parent
1cc1a83e34
commit
dad35c5c51
@ -0,0 +1,79 @@
|
|||||||
|
defmodule LinkShortener.Accounts.UserNotifier do
|
||||||
|
import Swoosh.Email
|
||||||
|
|
||||||
|
alias LinkShortener.Mailer
|
||||||
|
|
||||||
|
# Delivers the email using the application mailer.
|
||||||
|
defp deliver(recipient, subject, body) do
|
||||||
|
email =
|
||||||
|
new()
|
||||||
|
|> to(recipient)
|
||||||
|
|> from({"LinkShortener", "contact@example.com"})
|
||||||
|
|> subject(subject)
|
||||||
|
|> text_body(body)
|
||||||
|
|
||||||
|
with {:ok, _metadata} <- Mailer.deliver(email) do
|
||||||
|
{:ok, email}
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Deliver instructions to confirm account.
|
||||||
|
"""
|
||||||
|
def deliver_confirmation_instructions(user, url) do
|
||||||
|
deliver(user.email, "Confirmation instructions", """
|
||||||
|
|
||||||
|
==============================
|
||||||
|
|
||||||
|
Hi #{user.email},
|
||||||
|
|
||||||
|
You can confirm your account by visiting the URL below:
|
||||||
|
|
||||||
|
#{url}
|
||||||
|
|
||||||
|
If you didn't create an account with us, please ignore this.
|
||||||
|
|
||||||
|
==============================
|
||||||
|
""")
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Deliver instructions to reset a user password.
|
||||||
|
"""
|
||||||
|
def deliver_reset_password_instructions(user, url) do
|
||||||
|
deliver(user.email, "Reset password instructions", """
|
||||||
|
|
||||||
|
==============================
|
||||||
|
|
||||||
|
Hi #{user.email},
|
||||||
|
|
||||||
|
You can reset your password by visiting the URL below:
|
||||||
|
|
||||||
|
#{url}
|
||||||
|
|
||||||
|
If you didn't request this change, please ignore this.
|
||||||
|
|
||||||
|
==============================
|
||||||
|
""")
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Deliver instructions to update a user email.
|
||||||
|
"""
|
||||||
|
def deliver_update_email_instructions(user, url) do
|
||||||
|
deliver(user.email, "Update email instructions", """
|
||||||
|
|
||||||
|
==============================
|
||||||
|
|
||||||
|
Hi #{user.email},
|
||||||
|
|
||||||
|
You can change your email by visiting the URL below:
|
||||||
|
|
||||||
|
#{url}
|
||||||
|
|
||||||
|
If you didn't request this change, please ignore this.
|
||||||
|
|
||||||
|
==============================
|
||||||
|
""")
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,179 @@
|
|||||||
|
defmodule LinkShortener.Accounts.UserToken do
|
||||||
|
use Ecto.Schema
|
||||||
|
import Ecto.Query
|
||||||
|
alias LinkShortener.Accounts.UserToken
|
||||||
|
|
||||||
|
@hash_algorithm :sha256
|
||||||
|
@rand_size 32
|
||||||
|
|
||||||
|
# It is very important to keep the reset password token expiry short,
|
||||||
|
# since someone with access to the email may take over the account.
|
||||||
|
@reset_password_validity_in_days 1
|
||||||
|
@confirm_validity_in_days 7
|
||||||
|
@change_email_validity_in_days 7
|
||||||
|
@session_validity_in_days 60
|
||||||
|
|
||||||
|
schema "users_tokens" do
|
||||||
|
field :token, :binary
|
||||||
|
field :context, :string
|
||||||
|
field :sent_to, :string
|
||||||
|
belongs_to :user, LinkShortener.Accounts.User
|
||||||
|
|
||||||
|
timestamps(updated_at: false)
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Generates a token that will be stored in a signed place,
|
||||||
|
such as session or cookie. As they are signed, those
|
||||||
|
tokens do not need to be hashed.
|
||||||
|
|
||||||
|
The reason why we store session tokens in the database, even
|
||||||
|
though Phoenix already provides a session cookie, is because
|
||||||
|
Phoenix' default session cookies are not persisted, they are
|
||||||
|
simply signed and potentially encrypted. This means they are
|
||||||
|
valid indefinitely, unless you change the signing/encryption
|
||||||
|
salt.
|
||||||
|
|
||||||
|
Therefore, storing them allows individual user
|
||||||
|
sessions to be expired. The token system can also be extended
|
||||||
|
to store additional data, such as the device used for logging in.
|
||||||
|
You could then use this information to display all valid sessions
|
||||||
|
and devices in the UI and allow users to explicitly expire any
|
||||||
|
session they deem invalid.
|
||||||
|
"""
|
||||||
|
def build_session_token(user) do
|
||||||
|
token = :crypto.strong_rand_bytes(@rand_size)
|
||||||
|
{token, %UserToken{token: token, context: "session", user_id: user.id}}
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Checks if the token is valid and returns its underlying lookup query.
|
||||||
|
|
||||||
|
The query returns the user found by the token, if any.
|
||||||
|
|
||||||
|
The token is valid if it matches the value in the database and it has
|
||||||
|
not expired (after @session_validity_in_days).
|
||||||
|
"""
|
||||||
|
def verify_session_token_query(token) do
|
||||||
|
query =
|
||||||
|
from token in token_and_context_query(token, "session"),
|
||||||
|
join: user in assoc(token, :user),
|
||||||
|
where: token.inserted_at > ago(@session_validity_in_days, "day"),
|
||||||
|
select: user
|
||||||
|
|
||||||
|
{:ok, query}
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Builds a token and its hash to be delivered to the user's email.
|
||||||
|
|
||||||
|
The non-hashed token is sent to the user email while the
|
||||||
|
hashed part is stored in the database. The original token cannot be reconstructed,
|
||||||
|
which means anyone with read-only access to the database cannot directly use
|
||||||
|
the token in the application to gain access. Furthermore, if the user changes
|
||||||
|
their email in the system, the tokens sent to the previous email are no longer
|
||||||
|
valid.
|
||||||
|
|
||||||
|
Users can easily adapt the existing code to provide other types of delivery methods,
|
||||||
|
for example, by phone numbers.
|
||||||
|
"""
|
||||||
|
def build_email_token(user, context) do
|
||||||
|
build_hashed_token(user, context, user.email)
|
||||||
|
end
|
||||||
|
|
||||||
|
defp build_hashed_token(user, context, sent_to) do
|
||||||
|
token = :crypto.strong_rand_bytes(@rand_size)
|
||||||
|
hashed_token = :crypto.hash(@hash_algorithm, token)
|
||||||
|
|
||||||
|
{Base.url_encode64(token, padding: false),
|
||||||
|
%UserToken{
|
||||||
|
token: hashed_token,
|
||||||
|
context: context,
|
||||||
|
sent_to: sent_to,
|
||||||
|
user_id: user.id
|
||||||
|
}}
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Checks if the token is valid and returns its underlying lookup query.
|
||||||
|
|
||||||
|
The query returns the user found by the token, if any.
|
||||||
|
|
||||||
|
The given token is valid if it matches its hashed counterpart in the
|
||||||
|
database and the user email has not changed. This function also checks
|
||||||
|
if the token is being used within a certain period, depending on the
|
||||||
|
context. The default contexts supported by this function are either
|
||||||
|
"confirm", for account confirmation emails, and "reset_password",
|
||||||
|
for resetting the password. For verifying requests to change the email,
|
||||||
|
see `verify_change_email_token_query/2`.
