2013-10-06 14:13:56 -04:00
|
|
|
require 'carrierwave/orm/activerecord'
|
|
|
|
|
2011-10-08 17:36:38 -04:00
|
|
|
class User < ActiveRecord::Base
|
2015-01-08 12:53:35 -05:00
|
|
|
extend Gitlab::ConfigHelper
|
2015-05-02 23:11:21 -04:00
|
|
|
|
|
|
|
include Gitlab::ConfigHelper
|
2015-02-19 11:16:46 -05:00
|
|
|
include Gitlab::CurrentSettings
|
2015-05-02 23:11:21 -04:00
|
|
|
include Referable
|
|
|
|
include Sortable
|
2015-10-08 07:28:26 -04:00
|
|
|
include CaseSensitivity
|
2015-12-10 04:48:37 -05:00
|
|
|
include TokenAuthenticatable
|
|
|
|
|
2016-06-06 11:50:54 -04:00
|
|
|
DEFAULT_NOTIFICATION_LEVEL = :participating
|
|
|
|
|
2015-12-10 04:48:37 -05:00
|
|
|
add_authentication_token_field :authentication_token
|
2014-06-26 16:24:17 -04:00
|
|
|
|
2014-04-09 06:36:25 -04:00
|
|
|
default_value_for :admin, false
|
2016-07-06 13:46:41 -04:00
|
|
|
default_value_for(:external) { current_application_settings.user_default_external }
|
2014-06-26 16:24:17 -04:00
|
|
|
default_value_for :can_create_group, gitlab_config.default_can_create_group
|
2014-04-09 06:36:25 -04:00
|
|
|
default_value_for :can_create_team, false
|
|
|
|
default_value_for :hide_no_ssh_key, false
|
2015-02-13 07:33:28 -05:00
|
|
|
default_value_for :hide_no_password, false
|
2014-06-26 16:24:17 -04:00
|
|
|
default_value_for :theme_id, gitlab_config.default_theme
|
2014-04-09 06:36:25 -04:00
|
|
|
|
2016-05-19 14:55:25 -04:00
|
|
|
attr_encrypted :otp_secret,
|
2016-07-15 08:19:29 -04:00
|
|
|
key: Gitlab::Application.secrets.otp_key_base,
|
2016-05-19 14:55:25 -04:00
|
|
|
mode: :per_attribute_iv_and_salt,
|
2016-06-28 03:55:19 -04:00
|
|
|
insecure_mode: true,
|
2016-05-19 14:55:25 -04:00
|
|
|
algorithm: 'aes-256-cbc'
|
|
|
|
|
2015-05-05 22:16:09 -04:00
|
|
|
devise :two_factor_authenticatable,
|
2016-07-15 08:19:29 -04:00
|
|
|
otp_secret_encryption_key: Gitlab::Application.secrets.otp_key_base
|
2015-05-09 15:45:22 -04:00
|
|
|
|
2015-05-09 15:46:49 -04:00
|
|
|
devise :two_factor_backupable, otp_number_of_backup_codes: 10
|
2015-05-09 15:45:22 -04:00
|
|
|
serialize :otp_backup_codes, JSON
|
|
|
|
|
2016-05-19 14:52:08 -04:00
|
|
|
devise :lockable, :recoverable, :rememberable, :trackable,
|
2015-05-05 22:16:09 -04:00
|
|
|
:validatable, :omniauthable, :confirmable, :registerable
|
2011-10-08 17:36:38 -04:00
|
|
|
|
2012-06-26 17:59:08 -04:00
|
|
|
attr_accessor :force_random_password
|
2011-10-08 17:36:38 -04:00
|
|
|
|
2013-03-25 10:10:14 -04:00
|
|
|
# Virtual attribute for authenticating by either username or email
|
|
|
|
attr_accessor :login
|
|
|
|
|
2013-03-05 02:27:06 -05:00
|
|
|
#
|
|
|
|
# Relations
|
|
|
|
#
|
|
|
|
|
2012-11-22 23:11:09 -05:00
|
|
|
# Namespace for personal projects
|
2013-12-09 14:02:36 -05:00
|
|
|
has_one :namespace, -> { where type: nil }, dependent: :destroy, foreign_key: :owner_id, class_name: "Namespace"
|
2013-03-05 02:27:06 -05:00
|
|
|
|
|
|
|
# Profile
|
|
|
|
has_many :keys, dependent: :destroy
|
2014-02-08 22:08:49 -05:00
|
|
|
has_many :emails, dependent: :destroy
|
2016-04-15 03:36:44 -04:00
|
|
|
has_many :personal_access_tokens, dependent: :destroy
|
2015-07-21 17:03:26 -04:00
|
|
|
has_many :identities, dependent: :destroy, autosave: true
|
2016-06-06 00:38:42 -04:00
|
|
|
has_many :u2f_registrations, dependent: :destroy
|
2013-03-05 02:27:06 -05:00
|
|
|
|
|
|
|
# Groups
|
2014-09-14 12:32:51 -04:00
|
|
|
has_many :members, dependent: :destroy
|
2016-06-24 06:01:48 -04:00
|
|
|
has_many :group_members, -> { where(requested_at: nil) }, dependent: :destroy, source: 'GroupMember'
|
2014-09-14 12:32:51 -04:00
|
|
|
has_many :groups, through: :group_members
|
2014-09-14 13:38:57 -04:00
|
|
|
has_many :owned_groups, -> { where members: { access_level: Gitlab::Access::OWNER } }, through: :group_members, source: :group
|
|
|
|
has_many :masters_groups, -> { where members: { access_level: Gitlab::Access::MASTER } }, through: :group_members, source: :group
|
2014-05-28 12:03:01 -04:00
|
|
|
|
2013-03-05 02:27:06 -05:00
|
|
|
# Projects
|
2013-11-05 09:58:13 -05:00
|
|
|
has_many :groups_projects, through: :groups, source: :projects
|
|
|
|
has_many :personal_projects, through: :namespace, source: :projects
|
2016-06-24 06:01:48 -04:00
|
|
|
has_many :project_members, -> { where(requested_at: nil) }, dependent: :destroy, class_name: 'ProjectMember'
|
2014-09-14 12:51:54 -04:00
|
|
|
has_many :projects, through: :project_members
|
2013-11-05 09:58:13 -05:00
|
|
|
has_many :created_projects, foreign_key: :creator_id, class_name: 'Project'
|
2014-06-26 03:49:14 -04:00
|
|
|
has_many :users_star_projects, dependent: :destroy
|
|
|
|
has_many :starred_projects, through: :users_star_projects, source: :project
|
2013-11-05 09:58:13 -05:00
|
|
|
|
2013-03-24 15:09:59 -04:00
|
|
|
has_many :snippets, dependent: :destroy, foreign_key: :author_id, class_name: "Snippet"
|
2013-01-19 12:06:50 -05:00
|
|
|
has_many :issues, dependent: :destroy, foreign_key: :author_id
|
|
|
|
has_many :notes, dependent: :destroy, foreign_key: :author_id
|
|
|
|
has_many :merge_requests, dependent: :destroy, foreign_key: :author_id
|
|
|
|
has_many :events, dependent: :destroy, foreign_key: :author_id, class_name: "Event"
|
2015-03-24 10:44:17 -04:00
|
|
|
has_many :subscriptions, dependent: :destroy
|
2013-12-09 14:02:36 -05:00
|
|
|
