8
0
Fork 0
mirror of https://gitlab2.federez.net/re2o/re2o synced 2024-11-27 15:12:25 +00:00
re2o/users/views.py

1190 lines
39 KiB
Python
Raw Normal View History

2018-08-09 09:15:40 +00:00
# -*- mode: python; coding: utf-8 -*-
2017-01-15 23:01:18 +00:00
# Re2o est un logiciel d'administration développé initiallement au rezometz. Il
# se veut agnostique au réseau considéré, de manière à être installable en
# quelques clics.
#
# Copyright © 2017 Gabriel Détraz
# Copyright © 2017 Lara Kermarec
2017-01-15 23:01:18 +00:00
# Copyright © 2017 Augustin Lemesle
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
2016-06-30 18:18:06 +00:00
# App de gestion des users pour re2o
# Lara Kermarec, Gabriel Détraz, Lemesle Augustin
2016-06-30 18:18:06 +00:00
# Gplv2
2017-10-14 20:10:07 +00:00
"""
Module des views.
On définit les vues pour l'ajout, l'edition des users : infos personnelles,
mot de passe, etc
Permet aussi l'ajout, edition et suppression des droits, des bannissements,
des whitelist, des services users et des écoles
"""
from __future__ import unicode_literals
2017-10-26 15:58:41 +00:00
from django.urls import reverse
from django.shortcuts import get_object_or_404, render, redirect
from django.contrib import messages
2016-07-09 02:12:09 +00:00
from django.contrib.auth.decorators import login_required, permission_required
from django.db.models import ProtectedError, Count, Max
from django.utils import timezone
from django.db import transaction
from django.http import HttpResponse
from django.http import HttpResponseRedirect
from django.views.decorators.csrf import csrf_exempt
2018-08-15 17:15:26 +00:00
from django.utils.translation import ugettext as _
from django.template import loader
from rest_framework.renderers import JSONRenderer
2018-04-14 23:16:49 +00:00
from reversion import revisions as reversion
from cotisations.models import Facture, Paiement
2018-04-14 23:16:49 +00:00
from machines.models import Machine
2019-07-10 09:16:37 +00:00
2018-07-10 21:36:01 +00:00
from preferences.models import OptionalUser, GeneralOption, AssoOption
from importlib import import_module
from re2o.settings_local import OPTIONNAL_APPS_RE2O
2018-04-14 23:16:49 +00:00
from re2o.views import form
from re2o.utils import all_has_access
from re2o.base import re2o_paginator, SortTable
2018-04-14 23:16:49 +00:00
from re2o.acl import (
can_create,
can_edit,
can_delete_set,
can_delete,
can_view,
can_view_all,
can_change,
2018-04-14 23:16:49 +00:00
)
from cotisations.utils import find_payment_method
from topologie.models import Port
2018-04-14 23:16:49 +00:00
from .serializers import MailingSerializer, MailingMemberSerializer
from .models import (
User,
Ban,
Whitelist,
School,
ListRight,
Request,
ServiceUser,
Adherent,
2017-11-28 18:41:14 +00:00
Club,
ListShell,
2018-08-01 11:06:25 +00:00
EMailAddress,
)
2018-04-14 23:16:49 +00:00
from .forms import (
BanForm,
WhitelistForm,
2018-08-01 11:06:25 +00:00
EMailAddressForm,
2018-07-30 15:00:41 +00:00
EmailSettingsForm,
DelSchoolForm,
DelListRightForm,
NewListRightForm,
StateForm,
SchoolForm,
ShellForm,
EditServiceUserForm,
ServiceUserForm,
ListRightForm,
AdherentCreationForm,
AdherentEditForm,
ClubForm,
MassArchiveForm,
PassForm,
ResetPasswordForm,
2017-12-31 16:11:19 +00:00
ClubAdminandMembersForm,
GroupForm,
InitialRegisterForm,
)
2018-04-14 01:25:05 +00:00
2017-11-28 21:54:13 +00:00
@can_create(Adherent)
2016-06-30 18:18:06 +00:00
def new_user(request):
2017-10-14 20:10:07 +00:00
""" Vue de création d'un nouvel utilisateur,
envoie un mail pour le mot de passe"""
user = AdherentCreationForm(request.POST or None, user=request.user)
GTU_sum_up = GeneralOption.get_cached_value("GTU_sum_up")
GTU = GeneralOption.get_cached_value("GTU")
is_set_password_allowed = OptionalUser.get_cached_value("allow_set_password_during_user_creation")
if user.is_valid():
user = user.save()
# Use "is False" so that if None, the email is sent
if is_set_password_allowed and user.should_send_password_reset_email is False:
2020-04-16 20:06:14 +00:00
user.confirm_email_address_mail(request)
messages.success(
request,
_("The user %s was created.")
% user.pseudo,
)
else:
user.reset_passwd_mail(request)
messages.success(
request,
_("The user %s was created, an email to set the password was sent.")
