user.rb 25 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049
  1. # Copyright (C) 2012-2016 Zammad Foundation, http://zammad-foundation.org/
  2. require 'digest/md5'
  3. # @model User
  4. #
  5. # @property id(required) [Integer] The identifier for the User.
  6. # @property login(required) [String] The login of the User used for authentication.
  7. # @property firstname [String] The firstname of the User.
  8. # @property lastname [String] The lastname of the User.
  9. # @property email [String] The email of the User.
  10. # @property image [String] The Image used as the User avatar (TODO: Image model?).
  11. # @property web [String] The website/URL of the User.
  12. # @property password [String] The password of the User.
  13. # @property phone [String] The phone number of the User.
  14. # @property fax [String] The fax number of the User.
  15. # @property mobile [String] The mobile number of the User.
  16. # @property department [String] The department the User is working at.
  17. # @property street [String] The street the User lives in.
  18. # @property zip [Integer] The zip postal code of the User city.
  19. # @property city [String] The city the User lives in.
  20. # @property country [String] The country the User lives in.
  21. # @property verified [Boolean] The flag that shows the verified state of the User.
  22. # @property active [Boolean] The flag that shows the active state of the User.
  23. # @property note [String] The note or comment stored to the User.
  24. class User < ApplicationModel
  25. include HasActivityStreamLog
  26. include ChecksClientNotification
  27. include HasHistory
  28. include HasSearchIndexBackend
  29. include HasGroups
  30. include HasRoles
  31. include User::ChecksAccess
  32. load 'user/assets.rb'
  33. include User::Assets
  34. extend User::Search
  35. load 'user/search_index.rb'
  36. include User::SearchIndex
  37. before_validation :check_name, :check_email, :check_login, :ensure_uniq_email, :ensure_password, :ensure_roles, :ensure_identifier
  38. before_create :check_preferences_default, :validate_roles, :domain_based_assignment, :set_locale
  39. before_update :check_preferences_default, :validate_roles, :reset_login_failed
  40. after_create :avatar_for_email_check
  41. after_update :avatar_for_email_check
  42. after_destroy :avatar_destroy, :user_device_destroy
  43. has_and_belongs_to_many :roles, after_add: [:cache_update, :check_notifications], after_remove: :cache_update, before_add: :validate_agent_limit, before_remove: :last_admin_check, class_name: 'Role'
  44. has_and_belongs_to_many :organizations, after_add: :cache_update, after_remove: :cache_update, class_name: 'Organization'
  45. #has_many :permissions, class_name: 'Permission', through: :roles, class_name: 'Role'
  46. has_many :tokens, after_add: :cache_update, after_remove: :cache_update
  47. has_many :authorizations, after_add: :cache_update, after_remove: :cache_update
  48. belongs_to :organization, class_name: 'Organization'
  49. store :preferences
  50. activity_stream_permission 'admin.user'
  51. activity_stream_attributes_ignored :last_login,
  52. :login_failed,
  53. :image,
  54. :image_source,
  55. :preferences
  56. history_attributes_ignored :password,
  57. :last_login,
  58. :image,
  59. :image_source,
  60. :preferences
  61. search_index_attributes_ignored :password,
  62. :image,
  63. :image_source,
  64. :source,
  65. :login_failed,
  66. :preferences
  67. def ignore_search_indexing?(_action)
  68. # ignore internal user
  69. return true if id == 1
  70. false
  71. end
  72. =begin
  73. fullname of user
  74. user = User.find(123)
  75. result = user.fullname
  76. returns
  77. result = "Bob Smith"
  78. =end
  79. def fullname
  80. name = ''
  81. if firstname && !firstname.empty?
  82. name = name + firstname
  83. end
  84. if lastname && !lastname.empty?