has_many :recent_events, -> { order "id DESC" }, foreign_key: :author_id, class_name: "Event"
|
2013-01-19 12:06:50 -05:00
|
|
|
has_many :assigned_issues, dependent: :destroy, foreign_key: :assignee_id, class_name: "Issue"
|
|
|
|
has_many :assigned_merge_requests, dependent: :destroy, foreign_key: :assignee_id, class_name: "MergeRequest"
|
2014-12-19 09:15:29 -05:00
|
|
|
has_many :oauth_applications, class_name: 'Doorkeeper::Application', as: :owner, dependent: :destroy
|
2015-09-29 12:08:55 -04:00
|
|
|
has_one :abuse_report, dependent: :destroy
|
2016-01-26 14:55:33 -05:00
|
|
|
has_many :spam_logs, dependent: :destroy
|
2015-12-10 11:44:06 -05:00
|
|
|
has_many :builds, dependent: :nullify, class_name: 'Ci::Build'
|
2016-07-15 09:42:29 -04:00
|
|
|
has_many :pipelines, dependent: :nullify, class_name: 'Ci::Pipeline'
|
2016-02-20 08:59:59 -05:00
|
|
|
has_many :todos, dependent: :destroy
|
2016-03-28 12:17:42 -04:00
|
|
|
has_many :notification_settings, dependent: :destroy
|
2016-07-12 13:57:08 -04:00
|
|
|
has_many :award_emoji, dependent: :destroy
|
2012-04-24 03:42:30 -04:00
|
|
|
|
2013-03-05 02:27:06 -05:00
|
|
|
#
|
|
|
|
# Validations
|
|
|
|
#
|
2012-12-12 11:53:43 -05:00
|
|
|
validates :name, presence: true
|
2016-02-09 11:59:47 -05:00
|
|
|
validates :notification_email, presence: true, email: true
|
|
|
|
validates :public_email, presence: true, uniqueness: true, email: true, allow_blank: true
|
2013-12-06 10:05:34 -05:00
|
|
|
validates :bio, length: { maximum: 255 }, allow_blank: true
|
2015-02-02 23:36:54 -05:00
|
|
|
validates :projects_limit, presence: true, numericality: { greater_than_or_equal_to: 0 }
|
2015-02-03 00:15:44 -05:00
|
|
|
validates :username,
|
2015-12-07 16:17:12 -05:00
|
|
|
namespace: true,
|
2015-02-03 00:15:44 -05:00
|
|
|
presence: true,
|
2015-12-07 16:17:12 -05:00
|
|
|
uniqueness: { case_sensitive: false }
|
2012-11-27 22:14:05 -05:00
|
|
|
|
2013-01-07 10:36:24 -05:00
|
|
|
validate :namespace_uniq, if: ->(user) { user.username_changed? }
|
2015-05-06 17:33:39 -04:00
|
|
|
validate :avatar_type, if: ->(user) { user.avatar.present? && user.avatar_changed? }
|
2014-02-08 22:08:49 -05:00
|
|
|
validate :unique_email, if: ->(user) { user.email_changed? }
|
2015-02-06 18:23:58 -05:00
|
|
|
validate :owns_notification_email, if: ->(user) { user.notification_email_changed? }
|
2015-04-30 10:17:03 -04:00
|
|
|
validate :owns_public_email, if: ->(user) { user.public_email_changed? }
|
2014-12-02 04:32:24 -05:00
|
|
|
validates :avatar, file_size: { maximum: 200.kilobytes.to_i }
|
2013-01-07 10:36:24 -05:00
|
|
|
|
2012-08-10 18:07:50 -04:00
|
|
|
before_validation :generate_password, on: :create
|
2016-07-14 14:19:40 -04:00
|
|
|
before_validation :signup_domain_valid?, on: :create
|
2013-07-10 06:48:03 -04:00
|
|
|
before_validation :sanitize_attrs
|
2015-02-06 18:23:58 -05:00
|
|
|
before_validation :set_notification_email, if: ->(user) { user.email_changed? }
|
2015-04-13 12:28:49 -04:00
|
|
|
before_validation :set_public_email, if: ->(user) { user.public_email_changed? }
|
2013-07-10 06:48:03 -04:00
|
|
|
|
2015-04-30 10:17:03 -04:00
|
|
|
after_update :update_emails_with_primary_email, if: ->(user) { user.email_changed? }
|
2012-09-27 02:20:36 -04:00
|
|
|
before_save :ensure_authentication_token
|
2016-03-10 16:08:11 -05:00
|
|
|
before_save :ensure_external_user_rights
|
2014-06-17 15:32:35 -04:00
|
|
|
after_save :ensure_namespace_correct
|
2015-02-19 11:16:46 -05:00
|
|
|
after_initialize :set_projects_limit
|
2016-04-21 14:55:54 -04:00
|
|
|
before_create :check_confirmation_email
|
2014-06-17 15:32:35 -04:00
|
|
|
after_create :post_create_hook
|
|
|
|
after_destroy :post_destroy_hook
|
|
|
|
|
2015-10-05 11:22:47 -04:00
|
|
|
# User's Layout preference
|
2015-10-05 12:09:05 -04:00
|
|
|
enum layout: [:fixed, :fluid]
|
2015-10-05 11:22:47 -04:00
|
|
|
|
2015-06-19 14:59:07 -04:00
|
|
|
# User's Dashboard preference
|
|
|
|
# Note: When adding an option, it MUST go on the end of the array.
|
2016-03-24 06:12:45 -04:00
|
|
|
enum dashboard: [:projects, :stars, :project_activity, :starred_project_activity, :groups, :todos]
|
2013-07-10 06:48:03 -04:00
|
|
|
|
2015-07-13 12:24:15 -04:00
|
|
|
# User's Project preference
|
|
|
|
# Note: When adding an option, it MUST go on the end of the array.
|
2015-10-01 10:05:20 -04:00
|
|
|
enum project_view: [:readme, :activity, :files]
|
2015-07-13 12:24:15 -04:00
|
|
|
|
2012-09-27 02:20:36 -04:00
|
|
|
alias_attribute :private_token, :authentication_token
|
2012-06-24 16:26:13 -04:00
|
|
|
|
2012-11-23 13:11:09 -05:00
|
|
|
delegate :path, to: :namespace, allow_nil: true, prefix: true
|
2012-11-23 01:11:09 -05:00
|
|
|
|
2013-03-04 09:52:30 -05:00
|
|
|
state_machine :state, initial: :active do
|
|
|
|
event :block do
|
|
|
|
transition active: :blocked
|
2016-01-06 02:38:52 -05:00
|
|
|
transition ldap_blocked: :blocked
|
2013-03-04 09:52:30 -05:00
|
|
|
end
|
|
|
|
|
2015-12-29 14:53:55 -05:00
|
|
|
event :ldap_block do
|
|
|
|
transition active: :ldap_blocked
|
|
|
|
end
|
|
|
|
|
2013-03-04 09:52:30 -05:00
|
|
|
event :activate do
|
|
|
|
transition blocked: :active
|
2016-01-14 00:31:27 -05:00
|
|
|
transition ldap_blocked: :active
|
2013-03-04 09:52:30 -05:00
|
|
|
end
|
2015-12-29 14:53:55 -05:00
|
|
|
|
|
|
|
state :blocked, :ldap_blocked do
|
|
|
|
def blocked?
