require 'digest/sha1'

class User < ActiveRecord::Base

  attr_accessor :password

  validates_presence_of     :login, :email, :name, :country, :preferred_language
  validates_presence_of     :password,                   :if => :password_required?
  validates_presence_of     :password_confirmation,      :if => :password_required?
  validates_length_of       :password, :within => 4..40, :if => :password_required?
  validates_confirmation_of :password,                   :if => :password_required?
  validates_length_of       :login,    :within => 3..40
  validates_length_of       :email,    :within => 3..100
  validates_uniqueness_of   :login, :email, :case_sensitive => false
  
  before_save :encrypt_password

  belongs_to :country
  
  has_and_belongs_to_many :roles
  has_many :report_responses, :through => :roles
  has_many :requested_reports, :class_name => 'ReportRequest', :foreign_key => 'requestor_id'
  
  accepts_nested_attributes_for :roles, :reject_if => proc { |att| 
    att['coordinated_id'].blank? 
    }

  # Authenticates a user by their login name and unencrypted password.  Returns the user or nil.
  def self.authenticate(login, password)
    u = find_by_login(login) # need to get the salt
    u && (u.authenticated?(password) && u.allow_login) ? u : nil
  end

  # Encrypts some data with the salt.
  def self.encrypt(password, salt)
    Digest::SHA1.hexdigest("--#{salt}--#{password}--")
  end

  # Encrypts the password with the user salt
  def encrypt(password)
    self.class.encrypt(password, salt)
  end

  def authenticated?(password)
    crypted_password == encrypt(password)
  end

  def remember_token?
    remember_token_expires_at && Time.now.utc < remember_token_expires_at 
  end

  def set_last_login
    self.last_login = Time.now.utc
    save(false)
  end

  # These create and unset the fields required for remembering users between browser closes
  def remember_me
    self.remember_token_expires_at = 2.weeks.from_now.utc
    self.remember_token            = encrypt("#{email}--#{remember_token_expires_at}")
    save(false)
  end

  def forget_me
    self.remember_token_expires_at = nil
    self.remember_token            = nil
    save(false)
  end
  
  def get_role(type)
    self.roles.find_by_coordinated_type(type.name)
  end

  def is_only_xb?
    self.roles.each{ |role|
      if !role.is_cross_border
        return false
      end
    }
    return !self.is_admin
  end
  
  def is_only_admin?
    return self.is_admin && self.roles.empty?
  end

  def share_one_role(user)
    if user.id==self.id
      return false
    end
    self.roles.each{|role|
      user.roles.each{|aux_role|
        if role.id==aux_role.id
          return true
        end
      }
    }
    return false
  end
  

  protected
    # before filter 
    def encrypt_password
      return if password.blank?
      self.salt = Digest::SHA1.hexdigest("--#{Time.now.to_s}--#{login}--") if new_record?
      self.crypted_password = encrypt(password)
    end
    
    def password_required?
      crypted_password.blank? || !password.blank?
    end
  
    def roles_required?
      !is_admin
    end
end
