2019-12-10 17:53:50 +00:00
|
|
|
import logging
|
2019-12-13 10:05:27 +00:00
|
|
|
import random
|
2019-12-13 15:37:30 +00:00
|
|
|
import unicodedata
|
2017-09-03 16:17:25 +00:00
|
|
|
|
2019-12-10 17:53:50 +00:00
|
|
|
from datetime import datetime
|
2017-09-03 16:17:25 +00:00
|
|
|
from django.conf import settings
|
2016-03-07 16:49:02 +00:00
|
|
|
from django.contrib.auth.hashers import make_password
|
2017-09-03 16:17:25 +00:00
|
|
|
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager, \
|
|
|
|
PermissionsMixin
|
2016-04-23 17:00:20 +00:00
|
|
|
from django.contrib.sites.models import Site
|
2017-09-03 16:17:25 +00:00
|
|
|
from django.core.urlresolvers import reverse
|
|
|
|
from django.core.validators import RegexValidator
|
2019-12-10 17:53:50 +00:00
|
|
|
from django.db import models, IntegrityError
|
2017-06-22 07:52:14 +00:00
|
|
|
from django.utils.crypto import get_random_string
|
2017-09-03 16:17:25 +00:00
|
|
|
from django.utils.translation import ugettext_lazy as _
|
2019-12-13 15:37:30 +00:00
|
|
|
from django.core.exceptions import ValidationError
|
2016-05-01 12:13:12 +00:00
|
|
|
|
2017-06-10 23:49:56 +00:00
|
|
|
from utils.mailer import BaseEmail
|
2017-09-03 16:17:25 +00:00
|
|
|
from utils.mailer import DigitalGlarusRegistrationMailer
|
|
|
|
from utils.stripe_utils import StripeUtils
|
2019-12-10 17:53:50 +00:00
|
|
|
from utils.ldap_manager import LdapManager
|
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
2016-03-03 21:55:23 +00:00
|
|
|
|
2016-03-07 16:49:02 +00:00
|
|
|
REGISTRATION_MESSAGE = {'subject': "Validation mail",
|
2017-06-29 14:34:40 +00:00
|
|
|
'message': 'Please validate Your account under this link '
|
|
|
|
'http://localhost:8000/en-us/digitalglarus/login/validate/{}',
|
2016-03-07 16:49:02 +00:00
|
|
|
'from': 'test@test.com'}
|
|
|
|
|
|
|
|
|
2017-08-02 21:24:16 +00:00
|
|
|
def get_anonymous_user_instance(CustomUser):
|
2016-07-11 03:08:51 +00:00
|
|
|
return CustomUser(name='Anonymous', email='anonymous@ungleich.ch',
|
|
|
|
validation_slug=make_password(None))
|
2016-06-26 19:50:48 +00:00
|
|
|
|
|
|
|
|
2016-03-07 16:49:02 +00:00
|
|
|
class MyUserManager(BaseUserManager):
|
|
|
|
def create_user(self, email, name, password=None):
|
|
|
|
"""
|
2016-03-15 23:26:49 +00:00
|
|
|
Creates and saves a User with the given email,name and password.
|
2016-03-07 16:49:02 +00:00
|
|
|
"""
|
|
|
|
if not email:
|
|
|
|
raise ValueError('Users must have an email address')
|
|
|
|
|
|
|
|
user = self.model(
|
|
|
|
email=self.normalize_email(email),
|
2016-03-16 14:10:48 +00:00
|
|
|
name=name,
|
|
|
|
validation_slug=make_password(None)
|
2016-03-07 16:49:02 +00:00
|
|
|
)
|
2016-05-02 00:00:38 +00:00
|
|
|
user.is_admin = False
|
2016-03-19 20:28:58 +00:00
|
|
|
user.set_password(password)
|
2016-03-07 16:49:02 +00:00
|
|
|
user.save(using=self._db)
|
2019-12-14 09:29:45 +00:00
|
|
|
user.create_ldap_account(password)
|
2016-03-07 16:49:02 +00:00
|
|
|
return user
|
|
|
|
|
|
|
|
def create_superuser(self, email, name, password):
|
|
|
|
"""
|
2016-03-15 23:26:49 +00:00
|
|
|
Creates and saves a superuser with the given email, name and password.
