gitlab-org--gitlab-foss/app/models/user.rb

367 lines
11 KiB
Ruby
Raw Normal View History

2012-11-19 13:24:05 -05:00
# == Schema Information
#
# Table name: users
#
# id :integer not null, primary key
# email :string(255) default(""), not null
# encrypted_password :string(255) default(""), not null
# reset_password_token :string(255)
# reset_password_sent_at :datetime
# remember_created_at :datetime
# sign_in_count :integer default(0)
# current_sign_in_at :datetime
# last_sign_in_at :datetime
# current_sign_in_ip :string(255)
# last_sign_in_ip :string(255)
# created_at :datetime not null
# updated_at :datetime not null
# name :string(255)
# admin :boolean default(FALSE), not null
# projects_limit :integer default(10)
# skype :string(255) default(""), not null
# linkedin :string(255) default(""), not null
# twitter :string(255) default(""), not null
# authentication_token :string(255)
# theme_id :integer default(1), not null
# bio :string(255)
# failed_attempts :integer default(0)
# locked_at :datetime
# extern_uid :string(255)
# provider :string(255)
2012-11-24 15:16:51 -05:00
# username :string(255)
# can_create_group :boolean default(TRUE), not null
# can_create_team :boolean default(TRUE), not null
2013-03-15 09:16:02 -04:00
# state :string(255)
# color_scheme_id :integer default(1), not null
2013-03-27 12:26:37 -04:00
# notification_level :integer default(1), not null
2012-11-19 13:24:05 -05:00
#
2011-10-08 17:36:38 -04:00
class User < ActiveRecord::Base
2012-07-06 03:05:31 -04:00
devise :database_authenticatable, :token_authenticatable, :lockable,
2012-11-06 08:30:48 -05:00
:recoverable, :rememberable, :trackable, :validatable, :omniauthable, :registerable
2011-10-08 17:36:38 -04:00
attr_accessible :email, :password, :password_confirmation, :remember_me, :bio, :name, :username,
:skype, :linkedin, :twitter, :color_scheme_id, :theme_id, :force_random_password,
2012-11-27 22:14:05 -05:00
:extern_uid, :provider, as: [:default, :admin]
attr_accessible :projects_limit, :can_create_team, :can_create_group, as: :admin
attr_accessor :force_random_password
2011-10-08 17:36:38 -04:00
2013-03-25 10:10:14 -04:00
# Virtual attribute for authenticating by either username or email
attr_accessor :login
# Add login to attr_accessible
attr_accessible :login
#
# Relations
#
# Namespace for personal projects
2013-04-02 18:28:12 -04:00
has_one :namespace, dependent: :destroy, foreign_key: :owner_id, class_name: "Namespace", conditions: 'type IS NULL'
# Namespaces (owned groups and own namespace)
has_many :namespaces, foreign_key: :owner_id
# Profile
has_many :keys, dependent: :destroy
# Groups
has_many :groups, class_name: "Group", foreign_key: :owner_id
# Teams
2013-04-02 18:28:12 -04:00
has_many :own_teams, dependent: :destroy, class_name: "UserTeam", foreign_key: :owner_id
has_many :user_team_user_relationships, dependent: :destroy
has_many :user_teams, through: :user_team_user_relationships
has_many :user_team_project_relationships, through: :user_teams
2013-04-02 18:28:12 -04:00
has_many :team_projects, through: :user_team_project_relationships
# Projects
has_many :snippets, dependent: :destroy, foreign_key: :author_id, class_name: "Snippet"
has_many :users_projects, dependent: :destroy
has_many :issues, dependent: :destroy, foreign_key: :author_id
has_many :notes, dependent: :destroy, foreign_key: :author_id
has_many :merge_requests, dependent: :destroy, foreign_key: :author_id
has_many :events, dependent: :destroy, foreign_key: :author_id, class_name: "Event"
2013-04-02 18:28:12 -04:00
has_many :recent_events, foreign_key: :author_id, class_name: "Event", order: "id DESC"
has_many :assigned_issues, dependent: :destroy, foreign_key: :assignee_id, class_name: "Issue"
has_many :assigned_merge_requests, dependent: :destroy, foreign_key: :assignee_id, class_name: "MergeRequest"
2013-04-02 18:28:12 -04:00
