gab-social/app/models/user.rb

346 lines
10 KiB
Ruby
Raw Permalink Normal View History

2019-07-02 08:10:25 +01:00
# frozen_string_literal: true
# == Schema Information
#
# Table name: users
#
# id :bigint(8) not null, primary key
# email :string default(""), not null
# created_at :datetime not null
# updated_at :datetime not null
# encrypted_password :string default(""), not null
# reset_password_token :string
# reset_password_sent_at :datetime
# remember_created_at :datetime
# sign_in_count :integer default(0), not null
# current_sign_in_at :datetime
# last_sign_in_at :datetime
# current_sign_in_ip :inet
# last_sign_in_ip :inet
# admin :boolean default(FALSE), not null
# confirmation_token :string
# confirmed_at :datetime
# confirmation_sent_at :datetime
# unconfirmed_email :string
# locale :string
# encrypted_otp_secret :string
# encrypted_otp_secret_iv :string
# encrypted_otp_secret_salt :string
# consumed_timestep :integer
# otp_required_for_login :boolean default(FALSE), not null
# last_emailed_at :datetime
# otp_backup_codes :string is an Array
# filtered_languages :string default([]), not null, is an Array
# account_id :bigint(8) not null
# disabled :boolean default(FALSE), not null
# moderator :boolean default(FALSE), not null
# remember_token :string
# chosen_languages :string is an Array
# created_by_application_id :bigint(8)
# approved :boolean default(TRUE), not null
# last_read_notification :bigint(8)
2020-03-10 22:44:32 +00:00
# unique_email :string
2019-07-02 08:10:25 +01:00
#
class User < ApplicationRecord
2020-11-15 18:48:32 +00:00
self.ignored_columns = ["{:column=>:invite}_id"]
2019-07-02 08:10:25 +01:00
include Settings::Extend
include UserRoles
# The home and list feeds will be stored in Redis for this amount
# of time, and status fan-out to followers will include only people
# within this time frame. Lowering the duration may improve performance
# if lots of people sign up, but not a lot of them check their feed
# every day. Raising the duration reduces the amount of expensive
# RegenerationWorker jobs that need to be run when those people come
# to check their feed
ACTIVE_DURATION = ENV.fetch('USER_ACTIVE_DAYS', 7).to_i.days.freeze
devise :two_factor_authenticatable,
otp_secret_encryption_key: Rails.configuration.x.otp_secret
devise :two_factor_backupable,
otp_number_of_backup_codes: 10
devise :registerable, :recoverable, :rememberable, :trackable, :validatable,
:confirmable
include Omniauthable
include PamAuthenticable
include LdapAuthenticable
belongs_to :account, inverse_of: :user
belongs_to :created_by_application, class_name: 'Doorkeeper::Application', optional: true
accepts_nested_attributes_for :account
has_many :applications, class_name: 'Doorkeeper::Application', as: :owner
has_many :backups, inverse_of: :user
validates :locale, inclusion: I18n.available_locales.map(&:to_s), if: :locale?
validates_with BlacklistedEmailValidator, on: :create
validates_with EmailMxValidator, if: :validate_email_dns?
validates :agreement, acceptance: { allow_nil: false, accept: [true, 'true', '1'] }, on: :create
scope :recent, -> { order(id: :desc) }
scope :approved, -> { where(approved: true) }
scope :confirmed, -> { where.not(confirmed_at: nil) }
scope :enabled, -> { where(disabled: false) }
scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) }
scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where.not(accounts: { suspended_at: nil }) }
scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) }
scope :emailable, -> { confirmed.enabled.joins(:account).merge(Account.searchable) }
before_validation :sanitize_languages
before_create :set_approved
after_create :prepare_new_user!
2019-07-02 08:10:25 +01:00
# This avoids a deprecation warning from Rails 5.1
# It seems possible that a future release of devise-two-factor will
# handle this itself, and this can be removed from our User class.
attribute :otp_secret
has_many :session_activations, dependent: :destroy
delegate :auto_play_gif, :default_sensitive, :unfollow_modal, :boost_modal, :delete_modal,
:noindex, :display_media, :hide_network,
2020-11-15 18:48:32 +00:00
:expand_spoilers, :default_language, :aggregate_reblogs,
:group_in_home_feed, to: :settings, prefix: :setting, allow_nil: false
2019-07-02 08:10:25 +01:00
attr_writer :external
def confirmed?
confirmed_at.present?
end
def disable!
update!(disabled: true,
last_sign_in_at: current_sign_in_at,
current_sign_in_at: nil)
end
def enable!
update!(disabled: false)
end
def confirm
ActiveRecord::Base.connected_to(role: :writing) do
new_user = !confirmed?
self.approved = true if open_registrations?
2019-07-02 08:10:25 +01:00
super
2019-07-02 08:10:25 +01:00
if new_user && approved?
# prepare_new_user!
end
2019-07-02 08:10:25 +01:00
end
end
def confirm!
2020-11-15 18:48:32 +00:00
new_user = !confirmed?
self.approved = true if open_registrations?
2019-07-02 08:10:25 +01:00
skip_confirmation!
save!
