2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
class User < ActiveRecord::Base
|
2017-08-15 23:46:57 +08:00
|
|
|
include Searchable
|
2013-06-07 06:07:59 +08:00
|
|
|
include Roleable
|
2014-04-28 16:31:51 +08:00
|
|
|
include HasCustomFields
|
2018-02-20 14:44:51 +08:00
|
|
|
include SecondFactorManager
|
2018-10-05 16:53:59 +08:00
|
|
|
include HasDestroyedWebHook
|
2023-10-27 17:27:04 +08:00
|
|
|
include HasDeprecatedColumns
|
2013-06-07 06:07:59 +08:00
|
|
|
|
2020-05-23 12:56:13 +08:00
|
|
|
DEFAULT_FEATURED_BADGE_COUNT = 3
|
|
|
|
|
2023-04-11 17:16:28 +08:00
|
|
|
PASSWORD_SALT_LENGTH = 16
|
|
|
|
TARGET_PASSWORD_ALGORITHM =
|
|
|
|
"$pbkdf2-#{Rails.configuration.pbkdf2_algorithm}$i=#{Rails.configuration.pbkdf2_iterations},l=32$"
|
|
|
|
|
2023-10-27 17:27:04 +08:00
|
|
|
deprecate_column :flag_level, drop_from: "3.2"
|
|
|
|
|
2020-05-23 12:56:13 +08:00
|
|
|
# not deleted on user delete
|
2013-02-06 03:16:51 +08:00
|
|
|
has_many :posts
|
2020-05-23 12:56:13 +08:00
|
|
|
has_many :topics
|
|
|
|
has_many :uploads
|
|
|
|
|
2015-09-03 02:43:15 +08:00
|
|
|
has_many :category_users, dependent: :destroy
|
2016-05-05 02:02:47 +08:00
|
|
|
has_many :tag_users, dependent: :destroy
|
2016-08-16 15:06:33 +08:00
|
|
|
has_many :user_api_keys, dependent: :destroy
|
2020-05-23 11:25:56 +08:00
|
|
|
has_many :topic_allowed_users, dependent: :destroy
|
2020-05-23 12:56:13 +08:00
|
|
|
has_many :user_archived_messages, dependent: :destroy
|
|
|
|
has_many :email_change_requests, dependent: :destroy
|
2020-05-23 11:25:56 +08:00
|
|
|
has_many :email_tokens, dependent: :destroy
|
|
|
|
has_many :topic_links, dependent: :destroy
|
|
|
|
has_many :user_uploads, dependent: :destroy
|
2022-06-09 07:24:30 +08:00
|
|
|
has_many :upload_references, as: :target, dependent: :destroy
|
2021-02-22 19:42:37 +08:00
|
|
|
has_many :user_emails, dependent: :destroy, autosave: true
|
2020-05-23 12:56:13 +08:00
|
|
|
has_many :user_associated_accounts, dependent: :destroy
|
|
|
|
has_many :oauth2_user_infos, dependent: :destroy
|
|
|
|
has_many :user_second_factors, dependent: :destroy
|
|
|
|
has_many :user_badges, -> { for_enabled_badges }, dependent: :destroy
|
|
|
|
has_many :user_auth_tokens, dependent: :destroy
|
|
|
|
has_many :group_users, dependent: :destroy
|
|
|
|
has_many :user_warnings, dependent: :destroy
|
|
|
|
has_many :api_keys, dependent: :destroy
|
|
|
|
has_many :push_subscriptions, dependent: :destroy
|
|
|
|
has_many :acting_group_histories,
|
|
|
|
dependent: :destroy,
|
|
|
|
foreign_key: :acting_user_id,
|
|
|
|
class_name: "GroupHistory"
|
|
|
|
has_many :targeted_group_histories,
|
|
|
|
dependent: :destroy,
|
|
|
|
foreign_key: :target_user_id,
|
|
|
|
class_name: "GroupHistory"
|
|
|
|
has_many :reviewable_scores, dependent: :destroy
|
2020-06-09 23:19:32 +08:00
|
|
|
has_many :invites, foreign_key: :invited_by_id, dependent: :destroy
|
2021-04-27 13:52:45 +08:00
|
|
|
has_many :user_custom_fields, dependent: :destroy
|
2021-12-09 20:30:27 +08:00
|
|
|
has_many :user_associated_groups, dependent: :destroy
|
2021-08-27 00:16:00 +08:00
|
|
|
has_many :pending_posts,
|
|
|
|
-> { merge(Reviewable.pending) },
|
|
|
|
class_name: "ReviewableQueuedPost",
|
2023-07-18 19:50:31 +08:00
|
|
|
foreign_key: :target_created_by_id
|
2020-05-23 11:25:56 +08:00
|
|
|
|
|
|
|
has_one :user_option, dependent: :destroy
|
|
|
|
has_one :user_avatar, dependent: :destroy
|
2021-03-10 20:49:13 +08:00
|
|
|
has_one :primary_email,
|
|
|
|
-> { where(primary: true) },
|
|
|
|
class_name: "UserEmail",
|
|
|
|
dependent: :destroy,
|
|
|
|
autosave: true,
|
|
|
|
validate: false
|
2020-05-23 12:56:13 +08:00
|
|
|
has_one :user_stat, dependent: :destroy
|
|
|
|
has_one :user_profile, dependent: :destroy, inverse_of: :user
|
|
|
|
has_one :single_sign_on_record, dependent: :destroy
|
|
|
|
has_one :anonymous_user_master, class_name: "AnonymousUser", dependent: :destroy
|
|
|
|
has_one :anonymous_user_shadow,
|
|
|
|
->(record) { where(active: true) },
|
|
|
|
foreign_key: :master_user_id,
|
|
|
|
class_name: "AnonymousUser",
|
|
|
|
dependent: :destroy
|
2020-06-09 23:19:32 +08:00
|
|
|
has_one :invited_user, dependent: :destroy
|
2021-01-21 00:31:52 +08:00
|
|
|
has_one :user_notification_schedule, dependent: :destroy
|
2020-05-23 11:25:56 +08:00
|
|
|
|
2020-05-23 12:56:13 +08:00
|
|
|
# delete all is faster but bypasses callbacks
|
|
|
|
has_many :bookmarks, dependent: :delete_all
|
|
|
|
has_many :notifications, dependent: :delete_all
|
|
|
|
has_many :topic_users, dependent: :delete_all
|
|
|
|
has_many :incoming_emails, dependent: :delete_all
|
|
|
|
has_many :user_visits, dependent: :delete_all
|
|
|
|
has_many :user_auth_token_logs, dependent: :delete_all
|
|
|
|
has_many :group_requests, dependent: :delete_all
|
|
|
|
has_many :muted_user_records, class_name: "MutedUser", dependent: :delete_all
|
|
|
|
has_many :ignored_user_records, class_name: "IgnoredUser", dependent: :delete_all
|
2020-12-18 23:03:51 +08:00
|
|
|
has_many :do_not_disturb_timings, dependent: :delete_all
|
2023-02-03 11:44:40 +08:00
|
|
|
has_many :sidebar_sections, dependent: :destroy
|
2022-05-27 17:15:14 +08:00
|
|
|
has_one :user_status, dependent: :destroy
|
2019-05-29 12:26:06 +08:00
|
|
|
|
2020-05-23 12:56:13 +08:00
|
|
|
# dependent deleting handled via before_destroy (special cases)
|
|
|
|
has_many :user_actions
|
|
|
|
has_many :post_actions
|
|
|
|
has_many :post_timings
|
|
|
|
has_many :directory_items
|
2021-02-22 21:07:47 +08:00
|
|
|
has_many :email_logs
|
2020-05-23 11:25:56 +08:00
|
|
|
has_many :security_keys, -> { where(enabled: true) }, class_name: "UserSecurityKey"
|
2023-08-24 14:27:38 +08:00
|
|
|
has_many :all_security_keys, class_name: "UserSecurityKey"
|
2020-05-23 11:25:56 +08:00
|
|
|
|
2020-05-23 12:56:13 +08:00
|
|
|
has_many :badges, through: :user_badges
|
2021-06-22 23:58:03 +08:00
|
|
|
has_many :default_featured_user_badges,
|
2023-11-29 13:38:07 +08:00
|
|
|
-> do
|
2021-06-22 23:58:03 +08:00
|
|
|
max_featured_rank =
|
2023-01-09 20:20:10 +08:00
|
|
|
(
|
2021-06-22 23:58:03 +08:00
|
|
|
if SiteSetting.max_favorite_badges > 0
|
|
|
|
SiteSetting.max_favorite_badges + 1
|
2023-01-09 20:20:10 +08:00
|
|
|
else
|
2021-06-22 23:58:03 +08:00
|
|
|
DEFAULT_FEATURED_BADGE_COUNT
|
2023-01-09 20:20:10 +08:00
|
|
|
end
|
|
|
|
)
|
2021-06-22 23:58:03 +08:00
|
|
|
for_enabled_badges.grouped_with_count.where("featured_rank <= ?", max_featured_rank)
|
2023-11-29 13:38:07 +08:00
|
|
|
end,
|
2021-06-22 23:58:03 +08:00
|
|
|
class_name: "UserBadge"
|
2020-05-23 12:56:13 +08:00
|
|
|
|
|
|
|
has_many :topics_allowed, through: :topic_allowed_users, source: :topic
|
|
|
|
has_many :groups, through: :group_users
|
2022-12-06 02:39:10 +08:00
|
|
|
has_many :secure_categories, -> { distinct }, through: :groups, source: :categories
|
2021-12-09 20:30:27 +08:00
|
|
|
has_many :associated_groups, through: :user_associated_groups, dependent: :destroy
|
2020-05-23 12:56:13 +08:00
|
|
|
|
|
|
|
# deleted in user_second_factors relationship
|
|
|
|
has_many :totps,
|
|
|
|
-> { where(method: UserSecondFactor.methods[:totp], enabled: true) },
|
|
|
|
class_name: "UserSecondFactor"
|
2020-05-23 11:25:56 +08:00
|
|
|
|
2019-05-29 12:26:06 +08:00
|
|
|
has_one :master_user, through: :anonymous_user_master
|
|
|
|
has_one :shadow_user, through: :anonymous_user_shadow, source: :user
|
|
|
|
|
2019-04-29 11:58:52 +08:00
|
|
|
has_one :profile_background_upload, through: :user_profile
|
|
|
|
has_one :card_background_upload, through: :user_profile
|
2013-02-06 03:16:51 +08:00
|
|
|
belongs_to :approved_by, class_name: "User"
|
2014-04-24 10:42:04 +08:00
|
|
|
belongs_to :primary_group, class_name: "Group"
|
2021-07-08 15:46:21 +08:00
|
|
|
belongs_to :flair_group, class_name: "Group"
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2015-03-24 08:55:22 +08:00
|
|
|
has_many :muted_users, through: :muted_user_records
|
2020-01-02 21:04:08 +08:00
|
|
|
has_many :ignored_users, through: :ignored_user_records
|
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
belongs_to :uploaded_avatar, class_name: "Upload"
|
2013-08-14 04:08:29 +08:00
|
|
|
|
2022-06-30 14:54:20 +08:00
|
|
|
has_many :sidebar_section_links, dependent: :delete_all
|
|
|
|
|
2013-11-15 23:27:43 +08:00
|
|
|
delegate :last_sent_email_address, to: :email_logs
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
validates_presence_of :username
|
2017-08-31 12:06:56 +08:00
|
|
|
validate :username_validator, if: :will_save_change_to_username?
|
2013-02-06 03:16:51 +08:00
|
|
|
validate :password_validator
|
2019-05-14 04:43:19 +08:00
|
|
|
validate :name_validator, if: :will_save_change_to_name?
|
2017-08-31 12:06:56 +08:00
|
|
|
validates :name, user_full_name: true, if: :will_save_change_to_name?, length: { maximum: 255 }
|
2023-10-27 15:22:38 +08:00
|
|
|
validates :ip_address, allowed_ip_address: { on: :create }
|
2023-03-30 11:52:10 +08:00
|
|
|
validates :primary_email, presence: true, unless: :skip_email_validation
|
2022-07-15 06:36:54 +08:00
|
|
|
validates :validatable_user_fields_values, watched_words: true, unless: :custom_fields_clean?
|
2017-09-12 01:22:04 +08:00
|
|
|
validates_associated :primary_email,
|
2023-12-07 06:25:00 +08:00
|
|
|
message: ->(_, user_email) { user_email[:value]&.errors&.[](:email)&.first }
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
after_initialize :add_trust_level
|
2015-08-22 02:39:21 +08:00
|
|
|
|
2017-10-25 13:02:18 +08:00
|
|
|
before_validation :set_skip_validate_email
|
2017-08-09 10:56:08 +08:00
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
after_create :create_email_token
|
2013-09-12 02:50:26 +08:00
|
|
|
after_create :create_user_stat
|
2016-02-17 12:46:19 +08:00
|
|
|
after_create :create_user_option
|
2014-05-28 01:54:04 +08:00
|
|
|
after_create :create_user_profile
|
2018-07-18 18:57:43 +08:00
|
|
|
after_create :set_random_avatar
|
2014-06-17 08:46:30 +08:00
|
|
|
after_create :ensure_in_trust_level_group
|
2015-08-22 02:39:21 +08:00
|
|
|
after_create :set_default_categories_preferences
|
2019-11-01 15:10:13 +08:00
|
|
|
after_create :set_default_tags_preferences
|
2023-07-27 10:52:33 +08:00
|
|
|
after_create :set_default_sidebar_section_links
|
|
|
|
after_update :set_default_sidebar_section_links, if: Proc.new { self.saved_change_to_staged? }
|
2014-08-14 04:17:16 +08:00
|
|
|
|
2020-05-08 09:27:26 +08:00
|
|
|
after_update :trigger_user_updated_event,
|
|
|
|
if: Proc.new { self.human? && self.saved_change_to_uploaded_avatar_id? }
|
|
|
|
|
2019-06-17 13:10:47 +08:00
|
|
|
after_update :trigger_user_automatic_group_refresh, if: :saved_change_to_staged?
|
2023-06-26 11:01:59 +08:00
|
|
|
after_update :change_display_name, if: :saved_change_to_name?
|
2019-05-28 00:12:26 +08:00
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
before_save :update_usernames
|
2014-08-14 04:17:16 +08:00
|
|
|
before_save :ensure_password_is_hashed
|
2021-07-08 15:46:21 +08:00
|
|
|
before_save :match_primary_group_changes
|
2018-09-21 10:06:08 +08:00
|
|
|
before_save :check_if_title_is_badged_granted
|
2022-06-15 00:27:01 +08:00
|
|
|
before_save :apply_watched_words, unless: :custom_fields_clean?
|
2014-08-14 04:17:16 +08:00
|
|
|
|
2017-02-01 06:21:37 +08:00
|
|
|
after_save :expire_tokens_if_password_changed
|
2014-08-14 04:17:16 +08:00
|
|
|
after_save :clear_global_notice_if_needed
|
2014-05-22 15:37:02 +08:00
|
|
|
after_save :refresh_avatar
|
2014-07-23 09:42:24 +08:00
|
|
|
after_save :badge_grant
|
2015-06-06 01:50:06 +08:00
|
|
|
after_save :expire_old_email_tokens
|
2016-12-22 10:13:14 +08:00
|
|
|
after_save :index_search
|
2018-12-15 05:52:37 +08:00
|
|
|
after_save :check_site_contact_username
|
2019-06-17 13:10:47 +08:00
|
|
|
|
2022-06-09 07:24:30 +08:00
|
|
|
after_save do
|
|
|
|
if saved_change_to_uploaded_avatar_id?
