn}endendend@doc """Handles mounting and authenticating the current_user in LiveViews.## `on_mount` arguments* `:mount_current_user` - Assigns current_userto socket assigns based on user_token, or nil ifthere's no user_token or no matching user.* `:ensure_authenticated` - Authenticates the user from the session,and assigns the current_user to socket assigns basedon user_token.Redirects to login page if there's no logged user.* `:redirect_if_user_is_authenticated` - Authenticates the user from the session.Redirects to signed_in_path if there's a logged user.## ExamplesUse the `on_mount` lifecycle macro in LiveViews to mount or authenticatethe current_user:defmodule ChklstWeb.PageLive douse ChklstWeb, :live_viewon_mount {ChklstWeb.Accounts.UserAuth, :mount_current_user}...endOr use the `live_session` of your router to invoke the on_mount callback:live_session :authenticated, on_mount: [{ChklstWeb.Accounts.UserAuth, :ensure_authenticated}] dolive "/profile", ProfileLive, :indexend"""def on_mount(:mount_current_user, _params, session, socket) do{:cont, mount_current_user(socket, session)}enddef on_mount(:ensure_authenticated, _params, session, socket) dosocket = mount_current_user(socket, session)if socket.assigns.current_user do{:cont, socket}elsesocket =socket|> Phoenix.LiveView.put_flash(:error, "You must log in to access this page.")|> Phoenix.LiveView.redirect(to: ~p"/accounts/users/log_in"){:halt, socket}endenddef on_mount(:redirect_if_user_is_authenticated, _params, session, socket) dosocket = mount_current_user(socket, session)if socket.assigns.current_user do{:halt, Phoenix.LiveView.redirect(socket, to: signed_in_path(socket))}else{:cont, socket}endenddefp mount_current_user(socket, session) doPhoenix.Component.assign_new(socket, :current_user, fn ->if user_token = session["user_token"] doAccounts.get_user_by_session_token(user_token)endend)end@doc """Used for routes that require the user to not be authenticated."""def redirect_if_user_is_authenticated(conn, _opts) doif conn.assigns[:current_user] doconn|> redirect(to: signed_in_path(conn))|> halt()elseconnendend@doc """Used for routes that require the user to be authenticated.If you want to enforce the user email is confirmed beforethey use the application at all, here would be a good place."""def require_authenticated_user(conn, _opts) doif conn.assigns[:current_user] doconnelseconn|> put_flash(:error, "You must log in to access this page.")|> maybe_store_return_to()|> redirect(to: ~p"/accounts/users/log_in")|> halt()endenddefp put_token_in_session(conn, token) doconn|> put_session(:user_token, token)|> put_session(:live_socket_id, "users_sessions:#{Base.url_encode64(token)}")enddefp maybe_store_return_to(%{method: "GET"} = conn) doput_session(conn, :user_return_to, current_path(conn))enddefp maybe_store_return_to(conn), do: conndefp signed_in_path(_conn), do: ~p"/"end
defmodule Chklst.Accounts do@moduledoc """The Accounts context."""import Ecto.Query, warn: falsealias Chklst.Repoalias Chklst.Accounts.{User, UserToken, UserNotifier}## Database getters@doc """Gets a user by email.## Examplesiex> get_user_by_email("foo@example.com")%User{}iex> get_user_by_email("unknown@example.com")nil"""def get_user_by_email(email) when is_binary(email) doRepo.get_by(User, email: email)end@doc """Gets a user by email and password.## Examplesiex> get_user_by_email_and_password("foo@example.com", "correct_password")%User{}iex> get_user_by_email_and_password("foo@example.com", "invalid_password")nil"""def get_user_by_email_and_password(email, password)when is_binary(email) and is_binary(password) douser = Repo.get_by(User, email: email)if User.valid_password?(user, password), do: userend@doc """Gets a single user.Raises `Ecto.NoResultsError` if the User does not exist.## Examplesiex> get_user!(123)%User{}iex> get_user!(456)** (Ecto.NoResultsError)"""def get_user!(id), do: Repo.get!(User, id)## User registration@doc """Registers a user.## Examplesiex> register_user(%{field: value}){:ok, %User{}}iex> register_user(%{field: bad_value}){:error, %Ecto.Changeset{}}"""def register_user(attrs) do%User{}|> User.registration_changeset(attrs)|> Repo.insert()end@doc """Returns an `%Ecto.Changeset{}` for tracking user changes.## Examplesiex> change_user_registration(user)%Ecto.Changeset{data: %User{}}"""def change_user_registration(%User{} = user, attrs \\ %{}) doUser.registration_changeset(user, attrs, hash_password: false, validate_email: false)end## Settings@doc """Returns an `%Ecto.Changeset{}` for changing the user email.