mirror of
https://gitlab.com/allianceauth/allianceauth.git
synced 2025-07-21 18:22:27 +02:00
Compare commits
2202 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
34b94ae685 | ||
|
50fd900bdc | ||
|
1bf8ec5bc6 | ||
|
f849b75029 | ||
|
25c27793fe | ||
|
6e413772ad | ||
|
137a202e1b | ||
|
aaf718fe4d | ||
|
a193d9959b | ||
|
12250ef0c2 | ||
|
bde9802583 | ||
|
1b30b86d2b | ||
|
0707b9b98c | ||
|
b22a379db2 | ||
|
bb2e0aabbc | ||
|
449991d846 | ||
|
dd42c2b074 | ||
|
abff1b0add | ||
|
fc51f6bea2 | ||
|
6477c22308 | ||
|
329b3fecfb | ||
|
677505f22a | ||
|
f518166bd0 | ||
|
1f4c49f823 | ||
|
abcc4d47b5 | ||
|
3d4737df72 | ||
|
8f94885d8e | ||
|
993455d664 | ||
|
3cb0addee7 | ||
|
5530b76294 | ||
|
9fb51165ab | ||
|
a650f0730e | ||
|
63eb9edc9c | ||
|
d6e1eb9792 | ||
|
b459f96e6b | ||
|
bf32f2c1ef | ||
|
7ca67ebaae | ||
|
fa32f87a35 | ||
|
a630015451 | ||
|
bf43f59232 | ||
|
54910746e3 | ||
|
07ae68333d | ||
|
69e70a4c9b | ||
|
b55f11ee74 | ||
|
94ee3c0203 | ||
|
25cf329a50 | ||
|
b02827cb3f | ||
|
2bcc0570ad | ||
|
a3ea0c65a1 | ||
|
5e526da11c | ||
|
5c79265f90 | ||
|
eb0134e716 | ||
|
afde1f4729 | ||
|
5c6dda0eac | ||
|
af453bc772 | ||
|
e13674e886 | ||
|
e3e856b826 | ||
|
9d1cd23a8f | ||
|
148f7c116f | ||
|
33e7134d6f | ||
|
fb799551aa | ||
|
7b95051fe1 | ||
|
efb6a6db4f | ||
|
478aa1aa12 | ||
|
751e55ed6c | ||
|
9dad53f763 | ||
|
2d57064a7a | ||
|
833d12cf66 | ||
|
7b56caa4cb | ||
|
5752644122 | ||
|
cadc0cb534 | ||
|
dcdab5ae1f | ||
|
d64e896288 | ||
|
500d8ede32 | ||
|
f4c5c7f6db | ||
|
43e1be4032 | ||
|
702def2a4d | ||
|
a34baf4154 | ||
|
4de0774f15 | ||
|
83d2dfc7d9 | ||
|
c93afd2d68 | ||
|
b7bacd11af | ||
|
f26835fae0 | ||
|
4edb7cb678 | ||
|
2ce9ba997f | ||
|
055077fa77 | ||
|
f342ccbc6a | ||
|
37ffd0a1ac | ||
|
a1f705381e | ||
|
c0970ad4fa | ||
|
3818d0c6d1 | ||
|
95411c79cb | ||
|
eeccbbacfc | ||
|
f6c4180502 | ||
|
f4d3d6c0b1 | ||
|
e9d2d11297 | ||
|
96204b29e8 | ||
|
47842c1243 | ||
|
9b494106bc | ||
|
d51e730a7f | ||
|
363909c0c4 | ||
|
82273f68fe | ||
|
12fa38b446 | ||
|
c26af593ff | ||
|
8e9a53c494 | ||
|
5559ce5fbb | ||
|
faa529a55b | ||
|
4ccfe20c14 | ||
|
960c9625fe | ||
|
7b92d103d6 | ||
|
c1e2449084 | ||
|
3acb651650 | ||
|
2de57b334b | ||
|
0498f5bb1b | ||
|
929485a8f9 | ||
|
28cb62f373 | ||
|
02214b74d0 | ||
|
f497c18e5b | ||
|
cb57d922e6 | ||
|
805d138b09 | ||
|
09a583fb1d | ||
|
146c4c8d94 | ||
|
c2ae680f72 | ||
|
b5ad1c8a1a | ||
|
8be2760fc4 | ||
|
f047943eb7 | ||
|
43906f41b3 | ||
|
a18ec98877 | ||
|
14163d2c0c | ||
|
81d9c41cf6 | ||
|
58f5a5b41d | ||
|
6363bb706a | ||
|
baf3be4cb2 | ||
|
e69444fe79 | ||
|
7483fcb876 | ||
|
a57d55504d | ||
|
affb30e9f4 | ||
|
588cb1b7ca | ||
|
a609faa91b | ||
|
856e939c21 | ||
|
1b6cf98885 | ||
|
92c2af9975 | ||
|
5ef70bb031 | ||
|
60998bffc2 | ||
|
a5971314f5 | ||
|
a03c766840 | ||
|
ad47ff2c54 | ||
|
3efdb8f12b | ||
|
823fc82d19 | ||
|
a93e510895 | ||
|
d99f5858d8 | ||
|
4578ecf21d | ||
|
b737504d52 | ||
|
c6b6443901 | ||
|
f51523dc07 | ||
|
bd4dd60c98 | ||
|
a4ea48e14e | ||
|
646d3f5408 | ||
|
0f057ffa84 | ||
|
7033406ba6 | ||
|
6b395ca1d4 | ||
|
795a7e006f | ||
|
2a894cd62c | ||
|
9ada26e849 | ||
|
7120b3956c | ||
|
4da67cfaf6 | ||
|
0a940810bd | ||
|
a868438492 | ||
|
dc1ed8c570 | ||
|
8489f204dd | ||
|
1478588016 | ||
|
a16eb4b7f7 | ||
|
292fb7b29d | ||
|
c6890dd2c6 | ||
|
702564d15e | ||
|
cef2e86ea1 | ||
|
50681b023b | ||
|
2822775fb8 | ||
|
ef7c8be7b5 | ||
|
d639617eba | ||
|
2125192f72 | ||
|
8d63801b00 | ||
|
e053fb7d96 | ||
|
ae7ed5c297 | ||
|
d624ba4427 | ||
|
164cd4fbb2 | ||
|
94b52c850e | ||
|
4d19ceb388 | ||
|
9a64728311 | ||
|
dcc0c78daf | ||
|
5507c30af4 | ||
|
66b97835d4 | ||
|
fd66a7cb20 | ||
|
c0f0f8db73 | ||
|
4210b2eabc | ||
|
225e68647e | ||
|
7e2f864ebf | ||
|
f2384ba45b | ||
|
c5918b9b3c | ||
|
ffedc4103d | ||
|
0467b23a1a | ||
|
cda5ce739f | ||
|
e5c8426ea3 | ||
|
b2bd489ddc | ||
|
6397cf358a | ||
|
90fcc4a811 | ||
|
ec7472fe22 | ||
|
5148b1914d | ||
|
2e0716f5ae | ||
|
1fb091acb2 | ||
|
07c62ed32a | ||
|
660fe79d08 | ||
|
42ee06470c | ||
|
69aaa9652f | ||
|
1ccfff50e5 | ||
|
57a39557fd | ||
|
c36dea08e3 | ||
|
d3acd821b7 | ||
|
0a17427169 | ||
|
ce8935e621 | ||
|
efff946a56 | ||
|
1dea92ed76 | ||
|
3f54d49d8b | ||
|
77da6928b2 | ||
|
bd17b95cac | ||
|
4ed1c5b7c4 | ||
|
271fd8e8c4 | ||
|
9b4321281a | ||
|
052c35c8e5 | ||
|
0fcb517b0b | ||
|
dcfddf0add | ||
|
4a4258d0e6 | ||
|
dd15a221aa | ||
|
737e02293a | ||
|
c34efebacf | ||
|
4602097399 | ||
|
7051e06564 | ||
|
9767ce79d8 | ||
|
0c090f1486 | ||
|
618ee81f9b | ||
|
98efb9f887 | ||
|
cbe6c821cc | ||
|
de9d2b39a6 | ||
|
0d5f22288b | ||
|
e0d76dc268 | ||
|
ecc9e68330 | ||
|
710149ec21 | ||
|
3c2c137dad | ||
|
a8271c4189 | ||
|
3315ae7778 | ||
|
d2f048f8fe | ||
|
0fe2855faa | ||
|
79a1fa3d7c | ||
|
96fe88d5c7 | ||
|
59391ad3c5 | ||
|
94e9c08422 | ||
|
acff3695bc | ||
|
43ec8514aa | ||
|
4c629b193f | ||
|
c651da4011 | ||
|
da382cffd1 | ||
|
4ecfc3afd8 | ||
|
4eb7dbbe62 | ||
|
c96ba65296 | ||
|
ff2f60f7f3 | ||
|
3000545c98 | ||
|
f3ad092ef2 | ||
|
a012e7df2f | ||
|
1fa77412c0 | ||
|
e56caeb22b | ||
|
ceb07ebc67 | ||
|
237075d45c | ||
|
7099b1946d | ||
|
e416ab8ff2 | ||
|
2802ed03a5 | ||
|
4af73c76fe | ||
|
b6149979aa | ||
|
cb20288427 | ||
|
db6f4c91dc | ||
|
57ac7a5277 | ||
|
136438f9c2 | ||
|
e2be8b3440 | ||
|
04f3473ef3 | ||
|
255cb0da8d | ||
|
069352fb0f | ||
|
66e8ddb684 | ||
|
179c26975c | ||
|
e17f6e799b | ||
|
7cd8294104 | ||
|
ede5540335 | ||
|
747279b773 | ||
|
44f8b1c477 | ||
|
7c6ebd9bf6 | ||
|
430469b708 | ||
|
efbb3cee31 | ||
|
21094ed4dd | ||
|
5f326efc7e | ||
|
b6e34ace35 | ||
|
fe4a8965e3 | ||
|
23371c233d | ||
|
7a3bbf0d7f | ||
|
89a1bec9c1 | ||
|
1c1e70619a | ||
|
0ff4374efa | ||
|
18d0e58a48 | ||
|
84f44338dc | ||
|
2ba0412890 | ||
|
2326522b29 | ||
|
a7cb6ee434 | ||
|
2aeef63565 | ||
|
3c9e7335ef | ||
|
49067de325 | ||
|
471e7e29ae | ||
|
3ec5775406 | ||
|
e804d2b60d | ||
|
742438a95d | ||
|
5c60086baa | ||
|
e49041bb14 | ||
|
f3cbe91883 | ||
|
ea439a2176 | ||
|
56e1e76f11 | ||
|
634e7357be | ||
|
08dc88da1a | ||
|
3d206e445c | ||
|
64686cdad1 | ||
|
d7fe09bdf1 | ||
|
6da50da92f | ||
|
51e4dd986f | ||
|
bee6522182 | ||
|
1711a9dd33 | ||
|
3914626379 | ||
|
df276cb32d | ||
|
daad7d8b10 | ||
|
3bf5bc0fe3 | ||
|
96abae553a | ||
|
f9cbfb1562 | ||
|
8eaa94e179 | ||
|
4f876b648b | ||
|
cd738137c0 | ||
|
5605eb129d | ||
|
87ef0f21a3 | ||
|
a1c7ce827e | ||
|
97466bcdfb | ||
|
ff3096b106 | ||
|
98f0d77f3f | ||
|
92548ba402 | ||
|
c46741d311 | ||
|
7c7c1abf7c | ||
|
fc303b1b0a | ||
|
4e220a9679 | ||
|
b17b1f7504 | ||
|
7081fc0e76 | ||
|
68e4574f19 | ||
|
e6e0a70012 | ||
|
13e38da942 | ||
|
468c1de26b | ||
|
22ef5ac0e5 | ||
|
ef2dc08958 | ||
