2019-05-02 18:17:27 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
class User < ActiveRecord::Base
|
2017-08-15 11:46:57 -04:00
|
|
|
include Searchable
|
2013-06-06 18:07:59 -04:00
|
|
|
include Roleable
|
2014-04-28 04:31:51 -04:00
|
|
|
include HasCustomFields
|
2018-02-20 01:44:51 -05:00
|
|
|
include SecondFactorManager
|
2018-10-05 04:53:59 -04:00
|
|
|
include HasDestroyedWebHook
|
2013-06-06 18:07:59 -04:00
|
|
|
|
2020-05-23 00:56:13 -04:00
|
|
|
DEFAULT_FEATURED_BADGE_COUNT = 3
|
|
|
|
|
|
|
|
# not deleted on user delete
|
2013-02-05 14:16:51 -05:00
|
|
|
has_many :posts
|
2020-05-23 00:56:13 -04:00
|
|
|
has_many :topics
|
|
|
|
has_many :uploads
|
|
|
|
|
2015-09-02 14:43:15 -04:00
|
|
|
has_many :category_users, dependent: :destroy
|
2016-05-04 14:02:47 -04:00
|
|
|
has_many :tag_users, dependent: :destroy
|
2016-08-16 03:06:33 -04:00
|
|
|
has_many :user_api_keys, dependent: :destroy
|
2020-05-22 23:25:56 -04:00
|
|
|
has_many :topic_allowed_users, dependent: :destroy
|
2020-05-23 00:56:13 -04:00
|
|
|
has_many :user_archived_messages, dependent: :destroy
|
|
|
|
has_many :email_change_requests, dependent: :destroy
|
2020-05-22 23:25:56 -04:00
|
|
|
has_many :email_tokens, dependent: :destroy
|
|
|
|
has_many :topic_links, dependent: :destroy
|
|
|
|
has_many :user_uploads, dependent: :destroy
|
2022-06-08 19:24:30 -04:00
|
|
|
has_many :upload_references, as: :target, dependent: :destroy
|
2021-02-22 06:42:37 -05:00
|
|
|
has_many :user_emails, dependent: :destroy, autosave: true
|
2020-05-23 00:56:13 -04:00
|
|
|
has_many :user_associated_accounts, dependent: :destroy
|
|
|
|
has_many :oauth2_user_infos, dependent: :destroy
|
|
|
|
has_many :user_second_factors, dependent: :destroy
|
|
|
|
has_many :user_badges, -> { for_enabled_badges }, dependent: :destroy
|
|
|
|
has_many :user_auth_tokens, dependent: :destroy
|
|
|
|
has_many :group_users, dependent: :destroy
|
|
|
|
has_many :user_warnings, dependent: :destroy
|
|
|
|
has_many :api_keys, dependent: :destroy
|
|
|
|
has_many :push_subscriptions, dependent: :destroy
|
|
|
|
has_many :acting_group_histories, dependent: :destroy, foreign_key: :acting_user_id, class_name: 'GroupHistory'
|
|
|
|
has_many :targeted_group_histories, dependent: :destroy, foreign_key: :target_user_id, class_name: 'GroupHistory'
|
|
|
|
has_many :reviewable_scores, dependent: :destroy
|
2020-06-09 11:19:32 -04:00
|
|
|
has_many :invites, foreign_key: :invited_by_id, dependent: :destroy
|
2021-04-27 01:52:45 -04:00
|
|
|
has_many :user_custom_fields, dependent: :destroy
|
2021-12-09 07:30:27 -05:00
|
|
|
has_many :user_associated_groups, dependent: :destroy
|
2021-08-26 12:16:00 -04:00
|
|
|
has_many :pending_posts, -> { merge(Reviewable.pending) }, class_name: 'ReviewableQueuedPost', foreign_key: :created_by_id
|
2020-05-22 23:25:56 -04:00
|
|
|
|
|
|
|
has_one :user_option, dependent: :destroy
|
|
|
|
has_one :user_avatar, dependent: :destroy
|
2021-03-10 07:49:13 -05:00
|
|
|
has_one :primary_email, -> { where(primary: true) }, class_name: 'UserEmail', dependent: :destroy, autosave: true, validate: false
|
2020-05-23 00:56:13 -04:00
|
|
|
has_one :user_stat, dependent: :destroy
|
|
|
|
has_one :user_profile, dependent: :destroy, inverse_of: :user
|
|
|
|
has_one :single_sign_on_record, dependent: :destroy
|
|
|
|
has_one :anonymous_user_master, class_name: 'AnonymousUser', dependent: :destroy
|
|
|
|
has_one :anonymous_user_shadow, ->(record) { where(active: true) }, foreign_key: :master_user_id, class_name: 'AnonymousUser', dependent: :destroy
|
2020-06-09 11:19:32 -04:00
|
|
|
has_one :invited_user, dependent: :destroy
|
2021-01-20 11:31:52 -05:00
|
|
|
has_one :user_notification_schedule, dependent: :destroy
|
2020-05-22 23:25:56 -04:00
|
|
|
|
2020-05-23 00:56:13 -04:00
|
|
|
# delete all is faster but bypasses callbacks
|
|
|
|
has_many :bookmarks, dependent: :delete_all
|
|
|
|
has_many :notifications, dependent: :delete_all
|
|
|
|
has_many :topic_users, dependent: :delete_all
|
|
|
|
has_many :incoming_emails, dependent: :delete_all
|
|
|
|
has_many :user_visits, dependent: :delete_all
|
|
|
|
has_many :user_auth_token_logs, dependent: :delete_all
|
|
|
|
has_many :group_requests, dependent: :delete_all
|
|
|
|
has_many :muted_user_records, class_name: 'MutedUser', dependent: :delete_all
|
|
|
|
has_many :ignored_user_records, class_name: 'IgnoredUser', dependent: :delete_all
|
2020-12-18 10:03:51 -05:00
|
|
|
has_many :do_not_disturb_timings, dependent: :delete_all
|
2022-05-27 05:15:14 -04:00
|
|
|
has_one :user_status, dependent: :destroy
|
2019-05-29 00:26:06 -04:00
|
|
|
|
2020-05-23 00:56:13 -04:00
|
|
|
# dependent deleting handled via before_destroy (special cases)
|
|
|
|
has_many :user_actions
|
|
|
|
has_many :post_actions
|
|
|
|
has_many :post_timings
|
|
|
|
has_many :directory_items
|
2021-02-22 08:07:47 -05:00
|
|
|
has_many :email_logs
|
2020-05-22 23:25:56 -04:00
|
|
|
has_many :security_keys, -> {
|
|
|
|
where(enabled: true)
|
|
|
|
}, class_name: "UserSecurityKey"
|
|
|
|
|
2020-05-23 00:56:13 -04:00
|
|
|
has_many :badges, through: :user_badges
|
2021-06-22 11:58:03 -04:00
|
|
|
has_many :default_featured_user_badges, -> {
|
|
|
|
max_featured_rank = SiteSetting.max_favorite_badges > 0 ? SiteSetting.max_favorite_badges + 1
|
|
|
|
: DEFAULT_FEATURED_BADGE_COUNT
|
|
|
|
for_enabled_badges.grouped_with_count.where("featured_rank <= ?", max_featured_rank)
|
|
|
|
}, class_name: "UserBadge"
|
2020-05-23 00:56:13 -04:00
|
|
|
|
|
|
|
has_many :topics_allowed, through: :topic_allowed_users, source: :topic
|
|
|
|
has_many :groups, through: :group_users
|
|
|
|
has_many :secure_categories, through: :groups, source: :categories
|
2021-12-09 07:30:27 -05:00
|
|
|
has_many :associated_groups, through: :user_associated_groups, dependent: :destroy
|
2020-05-23 00:56:13 -04:00
|
|
|
|
|
|
|
# deleted in user_second_factors relationship
|
|
|
|
has_many :totps, -> {
|
|
|
|
where(method: UserSecondFactor.methods[:totp], enabled: true)
|
|
|
|
}, class_name: "UserSecondFactor"
|
2020-05-22 23:25:56 -04:00
|
|
|
|
2019-05-29 00:26:06 -04:00
|
|
|
has_one :master_user, through: :anonymous_user_master
|
|
|
|
has_one :shadow_user, through: :anonymous_user_shadow, source: :user
|
|
|
|
|
2019-04-28 23:58:52 -04:00
|
|
|
has_one :profile_background_upload, through: :user_profile
|
|
|
|
has_one :card_background_upload, through: :user_profile
|
2013-02-05 14:16:51 -05:00
|
|
|
belongs_to :approved_by, class_name: 'User'
|
2014-04-23 22:42:04 -04:00
|
|
|
belongs_to :primary_group, class_name: 'Group'
|
2021-07-08 03:46:21 -04:00
|
|
|
belongs_to :flair_group, class_name: 'Group'
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2015-03-23 20:55:22 -04:00
|
|
|
has_many :muted_users, through: :muted_user_records
|
2020-01-02 08:04:08 -05:00
|
|
|
has_many :ignored_users, through: :ignored_user_records
|
|
|
|
|
2014-05-22 03:37:02 -04:00
|
|
|
belongs_to :uploaded_avatar, class_name: 'Upload'
|
2013-08-13 16:08:29 -04:00
|
|
|
|
2022-06-30 02:54:20 -04:00
|
|
|
has_many :sidebar_section_links, dependent: :delete_all
|
|
|
|
has_many :category_sidebar_section_links, -> { where(linkable_type: "Category") }, class_name: 'SidebarSectionLink'
|
2022-08-21 18:46:20 -04:00
|
|
|
has_many :custom_sidebar_tags, through: :sidebar_section_links, source: :linkable, source_type: "Tag"
|
2022-06-30 02:54:20 -04:00
|
|
|
|
2013-11-15 10:27:43 -05:00
|
|
|
delegate :last_sent_email_address, to: :email_logs
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
validates_presence_of :username
|
2017-08-31 00:06:56 -04:00
|
|
|
validate :username_validator, if: :will_save_change_to_username?
|
2013-02-05 14:16:51 -05:00
|
|
|
validate :password_validator
|
2019-05-13 16:43:19 -04:00
|
|
|
validate :name_validator, if: :will_save_change_to_name?
|
2017-08-31 00:06:56 -04:00
|
|
|
validates :name, user_full_name: true, if: :will_save_change_to_name?, length: { maximum: 255 }
|
2013-10-21 14:49:51 -04:00
|
|
|
validates :ip_address, allowed_ip_address: { on: :create, message: :signup_not_allowed }
|
2017-07-30 22:45:18 -04:00
|
|
|
validates :primary_email, presence: true
|
2022-07-14 18:36:54 -04:00
|
|
|
validates :validatable_user_fields_values, watched_words: true, unless: :custom_fields_clean?
|
2017-09-11 13:22:04 -04:00
|
|
|
validates_associated :primary_email, message: -> (_, user_email) { user_email[:value]&.errors[:email]&.first }
|
2013-02-05 14:16:51 -05:00
|
|
|
|
|
|
|
after_initialize :add_trust_level
|
2015-08-21 14:39:21 -04:00
|
|
|
|
2017-10-25 01:02:18 -04:00
|
|
|
before_validation :set_skip_validate_email
|
2017-08-08 22:56:08 -04:00
|
|
|
|
2013-02-05 21:44:49 -05:00
|
|
|
after_create :create_email_token
|
2013-09-11 14:50:26 -04:00
|
|
|
after_create :create_user_stat
|
2016-02-16 23:46:19 -05:00
|
|
|
after_create :create_user_option
|
2014-05-27 13:54:04 -04:00
|
|
|
after_create :create_user_profile
|
2018-07-18 06:57:43 -04:00
|
|
|
after_create :set_random_avatar
|
2014-06-16 20:46:30 -04:00
|
|
|
after_create :ensure_in_trust_level_group
|
2015-08-21 14:39:21 -04:00
|
|
|
after_create :set_default_categories_preferences
|
2019-11-01 03:10:13 -04:00
|
|
|
after_create :set_default_tags_preferences
|
2022-10-26 18:38:50 -04:00
|
|
|
after_create :set_default_sidebar_section_links
|
|
|
|
|
|
|
|
after_update :set_default_sidebar_section_links, if: Proc.new {
|
|
|
|
self.saved_change_to_staged?
|
|
|
|
}
|
2014-08-13 16:17:16 -04:00
|
|
|
|
2020-05-07 21:27:26 -04:00
|
|
|
after_update :trigger_user_updated_event, if: Proc.new {
|
|
|
|
self.human? && self.saved_change_to_uploaded_avatar_id?
|
|
|
|
}
|
|
|
|
|
2019-06-17 01:10:47 -04:00
|
|
|
after_update :trigger_user_automatic_group_refresh, if: :saved_change_to_staged?
|
2019-05-27 12:12:26 -04:00
|
|
|
|
2019-04-23 06:22:47 -04:00
|
|
|
before_save :update_usernames
|
2014-08-13 16:17:16 -04:00
|
|
|
before_save :ensure_password_is_hashed
|
2021-07-08 03:46:21 -04:00
|
|
|
before_save :match_primary_group_changes
|
2018-09-20 22:06:08 -04:00
|
|
|
before_save :check_if_title_is_badged_granted
|
2022-06-14 12:27:01 -04:00
|
|
|
before_save :apply_watched_words, unless: :custom_fields_clean?
|
2014-08-13 16:17:16 -04:00
|
|
|
|
2017-01-31 17:21:37 -05:00
|
|
|
after_save :expire_tokens_if_password_changed
|
2014-08-13 16:17:16 -04:00
|
|
|
after_save :clear_global_notice_if_needed
|
2014-05-22 03:37:02 -04:00
|
|
|
after_save :refresh_avatar
|
2014-07-22 21:42:24 -04:00
|
|
|
after_save :badge_grant
|
2015-06-05 13:50:06 -04:00
|
|
|
after_save :expire_old_email_tokens
|
2016-12-21 21:13:14 -05:00
|
|
|
after_save :index_search
|
2018-12-14 16:52:37 -05:00
|
|
|
after_save :check_site_contact_username
|
2019-06-17 01:10:47 -04:00
|
|
|
|
2022-06-08 19:24:30 -04:00
|
|
|
after_save do
|
|
|
|
if saved_change_to_uploaded_avatar_id?
