1 # frozen_string_literal: true
3 # == Schema Information
7 # email :string not null
8 # id :bigint not null, primary key
9 # pass_crypt :string not null
10 # creation_time :datetime not null
11 # display_name :string default(""), not null
12 # data_public :boolean default(FALSE), not null
13 # description :text default(""), not null
16 # home_zoom :integer default(3)
18 # email_valid :boolean default(FALSE), not null
21 # status :enum default("pending"), not null
22 # terms_agreed :datetime
23 # consider_pd :boolean default(FALSE), not null
25 # preferred_editor :string
26 # terms_seen :boolean default(FALSE), not null
27 # description_format :enum default("markdown"), not null
28 # changesets_count :integer default(0), not null
29 # traces_count :integer default(0), not null
30 # diary_entries_count :integer default(0), not null
31 # image_use_gravatar :boolean default(FALSE), not null
32 # auth_provider :string
34 # tou_agreed :datetime
35 # diary_comments_count :integer default(0)
36 # note_comments_count :integer default(0)
37 # creation_address :inet
38 # home_location_name :string
40 # public_heatmap :boolean default(TRUE), not null
44 # index_users_on_creation_address (creation_address) USING gist
45 # users_auth_idx (auth_provider,auth_uid) UNIQUE
46 # users_display_name_canonical_idx (lower(NORMALIZE(display_name, NFKC)))
47 # users_display_name_idx (display_name) UNIQUE
48 # users_email_idx (email) UNIQUE
49 # users_email_lower_idx (lower((email)::text))
50 # users_home_idx (home_tile)
53 class User < ApplicationRecord
56 has_many :traces, -> { where(:visible => true) }
57 has_many :diary_entries, -> { order(:created_at => :desc) }, :inverse_of => :user
58 has_many :diary_comments, -> { order(:created_at => :desc) }, :inverse_of => :user
59 has_many :diary_entry_subscriptions, :class_name => "DiaryEntrySubscription"
60 has_many :diary_subscriptions, :through => :diary_entry_subscriptions, :source => :diary_entry
61 has_many :messages, -> { where(:to_user_visible => true, :muted => false).order(:sent_on => :desc).preload(:sender, :recipient) }, :foreign_key => :to_user_id
62 has_many :new_messages, -> { where(:to_user_visible => true, :muted => false, :message_read => false).order(:sent_on => :desc) }, :class_name => "Message", :foreign_key => :to_user_id
63 has_many :sent_messages, -> { where(:from_user_visible => true).order(:sent_on => :desc).preload(:sender, :recipient) }, :class_name => "Message", :foreign_key => :from_user_id
64 has_many :muted_messages, -> { where(:to_user_visible => true, :muted => true).order(:sent_on => :desc).preload(:sender, :recipient) }, :class_name => "Message", :foreign_key => :to_user_id
65 has_many :follows, -> { joins(:following).where(:users => { :status => %w[active confirmed] }) }
66 has_many :followings, :through => :follows, :source => :following
67 has_many :preferences, :class_name => "UserPreference"
68 has_many :changesets, -> { order(:created_at => :desc) }, :inverse_of => :user
69 has_many :changeset_comments, :foreign_key => :author_id, :inverse_of => :author
70 has_many :changeset_subscriptions, :foreign_key => :subscriber_id
71 has_many :note_comments, :foreign_key => :author_id, :inverse_of => :author
72 has_many :notes, :through => :note_comments
73 has_many :note_subscriptions, :class_name => "NoteSubscription"
74 has_many :subscribed_notes, :through => :note_subscriptions, :source => :note
76 has_many :oauth2_applications, :class_name => Doorkeeper.config.application_model.name, :as => :owner
77 has_many :access_grants, :class_name => Doorkeeper.config.access_grant_model.name, :foreign_key => :resource_owner_id
