mastodon/app/models/account.rb

206 lines
7 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2016-08-17 17:56:23 +02:00
class Account < ApplicationRecord
include Targetable
include PgSearch
2016-11-07 17:35:25 +01:00
MENTION_RE = /(?:^|[^\/\w])@([a-z0-9_]+(?:@[a-z0-9\.\-]+)?)/i
2016-09-29 21:28:21 +02:00
IMAGE_MIME_TYPES = ['image/jpeg', 'image/png', 'image/gif'].freeze
2016-02-22 16:00:20 +01:00
# Local users
has_one :user, inverse_of: :account
validates :username, presence: true, format: { with: /\A[a-z0-9_]+\z/i, message: 'only letters, numbers and underscores' }, uniqueness: { scope: :domain, case_sensitive: false }, length: { maximum: 30 }, if: 'local?'
validates :username, presence: true, uniqueness: { scope: :domain, case_sensitive: true }, unless: 'local?'
2016-02-22 16:00:20 +01:00
# Avatar upload
has_attached_file :avatar, styles: { original: '120x120#' }, convert_options: { all: '-quality 80 -strip' }
validates_attachment_content_type :avatar, content_type: IMAGE_MIME_TYPES
validates_attachment_size :avatar, less_than: 2.megabytes
# Header upload
has_attached_file :header, styles: { original: '700x335#' }, convert_options: { all: '-quality 80 -strip' }
validates_attachment_content_type :header, content_type: IMAGE_MIME_TYPES
validates_attachment_size :header, less_than: 2.megabytes
2016-03-16 11:18:09 +01:00
# Local user profile validations
validates :display_name, length: { maximum: 30 }, if: 'local?'
validates :note, length: { maximum: 160 }, if: 'local?'
2016-03-16 11:18:09 +01:00
2016-02-22 16:00:20 +01:00
# Timelines
2016-10-09 14:48:43 +02:00
has_many :stream_entries, inverse_of: :account, dependent: :destroy
has_many :statuses, inverse_of: :account, dependent: :destroy
has_many :favourites, inverse_of: :account, dependent: :destroy
has_many :mentions, inverse_of: :account, dependent: :destroy
has_many :notifications, inverse_of: :account, dependent: :destroy
2016-02-20 22:53:20 +01:00
2016-02-22 16:00:20 +01:00
# Follow relations
has_many :follow_requests, dependent: :destroy
2016-02-22 16:00:20 +01:00
has_many :active_relationships, class_name: 'Follow', foreign_key: 'account_id', dependent: :destroy
has_many :passive_relationships, class_name: 'Follow', foreign_key: 'target_account_id', dependent: :destroy
2016-11-04 19:12:59 +01:00
has_many :following, -> { order('follows.id desc') }, through: :active_relationships, source: :target_account
has_many :followers, -> { order('follows.id desc') }, through: :passive_relationships, source: :account
# Block relationships
has_many :block_relationships, class_name: 'Block', foreign_key: 'account_id', dependent: :destroy
2016-11-04 19:12:59 +01:00
has_many :blocking, -> { order('blocks.id desc') }, through: :block_relationships, source: :target_account
2016-02-22 16:00:20 +01:00
2016-11-28 13:36:47 +01:00
# Media
2016-09-05 17:46:36 +02:00
has_many :media_attachments, dependent: :destroy
2016-11-28 13:36:47 +01:00
# PuSH subscriptions
has_many :subscriptions, dependent: :destroy
pg_search_scope :search_for, against: { username: 'A', domain: 'B' },
using: { tsearch: { prefix: true } }
scope :remote, -> { where.not(domain: nil) }
scope :local, -> { where(domain: nil) }
scope :without_followers, -> { where('(select count(f.id) from follows as f where f.target_account_id = accounts.id) = 0') }
scope :with_followers, -> { where('(select count(f.id) from follows as f where f.target_account_id = accounts.id) > 0') }
scope :expiring, ->(time) { where(subscription_expires_at: nil).or(where('subscription_expires_at < ?', time)).remote.with_followers }
scope :silenced, -> { where(silenced: true) }
scope :suspended, -> { where(suspended: true) }
2017-01-08 02:55:40 +01:00
scope :recent, -> { reorder(id: :desc) }
scope :alphabetic, -> { order(domain: :asc, username: :asc) }
2016-02-22 16:00:20 +01:00
def follow!(other_account)
2016-09-29 21:28:21 +02:00
active_relationships.where(target_account: other_account).first_or_create!(target_account: other_account)
2016-02-22 16:00:20 +01:00
end
def block!(other_account)
block_relationships.where(target_account: other_account).first_or_create!(target_account: other_account)
end
2016-02-22 16:00:20 +01:00
def unfollow!(other_account)
2016-09-29 21:28:21 +02:00
follow = active_relationships.find_by(target_account: other_account)
follow&.destroy
2016-02-22 16:00:20 +01:00
end
def unblock!(other_account)
block = block_relationships.find_by(target_account: other_account)
block&.destroy
end
2016-02-22 16:00:20 +01:00
def following?(other_account)
following.include?(other_account)
end
def blocking?(other_account)
blocking.include?(other_account)
end
def requested?(other_account)
follow_requests.where(target_account: other_account).exists?