|
|
|
|
UploadReference.ensure_exist!(upload_ids: [self.uploaded_avatar_id], target: self)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-16 04:02:34 -04:00
|
|
|
after_commit :trigger_user_created_event, on: :create
|
2018-07-23 03:49:49 -04:00
|
|
|
after_commit :trigger_user_destroyed_event, on: :destroy
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-09-03 17:19:29 -04:00
|
|
|
before_destroy do
|
|
|
|
# These tables don't have primary keys, so destroying them with activerecord is tricky:
|
2017-08-31 00:06:56 -04:00
|
|
|
PostTiming.where(user_id: self.id).delete_all
|
|
|
|
TopicViewItem.where(user_id: self.id).delete_all
|
2019-01-16 20:40:30 -05:00
|
|
|
UserAction.where('user_id = :user_id OR target_user_id = :user_id OR acting_user_id = :user_id', user_id: self.id).delete_all
|
|
|
|
|
|
|
|
# we need to bypass the default scope here, which appears not bypassed for :delete_all
|
|
|
|
# however :destroy it is bypassed
|
|
|
|
PostAction.with_deleted.where(user_id: self.id).delete_all
|
2019-04-26 04:11:39 -04:00
|
|
|
|
|
|
|
# This is a perf optimisation to ensure we hit the index
|
|
|
|
# without this we need to scan a much larger number of rows
|
|
|
|
DirectoryItem.where(user_id: self.id)
|
|
|
|
.where('period_type in (?)', DirectoryItem.period_types.values)
|
|
|
|
.delete_all
|
2020-05-23 00:56:13 -04:00
|
|
|
|
|
|
|
# our relationship filters on enabled, this makes sure everything is deleted
|
|
|
|
UserSecurityKey.where(user_id: self.id).delete_all
|
2020-06-18 17:42:39 -04:00
|
|
|
|
|
|
|
Developer.where(user_id: self.id).delete_all
|
|
|
|
DraftSequence.where(user_id: self.id).delete_all
|
|
|
|
GivenDailyLike.where(user_id: self.id).delete_all
|
|
|
|
MutedUser.where(user_id: self.id).or(MutedUser.where(muted_user_id: self.id)).delete_all
|
|
|
|
IgnoredUser.where(user_id: self.id).or(IgnoredUser.where(ignored_user_id: self.id)).delete_all
|
|
|
|
UserAvatar.where(user_id: self.id).delete_all
|
2013-09-03 17:19:29 -04:00
|
|
|
end
|
|
|
|
|
2016-09-07 14:05:46 -04:00
|
|
|
# Skip validating email, for example from a particular auth provider plugin
|
|
|
|
attr_accessor :skip_email_validation
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
# Whether we need to be sending a system message after creation
|
|
|
|
attr_accessor :send_welcome_message
|
|
|
|
|
|
|
|
# This is just used to pass some information into the serializer
|
|
|
|
attr_accessor :notification_channel_position
|
|
|
|
|
2014-08-13 16:17:16 -04:00
|
|
|
# set to true to optimize creation and save for imports
|
|
|
|
attr_accessor :import_mode
|
|
|
|
|
2021-04-27 01:52:45 -04:00
|
|
|
# Cache for user custom fields. Currently it is used to display quick search results
|
|
|
|
attr_accessor :custom_data
|
|
|
|
|
2018-03-18 23:31:14 -04:00
|
|
|
scope :with_email, ->(email) do
|
2018-03-19 00:34:21 -04:00
|
|
|
joins(:user_emails).where("lower(user_emails.email) IN (?)", email)
|
2018-03-18 23:31:14 -04:00
|
|
|
end
|
2017-04-26 14:47:36 -04:00
|
|
|
|
2021-07-05 00:56:32 -04:00
|
|
|
scope :with_primary_email, ->(email) do
|
|
|
|
joins(:user_emails).where("lower(user_emails.email) IN (?) AND user_emails.primary", email)
|
|
|
|
end
|
|
|
|
|
2017-03-11 01:25:09 -05:00
|
|
|
scope :human_users, -> { where('users.id > 0') }
|
|
|
|
|
2015-05-10 19:10:10 -04:00
|
|
|
# excluding fake users like the system user or anonymous users
|
2017-03-11 01:25:09 -05:00
|
|
|
scope :real, -> { human_users.where('NOT EXISTS(
|
2015-05-10 19:10:10 -04:00
|
|
|
SELECT 1
|
2019-05-29 00:26:06 -04:00
|
|
|
FROM anonymous_users a
|
|
|
|
WHERE a.user_id = users.id
|
|
|
|
)') }
|
2013-03-29 02:29:58 -04:00
|
|
|
|
2014-09-03 17:50:19 -04:00
|
|
|
# TODO-PERF: There is no indexes on any of these
|
|
|
|
# and NotifyMailingListSubscribers does a select-all-and-loop
|
2017-11-10 12:18:08 -05:00
|
|
|
# may want to create an index on (active, silence, suspended_till)?
|
2017-11-13 13:41:36 -05:00
|
|
|
scope :silenced, -> { where("silenced_till IS NOT NULL AND silenced_till > ?", Time.zone.now) }
|
|
|
|
scope :not_silenced, -> { where("silenced_till IS NULL OR silenced_till <= ?", Time.zone.now) }
|
2014-09-03 17:50:19 -04:00
|
|
|
scope :suspended, -> { where('suspended_till IS NOT NULL AND suspended_till > ?', Time.zone.now) }
|
|
|
|
scope :not_suspended, -> { where('suspended_till IS NULL OR suspended_till <= ?', Time.zone.now) }
|
|
|
|
scope :activated, -> { where(active: true) }
|
2022-06-07 14:58:58 -04:00
|
|
|
scope :not_staged, -> { where(staged: false) }
|
2014-09-03 17:50:19 -04:00
|
|
|
|
2018-03-22 01:42:46 -04:00
|
|
|
scope :filter_by_username, ->(filter) do
|
2018-03-26 02:30:37 -04:00
|
|
|
if filter.is_a?(Array)
|
|
|
|
where('username_lower ~* ?', "(#{filter.join('|')})")
|
|
|
|
else
|
|
|
|
where('username_lower ILIKE ?', "%#{filter}%")
|
|
|
|
end
|
2018-03-22 01:42:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
scope :filter_by_username_or_email, ->(filter) do
|
|
|
|
if filter =~ /.+@.+/
|
|
|
|
# probably an email so try the bypass
|
2019-10-21 06:32:27 -04:00
|
|
|
if user_id = UserEmail.where("lower(email) = ?", filter.downcase).pluck_first(:user_id)
|
2018-03-22 01:42:46 -04:00
|
|
|
return where('users.id = ?', user_id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-26 02:30:37 -04:00
|
|
|
users = joins(:primary_email)
|
|
|
|
|
|
|
|
if filter.is_a?(Array)
|
|
|
|
users.where(
|
|
|
|
'username_lower ~* :filter OR lower(user_emails.email) SIMILAR TO :filter',
|
|
|
|
filter: "(#{filter.join('|')})"
|
|
|
|
)
|
|
|
|
else
|
|
|
|
users.where(
|
2018-03-22 01:42:46 -04:00
|
|
|
'username_lower ILIKE :filter OR lower(user_emails.email) ILIKE :filter',
|
|
|
|
filter: "%#{filter}%"
|
|
|
|
)
|
2018-03-26 02:30:37 -04:00
|
|
|
end
|
2018-03-22 01:42:46 -04:00
|
|
|
end
|
|
|
|
|
2022-10-05 20:10:43 -04:00
|
|
|
scope :watching_topic, ->(topic) do
|
2020-12-15 17:30:21 -05:00
|
|
|
joins(DB.sql_fragment("LEFT JOIN category_users ON category_users.user_id = users.id AND category_users.category_id = :category_id", category_id: topic.category_id))
|
|
|
|
.joins(DB.sql_fragment("LEFT JOIN topic_users ON topic_users.user_id = users.id AND topic_users.topic_id = :topic_id", topic_id: topic.id))
|
|
|
|
.joins("LEFT JOIN tag_users ON tag_users.user_id = users.id AND tag_users.tag_id IN (#{topic.tag_ids.join(",").presence || 'NULL'})")
|
|
|
|
.where("category_users.notification_level > 0 OR topic_users.notification_level > 0 OR tag_users.notification_level > 0")
|
|
|
|
end
|
|
|
|
|
2013-02-14 01:32:58 -05:00
|
|
|
module NewTopicDuration
|
2013-02-25 11:42:20 -05:00
|
|
|
ALWAYS = -1
|
2013-02-14 01:32:58 -05:00
|
|
|
LAST_VISIT = -2
|
|
|
|
end
|
2014-03-07 12:58:53 -05:00
|
|
|
|
2019-08-10 06:02:12 -04:00
|
|
|
MAX_STAFF_DELETE_POST_COUNT ||= 5
|
|
|
|
|
2022-10-26 18:38:50 -04:00
|
|
|
def visible_sidebar_tags(user_guardian = nil)
|
|
|
|
user_guardian ||= guardian
|
|
|
|
DiscourseTagging.filter_visible(custom_sidebar_tags, user_guardian)
|
|
|
|
end
|
|
|
|
|
2014-09-11 15:22:11 -04:00
|
|
|
def self.max_password_length
|
|
|
|
200
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def self.username_length
|
2014-07-16 12:25:24 -04:00
|
|
|
SiteSetting.min_username_length.to_i..SiteSetting.max_username_length.to_i
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2019-04-23 06:22:47 -04:00
|
|
|
def self.normalize_username(username)
|
2022-04-04 17:15:32 -04:00
|
|
|
username.to_s.unicode_normalize.downcase if username.present?
|
2019-04-23 06:22:47 -04:00
|
|
|
end
|
|
|
|
|
2018-07-31 23:08:45 -04:00
|
|
|
def self.username_available?(username, email = nil, allow_reserved_username: false)
|
2019-04-23 06:22:47 -04:00
|
|
|
lower = normalize_username(username)
|
2018-07-31 23:08:45 -04:00
|
|
|
return false if !allow_reserved_username && reserved_username?(lower)
|
2019-02-19 16:31:03 -05:00
|
|
|
return true if !username_exists?(lower)
|
2018-05-22 15:25:52 -04:00
|
|
|
|
2017-12-12 05:26:00 -05:00
|
|
|
# staged users can use the same username since they will take over the account
|
|
|
|
email.present? && User.joins(:user_emails).exists?(staged: true, username_lower: lower, user_emails: { primary: true, email: email })
|
2017-04-12 22:44:26 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.reserved_username?(username)
|
2019-04-23 06:22:47 -04:00
|
|
|
username = normalize_username(username)
|
2016-08-31 09:49:45 -04:00
|
|
|
|
2021-11-23 15:25:54 -05:00
|
|
|
return true if SiteSetting.here_mention == username
|
|
|
|
|
2019-04-23 06:22:47 -04:00
|
|
|
SiteSetting.reserved_usernames.unicode_normalize.split("|").any? do |reserved|
|
|
|
|
username.match?(/^#{Regexp.escape(reserved).gsub('\*', '.*')}$/)
|
2017-04-12 22:44:26 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2019-10-11 04:57:55 -04:00
|
|
|
def self.editable_user_custom_fields(by_staff: false)
|
2018-09-04 06:45:36 -04:00
|
|
|
fields = []
|
2020-08-30 18:52:01 -04:00
|
|
|
fields.push(*DiscoursePluginRegistry.self_editable_user_custom_fields)
|
|
|
|
fields.push(*DiscoursePluginRegistry.staff_editable_user_custom_fields) if by_staff
|
2019-10-11 04:57:55 -04:00
|
|
|
|
2018-09-04 06:45:36 -04:00
|
|
|
fields.uniq
|
|
|
|
end
|
|
|
|
|
2020-07-26 20:23:54 -04:00
|
|
|
def self.allowed_user_custom_fields(guardian)
|
2016-03-11 15:52:18 -05:00
|
|
|
fields = []
|
|
|
|
|
2020-08-30 18:52:01 -04:00
|
|
|
fields.push(*DiscoursePluginRegistry.public_user_custom_fields)
|
2018-10-17 05:33:27 -04:00
|
|
|
|
2016-03-11 15:52:18 -05:00
|
|
|
if SiteSetting.public_user_custom_fields.present?
|
2020-08-30 18:52:01 -04:00
|
|
|
fields.push(*SiteSetting.public_user_custom_fields.split('|'))
|
2016-03-11 15:52:18 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
if guardian.is_staff?
|
|
|
|
if SiteSetting.staff_user_custom_fields.present?
|
2020-08-30 18:52:01 -04:00
|
|
|
fields.push(*SiteSetting.staff_user_custom_fields.split('|'))
|
2016-03-11 15:52:18 -05:00
|
|
|
end
|
2020-05-15 09:04:38 -04:00
|
|
|
|
2020-08-30 18:52:01 -04:00
|
|
|
fields.push(*DiscoursePluginRegistry.staff_user_custom_fields)
|
2016-03-11 15:52:18 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
fields.uniq
|
|
|
|
end
|
|
|
|
|
2020-05-25 20:07:00 -04:00
|
|
|
def self.human_user_id?(user_id)
|
|
|
|
user_id > 0
|
|
|
|
end
|
|
|
|
|
2019-02-08 13:34:54 -05:00
|
|
|
def human?
|
2020-05-25 20:07:00 -04:00
|
|
|
User.human_user_id?(self.id)
|
2019-02-08 13:34:54 -05:00
|
|
|
end
|
|
|
|
|
2019-03-11 19:58:14 -04:00
|
|
|
def bot?
|
|
|
|
!self.human?
|
|
|
|
end
|
|
|
|
|
2015-02-05 22:38:51 -05:00
|
|
|
def effective_locale
|
|
|
|
if SiteSetting.allow_user_locale && self.locale.present?
|
|
|
|
self.locale
|
|
|
|
else
|
|
|
|
SiteSetting.default_locale
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-04-21 18:23:42 -04:00
|
|
|
def bookmarks_of_type(type)
|
|
|
|
bookmarks.where(bookmarkable_type: type)
|
|
|
|
end
|
|
|
|
|
2013-03-31 12:51:13 -04:00
|
|
|
EMAIL = %r{([^@]+)@([^\.]+)}
|
2020-04-30 02:48:34 -04:00
|
|
|
FROM_STAGED = "from_staged"
|
2013-03-31 12:51:13 -04:00
|
|
|
|
2013-04-12 18:46:55 -04:00
|
|
|
def self.new_from_params(params)
|
|
|
|
user = User.new
|
|
|
|
user.name = params[:name]
|
|
|
|
user.email = params[:email]
|
|
|
|
user.password = params[:password]
|
|
|
|
user.username = params[:username]
|
|
|
|
user
|
|
|
|
end
|
|
|
|
|
2020-03-17 11:48:24 -04:00
|
|
|
def unstage!
|
2018-05-14 06:03:15 -04:00
|
|
|
if self.staged
|
2020-03-17 11:48:24 -04:00
|
|
|
ActiveRecord::Base.transaction do
|
|
|
|
self.staged = false
|
|
|
|
self.custom_fields[FROM_STAGED] = true
|
|
|
|
self.notifications.destroy_all
|
|
|
|
save!
|
|
|
|
end
|
2018-05-13 11:00:02 -04:00
|
|
|
|
2020-03-17 11:48:24 -04:00
|
|
|
DiscourseEvent.trigger(:user_unstaged, self)
|
2018-01-19 09:29:15 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-05-17 02:51:48 -04:00
|
|
|
def self.suggest_name(string)
|
|
|
|
return "" if string.blank?
|
2018-05-17 04:34:16 -04:00
|
|
|
(string[/\A[^@]+/].presence || string[/[^@]+\z/]).tr(".", " ").titleize
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-04-29 02:33:24 -04:00
|
|
|
def self.find_by_username_or_email(username_or_email)
|
2013-10-28 01:29:07 -04:00
|
|
|
if username_or_email.include?('@')
|
|
|
|
find_by_email(username_or_email)
|
2013-06-18 20:31:19 -04:00
|
|
|
else
|
2013-10-28 01:29:07 -04:00
|
|
|
find_by_username(username_or_email)
|
2013-06-18 20:31:19 -04:00
|
|
|
end
|
2013-04-29 02:33:24 -04:00
|
|
|
end
|
|
|
|
|
2021-07-05 00:56:32 -04:00
|
|
|
def self.find_by_email(email, primary: false)
|
|
|
|
if primary
|
|
|
|
self.with_primary_email(Email.downcase(email)).first
|
|
|
|
else
|
|
|
|
self.with_email(Email.downcase(email)).first
|
|
|
|
end
|
2013-10-24 03:59:58 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.find_by_username(username)
|
2019-04-23 06:22:47 -04:00
|
|
|
find_by(username_lower: normalize_username(username))
|
2013-10-24 03:59:58 -04:00
|
|
|
end
|
|
|
|
|
2022-09-25 23:58:40 -04:00
|
|
|
def in_any_groups?(group_ids)
|
|
|
|
group_ids.include?(Group::AUTO_GROUPS[:everyone]) || (group_ids & belonging_to_group_ids).any?