|
2016-03-07 16:49:02 +00:00
|
|
|
"""
|
|
|
|
user = self.create_user(email,
|
|
|
|
password=password,
|
2016-03-16 14:10:48 +00:00
|
|
|
name=name,
|
2016-03-07 16:49:02 +00:00
|
|
|
)
|
|
|
|
user.is_admin = True
|
2017-07-16 13:51:07 +00:00
|
|
|
user.is_active = True
|
|
|
|
user.is_superuser = True
|
2016-03-07 16:49:02 +00:00
|
|
|
user.save(using=self._db)
|
|
|
|
return user
|
|
|
|
|
|
|
|
|
2018-02-13 01:37:03 +00:00
|
|
|
def get_validation_slug():
|
|
|
|
return make_password(None)
|
|
|
|
|
|
|
|
|
2019-12-10 17:53:50 +00:00
|
|
|
def get_first_and_last_name(full_name):
|
|
|
|
first_name, *last_name = full_name.split(" ")
|
|
|
|
last_name = " ".join(last_name)
|
|
|
|
return first_name, last_name
|
|
|
|
|
|
|
|
|
|
|
|
def assign_username(user):
|
|
|
|
if not user.username:
|
2019-12-13 10:05:27 +00:00
|
|
|
ldap_manager = LdapManager()
|
|
|
|
|
|
|
|
# Try to come up with a username
|
2019-12-10 17:53:50 +00:00
|
|
|
first_name, last_name = get_first_and_last_name(user.name)
|
2019-12-13 15:37:30 +00:00
|
|
|
user.username = unicodedata.normalize('NFKD', first_name + last_name)
|
|
|
|
user.username = "".join([char for char in user.username if char.isalnum()]).lower()
|
2019-12-13 10:05:27 +00:00
|
|
|
exist = True
|
|
|
|
while exist:
|
|
|
|
# Check if it exists
|
|
|
|
exist, entries = ldap_manager.check_user_exists(user.username)
|
|
|
|
if exist:
|
|
|
|
# If username exists in ldap, come up with a new user name and check it again
|
2019-12-13 12:52:00 +00:00
|
|
|
user.username = user.username + str(random.randint(0, 2 ** 10))
|
2019-12-13 10:05:27 +00:00
|
|
|
else:
|
|
|
|
# If username does not exists in ldap, try to save it in database
|
|
|
|
try:
|
|
|
|
user.save()
|
|
|
|
except IntegrityError:
|
|
|
|
# If username exists in database then come up with a new username
|
2019-12-13 12:52:00 +00:00
|
|
|
user.username = user.username + str(random.randint(0, 2 ** 10))
|
2019-12-18 10:19:47 +00:00
|
|
|
exist = True
|
2019-12-10 17:53:50 +00:00
|
|
|
|
|
|
|
|
2019-12-13 15:37:30 +00:00
|
|
|
def validate_name(value):
|
|
|
|
valid_chars = [char for char in value if (char.isalpha() or char == "-" or char == " ")]
|
|
|
|
if len(valid_chars) < len(value):
|
|
|
|
raise ValidationError(
|
|
|
|
_('%(value)s is not a valid name. A valid name can only include letters, spaces or -'),
|
|
|
|
params={'value': value},
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2016-05-27 05:51:10 +00:00
|
|
|
class CustomUser(AbstractBaseUser, PermissionsMixin):
|
2016-03-07 16:49:02 +00:00
|
|
|
VALIDATED_CHOICES = ((0, 'Not validated'), (1, 'Validated'))
|
2016-04-23 17:00:20 +00:00
|
|
|
site = models.ForeignKey(Site, default=1)
|
2019-12-13 15:37:30 +00:00
|
|
|
name = models.CharField(max_length=50, validators=[validate_name])
|
2016-03-07 16:49:02 +00:00
|
|
|
email = models.EmailField(unique=True)
|
2019-12-13 15:37:30 +00:00
|
|
|
username = models.CharField(max_length=60, unique=True, null=True)
|
2016-03-07 16:49:02 +00:00
|
|
|
validated = models.IntegerField(choices=VALIDATED_CHOICES, default=0)
|
2019-12-10 17:53:50 +00:00