|
|
|
|
UploadReference.ensure_exist!(upload_ids: [self.uploaded_avatar_id], target: self)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-16 16:02:34 +08:00
|
|
|
after_commit :trigger_user_created_event, on: :create
|
2018-07-23 15:49:49 +08:00
|
|
|
after_commit :trigger_user_destroyed_event, on: :destroy
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-09-04 05:19:29 +08:00
|
|
|
before_destroy do
|
|
|
|
# These tables don't have primary keys, so destroying them with activerecord is tricky:
|
2017-08-31 12:06:56 +08:00
|
|
|
PostTiming.where(user_id: self.id).delete_all
|
|
|
|
TopicViewItem.where(user_id: self.id).delete_all
|
2019-01-17 09:40:30 +08:00
|
|
|
UserAction.where(
|
|
|
|
"user_id = :user_id OR target_user_id = :user_id OR acting_user_id = :user_id",
|
|
|
|
user_id: self.id,
|
|
|
|
).delete_all
|
|
|
|
|
|
|
|
# we need to bypass the default scope here, which appears not bypassed for :delete_all
|
|
|
|
# however :destroy it is bypassed
|
|
|
|
PostAction.with_deleted.where(user_id: self.id).delete_all
|
2019-04-26 16:11:39 +08:00
|
|
|
|
|
|
|
# This is a perf optimisation to ensure we hit the index
|
|
|
|
# without this we need to scan a much larger number of rows
|
|
|
|
DirectoryItem
|
|
|
|
.where(user_id: self.id)
|
|
|
|
.where("period_type in (?)", DirectoryItem.period_types.values)
|
|
|
|
.delete_all
|
2020-05-23 12:56:13 +08:00
|
|
|
|
|
|
|
# our relationship filters on enabled, this makes sure everything is deleted
|
|
|
|
UserSecurityKey.where(user_id: self.id).delete_all
|
2020-06-19 05:42:39 +08:00
|
|
|
|
|
|
|
Developer.where(user_id: self.id).delete_all
|
|
|
|
DraftSequence.where(user_id: self.id).delete_all
|
|
|
|
GivenDailyLike.where(user_id: self.id).delete_all
|
|
|
|
MutedUser.where(user_id: self.id).or(MutedUser.where(muted_user_id: self.id)).delete_all
|
|
|
|
IgnoredUser.where(user_id: self.id).or(IgnoredUser.where(ignored_user_id: self.id)).delete_all
|
|
|
|
UserAvatar.where(user_id: self.id).delete_all
|
2013-09-04 05:19:29 +08:00
|
|
|
end
|
|
|
|
|
2016-09-08 02:05:46 +08:00
|
|
|
# Skip validating email, for example from a particular auth provider plugin
|
|
|
|
attr_accessor :skip_email_validation
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
# Whether we need to be sending a system message after creation
|
|
|
|
attr_accessor :send_welcome_message
|
|
|
|
|
|
|
|
# This is just used to pass some information into the serializer
|
|
|
|
attr_accessor :notification_channel_position
|
|
|
|
|
2014-08-14 04:17:16 +08:00
|
|
|
# set to true to optimize creation and save for imports
|
|
|
|
attr_accessor :import_mode
|
|
|
|
|
2021-04-27 13:52:45 +08:00
|
|
|
# Cache for user custom fields. Currently it is used to display quick search results
|
|
|
|
attr_accessor :custom_data
|
|
|
|
|
2018-03-19 11:31:14 +08:00
|
|
|
scope :with_email,
|
2018-03-19 12:34:21 +08:00
|
|
|
->(email) { joins(:user_emails).where("lower(user_emails.email) IN (?)", email) }
|
2017-04-27 02:47:36 +08:00
|
|
|
|
2021-07-05 12:56:32 +08:00
|
|
|
scope :with_primary_email,
|
2023-11-29 13:38:07 +08:00
|
|
|
->(email) do
|
2021-07-05 12:56:32 +08:00
|
|
|
joins(:user_emails).where(
|
|
|
|
"lower(user_emails.email) IN (?) AND user_emails.primary",
|
|
|
|
email,
|
|
|
|
)
|
2023-11-29 13:38:07 +08:00
|
|
|
end
|
2021-07-05 12:56:32 +08:00
|
|
|
|
2017-03-11 14:25:09 +08:00
|
|
|
scope :human_users, -> { where("users.id > 0") }
|
|
|
|
|
2015-05-11 07:10:10 +08:00
|
|
|
# excluding fake users like the system user or anonymous users
|
2017-03-11 14:25:09 +08:00
|
|
|
scope :real,
|
2023-11-29 13:38:07 +08:00
|
|
|
-> do
|
2017-03-11 14:25:09 +08:00
|
|
|
human_users.where(
|
|
|
|
"NOT EXISTS(
|
2015-05-11 07:10:10 +08:00
|
|
|
SELECT 1
|
2019-05-29 12:26:06 +08:00
|
|
|
FROM anonymous_users a
|
|
|
|
WHERE a.user_id = users.id
|
2023-01-09 20:20:10 +08:00
|
|
|
)",
|
2019-05-29 12:26:06 +08:00
|
|
|
)
|
2023-11-29 13:38:07 +08:00
|
|
|
end
|
2013-03-29 14:29:58 +08:00
|
|
|
|
2014-09-04 05:50:19 +08:00
|
|
|
# TODO-PERF: There is no indexes on any of these
|
|
|
|
# and NotifyMailingListSubscribers does a select-all-and-loop
|
2017-11-11 01:18:08 +08:00
|
|
|
# may want to create an index on (active, silence, suspended_till)?
|
2017-11-14 02:41:36 +08:00
|
|
|
scope :silenced, -> { where("silenced_till IS NOT NULL AND silenced_till > ?", Time.zone.now) }
|
|
|
|
scope :not_silenced, -> { where("silenced_till IS NULL OR silenced_till <= ?", Time.zone.now) }
|
2014-09-04 05:50:19 +08:00
|
|
|
scope :suspended, -> { where("suspended_till IS NOT NULL AND suspended_till > ?", Time.zone.now) }
|
|
|
|
scope :not_suspended, -> { where("suspended_till IS NULL OR suspended_till <= ?", Time.zone.now) }
|
|
|
|
scope :activated, -> { where(active: true) }
|
2022-06-08 02:58:58 +08:00
|
|
|
scope :not_staged, -> { where(staged: false) }
|
2014-09-04 05:50:19 +08:00
|
|
|
|
2018-03-22 13:42:46 +08:00
|
|
|
scope :filter_by_username,
|
2023-11-29 13:38:07 +08:00
|
|
|
->(filter) do
|
2018-03-26 14:30:37 +08:00
|
|
|
if filter.is_a?(Array)
|
|
|
|
where("username_lower ~* ?", "(#{filter.join("|")})")
|
|
|
|
else
|
|
|
|
where("username_lower ILIKE ?", "%#{filter}%")
|
2018-03-22 13:42:46 +08:00
|
|
|
end
|
2023-11-29 13:38:07 +08:00
|
|
|
end
|
2018-03-26 14:30:37 +08:00
|
|
|
|
2018-03-22 13:42:46 +08:00
|
|
|
scope :filter_by_username_or_email,
|
2023-11-29 13:38:07 +08:00
|
|
|
->(filter) do
|
2022-12-16 09:08:05 +08:00
|
|
|
if filter.is_a?(String) && filter =~ /.+@.+/
|
2018-03-22 13:42:46 +08:00
|
|
|
# probably an email so try the bypass
|
2023-02-13 12:39:45 +08:00
|
|
|
if user_id = UserEmail.where("lower(email) = ?", filter.downcase).pick(:user_id)
|
2018-03-22 13:42:46 +08:00
|
|
|
return where("users.id = ?", user_id)
|
2023-01-09 20:20:10 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-26 14:30:37 +08:00
|
|
|
users = joins(:primary_email)
|
2023-01-09 20:20:10 +08:00
|
|
|
|
2018-03-26 14:30:37 +08:00
|
|
|
if filter.is_a?(Array)
|
|
|
|
users.where(
|
|
|
|
"username_lower ~* :filter OR lower(user_emails.email) SIMILAR TO :filter",
|
|
|
|
filter: "(#{filter.join("|")})",
|
|
|
|
)
|
|
|
|
else
|
|
|
|
users.where(
|
2018-03-22 13:42:46 +08:00
|
|
|
"username_lower ILIKE :filter OR lower(user_emails.email) ILIKE :filter",
|
|
|
|
filter: "%#{filter}%",
|
|
|
|
)
|
|
|
|
end
|
2023-11-29 13:38:07 +08:00
|
|
|
end
|
2018-03-22 13:42:46 +08:00
|
|
|
|
2022-10-06 08:10:43 +08:00
|
|
|
scope :watching_topic,
|
2023-11-29 13:38:07 +08:00
|
|
|
->(topic) do
|
2020-12-16 06:30:21 +08:00
|
|
|
joins(
|
|
|
|
DB.sql_fragment(
|
|
|
|
"LEFT JOIN category_users ON category_users.user_id = users.id AND category_users.category_id = :category_id",
|
|
|
|
category_id: topic.category_id,
|
2023-01-09 20:20:10 +08:00
|
|
|
),
|
2020-12-16 06:30:21 +08:00
|
|
|
)
|
|
|
|
.joins(
|
|
|
|
DB.sql_fragment(
|
|
|
|
"LEFT JOIN topic_users ON topic_users.user_id = users.id AND topic_users.topic_id = :topic_id",
|
|
|
|
topic_id: topic.id,
|
2023-01-09 20:20:10 +08:00
|
|
|
),
|
2020-12-16 06:30:21 +08:00
|
|
|
)
|
|
|
|
.joins(
|
|
|
|
"LEFT JOIN tag_users ON tag_users.user_id = users.id AND tag_users.tag_id IN (#{topic.tag_ids.join(",").presence || "NULL"})",
|
|
|
|
)
|
|
|
|
.where(
|
|
|
|
"category_users.notification_level > 0 OR topic_users.notification_level > 0 OR tag_users.notification_level > 0",
|
2023-01-09 20:20:10 +08:00
|
|
|
)
|
2023-11-29 13:38:07 +08:00
|
|
|
end
|
2020-12-16 06:30:21 +08:00
|
|
|
|
2013-02-14 14:32:58 +08:00
|
|
|
module NewTopicDuration
|
2013-02-26 00:42:20 +08:00
|
|
|
ALWAYS = -1
|
2013-02-14 14:32:58 +08:00
|
|
|
LAST_VISIT = -2
|
|
|
|
end
|
2014-03-08 01:58:53 +08:00
|
|
|
|
2019-08-10 18:02:12 +08:00
|
|
|
MAX_STAFF_DELETE_POST_COUNT ||= 5
|
|
|
|
|
2022-11-10 02:20:34 +08:00
|
|
|
def self.user_tips
|
|
|
|
@user_tips ||=
|
|
|
|
Enum.new(
|
|
|
|
first_notification: 1,
|
|
|
|
topic_timeline: 2,
|
2022-11-15 23:36:08 +08:00
|
|
|
post_menu: 3,
|
|
|
|
topic_notification_levels: 4,
|
|
|
|
suggested_topics: 5,
|
2023-07-11 01:42:09 +08:00
|
|
|
admin_guide: 6,
|
2022-11-10 02:20:34 +08:00
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2023-07-27 10:52:33 +08:00
|
|
|
def secured_sidebar_category_ids(user_guardian = nil)
|
|
|
|
user_guardian ||= guardian
|
|
|
|
|
|
|
|
SidebarSectionLink.where(user_id: self.id, linkable_type: "Category").pluck(:linkable_id) &
|
|
|
|
user_guardian.allowed_category_ids
|
|
|
|
end
|
|
|
|
|
2022-10-27 06:38:50 +08:00
|
|
|
def visible_sidebar_tags(user_guardian = nil)
|
|
|
|
user_guardian ||= guardian
|
2023-07-27 10:52:33 +08:00
|
|
|
|
|
|
|
DiscourseTagging.filter_visible(
|
|
|
|
Tag.where(
|
|
|
|
id: SidebarSectionLink.where(user_id: self.id, linkable_type: "Tag").select(:linkable_id),
|
|
|
|
),
|
|
|
|
user_guardian,
|
|
|
|
)
|
2022-10-27 06:38:50 +08:00
|
|
|
end
|
|
|
|
|
2014-09-12 03:22:11 +08:00
|
|
|
def self.max_password_length
|
|
|
|
200
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def self.username_length
|
2014-07-17 00:25:24 +08:00
|
|
|
SiteSetting.min_username_length.to_i..SiteSetting.max_username_length.to_i
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
def self.normalize_username(username)
|
2022-04-05 05:15:32 +08:00
|
|
|
username.to_s.unicode_normalize.downcase if username.present?
|
2019-04-23 18:22:47 +08:00
|
|
|
end
|
|
|
|
|
2018-08-01 11:08:45 +08:00
|
|
|
def self.username_available?(username, email = nil, allow_reserved_username: false)
|
2019-04-23 18:22:47 +08:00
|
|
|
lower = normalize_username(username)
|
2018-08-01 11:08:45 +08:00
|
|
|
return false if !allow_reserved_username && reserved_username?(lower)
|
2019-02-20 05:31:03 +08:00
|
|
|
return true if !username_exists?(lower)
|
2018-05-23 03:25:52 +08:00
|
|
|
|
2017-12-12 18:26:00 +08:00
|
|
|
# staged users can use the same username since they will take over the account
|
|
|
|
email.present? &&
|
|
|
|
User.joins(:user_emails).exists?(
|
|
|
|
staged: true,
|
|
|
|
username_lower: lower,
|
|
|
|
user_emails: {
|
|
|
|
primary: true,
|
|
|
|
email: email,
|
|
|
|
},
|
|
|
|
)
|
2017-04-13 10:44:26 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.reserved_username?(username)
|
2019-04-23 18:22:47 +08:00
|
|
|
username = normalize_username(username)
|
2016-08-31 21:49:45 +08:00
|
|
|
|
2021-11-24 04:25:54 +08:00
|
|
|
return true if SiteSetting.here_mention == username
|
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
SiteSetting
|
|
|
|
.reserved_usernames
|
|
|
|
.unicode_normalize
|
|
|
|
.split("|")
|
2023-01-21 02:52:49 +08:00
|
|
|
.any? { |reserved| username.match?(/\A#{Regexp.escape(reserved).gsub('\*', ".*")}\z/) }
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2019-10-11 16:57:55 +08:00
|
|
|
def self.editable_user_custom_fields(by_staff: false)
|
2018-09-04 18:45:36 +08:00
|
|
|
fields = []
|
2020-08-31 06:52:01 +08:00
|
|
|
fields.push(*DiscoursePluginRegistry.self_editable_user_custom_fields)
|
|
|
|
fields.push(*DiscoursePluginRegistry.staff_editable_user_custom_fields) if by_staff
|
2019-10-11 16:57:55 +08:00
|
|
|
|
2018-09-04 18:45:36 +08:00
|
|
|
fields.uniq
|
|
|
|
end
|
|
|
|
|
2020-07-27 08:23:54 +08:00
|
|
|
def self.allowed_user_custom_fields(guardian)
|
2016-03-12 04:52:18 +08:00
|
|
|
fields = []
|
|
|
|
|
2020-08-31 06:52:01 +08:00
|
|
|
fields.push(*DiscoursePluginRegistry.public_user_custom_fields)
|
2018-10-17 17:33:27 +08:00
|
|
|
|
2016-03-12 04:52:18 +08:00
|
|
|
if SiteSetting.public_user_custom_fields.present?
|
2020-08-31 06:52:01 +08:00
|
|
|
fields.push(*SiteSetting.public_user_custom_fields.split("|"))
|
2016-03-12 04:52:18 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
if guardian.is_staff?
|
|
|
|
if SiteSetting.staff_user_custom_fields.present?
|
2020-08-31 06:52:01 +08:00
|
|
|
fields.push(*SiteSetting.staff_user_custom_fields.split("|"))
|
2016-03-12 04:52:18 +08:00
|
|
|
end
|
2020-05-15 21:04:38 +08:00
|
|
|
|
2020-08-31 06:52:01 +08:00
|
|
|
fields.push(*DiscoursePluginRegistry.staff_user_custom_fields)
|
2016-03-12 04:52:18 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
fields.uniq
|
|
|
|
end
|
|
|
|
|
2020-05-26 08:07:00 +08:00
|
|
|
def self.human_user_id?(user_id)
|
|
|
|
user_id > 0
|
|
|
|
end
|
|
|
|
|
2019-02-09 02:34:54 +08:00
|
|
|
def human?
|
2020-05-26 08:07:00 +08:00
|
|
|
User.human_user_id?(self.id)
|
2019-02-09 02:34:54 +08:00
|
|
|
end
|
|
|
|
|
2019-03-12 07:58:14 +08:00
|
|
|
def bot?
|
|
|
|
!self.human?
|
|
|
|
end
|
|
|
|
|
2015-02-06 11:38:51 +08:00
|
|
|
def effective_locale
|
|
|
|
if SiteSetting.allow_user_locale && self.locale.present?
|
|
|
|
self.locale
|
|
|
|
else
|
|
|
|
SiteSetting.default_locale
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-04-22 06:23:42 +08:00
|
|
|
def bookmarks_of_type(type)
|
|
|
|
bookmarks.where(bookmarkable_type: type)
|
|
|
|
end
|
|
|
|
|
2013-04-01 00:51:13 +08:00
|
|
|
EMAIL = /([^@]+)@([^\.]+)/
|
2020-04-30 14:48:34 +08:00
|
|
|
FROM_STAGED = "from_staged"
|
2013-04-01 00:51:13 +08:00
|
|
|
|
2013-04-13 06:46:55 +08:00
|
|
|
def self.new_from_params(params)
|
|
|
|
user = User.new
|
|
|
|
user.name = params[:name]
|
|
|
|
user.email = params[:email]
|
|
|
|
user.password = params[:password]
|
|
|
|
user.username = params[:username]
|
|
|
|
user
|
|
|
|
end
|
|
|
|
|
2020-03-17 23:48:24 +08:00
|
|
|
def unstage!
