1
0
mirror of https://github.com/LaCasemate/fab-manager.git synced 2024-11-29 10:24:20 +01:00
fab-manager/app/models/user.rb

407 lines
14 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
# User is a physical or moral person with its authentication parameters
# It is linked to the Profile model with hold informations about this person (like address, name, etc.)
2015-05-05 03:10:25 +02:00
class User < ActiveRecord::Base
include NotifyWith::NotificationReceiver
include NotifyWith::NotificationAttachedObject
# Include default devise modules. Others available are:
# :lockable, :timeoutable and :omniauthable
devise :database_authenticatable, :registerable, :recoverable, :rememberable, :trackable, :validatable,
:confirmable
2015-05-05 03:10:25 +02:00
rolify
2016-03-23 18:39:41 +01:00
# enable OmniAuth authentication only if needed
devise :omniauthable, omniauth_providers: [AuthProvider.active.strategy_name.to_sym] unless
AuthProvider.active.providable_type == DatabaseProvider.name
2016-03-23 18:39:41 +01:00
2015-05-05 03:10:25 +02:00
extend FriendlyId
friendly_id :username, use: :slugged
has_one :profile, dependent: :destroy
accepts_nested_attributes_for :profile
has_one :invoicing_profile, dependent: :nullify
accepts_nested_attributes_for :invoicing_profile
2019-06-03 17:25:04 +02:00
has_one :statistic_profile, dependent: :nullify
accepts_nested_attributes_for :statistic_profile
2015-05-05 03:10:25 +02:00
has_many :project_users, dependent: :destroy
has_many :projects, through: :project_users
belongs_to :group
2016-03-23 18:39:41 +01:00
has_many :users_credits, dependent: :destroy
has_many :credits, through: :users_credits
has_many :training_credits, through: :users_credits, source: :training_credit
has_many :machine_credits, through: :users_credits, source: :machine_credit
has_many :user_tags, dependent: :destroy
has_many :tags, through: :user_tags
accepts_nested_attributes_for :tags, allow_destroy: true
has_many :exports, dependent: :destroy
2019-09-25 16:37:42 +02:00
has_many :imports, dependent: :nullify
2016-03-23 18:39:41 +01:00
# fix for create admin user
before_save do
email&.downcase!
2016-03-23 18:39:41 +01:00
end
2015-05-05 03:10:25 +02:00
before_create :assign_default_role
2016-03-23 18:39:41 +01:00
after_commit :create_stripe_customer, on: [:create]
after_commit :notify_admin_when_user_is_created, on: :create
after_create :init_dependencies
after_update :notify_group_changed, if: :saved_change_to_group_id?
after_update :update_invoicing_profile, if: :invoicing_data_was_modified?
after_update :update_statistic_profile, if: :statistic_data_was_modified?
before_destroy :remove_orphan_drafts
2015-05-05 03:10:25 +02:00
attr_accessor :cgu
2016-03-23 18:39:41 +01:00
delegate :first_name, to: :profile
delegate :last_name, to: :profile
delegate :subscriptions, to: :statistic_profile
delegate :reservations, to: :statistic_profile
delegate :trainings, to: :statistic_profile
2019-06-06 16:34:53 +02:00
delegate :my_projects, to: :statistic_profile
delegate :wallet, to: :invoicing_profile
delegate :wallet_transactions, to: :invoicing_profile
delegate :invoices, to: :invoicing_profile
2015-05-05 03:10:25 +02:00
validate :cgu_must_accept, if: :new_record?
validates :username, presence: true, uniqueness: true, length: { maximum: 30 }
2016-03-23 18:39:41 +01:00
scope :active, -> { where(is_active: true) }
scope :without_subscription, -> { includes(statistic_profile: [:subscriptions]).where(subscriptions: { statistic_profile_id: nil }) }
scope :with_subscription, -> { joins(statistic_profile: [:subscriptions]) }
scope :not_confirmed, -> { where(confirmed_at: nil) }
2020-01-07 10:44:29 +01:00
scope :inactive_for_3_years, -> { where('users.last_sign_in_at < ?', 3.years.ago) }
2016-03-23 18:39:41 +01:00
def to_json(*)
ApplicationController.new.view_context.render(
partial: 'api/members/member',
locals: { member: self },
formats: [:json],
handlers: [:jbuilder]
)
2015-05-05 03:10:25 +02:00
end
def self.admins
User.with_role(:admin)
end
def self.members
User.with_role(:member)
end
def self.superadmin
return unless Rails.application.secrets.superadmin_email.present?
User.find_by(email: Rails.application.secrets.superadmin_email)
end
def training_machine?(machine)
return true if admin?
trainings.map(&:machines).flatten.uniq.include?(machine)
2016-03-23 18:39:41 +01:00
end
def training_reservation_by_machine(machine)
reservations.where(reservable_type: 'Training', reservable_id: machine.trainings.map(&:id)).first
end
def subscribed_plan
return nil if subscription.nil? || subscription.expired_at < DateTime.current
2016-03-23 18:39:41 +01:00
subscription.plan
end
def subscription
subscriptions.order(:created_at).last
2016-03-23 18:39:41 +01:00
end
def admin?
