2016-11-15 15:56:29 +00:00
|
|
|
# frozen_string_literal: true
|
2017-05-02 01:14:47 +01:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: accounts
|
|
|
|
#
|
2017-11-17 23:16:48 +00:00
|
|
|
# id :integer not null, primary key
|
2017-05-02 01:14:47 +01:00
|
|
|
# username :string default(""), not null
|
|
|
|
# domain :string
|
|
|
|
# secret :string default(""), not null
|
|
|
|
# private_key :text
|
|
|
|
# public_key :text default(""), not null
|
|
|
|
# remote_url :string default(""), not null
|
|
|
|
# salmon_url :string default(""), not null
|
|
|
|
# hub_url :string default(""), not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# note :text default(""), not null
|
|
|
|
# display_name :string default(""), not null
|
|
|
|
# uri :string default(""), not null
|
|
|
|
# url :string
|
|
|
|
# avatar_file_name :string
|
|
|
|
# avatar_content_type :string
|
|
|
|
# avatar_file_size :integer
|
|
|
|
# avatar_updated_at :datetime
|
|
|
|
# header_file_name :string
|
|
|
|
# header_content_type :string
|
|
|
|
# header_file_size :integer
|
|
|
|
# header_updated_at :datetime
|
|
|
|
# avatar_remote_url :string
|
|
|
|
# subscription_expires_at :datetime
|
|
|
|
# silenced :boolean default(FALSE), not null
|
|
|
|
# suspended :boolean default(FALSE), not null
|
|
|
|
# locked :boolean default(FALSE), not null
|
|
|
|
# header_remote_url :string default(""), not null
|
|
|
|
# statuses_count :integer default(0), not null
|
|
|
|
# followers_count :integer default(0), not null
|
|
|
|
# following_count :integer default(0), not null
|
|
|
|
# last_webfingered_at :datetime
|
2017-07-19 16:06:46 +01:00
|
|
|
# inbox_url :string default(""), not null
|
|
|
|
# outbox_url :string default(""), not null
|
|
|
|
# shared_inbox_url :string default(""), not null
|
|
|
|
# followers_url :string default(""), not null
|
|
|
|
# protocol :integer default("ostatus"), not null
|
2017-11-07 18:06:44 +00:00
|
|
|
# memorial :boolean default(FALSE), not null
|
2017-11-18 18:39:02 +00:00
|
|
|
# moved_to_account_id :integer
|
2017-05-02 01:14:47 +01:00
|
|
|
#
|
2016-11-15 15:56:29 +00:00
|
|
|
|
2016-08-17 16:56:23 +01:00
|
|
|
class Account < ApplicationRecord
|
2017-11-07 18:08:14 +00:00
|
|
|
MENTION_RE = /(?<=^|[^\/[:word:]])@(([a-z0-9_]+)(?:@[a-z0-9\.\-]+[a-z0-9]+)?)/i
|
2017-05-05 20:37:02 +01:00
|
|
|
|
|
|
|
include AccountAvatar
|
2017-05-31 19:28:45 +01:00
|
|
|
include AccountFinderConcern
|
2017-05-05 20:37:02 +01:00
|
|
|
include AccountHeader
|
Account domain blocks (#2381)
* Add <ostatus:conversation /> tag to Atom input/output
Only uses ref attribute (not href) because href would be
the alternate link that's always included also.
Creates new conversation for every non-reply status. Carries
over conversation for every reply. Keeps remote URIs verbatim,
generates local URIs on the fly like the rest of them.
