mirror of
https://github.com/LaCasemate/fab-manager.git
synced 2024-11-29 10:24:20 +01:00
353 lines
12 KiB
Ruby
353 lines
12 KiB
Ruby
class User < ActiveRecord::Base
|
|
include NotifyWith::NotificationReceiver
|
|
include NotifyWith::NotificationAttachedObject
|
|
# Include default devise modules. Others available are:
|
|
# :confirmable, :lockable, :timeoutable and :omniauthable
|
|
devise :database_authenticatable, :registerable, :recoverable, :rememberable, :trackable, :validatable,
|
|
:confirmable, :async
|
|
rolify
|
|
|
|
# enable OmniAuth authentication only if needed
|
|
devise :omniauthable, omniauth_providers: [AuthProvider.active.strategy_name.to_sym] unless
|
|
AuthProvider.active.providable_type == DatabaseProvider.name
|
|
|
|
extend FriendlyId
|
|
friendly_id :username, use: :slugged
|
|
|
|
has_one :profile, dependent: :destroy
|
|
accepts_nested_attributes_for :profile
|
|
|
|
has_many :my_projects, foreign_key: :author_id, class_name: 'Project', dependent: :destroy
|
|
has_many :project_users, dependent: :destroy
|
|
has_many :projects, through: :project_users
|
|
|
|
has_many :reservations, dependent: :destroy
|
|
accepts_nested_attributes_for :reservations, allow_destroy: true
|
|
|
|
# Trainings that were already passed
|
|
has_many :user_trainings, dependent: :destroy
|
|
has_many :trainings, through: :user_trainings
|
|
|
|
belongs_to :group
|
|
|
|
has_many :subscriptions, dependent: :destroy
|
|
accepts_nested_attributes_for :subscriptions, allow_destroy: true
|
|
|
|
has_many :users_credits, dependent: :destroy
|
|
has_many :credits, through: :users_credits
|
|
|
|
has_many :training_credits, through: :users_credits, source: :training_credit
|
|
has_many :machine_credits, through: :users_credits, source: :machine_credit
|
|
|
|
has_many :invoices, dependent: :destroy
|
|
|
|
has_many :user_tags, dependent: :destroy
|
|
has_many :tags, through: :user_tags
|
|
accepts_nested_attributes_for :tags, allow_destroy: true
|
|
|
|
has_one :wallet, dependent: :destroy
|
|
has_many :wallet_transactions, dependent: :destroy
|
|
|
|
has_many :exports, dependent: :destroy
|
|
|
|
# fix for create admin user
|
|
before_save do
|
|
email&.downcase!
|
|
end
|
|
|
|
before_create :assign_default_role
|
|
after_create :create_a_wallet
|
|
after_commit :create_stripe_customer, on: [:create]
|
|
after_commit :notify_admin_when_user_is_created, on: :create
|
|
after_update :notify_admin_invoicing_changed, if: :invoicing_disabled_changed?
|
|
after_update :notify_group_changed, if: :group_id_changed?
|
|
|
|
attr_accessor :cgu
|
|
delegate :first_name, to: :profile
|
|
delegate :last_name, to: :profile
|
|
|
|
validate :cgu_must_accept, if: :new_record?
|
|
|
|
validates :username, presence: true, uniqueness: true, length: { maximum: 30 }
|
|
|
|
scope :active, -> { where(is_active: true) }
|
|
scope :without_subscription, -> { includes(:subscriptions).where(subscriptions: { user_id: nil }) }
|
|
scope :with_subscription, -> { joins(:subscriptions) }
|
|
|
|
def to_json(options = {})
|
|
ApplicationController.new.view_context.render(
|
|
partial: 'api/members/member',
|
|
locals: { member: self },
|
|
formats: [:json],
|
|
handlers: [:jbuilder]
|
|
)
|
|
end
|
|
|
|
def self.admins
|
|
User.with_role(:admin)
|
|
end
|
|
|
|
def training_machine?(machine)
|
|
return true if is_admin?
|
|
|
|
trainings.map(&:machines).flatten.uniq.include?(machine)
|
|
end
|
|
|
|
def training_reservation_by_machine(machine)
|
|
reservations.where(reservable_type: 'Training', reservable_id: machine.trainings.map(&:id)).first
|
|
end
|
|
|
|
def subscribed_plan
|
|
return nil if subscription.nil? || subscription.expired_at < Time.now
|
|
|
|
subscription.plan
|
|
end
|
|
|
|
def subscription
|
|
subscriptions.order(:created_at).last
|
|
end
|
|
|
|
def is_admin?
|
|
has_role? :admin
|
|
end
|
|
|
|
def is_member?