|
|
|
in_ldap = models.BooleanField(default=False)
|
2018-02-13 01:37:03 +00:00
|
|
|
# By default, we initialize the validation_slug with appropriate value
|
|
|
|
# This is required for User(page) admin
|
|
|
|
validation_slug = models.CharField(
|
|
|
|
db_index=True, unique=True, max_length=50,
|
|
|
|
default=get_validation_slug
|
|
|
|
)
|
2016-05-02 00:00:38 +00:00
|
|
|
is_admin = models.BooleanField(
|
2016-03-16 14:10:48 +00:00
|
|
|
_('staff status'),
|
|
|
|
default=False,
|
2017-09-03 16:17:25 +00:00
|
|
|
help_text=_(
|
|
|
|
'Designates whether the user can log into this admin site.'),
|
2016-03-16 14:10:48 +00:00
|
|
|
)
|
2019-11-28 07:21:02 +00:00
|
|
|
import_stripe_bill_remark = models.TextField(
|
|
|
|
default="",
|
|
|
|
help_text="Indicates any issues while importing stripe bills"
|
|
|
|
)
|
2016-03-07 16:49:02 +00:00
|
|
|
|
|
|
|
objects = MyUserManager()
|
|
|
|
|
|
|
|
USERNAME_FIELD = "email"
|
2016-03-07 18:19:25 +00:00
|
|
|
REQUIRED_FIELDS = ['name', 'password']
|
2016-03-07 16:49:02 +00:00
|
|
|
|
|
|
|
@classmethod
|
2017-09-03 16:17:25 +00:00
|
|
|
def register(cls, name, password, email, app='digital_glarus',
|
2017-09-22 10:01:09 +00:00
|
|
|
base_url=None, send_email=True, account_details=None):
|
2016-03-07 16:49:02 +00:00
|
|
|
user = cls.objects.filter(email=email).first()
|
|
|
|
if not user:
|
2017-09-03 16:17:25 +00:00
|
|
|
user = cls.objects.create_user(name=name, email=email,
|
|
|
|
password=password)
|
2016-03-07 16:49:02 +00:00
|
|
|
if user:
|
2017-06-10 23:49:56 +00:00
|
|
|
if app == 'digital_glarus':
|
|
|
|
dg = DigitalGlarusRegistrationMailer(user.validation_slug)
|
|
|
|
dg.send_mail(to=user.email)
|
|
|
|
elif app == 'dcl':
|
2017-06-19 07:00:37 +00:00
|
|
|
dcl_text = settings.DCL_TEXT
|
2017-06-10 23:49:56 +00:00
|
|
|
user.is_active = False
|
2017-06-22 07:52:14 +00:00
|
|
|
if send_email is True:
|
|
|
|
email_data = {
|
2017-09-03 16:17:25 +00:00
|
|
|
'subject': '{dcl_text} {account_activation}'.format(
|
|
|
|
dcl_text=dcl_text,
|
|
|
|
account_activation=_('Account Activation')
|
|
|
|
),
|
2017-06-22 23:05:33 +00:00
|
|
|
'from_address': settings.DCL_SUPPORT_FROM_ADDRESS,
|
2017-06-22 07:52:14 +00:00
|
|
|
'to': user.email,
|
2017-06-29 16:23:25 +00:00
|
|
|
'context': {'base_url': base_url,
|
2017-09-03 16:17:25 +00:00
|
|
|
'activation_link': reverse(
|
|
|
|
'hosting:validate',
|
|
|
|
kwargs={
|
|
|
|
'validate_slug': user.validation_slug}),
|
2017-06-29 16:23:25 +00:00
|
|
|
'dcl_text': dcl_text
|
2017-06-22 23:05:33 +00:00
|
|
|
},
|
2017-06-22 07:52:14 +00:00
|
|
|
'template_name': 'user_activation',
|
|
|
|
'template_path': 'datacenterlight/emails/'
|
|
|
|
}
|
2017-09-22 10:01:09 +00:00
|
|
|
if account_details:
|
|
|
|
email_data['context'][
|
|
|
|
'account_details'] = account_details
|
2017-06-22 07:52:14 +00:00
|
|
|
email = BaseEmail(**email_data)
|
|
|
|
email.send()
|
2016-03-07 16:49:02 +00:00
|
|
|
return user
|
|
|
|
else:
|
|
|
|
return None
|
|
|
|
else:
|
|
|
|
return None
|
|
|
|
|
2016-10-01 22:17:46 +00:00
|
|
|
@classmethod
|
|
|
|