* Conversation muting - prevents notifications that reference a conversation
(including replies, favourites, reblogs) from being created. API endpoints
/api/v1/statuses/:id/mute and /api/v1/statuses/:id/unmute
Currently no way to tell when a status/conversation is muted, so the web UI
only has a "disable notifications" button, doesn't work as a toggle
* Display "Dismiss notifications" on all statuses in notifications column, not just own
* Add "muted" as a boolean attribute on statuses JSON
For now always false on contained reblogs, since it's only relevant for
statuses returned from the notifications endpoint, which are not nested
Remove "Disable notifications" from detailed status view, since it's
only relevant in the notifications column
* Up max class length
* Remove pending test for conversation mute
* Add tests, clean up
* Rename to "mute conversation" and "unmute conversation"
* Raise validation error when trying to mute/unmute status without conversation
* Adding account domain blocks that filter notifications and public timelines
* Add tests for domain blocks in notifications, public timelines
Filter reblogs of blocked domains from home
* Add API for listing and creating account domain blocks
* API for creating/deleting domain blocks, tests for Status#ancestors
and Status#descendants, filter domain blocks from them
* Filter domains in streaming API
* Update account_domain_block_spec.rb
2017-05-19 00:14:30 +01:00
|
|
|
include AccountInteractions
|
2017-05-05 20:37:02 +01:00
|
|
|
include Attachmentable
|
2017-05-18 14:43:10 +01:00
|
|
|
include Remotable
|
2017-11-17 23:16:48 +00:00
|
|
|
include Paginable
|
2016-09-12 17:22:43 +01:00
|
|
|
|
2017-09-11 01:43:52 +01:00
|
|
|
MAX_NOTE_LENGTH = 500
|
|
|
|
|
2017-07-19 16:06:46 +01:00
|
|
|
enum protocol: [:ostatus, :activitypub]
|
|
|
|
|
2016-02-22 15:00:20 +00:00
|
|
|
# Local users
|
|
|
|
has_one :user, inverse_of: :account
|
|
|
|
|
2017-05-07 15:40:57 +01:00
|
|
|
validates :username, presence: true
|
2017-06-08 14:22:01 +01:00
|
|
|
|
|
|
|
# Remote user validations
|
2017-06-11 16:01:32 +01:00
|
|
|
validates :username, uniqueness: { scope: :domain, case_sensitive: true }, if: -> { !local? && will_save_change_to_username? }
|
2017-05-07 15:40:57 +01:00
|
|
|
|
|
|
|
# Local user validations
|
2017-06-11 16:01:32 +01:00
|
|
|
validates :username, format: { with: /\A[a-z0-9_]+\z/i }, uniqueness: { scope: :domain, case_sensitive: false }, length: { maximum: 30 }, if: -> { local? && will_save_change_to_username? }
|
|
|
|
validates_with UnreservedUsernameValidator, if: -> { local? && will_save_change_to_username? }
|
|
|
|
validates :display_name, length: { maximum: 30 }, if: -> { local? && will_save_change_to_display_name? }
|
2017-06-26 04:23:53 +01:00
|
|
|
validate :note_length_does_not_exceed_length_limit, if: -> { local? && will_save_change_to_note? }
|
2016-03-16 10:18:09 +00:00
|
|
|
|
2016-02-22 15:00:20 +00:00
|
|
|
# Timelines
|
2016-10-09 13:48:43 +01:00
|
|
|
has_many :stream_entries, inverse_of: :account, dependent: :destroy
|
|
|
|
has_many :statuses, inverse_of: :account, dependent: :destroy
|
|
|
|
has_many :favourites, inverse_of: :account, dependent: :destroy
|
|
|
|
has_many :mentions, inverse_of: :account, dependent: :destroy
|
2016-11-21 13:59:13 +00:00
|
|
|
has_many :notifications, inverse_of: :account, dependent: :destroy
|
2016-02-20 21:53:20 +00:00
|
|
|
|
2017-08-25 00:41:18 +01:00
|
|
|
# Pinned statuses
|
|
|
|