% user.pseudo,
)
return redirect(reverse("users:profil", kwargs={"userid": str(user.id)}))
# Anonymous users are allowed to create new accounts
# but they should be treated differently
params = {
"userform": user,
"GTU_sum_up": GTU_sum_up,
"GTU": GTU,
"showCGU": True,
"action_name": _("Commit"),
}
if is_set_password_allowed:
params["load_js_file"] = "/static/js/toggle_password_fields.js"
return form(params, "users/user.html", request)
2017-10-14 20:10:07 +00:00
@login_required
2017-11-28 21:54:13 +00:00
@can_create(Club)
def new_club(request):
""" Vue de création d'un nouveau club,
envoie un mail pour le mot de passe"""
club = ClubForm(request.POST or None, user=request.user)
if club.is_valid():
club = club.save(commit=False)
club.save()
club.reset_passwd_mail(request)
messages.success(
request,
2019-11-20 00:52:11 +00:00
_("The club %s was created, an email to set the password was sent.")
% club.pseudo,
)
return redirect(reverse("users:profil", kwargs={"userid": str(club.id)}))
2018-04-14 01:25:05 +00:00
return form(
{"userform": club, "showCGU": False, "action_name": _("Create a club")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
@login_required
@can_edit(Club)
2018-04-15 01:00:05 +00:00
def edit_club_admin_members(request, club_instance, **_kwargs):
"""Vue d'edition de la liste des users administrateurs et
membres d'un club"""
club = ClubAdminandMembersForm(request.POST or None, instance=club_instance)
if club.is_valid():
2018-03-31 22:06:44 +00:00
if club.changed_data:
club.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The club was edited."))
return redirect(
reverse("users:profil", kwargs={"userid": str(club_instance.id)})
)
2018-04-14 01:25:05 +00:00
return form(
{
"userform": club,
"showCGU": False,
2019-11-20 00:52:11 +00:00
"action_name": _("Edit"),
2018-04-14 01:25:05 +00:00
},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2016-07-08 10:35:53 +00:00
@login_required
@can_edit(User)
def edit_info(request, user, userid):
2017-10-14 20:10:07 +00:00
""" Edite un utilisateur à partir de son id,
si l'id est différent de request.user, vérifie la
possession du droit cableur """
if user.is_class_adherent:
user_form = AdherentEditForm(
request.POST or None, instance=user.adherent, user=request.user
)
2018-04-14 23:16:49 +00:00
else:
user_form = ClubForm(
request.POST or None, instance=user.club, user=request.user
)
2018-04-14 23:16:49 +00:00
if user_form.is_valid():
if user_form.changed_data:
user = user_form.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The user was edited."))
if user_form.should_send_confirmation_email:
user.confirm_email_address_mail(request)
messages.success(request, _("Sent a new confirmation email"))
return redirect(reverse("users:profil", kwargs={"userid": str(userid)}))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": user_form, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_edit(User, "state")
def state(request, user, userid):
2018-07-20 10:59:24 +00:00
""" Change the state (active/unactive/archived) of a user"""
2018-04-14 23:16:49 +00:00
state_form = StateForm(request.POST or None, instance=user)
if state_form.is_valid():
if state_form.changed_data:
state_form.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The state was edited."))
return redirect(reverse("users:profil", kwargs={"userid": str(userid)}))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": state_form, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-10-14 20:10:07 +00:00
2017-12-31 16:11:19 +00:00
@login_required
@can_edit(User, "groups")
2017-12-31 16:11:19 +00:00
def groups(request, user, userid):
2018-04-14 23:16:49 +00:00
""" View to edit the groups of a user """
group_form = GroupForm(request.POST or None, instance=user, user=request.user)
2018-04-14 23:16:49 +00:00
if group_form.is_valid():
if group_form.changed_data:
group_form.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The groups were edited."))
return redirect(reverse("users:profil", kwargs={"userid": str(userid)}))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": group_form, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-12-31 16:11:19 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_edit(User, "password")
def password(request, user, userid):
2016-11-21 00:49:45 +00:00
""" Reinitialisation d'un mot de passe à partir de l'userid,
pour self par défaut, pour tous sans droit si droit cableur,
pour tous si droit bureau """
u_form = PassForm(request.POST or None, instance=user, user=request.user)
if u_form.is_valid():
2018-03-31 22:06:44 +00:00
if u_form.changed_data:
u_form.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The password was changed."))
return redirect(reverse("users:profil", kwargs={"userid": str(userid)}))
2018-04-14 01:25:05 +00:00
return form(
{"userform": u_form, "action_name": _("Change the password")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2016-07-01 22:35:44 +00:00
2017-10-14 20:10:07 +00:00
2017-12-31 16:11:19 +00:00
@login_required
@can_edit(User, "groups")
2018-04-15 01:00:05 +00:00
def del_group(request, user, listrightid, **_kwargs):
2018-04-14 23:16:49 +00:00
""" View used to delete a group """
user.groups.remove(ListRight.objects.get(id=listrightid))
user.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("%s was removed from the group.") % user)
return HttpResponseRedirect(request.META.get("HTTP_REFERER"))
2017-12-31 16:11:19 +00:00
2018-05-03 08:26:17 +00:00
@login_required
@can_edit(User, "is_superuser")
2018-05-03 08:26:17 +00:00
def del_superuser(request, user, **_kwargs):
"""Remove the superuser right of an user."""
