2016-11-15 16:56:29 +01:00
|
|
|
# frozen_string_literal: true
|
2017-05-02 02:14:47 +02:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: users
|
|
|
|
#
|
2018-04-23 11:29:17 +02:00
|
|
|
# id :bigint(8) not null, primary key
|
2017-05-02 02:14:47 +02:00
|
|
|
# email :string default(""), not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# encrypted_password :string default(""), not null
|
|
|
|
# reset_password_token :string
|
|
|
|
# reset_password_sent_at :datetime
|
|
|
|
# remember_created_at :datetime
|
|
|
|
# sign_in_count :integer default(0), not null
|
|
|
|
# current_sign_in_at :datetime
|
|
|
|
# last_sign_in_at :datetime
|
|
|
|
# current_sign_in_ip :inet
|
|
|
|
# last_sign_in_ip :inet
|
2017-07-13 03:12:25 +02:00
|
|
|
# admin :boolean default(FALSE), not null
|
2017-05-02 02:14:47 +02:00
|
|
|
# confirmation_token :string
|
|
|
|
# confirmed_at :datetime
|
|
|
|
# confirmation_sent_at :datetime
|
|
|
|
# unconfirmed_email :string
|
|
|
|
# locale :string
|
|
|
|
# encrypted_otp_secret :string
|
|
|
|
# encrypted_otp_secret_iv :string
|
|
|
|
# encrypted_otp_secret_salt :string
|
|
|
|
# consumed_timestep :integer
|
2017-07-13 03:12:25 +02:00
|
|
|
# otp_required_for_login :boolean default(FALSE), not null
|
2017-05-02 02:14:47 +02:00
|
|
|
# last_emailed_at :datetime
|
|
|
|
# otp_backup_codes :string is an Array
|
2017-05-20 17:32:44 +02:00
|
|
|
# filtered_languages :string default([]), not null, is an Array
|
2018-04-23 11:29:17 +02:00
|
|
|
# account_id :bigint(8) not null
|
2017-11-07 19:06:44 +01:00
|
|
|
# disabled :boolean default(FALSE), not null
|
2017-11-11 20:23:33 +01:00
|
|
|
# moderator :boolean default(FALSE), not null
|
2018-04-23 11:29:17 +02:00
|
|
|
# invite_id :bigint(8)
|
2018-02-02 10:18:55 +01:00
|
|
|
# remember_token :string
|
2018-06-17 13:54:02 +02:00
|
|
|
# chosen_languages :string is an Array
|
2018-12-24 19:12:38 +01:00
|
|
|
# created_by_application_id :bigint(8)
|
2019-03-14 05:28:30 +01:00
|
|
|
# approved :boolean default(TRUE), not null
|
2020-06-09 10:23:06 +02:00
|
|
|
# sign_in_token :string
|
|
|
|
# sign_in_token_sent_at :datetime
|
Add WebAuthn as an alternative 2FA method (#14466)
* feat: add possibility of adding WebAuthn security keys to use as 2FA
This adds a basic UI for enabling WebAuthn 2FA. We did a little refactor
to the Settings page for editing the 2FA methods – now it will list the
methods that are available to the user (TOTP and WebAuthn) and from
there they'll be able to add or remove any of them.
Also, it's worth mentioning that for enabling WebAuthn it's required to
have TOTP enabled, so the first time that you go to the 2FA Settings
page, you'll be asked to set it up.
This work was inspired by the one donde by Github in their platform, and
despite it could be approached in different ways, we decided to go with
this one given that we feel that this gives a great UX.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add request for WebAuthn as second factor at login if enabled
This commits adds the feature for using WebAuthn as a second factor for
login when enabled.
If users have WebAuthn enabled, now a page requesting for the use of a
WebAuthn credential for log in will appear, although a link redirecting
to the old page for logging in using a two-factor code will also be
present.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add possibility of deleting WebAuthn Credentials
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: disable WebAuthn when an Admin disables 2FA for a user
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: remove ability to disable TOTP leaving only WebAuthn as 2FA
Following examples form other platforms like Github, we decided to make
Webauthn 2FA secondary to 2FA with TOTP, so that we removed the
possibility of removing TOTP authentication only, leaving users with
just WEbAuthn as 2FA. Instead, users will have to click on 'Disable 2FA'
in order to remove second factor auth.
The reason for WebAuthn being secondary to TOPT is that in that way,
users will still be able to log in using their code from their phone's
application if they don't have their security keys with them – or maybe
even lost them.
* We had to change a little the flow for setting up TOTP, given that now
it's possible to setting up again if you already had TOTP, in order to
let users modify their authenticator app – given that now it's not
possible for them to disable TOTP and set it up again with another
authenticator app.
So, basically, now instead of storing the new `otp_secret` in the
user, we store it in the session until the process of set up is
finished.
This was because, as it was before, when users clicked on 'Edit' in
the new two-factor methods lists page, but then went back without
finishing the flow, their `otp_secret` had been changed therefore
invalidating their previous authenticator app, making them unable to
log in again using TOTP.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* refactor: fix eslint errors
The PR build was failing given that linting returning some errors.
This commit attempts to fix them.
* refactor: normalize i18n translations
The build was failing given that i18n translations files were not
normalized.
This commits fixes that.
* refactor: avoid having the webauthn gem locked to a specific version
* refactor: use symbols for routes without '/'
* refactor: avoid sending webauthn disabled email when 2FA is disabled
When an admins disable 2FA for users, we were sending two mails
to them, one notifying that 2FA was disabled and the other to notify
that WebAuthn was disabled.
As the second one is redundant since the first email includes it, we can
remove it and send just one email to users.
