+ ##
+ # returns true if a user is active
+ def active?
+ ["active","confirmed"].include? self.status
+ end
+
+ ##
+ # returns true if the user has the moderator role, false otherwise
+ def moderator?
+ has_role? 'moderator'
+ end
+
+ ##
+ # returns true if the user has the administrator role, false otherwise
+ def administrator?
+ has_role? 'administrator'
+ end
+
+ ##
+ # returns true if the user has the requested role
+ def has_role?(role)
+ roles.any? { |r| r.role == role }
+ end
+
+ ##
+ # returns the first active block which would require users to view
+ # a message, or nil if there are none.
+ def blocked_on_view
+ active_blocks.detect { |b| b.needs_view? }
+ end
+
+ ##
+ # delete a user - leave the account but purge most personal data
+ def delete
+ self.display_name = "user_#{self.id}"
+ self.description = ""
+ self.home_lat = nil
+ self.home_lon = nil
+ self.image = nil
+ self.email_valid = false
+ self.new_email = nil
+ self.status = "deleted"
+ self.save
+ end
+
+ ##
+ # return a spam score for a user
+ def spam_score
+ changeset_score = self.changesets.limit(10).length * 50
+ trace_score = self.traces.limit(10).length * 50
+ diary_entry_score = self.diary_entries.inject(0) { |s,e| s += OSM.spam_score(e.body) }
+ diary_comment_score = self.diary_comments.inject(0) { |s,e| s += OSM.spam_score(e.body) }
+
+ score = OSM.spam_score(self.description)
+ score += diary_entry_score / self.diary_entries.length if self.diary_entries.length > 0
+ score += diary_comment_score / self.diary_comments.length if self.diary_comments.length > 0
+ score -= changeset_score
+ score -= trace_score
+
+ return score.to_i
+ end
+
+ ##
+ # return an oauth access token for a specified application
+ def access_token(application_key)
+ return ClientApplication.find_by_key(application_key).access_token_for_user(self)
+ end
+
+private
+
+ def set_creation_time
+ self.creation_time = Time.now.getutc unless self.attribute_present?(:creation_time)
+ end
+
+ def encrypt_password
+ if pass_crypt_confirmation
+ self.pass_salt = OSM::make_token(8)
+ self.pass_crypt = OSM::encrypt_password(pass_crypt, pass_salt)
+ end
+ end