2016-11-16 02:56:29 +11:00
|
|
|
# frozen_string_literal: true
|
2017-05-02 10:14:47 +10:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: users
|
|
|
|
#
|
2018-04-23 19:29:17 +10:00
|
|
|
# id :bigint(8) not null, primary key
|
2017-05-02 10:14:47 +10:00
|
|
|
# email :string default(""), not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# encrypted_password :string default(""), not null
|
|
|
|
# reset_password_token :string
|
|
|
|
# reset_password_sent_at :datetime
|
|
|
|
# remember_created_at :datetime
|
|
|
|
# sign_in_count :integer default(0), not null
|
|
|
|
# current_sign_in_at :datetime
|
|
|
|
# last_sign_in_at :datetime
|
|
|
|
# current_sign_in_ip :inet
|
|
|
|
# last_sign_in_ip :inet
|
2017-07-13 11:12:25 +10:00
|
|
|
# admin :boolean default(FALSE), not null
|
2017-05-02 10:14:47 +10:00
|
|
|
# confirmation_token :string
|
|
|
|
# confirmed_at :datetime
|
|
|
|
# confirmation_sent_at :datetime
|
|
|
|
# unconfirmed_email :string
|
|
|
|
# locale :string
|
|
|
|
# encrypted_otp_secret :string
|
|
|
|
# encrypted_otp_secret_iv :string
|
|
|
|
# encrypted_otp_secret_salt :string
|
|
|
|
# consumed_timestep :integer
|
2017-07-13 11:12:25 +10:00
|
|
|
# otp_required_for_login :boolean default(FALSE), not null
|
2017-05-02 10:14:47 +10:00
|
|
|
# last_emailed_at :datetime
|
|
|
|
# otp_backup_codes :string is an Array
|
2017-05-21 01:32:44 +10:00
|
|
|
# filtered_languages :string default([]), not null, is an Array
|
2018-04-23 19:29:17 +10:00
|
|
|
# account_id :bigint(8) not null
|
2017-11-08 05:06:44 +11:00
|
|
|
# disabled :boolean default(FALSE), not null
|
2017-11-12 06:23:33 +11:00
|
|
|
# moderator :boolean default(FALSE), not null
|
2018-04-23 19:29:17 +10:00
|
|
|
# invite_id :bigint(8)
|
2018-02-02 20:18:55 +11:00
|
|
|
# remember_token :string
|
2018-06-17 21:54:02 +10:00
|
|
|
# chosen_languages :string is an Array
|
2018-12-25 05:12:38 +11:00
|
|
|
# created_by_application_id :bigint(8)
|
2019-03-14 15:28:30 +11:00
|
|
|
# approved :boolean default(TRUE), not null
|
2017-05-02 10:14:47 +10:00
|
|
|
#
|
2016-11-16 02:56:29 +11:00
|
|
|
|
2016-08-18 01:56:23 +10:00
|
|
|
class User < ApplicationRecord
|
2017-01-13 12:42:22 +11:00
|
|
|
include Settings::Extend
|
2019-03-14 12:13:42 +11:00
|
|
|
include UserRoles
|
2017-11-08 05:06:44 +11:00
|
|
|
|
2018-08-19 11:50:34 +10:00
|
|
|
# The home and list feeds will be stored in Redis for this amount
|
|
|
|
# of time, and status fan-out to followers will include only people
|
|
|
|
# within this time frame. Lowering the duration may improve performance
|
|
|
|
# if lots of people sign up, but not a lot of them check their feed
|
|
|
|
# every day. Raising the duration reduces the amount of expensive
|
|
|
|
# RegenerationWorker jobs that need to be run when those people come
|
|
|
|
# to check their feed
|
2019-01-02 20:47:32 +11:00
|
|
|
ACTIVE_DURATION = ENV.fetch('USER_ACTIVE_DAYS', 7).to_i.days.freeze
|
2017-01-13 06:46:24 +11:00
|
|
|
|
2018-01-03 02:55:00 +11:00
|
|
|
devise :two_factor_authenticatable,
|
2018-03-05 06:28:24 +11:00
|
|
|
otp_secret_encryption_key: Rails.configuration.x.otp_secret
|