* refactor: avoid creating new env variable for webauthn_origin config
* refactor: improve flash error messages for webauthn pages
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
2020-08-24 16:46:27 +02:00
|
|
|
# webauthn_id :string
|
2017-05-02 02:14:47 +02:00
|
|
|
#
|
2016-11-15 16:56:29 +01:00
|
|
|
|
2016-08-17 17:56:23 +02:00
|
|
|
class User < ApplicationRecord
|
2017-01-13 02:42:22 +01:00
|
|
|
include Settings::Extend
|
2019-03-14 02:13:42 +01:00
|
|
|
include UserRoles
|
2017-11-07 19:06:44 +01:00
|
|
|
|
2018-08-19 03:50:34 +02:00
|
|
|
# The home and list feeds will be stored in Redis for this amount
|
|
|
|
# of time, and status fan-out to followers will include only people
|
|
|
|
# within this time frame. Lowering the duration may improve performance
|
|
|
|
# if lots of people sign up, but not a lot of them check their feed
|
|
|
|
# every day. Raising the duration reduces the amount of expensive
|
|
|
|
# RegenerationWorker jobs that need to be run when those people come
|
|
|
|
# to check their feed
|
2019-01-02 10:47:32 +01:00
|
|
|
ACTIVE_DURATION = ENV.fetch('USER_ACTIVE_DAYS', 7).to_i.days.freeze
|
2017-01-12 20:46:24 +01:00
|
|
|
|
2018-01-02 16:55:00 +01:00
|
|
|
devise :two_factor_authenticatable,
|
2018-03-04 20:28:24 +01:00
|
|
|
otp_secret_encryption_key: Rails.configuration.x.otp_secret
|
2018-01-02 16:55:00 +01:00
|
|
|
|
|
|
|
devise :two_factor_backupable,
|
2017-04-15 13:26:03 +02:00
|
|
|
otp_number_of_backup_codes: 10
|
2016-03-05 13:12:24 +01:00
|
|
|
|
2018-01-02 16:55:00 +01:00
|
|
|
devise :registerable, :recoverable, :rememberable, :trackable, :validatable,
|
|
|
|
:confirmable
|
|
|
|
|
2019-03-14 02:13:42 +01:00
|
|
|
include Omniauthable
|
|
|
|
include PamAuthenticable
|
|
|
|
include LdapAuthenticable
|
2018-02-02 10:18:55 +01:00
|
|
|
|
2018-01-19 20:56:47 +01:00
|
|
|
belongs_to :account, inverse_of: :user
|
|
|
|
belongs_to :invite, counter_cache: :uses, optional: true
|
2018-12-24 19:12:38 +01:00
|
|
|
belongs_to :created_by_application, class_name: 'Doorkeeper::Application', optional: true
|
2016-03-05 22:43:05 +01:00
|
|
|
accepts_nested_attributes_for :account
|
2016-03-05 13:12:24 +01:00
|
|
|
|
2017-08-22 18:33:57 +02:00
|
|
|
has_many :applications, class_name: 'Doorkeeper::Application', as: :owner
|
2018-02-21 23:21:32 +01:00
|
|
|
has_many :backups, inverse_of: :user
|
2019-07-26 18:55:33 +02:00
|
|
|
has_many :invites, inverse_of: :user
|
2019-09-06 13:55:51 +02:00
|
|
|
has_many :markers, inverse_of: :user, dependent: :destroy
|
Add WebAuthn as an alternative 2FA method (#14466)
* feat: add possibility of adding WebAuthn security keys to use as 2FA
This adds a basic UI for enabling WebAuthn 2FA. We did a little refactor
to the Settings page for editing the 2FA methods – now it will list the
methods that are available to the user (TOTP and WebAuthn) and from
there they'll be able to add or remove any of them.
Also, it's worth mentioning that for enabling WebAuthn it's required to
have TOTP enabled, so the first time that you go to the 2FA Settings
page, you'll be asked to set it up.
This work was inspired by the one donde by Github in their platform, and
despite it could be approached in different ways, we decided to go with
this one given that we feel that this gives a great UX.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add request for WebAuthn as second factor at login if enabled
This commits adds the feature for using WebAuthn as a second factor for
login when enabled.
If users have WebAuthn enabled, now a page requesting for the use of a
WebAuthn credential for log in will appear, although a link redirecting
to the old page for logging in using a two-factor code will also be
present.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add possibility of deleting WebAuthn Credentials
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: disable WebAuthn when an Admin disables 2FA for a user
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: remove ability to disable TOTP leaving only WebAuthn as 2FA
Following examples form other platforms like Github, we decided to make
Webauthn 2FA secondary to 2FA with TOTP, so that we removed the
possibility of removing TOTP authentication only, leaving users with
just WEbAuthn as 2FA. Instead, users will have to click on 'Disable 2FA'
in order to remove second factor auth.
The reason for WebAuthn being secondary to TOPT is that in that way,
users will still be able to log in using their code from their phone's
application if they don't have their security keys with them – or maybe
even lost them.
* We had to change a little the flow for setting up TOTP, given that now
it's possible to setting up again if you already had TOTP, in order to
let users modify their authenticator app – given that now it's not
possible for them to disable TOTP and set it up again with another
authenticator app.
So, basically, now instead of storing the new `otp_secret` in the
user, we store it in the session until the process of set up is
finished.
This was because, as it was before, when users clicked on 'Edit' in
the new two-factor methods lists page, but then went back without
finishing the flow, their `otp_secret` had been changed therefore
invalidating their previous authenticator app, making them unable to
log in again using TOTP.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* refactor: fix eslint errors
The PR build was failing given that linting returning some errors.
This commit attempts to fix them.
* refactor: normalize i18n translations
The build was failing given that i18n translations files were not
normalized.
This commits fixes that.
* refactor: avoid having the webauthn gem locked to a specific version
* refactor: use symbols for routes without '/'
* refactor: avoid sending webauthn disabled email when 2FA is disabled
When an admins disable 2FA for users, we were sending two mails
to them, one notifying that 2FA was disabled and the other to notify
that WebAuthn was disabled.
As the second one is redundant since the first email includes it, we can
remove it and send just one email to users.
