1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
# frozen_string_literal: true
class UserCustomAttribute < ApplicationRecord
belongs_to :user
validates :user_id, :key, :value, presence: true
validates :key, uniqueness: { scope: [:user_id] }
scope :by_key, ->(key) { where(key: key) }
scope :by_user_id, ->(user_id) { where(user_id: user_id) }
scope :by_updated_at, ->(updated_at) { where(updated_at: updated_at) }
scope :arkose_sessions, -> { by_key('arkose_session') }
scope :trusted_with_spam, -> { by_key(TRUSTED_BY) }
BLOCKED_BY = 'blocked_by'
UNBLOCKED_BY = 'unblocked_by'
ARKOSE_RISK_BAND = 'arkose_risk_band'
AUTO_BANNED_BY_ABUSE_REPORT_ID = 'auto_banned_by_abuse_report_id'
AUTO_BANNED_BY_SPAM_LOG_ID = 'auto_banned_by_spam_log_id'
TRUSTED_BY = 'trusted_by'
AUTO_BANNED_BY = 'auto_banned_by'
IDENTITY_VERIFICATION_PHONE_EXEMPT = 'identity_verification_phone_exempt'
IDENTITY_VERIFICATION_EXEMPT = 'identity_verification_exempt'
DELETED_OWN_ACCOUNT_AT = 'deleted_own_account_at'
SKIPPED_ACCOUNT_DELETION_AT = 'skipped_account_deletion_at'
ASSUMED_HIGH_RISK_REASON = 'assumed_high_risk_reason'
DEEP_CLEAN_CI_USAGE_WHEN_BANNED = 'deep_clean_ci_usage_when_banned'
class << self
def upsert_custom_attributes(custom_attributes)
created_at = DateTime.now
updated_at = DateTime.now
custom_attributes.map! do |custom_attribute|
custom_attribute.merge({ created_at: created_at, updated_at: updated_at })
end
upsert_all(custom_attributes, unique_by: [:user_id, :key])
end
def sessions
return none if blocked_users.empty?
arkose_sessions
.by_user_id(blocked_users.map(&:user_id))
.select(:value)
end
def set_banned_by_abuse_report(abuse_report)
return unless abuse_report
upsert_custom_attribute(
user_id: abuse_report.user.id,
key: AUTO_BANNED_BY_ABUSE_REPORT_ID,
value: abuse_report.id
)
end
def set_banned_by_spam_log(spam_log)
return unless spam_log
upsert_custom_attribute(user_id: spam_log.user_id, key: AUTO_BANNED_BY_SPAM_LOG_ID, value: spam_log.id)
end
def set_trusted_by(user:, trusted_by:)
return unless user && trusted_by
upsert_custom_attribute(
user_id: user.id,
key: UserCustomAttribute::TRUSTED_BY,
value: "#{trusted_by.username}/#{trusted_by.id}+#{Time.current}"
)
end
def set_deleted_own_account_at(user)
return unless user
upsert_custom_attribute(user_id: user.id, key: DELETED_OWN_ACCOUNT_AT, value: Time.zone.now.to_s)
end
def set_skipped_account_deletion_at(user)
return unless user
upsert_custom_attribute(user_id: user.id, key: SKIPPED_ACCOUNT_DELETION_AT, value: Time.zone.now.to_s)
end
def set_assumed_high_risk_reason(user:, reason:)
return unless user
return unless reason
upsert_custom_attribute(user_id: user.id, key: ASSUMED_HIGH_RISK_REASON, value: reason)
end
private
def blocked_users
by_key('blocked_at').by_updated_at(Date.yesterday.all_day)
end
def upsert_custom_attribute(user_id:, key:, value:)
return unless user_id && key && value
custom_attribute = {
user_id: user_id,
key: key,
value: value
}
upsert_custom_attributes([custom_attribute])
end
end
end
|