|
2018-05-14 18:03:15 +08:00
|
|
|
if self.staged
|
2020-03-17 23:48:24 +08:00
|
|
|
ActiveRecord::Base.transaction do
|
|
|
|
self.staged = false
|
|
|
|
self.custom_fields[FROM_STAGED] = true
|
|
|
|
self.notifications.destroy_all
|
|
|
|
save!
|
|
|
|
end
|
2018-05-13 23:00:02 +08:00
|
|
|
|
2020-03-17 23:48:24 +08:00
|
|
|
DiscourseEvent.trigger(:user_unstaged, self)
|
2018-01-19 22:29:15 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-05-17 14:51:48 +08:00
|
|
|
def self.suggest_name(string)
|
|
|
|
return "" if string.blank?
|
2018-05-17 16:34:16 +08:00
|
|
|
(string[/\A[^@]+/].presence || string[/[^@]+\z/]).tr(".", " ").titleize
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-04-29 14:33:24 +08:00
|
|
|
def self.find_by_username_or_email(username_or_email)
|
2013-10-28 13:29:07 +08:00
|
|
|
if username_or_email.include?("@")
|
|
|
|
find_by_email(username_or_email)
|
2013-06-19 08:31:19 +08:00
|
|
|
else
|
2013-10-28 13:29:07 +08:00
|
|
|
find_by_username(username_or_email)
|
2013-06-19 08:31:19 +08:00
|
|
|
end
|
2013-04-29 14:33:24 +08:00
|
|
|
end
|
|
|
|
|
2021-07-05 12:56:32 +08:00
|
|
|
def self.find_by_email(email, primary: false)
|
|
|
|
if primary
|
|
|
|
self.with_primary_email(Email.downcase(email)).first
|
|
|
|
else
|
|
|
|
self.with_email(Email.downcase(email)).first
|
|
|
|
end
|
2013-10-24 15:59:58 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.find_by_username(username)
|
2019-04-23 18:22:47 +08:00
|
|
|
find_by(username_lower: normalize_username(username))
|
2013-10-24 15:59:58 +08:00
|
|
|
end
|
|
|
|
|
2022-09-26 11:58:40 +08:00
|
|
|
def in_any_groups?(group_ids)
|
|
|
|
group_ids.include?(Group::AUTO_GROUPS[:everyone]) || (group_ids & belonging_to_group_ids).any?
|
|
|
|
end
|
|
|
|
|
|
|
|
def belonging_to_group_ids
|
|
|
|
@belonging_to_group_ids ||= group_users.pluck(:group_id)
|
|
|
|
end
|
|
|
|
|
2018-08-25 06:41:03 +08:00
|
|
|
def group_granted_trust_level
|
|
|
|
GroupUser.where(user_id: id).includes(:group).maximum("groups.grant_trust_level")
|
|
|
|
end
|
2018-12-18 15:41:42 +08:00
|
|
|
|
|
|
|
def visible_groups
|
|
|
|
groups.visible_groups(self)
|
|
|
|
end
|
2018-08-25 06:41:03 +08:00
|
|
|
|
2013-04-29 14:33:24 +08:00
|
|
|
def enqueue_welcome_message(message_type)
|
|
|
|
return unless SiteSetting.send_welcome_message?
|
|
|
|
Jobs.enqueue(:send_system_message, user_id: id, message_type: message_type)
|
|
|
|
end
|
|
|
|
|
2018-06-23 00:51:07 +08:00
|
|
|
def enqueue_member_welcome_message
|
|
|
|
return unless SiteSetting.send_tl1_welcome_message?
|
|
|
|
Jobs.enqueue(:send_system_message, user_id: id, message_type: "welcome_tl1_user")
|
|
|
|
end
|
|
|
|
|
2020-09-22 08:17:52 +08:00
|
|
|
def enqueue_tl2_promotion_message
|
|
|
|
return unless SiteSetting.send_tl2_promotion_message
|
|
|
|
Jobs.enqueue(:send_system_message, user_id: id, message_type: "tl2_promotion_message")
|
|
|
|
end
|
|
|
|
|
2019-11-05 20:45:55 +08:00
|
|
|
def enqueue_staff_welcome_message(role)
|
|
|
|
return unless staff?
|
2019-11-28 07:49:46 +08:00
|
|
|
return if role == :admin && User.real.where(admin: true).count == 1
|
2019-11-05 20:45:55 +08:00
|
|
|
|
|
|
|
Jobs.enqueue(
|
|
|
|
:send_system_message,
|
|
|
|
user_id: id,
|
|
|
|
message_type: "welcome_staff",
|
|
|
|
message_options: {
|
2022-03-25 09:07:21 +08:00
|
|
|
role: role.to_s,
|
2019-11-05 20:45:55 +08:00
|
|
|
},
|
|
|
|
)
|
2019-10-28 21:58:45 +08:00
|
|
|
end
|
|
|
|
|
2015-01-17 06:30:46 +08:00
|
|
|
def change_username(new_username, actor = nil)
|
2015-03-07 05:44:54 +08:00
|
|
|
UsernameChanger.change(self, new_username, actor)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-09-13 05:46:43 +08:00
|
|
|
def created_topic_count
|
2014-07-29 01:17:37 +08:00
|
|
|
stat.topic_count
|
2013-09-13 05:46:43 +08:00
|
|
|
end
|
2013-02-27 00:27:59 +08:00
|
|
|
|
2014-07-29 01:17:37 +08:00
|
|
|
alias_method :topic_count, :created_topic_count
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
# tricky, we need our bus to be subscribed from the right spot
|
|
|
|
def sync_notification_channel_position
|
|
|
|
@unread_notifications_by_type = nil
|
2015-05-04 10:21:00 +08:00
|
|
|
self.notification_channel_position = MessageBus.last_id("/notification/#{id}")
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def invited_by
|
2021-03-06 19:29:35 +08:00
|
|
|
used_invite =
|
|
|
|
Invite.with_deleted.joins(:invited_users).where("invited_users.user_id = ?", self.id).first
|
2013-02-28 21:08:56 +08:00
|
|
|
used_invite.try(:invited_by)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2017-08-09 10:56:08 +08:00
|
|
|
def should_validate_email_address?
|
2017-04-27 02:47:36 +08:00
|
|
|
!skip_email_validation && !staged?
|
2016-09-08 02:05:46 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def self.email_hash(email)
|
2013-02-06 10:44:49 +08:00
|
|
|
Digest::MD5.hexdigest(email.strip.downcase)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def email_hash
|
2013-02-28 21:08:56 +08:00
|
|
|
User.email_hash(email)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def reload
|
2015-04-17 14:01:20 +08:00
|
|
|
@unread_notifications = nil
|
2022-08-03 13:57:59 +08:00
|
|
|
@all_unread_notifications_count = nil
|
2014-10-13 18:26:30 +08:00
|
|
|
@unread_total_notifications = nil
|
2013-05-16 14:37:47 +08:00
|
|
|
@unread_pms = nil
|
2020-04-01 07:09:20 +08:00
|
|
|
@unread_bookmarks = nil
|
|
|
|
@unread_high_prios = nil
|
2020-01-02 21:04:08 +08:00
|
|
|
@ignored_user_ids = nil
|
|
|
|
@muted_user_ids = nil
|
2022-09-26 11:58:40 +08:00
|
|
|
@belonging_to_group_ids = nil
|
2013-02-06 03:16:51 +08:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2020-01-02 21:04:08 +08:00
|
|
|
def ignored_user_ids
|
|
|
|
@ignored_user_ids ||= ignored_users.pluck(:id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def muted_user_ids
|
|
|
|
@muted_user_ids ||= muted_users.pluck(:id)
|
|
|
|
end
|
|
|
|
|
2023-05-10 01:19:26 +08:00
|
|
|
def unread_notifications_of_type(notification_type, since: nil)
|
2016-12-13 03:20:25 +08:00
|
|
|
# perf critical, much more efficient than AR
|
2018-05-26 08:09:48 +08:00
|
|
|
sql = <<~SQL
|
|
|
|
SELECT COUNT(*)
|
|
|
|
FROM notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL
|
2020-04-01 07:09:20 +08:00
|
|
|
AND n.notification_type = :notification_type
|
2018-05-26 08:09:48 +08:00
|
|
|
AND n.user_id = :user_id
|
|
|
|
AND NOT read
|
2023-05-10 01:19:26 +08:00
|
|
|
#{since ? "AND n.created_at > :since" : ""}
|
2018-05-26 08:09:48 +08:00
|
|
|
SQL
|
2016-12-13 03:20:25 +08:00
|
|
|
|
2018-06-19 14:13:14 +08:00
|
|
|
# to avoid coalesce we do to_i
|
2023-05-10 01:19:26 +08:00
|
|
|
DB.query_single(sql, user_id: id, notification_type: notification_type, since: since)[0].to_i
|
2016-12-13 03:20:25 +08:00
|
|
|
end
|
2015-04-17 14:01:20 +08:00
|
|
|
|
2020-04-01 07:09:20 +08:00
|
|
|
def unread_notifications_of_priority(high_priority:)
|
|
|
|
# perf critical, much more efficient than AR
|
|
|
|
sql = <<~SQL
|
|
|
|
SELECT COUNT(*)
|
|
|
|
FROM notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL
|
|
|
|
AND n.high_priority = :high_priority
|
|
|
|
AND n.user_id = :user_id
|
|
|
|
AND NOT read
|
|
|
|
SQL
|
|
|
|
|
|
|
|
# to avoid coalesce we do to_i
|
|
|
|
DB.query_single(sql, user_id: id, high_priority: high_priority)[0].to_i
|
|
|
|
end
|
|
|
|
|
2022-08-31 09:16:28 +08:00
|
|
|
MAX_UNREAD_BACKLOG = 400
|
|
|
|
def grouped_unread_notifications
|
|
|
|
results = DB.query(<<~SQL, user_id: self.id, limit: MAX_UNREAD_BACKLOG)
|
2022-08-08 22:24:04 +08:00
|
|
|
SELECT X.notification_type AS type, COUNT(*) FROM (
|
|
|
|
SELECT n.notification_type
|
|
|
|
FROM notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL
|
|
|
|
AND n.user_id = :user_id
|
|
|
|
AND NOT n.read
|
|
|
|
LIMIT :limit
|
|
|
|
) AS X
|
|
|
|
GROUP BY X.notification_type
|
|
|
|
SQL
|
|
|
|
results.map! { |row| [row.type, row.count] }
|
|
|
|
results.to_h
|
|
|
|
end
|
|
|
|
|
2020-04-01 07:09:20 +08:00
|
|
|
def unread_high_priority_notifications
|
|
|
|
@unread_high_prios ||= unread_notifications_of_priority(high_priority: true)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2022-12-01 07:05:32 +08:00
|
|
|
def new_personal_messages_notifications_count
|
|
|
|
args = {
|
|
|
|
user_id: self.id,
|
|
|
|
seen_notification_id: self.seen_notification_id,
|
|
|
|
private_message: Notification.types[:private_message],
|
|
|
|
}
|
|
|
|
|
|
|
|
DB.query_single(<<~SQL, args).first
|
|
|
|
SELECT COUNT(*)
|
|
|
|
FROM notifications
|
|
|
|
WHERE user_id = :user_id
|
|
|
|
AND id > :seen_notification_id
|
|
|
|
AND NOT read
|
|
|
|
AND notification_type = :private_message
|
|
|
|
SQL
|
|
|
|
end
|
|
|
|
|
2018-10-24 08:53:28 +08:00
|
|
|
# PERF: This safeguard is in place to avoid situations where
|
|
|
|
# a user with enormous amounts of unread data can issue extremely
|
|
|
|
# expensive queries
|
|
|
|
MAX_UNREAD_NOTIFICATIONS = 99
|
|
|
|
|
2018-10-24 09:10:27 +08:00
|
|
|
def self.max_unread_notifications
|
|
|
|
@max_unread_notifications ||= MAX_UNREAD_NOTIFICATIONS
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.max_unread_notifications=(val)
|
|
|
|
@max_unread_notifications = val
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def unread_notifications
|
2018-05-26 08:09:48 +08:00
|
|
|
@unread_notifications ||=
|
|
|
|
begin
|
|
|
|
# perf critical, much more efficient than AR
|
|
|
|
sql = <<~SQL
|
2018-10-24 09:10:27 +08:00
|
|
|
SELECT COUNT(*) FROM (
|
|
|
|
SELECT 1 FROM
|
|
|
|
notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL AND
|
2020-04-01 07:09:20 +08:00
|
|
|
n.high_priority = FALSE AND
|
2018-10-24 09:10:27 +08:00
|
|
|
n.user_id = :user_id AND
|
|
|
|
n.id > :seen_notification_id AND
|
|
|
|
NOT read
|
|
|
|
LIMIT :limit
|
|
|
|
) AS X
|
2018-05-26 08:09:48 +08:00
|
|
|
SQL
|
|
|
|
|
2018-06-19 14:13:14 +08:00
|
|
|
DB.query_single(
|
|
|
|
sql,
|
2018-05-26 08:09:48 +08:00
|
|
|
user_id: id,
|
|
|
|
seen_notification_id: seen_notification_id,
|
2018-10-24 09:10:27 +08:00
|
|
|
limit: User.max_unread_notifications,
|
2018-06-19 14:13:14 +08:00
|
|
|
)[
|
2023-01-09 20:20:10 +08:00
|
|
|
0
|
2018-06-19 14:13:14 +08:00
|
|
|
].to_i
|
2018-05-26 08:09:48 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-02-06 10:44:49 +08:00
|
|
|
|
2022-08-03 13:57:59 +08:00
|
|
|
def all_unread_notifications_count
|
|
|
|
@all_unread_notifications_count ||=
|
|
|
|
begin
|
|
|
|
sql = <<~SQL
|
|
|
|
SELECT COUNT(*) FROM (
|
|
|
|
SELECT 1 FROM
|
|
|
|
notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL AND
|
|
|
|
n.user_id = :user_id AND
|
|
|
|
n.id > :seen_notification_id AND
|
|
|
|
NOT read
|
|
|
|
LIMIT :limit
|
|
|
|
) AS X
|
|
|
|
SQL
|
|
|
|
|
|
|
|
DB.query_single(
|
|
|
|
sql,
|
|
|
|
user_id: id,
|
|
|
|
seen_notification_id: seen_notification_id,
|
|
|
|
limit: User.max_unread_notifications,
|
|
|
|
)[
|
2023-01-09 20:20:10 +08:00
|
|
|
0
|
2022-08-03 13:57:59 +08:00
|
|
|
].to_i
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-10-13 18:26:30 +08:00
|
|
|
def total_unread_notifications
|
|
|
|
@unread_total_notifications ||= notifications.where("read = false").count
|
|
|
|
end
|
|
|
|
|
2022-07-28 16:16:33 +08:00
|
|
|
def reviewable_count
|
2023-05-18 00:16:42 +08:00
|
|
|
Reviewable.list_for(self, include_claimed_by_others: false).count
|
2022-08-03 13:57:59 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def saw_notification_id(notification_id)
|
2022-09-13 02:19:25 +08:00
|
|
|
Discourse.deprecate(<<~TEXT, since: "2.9", drop_from: "3.0")
|
|
|
|
User#saw_notification_id is deprecated. Please use User#bump_last_seen_notification! instead.
|
|
|
|
TEXT
|
2016-09-16 10:02:19 +08:00
|
|
|
if seen_notification_id.to_i < notification_id.to_i
|
|
|
|
update_columns(seen_notification_id: notification_id.to_i)
|
|
|
|
true
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2022-09-13 02:19:25 +08:00
|
|
|
def bump_last_seen_notification!
|
|
|
|
query = self.notifications.visible
|
|
|
|
query = query.where("notifications.id > ?", seen_notification_id) if seen_notification_id
|
|
|
|
if max_notification_id = query.maximum(:id)
|
|
|
|
update!(seen_notification_id: max_notification_id)
|
|
|
|
true
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-08-03 13:57:59 +08:00
|
|
|
def bump_last_seen_reviewable!
|
|
|
|
query = Reviewable.unseen_list_for(self, preload: false)
|
|
|
|
|
2022-12-01 07:09:57 +08:00
|
|
|
query = query.where("reviewables.id > ?", last_seen_reviewable_id) if last_seen_reviewable_id
|
2022-08-03 13:57:59 +08:00
|
|
|
max_reviewable_id = query.maximum(:id)
|
|
|
|
|
|
|
|
if max_reviewable_id
|
|
|
|
update!(last_seen_reviewable_id: max_reviewable_id)
|
2022-12-01 07:09:57 +08:00
|
|
|
publish_reviewable_counts
|
2022-08-03 13:57:59 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-12-01 07:09:57 +08:00
|
|
|
def publish_reviewable_counts(extra_data = nil)
|
|
|
|
data = {
|
|
|
|
reviewable_count: self.reviewable_count,
|
|
|
|
unseen_reviewable_count: Reviewable.unseen_reviewable_count(self),
|
|
|
|
}
|
|
|
|
data.merge!(extra_data) if extra_data.present?
