2012-10-03 17:38:42 +01:00
|
|
|
class User < Avatar
|
2014-04-11 21:29:43 +01:00
|
|
|
extend FriendlyId
|
|
|
|
friendly_id :uname, use: [:finders]
|
|
|
|
|
2014-03-11 08:58:36 +00:00
|
|
|
include PersonalRepository
|
|
|
|
include ActsLikeMember
|
2014-03-11 07:39:25 +00:00
|
|
|
include EventLoggable
|
2014-03-25 18:02:53 +00:00
|
|
|
include TokenAuthenticatable
|
2014-03-11 07:39:25 +00:00
|
|
|
|
2012-12-06 18:04:39 +00:00
|
|
|
ROLES = ['', 'admin', 'banned', 'tester']
|
2012-12-27 18:27:50 +00:00
|
|
|
EXTENDED_ROLES = ROLES | ['system']
|
2012-01-17 11:57:46 +00:00
|
|
|
LANGUAGES_FOR_SELECT = [['Russian', 'ru'], ['English', 'en']]
|
2012-01-18 13:06:18 +00:00
|
|
|
LANGUAGES = LANGUAGES_FOR_SELECT.map(&:last)
|
2014-03-13 16:35:00 +00:00
|
|
|
NAME_REGEXP = /[a-z0-9_]+/
|
2011-10-23 22:39:44 +01:00
|
|
|
|
2016-09-25 23:40:53 +01:00
|
|
|
devise :database_authenticatable, :registerable, :recoverable,
|
2016-03-20 09:24:23 +00:00
|
|
|
:rememberable, :validatable, :lockable, :confirmable
|
2016-09-25 23:40:53 +01:00
|
|
|
devise :omniauthable, omniauth_providers: %i(github)
|
2012-03-03 18:05:02 +00:00
|
|
|
|
2015-02-10 22:08:39 +00:00
|
|
|
has_one :notifier, class_name: 'SettingsNotifier', dependent: :destroy #:notifier
|
|
|
|
has_one :builds_setting, class_name: 'UserBuildsSetting', dependent: :destroy
|
2012-01-11 13:58:13 +00:00
|
|
|
|
2014-01-21 04:51:49 +00:00
|
|
|
has_many :activity_feeds, dependent: :destroy
|
2012-01-25 08:31:49 +00:00
|
|
|
|
2014-01-21 04:51:49 +00:00
|
|
|
has_many :authentications, dependent: :destroy
|
|
|
|
has_many :build_lists, dependent: :destroy
|
2011-10-21 18:17:49 +01:00
|
|
|
|
2014-01-21 04:51:49 +00:00
|
|
|
has_many :relations, as: :actor, dependent: :destroy
|
|
|
|
has_many :targets, as: :actor, class_name: 'Relation', dependent: :destroy
|
2011-10-13 16:55:03 +01:00
|
|
|
|
2014-01-21 04:51:49 +00:00
|
|
|
has_many :projects, through: :targets, source: :target, source_type: 'Project', autosave: true
|
|
|
|
has_many :groups, through: :targets, source: :target, source_type: 'Group', autosave: true
|
|
|
|
has_many :platforms, through: :targets, source: :target, source_type: 'Platform', autosave: true
|
|
|
|
has_many :repositories, through: :targets, source: :target, source_type: 'Repository'
|
2011-10-13 16:55:03 +01:00
|
|
|
|
2014-01-21 04:51:49 +00:00
|
|
|
has_many :own_projects, as: :owner, class_name: 'Project', dependent: :destroy
|
|
|
|
