GRN2-xx: Restructured email verification and password reset (#1444)

* Restructured email verification and password reset

* Fixed issue with password reset

Co-authored-by: Jesus Federico <jesus@123it.ca>
This commit is contained in:
Ahmad Farhat 2020-04-29 17:56:46 -04:00 committed by GitHub
parent 8f3ba8a038
commit 28302107bd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 46 additions and 81 deletions

View File

@ -29,7 +29,7 @@ class AccountActivationsController < ApplicationController
# GET /account_activations/edit
def edit
# If the user exists and is not verified and provided the correct token
if @user && !@user.activated? && @user.authenticated?(:activation, params[:token])
if @user && !@user.activated?
# Verify user
@user.activate
@ -51,8 +51,7 @@ class AccountActivationsController < ApplicationController
flash[:alert] = I18n.t("verify.already_verified")
else
# Resend
@user.create_activation_token
send_activation_email(@user)
send_activation_email(@user, @user.create_activation_token)
end
redirect_to root_path
@ -61,7 +60,7 @@ class AccountActivationsController < ApplicationController
private
def find_user
@user = User.find_by!(activation_digest: User.digest(params[:token]), provider: @user_domain)
@user = User.find_by!(activation_digest: User.hash_token(params[:token]), provider: @user_domain)
end
def ensure_unauthenticated

View File

@ -133,9 +133,7 @@ class AdminsController < ApplicationController
# GET /admins/reset
def reset
@user.create_reset_digest
send_password_reset_email(@user)
send_password_reset_email(@user, @user.create_reset_digest)
if session[:prev_url].present?
redirect_path = session[:prev_url]

View File

@ -20,11 +20,11 @@ module Emailer
extend ActiveSupport::Concern
# Sends account activation email.
def send_activation_email(user)
def send_activation_email(user, token)
begin
return unless Rails.configuration.enable_email_verification
UserMailer.verify_email(user, user_verification_link(user), @settings).deliver
UserMailer.verify_email(user, user_verification_link(token), @settings).deliver
rescue => e
logger.error "Support: Error in email delivery: #{e}"
flash[:alert] = I18n.t(params[:message], default: I18n.t("delivery_error"))
@ -34,11 +34,11 @@ module Emailer
end
# Sends password reset email.
def send_password_reset_email(user)
def send_password_reset_email(user, token)
begin
return unless Rails.configuration.enable_email_verification
UserMailer.password_reset(user, reset_link(user), @settings).deliver_now
UserMailer.password_reset(user, reset_link(token), @settings).deliver_now
rescue => e
logger.error "Support: Error in email delivery: #{e}"
flash[:alert] = I18n.t(params[:message], default: I18n.t("delivery_error"))
@ -124,8 +124,8 @@ module Emailer
private
# Returns the link the user needs to click to verify their account
def user_verification_link(user)
edit_account_activation_url(token: user.activation_token)
def user_verification_link(token)
edit_account_activation_url(token: token)
end
def admin_emails
@ -139,8 +139,8 @@ module Emailer
admins.collect(&:email).join(",")
end
def reset_link(user)
edit_password_reset_url(user.reset_token)
def reset_link(token)
edit_password_reset_url(token)
end
def invitation_link(token)

View File

@ -21,7 +21,6 @@ class PasswordResetsController < ApplicationController
before_action :disable_password_reset, unless: -> { Rails.configuration.enable_email_verification }
before_action :find_user, only: [:edit, :update]
before_action :valid_user, only: [:edit, :update]
before_action :check_expiration, only: [:edit, :update]
# POST /password_resets/new
@ -34,8 +33,7 @@ class PasswordResetsController < ApplicationController
# Check if user exists and throw an error if he doesn't
@user = User.find_by!(email: params[:password_reset][:email].downcase, provider: @user_domain)
@user.create_reset_digest
send_password_reset_email(@user)
send_password_reset_email(@user, @user.create_reset_digest)
redirect_to root_path
rescue
# User doesn't exist
@ -68,7 +66,7 @@ class PasswordResetsController < ApplicationController
private
def find_user
@user = User.find_by(reset_digest: User.digest(params[:id]), provider: @user_domain)
@user = User.find_by(reset_digest: User.hash_token(params[:id]), provider: @user_domain)
end
def user_params
@ -80,14 +78,6 @@ class PasswordResetsController < ApplicationController
redirect_to new_password_reset_url, alert: I18n.t("expired_reset_token") if @user.password_reset_expired?
end
# Confirms a valid user.
def valid_user
unless @user.authenticated?(:reset, params[:id])
@user&.activate unless @user&.activated?
redirect_to root_url
end
end
# Redirects to 404 if emails are not enabled
def disable_password_reset
redirect_to '/404'

