2019-05-02 18:17:27 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2019-10-02 00:01:53 -04:00
|
|
|
require 'guardian/category_guardian'
|
|
|
|
require 'guardian/ensure_magic'
|
|
|
|
require 'guardian/post_guardian'
|
2020-02-13 01:26:02 -05:00
|
|
|
require 'guardian/bookmark_guardian'
|
2019-10-02 00:01:53 -04:00
|
|
|
require 'guardian/topic_guardian'
|
|
|
|
require 'guardian/user_guardian'
|
|
|
|
require 'guardian/post_revision_guardian'
|
|
|
|
require 'guardian/group_guardian'
|
|
|
|
require 'guardian/tag_guardian'
|
2014-02-13 11:42:35 -05:00
|
|
|
|
2013-02-06 14:46:45 -05:00
|
|
|
# The guardian is responsible for confirming access to various site resources and operations
|
2013-02-05 14:16:51 -05:00
|
|
|
class Guardian
|
2014-01-09 18:25:14 -05:00
|
|
|
include EnsureMagic
|
|
|
|
include CategoryGuardian
|
2014-05-12 10:30:10 -04:00
|
|
|
include PostGuardian
|
2020-02-13 01:26:02 -05:00
|
|
|
include BookmarkGuardian
|
2014-01-09 18:25:14 -05:00
|
|
|
include TopicGuardian
|
2014-02-13 11:42:35 -05:00
|
|
|
include UserGuardian
|
2014-10-27 17:06:43 -04:00
|
|
|
include PostRevisionGuardian
|
2015-01-08 18:35:52 -05:00
|
|
|
include GroupGuardian
|
2016-06-06 14:18:15 -04:00
|
|
|
include TagGuardian
|
2014-02-04 14:05:50 -05:00
|
|
|
|
2013-05-20 02:04:53 -04:00
|
|
|
class AnonymousUser
|
2018-12-03 22:48:13 -05:00
|
|
|
def blank?
|
|
|
|
true
|
|
|
|
end
|
|
|
|
def admin?
|
|
|
|
false
|
|
|
|
end
|
|
|
|
def staff?
|
|
|
|
false
|
|
|
|
end
|
|
|
|
def moderator?
|
|
|
|
false
|
|
|
|
end
|
2019-04-17 04:05:02 -04:00
|
|
|
def anonymous?
|
|
|
|
true
|
|
|
|
end
|
2018-12-03 22:48:13 -05:00
|
|
|
def approved?
|
|
|
|
false
|
|
|
|
end
|
|
|
|
def staged?
|
|
|
|
false
|
|
|
|
end
|
|
|
|
def silenced?
|
|
|
|
false
|
|
|
|
end
|
|
|
|
def secure_category_ids
|
|
|
|
[]
|
|
|
|
end
|
|
|
|
def topic_create_allowed_category_ids
|
|
|
|
[]
|
|
|
|
end
|
|
|
|
def has_trust_level?(level)
|
|
|
|
false
|
|
|
|
end
|
|
|
|
def email
|
|
|
|
nil
|
|
|
|
end
|
2013-05-20 02:04:53 -04:00
|
|
|
end
|
2014-05-12 10:30:10 -04:00
|
|
|
|
2018-10-09 10:21:41 -04:00
|
|
|
attr_reader :request
|
2014-11-03 06:46:08 -05:00
|
|
|
|
2018-10-09 10:21:41 -04:00
|
|
|
def initialize(user = nil, request = nil)
|
2013-05-20 02:04:53 -04:00
|
|
|
@user = user.presence || AnonymousUser.new
|
2018-10-09 10:21:41 -04:00
|
|
|
@request = request
|
2013-05-20 02:04:53 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def user
|
|
|
|
@user.presence
|
|
|
|
end
|
|
|
|
alias :current_user :user
|
|
|
|
|
|
|
|
def anonymous?
|
|
|
|
!authenticated?
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-05-20 02:04:53 -04:00
|
|
|
def authenticated?
|
|
|
|
@user.present?
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def is_admin?
|
2013-05-20 02:04:53 -04:00
|
|
|
@user.admin?
|
2013-04-29 02:33:24 -04:00
|
|
|
end
|
|
|
|
|
2013-05-02 03:22:27 -04:00
|
|
|
def is_staff?
|
2013-05-20 02:04:53 -04:00
|
|
|
@user.staff?