|
6b84ffa16c | ||
|
d7a1096413 | ||
|
93b94a8bc2 | ||
|
9a95716105 | ||
|
dbfcf5d87a | ||
|
105d7d53b3 | ||
|
01cefe1457 | ||
|
7fe3db8017 | ||
|
e0945fac80 | ||
|
40fa190820 | ||
|
670580f8f3 | ||
|
323a0bcf16 | ||
|
6e995edd80 | ||
|
8d86e45b7a | ||
|
2aa6df4461 | ||
|
cf6f989502 | ||
|
3e1d8ae334 | ||
|
bcfe9484b5 | ||
|
5e4d1b9cfd | ||
|
3b463e7305 | ||
|
eedf5082fa | ||
|
2ea5b15175 | ||
|
7a9808aad3 | ||
|
a1d712694c | ||
|
ca11c726a3 | ||
|
6e0f7a35bd | ||
|
7375b001ca | ||
|
0287086633 | ||
|
9eb2becbb5 | ||
|
12f1444fe7 | ||
|
d6372bd093 | ||
|
3935a9cdd2 | ||
|
49fb6c39d5 | ||
|
8821f18b21 | ||
|
f4d8ead54e | ||
|
7427e13505 | ||
|
445683c3d5 | ||
|
677c46c48a | ||
|
87b9e3f87a | ||
|
da2a5aff2f | ||
|
65d77743dc | ||
|
1c7f8256d0 | ||
|
61f0aae5d9 | ||
|
4d56030edf | ||
|
2dfe194a3b | ||
|
ebb40deb7f | ||
|
a3a2d3d35b | ||
|
d4dee519b8 | ||
|
dfcbad3476 | ||
|
e03c1307a3 | ||
|
054ef27fa4 | ||
|
97e224b8e6 | ||
|
3b8fa415bc | ||
|
b94fd7ed19 | ||
|
d1dac61135 | ||
|
d2a095217f | ||
|
3a95b89779 | ||
|
4f5b231bdf | ||
|
40c0b8d862 | ||
|
62c936f1c0 | ||
|
2a762df9b3 | ||
|
8fb5a488f7 | ||
|
dc239d5396 | ||
|
2815ebaa07 | ||
|
34dd4802a8 | ||
|
3ebf11308c | ||
|
5cd5180a91 | ||
|
ba213db493 | ||
|
8362d11714 | ||
|
7ba65968ed | ||
|
7fdbac20cb | ||
|
76efcb5266 | ||
|
6aacb8c2e3 | ||
|
465fba3a18 | ||
|
9ae6addc71 | ||
|
76ae9b8849 | ||
|
13a8b7678f | ||
|
c166fc0ef9 | ||
|
9da61588eb | ||
|
7425176b3f | ||
|
2bb518f7e0 | ||
|
84d5693583 | ||
|
867e2a1ded | ||
|
fd6c6991f5 | ||
|
333fe8497d | ||
|
8a3fb17147 | ||
|
f8baeb19a7 | ||
|
10096862e5 | ||
|
89193d2fcf | ||
|
fd08b987bd | ||
|
4e9e22cb4b | ||
|
f8fbbb5ba7 | ||
|
dd3ef41396 | ||
|
d5fda05dc9 | ||
|
d815fad0e6 | ||
|
e109198782 | ||
|
fbd4672454 | ||
|
a29bd567c2 | ||
|
960aef95ad | ||
|
4aae5497bb | ||
|
6081cbe900 | ||
|
5e9b47cf79 | ||
|
853826c140 | ||
|
ce0d8342e3 | ||
|
006785e592 | ||
|
df05070a55 | ||
|
e81450baf3 | ||
|
24b6c19aca | ||
|
9f4bf13cc9 | ||
|
2a156302f0 | ||
|
c4d3bde106 | ||
|
9c7de58989 | ||
|
0900806f68 | ||
|
a0d32d8c2d | ||
|
e16252842a | ||
|
950ae34093 | ||
|
0ba94c53aa | ||
|
96cc55d174 | ||
|
a9062c4389 | ||
|
51b86f88b9 | ||
|
8184461b48 | ||
|
ca0cdd6e15 | ||
|
036a17ad3b | ||
|
2418023ddd | ||
|
c602cf0b00 | ||
|
3de988369f | ||
|
b28b51916c | ||
|
0db0978d5f | ||
|
0531da1128 | ||
|
547d047f59 | ||
|
5cd92e29d3 | ||
|
bb44194cfc | ||
|
aa1cb96c8a | ||
|
40ae092306 | ||
|
b2e70c3702 | ||
|
eebeb26001 | ||
|
003a67224e | ||
|
d3a3810456 | ||
|
f55008559e | ||
|
dbc19c76c5 | ||
|
ced7972962 | ||
|
ad508bd880 | ||
|
5c128f2c78 | ||
|
1caaca86cf | ||
|
33ad1413d5 | ||
|
cbb5c80b94 | ||
|
d2edd288f9 | ||
|
21e80f6961 | ||
|
a747951d19 | ||
|
4cc7135ace | ||
|
6a990c11e6 | ||
|
3f47cecbfc | ||
|
77c126ea2f | ||
|
6e3219fd1b | ||
|
8aeb061635 | ||
|
84e2107b62 | ||
|
8b7e57494c | ||
|
20fcf5efa4 | ||
|
8ff3d854ba | ||
|
49ff355d50 | ||
|
c15b955d5e | ||
|
65e1545a66 | ||
|
c558a980e1 | ||
|
bd8ef84862 | ||
|
6f670da1db | ||
|
c558f3785f | ||
|
04cdd4c64f | ||
|
42e96d2f14 | ||
|
00fcebd8e3 | ||
|
995c84481c | ||
|
4dd42da993 | ||
|
8295cc51a3 | ||
|
f7e1d7c47e | ||
|
234191218a | ||
|
de12b49527 | ||
|
021b7b2edb | ||
|
20b959f273 | ||
|
e16bb2a737 | ||
|
0a6a6e0bf9 | ||
|
f0fe3929d4 | ||
|
9a62c729eb | ||
|
eaedcd5bb7 | ||
|
d742257c74 | ||
|
ad92d7a916 | ||
|
af22222bdf | ||
|
01f49bd125 | ||
|
af5930b9d0 | ||
|
95ba19a827 | ||
|
c75647301f | ||
|
adedf7534f | ||
|
d0684862fe | ||
|
2440e5d2b2 | ||
|
5f51ad4a6a | ||
|
0bd3acc230 | ||
|
11a32c90a8 | ||
|
6f0b853a60 | ||
|
583a6d4c7f | ||
|
155494afea | ||
|
b0aa58b910 | ||
|
1adce85422 | ||
|
cd47eadcdc | ||
|
247058a30f | ||
|
e0fa615e90 | ||
|
61ec67183c | ||
|
4369813478 | ||
|
8bb3d35252 | ||
|
398a980fb5 | ||
|
e14a295ce6 | ||
|
e0cd5c6fb9 | ||
|
c37ece49d5 | ||
|
8adab8bae0 | ||
|
a9c87bc25a | ||
|
a4901802c0 | ||
|
079dcc5d28 | ||
|
10c5a8906d | ||
|
e6306ea7aa | ||
|
20067c1133 | ||
|
dba3c651dc | ||
|
0b4d2b819b | ||
|
23a3dd1ab9 | ||
|
81e5bc5337 | ||
|
7eebf4d953 | ||
|
9e45d2eac7 | ||
|
e3017f1ec7 | ||
|
a8ef844fe7 | ||
|
12709b1b56 | ||
|
51ae604efd | ||
|
63071ec359 | ||
|
0032e4a01f | ||
|
25ab78a41e | ||
|
3aa0e323d2 | ||
|
cadbb7e61c | ||
|
115263eb5a | ||
|
18fec5f614 | ||
|
02ab064ec3 | ||
|
ba25f99cb4 | ||
|
28fd1b07ea | ||
|
5de19c43df | ||
|
9ce1939040 | ||
|
322131cd4f | ||
|
55e6e92da5 | ||
|
e5d29629a5 | ||
|
6a0ddc9a83 | ||
|
03be66d11f | ||
|
26e187e4c8 | ||
|
3480c4e0e8 | ||
|
1544f097e0 | ||
|
2477c31656 | ||
|
0dc631d69e | ||
|
2a9981cdb9 | ||
|
3d92008069 | ||
|
59e47c24c2 | ||
|
6d942555ff | ||
|
7e312bb95f | ||
|
c92fee78e2 | ||
|
004c48b8ad | ||
|
658a8cd6ce | ||
|
c1dc130766 | ||
|
35f5573b63 | ||
|
4d66b7d456 | ||
|
77e5747a23 | ||
|
a9ebecdec6 | ||
|
21f0a96422 | ||
|
9e47d19337 | ||
|
2c5972d0ab | ||
|
6118c0ddec | ||
|
ce25deeca1 | ||
|
60084de3db | ||
|
e16c68e255 | ||
|
bf14e9c7c3 | ||
|
98e91fe207 | ||
|
ee41d62c13 | ||
|
346b4014a9 | ||
|
9b56a441ed | ||
|
068bf1ae7a | ||
|
5be686e3ca | ||
|
a215b4411c | ||
|
e15cfa0fb1 | ||
|
46d51699f4 | ||
|
ff30a136d5 | ||
|
6dcf3304d5 | ||
|
beddeea338 | ||
|
69723937f7 | ||
|
c541f56ee2 | ||
|
7e887e5e34 | ||
|
072327c79f | ||
|
28af3ff11e | ||
|
e3b151f2fb | ||
|
f87d7dbdf8 | ||
|
a04e6ae3d0 | ||
|
15042f5e77 | ||
|
6e25361d5e | ||
|
9e639a0eeb | ||
|
257fbdef36 | ||
|
df003c8ec5 | ||
|
ba22685eb8 | ||
|
773288072a | ||
|
63afb13d25 | ||
|
5dd286bbe7 | ||
|
8aaa8172ca | ||
|
b68b401146 | ||
|
f7821b647f | ||
|
a6526d6f78 | ||
|
7898594909 | ||
|
cfd12ee3cc | ||
|
2c9177b19f | ||
|
abff26fb6e | ||
|
e8c3b5225c | ||
|
98fd1dcc4c | ||
|
7024552c4e | ||
|
a0719e4b86 | ||
|
906c589f14 | ||
|
cfe46e4ca5 | ||
|
4675193416 | ||
|
a84fa1ca69 | ||
|
8f6cb0b9bb | ||
|
1c8634f1c8 | ||
|
2a21599d45 | ||
|
ffb526ab0c | ||
|
b9d128259e | ||
|
13d866bd0d | ||
|
e379c01655 | ||
|
afa3d2e7cc | ||
|
e5ed33aeec | ||
|
b12471e775 | ||
|
ea1887b9ec | ||
|
d2f8c2a42f | ||
|
5e70dab11f | ||
|
f728c786b3 | ||
|
7056912d54 | ||
|
7efed950ca | ||
|
886acf2005 | ||
|
b2dec3bff2 | ||
|
f0a402e141 | ||
|
2e2afd7923 | ||
|
e9ea09bc56 | ||
|
186fa1be03 | ||
|
37d1d84fc3 | ||
|
ee24706e43 | ||
|
07e85727ea | ||
|
4912f0f8f0 | ||
|
424246df26 | ||
|
563e2210ef | ||
|
02a1078005 | ||
|
30107de44e | ||
|
200e8f2ff1 | ||
|
77a08cd218 | ||
|
e5a09027e5 | ||
|
24376262f0 | ||
|
efe0c6963b | ||
|
a4644028ae | ||
|
3a77b4a429 | ||
|
52b6c5d341 | ||
|
fa375a551c | ||
|
00a93e6fe9 | ||
|
656e69d4b2 | ||
|
3b55d370d0 | ||
|
5c126ffe82 | ||
|
99be753836 | ||
|
2e78aa5f26 | ||
|
567d97f38a | ||
|
8b895b76b5 | ||
|
babd71702f | ||
|
3ec3cbdff7 | ||
|
51611e1237 | ||
|
39519bab91 | ||
|
90dc6a4d4c | ||