|
|
|
|
end
|
|
|
|
|
|
|
|
def belonging_to_group_ids
|
|
|
|
@belonging_to_group_ids ||= group_users.pluck(:group_id)
|
|
|
|
end
|
|
|
|
|
2018-08-24 18:41:03 -04:00
|
|
|
def group_granted_trust_level
|
|
|
|
GroupUser
|
|
|
|
.where(user_id: id)
|
|
|
|
.includes(:group)
|
|
|
|
.maximum("groups.grant_trust_level")
|
|
|
|
end
|
2018-12-18 02:41:42 -05:00
|
|
|
|
|
|
|
def visible_groups
|
|
|
|
groups.visible_groups(self)
|
|
|
|
end
|
2018-08-24 18:41:03 -04:00
|
|
|
|
2013-04-29 02:33:24 -04:00
|
|
|
def enqueue_welcome_message(message_type)
|
|
|
|
return unless SiteSetting.send_welcome_message?
|
|
|
|
Jobs.enqueue(:send_system_message, user_id: id, message_type: message_type)
|
|
|
|
end
|
|
|
|
|
2018-06-22 12:51:07 -04:00
|
|
|
def enqueue_member_welcome_message
|
|
|
|
return unless SiteSetting.send_tl1_welcome_message?
|
|
|
|
Jobs.enqueue(:send_system_message, user_id: id, message_type: "welcome_tl1_user")
|
|
|
|
end
|
|
|
|
|
2020-09-21 20:17:52 -04:00
|
|
|
def enqueue_tl2_promotion_message
|
|
|
|
return unless SiteSetting.send_tl2_promotion_message
|
|
|
|
Jobs.enqueue(:send_system_message, user_id: id, message_type: "tl2_promotion_message")
|
|
|
|
end
|
|
|
|
|
2019-11-05 07:45:55 -05:00
|
|
|
def enqueue_staff_welcome_message(role)
|
|
|
|
return unless staff?
|
2019-11-27 18:49:46 -05:00
|
|
|
return if role == :admin && User.real.where(admin: true).count == 1
|
2019-11-05 07:45:55 -05:00
|
|
|
|
|
|
|
Jobs.enqueue(
|
|
|
|
:send_system_message,
|
|
|
|
user_id: id,
|
|
|
|
message_type: 'welcome_staff',
|
|
|
|
message_options: {
|
2022-03-24 21:07:21 -04:00
|
|
|
role: role.to_s
|
2019-11-05 07:45:55 -05:00
|
|
|
}
|
|
|
|
)
|
2019-10-28 09:58:45 -04:00
|
|
|
end
|
|
|
|
|
2015-01-16 17:30:46 -05:00
|
|
|
def change_username(new_username, actor = nil)
|
2015-03-06 16:44:54 -05:00
|
|
|
UsernameChanger.change(self, new_username, actor)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-09-12 17:46:43 -04:00
|
|
|
def created_topic_count
|
2014-07-28 13:17:37 -04:00
|
|
|
stat.topic_count
|
2013-09-12 17:46:43 -04:00
|
|
|
end
|
2013-02-26 11:27:59 -05:00
|
|
|
|
2014-07-28 13:17:37 -04:00
|
|
|
alias_method :topic_count, :created_topic_count
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
# tricky, we need our bus to be subscribed from the right spot
|
|
|
|
def sync_notification_channel_position
|
|
|
|
@unread_notifications_by_type = nil
|
2015-05-03 22:21:00 -04:00
|
|
|
self.notification_channel_position = MessageBus.last_id("/notification/#{id}")
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def invited_by
|
2021-03-06 06:29:35 -05:00
|
|
|
used_invite = Invite.with_deleted.joins(:invited_users).where("invited_users.user_id = ?", self.id).first
|
2013-02-28 08:08:56 -05:00
|
|
|
used_invite.try(:invited_by)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-08-08 22:56:08 -04:00
|
|
|
def should_validate_email_address?
|
2017-04-26 14:47:36 -04:00
|
|
|
!skip_email_validation && !staged?
|
2016-09-07 14:05:46 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def self.email_hash(email)
|
2013-02-05 21:44:49 -05:00
|
|
|
Digest::MD5.hexdigest(email.strip.downcase)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def email_hash
|
2013-02-28 08:08:56 -05:00
|
|
|
User.email_hash(email)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def reload
|
2015-04-17 02:01:20 -04:00
|
|
|
@unread_notifications = nil
|
2022-08-03 01:57:59 -04:00
|
|
|
@all_unread_notifications_count = nil
|
2014-10-13 06:26:30 -04:00
|
|
|
@unread_total_notifications = nil
|
2013-05-16 02:37:47 -04:00
|
|
|
@unread_pms = nil
|
2020-03-31 19:09:20 -04:00
|
|
|
@unread_bookmarks = nil
|
|
|
|
@unread_high_prios = nil
|
2020-03-02 14:22:49 -05:00
|
|
|
@user_fields_cache = nil
|
2020-01-02 08:04:08 -05:00
|
|
|
@ignored_user_ids = nil
|
|
|
|
@muted_user_ids = nil
|
2022-09-25 23:58:40 -04:00
|
|
|
@belonging_to_group_ids = nil
|
2013-02-05 14:16:51 -05:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2020-01-02 08:04:08 -05:00
|
|
|
def ignored_user_ids
|
|
|
|
@ignored_user_ids ||= ignored_users.pluck(:id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def muted_user_ids
|
|
|
|
@muted_user_ids ||= muted_users.pluck(:id)
|
|
|
|
end
|
|
|
|
|
2016-12-12 14:20:25 -05:00
|
|
|
def unread_notifications_of_type(notification_type)
|
|
|
|
# perf critical, much more efficient than AR
|
2018-05-25 20:09:48 -04:00
|
|
|
sql = <<~SQL
|
|
|
|
SELECT COUNT(*)
|
|
|
|
FROM notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL
|
2020-03-31 19:09:20 -04:00
|
|
|
AND n.notification_type = :notification_type
|
2018-05-25 20:09:48 -04:00
|
|
|
AND n.user_id = :user_id
|
|
|
|
AND NOT read
|
|
|
|
SQL
|
2016-12-12 14:20:25 -05:00
|
|
|
|
2018-06-19 02:13:14 -04:00
|
|
|
# to avoid coalesce we do to_i
|
2020-03-31 19:09:20 -04:00
|
|
|
DB.query_single(sql, user_id: id, notification_type: notification_type)[0].to_i
|
2016-12-12 14:20:25 -05:00
|
|
|
end
|
2015-04-17 02:01:20 -04:00
|
|
|
|
2020-03-31 19:09:20 -04:00
|
|
|
def unread_notifications_of_priority(high_priority:)
|
|
|
|
# perf critical, much more efficient than AR
|
|
|
|
sql = <<~SQL
|
|
|
|
SELECT COUNT(*)
|
|
|
|
FROM notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL
|
|
|
|
AND n.high_priority = :high_priority
|
|
|
|
AND n.user_id = :user_id
|
|
|
|
AND NOT read
|
|
|
|
SQL
|
|
|
|
|
|
|
|
# to avoid coalesce we do to_i
|
|
|
|
DB.query_single(sql, user_id: id, high_priority: high_priority)[0].to_i
|
|
|
|
end
|
|
|
|
|
2022-08-30 21:16:28 -04:00
|
|
|
MAX_UNREAD_BACKLOG = 400
|
|
|
|
def grouped_unread_notifications
|
|
|
|
results = DB.query(<<~SQL, user_id: self.id, limit: MAX_UNREAD_BACKLOG)
|
2022-08-08 10:24:04 -04:00
|
|
|
SELECT X.notification_type AS type, COUNT(*) FROM (
|
|
|
|
SELECT n.notification_type
|
|
|
|
FROM notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL
|
|
|
|
AND n.user_id = :user_id
|
|
|
|
AND NOT n.read
|
|
|
|
LIMIT :limit
|
|
|
|
) AS X
|
|
|
|
GROUP BY X.notification_type
|
|
|
|
SQL
|
|
|
|
results.map! { |row| [row.type, row.count] }
|
|
|
|
results.to_h
|
|
|
|
end
|
|
|
|
|
2020-03-31 19:09:20 -04:00
|
|
|
###
|
|
|
|
# DEPRECATED: This is only maintained for backwards compat until v2.5. There
|
|
|
|
# may be inconsistencies with counts in the UI because of this, because unread
|
|
|
|
# high priority includes PMs AND bookmark reminders.
|
2016-12-12 14:20:25 -05:00
|
|
|
def unread_private_messages
|
2020-03-31 19:09:20 -04:00
|
|
|
@unread_pms ||= unread_high_priority_notifications
|
|
|
|
end
|
|
|
|
|
|
|
|
def unread_high_priority_notifications
|
|
|
|
@unread_high_prios ||= unread_notifications_of_priority(high_priority: true)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2018-10-23 20:53:28 -04:00
|
|
|
# PERF: This safeguard is in place to avoid situations where
|
|
|
|
# a user with enormous amounts of unread data can issue extremely
|
|
|
|
# expensive queries
|
|
|
|
MAX_UNREAD_NOTIFICATIONS = 99
|
|
|
|
|
2018-10-23 21:10:27 -04:00
|
|
|
def self.max_unread_notifications
|
|
|
|
@max_unread_notifications ||= MAX_UNREAD_NOTIFICATIONS
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.max_unread_notifications=(val)
|
|
|
|
@max_unread_notifications = val
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def unread_notifications
|
2018-05-25 20:09:48 -04:00
|
|
|
@unread_notifications ||= begin
|
|
|
|
# perf critical, much more efficient than AR
|
|
|
|
sql = <<~SQL
|
2018-10-23 21:10:27 -04:00
|
|
|
SELECT COUNT(*) FROM (
|
|
|
|
SELECT 1 FROM
|
|
|
|
notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL AND
|
2020-03-31 19:09:20 -04:00
|
|
|
n.high_priority = FALSE AND
|
2018-10-23 21:10:27 -04:00
|
|
|
n.user_id = :user_id AND
|
|
|
|
n.id > :seen_notification_id AND
|
|
|
|
NOT read
|
|
|
|
LIMIT :limit
|
|
|
|
) AS X
|
2018-05-25 20:09:48 -04:00
|
|
|
SQL
|
|
|
|
|
2018-06-19 02:13:14 -04:00
|
|
|
DB.query_single(sql,
|
2018-05-25 20:09:48 -04:00
|
|
|
user_id: id,
|
|
|
|
seen_notification_id: seen_notification_id,
|
2018-10-23 21:10:27 -04:00
|
|
|
limit: User.max_unread_notifications
|
2018-06-19 02:13:14 -04:00
|
|
|
)[0].to_i
|
2018-05-25 20:09:48 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-02-05 21:44:49 -05:00
|
|
|
|
2022-08-03 01:57:59 -04:00
|
|
|
def all_unread_notifications_count
|
|
|
|
@all_unread_notifications_count ||= begin
|
|
|
|
sql = <<~SQL
|
|
|
|
SELECT COUNT(*) FROM (
|
|
|
|
SELECT 1 FROM
|
|
|
|
notifications n
|
|
|
|
LEFT JOIN topics t ON t.id = n.topic_id
|
|
|
|
WHERE t.deleted_at IS NULL AND
|
|
|
|
n.user_id = :user_id AND
|
|
|
|
n.id > :seen_notification_id AND
|
|
|
|
NOT read
|
|
|
|
LIMIT :limit
|
|
|
|
) AS X
|
|
|
|
SQL
|
|
|
|
|
|
|
|
DB.query_single(sql,
|
|
|
|
user_id: id,
|
|
|
|
seen_notification_id: seen_notification_id,
|
|
|
|
limit: User.max_unread_notifications
|
|
|
|
)[0].to_i
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-10-13 06:26:30 -04:00
|
|
|
def total_unread_notifications
|
|
|
|
@unread_total_notifications ||= notifications.where("read = false").count
|
|
|
|
end
|
|
|
|
|
2022-07-28 04:16:33 -04:00
|
|
|
def reviewable_count
|
|
|
|
Reviewable.list_for(self).count
|
|
|
|
end
|
|
|
|
|
2022-08-03 01:57:59 -04:00
|
|
|
def unseen_reviewable_count
|
|
|
|
Reviewable.unseen_list_for(self).count
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def saw_notification_id(notification_id)
|
2022-09-12 14:19:25 -04:00
|
|
|
Discourse.deprecate(<<~TEXT, since: "2.9", drop_from: "3.0")
|
|
|
|
User#saw_notification_id is deprecated. Please use User#bump_last_seen_notification! instead.
|
|
|
|
TEXT
|
2016-09-15 22:02:19 -04:00
|
|
|
if seen_notification_id.to_i < notification_id.to_i
|
|
|
|
update_columns(seen_notification_id: notification_id.to_i)
|
|
|
|
true
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2022-09-12 14:19:25 -04:00
|
|
|
def bump_last_seen_notification!
|
|
|
|
query = self.notifications.visible
|
|
|
|
if seen_notification_id
|
|
|
|
query = query.where("notifications.id > ?", seen_notification_id)
|
|
|
|
end
|
|
|
|
if max_notification_id = query.maximum(:id)
|
|
|
|
update!(seen_notification_id: max_notification_id)
|
|
|
|
true
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-08-03 01:57:59 -04:00
|
|
|
def bump_last_seen_reviewable!
|
|
|
|
query = Reviewable.unseen_list_for(self, preload: false)
|
|
|
|
|
|
|
|
if last_seen_reviewable_id
|
|
|
|
query = query.where("id > ?", last_seen_reviewable_id)
|
|
|
|
end
|
|
|
|
max_reviewable_id = query.maximum(:id)
|
|
|
|
|
|
|
|
if max_reviewable_id
|
|
|
|
update!(last_seen_reviewable_id: max_reviewable_id)
|
|
|
|
publish_reviewable_counts(unseen_reviewable_count: self.unseen_reviewable_count)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def publish_reviewable_counts(data)
|
|
|
|
MessageBus.publish("/reviewable_counts/#{self.id}", data, user_ids: [self.id])
|
|
|
|
end
|
|
|
|
|
2016-11-16 03:20:38 -05:00
|
|
|
TRACK_FIRST_NOTIFICATION_READ_DURATION = 1.week.to_i
|
|
|
|
|
2016-11-08 03:12:40 -05:00
|
|
|
def read_first_notification?
|
2017-02-17 10:28:38 -05:00
|
|
|
if (trust_level > TrustLevel[1] ||
|
2020-08-18 04:13:40 -04:00
|
|
|
(first_seen_at.present? && first_seen_at < TRACK_FIRST_NOTIFICATION_READ_DURATION.seconds.ago) ||
|
|
|
|
user_option.skip_new_user_tips)
|
2016-11-16 03:20:38 -05:00
|
|
|
|
|
|
|
return true
|
|
|
|
end
|
|
|
|
|
2016-11-16 20:44:00 -05:00
|
|
|
self.seen_notification_id == 0 ? false : true
|
2016-11-08 03:12:40 -05:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def publish_notifications_state
|
2021-11-21 22:38:49 -05:00
|
|
|
return if !self.allow_live_notifications?