|
|
has_role? :member
|
|
end
|
|
|
|
def all_projects
|
|
my_projects.to_a.concat projects
|
|
end
|
|
|
|
def generate_subscription_invoice
|
|
return unless subscription
|
|
|
|
subscription.generate_and_save_invoice unless invoicing_disabled?
|
|
end
|
|
|
|
def stripe_customer
|
|
Stripe::Customer.retrieve stp_customer_id
|
|
end
|
|
|
|
def soft_destroy
|
|
update_attribute(:is_active, false)
|
|
uninvolve_from_projects
|
|
end
|
|
|
|
def uninvolve_from_projects
|
|
my_projects.destroy_all
|
|
project_users.destroy_all
|
|
end
|
|
|
|
def active_for_authentication?
|
|
super && is_active?
|
|
end
|
|
|
|
def self.from_omniauth(auth)
|
|
active_provider = AuthProvider.active
|
|
if active_provider.strategy_name != auth.provider
|
|
raise SecurityError, 'The identity provider does not match the activated one'
|
|
end
|
|
|
|
where(provider: auth.provider, uid: auth.uid).first_or_create.tap do |user|
|
|
# execute this regardless of whether record exists or not (-> User#tap)
|
|
# this will init or update the user thanks to the information retrieved from the SSO
|
|
user.profile ||= Profile.new
|
|
auth.info.mapping.each do |key, value|
|
|
user.set_data_from_sso_mapping(key, value)
|
|
end
|
|
user.password = Devise.friendly_token[0,20]
|
|
end
|
|
end
|
|
|
|
def need_completion?
|
|
profile.gender.nil? || profile.first_name.blank? || profile.last_name.blank? || username.blank? ||
|
|
email.blank? || encrypted_password.blank? || group_id.nil? || profile.birthday.blank? || profile.phone.blank?
|
|
end
|
|
|
|
## Retrieve the requested data in the User and user's Profile tables
|
|
## @param sso_mapping {String} must be of form 'user._field_' or 'profile._field_'. Eg. 'user.email'
|
|
def get_data_from_sso_mapping(sso_mapping)
|
|
parsed = /^(user|profile)\.(.+)$/.match(sso_mapping)
|
|
if parsed[1] == 'user'
|
|
self[parsed[2].to_sym]
|
|
elsif parsed[1] == 'profile'
|
|
case sso_mapping
|
|
when 'profile.avatar'
|
|
profile.user_avatar.remote_attachment_url
|
|
when 'profile.address'
|
|
profile.address.address
|
|
when 'profile.organization_name'
|
|
profile.organization.name
|
|
when 'profile.organization_address'
|
|
profile.organization.address.address
|
|
else
|
|
profile[parsed[2].to_sym]
|
|
end
|
|
end
|
|
end
|
|
|
|
## Set some data on the current user, according to the sso_key given
|
|
## @param sso_mapping {String} must be of form 'user._field_' or 'profile._field_'. Eg. 'user.email'
|
|
## @param data {*} the data to put in the given key. Eg. 'user@example.com'
|
|
def set_data_from_sso_mapping(sso_mapping, data)
|
|
if sso_mapping.to_s.start_with? 'user.'
|
|
self[sso_mapping[5..-1].to_sym] = data unless data.nil?
|
|
elsif sso_mapping.to_s.start_with? 'profile.'
|
|
case sso_mapping.to_s
|
|
when 'profile.avatar'
|
|
profile.user_avatar ||= UserAvatar.new
|
|
profile.user_avatar.remote_attachment_url = data
|
|
when 'profile.address'
|
|
profile.address ||= Address.new
|
|
profile.address.address = data
|
|
when 'profile.organization_name'
|
|
profile.organization ||= Organization.new
|
|
profile.organization.name = data
|
|
when 'profile.organization_address'
|
|
profile.organization ||= Organization.new
|
|
profile.organization.address ||= Address.new
|
|
profile.organization.address.address = data
|
|
else
|
|
profile[sso_mapping[8..-1].to_sym] = data unless data.nil?
|
|
end
|
|
end
|
|
end
|
|
|
|
## used to allow the migration of existing users between authentication providers
|
|
def generate_auth_migration_token
|
|
update_attributes(auth_token: Devise.friendly_token)
|
|
end
|
|
|
|
## link the current user to the given provider (omniauth attributes hash)
|
|
## and remove the auth_token to mark his account as "migrated"
|
|
def link_with_omniauth_provider(auth)
|
|
active_provider = AuthProvider.active
|
|
if active_provider.strategy_name != auth.provider
|
|
raise SecurityError, 'The identity provider does not match the activated one'
|
|
end
|
|
|
|
if User.where(provider: auth.provider, uid: auth.uid).size.positive?