2015-05-05 03:10:25 +02:00
has_role? :admin
end
def member?
2015-05-05 03:10:25 +02:00
has_role? :member
end
def all_projects
my_projects.to_a.concat projects
end
def generate_subscription_invoice(operator_profile_id)
return unless subscription
subscription.generate_and_save_invoice(operator_profile_id)
2016-03-23 18:39:41 +01:00
end
def stripe_customer
Stripe::Customer.retrieve stp_customer_id
end
def active_for_authentication?
super && is_active?
2016-03-23 18:39:41 +01:00
end
def self.from_omniauth(auth)
active_provider = AuthProvider.active
raise SecurityError, 'The identity provider does not match the activated one' if active_provider.strategy_name != auth.provider
2016-03-23 18:39:41 +01:00
where(provider: auth.provider, uid: auth.uid).first_or_create.tap do |user|
# execute this regardless of whether record exists or not (-> User#tap)
# this will init or update the user thanks to the information retrieved from the SSO
2016-03-23 18:39:41 +01:00
user.profile ||= Profile.new
auth.info.mapping.each do |key, value|
user.set_data_from_sso_mapping(key, value)
end
user.password = Devise.friendly_token[0,20]
end
end
def need_completion?
statistic_profile.gender.nil? || profile.first_name.blank? || profile.last_name.blank? || username.blank? ||
email.blank? || encrypted_password.blank? || group_id.nil? || statistic_profile.birthday.blank? ||
(Rails.application.secrets.phone_required && profile.phone.blank?)
2016-03-23 18:39:41 +01:00
end
## Retrieve the requested data in the User and user's Profile tables
## @param sso_mapping {String} must be of form 'user._field_' or 'profile._field_'. Eg. 'user.email'
def get_data_from_sso_mapping(sso_mapping)
parsed = /^(user|profile)\.(.+)$/.match(sso_mapping)
if parsed[1] == 'user'
self[parsed[2].to_sym]
elsif parsed[1] == 'profile'
case sso_mapping
when 'profile.avatar'
profile.user_avatar.remote_attachment_url
when 'profile.address'
invoicing_profile.address.address
when 'profile.organization_name'
invoicing_profile.organization.name
when 'profile.organization_address'
invoicing_profile.organization.address.address
else
profile[parsed[2].to_sym]
end
2016-03-23 18:39:41 +01:00
end
end
## Set some data on the current user, according to the sso_key given
## @param sso_mapping {String} must be of form 'user._field_' or 'profile._field_'. Eg. 'user.email'
## @param data {*} the data to put in the given key. Eg. 'user@example.com'
def set_data_from_sso_mapping(sso_mapping, data)
if sso_mapping.to_s.start_with? 'user.'
self[sso_mapping[5..-1].to_sym] = data unless data.nil?
elsif sso_mapping.to_s.start_with? 'profile.'
case sso_mapping.to_s
when 'profile.avatar'
profile.user_avatar ||= UserAvatar.new
profile.user_avatar.remote_attachment_url = data
when 'profile.address'
invoicing_profile.address ||= Address.new
invoicing_profile.address.address = data
when 'profile.organization_name'
invoicing_profile.organization ||= Organization.new
invoicing_profile.organization.name = data
when 'profile.organization_address'
invoicing_profile.organization ||= Organization.new
invoicing_profile.organization.address ||= Address.new
invoicing_profile.organization.address.address = data
else
profile[sso_mapping[8..-1].to_sym] = data unless data.nil?
2016-03-23 18:39:41 +01:00
end
end
end
## used to allow the migration of existing users between authentication providers
def generate_auth_migration_token
update_attributes(auth_token: Devise.friendly_token)
2016-03-23 18:39:41 +01:00
end
## link the current user to the given provider (omniauth attributes hash)
## and remove the auth_token to mark his account as "migrated"
def link_with_omniauth_provider(auth)
active_provider = AuthProvider.active
raise SecurityError, 'The identity provider does not match the activated one' if active_provider.strategy_name != auth.provider
2016-03-23 18:39:41 +01:00
if User.where(provider: auth.provider, uid: auth.uid).size.positive?
2016-03-23 18:39:41 +01:00
raise DuplicateIndexError, "This #{active_provider.name} account is already linked to an existing user"
end
update_attributes(provider: auth.provider, uid: auth.uid, auth_token: nil)
end
## Merge the provided User's SSO details into the current user and drop the provided user to ensure the unity
## @param sso_user {User} the provided user will be DELETED after the merge was successful
def merge_from_sso(sso_user)
# update the attributes to link the account to the sso account
2016-03-23 18:39:41 +01:00
self.provider = sso_user.provider
self.uid = sso_user.uid
# remove the token
self.auth_token = nil
self.merged_at = DateTime.current
2016-03-23 18:39:41 +01:00
# check that the email duplication was resolved
if sso_user.email.end_with? '-duplicate'
email_addr = sso_user.email.match(/^<([^>]+)>.{20}-duplicate$/)[1]
raise(DuplicateIndexError, email_addr) unless email_addr == email
2016-03-23 18:39:41 +01:00
end
# update the user's profile to set the data managed by the SSO
auth_provider = AuthProvider.from_strategy_name(sso_user.provider)
auth_provider.sso_fields.each do |field|
value = sso_user.get_data_from_sso_mapping(field)
# we do not merge the email field if its end with the special value '-duplicate' as this means
# that the user is currently merging with the account that have the same email than the sso
set_data_from_sso_mapping(field, value) unless field == 'user.email' && value.end_with?('-duplicate')
2016-03-23 18:39:41 +01:00
end
# run the account transfer in an SQL transaction to ensure data integrity
2016-03-23 18:39:41 +01:00
User.transaction do
# remove the temporary account
sso_user.destroy
# finally, save the new details
save!
