2013-04-19 02:27:04 +08:00
|
|
|
require_dependency 'email'
|
2013-02-06 03:16:51 +08:00
|
|
|
require_dependency 'email_token'
|
2016-12-21 17:00:45 +08:00
|
|
|
require_dependency 'email_validator'
|
2013-02-06 03:16:51 +08:00
|
|
|
require_dependency 'trust_level'
|
2013-03-06 20:12:16 +08:00
|
|
|
require_dependency 'pbkdf2'
|
2013-05-11 04:58:23 +08:00
|
|
|
require_dependency 'discourse'
|
2013-06-06 04:00:45 +08:00
|
|
|
require_dependency 'post_destroyer'
|
2013-06-06 22:40:10 +08:00
|
|
|
require_dependency 'user_name_suggester'
|
2013-06-23 12:32:46 +08:00
|
|
|
require_dependency 'pretty_text'
|
2013-11-23 02:18:45 +08:00
|
|
|
require_dependency 'url_helper'
|
2014-05-30 12:17:35 +08:00
|
|
|
require_dependency 'letter_avatar'
|
2014-06-17 08:46:30 +08:00
|
|
|
require_dependency 'promotion'
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
class User < ActiveRecord::Base
|
2013-06-07 06:07:59 +08:00
|
|
|
include Roleable
|
2014-04-28 16:31:51 +08:00
|
|
|
include HasCustomFields
|
2013-06-07 06:07:59 +08:00
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
has_many :posts
|
2013-09-04 05:19:29 +08:00
|
|
|
has_many :notifications, dependent: :destroy
|
|
|
|
has_many :topic_users, dependent: :destroy
|
2015-09-03 02:43:15 +08:00
|
|
|
has_many :category_users, dependent: :destroy
|
2016-05-05 02:02:47 +08:00
|
|
|
has_many :tag_users, dependent: :destroy
|
2016-08-16 15:06:33 +08:00
|
|
|
has_many :user_api_keys, dependent: :destroy
|
2013-02-06 03:16:51 +08:00
|
|
|
has_many :topics
|
2013-04-12 04:04:20 +08:00
|
|
|
has_many :user_open_ids, dependent: :destroy
|
2013-09-04 05:19:29 +08:00
|
|
|
has_many :user_actions, dependent: :destroy
|
|
|
|
has_many :post_actions, dependent: :destroy
|
2015-09-03 02:43:15 +08:00
|
|
|
has_many :user_badges, -> { where('user_badges.badge_id IN (SELECT id FROM badges WHERE enabled)') }, dependent: :destroy
|
2014-07-09 13:31:49 +08:00
|
|
|
has_many :badges, through: :user_badges
|
2014-11-29 03:20:43 +08:00
|
|
|
has_many :email_logs, dependent: :delete_all
|
2016-04-19 04:58:30 +08:00
|
|
|
has_many :incoming_emails, dependent: :delete_all
|
2013-02-06 03:16:51 +08:00
|
|
|
has_many :post_timings
|
2013-09-04 05:19:29 +08:00
|
|
|
has_many :topic_allowed_users, dependent: :destroy
|
2013-02-06 03:16:51 +08:00
|
|
|
has_many :topics_allowed, through: :topic_allowed_users, source: :topic
|
2013-09-04 05:19:29 +08:00
|
|
|
has_many :email_tokens, dependent: :destroy
|
|
|
|
has_many :user_visits, dependent: :destroy
|
|
|
|
has_many :invites, dependent: :destroy
|
|
|
|
has_many :topic_links, dependent: :destroy
|
2013-11-23 01:29:07 +08:00
|
|
|
has_many :uploads
|
2014-09-08 23:11:56 +08:00
|
|
|
has_many :warnings
|
2015-12-23 08:09:17 +08:00
|
|
|
has_many :user_archived_messages, dependent: :destroy
|
2016-03-08 03:40:11 +08:00
|
|
|
has_many :email_change_requests, dependent: :destroy
|
2015-12-23 08:09:17 +08:00
|
|
|
|
2013-05-11 04:58:23 +08:00
|
|
|
|
2016-02-17 12:46:19 +08:00
|
|
|
has_one :user_option, dependent: :destroy
|
2014-05-22 15:37:02 +08:00
|
|
|
has_one :user_avatar, dependent: :destroy
|
2013-06-24 22:03:51 +08:00
|
|
|
has_one :facebook_user_info, dependent: :destroy
|
2013-04-12 04:04:20 +08:00
|
|
|
has_one :twitter_user_info, dependent: :destroy
|
|
|
|
has_one :github_user_info, dependent: :destroy
|
2014-09-25 13:50:54 +08:00
|
|
|
has_one :google_user_info, dependent: :destroy
|
2013-08-18 12:43:59 +08:00
|
|
|
has_one :oauth2_user_info, dependent: :destroy
|
2013-09-12 02:50:26 +08:00
|
|
|
has_one :user_stat, dependent: :destroy
|
2014-06-10 13:19:08 +08:00
|
|
|
has_one :user_profile, dependent: :destroy, inverse_of: :user
|
2014-02-25 11:30:49 +08:00
|
|
|
has_one :single_sign_on_record, dependent: :destroy
|
2013-02-06 03:16:51 +08:00
|
|
|
belongs_to :approved_by, class_name: 'User'
|
2014-04-24 10:42:04 +08:00
|
|
|
belongs_to :primary_group, class_name: 'Group'
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-09-04 05:19:29 +08:00
|
|
|
has_many :group_users, dependent: :destroy
|
2013-04-29 14:33:24 +08:00
|
|
|
has_many :groups, through: :group_users
|
|
|
|
has_many :secure_categories, through: :groups, source: :categories
|
|
|
|
|
2015-03-24 08:55:22 +08:00
|
|
|
has_many :muted_user_records, class_name: 'MutedUser'
|
|
|
|
has_many :muted_users, through: :muted_user_records
|
|
|
|
|
2013-09-04 05:19:29 +08:00
|
|
|
has_one :user_search_data, dependent: :destroy
|
2013-10-23 03:53:08 +08:00
|
|
|
has_one :api_key, dependent: :destroy
|
2013-05-23 03:33:33 +08:00
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
belongs_to :uploaded_avatar, class_name: 'Upload'
|
2013-08-14 04:08:29 +08:00
|
|
|
|
2016-12-11 23:36:15 +08:00
|
|
|
has_many :acting_group_histories, dependent: :destroy, foreign_key: :acting_user_id, class_name: GroupHistory
|
|
|
|
has_many :targeted_group_histories, dependent: :destroy, foreign_key: :target_user_id, class_name: GroupHistory
|
|
|
|
|
2013-11-15 23:27:43 +08:00
|
|
|
delegate :last_sent_email_address, :to => :email_logs
|
|
|
|
|
2015-01-30 03:41:41 +08:00
|
|
|
before_validation :strip_downcase_email
|
2014-07-14 22:16:24 +08:00
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
validates_presence_of :username
|
2016-03-29 23:53:07 +08:00
|
|
|
validate :username_validator, if: :username_changed?
|
2013-07-26 01:01:27 +08:00
|
|
|
validates :email, presence: true, uniqueness: true
|
2016-12-21 17:00:45 +08:00
|
|
|
validates :email, format: { with: EmailValidator.email_regex }, if: :email_changed?
|
2016-09-08 02:05:46 +08:00
|
|
|
validates :email, email: true, if: :should_validate_email?
|
2013-02-06 03:16:51 +08:00
|
|
|
validate :password_validator
|
2015-04-03 05:07:56 +08:00
|
|
|
validates :name, user_full_name: true, if: :name_changed?
