You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

183 lines
5.5 KiB

Web Push Notifications (#3243) * feat: Register push subscription * feat: Notify when mentioned * feat: Boost, favourite, reply, follow, follow request * feat: Notification interaction * feat: Handle change of public key * feat: Unsubscribe if things go wrong * feat: Do not send normal notifications if push is enabled * feat: Focus client if open * refactor: Move push logic to WebPushSubscription * feat: Better title and body * feat: Localize messages * chore: Fix lint errors * feat: Settings * refactor: Lazy load * fix: Check if push settings exist * feat: Device-based preferences * refactor: Simplify logic * refactor: Pull request feedback * refactor: Pull request feedback * refactor: Create /api/web/push_subscriptions endpoint * feat: Spec PushSubscriptionController * refactor: WebPushSubscription => Web::PushSubscription * feat: Spec Web::PushSubscription * feat: Display first media attachment * feat: Support direction * fix: Stuff broken while rebasing * refactor: Integration with session activations * refactor: Cleanup * refactor: Simplify implementation * feat: Set VAPID keys via environment * chore: Comments * fix: Crash when no alerts * fix: Set VAPID keys in testing environment * fix: Follow link * feat: Notification actions * fix: Delete previous subscription * chore: Temporary logs * refactor: Move migration to a later date * fix: Fetch the correct session activation and misc bugs * refactor: Move migration to a later date * fix: Remove follow request (no notifications) * feat: Send administrator contact to push service * feat: Set time-to-live * fix: Do not show sensitive images * fix: Reducer crash in error handling * feat: Add badge * chore: Fix lint error * fix: Checkbox label overlap * fix: Check for payload support * fix: Rename action "type" (crash in latest Chrome) * feat: Action to expand notification * fix: Lint errors * fix: Unescape notification body * fix: Do not allow boosting if the status is hidden * feat: Add VAPID keys to the production sample environment * fix: Strip HTML tags from status * refactor: Better error messages * refactor: Handle browser not implementing the VAPID protocol (Samsung Internet) * fix: Error when target_status is nil * fix: Handle lack of image * fix: Delete reference to invalid subscriptions * feat: Better error handling * fix: Unescape HTML characters after tags are striped * refactor: Simpify code * fix: Modify to work with #4091 * Sort strings alphabetically * i18n: Updated Polish translation it annoys me that it's not fully localized :P * refactor: Use current_session in PushSubscriptionController * fix: Rebase mistake * fix: Set cacheName to mastodon * refactor: Pull request feedback * refactor: Remove logging statements * chore(yarn): Fix conflicts with master * chore(yarn): Copy latest from master * chore(yarn): Readd offline-plugin * refactor: Use save! and update! * refactor: Send notifications async * fix: Allow retry when push fails * fix: Save track for failed pushes * fix: Minify sw.js * fix: Remove account_id from fabricator
6 years ago
  1. # frozen_string_literal: true
  2. # == Schema Information
  3. #
  4. # Table name: users
  5. #
  6. # id :bigint not null, primary key
  7. # email :string default(""), not null
  8. # created_at :datetime not null
  9. # updated_at :datetime not null
  10. # encrypted_password :string default(""), not null
  11. # reset_password_token :string
  12. # reset_password_sent_at :datetime
  13. # remember_created_at :datetime
  14. # sign_in_count :integer default(0), not null
  15. # current_sign_in_at :datetime
  16. # last_sign_in_at :datetime
  17. # current_sign_in_ip :inet
  18. # last_sign_in_ip :inet
  19. # admin :boolean default(FALSE), not null
  20. # confirmation_token :string
  21. # confirmed_at :datetime
  22. # confirmation_sent_at :datetime
  23. # unconfirmed_email :string
  24. # locale :string
  25. # encrypted_otp_secret :string
  26. # encrypted_otp_secret_iv :string
  27. # encrypted_otp_secret_salt :string
  28. # consumed_timestep :integer
  29. # otp_required_for_login :boolean default(FALSE), not null
  30. # last_emailed_at :datetime
  31. # otp_backup_codes :string is an Array
  32. # filtered_languages :string default([]), not null, is an Array
  33. # account_id :bigint not null
  34. # disabled :boolean default(FALSE), not null
  35. # moderator :boolean default(FALSE), not null
  36. #
  37. class User < ApplicationRecord
  38. include Settings::Extend
  39. ACTIVE_DURATION = 14.days
  40. devise :registerable, :recoverable,
  41. :rememberable, :trackable, :validatable, :confirmable,
  42. :two_factor_authenticatable, :two_factor_backupable,
  43. otp_secret_encryption_key: ENV['OTP_SECRET'],
  44. otp_number_of_backup_codes: 10
  45. belongs_to :account, inverse_of: :user, required: true
  46. accepts_nested_attributes_for :account
  47. has_many :applications, class_name: 'Doorkeeper::Application', as: :owner
  48. validates :locale, inclusion: I18n.available_locales.map(&:to_s), if: :locale?