has_many :own_groups, foreign_key: :owner_id, class_name: 'Group', dependent: :destroy
|
|
|
|
has_many :own_platforms, as: :owner, class_name: 'Platform', dependent: :destroy
|
2011-10-13 16:55:03 +01:00
|
|
|
|
2012-07-17 10:31:32 +01:00
|
|
|
has_many :key_pairs
|
|
|
|
|
2014-11-28 16:19:06 +00:00
|
|
|
validates :uname, presence: true,
|
|
|
|
uniqueness: { case_sensitive: false },
|
|
|
|
format: { with: /\A#{NAME_REGEXP.source}\z/ },
|
|
|
|
reserved_name: true,
|
|
|
|
length: { maximum: 30 }
|
|
|
|
validates :name, length: { maximum: 100 }
|
|
|
|
|
2012-05-02 10:18:07 +01:00
|
|
|
validate { errors.add(:uname, :taken) if Group.by_uname(uname).present? }
|
2014-03-11 12:40:44 +00:00
|
|
|
validates :role, inclusion: { in: EXTENDED_ROLES }, allow_blank: true
|
|
|
|
validates :language, inclusion: { in: LANGUAGES }, allow_blank: true
|
2011-03-10 21:48:15 +00:00
|
|
|
|
2012-05-02 10:18:07 +01:00
|
|
|
attr_readonly :uname
|
2014-11-06 22:00:23 +00:00
|
|
|
attr_accessor :login, :delete_avatar
|
2011-10-11 21:56:51 +01:00
|
|
|
|
2014-03-11 07:39:25 +00:00
|
|
|
scope :opened, -> { where('users.role != \'system\' OR users.role IS NULL') }
|
|
|
|
scope :real, -> { where(role: ['', nil]) }
|
2014-03-11 12:40:44 +00:00
|
|
|
EXTENDED_ROLES.select { |type| type.present?}.each do |type|
|
2014-03-11 07:39:25 +00:00
|
|
|
scope type.to_sym, -> { where(role: type) }
|
2012-12-28 19:24:41 +00:00
|
|
|
end
|
2012-03-06 15:53:04 +00:00
|
|
|
|
2014-03-11 07:39:25 +00:00
|
|
|
scope :member_of_project, ->(item) {
|
|
|
|
where 'users.id IN (?)', item.members.map(&:id).uniq
|
2012-08-24 16:19:26 +01:00
|
|
|
}
|
|
|
|
|
2014-03-11 07:39:25 +00:00
|
|
|
after_create -> { self.create_notifier unless self.system? }
|
2012-04-18 13:46:09 +01:00
|
|
|
before_create :ensure_authentication_token
|
2012-01-11 13:58:13 +00:00
|
|
|
|
2011-11-15 20:05:08 +00:00
|
|
|
def admin?
|
2011-11-16 18:45:01 +00:00
|
|
|
role == 'admin'
|
2011-11-15 20:05:08 +00:00
|
|
|
end
|
2012-01-26 08:53:40 +00:00
|
|
|
|
2012-03-01 17:33:46 +00:00
|
|
|
def user?
|
|
|
|
persisted?
|
|
|
|
end
|
|
|
|
|
2011-11-15 20:05:08 +00:00
|
|
|
def guest?
|
2012-03-01 17:33:46 +00:00
|
|
|
new_record?
|
2011-11-15 20:05:08 +00:00
|
|
|
end
|
|
|
|
|
2012-12-06 18:04:39 +00:00
|
|
|
def tester?
|
|
|
|
role == 'tester'
|
|
|
|
end
|
2012-12-27 18:27:50 +00:00
|
|
|
|
|
|
|
def system?
|
|
|
|
role == 'system'
|
|
|
|
end
|
2012-12-06 18:04:39 +00:00
|
|
|
|
2012-03-22 14:50:15 +00:00
|
|
|
def access_locked?