|
2013-10-22 02:49:51 +08:00
|
|
|
validates :ip_address, allowed_ip_address: {on: :create, message: :signup_not_allowed}
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
after_initialize :add_trust_level
|
2015-08-22 02:39:21 +08:00
|
|
|
|
2013-02-06 10:44:49 +08:00
|
|
|
after_create :create_email_token
|
2013-09-12 02:50:26 +08:00
|
|
|
after_create :create_user_stat
|
2016-02-17 12:46:19 +08:00
|
|
|
after_create :create_user_option
|
2014-05-28 01:54:04 +08:00
|
|
|
after_create :create_user_profile
|
2014-06-17 08:46:30 +08:00
|
|
|
after_create :ensure_in_trust_level_group
|
2015-01-24 01:25:43 +08:00
|
|
|
after_create :automatic_group_membership
|
2015-08-22 02:39:21 +08:00
|
|
|
after_create :set_default_categories_preferences
|
2016-09-13 16:03:17 +08:00
|
|
|
after_create :trigger_user_created_event
|
2014-08-14 04:17:16 +08:00
|
|
|
|
|
|
|
before_save :update_username_lower
|
|
|
|
before_save :ensure_password_is_hashed
|
|
|
|
|
|
|
|
after_save :clear_global_notice_if_needed
|
2014-05-22 15:37:02 +08:00
|
|
|
after_save :refresh_avatar
|
2014-07-23 09:42:24 +08:00
|
|
|
after_save :badge_grant
|
2015-06-06 01:50:06 +08:00
|
|
|
after_save :expire_old_email_tokens
|
2016-12-22 10:13:14 +08:00
|
|
|
after_save :index_search
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-09-04 05:19:29 +08:00
|
|
|
before_destroy do
|
|
|
|
# These tables don't have primary keys, so destroying them with activerecord is tricky:
|
|
|
|
PostTiming.delete_all(user_id: self.id)
|
2014-08-04 17:07:55 +08:00
|
|
|
TopicViewItem.delete_all(user_id: self.id)
|
2013-09-04 05:19:29 +08:00
|
|
|
end
|
|
|
|
|
2016-09-08 02:05:46 +08:00
|
|
|
# Skip validating email, for example from a particular auth provider plugin
|
|
|
|
attr_accessor :skip_email_validation
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
# Whether we need to be sending a system message after creation
|
|
|
|
attr_accessor :send_welcome_message
|
|
|
|
|
|
|
|
# This is just used to pass some information into the serializer
|
|
|
|
attr_accessor :notification_channel_position
|
|
|
|
|
2014-08-14 04:17:16 +08:00
|
|
|
# set to true to optimize creation and save for imports
|
|
|
|
attr_accessor :import_mode
|
|
|
|
|
2015-05-11 07:10:10 +08:00
|
|
|
# excluding fake users like the system user or anonymous users
|
2016-02-03 10:29:51 +08:00
|
|
|
scope :real, -> { where('users.id > 0').where('NOT EXISTS(
|
2015-05-11 07:10:10 +08:00
|
|
|
SELECT 1
|
|
|
|
FROM user_custom_fields ucf
|
|
|
|
WHERE
|
|
|
|
ucf.user_id = users.id AND
|
|
|
|
ucf.name = ? AND
|
|
|
|
ucf.value::int > 0
|
|
|
|
)', 'master_id') }
|
2013-03-29 14:29:58 +08:00
|
|
|
|
2015-04-24 01:33:29 +08:00
|
|
|
scope :staff, -> { where("admin OR moderator") }
|
|
|
|
|
2014-09-04 05:50:19 +08:00
|
|
|
# TODO-PERF: There is no indexes on any of these
|
|
|
|
# and NotifyMailingListSubscribers does a select-all-and-loop
|
2016-02-17 12:46:19 +08:00
|
|
|
# may want to create an index on (active, blocked, suspended_till)?
|
2014-09-04 05:50:19 +08:00
|
|
|
scope :blocked, -> { where(blocked: true) }
|
|
|
|
scope :not_blocked, -> { where(blocked: false) }
|
|
|
|
scope :suspended, -> { where('suspended_till IS NOT NULL AND suspended_till > ?', Time.zone.now) }
|
|
|
|
scope :not_suspended, -> { where('suspended_till IS NULL OR suspended_till <= ?', Time.zone.now) }
|
|
|
|
scope :activated, -> { where(active: true) }
|
|
|
|
|
2013-02-14 14:32:58 +08:00
|
|
|
module NewTopicDuration
|
2013-02-26 00:42:20 +08:00
|
|
|
ALWAYS = -1
|
2013-02-14 14:32:58 +08:00
|
|
|
LAST_VISIT = -2
|
|
|
|
end
|
2014-03-08 01:58:53 +08:00
|
|
|
|
2014-09-12 03:22:11 +08:00
|
|
|
def self.max_password_length
|
|
|
|
200
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def self.username_length
|
2014-07-17 00:25:24 +08:00
|
|
|
SiteSetting.min_username_length.to_i..SiteSetting.max_username_length.to_i
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def self.username_available?(username)
|
|
|
|
lower = username.downcase
|
2016-08-31 21:49:45 +08:00
|
|
|
|
|
|
|
User.where(username_lower: lower).blank? &&
|
|
|
|
!SiteSetting.reserved_usernames.split("|").any? { |reserved| reserved.casecmp(username) == 0 }
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2016-03-12 04:52:18 +08:00
|
|
|
def self.plugin_staff_user_custom_fields
|
|
|
|
@plugin_staff_user_custom_fields ||= {}
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.register_plugin_staff_custom_field(custom_field_name, plugin)
|
|
|
|
plugin_staff_user_custom_fields[custom_field_name] = plugin
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.whitelisted_user_custom_fields(guardian)
|
|
|
|
fields = []
|
|
|
|
|
|
|
|
if SiteSetting.public_user_custom_fields.present?
|
|
|
|
fields += SiteSetting.public_user_custom_fields.split('|')
|
|
|
|
end
|
|
|
|
|
|
|
|
if guardian.is_staff?
|
|
|
|
if SiteSetting.staff_user_custom_fields.present?
|
|
|
|
fields += SiteSetting.staff_user_custom_fields.split('|')
|
|
|
|
end
|
|
|
|
plugin_staff_user_custom_fields.each do |k, v|
|
|
|
|
fields << k if v.enabled?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
fields.uniq
|
|
|
|
end
|
|
|
|
|
2015-02-06 11:38:51 +08:00
|
|
|
def effective_locale
|
|
|
|
if SiteSetting.allow_user_locale && self.locale.present?
|
|
|
|
self.locale
|
|
|
|
else
|
|
|
|
SiteSetting.default_locale
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-04-01 00:51:13 +08:00
|
|
|
EMAIL = %r{([^@]+)@([^\.]+)}
|
|
|
|
|
2013-04-13 06:46:55 +08:00
|
|
|
def self.new_from_params(params)
|
|
|
|
user = User.new
|
|
|
|
user.name = params[:name]
|
|
|
|
user.email = params[:email]
|
|
|
|
user.password = params[:password]
|
|
|
|
user.username = params[:username]
|
|
|
|
user
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def self.suggest_name(email)
|
2015-08-20 17:59:28 +08:00
|
|
|
return "" if email.blank?
|
2016-01-19 07:57:55 +08:00
|
|
|
email[/\A[^@]+/].tr(".", " ").titleize
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-04-29 14:33:24 +08:00
|
|
|
def self.find_by_username_or_email(username_or_email)
|
2013-10-28 13:29:07 +08:00
|
|
|
if username_or_email.include?('@')
|
|
|
|
find_by_email(username_or_email)
|
2013-06-19 08:31:19 +08:00
|
|
|
else
|
2013-10-28 13:29:07 +08:00
|
|
|
find_by_username(username_or_email)
|
2013-06-19 08:31:19 +08:00
|
|
|
end
|
2013-04-29 14:33:24 +08:00
|
|
|
end
|
|
|
|
|
2013-10-24 15:59:58 +08:00
|
|
|
def self.find_by_email(email)
|
2014-05-06 21:41:59 +08:00
|
|
|
find_by(email: Email.downcase(email))
|
2013-10-24 15:59:58 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.find_by_username(username)
|
2014-05-06 21:41:59 +08:00
|
|
|
find_by(username_lower: username.downcase)
|
2013-10-24 15:59:58 +08:00
|
|
|
end
|
|
|
|
|
2013-12-20 02:45:55 +08:00
|
|
|
|
2013-04-29 14:33:24 +08:00
|
|
|
def enqueue_welcome_message(message_type)
|
|
|
|
return unless SiteSetting.send_welcome_message?