|
2022-08-03 13:57:59 +08:00
|
|
|
MessageBus.publish("/reviewable_counts/#{self.id}", data, user_ids: [self.id])
|
|
|
|
end
|
|
|
|
|
2016-11-08 16:12:40 +08:00
|
|
|
def read_first_notification?
|
2023-06-26 23:39:29 +08:00
|
|
|
self.seen_notification_id != 0 || user_option.skip_new_user_tips
|
2016-11-08 16:12:40 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def publish_notifications_state
|
2021-11-22 11:38:49 +08:00
|
|
|
return if !self.allow_live_notifications?
|
|
|
|
|
2018-05-26 08:09:48 +08:00
|
|
|
# publish last notification json with the message so we can apply an update
|
2018-06-28 23:04:40 +08:00
|
|
|
notification = notifications.visible.order("notifications.created_at desc").first
|
2015-09-04 11:20:33 +08:00
|
|
|
json = NotificationSerializer.new(notification).as_json if notification
|
|
|
|
|
2020-04-30 14:48:34 +08:00
|
|
|
sql = (<<~SQL)
|
2016-02-15 16:29:35 +08:00
|
|
|
SELECT * FROM (
|
|
|
|
SELECT n.id, n.read FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
2020-04-01 07:09:20 +08:00
|
|
|
n.high_priority AND
|
2016-02-15 16:29:35 +08:00
|
|
|
n.user_id = :user_id AND
|
|
|
|
NOT read
|
|
|
|
ORDER BY n.id DESC
|
|
|
|
LIMIT 20
|
|
|
|
) AS x
|
|
|
|
UNION ALL
|
|
|
|
SELECT * FROM (
|
|
|
|
SELECT n.id, n.read FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
2020-04-01 07:09:20 +08:00
|
|
|
(n.high_priority = FALSE OR read) AND
|
2016-02-15 16:29:35 +08:00
|
|
|
n.user_id = :user_id
|
|
|
|
ORDER BY n.id DESC
|
|
|
|
LIMIT 20
|
|
|
|
) AS y
|
2018-06-19 14:13:14 +08:00
|
|
|
SQL
|
2016-02-15 16:29:35 +08:00
|
|
|
|
2020-04-01 07:09:20 +08:00
|
|
|
recent = DB.query(sql, user_id: id).map! { |r| [r.id, r.read] }
|
2016-02-15 16:29:35 +08:00
|
|
|
|
2018-05-26 08:09:48 +08:00
|
|
|
payload = {
|
|
|
|
unread_notifications: unread_notifications,
|
2020-04-01 07:09:20 +08:00
|
|
|
unread_high_priority_notifications: unread_high_priority_notifications,
|
2018-05-26 08:09:48 +08:00
|
|
|
read_first_notification: read_first_notification?,
|
|
|
|
last_notification: json,
|
|
|
|
recent: recent,
|
|
|
|
seen_notification_id: seen_notification_id,
|
|
|
|
}
|
|
|
|
|
2023-05-18 00:16:42 +08:00
|
|
|
payload[:all_unread_notifications_count] = all_unread_notifications_count
|
|
|
|
payload[:grouped_unread_notifications] = grouped_unread_notifications
|
|
|
|
payload[:new_personal_messages_notifications_count] = new_personal_messages_notifications_count
|
2022-08-03 13:57:59 +08:00
|
|
|
|
2018-05-26 08:09:48 +08:00
|
|
|
MessageBus.publish("/notification/#{id}", payload, user_ids: [id])
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2020-12-18 23:03:51 +08:00
|
|
|
def publish_do_not_disturb(ends_at: nil)
|
2022-06-17 12:24:15 +08:00
|
|
|
MessageBus.publish("/do-not-disturb/#{id}", { ends_at: ends_at&.httpdate }, user_ids: [id])
|
2020-12-18 23:03:51 +08:00
|
|
|
end
|
|
|
|
|
2022-05-30 17:41:53 +08:00
|
|
|
def publish_user_status(status)
|
2022-07-05 23:12:22 +08:00
|
|
|
if status
|
|
|
|
payload = {
|
|
|
|
description: status.description,
|
|
|
|
emoji: status.emoji,
|
|
|
|
ends_at: status.ends_at&.iso8601,
|
|
|
|
}
|
|
|
|
else
|
|
|
|
payload = nil
|
|
|
|
end
|
2022-06-17 12:24:15 +08:00
|
|
|
|
2022-07-07 21:37:05 +08:00
|
|
|
MessageBus.publish(
|
|
|
|
"/user-status",
|
|
|
|
{ id => payload },
|
|
|
|
group_ids: [Group::AUTO_GROUPS[:trust_level_0]],
|
|
|
|
)
|
2022-05-30 17:41:53 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def password=(password)
|
2013-02-06 10:44:49 +08:00
|
|
|
# special case for passwordless accounts
|
2015-06-06 01:09:02 +08:00
|
|
|
@raw_password = password unless password.blank?
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-12-20 04:12:03 +08:00
|
|
|
def password
|
|
|
|
"" # so that validator doesn't complain that a password attribute doesn't exist
|
|
|
|
end
|
|
|
|
|
2013-02-13 04:42:04 +08:00
|
|
|
# Indicate that this is NOT a passwordless account for the purposes of validation
|
2013-02-28 21:08:56 +08:00
|
|
|
def password_required!
|
2013-02-13 04:42:04 +08:00
|
|
|
@password_required = true
|
|
|
|
end
|
|
|
|
|
2013-12-20 04:12:03 +08:00
|
|
|
def password_required?
|
|
|
|
!!@password_required
|
|
|
|
end
|
|
|
|
|
2017-12-01 12:19:24 +08:00
|
|
|
def password_validation_required?
|
|
|
|
password_required? || @raw_password.present?
|
|
|
|
end
|
|
|
|
|
2014-01-22 01:42:20 +08:00
|
|
|
def has_password?
|
|
|
|
password_hash.present?
|
|
|
|
end
|
|
|
|
|
2013-12-20 04:12:03 +08:00
|
|
|
def password_validator
|
|
|
|
PasswordValidator.new(attributes: :password).validate_each(self, :password, @raw_password)
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def confirm_password?(password)
|
2023-04-11 17:16:28 +08:00
|
|
|
return false unless password_hash && salt && password_algorithm
|
|
|
|
confirmed = self.password_hash == hash_password(password, salt, password_algorithm)
|
|
|
|
|
|
|
|
if confirmed && persisted? && password_algorithm != TARGET_PASSWORD_ALGORITHM
|
|
|
|
# Regenerate password_hash with new algorithm and persist
|
|
|
|
salt = SecureRandom.hex(PASSWORD_SALT_LENGTH)
|
|
|
|
update_columns(
|
|
|
|
password_algorithm: TARGET_PASSWORD_ALGORITHM,
|
|
|
|
salt: salt,
|
|
|
|
password_hash: hash_password(password, salt, TARGET_PASSWORD_ALGORITHM),
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
confirmed
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-10-12 01:33:23 +08:00
|
|
|
|
2016-06-21 04:38:15 +08:00
|
|
|
def new_user_posting_on_first_day?
|
2015-03-26 13:48:36 +08:00
|
|
|
!staff? && trust_level < TrustLevel[2] &&
|
2018-06-21 08:25:03 +08:00
|
|
|
(
|
|
|
|
trust_level == TrustLevel[0] || self.first_post_created_at.nil? ||
|
|
|
|
self.first_post_created_at >= 24.hours.ago
|
|
|
|
)
|
2015-03-26 13:48:36 +08:00
|
|
|
end
|
|
|
|
|
2013-10-12 01:33:23 +08:00
|
|
|
def new_user?
|
2015-03-26 13:04:32 +08:00
|
|
|
(created_at >= 24.hours.ago || trust_level == TrustLevel[0]) && trust_level < TrustLevel[2] &&
|
|
|
|
!staff?
|
2013-10-12 01:33:23 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-02-12 13:41:04 +08:00
|
|
|
def seen_before?
|
|
|
|
last_seen_at.present?
|
|
|
|
end
|
|
|
|
|
2021-11-22 11:38:49 +08:00
|
|
|
def seen_since?(datetime)
|
|
|
|
seen_before? && last_seen_at >= datetime
|
|
|
|
end
|
|
|
|
|
2015-07-08 00:31:07 +08:00
|
|
|
def create_visit_record!(date, opts = {})
|
|
|
|
user_stat.update_column(:days_visited, user_stat.days_visited + 1)
|
|
|
|
user_visits.create!(
|
|
|
|
visited_at: date,
|
|
|
|
posts_read: opts[:posts_read] || 0,
|
|
|
|
mobile: opts[:mobile] || false,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2014-01-25 04:19:20 +08:00
|
|
|
def visit_record_for(date)
|
2014-05-06 21:41:59 +08:00
|
|
|
user_visits.find_by(visited_at: date)
|
2013-02-12 13:41:04 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_visit_record!(date)
|
2014-01-25 04:19:20 +08:00
|
|
|
create_visit_record!(date) unless visit_record_for(date)
|
|
|
|
end
|
2019-11-25 08:49:27 +08:00
|
|
|
|
|
|
|
def update_timezone_if_missing(timezone)
|
|
|
|
return if timezone.blank? || !TimezoneValidator.valid?(timezone)
|
|
|
|
|
|
|
|
# we only want to update the user's timezone if they have not set it themselves
|
|
|
|
UserOption.where(user_id: self.id, timezone: nil).update_all(timezone: timezone)
|
|
|
|
end
|
2014-01-25 04:19:20 +08:00
|
|
|
|
2015-07-08 00:31:07 +08:00
|
|
|
def update_posts_read!(num_posts, opts = {})
|
|
|
|
now = opts[:at] || Time.zone.now
|
|
|
|
_retry = opts[:retry] || false
|
|
|
|
|
2014-01-25 04:19:20 +08:00
|
|
|
if user_visit = visit_record_for(now.to_date)
|
|
|
|
user_visit.posts_read += num_posts
|
2015-07-08 00:31:07 +08:00
|
|
|
user_visit.mobile = true if opts[:mobile]
|
2014-01-25 04:19:20 +08:00
|
|
|
user_visit.save
|
|
|
|
user_visit
|
|
|
|
else
|
2015-06-01 09:55:07 +08:00
|
|
|
begin
|
2015-07-08 00:31:07 +08:00
|
|
|
create_visit_record!(now.to_date, posts_read: num_posts, mobile: opts.fetch(:mobile, false))
|
2015-06-01 09:55:07 +08:00
|
|
|
rescue ActiveRecord::RecordNotUnique
|
|
|
|
if !_retry
|
2015-08-24 08:28:38 +08:00
|
|
|
update_posts_read!(num_posts, opts.merge(retry: true))
|
2015-06-01 09:55:07 +08:00
|
|
|
else
|
|
|
|
raise
|
|
|
|
end
|
|
|
|
end
|
2013-02-12 13:41:04 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-03 06:50:56 +08:00
|
|
|
def self.update_ip_address!(user_id, new_ip:, old_ip:)
|
|
|
|
unless old_ip == new_ip || new_ip.blank?
|
|
|
|
DB.exec(<<~SQL, user_id: user_id, ip_address: new_ip)
|
|
|
|
UPDATE users
|
|
|
|
SET ip_address = :ip_address
|
|
|
|
WHERE id = :user_id
|
|
|
|
SQL
|
2020-09-17 10:55:29 +08:00
|
|
|
|
|
|
|
if SiteSetting.keep_old_ip_address_count > 0
|
2022-05-03 06:50:56 +08:00
|
|
|
DB.exec(<<~SQL, user_id: user_id, ip_address: new_ip, current_timestamp: Time.zone.now)
|
2020-09-17 10:55:29 +08:00
|
|
|
INSERT INTO user_ip_address_histories (user_id, ip_address, created_at, updated_at)
|
|
|
|
VALUES (:user_id, :ip_address, :current_timestamp, :current_timestamp)
|
|
|
|
ON CONFLICT (user_id, ip_address)
|
|
|
|
DO
|
|
|
|
UPDATE SET updated_at = :current_timestamp
|
|
|
|
SQL
|
|
|
|
|
2022-05-03 06:50:56 +08:00
|
|
|
DB.exec(<<~SQL, user_id: user_id, offset: SiteSetting.keep_old_ip_address_count)
|
2020-09-17 10:55:29 +08:00
|
|
|
DELETE FROM user_ip_address_histories
|
|
|
|
WHERE id IN (
|
|
|
|
SELECT
|
|
|
|
id
|
|
|
|
FROM user_ip_address_histories
|
|
|
|
WHERE user_id = :user_id
|
|
|
|
ORDER BY updated_at DESC
|
|
|
|
OFFSET :offset
|
|
|
|
)
|
|
|
|
SQL
|
|
|
|
end
|
2013-02-24 18:42:04 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-03 06:50:56 +08:00
|
|
|
def update_ip_address!(new_ip_address)
|
|
|
|
User.update_ip_address!(id, new_ip: new_ip_address, old_ip: ip_address)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.last_seen_redis_key(user_id, now)
|
2013-10-24 05:24:50 +08:00
|
|
|
now_date = now.to_date
|
2022-05-03 06:50:56 +08:00
|
|
|
"user:#{user_id}:#{now_date}"
|
|
|
|
end
|
|
|
|
|
|
|
|
def last_seen_redis_key(now)
|
|
|
|
User.last_seen_redis_key(id, now)
|
2020-08-31 06:54:42 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def clear_last_seen_cache!(now = Time.zone.now)
|
|
|
|
Discourse.redis.del(last_seen_redis_key(now))
|
|
|
|
end
|
|
|
|
|
2022-05-03 06:50:56 +08:00
|
|
|
def self.should_update_last_seen?(user_id, now = Time.zone.now)
|
|
|
|
return true if SiteSetting.active_user_rate_limit_secs <= 0
|
2020-08-31 06:54:42 +08:00
|
|
|
|
2022-05-03 06:50:56 +08:00
|
|
|
Discourse.redis.set(
|
|
|
|
last_seen_redis_key(user_id, now),
|
|
|
|
"1",
|
|
|
|
nx: true,
|
|
|
|
ex: SiteSetting.active_user_rate_limit_secs,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def update_last_seen!(now = Time.zone.now, force: false)
|
|
|
|
if !force
|
|
|
|
return if !User.should_update_last_seen?(self.id, now)
|
2020-08-31 06:54:42 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-10-24 05:24:50 +08:00
|
|
|
update_previous_visit(now)
|
|
|
|
# using update_column to avoid the AR transaction
|
|
|
|
update_column(:last_seen_at, now)
|
2016-05-21 21:17:54 +08:00
|
|
|
update_column(:first_seen_at, now) unless self.first_seen_at
|
2017-04-01 06:30:59 +08:00
|
|
|
|
|
|
|
DiscourseEvent.trigger(:user_seen, self)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-08-14 04:08:29 +08:00
|
|
|
def self.gravatar_template(email)
|
2020-03-12 23:23:55 +08:00
|
|
|
"//#{SiteSetting.gravatar_base_url}/avatar/#{self.email_hash(email)}.png?s={size}&r=pg&d=identicon"
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-03-09 04:58:37 +08:00
|
|
|
# Don't pass this up to the client - it's meant for server side use
|
2013-08-14 04:08:29 +08:00
|
|
|
# This is used in
|
|
|
|
# - self oneboxes in open graph data
|
|
|
|
# - emails
|
2013-03-09 04:58:37 +08:00
|
|
|
def small_avatar_url
|
2014-05-22 15:37:02 +08:00
|
|
|
avatar_template_url.gsub("{size}", "45")
|
2013-03-09 04:58:37 +08:00
|
|
|
end
|
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
def avatar_template_url
|
2015-06-12 18:02:36 +08:00
|
|
|
UrlHelper.schemaless UrlHelper.absolute avatar_template
|
2013-09-11 03:18:22 +08:00
|
|
|
end
|
|
|
|
|
2018-07-18 18:57:43 +08:00
|
|
|
def self.username_hash(username)
|
|
|
|
username
|
|
|
|
.each_char
|
|
|
|
.reduce(0) do |result, char|
|
|
|
|
[((result << 5) - result) + char.ord].pack("L").unpack("l").first
|
|
|
|
end
|
|
|
|
.abs
|
|
|
|
end
|
|
|
|
|
2015-06-27 01:37:50 +08:00
|
|
|
def self.default_template(username)
|
|
|
|
if SiteSetting.default_avatars.present?
|
2018-07-18 18:57:43 +08:00
|
|
|
urls = SiteSetting.default_avatars.split("\n")
|
|
|
|
return urls[username_hash(username) % urls.size] if urls.present?