  85. if name != ''
  86. name += ' '
  87. end
  88. name += lastname
  89. end
  90. if name == '' && email
  91. name = email
  92. end
  93. name
  94. end
  95. =begin
  96. longname of user
  97. user = User.find(123)
  98. result = user.longname
  99. returns
  100. result = "Bob Smith"
  101. or with org
  102. result = "Bob Smith (Org ABC)"
  103. =end
  104. def longname
  105. name = fullname
  106. if organization_id
  107. organization = Organization.lookup(id: organization_id)
  108. if organization
  109. name += " (#{organization.name})"
  110. end
  111. end
  112. name
  113. end
  114. =begin
  115. check if user is in role
  116. user = User.find(123)
  117. result = user.role?('Customer')
  118. result = user.role?(['Agent', 'Admin'])
  119. returns
  120. result = true|false
  121. =end
  122. def role?(role_name)
  123. roles.where(name: role_name).any?
  124. end
  125. =begin
  126. get users activity stream
  127. user = User.find(123)
  128. result = user.activity_stream(20)
  129. returns
  130. result = [
  131. {
  132. id: 2,
  133. o_id: 2,
  134. created_by_id: 3,
  135. created_at: '2013-09-28 00:57:21',
  136. object: "User",
  137. type: "created",
  138. },
  139. {
  140. id: 2,
  141. o_id: 2,
  142. created_by_id: 3,
  143. created_at: '2013-09-28 00:59:21',
  144. object: "User",
  145. type: "updated",
  146. },
  147. ]
  148. =end
  149. def activity_stream(limit, fulldata = false)
  150. activity_stream = ActivityStream.list(self, limit)
  151. return activity_stream if !fulldata
  152. # get related objects
  153. assets = ApplicationModel.assets_of_object_list(activity_stream)
  154. {
  155. activity_stream: activity_stream,
  156. assets: assets,
  157. }
  158. end
  159. =begin
  160. authenticate user
  161. result = User.authenticate(username, password)
  162. returns
  163. result = user_model # user model if authentication was successfully
  164. =end
  165. def self.authenticate(username, password)
  166. # do not authenticate with nothing
  167. return if username.blank? || password.blank?
  168. user = User.identify(username)
  169. return if !user
  170. return if !Auth.can_login?(user)
  171. return user if Auth.valid?(user, password)
  172. sleep 1
  173. user.login_failed += 1
  174. user.save
  175. nil
  176. end
  177. =begin
  178. checks if a user has reached the maximum of failed login tries
  179. user = User.find(123)
  180. result = user.max_login_failed?
  181. returns
  182. result = true | false
  183. =end
  184. def max_login_failed?
  185. max_login_failed = Setting.get('password_max_login_failed').to_i || 10
  186. login_failed > max_login_failed
  187. end
  188. =begin
  189. tries to find the matching instance by the given identifier. Currently email and login is supported.
  190. user = User.indentify('User123')
  191. # or
  192. user = User.indentify('user-123@example.com')
  193. returns
  194. # User instance
  195. user.login # 'user123'
  196. =end
  197. def self.identify(identifier)
  198. # try to find user based on login
  199. user = User.find_by(login: identifier.downcase)
  200. return user if user
  201. # try second lookup with email
  202. User.find_by(email: identifier.downcase)
  203. end
  204. =begin
  205. authenticate user agains sso
  206. result = User.sso(sso_params)
  207. returns
  208. result = user_model # user model if authentication was successfully
  209. =end
  210. def self.sso(params)
  211. # try to login against configure auth backends
  212. user_auth = Sso.check(params)
  213. return if !user_auth
  214. user_auth
  215. end
  216. =begin
  217. create user from from omni auth hash
  218. result = User.create_from_hash!(hash)
  219. returns
  220. result = user_model # user model if create was successfully
  221. =end
  222. def self.create_from_hash!(hash)
  223. role_ids = Role.signup_role_ids
  224. url = ''
  225. if hash['info']['urls']
  226. hash['info']['urls'].each { |_name, local_url|
  227. next if !local_url
  228. next if local_url.empty?