|
|
|
|
Jobs.enqueue(:send_system_message, user_id: id, message_type: message_type)
|
|
|
|
end
|
|
|
|
|
2015-01-17 06:30:46 +08:00
|
|
|
def change_username(new_username, actor=nil)
|
2015-03-07 05:44:54 +08:00
|
|
|
UsernameChanger.change(self, new_username, actor)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-09-13 05:46:43 +08:00
|
|
|
def created_topic_count
|
2014-07-29 01:17:37 +08:00
|
|
|
stat = user_stat || create_user_stat
|
|
|
|
stat.topic_count
|
2013-09-13 05:46:43 +08:00
|
|
|
end
|
2013-02-27 00:27:59 +08:00
|
|
|
|
2014-07-29 01:17:37 +08:00
|
|
|
alias_method :topic_count, :created_topic_count
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
# tricky, we need our bus to be subscribed from the right spot
|
|
|
|
def sync_notification_channel_position
|
|
|
|
@unread_notifications_by_type = nil
|
2015-05-04 10:21:00 +08:00
|
|
|
self.notification_channel_position = MessageBus.last_id("/notification/#{id}")
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def invited_by
|
|
|
|
used_invite = invites.where("redeemed_at is not null").includes(:invited_by).first
|
2013-02-28 21:08:56 +08:00
|
|
|
used_invite.try(:invited_by)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2016-09-08 02:05:46 +08:00
|
|
|
def should_validate_email?
|
|
|
|
return !skip_email_validation && !staged? && email_changed?
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
# Approve this user
|
2013-06-27 01:24:30 +08:00
|
|
|
def approve(approved_by, send_mail=true)
|
2013-02-06 03:16:51 +08:00
|
|
|
self.approved = true
|
2013-07-11 09:21:39 +08:00
|
|
|
|
2014-03-27 03:20:41 +08:00
|
|
|
if approved_by.is_a?(Fixnum)
|
2013-07-11 09:21:39 +08:00
|
|
|
self.approved_by_id = approved_by
|
|
|
|
else
|
|
|
|
self.approved_by = approved_by
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
self.approved_at = Time.now
|
2013-06-06 11:16:31 +08:00
|
|
|
|
2016-09-13 16:03:17 +08:00
|
|
|
if result = save
|
|
|
|
send_approval_email if send_mail
|
|
|
|
DiscourseEvent.trigger(:user_approved, self)
|
|
|
|
end
|
|
|
|
|
|
|
|
result
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.email_hash(email)
|
2013-02-06 10:44:49 +08:00
|
|
|
Digest::MD5.hexdigest(email.strip.downcase)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def email_hash
|
2013-02-28 21:08:56 +08:00
|
|
|
User.email_hash(email)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def reload
|
2015-04-17 14:01:20 +08:00
|
|
|
@unread_notifications = nil
|
2014-10-13 18:26:30 +08:00
|
|
|
@unread_total_notifications = nil
|
2013-05-16 14:37:47 +08:00
|
|
|
@unread_pms = nil
|
2013-02-06 03:16:51 +08:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2016-12-13 03:20:25 +08:00
|
|
|
def unread_notifications_of_type(notification_type)
|
|
|
|
# perf critical, much more efficient than AR
|
|
|
|
sql = "
|
|
|
|
SELECT COUNT(*) FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
|
|
|
n.notification_type = :type AND
|
|
|
|
n.user_id = :user_id AND
|
|
|
|
NOT read"
|
|
|
|
|
|
|
|
User.exec_sql(sql, user_id: id, type: notification_type).getvalue(0,0).to_i
|
|
|
|
end
|
2015-04-17 14:01:20 +08:00
|
|
|
|
2016-12-13 03:20:25 +08:00
|
|
|
def unread_private_messages
|
|
|
|
@unread_pms ||= unread_notifications_of_type(Notification.types[:private_message])
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def unread_notifications
|
2015-04-17 14:01:20 +08:00
|
|
|
@unread_notifications ||=
|
|
|
|
begin
|
|
|
|
# perf critical, much more efficient than AR
|
|
|
|
sql = "
|
|
|
|
SELECT COUNT(*) FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
|
|
|
n.notification_type <> :pm AND
|
|
|
|
n.user_id = :user_id AND
|
|
|
|
NOT read AND
|
|
|
|
n.id > :seen_notification_id"
|
|
|
|
|
|
|
|
User.exec_sql(sql, user_id: id,
|
|
|
|
seen_notification_id: seen_notification_id,
|
|
|
|
pm: Notification.types[:private_message])
|
|
|
|
.getvalue(0,0).to_i
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-02-06 10:44:49 +08:00
|
|
|
|
2014-10-13 18:26:30 +08:00
|
|
|
def total_unread_notifications
|
|
|
|
@unread_total_notifications ||= notifications.where("read = false").count
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def saw_notification_id(notification_id)
|
2016-09-16 10:02:19 +08:00
|
|
|
if seen_notification_id.to_i < notification_id.to_i
|
|
|
|
update_columns(seen_notification_id: notification_id.to_i)
|
|
|
|
true
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2016-11-16 16:20:38 +08:00
|
|
|
TRACK_FIRST_NOTIFICATION_READ_DURATION = 1.week.to_i
|
|
|
|
|
2016-11-08 16:12:40 +08:00
|
|
|
def read_first_notification?
|
2016-11-16 16:20:38 +08:00
|
|
|
if (trust_level > TrustLevel[0] ||
|
|
|
|
created_at < TRACK_FIRST_NOTIFICATION_READ_DURATION.seconds.ago)
|
|
|
|
|
|
|
|
return true
|
|
|
|
end
|
|
|
|
|
2016-11-17 09:44:00 +08:00
|
|
|
self.seen_notification_id == 0 ? false : true
|
2016-11-08 16:12:40 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def publish_notifications_state
|
2015-09-04 11:20:33 +08:00
|
|
|
# publish last notification json with the message so we
|
|
|
|
# can apply an update
|
|
|
|
notification = notifications.visible.order('notifications.id desc').first
|
|
|
|
json = NotificationSerializer.new(notification).as_json if notification
|
|
|
|
|
2016-02-15 16:29:35 +08:00
|
|
|
|
|
|
|
sql = "
|
|
|
|
SELECT * FROM (
|
|
|
|
SELECT n.id, n.read FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
|
|
|
n.notification_type = :type AND
|
|
|
|
n.user_id = :user_id AND
|
|
|
|
NOT read
|
|
|
|
ORDER BY n.id DESC
|
|
|
|
LIMIT 20
|
|
|
|
) AS x
|
|
|
|
UNION ALL
|
|
|
|
SELECT * FROM (
|
|
|
|
SELECT n.id, n.read FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
|
|
|
(n.notification_type <> :type OR read) AND
|
|
|
|
n.user_id = :user_id
|
|
|
|
ORDER BY n.id DESC
|
|
|
|
LIMIT 20
|
|
|
|
) AS y
|
|
|
|
"
|
|
|
|
|
|
|
|
recent = User.exec_sql(sql, user_id: id,
|
|
|
|
type: Notification.types[:private_message]).values.map do |id, read|
|
|
|
|
[id.to_i, read == 't'.freeze]
|
|
|
|
end
|
|
|
|
|
2015-05-04 10:21:00 +08:00
|
|
|
MessageBus.publish("/notification/#{id}",
|
2013-06-06 22:40:10 +08:00
|
|
|
{unread_notifications: unread_notifications,
|
2014-10-13 18:26:30 +08:00
|
|
|
unread_private_messages: unread_private_messages,
|
2015-09-04 11:20:33 +08:00
|
|
|
total_unread_notifications: total_unread_notifications,
|
2016-11-08 16:12:40 +08:00
|
|
|
read_first_notification: read_first_notification?,
|
2016-02-15 16:29:35 +08:00
|
|
|
last_notification: json,
|
2016-09-16 10:02:19 +08:00
|
|
|
recent: recent,
|
|
|
|
seen_notification_id: seen_notification_id
|
2015-09-04 11:20:33 +08:00
|
|
|
},
|
2013-06-06 22:40:10 +08:00
|
|
|
user_ids: [id] # only publish the notification to this user
|
|
|
|
)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
# A selection of people to autocomplete on @mention
|
|
|
|
def self.mentionable_usernames
|
2013-02-06 10:44:49 +08:00
|
|
|
User.select(:username).order('last_posted_at desc').limit(20)
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
|
|
|
def password=(password)
|
2013-02-06 10:44:49 +08:00
|
|
|
# special case for passwordless accounts
|
2015-06-06 01:09:02 +08:00
|
|
|
unless password.blank?