78 has_many :access_tokens, :class_name => Doorkeeper.config.access_token_model.name, :foreign_key => :resource_owner_id
80 has_many :blocks, :class_name => "UserBlock"
81 has_many :blocks_created, :class_name => "UserBlock", :foreign_key => :creator_id, :inverse_of => :creator
82 has_many :blocks_revoked, :class_name => "UserBlock", :foreign_key => :revoker_id, :inverse_of => :revoker
84 has_many :mutes, -> { order(:created_at => :desc) }, :class_name => "UserMute", :foreign_key => :owner_id, :inverse_of => :owner
85 has_many :muted_users, :through => :mutes, :source => :subject
87 has_many :roles, :class_name => "UserRole"
89 has_many :issues, :class_name => "Issue", :foreign_key => :reported_user_id, :inverse_of => :reported_user
90 has_many :issue_comments
94 has_many :social_links
95 accepts_nested_attributes_for :social_links, :allow_destroy => true
97 scope :visible, -> { where(:status => %w[pending active confirmed]) }
98 scope :active, -> { where(:status => %w[active confirmed]) }
99 scope :identifiable, -> { where(:data_public => true) }
101 has_one_attached :avatar, :service => Settings.avatar_storage
103 validates :display_name, :presence => true, :length => 3..255,
104 :exclusion => %w[new terms save confirm confirm-email go_public reset-password forgot-password suspended]
105 validates :display_name, :if => proc { |u| u.display_name_changed? },
106 :normalized_uniqueness => { :case_sensitive => false }
107 validates :display_name, :if => proc { |u| u.display_name_changed? },
108 :characters => { :url_safe => true },
109 :whitespace => { :leading => false, :trailing => false },
110 :width => { :minimum => 3 }
111 validate :display_name_cannot_be_user_id_with_other_id, :if => proc { |u| u.display_name_changed? }
112 validates :email, :presence => true, :characters => true
113 validates :email, :if => proc { |u| u.email_changed? },
114 :uniqueness => { :case_sensitive => false }
115 validates :email, :if => proc { |u| u.email_changed? },
116 :whitespace => { :leading => false, :trailing => false }
117 validates :pass_crypt, :confirmation => true, :length => 8..255
118 validates :home_lat, :allow_nil => true, :numericality => true, :inclusion => { :in => -90..90 }
119 validates :home_lon, :allow_nil => true, :numericality => true, :inclusion => { :in => -180..180 }
120 validates :home_zoom, :allow_nil => true, :numericality => { :only_integer => true }
121 validates :preferred_editor, :inclusion => Editors::ALL_EDITORS, :allow_nil => true
122 validates :auth_uid, :unless => proc { |u| u.auth_provider.nil? },
123 :uniqueness => { :scope => :auth_provider }
124 validates :avatar, :if => proc { |u| u.attachment_changes["avatar"] },
126 validates :description, :length => 0..65536
128 validates_email_format_of :email, :if => proc { |u| u.email_changed? }
129 validates_email_format_of :new_email, :allow_blank => true, :if => proc { |u| u.new_email_changed? }
131 alias_attribute :created_at, :creation_time
133 before_save :encrypt_password
134 before_save :update_tile
135 after_save :spam_check
137 generates_token_for :new_user, :expires_in => 1.week do
141 generates_token_for :new_email, :expires_in => 1.week do
145 generates_token_for :password_reset, :expires_in => 1.week do
149 def display_name_cannot_be_user_id_with_other_id
150 display_name&.match(/^user_(\d+)$/i) do |m|
151 errors.add :display_name, I18n.t("activerecord.errors.messages.display_name_is_user_n") unless m[1].to_i == id
159 def self.lookup(username)
160 user = find_by("email = ? OR display_name = ?", username.strip, username)
163 users = where("LOWER(email) = LOWER(?) OR LOWER(NORMALIZE(display_name, NFKC)) = LOWER(NORMALIZE(?, NFKC))", username.strip, username)
165 user = users.first if users.one?