|
||||||
|
"""
|
||||||
|
def verify_email_token_query(token, context) do
|
||||||
|
case Base.url_decode64(token, padding: false) do
|
||||||
|
{:ok, decoded_token} ->
|
||||||
|
hashed_token = :crypto.hash(@hash_algorithm, decoded_token)
|
||||||
|
days = days_for_context(context)
|
||||||
|
|
||||||
|
query =
|
||||||
|
from token in token_and_context_query(hashed_token, context),
|
||||||
|
join: user in assoc(token, :user),
|
||||||
|
where: token.inserted_at > ago(^days, "day") and token.sent_to == user.email,
|
||||||
|
select: user
|
||||||
|
|
||||||
|
{:ok, query}
|
||||||
|
|
||||||
|
:error ->
|
||||||
|
:error
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
defp days_for_context("confirm"), do: @confirm_validity_in_days
|
||||||
|
defp days_for_context("reset_password"), do: @reset_password_validity_in_days
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Checks if the token is valid and returns its underlying lookup query.
|
||||||
|
|
||||||
|
The query returns the user found by the token, if any.
|
||||||
|
|
||||||
|
This is used to validate requests to change the user
|
||||||
|
email. It is different from `verify_email_token_query/2` precisely because
|
||||||
|
`verify_email_token_query/2` validates the email has not changed, which is
|
||||||
|
the starting point by this function.
|
||||||
|
|
||||||
|
The given token is valid if it matches its hashed counterpart in the
|
||||||
|
database and if it has not expired (after @change_email_validity_in_days).
|
||||||
|
The context must always start with "change:".
|
||||||
|
"""
|
||||||
|
def verify_change_email_token_query(token, "change:" <> _ = context) do
|
||||||
|
case Base.url_decode64(token, padding: false) do
|
||||||
|
{:ok, decoded_token} ->
|
||||||
|
hashed_token = :crypto.hash(@hash_algorithm, decoded_token)
|
||||||
|
|
||||||
|
query =
|
||||||
|
from token in token_and_context_query(hashed_token, context),
|
||||||
|
where: token.inserted_at > ago(@change_email_validity_in_days, "day")
|
||||||
|
|
||||||
|
{:ok, query}
|
||||||
|
|
||||||
|
:error ->
|
||||||
|
:error
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Returns the token struct for the given token value and context.
|
||||||
|
"""
|
||||||
|
def token_and_context_query(token, context) do
|
||||||
|
from UserToken, where: [token: ^token, context: ^context]
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Gets all tokens for the given user for the given contexts.
|
||||||
|
"""
|
||||||
|
def user_and_contexts_query(user, :all) do
|
||||||
|
from t in UserToken, where: t.user_id == ^user.id
|
||||||
|
end
|
||||||
|
|
||||||
|
def user_and_contexts_query(user, [_ | _] = contexts) do
|
||||||
|
from t in UserToken, where: t.user_id == ^user.id and t.context in ^contexts
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,149 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserAuth do
|
||||||
|
import Plug.Conn
|
||||||
|
import Phoenix.Controller
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
alias LinkShortenerWeb.Router.Helpers, as: Routes
|
||||||
|
|
||||||
|
# Make the remember me cookie valid for 60 days.
|
||||||
|
# If you want bump or reduce this value, also change
|
||||||
|
# the token expiry itself in UserToken.
|
||||||
|
@max_age 60 * 60 * 24 * 60
|
||||||
|
@remember_me_cookie "_link_shortener_web_user_remember_me"
|
||||||
|
@remember_me_options [sign: true, max_age: @max_age, same_site: "Lax"]
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Logs the user in.
|
||||||
|
|
||||||
|
It renews the session ID and clears the whole session
|
||||||
|
to avoid fixation attacks. See the renew_session
|
||||||
|
function to customize this behaviour.
|
||||||
|
|
||||||
|
It also sets a `:live_socket_id` key in the session,
|
||||||
|
so LiveView sessions are identified and automatically
|
||||||
|
disconnected on log out. The line can be safely removed
|
||||||
|
if you are not using LiveView.
|
||||||
|
"""
|
||||||
|
def log_in_user(conn, user, params \\ %{}) do
|
||||||
|
token = Accounts.generate_user_session_token(user)
|
||||||
|
user_return_to = get_session(conn, :user_return_to)
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> renew_session()
|
||||||
|
|> put_session(:user_token, token)
|
||||||
|
|> put_session(:live_socket_id, "users_sessions:#{Base.url_encode64(token)}")
|
||||||
|
|> maybe_write_remember_me_cookie(token, params)
|
||||||
|
|> redirect(to: user_return_to || signed_in_path(conn))
|
||||||
|
end
|
||||||
|
|
||||||
|
defp maybe_write_remember_me_cookie(conn, token, %{"remember_me" => "true"}) do
|
||||||
|
put_resp_cookie(conn, @remember_me_cookie, token, @remember_me_options)
|
||||||
|
end
|
||||||
|
|
||||||
|
defp maybe_write_remember_me_cookie(conn, _token, _params) do
|
||||||
|
conn
|
||||||
|
end
|
||||||
|
|
||||||
|
# This function renews the session ID and erases the whole
|
||||||
|
# session to avoid fixation attacks. If there is any data
|
||||||
|
# in the session you may want to preserve after log in/log out,
|
||||||
|
# you must explicitly fetch the session data before clearing
|
||||||
|
# and then immediately set it after clearing, for example:
|
||||||
|
#
|
||||||
|
# defp renew_session(conn) do
|
||||||
|
# preferred_locale = get_session(conn, :preferred_locale)
|
||||||
|
#
|
||||||
|
# conn
|
||||||
|
# |> configure_session(renew: true)
|
||||||
|
# |> clear_session()
|
||||||
|
# |> put_session(:preferred_locale, preferred_locale)
|
||||||
|
# end
|
||||||
|
#
|
||||||
|
defp renew_session(conn) do
|
||||||
|
conn
|
||||||
|
|> configure_session(renew: true)
|
||||||
|
|> clear_session()
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Logs the user out.
|
||||||
|
|
||||||
|
It clears all session data for safety. See renew_session.
|
||||||
|
"""
|
||||||
|
def log_out_user(conn) do
|
||||||
|
user_token = get_session(conn, :user_token)
|
||||||
|
user_token && Accounts.delete_session_token(user_token)
|
||||||
|
|
||||||
|
if live_socket_id = get_session(conn, :live_socket_id) do
|
||||||
|
LinkShortenerWeb.Endpoint.broadcast(live_socket_id, "disconnect", %{})
|
||||||
|
end
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> renew_session()
|
||||||
|
|> delete_resp_cookie(@remember_me_cookie)
|
||||||
|
|> redirect(to: "/")
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Authenticates the user by looking into the session
|
||||||
|
and remember me token.
|
||||||
|
"""
|
||||||
|
def fetch_current_user(conn, _opts) do
|
||||||
|
{user_token, conn} = ensure_user_token(conn)
|
||||||
|
user = user_token && Accounts.get_user_by_session_token(user_token)
|
||||||
|
assign(conn, :current_user, user)
|
||||||
|
end
|
||||||
|
|
||||||
|
defp ensure_user_token(conn) do
|
||||||
|
if user_token = get_session(conn, :user_token) do
|
||||||
|
{user_token, conn}
|
||||||
|
else
|
||||||
|
conn = fetch_cookies(conn, signed: [@remember_me_cookie])
|
||||||
|
|
||||||
|
if user_token = conn.cookies[@remember_me_cookie] do
|
||||||
|
{user_token, put_session(conn, :user_token, user_token)}
|
||||||
|
else
|
||||||
|
{nil, conn}
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Used for routes that require the user to not be authenticated.
|
||||||
|
"""
|
||||||
|
def redirect_if_user_is_authenticated(conn, _opts) do
|
||||||
|
if conn.assigns[:current_user] do
|
||||||
|
conn
|
||||||
|
|> redirect(to: signed_in_path(conn))
|
||||||
|
|> halt()
|
||||||
|
else
|
||||||
|
conn
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
@doc """
|
||||||
|
Used for routes that require the user to be authenticated.
|
||||||
|
|
||||||
|
If you want to enforce the user email is confirmed before
|
||||||
|
they use the application at all, here would be a good place.
|
||||||
|
"""
|
||||||
|
def require_authenticated_user(conn, _opts) do
|
||||||
|
if conn.assigns[:current_user] do
|
||||||
|
conn
|
||||||
|
else
|
||||||
|
conn
|
||||||
|
|> put_flash(:error, "You must log in to access this page.")