|
53ffd7f885 | ||
|
efc7475228 | ||
|
380c41400b | ||
|
079c12a72e | ||
|
4f1ebedc44 | ||
|
66822107e3 | ||
|
7856cd5ce4 | ||
|
d6821b3fd6 | ||
|
90375246fd | ||
|
a2f217ace5 | ||
|
25cf2fdcd5 | ||
|
4305ae7995 | ||
|
36b3077caa | ||
|
1786f3a642 | ||
|
55927c6f15 | ||
|
8fbe0ba45d | ||
|
1563805ddb | ||
|
c58ed53369 | ||
|
32128ace1c | ||
|
7290eaad7e | ||
|
f23d4f4dd1 | ||
|
ab3f10e6f2 | ||
|
20187cc73e | ||
|
1f55fbfccc | ||
|
12383d79c8 | ||
|
56e2875650 | ||
|
d0118e6c0b | ||
|
7075ccdf7a | ||
|
b2d540c010 | ||
|
7cb7e2c77b | ||
|
5d6a4ab1a9 | ||
|
1122d617bd | ||
|
ef33501e45 | ||
|
08fd86db8f | ||
|
c4193c15fc | ||
|
903074080e | ||
|
3046a26a02 | ||
|
951c4135c2 | ||
|
b256a0c5e1 | ||
|
212b9b0f60 | ||
|
fc29d7e80d | ||
|
ec536c66a0 | ||
|
749ece45e2 | ||
|
b04c8873d0 | ||
|
9a77175bf3 | ||
|
5d4c7b9030 | ||
|
5f80259d57 | ||
|
dcd6bd1b36 | ||
|
6f4dffe930 | ||
|
56d70e6c74 | ||
|
5e14ea4573 | ||
|
c743eca0f7 | ||
|
2002f24178 | ||
|
6412aedf53 | ||
|
939df08b95 | ||
|
d8506aa753 | ||
|
3f2cdac658 | ||
|
d57ab01ff3 | ||
|
91b62bbe9d | ||
|
557a52e3c8 | ||
|
f8fefd92a5 | ||
|
f2c43ee921 | ||
|
99945b0146 | ||
|
4aff4006e3 | ||
|
55c188f2d0 | ||
|
f36f824a4b | ||
|
6fbf33bcdd | ||
|
ed3c2c8529 | ||
|
abb9dc4db6 | ||
|
eba5b80cde | ||
|
5b39c887a5 | ||
|
183363e789 | ||
|
d8704f4d8f | ||
|
165ee44a63 | ||
|
e8f508cecb | ||
|
3044f18900 | ||
|
1cae20fe5f | ||
|
79637020f3 | ||
|
05d7fb1f63 | ||
|
3b19db2564 | ||
|
98aa44c070 | ||
|
8d46ee65af | ||
|
49780b871d | ||
|
2b7d24fc28 | ||
|
b8f86a618f | ||
|
9921011742 | ||
|
2d34422e2d | ||
|
6b932b1188 | ||
|
f62153c746 | ||
|
88216c3f81 | ||
|
dc983c31e3 | ||
|
4204c44bde | ||
|
8da0122d17 | ||
|
c9fcf6e6bf | ||
|
36866cc59b | ||
|
298bdd98ed | ||
|
819018748d | ||
|
32e8e0fdd0 | ||
|
7625060a12 | ||
|
672cb13bfe | ||
|
7170f75b89 | ||
|
8f60c7a00a | ||
|
34ae6e402c | ||
|
0905e48994 | ||
|
02fcf7d500 | ||
|
8d8da50946 | ||
|
c1499d173f | ||
|
b149baa4e5 | ||
|
4807c69b5e | ||
|
ebefa0e307 | ||
|
468e7433f9 | ||
|
3ca313f907 | ||
|
820065fc04 | ||
|
3eddeefe28 | ||
|
82d7d7e3bf | ||
|
93194b4f2d | ||
|
fa335253d3 | ||
|
d1af9416b3 | ||
|
f4ac2ea400 | ||
|
31c1f8bb7d | ||
|
57f7178f1e | ||
|
17d4a4c415 | ||
|
18ce433fa0 | ||
|
1eadb1d934 | ||
|
59a8f8a967 | ||
|
2dc07b5519 | ||
|
3454520dfe | ||
|
7a195d4158 | ||
|
b73072dec0 | ||
|
1ca5e38bd9 | ||
|
ecb737c6a5 | ||
|
7063f53cdf | ||
|
017424b9d4 | ||
|
f6c26cf2ec | ||
|
9a422bd4ca | ||
|
47fec23f2e | ||
|
399ef1917d | ||
|
9db443ba54 | ||
|
0f2f5ea0ba | ||
|
1f781c5037 | ||
|
36dedfcbd2 | ||
|
13a05606fb | ||
|
90ad7790e1 | ||
|
6b8341ab5a | ||
|
d15f42b3fd | ||
|
cc60b26f5a | ||
|
36ff0af993 | ||
|
f17c94a9e1 | ||
|
7e3ba476f3 | ||
|
dd1313a2a9 | ||
|
763003bd7d | ||
|
f3217443dd | ||
|
a713ae1914 | ||
|
5815bac0df | ||
|
6154d2c2e7 | ||
|
b34661b35d | ||
|
a9a7e03b80 | ||
|
23c797ef64 | ||
|
da102618a0 | ||
|
51ee281b14 | ||
|
9133232c20 | ||
|
9cbabee126 | ||
|
4026523a2e | ||
|
7fbf96623b | ||
|
273bda173e | ||
|
7bd5838ea1 | ||
|
b232d9ab17 | ||
|
a11b870664 | ||
|
a27aae5d1c | ||
|
117ef63d90 | ||
|
1bde3d5672 | ||
|
d2355b1ec8 | ||
|
191d474a8e | ||
|
ec9a9733be | ||
|
cf7a8cedf1 | ||
|
18cbb994d5 | ||
|
663388a0c2 | ||
|
7a943591ec | ||
|
cd189927fe | ||
|
8772349309 | ||
|
cf20100cb5 | ||
|
9b9c2ddc04 | ||
|
34839e8344 | ||
|
89ef4f4cbc | ||
|
2cc7f46aae | ||
|
8d255fb720 | ||
|
67cf68ad87 | ||
|
db1971d4c2 | ||
|
63c1521cba | ||
|
ba7ef11505 | ||
|
d2e494b9be | ||
|
98bab0b180 | ||
|
c4efb2a11f | ||
|
94e4895f29 | ||
|
70eb1b5b50 | ||
|
e247a94db3 | ||
|
714431c932 | ||
|
b026277ab0 | ||
|
11855f0b54 | ||
|
635fbfe2c8 | ||
|
b10233daf0 | ||
|
1aa3187491 | ||
|
59f17a88f0 | ||
|
75db3195d4 | ||
|
afe3fea757 | ||
|
1072c00a28 | ||
|
b221c1ce24 | ||
|
1617c775ee | ||
|
cc88a02001 | ||
|
ae5d0f4a2f | ||
|
067e2c424e | ||
|
d64675a3b0 | ||
|
17a6b3225e | ||
|
b83f591dc2 | ||
|
be2fbe862b | ||
|
f95bee0921 | ||
|
2f9ae8b054 | ||
|
74651dd30a | ||
|
9cdcd8365c | ||
|
f5d70a2c48 | ||
|
f40ebbfba4 | ||
|
2551a9dd64 | ||
|
e3b01ccbc9 | ||
|
267a392945 | ||
|
634d021bf2 | ||
|
4e8bfba738 | ||
|
297f98f046 | ||
|
27dad05927 | ||
|
697e9dd772 | ||
|
312951ea3f | ||
|
e4bf96cfb6 | ||
|
3bd6baa8f9 | ||
|
06e38dcd93 | ||
|
f47b9eee5b | ||
|
0d4cab66b2 | ||
|
dc23ee8ad2 | ||
|
65f2efc890 | ||
|
def30900b4 | ||
|
d7fabccddd | ||
|
45289e1d17 | ||
|
e7bafaa4d8 | ||
|
ba3f1507be | ||
|
7b9bf08aa3 | ||
|
360458f574 | ||
|
def6431052 | ||
|
a47bd8d7c7 | ||
|
22a270aedb | ||
|
54bce4315b | ||
|
c930f7bbeb | ||
|
8c1f06d7b8 | ||
|
815b6fa030 | ||
|
7c05217900 | ||
|
64ee273953 | ||
|
d8c2944966 | ||
|
7669c9e55d | ||
|
71c9faaf28 | ||
|
236c70316c | ||
|
0d0686f58a | ||
|
3706a1aedf | ||
|
47f1b77320 | ||
|
8dec242a93 | ||
|
6b934060dd | ||
|
ff88a16163 | ||
|
e81a66b74b | ||
|
2ff200c566 | ||
|
091a2637ea | ||
|
6c7729308c | ||
|
0195ef23d5 | ||
|
a7afa4a0c3 | ||
|
004100091f | ||
|
20231ce198 | ||
|
0851a6d085 | ||
|
0cd36ad5bc | ||
|
7618dd0f91 | ||
|
cf49a2cb65 | ||
|
cbdce18633 | ||
|
a0d14eb1d3 | ||
|
53ce4d2453 | ||
|
1ddb041d6d | ||
|
43cbfd1c47 | ||
|
b9a8495a43 | ||
|
e296477880 | ||
|
bd5c2d8cbc | ||
|
ccd40d5c68 | ||
|
7f8ca4fad2 | ||
|
4bb9a7155d | ||
|
2ac79954f3 | ||
|
585e1f47f3 | ||
|
a33c474b35 | ||
|
61c3d8964b | ||
|
1c927c5820 | ||
|
ff0fa0329d | ||
|
e51ea439ca | ||
|
113977b19f | ||
|
8f39b50b6d | ||
|
95b309c358 | ||
|
cf3df3b715 | ||
|
d815028c4d | ||
|
ac5570abe2 | ||
|
84ad571aa4 | ||
|
38e7705ae7 | ||
|
0b6af014fa | ||
|
2401f2299d | ||
|
919768c8bb | ||
|
24db21463b | ||
|
1e029af83a | ||
|
53dd8ce606 | ||
|
0f4003366d | ||
|
ac6f3c267f | ||
|
39ad625fa1 | ||
|
1db67025bf | ||
|
13ab6c072a | ||
|
cec1dd84ef | ||
|
fae5805322 | ||
|
16ea9500be | ||
|
18f5dc0f47 | ||
|
ba3e941fe8 | ||
|
4c416b03b1 | ||
|
e2abb64171 | ||
|
c66aa13ae1 | ||
|
2b31be789d | ||
|
bf1b4bb549 | ||
|
3b539c8577 | ||
|
dd42b807f0 | ||
|
542fbafd98 | ||
|
37b9f5c882 | ||
|
4836559abe | ||
|
17b06c8845 | ||
|
8dd07b97c7 | ||
|
9e139495ac | ||
|
5bde9a6952 | ||
|
23ad9d02d3 | ||
|
f99878cc29 | ||
|
e64431b06c | ||
|
0b2993c1c3 | ||
|
75bccf1b0f | ||
|
7fa76d6d37 | ||
|
945bc92898 | ||
|
ec7d14a839 | ||
|
dd1a368ff6 | ||
|
a3cce35881 | ||
|
54085617dc | ||
|
8cdc5af453 | ||
|
da93940e13 | ||
|
f53b43d9dc | ||
|
497a167ca7 | ||
|
852c5a3037 | ||
|
90f6777a7a | ||
|
ed4f71a283 | ||
|
13e2f4e27d | ||
|
17343dfeae | ||
|
4b5978fb58 | ||
|
a8d890abaf | ||
|
79379b444c | ||
|
ace1de5c68 | ||
|
0a30eea3b4 | ||
|
a15d281c40 | ||
|
6846bb7cdc | ||
|
1d240a40dd | ||
|
5d6128e9ea | ||
|
c377bcec5f | ||
|
9b74fb4dbd | ||
|
6744c0c143 | ||
|
131cc5ed0a | ||
|
9297bed43f | ||
|
b2fddc683a | ||
|
1e9f5e6430 | ||
