1 class User < ActiveRecord::Base
4 has_many :traces, -> { where(:visible => true) }
5 has_many :diary_entries, -> { order(:created_at => :desc) }
6 has_many :diary_comments, -> { order(:created_at => :desc) }
7 has_many :messages, -> { where(:to_user_visible => true).order(:sent_on => :desc).preload(:sender, :recipient) }, :foreign_key => :to_user_id
8 has_many :new_messages, -> { where(:to_user_visible => true, :message_read => false).order(:sent_on => :desc) }, :class_name => "Message", :foreign_key => :to_user_id
9 has_many :sent_messages, -> { where(:from_user_visible => true).order(:sent_on => :desc).preload(:sender, :recipient) }, :class_name => "Message", :foreign_key => :from_user_id
10 has_many :friends, -> { joins(:befriendee).where(:users => { :status => ["active", "confirmed"] }) }
11 has_many :friend_users, :through => :friends, :source => :befriendee
12 has_many :tokens, :class_name => "UserToken"
13 has_many :preferences, :class_name => "UserPreference"
14 has_many :changesets, -> { order(:created_at => :desc) }
15 has_many :note_comments, :foreign_key => :author_id
16 has_many :notes, :through => :note_comments
18 has_many :client_applications
19 has_many :oauth_tokens, -> { order(:authorized_at => :desc).preload(:client_application) }, :class_name => "OauthToken"
21 has_many :blocks, :class_name => "UserBlock"
22 has_many :blocks_created, :class_name => "UserBlock", :foreign_key => :creator_id
23 has_many :blocks_revoked, :class_name => "UserBlock", :foreign_key => :revoker_id
25 has_many :roles, :class_name => "UserRole"
27 scope :visible, -> { where(:status => ["pending", "active", "confirmed"]) }
28 scope :active, -> { where(:status => ["active", "confirmed"]) }
29 scope :public, -> { where(:data_public => true) }
31 validates_presence_of :email, :display_name
32 validates_confirmation_of :email#, :message => ' addresses must match'
33 validates_confirmation_of :pass_crypt#, :message => ' must match the confirmation password'
34 validates_uniqueness_of :display_name, :allow_nil => true, :case_sensitive => false, :if => Proc.new { |u| u.display_name_changed? }
35 validates_uniqueness_of :email, :case_sensitive => false, :if => Proc.new { |u| u.email_changed? }
36 validates_uniqueness_of :openid_url, :allow_nil => true
37 validates_length_of :pass_crypt, :within => 8..255
38 validates_length_of :display_name, :within => 3..255, :allow_nil => true
39 validates_email_format_of :email, :if => Proc.new { |u| u.email_changed? }
40 validates_email_format_of :new_email, :allow_blank => true, :if => Proc.new { |u| u.new_email_changed? }
41 validates_format_of :display_name, :with => /\A[^\/;.,?%#]*\z/, :if => Proc.new { |u| u.display_name_changed? }
42 validates_format_of :display_name, :with => /\A\S/, :message => "has leading whitespace", :if => Proc.new { |u| u.display_name_changed? }
43 validates_format_of :display_name, :with => /\S\z/, :message => "has trailing whitespace", :if => Proc.new { |u| u.display_name_changed? }
44 validates_numericality_of :home_lat, :allow_nil => true
45 validates_numericality_of :home_lon, :allow_nil => true
46 validates_numericality_of :home_zoom, :only_integer => true, :allow_nil => true
47 validates_inclusion_of :preferred_editor, :in => Editors::ALL_EDITORS, :allow_nil => true
49 after_initialize :set_defaults
50 before_save :encrypt_password
51 after_save :spam_check
53 has_attached_file :image,
54 :default_url => "/assets/:class/:attachment/:style.png",
55 :styles => { :large => "100x100>", :small => "50x50>" }
57 def self.authenticate(options)
58 if options[:username] and options[:password]
59 user = where("email = ? OR display_name = ?", options[:username], options[:username]).first
62 users = where("LOWER(email) = LOWER(?) OR LOWER(display_name) = LOWER(?)", options[:username], options[:username])
69 if user and PasswordHash.check(user.pass_crypt, user.pass_salt, options[:password])
70 if PasswordHash.upgrade?(user.pass_crypt, user.pass_salt)
