1 # == Schema Information
5 # email :string not null
6 # id :bigint(8) not null, primary key
7 # pass_crypt :string not null
8 # creation_time :datetime not null
9 # display_name :string default(""), not null
10 # data_public :boolean default(FALSE), not null
11 # description :text default(""), not null
14 # home_zoom :integer default(3)
15 # nearby :integer default(50)
17 # email_valid :boolean default(FALSE), not null
21 # status :enum default("pending"), not null
22 # terms_agreed :datetime
23 # consider_pd :boolean default(FALSE), not null
25 # preferred_editor :string
26 # terms_seen :boolean default(FALSE), not null
27 # description_format :enum default("markdown"), not null
28 # changesets_count :integer default(0), not null
29 # traces_count :integer default(0), not null
30 # diary_entries_count :integer default(0), not null
31 # image_use_gravatar :boolean default(FALSE), not null
32 # auth_provider :string
33 # home_tile :bigint(8)
34 # tou_agreed :datetime
38 # users_auth_idx (auth_provider,auth_uid) UNIQUE
39 # users_display_name_idx (display_name) UNIQUE
40 # users_display_name_lower_idx (lower((display_name)::text))
41 # users_email_idx (email) UNIQUE
42 # users_email_lower_idx (lower((email)::text))
43 # users_home_idx (home_tile)
46 class User < ApplicationRecord
50 has_many :traces, -> { where(:visible => true) }
51 has_many :diary_entries, -> { order(:created_at => :desc) }, :inverse_of => :user
52 has_many :diary_comments, -> { order(:created_at => :desc) }, :inverse_of => :user
53 has_many :diary_entry_subscriptions, :class_name => "DiaryEntrySubscription"
54 has_many :diary_subscriptions, :through => :diary_entry_subscriptions, :source => :diary_entry
55 has_many :messages, -> { where(:to_user_visible => true).order(:sent_on => :desc).preload(:sender, :recipient) }, :foreign_key => :to_user_id
56 has_many :new_messages, -> { where(:to_user_visible => true, :message_read => false).order(:sent_on => :desc) }, :class_name => "Message", :foreign_key => :to_user_id
57 has_many :sent_messages, -> { where(:from_user_visible => true).order(:sent_on => :desc).preload(:sender, :recipient) }, :class_name => "Message", :foreign_key => :from_user_id
58 has_many :friendships, -> { joins(:befriendee).where(:users => { :status => %w[active confirmed] }) }
59 has_many :friends, :through => :friendships, :source => :befriendee
60 has_many :tokens, :class_name => "UserToken", :dependent => :destroy
61 has_many :preferences, :class_name => "UserPreference"
62 has_many :changesets, -> { order(:created_at => :desc) }, :inverse_of => :user
63 has_many :changeset_comments, :foreign_key => :author_id, :inverse_of => :author
64 has_and_belongs_to_many :changeset_subscriptions, :class_name => "Changeset", :join_table => "changesets_subscribers", :foreign_key => "subscriber_id"
65 has_many :note_comments, :foreign_key => :author_id, :inverse_of => :author
66 has_many :notes, :through => :note_comments
68 has_many :client_applications
69 has_many :oauth_tokens, -> { order(:authorized_at => :desc).preload(:client_application) }, :class_name => "OauthToken", :inverse_of => :user
71 has_many :oauth2_applications, :class_name => Doorkeeper.config.application_model.name, :as => :owner
72 has_many :access_grants, :class_name => Doorkeeper.config.access_grant_model.name, :foreign_key => :resource_owner_id
73 has_many :access_tokens, :class_name => Doorkeeper.config.access_token_model.name, :foreign_key => :resource_owner_id
75 has_many :blocks, :class_name => "UserBlock"
76 has_many :blocks_created, :class_name => "UserBlock", :foreign_key => :creator_id, :inverse_of => :creator
77 has_many :blocks_revoked, :class_name => "UserBlock", :foreign_key => :revoker_id, :inverse_of => :revoker
79 has_many :roles, :class_name => "UserRole"
81 has_many :issues, :class_name => "Issue", :foreign_key => :reported_user_id, :inverse_of => :reported_user
82 has_many :issue_comments
86 scope :visible, -> { where(:status => %w[pending active confirmed]) }
87 scope :active, -> { where(:status => %w[active confirmed]) }
88 scope :identifiable, -> { where(:data_public => true) }
90 has_one_attached :avatar, :service => Settings.avatar_storage
92 validates :display_name, :presence => true, :length => 3..255,
93 :exclusion => %w[new terms save confirm confirm-email go_public reset-password forgot-password suspended]
94 validates :display_name, :if => proc { |u| u.display_name_changed? },
95 :uniqueness => { :case_sensitive => false }
96 validates :display_name, :if => proc { |u| u.display_name_changed? },
97 :characters => { :url_safe => true },
98 :whitespace => { :leading => false, :trailing => false }
99 validates :email, :presence => true, :confirmation => true, :characters => true
100 validates :email, :if => proc { |u| u.email_changed? },
