]> git.openstreetmap.org Git - rails.git/blob - app/controllers/users_controller.rb
Use CanCanCan for messages controller
[rails.git] / app / controllers / users_controller.rb
1 class UsersController < ApplicationController
2   layout "site", :except => [:api_details]
3
4   skip_before_action :verify_authenticity_token, :only => [:api_read, :api_users, :api_details, :api_gpx_files, :auth_success]
5   before_action :disable_terms_redirect, :only => [:terms, :save, :logout, :api_details]
6   before_action :authorize, :only => [:api_details, :api_gpx_files]
7   before_action :authorize_web, :except => [:api_read, :api_users, :api_details, :api_gpx_files]
8   before_action :set_locale, :except => [:api_read, :api_users, :api_details, :api_gpx_files]
9   before_action :api_deny_access_handler, :only => [:api_read, :api_users, :api_details, :api_gpx_files]
10
11   authorize_resource
12
13   before_action :require_self, :only => [:account]
14   before_action :check_database_readable, :except => [:login, :api_read, :api_users, :api_details, :api_gpx_files]
15   before_action :check_database_writable, :only => [:new, :account, :confirm, :confirm_email, :lost_password, :reset_password, :go_public, :make_friend, :remove_friend]
16   before_action :check_api_readable, :only => [:api_read, :api_users, :api_details, :api_gpx_files]
17   before_action :require_cookies, :only => [:new, :login, :confirm]
18   around_action :api_call_handle_error, :only => [:api_read, :api_users, :api_details, :api_gpx_files]
19   before_action :lookup_user_by_id, :only => [:api_read]
20   before_action :lookup_user_by_name, :only => [:set_status, :delete]
21   before_action :allow_thirdparty_images, :only => [:show, :account]
22
23   def terms
24     @legale = params[:legale] || OSM.ip_to_country(request.remote_ip) || DEFAULT_LEGALE
25     @text = OSM.legal_text_for_country(@legale)
26
27     if request.xhr?
28       render :partial => "terms"
29     else
30       @title = t "users.terms.title"
31
32       if current_user&.terms_agreed?
33         # Already agreed to terms, so just show settings
34         redirect_to :action => :account, :display_name => current_user.display_name
35       elsif current_user.nil? && session[:new_user].nil?
36         redirect_to :action => :login, :referer => request.fullpath
37       end
38     end
39   end
40
41   def save
42     @title = t "users.new.title"
43
44     if params[:decline]
45       if current_user
46         current_user.terms_seen = true
47
48         flash[:notice] = t("users.new.terms declined", :url => t("users.new.terms declined url")).html_safe if current_user.save
49
50         if params[:referer]
51           redirect_to params[:referer]
52         else
53           redirect_to :action => :account, :display_name => current_user.display_name
54         end
55       else
56         redirect_to t("users.terms.declined")
57       end
58     elsif current_user
59       unless current_user.terms_agreed?
60         current_user.consider_pd = params[:user][:consider_pd]
61         current_user.terms_agreed = Time.now.getutc
62         current_user.terms_seen = true
63
64         flash[:notice] = t "users.new.terms accepted" if current_user.save
65       end
66
67       if params[:referer]
68         redirect_to params[:referer]
69       else
70         redirect_to :action => :account, :display_name => current_user.display_name
71       end
72     else
73       self.current_user = session.delete(:new_user)
74
75       if check_signup_allowed(current_user.email)
76         current_user.data_public = true
77         current_user.description = "" if current_user.description.nil?
78         current_user.creation_ip = request.remote_ip
79         current_user.languages = http_accept_language.user_preferred_languages
80         current_user.terms_agreed = Time.now.getutc
81         current_user.terms_seen = true
82
83         if current_user.auth_uid.blank?
