memEx/lib/memex/accounts/user.ex

200 lines
6.5 KiB
Elixir
Raw Normal View History

2022-07-25 19:31:54 -04:00
defmodule Memex.Accounts.User do
2022-01-22 20:44:38 -05:00
@moduledoc """
2022-07-25 19:31:54 -04:00
A Memex user
2022-01-22 20:44:38 -05:00
"""
2021-03-11 21:12:55 -05:00
use Ecto.Schema
import Ecto.Changeset
2022-07-25 19:31:54 -04:00
import MemexWeb.Gettext
2022-02-25 21:55:17 -05:00
alias Ecto.{Changeset, UUID}
2022-11-23 21:15:52 -05:00
alias Memex.Invites.Invite
2021-03-11 21:12:55 -05:00
@derive {Inspect, except: [:password]}
@primary_key {:id, :binary_id, autogenerate: true}
@foreign_key_type :binary_id
schema "users" do
field :email, :string
field :password, :string, virtual: true
field :hashed_password, :string
field :confirmed_at, :naive_datetime
2022-02-25 21:55:17 -05:00
field :role, Ecto.Enum, values: [:admin, :user], default: :user
2022-05-05 20:55:59 -04:00
field :locale, :string
2022-02-25 21:55:17 -05:00
has_many :invites, Invite, on_delete: :delete_all
2021-03-11 21:12:55 -05:00
timestamps()
end
2022-11-23 21:15:52 -05:00
@type t :: %__MODULE__{
2022-02-25 21:55:17 -05:00
id: id(),
email: String.t(),
password: String.t(),
hashed_password: String.t(),
confirmed_at: NaiveDateTime.t(),
2022-11-23 21:15:52 -05:00
role: role(),
2022-02-25 21:55:17 -05:00
invites: [Invite.t()],
2022-05-05 20:55:59 -04:00
locale: String.t() | nil,
2022-02-25 21:55:17 -05:00
inserted_at: NaiveDateTime.t(),
updated_at: NaiveDateTime.t()
}
2022-11-23 21:15:52 -05:00
@type new_user :: %__MODULE__{}
2022-02-25 21:55:17 -05:00
@type id :: UUID.t()
2022-11-23 21:15:52 -05:00
@type changeset :: Changeset.t(t() | new_user())
@type role :: :user | :admin | String.t()
2022-02-25 21:55:17 -05:00
2021-03-11 21:12:55 -05:00
@doc """
A user changeset for registration.
It is important to validate the length of both email and password.
Otherwise databases may truncate the email without warnings, which
could lead to unpredictable or insecure behaviour. Long passwords may
also be very expensive to hash for certain algorithms.
## Options
* `:hash_password` - Hashes the password so it can be stored securely
in the database and ensures the password field is cleared to prevent
leaks in the logs. If password hashing is not needed and clearing the
password field is not desired (like when using this changeset for
validations on a LiveView form), this option can be set to `false`.
Defaults to `true`.
"""
2022-11-23 21:15:52 -05:00
@spec registration_changeset(attrs :: map()) :: changeset()
@spec registration_changeset(attrs :: map(), opts :: keyword()) :: changeset()
def registration_changeset(attrs, opts \\ []) do
%__MODULE__{}
|> cast(attrs, [:email, :password, :locale])
2021-03-11 21:12:55 -05:00
|> validate_email()
|> validate_password(opts)
end
2022-02-25 21:55:17 -05:00
@doc """
A user changeset for role.
"""
2022-11-23 21:15:52 -05:00
@spec role_changeset(t() | new_user() | changeset(), role()) :: changeset()
2022-02-25 21:55:17 -05:00
def role_changeset(user, role) do
user |> cast(%{"role" => role}, [:role])
end
2022-11-23 21:15:52 -05:00
@spec validate_email(changeset()) :: changeset()
2021-03-11 21:12:55 -05:00
defp validate_email(changeset) do
changeset
|> validate_required([:email])
2022-02-25 21:55:17 -05:00
|> validate_format(:email, ~r/^[^\s]+@[^\s]+$/,
message: dgettext("errors", "must have the @ sign and no spaces")
)
2021-03-11 21:12:55 -05:00
|> validate_length(:email, max: 160)
2022-07-25 19:31:54 -04:00
|> unsafe_validate_unique(:email, Memex.Repo)
2021-03-11 21:12:55 -05:00
|> unique_constraint(:email)
end
2022-11-23 21:15:52 -05:00
@spec validate_password(changeset(), opts :: keyword()) :: changeset()
2021-03-11 21:12:55 -05:00
defp validate_password(changeset, opts) do
changeset
|> validate_required([:password])
|> validate_length(:password, min: 12, max: 80)
# |> validate_format(:password, ~r/[a-z]/, message: "at least one lower case character")
# |> validate_format(:password, ~r/[A-Z]/, message: "at least one upper case character")
# |> validate_format(:password, ~r/[!?@#$%^&*_0-9]/, message: "at least one digit or punctuation character")
|> maybe_hash_password(opts)
end
2022-11-23 21:15:52 -05:00
@spec maybe_hash_password(changeset(), opts :: keyword()) :: changeset()
2021-03-11 21:12:55 -05:00
defp maybe_hash_password(changeset, opts) do
hash_password? = Keyword.get(opts, :hash_password, true)
password = get_change(changeset, :password)
if hash_password? && password && changeset.valid? do
changeset
|> put_change(:hashed_password, Bcrypt.hash_pwd_salt(password))
|> delete_change(:password)
else
changeset
end
end
@doc """
A user changeset for changing the email.
