2016-11-16 00:56:29 +09:00
|
|
|
# frozen_string_literal: true
|
2017-05-02 09:14:47 +09:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: users
|
|
|
|
#
|
2018-04-23 18:29:17 +09:00
|
|
|
# id :bigint(8) not null, primary key
|
2017-05-02 09:14:47 +09:00
|
|
|
# email :string default(""), not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# encrypted_password :string default(""), not null
|
|
|
|
# reset_password_token :string
|
|
|
|
# reset_password_sent_at :datetime
|
|
|
|
# remember_created_at :datetime
|
|
|
|
# sign_in_count :integer default(0), not null
|
|
|
|
# current_sign_in_at :datetime
|
|
|
|
# last_sign_in_at :datetime
|
|
|
|
# current_sign_in_ip :inet
|
|
|
|
# last_sign_in_ip :inet
|
2017-07-13 10:12:25 +09:00
|
|
|
# admin :boolean default(FALSE), not null
|
2017-05-02 09:14:47 +09:00
|
|
|
# confirmation_token :string
|
|
|
|
# confirmed_at :datetime
|
|
|
|
# confirmation_sent_at :datetime
|
|
|
|
# unconfirmed_email :string
|
|
|
|
# locale :string
|
|
|
|
# encrypted_otp_secret :string
|
|
|
|
# encrypted_otp_secret_iv :string
|
|
|
|
# encrypted_otp_secret_salt :string
|
|
|
|
# consumed_timestep :integer
|
2017-07-13 10:12:25 +09:00
|
|
|
# otp_required_for_login :boolean default(FALSE), not null
|
2017-05-02 09:14:47 +09:00
|
|
|
# last_emailed_at :datetime
|
|
|
|
# otp_backup_codes :string is an Array
|
2017-05-21 00:32:44 +09:00
|
|
|
# filtered_languages :string default([]), not null, is an Array
|
2018-04-23 18:29:17 +09:00
|
|
|
# account_id :bigint(8) not null
|
2017-11-08 03:06:44 +09:00
|
|
|
# disabled :boolean default(FALSE), not null
|
2017-11-12 04:23:33 +09:00
|
|
|
# moderator :boolean default(FALSE), not null
|
2018-04-23 18:29:17 +09:00
|
|
|
# invite_id :bigint(8)
|
2018-02-02 18:18:55 +09:00
|
|
|
# remember_token :string
|
2018-06-17 20:54:02 +09:00
|
|
|
# chosen_languages :string is an Array
|
2018-12-25 03:12:38 +09:00
|
|
|
# created_by_application_id :bigint(8)
|
2017-05-02 09:14:47 +09:00
|
|
|
#
|
2016-11-16 00:56:29 +09:00
|
|
|
|
2016-08-18 00:56:23 +09:00
|
|
|
class User < ApplicationRecord
|
2017-01-13 10:42:22 +09:00
|
|
|
include Settings::Extend
|
2018-02-04 13:42:13 +09:00
|
|
|
include Omniauthable
|
2017-11-08 03:06:44 +09:00
|
|
|
|
2018-08-19 10:50:34 +09:00
|
|
|
# The home and list feeds will be stored in Redis for this amount
|
|
|
|
# of time, and status fan-out to followers will include only people
|
|
|
|
# within this time frame. Lowering the duration may improve performance
|
|
|
|
# if lots of people sign up, but not a lot of them check their feed
|
|
|
|
# every day. Raising the duration reduces the amount of expensive
|
|
|
|
# RegenerationWorker jobs that need to be run when those people come
|
|
|
|
# to check their feed
|
2019-01-02 18:47:32 +09:00
|
|
|
ACTIVE_DURATION = ENV.fetch('USER_ACTIVE_DAYS', 7).to_i.days.freeze
|
2017-01-13 04:46:24 +09:00
|
|
|
|
2018-01-03 00:55:00 +09:00
|
|
|
devise :two_factor_authenticatable,
|
2018-03-05 04:28:24 +09:00
|
|
|
otp_secret_encryption_key: Rails.configuration.x.otp_secret
|
2018-01-03 00:55:00 +09:00
|
|
|
|
|
|
|
devise :two_factor_backupable,
|
2017-04-15 20:26:03 +09:00
|
|
|
otp_number_of_backup_codes: 10
|
2016-03-05 21:12:24 +09:00
|
|
|
|
2018-01-03 00:55:00 +09:00
|
|
|
devise :registerable, :recoverable, :rememberable, :trackable, :validatable,
|
|
|
|
:confirmable
|
|
|
|
|
2018-03-20 04:08:56 +09:00
|
|
|
devise :pam_authenticatable if ENV['PAM_ENABLED'] == 'true'
