You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
525 lines
15 KiB
525 lines
15 KiB
# frozen_string_literal: true |
|
# == Schema Information |
|
# |
|
# Table name: users |
|
# |
|
# id :bigint(8) not null, primary key |
|
# email :string default(""), not null |
|
# created_at :datetime not null |
|
# updated_at :datetime not null |
|
# encrypted_password :string default(""), not null |
|
# reset_password_token :string |
|
# reset_password_sent_at :datetime |
|
# sign_in_count :integer default(0), not null |
|
# current_sign_in_at :datetime |
|
# last_sign_in_at :datetime |
|
# admin :boolean default(FALSE), not null |
|
# confirmation_token :string |
|
# confirmed_at :datetime |
|
# confirmation_sent_at :datetime |
|
# unconfirmed_email :string |
|
# locale :string |
|
# encrypted_otp_secret :string |
|
# encrypted_otp_secret_iv :string |
|
# encrypted_otp_secret_salt :string |
|
# consumed_timestep :integer |
|
# otp_required_for_login :boolean default(FALSE), not null |
|
# last_emailed_at :datetime |
|
# otp_backup_codes :string is an Array |
|
# account_id :bigint(8) not null |
|
# disabled :boolean default(FALSE), not null |
|
# moderator :boolean default(FALSE), not null |
|
# invite_id :bigint(8) |
|
# chosen_languages :string is an Array |
|
# created_by_application_id :bigint(8) |
|
# approved :boolean default(TRUE), not null |
|
# sign_in_token :string |
|
# sign_in_token_sent_at :datetime |
|
# webauthn_id :string |
|
# sign_up_ip :inet |
|
# role_id :bigint(8) |
|
# |
|
|
|
class User < ApplicationRecord |
|
self.ignored_columns = %w( |
|
remember_created_at |
|
remember_token |
|
current_sign_in_ip |
|
last_sign_in_ip |
|
skip_sign_in_token |
|
filtered_languages |
|
) |
|
|
|
include Settings::Extend |
|
include Redisable |
|
include LanguagesHelper |
|
|
|
# The home and list feeds will be stored in Redis for this amount |
|
# of time, and status fan-out to followers will include only people |
|
# within this time frame. Lowering the duration may improve performance |
|
# if lots of people sign up, but not a lot of them check their feed |
|
# every day. Raising the duration reduces the amount of expensive |
|
# RegenerationWorker jobs that need to be run when those people come |
|
# to check their feed |
|
ACTIVE_DURATION = ENV.fetch('USER_ACTIVE_DAYS', 7).to_i.days.freeze |
|
|
|
devise :two_factor_authenticatable, |
|
otp_secret_encryption_key: Rails.configuration.x.otp_secret |
|
|
|
devise :two_factor_backupable, |
|
otp_number_of_backup_codes: 10 |
|
|
|
devise :registerable, :recoverable, :validatable, |
|
:confirmable |
|
|
|
include Omniauthable |
|
include PamAuthenticable |
|
include LdapAuthenticable |
|
|
|
belongs_to :account, inverse_of: :user |
|
belongs_to :invite, counter_cache: :uses, optional: true |
|
belongs_to :created_by_application, class_name: 'Doorkeeper::Application', optional: true |
|
belongs_to :role, class_name: 'UserRole', optional: true |
|
accepts_nested_attributes_for :account |
|
|
|
has_many :applications, class_name: 'Doorkeeper::Application', as: :owner |
|
has_many :backups, inverse_of: :user |
|
has_many :invites, inverse_of: :user |
|
has_many :markers, inverse_of: :user, dependent: :destroy |
|
has_many :webauthn_credentials, dependent: :destroy |
|
has_many :ips, class_name: 'UserIp', inverse_of: :user |
|
|
|
has_one :invite_request, class_name: 'UserInviteRequest', inverse_of: :user, dependent: :destroy |
|
accepts_nested_attributes_for :invite_request, reject_if: ->(attributes) { attributes['text'].blank? && !Setting.require_invite_text } |
|
validates :invite_request, presence: true, on: :create, if: :invite_text_required? |
|
|
|
validates :locale, inclusion: I18n.available_locales.map(&:to_s), if: :locale? |
|
validates_with BlacklistedEmailValidator, if: -> { ENV['EMAIL_DOMAIN_LISTS_APPLY_AFTER_CONFIRMATION'] == 'true' || !confirmed? } |
|
validates_with EmailMxValidator, if: :validate_email_dns? |
