user.rb 30 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216
  1. # Copyright (C) 2012-2016 Zammad Foundation, http://zammad-foundation.org/
  2. class User < ApplicationModel
  3. include HasActivityStreamLog
  4. include ChecksClientNotification
  5. include HasHistory
  6. include HasSearchIndexBackend
  7. include CanCsvImport
  8. include HasGroups
  9. include HasRoles
  10. include User::ChecksAccess
  11. include User::Assets
  12. include User::Search
  13. include User::SearchIndex
  14. has_and_belongs_to_many :roles, after_add: %i[cache_update check_notifications], after_remove: :cache_update, before_add: %i[validate_agent_limit_by_role validate_roles], before_remove: :last_admin_check_by_role, class_name: 'Role'
  15. has_and_belongs_to_many :organizations, after_add: :cache_update, after_remove: :cache_update, class_name: 'Organization'
  16. has_many :tokens, after_add: :cache_update, after_remove: :cache_update
  17. has_many :authorizations, after_add: :cache_update, after_remove: :cache_update
  18. belongs_to :organization, inverse_of: :members
  19. before_validation :check_name, :check_email, :check_login, :ensure_uniq_email, :ensure_password, :ensure_roles, :ensure_identifier
  20. before_validation :check_mail_delivery_failed, on: :update
  21. before_create :check_preferences_default, :validate_preferences, :validate_ooo, :domain_based_assignment, :set_locale
  22. before_update :check_preferences_default, :validate_preferences, :validate_ooo, :reset_login_failed, :validate_agent_limit_by_attributes, :last_admin_check_by_attribute
  23. after_create :avatar_for_email_check
  24. after_update :avatar_for_email_check
  25. after_commit :update_caller_id
  26. before_destroy :destroy_longer_required_objects
  27. store :preferences
  28. activity_stream_permission 'admin.user'
  29. activity_stream_attributes_ignored :last_login,
  30. :login_failed,
  31. :image,
  32. :image_source,
  33. :preferences
  34. history_attributes_ignored :password,
  35. :last_login,
  36. :image,
  37. :image_source,
  38. :preferences
  39. search_index_attributes_ignored :password,
  40. :image,
  41. :image_source,
  42. :source,
  43. :login_failed
  44. csv_object_ids_ignored 1
  45. csv_attributes_ignored :password,
  46. :login_failed,
  47. :source,
  48. :image_source,
  49. :image,
  50. :authorizations,
  51. :organizations,
  52. :groups,
  53. :user_groups
  54. def ignore_search_indexing?(_action)
  55. # ignore internal user
  56. return true if id == 1
  57. false
  58. end
  59. =begin
  60. fullname of user
  61. user = User.find(123)
  62. result = user.fullname
  63. returns
  64. result = "Bob Smith"
  65. =end
  66. def fullname
  67. name = ''
  68. if firstname.present?
  69. name = firstname
  70. end
  71. if lastname.present?
  72. if name != ''
  73. name += ' '
  74. end
  75. name += lastname
  76. end
  77. if name.blank? && email.present?
  78. name = email
  79. end
  80. name
  81. end
  82. =begin
  83. longname of user
  84. user = User.find(123)
  85. result = user.longname
  86. returns
  87. result = "Bob Smith"
  88. or with org
  89. result = "Bob Smith (Org ABC)"
  90. =end
  91. def longname
  92. name = fullname
  93. if organization_id
  94. organization = Organization.lookup(id: organization_id)
  95. if organization
  96. name += " (#{organization.name})"
  97. end
  98. end
  99. name
  100. end
  101. =begin
  102. check if user is in role
  103. user = User.find(123)
  104. result = user.role?('Customer')
  105. result = user.role?(['Agent', 'Admin'])
  106. returns
  107. result = true|false
  108. =end
  109. def role?(role_name)
  110. roles.where(name: role_name).any?
  111. end
  112. =begin
  113. check if user is in role
  114. user = User.find(123)
  115. result = user.out_of_office?
  116. returns
  117. result = true|false
  118. =end
  119. def out_of_office?
  120. return false if out_of_office != true
  121. return false if out_of_office_start_at.blank?