user.is_superuser = False
user.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("%s is no longer superuser.") % user)
return HttpResponseRedirect(request.META.get("HTTP_REFERER"))
2018-05-03 08:26:17 +00:00
2017-06-18 12:59:53 +00:00
@login_required
2017-11-28 21:54:13 +00:00
@can_create(ServiceUser)
2017-06-18 12:59:53 +00:00
def new_serviceuser(request):
""" Vue de création d'un nouvel utilisateur service"""
user = ServiceUserForm(request.POST or None)
if user.is_valid():
user.save()
messages.success(request, _("The service user was created."))
return redirect(reverse("users:index-serviceusers"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": user, "action_name": _("Add")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-06-18 12:59:53 +00:00
2017-10-14 20:10:07 +00:00
2017-06-18 12:59:53 +00:00
@login_required
@can_edit(ServiceUser)
2018-04-15 01:00:05 +00:00
def edit_serviceuser(request, serviceuser, **_kwargs):
""" Edit a ServiceUser """
serviceuser = EditServiceUserForm(request.POST or None, instance=serviceuser)
2018-04-10 17:12:28 +00:00
if serviceuser.is_valid():
if serviceuser.changed_data:
serviceuser.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The service user was edited."))
return redirect(reverse("users:index-serviceusers"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": serviceuser, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-06-18 12:59:53 +00:00
2017-10-14 20:10:07 +00:00
2017-06-18 12:59:53 +00:00
@login_required
@can_delete(ServiceUser)
2018-04-15 01:00:05 +00:00
def del_serviceuser(request, serviceuser, **_kwargs):
2017-10-14 20:10:07 +00:00
"""Suppression d'un ou plusieurs serviceusers"""
2017-06-18 12:59:53 +00:00
if request.method == "POST":
2018-04-10 17:12:28 +00:00
serviceuser.delete()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The service user was deleted."))
return redirect(reverse("users:index-serviceusers"))
2017-10-14 20:10:07 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"objet": serviceuser, "objet_name": _("service user")},
"users/delete.html",
request,
2017-10-14 20:10:07 +00:00
)
2017-06-18 12:59:53 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_create(Ban)
@can_edit(User)
def add_ban(request, user, userid):
2017-10-14 20:10:07 +00:00
""" Ajouter un banissement, nécessite au moins le droit bofh
(a fortiori bureau)
2016-11-21 00:49:45 +00:00
Syntaxe : JJ/MM/AAAA , heure optionnelle, prend effet immédiatement"""
ban_instance = Ban(user=user)
ban = BanForm(request.POST or None, instance=ban_instance)
if ban.is_valid():
2018-04-14 23:16:49 +00:00
ban.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The ban was added."))
return redirect(reverse("users:profil", kwargs={"userid": str(userid)}))
if user.is_ban():
messages.error(request, _("Warning: this user already has an active ban."))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": ban, "action_name": _("Add")}, "users/user.html", request
2018-04-14 01:25:05 +00:00
)
2016-07-08 10:35:53 +00:00
@login_required
@can_edit(Ban)
2018-04-15 01:00:05 +00:00
def edit_ban(request, ban_instance, **_kwargs):
2017-10-14 20:10:07 +00:00
""" Editer un bannissement, nécessite au moins le droit bofh
(a fortiori bureau)
2016-11-21 00:49:45 +00:00
Syntaxe : JJ/MM/AAAA , heure optionnelle, prend effet immédiatement"""
ban = BanForm(request.POST or None, instance=ban_instance)
if ban.is_valid():
2018-03-31 22:06:44 +00:00
if ban.changed_data:
ban.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The ban was edited."))
return redirect(reverse("users:index"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": ban, "action_name": _("Edit")}, "users/user.html", request
2018-04-14 01:25:05 +00:00
)
@login_required
@can_delete(Ban)
def del_ban(request, ban, **_kwargs):
""" Supprime un banissement"""
if request.method == "POST":
ban.delete()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The ban was deleted."))
return redirect(reverse("users:profil", kwargs={"userid": str(ban.user.id)}))
2019-11-20 00:52:11 +00:00
return form({"objet": ban, "objet_name": _("ban")}, "users/delete.html", request)
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_create(Whitelist)
@can_edit(User)
def add_whitelist(request, user, userid):
2017-10-14 20:10:07 +00:00
""" Accorder un accès gracieux, temporaire ou permanent.
Need droit cableur
Syntaxe : JJ/MM/AAAA , heure optionnelle, prend effet immédiatement,
raison obligatoire"""
2016-07-04 18:04:11 +00:00
whitelist_instance = Whitelist(user=user)
whitelist = WhitelistForm(request.POST or None, instance=whitelist_instance)
2016-07-04 18:04:11 +00:00
if whitelist.is_valid():
whitelist.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The whitelist was added."))
return redirect(reverse("users:profil", kwargs={"userid": str(userid)}))
if user.is_whitelisted():
messages.error(
request, _("Warning: this user already has an active whitelist.")
)
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": whitelist, "action_name": _("Add")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2016-07-04 18:04:11 +00:00
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_edit(Whitelist)
2018-04-15 01:00:05 +00:00
def edit_whitelist(request, whitelist_instance, **_kwargs):
2017-10-14 20:10:07 +00:00
""" Editer un accès gracieux, temporaire ou permanent.