# prepare_new_user! if new_user && approved?
2019-07-02 08:10:25 +01:00
end
def active_for_authentication?
super && approved?
end
def approve!
return if approved?
update!(approved: true)
# prepare_new_user!
2019-07-02 08:10:25 +01:00
end
def update_tracked_fields!(request)
ActiveRecord::Base.connected_to(role: :writing) do
super
prepare_returning_user!
end
2019-07-02 08:10:25 +01:00
end
2021-01-30 06:49:22 +00:00
def update_sign_in!(request, new_sign_in: false)
ActiveRecord::Base.connected_to(role: :writing) do
old_current, new_current = current_sign_in_at, Time.now.utc
self.last_sign_in_at = old_current || new_current
self.current_sign_in_at = new_current
old_current = current_sign_in_ip
new_current = request.remote_ip
self.last_sign_in_ip = old_current || new_current
self.current_sign_in_ip = new_current
if new_sign_in
self.sign_in_count ||= 0
self.sign_in_count += 1
end
save(validate: false) unless new_record?
prepare_returning_user!
2021-01-30 06:49:22 +00:00
end
end
2019-07-02 08:10:25 +01:00
def disable_two_factor!
self.otp_required_for_login = false
otp_backup_codes&.clear
save!
end
def setting_default_privacy
settings.default_privacy || (account.locked? ? 'private' : 'public')
end
def allows_digest_emails?
settings.notification_emails['digest']
end
def allows_report_emails?
settings.notification_emails['report']
end
def allows_pro_reminder_emails?
settings.notification_emails['pro_reminder']
end
2019-07-02 08:10:25 +01:00
def hides_network?
@hides_network ||= settings.hide_network
end
def aggregates_reblogs?
@aggregates_reblogs ||= settings.aggregate_reblogs
end
def allows_group_in_home_feed?
settings.group_in_home_feed
end
2020-03-10 22:59:23 +00:00
2019-07-02 08:10:25 +01:00
def token_for_app(a)
return nil if a.nil? || a.owner != self
ActiveRecord::Base.connected_to(role: :writing) do
Doorkeeper::AccessToken
.find_or_create_by(application_id: a.id, resource_owner_id: id) do |t|
2019-07-02 08:10:25 +01:00
t.scopes = a.scopes
t.expires_in = Doorkeeper.configuration.access_token_expires_in
t.use_refresh_token = Doorkeeper.configuration.refresh_token_enabled?
end
2019-07-02 08:10:25 +01:00
end
end
def activate_session(request)
session_activations.activate(session_id: SecureRandom.hex,
user_agent: request.user_agent,
ip: request.remote_ip).session_id
2019-07-02 08:10:25 +01:00
end
def exclusive_session(id)
session_activations.exclusive(id)
end
def session_active?(id)
session_activations.active? id
end
def web_push_subscription(session)
return nil if session.nil?
2019-07-02 08:10:25 +01:00
session.web_push_subscription.nil? ? nil : session.web_push_subscription
end
def challenge
2021-01-12 04:56:42 +00:00
#
end
2019-07-02 08:10:25 +01:00
def password_required?
return false if Devise.pam_authentication || Devise.ldap_authentication
super
end
def send_reset_password_instructions
return false if encrypted_password.blank? && (Devise.pam_authentication || Devise.ldap_authentication)
super
end
def reset_password!(new_password, new_password_confirmation)
return false if encrypted_password.blank? && (Devise.pam_authentication || Devise.ldap_authentication)
super
end
def show_all_media?
setting_display_media == 'show_all'
end
def hide_all_media?
setting_display_media == 'hide_all'
end
def force_regeneration!
2021-01-12 04:56:42 +00:00
# Redis.current.set("account:#{account_id}:regeneration", true)
end
2019-07-02 08:10:25 +01:00
protected
def send_devise_notification(notification, *args)
devise_mailer.send(notification, self, *args).deliver_later
end
private
def set_approved
2021-01-12 04:56:42 +00:00
self.approved = open_registrations?
2019-07-02 08:10:25 +01:00
end
def external?
!!@external
end
def sanitize_languages
return if chosen_languages.nil?
chosen_languages.reject!(&:blank?)
self.chosen_languages = nil if chosen_languages.empty?
end
def prepare_new_user!
BootstrapTimelineWorker.perform_async(account_id)
2019-07-02 08:10:25 +01:00
ActivityTracker.increment('activity:accounts:local')
UserMailer.welcome(self).deliver_later
end
def prepare_returning_user!
ActivityTracker.record('activity:logins', id)
regenerate_feed! if needs_feed_update?
end
def regenerate_feed!
2021-01-12 04:56:42 +00:00
# return unless Redis.current.setnx("account:#{account_id}:regeneration", true)
# Redis.current.expire("account:#{account_id}:regeneration", 1.day.seconds)
# RegenerationWorker.perform_async(account_id)
return
2019-07-02 08:10:25 +01:00
end
def needs_feed_update?
last_sign_in_at < ACTIVE_DURATION.ago
end
def validate_email_dns?
email_changed? && !(Rails.env.test? || Rails.env.development?)
end
# allow username or email address for login (Gab)
def self.find_for_database_authentication conditions
if conditions[:email].start_with? "@" or !conditions[:email].include? "@"
joins(:account).find_by(accounts: { domain: nil, username: conditions[:email].sub('@', '') })
else
super
end
end
def open_registrations?
Setting.registrations_mode == 'open'
end
2019-07-02 08:10:25 +01:00
end