|
2015-06-27 01:37:50 +08:00
|
|
|
end
|
2018-07-18 18:57:43 +08:00
|
|
|
|
|
|
|
system_avatar_template(username)
|
2015-06-27 01:37:50 +08:00
|
|
|
end
|
|
|
|
|
2015-09-11 08:12:40 +08:00
|
|
|
def self.avatar_template(username, uploaded_avatar_id)
|
2014-05-22 15:37:02 +08:00
|
|
|
username ||= ""
|
2015-09-11 21:04:29 +08:00
|
|
|
return default_template(username) if !uploaded_avatar_id
|
2015-05-30 00:51:17 +08:00
|
|
|
hostname = RailsMultisite::ConnectionManagement.current_hostname
|
|
|
|
UserAvatar.local_avatar_template(hostname, username.downcase, uploaded_avatar_id)
|
2014-05-22 15:37:02 +08:00
|
|
|
end
|
|
|
|
|
2015-09-11 16:14:34 +08:00
|
|
|
def self.system_avatar_template(username)
|
2019-04-25 05:18:52 +08:00
|
|
|
normalized_username = normalize_username(username)
|
|
|
|
|
2015-09-11 16:14:34 +08:00
|
|
|
# TODO it may be worth caching this in a distributed cache, should be benched
|
|
|
|
if SiteSetting.external_system_avatars_enabled
|
|
|
|
url = SiteSetting.external_system_avatars_url.dup
|
2023-01-21 02:52:49 +08:00
|
|
|
url = +"#{Discourse.base_path}#{url}" unless url =~ %r{\Ahttps?://}
|
2019-04-25 05:18:52 +08:00
|
|
|
url.gsub! "{color}", letter_avatar_color(normalized_username)
|
2019-12-12 10:49:21 +08:00
|
|
|
url.gsub! "{username}", UrlHelper.encode_component(username)
|
|
|
|
url.gsub! "{first_letter}",
|
|
|
|
UrlHelper.encode_component(normalized_username.grapheme_clusters.first)
|
2015-10-02 15:27:54 +08:00
|
|
|
url.gsub! "{hostname}", Discourse.current_hostname
|
2015-09-11 16:14:34 +08:00
|
|
|
url
|
2015-09-11 08:12:40 +08:00
|
|
|
else
|
2020-10-09 19:51:24 +08:00
|
|
|
"#{Discourse.base_path}/letter_avatar/#{normalized_username}/{size}/#{LetterAvatar.version}.png"
|
2015-09-11 08:12:40 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.letter_avatar_color(username)
|
2015-09-11 21:04:29 +08:00
|
|
|
username ||= ""
|
2019-03-18 23:24:21 +08:00
|
|
|
if SiteSetting.restrict_letter_avatar_colors.present?
|
|
|
|
hex_length = 6
|
|
|
|
colors = SiteSetting.restrict_letter_avatar_colors
|
|
|
|
length = colors.count("|") + 1
|
|
|
|
num = color_index(username, length)
|
|
|
|
index = (num * hex_length) + num
|
|
|
|
colors[index, hex_length]
|
|
|
|
else
|
|
|
|
color = LetterAvatar::COLORS[color_index(username, LetterAvatar::COLORS.length)]
|
|
|
|
color.map { |c| c.to_s(16).rjust(2, "0") }.join
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.color_index(username, length)
|
|
|
|
Digest::MD5.hexdigest(username)[0...15].to_i(16) % length
|
2014-05-30 12:17:35 +08:00
|
|
|
end
|
|
|
|
|
2021-04-28 04:28:15 +08:00
|
|
|
def is_system_user?
|
|
|
|
id == Discourse::SYSTEM_USER_ID
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def avatar_template
|
2021-04-28 04:28:15 +08:00
|
|
|
use_small_logo =
|
2021-01-19 01:09:07 +08:00
|
|
|
is_system_user? && SiteSetting.logo_small && SiteSetting.use_site_small_logo_as_system_avatar
|
|
|
|
|
|
|
|
if use_small_logo
|
2021-02-01 09:35:41 +08:00
|
|
|
Discourse.store.cdn_url(SiteSetting.logo_small.url)
|
2021-01-08 21:40:00 +08:00
|
|
|
else
|
|
|
|
self.class.avatar_template(username, uploaded_avatar_id)
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
# The following count methods are somewhat slow - definitely don't use them in a loop.
|
2013-03-06 15:52:24 +08:00
|
|
|
# They might need to be denormalized
|
2013-02-06 03:16:51 +08:00
|
|
|
def like_count
|
2013-02-28 21:08:56 +08:00
|
|
|
UserAction.where(user_id: id, action_type: UserAction::WAS_LIKED).count
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2014-08-23 03:23:10 +08:00
|
|
|
def like_given_count
|
|
|
|
UserAction.where(user_id: id, action_type: UserAction::LIKE).count
|
2014-08-23 02:37:00 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def post_count
|
2014-07-29 01:17:37 +08:00
|
|
|
stat.post_count
|
2014-02-21 01:29:40 +08:00
|
|
|
end
|
|
|
|
|
2021-08-02 22:15:53 +08:00
|
|
|
def post_edits_count
|
|
|
|
stat.post_edits_count
|
|
|
|
end
|
|
|
|
|
|
|
|
def increment_post_edits_count
|
|
|
|
stat.increment!(:post_edits_count)
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def flags_given_count
|
2017-10-18 01:31:45 +08:00
|
|
|
PostAction.where(
|
|
|
|
user_id: id,
|
|
|
|
post_action_type_id: PostActionType.flag_types_without_custom.values,
|
|
|
|
).count
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2014-09-08 23:11:56 +08:00
|
|
|
def warnings_received_count
|
2017-04-15 12:11:02 +08:00
|
|
|
user_warnings.count
|
2014-09-08 23:11:56 +08:00
|
|
|
end
|
|
|
|
|
2023-10-18 09:38:17 +08:00
|
|
|
def flags_received_count
|
|
|
|
posts
|
|
|
|
.includes(:post_actions)
|
|
|
|
.where("post_actions.post_action_type_id" => PostActionType.flag_types_without_custom.values)
|
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def private_topics_count
|
|
|
|
topics_allowed.where(archetype: Archetype.private_message).count
|
|
|
|
end
|
|
|
|
|
2013-12-20 02:45:55 +08:00
|
|
|
def posted_too_much_in_topic?(topic_id)
|
2016-04-19 04:08:42 +08:00
|
|
|
# Does not apply to staff and non-new members...
|
|
|
|
return false if staff? || (trust_level != TrustLevel[0])
|
|
|
|
# ... your own topics or in private messages
|
|
|
|
topic = Topic.where(id: topic_id).first
|
|
|
|
return false if topic.try(:private_message?) || (topic.try(:user_id) == self.id)
|
2014-01-03 01:57:40 +08:00
|
|
|
|
2014-04-30 00:59:14 +08:00
|
|
|
last_action_in_topic = UserAction.last_action_in_topic(id, topic_id)
|
|
|
|
since_reply = Post.where(user_id: id, topic_id: topic_id)
|
|
|
|
since_reply = since_reply.where("id > ?", last_action_in_topic) if last_action_in_topic
|
|
|
|
|
|
|
|
(since_reply.count >= SiteSetting.newuser_max_replies_per_topic)
|
2013-12-20 02:45:55 +08:00
|
|
|
end
|
|
|
|
|
2018-12-14 18:04:18 +08:00
|
|
|
def delete_posts_in_batches(guardian, batch_size = 20)
|
2013-02-07 15:11:56 +08:00
|
|
|
raise Discourse::InvalidAccess unless guardian.can_delete_all_posts? self
|
2013-02-07 23:45:24 +08:00
|
|
|
|
2019-01-04 01:03:01 +08:00
|
|
|
Reviewable.where(created_by_id: id).delete_all
|
2015-04-25 04:04:44 +08:00
|
|
|
|
2018-12-14 18:04:18 +08:00
|
|
|
posts
|
|
|
|
.order("post_number desc")
|
|
|
|
.limit(batch_size)
|
2013-06-06 04:00:45 +08:00
|
|
|
.each { |p| PostDestroyer.new(guardian.user, p).destroy }
|
2013-02-07 15:11:56 +08:00
|
|
|
end
|
|
|
|
|
2013-11-08 02:53:32 +08:00
|
|
|
def suspended?
|
2017-11-29 02:44:24 +08:00
|
|
|
!!(suspended_till && suspended_till > Time.zone.now)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2017-11-14 02:41:36 +08:00
|
|
|
def silenced?
|
2017-11-29 02:44:24 +08:00
|
|
|
!!(silenced_till && silenced_till > Time.zone.now)
|
2017-11-14 02:41:36 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def silenced_record
|
|
|
|
UserHistory.for(self, :silence_user).order("id DESC").first
|
|
|
|
end
|
|
|
|
|
|
|
|
def silence_reason
|
|
|
|
silenced_record.try(:details) if silenced?
|
|
|
|
end
|
|
|
|
|
|
|
|
def silenced_at
|
|
|
|
silenced_record.try(:created_at) if silenced?
|
|
|
|
end
|
|
|
|
|
2021-07-20 18:42:08 +08:00
|
|
|
def silenced_forever?
|
|
|
|
silenced_till > 100.years.from_now
|
|
|
|
end
|
|
|
|
|
2013-11-08 02:53:32 +08:00
|
|
|
def suspend_record
|
|
|
|
UserHistory.for(self, :suspend_user).order("id DESC").first
|
2013-11-01 22:47:03 +08:00
|
|
|
end
|
|
|
|
|
2017-12-08 02:20:42 +08:00
|
|
|
def full_suspend_reason
|
2023-08-10 08:03:38 +08:00
|
|
|
suspend_record.try(:details) if suspended?
|
2017-12-08 02:20:42 +08:00
|
|
|
end
|
|
|
|
|
2013-11-08 02:53:32 +08:00
|
|
|
def suspend_reason
|
2017-12-08 02:20:42 +08:00
|
|
|
if details = full_suspend_reason
|
|
|
|
return details.split("\n")[0]
|
|
|
|
end
|
|
|
|
|
|
|
|
nil
|
2013-11-01 22:47:03 +08:00
|
|
|
end
|
|
|
|
|
2021-07-20 18:42:08 +08:00
|
|
|
def suspended_message
|
|
|
|
return nil unless suspended?
|
|
|
|
|
|
|
|
message = "login.suspended"
|
|
|
|
if suspend_reason
|
|
|
|
if suspended_forever?
|
|
|
|
message = "login.suspended_with_reason_forever"
|
|
|
|
else
|
|
|
|
message = "login.suspended_with_reason"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
I18n.t(
|
|
|
|
message,
|
|
|
|
date: I18n.l(suspended_till, format: :date_only),
|
|
|
|
reason: Rack::Utils.escape_html(suspend_reason),
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def suspended_forever?
|
|
|
|
suspended_till > 100.years.from_now
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
# Use this helper to determine if the user has a particular trust level.
|
|
|
|
# Takes into account admin, etc.
|
2013-02-06 10:44:49 +08:00
|
|
|
def has_trust_level?(level)
|
2016-05-30 11:38:04 +08:00
|
|
|
raise InvalidTrustLevel.new("Invalid trust level #{level}") unless TrustLevel.valid?(level)
|
|
|
|
|
2015-12-08 00:01:08 +08:00
|
|
|
admin? || moderator? || staged? || TrustLevel.compare(trust_level, level)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2021-11-23 02:18:53 +08:00
|
|
|
def has_trust_level_or_staff?(level)
|
|
|
|
return admin? if level.to_s == "admin"
|
|
|
|
return staff? if level.to_s == "staff"
|
|
|
|
has_trust_level?(level.to_i)
|
|
|
|
end
|
|
|
|
|
2013-03-20 07:51:39 +08:00
|
|
|
# a touch faster than automatic
|
2013-04-01 00:51:13 +08:00
|
|
|
def admin?
|
2013-03-20 07:51:39 +08:00
|
|
|
admin
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def guardian
|
|
|
|
Guardian.new(self)
|
|
|
|
end
|
|
|
|
|
2018-04-03 00:44:04 +08:00
|
|
|
def username_format_validator
|
|
|
|
UsernameValidator.perform_validation(self, "username")
|
2013-02-08 07:23:41 +08:00
|
|
|
end
|
|
|
|
|
2013-02-12 00:18:26 +08:00
|
|
|
def email_confirmed?
|
2018-05-15 07:48:30 +08:00
|
|
|
email_tokens.where(email: email, confirmed: true).present? || email_tokens.empty? ||
|
2019-11-08 01:26:28 +08:00
|
|
|
single_sign_on_record&.external_email&.downcase == email
|
2013-02-12 00:18:26 +08:00
|
|
|
end
|
|
|
|
|
2013-05-08 09:58:34 +08:00
|
|
|
def activate
|
2021-11-25 15:34:39 +08:00
|
|
|
email_token = self.email_tokens.create!(email: self.email, scope: EmailToken.scopes[:signup])
|
|
|
|
EmailToken.confirm(email_token.token, scope: EmailToken.scopes[:signup])
|
|
|
|
reload
|
2013-05-08 09:58:34 +08:00
|
|
|
end
|
|
|
|
|
2019-04-04 00:04:05 +08:00
|
|
|
def deactivate(performed_by)
|
2017-09-13 15:33:59 +08:00
|
|
|
self.update!(active: false)
|
2019-04-04 00:04:05 +08:00
|
|
|
|
|
|
|
if reviewable = ReviewableUser.pending.find_by(target: self)
|
2021-06-15 23:35:45 +08:00
|
|
|
reviewable.perform(performed_by, :delete_user)
|
2019-04-04 00:04:05 +08:00
|
|
|
end
|
2013-05-08 09:58:34 +08:00
|
|
|
end
|
|
|
|
|
2014-06-17 08:46:30 +08:00
|
|
|
def change_trust_level!(level, opts = nil)
|
|
|
|
Promotion.new(self).change_trust_level!(level, opts)
|
|
|
|
end
|
|
|
|
|
2013-02-22 02:20:00 +08:00
|
|
|
def readable_name
|
2018-05-15 07:48:30 +08:00
|
|
|
name.present? && name != username ? "#{name} (#{username})" : username
|
2013-02-22 02:20:00 +08:00
|
|
|
end
|
|
|
|
|
2014-04-16 18:22:21 +08:00
|
|
|
def badge_count
|
2019-12-30 19:19:59 +08:00
|
|
|
user_stat&.distinct_badge_count
|
2014-04-16 18:22:21 +08:00
|
|
|
end
|
|
|
|
|
2021-06-22 23:58:03 +08:00
|
|
|
def featured_user_badges(limit = nil)
|
|
|
|
if limit.nil?