has_many :personal_projects, through: :namespace, source: :projects
has_many :projects, through: :users_projects
has_many :master_projects, through: :users_projects, source: :project,
conditions: { users_projects: { project_access: UsersProject::MASTER } }
2013-05-06 08:10:55 -04:00
has_many :own_projects, foreign_key: :creator_id, class_name: 'Project'
2013-04-02 18:28:12 -04:00
has_many :owned_projects, through: :namespaces, source: :projects
#
# Validations
#
validates :name, presence: true
2013-02-26 04:09:32 -05:00
validates :email, presence: true, format: { with: /\A([^@\s]+)@((?:[-a-z0-9]+\.)+[a-z]{2,})\Z/ }
validates :bio, length: { within: 0..255 }
2012-11-27 22:14:05 -05:00
validates :extern_uid, allow_blank: true, uniqueness: {scope: :provider}
2012-09-27 02:20:36 -04:00
validates :projects_limit, presence: true, numericality: {greater_than_or_equal_to: 0}
2012-11-27 22:14:05 -05:00
validates :username, presence: true, uniqueness: true,
format: { with: Gitlab::Regex.username_regex,
message: "only letters, digits & '_' '-' '.' allowed. Letter should be first" }
2013-04-02 18:28:12 -04:00
validates :notification_level, inclusion: { in: Notification.notification_levels }, presence: true
validate :namespace_uniq, if: ->(user) { user.username_changed? }
before_validation :generate_password, on: :create
2012-09-27 02:20:36 -04:00
before_save :ensure_authentication_token
alias_attribute :private_token, :authentication_token
delegate :path, to: :namespace, allow_nil: true, prefix: true
state_machine :state, initial: :active do
after_transition any => :blocked do |user, transition|
# Remove user from all projects and
user.users_projects.find_each do |membership|
return false unless membership.destroy
end
end
event :block do
transition active: :blocked
end
event :activate do
transition blocked: :active
end
end
2012-10-08 20:10:04 -04:00
# Scopes
2013-02-12 02:16:45 -05:00
scope :admins, -> { where(admin: true) }
scope :blocked, -> { with_state(:blocked) }
scope :active, -> { with_state(:active) }
2013-02-12 02:16:45 -05:00
scope :alphabetically, -> { order('name ASC') }
scope :in_team, ->(team){ where(id: team.member_ids) }
scope :not_in_team, ->(team){ where('users.id NOT IN (:ids)', ids: team.member_ids) }
2013-04-02 18:28:12 -04:00
scope :not_in_project, ->(project) { project.users.present? ? where("id not in (:ids)", ids: project.users.map(&:id) ) : scoped }
scope :without_projects, -> { where('id NOT IN (SELECT DISTINCT(user_id) FROM users_projects)') }
2013-01-25 08:36:10 -05:00
scope :potential_team_members, ->(team) { team.members.any? ? active.not_in_team(team) : active }
2012-10-08 20:10:04 -04:00
#
# Class methods
#
2012-10-08 20:10:04 -04:00
class << self
2013-03-25 10:10:14 -04:00
# Devise method overriden to allow sing in with email or username
def find_for_database_authentication(warden_conditions)
conditions = warden_conditions.dup
if login = conditions.delete(:login)
where(conditions).where(["lower(username) = :value OR lower(email) = :value", { value: login.downcase }]).first
else
where(conditions).first
end
end
2012-10-08 20:10:04 -04:00
def filter filter_name
case filter_name
when "admins"; self.admins
when "blocked"; self.blocked
when "wop"; self.without_projects
else
self.active
end
end
2012-10-08 20:10:04 -04:00
def create_from_omniauth(auth, ldap = false)
gitlab_auth.create_from_omniauth(auth, ldap)
end
2011-10-08 17:36:38 -04:00
2012-10-08 20:10:04 -04:00
def find_or_new_for_omniauth(auth)
gitlab_auth.find_or_new_for_omniauth(auth)
end
2012-08-31 10:44:23 -04:00
2012-10-08 20:10:04 -04:00
def find_for_ldap_auth(auth, signed_in_resource = nil)
gitlab_auth.find_for_ldap_auth(auth, signed_in_resource)
end
2012-08-31 09:45:50 -04:00
2012-10-08 20:10:04 -04:00
def gitlab_auth
Gitlab::Auth.new
end
2012-08-31 09:45:50 -04:00
2012-10-08 20:10:04 -04:00
def search query