## Examplesiex> change_user_email(user)%Ecto.Changeset{data: %User{}}"""def change_user_email(user, attrs \\ %{}) doUser.email_changeset(user, attrs, validate_email: false)end@doc """Emulates that the email will change without actually changingit in the database.## Examplesiex> apply_user_email(user, "valid password", %{email: ...}){:ok, %User{}}iex> apply_user_email(user, "invalid password", %{email: ...}){:error, %Ecto.Changeset{}}"""def apply_user_email(user, password, attrs) douser|> User.email_changeset(attrs)|> User.validate_current_password(password)|> Ecto.Changeset.apply_action(:update)end@doc """Updates the user email using the given token.If the token matches, the user email is updated and the token is deleted.The confirmed_at date is also updated to the current time."""def update_user_email(user, token) docontext = "change:#{user.email}"with {:ok, query} <- UserToken.verify_change_email_token_query(token, context),%UserToken{sent_to: email} <- Repo.one(query),{:ok, _} <- Repo.transaction(user_email_multi(user, email, context)) do:okelse_ -> :errorendenddefp user_email_multi(user, email, context) dochangeset =user|> User.email_changeset(%{email: email})|> User.confirm_changeset()Ecto.Multi.new()|> Ecto.Multi.update(:user, changeset)|> Ecto.Multi.delete_all(:tokens, UserToken.by_user_and_contexts_query(user, [context]))end@doc ~S"""Delivers the update email instructions to the given user.## Examplesiex> deliver_user_update_email_instructions(user, current_email, &url(~p"/accounts/users/settings/confirm_email/#{&1})"){:ok, %{to: ..., body: ...}}"""def deliver_user_update_email_instructions(%User{} = user, current_email, update_email_url_fun)when is_function(update_email_url_fun, 1) do{encoded_token, user_token} = UserToken.build_email_token(user, "change:#{current_email}")Repo.insert!(user_token)UserNotifier.deliver_update_email_instructions(user, update_email_url_fun.(encoded_token))end@doc """Returns an `%Ecto.Changeset{}` for changing the user password.## Examplesiex> change_user_password(user)%Ecto.Changeset{data: %User{}}"""def change_user_password(user, attrs \\ %{}) doUser.password_changeset(user, attrs, hash_password: false)end@doc """Updates the user password.## Examplesiex> update_user_password(user, "valid password", %{password: ...}){:ok, %User{}}iex> update_user_password(user, "invalid password", %{password: ...}){:error, %Ecto.Changeset{}}"""def update_user_password(user, password, attrs) dochangeset =user|> User.password_changeset(attrs)|> User.validate_current_password(password)Ecto.Multi.new()|> Ecto.Multi.update(:user, changeset)|> Ecto.Multi.delete_all(:tokens, UserToken.by_user_and_contexts_query(user, :all))|> Repo.transaction()|> case do{:ok, %{user: user}} -> {:ok, user}{:error, :user, changeset, _} -> {:error, changeset}endend## Session@doc """Generates a session token."""def generate_user_session_token(user) do{token, user_token} = UserToken.build_session_token(user)Repo.insert!(user_token)tokenend@doc """Gets the user with the given signed token."""def get_user_by_session_token(token) do{:ok, query} = UserToken.verify_session_token_query(token)Repo.one(query)end@doc """Deletes the signed token with the given context."""def delete_user_session_token(token) doRepo.delete_all(UserToken.by_token_and_context_query(token, "session")):okend## Confirmation@doc ~S"""Delivers the confirmation email instructions to the given user.## Examplesiex> deliver_user_confirmation_instructions(user, &url(~p"/accounts/users/confirm/#{&1}")){:ok, %{to: ..., body: ...}}iex> deliver_user_confirmation_instructions(confirmed_user, &url(~p"/accounts/users/confirm/#{&1}")){:error, :already_confirmed}"""def deliver_user_confirmation_instructions(%User{} = user, confirmation_url_fun)when is_function(confirmation_url_fun, 1) doif user.confirmed_at do{:error, :already_confirmed}else{encoded_token, user_token} = UserToken.build_email_token(user, "confirm")Repo.insert!(user_token)UserNotifier.deliver_confirmation_instructions(user, confirmation_url_fun.(encoded_token))endend@doc """Confirms a user by the given token.If the token matches, the user account is marked as confirmedand the token is deleted."""def confirm_user(token) dowith {:ok, query} <- UserToken.verify_email_token_query(token, "confirm"),%User{} = user <- Repo.one(query),{:ok, %{user: user}} <- Repo.transaction(confirm_user_multi(user)) do{:ok, user}else_ -> :errorendenddefp confirm_user_multi(user) doEcto.Multi.new()|> Ecto.Multi.update(:user, User.confirm_changeset(user))|> Ecto.Multi.delete_all(:tokens, UserToken.by_user_and_contexts_query(user, ["confirm"]))end## Reset password@doc ~S"""Delivers the reset password email to the given user.