lib/ash_authentication/strategies/magic_link/sign_in_preparation.ex

defmodule AshAuthentication.Strategy.MagicLink.SignInPreparation do
  @moduledoc """
  Prepare a query for sign in.
  """

  use Ash.Resource.Preparation
  alias AshAuthentication.{Info, Jwt, TokenResource}
  alias Ash.{Query, Resource, Resource.Preparation}
  require Ash.Query

  @doc false
  @impl true
  @spec prepare(Query.t(), keyword, Preparation.context()) :: Query.t()
  def prepare(query, _otps, _context) do
    subject_name =
      query.resource
      |> Info.authentication_subject_name!()
      |> to_string()

    with {:ok, strategy} <- Info.strategy_for_action(query.resource, query.action.name),
         token when is_binary(token) <- Query.get_argument(query, strategy.token_param_name),
         {:ok, %{"act" => token_action, "sub" => subject}, _} <-
           Jwt.verify(token, query.resource),
         ^token_action <- to_string(strategy.sign_in_action_name),
         %URI{path: ^subject_name, query: primary_key} <- URI.parse(subject) do
      primary_key =
        primary_key
        |> URI.decode_query()
        |> Enum.to_list()

      query
      |> Query.set_context(%{private: %{ash_authentication?: true}})
      |> Query.filter(^primary_key)
      |> Query.after_action(fn
        query, [record] ->
          if strategy.single_use_token? do
            token_resource = Info.authentication_tokens_token_resource!(query.resource)
            :ok = TokenResource.revoke(token_resource, token)
          end

          {:ok, token, _claims} = Jwt.token_for_user(record)
          {:ok, [Resource.put_metadata(record, :token, token)]}

        _query, [] ->
          {:ok, []}
      end)
    else
      _ -> Query.limit(query, 0)
    end
  end
end