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-02-06 22:24:19 -05:00
|
|
|
def is_moderator?
|
|
|
|
@user.moderator?
|
|
|
|
end
|
|
|
|
|
2020-07-28 17:15:04 -04:00
|
|
|
def is_category_group_moderator?(category)
|
2020-11-05 12:18:26 -05:00
|
|
|
return false unless category
|
|
|
|
return false unless authenticated?
|
|
|
|
|
2020-07-28 17:15:04 -04:00
|
|
|
@is_category_group_moderator ||= begin
|
|
|
|
SiteSetting.enable_category_group_moderation? &&
|
|
|
|
category.present? &&
|
|
|
|
category.reviewable_by_group_id.present? &&
|
|
|
|
GroupUser.where(group_id: category.reviewable_by_group_id, user_id: @user.id).exists?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-11-10 12:18:08 -05:00
|
|
|
def is_silenced?
|
|
|
|
@user.silenced?
|
2016-06-20 03:41:17 -04:00
|
|
|
end
|
|
|
|
|
2013-09-04 20:27:34 -04:00
|
|
|
def is_developer?
|
|
|
|
@user &&
|
|
|
|
is_admin? &&
|
2018-01-16 23:50:18 -05:00
|
|
|
(
|
|
|
|
Rails.env.development? ||
|
|
|
|
Developer.user_ids.include?(@user.id) ||
|
2013-09-06 00:07:23 -04:00
|
|
|
(
|
|
|
|
Rails.configuration.respond_to?(:developer_emails) &&
|
|
|
|
Rails.configuration.developer_emails.include?(@user.email)
|
2018-01-16 23:50:18 -05:00
|
|
|
)
|
2013-09-06 00:07:23 -04:00
|
|
|
)
|
2013-09-04 20:27:34 -04:00
|
|
|
end
|
|
|
|
|
2016-06-26 13:25:45 -04:00
|
|
|
def is_staged?
|
|
|
|
@user.staged?
|
|
|
|
end
|
|
|
|
|
2019-04-17 04:05:02 -04:00
|
|
|
def is_anonymous?
|
|
|
|
@user.anonymous?
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
# Can the user see the object?
|
|
|
|
def can_see?(obj)
|
2013-05-20 02:04:53 -04:00
|
|
|
if obj
|
|
|
|
see_method = method_name_for :see, obj
|
2019-11-14 15:10:51 -05:00
|
|
|
(see_method ? public_send(see_method, obj) : true)
|
2013-05-20 02:04:53 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-03-17 14:50:28 -04:00
|
|
|
def can_create?(klass, parent = nil)
|
|
|
|
return false unless authenticated? && klass
|
|
|
|
|
|
|
|
# If no parent is provided, we look for a can_create_klass?
|
|
|
|
# custom method.
|
|
|
|
#
|
|
|
|
# If a parent is provided, we look for a method called
|
|
|
|
# can_create_klass_on_parent?
|
|
|
|
target = klass.name.underscore
|
|
|
|
if parent.present?
|
|
|
|
return false unless can_see?(parent)
|
|
|
|
target << "_on_#{parent.class.name.underscore}"
|
|
|
|
end
|
|
|
|
create_method = :"can_create_#{target}?"
|
|
|
|
|
2019-05-06 22:22:37 -04:00
|
|
|
return public_send(create_method, parent) if respond_to?(create_method)
|
2014-03-17 14:50:28 -04:00
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-04-25 11:46:54 -04:00
|
|
|
def can_enable_safe_mode?
|
|
|
|
SiteSetting.enable_safe_mode? || is_staff?
