1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
|
class User < ActiveRecord::Base
include UsersHelper
include ActionView::Helpers
include Rails.application.routes.url_helpers
strip_attributes
belongs_to :role
belongs_to :badge
has_secure_password
before_validation :strip_whitespaces, :set_uuid, :set_name, :set_email_token, :set_role, :set_badge
validates_presence_of :password, :password_confirmation, :email_token, on: :create
validates_presence_of :name, :email, :ign
validates_length_of :password, in: 8..72, on: [:create, :update], allow_nil: true
validates_length_of :name, in: 2..30
validates_length_of :about, maximum: 5000
validates_length_of :ign, minimum: 1, maximum: 16
validates_length_of :discord, minimum: 2, maximum: 37 # The maximum length of a name is 32, but you need the # and four numbers
validates :email, uniqueness: {case_sensitive: false}, format: {with: /\A.+@(.+\..{2,}|\[(IPv6)?[0-9a-f:.]+\])\z/i, message: "That doesn't look like an email address."}
validates :ign, uniqueness: {case_sensitive: false}, format: {with: /\A[a-z\d_]+\z/i, message: "Username is invalid (a-z, 0-9, _)."}
validates :discord, uniqueness: {case_sensitive: false}, format: {with: /\A^(?!everyone|here|discordtag|.*```.*)([^@#:]{2,32}#[0-9]{4})$\z/i, message: "Discord name is invalid."}
validates :public_key, format: {with: /\A(-----BEGIN PGP PUBLIC KEY BLOCK-----((.|\n)*?)-----END PGP PUBLIC KEY BLOCK-----)?\z/i, message: "That doesn't look like a PGP formatted public key."}
has_many :blogposts
has_many :comments
# foo.bar.is?(current_user)
def is? (user)
self == user
end
def confirmed?
!!self.confirmed
end
def self.seen(time)
# when you change this, change footer.html.erb as well?
User.where("last_seen >= ?", time.ago).order("last_seen desc")
end
def online?
last_seen && last_seen > 2.minutes.ago
end
#roles
def disabled?
!!(self.role == :disabled)
end
def banned?
!!(self.role == :banned)
end
def normal?
!!(self.role >= :normal)
end
def mod?
!!(self.role >= :mod)
end
def admin?
!!(self.role >= :admin)
end
def superadmin?
!!(self.role >= :superadmin)
end
def avatar(size, options = {})
options[:class] ||= "avatar"
options[:width] ||= size
options[:height] ||= size
options[:alt] ||= "avatar"
return image_tag("https://crafatar.com/avatars/#{CGI.escape(self.uuid)}?size=#{size}&overlay", options)
end
def to_s
ign
end
#check if this user is an idiot and uses their mc password.
def uses_mc_password?(password)
uri = URI.parse("https://authserver.mojang.com/authenticate")
http = Net::HTTP.new(uri.host, uri.port)
http.open_timeout = 5
http.read_timeout = 20
http.use_ssl = true
payload = { agent: { name: "Minecraft", version: 1 }, username: self.email, password: password }
begin
response = http.post(uri.request_uri, payload.to_json, "Content-Type" => "application/json").code
if response == "200"
return true
else
payload[:username] = self.ign
return http.post(uri.request_uri, payload.to_json, "Content-Type" => "application/json").code == "200"
end
rescue => e
Rails.logger.error "---"
Rails.logger.error "ERROR: failed to check mc password for '#{self.uuid}'. Login servers down?"
Rails.logger.error e.message
Rails.logger.error "---"
return false
end
end
def get_profile
uri = URI.parse("https://api.mojang.com/profiles/minecraft")
http = Net::HTTP.new(uri.host, uri.port)
http.open_timeout = 5
http.read_timeout = 20
http.use_ssl = true
begin
response = http.post(uri.request_uri, [self.ign].to_json, "Content-Type" => "application/json")
if response.code == "200"
data = JSON.load(response.body)
if data.length == 1
return data[0]
elsif data.length > 1
raise "Multiple accounts for user #{self.ign}: '#{response.body}'"
elsif data.length < 1
return nil
end
end
rescue => e
Rails.logger.error "----"
Rails.logger.error "Failed to get mojang profile for #{self.ign}"
Rails.logger.error e.message
Rails.logger.error "----"
return nil
end
end
def to_param
[id, to_s.parameterize].join("-")
end
private
def set_role
self.role ||= Role.get(:normal)
end
def set_badge
self.badge ||= Badge.get(:none)
end
def set_uuid
if !self.uuid.present?
# idk
end
end
def set_name
self.name ||= self.ign
end
def strip_whitespaces
self.name.strip! if self.name
self.ign.strip! if self.ign
self.email.strip! if self.email
self.about.strip! if self.about
self.discord.strip! if self.discord
self.youtube.strip! if self.youtube
self.twitter.strip! if self.twitter
end
def set_email_token
self.email_token ||= SecureRandom.hex(16)
end
def self.search (search, role, badge, staff, donor)
users = User.joins(:role)
if role
users = users.where(role: role)
elsif staff
users = users.where("roles.value >= ?", Role.get(:mod).to_i)
elsif donor
users = users.where("badge_id = ? OR badge_id = ?", Badge.get(:donor), Badge.get(:donorplus))
end
users = users.where(badge: badge) if badge
if search
search_san = User.send(:sanitize_sql_like, search.to_s)
users = users.where("users.name like ? OR ign like ?", "%#{search_san}%", "%#{search_san}%")
end
users = users.where.not(id: User.first.id) unless [search, role, badge].any?
users = users.order("roles.value desc", "confirmed desc", :name)
users
end
end
|