user.rb 29 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184
  1. # Copyright (C) 2012-2016 Zammad Foundation, http://zammad-foundation.org/
  2. require 'digest/md5'
  3. # @model User
  4. #
  5. # @property id(required) [Integer] The identifier for the User.
  6. # @property login(required) [String] The login of the User used for authentication.
  7. # @property firstname [String] The firstname of the User.
  8. # @property lastname [String] The lastname of the User.
  9. # @property email [String] The email of the User.
  10. # @property image [String] The Image used as the User avatar (TODO: Image model?).
  11. # @property web [String] The website/URL of the User.
  12. # @property password [String] The password of the User.
  13. # @property phone [String] The phone number of the User.
  14. # @property fax [String] The fax number of the User.
  15. # @property mobile [String] The mobile number of the User.
  16. # @property department [String] The department the User is working at.
  17. # @property street [String] The street the User lives in.
  18. # @property zip [Integer] The zip postal code of the User city.
  19. # @property city [String] The city the User lives in.
  20. # @property country [String] The country the User lives in.
  21. # @property verified [Boolean] The flag that shows the verified state of the User.
  22. # @property active [Boolean] The flag that shows the active state of the User.
  23. # @property note [String] The note or comment stored to the User.
  24. class User < ApplicationModel
  25. include HasActivityStreamLog
  26. include ChecksClientNotification
  27. include HasHistory
  28. include HasSearchIndexBackend
  29. include CanCsvImport
  30. include HasGroups
  31. include HasRoles
  32. include User::ChecksAccess
  33. load 'user/assets.rb'
  34. include User::Assets
  35. extend User::Search
  36. load 'user/search_index.rb'
  37. include User::SearchIndex
  38. has_and_belongs_to_many :roles, after_add: %i[cache_update check_notifications], after_remove: :cache_update, before_add: %i[validate_agent_limit_by_role validate_roles], before_remove: :last_admin_check_by_role, class_name: 'Role'
  39. has_and_belongs_to_many :organizations, after_add: :cache_update, after_remove: :cache_update, class_name: 'Organization'
  40. has_many :tokens, after_add: :cache_update, after_remove: :cache_update
  41. has_many :authorizations, after_add: :cache_update, after_remove: :cache_update
  42. belongs_to :organization, inverse_of: :members
  43. before_validation :check_name, :check_email, :check_login, :check_mail_delivery_failed, :ensure_uniq_email, :ensure_password, :ensure_roles, :ensure_identifier
  44. before_create :check_preferences_default, :validate_preferences, :validate_ooo, :domain_based_assignment, :set_locale
  45. before_update :check_preferences_default, :validate_preferences, :validate_ooo, :reset_login_failed, :validate_agent_limit_by_attributes, :last_admin_check_by_attribute
  46. after_create :avatar_for_email_check
  47. after_update :avatar_for_email_check
  48. before_destroy :avatar_destroy, :user_device_destroy, :cit_caller_id_destroy, :task_destroy
  49. store :preferences
  50. activity_stream_permission 'admin.user'
  51. activity_stream_attributes_ignored :last_login,
  52. :login_failed,
  53. :image,
  54. :image_source,
  55. :preferences
  56. history_attributes_ignored :password,
  57. :last_login,
  58. :image,
  59. :image_source,
  60. :preferences
  61. search_index_attributes_ignored :password,
  62. :image,
  63. :image_source,
  64. :source,
  65. :login_failed
  66. csv_object_ids_ignored 1
  67. csv_attributes_ignored :password,
  68. :login_failed,
  69. :source,
  70. :image_source,
  71. :image,
  72. :authorizations,
  73. :organizations,
  74. :groups,
  75. :user_groups
  76. def ignore_search_indexing?(_action)
  77. # ignore internal user
  78. return true if id == 1
  79. false
  80. end
  81. =begin
  82. fullname of user
  83. user = User.find(123)
  84. result = user.fullname
  85. returns
  86. result = "Bob Smith"
  87. =end
  88. def fullname
  89. name = ''
  90. if firstname.present?