|
||||||
|
|> maybe_store_return_to()
|
||||||
|
|> redirect(to: Routes.user_session_path(conn, :new))
|
||||||
|
|> halt()
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
defp maybe_store_return_to(%{method: "GET"} = conn) do
|
||||||
|
put_session(conn, :user_return_to, current_path(conn))
|
||||||
|
end
|
||||||
|
|
||||||
|
defp maybe_store_return_to(conn), do: conn
|
||||||
|
|
||||||
|
defp signed_in_path(_conn), do: "/"
|
||||||
|
end
|
@ -0,0 +1,56 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserConfirmationController do
|
||||||
|
use LinkShortenerWeb, :controller
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
|
||||||
|
def new(conn, _params) do
|
||||||
|
render(conn, "new.html")
|
||||||
|
end
|
||||||
|
|
||||||
|
def create(conn, %{"user" => %{"email" => email}}) do
|
||||||
|
if user = Accounts.get_user_by_email(email) do
|
||||||
|
Accounts.deliver_user_confirmation_instructions(
|
||||||
|
user,
|
||||||
|
&Routes.user_confirmation_url(conn, :edit, &1)
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> put_flash(
|
||||||
|
:info,
|
||||||
|
"If your email is in our system and it has not been confirmed yet, " <>
|
||||||
|
"you will receive an email with instructions shortly."
|
||||||
|
)
|
||||||
|
|> redirect(to: "/")
|
||||||
|
end
|
||||||
|
|
||||||
|
def edit(conn, %{"token" => token}) do
|
||||||
|
render(conn, "edit.html", token: token)
|
||||||
|
end
|
||||||
|
|
||||||
|
# Do not log in the user after confirmation to avoid a
|
||||||
|
# leaked token giving the user access to the account.
|
||||||
|
def update(conn, %{"token" => token}) do
|
||||||
|
case Accounts.confirm_user(token) do
|
||||||
|
{:ok, _} ->
|
||||||
|
conn
|
||||||
|
|> put_flash(:info, "User confirmed successfully.")
|
||||||
|
|> redirect(to: "/")
|
||||||
|
|
||||||
|
:error ->
|
||||||
|
# If there is a current user and the account was already confirmed,
|
||||||
|
# then odds are that the confirmation link was already visited, either
|
||||||
|
# by some automation or by the user themselves, so we redirect without
|
||||||
|
# a warning message.
|
||||||
|
case conn.assigns do
|
||||||
|
%{current_user: %{confirmed_at: confirmed_at}} when not is_nil(confirmed_at) ->
|
||||||
|
redirect(conn, to: "/")
|
||||||
|
|
||||||
|
%{} ->
|
||||||
|
conn
|
||||||
|
|> put_flash(:error, "User confirmation link is invalid or it has expired.")
|
||||||
|
|> redirect(to: "/")
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,30 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserRegistrationController do
|
||||||
|
use LinkShortenerWeb, :controller
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
alias LinkShortener.Accounts.User
|
||||||
|
alias LinkShortenerWeb.UserAuth
|
||||||
|
|
||||||
|
def new(conn, _params) do
|
||||||
|
changeset = Accounts.change_user_registration(%User{})
|
||||||
|
render(conn, "new.html", changeset: changeset)
|
||||||
|
end
|
||||||
|
|
||||||
|
def create(conn, %{"user" => user_params}) do
|
||||||
|
case Accounts.register_user(user_params) do
|
||||||
|
{:ok, user} ->
|
||||||
|
{:ok, _} =
|
||||||
|
Accounts.deliver_user_confirmation_instructions(
|
||||||
|
user,
|
||||||
|
&Routes.user_confirmation_url(conn, :edit, &1)
|
||||||
|
)
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> put_flash(:info, "User created successfully.")
|
||||||
|
|> UserAuth.log_in_user(user)
|
||||||
|
|
||||||
|
{:error, %Ecto.Changeset{} = changeset} ->
|
||||||
|
render(conn, "new.html", changeset: changeset)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,58 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserResetPasswordController do
|
||||||
|
use LinkShortenerWeb, :controller
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
|
||||||
|
plug :get_user_by_reset_password_token when action in [:edit, :update]
|
||||||
|
|
||||||
|
def new(conn, _params) do
|
||||||
|
render(conn, "new.html")
|
||||||
|
end
|
||||||
|
|
||||||
|
def create(conn, %{"user" => %{"email" => email}}) do
|
||||||
|
if user = Accounts.get_user_by_email(email) do
|
||||||
|
Accounts.deliver_user_reset_password_instructions(
|
||||||
|
user,
|
||||||
|
&Routes.user_reset_password_url(conn, :edit, &1)
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> put_flash(
|
||||||
|
:info,
|
||||||
|
"If your email is in our system, you will receive instructions to reset your password shortly."
|
||||||
|
)
|
||||||
|
|> redirect(to: "/")
|
||||||
|
end
|
||||||
|
|
||||||
|
def edit(conn, _params) do
|
||||||
|
render(conn, "edit.html", changeset: Accounts.change_user_password(conn.assigns.user))
|
||||||
|
end
|
||||||
|
|
||||||
|
# Do not log in the user after reset password to avoid a
|
||||||
|
# leaked token giving the user access to the account.
|
||||||
|
def update(conn, %{"user" => user_params}) do
|
||||||
|
case Accounts.reset_user_password(conn.assigns.user, user_params) do
|
||||||
|
{:ok, _} ->
|
||||||
|
conn
|
||||||
|
|> put_flash(:info, "Password reset successfully.")
|
||||||
|
|> redirect(to: Routes.user_session_path(conn, :new))
|
||||||
|
|
||||||
|
{:error, changeset} ->
|
||||||
|
render(conn, "edit.html", changeset: changeset)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
defp get_user_by_reset_password_token(conn, _opts) do
|
||||||
|
%{"token" => token} = conn.params
|
||||||
|
|
||||||
|
if user = Accounts.get_user_by_reset_password_token(token) do
|
||||||
|
conn |> assign(:user, user) |> assign(:token, token)
|
||||||
|
else
|
||||||
|
conn
|
||||||
|
|> put_flash(:error, "Reset password link is invalid or it has expired.")
|
||||||
|
|> redirect(to: "/")
|
||||||
|
|> halt()
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,27 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserSessionController do
|
||||||
|
use LinkShortenerWeb, :controller
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
alias LinkShortenerWeb.UserAuth
|
||||||
|
|
||||||
|
def new(conn, _params) do
|
||||||
|
render(conn, "new.html", error_message: nil)
|
||||||
|
end
|
||||||
|
|
||||||
|
def create(conn, %{"user" => user_params}) do
|
||||||
|
%{"email" => email, "password" => password} = user_params
|
||||||
|
|
||||||
|
if user = Accounts.get_user_by_email_and_password(email, password) do
|
||||||
|
UserAuth.log_in_user(conn, user, user_params)
|
||||||
|
else
|
||||||
|
# In order to prevent user enumeration attacks, don't disclose whether the email is registered.
|
||||||
|
render(conn, "new.html", error_message: "Invalid email or password")
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def delete(conn, _params) do
|
||||||
|
conn
|
||||||
|
|> put_flash(:info, "Logged out successfully.")
|
||||||
|
|> UserAuth.log_out_user()
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,74 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserSettingsController do
|
||||||
|
use LinkShortenerWeb, :controller
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
alias LinkShortenerWeb.UserAuth
|
||||||
|
|
||||||
|
plug :assign_email_and_password_changesets
|
||||||
|
|
||||||
|
def edit(conn, _params) do
|
||||||
|
render(conn, "edit.html")
|
||||||
|
end
|
||||||
|
|
||||||
|
def update(conn, %{"action" => "update_email"} = params) do
|
||||||
|
%{"current_password" => password, "user" => user_params} = params
|
||||||
|
user = conn.assigns.current_user
|
||||||
|
|
||||||
|
case Accounts.apply_user_email(user, password, user_params) do
|
||||||
|
{:ok, applied_user} ->
|
||||||
|
Accounts.deliver_update_email_instructions(
|
||||||
|
applied_user,
|
||||||
|
user.email,
|
||||||
|
&Routes.user_settings_url(conn, :confirm_email, &1)
|
||||||
|
)
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> put_flash(
|
||||||
|
:info,
|
||||||
|
"A link to confirm your email change has been sent to the new address."