Need droit cableur
Syntaxe : JJ/MM/AAAA , heure optionnelle, prend effet immédiatement,
raison obligatoire"""
whitelist = WhitelistForm(request.POST or None, instance=whitelist_instance)
2016-07-04 18:04:11 +00:00
if whitelist.is_valid():
2018-03-31 22:06:44 +00:00
if whitelist.changed_data:
whitelist.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The whitelist was edited."))
return redirect(reverse("users:index"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": whitelist, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2016-07-04 18:04:11 +00:00
2017-10-14 20:10:07 +00:00
@login_required
@can_delete(Whitelist)
def del_whitelist(request, whitelist, **_kwargs):
""" Supprime un acces gracieux"""
if request.method == "POST":
whitelist.delete()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The whitelist was deleted."))
return redirect(
reverse("users:profil", kwargs={"userid": str(whitelist.user.id)})
)
return form(
2019-11-20 00:52:11 +00:00
{"objet": whitelist, "objet_name": _("whitelist")}, "users/delete.html", request
)
@login_required
2018-08-01 11:06:25 +00:00
@can_create(EMailAddress)
@can_edit(User)
2018-08-01 11:06:25 +00:00
def add_emailaddress(request, user, userid):
2018-07-30 15:00:41 +00:00
""" Create a new local email account"""
2018-08-01 11:06:25 +00:00
emailaddress_instance = EMailAddress(user=user)
emailaddress = EMailAddressForm(
request.POST or None, instance=emailaddress_instance
)
2018-08-01 11:06:25 +00:00
if emailaddress.is_valid():
emailaddress.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The local email account was created."))
return redirect(reverse("users:profil", kwargs={"userid": str(userid)}))
return form(
{
"userform": emailaddress,
"showCGU": False,
2019-11-20 00:52:11 +00:00
"action_name": _("Add"),
},
"users/user.html",
request,
)
2018-07-30 15:00:41 +00:00
@login_required
2018-08-01 11:06:25 +00:00
@can_edit(EMailAddress)
def edit_emailaddress(request, emailaddress_instance, **_kwargs):
2018-07-30 15:00:41 +00:00
""" Edit a local email account"""
2018-08-01 11:06:25 +00:00
emailaddress = EMailAddressForm(
request.POST or None, instance=emailaddress_instance
)
2018-08-01 11:06:25 +00:00
if emailaddress.is_valid():
if emailaddress.changed_data:
emailaddress.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The local email account was edited."))
return redirect(
reverse(
"users:profil", kwargs={"userid": str(emailaddress_instance.user.id)}
)
)
return form(
{
"userform": emailaddress,
"showCGU": False,
2019-11-20 00:52:11 +00:00
"action_name": _("Edit"),
},
"users/user.html",
request,
)
2018-07-30 15:00:41 +00:00
@login_required
2018-08-01 11:06:25 +00:00
@can_delete(EMailAddress)
def del_emailaddress(request, emailaddress, **_kwargs):
2018-07-30 15:00:41 +00:00
"""Delete a local email account"""
if request.method == "POST":
2018-08-01 11:06:25 +00:00
emailaddress.delete()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The local email account was deleted."))
return redirect(
reverse("users:profil", kwargs={"userid": str(emailaddress.user.id)})
)
2018-07-30 15:00:41 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"objet": emailaddress, "objet_name": _("email address")},
"users/delete.html",
request,
2018-07-30 15:00:41 +00:00
)
@login_required
2018-06-29 14:36:04 +00:00
@can_edit(User)
2018-07-30 15:00:41 +00:00
def edit_email_settings(request, user_instance, **_kwargs):
"""Edit the email settings of a user"""
email_settings = EmailSettingsForm(
request.POST or None, instance=user_instance, user=request.user
)
2018-07-30 15:00:41 +00:00
if email_settings.is_valid():
if email_settings.changed_data:
email_settings.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The email settings were edited."))
return redirect(
reverse("users:profil", kwargs={"userid": str(user_instance.id)})
)
return form(
{
"userform": email_settings,
"showCGU": False,
"load_js_file": "/static/js/email_address.js",
2019-11-20 00:52:11 +00:00
"action_name": _("Edit"),
},
"users/user.html",
request,
)
2018-07-30 15:00:41 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_create(School)
2016-07-06 17:45:36 +00:00
def add_school(request):
2017-10-14 20:10:07 +00:00
""" Ajouter un établissement d'enseignement à la base de donnée,
need cableur"""
2016-07-06 17:45:36 +00:00
school = SchoolForm(request.POST or None)
if school.is_valid():
school.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The school was added."))
return redirect(reverse("users:index-school"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": school, "action_name": _("Add")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2016-07-06 17:45:36 +00:00
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_edit(School)
2018-04-15 01:00:05 +00:00
def edit_school(request, school_instance, **_kwargs):
2017-10-14 20:10:07 +00:00
""" Editer un établissement d'enseignement à partir du schoolid dans
la base de donnée, need cableur"""
school = SchoolForm(request.POST or None, instance=school_instance)
if school.is_valid():
2018-03-31 22:06:44 +00:00
if school.changed_data:
school.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The school was edited."))
return redirect(reverse("users:index-school"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": school, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
2017-12-13 17:35:16 +00:00
@can_delete_set(School)
2017-12-12 03:33:50 +00:00
def del_school(request, instances):
2017-10-14 20:10:07 +00:00
""" Supprimer un établissement d'enseignement à la base de donnée,
need cableur
Objet protégé, possible seulement si aucun user n'est affecté à
l'établissement """
2017-12-12 03:33:50 +00:00
school = DelSchoolForm(request.POST or None, instances=instances)
2016-07-06 17:45:36 +00:00
if school.is_valid():
school_dels = school.cleaned_data["schools"]
2016-07-06 17:45:36 +00:00
for school_del in school_dels:
try:
school_del.delete()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The school was deleted."))