has_many :status_pins, inverse_of: :account, dependent: :destroy
|
2017-08-25 17:50:52 +01:00
|
|
|
has_many :pinned_statuses, -> { reorder('status_pins.created_at DESC') }, through: :status_pins, class_name: 'Status', source: :status
|
2017-08-25 00:41:18 +01:00
|
|
|
|
2016-11-28 12:36:47 +00:00
|
|
|
# Media
|
2016-09-05 16:46:36 +01:00
|
|
|
has_many :media_attachments, dependent: :destroy
|
|
|
|
|
2016-11-28 12:36:47 +00:00
|
|
|
# PuSH subscriptions
|
|
|
|
has_many :subscriptions, dependent: :destroy
|
|
|
|
|
2017-04-18 18:36:18 +01:00
|
|
|
# Report relationships
|
|
|
|
has_many :reports
|
|
|
|
has_many :targeted_reports, class_name: 'Report', foreign_key: :target_account_id
|
|
|
|
|
2017-10-07 19:26:43 +01:00
|
|
|
# Moderation notes
|
2017-10-10 12:12:17 +01:00
|
|
|
has_many :account_moderation_notes, dependent: :destroy
|
|
|
|
has_many :targeted_moderation_notes, class_name: 'AccountModerationNote', foreign_key: :target_account_id, dependent: :destroy
|
2017-10-07 19:26:43 +01:00
|
|
|
|
2017-11-17 23:16:48 +00:00
|
|
|
# Lists
|
|
|
|
has_many :list_accounts, inverse_of: :account, dependent: :destroy
|
|
|
|
has_many :lists, through: :list_accounts
|
|
|
|
|
2017-11-18 18:39:02 +00:00
|
|
|
# Account migrations
|
|
|
|
belongs_to :moved_to_account, class_name: 'Account'
|
|
|
|
|
2016-09-19 23:39:03 +01:00
|
|
|
scope :remote, -> { where.not(domain: nil) }
|
|
|
|
scope :local, -> { where(domain: nil) }
|
2017-05-05 01:23:01 +01:00
|
|
|
scope :without_followers, -> { where(followers_count: 0) }
|
|
|
|
scope :with_followers, -> { where('followers_count > 0') }
|
2017-08-21 16:32:41 +01:00
|
|
|
scope :expiring, ->(time) { remote.where.not(subscription_expires_at: nil).where('subscription_expires_at < ?', time) }
|
2017-05-05 01:23:01 +01:00
|
|
|
scope :partitioned, -> { order('row_number() over (partition by domain)') }
|
2016-12-06 17:22:59 +00:00
|
|
|
scope :silenced, -> { where(silenced: true) }
|
|
|
|
scope :suspended, -> { where(suspended: true) }
|
2017-01-08 01:55:40 +00:00
|
|
|
scope :recent, -> { reorder(id: :desc) }
|
|
|
|
scope :alphabetic, -> { order(domain: :asc, username: :asc) }
|
2017-04-18 20:09:07 +01:00
|
|
|
scope :by_domain_accounts, -> { group(:domain).select(:domain, 'COUNT(*) AS accounts_count').order('accounts_count desc') }
|
2017-05-22 20:50:58 +01:00
|
|
|
scope :matches_username, ->(value) { where(arel_table[:username].matches("#{value}%")) }
|
|
|
|
scope :matches_display_name, ->(value) { where(arel_table[:display_name].matches("#{value}%")) }
|
2017-09-13 11:30:07 +01:00
|
|
|
scope :matches_domain, ->(value) { where(arel_table[:domain].matches("%#{value}%")) }
|
2016-10-16 17:57:54 +01:00
|
|
|
|
2017-04-28 14:12:37 +01:00
|
|
|
delegate :email,
|
2017-05-01 15:31:02 +01:00
|
|
|
:current_sign_in_ip,
|
|
|
|
:current_sign_in_at,
|
|
|
|
:confirmed?,
|
2017-08-16 16:12:58 +01:00
|
|
|
:admin?,
|
2017-11-17 00:22:38 +00:00
|
|
|
:moderator?,
|
|
|
|
:staff?,
|
2017-05-08 22:10:50 +01:00
|
|
|
:locale,
|
2017-05-01 15:31:02 +01:00
|
|
|
to: :user,
|
|
|
|
prefix: true,
|
|
|
|
allow_nil: true
|
2017-04-28 14:12:37 +01:00
|
|
|
|
2017-05-20 16:32:44 +01:00
|
|
|
delegate :filtered_languages, to: :user, prefix: false, allow_nil: true
|
2017-05-01 16:42:13 +01:00
|
|
|
|
2016-02-22 15:00:20 +00:00
|
|
|
def local?
|
2016-09-29 20:28:21 +01:00
|
|
|
domain.nil?
|
2016-02-22 15:00:20 +00:00
|
|
|
end
|
|
|
|
|
2017-11-18 18:39:02 +00:00
|
|
|
def moved?
|
|
|
|
moved_to_account_id.present?
