1 class User < ActiveRecord::Base
4 has_many :traces, :conditions => { :visible => true }
5 has_many :diary_entries, :order => 'created_at DESC'
6 has_many :diary_comments, :order => 'created_at DESC'
7 has_many :messages, :foreign_key => :to_user_id, :conditions => { :to_user_visible => true }, :order => 'sent_on DESC'
8 has_many :new_messages, :class_name => "Message", :foreign_key => :to_user_id, :conditions => { :to_user_visible => true, :message_read => false }, :order => 'sent_on DESC'
9 has_many :sent_messages, :class_name => "Message", :foreign_key => :from_user_id, :conditions => { :from_user_visible => true }, :order => 'sent_on DESC'
10 has_many :friends, :include => :befriendee, :conditions => "users.status IN ('active', 'confirmed')"
11 has_many :friend_users, :through => :friends, :source => :befriendee
12 has_many :tokens, :class_name => "UserToken"
13 has_many :preferences, :class_name => "UserPreference"
14 has_many :changesets, :order => 'created_at DESC'
15 has_many :note_comments, :foreign_key => :author_id
16 has_many :notes, :through => :note_comments
18 has_many :client_applications
19 has_many :oauth_tokens, :class_name => "OauthToken", :order => "authorized_at desc", :include => [:client_application]
21 has_many :blocks, :class_name => "UserBlock"
22 has_many :blocks_created, :class_name => "UserBlock", :foreign_key => :creator_id
23 has_many :blocks_revoked, :class_name => "UserBlock", :foreign_key => :revoker_id
25 has_many :roles, :class_name => "UserRole"
27 scope :visible, where(:status => ["pending", "active", "confirmed"])
28 scope :active, where(:status => ["active", "confirmed"])
29 scope :public, where(:data_public => true)
31 validates_presence_of :email, :display_name
32 validates_confirmation_of :email#, :message => ' addresses must match'
33 validates_confirmation_of :pass_crypt#, :message => ' must match the confirmation password'
34 validates_uniqueness_of :display_name, :allow_nil => true, :case_sensitive => false, :if => Proc.new { |u| u.display_name_changed? }
35 validates_uniqueness_of :email, :case_sensitive => false, :if => Proc.new { |u| u.email_changed? }
36 validates_uniqueness_of :openid_url, :allow_nil => true
37 validates_length_of :pass_crypt, :within => 8..255
38 validates_length_of :display_name, :within => 3..255, :allow_nil => true
39 validates_email_format_of :email, :if => Proc.new { |u| u.email_changed? }
40 validates_email_format_of :new_email, :allow_blank => true, :if => Proc.new { |u| u.new_email_changed? }
41 validates_format_of :display_name, :with => /^[^\/;.,?%#]*$/, :if => Proc.new { |u| u.display_name_changed? }
42 validates_format_of :display_name, :with => /^\S/, :message => "has leading whitespace", :if => Proc.new { |u| u.display_name_changed? }
43 validates_format_of :display_name, :with => /\S$/, :message => "has trailing whitespace", :if => Proc.new { |u| u.display_name_changed? }
44 validates_numericality_of :home_lat, :allow_nil => true
45 validates_numericality_of :home_lon, :allow_nil => true
46 validates_numericality_of :home_zoom, :only_integer => true, :allow_nil => true
47 validates_inclusion_of :preferred_editor, :in => Editors::ALL_EDITORS, :allow_nil => true
49 attr_accessible :display_name, :email, :email_confirmation, :openid_url,
50 :pass_crypt, :pass_crypt_confirmation, :consider_pd,
53 after_initialize :set_defaults
54 before_save :encrypt_password
56 has_attached_file :image,
57 :default_url => "/assets/:class/:attachment/:style.png",
58 :styles => { :large => "100x100>", :small => "50x50>" }
60 def self.authenticate(options)
61 if options[:username] and options[:password]
62 user = where("email = ? OR display_name = ?", options[:username], options[:username]).first
65 users = where("LOWER(email) = LOWER(?) OR LOWER(display_name) = LOWER(?)", options[:username], options[:username])