|
|
|
|
|
2018-05-25 20:09:48 -04:00
|
|
|
# publish last notification json with the message so we can apply an update
|
2018-06-28 11:04:40 -04:00
|
|
|
notification = notifications.visible.order('notifications.created_at desc').first
|
2015-09-03 23:20:33 -04:00
|
|
|
json = NotificationSerializer.new(notification).as_json if notification
|
|
|
|
|
2020-04-30 02:48:34 -04:00
|
|
|
sql = (<<~SQL)
|
2016-02-15 03:29:35 -05:00
|
|
|
SELECT * FROM (
|
|
|
|
SELECT n.id, n.read FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
2020-03-31 19:09:20 -04:00
|
|
|
n.high_priority AND
|
2016-02-15 03:29:35 -05:00
|
|
|
n.user_id = :user_id AND
|
|
|
|
NOT read
|
|
|
|
ORDER BY n.id DESC
|
|
|
|
LIMIT 20
|
|
|
|
) AS x
|
|
|
|
UNION ALL
|
|
|
|
SELECT * FROM (
|
|
|
|
SELECT n.id, n.read FROM notifications n
|
|
|
|
LEFT JOIN topics t ON n.topic_id = t.id
|
|
|
|
WHERE
|
|
|
|
t.deleted_at IS NULL AND
|
2020-03-31 19:09:20 -04:00
|
|
|
(n.high_priority = FALSE OR read) AND
|
2016-02-15 03:29:35 -05:00
|
|
|
n.user_id = :user_id
|
|
|
|
ORDER BY n.id DESC
|
|
|
|
LIMIT 20
|
|
|
|
) AS y
|
2018-06-19 02:13:14 -04:00
|
|
|
SQL
|
2016-02-15 03:29:35 -05:00
|
|
|
|
2020-03-31 19:09:20 -04:00
|
|
|
recent = DB.query(sql, user_id: id).map! do |r|
|
2018-06-19 02:13:14 -04:00
|
|
|
[r.id, r.read]
|
2016-02-15 03:29:35 -05:00
|
|
|
end
|
|
|
|
|
2018-05-25 20:09:48 -04:00
|
|
|
payload = {
|
|
|
|
unread_notifications: unread_notifications,
|
|
|
|
unread_private_messages: unread_private_messages,
|
2020-03-31 19:09:20 -04:00
|
|
|
unread_high_priority_notifications: unread_high_priority_notifications,
|
2018-05-25 20:09:48 -04:00
|
|
|
read_first_notification: read_first_notification?,
|
|
|
|
last_notification: json,
|
|
|
|
recent: recent,
|
|
|
|
seen_notification_id: seen_notification_id,
|
|
|
|
}
|
|
|
|
|
2022-08-03 01:57:59 -04:00
|
|
|
if self.redesigned_user_menu_enabled?
|
|
|
|
payload[:all_unread_notifications_count] = all_unread_notifications_count
|
2022-08-30 21:16:28 -04:00
|
|
|
payload[:grouped_unread_notifications] = grouped_unread_notifications
|
2022-08-03 01:57:59 -04:00
|
|
|
end
|
|
|
|
|
2018-05-25 20:09:48 -04:00
|
|
|
MessageBus.publish("/notification/#{id}", payload, user_ids: [id])
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2020-12-18 10:03:51 -05:00
|
|
|
def publish_do_not_disturb(ends_at: nil)
|
2022-06-17 00:24:15 -04:00
|
|
|
MessageBus.publish("/do-not-disturb/#{id}", { ends_at: ends_at&.httpdate }, user_ids: [id])
|
2020-12-18 10:03:51 -05:00
|
|
|
end
|
|
|
|
|
2022-05-30 05:41:53 -04:00
|
|
|
def publish_user_status(status)
|
2022-07-05 11:12:22 -04:00
|
|
|
if status
|
|
|
|
payload = {
|
|
|
|
description: status.description,
|
|
|
|
emoji: status.emoji,
|
|
|
|
ends_at: status.ends_at&.iso8601
|
|
|
|
}
|
|
|
|
else
|
|
|
|
payload = nil
|
|
|
|
end
|
2022-06-17 00:24:15 -04:00
|
|
|
|
2022-07-07 09:37:05 -04:00
|
|
|
MessageBus.publish("/user-status", { id => payload }, group_ids: [Group::AUTO_GROUPS[:trust_level_0]])
|
2022-05-30 05:41:53 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def password=(password)
|
2013-02-05 21:44:49 -05:00
|
|
|
# special case for passwordless accounts
|
2015-06-05 13:09:02 -04:00
|
|
|
unless password.blank?
|
|
|
|
@raw_password = password
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-12-19 15:12:03 -05:00
|
|
|
def password
|
|
|
|
'' # so that validator doesn't complain that a password attribute doesn't exist
|
|
|
|
end
|
|
|
|
|
2013-02-12 15:42:04 -05:00
|
|
|
# Indicate that this is NOT a passwordless account for the purposes of validation
|
2013-02-28 08:08:56 -05:00
|
|
|
def password_required!
|
2013-02-12 15:42:04 -05:00
|
|
|
@password_required = true
|
|
|
|
end
|
|
|
|
|
2013-12-19 15:12:03 -05:00
|
|
|
def password_required?
|
|
|
|
!!@password_required
|
|
|
|
end
|
|
|
|
|
2017-11-30 23:19:24 -05:00
|
|
|
def password_validation_required?
|
|
|
|
password_required? || @raw_password.present?
|
|
|
|
end
|
|
|
|
|
2014-01-21 12:42:20 -05:00
|
|
|
def has_password?
|
|
|
|
password_hash.present?
|
|
|
|
end
|
|
|
|
|
2013-12-19 15:12:03 -05:00
|
|
|
def password_validator
|
|
|
|
PasswordValidator.new(attributes: :password).validate_each(self, :password, @raw_password)
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def confirm_password?(password)
|
2013-02-28 08:08:56 -05:00
|
|
|
return false unless password_hash && salt
|
|
|
|
self.password_hash == hash_password(password, salt)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-10-11 13:33:23 -04:00
|
|
|
|
2016-06-20 16:38:15 -04:00
|
|
|
def new_user_posting_on_first_day?
|
2015-03-26 01:48:36 -04:00
|
|
|
!staff? &&
|
|
|
|
trust_level < TrustLevel[2] &&
|
2018-06-20 20:25:03 -04:00
|
|
|
(trust_level == TrustLevel[0] || self.first_post_created_at.nil? || self.first_post_created_at >= 24.hours.ago)
|
2015-03-26 01:48:36 -04:00
|
|
|
end
|
|
|
|
|
2013-10-11 13:33:23 -04:00
|
|
|
def new_user?
|
2015-03-26 01:04:32 -04:00
|
|
|
(created_at >= 24.hours.ago || trust_level == TrustLevel[0]) &&
|
|
|
|
trust_level < TrustLevel[2] &&
|
|
|
|
!staff?
|
2013-10-11 13:33:23 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-02-12 00:41:04 -05:00
|
|
|
def seen_before?
|
|
|
|
last_seen_at.present?
|
|
|
|
end
|
|
|
|
|
2021-11-21 22:38:49 -05:00
|
|
|
def seen_since?(datetime)
|
|
|
|
seen_before? && last_seen_at >= datetime
|
|
|
|
end
|
|
|
|
|
2015-07-07 12:31:07 -04:00
|
|
|
def create_visit_record!(date, opts = {})
|
|
|
|
user_stat.update_column(:days_visited, user_stat.days_visited + 1)
|
|
|
|
user_visits.create!(visited_at: date, posts_read: opts[:posts_read] || 0, mobile: opts[:mobile] || false)
|
|
|
|
end
|
|
|
|
|
2014-01-24 15:19:20 -05:00
|
|
|
def visit_record_for(date)
|
2014-05-06 09:41:59 -04:00
|
|
|
user_visits.find_by(visited_at: date)
|
2013-02-12 00:41:04 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_visit_record!(date)
|
2014-01-24 15:19:20 -05:00
|
|
|
create_visit_record!(date) unless visit_record_for(date)
|
|
|
|
end
|
2019-11-24 19:49:27 -05:00
|
|
|
|
|
|
|
def update_timezone_if_missing(timezone)
|
|
|
|
return if timezone.blank? || !TimezoneValidator.valid?(timezone)
|
|
|
|
|
|
|
|
# we only want to update the user's timezone if they have not set it themselves
|
|
|
|
UserOption
|
|
|
|
.where(user_id: self.id, timezone: nil)
|
|
|
|
.update_all(timezone: timezone)
|
|
|
|
end
|
2014-01-24 15:19:20 -05:00
|
|
|
|
2015-07-07 12:31:07 -04:00
|
|
|
def update_posts_read!(num_posts, opts = {})
|
|
|
|
now = opts[:at] || Time.zone.now
|
|
|
|
_retry = opts[:retry] || false
|
|
|
|
|
2014-01-24 15:19:20 -05:00
|
|
|
if user_visit = visit_record_for(now.to_date)
|
|
|
|
user_visit.posts_read += num_posts
|
2015-07-07 12:31:07 -04:00
|
|
|
user_visit.mobile = true if opts[:mobile]
|
2014-01-24 15:19:20 -05:00
|
|
|
user_visit.save
|
|
|
|
user_visit
|
|
|
|
else
|
2015-05-31 21:55:07 -04:00
|
|
|
begin
|
2015-07-07 12:31:07 -04:00
|
|
|
create_visit_record!(now.to_date, posts_read: num_posts, mobile: opts.fetch(:mobile, false))
|
2015-05-31 21:55:07 -04:00
|
|
|
rescue ActiveRecord::RecordNotUnique
|
|
|
|
if !_retry
|
2015-08-23 20:28:38 -04:00
|
|
|
update_posts_read!(num_posts, opts.merge(retry: true))
|
2015-05-31 21:55:07 -04:00
|
|
|
else
|
|
|
|
raise
|
|
|
|
end
|
|
|
|
end
|
2013-02-12 00:41:04 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-02 18:50:56 -04:00
|
|
|
def self.update_ip_address!(user_id, new_ip:, old_ip:)
|
|
|
|
unless old_ip == new_ip || new_ip.blank?
|
|
|
|
|
|
|
|
DB.exec(<<~SQL, user_id: user_id, ip_address: new_ip)
|
|
|
|
UPDATE users
|
|
|
|
SET ip_address = :ip_address
|
|
|
|
WHERE id = :user_id
|
|
|
|
SQL
|
2020-09-16 22:55:29 -04:00
|
|
|
|
|
|
|
if SiteSetting.keep_old_ip_address_count > 0
|
2022-05-02 18:50:56 -04:00
|
|
|
DB.exec(<<~SQL, user_id: user_id, ip_address: new_ip, current_timestamp: Time.zone.now)
|
2020-09-16 22:55:29 -04:00
|
|
|
INSERT INTO user_ip_address_histories (user_id, ip_address, created_at, updated_at)
|
|
|
|
VALUES (:user_id, :ip_address, :current_timestamp, :current_timestamp)
|
|
|
|
ON CONFLICT (user_id, ip_address)
|
|
|
|
DO
|
|
|
|
UPDATE SET updated_at = :current_timestamp
|
|
|
|
SQL
|
|
|
|
|
2022-05-02 18:50:56 -04:00
|
|
|
DB.exec(<<~SQL, user_id: user_id, offset: SiteSetting.keep_old_ip_address_count)
|
2020-09-16 22:55:29 -04:00
|
|
|
DELETE FROM user_ip_address_histories
|
|
|
|
WHERE id IN (
|
|
|
|
SELECT
|
|
|
|
id
|
|
|
|
FROM user_ip_address_histories
|
|
|
|
WHERE user_id = :user_id
|
|
|
|
ORDER BY updated_at DESC
|
|
|
|
OFFSET :offset
|
|
|
|
)
|
|
|
|
SQL
|
|
|
|
end
|
2013-02-24 05:42:04 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-02 18:50:56 -04:00
|
|
|
def update_ip_address!(new_ip_address)
|
|
|
|
User.update_ip_address!(id, new_ip: new_ip_address, old_ip: ip_address)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.last_seen_redis_key(user_id, now)
|
2013-10-23 17:24:50 -04:00
|
|
|
now_date = now.to_date
|
2022-05-02 18:50:56 -04:00
|
|
|
"user:#{user_id}:#{now_date}"
|
|
|
|
end
|
|
|
|
|
|
|
|
def last_seen_redis_key(now)
|
|
|
|
User.last_seen_redis_key(id, now)
|
2020-08-30 18:54:42 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def clear_last_seen_cache!(now = Time.zone.now)
|
|
|
|
Discourse.redis.del(last_seen_redis_key(now))
|
|
|
|
end
|
|
|
|
|
2022-05-02 18:50:56 -04:00
|
|
|
def self.should_update_last_seen?(user_id, now = Time.zone.now)
|
|
|
|
return true if SiteSetting.active_user_rate_limit_secs <= 0
|
2020-08-30 18:54:42 -04:00
|
|
|
|
2022-05-02 18:50:56 -04:00
|
|
|
Discourse.redis.set(
|
|
|
|
last_seen_redis_key(user_id, now), "1",
|
|
|
|
nx: true,
|
|
|
|
ex: SiteSetting.active_user_rate_limit_secs
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def update_last_seen!(now = Time.zone.now, force: false)
|
|
|
|
if !force
|
|
|
|
return if !User.should_update_last_seen?(self.id, now)
|
2020-08-30 18:54:42 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-10-23 17:24:50 -04:00
|
|
|
update_previous_visit(now)
|
|
|
|
# using update_column to avoid the AR transaction
|
|
|
|
update_column(:last_seen_at, now)
|
2016-05-21 09:17:54 -04:00
|
|
|
update_column(:first_seen_at, now) unless self.first_seen_at
|
2017-03-31 18:30:59 -04:00
|
|
|
|
|
|
|
DiscourseEvent.trigger(:user_seen, self)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-08-13 16:08:29 -04:00
|
|
|
def self.gravatar_template(email)
|
2020-03-12 11:23:55 -04:00
|
|
|
"//#{SiteSetting.gravatar_base_url}/avatar/#{self.email_hash(email)}.png?s={size}&r=pg&d=identicon"
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2013-03-08 15:58:37 -05:00
|
|
|
# Don't pass this up to the client - it's meant for server side use
|
2013-08-13 16:08:29 -04:00
|
|
|
# This is used in
|
|
|
|
# - self oneboxes in open graph data
|
|
|
|
# - emails
|
2013-03-08 15:58:37 -05:00
|
|
|
def small_avatar_url
|
2014-05-22 03:37:02 -04:00
|
|
|
avatar_template_url.gsub("{size}", "45")
|
2013-03-08 15:58:37 -05:00
|
|
|
end
|
|
|
|
|
2014-05-22 03:37:02 -04:00
|
|
|
def avatar_template_url
|
2015-06-12 06:02:36 -04:00
|
|
|
UrlHelper.schemaless UrlHelper.absolute avatar_template
|
2013-09-10 15:18:22 -04:00
|
|
|
end
|
|
|
|
|
2018-07-18 06:57:43 -04:00
|
|
|
def self.username_hash(username)
|
|
|
|
username.each_char.reduce(0) do |result, char|
|
|
|
|
[((result << 5) - result) + char.ord].pack('L').unpack('l').first
|
|
|
|
end.abs
|
|
|
|
end
|
|
|
|
|
2015-06-26 13:37:50 -04:00
|
|
|
def self.default_template(username)
|
|
|
|
if SiteSetting.default_avatars.present?
|
2018-07-18 06:57:43 -04:00
|
|
|
urls = SiteSetting.default_avatars.split("\n")
|
|
|
|
return urls[username_hash(username) % urls.size] if urls.present?
