2018-12-24 10:12:38 -08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
class AppSignUpService < BaseService
|
2023-11-13 05:27:00 -08:00
|
|
|
include RegistrationHelper
|
|
|
|
|
2020-10-12 07:33:49 -07:00
|
|
|
def call(app, remote_ip, params)
|
2022-08-24 10:00:37 -07:00
|
|
|
@app = app
|
|
|
|
@remote_ip = remote_ip
|
|
|
|
@params = params
|
2018-12-24 10:12:38 -08:00
|
|
|
|
2023-11-13 05:27:00 -08:00
|
|
|
raise Mastodon::NotPermittedError unless allowed_registration?(remote_ip, invite)
|
2018-12-24 10:12:38 -08:00
|
|
|
|
2022-08-24 10:00:37 -07:00
|
|
|
ApplicationRecord.transaction do
|
|
|
|
create_user!
|
|
|
|
create_access_token!
|
|
|
|
end
|
|
|
|
|
|
|
|
@access_token
|
2018-12-24 10:12:38 -08:00
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2022-08-24 10:00:37 -07:00
|
|
|
def create_user!
|
|
|
|
@user = User.create!(
|
|
|
|
user_params.merge(created_by_application: @app, sign_up_ip: @remote_ip, password_confirmation: user_params[:password], account_attributes: account_params, invite_request_attributes: invite_request_params)
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
def create_access_token!
|
|
|
|
@access_token = Doorkeeper::AccessToken.create!(
|
|
|
|
application: @app,
|
|
|
|
resource_owner_id: @user.id,
|
|
|
|
scopes: @app.scopes,
|
|
|
|
expires_in: Doorkeeper.configuration.access_token_expires_in,
|
|
|
|
use_refresh_token: Doorkeeper.configuration.refresh_token_enabled?
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2023-11-13 05:27:00 -08:00
|
|
|
def invite
|
|
|
|
Invite.find_by(code: @params[:invite_code]) if @params[:invite_code].present?
|
|
|
|
end
|
|
|
|
|
2022-08-24 10:00:37 -07:00
|
|
|
def user_params
|
2023-11-13 05:27:00 -08:00
|
|
|
@params.slice(:email, :password, :agreement, :locale, :time_zone, :invite_code)
|
2022-08-24 10:00:37 -07:00
|
|
|
end
|
|
|
|
|
|
|
|
def account_params
|
|
|
|
@params.slice(:username)
|
|
|
|
end
|
|
|
|
|
|
|
|
def invite_request_params
|
|
|
|
{ text: @params[:reason] }
|
|
|
|
end
|
2018-12-24 10:12:38 -08:00
|
|
|
end
|