2016-07-06 17:45:36 +00:00
except ProtectedError:
messages.error(
request,
_(
"The school %s is assigned to at least one user,"
" impossible to delete it."
)
% school_del,
)
return redirect(reverse("users:index-school"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": school, "action_name": _("Confirm")}, "users/user.html", request
2018-04-14 01:25:05 +00:00
)
2016-07-06 17:45:36 +00:00
2017-10-14 20:10:07 +00:00
@login_required
@can_create(ListShell)
def add_shell(request):
2018-03-25 21:01:06 +00:00
""" Ajouter un shell à la base de donnée"""
shell = ShellForm(request.POST or None)
if shell.is_valid():
shell.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The shell was added."))
return redirect(reverse("users:index-shell"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": shell, "action_name": _("Add")}, "users/user.html", request
2018-04-14 01:25:05 +00:00
)
@login_required
@can_edit(ListShell)
2018-04-15 01:00:05 +00:00
def edit_shell(request, shell_instance, **_kwargs):
2018-03-28 18:46:17 +00:00
""" Editer un shell à partir du listshellid"""
shell = ShellForm(request.POST or None, instance=shell_instance)
if shell.is_valid():
2018-03-31 22:06:44 +00:00
if shell.changed_data:
shell.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The shell was edited."))
return redirect(reverse("users:index-shell"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": shell, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
@login_required
@can_delete(ListShell)
2018-04-15 01:00:05 +00:00
def del_shell(request, shell, **_kwargs):
"""Destruction d'un shell"""
if request.method == "POST":
shell.delete()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The shell was deleted."))
return redirect(reverse("users:index-shell"))
2019-11-20 00:52:11 +00:00
return form({"objet": shell, "objet_name": _("shell")}, "users/delete.html", request)
@login_required
@can_create(ListRight)
def add_listright(request):
2016-11-21 00:49:45 +00:00
""" Ajouter un droit/groupe, nécessite droit bureau.
Obligation de fournir un gid pour la synchro ldap, unique """
listright = NewListRightForm(request.POST or None)
if listright.is_valid():
listright.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The group of rights was added."))
return redirect(reverse("users:index-listright"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": listright, "action_name": _("Add")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-10-14 20:10:07 +00:00
@login_required
@can_edit(ListRight)
2018-04-15 01:00:05 +00:00
def edit_listright(request, listright_instance, **_kwargs):
2017-10-14 20:10:07 +00:00
""" Editer un groupe/droit, necessite droit bureau,
à partir du listright id """
listright = ListRightForm(request.POST or None, instance=listright_instance)
if listright.is_valid():
2018-03-31 22:06:44 +00:00
if listright.changed_data:
listright.save()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The group of rights was edited."))
return redirect(reverse("users:index-listright"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": listright, "action_name": _("Edit")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-10-14 20:10:07 +00:00
@login_required
2017-12-13 17:35:16 +00:00
@can_delete_set(ListRight)
def del_listright(request, instances):
2017-10-14 20:10:07 +00:00
""" Supprimer un ou plusieurs groupe, possible si il est vide, need droit
bureau """
2017-12-13 17:35:16 +00:00
listright = DelListRightForm(request.POST or None, instances=instances)
if listright.is_valid():
listright_dels = listright.cleaned_data["listrights"]
for listright_del in listright_dels:
try:
listright_del.delete()
2019-11-20 00:52:11 +00:00
messages.success(request, _("The group of rights was deleted."))
except ProtectedError:
messages.error(
request,
_(
"The group of rights %s is assigned to at least one"
" user, impossible to delete it."