* refactor: avoid creating new env variable for webauthn_origin config
* refactor: improve flash error messages for webauthn pages
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
2020-08-24 16:46:27 +02:00
|
|
|
has_many :webauthn_credentials, dependent: :destroy
|
2017-08-22 18:33:57 +02:00
|
|
|
|
2019-04-09 16:06:30 +02:00
|
|
|
has_one :invite_request, class_name: 'UserInviteRequest', inverse_of: :user, dependent: :destroy
|
|
|
|
accepts_nested_attributes_for :invite_request, reject_if: ->(attributes) { attributes['text'].blank? }
|
|
|
|
|
2017-05-19 03:11:23 +02:00
|
|
|
validates :locale, inclusion: I18n.available_locales.map(&:to_s), if: :locale?
|
2019-05-03 23:44:44 +02:00
|
|
|
validates_with BlacklistedEmailValidator, on: :create
|
2018-12-10 22:53:25 +01:00
|
|
|
validates_with EmailMxValidator, if: :validate_email_dns?
|
2018-12-24 19:12:38 +01:00
|
|
|
validates :agreement, acceptance: { allow_nil: false, accept: [true, 'true', '1'] }, on: :create
|
2016-03-14 17:49:13 +01:00
|
|
|
|
2017-11-11 20:23:33 +01:00
|
|
|
scope :recent, -> { order(id: :desc) }
|
2019-03-14 05:28:30 +01:00
|
|
|
scope :pending, -> { where(approved: false) }
|
|
|
|
scope :approved, -> { where(approved: true) }
|
2017-03-03 23:45:48 +01:00
|
|
|
scope :confirmed, -> { where.not(confirmed_at: nil) }
|
2019-01-02 10:47:32 +01:00
|
|
|
scope :enabled, -> { where(disabled: false) }
|
2019-06-20 02:52:34 +02:00
|
|
|
scope :disabled, -> { where(disabled: true) }
|
2017-05-22 19:36:21 +02:00
|
|
|
scope :inactive, -> { where(arel_table[:current_sign_in_at].lt(ACTIVE_DURATION.ago)) }
|
2019-06-18 18:22:02 +02:00
|
|
|
scope :active, -> { confirmed.where(arel_table[:current_sign_in_at].gteq(ACTIVE_DURATION.ago)).joins(:account).where(accounts: { suspended_at: nil }) }
|
2017-05-22 21:50:58 +02:00
|
|
|
scope :matches_email, ->(value) { where(arel_table[:email].matches("#{value}%")) }
|
2020-01-20 17:00:41 +01:00
|
|
|
scope :matches_ip, ->(value) { left_joins(:session_activations).where('users.current_sign_in_ip <<= ?', value).or(left_joins(:session_activations).where('users.last_sign_in_ip <<= ?', value)).or(left_joins(:session_activations).where('session_activations.ip <<= ?', value)) }
|
2019-01-02 10:47:32 +01:00
|
|
|
scope :emailable, -> { confirmed.enabled.joins(:account).merge(Account.searchable) }
|
2016-10-07 13:17:56 +02:00
|
|
|
|
2017-05-08 03:32:52 +02:00
|
|
|
before_validation :sanitize_languages
|
2019-03-14 05:28:30 +01:00
|
|
|
before_create :set_approved
|
Fix “Email changed” notification sometimes having wrong e-mail (#13475)
* Fix “Email changed” notification sometimes having wrong e-mail
Fixes #6778
The root of the issue is that `send_devise_notification` was called before
the changes were properly commited to the database, causing the mailer to
pick previous values if running too early.
Devise's documentation provides guidance on how to handle that[1][2], however,
I have found it to not be working, as the following happens, in that order:
- `send_devise_notification` is called for the `email_changed` notification.
In that case, `changed?` is false and `saved_changes?` is true, so
if we use the former, we have the same issue.
- the `after_commit` hook is called
- `send_devise_notification` is called for the `confirmation_instructions`
notification.
In that case, `changed?` is still false, and `saved_changes?` still true,
so if we use the latter, that second notification email is simply not
going to be sent (as we would be queuing the notification *after*
executing the after_commit hook).
This is because it may be called from either an `after_update` or
`after_commit` hook, the difference not being a call to `save` but the
transaction actually being committed to the database. This may arguably
be a bug in Devise, or Devise's notification.
The proposed workaround is inspired by Devise's documentation but checks
whether a transaction is open to make the call whether to immediately
send the notification or defer it to the `after_commit` hook.
[1]: https://www.rubydoc.info/github/plataformatec/devise/Devise%2FModels%2FAuthenticatable:send_devise_notification
[2]: https://github.com/heartcombo/devise/blob/406915cb781e38255a30ad2a0609e33952b9ec50/lib/devise/models/authenticatable.rb#L133-L194
* Fix cases when sending notifications without changing the model
* Defer sending if and only if in transaction including current record
2020-04-15 16:13:44 +02:00
|
|
|
after_commit :send_pending_devise_notifications
|
2017-05-08 03:32:52 +02:00
|
|
|
|
2017-06-01 20:53:37 +02:00
|
|
|
# This avoids a deprecation warning from Rails 5.1
|
|
|
|
# It seems possible that a future release of devise-two-factor will
|
|
|
|
# handle this itself, and this can be removed from our User class.
|
|
|
|
attribute :otp_secret
|
|
|
|
|
2017-06-23 18:50:53 +02:00
|
|
|
has_many :session_activations, dependent: :destroy
|
|
|
|
|
2017-11-15 16:05:20 +01:00
|
|
|
delegate :auto_play_gif, :default_sensitive, :unfollow_modal, :boost_modal, :delete_modal,
|
2018-09-25 05:09:35 +02:00
|
|
|
:reduce_motion, :system_font_ui, :noindex, :theme, :display_media, :hide_network,
|
2019-05-25 21:27:00 +02:00
|
|
|
:expand_spoilers, :default_language, :aggregate_reblogs, :show_application,
|
2019-10-24 22:51:41 +02:00
|
|
|
:advanced_layout, :use_blurhash, :use_pending_items, :trends, :crop_images,
|
2020-09-30 19:31:03 +02:00
|
|
|
:disable_swiping,
|
2019-08-06 17:57:52 +02:00
|
|
|
to: :settings, prefix: :setting, allow_nil: false
|
2017-11-15 16:05:20 +01:00
|
|
|
|
2020-06-09 10:23:06 +02:00
|
|
|
attr_reader :invite_code, :sign_in_token_attempt
|
2019-04-25 02:49:25 +02:00
|
|
|
attr_writer :external
|
2017-11-27 16:07:59 +01:00
|
|
|
|
2017-04-23 04:43:42 +02:00
|
|
|
def confirmed?