end
2016-02-22 16:00:20 +01:00
def local?
2016-09-29 21:28:21 +02:00
domain.nil?
2016-02-22 16:00:20 +01:00
end
2016-02-22 18:10:30 +01:00
def acct
2016-09-29 21:28:21 +02:00
local? ? username : "#{username}@#{domain}"
2016-02-22 18:10:30 +01:00
end
def subscribed?
2016-09-29 21:28:21 +02:00
!subscription_expires_at.nil?
2016-02-22 18:10:30 +01:00
end
def favourited?(status)
(status.reblog? ? status.reblog : status).favourites.where(account: self).count.positive?
end
def reblogged?(status)
(status.reblog? ? status.reblog : status).reblogs.where(account: self).count.positive?
end
2016-02-22 16:00:20 +01:00
def keypair
2016-09-29 21:28:21 +02:00
private_key.nil? ? OpenSSL::PKey::RSA.new(public_key) : OpenSSL::PKey::RSA.new(private_key)
2016-02-22 16:00:20 +01:00
end
2016-02-20 22:53:20 +01:00
def subscription(webhook_url)
2016-09-29 21:28:21 +02:00
OStatus2::Subscription.new(remote_url, secret: secret, lease_seconds: 86_400 * 30, webhook: webhook_url, hub: hub_url)
2016-02-20 22:53:20 +01:00
end
2016-02-26 15:28:08 +01:00
def save_with_optional_avatar!
save!
rescue ActiveRecord::RecordInvalid => invalid
if invalid.record.errors[:avatar_file_size] || invalid[:avatar_content_type]
self.avatar = nil
retry
end
raise invalid
end
def avatar_remote_url=(url)
parsed_url = URI.parse(url)
return if !%w(http https).include?(parsed_url.scheme) || self[:avatar_remote_url] == url
self.avatar = parsed_url
self[:avatar_remote_url] = url
rescue OpenURI::HTTPError => e
Rails.logger.debug "Error fetching remote avatar: #{e}"
end
def object_type
:person
end
def to_param
2016-09-29 21:28:21 +02:00
username
end
class << self
def find_local!(username)
find_remote!(username, nil)
end
2016-09-04 21:06:04 +02:00
def find_remote!(username, domain)
where(arel_table[:username].matches(username.gsub(/[%_]/, '\\\\\0'))).where(domain.nil? ? { domain: nil } : arel_table[:domain].matches(domain.gsub(/[%_]/, '\\\\\0'))).take!
end
def find_local(username)
find_local!(username)
rescue ActiveRecord::RecordNotFound
nil
end
def find_remote(username, domain)
find_remote!(username, domain)
rescue ActiveRecord::RecordNotFound
nil
end
2016-09-04 21:06:04 +02:00
def following_map(target_account_ids, account_id)
follow_mapping(Follow.where(target_account_id: target_account_ids, account_id: account_id), :target_account_id)
end
def followed_by_map(target_account_ids, account_id)
follow_mapping(Follow.where(account_id: target_account_ids, target_account_id: account_id), :account_id)
end
def blocking_map(target_account_ids, account_id)
follow_mapping(Block.where(target_account_id: target_account_ids, account_id: account_id), :target_account_id)
end
def requested_map(target_account_ids, account_id)
follow_mapping(FollowRequest.where(target_account_id: target_account_ids, account_id: account_id), :target_account_id)
end
private def follow_mapping(query, field)
query.pluck(field).inject({}) { |mapping, id| mapping[id] = true }
end
end
2016-02-26 15:28:08 +01:00
before_create do
if local?
keypair = OpenSSL::PKey::RSA.new(Rails.env.test? ? 1024 : 2048)
2016-02-26 15:28:08 +01:00
self.private_key = keypair.to_pem
self.public_key = keypair.public_key.to_pem
end
end
2016-02-20 22:53:20 +01:00
end