|
2015-06-26 13:37:50 -04:00
|
|
|
end
|
2018-07-18 06:57:43 -04:00
|
|
|
|
|
|
|
system_avatar_template(username)
|
2015-06-26 13:37:50 -04:00
|
|
|
end
|
|
|
|
|
2015-09-10 20:12:40 -04:00
|
|
|
def self.avatar_template(username, uploaded_avatar_id)
|
2014-05-22 03:37:02 -04:00
|
|
|
username ||= ""
|
2015-09-11 09:04:29 -04:00
|
|
|
return default_template(username) if !uploaded_avatar_id
|
2015-05-29 12:51:17 -04:00
|
|
|
hostname = RailsMultisite::ConnectionManagement.current_hostname
|
|
|
|
UserAvatar.local_avatar_template(hostname, username.downcase, uploaded_avatar_id)
|
2014-05-22 03:37:02 -04:00
|
|
|
end
|
|
|
|
|
2015-09-11 04:14:34 -04:00
|
|
|
def self.system_avatar_template(username)
|
2019-04-24 17:18:52 -04:00
|
|
|
normalized_username = normalize_username(username)
|
|
|
|
|
2015-09-11 04:14:34 -04:00
|
|
|
# TODO it may be worth caching this in a distributed cache, should be benched
|
|
|
|
if SiteSetting.external_system_avatars_enabled
|
|
|
|
url = SiteSetting.external_system_avatars_url.dup
|
2020-10-09 07:51:24 -04:00
|
|
|
url = +"#{Discourse.base_path}#{url}" unless url =~ /^https?:\/\//
|
2019-04-24 17:18:52 -04:00
|
|
|
url.gsub! "{color}", letter_avatar_color(normalized_username)
|
2019-12-11 21:49:21 -05:00
|
|
|
url.gsub! "{username}", UrlHelper.encode_component(username)
|
|
|
|
url.gsub! "{first_letter}", UrlHelper.encode_component(normalized_username.grapheme_clusters.first)
|
2015-10-02 03:27:54 -04:00
|
|
|
url.gsub! "{hostname}", Discourse.current_hostname
|
2015-09-11 04:14:34 -04:00
|
|
|
url
|
2015-09-10 20:12:40 -04:00
|
|
|
else
|
2020-10-09 07:51:24 -04:00
|
|
|
"#{Discourse.base_path}/letter_avatar/#{normalized_username}/{size}/#{LetterAvatar.version}.png"
|
2015-09-10 20:12:40 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.letter_avatar_color(username)
|
2015-09-11 09:04:29 -04:00
|
|
|
username ||= ""
|
2019-03-18 11:24:21 -04:00
|
|
|
if SiteSetting.restrict_letter_avatar_colors.present?
|
|
|
|
hex_length = 6
|
|
|
|
colors = SiteSetting.restrict_letter_avatar_colors
|
|
|
|
length = colors.count("|") + 1
|
|
|
|
num = color_index(username, length)
|
|
|
|
index = (num * hex_length) + num
|
|
|
|
colors[index, hex_length]
|
|
|
|
else
|
|
|
|
color = LetterAvatar::COLORS[color_index(username, LetterAvatar::COLORS.length)]
|
|
|
|
color.map { |c| c.to_s(16).rjust(2, '0') }.join
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.color_index(username, length)
|
|
|
|
Digest::MD5.hexdigest(username)[0...15].to_i(16) % length
|
2014-05-30 00:17:35 -04:00
|
|
|
end
|
|
|
|
|
2021-04-27 16:28:15 -04:00
|
|
|
def is_system_user?
|
|
|
|
id == Discourse::SYSTEM_USER_ID
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def avatar_template
|
2021-04-27 16:28:15 -04:00
|
|
|
use_small_logo = is_system_user? &&
|
2021-01-18 12:09:07 -05:00
|
|
|
SiteSetting.logo_small && SiteSetting.use_site_small_logo_as_system_avatar
|
|
|
|
|
|
|
|
if use_small_logo
|
2021-01-31 20:35:41 -05:00
|
|
|
Discourse.store.cdn_url(SiteSetting.logo_small.url)
|
2021-01-08 08:40:00 -05:00
|
|
|
else
|
|
|
|
self.class.avatar_template(username, uploaded_avatar_id)
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
# The following count methods are somewhat slow - definitely don't use them in a loop.
|
2013-03-06 02:52:24 -05:00
|
|
|
# They might need to be denormalized
|
2013-02-05 14:16:51 -05:00
|
|
|
def like_count
|
2013-02-28 08:08:56 -05:00
|
|
|
UserAction.where(user_id: id, action_type: UserAction::WAS_LIKED).count
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-08-22 15:23:10 -04:00
|
|
|
def like_given_count
|
|
|
|
UserAction.where(user_id: id, action_type: UserAction::LIKE).count
|
2014-08-22 14:37:00 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def post_count
|
2014-07-28 13:17:37 -04:00
|
|
|
stat.post_count
|
2014-02-20 12:29:40 -05:00
|
|
|
end
|
|
|
|
|
2021-08-02 10:15:53 -04:00
|
|
|
def post_edits_count
|
|
|
|
stat.post_edits_count
|
|
|
|
end
|
|
|
|
|
|
|
|
def increment_post_edits_count
|
|
|
|
stat.increment!(:post_edits_count)
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def flags_given_count
|
2017-10-17 13:31:45 -04:00
|
|
|
PostAction.where(user_id: id, post_action_type_id: PostActionType.flag_types_without_custom.values).count
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2014-09-08 11:11:56 -04:00
|
|
|
def warnings_received_count
|
2017-04-15 00:11:02 -04:00
|
|
|
user_warnings.count
|
2014-09-08 11:11:56 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def flags_received_count
|
2017-10-17 13:31:45 -04:00
|
|
|
posts.includes(:post_actions).where('post_actions.post_action_type_id' => PostActionType.flag_types_without_custom.values).count
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def private_topics_count
|
|
|
|
topics_allowed.where(archetype: Archetype.private_message).count
|
|
|
|
end
|
|
|
|
|
2013-12-19 13:45:55 -05:00
|
|
|
def posted_too_much_in_topic?(topic_id)
|
2016-04-18 16:08:42 -04:00
|
|
|
# Does not apply to staff and non-new members...
|
|
|
|
return false if staff? || (trust_level != TrustLevel[0])
|
|
|
|
# ... your own topics or in private messages
|
|
|
|
topic = Topic.where(id: topic_id).first
|
|
|
|
return false if topic.try(:private_message?) || (topic.try(:user_id) == self.id)
|
2014-01-02 12:57:40 -05:00
|
|
|
|
2014-04-29 12:59:14 -04:00
|
|
|
last_action_in_topic = UserAction.last_action_in_topic(id, topic_id)
|
|
|
|
since_reply = Post.where(user_id: id, topic_id: topic_id)
|
|
|
|
since_reply = since_reply.where('id > ?', last_action_in_topic) if last_action_in_topic
|
|
|
|
|
|
|
|
(since_reply.count >= SiteSetting.newuser_max_replies_per_topic)
|
2013-12-19 13:45:55 -05:00
|
|
|
end
|
|
|
|
|
2018-12-14 05:04:18 -05:00
|
|
|
def delete_posts_in_batches(guardian, batch_size = 20)
|
2013-02-07 02:11:56 -05:00
|
|
|
raise Discourse::InvalidAccess unless guardian.can_delete_all_posts? self
|
2013-02-07 10:45:24 -05:00
|
|
|
|
2019-01-03 12:03:01 -05:00
|
|
|
Reviewable.where(created_by_id: id).delete_all
|
2015-04-24 16:04:44 -04:00
|
|
|
|
2018-12-14 05:04:18 -05:00
|
|
|
posts.order("post_number desc").limit(batch_size).each do |p|
|
2013-06-05 16:00:45 -04:00
|
|
|
PostDestroyer.new(guardian.user, p).destroy
|
2013-02-07 02:11:56 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
def suspended?
|
2017-11-28 13:44:24 -05:00
|
|
|
!!(suspended_till && suspended_till > Time.zone.now)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2017-11-13 13:41:36 -05:00
|
|
|
def silenced?
|
2017-11-28 13:44:24 -05:00
|
|
|
!!(silenced_till && silenced_till > Time.zone.now)
|
2017-11-13 13:41:36 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def silenced_record
|
|
|
|
UserHistory.for(self, :silence_user).order('id DESC').first
|
|
|
|
end
|
|
|
|
|
|
|
|
def silence_reason
|
|
|
|
silenced_record.try(:details) if silenced?
|
|
|
|
end
|
|
|
|
|
|
|
|
def silenced_at
|
|
|
|
silenced_record.try(:created_at) if silenced?
|
|
|
|
end
|
|
|
|
|
2021-07-20 06:42:08 -04:00
|
|
|
def silenced_forever?
|
|
|
|
silenced_till > 100.years.from_now
|
|
|
|
end
|
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
def suspend_record
|
|
|
|
UserHistory.for(self, :suspend_user).order('id DESC').first
|
2013-11-01 10:47:03 -04:00
|
|
|
end
|
|
|
|
|
2017-12-07 13:20:42 -05:00
|
|
|
def full_suspend_reason
|
|
|
|
return suspend_record.try(:details) if suspended?
|
|
|
|
end
|
|
|
|
|
2013-11-07 13:53:32 -05:00
|
|
|
def suspend_reason
|
2017-12-07 13:20:42 -05:00
|
|
|
if details = full_suspend_reason
|
|
|
|
return details.split("\n")[0]
|
|
|
|
end
|
|
|
|
|
|
|
|
nil
|
2013-11-01 10:47:03 -04:00
|
|
|
end
|
|
|
|
|
2021-07-20 06:42:08 -04:00
|
|
|
def suspended_message
|
|
|
|
return nil unless suspended?
|
|
|
|
|
|
|
|
message = "login.suspended"
|
|
|
|
if suspend_reason
|
|
|
|
if suspended_forever?
|
|
|
|
message = "login.suspended_with_reason_forever"
|
|
|
|
else
|
|
|
|
message = "login.suspended_with_reason"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
I18n.t(message,
|
|
|
|
date: I18n.l(suspended_till, format: :date_only),
|
|
|
|
reason: Rack::Utils.escape_html(suspend_reason))
|
|
|
|
end
|
|
|
|
|
|
|
|
def suspended_forever?
|
|
|
|
suspended_till > 100.years.from_now
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
# Use this helper to determine if the user has a particular trust level.
|
|
|
|
# Takes into account admin, etc.
|
2013-02-05 21:44:49 -05:00
|
|
|
def has_trust_level?(level)
|
2016-05-29 23:38:04 -04:00
|
|
|
unless TrustLevel.valid?(level)
|
|
|
|
raise InvalidTrustLevel.new("Invalid trust level #{level}")
|
|
|
|
end
|
|
|
|
|
2015-12-07 11:01:08 -05:00
|
|
|
admin? || moderator? || staged? || TrustLevel.compare(trust_level, level)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
|
|
|
|
2021-11-22 13:18:53 -05:00
|
|
|
def has_trust_level_or_staff?(level)
|
|
|
|
return admin? if level.to_s == 'admin'
|
|
|
|
return staff? if level.to_s == 'staff'
|
|
|
|
has_trust_level?(level.to_i)
|
|
|
|
end
|
|
|
|
|
2013-03-19 19:51:39 -04:00
|
|
|
# a touch faster than automatic
|
2013-03-31 12:51:13 -04:00
|
|
|
def admin?
|
2013-03-19 19:51:39 -04:00
|
|
|
admin
|
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
def guardian
|
|
|
|
Guardian.new(self)
|
|
|
|
end
|
|
|
|
|
2018-04-02 12:44:04 -04:00
|
|
|
def username_format_validator
|
|
|
|
UsernameValidator.perform_validation(self, 'username')
|
2013-02-07 18:23:41 -05:00
|
|
|
end
|
|
|
|
|
2013-02-11 11:18:26 -05:00
|
|
|
def email_confirmed?
|
2018-05-14 19:48:30 -04:00
|
|
|
email_tokens.where(email: email, confirmed: true).present? ||
|
|
|
|
email_tokens.empty? ||
|
2019-11-07 12:26:28 -05:00
|
|
|
single_sign_on_record&.external_email&.downcase == email
|
2013-02-11 11:18:26 -05:00
|
|
|
end
|
|
|
|
|
2013-05-07 21:58:34 -04:00
|
|
|
def activate
|
2021-11-25 02:34:39 -05:00
|
|
|
email_token = self.email_tokens.create!(email: self.email, scope: EmailToken.scopes[:signup])
|
|
|
|
EmailToken.confirm(email_token.token, scope: EmailToken.scopes[:signup])
|
|
|
|
reload
|
2013-05-07 21:58:34 -04:00
|
|
|
end
|
|
|
|
|
2019-04-03 12:04:05 -04:00
|
|
|
def deactivate(performed_by)
|
2017-09-13 03:33:59 -04:00
|
|
|
self.update!(active: false)
|
2019-04-03 12:04:05 -04:00
|
|
|
|
|
|
|
if reviewable = ReviewableUser.pending.find_by(target: self)
|
2021-06-15 11:35:45 -04:00
|
|
|
reviewable.perform(performed_by, :delete_user)
|
2019-04-03 12:04:05 -04:00
|
|
|
end
|
2013-05-07 21:58:34 -04:00
|
|
|
end
|
|
|
|
|
2014-06-16 20:46:30 -04:00
|
|
|
def change_trust_level!(level, opts = nil)
|
|
|
|
Promotion.new(self).change_trust_level!(level, opts)
|
|
|
|
end
|
|
|
|
|
2013-02-21 13:20:00 -05:00
|
|
|
def readable_name
|
2018-05-14 19:48:30 -04:00
|
|
|
name.present? && name != username ? "#{name} (#{username})" : username
|
2013-02-21 13:20:00 -05:00
|
|
|
end
|
|
|
|
|
2014-04-16 06:22:21 -04:00
|
|
|
def badge_count
|
2019-12-30 06:19:59 -05:00
|
|
|
user_stat&.distinct_badge_count
|
2014-04-16 06:22:21 -04:00
|
|
|
end
|
|
|
|
|
2021-06-22 11:58:03 -04:00
|
|
|
def featured_user_badges(limit = nil)
|
|
|
|
if limit.nil?