2018-01-03 02:55:00 +11:00
|
|
|
|
|
|
|
devise :two_factor_backupable,
|
2017-04-15 21:26:03 +10:00
|
|
|
otp_number_of_backup_codes: 10
|
2016-03-05 23:12:24 +11:00
|
|
|
|
2018-01-03 02:55:00 +11:00
|
|
|
devise :registerable, :recoverable, :rememberable, :trackable, :validatable,
|
|
|
|
:confirmable
|
|
|
|
|
2019-03-14 12:13:42 +11:00
|
|
|
include Omniauthable
|
|
|
|
include PamAuthenticable
|
|
|
|
include LdapAuthenticable
|
2018-02-02 20:18:55 +11:00
|
|
|
|
2018-01-20 06:56:47 +11:00
|
|
|
belongs_to :account, inverse_of: :user
|
|
|
|
belongs_to :invite, counter_cache: :uses, optional: true
|
2018-12-25 05:12:38 +11:00
|
|
|
belongs_to :created_by_application, class_name: 'Doorkeeper::Application', optional: true
|
2016-03-06 08:43:05 +11:00
|
|
|
accepts_nested_attributes_for :account
|
2016-03-05 23:12:24 +11:00
|
|
|
|
2017-08-23 02:33:57 +10:00
|
|
|
has_many :applications, class_name: 'Doorkeeper::Application', as: :owner
|
2018-02-22 09:21:32 +11:00
|
|
|
has_many :backups, inverse_of: :user
|
2019-07-27 02:55:33 +10:00
|
|
|
has_many :invites, inverse_of: :user
|
2019-09-06 21:55:51 +10:00
|
|
|
has_many :markers, inverse_of: :user, dependent: :destroy
|
2017-08-23 02:33:57 +10:00
|
|
|
|
2019-04-10 00:06:30 +10:00
|
|
|
has_one :invite_request, class_name: 'UserInviteRequest', inverse_of: :user, dependent: :destroy
|
|
|
|
accepts_nested_attributes_for :invite_request, reject_if: ->(attributes) { attributes['text'].blank? }
|
|
|
|
|
2017-05-19 11:11:23 +10:00
|
|
|
validates :locale, inclusion: I18n.available_locales.map(&:to_s), if: :locale?
|
2019-05-04 07:44:44 +10:00
|
|
|
validates_with BlacklistedEmailValidator, on: :create
|
2018-12-11 08:53:25 +11:00
|
|
|
validates_with EmailMxValidator, if: :validate_email_dns?
|
2018-12-25 05:12:38 +11:00
|
|
|
validates :agreement, acceptance: { allow_nil: false, accept: [true, 'true', '1'] }, on: :create
|
2016-03-15 03:49:13 +11:00
|
|
|
|
2017-11-12 06:23:33 +11:00
|
|
|
scope :recent, -> { order(id: :desc) }
|
2019-03-14 15:28:30 +11:00
|
|
|
scope :pending, -> { where(approved: false) }
|
|
|
|
scope :approved, -> { where(approved: true) }
|
2017-03-04 09:45:48 +11:00
|
|
|
scope :confirmed, -> { where.not(confirmed_at: nil) }
|
2019-01-02 20:47:32 +11:00
|
|
|
scope :enabled, -> { where(disabled: false) }
|
2019-06-20 10:52:34 +10:00
|
|
|
scope :disabled, -> { where(disabled: true) }
|
2017-05-23 03:36:21 +10:00
|
|
|
scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) }
|
2019-06-19 02:22:02 +10:00
|
|
|
scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where(accounts: { suspended_at: nil }) }
|
2017-05-23 05:50:58 +10:00
|
|
|
scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) }
|
2020-01-21 03:00:41 +11:00
|
|
|
scope :matches_ip, ->(value) { left_joins(:session_activations).where('users.current_sign_in_ip <<= ?', value).or(left_joins(:session_activations).where('users.last_sign_in_ip <<= ?', value)).or(left_joins(:session_activations).where('session_activations.ip <<= ?', value)) }
|
2019-01-02 20:47:32 +11:00
|
|
|
scope :emailable, -> { confirmed.enabled.joins(:account).merge(Account.searchable) }
