2026-02-18 21:23:15 +00:00
|
|
|
defmodule BerrypodWeb.UserSessionController do
|
|
|
|
|
use BerrypodWeb, :controller
|
2025-12-30 12:26:46 +00:00
|
|
|
|
2026-02-18 21:23:15 +00:00
|
|
|
alias Berrypod.Accounts
|
|
|
|
|
alias BerrypodWeb.UserAuth
|
2025-12-30 12:26:46 +00:00
|
|
|
|
2026-03-08 18:42:29 +00:00
|
|
|
plug BerrypodWeb.Plugs.RateLimit, [type: :login] when action in [:create, :verify_totp]
|
2026-03-08 08:58:43 +00:00
|
|
|
|
2025-12-30 12:26:46 +00:00
|
|
|
def create(conn, %{"_action" => "confirmed"} = params) do
|
|
|
|
|
create(conn, params, "User confirmed successfully.")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
def create(conn, params) do
|
|
|
|
|
create(conn, params, "Welcome back!")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
# magic link login
|
2026-03-08 18:42:29 +00:00
|
|
|
defp create(conn, %{"user" => %{"token" => token} = user_params} = params, info) do
|
2025-12-30 12:26:46 +00:00
|
|
|
case Accounts.login_user_by_magic_link(token) do
|
|
|
|
|
{:ok, {user, tokens_to_disconnect}} ->
|
|
|
|
|
UserAuth.disconnect_sessions(tokens_to_disconnect)
|
|
|
|
|
|
|
|
|
|
conn
|
2026-03-08 18:42:29 +00:00
|
|
|
|> maybe_store_return_to(params)
|
|
|
|
|
|> maybe_require_totp(user, user_params, info)
|
2025-12-30 12:26:46 +00:00
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
|
conn
|
|
|
|
|
|> put_flash(:error, "The link is invalid or it has expired.")
|
|
|
|
|
|> redirect(to: ~p"/users/log-in")
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
# email + password login
|
2026-03-08 18:42:29 +00:00
|
|
|
defp create(conn, %{"user" => user_params} = params, info) do
|
2025-12-30 12:26:46 +00:00
|
|
|
%{"email" => email, "password" => password} = user_params
|
|
|
|
|
|
|
|
|
|
if user = Accounts.get_user_by_email_and_password(email, password) do
|
|
|
|
|
conn
|
2026-03-08 18:42:29 +00:00
|
|
|
|> maybe_store_return_to(params)
|
|
|
|
|
|> maybe_require_totp(user, user_params, info)
|
2025-12-30 12:26:46 +00:00
|
|
|
else
|
|
|
|
|
# In order to prevent user enumeration attacks, don't disclose whether the email is registered.
|
|
|
|
|
conn
|
|
|
|
|
|> put_flash(:error, "Invalid email or password")
|
|
|
|
|
|> put_flash(:email, String.slice(email, 0, 160))
|
|
|
|
|
|> redirect(to: ~p"/users/log-in")
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2026-03-08 18:42:29 +00:00
|
|
|
defp maybe_store_return_to(conn, %{"return_to" => "/" <> _ = return_to}) do
|
|
|
|
|
put_session(conn, :user_return_to, return_to)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
defp maybe_store_return_to(conn, _params), do: conn
|
|
|
|
|
|
|
|
|
|
defp maybe_require_totp(conn, user, user_params, info) do
|
|
|
|
|
if Accounts.totp_enabled?(user) do
|
|
|
|
|
remember_me = user_params["remember_me"] == "true"
|
|
|
|
|
|
|
|
|
|
conn
|
|
|
|
|
|> put_session(:totp_pending_user_id, user.id)
|
|
|
|
|
|> put_session(:totp_pending_remember_me, remember_me)
|
|
|
|
|
|> redirect(to: ~p"/users/totp")
|
|
|
|
|
else
|
|
|
|
|
conn
|
|
|
|
|
|> put_flash(:info, info)
|
|
|
|
|
|> UserAuth.log_in_user(user, user_params)
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
def verify_totp(conn, %{"totp" => %{"code" => code}, "remember_me" => remember_me}) do
|
|
|
|
|
user_id = get_session(conn, :totp_pending_user_id)
|
|
|
|
|
|
|
|
|
|
if user_id do
|
|
|
|
|
user = Accounts.get_user!(user_id)
|
|
|
|
|
|
|
|
|
|
case Accounts.verify_totp(user, code) do
|
|
|
|
|
:ok ->
|
|
|
|
|
user_params = if remember_me == "true", do: %{"remember_me" => "true"}, else: %{}
|
|
|
|
|
|
|
|
|
|
conn
|
|
|
|
|
|> delete_session(:totp_pending_user_id)
|
|
|
|
|
|> delete_session(:totp_pending_remember_me)
|
|
|
|
|
|> put_flash(:info, "Welcome back!")
|
|
|
|
|
|> UserAuth.log_in_user(user, user_params)
|
|
|
|
|
|
|
|
|
|
:error ->
|
|
|
|
|
conn
|
|
|
|
|
|> put_flash(:error, "Invalid code. Please try again.")
|
|
|
|
|
|> redirect(to: ~p"/users/totp")
|
|
|
|
|
end
|
|
|
|
|
else
|
|
|
|
|
conn
|
|
|
|
|
|> put_flash(:error, "Session expired. Please log in again.")
|
|
|
|
|
|> redirect(to: ~p"/users/log-in")
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
2025-12-30 12:26:46 +00:00
|
|
|
def update_password(conn, %{"user" => user_params} = params) do
|
|
|
|
|
user = conn.assigns.current_scope.user
|
|
|
|
|
true = Accounts.sudo_mode?(user)
|
|
|
|
|
{:ok, {_user, expired_tokens}} = Accounts.update_user_password(user, user_params)
|
|
|
|
|
|
|
|
|
|
# disconnect all existing LiveViews with old sessions
|
|
|
|
|
UserAuth.disconnect_sessions(expired_tokens)
|
|
|
|
|
|
|
|
|
|
conn
|
2026-03-08 18:42:29 +00:00
|
|
|
|> put_session(:user_return_to, ~p"/admin/account")
|
2025-12-30 12:26:46 +00:00
|
|
|
|> create(params, "Password updated successfully!")
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
def delete(conn, _params) do
|
|
|
|
|
conn
|
|
|
|
|
|> put_flash(:info, "Logged out successfully.")
|
|
|
|
|
|> UserAuth.log_out_user()
|
|
|
|
|
end
|
|
|
|
|
end
|