  229. url = local_url
  230. }
  231. end
  232. create(
  233. login: hash['info']['nickname'] || hash['uid'],
  234. firstname: hash['info']['name'],
  235. email: hash['info']['email'],
  236. image_source: hash['info']['image'],
  237. web: url,
  238. address: hash['info']['location'],
  239. note: hash['info']['description'],
  240. source: hash['provider'],
  241. role_ids: role_ids,
  242. updated_by_id: 1,
  243. created_by_id: 1,
  244. )
  245. end
  246. =begin
  247. get all permissions of user
  248. user = User.find(123)
  249. user.permissions
  250. returns
  251. {
  252. 'permission.key' => true,
  253. # ...
  254. }
  255. =end
  256. def permissions
  257. list = {}
  258. Object.const_get('Permission').select('permissions.name, permissions.preferences').joins(:roles).where('roles.id IN (?) AND permissions.active = ?', role_ids, true).pluck(:name, :preferences).each { |permission|
  259. next if permission[1]['selectable'] == false
  260. list[permission[0]] = true
  261. }
  262. list
  263. end
  264. =begin
  265. true or false for permission
  266. user = User.find(123)
  267. user.permissions?('permission.key') # access to certain permission.key
  268. user.permissions?(['permission.key1', 'permission.key2']) # access to permission.key1 or permission.key2
  269. user.permissions?('permission') # access to all sub keys
  270. user.permissions?('permission.*') # access if one sub key access exists
  271. returns
  272. true|false
  273. =end
  274. def permissions?(key)
  275. keys = key
  276. names = []
  277. if key.class == String
  278. keys = [key]
  279. end
  280. keys.each { |local_key|
  281. cache_key = "User::permissions?:local_key:::#{id}"
  282. if Rails.env.production?
  283. cache = Cache.get(cache_key)
  284. return cache if cache
  285. end
  286. list = []
  287. if local_key =~ /\.\*$/
  288. local_key.sub!('.*', '.%')
  289. permissions = Object.const_get('Permission').with_parents(local_key)
  290. list = Object.const_get('Permission').select('preferences').joins(:roles).where('roles.id IN (?) AND roles.active = ? AND (permissions.name IN (?) OR permissions.name LIKE ?) AND permissions.active = ?', role_ids, true, permissions, local_key, true).pluck(:preferences)
  291. else
  292. permission = Object.const_get('Permission').lookup(name: local_key)
  293. break if permission && permission.active == false
  294. permissions = Object.const_get('Permission').with_parents(local_key)
  295. list = Object.const_get('Permission').select('preferences').joins(:roles).where('roles.id IN (?) AND roles.active = ? AND permissions.name IN (?) AND permissions.active = ?', role_ids, true, permissions, true).pluck(:preferences)
  296. end
  297. list.each { |preferences|
  298. next if preferences[:selectable] == false
  299. Cache.write(key, true, expires_in: 10.seconds)
  300. return true
  301. }
  302. }
  303. Cache.write(key, false, expires_in: 10.seconds)
  304. false
  305. end
  306. =begin
  307. returns all accessable permission ids of user
  308. user = User.find(123)
  309. user.permissions_with_child_ids
  310. returns
  311. [permission1_id, permission2_id, permission3_id]
  312. =end
  313. def permissions_with_child_ids
  314. where = ''
  315. where_bind = [true]
  316. permissions.each { |permission_name, _value|
  317. where += ' OR ' if where != ''
  318. where += 'permissions.name = ? OR permissions.name LIKE ?'
  319. where_bind.push permission_name
  320. where_bind.push "#{permission_name}.%"
  321. }
  322. return [] if where == ''
  323. Object.const_get('Permission').where("permissions.active = ? AND (#{where})", *where_bind).pluck(:id)
  324. end
  325. =begin
  326. get all users with permission
  327. users = User.with_permissions('admin.session')
  328. get all users with permission "admin.session" or "ticket.agent"
  329. users = User.with_permissions(['admin.session', 'ticket.agent'])
  330. returns
  331. [user1, user2, ...]