## Examplesiex> deliver_user_reset_password_instructions(user, &url(~p"/accounts/users/reset_password/#{&1}")){:ok, %{to: ..., body: ...}}"""def deliver_user_reset_password_instructions(%User{} = user, reset_password_url_fun)when is_function(reset_password_url_fun, 1) do{encoded_token, user_token} = UserToken.build_email_token(user, "reset_password")Repo.insert!(user_token)UserNotifier.deliver_reset_password_instructions(user, reset_password_url_fun.(encoded_token))end@doc """Gets the user by reset password token.## Examplesiex> get_user_by_reset_password_token("validtoken")%User{}iex> get_user_by_reset_password_token("invalidtoken")nil"""def get_user_by_reset_password_token(token) dowith {:ok, query} <- UserToken.verify_email_token_query(token, "reset_password"),%User{} = user <- Repo.one(query) douserelse_ -> nilendend@doc """Resets the user password.## Examplesiex> reset_user_password(user, %{password: "new long password", password_confirmation: "new long password"}){:ok, %User{}}iex> reset_user_password(user, %{password: "valid", password_confirmation: "not the same"}){:error, %Ecto.Changeset{}}"""def reset_user_password(user, attrs) doEcto.Multi.new()|> Ecto.Multi.update(:user, User.password_changeset(user, attrs))|> Ecto.Multi.delete_all(:tokens, UserToken.by_user_and_contexts_query(user, :all))|> Repo.transaction()|> case do{:ok, %{user: user}} -> {:ok, user}{:error, :user, changeset, _} -> {:error, changeset}endendend
defmodule Chklst.Accounts.UserToken douse Ecto.Schemaimport Ecto.Queryalias Chklst.Accounts.UserToken@hash_algorithm :sha256@rand_size 32# It is very important to keep the reset password token expiry short,# since someone with access to the email may take over the account.@reset_password_validity_in_days 1@confirm_validity_in_days 7@change_email_validity_in_days 7@session_validity_in_days 60@primary_key {:id, :binary_id, autogenerate: true}@foreign_key_type :binary_idschema "users_tokens" dofield :token, :binaryfield :context, :stringfield :sent_to, :stringbelongs_to :user, Chklst.Accounts.Usertimestamps(updated_at: false)end@doc """Generates a token that will be stored in a signed place,such as session or cookie. As they are signed, thosetokens do not need to be hashed.The reason why we store session tokens in the database, eventhough Phoenix already provides a session cookie, is becausePhoenix' default session cookies are not persisted, they aresimply signed and potentially encrypted. This means they arevalid indefinitely, unless you change the signing/encryptionsalt.Therefore, storing them allows individual usersessions to be expired. The token system can also be extendedto store additional data, such as the device used for logging in.You could then use this information to display all valid sessionsand devices in the UI and allow users to explicitly expire anysession they deem invalid."""def build_session_token(user) dotoken = :crypto.strong_rand_bytes(@rand_size){token, %UserToken{token: token, context: "session", user_id: user.id}}end@doc """Checks if the token is valid and returns its underlying lookup query.The query returns the user found by the token, if any.The token is valid if it matches the value in the database and it hasnot expired (after @session_validity_in_days)."""def verify_session_token_query(token) doquery =from token in by_token_and_context_query(token, "session"),join: user in assoc(token, :user),where: token.inserted_at > ago(@session_validity_in_days, "day"),select: user{:ok, query}end@doc """Builds a token and its hash to be delivered to the user's email.The non-hashed token is sent to the user email while thehashed part is stored in the database. The original token cannot be reconstructed,which means anyone with read-only access to the database cannot directly usethe token in the application to gain access. Furthermore, if the user changestheir email in the system, the tokens sent to the previous email are no longervalid.Users can easily adapt the existing code to provide other types of delivery methods,for example, by phone numbers."""def build_email_token(user, context) dobuild_hashed_token(user, context, user.email)enddefp