Skip to content
Snippets Groups Projects

Bugfix/8807 cleanup tmp invites

Merged azul requested to merge bugfix/8807-cleanup-tmp-invites into master
2 files
+ 56
37
Compare changes
  • Side-by-side
  • Inline
Files
2
+ 45
37
@@ -25,61 +25,57 @@ class Account
@@ -25,61 +25,57 @@ class Account
# configuration by same name.
# configuration by same name.
#
#
def self.create(attrs, options={})
def self.create(attrs, options={})
 
User.new(attrs).tap do |user|
 
self.new(user).create(options)
 
end
 
end
 
 
def create(options={})
identity = nil
identity = nil
user = nil
user = User.new(attrs)
if options[:invite_required] == false
if options[:invite_required] == false
user.ignore_invites!
user.ignore_invites!
end
end
user.save
user.save
# this is not very atomic, but we do the best we can:
# this is not very atomic, but we do the best we can:
if !user.is_tmp? && user.persisted?
return unless user.persisted?
 
if !user.is_tmp?
identity = user.identity
identity = user.identity
identity.user_id = user.id
identity.user_id = user.id
identity.save
identity.save
identity.errors.each do |attr, msg|
identity.errors.each do |attr, msg|
user.errors.add(attr, msg)
user.errors.add(attr, msg)
end
end
if user.invite_required?
user_invite_code = InviteCode.find_by_invite_code user.invite_code
if user.is_test? && user_invite_code.max_uses == 1
user_invite_code.destroy
else
user_invite_code.invite_count += 1
user_invite_code.save
end
end
end
end
 
consume_invite_code if user.invite_required?
rescue VALIDATION_FAILED => ex
rescue VALIDATION_FAILED => ex
user.errors.add(:base, ex.to_s) if user
user.errors.add(:base, ex.to_s)
ensure
ensure
if creation_problem?(user, identity)
if creation_problem?(identity)
user.destroy if user && user.persisted?
user.destroy if user && user.persisted?
identity.destroy if identity && identity.persisted?
identity.destroy if identity && identity.persisted?
end
end
return user
end
end
def update(attrs)
def update(attrs)
if attrs[:password_verifier].present?
if attrs[:password_verifier].present?
update_login(attrs[:login])
update_login(attrs[:login])
@user.update_attributes attrs.slice(:password_verifier, :password_salt)
user.update_attributes attrs.slice(:password_verifier, :password_salt)
end
end
if attrs[:recovery_code_verifier].present?
if attrs[:recovery_code_verifier].present?
@user.update_attributes attrs.slice(:recovery_code_verifier, :recovery_code_salt)
user.update_attributes attrs.slice(:recovery_code_verifier, :recovery_code_salt)
end
end
# TODO: move into identity controller
# TODO: move into identity controller
key = update_pgp_key(attrs[:public_key])
key = update_pgp_key(attrs[:public_key])
@user.errors.set :public_key, key.errors.full_messages
user.errors.set :public_key, key.errors.full_messages
@user.save && save_identities
user.save && save_identities
@user.refresh_identity
user.refresh_identity
end
end
def destroy(release_handles=false)
def destroy(release_handles=false)
return unless @user
return unless user
if !@user.is_tmp?
if !user.is_tmp?
@user.identities.each do |id|
user.identities.each do |id|
if release_handles == false
if release_handles == false
id.orphan!
id.orphan!
else
else
@@ -87,44 +83,56 @@ class Account
@@ -87,44 +83,56 @@ class Account
end
end
end
end
end
end
@user.destroy
user.destroy
end
end
# when a user is disable, all their data and associations remain
# when a user is disable, all their data and associations remain
# in place, but the user should not be able to send email or
# in place, but the user should not be able to send email or
# create new authentication certificates.
# create new authentication certificates.
def disable
def disable
if @user && !@user.is_tmp?
if user && !user.is_tmp?
@user.enabled = false
user.enabled = false
@user.save
user.save
@user.identities.each do |id|
user.identities.each do |id|
id.disable!
id.disable!
end
end
end
end
end
end
def enable
def enable
@user.enabled = true
user.enabled = true
@user.save
user.save
@user.identities.each do |id|
user.identities.each do |id|
id.enable!
id.enable!
end
end
end
end
protected
protected
 
attr_reader :user
 
 
def consume_invite_code
 
invite_code = InviteCode.find_by_invite_code user.invite_code
 
if user.is_test? && invite_code.max_uses == 1
 
invite_code.destroy
 
else
 
invite_code.invite_count += 1
 
invite_code.save
 
end
 
end
 
def update_login(login)
def update_login(login)
return unless login.present?
return unless login.present?
@old_identity = Identity.for(@user)
@old_identity = Identity.for(user)
@user.login = login
user.login = login
@new_identity = Identity.for(@user) # based on the new login
@new_identity = Identity.for(user) # based on the new login
@old_identity.destination = @user.email_address # alias old -> new
@old_identity.destination = user.email_address # alias old -> new
end
end
def update_pgp_key(key)
def update_pgp_key(key)
PgpKey.new(key).tap do |key|
PgpKey.new(key).tap do |key|
if key.present? && key.valid?
if key.present? && key.valid?
@new_identity ||= Identity.for(@user)
@new_identity ||= Identity.for(user)
@new_identity.set_key(:pgp, key)
@new_identity.set_key(:pgp, key)
end
end
end
end
@@ -134,7 +142,7 @@ class Account
@@ -134,7 +142,7 @@ class Account
@new_identity.try(:save) && @old_identity.try(:save)
@new_identity.try(:save) && @old_identity.try(:save)
end
end
def self.creation_problem?(user, identity)
def creation_problem?(identity)
return true if user.nil? || !user.persisted? || user.errors.any?
return true if user.nil? || !user.persisted? || user.errors.any?
if !user.is_tmp?
if !user.is_tmp?
return true if identity.nil? || !identity.persisted? || identity.errors.any?
return true if identity.nil? || !identity.persisted? || identity.errors.any?
Loading