  122. return false if out_of_office_end_at.blank?
  123. Time.zone.today.between?(out_of_office_start_at, out_of_office_end_at)
  124. end
  125. =begin
  126. check if user is in role
  127. user = User.find(123)
  128. result = user.out_of_office_agent
  129. returns
  130. result = user_model
  131. =end
  132. def out_of_office_agent
  133. return if !out_of_office?
  134. return if out_of_office_replacement_id.blank?
  135. User.find_by(id: out_of_office_replacement_id)
  136. end
  137. =begin
  138. gets users where user is replacement
  139. user = User.find(123)
  140. result = user.out_of_office_agent_of
  141. returns
  142. result = [user_model1, user_model2]
  143. =end
  144. def out_of_office_agent_of
  145. User.where(active: true, out_of_office: true, out_of_office_replacement_id: id).where('out_of_office_start_at <= ? AND out_of_office_end_at >= ?', Time.zone.today, Time.zone.today)
  146. end
  147. =begin
  148. get users activity stream
  149. user = User.find(123)
  150. result = user.activity_stream(20)
  151. returns
  152. result = [
  153. {
  154. id: 2,
  155. o_id: 2,
  156. created_by_id: 3,
  157. created_at: '2013-09-28 00:57:21',
  158. object: "User",
  159. type: "created",
  160. },
  161. {
  162. id: 2,
  163. o_id: 2,
  164. created_by_id: 3,
  165. created_at: '2013-09-28 00:59:21',
  166. object: "User",
  167. type: "updated",
  168. },
  169. ]
  170. =end
  171. def activity_stream(limit, fulldata = false)
  172. stream = ActivityStream.list(self, limit)
  173. return stream if !fulldata
  174. # get related objects
  175. assets = {}
  176. stream.each do |item|
  177. assets = item.assets(assets)
  178. end
  179. {
  180. stream: stream,
  181. assets: assets,
  182. }
  183. end
  184. =begin
  185. authenticate user
  186. result = User.authenticate(username, password)
  187. returns
  188. result = user_model # user model if authentication was successfully
  189. =end
  190. def self.authenticate(username, password)
  191. # do not authenticate with nothing
  192. return if username.blank? || password.blank?
  193. user = User.identify(username)
  194. return if !user
  195. return if !Auth.can_login?(user)
  196. return user if Auth.valid?(user, password)
  197. sleep 1
  198. user.login_failed += 1
  199. user.save!
  200. nil
  201. end
  202. =begin
  203. checks if a user has reached the maximum of failed login tries
  204. user = User.find(123)
  205. result = user.max_login_failed?
  206. returns
  207. result = true | false
  208. =end
  209. def max_login_failed?
  210. max_login_failed = Setting.get('password_max_login_failed').to_i || 10
  211. login_failed > max_login_failed
  212. end
  213. =begin
  214. tries to find the matching instance by the given identifier. Currently email and login is supported.
  215. user = User.indentify('User123')
  216. # or
  217. user = User.indentify('user-123@example.com')
  218. returns
  219. # User instance
  220. user.login # 'user123'
  221. =end
  222. def self.identify(identifier)
  223. # try to find user based on login
  224. user = User.find_by(login: identifier.downcase)
  225. return user if user
  226. # try second lookup with email
  227. User.find_by(email: identifier.downcase)
  228. end
  229. =begin
  230. authenticate user agains sso
  231. result = User.sso(sso_params)
  232. returns
  233. result = user_model # user model if authentication was successfully
  234. =end
  235. def self.sso(params)
  236. # try to login against configure auth backends
  237. user_auth = Sso.check(params)
  238. return if !user_auth
  239. user_auth
  240. end
  241. =begin
  242. create user from from omni auth hash
  243. result = User.create_from_hash!(hash)
  244. returns
  245. result = user_model # user model if create was successfully
  246. =end
  247. def self.create_from_hash!(hash)
  248. role_ids = Role.signup_role_ids
  249. url = ''
  250. hash['info']['urls']&.each_value do |local_url|
  251. next if local_url.blank?