|
2020-01-14 22:26:49 +08:00
|
|
|
default_featured_user_badges
|
|
|
|
else
|
|
|
|
user_badges.grouped_with_count.where("featured_rank <= ?", limit)
|
|
|
|
end
|
2014-04-16 18:11:11 +08:00
|
|
|
end
|
|
|
|
|
2018-05-03 21:41:41 +08:00
|
|
|
def self.count_by_signup_date(start_date = nil, end_date = nil, group_id = nil)
|
|
|
|
result = self
|
|
|
|
|
|
|
|
if start_date && end_date
|
2018-05-11 11:30:21 +08:00
|
|
|
result = result.group("date(users.created_at)")
|
|
|
|
result = result.where("users.created_at >= ? AND users.created_at <= ?", start_date, end_date)
|
2018-06-05 15:29:17 +08:00
|
|
|
result = result.order("date(users.created_at)")
|
2018-05-03 21:41:41 +08:00
|
|
|
end
|
2016-02-03 10:29:51 +08:00
|
|
|
|
|
|
|
if group_id
|
|
|
|
result = result.joins("INNER JOIN group_users ON group_users.user_id = users.id")
|
|
|
|
result = result.where("group_users.group_id = ?", group_id)
|
|
|
|
end
|
2018-04-26 20:49:41 +08:00
|
|
|
|
|
|
|
result.count
|
|
|
|
end
|
|
|
|
|
2018-05-03 21:41:41 +08:00
|
|
|
def self.count_by_first_post(start_date = nil, end_date = nil)
|
|
|
|
result = joins("INNER JOIN user_stats AS us ON us.user_id = users.id")
|
|
|
|
|
|
|
|
if start_date && end_date
|
2018-05-11 11:30:21 +08:00
|
|
|
result = result.group("date(us.first_post_created_at)")
|
|
|
|
result =
|
|
|
|
result.where(
|
|
|
|
"us.first_post_created_at > ? AND us.first_post_created_at < ?",
|
|
|
|
start_date,
|
|
|
|
end_date,
|
|
|
|
)
|
|
|
|
result = result.order("date(us.first_post_created_at)")
|
2018-05-03 21:41:41 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
result.count
|
2013-03-08 00:07:59 +08:00
|
|
|
end
|
|
|
|
|
2013-04-29 14:33:24 +08:00
|
|
|
def secure_category_ids
|
2022-11-18 11:37:36 +08:00
|
|
|
cats =
|
|
|
|
if self.admin? && !SiteSetting.suppress_secured_categories_from_admin
|
|
|
|
Category.unscoped.where(read_restricted: true)
|
|
|
|
else
|
|
|
|
secure_categories.references(:categories)
|
|
|
|
end
|
|
|
|
|
2013-09-10 12:29:02 +08:00
|
|
|
cats.pluck("categories.id").sort
|
2013-04-29 14:33:24 +08:00
|
|
|
end
|
|
|
|
|
2013-05-11 04:58:23 +08:00
|
|
|
# Flag all posts from a user as spam
|
|
|
|
def flag_linked_posts_as_spam
|
2019-01-04 01:03:01 +08:00
|
|
|
results = []
|
|
|
|
|
2016-04-26 05:03:17 +08:00
|
|
|
disagreed_flag_post_ids =
|
|
|
|
PostAction
|
|
|
|
.where(post_action_type_id: PostActionType.types[:spam])
|
|
|
|
.where.not(disagreed_at: nil)
|
|
|
|
.pluck(:post_id)
|
2015-10-17 03:16:44 +08:00
|
|
|
|
2016-04-26 05:03:17 +08:00
|
|
|
topic_links
|
|
|
|
.includes(:post)
|
|
|
|
.where.not(post_id: disagreed_flag_post_ids)
|
|
|
|
.each do |tl|
|
2019-07-12 18:04:16 +08:00
|
|
|
message =
|
|
|
|
I18n.t(
|
|
|
|
"flag_reason.spam_hosts",
|
|
|
|
base_path: Discourse.base_path,
|
|
|
|
locale: SiteSetting.default_locale,
|
|
|
|
)
|
2019-01-04 01:03:01 +08:00
|
|
|
results << PostActionCreator.create(Discourse.system_user, tl.post, :spam, message: message)
|
2013-05-11 04:58:23 +08:00
|
|
|
end
|
2019-01-04 01:03:01 +08:00
|
|
|
|
|
|
|
results
|
2013-05-11 04:58:23 +08:00
|
|
|
end
|
2013-05-13 16:04:03 +08:00
|
|
|
|
2013-08-14 04:08:29 +08:00
|
|
|
def has_uploaded_avatar
|
|
|
|
uploaded_avatar.present?
|
|
|
|
end
|
2013-05-24 18:58:26 +08:00
|
|
|
|
2013-11-15 23:27:43 +08:00
|
|
|
def find_email
|
2022-02-18 09:12:51 +08:00
|
|
|
if last_sent_email_address.present? &&
|
|
|
|
EmailAddressValidator.valid_value?(last_sent_email_address)
|
|
|
|
last_sent_email_address
|
2023-01-09 20:20:10 +08:00
|
|
|
else
|
2022-02-18 09:12:51 +08:00
|
|
|
email
|
2023-01-09 20:20:10 +08:00
|
|
|
end
|
2013-11-15 23:27:43 +08:00
|
|
|
end
|
|
|
|
|
2014-09-25 08:19:26 +08:00
|
|
|
def tl3_requirements
|
2014-09-05 13:20:39 +08:00
|
|
|
@lq ||= TrustLevel3Requirements.new(self)
|
2014-01-23 06:09:56 +08:00
|
|
|
end
|
|
|
|
|
2014-09-25 08:19:26 +08:00
|
|
|
def on_tl3_grace_period?
|
2018-10-12 03:11:40 +08:00
|
|
|
return true if SiteSetting.tl3_promotion_min_duration.to_i.days.ago.year < 2013
|
|
|
|
|
2014-09-14 04:55:26 +08:00
|
|
|
UserHistory
|
|
|
|
.for(self, :auto_trust_level_change)
|
|
|
|
.where("created_at >= ?", SiteSetting.tl3_promotion_min_duration.to_i.days.ago)
|
|
|
|
.where(previous_value: TrustLevel[2].to_s)
|
|
|
|
.where(new_value: TrustLevel[3].to_s)
|
|
|
|
.exists?
|
|
|
|
end
|
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
def refresh_avatar
|
2014-08-14 04:17:16 +08:00
|
|
|
return if @import_mode
|
|
|
|
|
2014-05-28 14:54:21 +08:00
|
|
|
avatar = user_avatar || create_user_avatar
|
2014-05-22 15:37:02 +08:00
|
|
|
|
2020-09-03 10:12:24 +08:00
|
|
|
if self.primary_email.present? && SiteSetting.automatically_download_gravatars? &&
|
|
|
|
!avatar.last_gravatar_download_attempt
|
2016-04-18 18:44:09 +08:00
|
|
|
Jobs.cancel_scheduled_job(:update_gravatar, user_id: self.id, avatar_id: avatar.id)
|
|
|
|
Jobs.enqueue_in(1.second, :update_gravatar, user_id: self.id, avatar_id: avatar.id)
|
2014-07-03 15:29:44 +08:00
|
|
|
end
|
2015-03-30 18:31:10 +08:00
|
|
|
|
2015-04-24 17:14:10 +08:00
|
|
|
# mark all the user's quoted posts as "needing a rebake"
|
2017-08-31 12:06:56 +08:00
|
|
|
Post.rebake_all_quoted_posts(self.id) if self.will_save_change_to_uploaded_avatar_id?
|
2014-07-03 15:29:44 +08:00
|
|
|
end
|
|
|
|
|
2014-07-29 01:17:37 +08:00
|
|
|
def first_post_created_at
|
|
|
|
user_stat.try(:first_post_created_at)
|
|
|
|
end
|
|
|
|
|
2014-09-25 13:50:54 +08:00
|
|
|
def associated_accounts
|
|
|
|
result = []
|
|
|
|
|
2018-07-23 23:51:57 +08:00
|
|
|
Discourse.authenticators.each do |authenticator|
|
|
|
|
account_description = authenticator.description_for_user(self)
|
|
|
|
unless account_description.empty?
|
|
|
|
result << { name: authenticator.name, description: account_description }
|
|
|
|
end
|
2014-09-25 13:50:54 +08:00
|
|
|
end
|
|
|
|
|
2018-07-23 23:51:57 +08:00
|
|
|
result
|
2014-09-25 13:50:54 +08:00
|
|
|
end
|
|
|
|
|
2018-09-07 06:02:47 +08:00
|
|
|
USER_FIELD_PREFIX ||= "user_field_"
|
|
|
|
|
2022-07-18 23:35:47 +08:00
|
|
|
def user_fields(field_ids = nil)
|
2020-03-03 03:22:49 +08:00
|
|
|
field_ids = (@all_user_field_ids ||= UserField.pluck(:id)) if field_ids.nil?
|
|
|
|
|
2023-06-22 01:35:24 +08:00
|
|
|
field_ids.map { |fid| [fid.to_s, custom_fields["#{USER_FIELD_PREFIX}#{fid}"]] }.to_h
|
2014-09-27 02:48:34 +08:00
|
|
|
end
|
|
|
|
|
2022-07-15 06:36:54 +08:00
|
|
|
def validatable_user_fields_values
|
|
|
|
validatable_user_fields.values.join(" ")
|
2022-05-16 21:21:33 +08:00
|
|
|
end
|
|
|
|
|
2021-03-29 19:03:19 +08:00
|
|
|
def set_user_field(field_id, value)
|
|
|
|
custom_fields["#{USER_FIELD_PREFIX}#{field_id}"] = value
|
|
|
|
end
|
|
|
|
|
2022-06-15 00:27:01 +08:00
|
|
|
def apply_watched_words
|
2022-07-15 06:36:54 +08:00
|
|
|
validatable_user_fields.each do |id, value|
|
2023-03-01 10:43:34 +08:00
|
|
|
field = WordWatcher.censor_text(value)
|
|
|
|
field = WordWatcher.replace_text(field)
|
|
|
|
set_user_field(id, field)
|
2022-06-15 00:27:01 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-15 06:36:54 +08:00
|
|
|
def validatable_user_fields
|
2022-07-18 23:35:47 +08:00
|
|
|
# ignore multiselect fields since they are admin-set and thus not user generated content
|
|
|
|
@public_user_field_ids ||=
|
|
|
|
UserField.public_fields.where.not(field_type: "multiselect").pluck(:id)
|
2022-07-15 06:36:54 +08:00
|
|
|
|
2022-06-15 00:27:01 +08:00
|
|
|
user_fields(@public_user_field_ids)
|
|
|
|
end
|
|
|
|
|
2015-02-20 01:11:07 +08:00
|
|
|
def number_of_deleted_posts
|
|
|
|
Post.with_deleted.where(user_id: self.id).where.not(deleted_at: nil).count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_flagged_posts
|
2023-10-18 09:38:17 +08:00
|
|
|
ReviewableFlaggedPost.where(target_created_by: self.id).count
|
2015-02-20 01:11:07 +08:00
|
|
|
end
|
|
|
|
|
2020-03-16 20:52:08 +08:00
|
|
|
def number_of_rejected_posts
|
2023-07-29 00:16:23 +08:00
|
|
|
ReviewableQueuedPost.rejected.where(target_created_by_id: self.id).count
|
2020-03-16 20:52:08 +08:00
|
|
|
end
|
|
|
|
|
2015-02-20 01:11:07 +08:00
|
|
|
def number_of_flags_given
|
|
|
|
PostAction
|
|
|
|
.where(user_id: self.id)
|
|
|
|
.where(disagreed_at: nil)
|
|
|
|
.where(post_action_type_id: PostActionType.notify_flag_type_ids)
|
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_suspensions
|
|
|
|
UserHistory.for(self, :suspend_user).count
|
|
|
|
end
|
|
|
|
|
2015-03-07 05:44:54 +08:00
|
|
|
def create_user_profile
|
2019-05-24 12:06:58 +08:00
|
|
|
UserProfile.create!(user_id: id)
|
2015-03-07 05:44:54 +08:00
|
|
|
end
|
|
|
|
|
2018-07-18 18:57:43 +08:00
|
|
|
def set_random_avatar
|
2022-02-25 04:57:39 +08:00
|
|
|
if SiteSetting.selectable_avatars_mode != "disabled"
|
2020-10-13 21:17:06 +08:00
|
|
|
if upload = SiteSetting.selectable_avatars.sample
|
|
|
|
update_column(:uploaded_avatar_id, upload.id)
|
|
|
|
UserAvatar.create!(user_id: id, custom_upload_id: upload.id)
|
2018-07-18 18:57:43 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-04-08 10:29:43 +08:00
|
|
|
def anonymous?
|
|
|
|
SiteSetting.allow_anonymous_posting && trust_level >= 1 && !!anonymous_user_master
|
|
|
|
end
|
|
|
|
|
2016-04-27 01:08:19 +08:00
|
|
|
def is_singular_admin?
|
2017-03-14 14:33:06 +08:00
|
|
|
User.where(admin: true).where.not(id: id).human_users.blank?
|
2016-04-27 01:08:19 +08:00
|
|
|
end
|
|
|
|
|
2016-07-04 17:20:30 +08:00
|
|
|
def logged_out
|
2023-01-05 03:55:52 +08:00
|
|
|
MessageBus.publish "/logout/#{self.id}", self.id, user_ids: [self.id]
|
2016-07-04 17:20:30 +08:00
|
|
|
DiscourseEvent.trigger(:user_logged_out, self)
|
|
|
|
end
|
|
|
|
|
2017-06-01 16:19:42 +08:00
|
|
|
def logged_in
|
|
|
|
DiscourseEvent.trigger(:user_logged_in, self)
|
|
|
|
|
|
|
|
DiscourseEvent.trigger(:user_first_logged_in, self) if !self.seen_before?
|
|
|
|
end
|
|
|
|
|
2017-06-15 01:20:18 +08:00
|
|
|
def set_automatic_groups
|
2018-05-15 07:48:30 +08:00
|
|
|
return if !active || staged || !email_confirmed?
|
2017-06-15 01:20:18 +08:00
|
|
|
|
|
|
|
Group
|
|
|
|
.where(automatic: false)
|
|
|
|
.where("LENGTH(COALESCE(automatic_membership_email_domains, '')) > 0")
|
|
|
|
.each do |group|
|
|
|
|
domains = group.automatic_membership_email_domains.gsub(".", '\.')
|
|
|
|
|
|
|
|
if email =~ Regexp.new("@(#{domains})$", true) && !group.users.include?(self)
|
|
|
|
group.add(self)
|
|
|
|
GroupActionLogger.new(Discourse.system_user, group).log_add_user_to_group(self)
|
2023-01-09 20:20:10 +08:00
|
|
|
end
|
2017-06-15 01:20:18 +08:00
|
|
|
end
|
2022-09-26 11:58:40 +08:00
|
|
|
|
|
|
|
@belonging_to_group_ids = nil
|
2017-06-15 01:20:18 +08:00
|
|
|
end
|
|
|
|
|
2017-04-27 02:47:36 +08:00
|
|
|
def email
|
2020-12-10 01:14:45 +08:00
|
|
|
primary_email&.email
|
2017-04-27 02:47:36 +08:00
|
|
|
end
|
|
|
|
|
2021-02-22 19:42:37 +08:00
|
|
|
# Shortcut to set the primary email of the user.
|
|
|
|
# Automatically removes any identical secondary emails.
|
2018-03-02 16:41:02 +08:00
|
|
|
def email=(new_email)
|
2017-04-27 02:47:36 +08:00
|
|
|
if primary_email
|
2021-02-22 19:42:37 +08:00
|
|
|
primary_email.email = new_email
|
2017-04-27 02:47:36 +08:00
|
|
|
else
|
2021-02-22 19:42:37 +08:00
|
|
|
build_primary_email email: new_email, skip_validate_email: !should_validate_email_address?
|
2017-04-27 02:47:36 +08:00
|
|
|
end
|
2021-02-22 19:42:37 +08:00
|
|
|
|
|
|
|
if secondary_match =
|
|
|
|
user_emails.detect { |ue|
|
|
|
|
!ue.primary && Email.downcase(ue.email) == Email.downcase(new_email)
|
|
|
|
}
|
|
|
|
secondary_match.mark_for_destruction
|
|
|
|
primary_email.skip_validate_unique_email = true
|
|
|
|
end
|
2017-04-27 02:47:36 +08:00
|
|
|
end
|
|
|
|
|
2018-07-03 19:51:22 +08:00
|
|
|
def emails
|
|
|
|
self.user_emails.order("user_emails.primary DESC NULLS LAST").pluck(:email)
|
|
|
|
end
|
|
|
|
|
|
|
|
def secondary_emails
|
|
|
|
self.user_emails.secondary.pluck(:email)
|
|
|
|
end
|
|
|
|
|
2020-06-11 00:11:49 +08:00
|
|
|
def unconfirmed_emails
|
|
|
|
self
|
|
|
|
.email_change_requests
|
|
|
|
.where.not(change_state: EmailChangeRequest.states[:complete])
|
|
|
|
.pluck(:new_email)
|
|
|
|
end
|
|
|
|
|
2020-03-03 21:57:46 +08:00
|
|
|
RECENT_TIME_READ_THRESHOLD ||= 60.days
|
|
|
|
|
|
|
|
def self.preload_recent_time_read(users)
|
|
|
|
times =
|
|
|
|
UserVisit
|
|
|
|
.where(user_id: users.map(&:id))
|
|
|
|
.where("visited_at >= ?", RECENT_TIME_READ_THRESHOLD.ago)
|
|
|
|
.group(:user_id)
|
|
|
|
.sum(:time_read)
|
|
|
|
users.each { |u| u.preload_recent_time_read(times[u.id] || 0) }
|
|
|
|
end
|
|
|
|
|
|
|
|
def preload_recent_time_read(time)
|
|
|
|
@recent_time_read = time
|
|
|
|
end
|
|
|
|
|
2017-11-15 05:39:07 +08:00
|
|
|
def recent_time_read
|
2020-03-03 21:57:46 +08:00
|
|
|
@recent_time_read ||=
|
|
|
|
self.user_visits.where("visited_at >= ?", RECENT_TIME_READ_THRESHOLD.ago).sum(:time_read)
|
2017-11-15 05:39:07 +08:00
|
|
|
end
|
|
|
|
|
2018-01-19 22:29:15 +08:00
|
|
|
def from_staged?
|
|
|
|
custom_fields[User::FROM_STAGED]
|
|
|
|
end
|
|
|
|
|
2018-06-19 08:05:04 +08:00
|
|
|
def mature_staged?