|
|
|
|
@raw_password = password
|
|
|
|
self.auth_token = nil
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-12-20 04:12:03 +08:00
|
|
|
def password
|
|
|
|
'' # so that validator doesn't complain that a password attribute doesn't exist
|
|
|
|
end
|
|
|
|
|
2013-02-13 04:42:04 +08:00
|
|
|
# Indicate that this is NOT a passwordless account for the purposes of validation
|
2013-02-28 21:08:56 +08:00
|
|
|
def password_required!
|
2013-02-13 04:42:04 +08:00
|
|
|
@password_required = true
|
|
|
|
end
|
|
|
|
|
2013-12-20 04:12:03 +08:00
|
|
|
def password_required?
|
|
|
|
!!@password_required
|
|
|
|
end
|
|
|
|
|
2014-01-22 01:42:20 +08:00
|
|
|
def has_password?
|
|
|
|
password_hash.present?
|
|
|
|
end
|
|
|
|
|
2013-12-20 04:12:03 +08:00
|
|
|
def password_validator
|
|
|
|
PasswordValidator.new(attributes: :password).validate_each(self, :password, @raw_password)
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def confirm_password?(password)
|
2013-02-28 21:08:56 +08:00
|
|
|
return false unless password_hash && salt
|
|
|
|
self.password_hash == hash_password(password, salt)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-10-12 01:33:23 +08:00
|
|
|
|
2016-06-21 04:38:15 +08:00
|
|
|
def new_user_posting_on_first_day?
|
2015-03-26 13:48:36 +08:00
|
|
|
!staff? &&
|
|
|
|
trust_level < TrustLevel[2] &&
|
2016-06-21 04:38:15 +08:00
|
|
|
(self.first_post_created_at.nil? || self.first_post_created_at >= 24.hours.ago)
|
2015-03-26 13:48:36 +08:00
|
|
|
end
|
|
|
|
|
2013-10-12 01:33:23 +08:00
|
|
|
def new_user?
|
2015-03-26 13:04:32 +08:00
|
|
|
(created_at >= 24.hours.ago || trust_level == TrustLevel[0]) &&
|
|
|
|
trust_level < TrustLevel[2] &&
|
|
|
|
!staff?
|
2013-10-12 01:33:23 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-02-12 13:41:04 +08:00
|
|
|
def seen_before?
|
|
|
|
last_seen_at.present?
|
|
|
|
end
|
|
|
|
|
2015-07-08 00:31:07 +08:00
|
|
|
def create_visit_record!(date, opts={})
|
|
|
|
user_stat.update_column(:days_visited, user_stat.days_visited + 1)
|
|
|
|
user_visits.create!(visited_at: date, posts_read: opts[:posts_read] || 0, mobile: opts[:mobile] || false)
|
|
|
|
end
|
|
|
|
|
2014-01-25 04:19:20 +08:00
|
|
|
def visit_record_for(date)
|
2014-05-06 21:41:59 +08:00
|
|
|
user_visits.find_by(visited_at: date)
|
2013-02-12 13:41:04 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_visit_record!(date)
|
2014-01-25 04:19:20 +08:00
|
|
|
create_visit_record!(date) unless visit_record_for(date)
|
|
|
|
end
|
|
|
|
|
2015-07-08 00:31:07 +08:00
|
|
|
def update_posts_read!(num_posts, opts={})
|
|
|
|
now = opts[:at] || Time.zone.now
|
|
|
|
_retry = opts[:retry] || false
|
|
|
|
|
2014-01-25 04:19:20 +08:00
|
|
|
if user_visit = visit_record_for(now.to_date)
|
|
|
|
user_visit.posts_read += num_posts
|
2015-07-08 00:31:07 +08:00
|
|
|
user_visit.mobile = true if opts[:mobile]
|
2014-01-25 04:19:20 +08:00
|
|
|
user_visit.save
|
|
|
|
user_visit
|
|
|
|
else
|
2015-06-01 09:55:07 +08:00
|
|
|
begin
|
2015-07-08 00:31:07 +08:00
|
|
|
create_visit_record!(now.to_date, posts_read: num_posts, mobile: opts.fetch(:mobile, false))
|
2015-06-01 09:55:07 +08:00
|
|
|
rescue ActiveRecord::RecordNotUnique
|
|
|
|
if !_retry
|
2015-08-24 08:28:38 +08:00
|
|
|
update_posts_read!(num_posts, opts.merge( retry: true ))
|
2015-06-01 09:55:07 +08:00
|
|
|
else
|
|
|
|
raise
|
|
|
|
end
|
|
|
|
end
|
2013-02-12 13:41:04 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-24 18:42:04 +08:00
|
|
|
def update_ip_address!(new_ip_address)
|
2013-03-09 09:24:10 +08:00
|
|
|
unless ip_address == new_ip_address || new_ip_address.blank?
|
2013-02-24 19:56:08 +08:00
|
|
|
update_column(:ip_address, new_ip_address)
|
2013-02-24 18:42:04 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-10-24 05:24:50 +08:00
|
|
|
def update_last_seen!(now=Time.zone.now)
|
|
|
|
now_date = now.to_date
|
2013-02-06 03:16:51 +08:00
|
|
|
# Only update last seen once every minute
|
2013-10-24 05:24:50 +08:00
|
|
|
redis_key = "user:#{id}:#{now_date}"
|
|
|
|
return unless $redis.setnx(redis_key, "1")
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-10-24 05:24:50 +08:00
|
|
|
$redis.expire(redis_key, SiteSetting.active_user_rate_limit_secs)
|
|
|
|
update_previous_visit(now)
|
|
|
|
# using update_column to avoid the AR transaction
|
|
|
|
update_column(:last_seen_at, now)
|
2016-05-21 21:17:54 +08:00
|
|
|
update_column(:first_seen_at, now) unless self.first_seen_at
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-08-14 04:08:29 +08:00
|
|
|
def self.gravatar_template(email)
|
2013-02-06 03:16:51 +08:00
|
|
|
email_hash = self.email_hash(email)
|
2014-04-25 17:40:38 +08:00
|
|
|
"//www.gravatar.com/avatar/#{email_hash}.png?s={size}&r=pg&d=identicon"
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-03-09 04:58:37 +08:00
|
|
|
# Don't pass this up to the client - it's meant for server side use
|
2013-08-14 04:08:29 +08:00
|
|
|
# This is used in
|
|
|
|
# - self oneboxes in open graph data
|
|
|
|
# - emails
|
2013-03-09 04:58:37 +08:00
|
|
|
def small_avatar_url
|
2014-05-22 15:37:02 +08:00
|
|
|
avatar_template_url.gsub("{size}", "45")
|
2013-03-09 04:58:37 +08:00
|
|
|
end
|
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
def avatar_template_url
|
2015-06-12 18:02:36 +08:00
|
|
|
UrlHelper.schemaless UrlHelper.absolute avatar_template
|
2013-09-11 03:18:22 +08:00
|
|
|
end
|
|
|
|
|
2015-06-27 01:37:50 +08:00
|
|
|
def self.default_template(username)
|
|
|
|
if SiteSetting.default_avatars.present?
|
|
|
|
split_avatars = SiteSetting.default_avatars.split("\n")
|
|
|
|
if split_avatars.present?