  252. url = local_url
  253. end
  254. begin
  255. create!(
  256. login: hash['info']['nickname'] || hash['uid'],
  257. firstname: hash['info']['name'],
  258. email: hash['info']['email'],
  259. image_source: hash['info']['image'],
  260. web: url,
  261. address: hash['info']['location'],
  262. note: hash['info']['description'],
  263. source: hash['provider'],
  264. role_ids: role_ids,
  265. updated_by_id: 1,
  266. created_by_id: 1,
  267. )
  268. rescue => e
  269. logger.error e
  270. raise Exceptions::UnprocessableEntity, e.message
  271. end
  272. end
  273. =begin
  274. get all permissions of user
  275. user = User.find(123)
  276. user.permissions
  277. returns
  278. {
  279. 'permission.key' => true,
  280. # ...
  281. }
  282. =end
  283. def permissions
  284. list = {}
  285. ::Permission.select('permissions.name, permissions.preferences').joins(:roles).where('roles.id IN (?) AND permissions.active = ?', role_ids, true).pluck(:name, :preferences).each do |permission|
  286. next if permission[1]['selectable'] == false
  287. list[permission[0]] = true
  288. end
  289. list
  290. end
  291. =begin
  292. true or false for permission
  293. user = User.find(123)
  294. user.permissions?('permission.key') # access to certain permission.key
  295. user.permissions?(['permission.key1', 'permission.key2']) # access to permission.key1 or permission.key2
  296. user.permissions?('permission') # access to all sub keys
  297. user.permissions?('permission.*') # access if one sub key access exists
  298. returns
  299. true|false
  300. =end
  301. def permissions?(key)
  302. keys = key
  303. names = []
  304. if key.class == String
  305. keys = [key]
  306. end
  307. keys.each do |local_key|
  308. list = []
  309. if local_key.match?(/\.\*$/)
  310. local_key.sub!('.*', '.%')
  311. permissions = ::Permission.with_parents(local_key)
  312. list = ::Permission.select('preferences').joins(:roles).where('roles.id IN (?) AND roles.active = ? AND (permissions.name IN (?) OR permissions.name LIKE ?) AND permissions.active = ?', role_ids, true, permissions, local_key, true).pluck(:preferences)
  313. else
  314. permission = ::Permission.lookup(name: local_key)
  315. break if permission&.active == false
  316. permissions = ::Permission.with_parents(local_key)
  317. list = ::Permission.select('preferences').joins(:roles).where('roles.id IN (?) AND roles.active = ? AND permissions.name IN (?) AND permissions.active = ?', role_ids, true, permissions, true).pluck(:preferences)
  318. end
  319. return true if list.present?
  320. end
  321. false
  322. end
  323. =begin
  324. returns all accessable permission ids of user
  325. user = User.find(123)
  326. user.permissions_with_child_ids
  327. returns
  328. [permission1_id, permission2_id, permission3_id]
  329. =end
  330. def permissions_with_child_ids
  331. where = ''
  332. where_bind = [true]
  333. permissions.each_key do |permission_name|
  334. where += ' OR ' if where != ''
  335. where += 'permissions.name = ? OR permissions.name LIKE ?'
  336. where_bind.push permission_name
  337. where_bind.push "#{permission_name}.%"
  338. end
  339. return [] if where == ''
  340. ::Permission.where("permissions.active = ? AND (#{where})", *where_bind).pluck(:id)
  341. end
  342. =begin
  343. get all users with permission
  344. users = User.with_permissions('ticket.agent')
  345. get all users with permission "admin.session" or "ticket.agent"
  346. users = User.with_permissions(['admin.session', 'ticket.agent'])
  347. returns
  348. [user1, user2, ...]
  349. =end
  350. def self.with_permissions(keys)
  351. if keys.class != Array
  352. keys = [keys]
  353. end
  354. total_role_ids = []
  355. permission_ids = []
  356. keys.each do |key|
  357. role_ids = []
  358. ::Permission.with_parents(key).each do |local_key|
  359. permission = ::Permission.lookup(name: local_key)
  360. next if !permission
  361. permission_ids.push permission.id
  362. end
  363. next if permission_ids.blank?