|
2018-06-20 00:41:10 +08:00
|
|
|
from_staged? && self.created_at && self.created_at < 1.day.ago
|
2018-06-19 08:05:04 +08:00
|
|
|
end
|
|
|
|
|
2018-09-21 10:06:08 +08:00
|
|
|
def next_best_title
|
|
|
|
group_titles_query = groups.where("groups.title <> ''")
|
|
|
|
group_titles_query =
|
|
|
|
group_titles_query.order("groups.id = #{primary_group_id} DESC") if primary_group_id
|
|
|
|
group_titles_query = group_titles_query.order("groups.primary_group DESC").limit(1)
|
|
|
|
|
2023-02-13 12:39:45 +08:00
|
|
|
if next_best_group_title = group_titles_query.pick(:title)
|
2018-09-21 10:06:08 +08:00
|
|
|
return next_best_group_title
|
|
|
|
end
|
|
|
|
|
2023-02-13 12:39:45 +08:00
|
|
|
next_best_badge_title = badges.where(allow_title: true).pick(:name)
|
2018-09-21 10:06:08 +08:00
|
|
|
next_best_badge_title ? Badge.display_name(next_best_badge_title) : nil
|
|
|
|
end
|
|
|
|
|
2019-04-04 04:10:36 +08:00
|
|
|
def create_reviewable
|
|
|
|
return unless SiteSetting.must_approve_users? || SiteSetting.invite_only?
|
|
|
|
return if approved?
|
|
|
|
|
|
|
|
Jobs.enqueue(:create_user_reviewable, user_id: self.id)
|
|
|
|
end
|
|
|
|
|
2019-08-10 18:02:12 +08:00
|
|
|
def has_more_posts_than?(max_post_count)
|
|
|
|
return true if user_stat && (user_stat.topic_count + user_stat.post_count) > max_post_count
|
2020-04-02 04:10:17 +08:00
|
|
|
return true if max_post_count < 0
|
2019-08-10 18:02:12 +08:00
|
|
|
|
|
|
|
DB.query_single(<<~SQL, user_id: self.id).first > max_post_count
|
|
|
|
SELECT COUNT(1)
|
|
|
|
FROM (
|
|
|
|
SELECT 1
|
|
|
|
FROM posts p
|
|
|
|
JOIN topics t ON (p.topic_id = t.id)
|
|
|
|
WHERE p.user_id = :user_id AND
|
|
|
|
p.deleted_at IS NULL AND
|
|
|
|
t.deleted_at IS NULL AND
|
|
|
|
(
|
|
|
|
t.archetype <> 'private_message' OR
|
|
|
|
EXISTS(
|
|
|
|
SELECT 1
|
|
|
|
FROM topic_allowed_users a
|
|
|
|
WHERE a.topic_id = t.id AND a.user_id > 0 AND a.user_id <> :user_id
|
|
|
|
) OR
|
|
|
|
EXISTS(
|
|
|
|
SELECT 1
|
|
|
|
FROM topic_allowed_groups g
|
|
|
|
WHERE g.topic_id = p.topic_id
|
|
|
|
)
|
|
|
|
)
|
|
|
|
LIMIT #{max_post_count + 1}
|
|
|
|
) x
|
|
|
|
SQL
|
|
|
|
end
|
|
|
|
|
2019-10-02 10:08:41 +08:00
|
|
|
def create_or_fetch_secure_identifier
|
|
|
|
return secure_identifier if secure_identifier.present?
|
|
|
|
new_secure_identifier = SecureRandom.hex(20)
|
|
|
|
self.update(secure_identifier: new_secure_identifier)
|
|
|
|
new_secure_identifier
|
|
|
|
end
|
|
|
|
|
2023-10-04 02:59:28 +08:00
|
|
|
def second_factor_security_keys
|
|
|
|
security_keys.where(factor_type: UserSecurityKey.factor_types[:second_factor])
|
|
|
|
end
|
|
|
|
|
2019-10-02 10:08:41 +08:00
|
|
|
def second_factor_security_key_credential_ids
|
2023-10-04 02:59:28 +08:00
|
|
|
second_factor_security_keys.pluck(:credential_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def passkey_credential_ids
|
|
|
|
security_keys.where(factor_type: UserSecurityKey.factor_types[:first_factor]).pluck(
|
|
|
|
:credential_id,
|
|
|
|
)
|
2019-10-02 10:08:41 +08:00
|
|
|
end
|
|
|
|
|
2020-06-06 00:31:58 +08:00
|
|
|
def encoded_username(lower: false)
|
|
|
|
UrlHelper.encode_component(lower ? username_lower : username)
|
|
|
|
end
|
|
|
|
|
2020-12-18 23:03:51 +08:00
|
|
|
def do_not_disturb?
|
|
|
|
active_do_not_disturb_timings.exists?
|
|
|
|
end
|
|
|
|
|
|
|
|
def active_do_not_disturb_timings
|
|
|
|
now = Time.zone.now
|
|
|
|
do_not_disturb_timings.where("starts_at <= ? AND ends_at > ?", now, now)
|
|
|
|
end
|
|
|
|
|
2021-01-08 00:49:49 +08:00
|
|
|
def do_not_disturb_until
|
|
|
|
active_do_not_disturb_timings.maximum(:ends_at)
|
|
|
|
end
|
|
|
|
|
2021-01-28 00:29:24 +08:00
|
|
|
def shelved_notifications
|
|
|
|
ShelvedNotification.joins(:notification).where("notifications.user_id = ?", self.id)
|
|
|
|
end
|
|
|
|
|
2021-11-22 11:38:49 +08:00
|
|
|
def allow_live_notifications?
|
|
|
|
seen_since?(30.days.ago)
|
|
|
|
end
|
|
|
|
|
2021-12-02 21:42:23 +08:00
|
|
|
def username_equals_to?(another_username)
|
|
|
|
username_lower == User.normalize_username(another_username)
|
|
|
|
end
|
|
|
|
|
2022-04-13 21:52:56 +08:00
|
|
|
def full_url
|
|
|
|
"#{Discourse.base_url}/u/#{encoded_username}"
|
|
|
|
end
|
|
|
|
|
|
|
|
def display_name
|
|
|
|
if SiteSetting.prioritize_username_in_ux?
|
|
|
|
username
|
|
|
|
else
|
|
|
|
name.presence || username
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-27 17:15:14 +08:00
|
|
|
def clear_status!
|
|
|
|
user_status.destroy! if user_status
|
2022-05-30 17:41:53 +08:00
|
|
|
publish_user_status(nil)
|
2022-05-27 17:15:14 +08:00
|
|
|
end
|
|
|
|
|
2022-08-09 18:54:33 +08:00
|
|
|
def set_status!(description, emoji, ends_at = nil)
|
2023-02-06 22:56:28 +08:00
|
|
|
status = {
|
|
|
|
description: description,
|
|
|
|
emoji: emoji,
|
|
|
|
set_at: Time.zone.now,
|
|
|
|
ends_at: ends_at,
|
|
|
|
user_id: id,
|
|
|
|
}
|
|
|
|
validate_status!(status)
|
|
|
|
UserStatus.upsert(status)
|
2022-05-30 17:41:53 +08:00
|
|
|
|
2023-02-06 22:56:28 +08:00
|
|
|
reload_user_status
|
2022-05-30 17:41:53 +08:00
|
|
|
publish_user_status(user_status)
|
2022-05-27 17:15:14 +08:00
|
|
|
end
|
|
|
|
|
2022-07-05 23:12:22 +08:00
|
|
|
def has_status?
|
|
|
|
user_status && !user_status.expired?
|
|
|
|
end
|
|
|
|
|
2023-02-27 20:11:01 +08:00
|
|
|
def new_new_view_enabled?
|
|
|
|
in_any_groups?(SiteSetting.experimental_new_new_view_groups_map)
|
|
|
|
end
|
DEV: Upgrade search-menu to glimmer (#20482)
# Top level view
This PR is the first version of converting the search menu and its logic from (deprecated) widgets to glimmer components. The changes are hidden behind a group based feature flag. This will give us the ability to test the new implementation in a production setting before fully committing to the new search menu.
# What has changed
The majority of the logic from the widget implementation has been updated to fit within the context of a glimmer component, but it has not fundamentally changed. Instead of having a single widget - [search-menu.js](https://github.com/discourse/discourse/blob/main/app/assets/javascripts/discourse/app/widgets/search-menu.js) - that built the bulk of the search menu logic, we split the logic into (20+) bite size components. This greatly increases the readability and makes extending a component in the search menu much more straightforward.
That being said, certain pieces needed to be rewritten from scratch as they did not translate from widget -> glimmer, or there was a general code upgraded needed. There are a few of these changes worth noting:
### Search Service
**Search Term** -> In the widget implementation we had a overly complex way of managing the current search term. We tracked the search term across multiple different states (`term`, `opts.term`, `searchData.term`) causing headaches. This PR introduces a single source of truth:
```js
this.search.activeGlobalSearchTerm
```
This tracked value is available anywhere the `search` service is injected. In the case the search term should be needs to be updated you can call
```js
this.search.activeGlobalSearchTerm = "foo"
```
**event listeners** -> In the widget implementation we defined event listeners **only** on the search input to handle things such as
- keyboard navigation / shortcuts
- closing the search menu
- performing a search with "enter"
Having this in one place caused a lot of bloat in our logic as we had to handle multiple different cases in one location. Do _x_ if it is this element, but do _y_ if it is another. This PR updates the event listeners to be attached to individual components, allowing for a more fine tuned set of actions per element. To not duplicate logic across multiple components, we have condensed shared logic to actions on the search service to be reused. For example - `this.search.handleArrowUpOrDown` - to handle keyboard navigation.
### Search Context
We have unique logic based on the current search context (topic / tag / category / user / etc). This context is set within a models route file. We have updated the search service with a tracked value `searchContext` that can be utilized and updated from any component where the search service is injected.
```js
# before
this.searchService.set("searchContext", user.searchContext);
# after
this.searchService.searchContext = user.searchContext;
```
# Views
<img width="434" alt="Screenshot 2023-06-15 at 11 01 01 AM" src="https://github.com/discourse/discourse/assets/50783505/ef57e8e6-4e7b-4ba0-a770-8f2ed6310569">
<img width="418" alt="Screenshot 2023-06-15 at 11 04 11 AM" src="https://github.com/discourse/discourse/assets/50783505/2c1e0b38-d12c-4339-a1d5-04f0c1932b08">
<img width="413" alt="Screenshot 2023-06-15 at 11 04 34 AM" src="https://github.com/discourse/discourse/assets/50783505/b871d164-88cb-405e-9b78-d326a6f63686">
<img width="419" alt="Screenshot 2023-06-15 at 11 07 51 AM" src="https://github.com/discourse/discourse/assets/50783505/c7309a19-f541-47f4-94ef-10fa65658d8c">
<img width="424" alt="Screenshot 2023-06-15 at 11 04 48 AM" src="https://github.com/discourse/discourse/assets/50783505/f3dba06e-b029-431c-b3d0-36727b9e6dce">
<img width="415" alt="Screenshot 2023-06-15 at 11 08 57 AM" src="https://github.com/discourse/discourse/assets/50783505/ad4e7250-040c-4d06-bf06-99652f4c7b7c">
2023-06-16 22:24:07 +08:00
|
|
|
|
2023-07-04 13:08:29 +08:00
|
|
|
def watched_precedence_over_muted
|
|
|
|
if user_option.watched_precedence_over_muted.nil?
|
|
|
|
SiteSetting.watched_precedence_over_muted
|
|
|
|
else
|
|
|
|
user_option.watched_precedence_over_muted
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
protected
|
|
|
|
|
2014-07-23 09:42:24 +08:00
|
|
|
def badge_grant
|
|
|
|
BadgeGranter.queue_badge_grant(Badge::Trigger::UserChange, user: self)
|
|
|
|
end
|
|
|
|
|
2015-06-06 01:50:06 +08:00
|
|
|
def expire_old_email_tokens
|
2017-08-31 12:06:56 +08:00
|
|
|
if saved_change_to_password_hash? && !saved_change_to_id?
|
2015-06-06 01:50:06 +08:00
|
|
|
email_tokens.where("not expired").update_all(expired: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-22 10:13:14 +08:00
|
|
|
def index_search
|
2021-04-27 13:52:45 +08:00
|
|
|
# force is needed as user custom fields are updated using SQL and after_save callback is not triggered
|
|
|
|
SearchIndexer.index(self, force: true)
|
2016-12-22 10:13:14 +08:00
|
|
|
end
|
|
|
|
|
2014-03-24 15:03:39 +08:00
|
|
|
def clear_global_notice_if_needed
|
2017-03-14 14:33:06 +08:00
|
|
|
return if id < 0
|
2017-02-13 23:53:45 +08:00
|
|
|
|
2014-03-24 15:03:39 +08:00
|
|
|
if admin && SiteSetting.has_login_hint
|
|
|
|
SiteSetting.has_login_hint = false
|
|
|
|
SiteSetting.global_notice = ""
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-17 08:46:30 +08:00
|
|
|
def ensure_in_trust_level_group
|
|
|
|
Group.user_trust_level_change!(id, trust_level)
|
|
|
|
end
|
|
|
|
|
2013-09-12 02:50:26 +08:00
|
|
|
def create_user_stat
|
2021-08-02 22:15:53 +08:00
|
|
|
UserStat.create!(new_since: Time.zone.now, user_id: id)
|
2013-09-12 02:50:26 +08:00
|
|
|
end
|
|
|
|
|
2016-02-17 12:46:19 +08:00
|
|
|
def create_user_option
|
2019-05-24 12:06:58 +08:00
|
|
|
UserOption.create!(user_id: id)
|
2016-02-17 12:46:19 +08:00
|
|
|
end
|
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def create_email_token
|
2021-11-25 15:34:39 +08:00
|
|
|
email_tokens.create!(email: email, scope: EmailToken.scopes[:signup])
|
2013-06-06 22:40:10 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def ensure_password_is_hashed
|
|
|
|
if @raw_password
|
2023-04-11 17:16:28 +08:00
|
|
|
self.salt = SecureRandom.hex(PASSWORD_SALT_LENGTH)
|
|
|
|
self.password_algorithm = TARGET_PASSWORD_ALGORITHM
|
|
|
|
self.password_hash = hash_password(@raw_password, salt, password_algorithm)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-06-06 22:40:10 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2017-02-01 06:21:37 +08:00
|
|
|
def expire_tokens_if_password_changed
|
|
|
|
# NOTE: setting raw password is the only valid way of changing a password
|
|
|
|
# the password field in the DB is actually hashed, nobody should be amending direct
|
|
|
|
if @raw_password
|
|
|
|
# Association in model may be out-of-sync
|
|
|
|
UserAuthToken.where(user_id: id).destroy_all
|
|
|
|
# We should not carry this around after save
|
|
|
|
@raw_password = nil
|
2017-12-01 12:19:24 +08:00
|
|
|
@password_required = false
|
2017-02-01 06:21:37 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-04-11 17:16:28 +08:00
|
|
|
def hash_password(password, salt, algorithm)
|
2016-05-30 11:38:04 +08:00
|
|
|
raise StandardError.new("password is too long") if password.size > User.max_password_length
|
2023-04-11 17:16:28 +08:00
|
|
|
PasswordHasher.hash_password(password: password, salt: salt, algorithm: algorithm)
|
2013-06-06 22:40:10 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def add_trust_level
|
2013-12-21 15:19:22 +08:00
|
|
|
# there is a possibility we did not load trust level column, skip it
|
2013-06-06 22:40:10 +08:00
|
|
|
return unless has_attribute? :trust_level
|
|
|
|
self.trust_level ||= SiteSetting.default_trust_level
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
def update_usernames
|
|
|
|
self.username.unicode_normalize!
|
2013-06-06 22:40:10 +08:00
|
|
|
self.username_lower = username.downcase
|
|
|
|
end
|
2013-02-06 10:44:49 +08:00
|
|
|
|
2018-04-03 00:44:04 +08:00
|
|
|
USERNAME_EXISTS_SQL = <<~SQL
|
2019-04-23 18:22:47 +08:00
|
|
|
(SELECT users.id AS id, true as is_user FROM users
|
|
|
|
WHERE users.username_lower = :username)
|
2018-04-03 00:44:04 +08:00
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
UNION ALL
|
2018-04-03 00:44:04 +08:00
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
(SELECT groups.id, false as is_user FROM groups
|
|
|
|
WHERE lower(groups.name) = :username)
|
2018-04-03 00:44:04 +08:00
|
|
|
SQL
|
|
|
|
|
2019-04-23 18:22:47 +08:00
|
|
|
def self.username_exists?(username)
|
|
|
|
username = normalize_username(username)
|
|
|
|
DB.exec(User::USERNAME_EXISTS_SQL, username: username) > 0
|
2019-02-20 05:31:03 +08:00
|
|
|
end
|
|
|
|
|
2018-04-03 00:44:04 +08:00
|
|
|
def username_validator
|
|
|
|
username_format_validator ||
|
|
|
|
begin
|
2019-05-14 04:43:19 +08:00
|
|
|
if will_save_change_to_username?