  332. =end
  333. def self.with_permissions(keys)
  334. if keys.class != Array
  335. keys = [keys]
  336. end
  337. total_role_ids = []
  338. permission_ids = []
  339. keys.each { |key|
  340. role_ids = []
  341. Object.const_get('Permission').with_parents(key).each { |local_key|
  342. permission = Object.const_get('Permission').lookup(name: local_key)
  343. next if !permission
  344. permission_ids.push permission.id
  345. }
  346. next if permission_ids.empty?
  347. Role.joins(:roles_permissions).joins(:permissions).where('permissions_roles.permission_id IN (?) AND roles.active = ? AND permissions.active = ?', permission_ids, true, true).uniq().pluck(:id).each { |role_id|
  348. role_ids.push role_id
  349. }
  350. total_role_ids.push role_ids
  351. }
  352. return [] if total_role_ids.empty?
  353. condition = ''
  354. total_role_ids.each { |_role_ids|
  355. if condition != ''
  356. condition += ' OR '
  357. end
  358. condition += 'roles_users.role_id IN (?)'
  359. }
  360. User.joins(:users_roles).where("(#{condition}) AND users.active = ?", *total_role_ids, true).distinct.order(:id)
  361. end
  362. =begin
  363. generate new token for reset password
  364. result = User.password_reset_new_token(username)
  365. returns
  366. result = {
  367. token: token,
  368. user: user,
  369. }
  370. =end
  371. def self.password_reset_new_token(username)
  372. return if username.blank?
  373. # try to find user based on login
  374. user = User.find_by(login: username.downcase, active: true)
  375. # try second lookup with email
  376. user ||= User.find_by(email: username.downcase, active: true)
  377. # check if email address exists
  378. return if !user
  379. return if !user.email
  380. # generate token
  381. token = Token.create(action: 'PasswordReset', user_id: user.id)
  382. {
  383. token: token,
  384. user: user,
  385. }
  386. end
  387. =begin
  388. returns the User instance for a given password token if found
  389. result = User.by_reset_token(token)
  390. returns
  391. result = user_model # user_model if token was verified
  392. =end
  393. def self.by_reset_token(token)
  394. Token.check(action: 'PasswordReset', name: token)
  395. end
  396. =begin
  397. reset password with token and set new password
  398. result = User.password_reset_via_token(token,password)
  399. returns
  400. result = user_model # user_model if token was verified
  401. =end
  402. def self.password_reset_via_token(token, password)
  403. # check token
  404. user = by_reset_token(token)
  405. return if !user
  406. # reset password
  407. user.update_attributes(password: password)
  408. # delete token
  409. Token.find_by(action: 'PasswordReset', name: token).destroy
  410. user
  411. end
  412. =begin
  413. update last login date and reset login_failed (is automatically done by auth and sso backend)
  414. user = User.find(123)
  415. result = user.update_last_login
  416. returns
  417. result = new_user_model
  418. =end
  419. def update_last_login
  420. self.last_login = Time.zone.now
  421. # reset login failed
  422. self.login_failed = 0
  423. save
  424. end
  425. =begin
  426. generate new token for signup
  427. result = User.signup_new_token(user) # or email
  428. returns
  429. result = {
  430. token: token,
  431. user: user,
  432. }
  433. =end
  434. def self.signup_new_token(user)
  435. return if !user
  436. return if !user.email
  437. # generate token
  438. token = Token.create(action: 'Signup', user_id: user.id)
  439. {
  440. token: token,
  441. user: user,
  442. }
  443. end
  444. =begin
  445. verify signup with token
  446. result = User.signup_verify_via_token(token, user)
  447. returns
  448. result = user_model # user_model if token was verified
  449. =end
  450. def self.signup_verify_via_token(token, user = nil)
  451. # check token
  452. local_user = Token.check(action: 'Signup', name: token)