|
|
|
|
confirmed_at.present?
|
|
|
|
end
|
|
|
|
|
2018-12-28 03:38:41 +01:00
|
|
|
def invited?
|
2019-05-19 21:40:36 +02:00
|
|
|
invite_id.present?
|
|
|
|
end
|
|
|
|
|
|
|
|
def valid_invitation?
|
2019-05-02 04:30:12 +02:00
|
|
|
invite_id.present? && invite.valid_for_use?
|
2018-12-28 03:38:41 +01:00
|
|
|
end
|
|
|
|
|
2017-11-07 19:06:44 +01:00
|
|
|
def disable!
|
2020-01-25 05:22:35 +01:00
|
|
|
update!(disabled: true)
|
2017-11-07 19:06:44 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def enable!
|
|
|
|
update!(disabled: false)
|
|
|
|
end
|
|
|
|
|
2017-12-29 19:52:04 +01:00
|
|
|
def confirm
|
2019-03-23 02:23:48 +01:00
|
|
|
new_user = !confirmed?
|
|
|
|
self.approved = true if open_registrations?
|
2017-12-29 19:52:04 +01:00
|
|
|
|
|
|
|
super
|
2019-03-14 02:13:42 +01:00
|
|
|
|
2019-03-14 05:28:30 +01:00
|
|
|
if new_user && approved?
|
|
|
|
prepare_new_user!
|
|
|
|
elsif new_user
|
|
|
|
notify_staff_about_pending_account!
|
|
|
|
end
|
2017-12-29 19:52:04 +01:00
|
|
|
end
|
|
|
|
|
2017-11-11 20:23:33 +01:00
|
|
|
def confirm!
|
2019-03-23 02:23:48 +01:00
|
|
|
new_user = !confirmed?
|
|
|
|
self.approved = true if open_registrations?
|
2017-12-29 19:52:04 +01:00
|
|
|
|
2017-11-11 20:23:33 +01:00
|
|
|
skip_confirmation!
|
|
|
|
save!
|
2019-03-14 02:13:42 +01:00
|
|
|
|
2019-03-14 05:28:30 +01:00
|
|
|
prepare_new_user! if new_user && approved?
|
|
|
|
end
|
|
|
|
|
|
|
|
def pending?
|
|
|
|
!approved?
|
|
|
|
end
|
|
|
|
|
|
|
|
def active_for_authentication?
|
2020-09-15 14:37:58 +02:00
|
|
|
!account.memorial?
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
2019-07-22 10:48:50 +02:00
|
|
|
end
|
|
|
|
|
2020-06-09 10:23:06 +02:00
|
|
|
def suspicious_sign_in?(ip)
|
|
|
|
!otp_required_for_login? && current_sign_in_at.present? && current_sign_in_at < 2.weeks.ago && !recent_ip?(ip)
|
|
|
|
end
|
|
|
|
|
Change unconfirmed user login behaviour (#11375)
Allow access to account settings, 2FA, authorized applications, and
account deletions to unconfirmed and pending users, as well as
users who had their accounts disabled. Suspended users cannot update
their e-mail or password or delete their account.
Display account status on account settings page, for example, when
an account is frozen, limited, unconfirmed or pending review.
After sign up, login users straight away and show a simple page that
tells them the status of their account with links to account settings
and logout, to reduce onboarding friction and allow users to correct
wrongly typed e-mail addresses.
Move the final sign-up step of SSO integrations to be the same
as above to reduce code duplication.
2019-07-22 10:48:50 +02:00
|
|
|
def functional?
|
2020-09-15 14:37:58 +02:00
|
|
|
confirmed? && approved? && !disabled? && !account.suspended? && !account.memorial? && account.moved_to_account_id.nil?
|
2019-03-14 05:28:30 +01:00
|
|
|
end
|
|
|
|
|
2019-09-11 16:32:44 +02:00
|
|
|
def unconfirmed_or_pending?
|
|
|
|
!(confirmed? && approved?)
|
|
|
|
end
|
|
|
|
|
2019-03-14 05:28:30 +01:00
|
|
|
def inactive_message
|
|
|
|
!approved? ? :pending : super
|
|
|
|
end
|
|
|
|
|
|
|
|
def approve!
|
|
|
|
return if approved?
|
|
|
|
|
|
|
|
update!(approved: true)
|
|
|
|
prepare_new_user!
|
2018-01-23 20:52:30 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_tracked_fields!(request)
|
|
|
|
super
|
|
|
|
prepare_returning_user!
|
2017-11-11 20:23:33 +01:00
|
|
|
end
|
|
|
|
|
Add WebAuthn as an alternative 2FA method (#14466)
* feat: add possibility of adding WebAuthn security keys to use as 2FA
This adds a basic UI for enabling WebAuthn 2FA. We did a little refactor
to the Settings page for editing the 2FA methods – now it will list the
methods that are available to the user (TOTP and WebAuthn) and from
there they'll be able to add or remove any of them.
Also, it's worth mentioning that for enabling WebAuthn it's required to
have TOTP enabled, so the first time that you go to the 2FA Settings
page, you'll be asked to set it up.
This work was inspired by the one donde by Github in their platform, and
despite it could be approached in different ways, we decided to go with
this one given that we feel that this gives a great UX.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add request for WebAuthn as second factor at login if enabled
This commits adds the feature for using WebAuthn as a second factor for
login when enabled.