  364. Role.joins(:roles_permissions).joins(:permissions).where('permissions_roles.permission_id IN (?) AND roles.active = ? AND permissions.active = ?', permission_ids, true, true).distinct().pluck(:id).each do |role_id|
  365. role_ids.push role_id
  366. end
  367. total_role_ids.push role_ids
  368. end
  369. return [] if total_role_ids.blank?
  370. condition = ''
  371. total_role_ids.each do |_role_ids|
  372. if condition != ''
  373. condition += ' OR '
  374. end
  375. condition += 'roles_users.role_id IN (?)'
  376. end
  377. User.joins(:users_roles).where("(#{condition}) AND users.active = ?", *total_role_ids, true).distinct.order(:id)
  378. end
  379. =begin
  380. generate new token for reset password
  381. result = User.password_reset_new_token(username)
  382. returns
  383. result = {
  384. token: token,
  385. user: user,
  386. }
  387. =end
  388. def self.password_reset_new_token(username)
  389. return if username.blank?
  390. # try to find user based on login
  391. user = User.find_by(login: username.downcase.strip, active: true)
  392. # try second lookup with email
  393. user ||= User.find_by(email: username.downcase.strip, active: true)
  394. # check if email address exists
  395. return if !user
  396. return if !user.email
  397. # generate token
  398. token = Token.create(action: 'PasswordReset', user_id: user.id)
  399. {
  400. token: token,
  401. user: user,
  402. }
  403. end
  404. =begin
  405. returns the User instance for a given password token if found
  406. result = User.by_reset_token(token)
  407. returns
  408. result = user_model # user_model if token was verified
  409. =end
  410. def self.by_reset_token(token)
  411. Token.check(action: 'PasswordReset', name: token)
  412. end
  413. =begin
  414. reset password with token and set new password
  415. result = User.password_reset_via_token(token,password)
  416. returns
  417. result = user_model # user_model if token was verified
  418. =end
  419. def self.password_reset_via_token(token, password)
  420. # check token
  421. user = by_reset_token(token)
  422. return if !user
  423. # reset password
  424. user.update!(password: password)
  425. # delete token
  426. Token.find_by(action: 'PasswordReset', name: token).destroy
  427. user
  428. end
  429. =begin
  430. update last login date and reset login_failed (is automatically done by auth and sso backend)
  431. user = User.find(123)
  432. result = user.update_last_login
  433. returns
  434. result = new_user_model
  435. =end
  436. def update_last_login
  437. self.last_login = Time.zone.now
  438. # reset login failed
  439. self.login_failed = 0
  440. save
  441. end
  442. =begin
  443. generate new token for signup
  444. result = User.signup_new_token(user) # or email
  445. returns
  446. result = {
  447. token: token,
  448. user: user,
  449. }
  450. =end
  451. def self.signup_new_token(user)
  452. return if !user
  453. return if !user.email
  454. # generate token
  455. token = Token.create(action: 'Signup', user_id: user.id)
  456. {
  457. token: token,
  458. user: user,
  459. }
  460. end
  461. =begin
  462. verify signup with token
  463. result = User.signup_verify_via_token(token, user)
  464. returns
  465. result = user_model # user_model if token was verified
  466. =end
  467. def self.signup_verify_via_token(token, user = nil)
  468. # check token
  469. local_user = Token.check(action: 'Signup', name: token)
  470. return if !local_user
  471. # if requested user is different to current user
  472. return if user && local_user.id != user.id
  473. # set verified
  474. local_user.update!(verified: true)
  475. # delete token
  476. Token.find_by(action: 'Signup', name: token).destroy
  477. local_user
  478. end
  479. =begin
  480. merge two users to one
  481. user = User.find(123)
  482. result = user.merge(user_id_of_duplicate_user)
  483. returns
  484. result = new_user_model
  485. =end
  486. def merge(user_id_of_duplicate_user)
  487. # find email addresses and move them to primary user
  488. duplicate_user = User.find(user_id_of_duplicate_user)
  489. # merge missing attibutes
  490. Models.merge('User', id, user_id_of_duplicate_user)
  491. true
  492. end
  493. =begin
  494. list of active users in role
  495. result = User.of_role('Agent', group_ids)
  496. result = User.of_role(['Agent', 'Admin'])
  497. returns
  498. result = [user1, user2]
  499. =end
  500. def self.of_role(role, group_ids = nil)
  501. roles_ids = Role.where(active: true, name: role).map(&:id)
  502. if !group_ids
  503. return User.where(active: true).joins(:users_roles).where('roles_users.role_id IN (?)', roles_ids).order('users.updated_at DESC')
  504. end
  505. User.where(active: true)
  506. .joins(:users_roles)
  507. .joins(:users_groups)
  508. .where('roles_users.role_id IN (?) AND users_groups.group_ids IN (?)', roles_ids, group_ids).order('users.updated_at DESC')
  509. end
  510. =begin
  511. update/sync default preferences of users in a dedecated permissions
  512. result = User.update_default_preferences_by_permission('ticket.agent', force)
  513. returns
  514. result = true # false
  515. =end
  516. def self.update_default_preferences_by_permission(permission_name, force = false)
  517. permission = ::Permission.lookup(name: permission_name)
  518. return if !permission
  519. default = Rails.configuration.preferences_default_by_permission
  520. return false if !default
  521. default.deep_stringify_keys!
