123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523 |
- # frozen_string_literal: true
- # == Schema Information
- #
- # Table name: users
- #
- # id :bigint(8) not null, primary key
- # email :string default(""), not null
- # created_at :datetime not null
- # updated_at :datetime not null
- # encrypted_password :string default(""), not null
- # reset_password_token :string
- # reset_password_sent_at :datetime
- # sign_in_count :integer default(0), not null
- # current_sign_in_at :datetime
- # last_sign_in_at :datetime
- # admin :boolean default(FALSE), not null
- # confirmation_token :string
- # confirmed_at :datetime
- # confirmation_sent_at :datetime
- # unconfirmed_email :string
- # locale :string
- # encrypted_otp_secret :string
- # encrypted_otp_secret_iv :string
- # encrypted_otp_secret_salt :string
- # consumed_timestep :integer
- # otp_required_for_login :boolean default(FALSE), not null
- # last_emailed_at :datetime
- # otp_backup_codes :string is an Array
- # account_id :bigint(8) not null
- # disabled :boolean default(FALSE), not null
- # moderator :boolean default(FALSE), not null
- # invite_id :bigint(8)
- # chosen_languages :string is an Array
- # created_by_application_id :bigint(8)
- # approved :boolean default(TRUE), not null
- # sign_in_token :string
- # sign_in_token_sent_at :datetime
- # webauthn_id :string
- # sign_up_ip :inet
- # role_id :bigint(8)
- # settings :text
- # time_zone :string
- #
- class User < ApplicationRecord
- self.ignored_columns += %w(
- remember_created_at
- remember_token
- current_sign_in_ip
- last_sign_in_ip
- skip_sign_in_token
- filtered_languages
- )
- include LanguagesHelper
- include Redisable
- include User::HasSettings
- include User::LdapAuthenticable
- include User::Omniauthable
- include User::PamAuthenticable
- # The home and list feeds will be stored in Redis for this amount
- # of time, and status fan-out to followers will include only people
- # within this time frame. Lowering the duration may improve performance
- # if lots of people sign up, but not a lot of them check their feed
- # every day. Raising the duration reduces the amount of expensive
- # RegenerationWorker jobs that need to be run when those people come
- # to check their feed
- ACTIVE_DURATION = ENV.fetch('USER_ACTIVE_DAYS', 7).to_i.days.freeze
- devise :two_factor_authenticatable,
- otp_secret_encryption_key: Rails.configuration.x.otp_secret
- devise :two_factor_backupable,
- otp_number_of_backup_codes: 10
- devise :registerable, :recoverable, :validatable,
- :confirmable
- belongs_to :account, inverse_of: :user
- belongs_to :invite, counter_cache: :uses, optional: true
- belongs_to :created_by_application, class_name: 'Doorkeeper::Application', optional: true
- belongs_to :role, class_name: 'UserRole', optional: true
- accepts_nested_attributes_for :account
- has_many :applications, class_name: 'Doorkeeper::Application', as: :owner, dependent: nil
- has_many :backups, inverse_of: :user, dependent: nil
- has_many :invites, inverse_of: :user, dependent: nil
- has_many :markers, inverse_of: :user, dependent: :destroy
- has_many :webauthn_credentials, dependent: :destroy
- has_many :ips, class_name: 'UserIp', inverse_of: :user, dependent: nil
- has_one :invite_request, class_name: 'UserInviteRequest', inverse_of: :user, dependent: :destroy
- accepts_nested_attributes_for :invite_request, reject_if: ->(attributes) { attributes['text'].blank? && !Setting.require_invite_text }
- validates :invite_request, presence: true, on: :create, if: :invite_text_required?
- validates_with BlacklistedEmailValidator, if: -> { ENV['EMAIL_DOMAIN_LISTS_APPLY_AFTER_CONFIRMATION'] == 'true' || !confirmed? }
- validates_with EmailMxValidator, if: :validate_email_dns?
- validates :agreement, acceptance: { allow_nil: false, accept: [true, 'true', '1'] }, on: :create
- # Honeypot/anti-spam fields
- attr_accessor :registration_form_time, :website, :confirm_password
- validates_with RegistrationFormTimeValidator, on: :create
- validates :website, absence: true, on: :create
- validates :confirm_password, absence: true, on: :create
- validate :validate_role_elevation
- scope :recent, -> { order(id: :desc) }
- scope :pending, -> { where(approved: false) }
- scope :approved, -> { where(approved: true) }
- scope :confirmed, -> { where.not(confirmed_at: nil) }
- scope :enabled, -> { where(disabled: false) }
- scope :disabled, -> { where(disabled: true) }
- scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) }
- scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where(accounts: { suspended_at: nil }) }
- scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) }
- scope :matches_ip, ->(value) { left_joins(:ips).where('user_ips.ip <<= ?', value).group('users.id') }
- before_validation :sanitize_role
- before_create :set_approved
- after_commit :send_pending_devise_notifications
- after_create_commit :trigger_webhooks
- normalizes :locale, with: ->(locale) { I18n.available_locales.exclude?(locale.to_sym) ? nil : locale }
- normalizes :time_zone, with: ->(time_zone) { ActiveSupport::TimeZone[time_zone].nil? ? nil : time_zone }
- normalizes :chosen_languages, with: ->(chosen_languages) { chosen_languages.compact_blank.presence }
- # This avoids a deprecation warning from Rails 5.1
- # It seems possible that a future release of devise-two-factor will
- # handle this itself, and this can be removed from our User class.