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
# Can the user edit the obj
|
|
|
|
def can_edit?(obj)
|
2013-08-16 08:24:29 -04:00
|
|
|
can_do?(:edit, obj)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
# Can we delete the object
|
|
|
|
def can_delete?(obj)
|
2013-08-16 08:24:29 -04:00
|
|
|
can_do?(:delete, obj)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2021-10-13 05:53:23 -04:00
|
|
|
def can_permanently_delete?(obj)
|
|
|
|
can_do?(:permanently_delete, obj)
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def can_moderate?(obj)
|
2020-10-13 12:03:14 -04:00
|
|
|
obj && authenticated? && !is_silenced? && (
|
|
|
|
is_staff? ||
|
|
|
|
(obj.is_a?(Topic) && @user.has_trust_level?(TrustLevel[4]) && can_see_topic?(obj))
|
|
|
|
)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
alias :can_see_flags? :can_moderate?
|
2014-09-02 16:12:27 -04:00
|
|
|
|
2018-02-22 09:57:02 -05:00
|
|
|
def can_tag?(topic)
|
|
|
|
return false if topic.blank?
|
2018-02-13 15:46:25 -05:00
|
|
|
|
2018-02-22 09:57:02 -05:00
|
|
|
topic.private_message? ? can_tag_pms? : can_tag_topics?
|
|
|
|
end
|
|
|
|
|
|
|
|
def can_see_tags?(topic)
|
|
|
|
SiteSetting.tagging_enabled && topic.present? && (!topic.private_message? || can_tag_pms?)
|
2018-02-13 15:46:25 -05:00
|
|
|
end
|
|
|
|
|
2017-07-04 04:29:05 -04:00
|
|
|
def can_send_activation_email?(user)
|
|
|
|
user && is_staff? && !SiteSetting.must_approve_users?
|
|
|
|
end
|
|
|
|
|
2014-09-02 16:12:27 -04:00
|
|
|
def can_grant_badges?(_user)
|
|
|
|
SiteSetting.enable_badges && is_staff?
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2019-04-12 09:55:27 -04:00
|
|
|
def can_delete_reviewable_queued_post?(reviewable)
|
|
|
|
reviewable.present? &&
|
|
|
|
authenticated? &&
|
|
|
|
reviewable.created_by_id == @user.id
|
|
|
|
end
|
|
|
|
|
2014-04-22 16:43:46 -04:00
|
|
|
def can_see_group?(group)
|
2020-01-15 05:21:58 -05:00
|
|
|
group.present? && can_see_groups?([group])
|
2014-04-22 16:43:46 -04:00
|
|
|
end
|
|
|
|
|
2019-08-14 09:30:04 -04:00
|
|
|
def can_see_group_members?(group)
|
|
|
|
return false if group.blank?
|
2020-01-15 05:21:58 -05:00
|
|
|
return true if is_admin? || group.members_visibility_level == Group.visibility_levels[:public]
|
2019-08-14 09:30:04 -04:00
|
|
|
return true if is_staff? && group.members_visibility_level == Group.visibility_levels[:staff]
|
2020-09-21 12:32:43 -04:00
|
|
|
return true if is_staff? && group.members_visibility_level == Group.visibility_levels[:members]
|
2019-08-14 09:30:04 -04:00
|
|
|
return true if authenticated? && group.members_visibility_level == Group.visibility_levels[:logged_on_users]
|
|
|
|
return false if user.blank?
|
|
|
|
|
2020-01-15 05:21:58 -05:00
|
|
|
return false unless membership = GroupUser.find_by(group_id: group.id, user_id: user.id)
|
|
|
|
return true if membership.owner
|
2019-08-14 09:30:04 -04:00
|
|
|
|
2020-01-15 05:21:58 -05:00
|
|
|
return false if group.members_visibility_level == Group.visibility_levels[:owners]
|
|
|
|
return false if group.members_visibility_level == Group.visibility_levels[:staff]
|
2019-08-14 09:30:04 -04:00
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2019-05-29 18:40:43 -04:00
|
|
|
def can_see_groups?(groups)
|
|
|
|
return false if groups.blank?
|
2020-01-15 05:21:58 -05:00
|
|
|
return true if is_admin? || groups.all? { |g| g.visibility_level == Group.visibility_levels[:public] }
|
2019-05-29 18:40:43 -04:00
|
|
|
return true if is_staff? && groups.all? { |g| g.visibility_level == Group.visibility_levels[:staff] }
|
2020-09-21 12:32:43 -04:00
|
|
|
return true if is_staff? && groups.all? { |g| g.visibility_level == Group.visibility_levels[:members] }
|
2019-07-08 15:09:50 -04:00
|
|
|
return true if authenticated? && groups.all? { |g| g.visibility_level == Group.visibility_levels[:logged_on_users] }
|
2019-05-29 18:40:43 -04:00
|
|
|
return false if user.blank?