  453. return if !local_user
  454. # if requested user is different to current user
  455. return if user && local_user.id != user.id
  456. # set verified
  457. local_user.update_attributes(verified: true)
  458. # delete token
  459. Token.find_by(action: 'Signup', name: token).destroy
  460. local_user
  461. end
  462. =begin
  463. merge two users to one
  464. user = User.find(123)
  465. result = user.merge(user_id_of_duplicate_user)
  466. returns
  467. result = new_user_model
  468. =end
  469. def merge(user_id_of_duplicate_user)
  470. # find email addresses and move them to primary user
  471. duplicate_user = User.find(user_id_of_duplicate_user)
  472. # merge missing attibutes
  473. Models.merge('User', id, user_id_of_duplicate_user)
  474. true
  475. end
  476. =begin
  477. list of active users in role
  478. result = User.of_role('Agent', group_ids)
  479. result = User.of_role(['Agent', 'Admin'])
  480. returns
  481. result = [user1, user2]
  482. =end
  483. def self.of_role(role, group_ids = nil)
  484. roles_ids = Role.where(active: true, name: role).map(&:id)
  485. if !group_ids
  486. return User.where(active: true).joins(:users_roles).where('roles_users.role_id IN (?)', roles_ids).order('users.updated_at DESC')
  487. end
  488. User.where(active: true)
  489. .joins(:users_roles)
  490. .joins(:users_groups)
  491. .where('roles_users.role_id IN (?) AND users_groups.group_ids IN (?)', roles_ids, group_ids).order('users.updated_at DESC')
  492. end
  493. =begin
  494. update/sync default preferences of users in a dedecated permissions
  495. result = User.update_default_preferences_by_permission('ticket.agent', force)
  496. returns
  497. result = true # false
  498. =end
  499. def self.update_default_preferences_by_permission(permission_name, force = false)
  500. permission = Object.const_get('Permission').lookup(name: permission_name)
  501. return if !permission
  502. default = Rails.configuration.preferences_default_by_permission
  503. return false if !default
  504. default.deep_stringify_keys!
  505. User.with_permissions(permission.name).each { |user|
  506. next if !default[permission.name]
  507. has_changed = false
  508. default[permission.name].each { |key, value|
  509. next if !force && user.preferences[key]
  510. has_changed = true
  511. user.preferences[key] = value
  512. }
  513. if has_changed
  514. user.save!
  515. end
  516. }
  517. true
  518. end
  519. =begin
  520. update/sync default preferences of users in a dedecated role
  521. result = User.update_default_preferences_by_role('Agent', force)
  522. returns
  523. result = true # false
  524. =end
  525. def self.update_default_preferences_by_role(role_name, force = false)
  526. role = Role.lookup(name: role_name)
  527. return if !role
  528. default = Rails.configuration.preferences_default_by_permission
  529. return false if !default
  530. default.deep_stringify_keys!
  531. role.permissions.each { |permission|
  532. User.update_default_preferences_by_permission(permission.name, force)
  533. }
  534. true
  535. end
  536. def check_notifications(o, shouldSave = true)
  537. default = Rails.configuration.preferences_default_by_permission
  538. return if !default
  539. default.deep_stringify_keys!
  540. has_changed = false
  541. o.permissions.each { |permission|
  542. next if !default[permission.name]
  543. default[permission.name].each { |key, value|
  544. next if preferences[key]
  545. preferences[key] = value
  546. has_changed = true
  547. }
  548. }
  549. return true if !has_changed
  550. if id && shouldSave
  551. save!
  552. return true
  553. end
  554. @preferences_default = preferences
  555. true
  556. end
  557. def check_preferences_default
  558. if @preferences_default.blank?
  559. if id
  560. roles.each { |role|
  561. check_notifications(role, false)
  562. }
  563. end
  564. end
  565. return if @preferences_default.blank?