  91. name = firstname
  92. end
  93. if lastname.present?
  94. if name != ''
  95. name += ' '
  96. end
  97. name += lastname
  98. end
  99. if name.blank? && email.present?
  100. name = email
  101. end
  102. name
  103. end
  104. =begin
  105. longname of user
  106. user = User.find(123)
  107. result = user.longname
  108. returns
  109. result = "Bob Smith"
  110. or with org
  111. result = "Bob Smith (Org ABC)"
  112. =end
  113. def longname
  114. name = fullname
  115. if organization_id
  116. organization = Organization.lookup(id: organization_id)
  117. if organization
  118. name += " (#{organization.name})"
  119. end
  120. end
  121. name
  122. end
  123. =begin
  124. check if user is in role
  125. user = User.find(123)
  126. result = user.role?('Customer')
  127. result = user.role?(['Agent', 'Admin'])
  128. returns
  129. result = true|false
  130. =end
  131. def role?(role_name)
  132. roles.where(name: role_name).any?
  133. end
  134. =begin
  135. check if user is in role
  136. user = User.find(123)
  137. result = user.out_of_office?
  138. returns
  139. result = true|false
  140. =end
  141. def out_of_office?
  142. return false if out_of_office != true
  143. return false if out_of_office_start_at.blank?
  144. return false if out_of_office_end_at.blank?
  145. Time.zone.today.between?(out_of_office_start_at, out_of_office_end_at)
  146. end
  147. =begin
  148. check if user is in role
  149. user = User.find(123)
  150. result = user.out_of_office_agent
  151. returns
  152. result = user_model
  153. =end
  154. def out_of_office_agent
  155. return if !out_of_office?
  156. return if out_of_office_replacement_id.blank?
  157. User.find_by(id: out_of_office_replacement_id)
  158. end
  159. =begin
  160. gets users where user is replacement
  161. user = User.find(123)
  162. result = user.out_of_office_agent_of
  163. returns
  164. result = [user_model1, user_model2]
  165. =end
  166. def out_of_office_agent_of
  167. User.where(active: true, out_of_office: true, out_of_office_replacement_id: id).where('out_of_office_start_at <= ? AND out_of_office_end_at >= ?', Time.zone.today, Time.zone.today)
  168. end
  169. =begin
  170. get users activity stream
  171. user = User.find(123)
  172. result = user.activity_stream(20)
  173. returns
  174. result = [
  175. {
  176. id: 2,
  177. o_id: 2,
  178. created_by_id: 3,
  179. created_at: '2013-09-28 00:57:21',
  180. object: "User",
  181. type: "created",
  182. },
  183. {
  184. id: 2,
  185. o_id: 2,
  186. created_by_id: 3,
  187. created_at: '2013-09-28 00:59:21',
  188. object: "User",
  189. type: "updated",
  190. },
  191. ]
  192. =end
  193. def activity_stream(limit, fulldata = false)
  194. stream = ActivityStream.list(self, limit)
  195. return stream if !fulldata
  196. # get related objects
  197. assets = {}
  198. stream.each do |item|
  199. assets = item.assets(assets)
  200. end
  201. {
  202. stream: stream,
  203. assets: assets,
  204. }
  205. end
  206. =begin
  207. authenticate user
  208. result = User.authenticate(username, password)
  209. returns
  210. result = user_model # user model if authentication was successfully
  211. =end
  212. def self.authenticate(username, password)
  213. # do not authenticate with nothing
  214. return if username.blank? || password.blank?
  215. user = User.identify(username)
  216. return if !user
  217. return if !Auth.can_login?(user)
  218. return user if Auth.valid?(user, password)
  219. sleep 1
  220. user.login_failed += 1
  221. user.save!
  222. nil
  223. end
  224. =begin
  225. checks if a user has reached the maximum of failed login tries
  226. user = User.find(123)
  227. result = user.max_login_failed?
  228. returns
  229. result = true | false
  230. =end
  231. def max_login_failed?