If users have WebAuthn enabled, now a page requesting for the use of a
WebAuthn credential for log in will appear, although a link redirecting
to the old page for logging in using a two-factor code will also be
present.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add possibility of deleting WebAuthn Credentials
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: disable WebAuthn when an Admin disables 2FA for a user
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: remove ability to disable TOTP leaving only WebAuthn as 2FA
Following examples form other platforms like Github, we decided to make
Webauthn 2FA secondary to 2FA with TOTP, so that we removed the
possibility of removing TOTP authentication only, leaving users with
just WEbAuthn as 2FA. Instead, users will have to click on 'Disable 2FA'
in order to remove second factor auth.
The reason for WebAuthn being secondary to TOPT is that in that way,
users will still be able to log in using their code from their phone's
application if they don't have their security keys with them – or maybe
even lost them.
* We had to change a little the flow for setting up TOTP, given that now
it's possible to setting up again if you already had TOTP, in order to
let users modify their authenticator app – given that now it's not
possible for them to disable TOTP and set it up again with another
authenticator app.
So, basically, now instead of storing the new `otp_secret` in the
user, we store it in the session until the process of set up is
finished.
This was because, as it was before, when users clicked on 'Edit' in
the new two-factor methods lists page, but then went back without
finishing the flow, their `otp_secret` had been changed therefore
invalidating their previous authenticator app, making them unable to
log in again using TOTP.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* refactor: fix eslint errors
The PR build was failing given that linting returning some errors.
This commit attempts to fix them.
* refactor: normalize i18n translations
The build was failing given that i18n translations files were not
normalized.
This commits fixes that.
* refactor: avoid having the webauthn gem locked to a specific version
* refactor: use symbols for routes without '/'
* refactor: avoid sending webauthn disabled email when 2FA is disabled
When an admins disable 2FA for users, we were sending two mails
to them, one notifying that 2FA was disabled and the other to notify
that WebAuthn was disabled.
As the second one is redundant since the first email includes it, we can
remove it and send just one email to users.
* refactor: avoid creating new env variable for webauthn_origin config
* refactor: improve flash error messages for webauthn pages
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
2020-08-24 16:46:27 +02:00
|
|
|
def otp_enabled?
|
|
|
|
otp_required_for_login
|
|
|
|
end
|
|
|
|
|
|
|
|
def webauthn_enabled?
|
|
|
|
webauthn_credentials.any?
|
|
|
|
end
|
|
|
|
|
|
|
|
def two_factor_enabled?
|
|
|
|
otp_required_for_login? || webauthn_credentials.any?
|
|
|
|
end
|
|
|
|
|
2017-05-02 21:07:12 +02:00
|
|
|
def disable_two_factor!
|
|
|
|
self.otp_required_for_login = false
|
Add WebAuthn as an alternative 2FA method (#14466)
* feat: add possibility of adding WebAuthn security keys to use as 2FA
This adds a basic UI for enabling WebAuthn 2FA. We did a little refactor
to the Settings page for editing the 2FA methods – now it will list the
methods that are available to the user (TOTP and WebAuthn) and from
there they'll be able to add or remove any of them.
Also, it's worth mentioning that for enabling WebAuthn it's required to
have TOTP enabled, so the first time that you go to the 2FA Settings
page, you'll be asked to set it up.
This work was inspired by the one donde by Github in their platform, and
despite it could be approached in different ways, we decided to go with
this one given that we feel that this gives a great UX.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add request for WebAuthn as second factor at login if enabled
This commits adds the feature for using WebAuthn as a second factor for
login when enabled.
If users have WebAuthn enabled, now a page requesting for the use of a
WebAuthn credential for log in will appear, although a link redirecting
to the old page for logging in using a two-factor code will also be
present.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add possibility of deleting WebAuthn Credentials
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: disable WebAuthn when an Admin disables 2FA for a user
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: remove ability to disable TOTP leaving only WebAuthn as 2FA
Following examples form other platforms like Github, we decided to make
Webauthn 2FA secondary to 2FA with TOTP, so that we removed the
possibility of removing TOTP authentication only, leaving users with
just WEbAuthn as 2FA. Instead, users will have to click on 'Disable 2FA'
in order to remove second factor auth.
The reason for WebAuthn being secondary to TOPT is that in that way,
users will still be able to log in using their code from their phone's
application if they don't have their security keys with them – or maybe
even lost them.
* We had to change a little the flow for setting up TOTP, given that now
it's possible to setting up again if you already had TOTP, in order to
let users modify their authenticator app – given that now it's not
possible for them to disable TOTP and set it up again with another
authenticator app.
So, basically, now instead of storing the new `otp_secret` in the
user, we store it in the session until the process of set up is
finished.
This was because, as it was before, when users clicked on 'Edit' in
the new two-factor methods lists page, but then went back without
finishing the flow, their `otp_secret` had been changed therefore
invalidating their previous authenticator app, making them unable to
log in again using TOTP.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* refactor: fix eslint errors
The PR build was failing given that linting returning some errors.
This commit attempts to fix them.
* refactor: normalize i18n translations
The build was failing given that i18n translations files were not
normalized.
This commits fixes that.
* refactor: avoid having the webauthn gem locked to a specific version
* refactor: use symbols for routes without '/'
* refactor: avoid sending webauthn disabled email when 2FA is disabled
When an admins disable 2FA for users, we were sending two mails
to them, one notifying that 2FA was disabled and the other to notify
that WebAuthn was disabled.
As the second one is redundant since the first email includes it, we can
remove it and send just one email to users.
* refactor: avoid creating new env variable for webauthn_origin config
* refactor: improve flash error messages for webauthn pages
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
2020-08-24 16:46:27 +02:00
|
|
|
self.otp_secret = nil
|
2017-05-02 21:07:12 +02:00
|
|
|
otp_backup_codes&.clear
|
Add WebAuthn as an alternative 2FA method (#14466)
* feat: add possibility of adding WebAuthn security keys to use as 2FA
This adds a basic UI for enabling WebAuthn 2FA. We did a little refactor
to the Settings page for editing the 2FA methods – now it will list the
methods that are available to the user (TOTP and WebAuthn) and from
there they'll be able to add or remove any of them.