|
|
|
|
hash = username.each_char.reduce(0) do |result, char|
|
|
|
|
[((result << 5) - result) + char.ord].pack('L').unpack('l').first
|
|
|
|
end
|
|
|
|
|
2015-09-11 11:18:07 +08:00
|
|
|
split_avatars[hash.abs % split_avatars.size]
|
2015-06-27 01:37:50 +08:00
|
|
|
end
|
|
|
|
else
|
2015-09-11 16:14:34 +08:00
|
|
|
system_avatar_template(username)
|
2015-06-27 01:37:50 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-09-11 08:12:40 +08:00
|
|
|
def self.avatar_template(username, uploaded_avatar_id)
|
2014-05-22 15:37:02 +08:00
|
|
|
username ||= ""
|
2015-09-11 21:04:29 +08:00
|
|
|
return default_template(username) if !uploaded_avatar_id
|
2015-05-30 00:51:17 +08:00
|
|
|
hostname = RailsMultisite::ConnectionManagement.current_hostname
|
|
|
|
UserAvatar.local_avatar_template(hostname, username.downcase, uploaded_avatar_id)
|
2014-05-22 15:37:02 +08:00
|
|
|
end
|
|
|
|
|
2015-09-11 16:14:34 +08:00
|
|
|
def self.system_avatar_template(username)
|
|
|
|
# TODO it may be worth caching this in a distributed cache, should be benched
|
|
|
|
if SiteSetting.external_system_avatars_enabled
|
|
|
|
url = SiteSetting.external_system_avatars_url.dup
|
2015-09-14 07:42:21 +08:00
|
|
|
url.gsub! "{color}", letter_avatar_color(username.downcase)
|
2015-09-11 16:14:34 +08:00
|
|
|
url.gsub! "{username}", username
|
|
|
|
url.gsub! "{first_letter}", username[0].downcase
|
2015-10-02 15:27:54 +08:00
|
|
|
url.gsub! "{hostname}", Discourse.current_hostname
|
2015-09-11 16:14:34 +08:00
|
|
|
url
|
2015-09-11 08:12:40 +08:00
|
|
|
else
|
|
|
|
"#{Discourse.base_uri}/letter_avatar/#{username.downcase}/{size}/#{LetterAvatar.version}.png"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.letter_avatar_color(username)
|
2015-09-11 21:04:29 +08:00
|
|
|
username ||= ""
|
2015-09-11 08:12:40 +08:00
|
|
|
color = LetterAvatar::COLORS[Digest::MD5.hexdigest(username)[0...15].to_i(16) % LetterAvatar::COLORS.length]
|
2015-09-11 16:14:34 +08:00
|
|
|
color.map { |c| c.to_s(16).rjust(2, '0') }.join
|
2014-05-30 12:17:35 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def avatar_template
|
2015-09-11 08:12:40 +08:00
|
|
|
self.class.avatar_template(username, uploaded_avatar_id)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
# The following count methods are somewhat slow - definitely don't use them in a loop.
|
2013-03-06 15:52:24 +08:00
|
|
|
# They might need to be denormalized
|
2013-02-06 03:16:51 +08:00
|
|
|
def like_count
|
2013-02-28 21:08:56 +08:00
|
|
|
UserAction.where(user_id: id, action_type: UserAction::WAS_LIKED).count
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2014-08-23 03:23:10 +08:00
|
|
|
def like_given_count
|
|
|
|
UserAction.where(user_id: id, action_type: UserAction::LIKE).count
|
2014-08-23 02:37:00 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def post_count
|
2014-07-29 01:17:37 +08:00
|
|
|
stat = user_stat || create_user_stat
|
|
|
|
stat.post_count
|
2014-02-21 01:29:40 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def flags_given_count
|
2013-03-01 20:07:44 +08:00
|
|
|
PostAction.where(user_id: id, post_action_type_id: PostActionType.flag_types.values).count
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2014-09-08 23:11:56 +08:00
|
|
|
def warnings_received_count
|
|
|
|
warnings.count
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def flags_received_count
|
2013-03-01 20:07:44 +08:00
|
|
|
posts.includes(:post_actions).where('post_actions.post_action_type_id' => PostActionType.flag_types.values).count
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def private_topics_count
|
|
|
|
topics_allowed.where(archetype: Archetype.private_message).count
|
|
|
|
end
|
|
|
|
|
2013-12-20 02:45:55 +08:00
|
|
|
def posted_too_much_in_topic?(topic_id)
|
2016-04-19 04:08:42 +08:00
|
|
|
# Does not apply to staff and non-new members...
|
|
|
|
return false if staff? || (trust_level != TrustLevel[0])
|
|
|
|
# ... your own topics or in private messages
|
|
|
|
topic = Topic.where(id: topic_id).first
|
|
|
|
return false if topic.try(:private_message?) || (topic.try(:user_id) == self.id)
|
2014-01-03 01:57:40 +08:00
|
|
|
|
2014-04-30 00:59:14 +08:00
|
|
|
last_action_in_topic = UserAction.last_action_in_topic(id, topic_id)
|
|
|
|
since_reply = Post.where(user_id: id, topic_id: topic_id)
|
|
|
|
since_reply = since_reply.where('id > ?', last_action_in_topic) if last_action_in_topic
|
|
|
|
|
|
|
|
(since_reply.count >= SiteSetting.newuser_max_replies_per_topic)
|
2013-12-20 02:45:55 +08:00
|
|
|
end
|
|
|
|
|
2013-02-07 15:11:56 +08:00
|
|
|
def delete_all_posts!(guardian)
|
|
|
|
raise Discourse::InvalidAccess unless guardian.can_delete_all_posts? self
|
2013-02-07 23:45:24 +08:00
|
|
|
|
2015-04-25 04:04:44 +08:00
|
|
|
QueuedPost.where(user_id: id).delete_all
|
|
|
|
|
2013-02-07 15:11:56 +08:00
|
|
|
posts.order("post_number desc").each do |p|
|
2013-06-06 04:00:45 +08:00
|
|
|
PostDestroyer.new(guardian.user, p).destroy
|
2013-02-07 15:11:56 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-11-08 02:53:32 +08:00
|
|
|
def suspended?
|
|
|
|
suspended_till && suspended_till > DateTime.now
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-11-08 02:53:32 +08:00
|
|
|
def suspend_record
|
|
|
|
UserHistory.for(self, :suspend_user).order('id DESC').first
|
2013-11-01 22:47:03 +08:00
|
|
|
end
|
|
|
|
|
2013-11-08 02:53:32 +08:00
|
|
|
def suspend_reason
|
|
|
|
suspend_record.try(:details) if suspended?
|
2013-11-01 22:47:03 +08:00
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
# Use this helper to determine if the user has a particular trust level.
|
|
|
|
# Takes into account admin, etc.
|
2013-02-06 10:44:49 +08:00
|
|
|
def has_trust_level?(level)
|
2016-05-30 11:38:04 +08:00
|
|
|
unless TrustLevel.valid?(level)
|
|
|
|
raise InvalidTrustLevel.new("Invalid trust level #{level}")
|
|
|
|
end
|
|
|
|
|
2015-12-08 00:01:08 +08:00
|
|
|
admin? || moderator? || staged? || TrustLevel.compare(trust_level, level)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
|
|
|
|
2013-03-20 07:51:39 +08:00
|
|
|
# a touch faster than automatic
|
2013-04-01 00:51:13 +08:00
|
|
|
def admin?
|
2013-03-20 07:51:39 +08:00
|
|
|
admin
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
def guardian
|
|
|
|
Guardian.new(self)
|
|
|
|
end
|
|
|
|
|
2013-02-08 07:23:41 +08:00
|
|
|
def username_format_validator
|
2013-07-07 19:05:18 +08:00
|
|
|
UsernameValidator.perform_validation(self, 'username')
|
2013-02-08 07:23:41 +08:00
|
|
|
end
|
|
|
|
|
2013-02-12 00:18:26 +08:00
|
|
|
def email_confirmed?
|
2013-02-28 21:08:56 +08:00
|
|
|
email_tokens.where(email: email, confirmed: true).present? || email_tokens.empty?