|
|
|
|
end
|
|
|
|
|
2016-02-22 17:10:30 +00:00
|
|
|
def acct
|
2016-09-29 20:28:21 +01:00
|
|
|
local? ? username : "#{username}@#{domain}"
|
2016-02-22 17:10:30 +00:00
|
|
|
end
|
|
|
|
|
2017-04-10 21:58:06 +01:00
|
|
|
def local_username_and_domain
|
|
|
|
"#{username}@#{Rails.configuration.x.local_domain}"
|
|
|
|
end
|
|
|
|
|
|
|
|
def to_webfinger_s
|
|
|
|
"acct:#{local_username_and_domain}"
|
|
|
|
end
|
|
|
|
|
2016-02-22 17:10:30 +00:00
|
|
|
def subscribed?
|
2017-05-03 18:13:04 +01:00
|
|
|
subscription_expires_at.present?
|
2016-02-22 17:10:30 +00:00
|
|
|
end
|
|
|
|
|
2017-09-28 16:50:14 +01:00
|
|
|
def possibly_stale?
|
|
|
|
last_webfingered_at.nil? || last_webfingered_at <= 1.day.ago
|
|
|
|
end
|
|
|
|
|
|
|
|
def refresh!
|
|
|
|
return if local?
|
|
|
|
ResolveRemoteAccountService.new.call(acct)
|
|
|
|
end
|
|
|
|
|
2017-11-07 18:06:44 +00:00
|
|
|
def unsuspend!
|
|
|
|
transaction do
|
|
|
|
user&.enable! if local?
|
|
|
|
update!(suspended: false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def memorialize!
|
|
|
|
transaction do
|
|
|
|
user&.disable! if local?
|
|
|
|
update!(memorial: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-02-22 15:00:20 +00:00
|
|
|
def keypair
|
2017-08-21 16:32:41 +01:00
|
|
|
@keypair ||= OpenSSL::PKey::RSA.new(private_key || public_key)
|
2016-02-22 15:00:20 +00:00
|
|
|
end
|
|
|
|
|
2017-12-06 06:04:49 +00:00
|
|
|
def magic_key
|
|
|
|
modulus, exponent = [keypair.public_key.n, keypair.public_key.e].map do |component|
|
|
|
|
result = []
|
|
|
|
|
|
|
|
until component.zero?
|
|
|
|
result << [component % 256].pack('C')
|
|
|
|
component >>= 8
|
|
|
|
end
|
|
|
|
|
|
|
|
result.reverse.join
|
|
|
|
end
|
|
|
|
|
|
|
|
(['RSA'] + [modulus, exponent].map { |n| Base64.urlsafe_encode64(n) }).join('.')
|
|
|
|
end
|
|
|
|
|
2016-02-20 21:53:20 +00:00
|
|
|
def subscription(webhook_url)
|
2017-08-21 16:32:41 +01:00
|
|
|
@subscription ||= OStatus2::Subscription.new(remote_url, secret: secret, webhook: webhook_url, hub: hub_url)
|
2016-02-20 21:53:20 +00:00
|
|
|
end
|
2016-02-26 14:28:08 +00:00
|
|
|
|
2017-05-05 20:37:02 +01:00
|
|
|
def save_with_optional_media!
|
2016-12-02 13:14:49 +00:00
|
|
|
save!
|
2017-01-19 01:14:57 +00:00
|
|
|
rescue ActiveRecord::RecordInvalid
|
2017-01-19 08:37:07 +00:00
|
|
|
self.avatar = nil
|
2017-03-18 21:51:20 +00:00
|
|
|
self.header = nil
|
2017-01-19 08:37:07 +00:00
|
|
|
self[:avatar_remote_url] = ''
|
2017-03-18 21:51:20 +00:00
|
|
|
self[:header_remote_url] = ''
|
2017-01-19 01:14:57 +00:00
|
|
|
save!