  232. max_login_failed = Setting.get('password_max_login_failed').to_i || 10
  233. login_failed > max_login_failed
  234. end
  235. =begin
  236. tries to find the matching instance by the given identifier. Currently email and login is supported.
  237. user = User.indentify('User123')
  238. # or
  239. user = User.indentify('user-123@example.com')
  240. returns
  241. # User instance
  242. user.login # 'user123'
  243. =end
  244. def self.identify(identifier)
  245. # try to find user based on login
  246. user = User.find_by(login: identifier.downcase)
  247. return user if user
  248. # try second lookup with email
  249. User.find_by(email: identifier.downcase)
  250. end
  251. =begin
  252. authenticate user agains sso
  253. result = User.sso(sso_params)
  254. returns
  255. result = user_model # user model if authentication was successfully
  256. =end
  257. def self.sso(params)
  258. # try to login against configure auth backends
  259. user_auth = Sso.check(params)
  260. return if !user_auth
  261. user_auth
  262. end
  263. =begin
  264. create user from from omni auth hash
  265. result = User.create_from_hash!(hash)
  266. returns
  267. result = user_model # user model if create was successfully
  268. =end
  269. def self.create_from_hash!(hash)
  270. role_ids = Role.signup_role_ids
  271. url = ''
  272. hash['info']['urls']&.each_value do |local_url|
  273. next if local_url.blank?
  274. url = local_url
  275. end
  276. create!(
  277. login: hash['info']['nickname'] || hash['uid'],
  278. firstname: hash['info']['name'],
  279. email: hash['info']['email'],
  280. image_source: hash['info']['image'],
  281. web: url,
  282. address: hash['info']['location'],
  283. note: hash['info']['description'],
  284. source: hash['provider'],
  285. role_ids: role_ids,
  286. updated_by_id: 1,
  287. created_by_id: 1,
  288. )
  289. end
  290. =begin
  291. get all permissions of user
  292. user = User.find(123)
  293. user.permissions
  294. returns
  295. {
  296. 'permission.key' => true,
  297. # ...
  298. }
  299. =end
  300. def permissions
  301. list = {}
  302. ::Permission.select('permissions.name, permissions.preferences').joins(:roles).where('roles.id IN (?) AND permissions.active = ?', role_ids, true).pluck(:name, :preferences).each do |permission|
  303. next if permission[1]['selectable'] == false
  304. list[permission[0]] = true
  305. end
  306. list
  307. end
  308. =begin
  309. true or false for permission
  310. user = User.find(123)
  311. user.permissions?('permission.key') # access to certain permission.key
  312. user.permissions?(['permission.key1', 'permission.key2']) # access to permission.key1 or permission.key2
  313. user.permissions?('permission') # access to all sub keys
  314. user.permissions?('permission.*') # access if one sub key access exists
  315. returns
  316. true|false
  317. =end
  318. def permissions?(key)
  319. keys = key
  320. names = []
  321. if key.class == String
  322. keys = [key]
  323. end
  324. keys.each do |local_key|
  325. list = []
  326. if local_key.match?(/\.\*$/)
  327. local_key.sub!('.*', '.%')
  328. permissions = ::Permission.with_parents(local_key)
  329. list = ::Permission.select('preferences').joins(:roles).where('roles.id IN (?) AND roles.active = ? AND (permissions.name IN (?) OR permissions.name LIKE ?) AND permissions.active = ?', role_ids, true, permissions, local_key, true).pluck(:preferences)
  330. else
  331. permission = ::Permission.lookup(name: local_key)
  332. break if permission&.active == false
  333. permissions = ::Permission.with_parents(local_key)
  334. list = ::Permission.select('preferences').joins(:roles).where('roles.id IN (?) AND roles.active = ? AND permissions.name IN (?) AND permissions.active = ?', role_ids, true, permissions, true).pluck(:preferences)
  335. end
  336. return true if list.present?