101 :uniqueness => { :case_sensitive => false }
102 validates :email, :if => proc { |u| u.email_changed? },
103 :whitespace => { :leading => false, :trailing => false }
104 validates :pass_crypt, :confirmation => true, :length => 8..255
105 validates :home_lat, :allow_nil => true, :numericality => true, :inclusion => { :in => -90..90 }
106 validates :home_lon, :allow_nil => true, :numericality => true, :inclusion => { :in => -180..180 }
107 validates :home_zoom, :allow_nil => true, :numericality => { :only_integer => true }
108 validates :preferred_editor, :inclusion => Editors::ALL_EDITORS, :allow_nil => true
109 validates :auth_uid, :unless => proc { |u| u.auth_provider.nil? },
110 :uniqueness => { :scope => :auth_provider }
111 validates :avatar, :if => proc { |u| u.attachment_changes["avatar"] },
114 validates_email_format_of :email, :if => proc { |u| u.email_changed? }
115 validates_email_format_of :new_email, :allow_blank => true, :if => proc { |u| u.new_email_changed? }
117 alias_attribute :created_at, :creation_time
119 before_save :encrypt_password
120 before_save :update_tile
121 after_save :spam_check
127 def self.authenticate(options)
128 if options[:username] && options[:password]
129 user = find_by("email = ? OR display_name = ?", options[:username].strip, options[:username])
132 users = where("LOWER(email) = LOWER(?) OR LOWER(display_name) = LOWER(?)", options[:username].strip, options[:username])
134 user = users.first if users.count == 1
137 if user && PasswordHash.check(user.pass_crypt, user.pass_salt, options[:password])
138 if PasswordHash.upgrade?(user.pass_crypt, user.pass_salt)
139 user.pass_crypt, user.pass_salt = PasswordHash.create(options[:password])
145 elsif options[:token]
146 token = UserToken.find_by(:token => options[:token])
147 user = token.user if token
151 (user.status == "deleted" ||
152 (user.status == "pending" && !options[:pending]) ||
153 (user.status == "suspended" && !options[:suspended]))
157 token.update(:expiry => 1.week.from_now) if token && user
162 aasm :column => :status, :no_direct_assignment => true do
163 state :pending, :initial => true
169 # A normal account is active
171 transitions :from => :pending, :to => :active
174 # Used in test suite, not something that we would normally need to do.
177 transitions :from => :active, :to => :pending
181 # To confirm an account is used to override the spam scoring
183 transitions :from => [:pending, :active, :suspended], :to => :confirmed
186 # To unconfirm an account is to make it subject to future spam scoring again
188 transitions :from => :confirmed, :to => :active
191 # Accounts can be automatically suspended by spam_check
193 transitions :from => [:pending, :active], :to => :suspended
196 # Unsuspending an account moves it back to active without overriding the spam scoring
198 transitions :from => :suspended, :to => :active
201 # Mark the account as deleted but keep all data intact
203 transitions :from => [:pending, :active, :confirmed, :suspended], :to => :deleted
207 transitions :from => [:deleted], :to => :active
210 # Mark the account as deleted and remove personal data
211 event :soft_destroy do
213 revoke_authentication_tokens
217 transitions :from => [:pending, :active, :confirmed, :suspended], :to => :deleted
222 RichText.new(self[:description_format], self[:description])
226 attribute_present?(:languages) ? self[:languages].split(/ *[, ] */) : []
229 def languages=(languages)
230 self[:languages] = languages.join(",")
233 def preferred_language
234 languages.find { |l| Language.exists?(:code => l) }
237 def preferred_languages
238 @preferred_languages ||= Locale.list(languages)
245 def nearby(radius = Settings.nearby_radius, num = Settings.nearby_users)
247 gc = OSM::GreatCircle.new(home_lat, home_lon)
248 sql_for_area = QuadTile.sql_for_area(gc.bounds(radius), "home_")
249 sql_for_distance = gc.sql_for_distance("home_lat", "home_lon")
250 nearby = User.active.identifiable
251 .where.not(:id => id)
253 .where("#{sql_for_distance} <= ?", radius)
254 .order(Arel.sql(sql_for_distance))
262 def distance(nearby_user)
263 OSM::GreatCircle.new(home_lat, home_lon).distance(nearby_user.home_lat, nearby_user.home_lon)
266 def friends_with?(new_friend)
267 friendships.exists?(:befriendee => new_friend)
271 # returns true if a user is visible
273 %w[pending active confirmed].include? status
277 # returns true if a user is active
279 %w[active confirmed].include? status
283 # returns true if the user has the moderator role, false otherwise
289 # returns true if the user has the administrator role, false otherwise
291 role? "administrator"
295 # returns true if the user has the requested role
297 roles.any? { |r| r.role == role }
301 # returns the first active block which would require users to view
302 # a message, or nil if there are none.