- attribute :otp_secret
- has_many :session_activations, dependent: :destroy
- delegate :can?, to: :role
- attr_reader :invite_code
- attr_writer :external, :bypass_invite_request_check, :current_account
- def self.those_who_can(*any_of_privileges)
- matching_role_ids = UserRole.that_can(*any_of_privileges).map(&:id)
- if matching_role_ids.empty?
- none
- else
- where(role_id: matching_role_ids)
- end
- end
- def self.skip_mx_check?
- Rails.env.local?
- end
- def role
- if role_id.nil?
- UserRole.everyone
- else
- super
- end
- end
- def confirmed?
- confirmed_at.present?
- end
- def invited?
- invite_id.present?
- end
- def valid_invitation?
- invite_id.present? && invite.valid_for_use?
- end
- def disable!
- update!(disabled: true)
- end
- def enable!
- update!(disabled: false)
- end
- def to_log_human_identifier
- account.acct
- end
- def to_log_route_param
- account_id
- end
- def confirm
- wrap_email_confirmation do
- super
- end
- end
- # Mark current email as confirmed, bypassing Devise
- def mark_email_as_confirmed!
- wrap_email_confirmation do
- skip_confirmation!
- save!
- end
- end
- def update_sign_in!(new_sign_in: false)
- old_current = current_sign_in_at
- new_current = Time.now.utc
- self.last_sign_in_at = old_current || new_current
- self.current_sign_in_at = new_current
- if new_sign_in
- self.sign_in_count ||= 0
- self.sign_in_count += 1
- end
- save(validate: false) unless new_record?
- prepare_returning_user!
- end
- def pending?
- !approved?
- end
- def active_for_authentication?
- !account.memorial?
- end
- def functional?
- functional_or_moved? && account.moved_to_account_id.nil?
- end
- def functional_or_moved?
- confirmed? && approved? && !disabled? && !account.unavailable? && !account.memorial?
- end
- def unconfirmed?
- !confirmed?
- end
- def unconfirmed_or_pending?
- unconfirmed? || pending?
- end
- def inactive_message
- approved? ? super : :pending
- end
- def approve!
- return if approved?
- update!(approved: true)
- # Avoid extremely unlikely race condition when approving and confirming
- # the user at the same time
- reload unless confirmed?
- prepare_new_user! if confirmed?
- end
- def otp_enabled?
- otp_required_for_login
- end
- def webauthn_enabled?
- webauthn_credentials.any?
- end
- def two_factor_enabled?
- otp_required_for_login? || webauthn_credentials.any?
- end
- def disable_two_factor!
- self.otp_required_for_login = false
- self.otp_secret = nil
- otp_backup_codes&.clear
- webauthn_credentials.destroy_all if webauthn_enabled?
- save!
- end
- def token_for_app(app)
- return nil if app.nil? || app.owner != self
- Doorkeeper::AccessToken.find_or_create_by(application_id: app.id, resource_owner_id: id) do |t|
- t.scopes = app.scopes
- t.expires_in = Doorkeeper.configuration.access_token_expires_in
- t.use_refresh_token = Doorkeeper.configuration.refresh_token_enabled?
- end
- end
- def activate_session(request)
- session_activations.activate(
- session_id: SecureRandom.hex,
- user_agent: request.user_agent,
- ip: request.remote_ip
- ).session_id
- end
- def clear_other_sessions(id)
- session_activations.exclusive(id)
- end
- def web_push_subscription(session)
- session.web_push_subscription.nil? ? nil : session.web_push_subscription
- end
- def invite_code=(code)
- self.invite = Invite.find_by(code: code) if code.present?
- @invite_code = code
- end
- def password_required?
- return false if external?
- super
- end
- def external_or_valid_password?(compare_password)
- # If encrypted_password is blank, we got the user from LDAP or PAM,
- # so credentials are already valid
- encrypted_password.blank? || valid_password?(compare_password)
- end
- def send_reset_password_instructions
- return false if encrypted_password.blank?
- super
- end
- def reset_password(new_password, new_password_confirmation)
- return false if encrypted_password.blank?
- super
- end
- def revoke_access!
- Doorkeeper::AccessGrant.by_resource_owner(self).update_all(revoked_at: Time.now.utc)
- Doorkeeper::AccessToken.by_resource_owner(self).in_batches do |batch|
- batch.update_all(revoked_at: Time.now.utc)
- Web::PushSubscription.where(access_token_id: batch).delete_all
- end
- end
- def reset_password!