|
2016-02-28 13:33:13 +00:00
|
|
|
end
|
|
|
|
|
2016-03-25 01:13:30 +00:00
|
|
|
def object_type
|
|
|
|
:person
|
|
|
|
end
|
|
|
|
|
2016-02-29 18:42:08 +00:00
|
|
|
def to_param
|
2016-09-29 20:28:21 +01:00
|
|
|
username
|
2016-02-29 18:42:08 +00:00
|
|
|
end
|
|
|
|
|
2017-04-28 14:10:41 +01:00
|
|
|
def excluded_from_timeline_account_ids
|
|
|
|
Rails.cache.fetch("exclude_account_ids_for:#{id}") { blocking.pluck(:target_account_id) + blocked_by.pluck(:account_id) + muting.pluck(:target_account_id) }
|
|
|
|
end
|
|
|
|
|
Account domain blocks (#2381)
* Add <ostatus:conversation /> tag to Atom input/output
Only uses ref attribute (not href) because href would be
the alternate link that's always included also.
Creates new conversation for every non-reply status. Carries
over conversation for every reply. Keeps remote URIs verbatim,
generates local URIs on the fly like the rest of them.
* Conversation muting - prevents notifications that reference a conversation
(including replies, favourites, reblogs) from being created. API endpoints
/api/v1/statuses/:id/mute and /api/v1/statuses/:id/unmute
Currently no way to tell when a status/conversation is muted, so the web UI
only has a "disable notifications" button, doesn't work as a toggle
* Display "Dismiss notifications" on all statuses in notifications column, not just own
* Add "muted" as a boolean attribute on statuses JSON
For now always false on contained reblogs, since it's only relevant for
statuses returned from the notifications endpoint, which are not nested
Remove "Disable notifications" from detailed status view, since it's
only relevant in the notifications column
* Up max class length
* Remove pending test for conversation mute
* Add tests, clean up
* Rename to "mute conversation" and "unmute conversation"
* Raise validation error when trying to mute/unmute status without conversation
* Adding account domain blocks that filter notifications and public timelines
* Add tests for domain blocks in notifications, public timelines
Filter reblogs of blocked domains from home
* Add API for listing and creating account domain blocks
* API for creating/deleting domain blocks, tests for Status#ancestors
and Status#descendants, filter domain blocks from them
* Filter domains in streaming API
* Update account_domain_block_spec.rb
2017-05-19 00:14:30 +01:00
|
|
|
def excluded_from_timeline_domains
|
|
|
|
Rails.cache.fetch("exclude_domains_for:#{id}") { domain_blocks.pluck(:domain) }
|
|
|
|
end
|
|
|
|
|
2017-11-30 02:50:05 +00:00
|
|
|
def preferred_inbox_url
|
|
|
|
shared_inbox_url.presence || inbox_url
|
|
|
|
end
|
|
|
|
|
2016-11-09 16:48:44 +00:00
|
|
|
class << self
|
2017-09-11 23:16:03 +01:00
|
|
|
def readonly_attributes
|
|
|
|
super - %w(statuses_count following_count followers_count)
|
|
|
|
end
|
|
|
|
|
2017-06-22 17:34:27 +01:00
|
|
|
def domains
|
|
|
|
reorder(nil).pluck('distinct accounts.domain')
|
|
|
|
end
|
|
|
|
|
2017-08-12 23:44:41 +01:00
|
|
|
def inboxes
|
2017-09-29 02:16:20 +01:00
|
|
|
urls = reorder(nil).where(protocol: :activitypub).pluck("distinct coalesce(nullif(accounts.shared_inbox_url, ''), accounts.inbox_url)")
|
|
|
|