|
|
|
|
true
|
|
|
|
end
|
|
|
|
end
|
2013-03-04 09:52:30 -05:00
|
|
|
end
|
|
|
|
|
2015-02-09 08:35:48 -05:00
|
|
|
mount_uploader :avatar, AvatarUploader
|
2013-10-06 14:13:56 -04:00
|
|
|
|
2012-10-08 20:10:04 -04:00
|
|
|
# Scopes
|
2015-06-19 16:31:36 -04:00
|
|
|
scope :admins, -> { where(admin: true) }
|
2015-12-29 14:53:55 -05:00
|
|
|
scope :blocked, -> { with_states(:blocked, :ldap_blocked) }
|
2016-03-13 05:05:32 -04:00
|
|
|
scope :external, -> { where(external: true) }
|
2013-03-04 09:52:30 -05:00
|
|
|
scope :active, -> { with_state(:active) }
|
2013-12-14 08:43:48 -05:00
|
|
|
scope :not_in_project, ->(project) { project.users.present? ? where("id not in (:ids)", ids: project.users.map(&:id) ) : all }
|
2014-09-15 03:57:02 -04:00
|
|
|
scope :without_projects, -> { where('id NOT IN (SELECT DISTINCT(user_id) FROM members)') }
|
2016-06-06 00:38:42 -04:00
|
|
|
|
|
|
|
def self.with_two_factor
|
|
|
|
joins("LEFT OUTER JOIN u2f_registrations AS u2f ON u2f.user_id = users.id").
|
|
|
|
where("u2f.id IS NOT NULL OR otp_required_for_login = ?", true).distinct(arel_table[:id])
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.without_two_factor
|
|
|
|
joins("LEFT OUTER JOIN u2f_registrations AS u2f ON u2f.user_id = users.id").
|
|
|
|
where("u2f.id IS NULL AND otp_required_for_login = ?", false)
|
|
|
|
end
|
2012-10-08 20:10:04 -04:00
|
|
|
|
2013-01-02 12:00:00 -05:00
|
|
|
#
|
|
|
|
# Class methods
|
|
|
|
#
|
2012-10-08 20:10:04 -04:00
|
|
|
class << self
|
2013-10-03 05:04:51 -04:00
|
|
|
# Devise method overridden to allow sign in with email or username
|
2013-03-25 10:10:14 -04:00
|
|
|
def find_for_database_authentication(warden_conditions)
|
|
|
|
conditions = warden_conditions.dup
|
|
|
|
if login = conditions.delete(:login)
|
2015-12-14 21:53:52 -05:00
|
|
|
where(conditions).find_by("lower(username) = :value OR lower(email) = :value", value: login.downcase)
|
2013-03-25 10:10:14 -04:00
|
|
|
else
|
2015-12-14 21:53:52 -05:00
|
|
|
find_by(conditions)
|
2013-03-25 10:10:14 -04:00
|
|
|
end
|
|
|
|
end
|
2014-03-11 04:24:07 -04:00
|
|
|
|
2014-10-10 08:15:34 -04:00
|
|
|
def sort(method)
|
|
|
|
case method.to_s
|
2015-02-05 22:15:05 -05:00
|
|
|
when 'recent_sign_in' then reorder(last_sign_in_at: :desc)
|
|
|
|
when 'oldest_sign_in' then reorder(last_sign_in_at: :asc)
|
|
|
|
else
|
|
|
|
order_by(method)
|
2014-10-10 08:15:34 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-06-23 18:04:21 -04:00
|
|
|
# Find a User by their primary email or any associated secondary email
|
|
|
|
def find_by_any_email(email)
|
2015-10-29 12:51:49 -04:00
|
|
|
sql = 'SELECT *
|
|
|
|
FROM users
|
|
|
|
WHERE id IN (
|
|
|
|
SELECT id FROM users WHERE email = :email
|
|
|
|
UNION
|
|
|
|
SELECT emails.user_id FROM emails WHERE email = :email
|
|
|
|
)
|
2015-10-29 07:05:47 -04:00
|
|
|
LIMIT 1;'
|
|
|
|
|
|
|
|
User.find_by_sql([sql, { email: email }]).first
|
2014-02-08 22:08:49 -05:00
|
|
|
end
|
2013-03-25 10:10:14 -04:00
|
|
|
|
2014-09-25 18:07:40 -04:00
|
|
|
def filter(filter_name)
|
2012-10-08 20:10:04 -04:00
|
|
|
case filter_name
|
2015-06-19 16:31:36 -04:00
|
|
|
when 'admins'
|
|
|
|
self.admins
|
|
|
|
when 'blocked'
|
|
|
|
self.blocked
|
|
|
|
when 'two_factor_disabled'
|
|
|
|
self.without_two_factor
|
|
|
|
when 'two_factor_enabled'
|
|
|
|
self.with_two_factor
|
|
|
|
when 'wop'
|
|
|
|
self.without_projects
|
2016-03-13 05:05:32 -04:00
|
|
|
when 'external'
|
|
|
|
self.external
|
2012-10-08 20:10:04 -04:00
|
|
|
else
|
|
|
|
self.active
|
|
|
|
end
|
2012-06-24 16:26:13 -04:00
|
|
|
end
|
|
|
|
|
2016-03-01 10:08:48 -05:00
|
|
|
# Searches users matching the given query.
|
|
|
|
#
|
|
|
|
# This method uses ILIKE on PostgreSQL and LIKE on MySQL.
|
|
|
|
#
|
|
|
|
# query - The search query as a String
|
|
|
|
#
|
|
|
|
# Returns an ActiveRecord::Relation.
|
2014-09-25 18:07:40 -04:00
|
|
|
def search(query)
|
2016-03-04 06:01:21 -05:00
|
|
|
table = arel_table
|
2016-03-01 10:08:48 -05:00
|
|
|
pattern = "%#{query}%"
|
|
|
|
|
|
|
|
where(
|
|
|
|
table[:name].matches(pattern).
|
|
|
|
or(table[:email].matches(pattern)).
|
|
|
|
or(table[:username].matches(pattern))
|
|
|
|
)
|
2012-10-08 20:10:04 -04:00
|
|
|
end
|
2013-06-28 08:59:05 -04:00
|
|
|
|
2014-10-22 11:29:26 -04:00
|
|
|
def by_login(login)
|
2015-10-08 07:28:26 -04:00
|
|
|
return nil unless login
|
|
|
|
|
|
|
|
if login.include?('@'.freeze)
|
|
|
|
unscoped.iwhere(email: login).take
|
|
|
|
else
|
|
|
|
unscoped.iwhere(username: login).take
|
|
|
|
end
|
2014-10-22 11:29:26 -04:00
|
|
|
end
|
|
|
|
|
2015-07-23 17:16:39 -04:00
|
|
|
def find_by_username!(username)
|
|
|
|
find_by!('lower(username) = ?', username.downcase)
|
|
|
|
end
|
|
|
|
|
2016-06-15 22:54:13 -04:00
|
|
|
def find_by_personal_access_token(token_string)
|
|
|
|
personal_access_token = PersonalAccessToken.active.find_by_token(token_string) if token_string
|
|
|
|
personal_access_token.user if personal_access_token
|
|
|
|
end
|
|
|
|
|
2013-06-28 08:59:05 -04:00
|
|
|
def by_username_or_id(name_or_id)
|
2015-12-14 21:53:52 -05:00
|
|
|
find_by('users.username = ? OR users.id = ?', name_or_id.to_s, name_or_id.to_i)