|
||||||
|
)
|
||||||
|
|> redirect(to: Routes.user_settings_path(conn, :edit))
|
||||||
|
|
||||||
|
{:error, changeset} ->
|
||||||
|
render(conn, "edit.html", email_changeset: changeset)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def update(conn, %{"action" => "update_password"} = params) do
|
||||||
|
%{"current_password" => password, "user" => user_params} = params
|
||||||
|
user = conn.assigns.current_user
|
||||||
|
|
||||||
|
case Accounts.update_user_password(user, password, user_params) do
|
||||||
|
{:ok, user} ->
|
||||||
|
conn
|
||||||
|
|> put_flash(:info, "Password updated successfully.")
|
||||||
|
|> put_session(:user_return_to, Routes.user_settings_path(conn, :edit))
|
||||||
|
|> UserAuth.log_in_user(user)
|
||||||
|
|
||||||
|
{:error, changeset} ->
|
||||||
|
render(conn, "edit.html", password_changeset: changeset)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def confirm_email(conn, %{"token" => token}) do
|
||||||
|
case Accounts.update_user_email(conn.assigns.current_user, token) do
|
||||||
|
:ok ->
|
||||||
|
conn
|
||||||
|
|> put_flash(:info, "Email changed successfully.")
|
||||||
|
|> redirect(to: Routes.user_settings_path(conn, :edit))
|
||||||
|
|
||||||
|
:error ->
|
||||||
|
conn
|
||||||
|
|> put_flash(:error, "Email change link is invalid or it has expired.")
|
||||||
|
|> redirect(to: Routes.user_settings_path(conn, :edit))
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
defp assign_email_and_password_changesets(conn, _opts) do
|
||||||
|
user = conn.assigns.current_user
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> assign(:email_changeset, Accounts.change_user_email(user))
|
||||||
|
|> assign(:password_changeset, Accounts.change_user_password(user))
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,10 @@
|
|||||||
|
<ul>
|
||||||
|
<%= if @current_user do %>
|
||||||
|
<li><%= @current_user.email %></li>
|
||||||
|
<li><%= link "Settings", to: Routes.user_settings_path(@conn, :edit) %></li>
|
||||||
|
<li><%= link "Log out", to: Routes.user_session_path(@conn, :delete), method: :delete %></li>
|
||||||
|
<% else %>
|
||||||
|
<li><%= link "Register", to: Routes.user_registration_path(@conn, :new) %></li>
|
||||||
|
<li><%= link "Log in", to: Routes.user_session_path(@conn, :new) %></li>
|
||||||
|
<% end %>
|
||||||
|
</ul>
|
@ -0,0 +1,12 @@
|
|||||||
|
<h1>Confirm account</h1>
|
||||||
|
|
||||||
|
<.form let={_f} for={:user} action={Routes.user_confirmation_path(@conn, :update, @token)}>
|
||||||
|
<div>
|
||||||
|
<%= submit "Confirm my account" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
<%= link "Register", to: Routes.user_registration_path(@conn, :new) %> |
|
||||||
|
<%= link "Log in", to: Routes.user_session_path(@conn, :new) %>
|
||||||
|
</p>
|
@ -0,0 +1,15 @@
|
|||||||
|
<h1>Resend confirmation instructions</h1>
|
||||||
|
|
||||||
|
<.form let={f} for={:user} action={Routes.user_confirmation_path(@conn, :create)}>
|
||||||
|
<%= label f, :email %>
|
||||||
|
<%= email_input f, :email, required: true %>
|
||||||
|
|
||||||
|
<div>
|
||||||
|
<%= submit "Resend confirmation instructions" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
<%= link "Register", to: Routes.user_registration_path(@conn, :new) %> |
|
||||||
|
<%= link "Log in", to: Routes.user_session_path(@conn, :new) %>
|
||||||
|
</p>
|
@ -0,0 +1,26 @@
|
|||||||
|
<h1>Register</h1>
|
||||||
|
|
||||||
|
<.form let={f} for={@changeset} action={Routes.user_registration_path(@conn, :create)}>
|
||||||
|
<%= if @changeset.action do %>
|
||||||
|
<div class="alert alert-danger">
|
||||||
|
<p>Oops, something went wrong! Please check the errors below.</p>
|
||||||
|
</div>
|
||||||
|
<% end %>
|
||||||
|
|
||||||
|
<%= label f, :email %>
|
||||||
|
<%= email_input f, :email, required: true %>
|
||||||
|
<%= error_tag f, :email %>
|
||||||
|
|
||||||
|
<%= label f, :password %>
|
||||||
|
<%= password_input f, :password, required: true %>
|
||||||
|
<%= error_tag f, :password %>
|
||||||
|
|
||||||
|
<div>
|
||||||
|
<%= submit "Register" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
<%= link "Log in", to: Routes.user_session_path(@conn, :new) %> |
|
||||||
|
<%= link "Forgot your password?", to: Routes.user_reset_password_path(@conn, :new) %>
|
||||||
|
</p>
|
@ -0,0 +1,26 @@
|
|||||||
|
<h1>Reset password</h1>
|
||||||
|
|
||||||
|
<.form let={f} for={@changeset} action={Routes.user_reset_password_path(@conn, :update, @token)}>
|
||||||
|
<%= if @changeset.action do %>
|
||||||
|
<div class="alert alert-danger">
|
||||||
|
<p>Oops, something went wrong! Please check the errors below.</p>
|
||||||
|
</div>
|
||||||
|
<% end %>
|
||||||
|
|
||||||
|
<%= label f, :password, "New password" %>
|
||||||
|
<%= password_input f, :password, required: true %>
|
||||||
|
<%= error_tag f, :password %>
|
||||||
|
|
||||||
|
<%= label f, :password_confirmation, "Confirm new password" %>
|
||||||
|
<%= password_input f, :password_confirmation, required: true %>
|
||||||
|
<%= error_tag f, :password_confirmation %>
|
||||||
|
|
||||||
|
<div>
|
||||||
|
<%= submit "Reset password" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
<%= link "Register", to: Routes.user_registration_path(@conn, :new) %> |
|
||||||
|
<%= link "Log in", to: Routes.user_session_path(@conn, :new) %>
|
||||||
|
</p>
|
@ -0,0 +1,15 @@
|
|||||||
|
<h1>Forgot your password?</h1>
|
||||||
|
|
||||||
|
<.form let={f} for={:user} action={Routes.user_reset_password_path(@conn, :create)}>
|
||||||
|
<%= label f, :email %>
|
||||||
|
<%= email_input f, :email, required: true %>
|
||||||
|
|
||||||
|
<div>
|
||||||
|
<%= submit "Send instructions to reset password" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
<%= link "Register", to: Routes.user_registration_path(@conn, :new) %> |
|
||||||
|
<%= link "Log in", to: Routes.user_session_path(@conn, :new) %>
|
||||||
|
</p>
|
@ -0,0 +1,27 @@
|
|||||||
|
<h1>Log in</h1>
|
||||||
|
|
||||||
|
<.form let={f} for={@conn} action={Routes.user_session_path(@conn, :create)} as={:user}>
|
||||||
|
<%= if @error_message do %>
|
||||||
|
<div class="alert alert-danger">
|
||||||
|
<p><%= @error_message %></p>
|
||||||
|
</div>
|
||||||
|
<% end %>
|
||||||
|
|
||||||
|
<%= label f, :email %>
|
||||||
|
<%= email_input f, :email, required: true %>
|
||||||
|
|
||||||
|
<%= label f, :password %>
|
||||||
|
<%= password_input f, :password, required: true %>
|
||||||
|
|
||||||
|
<%= label f, :remember_me, "Keep me logged in for 60 days" %>
|
||||||
|
<%= checkbox f, :remember_me %>
|
||||||
|
|
||||||
|
<div>
|
||||||
|
<%= submit "Log in" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
<%= link "Register", to: Routes.user_registration_path(@conn, :new) %> |
|
||||||
|
<%= link "Forgot your password?", to: Routes.user_reset_password_path(@conn, :new) %>
|
||||||
|
</p>
|
@ -0,0 +1,53 @@
|
|||||||
|
<h1>Settings</h1>
|
||||||
|
|
||||||
|
<h3>Change email</h3>
|
||||||
|
|
||||||
|
<.form let={f} for={@email_changeset} action={Routes.user_settings_path(@conn, :update)} id="update_email">
|
||||||
|
<%= if @email_changeset.action do %>
|
||||||
|
<div class="alert alert-danger">
|
||||||
|
<p>Oops, something went wrong! Please check the errors below.</p>
|
||||||
|
</div>
|
||||||
|
<% end %>
|
||||||
|
|
||||||
|
<%= hidden_input f, :action, name: "action", value: "update_email" %>
|
||||||
|
|
||||||
|
<%= label f, :email %>
|
||||||
|
<%= email_input f, :email, required: true %>
|
||||||
|
<%= error_tag f, :email %>
|
||||||
|
|
||||||
|
<%= label f, :current_password, for: "current_password_for_email" %>
|
||||||
|
<%= password_input f, :current_password, required: true, name: "current_password", id: "current_password_for_email" %>