  522. User.with_permissions(permission.name).each do |user|
  523. next if !default[permission.name]
  524. has_changed = false
  525. default[permission.name].each do |key, value|
  526. next if !force && user.preferences[key]
  527. has_changed = true
  528. user.preferences[key] = value
  529. end
  530. if has_changed
  531. user.save!
  532. end
  533. end
  534. true
  535. end
  536. =begin
  537. update/sync default preferences of users in a dedecated role
  538. result = User.update_default_preferences_by_role('Agent', force)
  539. returns
  540. result = true # false
  541. =end
  542. def self.update_default_preferences_by_role(role_name, force = false)
  543. role = Role.lookup(name: role_name)
  544. return if !role
  545. default = Rails.configuration.preferences_default_by_permission
  546. return false if !default
  547. default.deep_stringify_keys!
  548. role.permissions.each do |permission|
  549. User.update_default_preferences_by_permission(permission.name, force)
  550. end
  551. true
  552. end
  553. def check_notifications(other, should_save = true)
  554. default = Rails.configuration.preferences_default_by_permission
  555. return if !default
  556. default.deep_stringify_keys!
  557. has_changed = false
  558. other.permissions.each do |permission|
  559. next if !default[permission.name]
  560. default[permission.name].each do |key, value|
  561. next if preferences[key]
  562. preferences[key] = value
  563. has_changed = true
  564. end
  565. end
  566. return true if !has_changed
  567. if id && should_save
  568. save!
  569. return true
  570. end
  571. @preferences_default = preferences
  572. true
  573. end
  574. def check_preferences_default
  575. if @preferences_default.blank?
  576. if id
  577. roles.each do |role|
  578. check_notifications(role, false)
  579. end
  580. end
  581. end
  582. return if @preferences_default.blank?
  583. preferences_tmp = @preferences_default.merge(preferences)
  584. self.preferences = preferences_tmp
  585. @preferences_default = nil
  586. true
  587. end
  588. def cache_delete
  589. super
  590. # delete asset caches
  591. key = "User::authorizations::#{id}"
  592. Cache.delete(key)
  593. # delete permission cache
  594. key = "User::permissions?:local_key:::#{id}"
  595. Cache.delete(key)
  596. end
  597. =begin
  598. try to find correct name
  599. [firstname, lastname] = User.name_guess('Some Name', 'some.name@example.com')
  600. =end
  601. def self.name_guess(string, email = nil)
  602. return if string.blank? && email.blank?
  603. string.strip!
  604. firstname = ''
  605. lastname = ''
  606. # "Lastname, Firstname"
  607. if string.match?(',')
  608. name = string.split(', ', 2)
  609. if name.count == 2
  610. if name[0].present?
  611. lastname = name[0].strip
  612. end
  613. if name[1].present?
  614. firstname = name[1].strip
  615. end
  616. return [firstname, lastname] if firstname.present? || lastname.present?
  617. end
  618. end
  619. # "Firstname Lastname"
  620. if string =~ /^(((Dr\.|Prof\.)[[:space:]]|).+?)[[:space:]](.+?)$/i
  621. if $1.present?