|
2016-10-07 22:17:56 +11:00
|
|
|
|
2017-05-08 11:32:52 +10:00
|
|
|
before_validation :sanitize_languages
|
2019-03-14 15:28:30 +11:00
|
|
|
before_create :set_approved
|
2017-05-08 11:32:52 +10:00
|
|
|
|
2017-06-02 04:53:37 +10:00
|
|
|
# This avoids a deprecation warning from Rails 5.1
|
|
|
|
# It seems possible that a future release of devise-two-factor will
|
|
|
|
# handle this itself, and this can be removed from our User class.
|
|
|
|
attribute :otp_secret
|
|
|
|
|
2017-06-24 02:50:53 +10:00
|
|
|
has_many :session_activations, dependent: :destroy
|
|
|
|
|
2017-11-16 02:05:20 +11:00
|
|
|
delegate :auto_play_gif, :default_sensitive, :unfollow_modal, :boost_modal, :delete_modal,
|
2018-09-25 13:09:35 +10:00
|
|
|
:reduce_motion, :system_font_ui, :noindex, :theme, :display_media, :hide_network,
|
2019-05-26 05:27:00 +10:00
|
|
|
:expand_spoilers, :default_language, :aggregate_reblogs, :show_application,
|
2019-10-25 07:51:41 +11:00
|
|
|
:advanced_layout, :use_blurhash, :use_pending_items, :trends, :crop_images,
|
2019-08-07 01:57:52 +10:00
|
|
|
to: :settings, prefix: :setting, allow_nil: false
|
2017-11-16 02:05:20 +11:00
|
|
|
|
2018-08-27 03:22:46 +10:00
|
|
|
attr_reader :invite_code
|
2019-04-25 10:49:25 +10:00
|
|
|
attr_writer :external
|
2017-11-28 02:07:59 +11:00
|
|
|
|
2017-04-23 12:43:42 +10:00
|
|
|
def confirmed?
|
|
|
|
confirmed_at.present?
|
|
|
|
end
|
|
|
|
|
2018-12-28 13:38:41 +11:00
|
|
|
def invited?
|
2019-05-20 05:40:36 +10:00
|
|
|
invite_id.present?
|
|
|
|
end
|
|
|
|
|
|
|
|
def valid_invitation?
|
2019-05-02 12:30:12 +10:00
|
|
|
invite_id.present? && invite.valid_for_use?
|
2018-12-28 13:38:41 +11:00
|
|
|
end
|
|
|
|
|
2017-11-08 05:06:44 +11:00
|
|
|
def disable!
|
|
|
|
update!(disabled: true,
|
|
|
|
last_sign_in_at: current_sign_in_at,
|
|
|
|
current_sign_in_at: nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
def enable!
|
|
|
|
update!(disabled: false)
|
|
|
|
end
|
|
|
|
|
2017-12-30 05:52:04 +11:00
|
|
|
def confirm
|
2019-03-23 12:23:48 +11:00
|
|
|
new_user = !confirmed?
|
|
|
|
self.approved = true if open_registrations?
|
2017-12-30 05:52:04 +11:00
|
|
|
|
|
|
|
super
|
2019-03-14 12:13:42 +11:00
|
|
|
|
2019-03-14 15:28:30 +11:00
|
|
|
if new_user && approved?
|
|
|
|
prepare_new_user!
|
|
|
|
elsif new_user
|
|
|
|
notify_staff_about_pending_account!
|
|
|
|
end
|
2017-12-30 05:52:04 +11:00
|
|
|
end
|
|
|
|
|
2017-11-12 06:23:33 +11:00
|
|
|
def confirm!
|
2019-03-23 12:23:48 +11:00
|
|
|
new_user = !confirmed?
|
|
|
|
self.approved = true if open_registrations?
|
2017-12-30 05:52:04 +11:00
|
|
|
|
2017-11-12 06:23:33 +11:00
|
|
|
skip_confirmation!
|
|
|
|
save!
|
2019-03-14 12:13:42 +11:00
|
|
|
|
2019-03-14 15:28:30 +11:00
|
|
|
prepare_new_user! if new_user && approved?
|
|
|
|
end
|
|
|
|
|
|
|
|
def pending?
|
|
|
|
!approved?
|
|
|
|
end
|
|
|
|
|
|
|
|
def active_for_authentication?