DeliveryFailureTracker.filter(urls)
|
2017-08-12 23:44:41 +01:00
|
|
|
end
|
|
|
|
|
2017-05-16 11:06:38 +01:00
|
|
|
def triadic_closures(account, limit: 5, offset: 0)
|
2017-04-09 13:45:01 +01:00
|
|
|
sql = <<-SQL.squish
|
2017-03-16 19:10:51 +00:00
|
|
|
WITH first_degree AS (
|
2017-05-16 11:06:38 +01:00
|
|
|
SELECT target_account_id
|
|
|
|
FROM follows
|
|
|
|
WHERE account_id = :account_id
|
|
|
|
)
|
2017-03-16 19:10:51 +00:00
|
|
|
SELECT accounts.*
|
|
|
|
FROM follows
|
|
|
|
INNER JOIN accounts ON follows.target_account_id = accounts.id
|
2017-05-16 11:06:38 +01:00
|
|
|
WHERE
|
|
|
|
account_id IN (SELECT * FROM first_degree)
|
|
|
|
AND target_account_id NOT IN (SELECT * FROM first_degree)
|
|
|
|
AND target_account_id NOT IN (:excluded_account_ids)
|
2017-06-14 17:01:27 +01:00
|
|
|
AND accounts.suspended = false
|
2017-03-16 19:10:51 +00:00
|
|
|
GROUP BY target_account_id, accounts.id
|
|
|
|
ORDER BY count(account_id) DESC
|
2017-05-16 11:06:38 +01:00
|
|
|
OFFSET :offset
|
2017-04-18 00:21:55 +01:00
|
|
|
LIMIT :limit
|
2017-04-09 13:45:01 +01:00
|
|
|
SQL
|
2017-03-16 19:10:51 +00:00
|
|
|
|
2017-05-16 11:06:38 +01:00
|
|
|
excluded_account_ids = account.excluded_from_timeline_account_ids + [account.id]
|
|
|
|
|
2017-04-18 00:21:55 +01:00
|
|
|
find_by_sql(
|
2017-05-16 11:06:38 +01:00
|
|
|
[sql, { account_id: account.id, excluded_account_ids: excluded_account_ids, limit: limit, offset: offset }]
|
2017-04-18 00:21:55 +01:00
|
|
|
)
|
2017-03-16 19:10:51 +00:00
|
|
|
end
|
|
|
|
|
2017-03-17 19:47:38 +00:00
|
|
|
def search_for(terms, limit = 10)
|
2017-05-07 15:40:57 +01:00
|
|
|
textsearch, query = generate_query_for_search(terms)
|
2017-03-17 19:47:38 +00:00
|
|
|
|
2017-04-09 13:45:01 +01:00
|
|
|
sql = <<-SQL.squish
|
2017-03-17 19:47:38 +00:00
|
|
|
SELECT
|
|
|
|
accounts.*,
|
|
|
|
ts_rank_cd(#{textsearch}, #{query}, 32) AS rank
|
|
|
|
FROM accounts
|
|
|
|
WHERE #{query} @@ #{textsearch}
|
2017-06-14 17:01:27 +01:00
|
|
|
AND accounts.suspended = false
|
2017-03-17 19:47:38 +00:00
|
|
|
ORDER BY rank DESC
|
|
|
|
LIMIT ?
|
2017-04-09 13:45:01 +01:00
|
|
|
SQL
|
2017-03-17 19:47:38 +00:00
|
|
|
|
2017-05-07 15:40:57 +01:00
|
|
|
find_by_sql([sql, limit])
|
2017-03-17 19:47:38 +00:00
|
|
|
end
|
|
|
|
|
2017-12-05 22:02:27 +00:00
|
|
|
def advanced_search_for(terms, account, limit = 10, following = false)
|
2017-05-07 15:40:57 +01:00
|
|
|
textsearch, query = generate_query_for_search(terms)
|
2017-03-17 19:47:38 +00:00
|
|
|
|
2017-12-05 22:02:27 +00:00
|
|
|
if following
|
|
|
|
sql = <<-SQL.squish
|
|
|
|
WITH first_degree AS (
|
|
|
|
SELECT target_account_id
|
|
|
|
FROM follows
|
|
|
|
WHERE account_id = ?
|
|
|
|
)
|
|
|
|
SELECT
|
|
|
|
accounts.*,
|
|
|
|
(count(f.id) + 1) * ts_rank_cd(#{textsearch}, #{query}, 32) AS rank
|
|
|
|
FROM accounts
|
|
|
|
LEFT OUTER JOIN follows AS f ON (accounts.id = f.account_id AND f.target_account_id = ?) OR (accounts.id = f.target_account_id AND f.account_id = ?)
|
|
|
|
WHERE accounts.id IN (SELECT * FROM first_degree)
|
|
|
|
AND #{query} @@ #{textsearch}
|
|
|
|
AND accounts.suspended = false
|
|
|
|
GROUP BY accounts.id
|
|
|
|
ORDER BY rank DESC
|
|
|
|
LIMIT ?