  566. preferences_tmp = @preferences_default.merge(preferences)
  567. self.preferences = preferences_tmp
  568. @preferences_default = nil
  569. true
  570. end
  571. private
  572. def cache_delete
  573. super
  574. # delete asset caches
  575. key = "User::authorizations::#{id}"
  576. Cache.delete(key)
  577. # delete permission cache
  578. key = "User::permissions?:local_key:::#{id}"
  579. Cache.delete(key)
  580. end
  581. def check_name
  582. return true if !firstname.empty? && !lastname.empty?
  583. if !firstname.empty? && lastname.empty?
  584. # "Lastname, Firstname"
  585. scan = firstname.scan(/, /)
  586. if scan[0]
  587. name = firstname.split(', ', 2)
  588. if !name[0].nil?
  589. self.lastname = name[0]
  590. end
  591. if !name[1].nil?
  592. self.firstname = name[1]
  593. end
  594. return true
  595. end
  596. # "Firstname Lastname"
  597. name = firstname.split(' ', 2)
  598. if !name[0].nil?
  599. self.firstname = name[0]
  600. end
  601. if !name[1].nil?
  602. self.lastname = name[1]
  603. end
  604. return true
  605. # -no name- "firstname.lastname@example.com"
  606. elsif firstname.empty? && lastname.empty? && !email.empty?
  607. scan = email.scan(/^(.+?)\.(.+?)\@.+?$/)
  608. if scan[0]
  609. if !scan[0][0].nil?
  610. self.firstname = scan[0][0].capitalize
  611. end
  612. if !scan[0][1].nil?
  613. self.lastname = scan[0][1].capitalize
  614. end
  615. end
  616. end
  617. true
  618. end
  619. def check_email
  620. return true if Setting.get('import_mode')
  621. return true if email.blank?
  622. self.email = email.downcase.strip
  623. return true if id == 1
  624. raise Exceptions::UnprocessableEntity, 'Invalid email' if email !~ /@/
  625. raise Exceptions::UnprocessableEntity, 'Invalid email' if email =~ /\s/
  626. true
  627. end
  628. def check_login
  629. # use email as login if not given
  630. if login.blank?
  631. self.login = email
  632. end
  633. # if email has changed, login is old email, change also login
  634. if changes && changes['email']
  635. if changes['email'][0] == login
  636. self.login = email
  637. end
  638. end
  639. # generate auto login
  640. if login.blank?
  641. self.login = "auto-#{Time.zone.now.to_i}-#{rand(999_999)}"
  642. end
  643. # check if login already exists
  644. self.login = login.downcase.strip
  645. check = true
  646. while check
  647. exists = User.find_by(login: login)
  648. if exists && exists.id != id
  649. self.login = "#{login}#{rand(999)}"
  650. else
  651. check = false
  652. end
  653. end
  654. true
  655. end
  656. def ensure_roles
  657. return true if role_ids.present?
  658. self.role_ids = Role.signup_role_ids
  659. end
  660. def ensure_identifier
  661. return true if email.present? || firstname.present? || lastname.present? || phone.present?
  662. return true if login.present? && !login.start_with?('auto-')
  663. raise Exceptions::UnprocessableEntity, 'Minimum one identifier (login, firstname, lastname, phone or email) for user is required.'
  664. end
  665. def ensure_uniq_email
  666. return true if Setting.get('user_email_multiple_use')
  667. return true if Setting.get('import_mode')
  668. return true if email.blank?
  669. return true if !changes
  670. return true if !changes['email']
  671. return true if !User.find_by(email: email.downcase.strip)
  672. raise Exceptions::UnprocessableEntity, 'Email address is already used for other user.'