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
2019-07-22 18:48:50 +10:00
|
|
|
true
|
|
|
|
end
|
|
|
|
|
|
|
|
def functional?
|
2019-09-20 04:58:19 +10:00
|
|
|
confirmed? && approved? && !disabled? && !account.suspended? && account.moved_to_account_id.nil?
|
2019-03-14 15:28:30 +11:00
|
|
|
end
|
|
|
|
|
2019-09-12 00:32:44 +10:00
|
|
|
def unconfirmed_or_pending?
|
|
|
|
!(confirmed? && approved?)
|
|
|
|
end
|
|
|
|
|
2019-03-14 15:28:30 +11:00
|
|
|
def inactive_message
|
|
|
|
!approved? ? :pending : super
|
|
|
|
end
|
|
|
|
|
|
|
|
def approve!
|
|
|
|
return if approved?
|
|
|
|
|
|
|
|
update!(approved: true)
|
|
|
|
prepare_new_user!
|
2018-01-24 06:52:30 +11:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_tracked_fields!(request)
|
|
|
|
super
|
|
|
|
prepare_returning_user!
|
2017-11-12 06:23:33 +11:00
|
|
|
end
|
|
|
|
|
2017-05-03 05:07:12 +10:00
|
|
|
def disable_two_factor!
|
|
|
|
self.otp_required_for_login = false
|
|
|
|
otp_backup_codes&.clear
|
|
|
|
save!
|
|
|
|
end
|
|
|
|
|
2017-02-07 09:16:20 +11:00
|
|
|
def setting_default_privacy
|
|
|
|
settings.default_privacy || (account.locked? ? 'private' : 'public')
|
|
|
|
end
|
2017-04-12 00:10:16 +10:00
|
|
|
|
2018-01-15 14:34:28 +11:00
|
|
|
def allows_digest_emails?
|
|
|
|
settings.notification_emails['digest']
|
|
|
|
end
|
|
|
|
|
2018-09-02 08:11:58 +10:00
|
|
|
def allows_report_emails?
|
|
|
|
settings.notification_emails['report']
|
|
|
|
end
|
|
|
|
|
2019-04-10 08:35:49 +10:00
|
|
|
def allows_pending_account_emails?
|
|
|
|
settings.notification_emails['pending_account']
|
|
|
|
end
|
|
|
|
|
2019-08-06 03:54:29 +10:00
|
|
|
def allows_trending_tag_emails?
|
|
|
|
settings.notification_emails['trending_tag']
|
|
|
|
end
|
|
|
|
|
2018-05-18 10:26:51 +10:00
|
|
|
def hides_network?
|
|
|
|
@hides_network ||= settings.hide_network
|
|
|
|
end
|
|
|
|
|
2018-12-09 23:03:01 +11:00
|
|
|
def aggregates_reblogs?
|
|
|
|
@aggregates_reblogs ||= settings.aggregate_reblogs
|
|
|
|
end
|
|
|
|
|
2019-02-03 05:18:15 +11:00
|
|
|
def shows_application?
|
2019-02-21 03:47:38 +11:00
|
|
|
@shows_application ||= settings.show_application
|
2019-02-03 05:18:15 +11:00
|
|
|
end
|
|
|
|
|
2017-08-23 02:33:57 +10:00
|
|
|
def token_for_app(a)
|
|
|
|
return nil if a.nil? || a.owner != self
|
|
|
|
Doorkeeper::AccessToken
|
|
|
|
.find_or_create_by(application_id: a.id, resource_owner_id: id) do |t|
|
|
|
|
|
|
|
|
t.scopes = a.scopes
|
|
|
|
t.expires_in = Doorkeeper.configuration.access_token_expires_in
|
|
|
|
t.use_refresh_token = Doorkeeper.configuration.refresh_token_enabled?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-06-26 00:54:30 +10:00
|
|
|
def activate_session(request)
|
|
|
|
session_activations.activate(session_id: SecureRandom.hex,
|
|
|
|
user_agent: request.user_agent,
|
2017-08-30 18:24:30 +10:00
|
|
|
ip: request.remote_ip).session_id
|
2017-06-24 02:50:53 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
def exclusive_session(id)
|
|
|
|
session_activations.exclusive(id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def session_active?(id)
|
|
|
|
session_activations.active? id
|
|
|
|
end
|
|
|
|
|
2017-07-14 06:15:32 +10:00
|
|
|
def web_push_subscription(session)
|
2018-05-11 19:49:12 +10:00
|
|
|
session.web_push_subscription.nil? ? nil : session.web_push_subscription
|
2017-07-14 06:15:32 +10:00
|
|
|
end
|
|
|
|
|
2017-11-28 02:07:59 +11:00
|
|
|
def invite_code=(code)
|
2018-08-27 03:22:46 +10:00
|
|
|
self.invite = Invite.find_by(code: code) if code.present?
|
2017-11-28 02:07:59 +11:00
|
|
|
@invite_code = code
|
|
|
|
end
|
|
|
|
|
2018-02-02 20:18:55 +11:00
|
|
|
def password_required?