View File

@ -88,10 +88,7 @@ class SessionsController < ApplicationController
# Check that the user is a Greenlight account
return redirect_to(root_path, alert: I18n.t("invalid_login_method")) unless user.greenlight_account?
# Check that the user has verified their account
unless user.activated?
user.create_activation_token
return redirect_to(account_activation_path(token: user.activation_token))
end
return redirect_to(account_activation_path(token: user.create_activation_token)) unless user.activated?
end
login(user)
@ -247,8 +244,7 @@ class SessionsController < ApplicationController
logger.info "Switching social account to local account for #{user.uid}"
# Send the user a reset password email
user.create_reset_digest
send_password_reset_email(user)
send_password_reset_email(user, user.create_reset_digest)
# Overwrite the flash with a more descriptive message if successful
flash[:success] = I18n.t("reset_password.auth_change") if flash[:success].present?

View File

@ -58,9 +58,7 @@ class UsersController < ApplicationController
# Sign in automatically if email verification is disabled or if user is already verified.
login(@user) && return if !Rails.configuration.enable_email_verification || @user.email_verified
@user.create_activation_token
send_activation_email(@user)
send_activation_email(@user, @user.create_activation_token)
redirect_to root_path
end

View File

@ -21,7 +21,6 @@ require 'bbb_api'
class User < ApplicationRecord
include Deleteable
attr_accessor :reset_token, :activation_token
after_create :setup_user
before_save { email.try(:downcase!) }
@ -110,24 +109,28 @@ class User < ApplicationRecord
# Activates an account and initialize a users main room
def activate
update_attributes(email_verified: true, activated_at: Time.zone.now)
update_attributes(email_verified: true, activated_at: Time.zone.now, activation_digest: nil)
end
def activated?
Rails.configuration.enable_email_verification ? email_verified : true
end
# Sets the password reset attributes.
def create_reset_digest
self.reset_token = User.new_token
update_attributes(reset_digest: User.digest(reset_token), reset_sent_at: Time.zone.now)
def self.hash_token(token)
Digest::SHA2.hexdigest(token)
end
# Returns true if the given token matches the digest.
def authenticated?(attribute, token)
digest = send("#{attribute}_digest")
return false if digest.nil?
digest == Digest::SHA256.base64digest(token)
# Sets the password reset attributes.
def create_reset_digest
new_token = SecureRandom.urlsafe_base64
update_attributes(reset_digest: User.hash_token(new_token), reset_sent_at: Time.zone.now)
new_token
end
def create_activation_token
new_token = SecureRandom.urlsafe_base64
update_attributes(activation_digest: User.hash_token(new_token))
new_token
end
# Return true if password reset link expires
@ -158,11 +161,6 @@ class User < ApplicationRecord
social_uid.nil?
end
def create_activation_token
self.activation_token = User.new_token
update_attributes(activation_digest: User.digest(activation_token))
end
def admin_of?(user, permission)
has_correct_permission = highest_priority_role.get_permission(permission) && id != user.id
@ -171,15 +169,6 @@ class User < ApplicationRecord
has_correct_permission && provider == user.provider && !user.has_role?(:super_admin)
end
def self.digest(string)
Digest::SHA256.base64digest(string)
end
# Returns a random token.
def self.new_token
SecureRandom.urlsafe_base64
end
# role functions
def highest_priority_role
roles.min_by(&:priority)