|
2013-06-28 08:59:05 -04:00
|
|
|
end
|
2013-08-08 14:09:33 -04:00
|
|
|
|
2016-10-04 12:03:10 -04:00
|
|
|
# Returns a user for the given SSH key.
|
|
|
|
def find_by_ssh_key_id(key_id)
|
|
|
|
find_by(id: Key.unscoped.select(:user_id).where(id: key_id))
|
|
|
|
end
|
|
|
|
|
2014-06-26 16:24:17 -04:00
|
|
|
def build_user(attrs = {})
|
|
|
|
User.new(attrs)
|
2013-08-15 17:43:46 -04:00
|
|
|
end
|
2015-05-02 23:11:21 -04:00
|
|
|
|
|
|
|
def reference_prefix
|
|
|
|
'@'
|
|
|
|
end
|
2015-05-14 16:59:39 -04:00
|
|
|
|
|
|
|
# Pattern used to extract `@user` user references from text
|
|
|
|
def reference_pattern
|
|
|
|
%r{
|
|
|
|
#{Regexp.escape(reference_prefix)}
|
|
|
|
(?<user>#{Gitlab::Regex::NAMESPACE_REGEX_STR})
|
|
|
|
}x
|
|
|
|
end
|
2012-01-28 08:23:17 -05:00
|
|
|
end
|
2012-06-21 12:05:09 -04:00
|
|
|
|
2013-01-02 12:00:00 -05:00
|
|
|
#
|
|
|
|
# Instance methods
|
|
|
|
#
|
2013-01-25 13:35:58 -05:00
|
|
|
|
|
|
|
def to_param
|
|
|
|
username
|
|
|
|
end
|
|
|
|
|
2015-05-02 23:11:21 -04:00
|
|
|
def to_reference(_from_project = nil)
|
|
|
|
"#{self.class.reference_prefix}#{username}"
|
|
|
|
end
|
|
|
|
|
2012-10-08 20:10:04 -04:00
|
|
|
def generate_password
|
|
|
|
if self.force_random_password
|
2016-05-05 10:40:49 -04:00
|
|
|
self.password = self.password_confirmation = Devise.friendly_token.first(Devise.password_length.min)
|
2012-10-08 20:10:04 -04:00
|
|
|
end
|
2012-06-21 12:05:09 -04:00
|
|
|
end
|
2013-01-02 12:00:00 -05:00
|
|
|
|
2014-07-15 07:25:11 -04:00
|
|
|
def generate_reset_token
|
2014-07-16 04:01:13 -04:00
|
|
|
@reset_token, enc = Devise.token_generator.generate(self.class, :reset_password_token)
|
2014-07-15 07:25:11 -04:00
|
|
|
|
|
|
|
self.reset_password_token = enc
|
|
|
|
self.reset_password_sent_at = Time.now.utc
|
|
|
|
|
2014-07-16 04:01:13 -04:00
|
|
|
@reset_token
|
2014-07-15 07:25:11 -04:00
|
|
|
end
|
|
|
|
|
2016-04-21 14:55:54 -04:00
|
|
|
def check_confirmation_email
|
2016-04-28 16:09:15 -04:00
|
|
|
skip_confirmation! unless current_application_settings.send_user_confirmation_email
|
2016-04-21 14:55:54 -04:00
|
|
|
end
|
|
|
|
|
2015-10-01 21:41:56 -04:00
|
|
|
def recently_sent_password_reset?
|
|
|
|
reset_password_sent_at.present? && reset_password_sent_at >= 1.minute.ago
|
|
|
|
end
|
|
|
|
|
2015-07-10 16:08:39 -04:00
|
|
|
def disable_two_factor!
|
2016-06-06 00:38:42 -04:00
|
|
|
transaction do
|
|
|
|
update_attributes(
|
|
|
|
otp_required_for_login: false,
|
|
|
|
encrypted_otp_secret: nil,
|
|
|
|
encrypted_otp_secret_iv: nil,
|
|
|
|
encrypted_otp_secret_salt: nil,
|
|
|
|
otp_grace_period_started_at: nil,
|
|
|
|
otp_backup_codes: nil
|
|
|
|
)
|
|
|
|
self.u2f_registrations.destroy_all
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def two_factor_enabled?
|
|
|
|
two_factor_otp_enabled? || two_factor_u2f_enabled?
|
|
|
|
end
|
|
|
|
|
|
|
|
def two_factor_otp_enabled?
|
|
|
|
self.otp_required_for_login?
|
|
|
|
end
|
|
|
|
|
|
|
|
def two_factor_u2f_enabled?
|
|
|
|
self.u2f_registrations.exists?
|
2015-07-10 16:08:39 -04:00
|
|
|
end
|
|
|
|
|
2013-01-07 10:36:24 -05:00
|
|
|
def namespace_uniq
|
2016-01-02 19:53:45 -05:00
|
|
|
# Return early if username already failed the first uniqueness validation
|
2016-02-29 17:05:36 -05:00
|
|
|
return if self.errors.key?(:username) &&
|
|
|
|
self.errors[:username].include?('has already been taken')
|
2016-01-02 19:53:45 -05:00
|
|
|
|
2013-01-07 10:36:24 -05:00
|
|
|
namespace_name = self.username
|
2015-02-13 06:39:11 -05:00
|
|
|
existing_namespace = Namespace.by_path(namespace_name)
|
|
|
|
if existing_namespace && existing_namespace != self.namespace
|
2016-01-02 19:53:45 -05:00
|
|
|
self.errors.add(:username, 'has already been taken')
|
2013-01-07 10:36:24 -05:00
|
|
|
end
|
|
|
|
end
|
2013-01-02 12:00:00 -05:00
|
|
|
|
2013-12-23 13:28:59 -05:00
|
|
|
def avatar_type
|
|
|
|
unless self.avatar.image?
|
|
|
|
self.errors.add :avatar, "only images allowed"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-02-08 22:08:49 -05:00
|
|
|
def unique_email
|
2015-04-30 10:17:03 -04:00
|
|
|
if !self.emails.exists?(email: self.email) && Email.exists?(email: self.email)
|
|
|
|
self.errors.add(:email, 'has already been taken')
|
|
|
|
end
|
2014-02-08 22:08:49 -05:00
|
|
|
end
|
|
|
|
|
2015-02-06 18:23:58 -05:00
|
|
|
def owns_notification_email
|
2016-03-31 13:59:19 -04:00
|
|
|
return if self.temp_oauth_email?
|
|
|
|
|
2015-02-06 18:23:58 -05:00
|
|
|
self.errors.add(:notification_email, "is not an email you own") unless self.all_emails.include?(self.notification_email)
|
|
|
|
end
|
|
|
|
|
2015-04-30 10:17:03 -04:00
|
|
|
def owns_public_email
|
2015-06-23 21:22:00 -04:00
|
|
|
return if self.public_email.blank?
|
|
|
|
|
2015-04-30 10:17:03 -04:00
|
|
|
self.errors.add(:public_email, "is not an email you own") unless self.all_emails.include?(self.public_email)
|
|
|
|
end
|
|
|
|
|
|
|
|
def update_emails_with_primary_email
|
|
|
|
primary_email_record = self.emails.find_by(email: self.email)
|
|
|
|
if primary_email_record
|
|
|
|
primary_email_record.destroy
|
|
|
|
self.emails.create(email: self.email_was)
|
2015-05-06 17:33:39 -04:00
|
|
|
|
2015-04-30 10:17:03 -04:00
|
|
|
self.update_secondary_emails!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-11-18 06:30:24 -05:00
|
|
|
# Returns the groups a user has access to
|
|
|
|
def authorized_groups
|
2015-11-16 08:28:02 -05:00
|
|
|
union = Gitlab::SQL::Union.