def get_all_members(cls):
|
2017-09-03 16:17:25 +00:00
|
|
|
return cls.objects.filter(
|
|
|
|
stripecustomer__membershiporder__isnull=False)
|
2016-10-01 22:17:46 +00:00
|
|
|
|
2016-03-07 16:49:02 +00:00
|
|
|
@classmethod
|
|
|
|
def validate_url(cls, validation_slug):
|
|
|
|
user = cls.objects.filter(validation_slug=validation_slug).first()
|
|
|
|
if user:
|
|
|
|
user.validated = 1
|
2016-03-16 14:10:48 +00:00
|
|
|
user.save()
|
2016-03-07 16:49:02 +00:00
|
|
|
return True
|
|
|
|
return False
|
2016-03-07 18:19:25 +00:00
|
|
|
|
2017-06-22 07:52:14 +00:00
|
|
|
@classmethod
|
|
|
|
def get_random_password(cls):
|
|
|
|
return get_random_string(24)
|
|
|
|
|
2016-03-07 17:39:24 +00:00
|
|
|
def is_superuser(self):
|
2016-03-16 14:10:48 +00:00
|
|
|
return False
|
2016-03-07 18:19:25 +00:00
|
|
|
|
2016-03-07 16:49:02 +00:00
|
|
|
def get_full_name(self):
|
|
|
|
# The user is identified by their email address
|
|
|
|
return self.email
|
|
|
|
|
|
|
|
def get_short_name(self):
|
|
|
|
# The user is identified by their email address
|
|
|
|
return self.email
|
|
|
|
|
2019-12-14 09:29:45 +00:00
|
|
|
def create_ldap_account(self, password):
|
2019-12-10 17:53:50 +00:00
|
|
|
# create ldap account for user if it does not exists already.
|
|
|
|
if self.in_ldap:
|
|
|
|
return
|
|
|
|
|
|
|
|
assign_username(self)
|
|
|
|
ldap_manager = LdapManager()
|
|
|
|
try:
|
2019-12-18 10:19:47 +00:00
|
|
|
user_exists_in_ldap, entries = ldap_manager.check_user_exists(self.username)
|
2019-12-10 17:53:50 +00:00
|
|
|
except Exception:
|
|
|
|
logger.exception("Exception occur while searching for user in LDAP")
|
|
|
|
else:
|
|
|
|
if not user_exists_in_ldap:
|
|
|
|
# IF no ldap account
|
|
|
|
first_name, last_name = get_first_and_last_name(self.name)
|
|
|
|
if not last_name:
|
|
|
|
last_name = first_name
|
2019-12-14 09:29:45 +00:00
|
|
|
ldap_manager.create_user(self.username, password=password,
|
2019-12-10 17:53:50 +00:00
|
|
|
firstname=first_name, lastname=last_name,
|
|
|
|
email=self.email)
|
2020-03-05 17:10:59 +00:00
|
|
|
else:
|
|
|
|
# User exists already in LDAP, but with a dummy credential
|
|
|
|
# We are here implies that the user has successfully
|
|
|
|
# authenticated against Django db, and a corresponding user
|
|
|
|
# exists in LDAP.
|
|
|
|
# We just update the LDAP credentials once again, assuming it
|
|
|
|
# was set to a dummy value while migrating users from Django to
|
|
|
|
# LDAP
|
|
|
|
ldap_manager.change_password(self.username, password)
|
2020-03-05 18:31:27 +00:00
|
|
|
self.in_ldap = True
|
|
|
|
self.save()
|
2019-12-13 15:37:30 +00:00
|
|
|
|
2016-03-07 16:49:02 +00:00
|
|
|
def __str__(self): # __unicode__ on Python 2
|
|
|
|
return self.email
|
|
|
|
|
2016-07-11 03:08:51 +00:00
|
|
|
# def has_perm(self, perm, obj=None):
|
|
|
|
# "Does the user have a specific permission?"
|
|
|
|
# # Simplest possible answer: Yes, always
|
|
|
|
# return self.is_admin
|
2016-03-07 16:49:02 +00:00
|
|
|
|
|
|
|
def has_module_perms(self, app_label):
|
|
|
|
"Does the user have permissions to view the app `app_label`?"