build_hashed_token(user, context, sent_to) dotoken = :crypto.strong_rand_bytes(@rand_size)hashed_token = :crypto.hash(@hash_algorithm, token){Base.url_encode64(token, padding: false),%UserToken{token: hashed_token,context: context,sent_to: sent_to,user_id: user.id}}end@doc """Checks if the token is valid and returns its underlying lookup query.The query returns the user found by the token, if any.The given token is valid if it matches its hashed counterpart in thedatabase and the user email has not changed. This function also checksif the token is being used within a certain period, depending on thecontext. The default contexts supported by this function are either"confirm", for account confirmation emails, and "reset_password",for resetting the password. For verifying requests to change the email,see `verify_change_email_token_query/2`."""def verify_email_token_query(token, context) docase Base.url_decode64(token, padding: false) do{:ok, decoded_token} ->hashed_token = :crypto.hash(@hash_algorithm, decoded_token)days = days_for_context(context)query =from token in by_token_and_context_query(hashed_token, context),join: user in assoc(token, :user),where: token.inserted_at > ago(^days, "day") and token.sent_to == user.email,select: user{:ok, query}:error ->:errorendenddefp days_for_context("confirm"), do: @confirm_validity_in_daysdefp days_for_context("reset_password"), do: @reset_password_validity_in_days@doc """Checks if the token is valid and returns its underlying lookup query.The query returns the user found by the token, if any.This is used to validate requests to change the useremail. It is different from `verify_email_token_query/2` precisely because`verify_email_token_query/2` validates the email has not changed, which isthe starting point by this function.The given token is valid if it matches its hashed counterpart in thedatabase and if it has not expired (after @change_email_validity_in_days).The context must always start with "change:"."""def verify_change_email_token_query(token, "change:" <> _ = context) docase Base.url_decode64(token, padding: false) do{:ok, decoded_token} ->hashed_token = :crypto.hash(@hash_algorithm, decoded_token)query =from token in by_token_and_context_query(hashed_token, context),where: token.inserted_at > ago(@change_email_validity_in_days, "day"){:ok, query}:error ->:errorendend@doc """Returns the token struct for the given token value and context."""def by_token_and_context_query(token, context) dofrom UserToken, where: [token: ^token, context: ^context]end@doc """Gets all tokens for the given user for the given contexts."""def by_user_and_contexts_query(user, :all) dofrom t in UserToken, where: t.user_id == ^user.idenddef by_user_and_contexts_query(user, [_ | _] = contexts) dofrom t in UserToken, where: t.user_id == ^user.id and t.context in ^contextsendend
defmodule Chklst.Accounts.UserNotifier doimport Swoosh.Emailalias Chklst.Mailer# Delivers the email using the application mailer.defp deliver(recipient, subject, body) doemail =new()|> to(recipient)|> from({"Chklst", "contact@example.com"})|> subject(subject)|> text_body(body)with {:ok, _metadata} <- Mailer.deliver(email) do{:ok, email}endend@doc """Deliver instructions to confirm account."""def deliver_confirmation_instructions(user, url) dodeliver(user.email, "Confirmation instructions", """==============================Hi #{user.email},You can confirm your account by visiting the URL below:#{url}If you didn't create an account with us, please ignore this.==============================""")end@doc """Deliver instructions to reset a user password."""def deliver_reset_password_instructions(user, url) dodeliver(user.email, "Reset password instructions", """==============================Hi #{user.email},You can reset your password by visiting the URL below:#{url}If you didn't request this change, please ignore this.==============================""")end@doc """Deliver instructions to update a user email."""def deliver_update_email_instructions(user, url) dodeliver(user.email, "Update email instructions", """==============================Hi #{user.email},You can change your email by visiting the URL below:#{url}If you didn't request this change, please ignore this.==============================""")endend