It requires the email to change otherwise an error is added.
"""
2022-11-23 21:15:52 -05:00
@spec email_changeset(t(), attrs :: map()) :: changeset()
2021-03-11 21:12:55 -05:00
def email_changeset(user, attrs) do
user
|> cast(attrs, [:email])
|> validate_email()
|> case do
%{changes: %{email: _}} = changeset -> changeset
2022-02-25 21:55:17 -05:00
%{} = changeset -> add_error(changeset, :email, dgettext("errors", "did not change"))
2021-03-11 21:12:55 -05:00
end
end
@doc """
A user changeset for changing the password.
## Options
* `:hash_password` - Hashes the password so it can be stored securely
in the database and ensures the password field is cleared to prevent
leaks in the logs. If password hashing is not needed and clearing the
password field is not desired (like when using this changeset for
validations on a LiveView form), this option can be set to `false`.
Defaults to `true`.
"""
2022-11-23 21:15:52 -05:00
@spec password_changeset(t(), attrs :: map()) :: changeset()
@spec password_changeset(t(), attrs :: map(), opts :: keyword()) :: changeset()
2021-03-11 21:12:55 -05:00
def password_changeset(user, attrs, opts \\ []) do
user
|> cast(attrs, [:password])
2022-02-25 21:55:17 -05:00
|> validate_confirmation(:password, message: dgettext("errors", "does not match password"))
2021-03-11 21:12:55 -05:00
|> validate_password(opts)
end
@doc """
Confirms the account by setting `confirmed_at`.
"""
2022-11-23 21:15:52 -05:00
@spec confirm_changeset(t() | changeset()) :: changeset()
2022-02-25 21:55:17 -05:00
def confirm_changeset(user_or_changeset) do
2021-03-11 21:12:55 -05:00
now = NaiveDateTime.utc_now() |> NaiveDateTime.truncate(:second)
2022-02-25 21:55:17 -05:00
user_or_changeset |> change(confirmed_at: now)
2021-03-11 21:12:55 -05:00
end
@doc """
Verifies the password.
If there is no user or the user doesn't have a password, we call
`Bcrypt.no_user_verify/0` to avoid timing attacks.
"""
2022-02-25 21:55:17 -05:00
@spec valid_password?(t(), String.t()) :: boolean()
2022-11-23 21:15:52 -05:00
def valid_password?(%__MODULE__{hashed_password: hashed_password}, password)
2021-03-11 21:12:55 -05:00
when is_binary(hashed_password) and byte_size(password) > 0 do
Bcrypt.verify_pass(password, hashed_password)
end
def valid_password?(_, _) do
Bcrypt.no_user_verify()
false
end
@doc """
Validates the current password otherwise adds an error to the changeset.
"""
2022-11-23 21:15:52 -05:00
@spec validate_current_password(changeset(), String.t()) :: changeset()
2021-03-11 21:12:55 -05:00
def validate_current_password(changeset, password) do
2022-02-25 21:55:17 -05:00
if valid_password?(changeset.data, password),
do: changeset,
else: changeset |> add_error(:current_password, dgettext("errors", "is not valid"))
2021-03-11 21:12:55 -05:00
end
2022-05-05 20:55:59 -04:00
@doc """
A changeset for changing the user's locale
"""
2022-11-23 21:15:52 -05:00
@spec locale_changeset(t() | changeset(), locale :: String.t() | nil) :: changeset()
2022-05-05 20:55:59 -04:00
def locale_changeset(user_or_changeset, locale) do
user_or_changeset
|> cast(%{"locale" => locale}, [:locale])
|> validate_required(:locale)
end
2021-03-11 21:12:55 -05:00
end