304 blocks.active.detect(&:needs_view?)
308 # revoke any authentication tokens
309 def revoke_authentication_tokens
310 oauth_tokens.authorized.each(&:invalidate!)
311 access_tokens.not_expired.each(&:revoke)
315 # remove personal data - leave the account but purge most personal data
316 def remove_personal_data
319 self.display_name = "user_#{id}"
320 self.description = ""
323 self.email_valid = false
325 self.auth_provider = nil
332 # return a spam score for a user
334 changeset_score = changesets.size * 50
335 trace_score = traces.size * 50
336 diary_entry_score = diary_entries.visible.inject(0) { |acc, elem| acc + elem.body.spam_score }
337 diary_comment_score = diary_comments.visible.inject(0) { |acc, elem| acc + elem.body.spam_score }
339 score = description.spam_score / 4.0
340 score += diary_entries.where("created_at > ?", 1.day.ago).count * 10
341 score += diary_entry_score / diary_entries.length unless diary_entries.empty?
342 score += diary_comment_score / diary_comments.length unless diary_comments.empty?
343 score -= changeset_score
350 # perform a spam check on a user
352 suspend! if may_suspend? && spam_score > Settings.spam_threshold
356 # return an oauth 1 access token for a specified application
357 def access_token(application_key)
358 ClientApplication.find_by(:key => application_key).access_token_for_user(self)
362 # return an oauth 2 access token for a specified application
363 def oauth_token(application_id)
364 application = Doorkeeper.config.application_model.find_by(:uid => application_id)
366 Doorkeeper.config.access_token_model.find_or_create_for(
367 :application => application,
368 :resource_owner => self,
369 :scopes => application.scopes
374 digest = Digest::SHA256.new
376 digest.update(pass_crypt)
380 def max_messages_per_hour
381 account_age_in_seconds = Time.now.utc - created_at
382 account_age_in_hours = account_age_in_seconds / 3600
383 recent_messages = messages.where("sent_on >= ?", Time.now.utc - 3600).count
384 active_reports = issues.with_status(:open).sum(:reports_count)
385 max_messages = account_age_in_hours.ceil + recent_messages - (active_reports * 10)
386 max_messages.clamp(0, Settings.max_messages_per_hour)
389 def max_friends_per_hour
390 account_age_in_seconds = Time.now.utc - created_at
391 account_age_in_hours = account_age_in_seconds / 3600
392 recent_friends = Friendship.where(:befriendee => self).where("created_at >= ?", Time.now.utc - 3600).count
393 active_reports = issues.with_status(:open).sum(:reports_count)
394 max_friends = account_age_in_hours.ceil + recent_friends - (active_reports * 10)
395 max_friends.clamp(0, Settings.max_friends_per_hour)
398 def max_changeset_comments_per_hour
400 Settings.moderator_changeset_comments_per_hour
402 previous_comments = changeset_comments.limit(200).count
403 active_reports = issues.with_status(:open).sum(:reports_count)
404 max_comments = previous_comments / 200.0 * Settings.max_changeset_comments_per_hour
405 max_comments = max_comments.floor.clamp(Settings.initial_changeset_comments_per_hour, Settings.max_changeset_comments_per_hour)
406 max_comments /= 2**active_reports
407 max_comments.floor.clamp(Settings.min_changeset_comments_per_hour, Settings.max_changeset_comments_per_hour)
414 if pass_crypt_confirmation
415 self.pass_crypt, self.pass_salt = PasswordHash.create(pass_crypt)
416 self.pass_crypt_confirmation = nil
421 self.home_tile = QuadTile.tile_for_point(home_lat, home_lon) if home_location?