View File

@ -35,8 +35,7 @@ describe AccountActivationsController, type: :controller do
it "renders the verify view if the user is not signed in and is not verified" do
user = create(:user, email_verified: false, provider: "greenlight")
user.create_activation_token
get :show, params: { token: user.activation_token }
get :show, params: { token: user.create_activation_token }
expect(response).to render_template(:show)
end
@ -46,8 +45,7 @@ describe AccountActivationsController, type: :controller do
it "activates a user if they have the correct activation token" do
@user = create(:user, email_verified: false, provider: "greenlight")
@user.create_activation_token
get :edit, params: { token: @user.activation_token }
get :edit, params: { token: @user.create_activation_token }
@user.reload
expect(@user.email_verified).to eq(true)
@ -64,8 +62,7 @@ describe AccountActivationsController, type: :controller do
it "does not allow the user to click the verify link again" do
@user = create(:user, provider: "greenlight")
@user.create_activation_token
get :edit, params: { token: @user.activation_token }
get :edit, params: { token: @user.create_activation_token }
expect(flash[:alert]).to be_present
expect(response).to redirect_to(root_path)
end
@ -75,8 +72,7 @@ describe AccountActivationsController, type: :controller do
@user.add_role :pending
@user.create_activation_token
get :edit, params: { token: @user.activation_token }
get :edit, params: { token: @user.create_activation_token }
expect(flash[:success]).to be_present
expect(response).to redirect_to(root_path)
@ -87,8 +83,8 @@ describe AccountActivationsController, type: :controller do
it "resends the email to the current user if the resend button is clicked" do
user = create(:user, email_verified: false, provider: "greenlight")
user.create_activation_token
expect { get :resend, params: { token: user.activation_token } }.to change { ActionMailer::Base.deliveries.count }.by(1)
expect { get :resend, params: { token: user.create_activation_token } }
.to change { ActionMailer::Base.deliveries.count }.by(1)
expect(flash[:success]).to be_present
expect(response).to redirect_to(root_path)
end
@ -96,8 +92,7 @@ describe AccountActivationsController, type: :controller do
it "redirects a verified user to the root path" do
user = create(:user, provider: "greenlight")
user.create_activation_token
get :resend, params: { token: user.activation_token }
get :resend, params: { token: user.create_activation_token }
expect(flash[:alert]).to be_present
expect(response).to redirect_to(root_path)

View File

@ -81,8 +81,6 @@ describe PasswordResetsController, type: :controller do
context "valid user" do
it "reloads page with notice if password is empty" do
token = "reset_token"
allow(controller).to receive(:valid_user).and_return(nil)
allow(controller).to receive(:check_expiration).and_return(nil)
params = {
@ -99,7 +97,6 @@ describe PasswordResetsController, type: :controller do
it "reloads page with notice if password is confirmation doesn't match" do
token = "reset_token"
allow(controller).to receive(:valid_user).and_return(nil)
allow(controller).to receive(:check_expiration).and_return(nil)
params = {
@ -116,14 +113,12 @@ describe PasswordResetsController, type: :controller do
it "updates attributes if the password update is a success" do
user = create(:user, provider: "greenlight")
user.create_reset_digest
old_digest = user.password_digest
allow(controller).to receive(:valid_user).and_return(nil)
allow(controller).to receive(:check_expiration).and_return(nil)
params = {
id: user.reset_token,
id: user.create_reset_digest,
user: {
password: :password,
password_confirmation: :password,

View File

@ -138,8 +138,13 @@ describe User, type: :model do
it 'creates token and respective reset digest' do
user = create(:user)
reset_digest_success = user.create_reset_digest
expect(reset_digest_success).to eq(true)
expect(user.create_reset_digest).to be_truthy
end
it 'correctly verifies the token' do
user = create(:user)
token = user.create_reset_digest
expect(User.exists?(reset_digest: User.hash_token(token))).to be true
end
it 'verifies if password reset link expired' do