  337. end
  338. false
  339. end
  340. =begin
  341. returns all accessable permission ids of user
  342. user = User.find(123)
  343. user.permissions_with_child_ids
  344. returns
  345. [permission1_id, permission2_id, permission3_id]
  346. =end
  347. def permissions_with_child_ids
  348. where = ''
  349. where_bind = [true]
  350. permissions.each_key do |permission_name|
  351. where += ' OR ' if where != ''
  352. where += 'permissions.name = ? OR permissions.name LIKE ?'
  353. where_bind.push permission_name
  354. where_bind.push "#{permission_name}.%"
  355. end
  356. return [] if where == ''
  357. ::Permission.where("permissions.active = ? AND (#{where})", *where_bind).pluck(:id)
  358. end
  359. =begin
  360. get all users with permission
  361. users = User.with_permissions('ticket.agent')
  362. get all users with permission "admin.session" or "ticket.agent"
  363. users = User.with_permissions(['admin.session', 'ticket.agent'])
  364. returns
  365. [user1, user2, ...]
  366. =end
  367. def self.with_permissions(keys)
  368. if keys.class != Array
  369. keys = [keys]
  370. end
  371. total_role_ids = []
  372. permission_ids = []
  373. keys.each do |key|
  374. role_ids = []
  375. ::Permission.with_parents(key).each do |local_key|
  376. permission = ::Permission.lookup(name: local_key)
  377. next if !permission
  378. permission_ids.push permission.id
  379. end
  380. next if permission_ids.blank?
  381. Role.joins(:roles_permissions).joins(:permissions).where('permissions_roles.permission_id IN (?) AND roles.active = ? AND permissions.active = ?', permission_ids, true, true).distinct().pluck(:id).each do |role_id|
  382. role_ids.push role_id
  383. end
  384. total_role_ids.push role_ids
  385. end
  386. return [] if total_role_ids.blank?
  387. condition = ''
  388. total_role_ids.each do |_role_ids|
  389. if condition != ''
  390. condition += ' OR '
  391. end
  392. condition += 'roles_users.role_id IN (?)'
  393. end
  394. User.joins(:users_roles).where("(#{condition}) AND users.active = ?", *total_role_ids, true).distinct.order(:id)
  395. end
  396. =begin
  397. generate new token for reset password
  398. result = User.password_reset_new_token(username)
  399. returns
  400. result = {
  401. token: token,
  402. user: user,
  403. }
  404. =end
  405. def self.password_reset_new_token(username)
  406. return if username.blank?
  407. # try to find user based on login
  408. user = User.find_by(login: username.downcase, active: true)
  409. # try second lookup with email
  410. user ||= User.find_by(email: username.downcase, active: true)
  411. # check if email address exists
  412. return if !user
  413. return if !user.email
  414. # generate token
  415. token = Token.create(action: 'PasswordReset', user_id: user.id)
  416. {
  417. token: token,
  418. user: user,
  419. }
  420. end
  421. =begin
  422. returns the User instance for a given password token if found
  423. result = User.by_reset_token(token)
  424. returns
  425. result = user_model # user_model if token was verified
  426. =end
  427. def self.by_reset_token(token)
  428. Token.check(action: 'PasswordReset', name: token)
  429. end
  430. =begin
  431. reset password with token and set new password
  432. result = User.password_reset_via_token(token,password)
  433. returns
  434. result = user_model # user_model if token was verified
  435. =end
  436. def self.password_reset_via_token(token, password)
  437. # check token
  438. user = by_reset_token(token)
  439. return if !user
  440. # reset password
  441. user.update!(password: password)
  442. # delete token
  443. Token.find_by(action: 'PasswordReset', name: token).destroy
  444. user
  445. end
  446. =begin
  447. update last login date and reset login_failed (is automatically done by auth and sso backend)
  448. user = User.find(123)
  449. result = user.update_last_login
  450. returns
  451. result = new_user_model
  452. =end
  453. def update_last_login
  454. self.last_login = Time.zone.now
  455. # reset login failed
  456. self.login_failed = 0