|
2012-05-02 10:18:07 +01:00
|
|
|
role == 'banned'
|
2012-03-22 14:50:15 +00:00
|
|
|
end
|
|
|
|
|
2011-12-20 17:09:29 +00:00
|
|
|
def fullname
|
2013-03-14 14:55:59 +00:00
|
|
|
return name.present? ? "#{uname} (#{name})" : uname
|
2011-12-20 17:09:29 +00:00
|
|
|
end
|
2012-03-06 15:53:04 +00:00
|
|
|
|
2012-05-02 10:18:07 +01:00
|
|
|
def user_appeal
|
|
|
|
name.presence || uname
|
|
|
|
end
|
|
|
|
|
2011-10-11 21:56:51 +01:00
|
|
|
class << self
|
|
|
|
def find_for_database_authentication(warden_conditions)
|
|
|
|
conditions = warden_conditions.dup
|
|
|
|
login = conditions.delete(:login)
|
2012-12-25 15:55:56 +00:00
|
|
|
where(conditions)
|
|
|
|
.where(["lower(uname) = :value OR lower(email) = :value OR authentication_token = :orig_value",
|
2014-01-21 04:51:49 +00:00
|
|
|
{ value: login.downcase, orig_value: login }]).first
|
2011-10-11 21:56:51 +01:00
|
|
|
end
|
|
|
|
|
2012-12-25 15:55:56 +00:00
|
|
|
def auth_by_token_or_login_pass(user, pass)
|
2014-01-21 04:51:49 +00:00
|
|
|
u = User.find_for_database_authentication(login: user)
|
2012-12-25 15:55:56 +00:00
|
|
|
u if u && !u.access_locked? && (u.authentication_token == user || u.valid_password?(pass))
|
|
|
|
end
|
2011-10-11 21:56:51 +01:00
|
|
|
end
|
2011-03-10 21:48:15 +00:00
|
|
|
|
2012-03-05 15:36:23 +00:00
|
|
|
# def update_with_password(params={})
|
|
|
|
# params.delete(:current_password)
|
|
|
|
# # self.update_without_password(params) # Don't allow password update
|
|
|
|
# if params[:password].blank?
|
|
|
|
# params.delete(:password)
|
|
|
|
# params.delete(:password_confirmation) if params[:password_confirmation].blank?
|
|
|
|
# end
|
|
|
|
# result = update_attributes(params)
|
|
|
|
# clean_up_passwords
|
|
|
|
# result
|
|
|
|
# end
|
2012-01-26 08:53:40 +00:00
|
|
|
|
2012-03-11 23:08:50 +00:00
|
|
|
def owner_of? object
|
|
|
|
if object.respond_to? :owner
|
|
|
|
object.owner_id == self.id or self.group_ids.include? object.owner_id
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
2012-06-19 19:24:35 +01:00
|
|
|
|
2012-06-21 10:49:39 +01:00
|
|
|
def best_role target
|
2013-02-04 14:13:00 +00:00
|
|
|
return nil if target.nil?
|
2012-06-21 10:49:39 +01:00
|
|
|
roles = target_roles(target)
|
|
|
|
return nil if roles.count == 0
|
2012-06-25 15:31:41 +01:00
|
|
|
%w(admin writer reader).each {|role| return role if roles.include?(role)}
|
2012-06-21 10:49:39 +01:00
|
|
|
raise "unknown user #{self.uname} roles #{roles}"
|
|
|
|
end
|
|
|
|
|
|
|
|
protected
|
|
|
|
|
2012-06-20 19:10:27 +01:00
|
|
|
def target_roles target
|
|
|
|
rel, gr, roles = target.relations, self.groups, []
|
|
|
|
|
2012-06-21 15:19:44 +01:00
|
|
|
if target.owner.class == Group
|
2014-01-21 04:51:49 +00:00
|
|
|
owner_group = self.groups.where(id: target.owner.id).first
|
|
|
|
roles += owner_group.actors.where(actor_id: self) if owner_group# user group is owner
|
2012-06-21 15:19:44 +01:00
|
|
|
|
|
|
|
gr = gr.where('groups.id != ?', target.owner.id) # exclude target owner group from users group list
|
2012-06-19 19:24:35 +01:00
|
|
|
end
|
2015-03-31 17:49:02 +01:00
|
|
|
|
|
|
|
if target.class == Group
|
|
|
|
roles += target.actors.where(actor_id: self.id, actor_type: 'User') # user is member of a target group
|
|
|
|
else
|
|
|
|
roles += rel.where(actor_id: gr.pluck('DISTINCT groups.id'), actor_type: 'Group') # user group is member
|
|
|
|
end
|
2014-01-21 04:51:49 +00:00
|
|
|
roles += rel.where(actor_id: self.id, actor_type: 'User') # user is member
|
2012-06-20 19:10:27 +01:00
|
|
|
roles.map(&:role).uniq
|
|
|
|
end
|
|
|
|
|
2011-03-09 16:16:48 +00:00
|
|
|
end
|