-
Notifications
You must be signed in to change notification settings - Fork 40
Expand file tree
/
Copy pathmodels.py
More file actions
315 lines (251 loc) · 10.4 KB
/
models.py
File metadata and controls
315 lines (251 loc) · 10.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
import uuid
from datetime import datetime
from django.contrib.auth.models import AbstractUser, Group
from django.contrib.auth.password_validation import validate_password
from django.contrib.contenttypes.fields import GenericForeignKey, GenericRelation
from django.contrib.contenttypes.models import ContentType
from django.core.exceptions import ValidationError
from django.db import models
from rest_framework.authtoken.models import Token
from core.common.mixins import SourceContainerMixin
from core.common.models import BaseModel, CommonLogoModel
from core.common.tasks import send_user_verification_email, send_user_reset_password_email
from core.common.utils import web_url
from core.users.constants import AUTH_GROUPS, MAPPER_WAITLIST_GROUP, STAFF_GROUP, SUPERADMIN_GROUP, GUEST_GROUP, \
MAPPER_APPROVED_GROUP, CORE_USER_GROUP
from .constants import USER_OBJECT_TYPE
from ..common.checksums import ChecksumModel
class Follow(models.Model):
class Meta:
db_table = 'follows'
unique_together = ('follower', 'following_id', 'following_type')
follower = models.ForeignKey('users.UserProfile', on_delete=models.CASCADE, related_name='following')
follow_date = models.DateTimeField(auto_now_add=True)
following_id = models.PositiveIntegerField()
following_type = models.ForeignKey(ContentType, on_delete=models.CASCADE)
following = GenericForeignKey('following_type', 'following_id')
@property
def type(self):
return 'Follow'
def clean(self):
if self.follower == self.following:
raise ValidationError("User cannot follow themselves.")
@property
def uri(self):
return f"/users/{self.follower.username}/following/{self.id}/"
class UserProfile(AbstractUser, BaseModel, CommonLogoModel, SourceContainerMixin, ChecksumModel):
class Meta:
db_table = 'user_profiles'
swappable = 'AUTH_USER_MODEL'
indexes = [
models.Index(fields=['uri']),
models.Index(fields=['public_access']),
] + BaseModel.Meta.indexes
OBJECT_TYPE = USER_OBJECT_TYPE
first_name = models.CharField(max_length=100, blank=True)
last_name = models.CharField(max_length=100, blank=True)
organizations = models.ManyToManyField('orgs.Organization', related_name='members')
company = models.TextField(null=True, blank=True)
location = models.TextField(null=True, blank=True)
preferred_locale = models.TextField(null=True, blank=True)
website = models.TextField(null=True, blank=True)
verified = models.BooleanField(default=True)
verification_token = models.TextField(null=True, blank=True)
deactivated_at = models.DateTimeField(null=True, blank=True)
followers = GenericRelation(Follow, object_id_field='following_id', content_type_field='following_type')
bio = models.TextField(null=True, blank=True)
mnemonic_attr = 'username'
es_fields = {
'username': {'sortable': False, 'filterable': True, 'exact': True},
'_username': {'sortable': True, 'filterable': False, 'exact': False},
'name': {'sortable': False, 'filterable': True, 'exact': True},
'_name': {'sortable': True, 'filterable': False, 'exact': False},
'date_joined': {'sortable': True, 'default': 'asc', 'filterable': False},
'updated_by': {'sortable': False, 'filterable': False, 'facet': True},
'company': {'sortable': True, 'filterable': True, 'exact': True},
'location': {'sortable': True, 'filterable': True, 'exact': True},
'is_superuser': {'sortable': False, 'filterable': True, 'exact': False, 'facet': True},
'is_staff': {'sortable': False, 'filterable': False, 'exact': False, 'facet': True},
'is_admin': {'sortable': False, 'filterable': False, 'exact': False, 'facet': True}
}
@property
def events(self):
from core.events.models import Event
return Event.objects.filter(object_url=self.uri)
def calculate_uri(self):
return f"/users/{self.username}/"
@staticmethod
def get_search_document():
from core.users.documents import UserProfileDocument
return UserProfileDocument
@staticmethod
def get_brief_serializer():
from core.users.serializers import UserListSerializer
return UserListSerializer
@property
def status(self):
if not self.is_active:
return 'deactivated'
if not self.verified:
return 'verification_pending' if self.verification_token else 'unverified'
return 'verified'
@property
def user(self):
return self.username
@property
def name(self):
name = self.first_name.strip()
if self.last_name:
name += f" {self.last_name.strip()}"
return name
@property
def full_name(self):
return self.name