|
|
|
|
|
|
|
|
memberships = GroupUser.where(group: groups, user_id: user.id).pluck(:owner)
|
2020-01-15 05:21:58 -05:00
|
|
|
return false if memberships.size < groups.size
|
|
|
|
return true if memberships.all? # owner of all groups
|
2019-05-29 18:40:43 -04:00
|
|
|
|
2020-01-15 05:21:58 -05:00
|
|
|
return false if groups.all? { |g| g.visibility_level == Group.visibility_levels[:owners] }
|
|
|
|
return false if groups.all? { |g| g.visibility_level == Group.visibility_levels[:staff] }
|
2019-05-29 18:40:43 -04:00
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2019-10-24 08:23:19 -04:00
|
|
|
def can_see_groups_members?(groups)
|
|
|
|
return false if groups.blank?
|
|
|
|
|
|
|
|
requested_group_ids = groups.map(&:id) # Can't use pluck, groups could be a regular array
|
2020-01-15 05:21:58 -05:00
|
|
|
matching_group_ids = Group.where(id: requested_group_ids).members_visible_groups(user).pluck(:id)
|
2019-10-24 08:23:19 -04:00
|
|
|
|
2020-01-15 05:21:58 -05:00
|
|
|
matching_group_ids.sort == requested_group_ids.sort
|
2019-10-24 08:23:19 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
# Can we impersonate this user?
|
|
|
|
def can_impersonate?(target)
|
2013-05-20 02:04:53 -04:00
|
|
|
target &&
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
# You must be an admin to impersonate
|
2013-05-20 02:04:53 -04:00
|
|
|
is_admin? &&
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-09-04 20:27:34 -04:00
|
|
|
# You may not impersonate other admins unless you are a dev
|
|
|
|
(!target.admin? || is_developer?)
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-05-20 02:04:53 -04:00
|
|
|
# Additionally, you may not impersonate yourself;
|
|
|
|
# but the two tests for different admin statuses
|
|
|
|
# make it impossible to be the same user.
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-02-21 07:45:30 -05:00
|
|
|
def can_view_action_logs?(target)
|
2017-04-20 12:15:52 -04:00
|
|
|
target.present? && is_staff?
|
2017-02-21 07:45:30 -05:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
# Can we approve it?
|
|
|
|
def can_approve?(target)
|
2019-04-16 14:42:47 -04:00
|
|
|
is_staff? && target && target.active? && !target.approved?
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2014-04-28 13:46:28 -04:00
|
|
|
|
|
|
|
def can_activate?(target)
|
|
|
|
is_staff? && target && not(target.active?)
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
def can_suspend?(user)
|
2013-05-24 12:13:31 -04:00
|
|
|
user && is_staff? && user.regular?
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-11-07 13:53:32 -05:00
|
|
|
alias :can_deactivate? :can_suspend?
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
def can_revoke_admin?(admin)
|
2013-05-20 02:04:53 -04:00
|
|
|
can_administer_user?(admin) && admin.admin?
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def can_grant_admin?(user)
|
2016-12-28 22:11:33 -05:00
|
|
|
can_administer_user?(user) && !user.admin?
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-02-12 17:58:08 -05:00
|
|
|
def can_revoke_moderation?(moderator)
|
2013-05-20 02:04:53 -04:00
|
|
|
can_administer?(moderator) && moderator.moderator?
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def can_grant_moderation?(user)
|
2016-12-28 22:11:33 -05:00
|
|
|
can_administer?(user) && !user.moderator?
|
2013-02-12 17:58:08 -05:00
|
|
|
end
|
|
|
|
|
2018-04-06 14:29:27 -04:00
|
|
|
def can_grant_title?(user, title = nil)
|
|
|
|
return true if user && is_staff?
|
2018-04-26 16:50:50 -04:00
|
|
|
return false if title.nil?