|
2020-01-14 09:26:49 -05:00
|
|
|
default_featured_user_badges
|
|
|
|
else
|
|
|
|
user_badges.grouped_with_count.where("featured_rank <= ?", limit)
|
|
|
|
end
|
2014-04-16 06:11:11 -04:00
|
|
|
end
|
|
|
|
|
2018-05-03 09:41:41 -04:00
|
|
|
def self.count_by_signup_date(start_date = nil, end_date = nil, group_id = nil)
|
|
|
|
result = self
|
|
|
|
|
|
|
|
if start_date && end_date
|
2018-05-10 23:30:21 -04:00
|
|
|
result = result.group("date(users.created_at)")
|
|
|
|
result = result.where("users.created_at >= ? AND users.created_at <= ?", start_date, end_date)
|
2018-06-05 03:29:17 -04:00
|
|
|
result = result.order("date(users.created_at)")
|
2018-05-03 09:41:41 -04:00
|
|
|
end
|
2016-02-02 21:29:51 -05:00
|
|
|
|
|
|
|
if group_id
|
|
|
|
result = result.joins("INNER JOIN group_users ON group_users.user_id = users.id")
|
|
|
|
result = result.where("group_users.group_id = ?", group_id)
|
|
|
|
end
|
2018-04-26 08:49:41 -04:00
|
|
|
|
|
|
|
result.count
|
|
|
|
end
|
|
|
|
|
2018-05-03 09:41:41 -04:00
|
|
|
def self.count_by_first_post(start_date = nil, end_date = nil)
|
|
|
|
result = joins('INNER JOIN user_stats AS us ON us.user_id = users.id')
|
|
|
|
|
|
|
|
if start_date && end_date
|
2018-05-10 23:30:21 -04:00
|
|
|
result = result.group("date(us.first_post_created_at)")
|
|
|
|
result = result.where("us.first_post_created_at > ? AND us.first_post_created_at < ?", start_date, end_date)
|
|
|
|
result = result.order("date(us.first_post_created_at)")
|
2018-05-03 09:41:41 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
result.count
|
2013-03-07 11:07:59 -05:00
|
|
|
end
|
|
|
|
|
2013-04-29 02:33:24 -04:00
|
|
|
def secure_category_ids
|
2019-04-30 02:58:18 -04:00
|
|
|
cats = self.admin? ? Category.unscoped.where(read_restricted: true) : secure_categories.references(:categories)
|
2013-09-10 00:29:02 -04:00
|
|
|
cats.pluck('categories.id').sort
|
2013-04-29 02:33:24 -04:00
|
|
|
end
|
|
|
|
|
2013-07-13 21:24:16 -04:00
|
|
|
def topic_create_allowed_category_ids
|
|
|
|
Category.topic_create_allowed(self.id).select(:id)
|
|
|
|
end
|
|
|
|
|
2013-05-10 16:58:23 -04:00
|
|
|
# Flag all posts from a user as spam
|
|
|
|
def flag_linked_posts_as_spam
|
2019-01-03 12:03:01 -05:00
|
|
|
results = []
|
|
|
|
|
2016-04-25 17:03:17 -04:00
|
|
|
disagreed_flag_post_ids = PostAction.where(post_action_type_id: PostActionType.types[:spam])
|
|
|
|
.where.not(disagreed_at: nil)
|
|
|
|
.pluck(:post_id)
|
2015-10-16 15:16:44 -04:00
|
|
|
|
2016-04-25 17:03:17 -04:00
|
|
|
topic_links.includes(:post)
|
|
|
|
.where.not(post_id: disagreed_flag_post_ids)
|
|
|
|
.each do |tl|
|
2019-01-03 12:03:01 -05:00
|
|
|
|
2019-07-12 06:04:16 -04:00
|
|
|
message = I18n.t(
|
|
|
|
'flag_reason.spam_hosts',
|
|
|
|
base_path: Discourse.base_path,
|
|
|
|
locale: SiteSetting.default_locale
|
|
|
|
)
|
2019-01-03 12:03:01 -05:00
|
|
|
results << PostActionCreator.create(Discourse.system_user, tl.post, :spam, message: message)
|
2013-05-10 16:58:23 -04:00
|
|
|
end
|
2019-01-03 12:03:01 -05:00
|
|
|
|
|
|
|
results
|
2013-05-10 16:58:23 -04:00
|
|
|
end
|
2013-05-13 04:04:03 -04:00
|
|
|
|
2013-08-13 16:08:29 -04:00
|
|
|
def has_uploaded_avatar
|
|
|
|
uploaded_avatar.present?
|
|
|
|
end
|
2013-05-24 06:58:26 -04:00
|
|
|
|
2013-11-15 10:27:43 -05:00
|
|
|
def find_email
|
2022-02-17 20:12:51 -05:00
|
|
|
last_sent_email_address.present? && EmailAddressValidator.valid_value?(last_sent_email_address) ? last_sent_email_address : email
|
2013-11-15 10:27:43 -05:00
|
|
|
end
|
|
|
|
|
2014-09-24 20:19:26 -04:00
|
|
|
def tl3_requirements
|
2014-09-05 01:20:39 -04:00
|
|
|
@lq ||= TrustLevel3Requirements.new(self)
|
2014-01-22 17:09:56 -05:00
|
|
|
end
|
|
|
|
|
2014-09-24 20:19:26 -04:00
|
|
|
def on_tl3_grace_period?
|
2018-10-11 15:11:40 -04:00
|
|
|
return true if SiteSetting.tl3_promotion_min_duration.to_i.days.ago.year < 2013
|
|
|
|
|
2014-09-13 16:55:26 -04:00
|
|
|
UserHistory.for(self, :auto_trust_level_change)
|
|
|
|
.where('created_at >= ?', SiteSetting.tl3_promotion_min_duration.to_i.days.ago)
|
|
|
|
.where(previous_value: TrustLevel[2].to_s)
|
|
|
|
.where(new_value: TrustLevel[3].to_s)
|
|
|
|
.exists?
|
|
|
|
end
|
|
|
|
|
2014-05-22 03:37:02 -04:00
|
|
|
def refresh_avatar
|
2014-08-13 16:17:16 -04:00
|
|
|
return if @import_mode
|
|
|
|
|
2014-05-28 02:54:21 -04:00
|
|
|
avatar = user_avatar || create_user_avatar
|
2014-05-22 03:37:02 -04:00
|
|
|
|
2020-09-02 22:12:24 -04:00
|
|
|
if self.primary_email.present? &&
|
|
|
|
SiteSetting.automatically_download_gravatars? &&
|
|
|
|
!avatar.last_gravatar_download_attempt
|
|
|
|
|
2016-04-18 06:44:09 -04:00
|
|
|
Jobs.cancel_scheduled_job(:update_gravatar, user_id: self.id, avatar_id: avatar.id)
|
|
|
|
Jobs.enqueue_in(1.second, :update_gravatar, user_id: self.id, avatar_id: avatar.id)
|
2014-07-03 03:29:44 -04:00
|
|
|
end
|
2015-03-30 06:31:10 -04:00
|
|
|
|
2015-04-24 05:14:10 -04:00
|
|
|
# mark all the user's quoted posts as "needing a rebake"
|
2017-08-31 00:06:56 -04:00
|
|
|
Post.rebake_all_quoted_posts(self.id) if self.will_save_change_to_uploaded_avatar_id?
|
2014-07-03 03:29:44 -04:00
|
|
|
end
|
|
|
|
|
2014-07-28 13:17:37 -04:00
|
|
|
def first_post_created_at
|
|
|
|
user_stat.try(:first_post_created_at)
|
|
|
|
end
|
|
|
|
|
2014-09-25 01:50:54 -04:00
|
|
|
def associated_accounts
|
|
|
|
result = []
|
|
|
|
|
2018-07-23 11:51:57 -04:00
|
|
|
Discourse.authenticators.each do |authenticator|
|
|
|
|
account_description = authenticator.description_for_user(self)
|
|
|
|
unless account_description.empty?
|
|
|
|
result << {
|
|
|
|
name: authenticator.name,
|
|
|
|
description: account_description,
|
|
|
|
}
|
|
|
|
end
|
2014-09-25 01:50:54 -04:00
|
|
|
end
|
|
|
|
|
2018-07-23 11:51:57 -04:00
|
|
|
result
|
2014-09-25 01:50:54 -04:00
|
|
|
end
|
|
|
|
|
2018-09-06 18:02:47 -04:00
|
|
|
USER_FIELD_PREFIX ||= "user_field_"
|
|
|
|
|
2022-07-18 11:35:47 -04:00
|
|
|
def user_fields(field_ids = nil)
|
2020-03-02 14:22:49 -05:00
|
|
|
if field_ids.nil?
|
|
|
|
field_ids = (@all_user_field_ids ||= UserField.pluck(:id))
|
|
|
|
end
|
|
|
|
|
|
|
|
@user_fields_cache ||= {}
|
|
|
|
|
|
|
|
# Memoize based on requested fields
|
|
|
|
@user_fields_cache[field_ids.join(':')] ||= {}.tap do |hash|
|
|
|
|
field_ids.each do |fid|
|
|
|
|
# The hash keys are strings for backwards compatibility
|
|
|
|
hash[fid.to_s] = custom_fields["#{USER_FIELD_PREFIX}#{fid}"]
|
2014-09-26 14:48:34 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-14 18:36:54 -04:00
|
|
|
def validatable_user_fields_values
|
|
|
|
validatable_user_fields.values.join(" ")
|
2022-05-16 09:21:33 -04:00
|
|
|
end
|
|
|
|
|
2021-03-29 07:03:19 -04:00
|
|
|
def set_user_field(field_id, value)
|
|
|
|
custom_fields["#{USER_FIELD_PREFIX}#{field_id}"] = value
|
|
|
|
end
|
|
|
|
|
2022-06-14 12:27:01 -04:00
|
|
|
def apply_watched_words
|
2022-07-14 18:36:54 -04:00
|
|
|
validatable_user_fields.each do |id, value|
|
2022-07-26 11:15:42 -04:00
|
|
|
set_user_field(id, WordWatcher.apply_to_text(value))
|
2022-06-14 12:27:01 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-14 18:36:54 -04:00
|
|
|
def validatable_user_fields
|
2022-07-18 11:35:47 -04:00
|
|
|
# ignore multiselect fields since they are admin-set and thus not user generated content
|
|
|
|
@public_user_field_ids ||= UserField.public_fields.where.not(field_type: 'multiselect').pluck(:id)
|
2022-07-14 18:36:54 -04:00
|
|
|
|
2022-06-14 12:27:01 -04:00
|
|
|
user_fields(@public_user_field_ids)
|
|
|
|
end
|
|
|
|
|
2015-02-19 12:11:07 -05:00
|
|
|
def number_of_deleted_posts
|
|
|
|
Post.with_deleted
|
|
|
|
.where(user_id: self.id)
|
|
|
|
.where.not(deleted_at: nil)
|
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_flagged_posts
|
2021-08-12 13:20:46 -04:00
|
|
|
ReviewableFlaggedPost.where(target_created_by: self.id).count
|
2015-02-19 12:11:07 -05:00
|
|
|
end
|
|
|
|
|
2020-03-16 08:52:08 -04:00
|
|
|
def number_of_rejected_posts
|
2020-05-23 00:56:13 -04:00
|
|
|
ReviewableQueuedPost
|
2021-12-08 12:12:24 -05:00
|
|
|
.rejected
|
2020-05-23 00:56:13 -04:00
|
|
|
.where(created_by_id: self.id)
|
2020-03-16 08:52:08 -04:00
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
2015-02-19 12:11:07 -05:00
|
|
|
def number_of_flags_given
|
|
|
|
PostAction.where(user_id: self.id)
|
|
|
|
.where(disagreed_at: nil)
|
|
|
|
.where(post_action_type_id: PostActionType.notify_flag_type_ids)
|
|
|
|
.count
|
|
|
|
end
|
|
|
|
|
|
|
|
def number_of_suspensions
|
|
|
|
UserHistory.for(self, :suspend_user).count
|
|
|
|
end
|
|
|
|
|
2015-03-06 16:44:54 -05:00
|
|
|
def create_user_profile
|
2019-05-24 00:06:58 -04:00
|
|
|
UserProfile.create!(user_id: id)
|
2015-03-06 16:44:54 -05:00
|
|
|
end
|
|
|
|
|
2018-07-18 06:57:43 -04:00
|
|
|
def set_random_avatar
|
2022-02-24 15:57:39 -05:00
|
|
|
if SiteSetting.selectable_avatars_mode != "disabled"
|
2020-10-13 09:17:06 -04:00
|
|
|
if upload = SiteSetting.selectable_avatars.sample
|
|
|
|
update_column(:uploaded_avatar_id, upload.id)
|
|
|
|
UserAvatar.create!(user_id: id, custom_upload_id: upload.id)
|
2018-07-18 06:57:43 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-04-07 22:29:43 -04:00
|
|
|
def anonymous?
|
|
|
|
SiteSetting.allow_anonymous_posting &&
|
|
|
|
trust_level >= 1 &&
|
2019-05-29 00:26:06 -04:00
|
|
|
!!anonymous_user_master
|
2015-04-07 22:29:43 -04:00
|
|
|
end
|
|
|
|
|
2016-04-26 13:08:19 -04:00
|
|
|
def is_singular_admin?
|
2017-03-14 02:33:06 -04:00
|
|
|
User.where(admin: true).where.not(id: id).human_users.blank?
|
2016-04-26 13:08:19 -04:00
|
|
|
end
|
|
|
|
|
2016-07-04 05:20:30 -04:00
|
|
|
def logged_out
|
|
|
|
MessageBus.publish "/logout", self.id, user_ids: [self.id]
|
|
|
|
DiscourseEvent.trigger(:user_logged_out, self)
|
|
|
|
end
|
|
|
|
|
2017-06-01 04:19:42 -04:00
|
|
|
def logged_in
|
|
|
|
DiscourseEvent.trigger(:user_logged_in, self)
|
|
|
|
|
|
|
|
if !self.seen_before?
|
|
|
|
DiscourseEvent.trigger(:user_first_logged_in, self)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-06-14 13:20:18 -04:00
|
|
|
def set_automatic_groups
|
2018-05-14 19:48:30 -04:00
|
|
|
return if !active || staged || !email_confirmed?
|
2017-06-14 13:20:18 -04:00
|
|
|
|
|
|
|
Group.where(automatic: false)
|
|
|
|
.where("LENGTH(COALESCE(automatic_membership_email_domains, '')) > 0")
|
|
|
|
.each do |group|
|
|
|
|
|
|
|
|
domains = group.automatic_membership_email_domains.gsub('.', '\.')
|
|
|
|
|
|
|
|
if email =~ Regexp.new("@(#{domains})$", true) && !group.users.include?(self)
|
|
|
|
group.add(self)
|
|
|
|
GroupActionLogger.new(Discourse.system_user, group).log_add_user_to_group(self)
|
|
|
|
end
|
|
|
|
end
|
2022-09-25 23:58:40 -04:00
|
|
|
|
|
|
|
@belonging_to_group_ids = nil
|
2017-06-14 13:20:18 -04:00
|
|
|
end
|
|
|
|
|
2017-04-26 14:47:36 -04:00
|
|
|
def email
|
2020-12-09 12:14:45 -05:00
|
|
|
primary_email&.email
|
2017-04-26 14:47:36 -04:00
|
|
|
end
|
|
|
|
|
2021-02-22 06:42:37 -05:00
|
|
|
# Shortcut to set the primary email of the user.
|
|
|
|
# Automatically removes any identical secondary emails.
|
2018-03-02 03:41:02 -05:00
|
|
|
def email=(new_email)
|
2017-04-26 14:47:36 -04:00
|
|
|
if primary_email
|
2021-02-22 06:42:37 -05:00
|
|
|
primary_email.email = new_email
|
2017-04-26 14:47:36 -04:00
|
|
|
else
|
2021-02-22 06:42:37 -05:00
|
|
|
build_primary_email email: new_email, skip_validate_email: !should_validate_email_address?
|
2017-04-26 14:47:36 -04:00
|
|
|
end
|
2021-02-22 06:42:37 -05:00
|
|
|
|
|
|
|
if secondary_match = user_emails.detect { |ue| !ue.primary && Email.downcase(ue.email) == Email.downcase(new_email) }
|
|
|
|
secondary_match.mark_for_destruction
|
|
|
|
primary_email.skip_validate_unique_email = true
|
|
|
|
end
|
|
|
|
|
|
|
|
new_email
|
2017-04-26 14:47:36 -04:00
|
|
|
end
|
|
|
|
|
2018-07-03 07:51:22 -04:00
|
|
|
def emails
|
|
|
|
self.user_emails.order("user_emails.primary DESC NULLS LAST").pluck(:email)
|
|
|
|
end
|
|
|
|
|
|
|
|
def secondary_emails
|
|
|
|
self.user_emails.secondary.pluck(:email)
|
|
|
|
end
|
|
|
|
|
2020-06-10 12:11:49 -04:00
|
|
|
def unconfirmed_emails
|
|
|
|
self.email_change_requests.where.not(change_state: EmailChangeRequest.states[:complete]).pluck(:new_email)
|
|
|
|
end
|
|
|
|
|
2020-03-03 08:57:46 -05:00
|
|
|
RECENT_TIME_READ_THRESHOLD ||= 60.days
|
|
|
|
|
|
|
|
def self.preload_recent_time_read(users)
|
|
|
|
times = UserVisit.where(user_id: users.map(&:id))
|
|
|
|
.where('visited_at >= ?', RECENT_TIME_READ_THRESHOLD.ago)
|
|
|
|
.group(:user_id)
|
|
|
|
.sum(:time_read)
|
|
|
|
users.each { |u| u.preload_recent_time_read(times[u.id] || 0) }
|
|
|
|
end
|
|
|
|
|
|
|
|
def preload_recent_time_read(time)
|
|
|
|
@recent_time_read = time
|
|
|
|
end
|
|
|
|
|
2017-11-14 16:39:07 -05:00
|
|
|
def recent_time_read
|
2020-03-03 08:57:46 -05:00
|
|
|
@recent_time_read ||= self.user_visits.where('visited_at >= ?', RECENT_TIME_READ_THRESHOLD.ago).sum(:time_read)
|
2017-11-14 16:39:07 -05:00
|
|
|
end
|
|
|
|
|
2018-01-19 09:29:15 -05:00
|
|
|
def from_staged?