@property
def mnemonic(self):
return self.username
@staticmethod
def get_url_kwarg():
return 'user'
@property
def organizations_url(self):
return f"/users/{self.mnemonic}/orgs/"
def update_password(self, password=None, hashed_password=None):
if not password and not hashed_password:
return None
if password:
try:
validate_password(password)
self.set_password(password)
except ValidationError as ex:
return {'errors': ex.messages}
elif hashed_password:
self.password = hashed_password
if self.verification_token:
self.verification_token = None
self.save()
self.refresh_token()
return None
def refresh_token(self):
self.__delete_token()
self.__create_token()
def get_token(self):
token = Token.objects.filter(user_id=self.id).first() or self.__create_token()
return token.key
def set_token(self, token):
self.__delete_token()
Token.objects.create(user=self, key=token)
def is_admin_for(self, concept_container): # pragma: no cover
parent_id = concept_container.parent_id
return parent_id == self.id or self.organizations.filter(id=parent_id).exists()
def __create_token(self):
return Token.objects.create(user=self)
def __delete_token(self):
return Token.objects.filter(user=self).delete()
@property
def orgs_count(self):
return self.organizations.count()
@property
def owned_orgs_count(self):
return self.organizations.filter(created_by=self).count()
def send_verification_email(self):
return send_user_verification_email.apply_async((self.id,), queue='default', permanent=False)
def send_reset_password_email(self):
return send_user_reset_password_email.apply_async((self.id,), queue='default', permanent=False)
@property
def email_verification_url(self):
return f"{web_url()}/#/accounts/{self.username}/verify/{self.verification_token}/"
@property
def reset_password_url(self):
return f"{web_url()}/#/accounts/{self.username}/password/reset/{self.verification_token}/"
def mark_verified(self, token, force=False):
if self.verified:
return True
if token == self.verification_token or force:
self.verified = True
self.verification_token = None
self.deactivated_at = None
self.save()
return True
return False
@staticmethod
def is_valid_auth_group(*names):
return all(name in AUTH_GROUPS for name in names)
@property
def auth_groups(self):
return self.groups.values_list('name', flat=True)
def has_auth_group(self, group_name):
return self.groups.filter(name=group_name).exists()
@property
def is_mapper_waitlisted(self):
return self.has_auth_group(MAPPER_WAITLIST_GROUP)
@property
def is_mapper_approved(self):
return self.has_auth_group(MAPPER_APPROVED_GROUP)
@property
def is_guest_group(self):
return self.has_auth_group(GUEST_GROUP)
@property
def is_core_group(self):
"""Return whether the user belongs to the elevated core auth group."""
return self.has_auth_group(CORE_USER_GROUP)
@property
def is_staff_group(self):
return self.has_auth_group(STAFF_GROUP)
@property
def is_superadmin_group(self):
return self.has_auth_group(SUPERADMIN_GROUP)
@property
def auth_headers(self):
return {'Authorization': f'Token {self.get_token()}'}
def deactivate(self):
self.is_active = False
self.verified = False
self.verification_token = None
self.deactivated_at = datetime.now()
self.__delete_token()
self.save()
self.set_checksums()
def verify(self):
self.is_active = True
self.verified = False
self.verification_token = uuid.uuid4()
self.save()
self.token = self.get_token()
self.send_verification_email()
def soft_delete(self):
self.deactivate()
def undelete(self):
self.verified = True
self.verification_token = None
self.deactivated_at = None
self.is_active = True
self.save()
self.set_checksums()
def is_member_of_org(self, org_mnemonic):
return self.organizations.filter(mnemonic=org_mnemonic).exists()
def follow(self, following):
self.following.create(following_id=following.id, following_type=ContentType.objects.get_for_model(following))
from core.events.models import Event
self.events.create(
actor=self,
event_type=Event.FOLLOWED,
object_url=self.url,
referenced_object_url=following.url,
)
def unfollow(self, following):
self.following.filter(
following_id=following.id, following_type=ContentType.objects.get_for_model(following)).delete()
from core.events.models import Event
self.events.create(
actor=self,
event_type=Event.UNFOLLOWED,
object_url=self.url,
referenced_object_url=following.url,
)
def set_groups(self, groups, verify=True):
if not verify or sorted(self.groups.values_list('name', flat=True)) != sorted(groups):
self.groups.set(Group.objects.filter(name__in=groups))
self.is_staff = self.has_auth_group(STAFF_GROUP)
self.is_superuser = self.has_auth_group(SUPERADMIN_GROUP)
self.save()