  622. firstname = $1.strip
  623. end
  624. if $4.present?
  625. lastname = $4.strip
  626. end
  627. return [firstname, lastname] if firstname.present? || lastname.present?
  628. end
  629. # -no name- "firstname.lastname@example.com"
  630. if string.blank? && email.present?
  631. scan = email.scan(/^(.+?)\.(.+?)\@.+?$/)
  632. if scan[0].present?
  633. if scan[0][0].present?
  634. firstname = scan[0][0].strip
  635. end
  636. if scan[0][1].present?
  637. lastname = scan[0][1].strip
  638. end
  639. return [firstname, lastname] if firstname.present? || lastname.present?
  640. end
  641. end
  642. nil
  643. end
  644. def no_name?
  645. firstname.blank? && lastname.blank?
  646. end
  647. private
  648. def check_name
  649. if firstname.present?
  650. firstname.strip!
  651. end
  652. if lastname.present?
  653. lastname.strip!
  654. end
  655. return true if firstname.present? && lastname.present?
  656. if (firstname.blank? && lastname.present?) || (firstname.present? && lastname.blank?)
  657. used_name = firstname.presence || lastname
  658. (local_firstname, local_lastname) = User.name_guess(used_name, email)
  659. elsif firstname.blank? && lastname.blank? && email.present?
  660. (local_firstname, local_lastname) = User.name_guess('', email)
  661. end
  662. self.firstname = local_firstname if local_firstname.present?
  663. self.lastname = local_lastname if local_lastname.present?
  664. if firstname.present? && firstname.match(/^[A-z]+$/) && (firstname.downcase == firstname || firstname.upcase == firstname)
  665. firstname.capitalize!
  666. end
  667. if lastname.present? && lastname.match(/^[A-z]+$/) && (lastname.downcase == lastname || lastname.upcase == lastname)
  668. lastname.capitalize!
  669. end
  670. true
  671. end
  672. def check_email
  673. return true if Setting.get('import_mode')
  674. return true if email.blank?
  675. self.email = email.downcase.strip
  676. return true if id == 1
  677. raise Exceptions::UnprocessableEntity, 'Invalid email' if email !~ /@/
  678. raise Exceptions::UnprocessableEntity, 'Invalid email' if email.match?(/\s/)
  679. true
  680. end
  681. def check_login
  682. # use email as login if not given
  683. if login.blank?
  684. self.login = email
  685. end
  686. # if email has changed, login is old email, change also login
  687. if changes && changes['email']
  688. if changes['email'][0] == login
  689. self.login = email
  690. end
  691. end
  692. # generate auto login
  693. if login.blank?
  694. self.login = "auto-#{Time.zone.now.to_i}-#{rand(999_999)}"
  695. end
  696. # check if login already exists
  697. self.login = login.downcase.strip
  698. check = true
  699. while check
  700. exists = User.find_by(login: login)
  701. if exists && exists.id != id
  702. self.login = "#{login}#{rand(999)}"
  703. else
  704. check = false
  705. end
  706. end
  707. true
  708. end
  709. def check_mail_delivery_failed
  710. return if email_change.blank?
  711. preferences.delete(:mail_delivery_failed)
  712. end
  713. def ensure_roles
  714. return true if role_ids.present?
  715. self.role_ids = Role.signup_role_ids
  716. end
  717. def ensure_identifier
  718. return true if email.present? || firstname.present? || lastname.present? || phone.present?
  719. return true if login.present? && !login.start_with?('auto-')
  720. raise Exceptions::UnprocessableEntity, 'Minimum one identifier (login, firstname, lastname, phone or email) for user is required.'
  721. end
  722. def ensure_uniq_email
  723. return true if Setting.get('user_email_multiple_use')
  724. return true if Setting.get('import_mode')
  725. return true if email.blank?
  726. return true if !changes
  727. return true if !changes['email']
  728. return true if !User.find_by(email: email.downcase.strip)
  729. raise Exceptions::UnprocessableEntity, 'Email address is already used for other user.'
  730. end
  731. def validate_roles(role)
  732. return true if !role_ids # we need role_ids for checking in role_ids below, in this method
  733. return true if role.preferences[:not].blank?