72 user = nil if user and user.pass_crypt != OSM::encrypt_password(options[:password], user.pass_salt)
74 token = UserToken.find_by_token(options[:token])
75 user = token.user if token
79 ( user.status == "deleted" or
80 ( user.status == "pending" and not options[:pending] ) or
81 ( user.status == "suspended" and not options[:suspended] ) )
85 token.update_column(:expiry, 1.week.from_now) if token and user
91 doc = OSM::API.new.get_xml_doc
92 doc.root << to_xml_node()
97 el1 = XML::Node.new 'user'
98 el1['display_name'] = self.display_name.to_s
99 el1['account_created'] = self.creation_time.xmlschema
100 if self.home_lat and self.home_lon
101 home = XML::Node.new 'home'
102 home['lat'] = self.home_lat.to_s
103 home['lon'] = self.home_lon.to_s
104 home['zoom'] = self.home_zoom.to_s
111 RichText.new(read_attribute(:description_format), read_attribute(:description))
115 attribute_present?(:languages) ? read_attribute(:languages).split(/ *, */) : []
118 def languages=(languages)
119 write_attribute(:languages, languages.join(","))
122 def preferred_language
123 languages.find { |l| Language.exists?(:code => l) }
126 def preferred_language_from(array)
127 (languages & array.collect { |i| i.to_s }).first
130 def nearby(radius = NEARBY_RADIUS, num = NEARBY_USERS)
131 if self.home_lon and self.home_lat
132 gc = OSM::GreatCircle.new(self.home_lat, self.home_lon)
133 bounds = gc.bounds(radius)
134 sql_for_distance = gc.sql_for_distance("home_lat", "home_lon")
135 nearby = User.where("id != ? AND status IN (\'active\', \'confirmed\') AND data_public = ? AND #{sql_for_distance} <= ?", id, true, radius).order(sql_for_distance).limit(num)
142 def distance(nearby_user)
143 return OSM::GreatCircle.new(self.home_lat, self.home_lon).distance(nearby_user.home_lat, nearby_user.home_lon)
146 def is_friends_with?(new_friend)
148 @new_friend = new_friend
149 self.friends.each do |friend|
150 if friend.friend_user_id == @new_friend.id
158 # returns true if a user is visible
160 ["pending","active","confirmed"].include? self.status
164 # returns true if a user is active
166 ["active","confirmed"].include? self.status
170 # returns true if the user has the moderator role, false otherwise
172 has_role? 'moderator'
176 # returns true if the user has the administrator role, false otherwise
178 has_role? 'administrator'
182 # returns true if the user has the requested role
184 roles.any? { |r| r.role == role }
188 # returns the first active block which would require users to view
189 # a message, or nil if there are none.
191 blocks.active.detect { |b| b.needs_view? }
195 # delete a user - leave the account but purge most personal data
197 self.display_name = "user_#{self.id}"
198 self.description = ""
202 self.email_valid = false
204 self.openid_url = nil
205 self.status = "deleted"
210 # return a spam score for a user
212 changeset_score = self.changesets.size * 50
213 trace_score = self.traces.size * 50
214 diary_entry_score = self.diary_entries.inject(0) { |s,e| s += e.body.spam_score }
215 diary_comment_score = self.diary_comments.inject(0) { |s,c| s += c.body.spam_score }
217 score = self.description.spam_score / 4.0
218 score += diary_entry_score / self.diary_entries.length if self.diary_entries.length > 0
219 score += diary_comment_score / self.diary_comments.length if self.diary_comments.length > 0
220 score -= changeset_score
227 # return an oauth access token for a specified application
228 def access_token(application_key)
229 return ClientApplication.find_by_key(application_key).access_token_for_user(self)
235 self.creation_time = Time.now.getutc unless self.attribute_present?(:creation_time)
236 self.description_format = "markdown" unless self.attribute_present?(:description_format)
240 if pass_crypt_confirmation
241 self.pass_salt = OSM::make_token(8)
242 self.pass_crypt = OSM::encrypt_password(pass_crypt, pass_salt)
243 self.pass_crypt_confirmation = nil