mirror of
https://akkoma.dev/AkkomaGang/akkoma.git
synced 2024-12-04 18:38:15 +00:00
107 lines
2.5 KiB
Elixir
107 lines
2.5 KiB
Elixir
|
# Pleroma: A lightweight social networking server
|
||
|
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
|
||
|
# SPDX-License-Identifier: AGPL-3.0-only
|
||
|
|
||
|
defmodule Pleroma.MFA.Token do
|
||
|
use Ecto.Schema
|
||
|
import Ecto.Query
|
||
|
import Ecto.Changeset
|
||
|
|
||
|
alias Pleroma.Repo
|
||
|
alias Pleroma.User
|
||
|
alias Pleroma.Web.OAuth.Authorization
|
||
|
alias Pleroma.Web.OAuth.Token, as: OAuthToken
|
||
|
|
||
|
@expires 300
|
||
|
|
||
|
schema "mfa_tokens" do
|
||
|
field(:token, :string)
|
||
|
field(:valid_until, :naive_datetime_usec)
|
||
|
|
||
|
belongs_to(:user, User, type: FlakeId.Ecto.CompatType)
|
||
|
belongs_to(:authorization, Authorization)
|
||
|
|
||
|
timestamps()
|
||
|
end
|
||
|
|
||
|
def get_by_token(token) do
|
||
|
from(
|
||
|
t in __MODULE__,
|
||
|
where: t.token == ^token,
|
||
|
preload: [:user, :authorization]
|
||
|
)
|
||
|
|> Repo.find_resource()
|
||
|
end
|
||
|
|
||
|
def validate(token) do
|
||
|
with {:fetch_token, {:ok, token}} <- {:fetch_token, get_by_token(token)},
|
||
|
{:expired, false} <- {:expired, is_expired?(token)} do
|
||
|
{:ok, token}
|
||
|
else
|
||
|
{:expired, _} -> {:error, :expired_token}
|
||
|
{:fetch_token, _} -> {:error, :not_found}
|
||
|
error -> {:error, error}
|
||
|
end
|
||
|
end
|
||
|
|
||
|
def create_token(%User{} = user) do
|
||
|
%__MODULE__{}
|
||
|
|> change
|
||
|
|> assign_user(user)
|
||
|
|> put_token
|
||
|
|> put_valid_until
|
||
|
|> Repo.insert()
|
||
|
end
|
||
|
|
||
|
def create_token(user, authorization) do
|
||
|
%__MODULE__{}
|
||
|
|> change
|
||
|
|> assign_user(user)
|
||
|
|> assign_authorization(authorization)
|
||
|
|> put_token
|
||
|
|> put_valid_until
|
||
|
|> Repo.insert()
|
||
|
end
|
||
|
|
||
|
defp assign_user(changeset, user) do
|
||
|
changeset
|
||
|
|> put_assoc(:user, user)
|
||
|
|> validate_required([:user])
|
||
|
end
|
||
|
|
||
|
defp assign_authorization(changeset, authorization) do
|
||
|
changeset
|
||
|
|> put_assoc(:authorization, authorization)
|
||
|
|> validate_required([:authorization])
|
||
|
end
|
||
|
|
||
|
defp put_token(changeset) do
|
||
|
changeset
|
||
|
|> change(%{token: OAuthToken.Utils.generate_token()})
|
||
|
|> validate_required([:token])
|
||
|
|> unique_constraint(:token)
|
||
|
end
|
||
|
|
||
|
defp put_valid_until(changeset) do
|
||
|
expires_in = NaiveDateTime.add(NaiveDateTime.utc_now(), @expires)
|
||
|
|
||
|
changeset
|
||
|
|> change(%{valid_until: expires_in})
|
||
|
|> validate_required([:valid_until])
|
||
|
end
|
||
|
|
||
|
def is_expired?(%__MODULE__{valid_until: valid_until}) do
|
||
|
NaiveDateTime.diff(NaiveDateTime.utc_now(), valid_until) > 0
|
||
|
end
|
||
|
|
||
|
def is_expired?(_), do: false
|
||
|
|
||
|
def delete_expired_tokens do
|
||
|
from(
|
||
|
q in __MODULE__,
|
||
|
where: fragment("?", q.valid_until) < ^Timex.now()
|
||
|
)
|
||
|
|> Repo.delete_all()
|
||
|
end
|
||
|
end
|