  457. save
  458. end
  459. =begin
  460. generate new token for signup
  461. result = User.signup_new_token(user) # or email
  462. returns
  463. result = {
  464. token: token,
  465. user: user,
  466. }
  467. =end
  468. def self.signup_new_token(user)
  469. return if !user
  470. return if !user.email
  471. # generate token
  472. token = Token.create(action: 'Signup', user_id: user.id)
  473. {
  474. token: token,
  475. user: user,
  476. }
  477. end
  478. =begin
  479. verify signup with token
  480. result = User.signup_verify_via_token(token, user)
  481. returns
  482. result = user_model # user_model if token was verified
  483. =end
  484. def self.signup_verify_via_token(token, user = nil)
  485. # check token
  486. local_user = Token.check(action: 'Signup', name: token)
  487. return if !local_user
  488. # if requested user is different to current user
  489. return if user && local_user.id != user.id
  490. # set verified
  491. local_user.update!(verified: true)
  492. # delete token
  493. Token.find_by(action: 'Signup', name: token).destroy
  494. local_user
  495. end
  496. =begin
  497. merge two users to one
  498. user = User.find(123)
  499. result = user.merge(user_id_of_duplicate_user)
  500. returns
  501. result = new_user_model
  502. =end
  503. def merge(user_id_of_duplicate_user)
  504. # find email addresses and move them to primary user
  505. duplicate_user = User.find(user_id_of_duplicate_user)
  506. # merge missing attibutes
  507. Models.merge('User', id, user_id_of_duplicate_user)
  508. true
  509. end
  510. =begin
  511. list of active users in role
  512. result = User.of_role('Agent', group_ids)
  513. result = User.of_role(['Agent', 'Admin'])
  514. returns
  515. result = [user1, user2]
  516. =end
  517. def self.of_role(role, group_ids = nil)
  518. roles_ids = Role.where(active: true, name: role).map(&:id)
  519. if !group_ids
  520. return User.where(active: true).joins(:users_roles).where('roles_users.role_id IN (?)', roles_ids).order('users.updated_at DESC')
  521. end
  522. User.where(active: true)
  523. .joins(:users_roles)
  524. .joins(:users_groups)
  525. .where('roles_users.role_id IN (?) AND users_groups.group_ids IN (?)', roles_ids, group_ids).order('users.updated_at DESC')
  526. end
  527. =begin
  528. update/sync default preferences of users in a dedecated permissions
  529. result = User.update_default_preferences_by_permission('ticket.agent', force)
  530. returns
  531. result = true # false
  532. =end
  533. def self.update_default_preferences_by_permission(permission_name, force = false)
  534. permission = ::Permission.lookup(name: permission_name)
  535. return if !permission
  536. default = Rails.configuration.preferences_default_by_permission
  537. return false if !default
  538. default.deep_stringify_keys!
  539. User.with_permissions(permission.name).each do |user|
  540. next if !default[permission.name]
  541. has_changed = false
  542. default[permission.name].each do |key, value|
  543. next if !force && user.preferences[key]
  544. has_changed = true
  545. user.preferences[key] = value
  546. end
  547. if has_changed
  548. user.save!
  549. end
  550. end
  551. true
  552. end
  553. =begin
  554. update/sync default preferences of users in a dedecated role
  555. result = User.update_default_preferences_by_role('Agent', force)
  556. returns
  557. result = true # false
  558. =end
  559. def self.update_default_preferences_by_role(role_name, force = false)
  560. role = Role.lookup(name: role_name)
  561. return if !role
  562. default = Rails.configuration.preferences_default_by_permission
  563. return false if !default
  564. default.deep_stringify_keys!
  565. role.permissions.each do |permission|
  566. User.update_default_preferences_by_permission(permission.name, force)
  567. end
  568. true
  569. end
  570. def check_notifications(other, should_save = true)
  571. default = Rails.configuration.preferences_default_by_permission
  572. return if !default
  573. default.deep_stringify_keys!