|
||||||
|
<%= error_tag f, :current_password %>
|
||||||
|
|
||||||
|
<div>
|
||||||
|
<%= submit "Change email" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
||||||
|
|
||||||
|
<h3>Change password</h3>
|
||||||
|
|
||||||
|
<.form let={f} for={@password_changeset} action={Routes.user_settings_path(@conn, :update)} id="update_password">
|
||||||
|
<%= if @password_changeset.action do %>
|
||||||
|
<div class="alert alert-danger">
|
||||||
|
<p>Oops, something went wrong! Please check the errors below.</p>
|
||||||
|
</div>
|
||||||
|
<% end %>
|
||||||
|
|
||||||
|
<%= hidden_input f, :action, name: "action", value: "update_password" %>
|
||||||
|
|
||||||
|
<%= label f, :password, "New password" %>
|
||||||
|
<%= password_input f, :password, required: true %>
|
||||||
|
<%= error_tag f, :password %>
|
||||||
|
|
||||||
|
<%= label f, :password_confirmation, "Confirm new password" %>
|
||||||
|
<%= password_input f, :password_confirmation, required: true %>
|
||||||
|
<%= error_tag f, :password_confirmation %>
|
||||||
|
|
||||||
|
<%= label f, :current_password, for: "current_password_for_password" %>
|
||||||
|
<%= password_input f, :current_password, required: true, name: "current_password", id: "current_password_for_password" %>
|
||||||
|
<%= error_tag f, :current_password %>
|
||||||
|
|
||||||
|
<div>
|
||||||
|
<%= submit "Change password" %>
|
||||||
|
</div>
|
||||||
|
</.form>
|
@ -0,0 +1,3 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserConfirmationView do
|
||||||
|
use LinkShortenerWeb, :view
|
||||||
|
end
|
@ -0,0 +1,3 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserRegistrationView do
|
||||||
|
use LinkShortenerWeb, :view
|
||||||
|
end
|
@ -0,0 +1,3 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserResetPasswordView do
|
||||||
|
use LinkShortenerWeb, :view
|
||||||
|
end
|
@ -0,0 +1,3 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserSessionView do
|
||||||
|
use LinkShortenerWeb, :view
|
||||||
|
end
|
@ -0,0 +1,3 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserSettingsView do
|
||||||
|
use LinkShortenerWeb, :view
|
||||||
|
end
|
@ -1,14 +0,0 @@
|
|||||||
defmodule LinkShortener.Repo.Migrations.CreateUsers do
|
|
||||||
use Ecto.Migration
|
|
||||||
|
|
||||||
def change do
|
|
||||||
create table(:users) do
|
|
||||||
add :email, :string
|
|
||||||
add :encrypted_password, :string
|
|
||||||
|
|
||||||
timestamps()
|
|
||||||
end
|
|
||||||
|
|
||||||
create unique_index(:users, [:email])
|
|
||||||
end
|
|
||||||
end
|
|
@ -0,0 +1,27 @@
|
|||||||
|
defmodule LinkShortener.Repo.Migrations.CreateUsersAuthTables do
|
||||||
|
use Ecto.Migration
|
||||||
|
|
||||||
|
def change do
|
||||||
|
execute "CREATE EXTENSION IF NOT EXISTS citext", ""
|
||||||
|
|
||||||
|
create table(:users) do
|
||||||
|
add :email, :citext, null: false
|
||||||
|
add :hashed_password, :string, null: false
|
||||||
|
add :confirmed_at, :naive_datetime
|
||||||
|
timestamps()
|
||||||
|
end
|
||||||
|
|
||||||
|
create unique_index(:users, [:email])
|
||||||
|
|
||||||
|
create table(:users_tokens) do
|
||||||
|
add :user_id, references(:users, on_delete: :delete_all), null: false
|
||||||
|
add :token, :binary, null: false
|
||||||
|
add :context, :string, null: false
|
||||||
|
add :sent_to, :string
|
||||||
|
timestamps(updated_at: false)
|
||||||
|
end
|
||||||
|
|
||||||
|
create index(:users_tokens, [:user_id])
|
||||||
|
create unique_index(:users_tokens, [:context, :token])
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,170 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserAuthTest do
|
||||||
|
use LinkShortenerWeb.ConnCase, async: true
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
alias LinkShortenerWeb.UserAuth
|
||||||
|
import LinkShortener.AccountsFixtures
|
||||||
|
|
||||||
|
@remember_me_cookie "_link_shortener_web_user_remember_me"
|
||||||
|
|
||||||
|
setup %{conn: conn} do
|
||||||
|
conn =
|
||||||
|
conn
|
||||||
|
|> Map.replace!(:secret_key_base, LinkShortenerWeb.Endpoint.config(:secret_key_base))
|
||||||
|
|> init_test_session(%{})
|
||||||
|
|
||||||
|
%{user: user_fixture(), conn: conn}
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "log_in_user/3" do
|
||||||
|
test "stores the user token in the session", %{conn: conn, user: user} do
|
||||||
|
conn = UserAuth.log_in_user(conn, user)
|
||||||
|
assert token = get_session(conn, :user_token)
|
||||||
|
assert get_session(conn, :live_socket_id) == "users_sessions:#{Base.url_encode64(token)}"
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert Accounts.get_user_by_session_token(token)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "clears everything previously stored in the session", %{conn: conn, user: user} do
|
||||||
|
conn = conn |> put_session(:to_be_removed, "value") |> UserAuth.log_in_user(user)
|
||||||
|
refute get_session(conn, :to_be_removed)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "redirects to the configured path", %{conn: conn, user: user} do
|
||||||
|
conn = conn |> put_session(:user_return_to, "/hello") |> UserAuth.log_in_user(user)
|
||||||
|
assert redirected_to(conn) == "/hello"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "writes a cookie if remember_me is configured", %{conn: conn, user: user} do
|
||||||
|
conn = conn |> fetch_cookies() |> UserAuth.log_in_user(user, %{"remember_me" => "true"})
|
||||||
|
assert get_session(conn, :user_token) == conn.cookies[@remember_me_cookie]
|
||||||
|
|
||||||
|
assert %{value: signed_token, max_age: max_age} = conn.resp_cookies[@remember_me_cookie]
|
||||||
|
assert signed_token != get_session(conn, :user_token)
|
||||||
|
assert max_age == 5_184_000
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "logout_user/1" do
|
||||||
|
test "erases session and cookies", %{conn: conn, user: user} do
|
||||||
|
user_token = Accounts.generate_user_session_token(user)
|
||||||
|
|
||||||
|
conn =
|
||||||
|
conn
|
||||||
|
|> put_session(:user_token, user_token)
|
||||||
|
|> put_req_cookie(@remember_me_cookie, user_token)
|
||||||
|
|> fetch_cookies()
|
||||||
|
|> UserAuth.log_out_user()
|
||||||
|
|
||||||
|
refute get_session(conn, :user_token)
|
||||||
|
refute conn.cookies[@remember_me_cookie]
|
||||||
|
assert %{max_age: 0} = conn.resp_cookies[@remember_me_cookie]
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
refute Accounts.get_user_by_session_token(user_token)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "broadcasts to the given live_socket_id", %{conn: conn} do
|
||||||
|
live_socket_id = "users_sessions:abcdef-token"
|
||||||
|
LinkShortenerWeb.Endpoint.subscribe(live_socket_id)
|
||||||
|
|
||||||
|
conn
|
||||||
|
|> put_session(:live_socket_id, live_socket_id)
|
||||||
|
|> UserAuth.log_out_user()
|
||||||
|
|
||||||
|
assert_receive %Phoenix.Socket.Broadcast{event: "disconnect", topic: ^live_socket_id}
|
||||||
|
end
|
||||||
|
|
||||||
|
test "works even if user is already logged out", %{conn: conn} do
|
||||||
|
conn = conn |> fetch_cookies() |> UserAuth.log_out_user()
|
||||||
|
refute get_session(conn, :user_token)
|
||||||
|
assert %{max_age: 0} = conn.resp_cookies[@remember_me_cookie]
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "fetch_current_user/2" do
|
||||||
|
test "authenticates user from session", %{conn: conn, user: user} do
|
||||||
|
user_token = Accounts.generate_user_session_token(user)
|
||||||
|
conn = conn |> put_session(:user_token, user_token) |> UserAuth.fetch_current_user([])
|
||||||
|
assert conn.assigns.current_user.id == user.id
|
||||||
|
end
|
||||||
|
|
||||||
|
test "authenticates user from cookies", %{conn: conn, user: user} do
|
||||||
|