|
|
|
|
existing =
|
|
|
|
DB.query(USERNAME_EXISTS_SQL, username: self.class.normalize_username(username))
|
|
|
|
|
|
|
|
user_id = existing.select { |u| u.is_user }.first&.id
|
|
|
|
same_user = user_id && user_id == self.id
|
2018-06-19 14:13:14 +08:00
|
|
|
|
2019-05-14 04:43:19 +08:00
|
|
|
errors.add(:username, I18n.t(:"user.username.unique")) if existing.present? && !same_user
|
2018-04-03 00:44:04 +08:00
|
|
|
|
2019-05-14 04:43:19 +08:00
|
|
|
if confirm_password?(username) || confirm_password?(username.downcase)
|
|
|
|
errors.add(:username, :same_as_password)
|
2023-01-09 20:20:10 +08:00
|
|
|
end
|
2019-05-14 04:43:19 +08:00
|
|
|
end
|
2018-04-03 00:44:04 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-14 04:43:19 +08:00
|
|
|
def name_validator
|
2020-02-04 03:12:45 +08:00
|
|
|
if name.present?
|
|
|
|
name_pw = name[0...User.max_password_length]
|
|
|
|
if confirm_password?(name_pw) || confirm_password?(name_pw.downcase)
|
|
|
|
errors.add(:name, :same_as_password)
|
|
|
|
end
|
2019-05-14 04:43:19 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-08-22 02:39:21 +08:00
|
|
|
def set_default_categories_preferences
|
2016-06-14 22:45:47 +08:00
|
|
|
return if self.staged?
|
|
|
|
|
2015-08-22 02:39:21 +08:00
|
|
|
values = []
|
|
|
|
|
2021-05-06 07:14:07 +08:00
|
|
|
# The following site settings are used to pre-populate default category
|
|
|
|
# tracking settings for a user:
|
|
|
|
#
|
|
|
|
# * default_categories_watching
|
|
|
|
# * default_categories_tracking
|
|
|
|
# * default_categories_watching_first_post
|
2022-06-20 11:49:33 +08:00
|
|
|
# * default_categories_normal
|
2021-05-06 07:14:07 +08:00
|
|
|
# * default_categories_muted
|
2022-06-20 11:49:33 +08:00
|
|
|
%w[watching watching_first_post tracking normal muted].each do |setting|
|
2021-05-06 07:14:07 +08:00
|
|
|
category_ids = SiteSetting.get("default_categories_#{setting}").split("|").map(&:to_i)
|
2015-08-22 02:39:21 +08:00
|
|
|
category_ids.each do |category_id|
|
2019-07-12 01:41:51 +08:00
|
|
|
next if category_id == 0
|
2021-05-06 07:14:07 +08:00
|
|
|
values << {
|
|
|
|
user_id: self.id,
|
|
|
|
category_id: category_id,
|
|
|
|
notification_level: CategoryUser.notification_levels[setting.to_sym],
|
|
|
|
}
|
2013-08-24 05:35:01 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-03-28 22:13:01 +08:00
|
|
|
CategoryUser.insert_all(values) if values.present?
|
2014-01-03 04:27:26 +08:00
|
|
|
end
|
|
|
|
|
2019-11-01 15:10:13 +08:00
|
|
|
def set_default_tags_preferences
|
|
|
|
return if self.staged?
|
|
|
|
|
|
|
|
values = []
|
|
|
|
|
2021-05-06 07:14:07 +08:00
|
|
|
# The following site settings are used to pre-populate default tag
|
|
|
|
# tracking settings for a user:
|
|
|
|
#
|
|
|
|
# * default_tags_watching
|
|
|
|
# * default_tags_tracking
|
|
|
|
# * default_tags_watching_first_post
|
|
|
|
# * default_tags_muted
|
|
|
|
%w[watching watching_first_post tracking muted].each do |setting|
|
|
|
|
tag_names = SiteSetting.get("default_tags_#{setting}").split("|")
|
2019-11-01 15:10:13 +08:00
|
|
|
now = Time.zone.now
|
|
|
|
|
|
|
|
Tag
|
|
|
|
.where(name: tag_names)
|
|
|
|
.pluck(:id)
|
|
|
|
.each do |tag_id|
|
2021-05-06 07:14:07 +08:00
|
|
|
values << {
|
|
|
|
user_id: self.id,
|
|
|
|
tag_id: tag_id,
|
|
|
|
notification_level: TagUser.notification_levels[setting.to_sym],
|
|
|
|
created_at: now,
|
|
|
|
updated_at: now,
|
|
|
|
}
|
2019-11-01 15:10:13 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
TagUser.insert_all!(values) if values.present?
|
|
|
|
end
|
|
|
|
|
2014-12-03 13:36:25 +08:00
|
|
|
def self.purge_unactivated
|
2017-08-26 03:20:06 +08:00
|
|
|
return [] if SiteSetting.purge_unactivated_users_grace_period_days <= 0
|
|
|
|
|
2018-05-17 00:24:11 +08:00
|
|
|
destroyer = UserDestroyer.new(Discourse.system_user)
|
|
|
|
|
|
|
|
User
|
|
|
|
.where(active: false)
|
2014-12-03 13:36:25 +08:00
|
|
|
.where("created_at < ?", SiteSetting.purge_unactivated_users_grace_period_days.days.ago)
|
2018-05-17 00:24:11 +08:00
|
|
|
.where("NOT admin AND NOT moderator")
|
2018-06-29 11:33:54 +08:00
|
|
|
.where(
|
|
|
|
"NOT EXISTS
|
2018-07-13 10:28:27 +08:00
|
|
|
(SELECT 1 FROM topic_allowed_users tu JOIN topics t ON t.id = tu.topic_id AND t.user_id > 0 WHERE tu.user_id = users.id LIMIT 1)
|
2018-06-29 11:33:54 +08:00
|
|
|
",
|
|
|
|
)
|
2021-03-01 13:46:28 +08:00
|
|
|
.where(
|
|
|
|
"NOT EXISTS
|
|
|
|
(SELECT 1 FROM posts p WHERE p.user_id = users.id LIMIT 1)
|
|
|
|
",
|
|
|
|
)
|
2016-07-27 18:28:56 +08:00
|
|
|
.limit(200)
|
2018-05-17 00:24:11 +08:00
|
|
|
.find_each do |user|
|
2014-08-20 01:46:40 +08:00
|
|
|
begin
|
2018-05-17 00:24:11 +08:00
|
|
|
destroyer.destroy(user, context: I18n.t(:purge_reason))
|
2021-03-01 13:46:28 +08:00
|
|
|
rescue Discourse::InvalidAccess
|
2018-05-17 00:24:11 +08:00
|
|
|
# keep going
|
2023-01-09 20:20:10 +08:00
|
|
|
end
|
2014-08-20 01:46:40 +08:00
|
|
|
end
|
2014-08-14 02:13:41 +08:00
|
|
|
end
|
|
|
|
|
2021-07-08 15:46:21 +08:00
|
|
|
def match_primary_group_changes
|
2018-09-17 13:08:39 +08:00
|
|
|
return unless primary_group_id_changed?
|
|
|
|
|
2023-02-13 12:39:45 +08:00
|
|
|
self.title = primary_group&.title if Group.exists?(id: primary_group_id_was, title: title)
|
2021-07-08 15:46:21 +08:00
|
|
|
|
|
|
|
self.flair_group_id = primary_group&.id if flair_group_id == primary_group_id_was
|
2018-09-17 13:08:39 +08:00
|
|
|
end
|
|
|
|
|
2022-08-10 00:22:39 +08:00
|
|
|
def self.first_login_admin_id
|
|
|
|
User
|
|
|
|
.where(admin: true)
|
|
|
|
.human_users
|
|
|
|
.joins(:user_auth_tokens)
|
|
|
|
.order("user_auth_tokens.created_at")
|
2023-02-13 12:39:45 +08:00
|
|
|
.pick(:id)
|
2022-08-10 00:22:39 +08:00
|
|
|
end
|
|
|
|
|
2013-07-07 18:40:35 +08:00
|
|
|
private
|
|
|
|
|
2022-12-06 02:39:10 +08:00
|
|
|
def set_default_sidebar_section_links(update: false)
|
2022-10-27 06:38:50 +08:00
|
|
|
return if staged? || bot?
|
|
|
|
|
2023-06-15 07:31:28 +08:00
|
|
|
if SiteSetting.default_navigation_menu_categories.present?
|
|
|
|
categories_to_update = SiteSetting.default_navigation_menu_categories.split("|")
|
2022-12-06 02:39:10 +08:00
|
|
|
|
2022-12-01 09:32:35 +08:00
|
|
|
SidebarSectionLinksUpdater.update_category_section_links(
|
|
|
|
self,
|
2022-12-06 02:39:10 +08:00
|
|
|
category_ids: categories_to_update,
|
2022-12-01 09:32:35 +08:00
|
|
|
)
|
2022-10-27 06:38:50 +08:00
|
|
|
end
|
|
|
|
|
2023-06-15 07:31:28 +08:00
|
|
|
if SiteSetting.tagging_enabled && SiteSetting.default_navigation_menu_tags.present?
|
2023-07-27 10:52:33 +08:00
|
|
|
SidebarSectionLinksUpdater.update_tag_section_links(
|
|
|
|
self,
|
|
|
|
tag_ids: Tag.where(name: SiteSetting.default_navigation_menu_tags.split("|")).pluck(:id),
|
|
|
|
)
|
2022-10-27 06:38:50 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-08-02 22:15:53 +08:00
|
|
|
def stat
|
|
|
|
user_stat || create_user_stat
|
|
|
|
end
|
|
|
|
|
2019-06-17 13:10:47 +08:00
|
|
|
def trigger_user_automatic_group_refresh
|
|
|
|
Group.user_trust_level_change!(id, trust_level) if !staged
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2019-05-28 00:12:26 +08:00
|
|
|
def trigger_user_updated_event
|
|
|
|
DiscourseEvent.trigger(:user_updated, self)
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-09-21 10:06:08 +08:00
|
|
|
def check_if_title_is_badged_granted
|
|
|
|
if title_changed? && !new_record? && user_profile
|
2019-11-08 13:34:24 +08:00
|
|
|
badge_matching_title =
|
|
|
|
title &&
|
|
|
|
badges.find do |badge|
|
|
|
|
badge.allow_title? && (badge.display_name == title || badge.name == title)
|
|
|
|
end
|
2023-03-08 20:37:20 +08:00
|
|
|
user_profile.update!(granted_title_badge_id: badge_matching_title&.id)
|
2018-09-21 10:06:08 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-10-24 05:24:50 +08:00
|
|
|
def previous_visit_at_update_required?(timestamp)
|
2014-01-17 11:38:08 +08:00
|
|
|
seen_before? && (last_seen_at < (timestamp - SiteSetting.previous_visit_timeout_hours.hours))
|
2013-10-24 05:24:50 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_previous_visit(timestamp)
|
|
|
|
update_visit_record!(timestamp.to_date)
|
|
|
|
update_column(:previous_visit_at, last_seen_at) if previous_visit_at_update_required?(timestamp)
|
|
|
|
end
|
|
|
|
|
2023-06-26 11:01:59 +08:00
|
|
|
def change_display_name
|
|
|
|
Jobs.enqueue(:change_display_name, user_id: id, old_name: name_before_last_save, new_name: name)
|
|
|
|
end
|
|
|
|
|
2017-03-16 15:36:27 +08:00
|
|
|
def trigger_user_created_event
|
2017-03-16 16:02:34 +08:00
|
|
|
DiscourseEvent.trigger(:user_created, self)
|
2017-03-16 15:36:27 +08:00
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-07-23 15:49:49 +08:00
|
|
|
def trigger_user_destroyed_event
|
|
|
|
DiscourseEvent.trigger(:user_destroyed, self)
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2017-10-25 13:02:18 +08:00
|
|
|
def set_skip_validate_email
|
|
|
|
self.primary_email.skip_validate_email = !should_validate_email_address? if self.primary_email
|
2017-08-09 10:56:08 +08:00
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-12-15 05:52:37 +08:00
|
|
|
def check_site_contact_username
|
|
|
|
if (saved_change_to_admin? || saved_change_to_moderator?) &&
|
|
|
|
self.username == SiteSetting.site_contact_username && !staff?
|
|
|
|
SiteSetting.set_and_log(:site_contact_username, SiteSetting.defaults[:site_contact_username])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-31 12:46:22 +08:00
|
|
|
def self.ensure_consistency!
|
|
|
|
DB.exec <<~SQL
|
|
|
|
UPDATE users
|
|
|
|
SET uploaded_avatar_id = NULL
|
|
|
|
WHERE uploaded_avatar_id IN (
|
|
|
|
SELECT u1.uploaded_avatar_id FROM users u1
|
|
|
|
LEFT JOIN uploads up
|
|
|
|
ON u1.uploaded_avatar_id = up.id
|
|
|
|
WHERE u1.uploaded_avatar_id IS NOT NULL AND
|
|
|
|
up.id IS NULL
|
|
|
|
)
|
|
|
|
SQL
|
|
|
|
end
|
2023-02-06 22:56:28 +08:00
|
|
|
|
|
|
|
def validate_status!(status)
|
|
|
|
UserStatus.new(status).validate!
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-05-24 10:48:32 +08:00
|
|
|
|
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: users
|
|
|
|
#
|
2017-11-24 04:55:44 +08:00
|
|
|
# id :integer not null, primary key
|
|
|
|
# username :string(60) not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
2019-01-12 03:29:56 +08:00
|
|
|
# name :string
|
2017-11-24 04:55:44 +08:00
|
|
|
# seen_notification_id :integer default(0), not null
|
|
|
|
# last_posted_at :datetime
|
|
|
|
# password_hash :string(64)
|
|
|
|
# salt :string(32)
|
|
|
|
# active :boolean default(FALSE), not null
|
|
|
|
# username_lower :string(60) not null
|
|
|
|
# last_seen_at :datetime
|
|
|
|
# admin :boolean default(FALSE), not null
|
|
|
|
# last_emailed_at :datetime
|
|
|
|
# trust_level :integer not null
|
|
|
|
# approved :boolean default(FALSE), not null
|
|
|
|
# approved_by_id :integer
|
|
|
|
# approved_at :datetime
|
|
|
|
# previous_visit_at :datetime
|
|
|
|
# suspended_at :datetime
|
|
|
|
# suspended_till :datetime
|
|
|
|
# date_of_birth :date
|
|
|
|
# views :integer default(0), not null
|
|
|
|
# flag_level :integer default(0), not null
|
|
|
|
# ip_address :inet
|
|
|
|
# moderator :boolean default(FALSE)
|
2019-01-12 03:29:56 +08:00
|
|
|
# title :string
|
2017-11-24 04:55:44 +08:00
|
|
|
# uploaded_avatar_id :integer
|
2019-01-12 01:19:23 +08:00
|
|
|
# locale :string(10)
|
2019-01-12 03:29:56 +08:00
|
|
|
# primary_group_id :integer
|
2017-11-24 04:55:44 +08:00
|
|
|
# registration_ip_address :inet
|
|
|
|
# staged :boolean default(FALSE), not null
|
|
|
|
# first_seen_at :datetime
|
|
|
|
# silenced_till :datetime
|
2019-01-04 01:03:01 +08:00
|
|
|
# group_locked_trust_level :integer
|
2017-11-24 04:55:44 +08:00
|
|
|
# manual_locked_trust_level :integer
|
2019-10-17 13:57:53 +08:00
|
|
|
# secure_identifier :string
|
2021-07-08 15:46:21 +08:00
|
|
|
# flair_group_id :integer
|
2022-05-06 15:11:16 +08:00
|
|
|
# last_seen_reviewable_id :integer
|
2023-04-11 17:16:28 +08:00
|
|
|
# password_algorithm :string(64)
|
2013-05-24 10:48:32 +08:00
|
|
|
#
|
|
|
|
# Indexes
|
|
|
|
#
|
2023-02-03 00:35:04 +08:00
|
|
|
# idx_users_admin (id) WHERE admin
|
|
|
|
# idx_users_moderator (id) WHERE moderator
|
|
|
|
# index_users_on_last_posted_at (last_posted_at)
|
|
|
|
# index_users_on_last_seen_at (last_seen_at)
|
|
|
|
# index_users_on_name_trgm (name) USING gist
|
|
|
|
# index_users_on_secure_identifier (secure_identifier) UNIQUE
|
|
|
|
# index_users_on_uploaded_avatar_id (uploaded_avatar_id)
|
|
|
|
# index_users_on_username (username) UNIQUE
|
|
|
|
# index_users_on_username_lower (username_lower) UNIQUE
|
|
|
|
# index_users_on_username_lower_trgm (username_lower) USING gist
|
2013-05-24 10:48:32 +08:00
|
|
|
#
|