|
2018-05-31 19:10:52 -04:00
|
|
|
return true if title.empty? # A title set to '(none)' in the UI is an empty string
|
2018-04-06 14:29:27 -04:00
|
|
|
return false if user != @user
|
2020-01-08 12:01:46 -05:00
|
|
|
|
|
|
|
return true if user.badges
|
|
|
|
.where(allow_title: true)
|
|
|
|
.pluck(:name)
|
2020-01-08 12:37:28 -05:00
|
|
|
.any? { |name| Badge.display_name(name) == title }
|
2020-01-08 12:01:46 -05:00
|
|
|
|
2018-04-06 14:29:27 -04:00
|
|
|
user.groups.where(title: title).exists?
|
2013-06-25 18:39:20 -04:00
|
|
|
end
|
|
|
|
|
2019-10-28 13:46:27 -04:00
|
|
|
def can_use_primary_group?(user, group_id = nil)
|
|
|
|
return false if !user || !group_id
|
|
|
|
group = Group.find_by(id: group_id.to_i)
|
|
|
|
|
|
|
|
user.group_ids.include?(group_id.to_i) &&
|
|
|
|
(group ? !group.automatic : false)
|
|
|
|
end
|
|
|
|
|
2021-07-21 07:41:04 -04:00
|
|
|
def can_use_flair_group?(user, group_id = nil)
|
|
|
|
return false if !user || !group_id || !user.group_ids.include?(group_id.to_i)
|
|
|
|
flair_icon, flair_upload_id = Group.where(id: group_id.to_i).pluck_first(:flair_icon, :flair_upload_id)
|
|
|
|
flair_icon.present? || flair_upload_id.present?
|
|
|
|
end
|
|
|
|
|
2014-02-10 16:59:36 -05:00
|
|
|
def can_change_primary_group?(user)
|
|
|
|
user && is_staff?
|
|
|
|
end
|
|
|
|
|
2013-07-03 04:27:40 -04:00
|
|
|
def can_change_trust_level?(user)
|
2013-07-22 19:13:48 -04:00
|
|
|
user && is_staff?
|
2013-07-03 04:27:40 -04:00
|
|
|
end
|
|
|
|
|
2013-04-03 12:23:28 -04:00
|
|
|
# Support sites that have to approve users
|
|
|
|
def can_access_forum?
|
|
|
|
return true unless SiteSetting.must_approve_users?
|
2020-04-05 19:56:47 -04:00
|
|
|
return false if anonymous?
|
2013-04-03 12:23:28 -04:00
|
|
|
|
2013-05-02 03:22:27 -04:00
|
|
|
# Staff can't lock themselves out of a site
|
|
|
|
return true if is_staff?
|
2013-04-03 12:23:28 -04:00
|
|
|
|
2013-05-02 03:22:27 -04:00
|
|
|
@user.approved?
|
2013-04-03 12:23:28 -04:00
|
|
|
end
|
|
|
|
|
2014-03-21 14:13:04 -04:00
|
|
|
def can_see_invite_details?(user)
|
2021-10-14 10:57:01 -04:00
|
|
|
is_staff? || is_me?(user)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2020-03-04 11:47:09 -05:00
|
|
|
def can_see_invite_emails?(user)
|
|
|
|
is_staff? || is_me?(user)
|
|
|
|
end
|
|
|
|
|
2014-05-09 04:22:15 -04:00
|
|
|
def can_invite_to_forum?(groups = nil)
|
2021-09-29 10:40:16 -04:00
|
|
|
authenticated? &&
|
|
|
|
(is_staff? || !SiteSetting.must_approve_users?) &&
|
|
|
|
(is_staff? || SiteSetting.max_invites_per_day.to_i.positive?) &&
|
|
|
|
(is_staff? || @user.has_trust_level?(SiteSetting.min_trust_level_to_allow_invite.to_i)) &&
|
|
|
|
(is_admin? || groups.blank? || groups.all? { |g| can_edit_group?(g) })
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-07-21 02:12:24 -04:00
|
|
|
def can_invite_to?(object, groups = nil)
|
2021-10-11 05:19:31 -04:00
|
|
|
return false if !authenticated?
|
2021-09-29 10:40:16 -04:00
|
|
|
return false if !object.is_a?(Topic) || !can_see?(object)
|
2017-07-21 02:12:24 -04:00
|
|
|
return false if groups.present?