|
2013-02-12 00:18:26 +08:00
|
|
|
end
|
|
|
|
|
2013-05-08 09:58:34 +08:00
|
|
|
def activate
|
|
|
|
email_token = self.email_tokens.active.first
|
|
|
|
if email_token
|
|
|
|
EmailToken.confirm(email_token.token)
|
|
|
|
else
|
|
|
|
self.active = true
|
|
|
|
save
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def deactivate
|
|
|
|
self.active = false
|
|
|
|
save
|
|
|
|
end
|
|
|
|
|
2014-06-17 08:46:30 +08:00
|
|
|
def change_trust_level!(level, opts=nil)
|
|
|
|
Promotion.new(self).change_trust_level!(level, opts)
|
|
|
|
end
|
|
|
|
|
2013-02-22 02:20:00 +08:00
|
|
|
def readable_name
|
2013-03-07 04:17:07 +08:00
|
|
|
return "#{name} (#{username})" if name.present? && name != username
|
|
|
|
username
|
2013-02-22 02:20:00 +08:00
|
|
|
end
|
|
|
|
|
2014-04-16 18:22:21 +08:00
|
|
|
def badge_count
|
2014-07-16 14:21:46 +08:00
|
|
|
user_badges.select('distinct badge_id').count
|
2014-04-16 18:22:21 +08:00
|
|
|
end
|
|
|
|
|
2016-01-20 12:11:52 +08:00
|
|
|
def featured_user_badges(limit=3)
|
2016-11-15 04:53:24 +08:00
|
|
|
tl_badge_ids = Badge.trust_level_badge_ids
|
|
|
|
|
|
|
|
query = user_badges
|
|
|
|
.group(:badge_id)
|
|
|
|
.select(UserBadge.attribute_names.map { |x| "MAX(user_badges.#{x}) AS #{x}" },
|
|
|
|
'COUNT(*) AS "count"',
|
|
|
|
'MAX(badges.badge_type_id) AS badges_badge_type_id',
|
|
|
|
'MAX(badges.grant_count) AS badges_grant_count')
|
|
|
|
.joins(:badge)
|
|
|
|
.order('badges_badge_type_id ASC, badges_grant_count ASC, badge_id DESC')
|
|
|
|
.includes(:user, :granted_by, { badge: :badge_type }, { post: :topic })
|
|
|
|
|
|
|
|
tl_badge = query.where("user_badges.badge_id IN (:tl_badge_ids)",
|
|
|
|
tl_badge_ids: tl_badge_ids)
|
|
|
|
.limit(1)
|
|
|
|
|
|
|
|
other_badges = query.where("user_badges.badge_id NOT IN (:tl_badge_ids)",
|
|
|
|
tl_badge_ids: tl_badge_ids)
|
|
|
|
.limit(limit)
|
|
|
|
|
|
|
|
(tl_badge + other_badges).take(limit)
|
2014-04-16 18:11:11 +08:00
|
|
|
end
|
|
|
|
|
2016-02-03 10:29:51 +08:00
|
|
|
def self.count_by_signup_date(start_date, end_date, group_id=nil)
|
2016-03-31 05:11:00 +08:00
|
|
|
result = where('users.created_at >= ? AND users.created_at <= ?', start_date, end_date)
|
2016-02-03 10:29:51 +08:00
|
|
|
|
|
|
|
if group_id
|
|
|
|
result = result.joins("INNER JOIN group_users ON group_users.user_id = users.id")
|
|
|
|
result = result.where("group_users.group_id = ?", group_id)
|
|
|
|
end
|
|
|
|
result.group('date(users.created_at)').order('date(users.created_at)').count
|
2013-03-08 00:07:59 +08:00
|
|
|
end
|
|
|
|
|
2013-04-05 13:48:38 +08:00
|
|
|
|
2013-04-29 14:33:24 +08:00
|
|
|
def secure_category_ids
|
2014-02-07 11:11:52 +08:00
|
|
|
cats = self.admin? ? Category.where(read_restricted: true) : secure_categories.references(:categories)
|
2013-09-10 12:29:02 +08:00
|
|
|
cats.pluck('categories.id').sort
|
2013-04-29 14:33:24 +08:00
|
|
|
end
|
|
|
|
|
2013-07-14 09:24:16 +08:00
|
|
|
def topic_create_allowed_category_ids
|
|
|
|
Category.topic_create_allowed(self.id).select(:id)
|
|
|
|
end
|
|
|
|
|
2013-09-13 05:46:43 +08:00
|
|
|
|
2013-05-11 04:58:23 +08:00
|
|
|
# Flag all posts from a user as spam
|
|
|
|
def flag_linked_posts_as_spam
|
2016-04-26 05:03:17 +08:00
|
|
|
disagreed_flag_post_ids = PostAction.where(post_action_type_id: PostActionType.types[:spam])
|
|
|
|
.where.not(disagreed_at: nil)
|
|
|
|
.pluck(:post_id)
|
2015-10-17 03:16:44 +08:00
|
|
|
|
2016-04-26 05:03:17 +08:00
|
|
|
topic_links.includes(:post)
|
|
|
|
.where.not(post_id: disagreed_flag_post_ids)
|
|
|
|
.each do |tl|
|
2013-05-11 04:58:23 +08:00
|
|
|
begin
|
2016-04-26 05:03:17 +08:00
|
|
|
message = I18n.t('flag_reason.spam_hosts', domain: tl.domain)
|
|
|
|
PostAction.act(Discourse.system_user, tl.post, PostActionType.types[:spam], message: message)
|
2013-05-11 04:58:23 +08:00
|
|
|
rescue PostAction::AlreadyActed
|
|
|
|
# If the user has already acted, just ignore it
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2013-05-13 16:04:03 +08:00
|
|
|
|
2013-08-14 04:08:29 +08:00
|
|
|
def has_uploaded_avatar
|
|
|
|
uploaded_avatar.present?
|
|
|
|
end
|
2013-05-24 18:58:26 +08:00
|
|
|
|
2013-10-23 03:53:08 +08:00
|
|
|
def generate_api_key(created_by)
|
|
|
|
if api_key.present?
|
|
|
|
api_key.regenerate!(created_by)
|
|
|
|
api_key
|
|
|
|
else
|
|
|
|
ApiKey.create(user: self, key: SecureRandom.hex(32), created_by: created_by)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def revoke_api_key
|
|
|
|
ApiKey.where(user_id: self.id).delete_all
|
|
|
|
end
|
|
|
|
|
2013-11-15 23:27:43 +08:00
|
|
|
def find_email
|
|
|
|
last_sent_email_address || email
|
|
|
|
end
|
|
|
|
|
2014-09-25 08:19:26 +08:00
|
|
|
def tl3_requirements
|
2014-09-05 13:20:39 +08:00
|
|
|
@lq ||= TrustLevel3Requirements.new(self)
|
2014-01-23 06:09:56 +08:00
|
|
|
end
|
|
|
|
|
2014-09-25 08:19:26 +08:00
|
|
|
def on_tl3_grace_period?
|
2014-09-14 04:55:26 +08:00
|
|
|
UserHistory.for(self, :auto_trust_level_change)
|
|
|
|
.where('created_at >= ?', SiteSetting.tl3_promotion_min_duration.to_i.days.ago)
|
|
|
|
.where(previous_value: TrustLevel[2].to_s)
|
|
|
|
.where(new_value: TrustLevel[3].to_s)
|
|
|
|
.exists?
|
|
|
|
end
|
|
|
|
|
2014-05-06 01:00:40 +08:00
|
|
|
|
2014-05-22 15:37:02 +08:00
|
|
|
def refresh_avatar
|
2014-08-14 04:17:16 +08:00
|
|
|
return if @import_mode
|
|
|
|
|
2014-05-28 14:54:21 +08:00
|
|
|
avatar = user_avatar || create_user_avatar
|
2014-05-22 15:37:02 +08:00
|
|
|
|
2014-05-28 14:54:21 +08:00
|
|
|
if SiteSetting.automatically_download_gravatars? && !avatar.last_gravatar_download_attempt
|
2016-04-18 18:44:09 +08:00
|
|
|
Jobs.cancel_scheduled_job(:update_gravatar, user_id: self.id, avatar_id: avatar.id)
|
|
|
|
Jobs.enqueue_in(1.second, :update_gravatar, user_id: self.id, avatar_id: avatar.id)
|
2014-07-03 15:29:44 +08:00
|
|
|
end
|
2015-03-30 18:31:10 +08:00
|
|
|
|
2015-04-24 17:14:10 +08:00
|
|
|
# mark all the user's quoted posts as "needing a rebake"
|
|
|
|
Post.rebake_all_quoted_posts(self.id) if self.uploaded_avatar_id_changed?