  574. has_changed = false
  575. other.permissions.each do |permission|
  576. next if !default[permission.name]
  577. default[permission.name].each do |key, value|
  578. next if preferences[key]
  579. preferences[key] = value
  580. has_changed = true
  581. end
  582. end
  583. return true if !has_changed
  584. if id && should_save
  585. save!
  586. return true
  587. end
  588. @preferences_default = preferences
  589. true
  590. end
  591. def check_preferences_default
  592. if @preferences_default.blank?
  593. if id
  594. roles.each do |role|
  595. check_notifications(role, false)
  596. end
  597. end
  598. end
  599. return if @preferences_default.blank?
  600. preferences_tmp = @preferences_default.merge(preferences)
  601. self.preferences = preferences_tmp
  602. @preferences_default = nil
  603. true
  604. end
  605. private
  606. def cache_delete
  607. super
  608. # delete asset caches
  609. key = "User::authorizations::#{id}"
  610. Cache.delete(key)
  611. # delete permission cache
  612. key = "User::permissions?:local_key:::#{id}"
  613. Cache.delete(key)
  614. end
  615. def check_name
  616. if firstname.present?
  617. firstname.strip!
  618. end
  619. if lastname.present?
  620. lastname.strip!
  621. end
  622. return true if firstname.present? && lastname.present?
  623. if (firstname.blank? && lastname.present?) || (firstname.present? && lastname.blank?)
  624. # "Lastname, Firstname"
  625. used_name = firstname.presence || lastname
  626. name = used_name.split(', ', 2)
  627. if name.count == 2
  628. if name[0].present?
  629. self.lastname = name[0]
  630. end
  631. if name[1].present?
  632. self.firstname = name[1]
  633. end
  634. return true
  635. end
  636. # "Firstname Lastname"
  637. name = used_name.split(' ', 2)
  638. if name.count == 2
  639. if name[0].present?
  640. self.firstname = name[0]
  641. end
  642. if name[1].present?
  643. self.lastname = name[1]
  644. end
  645. return true
  646. end
  647. # -no name- "firstname.lastname@example.com"
  648. elsif firstname.blank? && lastname.blank? && email.present?
  649. scan = email.scan(/^(.+?)\.(.+?)\@.+?$/)
  650. if scan[0]
  651. if scan[0][0].present?
  652. self.firstname = scan[0][0].capitalize
  653. end
  654. if scan[0][1].present?
  655. self.lastname = scan[0][1].capitalize
  656. end
  657. end
  658. end
  659. true
  660. end
  661. def check_email
  662. return true if Setting.get('import_mode')
  663. return true if email.blank?
  664. self.email = email.downcase.strip
  665. return true if id == 1
  666. raise Exceptions::UnprocessableEntity, 'Invalid email' if email !~ /@/
  667. raise Exceptions::UnprocessableEntity, 'Invalid email' if email.match?(/\s/)
  668. true
  669. end
  670. def check_login
  671. # use email as login if not given
  672. if login.blank?
  673. self.login = email
  674. end
  675. # if email has changed, login is old email, change also login
  676. if changes && changes['email']
  677. if changes['email'][0] == login
  678. self.login = email
  679. end
  680. end
  681. # generate auto login
  682. if login.blank?
  683. self.login = "auto-#{Time.zone.now.to_i}-#{rand(999_999)}"
  684. end
  685. # check if login already exists
  686. self.login = login.downcase.strip
  687. check = true
  688. while check
  689. exists = User.find_by(login: login)
  690. if exists && exists.id != id
  691. self.login = "#{login}#{rand(999)}"
  692. else
  693. check = false
  694. end
  695. end
  696. true
  697. end
  698. def check_mail_delivery_failed
  699. return true if !changes || !changes['email']
  700. preferences.delete(:mail_delivery_failed)
  701. true
  702. end
  703. def ensure_roles
  704. return true if role_ids.present?
  705. self.role_ids = Role.signup_role_ids
  706. end
  707. def ensure_identifier
  708. return true if email.present? || firstname.present? || lastname.present? || phone.present?