|
|
|
|
# Simplest possible answer: Yes, always
|
2016-05-02 00:00:38 +00:00
|
|
|
return self.is_admin
|
2016-03-07 16:49:02 +00:00
|
|
|
|
|
|
|
@property
|
|
|
|
def is_staff(self):
|
|
|
|
"Is the user a member of staff?"
|
|
|
|
# Simplest possible answer: All admins are staff
|
|
|
|
return self.is_admin
|
|
|
|
|
2018-02-13 01:42:40 +00:00
|
|
|
@is_staff.setter
|
|
|
|
def is_staff(self, value):
|
|
|
|
self._is_staff = value
|
|
|
|
|
2016-03-11 18:42:45 +00:00
|
|
|
|
2016-04-26 06:16:03 +00:00
|
|
|
class StripeCustomer(models.Model):
|
|
|
|
user = models.OneToOneField(CustomUser)
|
|
|
|
stripe_id = models.CharField(unique=True, max_length=100)
|
|
|
|
|
2016-06-03 05:07:47 +00:00
|
|
|
def __str__(self):
|
|
|
|
return "%s - %s" % (self.stripe_id, self.user.email)
|
|
|
|
|
2017-09-21 01:11:09 +00:00
|
|
|
@classmethod
|
2017-09-22 10:01:09 +00:00
|
|
|
def create_stripe_api_customer(cls, email=None, token=None,
|
|
|
|
customer_name=None):
|
2017-09-21 01:11:09 +00:00
|
|
|
"""
|
|
|
|
This method creates a Stripe API customer with the given
|
2017-09-28 12:49:17 +00:00
|
|
|
email, token and customer_name. This is different from
|
|
|
|
get_or_create method below in that it does not create a
|
|
|
|
CustomUser and associate the customer created in stripe
|
2017-09-21 01:11:09 +00:00
|
|
|
with it, while get_or_create does that before creating the
|
|
|
|
stripe user.
|
|
|
|
"""
|
|
|
|
stripe_utils = StripeUtils()
|
|
|
|
stripe_data = stripe_utils.create_customer(token, email, customer_name)
|
|
|
|
if stripe_data.get('response_object'):
|
|
|
|
stripe_cus_id = stripe_data.get('response_object').get('id')
|
|
|
|
return stripe_cus_id
|
|
|
|
else:
|
|
|
|
return None
|
|
|
|
|
2016-04-26 06:16:03 +00:00
|
|
|
@classmethod
|
|
|
|
def get_or_create(cls, email=None, token=None):
|
|
|
|
"""
|
|
|
|
Check if there is a registered stripe customer with that email
|
|
|
|
or create a new one
|
|
|
|
"""
|
|
|
|
try:
|
2016-05-01 12:13:12 +00:00
|
|
|
stripe_utils = StripeUtils()
|
2016-04-26 06:16:03 +00:00
|
|
|
stripe_customer = cls.objects.get(user__email=email)
|
2016-05-02 00:00:38 +00:00
|
|
|
# check if user is not in stripe but in database
|
2016-12-19 14:33:15 +00:00
|
|
|
customer = stripe_utils.check_customer(stripe_customer.stripe_id,
|
|
|
|
stripe_customer.user, token)
|
2017-10-21 18:39:00 +00:00
|
|
|
if "deleted" in customer and customer["deleted"]:
|
|
|
|
raise StripeCustomer.DoesNotExist()
|
2016-04-26 06:16:03 +00:00
|
|
|
return stripe_customer
|
|
|
|
except StripeCustomer.DoesNotExist:
|
|
|
|
user = CustomUser.objects.get(email=email)
|
|
|
|
stripe_utils = StripeUtils()
|
2017-08-15 10:35:52 +00:00
|
|
|
stripe_data = stripe_utils.create_customer(token, email, user.name)
|
2016-05-20 22:03:17 +00:00
|
|
|
if stripe_data.get('response_object'):
|
|
|
|