where("name LIKE :query OR email LIKE :query OR username LIKE :query", query: "%#{query}%")
2012-10-08 20:10:04 -04:00
end
2012-01-28 08:23:17 -05:00
end
2012-06-21 12:05:09 -04:00
#
# Instance methods
#
2013-01-25 13:35:58 -05:00
def to_param
username
end
def with_defaults
tap do |u|
u.projects_limit = Gitlab.config.gitlab.default_projects_limit
u.can_create_group = Gitlab.config.gitlab.default_can_create_group
u.can_create_team = Gitlab.config.gitlab.default_can_create_team
end
end
2013-03-27 13:04:29 -04:00
def notification
@notification ||= Notification.new(self)
end
2012-10-08 20:10:04 -04:00
def generate_password
if self.force_random_password
self.password = self.password_confirmation = Devise.friendly_token.first(8)
end
2012-06-21 12:05:09 -04:00
end
def namespace_uniq
namespace_name = self.username
if Namespace.find_by_path(namespace_name)
self.errors.add :username, "already exist"
end
end
# Groups where user is an owner
def owned_groups
groups
end
2013-04-02 18:28:12 -04:00
def owned_teams
own_teams
end
# Groups user has access to
def authorized_groups
2013-04-02 18:28:12 -04:00
@group_ids ||= (groups.pluck(:id) + authorized_projects.pluck(:namespace_id))
Group.where(id: @group_ids)
end
# Projects user has access to
def authorized_projects
2013-04-02 18:28:12 -04:00
@project_ids ||= (owned_projects.pluck(:id) + projects.pluck(:id)).uniq
Project.where(id: @project_ids)
end
2013-04-02 18:28:12 -04:00
def authorized_teams
if admin?
UserTeam.scoped
else
@team_ids ||= (user_teams.pluck(:id) + own_teams.pluck(:id)).uniq
UserTeam.where(id: @team_ids)
end
end
# Team membership in authorized projects
def tm_in_authorized_projects
2013-04-02 18:28:12 -04:00
UsersProject.where(project_id: authorized_projects.map(&:id), user_id: self.id)
end
2013-01-02 16:35:11 -05:00
def is_admin?
admin
end
def require_ssh_key?
keys.count == 0
end
def can_change_username?
Gitlab.config.gitlab.username_changing_enabled
end
2013-01-02 16:35:11 -05:00
def can_create_project?
projects_limit > owned_projects.count
2013-01-02 16:35:11 -05:00
end
def can_create_group?
2013-01-25 04:30:49 -05:00
can?(:create_group, nil)
2013-01-02 16:35:11 -05:00
end
def abilities
@abilities ||= begin
abilities = Six.new
abilities << Ability
abilities
end
end
def can_select_namespace?
several_namespaces? || admin
end
2013-01-02 16:35:11 -05:00
def can? action, subject
abilities.allowed?(self, action, subject)
end
def first_name
name.split.first unless name.blank?
end
def cared_merge_requests
2013-02-19 02:43:41 -05:00
MergeRequest.cared(self)
2013-01-02 16:35:11 -05:00
end
def projects_limit_left
projects_limit - owned_projects.count
end
2013-01-02 16:35:11 -05:00
def projects_limit_percent
return 100 if projects_limit.zero?
(owned_projects.count.to_f / projects_limit) * 100
2013-01-02 16:35:11 -05:00
end
def recent_push project_id = nil
# Get push events not earlier than 2 hours ago
events = recent_events.code_push.where("created_at > ?", Time.now - 2.hours)
events = events.where(project_id: project_id) if project_id
# Take only latest one
events = events.recent.limit(1).first
end
def projects_sorted_by_activity
authorized_projects.sorted_by_activity
end
def several_namespaces?
2013-04-02 18:28:12 -04:00
namespaces.many?
2013-01-02 16:35:11 -05:00
end
def namespace_id
namespace.try :id
end
2013-01-25 08:51:45 -05:00
2013-03-13 13:24:30 -04:00
def name_with_username
"#{name} (#{username})"
end
2013-04-04 03:53:39 -04:00
def tm_of(project)
project.team_member_by_id(self.id)
end
def already_forked? project
!!fork_of(project)
end
def fork_of project
links = ForkedProjectLink.where(forked_from_project_id: project, forked_to_project_id: personal_projects)
if links.any?
links.first.forked_to_project
else
nil
end
end
def ldap_user?
extern_uid && provider == 'ldap'
end
def accessible_deploy_keys
DeployKey.in_projects(self.master_projects).uniq
end
2011-10-08 17:36:38 -04:00
end