pleroma/lib/pleroma/password_reset_token.ex

63 lines
1.6 KiB
Elixir
Raw Normal View History

# Pleroma: A lightweight social networking server
2022-02-25 22:11:42 -08:00
# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
2017-10-19 08:37:24 -07:00
defmodule Pleroma.PasswordResetToken do
use Ecto.Schema
2017-11-18 17:22:07 -08:00
import Ecto.Changeset
2017-10-19 08:37:24 -07:00
2019-02-09 07:16:26 -08:00
alias Pleroma.PasswordResetToken
alias Pleroma.Repo
alias Pleroma.User
2017-10-19 08:37:24 -07:00
schema "password_reset_tokens" do
belongs_to(:user, User, type: FlakeId.Ecto.CompatType)
2018-03-30 06:01:53 -07:00
field(:token, :string)
field(:used, :boolean, default: false)
2017-10-19 08:37:24 -07:00
timestamps()
end
def create_token(%User{} = user) do
2018-03-30 06:01:53 -07:00
token = :crypto.strong_rand_bytes(32) |> Base.url_encode64()
2017-10-19 08:37:24 -07:00
token = %PasswordResetToken{
user_id: user.id,
used: false,
token: token
}
Repo.insert(token)
end
def used_changeset(struct) do
2017-11-18 17:22:07 -08:00
struct
2017-10-19 08:37:24 -07:00
|> cast(%{}, [])
|> put_change(:used, true)
end
@spec reset_password(binary(), map()) :: {:ok, User.t()} | {:error, binary()}
2017-10-19 08:37:24 -07:00
def reset_password(token, data) do
with %{used: false} = token <- Repo.get_by(PasswordResetToken, %{token: token}),
false <- expired?(token),
2019-04-22 00:20:43 -07:00
%User{} = user <- User.get_cached_by_id(token.user_id),
2017-11-18 17:22:07 -08:00
{:ok, _user} <- User.reset_password(user, data),
2017-10-19 08:37:24 -07:00
{:ok, token} <- Repo.update(used_changeset(token)) do
{:ok, token}
else
_e -> {:error, token}
end
end
def expired?(%__MODULE__{inserted_at: inserted_at}) do
validity = Pleroma.Config.get([:instance, :password_reset_token_validity], 0)
now = NaiveDateTime.utc_now()
difference = NaiveDateTime.diff(now, inserted_at)
difference > validity
end
2017-10-19 08:37:24 -07:00
end