Also, it's worth mentioning that for enabling WebAuthn it's required to
have TOTP enabled, so the first time that you go to the 2FA Settings
page, you'll be asked to set it up.
This work was inspired by the one donde by Github in their platform, and
despite it could be approached in different ways, we decided to go with
this one given that we feel that this gives a great UX.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add request for WebAuthn as second factor at login if enabled
This commits adds the feature for using WebAuthn as a second factor for
login when enabled.
If users have WebAuthn enabled, now a page requesting for the use of a
WebAuthn credential for log in will appear, although a link redirecting
to the old page for logging in using a two-factor code will also be
present.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: add possibility of deleting WebAuthn Credentials
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: disable WebAuthn when an Admin disables 2FA for a user
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* feat: remove ability to disable TOTP leaving only WebAuthn as 2FA
Following examples form other platforms like Github, we decided to make
Webauthn 2FA secondary to 2FA with TOTP, so that we removed the
possibility of removing TOTP authentication only, leaving users with
just WEbAuthn as 2FA. Instead, users will have to click on 'Disable 2FA'
in order to remove second factor auth.
The reason for WebAuthn being secondary to TOPT is that in that way,
users will still be able to log in using their code from their phone's
application if they don't have their security keys with them – or maybe
even lost them.
* We had to change a little the flow for setting up TOTP, given that now
it's possible to setting up again if you already had TOTP, in order to
let users modify their authenticator app – given that now it's not
possible for them to disable TOTP and set it up again with another
authenticator app.
So, basically, now instead of storing the new `otp_secret` in the
user, we store it in the session until the process of set up is
finished.
This was because, as it was before, when users clicked on 'Edit' in
the new two-factor methods lists page, but then went back without
finishing the flow, their `otp_secret` had been changed therefore
invalidating their previous authenticator app, making them unable to
log in again using TOTP.
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
* refactor: fix eslint errors
The PR build was failing given that linting returning some errors.
This commit attempts to fix them.
* refactor: normalize i18n translations
The build was failing given that i18n translations files were not
normalized.
This commits fixes that.
* refactor: avoid having the webauthn gem locked to a specific version
* refactor: use symbols for routes without '/'
* refactor: avoid sending webauthn disabled email when 2FA is disabled
When an admins disable 2FA for users, we were sending two mails
to them, one notifying that 2FA was disabled and the other to notify
that WebAuthn was disabled.
As the second one is redundant since the first email includes it, we can
remove it and send just one email to users.
* refactor: avoid creating new env variable for webauthn_origin config
* refactor: improve flash error messages for webauthn pages
Co-authored-by: Facundo Padula <facundo.padula@cedarcode.com>
2020-08-24 16:46:27 +02:00
|
|
|
|
|
|
|
webauthn_credentials.destroy_all if webauthn_enabled?
|
|
|
|
|
2017-05-02 21:07:12 +02:00
|
|
|
save!
|
|
|
|
end
|
|
|
|
|
2017-02-06 23:16:20 +01:00
|
|
|
def setting_default_privacy
|
|
|
|
settings.default_privacy || (account.locked? ? 'private' : 'public')
|
|
|
|
end
|
2017-04-11 16:10:16 +02:00
|
|
|
|
2018-01-15 04:34:28 +01:00
|
|
|
def allows_digest_emails?
|
|
|
|
settings.notification_emails['digest']
|
|
|
|
end
|
|
|
|
|
2018-09-02 00:11:58 +02:00
|
|
|
def allows_report_emails?
|
|
|
|
settings.notification_emails['report']
|
|
|
|
end
|
|
|
|
|
2019-04-10 00:35:49 +02:00
|
|
|
def allows_pending_account_emails?
|
|
|
|
settings.notification_emails['pending_account']
|
|
|
|
end
|
|
|
|
|
2019-08-05 19:54:29 +02:00
|
|
|
def allows_trending_tag_emails?
|
|
|
|
settings.notification_emails['trending_tag']
|
|
|
|
end
|
|
|
|
|
2018-05-18 02:26:51 +02:00
|
|
|
def hides_network?
|
|
|
|
@hides_network ||= settings.hide_network
|
|
|
|
end
|
|
|
|
|
2018-12-09 13:03:01 +01:00
|
|
|
def aggregates_reblogs?
|
|
|
|
@aggregates_reblogs ||= settings.aggregate_reblogs
|
|
|
|
end
|
|
|
|
|
2019-02-02 19:18:15 +01:00
|
|
|
def shows_application?
|
2019-02-20 17:47:38 +01:00
|
|
|
@shows_application ||= settings.show_application
|
2019-02-02 19:18:15 +01:00
|
|
|
end
|
|
|
|
|
2020-09-01 03:04:00 +02:00
|
|
|
# rubocop:disable Naming/MethodParameterName
|
2017-08-22 18:33:57 +02:00
|
|
|
def token_for_app(a)
|
|
|
|
return nil if a.nil? || a.owner != self
|
2020-09-01 03:04:00 +02:00
|
|
|
Doorkeeper::AccessToken.find_or_create_by(application_id: a.id, resource_owner_id: id) do |t|
|
2017-08-22 18:33:57 +02:00
|
|
|
t.scopes = a.scopes
|
|
|
|
t.expires_in = Doorkeeper.configuration.access_token_expires_in
|
|
|
|
t.use_refresh_token = Doorkeeper.configuration.refresh_token_enabled?