|
|
|
|
|
2018-02-04 13:42:13 +09:00
|
|
|
devise :omniauthable
|
2018-02-02 18:18:55 +09:00
|
|
|
|
2018-01-20 04:56:47 +09:00
|
|
|
belongs_to :account, inverse_of: :user
|
|
|
|
belongs_to :invite, counter_cache: :uses, optional: true
|
2018-12-25 03:12:38 +09:00
|
|
|
belongs_to :created_by_application, class_name: 'Doorkeeper::Application', optional: true
|
2016-03-06 06:43:05 +09:00
|
|
|
accepts_nested_attributes_for :account
|
2016-03-05 21:12:24 +09:00
|
|
|
|
2017-08-23 01:33:57 +09:00
|
|
|
has_many :applications, class_name: 'Doorkeeper::Application', as: :owner
|
2018-02-22 07:21:32 +09:00
|
|
|
has_many :backups, inverse_of: :user
|
2017-08-23 01:33:57 +09:00
|
|
|
|
2017-05-19 10:11:23 +09:00
|
|
|
validates :locale, inclusion: I18n.available_locales.map(&:to_s), if: :locale?
|
2017-06-10 02:46:01 +09:00
|
|
|
validates_with BlacklistedEmailValidator, if: :email_changed?
|
2018-12-11 06:53:25 +09:00
|
|
|
validates_with EmailMxValidator, if: :validate_email_dns?
|
2018-12-25 03:12:38 +09:00
|
|
|
validates :agreement, acceptance: { allow_nil: false, accept: [true, 'true', '1'] }, on: :create
|
2016-03-15 01:49:13 +09:00
|
|
|
|
2017-11-12 04:23:33 +09:00
|
|
|
scope :recent, -> { order(id: :desc) }
|
|
|
|
scope :admins, -> { where(admin: true) }
|
|
|
|
scope :moderators, -> { where(moderator: true) }
|
|
|
|
scope :staff, -> { admins.or(moderators) }
|
2017-03-04 07:45:48 +09:00
|
|
|
scope :confirmed, -> { where.not(confirmed_at: nil) }
|
2019-01-02 18:47:32 +09:00
|
|
|
scope :enabled, -> { where(disabled: false) }
|
2017-05-23 02:36:21 +09:00
|
|
|
scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) }
|
2017-07-23 08:15:04 +09:00
|
|
|
scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where(accounts: { suspended: false }) }
|
2017-05-23 04:50:58 +09:00
|
|
|
scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) }
|
2019-01-02 18:47:32 +09:00
|
|
|
scope :emailable, -> { confirmed.enabled.joins(:account).merge(Account.searchable) }
|
2016-10-07 20:17:56 +09:00
|
|
|
|
2017-05-08 10:32:52 +09:00
|
|
|
before_validation :sanitize_languages
|
|
|
|
|
2017-06-02 03:53:37 +09:00
|
|
|
# This avoids a deprecation warning from Rails 5.1
|
|
|
|
# It seems possible that a future release of devise-two-factor will
|
|
|
|
# handle this itself, and this can be removed from our User class.
|
|
|
|
attribute :otp_secret
|
|
|
|
|
2017-06-24 01:50:53 +09:00
|
|
|
has_many :session_activations, dependent: :destroy
|
|
|
|
|
2017-11-16 00:05:20 +09:00
|
|
|
delegate :auto_play_gif, :default_sensitive, :unfollow_modal, :boost_modal, :delete_modal,
|
2018-09-25 12:09:35 +09:00
|
|
|
:reduce_motion, :system_font_ui, :noindex, :theme, :display_media, :hide_network,
|
2019-02-03 03:18:15 +09:00
|
|
|
:expand_spoilers, :default_language, :aggregate_reblogs, :show_application, to: :settings, prefix: :setting, allow_nil: false
|
2017-11-16 00:05:20 +09:00
|
|
|
|
2018-08-27 02:22:46 +09:00
|
|
|
attr_reader :invite_code
|
2017-11-28 00:07:59 +09:00
|
|
|
|
2018-02-02 18:18:55 +09:00
|
|
|
def pam_conflict(_)
|
|
|
|
# block pam login tries on traditional account
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
|
|
|
def pam_conflict?
|
|
|
|
return false unless Devise.pam_authentication
|
2018-03-20 04:08:56 +09:00
|
|
|
encrypted_password.present? && pam_managed_user?
|
2018-02-02 18:18:55 +09:00
|
|
|
end
|
|
|
|
|
|
|
|
def pam_get_name
|
|
|
|
return account.username if account.present?