168 user if user && user.status != "deleted"
171 def password_expired?
172 !PasswordHash.valid?(pass_crypt, pass_salt)
175 def password_matches?(password)
176 if PasswordHash.check(pass_crypt, pass_salt, password)
177 if PasswordHash.upgrade?(pass_crypt, pass_salt)
178 self.pass_crypt, self.pass_salt = PasswordHash.create(password)
188 aasm :column => :status, :no_direct_assignment => true do
189 state :pending, :initial => true
195 # A normal account is active
197 transitions :from => :pending, :to => :active
200 # Used in test suite, not something that we would normally need to do.
203 transitions :from => :active, :to => :pending
207 # To confirm an account is used to override the spam scoring
209 transitions :from => [:pending, :active, :suspended], :to => :confirmed
212 # To unconfirm an account is to make it subject to future spam scoring again
214 transitions :from => :confirmed, :to => :active
217 # Accounts can be automatically suspended by spam_check
223 transitions :from => [:pending, :active, :confirmed], :to => :suspended
226 # Unsuspending an account moves it back to active without overriding the spam scoring
228 transitions :from => :suspended, :to => :active
231 # Mark the account as deleted but keep all data intact
232 # Only to be used in tests. There's currently no production
233 # use for this transition.
234 event :mark_deleted do
239 transitions :from => [:pending, :active, :confirmed, :suspended], :to => :deleted
243 transitions :from => [:deleted], :to => :active
246 # Mark the account as deleted and remove personal data
247 event :soft_destroy do
250 revoke_authentication_tokens
254 transitions :from => [:pending, :active, :confirmed, :suspended], :to => :deleted
259 RichText.new(self[:description_format], self[:description])
263 attribute_present?(:languages) ? self[:languages].split(/ *[, ] */) : []
266 def languages=(languages)
267 self[:languages] = languages.join(",")
270 def preferred_languages
271 @preferred_languages ||= Locale.list(languages)
274 def preferred_color_scheme(*priority_list)
275 color_preferences = preferences.color_schemes.where.not(:v => "auto").pluck(:k, :v).to_h
276 priority_list.each do |target|
277 scheme = color_preferences["#{target}.color_scheme"]
278 return scheme unless scheme.nil?
283 def default_diary_language
284 diary_language_preference = preferences.find_by(:k => "diary.default_language")
285 if diary_language_preference
286 diary_language_preference.v
288 languages.find { |l| Language.exists?(:code => l) }
292 def default_diary_language=(language)
293 preference = preferences.find_or_create_by(:k => "diary.default_language")
294 preference.update!(:v => language)
297 def notification_preferences
298 @notification_preferences ||= UserNotificationPreferences.new(self)
305 def nearby(radius = Settings.nearby_radius, num = Settings.nearby_users)
307 gc = OSM::GreatCircle.new(home_lat, home_lon)
308 sql_for_area = QuadTile.sql_for_area(gc.bounds(radius), "home_")
309 sql_for_distance = gc.sql_for_distance("home_lat", "home_lon")
310 nearby = User.active.identifiable
311 .where.not(:id => id)
313 .where("#{sql_for_distance} <= ?", radius)
314 .order(Arel.sql(sql_for_distance))
322 def distance(nearby_user)
323 OSM::GreatCircle.new(home_lat, home_lon).distance(nearby_user.home_lat, nearby_user.home_lon)
327 follows.exists?(:following => user)
331 # returns true if a user is visible
333 %w[pending active confirmed].include? status
337 # returns true if a user is active
339 %w[active confirmed].include? status
343 # returns true if the user has the moderator role, false otherwise
349 # returns true if the user has the administrator role, false otherwise
351 role? "administrator"
355 # returns true if the user has the importer role, false otherwise
361 # returns true if the user has the requested role
363 roles.any? { |r| r.role == role }
367 # returns the first active block which would require users to view
368 # a message, or nil if there are none.
370 blocks.active.detect(&:needs_view?)