|
validates :agreement, acceptance: { allow_nil: false, accept: [true, 'true', '1'] }, on: :create |
|
|
|
# Honeypot/anti-spam fields |
|
attr_accessor :registration_form_time, :website, :confirm_password |
|
|
|
validates_with RegistrationFormTimeValidator, on: :create |
|
validates :website, absence: true, on: :create |
|
validates :confirm_password, absence: true, on: :create |
|
validate :validate_role_elevation |
|
|
|
scope :recent, -> { order(id: :desc) } |
|
scope :pending, -> { where(approved: false) } |
|
scope :approved, -> { where(approved: true) } |
|
scope :confirmed, -> { where.not(confirmed_at: nil) } |
|
scope :enabled, -> { where(disabled: false) } |
|
scope :disabled, -> { where(disabled: true) } |
|
scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) } |
|
scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where(accounts: { suspended_at: nil }) } |
|
scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) } |
|
scope :matches_ip, ->(value) { left_joins(:ips).where('user_ips.ip <<= ?', value).group('users.id') } |
|
scope :emailable, -> { confirmed.enabled.joins(:account).merge(Account.searchable) } |
|
|
|
before_validation :sanitize_languages |
|
before_validation :sanitize_role |
|
before_create :set_approved |
|
after_commit :send_pending_devise_notifications |
|
after_create_commit :trigger_webhooks |
|
|
|
# This avoids a deprecation warning from Rails 5.1 |
|
# It seems possible that a future release of devise-two-factor will |
|
# handle this itself, and this can be removed from our User class. |
|
attribute :otp_secret |
|
|
|
has_many :session_activations, dependent: :destroy |
|
|
|
delegate :auto_play_gif, :default_sensitive, :unfollow_modal, :boost_modal, :delete_modal, |
|
:reduce_motion, :system_font_ui, :noindex, :theme, :display_media, |
|
:expand_spoilers, :default_language, :aggregate_reblogs, :show_application, |
|
:advanced_layout, :use_blurhash, :use_pending_items, :trends, :crop_images, |
|
:disable_swiping, :always_send_emails, |
|
to: :settings, prefix: :setting, allow_nil: false |
|
|
|
delegate :can?, to: :role |
|
|
|
attr_reader :invite_code |
|
attr_writer :external, :bypass_invite_request_check, :current_account |
|
|
|
def self.those_who_can(*any_of_privileges) |
|
matching_role_ids = UserRole.that_can(*any_of_privileges).map(&:id) |
|
|
|
if matching_role_ids.empty? |
|
none |
|
else |
|
where(role_id: matching_role_ids) |
|
end |
|
end |
|
|
|
def role |
|
if role_id.nil? |
|
UserRole.everyone |
|
else |
|
super |
|
end |
|
end |
|
|
|
def confirmed? |
|
confirmed_at.present? |
|
end |
|
|
|
def invited? |
|
invite_id.present? |
|
end |
|
|
|
def valid_invitation? |
|
invite_id.present? && invite.valid_for_use? |
|
end |
|
|
|
def disable! |
|
update!(disabled: true) |
|
end |
|
|
|
def enable! |
|
update!(disabled: false) |
|
end |
|
|
|
def to_log_human_identifier |
|
account.acct |
|
end |
|
|
|
def to_log_route_param |
|
account_id |
|
end |
|
|
|
def confirm |
|
new_user = !confirmed? |
|
self.approved = true if open_registrations? && !sign_up_from_ip_requires_approval? |
|
|
|
super |
|
|
|
if new_user && approved? |
|
prepare_new_user! |
|
elsif new_user |
|
notify_staff_about_pending_account! |
|
end |
|
end |
|
|
|
def confirm! |
|
new_user = !confirmed? |
|
self.approved = true if open_registrations? |
|
|
|
skip_confirmation! |
|
save! |
|
|
|
prepare_new_user! if new_user && approved? |
|
end |
|
|
|
def update_sign_in!(new_sign_in: false) |
|
old_current = current_sign_in_at |
|
new_current = Time.now.utc |
|
|
|
self.last_sign_in_at = old_current || new_current |
|
self.current_sign_in_at = new_current |
|
|
|
if new_sign_in |
|
self.sign_in_count ||= 0 |
|
self.sign_in_count += 1 |
|
end |
|
|
|
save(validate: false) unless new_record? |
|
prepare_returning_user! |
|
end |
|
|
|
def pending? |
|
!approved? |
|
end |
|
|
|
def active_for_authentication? |