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def pam_setup(_attributes)
|
|
|
|
acc = Account.new(username: pam_get_name)
|
|
|
|
acc.save!(validate: false)
|
|
|
|
|
|
|
|
self.email = "#{acc.username}@#{find_pam_suffix}" if email.nil? && find_pam_suffix
|
|
|
|
self.confirmed_at = Time.now.utc
|
|
|
|
self.admin = false
|
|
|
|
self.account = acc
|
|
|
|
|
|
|
|
acc.destroy! unless save
|
|
|
|
end
|
|
|
|
|
2018-03-01 03:04:53 +09:00
|
|
|
def ldap_setup(_attributes)
|
|
|
|
self.confirmed_at = Time.now.utc
|
|
|
|
self.admin = false
|
|
|
|
save!
|
|
|
|
end
|
|
|
|
|
2017-04-23 11:43:42 +09:00
|
|
|
def confirmed?
|
|
|
|
confirmed_at.present?
|
|
|
|
end
|
|
|
|
|
2018-12-28 11:38:41 +09:00
|
|
|
def invited?
|
|
|
|
invite_id.present?
|
|
|
|
end
|
|
|
|
|
2017-11-12 04:23:33 +09:00
|
|
|
def staff?
|
|
|
|
admin? || moderator?
|
|
|
|
end
|
|
|
|
|
|
|
|
def role
|
|
|
|
if admin?
|
|
|
|
'admin'
|
|
|
|
elsif moderator?
|
|
|
|
'moderator'
|
|
|
|
else
|
|
|
|
'user'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-11-28 00:07:59 +09:00
|
|
|
def role?(role)
|
|
|
|
case role
|
|
|
|
when 'user'
|
|
|
|
true
|
|
|
|
when 'moderator'
|
|
|
|
staff?
|
|
|
|
when 'admin'
|
|
|
|
admin?
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-11-08 03:06:44 +09:00
|
|
|
def disable!
|
|
|
|
update!(disabled: true,
|
|
|
|
last_sign_in_at: current_sign_in_at,
|
|
|
|
current_sign_in_at: nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
def enable!
|
|
|
|
update!(disabled: false)
|
|
|
|
end
|
|
|
|
|
2017-12-30 03:52:04 +09:00
|
|
|
def confirm
|
2018-01-05 08:15:35 +09:00
|
|
|
new_user = !confirmed?
|
2017-12-30 03:52:04 +09:00
|
|
|
|
|
|
|
super
|
2018-01-24 04:52:30 +09:00
|
|
|
prepare_new_user! if new_user
|
2017-12-30 03:52:04 +09:00
|
|
|
end
|
|
|
|
|
2017-11-12 04:23:33 +09:00
|
|
|
def confirm!
|
2018-01-05 08:15:35 +09:00
|
|
|
new_user = !confirmed?
|
2017-12-30 03:52:04 +09:00
|
|
|
|
2017-11-12 04:23:33 +09:00
|
|
|
skip_confirmation!
|
|
|
|
save!
|
2018-01-24 04:52:30 +09:00
|
|
|
prepare_new_user! if new_user
|
|
|
|
end
|
|
|
|
|
|
|
|
def update_tracked_fields!(request)
|
|
|
|
super
|
|
|
|
prepare_returning_user!
|
2017-11-12 04:23:33 +09:00
|
|
|
end
|
|
|
|
|
|
|
|
def promote!
|
|
|
|
if moderator?
|
|
|
|
update!(moderator: false, admin: true)
|
|
|
|
elsif !admin?
|
|
|
|
update!(moderator: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def demote!
|
|
|
|
if admin?
|
|
|
|
update!(admin: false, moderator: true)
|
|
|
|
elsif moderator?
|
|
|
|
update!(moderator: false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-05-03 04:07:12 +09:00
|
|
|
def disable_two_factor!
|
|
|
|
self.otp_required_for_login = false
|
|
|
|
otp_backup_codes&.clear
|
|
|
|
save!
