require 'digest/sha1'
class User < ActiveRecord::Base
  
  
  # Virtual attribute for the unencrypted password
  attr_accessor :password

  validates_presence_of     :email
  validates_format_of       :email, :with =>  /^.+@[^\.].*\.[a-z]{2,}/, :message => 'invalid email address, it must look like a@b.c'
  validates_presence_of     :password,                   :if => :password_required?
  validates_presence_of     :password_confirmation,      :if => :password_required?
  validates_length_of       :password, :within => 4..40, :if => :password_required?
  validates_confirmation_of :password,                   :if => :password_required?
  validates_length_of       :email,    :within => 3..100, :if => :not_openid?
  validates_uniqueness_of   :email, :case_sensitive => false
  before_save :encrypt_password
   before_create :make_activation_code 
   
  has_many :application_errors, :order => 'application_errors.created_at DESC'
  
  has_many :new_application_errors, :class_name => 'ApplicationError', 
            :conditions => 'application_errors.status = "new"', 
            :order => 'application_errors.created_at DESC'
  
  # Activates the user in the database.
  def activate
    @activated = true
    self.attributes = {:activated_at => Time.now.utc, :activation_code => nil, :crypted_key => encrypt_key}
    save(false)
  end




  def activated?
    !! activation_code.nil?
  end
  def has_comments?
    return false unless crypted_key
    Comment.count(:conditions => ['user_crypted_key = ?', crypted_key]) > 0 ? true : false 
  end
  # Returns true if the user has just been activated.
  def recently_activated?
    @activated
  end 
  
  
  
  # Authenticates a user by their login name and unencrypted password.  Returns the user or nil.
  def self.authenticate(email, password)
    u = find :first, :conditions => ['email = ? and activated_at IS NOT NULL', email] # need to get the salt
    u && u.authenticated?(password) ? u : nil
  end

  # Encrypts some data with the salt.
  def self.encrypt(password, salt)
    Digest::SHA1.hexdigest("--#{salt}--#{password}--")
  end

  # Encrypts the password with the user salt
  def encrypt(password)
    self.class.encrypt(password, salt)
  end
  def encrypt_key
    self.class.encrypt(email, salt)
  end
  def authenticated?(password)
    crypted_password == encrypt(password)
  end

  def remember_token?
    remember_token_expires_at && Time.now.utc < remember_token_expires_at 
  end

  # These create and unset the fields required for remembering users between browser closes
  def remember_me
    remember_me_for 2.weeks
  end

  def remember_me_for(time)
    remember_me_until time.from_now.utc
  end

  def remember_me_until(time)
    self.remember_token_expires_at = time
    self.remember_token            = encrypt("#{email}--#{remember_token_expires_at}")
    save(false)
  end

  def forget_me
    self.remember_token_expires_at = nil
    self.remember_token            = nil
    save(false)
  end
  def comments
    Comment.find(:all, :conditions => ["user_crypted_key = ?", crypted_key])
  end
  def suggested_domain
    comment = Comment.find(:first, :conditions => ["domain_id is null and user_crypted_key = ?", crypted_key])
    return '' unless comment
    comment.referer_url.split('/')[0..2].join('/')
  end
  
  protected
    # before filter 
    def encrypt_password
      return if password.blank?
      self.salt = Digest::SHA1.hexdigest("--#{Time.now.to_s}--#{email}--") if new_record?
      self.crypted_password = encrypt(password)
    end
    
    def password_required?
      not_openid? && (crypted_password.blank? || !password.blank?)
    end

    def not_openid?
      identity_url.blank?
    end
    
    def make_activation_code
      self.activation_code = Digest::SHA1.hexdigest( Time.now.to_s.split(//).sort_by {rand}.join )
    end 
end