  734. role.preferences[:not].each do |local_role_name|
  735. local_role = Role.lookup(name: local_role_name)
  736. next if !local_role
  737. next if role_ids.exclude?(local_role.id)
  738. raise "Role #{role.name} conflicts with #{local_role.name}"
  739. end
  740. true
  741. end
  742. def validate_ooo
  743. return true if out_of_office != true
  744. raise Exceptions::UnprocessableEntity, 'out of office start is required' if out_of_office_start_at.blank?
  745. raise Exceptions::UnprocessableEntity, 'out of office end is required' if out_of_office_end_at.blank?
  746. raise Exceptions::UnprocessableEntity, 'out of office end is before start' if out_of_office_start_at > out_of_office_end_at
  747. raise Exceptions::UnprocessableEntity, 'out of office replacement user is required' if out_of_office_replacement_id.blank?
  748. raise Exceptions::UnprocessableEntity, 'out of office no such replacement user' if !User.find_by(id: out_of_office_replacement_id)
  749. true
  750. end
  751. def validate_preferences
  752. return true if !changes
  753. return true if !changes['preferences']
  754. return true if preferences.blank?
  755. return true if !preferences[:notification_sound]
  756. return true if !preferences[:notification_sound][:enabled]
  757. if preferences[:notification_sound][:enabled] == 'true'
  758. preferences[:notification_sound][:enabled] = true
  759. elsif preferences[:notification_sound][:enabled] == 'false'
  760. preferences[:notification_sound][:enabled] = false
  761. end
  762. class_name = preferences[:notification_sound][:enabled].class.to_s
  763. raise Exceptions::UnprocessableEntity, "preferences.notification_sound.enabled need to be an boolean, but it was a #{class_name}" if class_name != 'TrueClass' && class_name != 'FalseClass'
  764. true
  765. end
  766. =begin
  767. checks if the current user is the last one with admin permissions.
  768. Raises
  769. raise 'Minimum one user need to have admin permissions'
  770. =end
  771. def last_admin_check_by_attribute
  772. return true if !will_save_change_to_attribute?('active')
  773. return true if active != false
  774. return true if !permissions?(['admin', 'admin.user'])
  775. raise Exceptions::UnprocessableEntity, 'Minimum one user needs to have admin permissions.' if last_admin_check_admin_count < 1
  776. true
  777. end
  778. def last_admin_check_by_role(role)
  779. return true if Setting.get('import_mode')
  780. return true if !role.with_permission?(['admin', 'admin.user'])
  781. raise Exceptions::UnprocessableEntity, 'Minimum one user needs to have admin permissions.' if last_admin_check_admin_count < 1
  782. true
  783. end
  784. def last_admin_check_admin_count
  785. admin_role_ids = Role.joins(:permissions).where(permissions: { name: ['admin', 'admin.user'], active: true }, roles: { active: true }).pluck(:id)
  786. User.joins(:roles).where(roles: { id: admin_role_ids }, users: { active: true }).distinct().count - 1
  787. end
  788. def validate_agent_limit_by_attributes
  789. return true if Setting.get('system_agent_limit').blank?
  790. return true if !will_save_change_to_attribute?('active')
  791. return true if active != true
  792. return true if !permissions?('ticket.agent')
  793. ticket_agent_role_ids = Role.joins(:permissions).where(permissions: { name: 'ticket.agent', active: true }, roles: { active: true }).pluck(:id)
  794. count = User.joins(:roles).where(roles: { id: ticket_agent_role_ids }, users: { active: true }).distinct().count + 1
  795. raise Exceptions::UnprocessableEntity, 'Agent limit exceeded, please check your account settings.' if count > Setting.get('system_agent_limit').to_i
  796. true
  797. end
  798. def validate_agent_limit_by_role(role)
  799. return true if Setting.get('system_agent_limit').blank?