84           current_user.auth_provider = nil
85           current_user.auth_uid = nil
86         end
87
88         if current_user.save
89           flash[:piwik_goal] = PIWIK["goals"]["signup"] if defined?(PIWIK)
90
91           referer = welcome_path
92
93           begin
94             uri = URI(session[:referer])
95             %r{map=(.*)/(.*)/(.*)}.match(uri.fragment) do |m|
96               editor = Rack::Utils.parse_query(uri.query).slice("editor")
97               referer = welcome_path({ "zoom" => m[1],
98                                        "lat" => m[2],
99                                        "lon" => m[3] }.merge(editor))
100             end
101           rescue StandardError
102             # Use default
103           end
104
105           if current_user.status == "active"
106             session[:referer] = referer
107             successful_login(current_user)
108           else
109             session[:token] = current_user.tokens.create.token
110             Notifier.signup_confirm(current_user, current_user.tokens.create(:referer => referer)).deliver_later
111             redirect_to :action => "confirm", :display_name => current_user.display_name
112           end
113         else
114           render :action => "new", :referer => params[:referer]
115         end
116       end
117     end
118   end
119
120   def account
121     @tokens = current_user.oauth_tokens.authorized
122
123     if params[:user] && params[:user][:display_name] && params[:user][:description]
124       if params[:user][:auth_provider].blank? ||
125          (params[:user][:auth_provider] == current_user.auth_provider &&
126           params[:user][:auth_uid] == current_user.auth_uid)
127         update_user(current_user, params)
128       else
129         session[:new_user_settings] = params
130         redirect_to auth_url(params[:user][:auth_provider], params[:user][:auth_uid])
131       end
132     elsif errors = session.delete(:user_errors)
133       errors.each do |attribute, error|
134         current_user.errors.add(attribute, error)
135       end
136     end
137     @title = t "users.account.title"
138   end
139
140   def go_public
141     current_user.data_public = true
142     current_user.save
143     flash[:notice] = t "users.go_public.flash success"
144     redirect_to :action => "account", :display_name => current_user.display_name
145   end
146
147   def lost_password
148     @title = t "users.lost_password.title"
149
150     if params[:user] && params[:user][:email]
151       user = User.visible.find_by(:email => params[:user][:email])
152
153       if user.nil?
154         users = User.visible.where("LOWER(email) = LOWER(?)", params[:user][:email])
155
156         user = users.first if users.count == 1
157       end
158
159       if user
160         token = user.tokens.create
161         Notifier.lost_password(user, token).deliver_later
162         flash[:notice] = t "users.lost_password.notice email on way"
163         redirect_to :action => "login"
164       else
165         flash.now[:error] = t "users.lost_password.notice email cannot find"
166       end
167     end
168   end
169
170   def reset_password
171     @title = t "users.reset_password.title"
172
173     if params[:token]
174       token = UserToken.find_by(:token => params[:token])
175
176       if token
177         self.current_user = token.user
178
179         if params[:user]
180           current_user.pass_crypt = params[:user][:pass_crypt]
181           current_user.pass_crypt_confirmation = params[:user][:pass_crypt_confirmation]
182           current_user.status = "active" if current_user.status == "pending"
183           current_user.email_valid = true
184
185           if current_user.save
186             token.destroy
187             flash[:notice] = t "users.reset_password.flash changed"
188             successful_login(current_user)
189           end
190         end
191       else
192         flash[:error] = t "users.reset_password.flash token bad"
193         redirect_to :action => "lost_password"
194       end
195     else
196       head :bad_request
197     end
198   end
199
200   def new
201     @title = t "users.new.title"
202     @referer = params[:referer] || session[:referer]
203
204     append_content_security_policy_directives(
205       :form_action => %w[accounts.google.com *.facebook.com login.live.com github.com meta.wikimedia.org]
206     )
207
208     if current_user
209       # The user is logged in already, so don't show them the signup
210       # page, instead send them to the home page
211       if @referer
212         redirect_to @referer
213       else
214         redirect_to :controller => "site", :action => "index"
215       end
216     elsif params.key?(:auth_provider) && params.key?(:auth_uid)
217       self.current_user = User.new(:email => params[:email],
218                                    :email_confirmation => params[:email],
219                                    :display_name => params[:nickname],
220                                    :auth_provider => params[:auth_provider],
221                                    :auth_uid => params[:auth_uid])
222
223       flash.now[:notice] = render_to_string :partial => "auth_association"
224     else
225       check_signup_allowed
226
227       self.current_user = User.new
228     end
229   end
230
231   def create
232     self.current_user = User.new(user_params)
233
234     if check_signup_allowed(current_user.email)
235       session[:referer] = params[:referer]
236
237       current_user.status = "pending"
238
239       if current_user.auth_provider.present? && current_user.pass_crypt.empty?
240         # We are creating an account with external authentication and
241         # no password was specified so create a random one
242         current_user.pass_crypt = SecureRandom.base64(16)
243         current_user.pass_crypt_confirmation = current_user.pass_crypt
244       end
245
246       if current_user.invalid?
247         # Something is wrong with a new user, so rerender the form
248         render :action => "new"
249       elsif current_user.auth_provider.present?