)
% listright_del,
)
return redirect(reverse("users:index-listright"))
2018-04-14 01:25:05 +00:00
return form(
2019-11-20 00:52:11 +00:00
{"userform": listright, "action_name": _("Confirm")}, "users/user.html", request
2018-04-14 01:25:05 +00:00
)
2017-10-14 20:10:07 +00:00
@login_required
@can_view_all(User)
@can_change(User, "state")
def mass_archive(request):
""" Permet l'archivage massif"""
pagination_number = GeneralOption.get_cached_value("pagination_number")
to_archive_form = MassArchiveForm(request.POST or None)
to_archive_list = []
if to_archive_form.is_valid():
date = to_archive_form.cleaned_data["date"]
full_archive = to_archive_form.cleaned_data["full_archive"]
to_archive_list = (
User.objects.exclude(id__in=all_has_access())
.exclude(id__in=all_has_access(search_time=date))
.exclude(state=User.STATE_NOT_YET_ACTIVE)
.exclude(state=User.STATE_FULL_ARCHIVE)
2020-04-16 20:06:14 +00:00
.exclude(state=User.STATE_EMAIL_NOT_YET_CONFIRMED)
)
if not full_archive:
to_archive_list = to_archive_list.exclude(state=User.STATE_ARCHIVE)
if "valider" in request.POST:
if full_archive:
User.mass_full_archive(to_archive_list)
else:
User.mass_archive(to_archive_list)
messages.success(
request, _("%s users were archived.") % to_archive_list.count()
)
return redirect(reverse("users:index"))
to_archive_list = re2o_paginator(request, to_archive_list, pagination_number)
2017-10-14 20:10:07 +00:00
return form(
{"userform": to_archive_form, "to_archive_list": to_archive_list},
"users/mass_archive.html",
request,
2017-10-14 20:10:07 +00:00
)
2016-07-08 10:35:53 +00:00
@login_required
@can_view_all(Adherent)
2016-07-01 22:35:44 +00:00
def index(request):
""" Affiche l'ensemble des adherents, need droit cableur """
pagination_number = GeneralOption.get_cached_value("pagination_number")
users_list = Adherent.objects.select_related("room")
users_list = SortTable.sort(
users_list,
request.GET.get("col"),
request.GET.get("order"),
SortTable.USERS_INDEX,
)
users_list = re2o_paginator(request, users_list, pagination_number)
return render(request, "users/index.html", {"users_list": users_list})
2016-07-03 16:09:58 +00:00
2017-10-14 20:10:07 +00:00
@login_required
2017-12-28 15:10:34 +00:00
@can_view_all(Club)
def index_clubs(request):
""" Affiche l'ensemble des clubs, need droit cableur """
pagination_number = GeneralOption.get_cached_value("pagination_number")
clubs_list = Club.objects.select_related("room")
clubs_list = SortTable.sort(
clubs_list,
request.GET.get("col"),
request.GET.get("order"),
SortTable.USERS_INDEX,
)
clubs_list = re2o_paginator(request, clubs_list, pagination_number)
return render(request, "users/index_clubs.html", {"clubs_list": clubs_list})
2016-07-08 10:35:53 +00:00
@login_required
@can_view_all(Ban)
def index_ban(request):
2016-11-21 00:49:45 +00:00
""" Affiche l'ensemble des ban, need droit cableur """
pagination_number = GeneralOption.get_cached_value("pagination_number")
ban_list = Ban.objects.select_related("user")
ban_list = SortTable.sort(
ban_list,
request.GET.get("col"),
request.GET.get("order"),
SortTable.USERS_INDEX_BAN,
)
ban_list = re2o_paginator(request, ban_list, pagination_number)
return render(request, "users/index_ban.html", {"ban_list": ban_list})
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_view_all(Whitelist)
def index_white(request):
2016-11-21 00:49:45 +00:00
""" Affiche l'ensemble des whitelist, need droit cableur """
pagination_number = GeneralOption.get_cached_value("pagination_number")
white_list = Whitelist.objects.select_related("user")
white_list = SortTable.sort(
white_list,
request.GET.get("col"),
request.GET.get("order"),
SortTable.USERS_INDEX_BAN,
)
white_list = re2o_paginator(request, white_list, pagination_number)
return render(request, "users/index_whitelist.html", {"white_list": white_list})
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_view_all(School)
def index_school(request):
""" Affiche l'ensemble des établissement"""
school_list = School.objects.order_by("name")
pagination_number = GeneralOption.get_cached_value("pagination_number")
school_list = SortTable.sort(
school_list,
request.GET.get("col"),
request.GET.get("order"),
SortTable.USERS_INDEX_SCHOOL,
)
school_list = re2o_paginator(request, school_list, pagination_number)
return render(request, "users/index_schools.html", {"school_list": school_list})
2017-10-14 20:10:07 +00:00
@login_required
@can_view_all(ListShell)
def index_shell(request):
""" Affiche l'ensemble des shells"""
shell_list = ListShell.objects.order_by("shell")
return render(request, "users/index_shell.html", {"shell_list": shell_list})
@login_required
@can_view_all(ListRight)
def index_listright(request):
""" Affiche l'ensemble des droits"""
rights = {}
for right in (
ListRight.objects.order_by("name")
.prefetch_related("permissions")
.prefetch_related("user_set")
):
rights[right] = right.user_set.annotate(
action_number=Count("revision"), last_seen=Max("revision__date_created")
)
superusers = User.objects.filter(is_superuser=True).annotate(
action_number=Count("revision"), last_seen=Max("revision__date_created")
)
2017-10-14 20:10:07 +00:00
return render(
request,
"users/index_listright.html",
{"rights": rights, "superusers": superusers},
2017-10-14 20:10:07 +00:00
)