defmodule Chklst.Accounts.User douse Ecto.Schemaimport Ecto.Changeset@primary_key {:id, :binary_id, autogenerate: true}@foreign_key_type :binary_idschema "users" dofield :email, :stringfield :password, :string, virtual: true, redact: truefield :hashed_password, :string, redact: truefield :confirmed_at, :naive_datetimetimestamps(type: :utc_datetime)end@doc """A user changeset for registration.It is important to validate the length of both email and password.Otherwise databases may truncate the email without warnings, whichcould lead to unpredictable or insecure behaviour. Long passwords mayalso be very expensive to hash for certain algorithms.## Options* `:hash_password` - Hashes the password so it can be stored securelyin the database and ensures the password field is cleared to preventleaks in the logs. If password hashing is not needed and clearing thepassword field is not desired (like when using this changeset forvalidations on a LiveView form), this option can be set to `false`.Defaults to `true`.* `:validate_email` - Validates the uniqueness of the email, in caseyou don't want to validate the uniqueness of the email (like whenusing this changeset for validations on a LiveView form beforesubmitting the form), this option can be set to `false`.Defaults to `true`."""def registration_changeset(user, attrs, opts \\ []) douser|> cast(attrs, [:email, :password])|> validate_email(opts)|> validate_password(opts)enddefp validate_email(changeset, opts) dochangeset|> validate_required([:email])|> validate_format(:email, ~r/^[^\s]+@[^\s]+$/, message: "must have the @ sign and no spaces")|> validate_length(:email, max: 160)|> maybe_validate_unique_email(opts)enddefp validate_password(changeset, opts) dochangeset|> validate_required([:password])|> validate_length(:password, min: 12, max: 72)# Examples of additional password validation:# |> validate_format(:password, ~r/[a-z]/, message: "at least one lower case character")# |> validate_format(:password, ~r/[A-Z]/, message: "at least one upper case character")# |> validate_format(:password, ~r/[!?@#$%^&*_0-9]/, message: "at least one digit or punctuation character")|> maybe_hash_password(opts)enddefp maybe_hash_password(changeset, opts) dohash_password? = Keyword.get(opts, :hash_password, true)password = get_change(changeset, :password)if hash_password? && password && changeset.valid? dochangeset# Hashing could be done with `Ecto.Changeset.prepare_changes/2`, but that# would keep the database transaction open longer and hurt performance.|> put_change(:hashed_password, Argon2.hash_pwd_salt(password))|> delete_change(:password)elsechangesetendenddefp maybe_validate_unique_email(changeset, opts) doif Keyword.get(opts, :validate_email, true) dochangeset|> unsafe_validate_unique(:email, Chklst.Repo)|> unique_constraint(:email)elsechangesetendend@doc """A user changeset for changing the email.It requires the email to change otherwise an error is added."""def email_changeset(user, attrs, opts \\ []) douser|> cast(attrs, [:email])|> validate_email(opts)|> case do%{changes: %{email: _}} = changeset -> changeset%{} = changeset -> add_error(changeset, :email, "did not change")endend@doc """A user changeset for changing the password.## Options* `:hash_password` - Hashes the password so it can be stored securelyin the database and ensures the password field is cleared to preventleaks in the logs. If password hashing is not needed and clearing thepassword field is not desired (like when using this changeset forvalidations on a LiveView form), this option can be set to `false`.Defaults to `true`."""def password_changeset(user, attrs, opts \\ []) douser|> cast(attrs, [:password])|> validate_confirmation(:password, message: "does not match password")|> validate_password(opts)end@doc """Confirms the account by setting `confirmed_at`."""def confirm_changeset(user) donow = NaiveDateTime.utc_now() |> NaiveDateTime.truncate(:second)change(user, confirmed_at: now)end@doc """Verifies the password.If there is no user or the user doesn't have a password, we call`Argon2.no_user_verify/0` to avoid timing attacks."""def valid_password?(%Chklst.Accounts.User{hashed_password: hashed_password}, password)when is_binary(hashed_password) and byte_size(password) > 0 doArgon2.verify_pass(password, hashed_password)enddef valid_password?(_, _) doArgon2.no_user_verify()falseend@doc """Validates the current password otherwise adds an error to the changeset."""def validate_current_password(changeset, password) doif valid_password?(changeset.data, password) dochangesetelseadd_error(changeset, :current_password, "is not valid")endendend