250         # Verify external authenticator before moving on
251         session[:new_user] = current_user
252         redirect_to auth_url(current_user.auth_provider, current_user.auth_uid)
253       else
254         # Save the user record
255         session[:new_user] = current_user
256         redirect_to :action => :terms
257       end
258     end
259   end
260
261   def login
262     session[:referer] = params[:referer] if params[:referer]
263
264     if params[:username].present? && params[:password].present?
265       session[:remember_me] ||= params[:remember_me]
266       password_authentication(params[:username], params[:password])
267     elsif params[:openid_url].present?
268       session[:remember_me] ||= params[:remember_me_openid]
269       redirect_to auth_url("openid", params[:openid_url], params[:referer])
270     end
271   end
272
273   def logout
274     @title = t "users.logout.title"
275
276     if params[:session] == session.id
277       if session[:token]
278         token = UserToken.find_by(:token => session[:token])
279         token&.destroy
280         session.delete(:token)
281       end
282       session.delete(:user)
283       session_expires_automatically
284       if params[:referer]
285         redirect_to params[:referer]
286       else
287         redirect_to :controller => "site", :action => "index"
288       end
289     end
290   end
291
292   def confirm
293     if request.post?
294       token = UserToken.find_by(:token => params[:confirm_string])
295       if token&.user&.active?
296         flash[:error] = t("users.confirm.already active")
297         redirect_to :action => "login"
298       elsif !token || token.expired?
299         flash[:error] = t("users.confirm.unknown token")
300         redirect_to :action => "confirm"
301       else
302         user = token.user
303         user.status = "active"
304         user.email_valid = true
305         flash[:notice] = gravatar_status_message(user) if gravatar_enable(user)
306         user.save!
307         referer = token.referer
308         token.destroy
309
310         if session[:token]
311           token = UserToken.find_by(:token => session[:token])
312           session.delete(:token)
313         else
314           token = nil
315         end
316
317         if token.nil? || token.user != user
318           flash[:notice] = t("users.confirm.success")
319           redirect_to :action => :login, :referer => referer
320         else
321           token.destroy
322
323           session[:user] = user.id
324
325           redirect_to referer || welcome_path
326         end
327       end
328     else
329       user = User.find_by(:display_name => params[:display_name])
330
331       redirect_to root_path if user.nil? || user.active?
332     end
333   end
334
335   def confirm_resend
336     user = User.find_by(:display_name => params[:display_name])
337     token = UserToken.find_by(:token => session[:token])
338
339     if user.nil? || token.nil? || token.user != user
340       flash[:error] = t "users.confirm_resend.failure", :name => params[:display_name]
341     else
342       Notifier.signup_confirm(user, user.tokens.create).deliver_later
343       flash[:notice] = t("users.confirm_resend.success", :email => user.email, :sender => SUPPORT_EMAIL).html_safe
344     end
345
346     redirect_to :action => "login"
347   end
348
349   def confirm_email
350     if request.post?
351       token = UserToken.find_by(:token => params[:confirm_string])
352       if token&.user&.new_email?
353         self.current_user = token.user
354         current_user.email = current_user.new_email
355         current_user.new_email = nil
356         current_user.email_valid = true
357         gravatar_enabled = gravatar_enable(current_user)
358         if current_user.save
359           flash[:notice] = if gravatar_enabled
360                              t("users.confirm_email.success") + " " + gravatar_status_message(current_user)
361                            else
362                              t("users.confirm_email.success")
363                            end
364         else
365           flash[:errors] = current_user.errors
366         end
367         token.destroy
368         session[:user] = current_user.id
369         redirect_to :action => "account", :display_name => current_user.display_name
370       elsif token
371         flash[:error] = t "users.confirm_email.failure"
372         redirect_to :action => "account", :display_name => token.user.display_name
373       else
374         flash[:error] = t "users.confirm_email.unknown_token"
375       end
376     end
377   end
378
379   def api_read
380     if @user.visible?
381       render :action => :api_read, :content_type => "text/xml"
382     else
383       head :gone
384     end
385   end
386
387   def api_details
388     @user = current_user
389     render :action => :api_read, :content_type => "text/xml"
390   end
391
392   def api_users
393     raise OSM::APIBadUserInput, "The parameter users is required, and must be of the form users=id[,id[,id...]]" unless params["users"]
394
395     ids = params["users"].split(",").collect(&:to_i)
396
397     raise OSM::APIBadUserInput, "No users were given to search for" if ids.empty?