|
2014-07-03 15:29:44 +08:00
|
|
|
end
|
|
|
|
|
2014-07-29 01:17:37 +08:00
|
|
|
def first_post_created_at
|
|
|
|
user_stat.try(:first_post_created_at)
|
|
|
|
end
|
|
|
|
|
2014-09-25 13:50:54 +08:00
|
|
|
def associated_accounts
|
|
|
|
result = []
|
|
|
|
|
2016-07-18 15:02:41 +08:00
|
|
|
result << "Twitter(#{twitter_user_info.screen_name})" if twitter_user_info
|
|
|
|
result << "Facebook(#{facebook_user_info.username})" if facebook_user_info
|
|
|
|
result << "Google(#{google_user_info.email})" if google_user_info
|
|
|
|
result << "Github(#{github_user_info.screen_name})" if github_user_info
|
|
|
|
result << "#{oauth2_user_info.provider}(#{oauth2_user_info.email})" if oauth2_user_info
|
2014-09-25 13:50:54 +08:00
|
|
|
|
|
|
|
user_open_ids.each do |oid|
|
|
|
|
result << "OpenID #{oid.url[0..20]}...(#{oid.email})"
|
|
|
|
end
|
|
|
|
|
|
|
|
result.empty? ? I18n.t("user.no_accounts_associated") : result.join(", ")
|
|
|
|
end
|
|
|
|
|
2014-09-27 02:48:34 +08:00
|
|
|
def user_fields
|
|
|
|
return @user_fields if @user_fields
|
|
|
|
user_field_ids = UserField.pluck(:id)
|
|
|
|
if user_field_ids.present?
|
|
|
|
@user_fields = {}
|
|
|
|
user_field_ids.each do |fid|
|
|
|
|
@user_fields[fid.to_s] = custom_fields["user_field_#{fid}"]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
@user_fields
|
|
|
|
end
|
|
|
|
|
2014-10-08 07:26:18 +08:00
|
|
|
def title=(val)
|
|
|
|
write_attribute(:title, val)
|
|
|
|
if !new_record? && user_profile
|
|
|
|
user_profile.update_column(:badge_granted_title, false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-02-20 01:11:07 +08:00
|
|
|
def number_of_deleted_posts
|
|
|
|
Post.with_deleted
|
|
|
|
.where(user_id: self.id)
|
|
|
|
.where.not(deleted_at: nil)
|
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_flagged_posts
|
|
|
|
Post.with_deleted
|
|
|
|
.where(user_id: self.id)
|
|
|
|
.where(id: PostAction.where(post_action_type_id: PostActionType.notify_flag_type_ids)
|
|
|
|
.where(disagreed_at: nil)
|
|
|
|
.select(:post_id))
|
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_flags_given
|
|
|
|
PostAction.where(user_id: self.id)
|
|
|
|
.where(disagreed_at: nil)
|
|
|
|
.where(post_action_type_id: PostActionType.notify_flag_type_ids)
|
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_warnings
|
|
|
|
self.warnings.count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_suspensions
|
|
|
|
UserHistory.for(self, :suspend_user).count
|
|
|
|
end
|
|
|
|
|
2015-03-07 05:44:54 +08:00
|
|
|
def create_user_profile
|
|
|
|
UserProfile.create(user_id: id)
|
|
|
|
end
|
|
|
|
|
2015-04-08 10:29:43 +08:00
|
|
|
def anonymous?
|
|
|
|
SiteSetting.allow_anonymous_posting &&
|
|
|
|
trust_level >= 1 &&
|
|
|
|
custom_fields["master_id"].to_i > 0
|
|
|
|
end
|
|
|
|
|
2016-04-27 01:08:19 +08:00
|
|
|
def is_singular_admin?
|
|
|
|
User.where(admin: true).where.not(id: id).where.not(id: Discourse::SYSTEM_USER_ID).blank?
|
|
|
|
end
|
|
|
|
|
2016-07-04 17:20:30 +08:00
|
|
|
def logged_out
|
|
|
|
MessageBus.publish "/logout", self.id, user_ids: [self.id]
|
|
|
|
DiscourseEvent.trigger(:user_logged_out, self)
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
protected
|
|
|
|
|
2014-07-23 09:42:24 +08:00
|
|
|
def badge_grant
|
|
|
|
BadgeGranter.queue_badge_grant(Badge::Trigger::UserChange, user: self)
|
|
|
|
end
|
|
|
|
|
2015-06-06 01:50:06 +08:00
|
|
|
def expire_old_email_tokens
|
|
|
|
if password_hash_changed? && !id_changed?
|
|
|
|
email_tokens.where('not expired').update_all(expired: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-22 10:13:14 +08:00
|
|
|
def index_search
|
|
|
|
SearchIndexer.index(self)
|
|
|
|
end
|
|
|
|
|
2014-03-24 15:03:39 +08:00
|
|
|
def clear_global_notice_if_needed
|
|
|
|
if admin && SiteSetting.has_login_hint
|
|
|
|
SiteSetting.has_login_hint = false
|
|
|
|
SiteSetting.global_notice = ""
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-17 08:46:30 +08:00
|
|
|
def ensure_in_trust_level_group
|
|
|
|
Group.user_trust_level_change!(id, trust_level)
|
|
|
|
end
|
|
|
|
|
2015-01-24 01:25:43 +08:00
|
|
|
def automatic_group_membership
|
2016-12-29 06:36:02 +08:00
|
|
|
Group.grants_by_email_domain.each do |group|
|
2015-01-24 01:25:43 +08:00
|
|
|
domains = group.automatic_membership_email_domains.gsub('.', '\.')
|
2016-12-11 23:36:15 +08:00
|
|
|
if self.email =~ Regexp.new("@(#{domains})$", true) && !group.users.include?(self)
|
|
|
|
group.add(self)
|
|
|
|
GroupActionLogger.new(Discourse.system_user, group).log_add_user_to_group(self)
|
2015-01-24 01:25:43 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-29 06:36:02 +08:00
|
|
|
def automatic_group_from_email
|
|
|
|
Group.grants_by_email_domain.each do |group|
|
|
|
|
domains = group.automatic_membership_email_domains.gsub('.', '\.')
|
|
|
|
return group if self.email =~ Regexp.new("@(#{domains})$", true)
|
|
|
|
end
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
2013-09-12 02:50:26 +08:00
|
|
|
def create_user_stat
|
2014-03-04 03:31:29 +08:00
|
|
|
stat = UserStat.new(new_since: Time.now)
|
2013-10-04 11:28:49 +08:00
|
|
|
stat.user_id = id
|
2013-09-12 02:50:26 +08:00
|
|
|
stat.save!