  800. return true if active != true
  801. return true if role.active != true
  802. return true if !role.with_permission?('ticket.agent')
  803. ticket_agent_role_ids = Role.joins(:permissions).where(permissions: { name: 'ticket.agent', active: true }, roles: { active: true }).pluck(:id)
  804. count = User.joins(:roles).where(roles: { id: ticket_agent_role_ids }, users: { active: true }).distinct().count
  805. # if new added role is a ticket.agent role
  806. if ticket_agent_role_ids.include?(role.id)
  807. # if user already has a ticket.agent role
  808. hint = false
  809. role_ids.each do |locale_role_id|
  810. next if !ticket_agent_role_ids.include?(locale_role_id)
  811. hint = true
  812. break
  813. end
  814. # user has not already a ticket.agent role
  815. if hint == false
  816. count += 1
  817. end
  818. end
  819. raise Exceptions::UnprocessableEntity, 'Agent limit exceeded, please check your account settings.' if count > Setting.get('system_agent_limit').to_i
  820. true
  821. end
  822. def domain_based_assignment
  823. return true if !email
  824. return true if organization_id
  825. begin
  826. domain = Mail::Address.new(email).domain
  827. return true if !domain
  828. organization = Organization.find_by(domain: domain.downcase, domain_assignment: true)
  829. return true if !organization
  830. self.organization_id = organization.id
  831. rescue
  832. return true
  833. end
  834. true
  835. end
  836. # sets locale of the user
  837. def set_locale
  838. # set the user's locale to the one of the "executing" user
  839. return true if !UserInfo.current_user_id
  840. user = User.find_by(id: UserInfo.current_user_id)
  841. return true if !user
  842. return true if !user.preferences[:locale]
  843. preferences[:locale] = user.preferences[:locale]
  844. true
  845. end
  846. def avatar_for_email_check
  847. return true if Setting.get('import_mode')
  848. return true if email.blank?
  849. return true if email !~ /@/
  850. return true if !saved_change_to_attribute?('email') && updated_at > Time.zone.now - 10.days
  851. # save/update avatar
  852. avatar = Avatar.auto_detection(
  853. object: 'User',
  854. o_id: id,
  855. url: email,
  856. source: 'app',
  857. updated_by_id: updated_by_id,
  858. created_by_id: updated_by_id,
  859. )
  860. # update user link
  861. return true if !avatar
  862. update_column(:image, avatar.store_hash) # rubocop:disable Rails/SkipsModelValidations
  863. cache_delete
  864. true
  865. end
  866. def destroy_longer_required_objects
  867. ::Authorization.where(user_id: id).destroy_all
  868. ::Avatar.remove('User', id)
  869. ::Cti::CallerId.where(user_id: id).destroy_all
  870. ::Taskbar.where(user_id: id).destroy_all
  871. ::Karma::ActivityLog.where(user_id: id).destroy_all
  872. ::Karma::User.where(user_id: id).destroy_all
  873. ::OnlineNotification.where(user_id: id).destroy_all
  874. ::RecentView.where(created_by_id: id).destroy_all
  875. ::UserDevice.remove(id)
  876. ::Token.where(user_id: id).destroy_all
  877. ::StatsStore.remove(
  878. object: 'User',
  879. o_id: id,
  880. )
  881. true
  882. end
  883. def ensure_password
  884. return true if password_empty?
  885. return true if PasswordHash.crypted?(password)
  886. self.password = PasswordHash.crypt(password)
  887. true
  888. end
  889. def password_empty?
  890. # set old password again if not given
  891. return if password.present?
  892. # skip if it's not desired to set a password (yet)
  893. return true if !password
  894. # get current record
  895. return if !id
  896. self.password = password_was
  897. true
  898. end
  899. # reset login_failed if password is changed
  900. def reset_login_failed
  901. return true if !will_save_change_to_attribute?('password')
  902. self.login_failed = 0
  903. true
  904. end
  905. # When adding/removing a phone number from the User table,
  906. # update caller ID table
  907. # to adopt/orphan matching Cti::Logs accordingly
  908. # (see https://github.com/zammad/zammad/issues/2057)
  909. def update_caller_id
  910. # skip if "phone" does not change, or changes like [nil, ""]
  911. return if persisted? && !previous_changes[:phone]&.any?(&:present?)
  912. return if destroyed? && phone.blank?
  913. Cti::CallerId.build(self)
  914. end
  915. end