|
|
|
|
end
|
|
|
|
|
2017-02-07 07:16:20 +09:00
|
|
|
def setting_default_privacy
|
|
|
|
settings.default_privacy || (account.locked? ? 'private' : 'public')
|
|
|
|
end
|
2017-04-11 23:10:16 +09:00
|
|
|
|
2018-01-15 12:34:28 +09:00
|
|
|
def allows_digest_emails?
|
|
|
|
settings.notification_emails['digest']
|
|
|
|
end
|
|
|
|
|
2018-09-02 07:11:58 +09:00
|
|
|
def allows_report_emails?
|
|
|
|
settings.notification_emails['report']
|
|
|
|
end
|
|
|
|
|
2018-05-18 09:26:51 +09:00
|
|
|
def hides_network?
|
|
|
|
@hides_network ||= settings.hide_network
|
|
|
|
end
|
|
|
|
|
2018-12-09 21:03:01 +09:00
|
|
|
def aggregates_reblogs?
|
|
|
|
@aggregates_reblogs ||= settings.aggregate_reblogs
|
|
|
|
end
|
|
|
|
|
2019-02-03 03:18:15 +09:00
|
|
|
def shows_application?
|
2019-02-21 01:47:38 +09:00
|
|
|
@shows_application ||= settings.show_application
|
2019-02-03 03:18:15 +09:00
|
|
|
end
|
|
|
|
|
2017-08-23 01:33:57 +09:00
|
|
|
def token_for_app(a)
|
|
|
|
return nil if a.nil? || a.owner != self
|
|
|
|
Doorkeeper::AccessToken
|
|
|
|
.find_or_create_by(application_id: a.id, resource_owner_id: id) do |t|
|
|
|
|
|
|
|
|
t.scopes = a.scopes
|
|
|
|
t.expires_in = Doorkeeper.configuration.access_token_expires_in
|
|
|
|
t.use_refresh_token = Doorkeeper.configuration.refresh_token_enabled?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-06-25 23:54:30 +09:00
|
|
|
def activate_session(request)
|
|
|
|
session_activations.activate(session_id: SecureRandom.hex,
|
|
|
|
user_agent: request.user_agent,
|
2017-08-30 17:24:30 +09:00
|
|
|
ip: request.remote_ip).session_id
|
2017-06-24 01:50:53 +09:00
|
|
|
end
|
|
|
|
|
|
|
|
def exclusive_session(id)
|
|
|
|
session_activations.exclusive(id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def session_active?(id)
|
|
|
|
session_activations.active? id
|
|
|
|
end
|
|
|
|
|
2017-07-14 05:15:32 +09:00
|
|
|
def web_push_subscription(session)
|
2018-05-11 18:49:12 +09:00
|
|
|
session.web_push_subscription.nil? ? nil : session.web_push_subscription
|
2017-07-14 05:15:32 +09:00
|
|
|
end
|
|
|
|
|
2017-11-28 00:07:59 +09:00
|
|
|
def invite_code=(code)
|
2018-08-27 02:22:46 +09:00
|
|
|
self.invite = Invite.find_by(code: code) if code.present?
|
2017-11-28 00:07:59 +09:00
|
|
|
@invite_code = code
|
|
|
|
end
|
|
|
|
|
2018-02-02 18:18:55 +09:00
|
|
|
def password_required?
|
2018-03-01 03:04:53 +09:00
|
|
|
return false if Devise.pam_authentication || Devise.ldap_authentication
|
2018-02-02 18:18:55 +09:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def send_reset_password_instructions
|
2018-03-01 03:04:53 +09:00
|
|
|
return false if encrypted_password.blank? && (Devise.pam_authentication || Devise.ldap_authentication)
|
2018-02-02 18:18:55 +09:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def reset_password!(new_password, new_password_confirmation)
|
2018-03-01 03:04:53 +09:00
|
|
|
return false if encrypted_password.blank? && (Devise.pam_authentication || Devise.ldap_authentication)
|
2018-02-02 18:18:55 +09:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.pam_get_user(attributes = {})
|
2018-03-20 04:08:56 +09:00
|
|
|
return nil unless attributes[:email]
|
2019-01-25 20:36:54 +09:00
|
|
|
|
2018-03-20 04:08:56 +09:00
|
|
|
resource =
|
|
|
|
if Devise.check_at_sign && !attributes[:email].index('@')
|
|
|
|
joins(:account).find_by(accounts: { username: attributes[:email] })
|
|
|
|
else
|
|
|
|
find_by(email: attributes[:email])
|
|
|
|
end
|
|
|
|
|
|
|
|
if resource.blank?
