berrypod/lib/berrypod_web/controllers/user_session_controller.ex
jamey 32cc425458
All checks were successful
deploy / deploy (push) Successful in 3m28s
separate account settings from shop settings
- Create dedicated /admin/account page for user account management
- Move email, password, and 2FA settings from /admin/settings
- Add Account link to top of admin sidebar navigation
- Add TOTP-based two-factor authentication with NimbleTOTP
- Add TOTP verification LiveView for login flow
- Add AccountController for TOTP session management
- Remove Advanced section from settings (duplicated in dev tools)
- Remove user email from sidebar footer (replaced by Account link)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-03-08 18:42:29 +00:00

119 lines
3.6 KiB
Elixir

defmodule BerrypodWeb.UserSessionController do
use BerrypodWeb, :controller
alias Berrypod.Accounts
alias BerrypodWeb.UserAuth
plug BerrypodWeb.Plugs.RateLimit, [type: :login] when action in [:create, :verify_totp]
def create(conn, %{"_action" => "confirmed"} = params) do
create(conn, params, "User confirmed successfully.")
end
def create(conn, params) do
create(conn, params, "Welcome back!")
end
# magic link login
defp create(conn, %{"user" => %{"token" => token} = user_params} = params, info) do
case Accounts.login_user_by_magic_link(token) do
{:ok, {user, tokens_to_disconnect}} ->
UserAuth.disconnect_sessions(tokens_to_disconnect)
conn
|> maybe_store_return_to(params)
|> maybe_require_totp(user, user_params, info)
_ ->
conn
|> put_flash(:error, "The link is invalid or it has expired.")
|> redirect(to: ~p"/users/log-in")
end
end
# email + password login
defp create(conn, %{"user" => user_params} = params, info) do
%{"email" => email, "password" => password} = user_params
if user = Accounts.get_user_by_email_and_password(email, password) do
conn
|> maybe_store_return_to(params)
|> maybe_require_totp(user, user_params, info)
else
# In order to prevent user enumeration attacks, don't disclose whether the email is registered.
conn
|> put_flash(:error, "Invalid email or password")
|> put_flash(:email, String.slice(email, 0, 160))
|> redirect(to: ~p"/users/log-in")
end
end
defp maybe_store_return_to(conn, %{"return_to" => "/" <> _ = return_to}) do
put_session(conn, :user_return_to, return_to)
end
defp maybe_store_return_to(conn, _params), do: conn
defp maybe_require_totp(conn, user, user_params, info) do
if Accounts.totp_enabled?(user) do
remember_me = user_params["remember_me"] == "true"
conn
|> put_session(:totp_pending_user_id, user.id)
|> put_session(:totp_pending_remember_me, remember_me)
|> redirect(to: ~p"/users/totp")
else
conn
|> put_flash(:info, info)
|> UserAuth.log_in_user(user, user_params)
end
end
def verify_totp(conn, %{"totp" => %{"code" => code}, "remember_me" => remember_me}) do
user_id = get_session(conn, :totp_pending_user_id)
if user_id do
user = Accounts.get_user!(user_id)
case Accounts.verify_totp(user, code) do
:ok ->
user_params = if remember_me == "true", do: %{"remember_me" => "true"}, else: %{}
conn
|> delete_session(:totp_pending_user_id)
|> delete_session(:totp_pending_remember_me)
|> put_flash(:info, "Welcome back!")
|> UserAuth.log_in_user(user, user_params)
:error ->
conn
|> put_flash(:error, "Invalid code. Please try again.")
|> redirect(to: ~p"/users/totp")
end
else
conn
|> put_flash(:error, "Session expired. Please log in again.")
|> redirect(to: ~p"/users/log-in")
end
end
def update_password(conn, %{"user" => user_params} = params) do
user = conn.assigns.current_scope.user
true = Accounts.sudo_mode?(user)
{:ok, {_user, expired_tokens}} = Accounts.update_user_password(user, user_params)
# disconnect all existing LiveViews with old sessions
UserAuth.disconnect_sessions(expired_tokens)
conn
|> put_session(:user_return_to, ~p"/admin/account")
|> create(params, "Password updated successfully!")
end
def delete(conn, _params) do
conn
|> put_flash(:info, "Logged out successfully.")
|> UserAuth.log_out_user()
end
end