summaryrefslogtreecommitdiff
path: root/app/models/concerns/limitable.rb
blob: 3cb0bd85936e823f921a0121315b96a71ed5dbf8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
# frozen_string_literal: true

module Limitable
  extend ActiveSupport::Concern
  GLOBAL_SCOPE = :limitable_global_scope

  included do
    class_attribute :limit_scope
    class_attribute :limit_name
    self.limit_name = self.name.demodulize.tableize

    validate :validate_plan_limit_not_exceeded, on: :create
  end

  private

  def validate_plan_limit_not_exceeded
    if GLOBAL_SCOPE == limit_scope
      validate_global_plan_limit_not_exceeded
    else
      validate_scoped_plan_limit_not_exceeded
    end
  end

  def validate_scoped_plan_limit_not_exceeded
    scope_relation = self.public_send(limit_scope) # rubocop:disable GitlabSecurity/PublicSend
    return unless scope_relation

    relation = self.class.where(limit_scope => scope_relation)
    limits = scope_relation.actual_limits

    check_plan_limit_not_exceeded(limits, relation)
  end

  def validate_global_plan_limit_not_exceeded
    relation = self.class.all
    limits = Plan.default.actual_limits

    check_plan_limit_not_exceeded(limits, relation)
  end

  def check_plan_limit_not_exceeded(limits, relation)
    return unless limits.exceeded?(limit_name, relation)

    errors.add(:base, _("Maximum number of %{name} (%{count}) exceeded") %
        { name: limit_name.humanize(capitalize: false), count: limits.public_send(limit_name) }) # rubocop:disable GitlabSecurity/PublicSend
  end
end