|
!account.memorial? |
|
end |
|
|
|
def functional? |
|
functional_or_moved? && account.moved_to_account_id.nil? |
|
end |
|
|
|
def functional_or_moved? |
|
confirmed? && approved? && !disabled? && !account.suspended? && !account.memorial? |
|
end |
|
|
|
def unconfirmed? |
|
!confirmed? |
|
end |
|
|
|
def unconfirmed_or_pending? |
|
unconfirmed? || pending? |
|
end |
|
|
|
def inactive_message |
|
!approved? ? :pending : super |
|
end |
|
|
|
def approve! |
|
return if approved? |
|
|
|
update!(approved: true) |
|
prepare_new_user! |
|
end |
|
|
|
def otp_enabled? |
|
otp_required_for_login |
|
end |
|
|
|
def webauthn_enabled? |
|
webauthn_credentials.any? |
|
end |
|
|
|
def two_factor_enabled? |
|
otp_required_for_login? || webauthn_credentials.any? |
|
end |
|
|
|
def disable_two_factor! |
|
self.otp_required_for_login = false |
|
self.otp_secret = nil |
|
otp_backup_codes&.clear |
|
|
|
webauthn_credentials.destroy_all if webauthn_enabled? |
|
|
|
save! |
|
end |
|
|
|
def prefers_noindex? |
|
setting_noindex |
|
end |
|
|
|
def preferred_posting_language |
|
valid_locale_cascade(settings.default_language, locale, I18n.locale) |
|
end |
|
|
|
def setting_default_privacy |
|
settings.default_privacy || (account.locked? ? 'private' : 'public') |
|
end |
|
|
|
def allows_report_emails? |
|
settings.notification_emails['report'] |
|
end |
|
|
|
def allows_pending_account_emails? |
|
settings.notification_emails['pending_account'] |
|
end |
|
|
|
def allows_appeal_emails? |
|
settings.notification_emails['appeal'] |
|
end |
|
|
|
def allows_trends_review_emails? |
|
settings.notification_emails['trending_tag'] |
|
end |
|
|
|
def aggregates_reblogs? |
|
@aggregates_reblogs ||= settings.aggregate_reblogs |
|
end |
|
|
|
def shows_application? |
|
@shows_application ||= settings.show_application |
|
end |
|
|
|
def token_for_app(app) |
|
return nil if app.nil? || app.owner != self |
|
|
|
Doorkeeper::AccessToken.find_or_create_by(application_id: app.id, resource_owner_id: id) do |t| |
|
t.scopes = app.scopes |
|
t.expires_in = Doorkeeper.configuration.access_token_expires_in |
|
t.use_refresh_token = Doorkeeper.configuration.refresh_token_enabled? |
|
end |
|
end |
|
|
|
def activate_session(request) |
|
session_activations.activate( |
|
session_id: SecureRandom.hex, |
|
user_agent: request.user_agent, |
|
ip: request.remote_ip |
|
).session_id |
|
end |
|
|
|
def clear_other_sessions(id) |
|
session_activations.exclusive(id) |
|
end |
|
|
|
def web_push_subscription(session) |
|
session.web_push_subscription.nil? ? nil : session.web_push_subscription |
|
end |
|
|
|
def invite_code=(code) |
|
self.invite = Invite.find_by(code: code) if code.present? |
|
@invite_code = code |
|
end |
|
|
|
def password_required? |
|
return false if external? |
|
|
|
super |
|
end |
|
|
|
def external_or_valid_password?(compare_password) |
|
# If encrypted_password is blank, we got the user from LDAP or PAM, |
|
# so credentials are already valid |
|
|
|
encrypted_password.blank? || valid_password?(compare_password) |
|
end |
|
|
|
def send_reset_password_instructions |
|
return false if encrypted_password.blank? |
|
|
|
super |
|
end |
|
|
|
def reset_password(new_password, new_password_confirmation) |
|
return false if encrypted_password.blank? |
|
|
|
super |
|
end |
|
|
|
def reset_password! |
|
# First, change password to something random and deactivate all sessions |
|
transaction do |
|
update(password: SecureRandom.hex) |
|
session_activations.destroy_all |
|
end |
|
|
|
# Then, remove all authorized applications and connected push subscriptions |
|
Doorkeeper::AccessGrant.by_resource_owner(self).in_batches.update_all(revoked_at: Time.now.utc) |
|
|
|
Doorkeeper::AccessToken.by_resource_owner(self).in_batches do |batch| |
|
batch.update_all(revoked_at: Time.now.utc) |
|
Web::PushSubscription.where(access_token_id: batch).delete_all |
|
end |
|
|