2016-03-23 18:39:41 +01:00
end
end
def self.mapping
# we protect some fields as they are designed to be managed by the system and must not be updated externally
blacklist = %w[id encrypted_password reset_password_token reset_password_sent_at remember_created_at
sign_in_count current_sign_in_at last_sign_in_at current_sign_in_ip last_sign_in_ip confirmation_token
confirmed_at confirmation_sent_at unconfirmed_email failed_attempts unlock_token locked_at created_at
updated_at stp_customer_id slug provider auth_token merged_at]
User.column_types
.map { |k, v| [k, v.type.to_s] }
.delete_if { |col| blacklist.include?(col[0]) }
end
2016-03-23 18:39:41 +01:00
protected
# remove projets drafts that are not linked to another user
def remove_orphan_drafts
orphans = my_projects
.joins('LEFT JOIN project_users ON projects.id = project_users.project_id')
.where('project_users.project_id IS NULL')
.where(state: 'draft')
orphans.map(&:destroy!)
end
2016-03-23 18:39:41 +01:00
def confirmation_required?
2020-01-07 10:34:12 +01:00
Rails.application.secrets.user_confirmation_needed_to_sign_in ? super : false
2016-03-23 18:39:41 +01:00
end
2015-05-05 03:10:25 +02:00
private
2015-05-05 03:10:25 +02:00
def assign_default_role
add_role(:member) if roles.blank?
2015-05-05 03:10:25 +02:00
end
2016-03-23 18:39:41 +01:00
def cached_has_role?(role)
roles = Rails.cache.fetch(
roles_for: { object_id: object_id },
expires_in: 1.day,
race_condition_ttl: 2.seconds
) { roles.map(&:name) }
2016-03-23 18:39:41 +01:00
roles.include?(role.to_s)
end
2015-05-05 03:10:25 +02:00
def cgu_must_accept
errors.add(:cgu, I18n.t('activerecord.errors.messages.empty')) if cgu == '0'
end
2016-03-23 18:39:41 +01:00
def create_stripe_customer
StripeWorker.perform_async(:create_stripe_customer, id)
end
def send_devise_notification(notification, *args)
devise_mailer.send(notification, self, *args).deliver_later
end
2015-05-05 03:10:25 +02:00
def notify_admin_when_user_is_created
if need_completion? && !provider.nil?
2016-03-23 18:39:41 +01:00
NotificationCenter.call type: 'notify_admin_when_user_is_imported',
receiver: User.admins,
attached_object: self
else
NotificationCenter.call type: 'notify_admin_when_user_is_created',
receiver: User.admins,
attached_object: self
end
end
def notify_group_changed
return if changes[:group_id].first.nil?
2016-03-23 18:39:41 +01:00
ex_group = Group.find(changes[:group_id].first)
meta_data = { ex_group_name: ex_group.name }
2016-03-23 18:39:41 +01:00
NotificationCenter.call type: :notify_admin_user_group_changed,
receiver: User.admins,
attached_object: self,
meta_data: meta_data
NotificationCenter.call type: :notify_user_user_group_changed,
receiver: self,
attached_object: self
2016-03-23 18:39:41 +01:00
end
2019-06-03 17:25:04 +02:00
def invoicing_data_was_modified?
saved_change_to_email?
2019-06-03 17:25:04 +02:00
end
def statistic_data_was_modified?
saved_change_to_group_id?
end
def init_dependencies
if invoicing_profile.nil?
ip = InvoicingProfile.create!(
user: self,
email: email,
first_name: first_name,
last_name: last_name
)
end
if wallet.nil?
ip ||= invoicing_profile
Wallet.create!(
invoicing_profile: ip
)
end
if statistic_profile.nil?
StatisticProfile.create!(
user: self,
group_id: group_id,
role_id: roles.first.id
)
else
update_statistic_profile
end
2019-06-03 17:25:04 +02:00
end
def update_invoicing_profile
raise NoProfileError if invoicing_profile.nil?
invoicing_profile.update_attributes(
email: email
)
end
2019-06-03 17:25:04 +02:00
# will update the statistic_profile after a group switch. Updating the role is not supported
2019-06-03 17:25:04 +02:00
def update_statistic_profile
raise NoProfileError if statistic_profile.nil?
statistic_profile.update_attributes(
group_id: group_id
)
2019-06-03 17:25:04 +02:00
end
2015-05-05 03:10:25 +02:00
end