logged_in_conn =
|
||||||
|
conn |> fetch_cookies() |> UserAuth.log_in_user(user, %{"remember_me" => "true"})
|
||||||
|
|
||||||
|
user_token = logged_in_conn.cookies[@remember_me_cookie]
|
||||||
|
%{value: signed_token} = logged_in_conn.resp_cookies[@remember_me_cookie]
|
||||||
|
|
||||||
|
conn =
|
||||||
|
conn
|
||||||
|
|> put_req_cookie(@remember_me_cookie, signed_token)
|
||||||
|
|> UserAuth.fetch_current_user([])
|
||||||
|
|
||||||
|
assert get_session(conn, :user_token) == user_token
|
||||||
|
assert conn.assigns.current_user.id == user.id
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not authenticate if data is missing", %{conn: conn, user: user} do
|
||||||
|
_ = Accounts.generate_user_session_token(user)
|
||||||
|
conn = UserAuth.fetch_current_user(conn, [])
|
||||||
|
refute get_session(conn, :user_token)
|
||||||
|
refute conn.assigns.current_user
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "redirect_if_user_is_authenticated/2" do
|
||||||
|
test "redirects if user is authenticated", %{conn: conn, user: user} do
|
||||||
|
conn = conn |> assign(:current_user, user) |> UserAuth.redirect_if_user_is_authenticated([])
|
||||||
|
assert conn.halted
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not redirect if user is not authenticated", %{conn: conn} do
|
||||||
|
conn = UserAuth.redirect_if_user_is_authenticated(conn, [])
|
||||||
|
refute conn.halted
|
||||||
|
refute conn.status
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "require_authenticated_user/2" do
|
||||||
|
test "redirects if user is not authenticated", %{conn: conn} do
|
||||||
|
conn = conn |> fetch_flash() |> UserAuth.require_authenticated_user([])
|
||||||
|
assert conn.halted
|
||||||
|
assert redirected_to(conn) == Routes.user_session_path(conn, :new)
|
||||||
|
assert get_flash(conn, :error) == "You must log in to access this page."
|
||||||
|
end
|
||||||
|
|
||||||
|
test "stores the path to redirect to on GET", %{conn: conn} do
|
||||||
|
halted_conn =
|
||||||
|
%{conn | path_info: ["foo"], query_string: ""}
|
||||||
|
|> fetch_flash()
|
||||||
|
|> UserAuth.require_authenticated_user([])
|
||||||
|
|
||||||
|
assert halted_conn.halted
|
||||||
|
assert get_session(halted_conn, :user_return_to) == "/foo"
|
||||||
|
|
||||||
|
halted_conn =
|
||||||
|
%{conn | path_info: ["foo"], query_string: "bar=baz"}
|
||||||
|
|> fetch_flash()
|
||||||
|
|> UserAuth.require_authenticated_user([])
|
||||||
|
|
||||||
|
assert halted_conn.halted
|
||||||
|
assert get_session(halted_conn, :user_return_to) == "/foo?bar=baz"
|
||||||
|
|
||||||
|
halted_conn =
|
||||||
|
%{conn | path_info: ["foo"], query_string: "bar", method: "POST"}
|
||||||
|
|> fetch_flash()
|
||||||
|
|> UserAuth.require_authenticated_user([])
|
||||||
|
|
||||||
|
assert halted_conn.halted
|
||||||
|
refute get_session(halted_conn, :user_return_to)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not redirect if user is authenticated", %{conn: conn, user: user} do
|
||||||
|
conn = conn |> assign(:current_user, user) |> UserAuth.require_authenticated_user([])
|
||||||
|
refute conn.halted
|
||||||
|
refute conn.status
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,105 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserConfirmationControllerTest do
|
||||||
|
use LinkShortenerWeb.ConnCase, async: true
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
alias LinkShortener.Repo
|
||||||
|
import LinkShortener.AccountsFixtures
|
||||||
|
|
||||||
|
setup do
|
||||||
|
%{user: user_fixture()}
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "GET /users/confirm" do
|
||||||
|
test "renders the resend confirmation page", %{conn: conn} do
|
||||||
|
conn = get(conn, Routes.user_confirmation_path(conn, :new))
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Resend confirmation instructions</h1>"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "POST /users/confirm" do
|
||||||
|
@tag :capture_log
|
||||||
|
test "sends a new confirmation token", %{conn: conn, user: user} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_confirmation_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => user.email}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :info) =~ "If your email is in our system"
|
||||||
|
assert Repo.get_by!(Accounts.UserToken, user_id: user.id).context == "confirm"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not send confirmation token if User is confirmed", %{conn: conn, user: user} do
|
||||||
|
Repo.update!(Accounts.User.confirm_changeset(user))
|
||||||
|
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_confirmation_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => user.email}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :info) =~ "If your email is in our system"
|
||||||
|
refute Repo.get_by(Accounts.UserToken, user_id: user.id)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not send confirmation token if email is invalid", %{conn: conn} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_confirmation_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => "unknown@example.com"}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :info) =~ "If your email is in our system"
|
||||||
|
assert Repo.all(Accounts.UserToken) == []
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "GET /users/confirm/:token" do
|
||||||
|
test "renders the confirmation page", %{conn: conn} do
|
||||||
|
conn = get(conn, Routes.user_confirmation_path(conn, :edit, "some-token"))
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Confirm account</h1>"
|
||||||
|
|
||||||
|
form_action = Routes.user_confirmation_path(conn, :update, "some-token")
|
||||||
|
assert response =~ "action=\"#{form_action}\""
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "POST /users/confirm/:token" do
|
||||||
|
test "confirms the given token once", %{conn: conn, user: user} do
|
||||||
|
token =
|
||||||
|
extract_user_token(fn url ->
|
||||||
|
Accounts.deliver_user_confirmation_instructions(user, url)
|
||||||
|
end)
|
||||||
|
|
||||||
|
conn = post(conn, Routes.user_confirmation_path(conn, :update, token))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :info) =~ "User confirmed successfully"
|
||||||
|
assert Accounts.get_user!(user.id).confirmed_at
|
||||||
|
refute get_session(conn, :user_token)
|
||||||
|
assert Repo.all(Accounts.UserToken) == []
|
||||||
|
|
||||||
|
# When not logged in
|
||||||
|
conn = post(conn, Routes.user_confirmation_path(conn, :update, token))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :error) =~ "User confirmation link is invalid or it has expired"
|
||||||
|
|
||||||
|
# When logged in
|
||||||
|
conn =
|
||||||
|
build_conn()
|
||||||
|
|> log_in_user(user)
|
||||||
|
|> post(Routes.user_confirmation_path(conn, :update, token))
|
||||||
|
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
refute get_flash(conn, :error)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not confirm email with invalid token", %{conn: conn, user: user} do
|
||||||
|
conn = post(conn, Routes.user_confirmation_path(conn, :update, "oops"))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :error) =~ "User confirmation link is invalid or it has expired"
|
||||||
|
refute Accounts.get_user!(user.id).confirmed_at
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,54 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserRegistrationControllerTest do
|
||||||
|
use LinkShortenerWeb.ConnCase, async: true
|
||||||
|
|
||||||
|
import LinkShortener.AccountsFixtures
|
||||||
|
|
||||||
|
describe "GET /users/register" do
|
||||||
|
test "renders registration page", %{conn: conn} do
|
||||||
|
conn = get(conn, Routes.user_registration_path(conn, :new))