|
|
|
|
end
|
|
|
|
end
|
2020-09-01 03:04:00 +02:00
|
|
|
# rubocop:enable Naming/MethodParameterName
|
2017-08-22 18:33:57 +02:00
|
|
|
|
2017-06-25 16:54:30 +02:00
|
|
|
def activate_session(request)
|
|
|
|
session_activations.activate(session_id: SecureRandom.hex,
|
|
|
|
user_agent: request.user_agent,
|
2017-08-30 10:24:30 +02:00
|
|
|
ip: request.remote_ip).session_id
|
2017-06-23 18:50:53 +02:00
|
|
|
end
|
|
|
|
|
2020-01-24 00:20:38 +01:00
|
|
|
def clear_other_sessions(id)
|
2017-06-23 18:50:53 +02:00
|
|
|
session_activations.exclusive(id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def session_active?(id)
|
|
|
|
session_activations.active? id
|
|
|
|
end
|
|
|
|
|
2017-07-13 22:15:32 +02:00
|
|
|
def web_push_subscription(session)
|
2018-05-11 11:49:12 +02:00
|
|
|
session.web_push_subscription.nil? ? nil : session.web_push_subscription
|
2017-07-13 22:15:32 +02:00
|
|
|
end
|
|
|
|
|
2017-11-27 16:07:59 +01:00
|
|
|
def invite_code=(code)
|
2018-08-26 19:22:46 +02:00
|
|
|
self.invite = Invite.find_by(code: code) if code.present?
|
2017-11-27 16:07:59 +01:00
|
|
|
@invite_code = code
|
|
|
|
end
|
|
|
|
|
2018-02-02 10:18:55 +01:00
|
|
|
def password_required?
|
2019-09-18 16:37:27 +02:00
|
|
|
return false if external?
|
|
|
|
|
2018-02-02 10:18:55 +01:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2020-06-09 10:23:06 +02:00
|
|
|
def external_or_valid_password?(compare_password)
|
|
|
|
# If encrypted_password is blank, we got the user from LDAP or PAM,
|
|
|
|
# so credentials are already valid
|
|
|
|
|
|
|
|
encrypted_password.blank? || valid_password?(compare_password)
|
|
|
|
end
|
|
|
|
|
2018-02-02 10:18:55 +01:00
|
|
|
def send_reset_password_instructions
|
2019-09-18 16:37:27 +02:00
|
|
|
return false if encrypted_password.blank?
|
|
|
|
|
2018-02-02 10:18:55 +01:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def reset_password!(new_password, new_password_confirmation)
|
2019-09-18 16:37:27 +02:00
|
|
|
return false if encrypted_password.blank?
|
|
|
|
|
2018-02-02 10:18:55 +01:00
|
|
|
super
|
|
|
|
end
|
|
|
|
|
2018-09-25 05:09:35 +02:00
|
|
|
def show_all_media?
|
|
|
|
setting_display_media == 'show_all'
|
|
|
|
end
|
|
|
|
|
|
|
|
def hide_all_media?
|
|
|
|
setting_display_media == 'hide_all'
|
|
|
|
end
|
|
|
|
|
2020-01-20 18:00:54 +01:00
|
|
|
def recent_ips
|
|
|
|
@recent_ips ||= begin
|
|
|
|
arr = []
|
|
|
|
|
|
|
|
session_activations.each do |session_activation|
|
|
|
|
arr << [session_activation.updated_at, session_activation.ip]
|
|
|
|
end
|
|
|
|
|
|
|
|
arr << [current_sign_in_at, current_sign_in_ip] if current_sign_in_ip.present?
|
|
|
|
arr << [last_sign_in_at, last_sign_in_ip] if last_sign_in_ip.present?
|
|
|
|
|
2020-01-25 05:22:35 +01:00
|
|
|
arr.sort_by { |pair| pair.first || Time.now.utc }.uniq(&:last).reverse!
|
2020-01-20 18:00:54 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-06-09 10:23:06 +02:00
|
|
|
def sign_in_token_expired?
|
|
|
|
sign_in_token_sent_at.nil? || sign_in_token_sent_at < 5.minutes.ago
|
|
|
|
end
|
|
|
|
|
|
|
|
def generate_sign_in_token
|
|
|
|
self.sign_in_token = Devise.friendly_token(6)
|
|
|
|
self.sign_in_token_sent_at = Time.now.utc
|
|
|
|
end
|
|
|
|
|
2017-05-30 15:28:56 +02:00
|
|
|
protected
|
|
|
|
|
|
|
|
def send_devise_notification(notification, *args)
|
Fix “Email changed” notification sometimes having wrong e-mail (#13475)
* Fix “Email changed” notification sometimes having wrong e-mail
Fixes #6778
The root of the issue is that `send_devise_notification` was called before
the changes were properly commited to the database, causing the mailer to
pick previous values if running too early.
Devise's documentation provides guidance on how to handle that[1][2], however,
I have found it to not be working, as the following happens, in that order:
- `send_devise_notification` is called for the `email_changed` notification.
In that case, `changed?` is false and `saved_changes?` is true, so
if we use the former, we have the same issue.
- the `after_commit` hook is called
- `send_devise_notification` is called for the `confirmation_instructions`
notification.
In that case, `changed?` is still false, and `saved_changes?` still true,
so if we use the latter, that second notification email is simply not
going to be sent (as we would be queuing the notification *after*
executing the after_commit hook).
This is because it may be called from either an `after_update` or
`after_commit` hook, the difference not being a call to `save` but the
transaction actually being committed to the database. This may arguably
be a bug in Devise, or Devise's notification.
The proposed workaround is inspired by Devise's documentation but checks
whether a transaction is open to make the call whether to immediately
send the notification or defer it to the `after_commit` hook.
[1]: https://www.rubydoc.info/github/plataformatec/devise/Devise%2FModels%2FAuthenticatable:send_devise_notification
[2]: https://github.com/heartcombo/devise/blob/406915cb781e38255a30ad2a0609e33952b9ec50/lib/devise/models/authenticatable.rb#L133-L194
* Fix cases when sending notifications without changing the model
* Defer sending if and only if in transaction including current record
2020-04-15 16:13:44 +02:00
|
|
|
# This method can be called in `after_update` and `after_commit` hooks,
|
|
|
|
# but we must make sure the mailer is actually called *after* commit,
|
|
|
|
# otherwise it may work on stale data. To do this, figure out if we are
|
|
|
|
# within a transaction.
|
|
|
|
if ActiveRecord::Base.connection.current_transaction.try(:records)&.include?(self)
|
|
|
|
pending_devise_notifications << [notification, args]
|
|
|
|
else
|
|
|
|
render_and_send_devise_message(notification, *args)
|
|
|
|
end
|
2017-05-30 15:28:56 +02:00
|
|
|
end
|
|
|
|
|
2017-05-08 03:32:52 +02:00
|
|
|
private
|
|
|
|
|
2020-06-09 10:23:06 +02:00
|
|
|
def recent_ip?(ip)
|
|
|
|
recent_ips.any? { |(_, recent_ip)| recent_ip == ip }
|
|
|
|
end
|
|
|
|
|
Fix “Email changed” notification sometimes having wrong e-mail (#13475)
* Fix “Email changed” notification sometimes having wrong e-mail
Fixes #6778
The root of the issue is that `send_devise_notification` was called before
the changes were properly commited to the database, causing the mailer to
pick previous values if running too early.