|
|
|
|
custom_fields[User::FROM_STAGED]
|
|
|
|
end
|
|
|
|
|
2018-06-18 20:05:04 -04:00
|
|
|
def mature_staged?
|
2018-06-19 12:41:10 -04:00
|
|
|
from_staged? && self.created_at && self.created_at < 1.day.ago
|
2018-06-18 20:05:04 -04:00
|
|
|
end
|
|
|
|
|
2018-09-20 22:06:08 -04:00
|
|
|
def next_best_title
|
|
|
|
group_titles_query = groups.where("groups.title <> ''")
|
|
|
|
group_titles_query = group_titles_query.order("groups.id = #{primary_group_id} DESC") if primary_group_id
|
|
|
|
group_titles_query = group_titles_query.order("groups.primary_group DESC").limit(1)
|
|
|
|
|
2019-10-21 06:32:27 -04:00
|
|
|
if next_best_group_title = group_titles_query.pluck_first(:title)
|
2018-09-20 22:06:08 -04:00
|
|
|
return next_best_group_title
|
|
|
|
end
|
|
|
|
|
2019-10-21 06:32:27 -04:00
|
|
|
next_best_badge_title = badges.where(allow_title: true).pluck_first(:name)
|
2018-09-20 22:06:08 -04:00
|
|
|
next_best_badge_title ? Badge.display_name(next_best_badge_title) : nil
|
|
|
|
end
|
|
|
|
|
2019-04-03 16:10:36 -04:00
|
|
|
def create_reviewable
|
|
|
|
return unless SiteSetting.must_approve_users? || SiteSetting.invite_only?
|
|
|
|
return if approved?
|
|
|
|
|
|
|
|
Jobs.enqueue(:create_user_reviewable, user_id: self.id)
|
|
|
|
end
|
|
|
|
|
2019-08-10 06:02:12 -04:00
|
|
|
def has_more_posts_than?(max_post_count)
|
|
|
|
return true if user_stat && (user_stat.topic_count + user_stat.post_count) > max_post_count
|
2020-04-01 16:10:17 -04:00
|
|
|
return true if max_post_count < 0
|
2019-08-10 06:02:12 -04:00
|
|
|
|
|
|
|
DB.query_single(<<~SQL, user_id: self.id).first > max_post_count
|
|
|
|
SELECT COUNT(1)
|
|
|
|
FROM (
|
|
|
|
SELECT 1
|
|
|
|
FROM posts p
|
|
|
|
JOIN topics t ON (p.topic_id = t.id)
|
|
|
|
WHERE p.user_id = :user_id AND
|
|
|
|
p.deleted_at IS NULL AND
|
|
|
|
t.deleted_at IS NULL AND
|
|
|
|
(
|
|
|
|
t.archetype <> 'private_message' OR
|
|
|
|
EXISTS(
|
|
|
|
SELECT 1
|
|
|
|
FROM topic_allowed_users a
|
|
|
|
WHERE a.topic_id = t.id AND a.user_id > 0 AND a.user_id <> :user_id
|
|
|
|
) OR
|
|
|
|
EXISTS(
|
|
|
|
SELECT 1
|
|
|
|
FROM topic_allowed_groups g
|
|
|
|
WHERE g.topic_id = p.topic_id
|
|
|
|
)
|
|
|
|
)
|
|
|
|
LIMIT #{max_post_count + 1}
|
|
|
|
) x
|
|
|
|
SQL
|
|
|
|
end
|
|
|
|
|
2019-10-01 22:08:41 -04:00
|
|
|
def create_or_fetch_secure_identifier
|
|
|
|
return secure_identifier if secure_identifier.present?
|
|
|
|
new_secure_identifier = SecureRandom.hex(20)
|
|
|
|
self.update(secure_identifier: new_secure_identifier)
|
|
|
|
new_secure_identifier
|
|
|
|
end
|
|
|
|
|
|
|
|
def second_factor_security_key_credential_ids
|
|
|
|
security_keys
|
|
|
|
.select(:credential_id)
|
|
|
|
.where(factor_type: UserSecurityKey.factor_types[:second_factor])
|
|
|
|
.pluck(:credential_id)
|
|
|
|
end
|
|
|
|
|
2020-06-05 12:31:58 -04:00
|
|
|
def encoded_username(lower: false)
|
|
|
|
UrlHelper.encode_component(lower ? username_lower : username)
|
|
|
|
end
|
|
|
|
|
2020-12-18 10:03:51 -05:00
|
|
|
def do_not_disturb?
|
|
|
|
active_do_not_disturb_timings.exists?
|
|
|
|
end
|
|
|
|
|
|
|
|
def active_do_not_disturb_timings
|
|
|
|
now = Time.zone.now
|
|
|
|
do_not_disturb_timings.where('starts_at <= ? AND ends_at > ?', now, now)
|
|
|
|
end
|
|
|
|
|
2021-01-07 11:49:49 -05:00
|
|
|
def do_not_disturb_until
|
|
|
|
active_do_not_disturb_timings.maximum(:ends_at)
|
|
|
|
end
|
|
|
|
|
2021-01-27 11:29:24 -05:00
|
|
|
def shelved_notifications
|
|
|
|
ShelvedNotification.joins(:notification).where("notifications.user_id = ?", self.id)
|
|
|
|
end
|
|
|
|
|
2021-11-21 22:38:49 -05:00
|
|
|
def allow_live_notifications?
|
|
|
|
seen_since?(30.days.ago)
|
|
|
|
end
|
|
|
|
|
2021-12-02 08:42:23 -05:00
|
|
|
def username_equals_to?(another_username)
|
|
|
|
username_lower == User.normalize_username(another_username)
|
|
|
|
end
|
|
|
|
|
2022-04-13 09:52:56 -04:00
|
|
|
def full_url
|
|
|
|
"#{Discourse.base_url}/u/#{encoded_username}"
|
|
|
|
end
|
|
|
|
|
|
|
|
def display_name
|
|
|
|
if SiteSetting.prioritize_username_in_ux?
|
|
|
|
username
|
|
|
|
else
|
|
|
|
name.presence || username
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-27 05:15:14 -04:00
|
|
|
def clear_status!
|
|
|
|
user_status.destroy! if user_status
|
2022-05-30 05:41:53 -04:00
|
|
|
publish_user_status(nil)
|
2022-05-27 05:15:14 -04:00
|
|
|
end
|
|
|
|
|
2022-08-09 06:54:33 -04:00
|
|
|
def set_status!(description, emoji, ends_at = nil)
|
2022-07-05 11:12:22 -04:00
|
|
|
status = {
|
|
|
|
description: description,
|
|
|
|
emoji: emoji,
|
|
|
|
set_at: Time.zone.now,
|
|
|
|
ends_at: ends_at
|
|
|
|
}
|
|
|
|
|
2022-05-27 05:15:14 -04:00
|
|
|
if user_status
|
2022-07-05 11:12:22 -04:00
|
|
|
user_status.update!(status)
|
2022-05-27 05:15:14 -04:00
|
|
|
else
|
2022-07-05 11:12:22 -04:00
|
|
|
self.user_status = UserStatus.create!(status)
|
2022-05-27 05:15:14 -04:00
|
|
|
end
|
2022-05-30 05:41:53 -04:00
|
|
|
|
|
|
|
publish_user_status(user_status)
|
2022-05-27 05:15:14 -04:00
|
|
|
end
|
|
|
|
|
2022-07-05 11:12:22 -04:00
|
|
|
def has_status?
|
|
|
|
user_status && !user_status.expired?
|
|
|
|
end
|
|
|
|
|
2022-07-14 02:30:46 -04:00
|
|
|
def redesigned_user_menu_enabled?
|
2022-08-31 14:15:01 -04:00
|
|
|
SiteSetting.enable_experimental_sidebar_hamburger
|
2022-07-14 02:30:46 -04:00
|
|
|
end
|
|
|
|
|
2013-02-05 14:16:51 -05:00
|
|
|
protected
|
|
|
|
|
2014-07-22 21:42:24 -04:00
|
|
|
def badge_grant
|
|
|
|
BadgeGranter.queue_badge_grant(Badge::Trigger::UserChange, user: self)
|
|
|
|
end
|
|
|
|
|
2015-06-05 13:50:06 -04:00
|
|
|
def expire_old_email_tokens
|
2017-08-31 00:06:56 -04:00
|
|
|
if saved_change_to_password_hash? && !saved_change_to_id?
|
2015-06-05 13:50:06 -04:00
|
|
|
email_tokens.where('not expired').update_all(expired: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-21 21:13:14 -05:00
|
|
|
def index_search
|
2021-04-27 01:52:45 -04:00
|
|
|
# force is needed as user custom fields are updated using SQL and after_save callback is not triggered
|
|
|
|
SearchIndexer.index(self, force: true)
|
2016-12-21 21:13:14 -05:00
|
|
|
end
|
|
|
|
|
2014-03-24 03:03:39 -04:00
|
|
|
def clear_global_notice_if_needed
|
2017-03-14 02:33:06 -04:00
|
|
|
return if id < 0
|
2017-02-13 10:53:45 -05:00
|
|
|
|
2014-03-24 03:03:39 -04:00
|
|
|
if admin && SiteSetting.has_login_hint
|
|
|
|
SiteSetting.has_login_hint = false
|
|
|
|
SiteSetting.global_notice = ""
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-06-16 20:46:30 -04:00
|
|
|
def ensure_in_trust_level_group
|
|
|
|
Group.user_trust_level_change!(id, trust_level)
|
|
|
|
end
|
|
|
|
|
2013-09-11 14:50:26 -04:00
|
|
|
def create_user_stat
|
2021-08-02 10:15:53 -04:00
|
|
|
UserStat.create!(new_since: Time.zone.now, user_id: id)
|
2013-09-11 14:50:26 -04:00
|
|
|
end
|
|
|
|
|
2016-02-16 23:46:19 -05:00
|
|
|
def create_user_option
|
2019-05-24 00:06:58 -04:00
|
|
|
UserOption.create!(user_id: id)
|
2016-02-16 23:46:19 -05:00
|
|
|
end
|
|
|
|
|
2013-06-06 10:40:10 -04:00
|
|
|
def create_email_token
|
2021-11-25 02:34:39 -05:00
|
|
|
email_tokens.create!(email: email, scope: EmailToken.scopes[:signup])
|
2013-06-06 10:40:10 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-06-06 10:40:10 -04:00
|
|
|
def ensure_password_is_hashed
|
|
|
|
if @raw_password
|
|
|
|
self.salt = SecureRandom.hex(16)
|
|
|
|
self.password_hash = hash_password(@raw_password, salt)
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-06-06 10:40:10 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2017-01-31 17:21:37 -05:00
|
|
|
def expire_tokens_if_password_changed
|
|
|
|
# NOTE: setting raw password is the only valid way of changing a password
|
|
|
|
# the password field in the DB is actually hashed, nobody should be amending direct
|
|
|
|
if @raw_password
|
|
|
|
# Association in model may be out-of-sync
|
|
|
|
UserAuthToken.where(user_id: id).destroy_all
|
|
|
|
# We should not carry this around after save
|
|
|
|
@raw_password = nil
|
2017-11-30 23:19:24 -05:00
|
|
|
@password_required = false
|
2017-01-31 17:21:37 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-06-06 10:40:10 -04:00
|
|
|
def hash_password(password, salt)
|
2016-05-29 23:38:04 -04:00
|
|
|
raise StandardError.new("password is too long") if password.size > User.max_password_length
|
2013-07-22 21:36:01 -04:00
|
|
|
Pbkdf2.hash_password(password, salt, Rails.configuration.pbkdf2_iterations, Rails.configuration.pbkdf2_algorithm)
|
2013-06-06 10:40:10 -04:00
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2013-06-06 10:40:10 -04:00
|
|
|
def add_trust_level
|
2013-12-21 02:19:22 -05:00
|
|
|
# there is a possibility we did not load trust level column, skip it
|
2013-06-06 10:40:10 -04:00
|
|
|
return unless has_attribute? :trust_level
|
|
|
|
self.trust_level ||= SiteSetting.default_trust_level
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
|
2019-04-23 06:22:47 -04:00
|
|
|
def update_usernames
|
|
|
|
self.username.unicode_normalize!
|
2013-06-06 10:40:10 -04:00
|
|
|
self.username_lower = username.downcase
|
|
|
|
end
|
2013-02-05 21:44:49 -05:00
|
|
|
|
2018-04-02 12:44:04 -04:00
|
|
|
USERNAME_EXISTS_SQL = <<~SQL
|
2019-04-23 06:22:47 -04:00
|
|
|
(SELECT users.id AS id, true as is_user FROM users
|
|
|
|
WHERE users.username_lower = :username)
|
2018-04-02 12:44:04 -04:00
|
|
|
|
2019-04-23 06:22:47 -04:00
|
|
|
UNION ALL
|
2018-04-02 12:44:04 -04:00
|
|
|
|
2019-04-23 06:22:47 -04:00
|
|
|
(SELECT groups.id, false as is_user FROM groups
|
|
|
|
WHERE lower(groups.name) = :username)
|
2018-04-02 12:44:04 -04:00
|
|
|
SQL
|
|
|
|
|
2019-04-23 06:22:47 -04:00
|
|
|
def self.username_exists?(username)
|
|
|
|
username = normalize_username(username)
|
|
|
|
DB.exec(User::USERNAME_EXISTS_SQL, username: username) > 0
|
2019-02-19 16:31:03 -05:00
|
|
|
end
|
|
|
|
|
2018-04-02 12:44:04 -04:00
|
|
|
def username_validator
|
|
|
|
username_format_validator || begin
|
2019-05-13 16:43:19 -04:00
|
|
|
if will_save_change_to_username?
|
|
|
|
existing = DB.query(
|
|
|
|
USERNAME_EXISTS_SQL,
|
|
|
|
username: self.class.normalize_username(username)
|
|
|
|
)
|
|
|
|
|
|
|
|
user_id = existing.select { |u| u.is_user }.first&.id
|
|
|
|
same_user = user_id && user_id == self.id
|
2018-06-19 02:13:14 -04:00
|
|
|
|
2019-05-13 16:43:19 -04:00
|
|
|
if existing.present? && !same_user
|
|
|
|
errors.add(:username, I18n.t(:'user.username.unique'))
|
|
|
|
end
|
2018-04-02 12:44:04 -04:00
|
|
|
|
2019-05-13 16:43:19 -04:00
|
|
|
if confirm_password?(username) || confirm_password?(username.downcase)
|
|
|
|
errors.add(:username, :same_as_password)
|
|
|
|
end
|
2018-04-02 12:44:04 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-13 16:43:19 -04:00
|
|
|
def name_validator
|
2020-02-03 14:12:45 -05:00
|
|
|
if name.present?
