require 'digest/sha1'

class Member < ActiveRecord::Base
  
  file_column :image, :magick => { :versions => {
        :thumb => {:crop => "1:1", :size => "48x48!", :name => "thumb"},
        :normal => {:size => "260x260>"}
        },
        :quality => 75
      }
      
  has_many :week_reservations, :class_name => "Reservation", :foreign_key => "member_id", :conditions => ['reservations.start_date > ? AND reservations.end_date < ? AND reservations.state = ?', Time.now.beginning_of_week, Time.now.advance(:weeks => 1).beginning_of_week, 'paid'], :include => [:post, :member]

  has_many :past_reservations, :class_name => "Reservation", :foreign_key => "member_id", :conditions => ['reservations.start_date > ? AND reservations.end_date < ? AND reservations.state = ?', Time.now.advance(:weeks => -12).beginning_of_week, Time.now.beginning_of_week, 'paid'], :order => 'reservations.start_date DESC', :include => [:post, :member]
      
  has_many :reservations, :conditions => ['reservations.start_date > ? AND reservations.state = ?', Time.now - 1.week, 'paid'], :order => 'reservations.start_date ASC', :include => [:post, :member]
  
  
  
  # Virtual attribute for the unencrypted password
  attr_accessor :password

  #validations for the users
  validates_presence_of   :login, :email
  validates_email_veracity_of :email
  validates_presence_of   :password, :if => :password_required?
  validates_presence_of   :password_confirmation, :if => :password_required?
  validates_length_of     :password, :within => 4..40, :if => :password_required?
  validates_confirmation_of :password, :if => :password_required?
  validates_length_of       :login, :within => 3..100
  validates_uniqueness_of   :login, :email, :case_sensitive => false
  before_save :encrypt_password
  # prevents a user from submitting a crafted form that bypasses activation
  # anything else you want your user to change should be added here.
  attr_accessible :login, :password, :password_confirmation, :image, :email, :membership, :biography, :blog, :facebook, :linkedin, :flickr, :twitter, :credit
  
  def has_role?(role_in_question)
    return true if self.role=="admin"
    self.role == role_in_question.to_s
  end
  
  def authorized_for_reservation?(reservation_id)
    res = Reservation.find(reservation_id)
    (res && res.member_id == id)
  end

  # Authenticates a user by their login name and unencrypted password.  Returns the user or nil.
  def self.authenticate(login, password)
    u = find :first, :conditions => ['login = ?', login] # need to get the salt
   
    u && u.authenticated?(password) ? u : nil
  end

  # Encrypts some data with the salt.
  def self.encrypt(password, salt)
    Digest::SHA1.hexdigest("--#{salt}--#{password}--")
  end

  # Encrypts the password with the user salt
  def encrypt(password)
    self.class.encrypt(password, salt)
  end

  def authenticated?(password)
    crypted_password == encrypt(password)
  end

  def remember_token?
    remember_token_expires_at && Time.now.utc < remember_token_expires_at 
  end

  # These create and unset the fields required for remembering users between browser closes
  def remember_me
    remember_me_for 2.weeks
  end

  def remember_me_for(time)
    remember_me_until time.from_now.utc
  end

  def remember_me_until(time)
    self.remember_token_expires_at = time
    self.remember_token            = encrypt("#{login}--#{remember_token_expires_at}")
    save(false)
  end

  def forget_me
    self.remember_token_expires_at = nil
    self.remember_token            = nil
    save(false)
  end
  
  # This will make URLs and such use the login, rather than the member ID.
  def to_param
    login
  end

  protected
    # before filter 
    def encrypt_password
      return if password.blank?
      self.salt = Digest::SHA1.hexdigest("--#{Time.now.to_s}--#{login}--") if new_record?
      self.crypted_password = encrypt(password)
    end
    
    def password_required?
      crypted_password.blank? || !password.blank?
    end
end
