2018-03-06 13:44:29 +01:00
|
|
|
class Administrateur < ApplicationRecord
|
2018-02-28 14:30:59 +01:00
|
|
|
include CredentialsSyncableConcern
|
|
|
|
include EmailSanitizableConcern
|
2018-08-24 16:45:43 +02:00
|
|
|
include ActiveRecord::SecureToken
|
2018-02-28 14:30:59 +01:00
|
|
|
|
2018-05-26 00:06:40 +02:00
|
|
|
devise :database_authenticatable, :registerable, :async,
|
2017-06-12 13:49:51 +02:00
|
|
|
:recoverable, :rememberable, :trackable, :validatable
|
2015-11-10 10:23:15 +01:00
|
|
|
|
2016-05-20 15:39:17 +02:00
|
|
|
has_and_belongs_to_many :gestionnaires
|
2018-03-23 11:39:36 +01:00
|
|
|
has_many :administrateurs_procedures
|
2019-02-26 16:18:04 +01:00
|
|
|
has_many :procedures, through: :administrateurs_procedures
|
2018-04-17 16:11:49 +02:00
|
|
|
has_many :services
|
2018-09-07 18:17:51 +02:00
|
|
|
has_many :dossiers, -> { state_not_brouillon }, through: :procedures
|
2015-12-14 17:28:36 +01:00
|
|
|
|
2018-02-28 14:30:59 +01:00
|
|
|
before_validation -> { sanitize_email(:email) }
|
2017-02-07 16:56:21 +01:00
|
|
|
|
2018-01-11 14:17:50 +01:00
|
|
|
scope :inactive, -> { where(active: false) }
|
|
|
|
|
2018-01-25 10:50:06 +01:00
|
|
|
validate :password_complexity, if: Proc.new { |a| Devise.password_length.include?(a.password.try(:size)) }
|
|
|
|
|
|
|
|
def password_complexity
|
|
|
|
if password.present?
|
|
|
|
score = Zxcvbn.test(password, [], ZXCVBN_DICTIONNARIES).score
|
|
|
|
if score < 4
|
|
|
|
errors.add(:password, :not_strength)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-11 14:17:50 +01:00
|
|
|
def self.find_inactive_by_token(reset_password_token)
|
|
|
|
self.inactive.with_reset_password_token(reset_password_token)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.find_inactive_by_id(id)
|
|
|
|
self.inactive.find(id)
|
|
|
|
end
|
|
|
|
|
2015-12-14 17:28:36 +01:00
|
|
|
def renew_api_token
|
2018-08-24 16:45:43 +02:00
|
|
|
api_token = Administrateur.generate_unique_secure_token
|
|
|
|
encrypted_token = BCrypt::Password.create(api_token)
|
2018-09-26 17:22:36 +02:00
|
|
|
update(encrypted_token: encrypted_token)
|
2018-08-24 16:45:43 +02:00
|
|
|
api_token
|
2015-12-14 17:28:36 +01:00
|
|
|
end
|
|
|
|
|
2018-09-26 15:39:45 +02:00
|
|
|
def valid_api_token?(api_token)
|
|
|
|
BCrypt::Password.new(encrypted_token) == api_token
|
|
|
|
rescue BCrypt::Errors::InvalidHash
|
|
|
|
false
|
|
|
|
end
|
|
|
|
|
2018-01-11 14:17:50 +01:00
|
|
|
def registration_state
|
|
|
|
if active?
|
|
|
|
'Actif'
|
|
|
|
elsif reset_password_period_valid?
|
|
|
|
'En attente'
|
|
|
|
else
|
|
|
|
'Expiré'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-05-31 18:07:19 +02:00
|
|
|
def invite!(administration_id)
|
2018-01-11 14:17:50 +01:00
|
|
|
if active?
|
|
|
|
raise "Impossible d'inviter un utilisateur déjà actif !"
|
|
|
|
end
|
2018-01-15 22:13:52 +01:00
|
|
|
|
2018-01-11 14:17:50 +01:00
|
|
|
reset_password_token = set_reset_password_token
|
2018-01-15 22:13:52 +01:00
|
|
|
|
2018-05-31 18:07:19 +02:00
|
|
|
AdministrationMailer.invite_admin(self, reset_password_token, administration_id).deliver_later
|
2018-01-11 14:17:50 +01:00
|
|
|
|
|
|
|
reset_password_token
|
|
|
|
end
|
|
|
|
|
2018-05-03 18:30:40 +02:00
|
|
|
def remind_invitation!
|
|
|
|
if active?
|
|
|
|
raise "Impossible d'envoyer un rappel d'invitation à un utilisateur déjà actif !"
|
|
|
|
end
|
|
|
|
|
|
|
|
reset_password_token = set_reset_password_token
|
|
|
|
|
|
|
|
AdministrateurMailer.activate_before_expiration(self, reset_password_token).deliver_later
|
|
|
|
end
|
|
|
|
|
2018-01-11 14:17:50 +01:00
|
|
|
def invitation_expired?
|
|
|
|
!active && !reset_password_period_valid?
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.reset_password(reset_password_token, password)
|
|
|
|
administrateur = self.reset_password_by_token({
|
|
|
|
password: password,
|
|
|
|
password_confirmation: password,
|
|
|
|
reset_password_token: reset_password_token
|
|
|
|
})
|
|
|
|
|
|
|
|
if administrateur && administrateur.errors.empty?
|
|
|
|
administrateur.update_column(:active, true)
|
|
|
|
end
|
|
|
|
|
|
|
|
administrateur
|
|
|
|
end
|
|
|
|
|
2018-03-27 15:43:59 +02:00
|
|
|
def feature_enabled?(feature)
|
2018-04-18 12:16:25 +02:00
|
|
|
Flipflop.feature_set.feature(feature)
|
|
|
|
features[feature.to_s]
|
|
|
|
end
|
|
|
|
|
|
|
|
def disable_feature(feature)
|
|
|
|
Flipflop.feature_set.feature(feature)
|
|
|
|
features.delete(feature.to_s)
|
|
|
|
save
|
|
|
|
end
|
|
|
|
|
|
|
|
def enable_feature(feature)
|
|
|
|
Flipflop.feature_set.feature(feature)
|
|
|
|
features[feature.to_s] = true
|
|
|
|
save
|
2018-03-27 15:43:59 +02:00
|
|
|
end
|
|
|
|
|
2018-05-17 15:39:37 +02:00
|
|
|
def owns?(procedure)
|
2019-02-26 16:18:04 +01:00
|
|
|
procedure.administrateurs.include?(self)
|
2018-05-17 15:39:37 +02:00
|
|
|
end
|
2019-01-07 15:11:55 +01:00
|
|
|
|
|
|
|
def gestionnaire
|
|
|
|
Gestionnaire.find_by(email: email)
|
|
|
|
end
|
2015-10-23 16:19:55 +02:00
|
|
|
end
|