|
2015-11-18 06:30:24 -05:00
|
|
|
new([groups.select(:id), authorized_projects.select(:namespace_id)])
|
2015-11-12 11:38:20 -05:00
|
|
|
|
2015-11-18 06:30:24 -05:00
|
|
|
Group.where("namespaces.id IN (#{union.to_sql})")
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
2016-03-14 06:25:04 -04:00
|
|
|
# Returns projects user is authorized to access.
|
2016-07-07 16:08:06 -04:00
|
|
|
#
|
|
|
|
# If you change the logic of this method, please also update `Project#authorized_for_user`
|
2016-06-06 15:13:31 -04:00
|
|
|
def authorized_projects(min_access_level = nil)
|
|
|
|
Project.where("projects.id IN (#{projects_union(min_access_level).to_sql})")
|
2013-01-02 12:00:00 -05:00
|
|
|
end
|
|
|
|
|
2016-05-10 13:03:55 -04:00
|
|
|
def viewable_starred_projects
|
|
|
|
starred_projects.where("projects.visibility_level IN (?) OR projects.id IN (#{projects_union.to_sql})",
|
2016-05-11 04:03:23 -04:00
|
|
|
[Project::PUBLIC, Project::INTERNAL])
|
2016-05-10 13:03:55 -04:00
|
|
|
end
|
|
|
|
|
2013-11-05 10:15:43 -05:00
|
|
|
def owned_projects
|
2015-06-09 07:28:11 -04:00
|
|
|
@owned_projects ||=
|
2015-11-18 07:12:44 -05:00
|
|
|
Project.where('namespace_id IN (?) OR namespace_id = ?',
|
|
|
|
owned_groups.select(:id), namespace.id).joins(:namespace)
|
2013-11-05 10:15:43 -05:00
|
|
|
end
|
|
|
|
|
2016-08-05 09:29:20 -04:00
|
|
|
# Returns projects which user can admin issues on (for example to move an issue to that project).
|
|
|
|
#
|
|
|
|
# This logic is duplicated from `Ability#project_abilities` into a SQL form.
|
|
|
|
def projects_where_can_admin_issues
|
2016-08-01 18:31:21 -04:00
|
|
|
authorized_projects(Gitlab::Access::REPORTER).non_archived.with_issues_enabled
|
2016-08-05 09:29:20 -04:00
|
|
|
end
|
|
|
|
|
2013-01-02 16:35:11 -05:00
|
|
|
def is_admin?
|
|
|
|
admin
|
|
|
|
end
|
|
|
|
|
|
|
|
def require_ssh_key?
|
|
|
|
keys.count == 0
|
|
|
|
end
|
|
|
|
|
2015-02-23 16:21:49 -05:00
|
|
|
def require_password?
|
|
|
|
password_automatically_set? && !ldap_user?
|
|
|
|
end
|
|
|
|
|
2013-01-30 15:14:34 -05:00
|
|
|
def can_change_username?
|
2014-06-26 16:24:17 -04:00
|
|
|
gitlab_config.username_changing_enabled
|
2013-01-30 15:14:34 -05:00
|
|
|
end
|
|
|
|
|
2013-01-02 16:35:11 -05:00
|
|
|
def can_create_project?
|
2013-07-09 13:51:49 -04:00
|
|
|
projects_limit_left > 0
|
2013-01-02 16:35:11 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def can_create_group?
|
2013-01-25 04:30:49 -05:00
|
|
|
can?(:create_group, nil)
|
2013-01-02 16:35:11 -05:00
|
|
|
end
|
|
|
|
|
2013-01-17 10:35:57 -05:00
|
|
|
def can_select_namespace?
|
|
|
|
several_namespaces? || admin
|
|
|
|
end
|
|
|
|
|
2014-09-25 18:07:40 -04:00
|
|
|
def can?(action, subject)
|
2016-08-08 14:55:13 -04:00
|
|
|
Ability.allowed?(self, action, subject)
|
2013-01-02 16:35:11 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def first_name
|
|
|
|
name.split.first unless name.blank?
|
|
|
|
end
|
|
|
|
|
|
|
|
def cared_merge_requests
|
2013-02-19 02:43:41 -05:00
|
|
|
MergeRequest.cared(self)
|
2013-01-02 16:35:11 -05:00
|
|
|
end
|
|
|
|
|
2013-04-03 11:36:37 -04:00
|
|
|
def projects_limit_left
|
2013-06-26 07:41:03 -04:00
|
|
|
projects_limit - personal_projects.count
|
2013-04-03 11:36:37 -04:00
|
|
|
end
|
|
|
|
|
2013-01-02 16:35:11 -05:00
|
|
|
def projects_limit_percent
|
|
|
|
return 100 if projects_limit.zero?
|
2013-06-26 07:41:03 -04:00
|
|
|
(personal_projects.count.to_f / projects_limit) * 100
|
2013-01-02 16:35:11 -05:00
|
|
|
end
|
|
|
|
|
2016-08-24 07:13:26 -04:00
|
|
|
def recent_push(project_ids = nil)
|
2013-01-02 16:35:11 -05:00
|
|
|
# Get push events not earlier than 2 hours ago
|
|
|
|
events = recent_events.code_push.where("created_at > ?", Time.now - 2.hours)
|
2016-08-24 07:13:26 -04:00
|
|
|
events = events.where(project_id: project_ids) if project_ids
|
2013-01-02 16:35:11 -05:00
|
|
|
|
2015-08-16 21:05:53 -04:00
|
|
|
# Use the latest event that has not been pushed or merged recently
|
|
|
|
events.recent.find do |event|
|
|
|
|
project = Project.find_by_id(event.project_id)
|
|
|
|
next unless project
|
|
|
|
|
2016-06-20 09:38:54 -04:00
|
|
|
if project.repository.branch_exists?(event.branch_name)
|
2015-08-16 21:05:53 -04:00
|
|
|
merge_requests = MergeRequest.where("created_at >= ?", event.created_at).
|
|
|
|
where(source_project_id: project.id,
|
|
|
|
source_branch: event.branch_name)
|
|
|
|
merge_requests.empty?
|
|
|
|
end
|
|
|
|
end
|
2013-01-02 16:35:11 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def projects_sorted_by_activity
|
|
|
|
authorized_projects.sorted_by_activity
|
|
|
|
end
|
|
|
|
|
|
|
|
def several_namespaces?
|
2014-06-24 08:12:08 -04:00
|
|
|
owned_groups.any? || masters_groups.any?
|
2013-01-02 16:35:11 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def namespace_id
|
|
|
|
namespace.try :id
|
|
|
|
end
|
2013-01-25 08:51:45 -05:00
|
|
|
|
2013-03-13 13:24:30 -04:00
|
|
|
def name_with_username
|
|
|
|
"#{name} (#{username})"
|
|
|
|
end
|
2013-04-04 03:53:39 -04:00
|
|
|
|
2014-09-25 18:07:40 -04:00
|
|
|
def already_forked?(project)
|
2013-05-08 12:40:31 -04:00
|
|
|
!!fork_of(project)
|
|
|
|
end
|
|
|
|
|
2014-09-25 18:07:40 -04:00
|
|
|
def fork_of(project)
|
2013-05-08 12:40:31 -04:00
|
|
|
links = ForkedProjectLink.where(forked_from_project_id: project, forked_to_project_id: personal_projects)
|
|
|
|
|
|
|
|
if links.any?
|
|
|
|
links.first.forked_to_project
|
|
|
|
else
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
end
|
2013-05-24 10:12:27 -04:00
|
|
|
|
|
|
|
def ldap_user?