stripe_cus_id = stripe_data.get('response_object').get('id')
|
2017-10-26 13:00:54 +00:00
|
|
|
if hasattr(user, 'stripecustomer'):
|
2017-10-21 18:39:00 +00:00
|
|
|
# User already had a Stripe account and we are here
|
|
|
|
# because the account was deleted in dashboard
|
|
|
|
# So, we simply update the stripe_id
|
|
|
|
user.stripecustomer.stripe_id = stripe_cus_id
|
|
|
|
user.stripecustomer.save()
|
|
|
|
stripe_customer = user.stripecustomer
|
2017-10-26 13:00:54 +00:00
|
|
|
else:
|
|
|
|
# The user never had an associated Stripe account
|
|
|
|
# So, create one
|
|
|
|
stripe_customer = StripeCustomer.objects.create(
|
|
|
|
user=user, stripe_id=stripe_cus_id
|
|
|
|
)
|
2016-05-20 22:03:17 +00:00
|
|
|
return stripe_customer
|
|
|
|
else:
|
|
|
|
return None
|
2016-04-26 06:16:03 +00:00
|
|
|
|
|
|
|
|
2016-03-11 18:42:45 +00:00
|
|
|
class CreditCards(models.Model):
|
|
|
|
name = models.CharField(max_length=50)
|
|
|
|
user_id = models.ForeignKey(CustomUser, on_delete=models.CASCADE)
|
|
|
|
card_number = models.CharField(max_length=50)
|
2017-09-03 16:17:25 +00:00
|
|
|
expiry_date = models.CharField(max_length=50, validators=[
|
|
|
|
RegexValidator(r'\d{2}\/\d{4}', _(
|
|
|
|
'Use this pattern(MM/YYYY).'))])
|
|
|
|
ccv = models.CharField(max_length=4, validators=[
|
|
|
|
RegexValidator(r'\d{3,4}', _('Wrong CCV number.'))])
|
2016-04-23 17:00:20 +00:00
|
|
|
payment_type = models.CharField(max_length=5, default='N')
|
|
|
|
|
2016-05-01 12:13:12 +00:00
|
|
|
def save(self, *args, **kwargs):
|
|
|
|
# override saving to database
|
|
|
|
pass
|
|
|
|
|
2016-04-23 17:00:20 +00:00
|
|
|
|
2019-05-06 06:07:26 +00:00
|
|
|
class DeletedUser(models.Model):
|
|
|
|
user_id = models.PositiveIntegerField()
|
|
|
|
|
|
|
|
# why 254 ? => to be consistent with legacy code
|
|
|
|
name = models.CharField(max_length=254)
|
|
|
|
email = models.EmailField(unique=True, max_length=254)
|
|
|
|
deleted_at = models.DateTimeField(auto_now_add=True)
|
|
|
|
|
|
|
|
|
2016-04-23 17:00:20 +00:00
|
|
|
class Calendar(models.Model):
|
|
|
|
datebooked = models.DateField()
|
|
|
|
user = models.ForeignKey(CustomUser)
|
|
|
|
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
if kwargs.get('datebooked'):
|
|
|
|
user = kwargs.get('user')
|
2017-09-03 16:17:25 +00:00
|
|
|
kwargs['datebooked'] = datetime.strptime(
|
|
|
|
kwargs.get('datebooked', ''), '%d,%m,%Y')
|
2016-04-23 17:00:20 +00:00
|
|
|
self.user_id = user.id
|
|
|
|
super(Calendar, self).__init__(*args, **kwargs)
|
|
|
|
|
|
|
|
@classmethod
|
2016-05-01 12:13:12 +00:00
|
|
|
def add_dates(cls, dates, user):
|
2016-04-23 17:00:20 +00:00
|
|
|
old_dates = Calendar.objects.filter(user_id=user.id)
|
|
|
|
if old_dates:
|
|
|
|
old_dates.delete()
|
|
|
|
for date in dates:
|
2016-05-01 12:13:12 +00:00
|
|
|
Calendar.objects.create(datebooked=date, user=user)
|