71 user.pass_crypt, user.pass_salt = PasswordHash.create(options[:password])
78 token = UserToken.find_by_token(options[:token])
79 user = token.user if token
83 ( user.status == "deleted" or
84 ( user.status == "pending" and not options[:pending] ) or
85 ( user.status == "suspended" and not options[:suspended] ) )
89 token.update_column(:expiry, 1.week.from_now) if token and user
95 doc = OSM::API.new.get_xml_doc
96 doc.root << to_xml_node()
101 el1 = XML::Node.new 'user'
102 el1['display_name'] = self.display_name.to_s
103 el1['account_created'] = self.creation_time.xmlschema
104 if self.home_lat and self.home_lon
105 home = XML::Node.new 'home'
106 home['lat'] = self.home_lat.to_s
107 home['lon'] = self.home_lon.to_s
108 home['zoom'] = self.home_zoom.to_s
115 RichText.new(read_attribute(:description_format), read_attribute(:description))
119 attribute_present?(:languages) ? read_attribute(:languages).split(/ *, */) : []
122 def languages=(languages)
123 write_attribute(:languages, languages.join(","))
126 def preferred_language
127 languages.find { |l| Language.exists?(:code => l) }
130 def preferred_language_from(array)
131 (languages & array.collect { |i| i.to_s }).first
134 def nearby(radius = NEARBY_RADIUS, num = NEARBY_USERS)
135 if self.home_lon and self.home_lat
136 gc = OSM::GreatCircle.new(self.home_lat, self.home_lon)
137 bounds = gc.bounds(radius)
138 sql_for_distance = gc.sql_for_distance("home_lat", "home_lon")
139 nearby = User.where("id != ? AND status IN (\'active\', \'confirmed\') AND data_public = ? AND #{sql_for_distance} <= ?", id, true, radius).order(sql_for_distance).limit(num)
146 def distance(nearby_user)
147 return OSM::GreatCircle.new(self.home_lat, self.home_lon).distance(nearby_user.home_lat, nearby_user.home_lon)
150 def is_friends_with?(new_friend)
151 self.friends.where(:friend_user_id => new_friend.id).exists?
155 # returns true if a user is visible
157 ["pending","active","confirmed"].include? self.status
161 # returns true if a user is active
163 ["active","confirmed"].include? self.status
167 # returns true if the user has the moderator role, false otherwise
169 has_role? 'moderator'
173 # returns true if the user has the administrator role, false otherwise
175 has_role? 'administrator'
179 # returns true if the user has the requested role
181 roles.any? { |r| r.role == role }
185 # returns the first active block which would require users to view
186 # a message, or nil if there are none.
188 blocks.active.detect { |b| b.needs_view? }
192 # delete a user - leave the account but purge most personal data
194 self.display_name = "user_#{self.id}"
195 self.description = ""
199 self.email_valid = false
201 self.openid_url = nil
202 self.status = "deleted"
207 # return a spam score for a user
209 changeset_score = self.changesets.size * 50
210 trace_score = self.traces.size * 50
211 diary_entry_score = self.diary_entries.inject(0) { |s,e| s += e.body.spam_score }
212 diary_comment_score = self.diary_comments.inject(0) { |s,c| s += c.body.spam_score }
214 score = self.description.spam_score / 4.0
215 score += diary_entry_score / self.diary_entries.length if self.diary_entries.length > 0
216 score += diary_comment_score / self.diary_comments.length if self.diary_comments.length > 0
217 score -= changeset_score
224 # perform a spam check on a user
226 if status == "active" and spam_score > SPAM_THRESHOLD
227 update_column(:status, "suspended")
232 # return an oauth access token for a specified application
233 def access_token(application_key)
234 return ClientApplication.find_by_key(application_key).access_token_for_user(self)
240 self.creation_time = Time.now.getutc unless self.attribute_present?(:creation_time)
241 self.description_format = "markdown" unless self.attribute_present?(:description_format)
245 if pass_crypt_confirmation
246 self.pass_crypt, self.pass_salt = PasswordHash.create(pass_crypt)
247 self.pass_crypt_confirmation = nil