  673. end
  674. def validate_roles
  675. return true if !role_ids
  676. role_ids.each { |role_id|
  677. role = Role.lookup(id: role_id)
  678. raise "Unable to find role for id #{role_id}" if !role
  679. next if !role.preferences[:not]
  680. role.preferences[:not].each { |local_role_name|
  681. local_role = Role.lookup(name: local_role_name)
  682. next if !local_role
  683. raise "Role #{role.name} conflicts with #{local_role.name}" if role_ids.include?(local_role.id)
  684. }
  685. }
  686. true
  687. end
  688. =begin
  689. checks if the current user is the last one
  690. with admin permissions.
  691. Raises
  692. raise 'Minimum one user need to have admin permissions'
  693. =end
  694. def last_admin_check(role)
  695. return true if Setting.get('import_mode')
  696. ticket_admin_role_ids = Role.joins(:permissions).where(permissions: { name: ['admin', 'admin.user'] }).pluck(:id)
  697. count = User.joins(:roles).where(roles: { id: ticket_admin_role_ids }, users: { active: true }).count
  698. if ticket_admin_role_ids.include?(role.id)
  699. count -= 1
  700. end
  701. raise Exceptions::UnprocessableEntity, 'Minimum one user needs to have admin permissions.' if count < 1
  702. true
  703. end
  704. def validate_agent_limit(role)
  705. return true if !Setting.get('system_agent_limit')
  706. ticket_agent_role_ids = Role.joins(:permissions).where(permissions: { name: 'ticket.agent' }).pluck(:id)
  707. count = User.joins(:roles).where(roles: { id: ticket_agent_role_ids }, users: { active: true }).count
  708. if ticket_agent_role_ids.include?(role.id)
  709. count += 1
  710. end
  711. raise Exceptions::UnprocessableEntity, 'Agent limit exceeded, please check your account settings.' if count > Setting.get('system_agent_limit')
  712. true
  713. end
  714. def domain_based_assignment
  715. return true if !email
  716. return true if organization_id
  717. begin
  718. domain = Mail::Address.new(email).domain
  719. return true if !domain
  720. organization = Organization.find_by(domain: domain.downcase, domain_assignment: true)
  721. return true if !organization
  722. self.organization_id = organization.id
  723. rescue
  724. return true
  725. end
  726. true
  727. end
  728. # sets locale of the user
  729. def set_locale
  730. # set the user's locale to the one of the "executing" user
  731. return true if !UserInfo.current_user_id
  732. user = User.find_by(id: UserInfo.current_user_id)
  733. return true if !user
  734. return true if !user.preferences[:locale]
  735. preferences[:locale] = user.preferences[:locale]
  736. true
  737. end
  738. def avatar_for_email_check
  739. return true if email.blank?
  740. return true if email !~ /@/
  741. return true if !changes['email'] && updated_at > Time.zone.now - 10.days
  742. # save/update avatar
  743. avatar = Avatar.auto_detection(
  744. object: 'User',
  745. o_id: id,
  746. url: email,
  747. source: 'app',
  748. updated_by_id: updated_by_id,
  749. created_by_id: updated_by_id,
  750. )
  751. # update user link
  752. return true if !avatar
  753. update_column(:image, avatar.store_hash)
  754. cache_delete
  755. true
  756. end
  757. def avatar_destroy
  758. Avatar.remove('User', id)
  759. end
  760. def user_device_destroy
  761. UserDevice.remove(id)
  762. end
  763. def ensure_password
  764. return true if password_empty?
  765. return true if PasswordHash.crypted?(password)
  766. self.password = PasswordHash.crypt(password)
  767. true
  768. end
  769. def password_empty?
  770. # set old password again if not given
  771. return if password.present?
  772. # skip if it's not desired to set a password (yet)
  773. return true if !password
  774. # get current record
  775. return if !id
  776. self.password = password_was
  777. true
  778. end
  779. # reset login_failed if password is changed
  780. def reset_login_failed
  781. return true if !changes
  782. return true if !changes['password']
  783. self.login_failed = 0
  784. true
  785. end
  786. end