|
ceaa064e62 | ||
|
1aad3e4512 | ||
|
f83c3c2811 | ||
|
a23ec6d318 | ||
|
ecc53888bc | ||
|
9af634d16a | ||
|
a68163caa3 | ||
|
00770fd034 | ||
|
01164777ed | ||
|
e54f72091f | ||
|
00f5e3e1e0 | ||
|
8b2527f408 | ||
|
b7500e4e4e | ||
|
4f4bd0c419 | ||
|
75b5b28804 | ||
|
f81a2ed237 | ||
|
49e01157e7 | ||
|
28420a729e | ||
|
52a4cf8d52 | ||
|
703c2392a9 | ||
|
18c9a66437 | ||
|
9687d57de9 | ||
|
60c2e57d83 | ||
|
b14bff0145 | ||
|
9166886665 | ||
|
c74010d441 | ||
|
640a21e4db | ||
|
8ae4e02012 | ||
|
cc9a07197d | ||
|
fd442a5735 | ||
|
c7b99044bc | ||
|
234451a7d4 | ||
|
ffff904ab1 | ||
|
d71a26220c | ||
|
beeeb8dc5d | ||
|
19244cc4c6 | ||
|
cc94ba6b5e | ||
|
c9926cc877 | ||
|
1d14e1b0af | ||
|
297da44a5a | ||
|
402ff53a5c | ||
|
2d6e4a0df1 | ||
|
f18dd1029b | ||
|
fd8d43571a | ||
|
13e88492f1 | ||
|
38df580a56 | ||
|
ba39318313 | ||
|
d8c6035405 | ||
|
2ef3da916b | ||
|
d32d8b26ce | ||
|
f348b1a34c | ||
|
86aaa3edda | ||
|
26017056c7 | ||
|
e39a3c072b | ||
|
827291dda4 | ||
|
defcfa3316 | ||
|
3209b71b0a | ||
|
80b3ca0a1e | ||
|
8351bd2fa3 | ||
|
255966ed3b | ||
|
8d6ebf4770 | ||
|
2ca752bf78 | ||
|
79e1192f67 | ||
|
ff610efc84 | ||
|
ea8958ccc3 | ||
|
20554df857 | ||
|
750f43eaf0 | ||
|
09cf28ec9f | ||
|
b61746b3cb | ||
|
22c22fafeb | ||
|
577c4395c4 | ||
|
d241f476f7 | ||
|
5832ed0c30 | ||
|
6b68a739ef | ||
|
909bd0ba15 | ||
|
05110abc59 | ||
|
bd9ea225be | ||
|
4a575dd70c | ||
|
b80ee16a7c | ||
|
c888371e6c | ||
|
a64d99eb91 | ||
|
0e45403195 | ||
|
e16a9ffe65 | ||
|
57de122ef8 | ||
|
8de2c3bfcb | ||
|
6688f73565 | ||
|
7d929cb6e2 | ||
|
72740b9e4d | ||
|
f7d279fa16 | ||
|
ff7c9c48f3 | ||
|
d11832913d | ||
|
724e0e83f2 | ||
|
333f091f1a | ||
|
cfbb0b993a | ||
|
582b6754a4 | ||
|
7767c46bf4 | ||
|
bf34cef896 | ||
|
c085ec6860 | ||
|
5f5d0316b2 | ||
|
f9ec64c3ad | ||
|
0dfd0ad4b0 | ||
|
e88e11b9ba | ||
|
7a2a79ca7b | ||
|
4c0683c484 | ||
|
dfe62db8ee | ||
|
025c824fbb | ||
|
930c5d7c7a | ||
|
8b8dcc0127 | ||
|
4ad8e88bd8 | ||
|
89d4640e92 | ||
|
60b12bad61 | ||
|
2595fa5c51 | ||
|
3e487e5f13 | ||
|
b6d6c68e54 | ||
|
49548d6f9f | ||
|
8faadc23b0 | ||
|
20da1ebfab | ||
|
03305c72c7 | ||
|
a636fd1cf0 | ||
|
d8797a8dc6 | ||
|
363e18e15d | ||
|
982cac8c43 | ||
|
fabf64b838 | ||
|
e3e6ebe953 | ||
|
7ad9b52546 | ||
|
abb5090d63 | ||
|
52ae05d057 | ||
|
3cd216d119 | ||
|
581edc0a38 | ||
|
f17ebbede6 | ||
|
2bd2c09c23 | ||
|
c1cf859ec9 | ||
|
1ebf864998 | ||
|
0948e34e48 | ||
|
f9a1ea9c83 | ||
|
d02a8ebc1b | ||
|
5c2625b648 | ||
|
13174d006e | ||
|
2c59cc4cc3 | ||
|
41c81d3226 | ||
|
2ec7d3b4d9 | ||
|
b607b73598 | ||
|
f52791cd1f | ||
|
d829facbd4 | ||
|
44ac3a9ff2 | ||
|
2054a76353 | ||
|
4b073c3161 | ||
|
527c016c72 | ||
|
23849b9f42 | ||
|
5d4277adf0 | ||
|
0f479d525e | ||
|
4aae85a70f | ||
|
f0ec16be4e | ||
|
92f6d8b98d | ||
|
0a48436937 | ||
|
f4c5dc77d8 | ||
|
8656d1c972 | ||
|
1b81f5cfe8 | ||
|
a4723c5942 | ||
|
b31521c758 | ||
|
6dc96bb348 | ||
|
2da78f7793 | ||
|
e8d54a1d11 | ||
|
f79e764439 | ||
|
803b659fce | ||
|
537987398d | ||
|
cdcf65cb52 | ||
|
5fcb092151 | ||
|
1fd708e765 | ||
|
a19302babc | ||
|
18a627b01e | ||
|
a6b340c179 | ||
|
2fe1de1c97 | ||
|
0072983b4f | ||
|
e1e87edc74 | ||
|
eddb5480e9 | ||
|
f3c28ea933 | ||
|
829f8ba0a4 | ||
|
f49ca2bccb | ||
|
9c71a8d9a3 | ||
|
0032f91525 | ||
|
7f3492f978 | ||
|
2b9110e417 | ||
|
98619a0eb8 | ||
|
7a4aa05c39 | ||
|
5b26757662 | ||
|
ba597cd2ad | ||
|
5992ddd48e | ||
|
8486b95917 | ||
|
564f4fb5f9 | ||
|
688c11ff18 | ||
|
4a9a2a670c | ||
|
5b25637de5 | ||
|
bb15de6d1a | ||
|
cf2e368978 | ||
|
0d67673542 | ||
|
d7e58fb557 | ||
|
f8cffb64a1 | ||
|
dc97fb1cc5 | ||
|
392a0c4dcb | ||
|
970a111386 | ||
|
cafa7cbf17 | ||
|
0f0c0441a9 | ||
|
a0db8e8e2c | ||
|
641356f31d | ||
|
191b238a04 | ||
|
f6936c5f33 | ||
|
e8f8cb8aa3 | ||
|
96170a668f | ||
|
4a3e807066 | ||
|
ab369d9aac | ||
|
742864fe6c | ||
|
c3df1c4d1f | ||
|
63d7fb80e6 | ||
|
a7f468efd1 | ||
|
9f4ab9540b | ||
|
1e133b7c5d | ||
|
4aa7530bbc | ||
|
2e0ddf2e7a | ||
|
e24bc2a05d | ||
|
a8c0db3fd7 | ||
|
7b77a6cd40 | ||
|
b8b8e470f2 | ||
|
ad92ea243d | ||
|
489a8456f7 | ||
|
122e389c38 | ||
|
8318add6d5 | ||
|
6c3650d9f2 | ||
|
37005b1c68 | ||
|
0897383e41 | ||
|
15db817382 | ||
|
eaa1cde01a | ||
|
7c1d1074f9 | ||
|
0f0f9b6062 | ||
|
839232dc98 | ||
|
356df45583 | ||
|
6b78992f07 | ||
|
5af33facb6 | ||
|
a7b9bcf3e8 | ||
|
eafc6074c1 | ||
|
99383a482b | ||
|
6f2807cba2 | ||
|
39a40a8c43 | ||
|
31123f7e97 | ||
|
96300a012a | ||
|
5f98b5350e | ||
|
8874eceb5f | ||
|
9de4d557e3 | ||
|
1d5f2634f1 | ||
|
710d26d36d | ||
|
47793e6198 | ||
|
3c799eb40b | ||
|
0d7b8e315f | ||
|
ae7cfbff35 | ||
|
a0a497ab33 | ||
|
fd86471a0f | ||
|
5fcb56a087 | ||
|
808080d5ee | ||
|
e6037f1680 | ||
|
5c3ded6b07 | ||
|
0c14e35d15 | ||
|
c13be5d39a | ||
|
e4b515c1d5 | ||
|
65e2c87e8f | ||
|
68ce25854a | ||
|
1f80a02be9 | ||
|
3df6643513 | ||
|
e6a4cea4de | ||
|
bad36a69e8 | ||
|
2697fb5317 | ||
|
b47392ba7f | ||
|
a99a375375 | ||
|
8c3df89d52 | ||
|
6ea0ebc9f9 | ||
|
26236f5886 | ||
|
1420c71ec5 | ||
|
10bd77d761 | ||
|
192d286cf2 | ||
|
8ab9d2d5ad | ||
|
3630812b92 | ||
|
2f320bc256 | ||
|
45b8d42b8e | ||
|
bd2d19f867 | ||
|
0be404baca | ||
|
e6cee9ac83 | ||
|
5a2c9243c4 | ||
|
fecd748198 | ||
|
85351b2c66 | ||
|
8b3e5b6462 | ||
|
93af920b8f | ||
|
b1248d9845 | ||
|
c86abef07d | ||
|
17ad5dfe33 | ||
|
e1843fe1f1 | ||
|
256a21f058 | ||
|
1473259e41 | ||
|
e935b91e93 | ||
|
07258a6914 | ||
|
cb35808508 | ||
|
937d656227 | ||
|
d173a59441 | ||
|
75a3adb2c9 | ||
|
148e208476 | ||
|
8f59f2549a | ||
|
630400fee4 | ||
|
1ec6929e91 | ||
|
8c6bdd8ae2 | ||
|
e04138bced | ||
|
db5ad85811 | ||
|
5b44fd376d | ||
|
0036e8b280 | ||
|
ea2b5bfecf | ||
|
aa7495fa60 | ||
|
162ec1bd86 | ||
|
2668884008 | ||
|
abdc3f3485 | ||
|
911f21ee7c | ||
|
2387c40254 | ||
|
76e18a79b3 | ||
|
9725c9c947 | ||
|
b1b79d1245 | ||
|
247ed7cc64 | ||
|
2fd2af793e | ||
|
3fc36b9ce1 | ||
|
c12fd2d7bc | ||
|
7fe1ba2fb2 | ||
|
ab7eb3e5df | ||
|
3452c3acd1 | ||
|
3c305fbf37 | ||
|
a5e0721ec1 | ||
|
164a0d5376 | ||
|
2bcf6ec39a | ||
|
40824156bf | ||
|
cec4495034 | ||
|
74eb8621d9 | ||
|
4394d25961 | ||
|
8113327d31 | ||
|
aeeb35bc60 | ||
|
630aa3f320 | ||
|
3487a945c2 | ||
|
1936ae44a3 | ||
|
3d7a84e786 | ||
|
a4d6730cb0 | ||
|
b724227a29 | ||
|
d72964fd7c | ||
|
d4a41cfb60 | ||
|
05859453df | ||
|
240d910c9b | ||
|
0c31bce7d0 | ||
|
f4c4ae36ed | ||
|
b9931b2ceb | ||
|
4fd6f06c0b | ||
|
09573ba7ef | ||
|
08e9676760 | ||
|
15ae737522 | ||
|
50ec9e563e | ||
|
cb40649f8b | ||
|
bccead0881 | ||
|
35ae710624 | ||
|
75de4518f2 | ||
|
bfcdfea6c8 | ||
|
471553fa88 | ||
|
db59f5f69b | ||
|
1b5413646e | ||
|
0337d2517c | ||
|
87e6eb9688 | ||
|
7b8c246ef8 | ||
|