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Register</h1>"
|
||||||
|
assert response =~ "Log in</a>"
|
||||||
|
assert response =~ "Register</a>"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "redirects if already logged in", %{conn: conn} do
|
||||||
|
conn = conn |> log_in_user(user_fixture()) |> get(Routes.user_registration_path(conn, :new))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "POST /users/register" do
|
||||||
|
@tag :capture_log
|
||||||
|
test "creates account and logs the user in", %{conn: conn} do
|
||||||
|
email = unique_user_email()
|
||||||
|
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_registration_path(conn, :create), %{
|
||||||
|
"user" => valid_user_attributes(email: email)
|
||||||
|
})
|
||||||
|
|
||||||
|
assert get_session(conn, :user_token)
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
|
||||||
|
# Now do a logged in request and assert on the menu
|
||||||
|
conn = get(conn, "/")
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ email
|
||||||
|
assert response =~ "Settings</a>"
|
||||||
|
assert response =~ "Log out</a>"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "render errors for invalid data", %{conn: conn} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_registration_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => "with spaces", "password" => "too short"}
|
||||||
|
})
|
||||||
|
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Register</h1>"
|
||||||
|
assert response =~ "must have the @ sign and no spaces"
|
||||||
|
assert response =~ "should be at least 12 character"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,113 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserResetPasswordControllerTest do
|
||||||
|
use LinkShortenerWeb.ConnCase, async: true
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
alias LinkShortener.Repo
|
||||||
|
import LinkShortener.AccountsFixtures
|
||||||
|
|
||||||
|
setup do
|
||||||
|
%{user: user_fixture()}
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "GET /users/reset_password" do
|
||||||
|
test "renders the reset password page", %{conn: conn} do
|
||||||
|
conn = get(conn, Routes.user_reset_password_path(conn, :new))
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Forgot your password?</h1>"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "POST /users/reset_password" do
|
||||||
|
@tag :capture_log
|
||||||
|
test "sends a new reset password token", %{conn: conn, user: user} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_reset_password_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => user.email}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :info) =~ "If your email is in our system"
|
||||||
|
assert Repo.get_by!(Accounts.UserToken, user_id: user.id).context == "reset_password"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not send reset password token if email is invalid", %{conn: conn} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_reset_password_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => "unknown@example.com"}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :info) =~ "If your email is in our system"
|
||||||
|
assert Repo.all(Accounts.UserToken) == []
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "GET /users/reset_password/:token" do
|
||||||
|
setup %{user: user} do
|
||||||
|
token =
|
||||||
|
extract_user_token(fn url ->
|
||||||
|
Accounts.deliver_user_reset_password_instructions(user, url)
|
||||||
|
end)
|
||||||
|
|
||||||
|
%{token: token}
|
||||||
|
end
|
||||||
|
|
||||||
|
test "renders reset password", %{conn: conn, token: token} do
|
||||||
|
conn = get(conn, Routes.user_reset_password_path(conn, :edit, token))
|
||||||
|
assert html_response(conn, 200) =~ "<h1>Reset password</h1>"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not render reset password with invalid token", %{conn: conn} do
|
||||||
|
conn = get(conn, Routes.user_reset_password_path(conn, :edit, "oops"))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :error) =~ "Reset password link is invalid or it has expired"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "PUT /users/reset_password/:token" do
|
||||||
|
setup %{user: user} do
|
||||||
|
token =
|
||||||
|
extract_user_token(fn url ->
|
||||||
|
Accounts.deliver_user_reset_password_instructions(user, url)
|
||||||
|
end)
|
||||||
|
|
||||||
|
%{token: token}
|
||||||
|
end
|
||||||
|
|
||||||
|
test "resets password once", %{conn: conn, user: user, token: token} do
|
||||||
|
conn =
|
||||||
|
put(conn, Routes.user_reset_password_path(conn, :update, token), %{
|
||||||
|
"user" => %{
|
||||||
|
"password" => "new valid password",
|
||||||
|
"password_confirmation" => "new valid password"
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == Routes.user_session_path(conn, :new)
|
||||||
|
refute get_session(conn, :user_token)
|
||||||
|
assert get_flash(conn, :info) =~ "Password reset successfully"
|
||||||
|
assert Accounts.get_user_by_email_and_password(user.email, "new valid password")
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not reset password on invalid data", %{conn: conn, token: token} do
|
||||||
|
conn =
|
||||||
|
put(conn, Routes.user_reset_password_path(conn, :update, token), %{
|
||||||
|
"user" => %{
|
||||||
|
"password" => "too short",
|
||||||
|
"password_confirmation" => "does not match"
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Reset password</h1>"
|
||||||
|
assert response =~ "should be at least 12 character(s)"
|
||||||
|
assert response =~ "does not match password"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not reset password with invalid token", %{conn: conn} do
|
||||||
|
conn = put(conn, Routes.user_reset_password_path(conn, :update, "oops"))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
assert get_flash(conn, :error) =~ "Reset password link is invalid or it has expired"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,98 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserSessionControllerTest do
|
||||||
|
use LinkShortenerWeb.ConnCase, async: true
|
||||||
|
|
||||||
|
import LinkShortener.AccountsFixtures
|
||||||
|
|
||||||
|
setup do
|
||||||
|
%{user: user_fixture()}
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "GET /users/log_in" do
|
||||||
|
test "renders log in page", %{conn: conn} do
|
||||||
|
conn = get(conn, Routes.user_session_path(conn, :new))
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Log in</h1>"
|
||||||
|
assert response =~ "Register</a>"
|
||||||
|
assert response =~ "Forgot your password?</a>"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "redirects if already logged in", %{conn: conn, user: user} do
|
||||||
|
conn = conn |> log_in_user(user) |> get(Routes.user_session_path(conn, :new))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "POST /users/log_in" do
|
||||||
|
test "logs the user in", %{conn: conn, user: user} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_session_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => user.email, "password" => valid_user_password()}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert get_session(conn, :user_token)
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
|
||||||
|
# Now do a logged in request and assert on the menu
|
||||||
|
conn = get(conn, "/")
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ user.email
|
||||||
|
assert response =~ "Settings</a>"
|
||||||
|
assert response =~ "Log out</a>"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "logs the user in with remember me", %{conn: conn, user: user} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_session_path(conn, :create), %{