|
|
|
|
SQL
|
|
|
|
|
|
|
|
find_by_sql([sql, account.id, account.id, account.id, limit])
|
|
|
|
else
|
|
|
|
sql = <<-SQL.squish
|
|
|
|
SELECT
|
|
|
|
accounts.*,
|
|
|
|
(count(f.id) + 1) * ts_rank_cd(#{textsearch}, #{query}, 32) AS rank
|
|
|
|
FROM accounts
|
|
|
|
LEFT OUTER JOIN follows AS f ON (accounts.id = f.account_id AND f.target_account_id = ?) OR (accounts.id = f.target_account_id AND f.account_id = ?)
|
|
|
|
WHERE #{query} @@ #{textsearch}
|
|
|
|
AND accounts.suspended = false
|
|
|
|
GROUP BY accounts.id
|
|
|
|
ORDER BY rank DESC
|
|
|
|
LIMIT ?
|
|
|
|
SQL
|
|
|
|
|
|
|
|
find_by_sql([sql, account.id, account.id, limit])
|
|
|
|
end
|
2017-03-17 19:47:38 +00:00
|
|
|
end
|
|
|
|
|
2017-01-08 18:12:54 +00:00
|
|
|
private
|
|
|
|
|
2017-05-07 15:40:57 +01:00
|
|
|
def generate_query_for_search(terms)
|
|
|
|
terms = Arel.sql(connection.quote(terms.gsub(/['?\\:]/, ' ')))
|
|
|
|
textsearch = "(setweight(to_tsvector('simple', accounts.display_name), 'A') || setweight(to_tsvector('simple', accounts.username), 'B') || setweight(to_tsvector('simple', coalesce(accounts.domain, '')), 'C'))"
|
|
|
|
query = "to_tsquery('simple', ''' ' || #{terms} || ' ''' || ':*')"
|
|
|
|
|
|
|
|
[textsearch, query]
|
|
|
|
end
|
2016-10-03 16:16:58 +01:00
|
|
|
end
|
|
|
|
|
2017-04-25 01:47:31 +01:00
|
|
|
before_create :generate_keys
|
|
|
|
before_validation :normalize_domain
|
2017-07-14 18:47:53 +01:00
|
|
|
before_validation :prepare_contents, if: :local?
|
2017-04-18 22:15:44 +01:00
|
|
|
|
|
|
|
private
|
|
|
|
|
2017-07-14 18:47:53 +01:00
|
|
|
def prepare_contents
|
|
|
|
display_name&.strip!
|
|
|
|
note&.strip!
|
|
|
|
end
|
|
|
|
|
2017-04-25 01:47:31 +01:00
|
|
|
def generate_keys
|
|
|
|
return unless local?
|
|
|
|
|
2017-08-24 12:31:55 +01:00
|
|
|
keypair = OpenSSL::PKey::RSA.new(Rails.env.test? ? 512 : 2048)
|
2017-04-25 01:47:31 +01:00
|
|
|
self.private_key = keypair.to_pem
|
|
|
|
self.public_key = keypair.public_key.to_pem
|
|
|
|
end
|
|
|
|
|
2017-06-26 04:23:53 +01:00
|
|
|
YAML_START = "---\r\n"
|
|
|
|
YAML_END = "\r\n...\r\n"
|
|
|
|
|
|
|
|
def note_length_does_not_exceed_length_limit
|
|
|
|
note_without_metadata = note
|
|
|
|
if note.start_with? YAML_START
|
|
|
|
idx = note.index YAML_END
|
|
|
|
unless idx.nil?
|
|
|
|
note_without_metadata = note[(idx + YAML_END.length) .. -1]
|
|
|
|
end
|
|
|
|
end
|
2017-09-11 01:43:52 +01:00
|
|
|
if note_without_metadata.mb_chars.grapheme_length > MAX_NOTE_LENGTH
|
2017-06-26 04:23:53 +01:00
|
|
|
errors.add(:note, "can't be longer than 500 graphemes")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-04-25 01:47:31 +01:00
|
|
|
def normalize_domain
|
|
|
|
return if local?
|
|
|
|
|
|
|
|
self.domain = TagManager.instance.normalize_domain(domain)
|
|
|
|
end
|
2016-02-20 21:53:20 +00:00
|
|
|
end
|