|
2015-03-02 14:25:25 -05:00
|
|
|
|
2021-09-29 10:40:16 -04:00
|
|
|
if object.is_a?(Topic)
|
2018-12-05 10:43:07 -05:00
|
|
|
if object.private_message?
|
|
|
|
return true if is_admin?
|
|
|
|
return false unless SiteSetting.enable_personal_messages?
|
|
|
|
return false if object.reached_recipients_limit? && !is_staff?
|
|
|
|
end
|
2018-03-07 15:04:17 -05:00
|
|
|
|
2018-12-05 10:43:07 -05:00
|
|
|
if (category = object.category) && category.read_restricted
|
2021-09-29 10:40:16 -04:00
|
|
|
return category.groups&.where(automatic: false).any? { |g| can_edit_group?(g) }
|
2015-03-02 14:25:25 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-09-29 10:40:16 -04:00
|
|
|
true
|
2013-11-06 12:56:26 -05:00
|
|
|
end
|
|
|
|
|
2017-02-02 12:38:25 -05:00
|
|
|
def can_invite_via_email?(object)
|
2021-10-11 05:19:31 -04:00
|
|
|
return false if !can_invite_to_forum?
|
2021-09-29 10:40:16 -04:00
|
|
|
return false if !can_invite_to?(object)
|
|
|
|
|
2021-03-18 20:20:10 -04:00
|
|
|
(SiteSetting.enable_local_logins || SiteSetting.enable_discourse_connect) &&
|
|
|
|
(!SiteSetting.must_approve_users? || is_staff?)
|
2017-02-02 12:38:25 -05:00
|
|
|
end
|
|
|
|
|
2014-05-27 16:14:37 -04:00
|
|
|
def can_bulk_invite_to_forum?(user)
|
2021-03-02 02:13:04 -05:00
|
|
|
user.admin? && !SiteSetting.enable_discourse_connect
|
2014-05-27 16:14:37 -04:00
|
|
|
end
|
|
|
|
|
2016-06-07 01:27:08 -04:00
|
|
|
def can_resend_all_invites?(user)
|
|
|
|
user.staff?
|
2014-07-29 13:57:08 -04:00
|
|
|
end
|
|
|
|
|
2021-03-03 04:45:29 -05:00
|
|
|
def can_destroy_all_invites?(user)
|
2017-06-29 10:32:07 -04:00
|
|
|
user.staff?
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def can_see_private_messages?(user_id)
|
2014-02-06 22:24:19 -05:00
|
|
|
is_admin? || (authenticated? && @user.id == user_id)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-12-13 21:53:21 -05:00
|
|
|
def can_invite_group_to_private_message?(group, topic)
|
|
|
|
can_see_topic?(topic) &&
|
|
|
|
can_send_private_message?(group)
|
|
|
|
end
|
|
|
|
|
2019-01-24 06:26:59 -05:00
|
|
|
def can_send_private_message?(target, notify_moderators: false)
|
2017-10-06 03:56:58 -04:00
|
|
|
is_user = target.is_a?(User)
|
|
|
|
is_group = target.is_a?(Group)
|
|
|
|
|
|
|
|
(is_group || is_user) &&
|
2014-02-12 23:08:46 -05:00
|
|
|
# User is authenticated
|
2013-05-20 02:04:53 -04:00
|
|
|
authenticated? &&
|
2017-10-23 17:19:30 -04:00
|
|
|
# Have to be a basic level at least
|
2019-09-18 15:23:13 -04:00
|
|
|
(is_group || @user.has_trust_level?(SiteSetting.min_trust_to_send_messages) || notify_moderators) &&
|
2017-10-06 03:56:58 -04:00
|
|
|
# User disabled private message
|
|
|
|
(is_staff? || is_group || target.user_option.allow_private_messages) &&
|
2014-02-12 23:08:46 -05:00
|
|
|
# PMs are enabled
|
2019-01-24 06:26:59 -05:00
|
|
|
(is_staff? || SiteSetting.enable_personal_messages || notify_moderators) &&
|
2014-05-06 15:01:19 -04:00
|
|
|
# Can't send PMs to suspended users
|
2017-10-06 03:56:58 -04:00
|
|
|
(is_staff? || is_group || !target.suspended?) &&
|
2017-12-13 21:53:21 -05:00
|
|
|
# Check group messageable level
|
2021-08-11 18:11:22 -04:00
|
|
|
(is_staff? || is_user || Group.messageable(@user).where(id: target.id).exists? || notify_moderators) &&
|
2017-11-10 12:18:08 -05:00
|
|
|
# Silenced users can only send PM to staff
|
|
|
|
(!is_silenced? || target.staff?)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2018-08-26 21:38:11 -04:00
|
|
|
def can_send_private_messages_to_email?