a268a8980a | ||
|
3b516c338e | ||
|
9952685805 | ||
|
2f59c8df22 | ||
|
6cd0a42791 | ||
|
4c42153bfd | ||
|
603bd9c37c | ||
|
87c0c3ac73 | ||
|
8a91e7f6ac | ||
|
281dbdbb01 | ||
|
8980d8d32f | ||
|
9d6cf9a62e | ||
|
0fabb2b368 | ||
|
9801ca0314 | ||
|
fd86b26b39 | ||
|
b0dbef1587 | ||
|
a6e60bc23b | ||
|
137e8a876d | ||
|
fe9538253f | ||
|
edda2c248e | ||
|
62275639e3 | ||
|
d0c68b82f4 | ||
|
78b5953bdf | ||
|
25e565b099 | ||
|
1fe0f78ad7 | ||
|
fc8b68156f | ||
|
b47cd197ce | ||
|
3943426c4c | ||
|
08a9bd42a3 | ||
|
b2ff339efe | ||
|
c604131e04 | ||
|
f17607f126 | ||
|
94e455a57b | ||
|
3c9149db4a | ||
|
96cc615c07 | ||
|
cd1f4a1c2b | ||
|
e0f99a42db | ||
|
3506e417d4 | ||
|
36197e2212 | ||
|
fc5f42d01e | ||
|
e26d3767e0 | ||
|
046b37c76a | ||
|
925ff3e116 | ||
|
e5ede4f7b6 | ||
|
ded9301527 | ||
|
bd1ed6ff73 | ||
|
feb65980d4 | ||
|
e81d75a782 | ||
|
ff305d13ae | ||
|
8bcbc1a779 | ||
|
3874aa6fee | ||
|
103e9f3a11 | ||
|
d02c25f421 | ||
|
228af38a4a | ||
|
051a48885c | ||
|
6bcdc6052f | ||
|
af3527e64f | ||
|
17ef3dd07a | ||
|
1f165ecd2a | ||
|
70d1d450a9 | ||
|
b667892698 | ||
|
dc11add0e9 | ||
|
cb429a0b88 | ||
|
b51039cfc0 | ||
|
eadd959d95 | ||
|
1856e03d88 | ||
|
7dcfa622a3 | ||
|
64251b9b3c | ||
|
6b073dd5fc | ||
|
0911fabfb2 | ||
|
050d3f5e63 | ||
|
bbe3f78ad1 | ||
|
8204c18895 | ||
|
b91c788897 | ||
|
1d20a3029f | ||
|
9cfebc9ae3 | ||
|
ddabb4539b | ||
|
ada35e221b | ||
|
6fef9d904e | ||
|
67cf2b5904 | ||
|
3bebe792f6 | ||
|
00b4d89181 | ||
|
f729c6b650 | ||
|
df95f8c3f3 | ||
|
fe36e57d72 | ||
|
31197812b6 | ||
|
bd3fe01a12 | ||
|
39f7f32b7d | ||
|
b4522a1277 | ||
|
bb6a7e8327 | ||
|
9bd42a7579 | ||
|
b41430e5a3 | ||
|
595353e838 | ||
|
f1a21bb856 | ||
|
e44c2935f9 | ||
|
4d546f948d | ||
|
3bab349d7b | ||
|
eef6126ef8 | ||
|
5c7478fa39 | ||
|
64b72d0b06 | ||
|
b266a98b25 | ||
|
8a27de5df8 | ||
|
f9b5310fce | ||
|
fdce173969 | ||
|
7b9ddf90c1 | ||
|
580c8c19de | ||
|
55cc77140e | ||
|
93c89dd7cc | ||
|
c970cbbd2d | ||
|
9ea55fa51f | ||
|
5775a11b4e | ||
|
1a666b6584 | ||
|
35407a2108 | ||
|
71fb19aa22 | ||
|
b7d7f7b8ce | ||
|
59b983edcc | ||
|
1734d034e1 | ||
|
7f7500ff0c | ||
|
ce77c24e5c | ||
|
5469a591c0 | ||
|
a4befc5e59 | ||
|
1ee8065592 | ||
|
e4e3bd44fc | ||
|
c75de07c2e | ||
|
e928131809 | ||
|
4f802e82a9 | ||
|
0c90bd462e | ||
|
bbb70c93d9 | ||
|
f6e6ba775c | ||
|
06646be907 | ||
|
1b4c1a4b9e | ||
|
ae3f5a0f62 | ||
|
3a984e8a4d | ||
|
7d711a54bc | ||
|
d92d629c25 | ||
|
21e630209a | ||
|
e3933998ef | ||
|
667afe9051 | ||
|
26dc2881eb | ||
|
250cb33285 | ||
|
db51abec1f | ||
|
530716d458 | ||
|
f3065d79b3 | ||
|
bca5f0472e | ||
|
8e54c43917 | ||
|
946df1d7a0 | ||
|
55f00f742c | ||
|
97b2cb71b7 | ||
|
ba3a5ba53c | ||
|
953c09c999 | ||
|
b4cc325b07 | ||
|
28c1343f3e | ||
|
c16fd94c4a | ||
|
bb2cc20838 | ||
|
7b815fd010 | ||
|
18584974df | ||
|
15823b7785 | ||
|
6c275d4cd2 | ||
|
2d64ee5e2a | ||
|
3ae5ffa3f6 | ||
|
57d9ddc2c6 | ||
|
8b84def494 | ||
|
546f01ceb2 | ||
|
be720d0e0f | ||
|
72bed03244 | ||
|
38083ed284 | ||
|
53f1b94475 | ||
|
ed4270a0e3 | ||
|
f1d5cc8903 | ||
|
80efdec5d9 | ||
|
d49687400a | ||
|
e6e03b50da | ||
|
543fa3cfa9 | ||
|
899988c7c2 | ||
|
2f48dd449b | ||
|
f70fbbdfee | ||
|
2b09ca240d | ||
|
0626ff84ad | ||
|
62ec746ee3 | ||
|
d0f12d7d56 | ||
|
b806a69604 | ||
|
a609d6360b | ||
|
dafbfc8644 | ||
|
55413eea19 | ||
|
5247c181af | ||
|
321af5ec87 | ||
|
9ccf340b3d | ||
|
d7dcacb899 | ||
|
8addd483c2 | ||
|
4d27e5ac9b | ||
|
31290f6e80 | ||
|
c31cc4dbee | ||
|
cc1f94cf61 | ||
|
a9132b8d50 | ||
|
7b4a9891aa | ||
|
dcaaf38ecc | ||
|
653a8aa850 | ||
|
274af11385 | ||
|
170b246901 | ||
|
5250432ce3 | ||
|
53d6e973eb | ||
|
c9bdd62d53 | ||
|
7eb98af528 | ||
|
385e3e21b3 | ||
|
127ec63d76 | ||
|
4988b5f260 | ||
|
f28a50f92c | ||
|
e8efe8e609 | ||
|
d7e7457bc5 | ||
|
daff927811 | ||
|
8861ec0a61 | ||
|
bd4321f61a | ||
|
d831482fe0 | ||
|
9ea79ea389 | ||
|
b6fdf840ef | ||
|
73f262ce4b | ||
|
f63434adc3 | ||
|
42948386ec | ||
|
1ce0dbde0e | ||
|
32e0621b0a | ||
|
78e05b84e9 | ||
|
76ebd21163 | ||
|
38aaf545c6 | ||
|
527d7ef671 | ||
|
e54b80e061 | ||
|
27f95a8b2c | ||
|
a1e8903128 | ||
|
b00ac2aef4 | ||
|
8865d15ed9 | ||
|
fc3d4b7f33 | ||
|
934cc44540 | ||
|
106de3dd4c | ||
|
9b55cfcbe3 | ||
|
8137f1023a | ||
|
d670e33b6f | ||
|
3d3bb8fc94 | ||
|
9c880eae8a | ||
|
54a71630f1 | ||
|
923a8453cc | ||
|
00447ca819 | ||
|
ad4ee9d822 | ||
|
40e9dbfda2 | ||
|
b9da6911e6 | ||
|
81f9211098 | ||
|
8290081365 | ||
|
81af610c11 | ||
|
cfa2cf58f3 | ||
|
01c17d28f6 | ||
|
efd2a5e8c5 | ||
|
c437b00727 | ||
|
5df0d1ddc6 | ||
|
c3521b0d87 | ||
|
148916d35e | ||
|
06c7da944c | ||
|
f2ba741499 | ||
|
0f9927686b | ||
|
59855a71ef | ||
|
fffb21bb4f | ||
|
30bb6cdfab | ||
|
8771477884 | ||
|
55a5070691 | ||
|
1182b51e4b | ||
|
9976ecc2aa | ||
|
3bd8107fcf | ||
|
a48c67de5c | ||
|
bb0a7c014e | ||
|
80729b6b06 | ||
|
ff168d1c9e | ||
|
331100370c | ||
|
47babf2ed7 | ||
|
c1388bf23f | ||
|
3f4dfe9b0b | ||
|
0caac20d77 | ||
|
9d0a65a516 | ||
|
ab061ba7a6 | ||
|
2d24d064d5 | ||
|
458685026b | ||
|
b0448a4565 | ||
|
f902f59b31 | ||
|
2b8bfbe544 | ||
|
564a25e578 | ||
|
f50b08d301 | ||
|
26566d9ce0 | ||
|
f42d438be2 | ||
|
1fbc39b614 | ||
|
36af471c3c | ||
|
a5e86c9a36 | ||
|
4b27dd40b9 | ||
|
ff0aac9d8a | ||
|
bf24c8253e | ||
|
fd92352302 | ||
|
fcb66a11a3 | ||
|
63d2021a73 | ||
|
d110d9c74e | ||
|
157bf81dcb | ||
|
1beb1b1b4f | ||
|
13f523679c | ||
|
ed816d9aea | ||
|
ebfb51eed5 | ||
|
0127b1ea9e | ||
|
61f41a1459 | ||
|
d3fbc133a2 | ||
|
ce7a8e7a3d | ||
|
2b45610080 | ||
|
5b4dd6731c | ||
|
80157a032a | ||
|
7b1bf9a4e2 | ||
|
337c4d9ce5 | ||
|
9afc36a009 | ||
|
ebff1387c1 | ||
|
801502ec77 | ||
|
c07f59201e | ||
|
98b799d821 | ||
|
02714956d8 | ||
|
4d435d58c5 | ||
|
1c2fd3be50 | ||
|
6222439e21 | ||
|
46d46ac90b | ||
|
a5fe61eb15 | ||
|
0bfec36983 | ||
|
11607ecf24 | ||
|
9970e5535b | ||
|
99492e9c34 | ||
|
1d6ecffb3b | ||
|
8c33349dcb | ||
|
cfb2c55a4b | ||
|
e24d29f1d3 | ||
|
debd6ef2b9 | ||
|
58e9c21e4f | ||
|
c7c3083e3e | ||
|
63d061e9f2 | ||
|
1887bdb90a | ||
|
69addb068a | ||
|
a62c3ce0f9 | ||
|
aecc94bdb3 | ||
|
fcb7f2905a | ||
|
34c7169ca3 | ||
|
6e450061f4 | ||
|
fc3d7e9f43 | ||
|
514db4f9a2 | ||
|
23a8b65ce2 | ||
|
f8e6662bc8 | ||
|
89be2456fb | ||
|
bfd3451717 | ||
|
0b759d6a32 | ||
|
65e05084e6 | ||
|
f25a4ed386 | ||
|
b2a1d41829 | ||
|
2741a92d31 | ||
|
3570ce86d7 | ||
|
d809902d1e | ||
|
ec4232c00a | ||
|
dec793bfac | ||
|
fe3fe0527a | ||
|
a8855e86ed | ||
|
179d1c38e6 | ||
|
287da73a4f | ||
|
e9ed917888 | ||
|
70d842c971 | ||
|
bcda228e05 | ||
|
000dafc5e6 | ||
|
4ea824fe71 | ||
|
f72f539516 | ||
|
1b192a184f | ||
|
0edf896b4c | ||
|
7dec4deb70 | ||
|
d511221899 | ||
|