|
2018-12-25 03:12:38 +09:00
|
|
|
resource = new(email: attributes[:email], agreement: true)
|
2019-01-25 20:36:54 +09:00
|
|
|
|
2018-03-20 04:08:56 +09:00
|
|
|
if Devise.check_at_sign && !resource[:email].index('@')
|
|
|
|
resource[:email] = Rpam2.getenv(resource.find_pam_service, attributes[:email], attributes[:password], 'email', false)
|
|
|
|
resource[:email] = "#{attributes[:email]}@#{resource.find_pam_suffix}" unless resource[:email]
|
2018-02-02 18:18:55 +09:00
|
|
|
end
|
|
|
|
end
|
2018-03-20 04:08:56 +09:00
|
|
|
resource
|
2018-02-02 18:18:55 +09:00
|
|
|
end
|
|
|
|
|
2018-03-01 03:04:53 +09:00
|
|
|
def self.ldap_get_user(attributes = {})
|
|
|
|
resource = joins(:account).find_by(accounts: { username: attributes[Devise.ldap_uid.to_sym].first })
|
|
|
|
|
|
|
|
if resource.blank?
|
2018-12-25 03:12:38 +09:00
|
|
|
resource = new(email: attributes[:mail].first, agreement: true, account_attributes: { username: attributes[Devise.ldap_uid.to_sym].first })
|
2018-03-01 03:04:53 +09:00
|
|
|
resource.ldap_setup(attributes)
|
|
|
|
end
|
|
|
|
|
|
|
|
resource
|
|
|
|
end
|
|
|
|
|
2018-02-02 18:18:55 +09:00
|
|
|
def self.authenticate_with_pam(attributes = {})
|
|
|
|
return nil unless Devise.pam_authentication
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2018-09-25 12:09:35 +09:00
|
|
|
def show_all_media?
|
|
|
|
setting_display_media == 'show_all'
|
|
|
|
end
|
|
|
|
|
|
|
|
def hide_all_media?
|
|
|
|
setting_display_media == 'hide_all'
|
|
|
|
end
|
|
|
|
|
2017-05-30 22:28:56 +09:00
|
|
|
protected
|
|
|
|
|
|
|
|
def send_devise_notification(notification, *args)
|
|
|
|
devise_mailer.send(notification, self, *args).deliver_later
|
|
|
|
end
|
|
|
|
|
2017-05-08 10:32:52 +09:00
|
|
|
private
|
|
|
|
|
|
|
|
def sanitize_languages
|
2018-06-17 20:54:02 +09:00
|
|
|
return if chosen_languages.nil?
|
|
|
|
chosen_languages.reject!(&:blank?)
|
|
|
|
self.chosen_languages = nil if chosen_languages.empty?
|
2017-05-08 10:32:52 +09:00
|
|
|
end
|
2017-12-30 03:52:04 +09:00
|
|
|
|
2018-01-24 04:52:30 +09:00
|
|
|
def prepare_new_user!
|
2017-12-30 03:52:04 +09:00
|
|
|
BootstrapTimelineWorker.perform_async(account_id)
|
|
|
|
ActivityTracker.increment('activity:accounts:local')
|
2018-01-19 03:17:25 +09:00
|
|
|
UserMailer.welcome(self).deliver_later
|
2017-12-30 03:52:04 +09:00
|
|
|
end
|
2018-01-24 04:52:30 +09:00
|
|
|
|
|
|
|
def prepare_returning_user!
|
|
|
|
ActivityTracker.record('activity:logins', id)
|
|
|
|
regenerate_feed! if needs_feed_update?
|
|
|
|
end
|
|
|
|
|
|
|
|
def regenerate_feed!
|
2019-01-18 09:02:51 +09:00
|
|
|
return unless Redis.current.setnx("account:#{account_id}:regeneration", true)
|
|
|
|
Redis.current.expire("account:#{account_id}:regeneration", 1.day.seconds)
|
2018-01-24 04:52:30 +09:00
|
|
|
RegenerationWorker.perform_async(account_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def needs_feed_update?
|
|
|
|
last_sign_in_at < ACTIVE_DURATION.ago
|
|
|
|
end
|
2018-12-11 06:53:25 +09:00
|
|
|
|
|
|
|
def validate_email_dns?
|
|
|
|
email_changed? && !(Rails.env.test? || Rails.env.development?)
|
|
|
|
end
|
2016-02-23 00:00:20 +09:00
|
|
|
end
|