|
2017-08-28 12:07:30 -04:00
|
|
|
# Staged users must be enabled to create a temporary user.
|
2021-04-06 08:39:27 -04:00
|
|
|
return false if !SiteSetting.enable_staged_users
|
2017-08-28 12:07:30 -04:00
|
|
|
# User is authenticated
|
2021-04-06 08:39:27 -04:00
|
|
|
return false if !authenticated?
|
2017-08-28 12:07:30 -04:00
|
|
|
# User is trusted enough
|
2021-04-06 08:39:27 -04:00
|
|
|
return is_admin? if SiteSetting.min_trust_to_send_email_messages.to_s == 'admin'
|
|
|
|
return is_staff? if SiteSetting.min_trust_to_send_email_messages.to_s == 'staff'
|
|
|
|
SiteSetting.enable_personal_messages && @user.has_trust_level?(SiteSetting.min_trust_to_send_email_messages.to_i)
|
2017-08-28 12:07:30 -04:00
|
|
|
end
|
|
|
|
|
2017-05-19 15:59:37 -04:00
|
|
|
def can_export_entity?(entity)
|
2020-04-05 19:56:47 -04:00
|
|
|
return false if anonymous?
|
2018-09-20 21:07:13 -04:00
|
|
|
return true if is_admin?
|
|
|
|
return entity != 'user_list' if is_moderator?
|
2017-05-19 15:59:37 -04:00
|
|
|
|
|
|
|
# Regular users can only export their archives
|
|
|
|
return false unless entity == "user_archive"
|
2014-12-30 07:37:05 -05:00
|
|
|
UserExport.where(user_id: @user.id, created_at: (Time.zone.now.beginning_of_day..Time.zone.now.end_of_day)).count == 0
|
2014-12-22 11:17:04 -05:00
|
|
|
end
|
|
|
|
|
2020-01-02 08:04:08 -05:00
|
|
|
def can_mute_user?(target_user)
|
2019-03-27 05:41:50 -04:00
|
|
|
can_mute_users? &&
|
2020-01-02 08:04:08 -05:00
|
|
|
@user.id != target_user.id &&
|
|
|
|
!target_user.staff?
|
2019-03-27 05:41:50 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def can_mute_users?
|
|
|
|
return false if anonymous?
|
|
|
|
@user.staff? || @user.trust_level >= TrustLevel.levels[:basic]
|
|
|
|
end
|
|
|
|
|
2020-01-02 08:04:08 -05:00
|
|
|
def can_ignore_user?(target_user)
|
|
|
|
can_ignore_users? && @user.id != target_user.id && !target_user.staff?
|
2019-03-20 15:55:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def can_ignore_users?
|
|
|
|
return false if anonymous?
|
2020-11-20 13:05:20 -05:00
|
|
|
@user.staff? || @user.has_trust_level?(SiteSetting.min_trust_level_to_allow_ignore.to_i)
|
2019-03-20 06:18:46 -04:00
|
|
|
end
|
|
|
|
|
2020-06-02 23:19:42 -04:00
|
|
|
def allowed_theme_repo_import?(repo)
|
|
|
|
return false if !@user.admin?
|
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
allowed_repos = GlobalSetting.allowed_theme_repos
|
|
|
|
if !allowed_repos.blank?
|
|
|
|
urls = allowed_repos.split(",").map(&:strip)
|
2020-06-02 23:19:42 -04:00
|
|
|
return urls.include?(repo)
|
|
|
|
end
|
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-09-06 20:44:57 -04:00
|
|
|
def allow_themes?(theme_ids, include_preview: false)
|
2018-08-10 07:12:02 -04:00
|
|
|
return true if theme_ids.blank?