|
|
raise DuplicateIndexError, "This #{active_provider.name} account is already linked to an existing user"
|
|
end
|
|
|
|
update_attributes(provider: auth.provider, uid: auth.uid, auth_token: nil)
|
|
end
|
|
|
|
## Merge the provided User's SSO details into the current user and drop the provided user to ensure the unity
|
|
## @param sso_user {User} the provided user will be DELETED after the merge was successful
|
|
def merge_from_sso(sso_user)
|
|
# update the attributes to link the account to the sso account
|
|
self.provider = sso_user.provider
|
|
self.uid = sso_user.uid
|
|
|
|
# remove the token
|
|
self.auth_token = nil
|
|
self.merged_at = DateTime.now
|
|
|
|
# check that the email duplication was resolved
|
|
if sso_user.email.end_with? '-duplicate'
|
|
email_addr = sso_user.email.match(/^<([^>]+)>.{20}-duplicate$/)[1]
|
|
raise(DuplicateIndexError, email_addr) unless email_addr == email
|
|
end
|
|
|
|
# update the user's profile to set the data managed by the SSO
|
|
auth_provider = AuthProvider.from_strategy_name(sso_user.provider)
|
|
auth_provider.sso_fields.each do |field|
|
|
value = sso_user.get_data_from_sso_mapping(field)
|
|
# we do not merge the email field if its end with the special value '-duplicate' as this means
|
|
# that the user is currently merging with the account that have the same email than the sso
|
|
set_data_from_sso_mapping(field, value) unless field == 'user.email' && value.end_with?('-duplicate')
|
|
end
|
|
|
|
# run the account transfer in an SQL transaction to ensure data integrity
|
|
User.transaction do
|
|
# remove the temporary account
|
|
sso_user.destroy
|
|
# finally, save the new details
|
|
save!
|
|
end
|
|
end
|
|
|
|
def self.mapping
|
|
# we protect some fields as they are designed to be managed by the system and must not be updated externally
|
|
blacklist = %w[id encrypted_password reset_password_token reset_password_sent_at remember_created_at
|
|
sign_in_count current_sign_in_at last_sign_in_at current_sign_in_ip last_sign_in_ip confirmation_token
|
|
confirmed_at confirmation_sent_at unconfirmed_email failed_attempts unlock_token locked_at created_at
|
|
updated_at stp_customer_id slug provider auth_token merged_at]
|
|
User.column_types
|
|
.map { |k, v| [k, v.type.to_s] }
|
|
.delete_if { |col| blacklist.include?(col[0]) }
|
|
end
|
|
|
|
protected
|
|
|
|
def confirmation_required?
|
|
false
|
|
end
|
|
|
|
|
|
private
|
|
|
|
def assign_default_role
|
|
add_role(:member) if roles.blank?
|
|
end
|
|
|
|
def cached_has_role?(role)
|
|
roles = Rails.cache.fetch(
|
|
roles_for: { object_id: object_id },
|
|
expires_in: 1.day,
|
|
race_condition_ttl: 2.seconds
|
|
) { roles.map(&:name) }
|
|
roles.include?(role.to_s)
|
|
end
|
|
|
|
def cgu_must_accept
|
|
errors.add(:cgu, I18n.t('activerecord.errors.messages.empty')) if cgu == '0'
|
|
end
|
|
|
|
def create_stripe_customer
|
|
StripeWorker.perform_async(:create_stripe_customer, id)
|
|
end
|
|
|
|
def create_a_wallet
|
|
create_wallet
|
|
end
|
|
|
|
def notify_admin_when_user_is_created
|
|
if need_completion? && !provider.nil?
|
|
NotificationCenter.call type: 'notify_admin_when_user_is_imported',
|
|
receiver: User.admins,
|
|
attached_object: self
|
|
else
|
|
NotificationCenter.call type: 'notify_admin_when_user_is_created',
|
|
receiver: User.admins,
|
|
attached_object: self
|
|
end
|
|
end
|
|
|
|
def notify_group_changed
|
|
return if changes[:group_id].first.nil?
|
|
|
|
ex_group = Group.find(changes[:group_id].first)
|
|
meta_data = { ex_group_name: ex_group.name }
|
|
|
|
User.admins.each do |admin|
|
|
notification = Notification.new(meta_data: meta_data)
|
|
notification.send_notification(type: :notify_admin_user_group_changed, attached_object: self).to(admin).deliver_later
|
|
end
|
|
|
|
NotificationCenter.call type: :notify_user_user_group_changed,
|
|
receiver: self,
|
|
attached_object: self
|
|
end
|
|
|
|
def notify_admin_invoicing_changed
|
|
NotificationCenter.call type: 'notify_admin_invoicing_changed',
|
|
receiver: User.admins,
|
|
attached_object: self
|
|
end
|
|
|
|
|
|
end
|