- # First, change password to something random and deactivate all sessions
- transaction do
- update(password: SecureRandom.hex)
- session_activations.destroy_all
- end
- # Then, remove all authorized applications and connected push subscriptions
- revoke_access!
- # Finally, send a reset password prompt to the user
- send_reset_password_instructions
- end
- protected
- def send_devise_notification(notification, *args, **kwargs)
- # This method can be called in `after_update` and `after_commit` hooks,
- # but we must make sure the mailer is actually called *after* commit,
- # otherwise it may work on stale data. To do this, figure out if we are
- # within a transaction.
- # It seems like devise sends keyword arguments as a hash in the last
- # positional argument
- kwargs = args.pop if args.last.is_a?(Hash) && kwargs.empty?
- if ActiveRecord::Base.connection.current_transaction.try(:records)&.include?(self)
- pending_devise_notifications << [notification, args, kwargs]
- else
- render_and_send_devise_message(notification, *args, **kwargs)
- end
- end
- private
- def send_pending_devise_notifications
- pending_devise_notifications.each do |notification, args, kwargs|
- render_and_send_devise_message(notification, *args, **kwargs)
- end
- # Empty the pending notifications array because the
- # after_commit hook can be called multiple times which
- # could cause multiple emails to be sent.
- pending_devise_notifications.clear
- end
- def pending_devise_notifications
- @pending_devise_notifications ||= []
- end
- def render_and_send_devise_message(notification, *args, **kwargs)
- devise_mailer.send(notification, self, *args, **kwargs).deliver_later
- end
- def set_approved
- self.approved = begin
- if sign_up_from_ip_requires_approval? || sign_up_email_requires_approval?
- false
- else
- open_registrations? || valid_invitation? || external?
- end
- end
- end
- def grant_approval_on_confirmation?
- # Re-check approval on confirmation if the server has switched to open registrations
- open_registrations? && !sign_up_from_ip_requires_approval? && !sign_up_email_requires_approval?
- end
- def wrap_email_confirmation
- new_user = !confirmed?
- self.approved = true if grant_approval_on_confirmation?
- yield
- if new_user
- # Avoid extremely unlikely race condition when approving and confirming
- # the user at the same time
- reload unless approved?
- if approved?
- prepare_new_user!
- else
- notify_staff_about_pending_account!
- end
- end
- end
- def sign_up_from_ip_requires_approval?
- !sign_up_ip.nil? && IpBlock.where(severity: :sign_up_requires_approval).where('ip >>= ?', sign_up_ip.to_s).exists?
- end
- def sign_up_email_requires_approval?
- return false if email.blank?
- _, domain = email.split('@', 2)
- return false if domain.blank?
- records = []
- # Doing this conditionally is not very satisfying, but this is consistent
- # with the MX records validations we do and keeps the specs tractable.
- unless self.class.skip_mx_check?
- Resolv::DNS.open do |dns|
- dns.timeouts = 5
- records = dns.getresources(domain, Resolv::DNS::Resource::IN::MX).to_a.map { |e| e.exchange.to_s }.compact_blank
- end
- end
- EmailDomainBlock.requires_approval?(records + [domain], attempt_ip: sign_up_ip)
- end
- def open_registrations?
- Setting.registrations_mode == 'open'
- end
- def external?
- !!@external
- end
- def bypass_invite_request_check?
- @bypass_invite_request_check
- end
- def sanitize_role
- self.role = nil if role.present? && role.everyone?
- end
- def prepare_new_user!
- BootstrapTimelineWorker.perform_async(account_id)
- ActivityTracker.increment('activity:accounts:local')
- ActivityTracker.record('activity:logins', id)
- UserMailer.welcome(self).deliver_later
- TriggerWebhookWorker.perform_async('account.approved', 'Account', account_id)
- end
- def prepare_returning_user!
- return unless confirmed?
- ActivityTracker.record('activity:logins', id)
- regenerate_feed! if needs_feed_update?
- end
- def notify_staff_about_pending_account!
- User.those_who_can(:manage_users).includes(:account).find_each do |u|
- next unless u.allows_pending_account_emails?
- AdminMailer.with(recipient: u.account).new_pending_account(self).deliver_later
- end
- end
- def regenerate_feed!
- RegenerationWorker.perform_async(account_id) if redis.set("account:#{account_id}:regeneration", true, nx: true, ex: 1.day.seconds)
- end
- def needs_feed_update?
- last_sign_in_at < ACTIVE_DURATION.ago
- end
- def validate_email_dns?
- email_changed? && !external? && !self.class.skip_mx_check?
- end
- def validate_role_elevation
- errors.add(:role_id, :elevated) if defined?(@current_account) && role&.overrides?(@current_account&.user_role)
- end
- def invite_text_required?
- Setting.require_invite_text && !open_registrations? && !invited? && !external? && !bypass_invite_request_check?
- end
- def trigger_webhooks
- TriggerWebhookWorker.perform_async('account.created', 'Account', account_id)
- end
- end
|