|
|
|
|
name_pw = name[0...User.max_password_length]
|
|
|
|
if confirm_password?(name_pw) || confirm_password?(name_pw.downcase)
|
|
|
|
errors.add(:name, :same_as_password)
|
|
|
|
end
|
2019-05-13 16:43:19 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-08-21 14:39:21 -04:00
|
|
|
def set_default_categories_preferences
|
2016-06-14 10:45:47 -04:00
|
|
|
return if self.staged?
|
|
|
|
|
2015-08-21 14:39:21 -04:00
|
|
|
values = []
|
|
|
|
|
2021-05-05 19:14:07 -04:00
|
|
|
# The following site settings are used to pre-populate default category
|
|
|
|
# tracking settings for a user:
|
|
|
|
#
|
|
|
|
# * default_categories_watching
|
|
|
|
# * default_categories_tracking
|
|
|
|
# * default_categories_watching_first_post
|
2022-06-19 23:49:33 -04:00
|
|
|
# * default_categories_normal
|
2021-05-05 19:14:07 -04:00
|
|
|
# * default_categories_muted
|
2022-06-19 23:49:33 -04:00
|
|
|
%w{watching watching_first_post tracking normal muted}.each do |setting|
|
2021-05-05 19:14:07 -04:00
|
|
|
category_ids = SiteSetting.get("default_categories_#{setting}").split("|").map(&:to_i)
|
2015-08-21 14:39:21 -04:00
|
|
|
category_ids.each do |category_id|
|
2019-07-11 13:41:51 -04:00
|
|
|
next if category_id == 0
|
2021-05-05 19:14:07 -04:00
|
|
|
values << {
|
|
|
|
user_id: self.id,
|
|
|
|
category_id: category_id,
|
|
|
|
notification_level: CategoryUser.notification_levels[setting.to_sym]
|
|
|
|
}
|
2013-08-23 17:35:01 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-05-05 19:14:07 -04:00
|
|
|
CategoryUser.insert_all!(values) if values.present?
|
2014-01-02 15:27:26 -05:00
|
|
|
end
|
|
|
|
|
2019-11-01 03:10:13 -04:00
|
|
|
def set_default_tags_preferences
|
|
|
|
return if self.staged?
|
|
|
|
|
|
|
|
values = []
|
|
|
|
|
2021-05-05 19:14:07 -04:00
|
|
|
# The following site settings are used to pre-populate default tag
|
|
|
|
# tracking settings for a user:
|
|
|
|
#
|
|
|
|
# * default_tags_watching
|
|
|
|
# * default_tags_tracking
|
|
|
|
# * default_tags_watching_first_post
|
|
|
|
# * default_tags_muted
|
|
|
|
%w{watching watching_first_post tracking muted}.each do |setting|
|
|
|
|
tag_names = SiteSetting.get("default_tags_#{setting}").split("|")
|
2019-11-01 03:10:13 -04:00
|
|
|
now = Time.zone.now
|
|
|
|
|
|
|
|
Tag.where(name: tag_names).pluck(:id).each do |tag_id|
|
2021-05-05 19:14:07 -04:00
|
|
|
values << {
|
|
|
|
user_id: self.id,
|
|
|
|
tag_id: tag_id,
|
|
|
|
notification_level: TagUser.notification_levels[setting.to_sym],
|
|
|
|
created_at: now,
|
|
|
|
updated_at: now
|
|
|
|
}
|
2019-11-01 03:10:13 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
TagUser.insert_all!(values) if values.present?
|
|
|
|
end
|
|
|
|
|
2014-12-03 00:36:25 -05:00
|
|
|
def self.purge_unactivated
|
2017-08-25 15:20:06 -04:00
|
|
|
return [] if SiteSetting.purge_unactivated_users_grace_period_days <= 0
|
|
|
|
|
2018-05-16 12:24:11 -04:00
|
|
|
destroyer = UserDestroyer.new(Discourse.system_user)
|
|
|
|
|
|
|
|
User
|
|
|
|
.where(active: false)
|
2014-12-03 00:36:25 -05:00
|
|
|
.where("created_at < ?", SiteSetting.purge_unactivated_users_grace_period_days.days.ago)
|
2018-05-16 12:24:11 -04:00
|
|
|
.where("NOT admin AND NOT moderator")
|
2018-06-28 23:33:54 -04:00
|
|
|
.where("NOT EXISTS
|
2018-07-12 22:28:27 -04:00
|
|
|
(SELECT 1 FROM topic_allowed_users tu JOIN topics t ON t.id = tu.topic_id AND t.user_id > 0 WHERE tu.user_id = users.id LIMIT 1)
|
2018-06-28 23:33:54 -04:00
|
|
|
")
|
2021-03-01 00:46:28 -05:00
|
|
|
.where("NOT EXISTS
|
|
|
|
(SELECT 1 FROM posts p WHERE p.user_id = users.id LIMIT 1)
|
|
|
|
")
|
2016-07-27 06:28:56 -04:00
|
|
|
.limit(200)
|
2018-05-16 12:24:11 -04:00
|
|
|
.find_each do |user|
|
2014-08-19 13:46:40 -04:00
|
|
|
begin
|
2018-05-16 12:24:11 -04:00
|
|
|
destroyer.destroy(user, context: I18n.t(:purge_reason))
|
2021-03-01 00:46:28 -05:00
|
|
|
rescue Discourse::InvalidAccess
|
2018-05-16 12:24:11 -04:00
|
|
|
# keep going
|
2014-08-19 13:46:40 -04:00
|
|
|
end
|
2014-08-13 14:13:41 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-07-08 03:46:21 -04:00
|
|
|
def match_primary_group_changes
|
2018-09-17 01:08:39 -04:00
|
|
|
return unless primary_group_id_changed?
|
|
|
|
|
2019-10-21 06:32:27 -04:00
|
|
|
if title == Group.where(id: primary_group_id_was).pluck_first(:title)
|
2018-09-17 01:08:39 -04:00
|
|
|
self.title = primary_group&.title
|
|
|
|
end
|
2021-07-08 03:46:21 -04:00
|
|
|
|
|
|
|
if flair_group_id == primary_group_id_was
|
|
|
|
self.flair_group_id = primary_group&.id
|
|
|
|
end
|
2018-09-17 01:08:39 -04:00
|
|
|
end
|
|
|
|
|
2022-08-09 12:22:39 -04:00
|
|
|
def self.first_login_admin_id
|
|
|
|
User.where(admin: true)
|
|
|
|
.human_users
|
|
|
|
.joins(:user_auth_tokens)
|
|
|
|
.order('user_auth_tokens.created_at')
|
|
|
|
.pluck_first(:id)
|
|
|
|
end
|
|
|
|
|
2013-07-07 06:40:35 -04:00
|
|
|
private
|
|
|
|
|
2022-10-26 18:38:50 -04:00
|
|
|
def set_default_sidebar_section_links
|
|
|
|
return if !SiteSetting.enable_experimental_sidebar_hamburger
|
|
|
|
return if staged? || bot?
|
|
|
|
|
|
|
|
records = []
|
|
|
|
|
|
|
|
if SiteSetting.default_sidebar_categories.present?
|
|
|
|
category_ids = SiteSetting.default_sidebar_categories.split("|")
|
|
|
|
|
|
|
|
# Filters out categories that user does not have access to or do not exist anymore
|
|
|
|
category_ids = Category.secured(self.guardian).where(id: category_ids).pluck(:id)
|
|
|
|
|
|
|
|
category_ids.each do |category_id|
|
|
|
|
records.push(
|
|
|
|
linkable_type: 'Category',
|
|
|
|
linkable_id: category_id,
|
|
|
|
user_id: self.id
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
if SiteSetting.tagging_enabled && SiteSetting.default_sidebar_tags.present?
|
|
|
|
tag_names = SiteSetting.default_sidebar_tags.split("|")
|
|
|
|
|
|
|
|
# Filters out tags that user cannot see or do not exist anymore
|
|
|
|
tag_ids = DiscourseTagging.filter_visible(Tag, self.guardian).where(name: tag_names).pluck(:id)
|
|
|
|
|
|
|
|
tag_ids.each do |tag_id|
|
|
|
|
records.push(
|
|
|
|
linkable_type: 'Tag',
|
|
|
|
linkable_id: tag_id,
|
|
|
|
user_id: self.id
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
SidebarSectionLink.insert_all!(records) if records.present?
|
|
|
|
end
|
|
|
|
|
2021-08-02 10:15:53 -04:00
|
|
|
def stat
|
|
|
|
user_stat || create_user_stat
|
|
|
|
end
|
|
|
|
|
2019-06-17 01:10:47 -04:00
|
|
|
def trigger_user_automatic_group_refresh
|
|
|
|
if !staged
|
|
|
|
Group.user_trust_level_change!(id, trust_level)
|
|
|
|
end
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2019-05-27 12:12:26 -04:00
|
|
|
def trigger_user_updated_event
|
|
|
|
DiscourseEvent.trigger(:user_updated, self)
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-09-20 22:06:08 -04:00
|
|
|
def check_if_title_is_badged_granted
|
|
|
|
if title_changed? && !new_record? && user_profile
|
2019-11-08 00:34:24 -05:00
|
|
|
badge_matching_title = title && badges.find do |badge|
|
|
|
|
badge.allow_title? && (badge.display_name == title || badge.name == title)
|
|
|
|
end
|
|
|
|
user_profile.update(
|
|
|
|
badge_granted_title: badge_matching_title.present?,
|
|
|
|
granted_title_badge_id: badge_matching_title&.id
|
|
|
|
)
|
2018-09-20 22:06:08 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-10-23 17:24:50 -04:00
|
|
|
def previous_visit_at_update_required?(timestamp)
|
2014-01-16 22:38:08 -05:00
|
|
|
seen_before? && (last_seen_at < (timestamp - SiteSetting.previous_visit_timeout_hours.hours))
|
2013-10-23 17:24:50 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_previous_visit(timestamp)
|
|
|
|
update_visit_record!(timestamp.to_date)
|
|
|
|
if previous_visit_at_update_required?(timestamp)
|
|
|
|
update_column(:previous_visit_at, last_seen_at)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-16 03:36:27 -04:00
|
|
|
def trigger_user_created_event
|
2017-03-16 04:02:34 -04:00
|
|
|
DiscourseEvent.trigger(:user_created, self)
|
2017-03-16 03:36:27 -04:00
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-07-23 03:49:49 -04:00
|
|
|
def trigger_user_destroyed_event
|
|
|
|
DiscourseEvent.trigger(:user_destroyed, self)
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2017-10-25 01:02:18 -04:00
|
|
|
def set_skip_validate_email
|
2017-08-08 22:56:08 -04:00
|
|
|
if self.primary_email
|
2017-10-25 01:02:18 -04:00
|
|
|
self.primary_email.skip_validate_email = !should_validate_email_address?
|
2017-08-08 22:56:08 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-12-14 16:52:37 -05:00
|
|
|
def check_site_contact_username
|
|
|
|
if (saved_change_to_admin? || saved_change_to_moderator?) &&
|
|
|
|
self.username == SiteSetting.site_contact_username && !staff?
|
|
|
|
SiteSetting.set_and_log(:site_contact_username, SiteSetting.defaults[:site_contact_username])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-31 00:46:22 -04:00
|
|
|
def self.ensure_consistency!
|
|
|
|
DB.exec <<~SQL
|
|
|
|
UPDATE users
|
|
|
|
SET uploaded_avatar_id = NULL
|
|
|
|
WHERE uploaded_avatar_id IN (
|
|
|
|
SELECT u1.uploaded_avatar_id FROM users u1
|
|
|
|
LEFT JOIN uploads up
|
|
|
|
ON u1.uploaded_avatar_id = up.id
|
|
|
|
WHERE u1.uploaded_avatar_id IS NOT NULL AND
|
|
|
|
up.id IS NULL
|
|
|
|
)
|
|
|
|
SQL
|
|
|
|
end
|
2013-02-05 14:16:51 -05:00
|
|
|
end
|
2013-05-23 22:48:32 -04:00
|
|
|
|
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: users
|
|
|
|
#
|
2017-11-23 15:55:44 -05:00
|
|
|
# id :integer not null, primary key
|
|
|
|
# username :string(60) not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
2019-01-11 14:29:56 -05:00
|
|
|
# name :string
|
2017-11-23 15:55:44 -05:00
|
|
|
# seen_notification_id :integer default(0), not null
|
|
|
|
# last_posted_at :datetime
|
|
|
|
# password_hash :string(64)
|
|
|
|
# salt :string(32)
|
|
|
|
# active :boolean default(FALSE), not null
|
|
|
|
# username_lower :string(60) not null
|
|
|
|
# last_seen_at :datetime
|
|
|
|
# admin :boolean default(FALSE), not null
|
|
|
|
# last_emailed_at :datetime
|
|
|
|
# trust_level :integer not null
|
|
|
|
# approved :boolean default(FALSE), not null
|
|
|
|
# approved_by_id :integer
|
|
|
|
# approved_at :datetime
|
|
|
|
# previous_visit_at :datetime
|
|
|
|
# suspended_at :datetime
|
|
|
|
# suspended_till :datetime
|
|
|
|
# date_of_birth :date
|
|
|
|
# views :integer default(0), not null
|
|
|
|
# flag_level :integer default(0), not null
|
|
|
|
# ip_address :inet
|
|
|
|
# moderator :boolean default(FALSE)
|
2019-01-11 14:29:56 -05:00
|
|
|
# title :string
|
2017-11-23 15:55:44 -05:00
|
|
|
# uploaded_avatar_id :integer
|
2019-01-11 12:19:23 -05:00
|
|
|
# locale :string(10)
|
2019-01-11 14:29:56 -05:00
|
|
|
# primary_group_id :integer
|
2017-11-23 15:55:44 -05:00
|
|
|
# registration_ip_address :inet
|
|
|
|
# staged :boolean default(FALSE), not null
|
|
|
|
# first_seen_at :datetime
|
|
|
|
# silenced_till :datetime
|
2019-01-03 12:03:01 -05:00
|
|
|
# group_locked_trust_level :integer
|
2017-11-23 15:55:44 -05:00
|
|
|
# manual_locked_trust_level :integer
|
2019-10-17 01:57:53 -04:00
|
|
|
# secure_identifier :string
|
2021-07-08 03:46:21 -04:00
|
|
|
# flair_group_id :integer
|
2022-05-06 03:11:16 -04:00
|
|
|
# last_seen_reviewable_id :integer
|
2013-05-23 22:48:32 -04:00
|
|
|
#
|
|
|
|
# Indexes
|
|
|
|
#
|
2018-07-16 02:18:07 -04:00
|
|
|
# idx_users_admin (id) WHERE admin
|
|
|
|
# idx_users_moderator (id) WHERE moderator
|
2016-11-23 21:13:03 -05:00
|
|
|
# index_users_on_last_posted_at (last_posted_at)
|
|
|
|
# index_users_on_last_seen_at (last_seen_at)
|
2019-10-17 01:57:53 -04:00
|
|
|
# index_users_on_secure_identifier (secure_identifier) UNIQUE
|
2016-11-23 21:13:03 -05:00
|
|
|
# index_users_on_uploaded_avatar_id (uploaded_avatar_id)
|
|
|
|
# index_users_on_username (username) UNIQUE
|
|
|
|
# index_users_on_username_lower (username_lower) UNIQUE
|
2013-05-23 22:48:32 -04:00
|
|
|
#
|