|
2014-11-27 06:34:39 -05:00
|
|
|
identities.exists?(["provider LIKE ? AND extern_uid IS NOT NULL", "ldap%"])
|
|
|
|
end
|
|
|
|
|
|
|
|
def ldap_identity
|
|
|
|
@ldap_identity ||= identities.find_by(["provider LIKE ?", "ldap%"])
|
2013-05-24 10:12:27 -04:00
|
|
|
end
|
2013-06-03 12:49:04 -04:00
|
|
|
|
2015-03-27 09:43:48 -04:00
|
|
|
def project_deploy_keys
|
2015-05-08 09:03:26 -04:00
|
|
|
DeployKey.unscoped.in_projects(self.authorized_projects.pluck(:id)).distinct(:id)
|
2015-03-27 09:43:48 -04:00
|
|
|
end
|
|
|
|
|
2013-06-04 10:50:51 -04:00
|
|
|
def accessible_deploy_keys
|
2015-03-27 09:43:48 -04:00
|
|
|
@accessible_deploy_keys ||= begin
|
|
|
|
key_ids = project_deploy_keys.pluck(:id)
|
|
|
|
key_ids.push(*DeployKey.are_public.pluck(:id))
|
|
|
|
DeployKey.where(id: key_ids)
|
|
|
|
end
|
2013-06-03 12:49:04 -04:00
|
|
|
end
|
2013-06-13 14:06:27 -04:00
|
|
|
|
|
|
|
def created_by
|
2014-01-19 13:55:59 -05:00
|
|
|
User.find_by(id: created_by_id) if created_by_id
|
2013-06-13 14:06:27 -04:00
|
|
|
end
|
2013-07-10 06:48:03 -04:00
|
|
|
|
|
|
|
def sanitize_attrs
|
2015-05-21 04:44:17 -04:00
|
|
|
%w(name username skype linkedin twitter).each do |attr|
|
2013-07-10 06:48:03 -04:00
|
|
|
value = self.send(attr)
|
|
|
|
self.send("#{attr}=", Sanitize.clean(value)) if value.present?
|
|
|
|
end
|
|
|
|
end
|
2013-08-27 13:40:42 -04:00
|
|
|
|
2015-02-06 18:23:58 -05:00
|
|
|
def set_notification_email
|
|
|
|
if self.notification_email.blank? || !self.all_emails.include?(self.notification_email)
|
2015-02-18 16:28:24 -05:00
|
|
|
self.notification_email = self.email
|
2015-02-06 18:23:58 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-04-13 12:28:49 -04:00
|
|
|
def set_public_email
|
|
|
|
if self.public_email.blank? || !self.all_emails.include?(self.public_email)
|
2015-06-23 21:22:00 -04:00
|
|
|
self.public_email = ''
|
2015-04-13 12:28:49 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-04-30 10:17:03 -04:00
|
|
|
def update_secondary_emails!
|
|
|
|
self.set_notification_email
|
|
|
|
self.set_public_email
|
|
|
|
self.save if self.notification_email_changed? || self.public_email_changed?
|
|
|
|
end
|
|
|
|
|
2015-02-19 11:16:46 -05:00
|
|
|
def set_projects_limit
|
2016-10-11 04:21:22 -04:00
|
|
|
# `User.select(:id)` raises
|
|
|
|
# `ActiveModel::MissingAttributeError: missing attribute: projects_limit`
|
|
|
|
# without this safeguard!
|
|
|
|
return unless self.has_attribute?(:projects_limit)
|
|
|
|
|
2015-02-19 11:16:46 -05:00
|
|
|
connection_default_value_defined = new_record? && !projects_limit_changed?
|
|
|
|
return unless self.projects_limit.nil? || connection_default_value_defined
|
|
|
|
|
|
|
|
self.projects_limit = current_application_settings.default_projects_limit
|
|
|
|
end
|
|
|
|
|
2014-03-11 04:24:07 -04:00
|
|
|
def requires_ldap_check?
|
2014-08-06 09:17:12 -04:00
|
|
|
if !Gitlab.config.ldap.enabled
|
|
|
|
false
|
|
|
|
elsif ldap_user?
|
2014-03-11 04:24:07 -04:00
|
|
|
!last_credential_check_at || (last_credential_check_at + 1.hour) < Time.now
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-03-10 06:37:14 -05:00
|
|
|
def try_obtain_ldap_lease
|
|
|
|
# After obtaining this lease LDAP checks will be blocked for 600 seconds
|
|
|
|
# (10 minutes) for this user.
|
|
|
|
lease = Gitlab::ExclusiveLease.new("user_ldap_check:#{id}", timeout: 600)
|
|
|
|
lease.try_obtain
|
|
|
|
end
|
|
|
|
|
2013-08-27 13:40:42 -04:00
|
|
|
def solo_owned_groups
|
|
|
|
@solo_owned_groups ||= owned_groups.select do |group|
|
|
|
|
group.owners == [self]
|
|
|
|
end
|
|
|
|
end
|
2013-08-15 17:43:46 -04:00
|
|
|
|
|
|
|
def with_defaults
|
2013-09-14 13:51:16 -04:00
|
|
|
User.defaults.each do |k, v|
|
|
|
|
self.send("#{k}=", v)
|
2013-08-15 17:43:46 -04:00
|
|
|
end
|
2013-09-14 13:51:16 -04:00
|
|
|
|
|
|
|
self
|
2013-08-15 17:43:46 -04:00
|
|
|
end
|
2013-10-02 11:09:29 -04:00
|
|
|
|
2013-11-05 09:41:29 -05:00
|
|
|
def can_leave_project?(project)
|
|
|
|
project.namespace != namespace &&
|
|
|
|
project.project_member(self)
|
|
|
|
end
|
2013-12-11 10:30:22 -05:00
|
|
|
|
|
|
|
# Reset project events cache related to this user
|
|
|
|
#
|
|
|
|
# Since we do cache @event we need to reset cache in special cases:
|
|
|
|
# * when the user changes their avatar
|
|
|
|
# Events cache stored like events/23-20130109142513.
|
|
|
|
# The cache key includes updated_at timestamp.
|
|
|
|
# Thus it will automatically generate a new fragment
|
|
|
|
# when the event is updated because the key changes.
|
|
|
|
def reset_events_cache
|
|
|
|
Event.where(author_id: self.id).
|
|
|
|
order('id DESC').limit(1000).
|
|
|
|
update_all(updated_at: Time.now)
|
|
|
|
end
|
2014-01-18 14:07:00 -05:00
|
|
|
|
|
|
|
def full_website_url
|
2015-04-10 12:27:42 -04:00
|
|
|
return "http://#{website_url}" if website_url !~ /\Ahttps?:\/\//
|
2014-01-18 14:07:00 -05:00
|
|
|
|
|
|
|
website_url
|
|
|
|
end
|
|
|
|
|
|
|
|
def short_website_url
|
2015-04-10 12:27:42 -04:00
|
|
|
website_url.sub(/\Ahttps?:\/\//, '')
|
2014-01-18 14:07:00 -05:00
|
|
|
end
|
2014-02-06 06:26:20 -05:00
|
|
|
|
2013-10-02 11:09:29 -04:00
|
|
|
def all_ssh_keys
|
2015-06-19 13:17:34 -04:00
|
|
|
keys.map(&:publishable_key)
|
2013-10-02 11:09:29 -04:00
|
|
|
end
|
2014-04-07 07:09:29 -04:00
|
|
|
|
|
|
|
def temp_oauth_email?
