2017-06-24 01:50:53 +09:00
|
|
|
# frozen_string_literal: true
|
2023-02-20 14:58:28 +09:00
|
|
|
|
2017-06-24 01:50:53 +09:00
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: session_activations
|
|
|
|
#
|
2018-04-23 18:29:17 +09:00
|
|
|
# id :bigint(8) not null, primary key
|
2017-07-14 05:15:32 +09:00
|
|
|
# session_id :string not null
|
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
|
|
|
# user_agent :string default(""), not null
|
|
|
|
# ip :inet
|
2018-04-23 18:29:17 +09:00
|
|
|
# access_token_id :bigint(8)
|
|
|
|
# user_id :bigint(8) not null
|
|
|
|
# web_push_subscription_id :bigint(8)
|
2017-07-14 05:15:32 +09:00
|
|
|
#
|
|
|
|
|
2017-06-24 01:50:53 +09:00
|
|
|
class SessionActivation < ApplicationRecord
|
2024-03-20 00:39:14 +09:00
|
|
|
include BrowserDetection
|
|
|
|
|
2018-01-20 04:56:47 +09:00
|
|
|
belongs_to :user, inverse_of: :session_activations
|
|
|
|
belongs_to :access_token, class_name: 'Doorkeeper::AccessToken', dependent: :destroy, optional: true
|
|
|
|
belongs_to :web_push_subscription, class_name: 'Web::PushSubscription', dependent: :destroy, optional: true
|
2017-06-26 06:51:32 +09:00
|
|
|
|
|
|
|
delegate :token,
|
|
|
|
to: :access_token,
|
|
|
|
allow_nil: true
|
|
|
|
|
2023-05-03 01:23:35 +09:00
|
|
|
before_create :assign_access_token
|
2017-06-24 01:50:53 +09:00
|
|
|
|
2024-10-02 23:45:12 +09:00
|
|
|
DEFAULT_SCOPES = %w(read write follow).freeze
|
|
|
|
|
2017-06-25 23:54:30 +09:00
|
|
|
class << self
|
|
|
|
def active?(id)
|
2024-01-24 18:57:49 +09:00
|
|
|
id && exists?(session_id: id)
|
2017-06-25 23:54:30 +09:00
|
|
|
end
|
|
|
|
|
2024-11-01 00:12:08 +09:00
|
|
|
def activate(**)
|
|
|
|
activation = create!(**)
|
2017-06-25 23:54:30 +09:00
|
|
|
purge_old
|
|
|
|
activation
|
|
|
|
end
|
|
|
|
|
|
|
|
def deactivate(id)
|
|
|
|
return unless id
|
2023-02-20 14:58:28 +09:00
|
|
|
|
2017-06-25 23:54:30 +09:00
|
|
|
where(session_id: id).destroy_all
|
|
|
|
end
|
|
|
|
|
|
|
|
def purge_old
|
|
|
|
order('created_at desc').offset(Rails.configuration.x.max_session_activations).destroy_all
|
|
|
|
end
|
|
|
|
|
|
|
|
def exclusive(id)
|
2023-02-08 18:39:57 +09:00
|
|
|
where.not(session_id: id).destroy_all
|
2017-06-25 23:54:30 +09:00
|
|
|
end
|
2017-06-24 01:50:53 +09:00
|
|
|
end
|
2017-06-26 06:51:32 +09:00
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def assign_access_token
|
2020-11-13 07:05:24 +09:00
|
|
|
self.access_token = Doorkeeper::AccessToken.create!(access_token_attributes)
|
|
|
|
end
|
2017-06-26 06:51:32 +09:00
|
|
|
|
2020-11-13 07:05:24 +09:00
|
|
|
def access_token_attributes
|
|
|
|
{
|
|
|
|
application_id: Doorkeeper::Application.find_by(superapp: true)&.id,
|
|
|
|
resource_owner_id: user_id,
|
2024-10-02 23:45:12 +09:00
|
|
|
scopes: DEFAULT_SCOPES.join(' '),
|
2020-11-13 07:05:24 +09:00
|
|
|
expires_in: Doorkeeper.configuration.access_token_expires_in,
|
|
|
|
use_refresh_token: Doorkeeper.configuration.refresh_token_enabled?,
|
|
|
|
}
|
2017-06-26 06:51:32 +09:00
|
|
|
end
|
2017-06-24 01:50:53 +09:00
|
|
|
end
|