Devise's documentation provides guidance on how to handle that[1][2], however,
I have found it to not be working, as the following happens, in that order:
- `send_devise_notification` is called for the `email_changed` notification.
In that case, `changed?` is false and `saved_changes?` is true, so
if we use the former, we have the same issue.
- the `after_commit` hook is called
- `send_devise_notification` is called for the `confirmation_instructions`
notification.
In that case, `changed?` is still false, and `saved_changes?` still true,
so if we use the latter, that second notification email is simply not
going to be sent (as we would be queuing the notification *after*
executing the after_commit hook).
This is because it may be called from either an `after_update` or
`after_commit` hook, the difference not being a call to `save` but the
transaction actually being committed to the database. This may arguably
be a bug in Devise, or Devise's notification.
The proposed workaround is inspired by Devise's documentation but checks
whether a transaction is open to make the call whether to immediately
send the notification or defer it to the `after_commit` hook.
[1]: https://www.rubydoc.info/github/plataformatec/devise/Devise%2FModels%2FAuthenticatable:send_devise_notification
[2]: https://github.com/heartcombo/devise/blob/406915cb781e38255a30ad2a0609e33952b9ec50/lib/devise/models/authenticatable.rb#L133-L194
* Fix cases when sending notifications without changing the model
* Defer sending if and only if in transaction including current record
2020-04-15 16:13:44 +02:00
|
|
|
def send_pending_devise_notifications
|
|
|
|
pending_devise_notifications.each do |notification, args|
|
|
|
|
render_and_send_devise_message(notification, *args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Empty the pending notifications array because the
|
|
|
|
# after_commit hook can be called multiple times which
|
|
|
|
# could cause multiple emails to be sent.
|
|
|
|
pending_devise_notifications.clear
|
|
|
|
end
|
|
|
|
|
|
|
|
def pending_devise_notifications
|
|
|
|
@pending_devise_notifications ||= []
|
|
|
|
end
|
|
|
|
|
|
|
|
def render_and_send_devise_message(notification, *args)
|
|
|
|
devise_mailer.send(notification, self, *args).deliver_later
|
|
|
|
end
|
|
|
|
|
2019-03-14 05:28:30 +01:00
|
|
|
def set_approved
|
2019-05-19 21:40:36 +02:00
|
|
|
self.approved = open_registrations? || valid_invitation? || external?
|
2019-03-23 02:23:48 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
def open_registrations?
|
|
|
|
Setting.registrations_mode == 'open'
|
2019-03-14 05:28:30 +01:00
|
|
|
end
|
|
|
|
|
2019-04-25 02:49:25 +02:00
|
|
|
def external?
|
2019-04-27 23:55:16 +02:00
|
|
|
!!@external
|
2019-04-25 02:49:25 +02:00
|
|
|
end
|
|
|
|
|
2017-05-08 03:32:52 +02:00
|
|
|
def sanitize_languages
|
2018-06-17 13:54:02 +02:00
|
|
|
return if chosen_languages.nil?
|
|
|
|
chosen_languages.reject!(&:blank?)
|
|
|
|
self.chosen_languages = nil if chosen_languages.empty?
|
2017-05-08 03:32:52 +02:00
|
|
|
end
|
2017-12-29 19:52:04 +01:00
|
|
|
|
2018-01-23 20:52:30 +01:00
|
|
|
def prepare_new_user!
|
2017-12-29 19:52:04 +01:00
|
|
|
BootstrapTimelineWorker.perform_async(account_id)
|
|
|
|
ActivityTracker.increment('activity:accounts:local')
|
2018-01-18 19:17:25 +01:00
|
|
|
UserMailer.welcome(self).deliver_later
|
2017-12-29 19:52:04 +01:00
|
|
|
end
|
2018-01-23 20:52:30 +01:00
|
|
|
|
|
|
|
def prepare_returning_user!
|
|
|
|
ActivityTracker.record('activity:logins', id)
|
|
|
|
regenerate_feed! if needs_feed_update?
|
|
|
|
end
|
|
|
|
|
2019-03-14 05:28:30 +01:00
|
|
|
def notify_staff_about_pending_account!
|
2020-09-01 03:04:00 +02:00
|
|
|
User.staff.includes(:account).find_each do |u|
|
2019-04-10 00:35:49 +02:00
|
|
|
next unless u.allows_pending_account_emails?
|
2019-03-14 05:28:30 +01:00
|
|
|
AdminMailer.new_pending_account(u.account, self).deliver_later
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-23 20:52:30 +01:00
|
|
|
def regenerate_feed!
|
2019-01-18 01:02:51 +01:00
|
|
|
return unless Redis.current.setnx("account:#{account_id}:regeneration", true)
|
|
|
|
Redis.current.expire("account:#{account_id}:regeneration", 1.day.seconds)
|
2018-01-23 20:52:30 +01:00
|
|
|
RegenerationWorker.perform_async(account_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def needs_feed_update?
|
|
|
|
last_sign_in_at < ACTIVE_DURATION.ago
|
|
|
|
end
|
2018-12-10 22:53:25 +01:00
|
|
|
|
|
|
|
def validate_email_dns?
|
|
|
|
email_changed? && !(Rails.env.test? || Rails.env.development?)
|
|
|
|
end
|
2016-02-22 16:00:20 +01:00
|
|
|
end
|