d2b7de5221 | ||
|
79c5be02e2 | ||
|
09df37438d | ||
|
8561e4c6fd | ||
|
976cb4d988 | ||
|
20f7d5103c | ||
|
d049ec2832 | ||
|
00fe2a527e | ||
|
f53ec3b43e | ||
|
4d0417f114 | ||
|
00903b64db | ||
|
a3038cad00 | ||
|
ef99f1afac | ||
|
cc00d4bd04 | ||
|
250f26ff6f | ||
|
62b786ca4a | ||
|
9cfb47e658 | ||
|
ccef27b637 | ||
|
8dee61fd39 | ||
|
ae64bd0e19 | ||
|
a75e93dbfc | ||
|
0aa66c5729 | ||
|
4c2434219d | ||
|
8c65fda33b | ||
|
14f2751bbb | ||
|
d37a543c39 | ||
|
4947e0c483 | ||
|
f87c630b86 | ||
|
73789ea734 | ||
|
5a16c9c495 | ||
|
9dd8357f67 | ||
|
623e77a268 | ||
|
73403b98df | ||
|
7aa1a2f336 | ||
|
08e42d2f56 | ||
|
69248fd7bb | ||
|
0af188c6ab | ||
|
8b6d32d0d1 | ||
|
3c11c25d69 | ||
|
12e6cc63e8 | ||
|
d429c8b59a | ||
|
ddd7a3551b | ||
|
49ede92e06 | ||
|
b813213328 | ||
|
14065b3ca9 | ||
|
41f9dc490a | ||
|
48d25ca73f | ||
|
e49e04034c | ||
|
c7860f8e5c | ||
|
adb982114a | ||
|
5b8983deac | ||
|
1730bc3b98 | ||
|
4374064d98 | ||
|
c1d7994045 | ||
|
7bda367cc8 | ||
|
3de7a2ccd2 | ||
|
9cc278df31 | ||
|
a0bab07e2f | ||
|
149bbd92ca | ||
|
1de3c989d7 | ||
|
2e547945e2 | ||
|
4d4a9a27af | ||
|
5b41d0995f | ||
|
ab98d72022 | ||
|
8a7cd3f74d | ||
|
35cb56d6e9 | ||
|
a7a2ffd16b | ||
|
dbeda324e0 | ||
|
bf1fe99d98 | ||
|
41429ec7c7 | ||
|
ee9ed13a66 | ||
|
490ce286ff | ||
|
099c2c0a21 | ||
|
46e15f7fa1 | ||
|
6677e63e08 | ||
|
6d6a3a3d6b | ||
|
5006246cf1 | ||
|
6187fb9b86 | ||
|
86f57ccd56 | ||
|
854096bac7 | ||
|
9d2b3bb157 | ||
|
22bda62e59 | ||
|
c8ad1dcc7a | ||
|
7212a7a328 | ||
|
f6b1b7b6bb | ||
|
53a9d72c4a | ||
|
ca10fbcde5 | ||
|
b4d33e5dfc | ||
|
37bed989f1 | ||
|
507eda8a7d | ||
|
cbe67e9ebc | ||
|
cd38200506 | ||
|
5d5cf92a19 | ||
|
98230d0ee3 | ||
|
e47c04a0b0 | ||
|
b65ccac58f | ||
|
bee69cc250 | ||
|
a350e175c7 | ||
|
2cd8188ffb | ||
|
b8a2d65a1d | ||
|
95f72c854d | ||
|
cd8bcfbbb5 | ||
|
08f89d2844 | ||
|
f3f156bf57 | ||
|
73e6f576f4 | ||
|
20236cab8a | ||
|
6c7b65edad | ||
|
21782293ea | ||
|
e52478c9aa | ||
|
319cba8653 | ||
|
df3acccc50 | ||
|
19282cac60 | ||
|
933c12b48d | ||
|
8a73890646 | ||
|
d6df5184a6 | ||
|
91e1a374b4 | ||
|
c725de7b5b | ||
|
ad1fd633b1 | ||
|
ef9284030b | ||
|
89e5740027 | ||
|
106f6bbcea | ||
|
b53c7a624b | ||
|
6fa788a8f9 | ||
|
19f0788f47 | ||
|
7767226000 | ||
|
4eb6b73903 | ||
|
cb46ecb002 | ||
|
e694921fe6 | ||
|
8266661855 | ||
|
cf7ddbe0e1 | ||
|
bdb3ab366f | ||
|
1fc71a0738 | ||
|
0b7520e3b1 | ||
|
48c8ccfe97 | ||
|
ad79b4f77c | ||
|
fd876b8636 | ||
|
21e896642a | ||
|
b4c395f116 | ||
|
a38116014d | ||
|
54223db1e9 | ||
|
8a897abc7b | ||
|
fe7b078ec8 | ||
|
ce66bdcbd4 | ||
|
f65e563c0c | ||
|
e860ba6c22 | ||
|
50b6605a43 | ||
|
d181200642 | ||
|
386ba25a44 | ||
|
5331d194df | ||
|
814ecd233e | ||
|
f9a8ac4e9b | ||
|
1bd5eecd54 | ||
|
2fa1d9998d | ||
|
9d9cfebd9e | ||
|
cc8a7a18d2 | ||
|
552c795041 | ||
|
3d757e8d90 | ||
|
1b5ecaed80 | ||
|
77c93ed96b | ||
|
3eeed99af2 | ||
|
a143dfbb37 | ||
|
6b1da3b18a | ||
|
f0894f3415 | ||
|
539295c1b7 | ||
|
54f91a5bfb | ||
|
f3c0d05c39 | ||
|
9f9cc7ed42 | ||
|
814b2da0ca | ||
|
7a9bb0c84b | ||
|
36ae2af29b | ||
|
d192f23e6e | ||
|
67cd0cd55c | ||
|
9e53d8b429 | ||
|
f5abf82b95 | ||
|
8dd3a25b52 | ||
|
d0aa46db08 | ||
|
f0ff70566b | ||
|
efecf5113b | ||
|
980569de68 | ||
|
9c74952607 | ||
|
70c2a4a6e4 | ||
|
99b136b824 | ||
|
ae4116c0f6 | ||
|
3080d7d868 | ||
|
08cf8ae1d6 | ||
|
3ed0f873f3 | ||
|
5060d3f408 | ||
|
ef24bea562 | ||
|
c18efaa33d | ||
|
b6b14f6f1c | ||
|
a90a52f426 | ||
|
bd5ea38446 | ||
|
f8248f46e5 | ||
|
b09c454bf0 | ||
|
d825689da4 | ||
|
a64dda2a2e | ||
|
8ce8789631 | ||
|
2b2f367c30 | ||
|
4d194457d8 | ||
|
6f7cf8805d | ||
|
36e39503c8 | ||
|
e7a24c9cd4 | ||
|
bd8a8922cc | ||
|
396b2e0fb6 | ||
|
36e382fadb | ||
|
d2666f2440 | ||
|
397ca97f0f | ||
|
631bb439a4 | ||
|
a4003e188e | ||
|
f4a9ba2db8 | ||
|
895a62c475 | ||
|
ac5a0d9dcb | ||
|
b8644d5c93 | ||
|
4d8baf1af0 | ||
|
f70987de09 | ||
|
9d02b1530c | ||
|
3d532dae01 | ||
|
02247b067f | ||
|
63c2668171 | ||
|
5575039126 | ||
|
f97c8f2ce4 | ||
|
6baab1d006 | ||
|
17adf04860 | ||
|
f871ecb425 | ||
|
4a425cde78 | ||
|
f56252b0cc | ||
|
7ae6c66beb | ||
|
be90fb96ea | ||
|
dd3350b169 | ||
|
cdd1ba1fe3 | ||
|
10ea12c867 | ||
|
e6358d948a | ||
|
1101572f78 | ||
|
0cf8836832 | ||
|
6e4562b0e6 | ||
|
856f1e176a | ||
|
1653a57e7b | ||
|
5f03e580c2 | ||
|
d370ae48a2 | ||
|
38baeba254 | ||
|
478f9b9390 | ||
|
82ad3821c4 | ||
|
07afaf12d5 | ||
|
2c98cbd020 | ||
|
1fe9d18a1a | ||
|
02a75a931a | ||
|
af7a432f29 | ||
|
770aca923f | ||
|
d50a74c7c6 | ||
|
fcd8554ea7 | ||
|
98da0723fc | ||
|
f037d7fea6 | ||
|
676e68a2bb | ||
|
c82d9c7722 | ||
|
70c4b17518 | ||
|
995a44de0a | ||
|
4f5fc18c66 | ||
|
4a94f379b4 | ||
|
fb4651b11f | ||
|
f961db3130 | ||
|
c63464c4c9 | ||
|
cca8b26375 | ||
|
cd0afeca15 | ||
|
86362bb0dd | ||
|
c4979a22dd | ||
|
859c5b3fa1 | ||
|
57a26b90cb | ||
|
7fa45fa471 | ||
|
47b5b286d8 | ||
|
ef37cb3ea5 | ||
|
b95bb9aa6a | ||
|
cfad4fa8a6 | ||
|
3f33485ca9 | ||
|
1c1dfde2c4 | ||
|
86e92941df | ||
|
09b788fef6 | ||
|
d54d80b0b8 | ||
|
3ff29ba3b0 | ||
|
2efb45943c | ||
|
d43b8cf0e5 | ||
|
5e8b5e1a15 | ||
|
03447abf5c | ||
|
c22d3a9967 | ||
|
5df3672f3b | ||
|
c68574efc3 | ||
|
e5d76cbce8 | ||
|
f121ed4062 | ||
|
111105d48b | ||
|
d7cb1a2fab | ||
|
01d34b54eb | ||
|
f33f796421 | ||
|
0504be2441 | ||
|
93eca76bf8 | ||
|
b3d02b0c37 | ||
|
67ff9eb379 | ||
|
cd6963daa6 | ||
|
44de49cbb0 | ||
|
8864afd784 | ||
|
51e4db73f0 | ||
|
11fca74fec | ||
|
fff2cd32d5 | ||
|
d993a299ef | ||
|
650408f61c | ||
|
ef26cdbbee | ||
|
168ab569b9 | ||
|
b418abc7c8 | ||
|
280ddb336e | ||
|
d93f36a180 | ||
|
941bcd3cd1 | ||
|
7591db3168 | ||
|
e68c840dad | ||
|
45f7b7d962 | ||
|
1bf8b6079d | ||
|
c59565c038 | ||
|
53d7916772 | ||
|
7beec38881 | ||
|
b130cc6c8e | ||
|
f8488208fb | ||
|
2efaf40370 | ||
|
75b99148c6 | ||
|
f36b038010 | ||
|
f84de28338 | ||
|
2d92cd6cb2 | ||
|
1a8d163d45 | ||
|
954f36dae6 | ||
|
76ab835347 | ||
|
5f4e873f4a | ||
|
889fcfd0e0 | ||
|
0326836544 | ||
|
18f64b0357 | ||
|
786859294d | ||
|
d10580b56b | ||
|
2b51a98d27 | ||
|
96c4309230 | ||
|
5ce5f37867 | ||
|
02f2968ee5 | ||
|
c1547cab8b | ||
|
5f20efb0c7 | ||
|
3c90868338 | ||
|
84b1ddc5d9 | ||
|
a235254e48 | ||
|
40aac6c2dd | ||
|
70c496e9fe | ||
|
4bc91f2381 | ||
|
dd3a3e1081 | ||
|
23bfc3d34a | ||
|
7ab88dd663 | ||
|
ebb44773c2 | ||
|
122ab148a4 | ||
|
0deb60ac2c | ||
|
fd8ab2688e | ||
|
b7062c8dda | ||
|
97fe2ddfd0 | ||
|
9cc9a36766 | ||
|
d51848aa50 | ||
|
00cc89d71c | ||
|
971ce294ad | ||
|
ccc7412947 | ||
|
3e4fc7ceb4 | ||
|
87973951b8 | ||
|
96b04a269d | ||
|
f0f1b21226 | ||
|
26405985a2 | ||
|
3063355eb7 | ||
|
04053c8465 | ||
|
6f36a26694 | ||
|
aaf196b477 | ||
|