|
||||||
|
"user" => %{
|
||||||
|
"email" => user.email,
|
||||||
|
"password" => valid_user_password(),
|
||||||
|
"remember_me" => "true"
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert conn.resp_cookies["_link_shortener_web_user_remember_me"]
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "logs the user in with return to", %{conn: conn, user: user} do
|
||||||
|
conn =
|
||||||
|
conn
|
||||||
|
|> init_test_session(user_return_to: "/foo/bar")
|
||||||
|
|> post(Routes.user_session_path(conn, :create), %{
|
||||||
|
"user" => %{
|
||||||
|
"email" => user.email,
|
||||||
|
"password" => valid_user_password()
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == "/foo/bar"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "emits error message with invalid credentials", %{conn: conn, user: user} do
|
||||||
|
conn =
|
||||||
|
post(conn, Routes.user_session_path(conn, :create), %{
|
||||||
|
"user" => %{"email" => user.email, "password" => "invalid_password"}
|
||||||
|
})
|
||||||
|
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Log in</h1>"
|
||||||
|
assert response =~ "Invalid email or password"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "DELETE /users/log_out" do
|
||||||
|
test "logs the user out", %{conn: conn, user: user} do
|
||||||
|
conn = conn |> log_in_user(user) |> delete(Routes.user_session_path(conn, :delete))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
refute get_session(conn, :user_token)
|
||||||
|
assert get_flash(conn, :info) =~ "Logged out successfully"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "succeeds even if the user is not logged in", %{conn: conn} do
|
||||||
|
conn = delete(conn, Routes.user_session_path(conn, :delete))
|
||||||
|
assert redirected_to(conn) == "/"
|
||||||
|
refute get_session(conn, :user_token)
|
||||||
|
assert get_flash(conn, :info) =~ "Logged out successfully"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
@ -0,0 +1,129 @@
|
|||||||
|
defmodule LinkShortenerWeb.UserSettingsControllerTest do
|
||||||
|
use LinkShortenerWeb.ConnCase, async: true
|
||||||
|
|
||||||
|
alias LinkShortener.Accounts
|
||||||
|
import LinkShortener.AccountsFixtures
|
||||||
|
|
||||||
|
setup :register_and_log_in_user
|
||||||
|
|
||||||
|
describe "GET /users/settings" do
|
||||||
|
test "renders settings page", %{conn: conn} do
|
||||||
|
conn = get(conn, Routes.user_settings_path(conn, :edit))
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Settings</h1>"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "redirects if user is not logged in" do
|
||||||
|
conn = build_conn()
|
||||||
|
conn = get(conn, Routes.user_settings_path(conn, :edit))
|
||||||
|
assert redirected_to(conn) == Routes.user_session_path(conn, :new)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "PUT /users/settings (change password form)" do
|
||||||
|
test "updates the user password and resets tokens", %{conn: conn, user: user} do
|
||||||
|
new_password_conn =
|
||||||
|
put(conn, Routes.user_settings_path(conn, :update), %{
|
||||||
|
"action" => "update_password",
|
||||||
|
"current_password" => valid_user_password(),
|
||||||
|
"user" => %{
|
||||||
|
"password" => "new valid password",
|
||||||
|
"password_confirmation" => "new valid password"
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(new_password_conn) == Routes.user_settings_path(conn, :edit)
|
||||||
|
assert get_session(new_password_conn, :user_token) != get_session(conn, :user_token)
|
||||||
|
assert get_flash(new_password_conn, :info) =~ "Password updated successfully"
|
||||||
|
assert Accounts.get_user_by_email_and_password(user.email, "new valid password")
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not update password on invalid data", %{conn: conn} do
|
||||||
|
old_password_conn =
|
||||||
|
put(conn, Routes.user_settings_path(conn, :update), %{
|
||||||
|
"action" => "update_password",
|
||||||
|
"current_password" => "invalid",
|
||||||
|
"user" => %{
|
||||||
|
"password" => "too short",
|
||||||
|
"password_confirmation" => "does not match"
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
response = html_response(old_password_conn, 200)
|
||||||
|
assert response =~ "<h1>Settings</h1>"
|
||||||
|
assert response =~ "should be at least 12 character(s)"
|
||||||
|
assert response =~ "does not match password"
|
||||||
|
assert response =~ "is not valid"
|
||||||
|
|
||||||
|
assert get_session(old_password_conn, :user_token) == get_session(conn, :user_token)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "PUT /users/settings (change email form)" do
|
||||||
|
@tag :capture_log
|
||||||
|
test "updates the user email", %{conn: conn, user: user} do
|
||||||
|
conn =
|
||||||
|
put(conn, Routes.user_settings_path(conn, :update), %{
|
||||||
|
"action" => "update_email",
|
||||||
|
"current_password" => valid_user_password(),
|
||||||
|
"user" => %{"email" => unique_user_email()}
|
||||||
|
})
|
||||||
|
|
||||||
|
assert redirected_to(conn) == Routes.user_settings_path(conn, :edit)
|
||||||
|
assert get_flash(conn, :info) =~ "A link to confirm your email"
|
||||||
|
assert Accounts.get_user_by_email(user.email)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not update email on invalid data", %{conn: conn} do
|
||||||
|
conn =
|
||||||
|
put(conn, Routes.user_settings_path(conn, :update), %{
|
||||||
|
"action" => "update_email",
|
||||||
|
"current_password" => "invalid",
|
||||||
|
"user" => %{"email" => "with spaces"}
|
||||||
|
})
|
||||||
|
|
||||||
|
response = html_response(conn, 200)
|
||||||
|
assert response =~ "<h1>Settings</h1>"
|
||||||
|
assert response =~ "must have the @ sign and no spaces"
|
||||||
|
assert response =~ "is not valid"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "GET /users/settings/confirm_email/:token" do
|
||||||
|
setup %{user: user} do
|
||||||
|
email = unique_user_email()
|
||||||
|
|
||||||
|
token =
|
||||||
|
extract_user_token(fn url ->
|
||||||
|
Accounts.deliver_update_email_instructions(%{user | email: email}, user.email, url)
|
||||||
|
end)
|
||||||
|
|
||||||
|
%{token: token, email: email}
|
||||||
|
end
|
||||||
|
|
||||||
|
test "updates the user email once", %{conn: conn, user: user, token: token, email: email} do
|
||||||
|
conn = get(conn, Routes.user_settings_path(conn, :confirm_email, token))
|
||||||
|
assert redirected_to(conn) == Routes.user_settings_path(conn, :edit)
|
||||||
|
assert get_flash(conn, :info) =~ "Email changed successfully"
|
||||||
|
refute Accounts.get_user_by_email(user.email)
|
||||||
|
assert Accounts.get_user_by_email(email)
|
||||||
|
|
||||||
|
conn = get(conn, Routes.user_settings_path(conn, :confirm_email, token))
|
||||||
|
assert redirected_to(conn) == Routes.user_settings_path(conn, :edit)
|
||||||
|
assert get_flash(conn, :error) =~ "Email change link is invalid or it has expired"
|
||||||
|
end
|
||||||
|
|
||||||
|
test "does not update email with invalid token", %{conn: conn, user: user} do
|
||||||
|
conn = get(conn, Routes.user_settings_path(conn, :confirm_email, "oops"))
|
||||||
|
assert redirected_to(conn) == Routes.user_settings_path(conn, :edit)
|
||||||
|
assert get_flash(conn, :error) =~ "Email change link is invalid or it has expired"
|
||||||
|
assert Accounts.get_user_by_email(user.email)
|
||||||
|
end
|
||||||
|
|
||||||
|
test "redirects if user is not logged in", %{token: token} do
|
||||||
|
conn = build_conn()
|
||||||
|
conn = get(conn, Routes.user_settings_path(conn, :confirm_email, token))
|
||||||
|
assert redirected_to(conn) == Routes.user_session_path(conn, :new)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
Loading…
Reference in new issue