discourse/lib/guardian.rb

315 lines
7.3 KiB
Ruby
Raw Normal View History

require_dependency 'guardian/category_guardian'
require_dependency 'guardian/ensure_magic'
require_dependency 'guardian/post_guardian'
require_dependency 'guardian/topic_guardian'
require_dependency 'guardian/user_guardian'
require_dependency 'guardian/post_revision_guardian'
require_dependency 'guardian/group_guardian'
# The guardian is responsible for confirming access to various site resources and operations
2013-02-06 03:16:51 +08:00
class Guardian
include EnsureMagic
include CategoryGuardian
include PostGuardian
include TopicGuardian
include UserGuardian
include PostRevisionGuardian
include GroupGuardian
class AnonymousUser
def blank?; true; end
def admin?; false; end
def staff?; false; end
def moderator?; false; end
def approved?; false; end
def secure_category_ids; []; end
def topic_create_allowed_category_ids; []; end
def has_trust_level?(level); false; end
def email; nil; end
end
attr_accessor :can_see_emails
2013-02-06 03:16:51 +08:00
def initialize(user=nil)
@user = user.presence || AnonymousUser.new
end
def user
@user.presence
end
alias :current_user :user
def anonymous?
!authenticated?
2013-02-06 03:16:51 +08:00
end
def authenticated?
@user.present?
2013-02-06 03:16:51 +08:00
end
def is_admin?
@user.admin?
end
def is_staff?
@user.staff?
2013-02-06 03:16:51 +08:00
end
def is_moderator?
@user.moderator?
end
def is_developer?
@user &&
is_admin? &&
(Rails.env.development? ||
(
Rails.configuration.respond_to?(:developer_emails) &&
Rails.configuration.developer_emails.include?(@user.email)
)
)
end
2013-02-06 03:16:51 +08:00
# Can the user see the object?
def can_see?(obj)
if obj
see_method = method_name_for :see, obj
return (see_method ? send(see_method, obj) : true)
end
2013-02-06 03:16:51 +08:00
end
def can_create?(klass, parent=nil)
return false unless authenticated? && klass
# If no parent is provided, we look for a can_create_klass?
# custom method.
#
# If a parent is provided, we look for a method called
# can_create_klass_on_parent?
target = klass.name.underscore
if parent.present?
return false unless can_see?(parent)
target << "_on_#{parent.class.name.underscore}"
end
create_method = :"can_create_#{target}?"
return send(create_method, parent) if respond_to?(create_method)
true
end
2013-02-06 03:16:51 +08:00
# Can the user edit the obj
def can_edit?(obj)
2013-08-16 20:24:29 +08:00
can_do?(:edit, obj)
2013-02-06 03:16:51 +08:00
end
# Can we delete the object
def can_delete?(obj)
2013-08-16 20:24:29 +08:00
can_do?(:delete, obj)
2013-02-06 03:16:51 +08:00
end
def can_moderate?(obj)
obj && authenticated? && (is_staff? || (obj.is_a?(Topic) && @user.has_trust_level?(TrustLevel[4])))
2013-02-06 03:16:51 +08:00
end
2013-02-26 00:42:20 +08:00
alias :can_move_posts? :can_moderate?
2013-02-06 03:16:51 +08:00
alias :can_see_flags? :can_moderate?
alias :can_send_activation_email? :can_moderate?
alias :can_close? :can_moderate?
def can_grant_badges?(_user)
SiteSetting.enable_badges && is_staff?
end
2013-02-06 03:16:51 +08:00
def can_see_group?(group)
group.present? && (is_admin? || group.visible?)
end
2013-02-06 03:16:51 +08:00
# Can we impersonate this user?
def can_impersonate?(target)
target &&
2013-02-06 03:16:51 +08:00
# You must be an admin to impersonate
is_admin? &&
2013-02-06 03:16:51 +08:00
# You may not impersonate other admins unless you are a dev
(!target.admin? || is_developer?)
2013-02-06 03:16:51 +08:00
# Additionally, you may not impersonate yourself;
# but the two tests for different admin statuses
# make it impossible to be the same user.
2013-02-06 03:16:51 +08:00
end
# Can we approve it?
def can_approve?(target)
is_staff? && target && not(target.approved?)
2013-02-06 03:16:51 +08:00
end
def can_activate?(target)
is_staff? && target && not(target.active?)
end
2013-02-06 03:16:51 +08:00
def can_suspend?(user)
2013-05-25 00:13:31 +08:00
user && is_staff? && user.regular?
2013-02-06 03:16:51 +08:00
end
alias :can_deactivate? :can_suspend?