06f78a7518 | ||
|
c6699686ad | ||
|
64e7c6093e | ||
|
54262a850d | ||
|
13b0dbc960 | ||
|
963cecb365 | ||
|
ab10f062f7 | ||
|
e15d79b834 | ||
|
bb87fdd958 |
20
.coveragerc
20
.coveragerc
@ -1,24 +1,15 @@
|
|||||||
[run]
|
[run]
|
||||||
branch = True
|
branch = True
|
||||||
source =
|
source =
|
||||||
alliance_auth
|
allianceauth
|
||||||
authentication
|
|
||||||
corputils
|
|
||||||
eveonline
|
|
||||||
fleetactivitytracking
|
|
||||||
fleetup
|
|
||||||
groupmanagement
|
|
||||||
hrapplications
|
|
||||||
notifications
|
|
||||||
optimer
|
|
||||||
permissions_tool
|
|
||||||
services
|
|
||||||
srp
|
|
||||||
timerboard
|
|
||||||
|
|
||||||
omit =
|
omit =
|
||||||
*/migrations/*
|
*/migrations/*
|
||||||
*/example/*
|
*/example/*
|
||||||
|
*/project_template/*
|
||||||
|
*/bin/*
|
||||||
|
*/tests/*
|
||||||
|
*/tests.py
|
||||||
|
|
||||||
[report]
|
[report]
|
||||||
exclude_lines =
|
exclude_lines =
|
||||||
@ -28,5 +19,6 @@ exclude_lines =
|
|||||||
if __name__ == .__main__.:
|
if __name__ == .__main__.:
|
||||||
def __repr__
|
def __repr__
|
||||||
raise AssertionError
|
raise AssertionError
|
||||||
|
if TYPE_CHECKING:
|
||||||
|
|
||||||
ignore_errors = True
|
ignore_errors = True
|
||||||
|
28
.editorconfig
Normal file
28
.editorconfig
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
# http://editorconfig.org
|
||||||
|
root = true
|
||||||
|
|
||||||
|
[*]
|
||||||
|
indent_style = space
|
||||||
|
indent_size = 4
|
||||||
|
tab_width = 4
|
||||||
|
end_of_line = lf
|
||||||
|
charset = utf-8
|
||||||
|
trim_trailing_whitespace = true
|
||||||
|
insert_final_newline = true
|
||||||
|
|
||||||
|
[*.{yaml,yml,less}]
|
||||||
|
indent_size = 2
|
||||||
|
|
||||||
|
[*.md]
|
||||||
|
indent_size = 2
|
||||||
|
|
||||||
|
# Makefiles always use tabs for indentation
|
||||||
|
[Makefile]
|
||||||
|
indent_style = tab
|
||||||
|
|
||||||
|
[*.bat]
|
||||||
|
indent_style = tab
|
||||||
|
|
||||||
|
[{Dockerfile,*.dockerfile}]
|
||||||
|
indent_style = space
|
||||||
|
indent_size = 4
|
1
.gitattributes
vendored
1
.gitattributes
vendored
@ -1 +0,0 @@
|
|||||||
*/*.py.example linguist-language=Python
|
|
23
.gitignore
vendored
23
.gitignore
vendored
@ -8,6 +8,7 @@ __pycache__/
|
|||||||
# Distribution / packaging
|
# Distribution / packaging
|
||||||
.Python
|
.Python
|
||||||
env/
|
env/
|
||||||
|
venv/
|
||||||
build/
|
build/
|
||||||
develop-eggs/
|
develop-eggs/
|
||||||
dist/
|
dist/
|
||||||
@ -37,11 +38,9 @@ htmlcov/
|
|||||||
.tox/
|
.tox/
|
||||||
.coverage
|
.coverage
|
||||||
.cache
|
.cache
|
||||||
nosetests.xml
|
|
||||||
coverage.xml
|
coverage.xml
|
||||||
|
|
||||||
# Translations
|
# Translations
|
||||||
*.mo
|
|
||||||
*.pot
|
*.pot
|
||||||
|
|
||||||
# Django stuff:
|
# Django stuff:
|
||||||
@ -53,17 +52,25 @@ docs/_build/
|
|||||||
# PyBuilder
|
# PyBuilder
|
||||||
target/
|
target/
|
||||||
|
|
||||||
.vagrant/
|
|
||||||
alliance_auth/settings.py
|
|
||||||
*Thumbs.db
|
*Thumbs.db
|
||||||
nginx_config.txt
|
nginx_config.txt
|
||||||
|
|
||||||
# custom staticfiles
|
|
||||||
static/*
|
|
||||||
|
|
||||||
#celerybeat
|
#celerybeat
|
||||||
*.pid
|
*.pid
|
||||||
celerybeat-schedule
|
celerybeat-schedule
|
||||||
|
|
||||||
#pycharm
|
#pycharm
|
||||||
.idea/*
|
.idea/*
|
||||||
|
/nbproject/
|
||||||
|
|
||||||
|
#VSCode
|
||||||
|
.vscode/
|
||||||
|
|
||||||
|
#gitlab configs
|
||||||
|
.gitlab/
|
||||||
|
|
||||||
|
#other
|
||||||
|
.flake8
|
||||||
|
.pylintrc
|
||||||
|
Makefile
|
||||||
|
alliance_auth.sqlite3
|
||||||
|
280
.gitlab-ci.yml
Normal file
280
.gitlab-ci.yml
Normal file
@ -0,0 +1,280 @@
|
|||||||
|
.only-default: &only-default
|
||||||
|
only:
|
||||||
|
- master
|
||||||
|
- branches
|
||||||
|
- merge_requests
|
||||||
|
|
||||||
|
stages:
|
||||||
|
- pre-commit
|
||||||
|
- gitlab
|
||||||
|
- test
|
||||||
|
- deploy
|
||||||
|
- docker
|
||||||
|
|
||||||
|
include:
|
||||||
|
- template: Dependency-Scanning.gitlab-ci.yml
|
||||||
|
- template: Security/SAST.gitlab-ci.yml
|
||||||
|
- template: Security/Secret-Detection.gitlab-ci.yml
|
||||||
|
|
||||||
|
before_script:
|
||||||
|
- apt-get update && apt-get install redis-server -y
|
||||||
|
- redis-server --daemonize yes
|
||||||
|
- python -V
|
||||||
|
- pip install wheel tox
|
||||||
|
|
||||||
|
pre-commit-check:
|
||||||
|
<<: *only-default
|
||||||
|
stage: pre-commit
|
||||||
|
image: python:3.11-bookworm
|
||||||
|
# variables:
|
||||||
|
# PRE_COMMIT_HOME: ${CI_PROJECT_DIR}/.cache/pre-commit
|
||||||
|
# cache:
|
||||||
|
# paths:
|
||||||
|
# - ${PRE_COMMIT_HOME}
|
||||||
|
script:
|
||||||
|
- pip install pre-commit
|
||||||
|
- pre-commit run --all-files
|
||||||
|
|
||||||
|
sast:
|
||||||
|
stage: gitlab
|
||||||
|
before_script: []
|
||||||
|
|
||||||
|
dependency_scanning:
|
||||||
|
stage: gitlab
|
||||||
|
before_script:
|
||||||
|
- apt-get update && apt-get install redis-server libmariadb-dev -y
|
||||||
|
- redis-server --daemonize yes
|
||||||
|
- python -V
|
||||||
|
- pip install wheel tox
|
||||||
|
|
||||||
|
secret_detection:
|
||||||
|
stage: gitlab
|
||||||
|
before_script: []
|
||||||
|
|
||||||
|
test-3.8-core:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.8-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py38-core
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.9-core:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.9-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py39-core
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.10-core:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.10-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py310-core
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.11-core:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.11-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py311-core
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.12-core:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.12-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py312-core
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.8-all:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.8-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py38-all
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.9-all:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.9-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py39-all
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.10-all:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.10-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py310-all
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