|
# Finally, send a reset password prompt to the user |
|
send_reset_password_instructions |
|
end |
|
|
|
def show_all_media? |
|
setting_display_media == 'show_all' |
|
end |
|
|
|
def hide_all_media? |
|
setting_display_media == 'hide_all' |
|
end |
|
|
|
protected |
|
|
|
def send_devise_notification(notification, *args, **kwargs) |
|
# This method can be called in `after_update` and `after_commit` hooks, |
|
# but we must make sure the mailer is actually called *after* commit, |
|
# otherwise it may work on stale data. To do this, figure out if we are |
|
# within a transaction. |
|
|
|
# It seems like devise sends keyword arguments as a hash in the last |
|
# positional argument |
|
kwargs = args.pop if args.last.is_a?(Hash) && kwargs.empty? |
|
|
|
if ActiveRecord::Base.connection.current_transaction.try(:records)&.include?(self) |
|
pending_devise_notifications << [notification, args, kwargs] |
|
else |
|
render_and_send_devise_message(notification, *args, **kwargs) |
|
end |
|
end |
|
|
|
private |
|
|
|
def send_pending_devise_notifications |
|
pending_devise_notifications.each do |notification, args, kwargs| |
|
render_and_send_devise_message(notification, *args, **kwargs) |
|
end |
|
|
|
# Empty the pending notifications array because the |
|
# after_commit hook can be called multiple times which |
|
# could cause multiple emails to be sent. |
|
pending_devise_notifications.clear |
|
end |
|
|
|
def pending_devise_notifications |
|
@pending_devise_notifications ||= [] |
|
end |
|
|
|
def render_and_send_devise_message(notification, *args, **kwargs) |
|
devise_mailer.send(notification, self, *args, **kwargs).deliver_later |
|
end |
|
|
|
def set_approved |
|
self.approved = begin |
|
if sign_up_from_ip_requires_approval? |
|
false |
|
else |
|
open_registrations? || valid_invitation? || external? |
|
end |
|
end |
|
end |
|
|
|
def sign_up_from_ip_requires_approval? |
|
!sign_up_ip.nil? && IpBlock.where(severity: :sign_up_requires_approval).where('ip >>= ?', sign_up_ip.to_s).exists? |
|
end |
|
|
|
def open_registrations? |
|
Setting.registrations_mode == 'open' |
|
end |
|
|
|
def external? |
|
!!@external |
|
end |
|
|
|
def bypass_invite_request_check? |
|
@bypass_invite_request_check |
|
end |
|
|
|
def sanitize_languages |
|
return if chosen_languages.nil? |
|
chosen_languages.reject!(&:blank?) |
|
self.chosen_languages = nil if chosen_languages.empty? |
|
end |
|
|
|
def sanitize_role |
|
return if role.nil? |
|
self.role = nil if role.everyone? |
|
end |
|
|
|
def prepare_new_user! |
|
BootstrapTimelineWorker.perform_async(account_id) |
|
ActivityTracker.increment('activity:accounts:local') |
|
UserMailer.welcome(self).deliver_later |
|
end |
|
|
|
def prepare_returning_user! |
|
ActivityTracker.record('activity:logins', id) |
|
regenerate_feed! if needs_feed_update? |
|
end |
|
|
|
def notify_staff_about_pending_account! |
|
User.those_who_can(:manage_users).includes(:account).find_each do |u| |
|
next unless u.allows_pending_account_emails? |
|
AdminMailer.new_pending_account(u.account, self).deliver_later |
|
end |
|
end |
|
|
|
def regenerate_feed! |
|
RegenerationWorker.perform_async(account_id) if redis.set("account:#{account_id}:regeneration", true, nx: true, ex: 1.day.seconds) |
|
end |
|
|
|
def needs_feed_update? |
|
last_sign_in_at < ACTIVE_DURATION.ago |
|
end |
|
|
|
def validate_email_dns? |
|
email_changed? && !external? && !(Rails.env.test? || Rails.env.development?) |
|
end |
|
|
|
def validate_role_elevation |
|
errors.add(:role_id, :elevated) if defined?(@current_account) && role&.overrides?(@current_account&.user_role) |
|
end |
|
|
|
def invite_text_required? |
|
Setting.require_invite_text && !open_registrations? && !invited? && !external? && !bypass_invite_request_check? |
|
end |
|
|
|
def trigger_webhooks |
|
TriggerWebhookWorker.perform_async('account.created', 'Account', account_id) |
|
end |
|
end
|
|
|