|
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
if allowed_theme_ids = GlobalSetting.allowed_theme_ids
|
|
|
|
if (theme_ids - allowed_theme_ids).present?
|
2020-06-02 23:19:42 -04:00
|
|
|
return false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-06 20:44:57 -04:00
|
|
|
if include_preview && is_staff? && (theme_ids - Theme.theme_ids).blank?
|
2018-08-08 00:46:34 -04:00
|
|
|
return true
|
|
|
|
end
|
|
|
|
|
|
|
|
parent = theme_ids.first
|
|
|
|
components = theme_ids[1..-1] || []
|
|
|
|
|
|
|
|
Theme.user_theme_ids.include?(parent) &&
|
|
|
|
(components - Theme.components_for(parent)).empty?
|
2017-04-14 13:35:12 -04:00
|
|
|
end
|
|
|
|
|
2020-04-08 12:52:36 -04:00
|
|
|
def can_publish_page?(topic)
|
2020-11-05 19:33:19 -05:00
|
|
|
return false if !SiteSetting.enable_page_publishing?
|
|
|
|
return false if SiteSetting.secure_media?
|
2020-04-08 12:52:36 -04:00
|
|
|
return false if topic.blank?
|
|
|
|
return false if topic.private_message?
|
|
|
|
return false unless can_see_topic?(topic)
|
|
|
|
is_staff?
|
|
|
|
end
|
|
|
|
|
2020-05-23 00:56:13 -04:00
|
|
|
def can_see_about_stats?
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2021-05-19 02:15:24 -04:00
|
|
|
def can_see_site_contact_details?
|
|
|
|
!SiteSetting.login_required? || authenticated?
|
|
|
|
end
|
|
|
|
|
2018-10-11 19:40:48 -04:00
|
|
|
def auth_token
|
2018-10-11 19:51:41 -04:00
|
|
|
if cookie = request&.cookies[Auth::DefaultCurrentUserProvider::TOKEN_COOKIE]
|
|
|
|
UserAuthToken.hash_token(cookie)
|
|
|
|
end
|
2018-10-11 19:40:48 -04:00
|
|
|
end
|
|
|
|
|
2013-05-20 02:04:53 -04:00
|
|
|
private
|
|
|
|
|
|
|
|
def is_my_own?(obj)
|
2013-10-03 23:28:49 -04:00
|
|
|
|
|
|
|
unless anonymous?
|
2013-10-04 03:00:23 -04:00
|
|
|
return obj.user_id == @user.id if obj.respond_to?(:user_id) && obj.user_id && @user.id
|
2013-10-03 23:28:49 -04:00
|
|
|
return obj.user == @user if obj.respond_to?(:user)
|
|
|
|
end
|
|
|
|
|
|
|
|
false
|
2013-05-20 02:04:53 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def is_me?(other)
|
2014-03-26 15:20:41 -04:00
|
|
|
other && authenticated? && other.is_a?(User) && @user == other
|
2013-04-29 02:33:24 -04:00
|
|
|
end
|
2013-05-20 02:04:53 -04:00
|
|
|
|
|
|
|
def is_not_me?(other)
|
|
|
|
@user.blank? || !is_me?(other)
|
|
|
|
end
|
|
|
|
|
|
|
|
def can_administer?(obj)
|
2016-12-28 22:11:33 -05:00
|
|
|
is_admin? && obj.present? && obj.id&.positive?
|
2013-05-20 02:04:53 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def can_administer_user?(other_user)
|
|
|
|
can_administer?(other_user) && is_not_me?(other_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
def method_name_for(action, obj)
|
|
|
|
method_name = :"can_#{action}_#{obj.class.name.underscore}?"
|
|
|
|
return method_name if respond_to?(method_name)
|
|
|
|
end
|
|
|
|
|
2013-08-16 08:24:29 -04:00
|
|
|
def can_do?(action, obj)
|
|
|
|
if obj && authenticated?
|
|
|
|
action_method = method_name_for action, obj
|
2019-11-14 15:10:51 -05:00
|
|
|
(action_method ? public_send(action_method, obj) : true)
|
2014-01-16 11:59:26 -05:00
|
|
|
else
|
|
|
|
false
|
2013-08-16 08:24:29 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|