398
399     @users = User.visible.find(ids)
400
401     render :action => :api_users, :content_type => "text/xml"
402   end
403
404   def api_gpx_files
405     doc = OSM::API.new.get_xml_doc
406     current_user.traces.reload.each do |trace|
407       doc.root << trace.to_xml_node
408     end
409     render :xml => doc.to_s
410   end
411
412   def show
413     @user = User.find_by(:display_name => params[:display_name])
414
415     if @user &&
416        (@user.visible? || (current_user&.administrator?))
417       @title = @user.display_name
418     else
419       render_unknown_user params[:display_name]
420     end
421   end
422
423   def make_friend
424     @new_friend = User.find_by(:display_name => params[:display_name])
425
426     if @new_friend
427       if request.post?
428         friend = Friend.new
429         friend.befriender = current_user
430         friend.befriendee = @new_friend
431         if current_user.is_friends_with?(@new_friend)
432           flash[:warning] = t "users.make_friend.already_a_friend", :name => @new_friend.display_name
433         elsif friend.save
434           flash[:notice] = t "users.make_friend.success", :name => @new_friend.display_name
435           Notifier.friend_notification(friend).deliver_later
436         else
437           friend.add_error(t("users.make_friend.failed", :name => @new_friend.display_name))
438         end
439
440         if params[:referer]
441           redirect_to params[:referer]
442         else
443           redirect_to :action => "show"
444         end
445       end
446     else
447       render_unknown_user params[:display_name]
448     end
449   end
450
451   def remove_friend
452     @friend = User.find_by(:display_name => params[:display_name])
453
454     if @friend
455       if request.post?
456         if current_user.is_friends_with?(@friend)
457           Friend.where(:user_id => current_user.id, :friend_user_id => @friend.id).delete_all
458           flash[:notice] = t "users.remove_friend.success", :name => @friend.display_name
459         else
460           flash[:error] = t "users.remove_friend.not_a_friend", :name => @friend.display_name
461         end
462
463         if params[:referer]
464           redirect_to params[:referer]
465         else
466           redirect_to :action => "show"
467         end
468       end
469     else
470       render_unknown_user params[:display_name]
471     end
472   end
473
474   ##
475   # sets a user's status
476   def set_status
477     @user.status = params[:status]
478     @user.save
479     redirect_to user_path(:display_name => params[:display_name])
480   end
481
482   ##
483   # delete a user, marking them as deleted and removing personal data
484   def delete
485     @user.delete
486     redirect_to user_path(:display_name => params[:display_name])
487   end
488
489   ##
490   # display a list of users matching specified criteria
491   def index
492     if request.post?
493       ids = params[:user].keys.collect(&:to_i)
494
495       User.where(:id => ids).update_all(:status => "confirmed") if params[:confirm]
496       User.where(:id => ids).update_all(:status => "deleted") if params[:hide]
497
498       redirect_to url_for(:status => params[:status], :ip => params[:ip], :page => params[:page])
499     else
500       @params = params.permit(:status, :ip)
501
502       conditions = {}
503       conditions[:status] = @params[:status] if @params[:status]
504       conditions[:creation_ip] = @params[:ip] if @params[:ip]
505
506       @user_pages, @users = paginate(:users,
507                                      :conditions => conditions,
508                                      :order => :id,
509                                      :per_page => 50)
510     end
511   end
512
513   ##
514   # omniauth success callback
515   def auth_success
516     auth_info = request.env["omniauth.auth"]
517
518     provider = auth_info[:provider]
519     uid = auth_info[:uid]
520     name = auth_info[:info][:name]
521     email = auth_info[:info][:email]
522
523     case provider
524     when "openid"
525       email_verified = uid.match(%r{https://www.google.com/accounts/o8/id?(.*)}) ||
526                        uid.match(%r{https://me.yahoo.com/(.*)})
527     when "google", "facebook"
528       email_verified = true
529     else
530       email_verified = false
531     end
532
533     if settings = session.delete(:new_user_settings)
534       current_user.auth_provider = provider
535       current_user.auth_uid = uid
536
537       update_user(current_user, settings)
538
539       session[:user_errors] = current_user.errors.as_json
540
541       redirect_to :action => "account", :display_name => current_user.display_name
542     elsif session[:new_user]
543       session[:new_user].auth_provider = provider
544       session[:new_user].auth_uid = uid
545
546       session[:new_user].status = "active" if email_verified && email == session[:new_user].email
547
548       redirect_to :action => "terms"
549     else