2017-06-18 12:59:53 +00:00
@login_required
@can_view_all(ServiceUser)
2017-06-18 12:59:53 +00:00
def index_serviceusers(request):
""" Affiche les users de services (pour les accès ldap)"""
serviceusers_list = ServiceUser.objects.order_by("pseudo")
2017-10-14 20:10:07 +00:00
return render(
request,
"users/index_serviceusers.html",
{"serviceusers_list": serviceusers_list},
2017-10-14 20:10:07 +00:00
)
2017-06-18 12:59:53 +00:00
@login_required
def mon_profil(request):
2016-11-21 00:49:45 +00:00
""" Lien vers profil, renvoie request.id à la fonction """
return redirect(reverse("users:profil", kwargs={"userid": str(request.user.id)}))
2017-10-14 20:10:07 +00:00
2016-07-08 10:35:53 +00:00
@login_required
@can_view(User)
2018-04-15 01:00:05 +00:00
def profil(request, users, **_kwargs):
2016-11-21 00:49:45 +00:00
""" Affiche un profil, self or cableur, prend un userid en argument """
machines = (
Machine.objects.filter(user=users)
.select_related("user")
.prefetch_related("interface_set__domain__extension")
.prefetch_related("interface_set__ipv4__ip_type__extension")
.prefetch_related("interface_set__machine_type")
.prefetch_related("interface_set__domain__related_domain__extension")
)
machines = SortTable.sort(
machines,
request.GET.get("col"),
request.GET.get("order"),
SortTable.MACHINES_INDEX,
)
2019-09-29 16:27:35 +00:00
optionnal_apps = [import_module(app) for app in OPTIONNAL_APPS_RE2O]
optionnal_templates_list = [
app.views.profil(request, users)
for app in optionnal_apps
if hasattr(app.views, "profil")
]
pagination_large_number = GeneralOption.get_cached_value("pagination_large_number")
2018-04-16 21:57:22 +00:00
nb_machines = machines.count()
machines = re2o_paginator(request, machines, pagination_large_number)
2017-10-10 23:02:50 +00:00
factures = Facture.objects.filter(user=users)
factures = SortTable.sort(
factures,
request.GET.get("col"),
request.GET.get("order"),
SortTable.COTISATIONS_INDEX,
)
2017-10-10 23:02:50 +00:00
bans = Ban.objects.filter(user=users)
bans = SortTable.sort(
bans,
request.GET.get("col"),
request.GET.get("order"),
SortTable.USERS_INDEX_BAN,
)
2017-10-10 23:02:50 +00:00
whitelists = Whitelist.objects.filter(user=users)
whitelists = SortTable.sort(
whitelists,
request.GET.get("col"),
request.GET.get("order"),
SortTable.USERS_INDEX_WHITE,
)
try:
balance = find_payment_method(Paiement.objects.get(is_balance=True))
except Paiement.DoesNotExist:
user_solde = False
else:
user_solde = balance is not None and balance.can_credit_balance(request.user)
return render(
request,
"users/profil.html",
{
"users": users,
"machines_list": machines,
"nb_machines": nb_machines,
"optionnal_templates_list": optionnal_templates_list,
"facture_list": factures,
"ban_list": bans,
"white_list": whitelists,
"user_solde": user_solde,
"solde_activated": Paiement.objects.filter(is_balance=True).exists(),
"asso_name": AssoOption.objects.first().name,
"emailaddress_list": users.email_address,
"local_email_accounts_enabled": (
2018-07-30 15:00:41 +00:00
OptionalUser.objects.first().local_email_accounts_enabled
),
},
2016-07-08 01:40:04 +00:00
)
2016-07-03 16:09:58 +00:00
2017-10-14 20:10:07 +00:00
2016-07-20 10:06:33 +00:00
def reset_password(request):
2016-11-21 00:49:45 +00:00
""" Reintialisation du mot de passe si mdp oublié """
2016-07-20 10:06:33 +00:00
userform = ResetPasswordForm(request.POST or None)
if userform.is_valid():
try:
2017-10-14 20:10:07 +00:00
user = User.objects.get(
pseudo=userform.cleaned_data["pseudo"],
email=userform.cleaned_data["email"],
state__in=[User.STATE_ACTIVE, User.STATE_NOT_YET_ACTIVE],
2017-10-14 20:10:07 +00:00
)
2016-07-20 10:06:33 +00:00
except User.DoesNotExist:
2018-08-15 17:15:26 +00:00
messages.error(request, _("The user doesn't exist."))
2018-04-14 01:25:05 +00:00
return form(
{"userform": userform, "action_name": _("Reset")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
user.reset_passwd_mail(request)
2018-08-15 17:15:26 +00:00
messages.success(request, _("An email to reset the password was sent."))
redirect(reverse("index"))
2018-04-14 01:25:05 +00:00
return form(
{"userform": userform, "action_name": _("Reset")}, "users/user.html", request
2018-04-14 01:25:05 +00:00
)
2016-07-20 10:06:33 +00:00
2017-10-14 20:10:07 +00:00
def process(request, token):
"""Process, lien pour la reinitialisation du mot de passe
et la confirmation de l'email"""
valid_reqs = Request.objects.filter(expires_at__gt=timezone.now())
req = get_object_or_404(valid_reqs, token=token)
if req.type == Request.PASSWD:
return process_passwd(request, req)
elif req.type == Request.EMAIL:
return process_email(request, req)
else:
2018-08-15 17:15:26 +00:00
messages.error(request, _("Error: please contact an admin."))
redirect(reverse("index"))
2017-10-14 20:10:07 +00:00
def process_passwd(request, req):
2017-10-14 20:10:07 +00:00
"""Process le changeemnt de mot de passe, renvoie le formulaire
demandant le nouveau password"""
user = req.user
u_form = PassForm(request.POST or None, instance=user, user=request.user)
if u_form.is_valid():
with transaction.atomic(), reversion.create_revision():
u_form.save()
2019-11-20 00:52:11 +00:00
reversion.set_comment("Password reset")
req.delete()
2018-08-15 17:15:26 +00:00
messages.success(request, _("The password was changed."))