  49. validates_with BlacklistedEmailValidator, if: :email_changed?
  50. scope :recent, -> { order(id: :desc) }
  51. scope :admins, -> { where(admin: true) }
  52. scope :moderators, -> { where(moderator: true) }
  53. scope :staff, -> { admins.or(moderators) }
  54. scope :confirmed, -> { where.not(confirmed_at: nil) }
  55. scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) }
  56. scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where(accounts: { suspended: false }) }
  57. scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) }
  58. scope :with_recent_ip_address, ->(value) { where(arel_table[:current_sign_in_ip].eq(value).or(arel_table[:last_sign_in_ip].eq(value))) }
  59. before_validation :sanitize_languages
  60. # This avoids a deprecation warning from Rails 5.1
  61. # It seems possible that a future release of devise-two-factor will
  62. # handle this itself, and this can be removed from our User class.
  63. attribute :otp_secret
  64. has_many :session_activations, dependent: :destroy
  65. delegate :auto_play_gif, :default_sensitive, :unfollow_modal, :boost_modal, :delete_modal,
  66. :reduce_motion, :system_font_ui, :noindex, :theme,
  67. to: :settings, prefix: :setting, allow_nil: false
  68. def confirmed?
  69. confirmed_at.present?
  70. end
  71. def staff?
  72. admin? || moderator?
  73. end
  74. def role
  75. if admin?
  76. 'admin'
  77. elsif moderator?
  78. 'moderator'
  79. else
  80. 'user'
  81. end
  82. end
  83. def disable!
  84. update!(disabled: true,
  85. last_sign_in_at: current_sign_in_at,
  86. current_sign_in_at: nil)
  87. end
  88. def enable!
  89. update!(disabled: false)
  90. end
  91. def confirm!
  92. skip_confirmation!
  93. save!
  94. end
  95. def promote!
  96. if moderator?
  97. update!(moderator: false, admin: true)
  98. elsif !admin?
  99. update!(moderator: true)
  100. end
  101. end
  102. def demote!
  103. if admin?
  104. update!(admin: false, moderator: true)
  105. elsif moderator?
  106. update!(moderator: false)
  107. end
  108. end
  109. def disable_two_factor!
  110. self.otp_required_for_login = false
  111. otp_backup_codes&.clear
  112. save!
  113. end
  114. def active_for_authentication?
  115. super && !disabled?
  116. end
  117. def setting_default_privacy
  118. settings.default_privacy || (account.locked? ? 'private' : 'public')
  119. end
  120. def token_for_app(a)
  121. return nil if a.nil? || a.owner != self
  122. Doorkeeper::AccessToken
  123. .find_or_create_by(application_id: a.id, resource_owner_id: id) do |t|
  124. t.scopes = a.scopes
  125. t.expires_in = Doorkeeper.configuration.access_token_expires_in
  126. t.use_refresh_token = Doorkeeper.configuration.refresh_token_enabled?
  127. end
  128. end
  129. def activate_session(request)
  130. session_activations.activate(session_id: SecureRandom.hex,
  131. user_agent: request.user_agent,
  132. ip: request.remote_ip).session_id
  133. end
  134. def exclusive_session(id)
  135. session_activations.exclusive(id)
  136. end
  137. def session_active?(id)
  138. session_activations.active? id
  139. end
  140. def web_push_subscription(session)
  141. session.web_push_subscription.nil? ? nil : session.web_push_subscription.as_payload
  142. end
  143. protected
  144. def send_devise_notification(notification, *args)
  145. devise_mailer.send(notification, self, *args).deliver_later
  146. end
  147. private
  148. def sanitize_languages
  149. filtered_languages.reject!(&:blank?)
  150. end
  151. end