550       user = User.find_by(:auth_provider => provider, :auth_uid => uid)
551
552       if user.nil? && provider == "google"
553         openid_url = auth_info[:extra][:id_info]["openid_id"]
554         user = User.find_by(:auth_provider => "openid", :auth_uid => openid_url) if openid_url
555         user&.update(:auth_provider => provider, :auth_uid => uid)
556       end
557
558       if user
559         case user.status
560         when "pending" then
561           unconfirmed_login(user)
562         when "active", "confirmed" then
563           successful_login(user, request.env["omniauth.params"]["referer"])
564         when "suspended" then
565           failed_login t("users.login.account is suspended", :webmaster => "mailto:#{SUPPORT_EMAIL}").html_safe
566         else
567           failed_login t("users.login.auth failure")
568         end
569       else
570         redirect_to :action => "new", :nickname => name, :email => email,
571                     :auth_provider => provider, :auth_uid => uid
572       end
573     end
574   end
575
576   ##
577   # omniauth failure callback
578   def auth_failure
579     flash[:error] = t("users.auth_failure." + params[:message])
580     redirect_to params[:origin] || login_url
581   end
582
583   private
584
585   ##
586   # handle password authentication
587   def password_authentication(username, password)
588     if user = User.authenticate(:username => username, :password => password)
589       successful_login(user)
590     elsif user = User.authenticate(:username => username, :password => password, :pending => true)
591       unconfirmed_login(user)
592     elsif User.authenticate(:username => username, :password => password, :suspended => true)
593       failed_login t("users.login.account is suspended", :webmaster => "mailto:#{SUPPORT_EMAIL}").html_safe, username
594     else
595       failed_login t("users.login.auth failure"), username
596     end
597   end
598
599   ##
600   # return the URL to use for authentication
601   def auth_url(provider, uid, referer = nil)
602     params = { :provider => provider }
603
604     params[:openid_url] = openid_expand_url(uid) if provider == "openid"
605
606     if referer.nil?
607       params[:origin] = request.path
608     else
609       params[:origin] = request.path + "?referer=" + CGI.escape(referer)
610       params[:referer] = referer
611     end
612
613     auth_path(params)
614   end
615
616   ##
617   # special case some common OpenID providers by applying heuristics to
618   # try and come up with the correct URL based on what the user entered
619   def openid_expand_url(openid_url)
620     if openid_url.nil?
621       nil
622     elsif openid_url.match(%r{(.*)gmail.com(/?)$}) || openid_url.match(%r{(.*)googlemail.com(/?)$})
623       # Special case gmail.com as it is potentially a popular OpenID
624       # provider and, unlike yahoo.com, where it works automatically, Google
625       # have hidden their OpenID endpoint somewhere obscure this making it
626       # somewhat less user friendly.
627       "https://www.google.com/accounts/o8/id"
628     else
629       openid_url
630     end
631   end
632
633   ##
634   # process a successful login
635   def successful_login(user, referer = nil)
636     session[:user] = user.id
637     session_expires_after 28.days if session[:remember_me]
638
639     target = referer || session[:referer] || url_for(:controller => :site, :action => :index)
640
641     # The user is logged in, so decide where to send them:
642     #
643     # - If they haven't seen the contributor terms, send them there.
644     # - If they have a block on them, show them that.
645     # - If they were referred to the login, send them back there.
646     # - Otherwise, send them to the home page.
647     if REQUIRE_TERMS_SEEN && !user.terms_seen
648       redirect_to :action => :terms, :referer => target
649     elsif user.blocked_on_view
650       redirect_to user.blocked_on_view, :referer => target
651     else
652       redirect_to target
653     end
654
655     session.delete(:remember_me)
656     session.delete(:referer)
657   end
658
659   ##
660   # process a failed login
661   def failed_login(message, username = nil)
662     flash[:error] = message
663
664     redirect_to :action => "login", :referer => session[:referer],
665                 :username => username, :remember_me => session[:remember_me]
666
667     session.delete(:remember_me)
668     session.delete(:referer)
669   end
670
671   ##
672   #
673   def unconfirmed_login(user)
674     session[:token] = user.tokens.create.token
675
676     redirect_to :action => "confirm", :display_name => user.display_name
677
678     session.delete(:remember_me)
679     session.delete(:referer)
680   end
681
682   ##
683   # update a user's details
684   def update_user(user, params)
685     user.display_name = params[:user][:display_name]
686     user.new_email = params[:user][:new_email]
687
688     unless params[:user][:pass_crypt].empty? && params[:user][:pass_crypt_confirmation].empty?