|
|
|
|
end
|
|
|
|
|
2016-02-17 12:46:19 +08:00
|
|
|
def create_user_option
|
|
|
|
UserOption.create(user_id: id)
|
|
|
|
end
|
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def create_email_token
|
|
|
|
email_tokens.create(email: email)
|
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def ensure_password_is_hashed
|
|
|
|
if @raw_password
|
|
|
|
self.salt = SecureRandom.hex(16)
|
|
|
|
self.password_hash = hash_password(@raw_password, salt)
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-06-06 22:40:10 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def hash_password(password, salt)
|
2016-05-30 11:38:04 +08:00
|
|
|
raise StandardError.new("password is too long") if password.size > User.max_password_length
|
2013-07-23 09:36:01 +08:00
|
|
|
Pbkdf2.hash_password(password, salt, Rails.configuration.pbkdf2_iterations, Rails.configuration.pbkdf2_algorithm)
|
2013-06-06 22:40:10 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def add_trust_level
|
2013-12-21 15:19:22 +08:00
|
|
|
# there is a possibility we did not load trust level column, skip it
|
2013-06-06 22:40:10 +08:00
|
|
|
return unless has_attribute? :trust_level
|
2016-12-29 06:36:02 +08:00
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
self.trust_level ||= SiteSetting.default_trust_level
|
2016-12-29 06:36:02 +08:00
|
|
|
|
|
|
|
group_from_email = automatic_group_from_email
|
|
|
|
if group_from_email&.grant_trust_level &&
|
|
|
|
group_from_email.grant_trust_level > self.trust_level
|
|
|
|
self.trust_level = group_from_email.grant_trust_level
|
|
|
|
self.trust_level_locked = true
|
|
|
|
end
|
2013-06-06 22:40:10 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def update_username_lower
|
|
|
|
self.username_lower = username.downcase
|
|
|
|
end
|
2013-02-06 10:44:49 +08:00
|
|
|
|
2015-01-30 03:41:41 +08:00
|
|
|
def strip_downcase_email
|
|
|
|
if self.email
|
|
|
|
self.email = self.email.strip
|
|
|
|
self.email = self.email.downcase
|
|
|
|
end
|
2014-07-14 22:16:24 +08:00
|
|
|
end
|
|
|
|
|
2013-06-06 22:40:10 +08:00
|
|
|
def username_validator
|
|
|
|
username_format_validator || begin
|
|
|
|
lower = username.downcase
|
2014-05-06 21:41:59 +08:00
|
|
|
existing = User.find_by(username_lower: lower)
|
2013-06-29 04:21:46 +08:00
|
|
|
if username_changed? && existing && existing.id != self.id
|
2013-06-06 22:40:10 +08:00
|
|
|
errors.add(:username, I18n.t(:'user.username.unique'))
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-02-08 07:23:41 +08:00
|
|
|
end
|
2013-06-06 22:40:10 +08:00
|
|
|
end
|
2013-02-06 03:16:51 +08:00
|
|
|
|
2013-08-14 04:08:29 +08:00
|
|
|
def send_approval_email
|
2015-05-05 03:30:25 +08:00
|
|
|
if SiteSetting.must_approve_users
|
2016-04-07 12:38:43 +08:00
|
|
|
Jobs.enqueue(:critical_user_email,
|
2015-05-05 03:30:25 +08:00
|
|
|
type: :signup_after_approval,
|
|
|
|
user_id: id,
|
|
|
|
email_token: email_tokens.first.token
|
|
|
|
)
|
|
|
|
end
|
2013-08-14 04:08:29 +08:00
|
|
|
end
|
2013-07-07 18:40:35 +08:00
|
|
|
|
2015-08-22 02:39:21 +08:00
|
|
|
def set_default_categories_preferences
|
2016-06-14 22:45:47 +08:00
|
|
|
return if self.staged?
|
|
|
|
|
2015-08-22 02:39:21 +08:00
|
|
|
values = []
|
|
|
|
|
2016-11-10 02:37:54 +08:00
|
|
|
%w{watching watching_first_post tracking muted}.each do |s|
|
2015-08-22 02:39:21 +08:00
|
|
|
category_ids = SiteSetting.send("default_categories_#{s}").split("|")
|
|
|
|
category_ids.each do |category_id|
|
|
|
|
values << "(#{self.id}, #{category_id}, #{CategoryUser.notification_levels[s.to_sym]})"
|
2013-08-24 05:35:01 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-08-22 02:39:21 +08:00
|
|
|
if values.present?
|
|
|
|
exec_sql("INSERT INTO category_users (user_id, category_id, notification_level) VALUES #{values.join(",")}")
|
2014-01-03 04:27:26 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-12-03 13:36:25 +08:00
|
|
|
# Delete unactivated accounts (without verified email) that are over a week old
|
|
|
|
def self.purge_unactivated
|
2014-08-14 02:13:41 +08:00
|
|
|
to_destroy = User.where(active: false)
|
|
|
|
.joins('INNER JOIN user_stats AS us ON us.user_id = users.id')
|
2014-12-03 13:36:25 +08:00
|
|
|
.where("created_at < ?", SiteSetting.purge_unactivated_users_grace_period_days.days.ago)
|
2014-08-20 01:46:40 +08:00
|
|
|
.where('NOT admin AND NOT moderator')
|
2016-07-27 18:28:56 +08:00
|
|
|
.limit(200)
|
2014-08-14 02:13:41 +08:00
|
|
|
|
|
|
|
destroyer = UserDestroyer.new(Discourse.system_user)
|
|
|
|
to_destroy.each do |u|
|
2014-08-20 01:46:40 +08:00
|
|
|
begin
|
2014-08-28 04:04:46 +08:00
|
|
|
destroyer.destroy(u, context: I18n.t(:purge_reason))
|
2015-05-04 23:37:49 +08:00
|
|
|
rescue Discourse::InvalidAccess, UserDestroyer::PostsExistError
|
2014-08-20 01:46:40 +08:00
|
|
|
# if for some reason the user can't be deleted, continue on to the next one
|
|
|
|
end
|
2014-08-14 02:13:41 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-09-13 16:03:17 +08:00
|
|
|
def trigger_user_created_event
|
|
|
|
DiscourseEvent.trigger(:user_created, self)
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2013-07-07 18:40:35 +08:00
|
|
|
private
|
|
|
|
|
2013-10-24 05:24:50 +08:00
|
|
|
def previous_visit_at_update_required?(timestamp)
|
2014-01-17 11:38:08 +08:00
|
|
|
seen_before? && (last_seen_at < (timestamp - SiteSetting.previous_visit_timeout_hours.hours))
|
2013-10-24 05:24:50 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_previous_visit(timestamp)
|
|
|
|
update_visit_record!(timestamp.to_date)
|
|
|
|
if previous_visit_at_update_required?(timestamp)
|
|
|
|
update_column(:previous_visit_at, last_seen_at)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-06 03:16:51 +08:00
|
|
|
end
|
2013-05-24 10:48:32 +08:00
|
|
|
|
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: users
|
|
|
|
#
|
2016-02-23 07:33:53 +08:00
|
|
|
# id :integer not null, primary key
|
|
|
|
# username :string(60) not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# name :string
|
|
|
|
# seen_notification_id :integer default(0), not null
|
|
|
|
# last_posted_at :datetime
|
|
|
|
# email :string(513) not null
|
|
|
|
# password_hash :string(64)
|
|
|
|
# salt :string(32)
|
|
|
|
# active :boolean default(FALSE), not null
|
|
|
|
# username_lower :string(60) not null
|
|
|
|
# auth_token :string(32)
|
|
|
|
# last_seen_at :datetime
|
|
|
|
# admin :boolean default(FALSE), not null
|
|
|
|
# last_emailed_at :datetime
|
|
|
|
# trust_level :integer not null
|
|
|
|
# approved :boolean default(FALSE), not null
|
|
|
|
# approved_by_id :integer
|
|
|
|
# approved_at :datetime
|
|
|
|
# previous_visit_at :datetime
|
|
|
|
# suspended_at :datetime
|
|
|
|
# suspended_till :datetime
|
|
|
|
# date_of_birth :date
|
|
|
|
# views :integer default(0), not null
|
|
|
|
# flag_level :integer default(0), not null
|
|
|
|
# ip_address :inet
|
|
|
|
# moderator :boolean default(FALSE)
|
|
|
|
# blocked :boolean default(FALSE)
|
|
|
|
# title :string
|
|
|
|
# uploaded_avatar_id :integer
|
|
|
|
# locale :string(10)
|
|
|
|
# primary_group_id :integer
|
|
|
|
# registration_ip_address :inet
|
|
|
|
# trust_level_locked :boolean default(FALSE), not null
|
|
|
|
# staged :boolean default(FALSE), not null
|
2016-05-30 08:45:32 +08:00
|
|
|
# first_seen_at :datetime
|
2016-07-25 10:07:31 +08:00
|
|
|
# auth_token_updated_at :datetime
|
2013-05-24 10:48:32 +08:00
|
|
|
#
|
|
|
|
# Indexes
|
|
|
|
#
|
2016-11-24 10:13:03 +08:00
|
|
|
# idx_users_admin (id)
|
|
|
|
# idx_users_moderator (id)
|
|
|
|
# index_users_on_auth_token (auth_token)
|
|
|
|
# index_users_on_last_posted_at (last_posted_at)
|
|
|
|
# index_users_on_last_seen_at (last_seen_at)
|
|
|
|
# index_users_on_uploaded_avatar_id (uploaded_avatar_id)
|
|
|
|
# index_users_on_username (username) UNIQUE
|
|
|
|
# index_users_on_username_lower (username_lower) UNIQUE
|
2013-05-24 10:48:32 +08:00
|
|
|
#
|