  709. return true if login.present? && !login.start_with?('auto-')
  710. raise Exceptions::UnprocessableEntity, 'Minimum one identifier (login, firstname, lastname, phone or email) for user is required.'
  711. end
  712. def ensure_uniq_email
  713. return true if Setting.get('user_email_multiple_use')
  714. return true if Setting.get('import_mode')
  715. return true if email.blank?
  716. return true if !changes
  717. return true if !changes['email']
  718. return true if !User.find_by(email: email.downcase.strip)
  719. raise Exceptions::UnprocessableEntity, 'Email address is already used for other user.'
  720. end
  721. def validate_roles(role)
  722. return true if !role_ids # we need role_ids for checking in role_ids below, in this method
  723. return true if role.preferences[:not].blank?
  724. role.preferences[:not].each do |local_role_name|
  725. local_role = Role.lookup(name: local_role_name)
  726. next if !local_role
  727. next if role_ids.exclude?(local_role.id)
  728. raise "Role #{role.name} conflicts with #{local_role.name}"
  729. end
  730. true
  731. end
  732. def validate_ooo
  733. return true if out_of_office != true
  734. raise Exceptions::UnprocessableEntity, 'out of office start is required' if out_of_office_start_at.blank?
  735. raise Exceptions::UnprocessableEntity, 'out of office end is required' if out_of_office_end_at.blank?
  736. raise Exceptions::UnprocessableEntity, 'out of office end is before start' if out_of_office_start_at > out_of_office_end_at
  737. raise Exceptions::UnprocessableEntity, 'out of office replacement user is required' if out_of_office_replacement_id.blank?
  738. raise Exceptions::UnprocessableEntity, 'out of office no such replacement user' if !User.find_by(id: out_of_office_replacement_id)
  739. true
  740. end
  741. def validate_preferences
  742. return true if !changes
  743. return true if !changes['preferences']
  744. return true if preferences.blank?
  745. return true if !preferences[:notification_sound]
  746. return true if !preferences[:notification_sound][:enabled]
  747. if preferences[:notification_sound][:enabled] == 'true'
  748. preferences[:notification_sound][:enabled] = true
  749. elsif preferences[:notification_sound][:enabled] == 'false'
  750. preferences[:notification_sound][:enabled] = false
  751. end
  752. class_name = preferences[:notification_sound][:enabled].class.to_s
  753. raise Exceptions::UnprocessableEntity, "preferences.notification_sound.enabled need to be an boolean, but it was a #{class_name}" if class_name != 'TrueClass' && class_name != 'FalseClass'
  754. true
  755. end
  756. =begin
  757. checks if the current user is the last one with admin permissions.
  758. Raises
  759. raise 'Minimum one user need to have admin permissions'
  760. =end
  761. def last_admin_check_by_attribute
  762. return true if !will_save_change_to_attribute?('active')
  763. return true if active != false
  764. return true if !permissions?(['admin', 'admin.user'])
  765. raise Exceptions::UnprocessableEntity, 'Minimum one user needs to have admin permissions.' if last_admin_check_admin_count < 1
  766. true
  767. end
  768. def last_admin_check_by_role(role)
  769. return true if Setting.get('import_mode')
  770. return true if !role.with_permission?(['admin', 'admin.user'])
  771. raise Exceptions::UnprocessableEntity, 'Minimum one user needs to have admin permissions.' if last_admin_check_admin_count < 1
  772. true
  773. end
  774. def last_admin_check_admin_count
  775. admin_role_ids = Role.joins(:permissions).where(permissions: { name: ['admin', 'admin.user'], active: true }, roles: { active: true }).pluck(:id)
  776. User.joins(:roles).where(roles: { id: admin_role_ids }, users: { active: true }).distinct().count - 1
  777. end
  778. def validate_agent_limit_by_attributes
  779. return true if !Setting.get('system_agent_limit')
  780. return true if !will_save_change_to_attribute?('active')
  781. return true if active != true
  782. return true if !permissions?('ticket.agent')