|
2014-10-19 10:09:38 -04:00
|
|
|
email.start_with?('temp-email-for-oauth')
|
2014-04-07 07:09:29 -04:00
|
|
|
end
|
|
|
|
|
2015-09-26 15:51:02 -04:00
|
|
|
def avatar_url(size = nil, scale = 2)
|
2016-07-05 10:51:11 -04:00
|
|
|
if self[:avatar].present?
|
2015-01-19 06:55:05 -05:00
|
|
|
[gitlab_config.url, avatar.url].join
|
2014-06-13 10:46:48 -04:00
|
|
|
else
|
2015-09-26 15:51:02 -04:00
|
|
|
GravatarService.new.execute(email, size, scale)
|
2014-06-13 10:46:48 -04:00
|
|
|
end
|
|
|
|
end
|
2014-06-17 15:32:35 -04:00
|
|
|
|
2015-02-06 18:23:58 -05:00
|
|
|
def all_emails
|
2016-01-19 10:25:38 -05:00
|
|
|
all_emails = []
|
|
|
|
all_emails << self.email unless self.temp_oauth_email?
|
|
|
|
all_emails.concat(self.emails.map(&:email))
|
|
|
|
all_emails
|
2015-02-06 18:23:58 -05:00
|
|
|
end
|
|
|
|
|
2014-10-05 09:03:15 -04:00
|
|
|
def hook_attrs
|
|
|
|
{
|
|
|
|
name: name,
|
|
|
|
username: username,
|
|
|
|
avatar_url: avatar_url
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2014-06-17 15:32:35 -04:00
|
|
|
def ensure_namespace_correct
|
|
|
|
# Ensure user has namespace
|
|
|
|
self.create_namespace!(path: self.username, name: self.username) unless self.namespace
|
|
|
|
|
|
|
|
if self.username_changed?
|
|
|
|
self.namespace.update_attributes(path: self.username, name: self.username)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def post_create_hook
|
|
|
|
log_info("User \"#{self.name}\" (#{self.email}) was created")
|
2015-02-13 09:30:54 -05:00
|
|
|
notification_service.new_user(self, @reset_token) if self.created_by_id
|
2014-06-17 15:32:35 -04:00
|
|
|
system_hook_service.execute_hooks_for(self, :create)
|
|
|
|
end
|
|
|
|
|
|
|
|
def post_destroy_hook
|
|
|
|
log_info("User \"#{self.name}\" (#{self.email}) was removed")
|
|
|
|
system_hook_service.execute_hooks_for(self, :destroy)
|
|
|
|
end
|
|
|
|
|
2014-06-17 15:54:21 -04:00
|
|
|
def notification_service
|
2014-06-17 15:32:35 -04:00
|
|
|
NotificationService.new
|
|
|
|
end
|
|
|
|
|
2014-09-25 18:07:40 -04:00
|
|
|
def log_info(message)
|
2014-06-17 15:32:35 -04:00
|
|
|
Gitlab::AppLogger.info message
|
|
|
|
end
|
|
|
|
|
|
|
|
def system_hook_service
|
|
|
|
SystemHooksService.new
|
|
|
|
end
|
2014-06-26 03:49:14 -04:00
|
|
|
|
|
|
|
def starred?(project)
|
2015-12-03 03:33:38 -05:00
|
|
|
starred_projects.exists?(project.id)
|
2014-06-26 03:49:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def toggle_star(project)
|
2015-10-17 03:55:33 -04:00
|
|
|
UsersStarProject.transaction do
|
|
|
|
user_star_project = users_star_projects.
|
|
|
|
where(project: project, user: self).lock(true).first
|
|
|
|
|
|
|
|
if user_star_project
|
|
|
|
user_star_project.destroy
|
|
|
|
else
|
|
|
|
UsersStarProject.create!(project: project, user: self)
|
|
|
|
end
|
2014-06-26 03:49:14 -04:00
|
|
|
end
|
|
|
|
end
|
2014-11-13 15:06:19 -05:00
|
|
|
|
|
|
|
def manageable_namespaces
|
2015-10-03 01:56:37 -04:00
|
|
|
@manageable_namespaces ||= [namespace] + owned_groups + masters_groups
|
2014-11-13 15:06:19 -05:00
|
|
|
end
|
2014-12-25 11:35:04 -05:00
|
|
|
|
2015-05-25 16:51:37 -04:00
|
|
|
def namespaces
|
|
|
|
namespace_ids = groups.pluck(:id)
|
|
|
|
namespace_ids.push(namespace.id)
|
|
|
|
Namespace.where(id: namespace_ids)
|
|
|
|
end
|
|
|
|
|
2014-12-25 11:35:04 -05:00
|
|
|
def oauth_authorized_tokens
|
|
|
|
Doorkeeper::AccessToken.where(resource_owner_id: self.id, revoked_at: nil)
|
|
|
|
end
|
2015-02-18 16:28:24 -05:00
|
|
|
|
2015-11-16 08:28:02 -05:00
|
|
|
# Returns the projects a user contributed to in the last year.
|
|
|
|
#
|
|
|
|
# This method relies on a subquery as this performs significantly better
|
|
|
|
# compared to a JOIN when coupled with, for example,
|
|
|
|
# `Project.visible_to_user`. That is, consider the following code:
|
|
|
|
#
|
|
|
|
# some_user.contributed_projects.visible_to_user(other_user)
|
|
|
|
#
|
|
|
|
# If this method were to use a JOIN the resulting query would take roughly 200
|
2015-11-18 14:20:55 -05:00
|
|
|
# ms on a database with a similar size to GitLab.com's database. On the other
|
2015-11-16 08:28:02 -05:00
|
|
|
# hand, using a subquery means we can get the exact same data in about 40 ms.
|
|
|
|
def contributed_projects
|
|
|
|
events = Event.select(:project_id).
|
|
|
|
contributions.where(author_id: self).
|
2015-02-18 18:16:13 -05:00
|
|
|
where("created_at > ?", Time.now - 1.year).
|
2015-11-12 10:29:40 -05:00
|
|
|
uniq.
|
2015-11-16 08:28:02 -05:00
|
|
|
reorder(nil)
|
|
|
|
|
|
|
|
Project.where(id: events)
|
2015-02-18 16:28:24 -05:00
|
|
|
end
|
2015-05-02 09:53:32 -04:00
|
|
|
|
2015-05-28 06:00:02 -04:00
|
|
|
def can_be_removed?
|
|
|
|
!solo_owned_groups.present?
|
|
|
|
end
|
2015-09-15 15:21:40 -04:00
|
|
|
|
|
|
|
def ci_authorized_runners
|
2015-10-23 12:15:13 -04:00
|
|
|
@ci_authorized_runners ||= begin
|
2015-12-04 06:55:23 -05:00
|
|
|
runner_ids = Ci::RunnerProject.
|
|
|
|
where("ci_runner_projects.gl_project_id IN (#{ci_projects_union.to_sql})").
|
2015-11-12 10:29:40 -05:00
|
|
|
select(:runner_id)
|
2015-10-23 12:15:13 -04:00
|
|
|
Ci::Runner.specific.where(id: runner_ids)
|
|
|
|
end
|
2015-09-15 15:21:40 -04:00
|
|
|
end
|
2015-11-12 10:29:40 -05:00
|
|
|
|
2016-04-08 16:35:21 -04:00
|
|
|
def notification_settings_for(source)
|
|
|
|
notification_settings.find_or_initialize_by(source: source)
|
|
|
|
end
|
|
|
|
|
2016-06-06 11:50:54 -04:00
|
|
|
# Lazy load global notification setting
|
|
|
|
# Initializes User setting with Participating level if setting not persisted
|
|
|
|
def global_notification_setting
|
2016-06-09 15:33:31 -04:00
|
|
|
return @global_notification_setting if defined?(@global_notification_setting)
|
|
|
|
|
|
|
|
@global_notification_setting = notification_settings.find_or_initialize_by(source: nil)
|
|
|
|
@global_notification_setting.update_attributes(level: NotificationSetting.levels[DEFAULT_NOTIFICATION_LEVEL]) unless @global_notification_setting.persisted?