689       user.pass_crypt = params[:user][:pass_crypt]
690       user.pass_crypt_confirmation = params[:user][:pass_crypt_confirmation]
691     end
692
693     if params[:user][:description] != user.description
694       user.description = params[:user][:description]
695       user.description_format = "markdown"
696     end
697
698     user.languages = params[:user][:languages].split(",")
699
700     case params[:image_action]
701     when "new" then
702       user.image = params[:user][:image]
703       user.image_use_gravatar = false
704     when "delete" then
705       user.image = nil
706       user.image_use_gravatar = false
707     when "gravatar" then
708       user.image = nil
709       user.image_use_gravatar = true
710     end
711
712     user.home_lat = params[:user][:home_lat]
713     user.home_lon = params[:user][:home_lon]
714
715     user.preferred_editor = if params[:user][:preferred_editor] == "default"
716                               nil
717                             else
718                               params[:user][:preferred_editor]
719                             end
720
721     if params[:user][:auth_provider].nil? || params[:user][:auth_provider].blank?
722       user.auth_provider = nil
723       user.auth_uid = nil
724     end
725
726     if user.save
727       set_locale(true)
728
729       if user.new_email.blank? || user.new_email == user.email
730         flash.now[:notice] = t "users.account.flash update success"
731       else
732         user.email = user.new_email
733
734         if user.valid?
735           flash.now[:notice] = t "users.account.flash update success confirm needed"
736
737           begin
738             Notifier.email_confirm(user, user.tokens.create).deliver_later
739           rescue StandardError
740             # Ignore errors sending email
741           end
742         else
743           current_user.errors.add(:new_email, current_user.errors[:email])
744           current_user.errors.add(:email, [])
745         end
746
747         user.restore_email!
748       end
749     end
750   end
751
752   ##
753   # require that the user in the URL is the logged in user
754   def require_self
755     head :forbidden if params[:display_name] != current_user.display_name
756   end
757
758   ##
759   # ensure that there is a "user" instance variable
760   def lookup_user_by_id
761     @user = User.find(params[:id])
762   end
763
764   ##
765   # ensure that there is a "user" instance variable
766   def lookup_user_by_name
767     @user = User.find_by(:display_name => params[:display_name])
768   rescue ActiveRecord::RecordNotFound
769     redirect_to :action => "view", :display_name => params[:display_name] unless @user
770   end
771
772   ##
773   #
774   def disable_terms_redirect
775     # this is necessary otherwise going to the user terms page, when
776     # having not agreed already would cause an infinite redirect loop.
777     # it's .now so that this doesn't propagate to other pages.
778     flash.now[:skip_terms] = true
779   end
780
781   ##
782   # return permitted user parameters
783   def user_params
784     params.require(:user).permit(:email, :email_confirmation, :display_name,
785                                  :auth_provider, :auth_uid,
786                                  :pass_crypt, :pass_crypt_confirmation)
787   end
788
789   ##
790   # check signup acls
791   def check_signup_allowed(email = nil)
792     domain = if email.nil?
793                nil
794              else
795                email.split("@").last
796              end
797
798     if blocked = Acl.no_account_creation(request.remote_ip, domain)
799       logger.info "Blocked signup from #{request.remote_ip} for #{email}"
800
801       render :action => "blocked"
802     end
803
804     !blocked
805   end
806
807   ##
808   # check if this user has a gravatar and set the user pref is true
809   def gravatar_enable(user)
810     # code from example https://en.gravatar.com/site/implement/images/ruby/
811     return false if user.image.present?
812
813     hash = Digest::MD5.hexdigest(user.email.downcase)
814     url = "https://www.gravatar.com/avatar/#{hash}?d=404" # without d=404 we will always get an image back
815     response = OSM.http_client.get(URI.parse(url))
816     oldsetting = user.image_use_gravatar
817     user.image_use_gravatar = response.success?
818     oldsetting != user.image_use_gravatar
819   end
820
821   ##
822   # display a message about th current status of the gravatar setting
823   def gravatar_status_message(user)
824     if user.image_use_gravatar
825       t "users.account.gravatar.enabled"
826     else
827       t "users.account.gravatar.disabled"
828     end
829   end
830 end