374 # close any open issues
375 def close_open_issues
376 issues.with_status(:open).each(&:resolve!)
380 # revoke any authentication tokens
381 def revoke_authentication_tokens
382 access_tokens.not_expired.each(&:revoke)
386 # remove personal data - leave the account but purge most personal data
387 def remove_personal_data
390 self.display_name = "user_#{id}"
391 self.description = ""
394 self.email_valid = false
396 self.auth_provider = nil
403 # return a spam score for a user
405 SpamScorer.new_from_user(self).score
409 # perform a spam check on a user
411 suspend! if !confirmed? && may_suspend? && spam_score > Settings.spam_threshold
415 # suspend the user only if allowed by aasm rules
416 def suspend_if_possible!
417 suspend! if may_suspend?
421 # return an oauth 2 access token for a specified application
422 def oauth_token(application_id)
423 application = Doorkeeper.config.application_model.find_by(:uid => application_id)
425 Doorkeeper.config.access_token_model.find_or_create_for(
426 :application => application,
427 :resource_owner => self,
428 :scopes => application.scopes
433 digest = Digest::SHA256.new
435 digest.update(pass_crypt)
443 .where("reports.updated_at >= COALESCE(issues.resolved_at, '1970-01-01')")
447 def max_messages_per_hour
448 account_age_in_seconds = Time.now.utc - created_at
449 account_age_in_hours = account_age_in_seconds / 3600
450 recent_messages = messages.where(:sent_on => (Time.now.utc - 3600)..).count
451 max_messages = account_age_in_hours.ceil + recent_messages - (active_reports * 10)
452 max_messages.clamp(0, Settings.max_messages_per_hour)
455 def max_follows_per_hour
456 account_age_in_seconds = Time.now.utc - created_at
457 account_age_in_hours = account_age_in_seconds / 3600
458 recent_follows = Follow.where(:following => self).where(:created_at => (Time.now.utc - 3600)..).count
459 max_follows = account_age_in_hours.ceil + recent_follows - (active_reports * 10)
460 max_follows.clamp(0, Settings.max_follows_per_hour)
463 def max_changeset_comments_per_hour
465 Settings.moderator_changeset_comments_per_hour
467 previous_comments = changeset_comments.limit(Settings.comments_to_max_changeset_comments).count
468 max_comments = previous_comments / Settings.comments_to_max_changeset_comments.to_f * Settings.max_changeset_comments_per_hour
469 max_comments = max_comments.floor.clamp(Settings.initial_changeset_comments_per_hour, Settings.max_changeset_comments_per_hour)
470 max_comments /= 2**active_reports
471 max_comments.floor.clamp(Settings.min_changeset_comments_per_hour, Settings.max_changeset_comments_per_hour)
475 def deletion_allowed_at
476 unless Settings.user_account_deletion_delay.nil?
477 last_changeset = changesets.reorder(:closed_at => :desc).first
478 return last_changeset.closed_at.utc + Settings.user_account_deletion_delay.hours if last_changeset
483 def deletion_allowed?
484 deletion_allowed_at <= Time.now.utc
488 # check if this user has a gravatar and set the user pref is true
490 # code from example https://en.gravatar.com/site/implement/images/ruby/
491 return false if avatar.attached?
494 hash = Digest::MD5.hexdigest(email.downcase)
495 url = "https://www.gravatar.com/avatar/#{hash}?d=404" # without d=404 we will always get an image back
496 response = OSM.http_client.get(URI.parse(url))
497 available = response.success?
502 oldsetting = image_use_gravatar
503 self.image_use_gravatar = available
504 oldsetting != image_use_gravatar
510 if pass_crypt_confirmation
511 self.pass_crypt, self.pass_salt = PasswordHash.create(pass_crypt)
512 self.pass_crypt_confirmation = nil
517 self.home_tile = QuadTile.tile_for_point(home_lat, home_lon) if home_location?