|
|
|
|
|
|
|
|
@global_notification_setting
|
2016-06-06 11:50:54 -04:00
|
|
|
end
|
|
|
|
|
2016-06-01 19:27:21 -04:00
|
|
|
def assigned_open_merge_request_count(force: false)
|
|
|
|
Rails.cache.fetch(['users', id, 'assigned_open_merge_request_count'], force: force) do
|
2016-05-31 09:02:47 -04:00
|
|
|
assigned_merge_requests.opened.count
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-06-01 19:27:21 -04:00
|
|
|
def assigned_open_issues_count(force: false)
|
|
|
|
Rails.cache.fetch(['users', id, 'assigned_open_issues_count'], force: force) do
|
2016-05-31 09:02:47 -04:00
|
|
|
assigned_issues.opened.count
|
|
|
|
end
|
2016-05-31 08:58:11 -04:00
|
|
|
end
|
|
|
|
|
2016-06-01 19:27:21 -04:00
|
|
|
def update_cache_counts
|
|
|
|
assigned_open_merge_request_count(force: true)
|
|
|
|
assigned_open_issues_count(force: true)
|
|
|
|
end
|
|
|
|
|
2016-06-02 09:46:58 -04:00
|
|
|
def todos_done_count(force: false)
|
|
|
|
Rails.cache.fetch(['users', id, 'todos_done_count'], force: force) do
|
2016-07-08 12:42:47 -04:00
|
|
|
TodosFinder.new(self, state: :done).execute.count
|
2016-06-02 09:46:58 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def todos_pending_count(force: false)
|
|
|
|
Rails.cache.fetch(['users', id, 'todos_pending_count'], force: force) do
|
2016-07-08 12:42:47 -04:00
|
|
|
TodosFinder.new(self, state: :pending).execute.count
|
2016-06-02 09:46:58 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def update_todos_count_cache
|
|
|
|
todos_done_count(force: true)
|
|
|
|
todos_pending_count(force: true)
|
|
|
|
end
|
|
|
|
|
2016-09-02 09:30:19 -04:00
|
|
|
# This is copied from Devise::Models::Lockable#valid_for_authentication?, as our auth
|
|
|
|
# flow means we don't call that automatically (and can't conveniently do so).
|
|
|
|
#
|
|
|
|
# See:
|
|
|
|
# <https://github.com/plataformatec/devise/blob/v4.0.0/lib/devise/models/lockable.rb#L92>
|
|
|
|
#
|
|
|
|
def increment_failed_attempts!
|
|
|
|
self.failed_attempts ||= 0
|
|
|
|
self.failed_attempts += 1
|
|
|
|
if attempts_exceeded?
|
|
|
|
lock_access! unless access_locked?
|
|
|
|
else
|
|
|
|
save(validate: false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-11-12 10:29:40 -05:00
|
|
|
private
|
|
|
|
|
2016-06-06 15:13:31 -04:00
|
|
|
def projects_union(min_access_level = nil)
|
2016-06-10 10:26:47 -04:00
|
|
|
relations = [personal_projects.select(:id),
|
|
|
|
groups_projects.select(:id),
|
|
|
|
projects.select(:id),
|
|
|
|
groups.joins(:shared_projects).select(:project_id)]
|
|
|
|
|
|
|
|
if min_access_level
|
2016-07-19 15:19:04 -04:00
|
|
|
scope = { access_level: Gitlab::Access.all_values.select { |access| access >= min_access_level } }
|
2016-06-10 10:26:47 -04:00
|
|
|
relations = [relations.shift] + relations.map { |relation| relation.where(members: scope) }
|
|
|
|
end
|
2016-06-06 15:13:31 -04:00
|
|
|
|
|
|
|
Gitlab::SQL::Union.new(relations)
|
2015-11-12 10:29:40 -05:00
|
|
|
end
|
2015-11-18 07:02:03 -05:00
|
|
|
|
|
|
|
def ci_projects_union
|
|
|
|
scope = { access_level: [Gitlab::Access::MASTER, Gitlab::Access::OWNER] }
|
|
|
|
groups = groups_projects.where(members: scope)
|
|
|
|
other = projects.where(members: scope)
|
|
|
|
|
|
|
|
Gitlab::SQL::Union.new([personal_projects.select(:id), groups.select(:id),
|
|
|
|
other.select(:id)])
|
|
|
|
end
|
2015-12-02 01:50:00 -05:00
|
|
|
|
|
|
|
# Added according to https://github.com/plataformatec/devise/blob/7df57d5081f9884849ca15e4fde179ef164a575f/README.md#activejob-integration
|
|
|
|
def send_devise_notification(notification, *args)
|
|
|
|
devise_mailer.send(notification, self, *args).deliver_later
|
|
|
|
end
|
2016-03-10 16:08:11 -05:00
|
|
|
|
|
|
|
def ensure_external_user_rights
|
|
|
|
return unless self.external?
|
|
|
|
|
|
|
|
self.can_create_group = false
|
|
|
|
self.projects_limit = 0
|
|
|
|
end
|
2016-07-14 23:47:36 -04:00
|
|
|
|
2016-07-15 10:54:04 -04:00
|
|
|
def signup_domain_valid?
|
|
|
|
valid = true
|
|
|
|
error = nil
|
|
|
|
|
|
|
|
if current_application_settings.domain_blacklist_enabled?
|
|
|
|
blocked_domains = current_application_settings.domain_blacklist
|
2016-07-16 12:44:50 -04:00
|
|
|
if domain_matches?(blocked_domains, self.email)
|
2016-07-15 10:54:04 -04:00
|
|
|
error = 'is not from an allowed domain.'
|
|
|
|
valid = false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-07-15 19:30:38 -04:00
|
|
|
allowed_domains = current_application_settings.domain_whitelist
|
2016-07-15 10:54:04 -04:00
|
|
|
unless allowed_domains.blank?
|
2016-07-16 12:44:50 -04:00
|
|
|
if domain_matches?(allowed_domains, self.email)
|
2016-07-15 10:54:04 -04:00
|
|
|
valid = true
|
|
|
|
else
|
2016-10-07 00:19:03 -04:00
|
|
|
error = "domain is not authorized for sign-up"
|
2016-07-15 10:54:04 -04:00
|
|
|
valid = false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
self.errors.add(:email, error) unless valid
|
|
|
|
|
|
|
|
valid
|
|
|
|
end
|
2016-07-14 23:47:36 -04:00
|
|
|
|
2016-07-16 12:44:50 -04:00
|
|
|
def domain_matches?(email_domains, email)
|
2016-07-14 23:47:36 -04:00
|
|
|
signup_domain = Mail::Address.new(email).domain
|
|
|
|
email_domains.any? do |domain|
|
|
|
|
escaped = Regexp.escape(domain).gsub('\*', '.*?')
|
|
|
|
regexp = Regexp.new "^#{escaped}$", Regexp::IGNORECASE
|
|
|
|
signup_domain =~ regexp
|
|
|
|
end
|
|
|
|
end
|
2011-10-08 17:36:38 -04:00
|
|
|
end
|