|
2019-09-19 00:37:27 +10:00
|
|
|
return false if external?
|
|
|
|
|
2018-02-02 20:18:55 +11:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def send_reset_password_instructions
|
2019-09-19 00:37:27 +10:00
|
|
|
return false if encrypted_password.blank?
|
|
|
|
|
2018-02-02 20:18:55 +11:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def reset_password!(new_password, new_password_confirmation)
|
2019-09-19 00:37:27 +10:00
|
|
|
return false if encrypted_password.blank?
|
|
|
|
|
2018-02-02 20:18:55 +11:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2018-09-25 13:09:35 +10:00
|
|
|
def show_all_media?
|
|
|
|
setting_display_media == 'show_all'
|
|
|
|
end
|
|
|
|
|
|
|
|
def hide_all_media?
|
|
|
|
setting_display_media == 'hide_all'
|
|
|
|
end
|
|
|
|
|
2017-05-30 23:28:56 +10:00
|
|
|
protected
|
|
|
|
|
|
|
|
def send_devise_notification(notification, *args)
|
|
|
|
devise_mailer.send(notification, self, *args).deliver_later
|
|
|
|
end
|
|
|
|
|
2017-05-08 11:32:52 +10:00
|
|
|
private
|
|
|
|
|
2019-03-14 15:28:30 +11:00
|
|
|
def set_approved
|
2019-05-20 05:40:36 +10:00
|
|
|
self.approved = open_registrations? || valid_invitation? || external?
|
2019-03-23 12:23:48 +11:00
|
|
|
end
|
|
|
|
|
|
|
|
def open_registrations?
|
|
|
|
Setting.registrations_mode == 'open'
|
2019-03-14 15:28:30 +11:00
|
|
|
end
|
|
|
|
|
2019-04-25 10:49:25 +10:00
|
|
|
def external?
|
2019-04-28 07:55:16 +10:00
|
|
|
!!@external
|
2019-04-25 10:49:25 +10:00
|
|
|
end
|
|
|
|
|
2017-05-08 11:32:52 +10:00
|
|
|
def sanitize_languages
|
2018-06-17 21:54:02 +10:00
|
|
|
return if chosen_languages.nil?
|
|
|
|
chosen_languages.reject!(&:blank?)
|
|
|
|
self.chosen_languages = nil if chosen_languages.empty?
|
2017-05-08 11:32:52 +10:00
|
|
|
end
|
2017-12-30 05:52:04 +11:00
|
|
|
|
2018-01-24 06:52:30 +11:00
|
|
|
def prepare_new_user!
|
2017-12-30 05:52:04 +11:00
|
|
|
BootstrapTimelineWorker.perform_async(account_id)
|
|
|
|
ActivityTracker.increment('activity:accounts:local')
|
2018-01-19 05:17:25 +11:00
|
|
|
UserMailer.welcome(self).deliver_later
|
2017-12-30 05:52:04 +11:00
|
|
|
end
|
2018-01-24 06:52:30 +11:00
|
|
|
|
|
|
|
def prepare_returning_user!
|
|
|
|
ActivityTracker.record('activity:logins', id)
|
|
|
|
regenerate_feed! if needs_feed_update?
|
|
|
|
end
|
|
|
|
|
2019-03-14 15:28:30 +11:00
|
|
|
def notify_staff_about_pending_account!
|
|
|
|
User.staff.includes(:account).each do |u|
|
2019-04-10 08:35:49 +10:00
|
|
|
next unless u.allows_pending_account_emails?
|
2019-03-14 15:28:30 +11:00
|
|
|
AdminMailer.new_pending_account(u.account, self).deliver_later
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-24 06:52:30 +11:00
|
|
|
def regenerate_feed!
|
2019-01-18 11:02:51 +11:00
|
|
|
return unless Redis.current.setnx("account:#{account_id}:regeneration", true)
|
|
|
|
Redis.current.expire("account:#{account_id}:regeneration", 1.day.seconds)
|
2018-01-24 06:52:30 +11:00
|
|
|
RegenerationWorker.perform_async(account_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def needs_feed_update?
|
|
|
|
last_sign_in_at < ACTIVE_DURATION.ago
|
|
|
|
end
|
2018-12-11 08:53:25 +11:00
|
|
|
|
|
|
|
def validate_email_dns?
|
|
|
|
email_changed? && !(Rails.env.test? || Rails.env.development?)
|
|
|
|
end
|
2016-02-23 02:00:20 +11:00
|
|
|
end
|