return redirect(reverse("index"))
2018-04-14 01:25:05 +00:00
return form(
{"userform": u_form, "action_name": _("Change the password")},
"users/user.html",
request,
2018-04-14 01:25:05 +00:00
)
2017-10-14 20:10:07 +00:00
def process_email(request, req):
"""Process la confirmation de mail, renvoie le formulaire
de validation"""
user = req.user
if request.method == "POST":
with transaction.atomic(), reversion.create_revision():
user.confirm_mail()
user.save()
reversion.set_comment("Email confirmation")
req.delete()
messages.success(request, _("The %s address was confirmed." % user.email))
return redirect(reverse("index"))
return form(
{"email": user.email, "firstname": user.name, "lastname": user.surname},
"users/confirm_email.html",
request
)
@login_required
@can_edit(User)
def resend_confirmation_email(request, logged_user, userid):
""" Renvoi du mail de confirmation """
2020-04-17 09:34:54 +00:00
try:
user = User.objects.get(
id=userid,
state__in=[User.STATE_EMAIL_NOT_YET_CONFIRMED],
)
except User.DoesNotExist:
messages.error(request, _("The user doesn't exist."))
2020-04-17 09:34:54 +00:00
if request.method == "POST":
user.confirm_email_address_mail(request)
messages.success(request, _("An email to confirm your address was sent."))
return redirect(reverse("users:profil", kwargs={"userid": userid}))
return form(
{"email": user.email},
"users/resend_confirmation_email.html",
request
)
@login_required
def initial_register(request):
switch_ip = request.GET.get("switch_ip", None)
switch_port = request.GET.get("switch_port", None)
client_mac = request.GET.get("client_mac", None)
u_form = InitialRegisterForm(
request.POST or None,
user=request.user,
switch_ip=switch_ip,
switch_port=switch_port,
client_mac=client_mac,
)
if not u_form.fields:
2019-01-08 23:40:59 +00:00
messages.error(request, _("Incorrect URL, or already registered device."))
return redirect(
reverse("users:profil", kwargs={"userid": str(request.user.id)})
)
if switch_ip and switch_port:
port = Port.objects.filter(
switch__interface__ipv4__ipv4=switch_ip, port=switch_port
).first()
if u_form.is_valid():
messages.success(
request,
_(
"Successful registration! Please"
" disconnect and reconnect your Ethernet"
" cable to get Internet access."
),
)
return form({}, "users/plugin_out.html", request)
return form(
{"userform": u_form, "port": port, "mac": client_mac},
"users/user_autocapture.html",
request,
)
class JSONResponse(HttpResponse):
2017-10-14 20:10:07 +00:00
""" Framework Rest """
def __init__(self, data, **kwargs):
content = JSONRenderer().render(data)
kwargs["content_type"] = "application/json"
super(JSONResponse, self).__init__(content, **kwargs)
2017-10-14 20:10:07 +00:00
@csrf_exempt
@login_required
@permission_required("machines.serveur")
2018-04-14 23:16:49 +00:00
def ml_std_list(_request):
""" API view sending all the available standard mailings"""
return JSONResponse([{"name": "adherents"}])
@csrf_exempt
@login_required
@permission_required("machines.serveur")
def ml_std_members(request, ml_name):
""" API view sending all the members for a standard mailing"""
# All with active connextion
if ml_name == "adherents":
members = all_has_access().values("email").distinct()
# Unknown mailing
else:
2018-08-15 17:15:26 +00:00
messages.error(request, _("The mailing list doesn't exist."))
return redirect(reverse("index"))
seria = MailingMemberSerializer(members, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required("machines.serveur")
2018-04-14 23:16:49 +00:00
def ml_club_list(_request):
""" API view sending all the available club mailings"""
clubs = Club.objects.filter(mailing=True).values("pseudo")
seria = MailingSerializer(clubs, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required("machines.serveur")
def ml_club_admins(request, ml_name):
""" API view sending all the administrators for a specific club mailing"""
try:
club = Club.objects.get(mailing=True, pseudo=ml_name)
except Club.DoesNotExist:
2018-08-15 17:15:26 +00:00
messages.error(request, _("The mailing list doesn't exist."))
return redirect(reverse("index"))
members = club.administrators.all().values("email").distinct()
seria = MailingMemberSerializer(members, many=True)
return JSONResponse(seria.data)
@csrf_exempt
@login_required
@permission_required("machines.serveur")
def ml_club_members(request, ml_name):
""" API view sending all the members for a specific club mailing"""
try:
club = Club.objects.get(mailing=True, pseudo=ml_name)
except Club.DoesNotExist:
2018-08-15 17:15:26 +00:00
messages.error(request, _("The mailing list doesn't exist."))
return redirect(reverse("index"))
2018-04-14 01:25:05 +00:00
members = (
club.administrators.all().values("email").distinct()
| club.members.all().values("email").distinct()
2018-04-14 01:25:05 +00:00
)
seria = MailingMemberSerializer(members, many=True)
return JSONResponse(seria.data)