2013-02-06 03:16:51 +08:00
def can_revoke_admin?(admin)
can_administer_user?(admin) && admin.admin?
2013-02-06 03:16:51 +08:00
end
def can_grant_admin?(user)
can_administer_user?(user) && not(user.admin?)
2013-02-06 03:16:51 +08:00
end
def can_revoke_moderation?(moderator)
can_administer?(moderator) && moderator.moderator?
end
def can_grant_moderation?(user)
can_administer?(user) && not(user.moderator?)
end
def can_grant_title?(user)
user && is_staff?
end
def can_change_primary_group?(user)
user && is_staff?
end
def can_change_trust_level?(user)
2013-07-23 07:13:48 +08:00
user && is_staff?
end
# Support sites that have to approve users
def can_access_forum?
return true unless SiteSetting.must_approve_users?
return false unless @user
# Staff can't lock themselves out of a site
return true if is_staff?
@user.approved?
end
def can_see_invite_details?(user)
is_me?(user)
2013-02-06 03:16:51 +08:00
end
def can_invite_to_forum?(groups=nil)
authenticated? &&
!SiteSetting.enable_sso &&
SiteSetting.enable_local_logins &&
(
(!SiteSetting.must_approve_users? && @user.has_trust_level?(TrustLevel[2])) ||
is_staff?
) &&
(groups.blank? || is_admin?)
2013-02-06 03:16:51 +08:00
end
2014-05-09 09:45:18 +08:00
def can_invite_to?(object, group_ids=nil)
return false if ! authenticated?
return false unless ( SiteSetting.enable_local_logins && (!SiteSetting.must_approve_users? || is_staff?) )
return true if is_admin?
return false if ! can_see?(object)
return false if group_ids.present?
if object.is_a?(Topic) && object.category
if object.category.groups.any?
return true if object.category.groups.all? { |g| can_edit_group?(g) }
end
return false if object.category.read_restricted
end
user.has_trust_level?(TrustLevel[2])
end
2014-05-28 04:14:37 +08:00
def can_bulk_invite_to_forum?(user)
user.admin?
end
2014-07-14 23:56:26 +08:00
def can_create_disposable_invite?(user)
user.admin?
end
def can_send_multiple_invites?(user)
user.staff?
end
2013-02-06 03:16:51 +08:00
def can_see_private_messages?(user_id)
is_admin? || (authenticated? && @user.id == user_id)
2013-02-06 03:16:51 +08:00
end
def can_send_private_message?(target)
2014-03-27 03:20:41 +08:00
(target.is_a?(Group) || target.is_a?(User)) &&
2014-02-13 12:08:46 +08:00
# User is authenticated
authenticated? &&
2013-02-26 00:42:20 +08:00
# Can't send message to yourself
is_not_me?(target) &&
2013-02-06 03:16:51 +08:00
# Have to be a basic level at least
@user.has_trust_level?(TrustLevel[1]) &&
2014-02-13 12:08:46 +08:00
# PMs are enabled
(SiteSetting.enable_private_messages ||
@user.username == SiteSetting.site_contact_username ||
@user == Discourse.system_user) &&
# Can't send PMs to suspended users
(is_staff? || target.is_a?(Group) || !target.suspended?)
2013-02-06 03:16:51 +08:00
end
def can_see_emails?
@can_see_emails
end
2014-12-30 20:37:05 +08:00
def can_export_entity?(entity_type)
return true if is_staff?
return false if entity_type == "admin"
UserExport.where(user_id: @user.id, created_at: (Time.zone.now.beginning_of_day..Time.zone.now.end_of_day)).count == 0
2014-12-23 00:17:04 +08:00
end
private
def is_my_own?(obj)
unless anonymous?
return obj.user_id == @user.id if obj.respond_to?(:user_id) && obj.user_id && @user.id
return obj.user == @user if obj.respond_to?(:user)
end
false
end
def is_me?(other)
2014-03-27 03:20:41 +08:00
other && authenticated? && other.is_a?(User) && @user == other
end
def is_not_me?(other)
@user.blank? || !is_me?(other)
end
def can_administer?(obj)
is_admin? && obj.present?
end
def can_administer_user?(other_user)
can_administer?(other_user) && is_not_me?(other_user)
end
def method_name_for(action, obj)
method_name = :"can_#{action}_#{obj.class.name.underscore}?"
return method_name if respond_to?(method_name)
end
2013-08-16 20:24:29 +08:00
def can_do?(action, obj)
if obj && authenticated?
action_method = method_name_for action, obj
return (action_method ? send(action_method, obj) : true)
else
false
2013-08-16 20:24:29 +08:00
end
end
2013-02-06 03:16:51 +08:00
end