  783. ticket_agent_role_ids = Role.joins(:permissions).where(permissions: { name: 'ticket.agent', active: true }, roles: { active: true }).pluck(:id)
  784. count = User.joins(:roles).where(roles: { id: ticket_agent_role_ids }, users: { active: true }).distinct().count + 1
  785. raise Exceptions::UnprocessableEntity, 'Agent limit exceeded, please check your account settings.' if count > Setting.get('system_agent_limit')
  786. true
  787. end
  788. def validate_agent_limit_by_role(role)
  789. return true if !Setting.get('system_agent_limit')
  790. return true if active != true
  791. return true if role.active != true
  792. return true if !role.with_permission?('ticket.agent')
  793. ticket_agent_role_ids = Role.joins(:permissions).where(permissions: { name: 'ticket.agent', active: true }, roles: { active: true }).pluck(:id)
  794. count = User.joins(:roles).where(roles: { id: ticket_agent_role_ids }, users: { active: true }).distinct().count
  795. # if new added role is a ticket.agent role
  796. if ticket_agent_role_ids.include?(role.id)
  797. # if user already has a ticket.agent role
  798. hint = false
  799. role_ids.each do |locale_role_id|
  800. next if !ticket_agent_role_ids.include?(locale_role_id)
  801. hint = true
  802. break
  803. end
  804. # user has not already a ticket.agent role
  805. if hint == false
  806. count += 1
  807. end
  808. end
  809. raise Exceptions::UnprocessableEntity, 'Agent limit exceeded, please check your account settings.' if count > Setting.get('system_agent_limit')
  810. true
  811. end
  812. def domain_based_assignment
  813. return true if !email
  814. return true if organization_id
  815. begin
  816. domain = Mail::Address.new(email).domain
  817. return true if !domain
  818. organization = Organization.find_by(domain: domain.downcase, domain_assignment: true)
  819. return true if !organization
  820. self.organization_id = organization.id
  821. rescue
  822. return true
  823. end
  824. true
  825. end
  826. # sets locale of the user
  827. def set_locale
  828. # set the user's locale to the one of the "executing" user
  829. return true if !UserInfo.current_user_id
  830. user = User.find_by(id: UserInfo.current_user_id)
  831. return true if !user
  832. return true if !user.preferences[:locale]
  833. preferences[:locale] = user.preferences[:locale]
  834. true
  835. end
  836. def avatar_for_email_check
  837. return true if Setting.get('import_mode')
  838. return true if email.blank?
  839. return true if email !~ /@/
  840. return true if !saved_change_to_attribute?('email') && updated_at > Time.zone.now - 10.days
  841. # save/update avatar
  842. avatar = Avatar.auto_detection(
  843. object: 'User',
  844. o_id: id,
  845. url: email,
  846. source: 'app',
  847. updated_by_id: updated_by_id,
  848. created_by_id: updated_by_id,
  849. )
  850. # update user link
  851. return true if !avatar
  852. update_column(:image, avatar.store_hash) # rubocop:disable Rails/SkipsModelValidations
  853. cache_delete
  854. true
  855. end
  856. def avatar_destroy
  857. Avatar.remove('User', id)
  858. end
  859. def user_device_destroy
  860. UserDevice.remove(id)
  861. end
  862. def cit_caller_id_destroy
  863. Cti::CallerId.where(user_id: id).destroy_all
  864. end
  865. def task_destroy
  866. Taskbar.where(user_id: id).destroy_all
  867. end
  868. def ensure_password
  869. return true if password_empty?
  870. return true if PasswordHash.crypted?(password)
  871. self.password = PasswordHash.crypt(password)
  872. true
  873. end
  874. def password_empty?
  875. # set old password again if not given
  876. return if password.present?
  877. # skip if it's not desired to set a password (yet)
  878. return true if !password
  879. # get current record
  880. return if !id
  881. self.password = password_was
  882. true
  883. end
  884. # reset login_failed if password is changed
  885. def reset_login_failed
  886. return true if !will_save_change_to_attribute?('password')
  887. self.login_failed = 0
  888. true
  889. end
  890. end