test-3.11-all:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.11-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py311-all
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
coverage: '/(?i)total.*? (100(?:\.0+)?\%|[1-9]?\d(?:\.\d+)?\%)$/'
|
||||||
|
|
||||||
|
test-3.12-all:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.12-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e py312-all
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
reports:
|
||||||
|
coverage_report:
|
||||||
|
coverage_format: cobertura
|
||||||
|
path: coverage.xml
|
||||||
|
|
||||||
|
build-test:
|
||||||
|
stage: test
|
||||||
|
image: python:3.11-bookworm
|
||||||
|
|
||||||
|
before_script:
|
||||||
|
- python -m pip install --upgrade pip
|
||||||
|
- python -m pip install --upgrade build
|
||||||
|
- python -m pip install --upgrade setuptools wheel
|
||||||
|
|
||||||
|
script:
|
||||||
|
- python -m build
|
||||||
|
|
||||||
|
artifacts:
|
||||||
|
when: always
|
||||||
|
name: "$CI_JOB_NAME-$CI_COMMIT_REF_SLUG"
|
||||||
|
paths:
|
||||||
|
- dist/*
|
||||||
|
expire_in: 1 year
|
||||||
|
|
||||||
|
test-docs:
|
||||||
|
<<: *only-default
|
||||||
|
image: python:3.11-bookworm
|
||||||
|
script:
|
||||||
|
- tox -e docs
|
||||||
|
|
||||||
|
deploy_production:
|
||||||
|
stage: deploy
|
||||||
|
image: python:3.11-bookworm
|
||||||
|
|
||||||
|
before_script:
|
||||||
|
- python -m pip install --upgrade pip
|
||||||
|
- python -m pip install --upgrade build
|
||||||
|
- python -m pip install --upgrade setuptools wheel twine
|
||||||
|
|
||||||
|
script:
|
||||||
|
- python -m build
|
||||||
|
- python -m twine upload dist/*
|
||||||
|
|
||||||
|
rules:
|
||||||
|
- if: $CI_COMMIT_TAG
|
||||||
|
|
||||||
|
build-image:
|
||||||
|
before_script: []
|
||||||
|
image: docker:24.0
|
||||||
|
stage: docker
|
||||||
|
services:
|
||||||
|
- docker:24.0-dind
|
||||||
|
script: |
|
||||||
|
CURRENT_DATE=$(echo $CI_COMMIT_TIMESTAMP | head -c 10 | tr -d -)
|
||||||
|
IMAGE_TAG=$CI_REGISTRY_IMAGE/auth:$CURRENT_DATE-$CI_COMMIT_SHORT_SHA
|
||||||
|
CURRENT_TAG=$CI_REGISTRY_IMAGE/auth:$CI_COMMIT_TAG
|
||||||
|
MINOR_TAG=$CI_REGISTRY_IMAGE/auth:$(echo $CI_COMMIT_TAG | cut -d '.' -f 1-2)
|
||||||
|
MAJOR_TAG=$CI_REGISTRY_IMAGE/auth:$(echo $CI_COMMIT_TAG | cut -d '.' -f 1)
|
||||||
|
LATEST_TAG=$CI_REGISTRY_IMAGE/auth:latest
|
||||||
|
|
||||||
|
docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
|
||||||
|
docker run --privileged --rm tonistiigi/binfmt --uninstall qemu-*
|
||||||
|
docker run --privileged --rm tonistiigi/binfmt --install all
|
||||||
|
docker buildx create --use --name new-builder
|
||||||
|
docker buildx build . --tag $IMAGE_TAG --tag $CURRENT_TAG --tag $MINOR_TAG --tag $MAJOR_TAG --tag $LATEST_TAG --file docker/Dockerfile --platform linux/amd64,linux/arm64 --push --build-arg AUTH_VERSION=$(echo $CI_COMMIT_TAG | cut -c 2-)
|
||||||
|
rules:
|
||||||
|
- if: $CI_COMMIT_TAG
|
||||||
|
when: delayed
|
||||||
|
start_in: 10 minutes
|
||||||
|
|
||||||
|
build-image-dev:
|
||||||
|
before_script: []
|
||||||
|
image: docker:24.0
|
||||||
|
stage: docker
|
||||||
|
services:
|
||||||
|
- docker:24.0-dind
|
||||||
|
script: |
|
||||||
|
CURRENT_DATE=$(echo $CI_COMMIT_TIMESTAMP | head -c 10 | tr -d -)
|
||||||
|
IMAGE_TAG=$CI_REGISTRY_IMAGE/auth:$CURRENT_DATE-$CI_COMMIT_BRANCH-$CI_COMMIT_SHORT_SHA
|
||||||
|
|
||||||
|
docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
|
||||||
|
docker run --privileged --rm tonistiigi/binfmt --uninstall qemu-*
|
||||||
|
docker run --privileged --rm tonistiigi/binfmt --install all
|
||||||
|
docker buildx create --use --name new-builder
|
||||||
|
docker buildx build . --tag $IMAGE_TAG --file docker/Dockerfile --platform linux/amd64,linux/arm64 --push --build-arg AUTH_PACKAGE=git+https://gitlab.com/allianceauth/allianceauth@$CI_COMMIT_BRANCH
|
||||||
|
rules:
|
||||||
|
- if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME == ""'
|
||||||
|
when: manual
|
||||||
|
- if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME != ""'
|
||||||
|
when: never
|
||||||
|
|
||||||
|
build-image-mr:
|
||||||
|
before_script: []
|
||||||
|
image: docker:24.0
|
||||||
|
stage: docker
|
||||||
|
services:
|
||||||
|
- docker:24.0-dind
|
||||||
|
script: |
|
||||||
|
CURRENT_DATE=$(echo $CI_COMMIT_TIMESTAMP | head -c 10 | tr -d -)
|
||||||
|
IMAGE_TAG=$CI_REGISTRY_IMAGE/auth:$CURRENT_DATE-$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME-$CI_COMMIT_SHORT_SHA
|
||||||
|
|
||||||
|
docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
|
||||||
|
docker run --privileged --rm tonistiigi/binfmt --uninstall qemu-*
|
||||||
|
docker run --privileged --rm tonistiigi/binfmt --install all
|
||||||
|
docker buildx create --use --name new-builder
|
||||||
|
docker buildx build . --tag $IMAGE_TAG --file docker/Dockerfile --platform linux/amd64,linux/arm64 --push --build-arg AUTH_PACKAGE=git+$CI_MERGE_REQUEST_SOURCE_PROJECT_URL@$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME
|
||||||
|
rules:
|
||||||
|
- if: '$CI_PIPELINE_SOURCE == "merge_request_event"'
|
||||||
|
when: manual
|
||||||
|
- if: '$CI_PIPELINE_SOURCE != "merge_request_event"'
|
||||||
|
when: never
|
14
.gitlab/issue_templates/Bug.md
Normal file
14
.gitlab/issue_templates/Bug.md
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Bug
|
||||||
|
|
||||||
|
- I have searched [issues](https://gitlab.com/allianceauth/allianceauth/issues?scope=all&utf8=%E2%9C%93&state=all) (Y/N):
|
||||||
|
- What Version of Alliance Auth:
|
||||||
|
- What Operating System:
|
||||||
|
- Version of other components relevant to issue eg. Service, Database:
|
||||||
|
|
||||||
|
Please include a brief description of your issue here.
|
||||||
|
|
||||||
|
Please include steps to reproduce the issue
|
||||||
|
|
||||||
|
Please include any tracebacks or logs
|
||||||
|
|
||||||
|
Please include the results of the command `pip list`
|
7
.gitlab/issue_templates/Feature Request.md
Normal file
7
.gitlab/issue_templates/Feature Request.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# Feature Request
|
||||||
|
|
||||||
|
- Describe the feature are you requesting.
|
||||||
|
|
||||||
|
- Is this a Service (external integration), a Module (Alliance Auth extension) or an enhancement to an existing service/module.
|
||||||
|
|
||||||
|
- Describe why its useful to you or others.
|
95
.pre-commit-config.yaml
Normal file
95
.pre-commit-config.yaml
Normal file
@ -0,0 +1,95 @@
|
|||||||
|
# Apply to all files without committing:
|
||||||
|
# pre-commit run --all-files
|
||||||
|
# Update this file:
|
||||||
|
# pre-commit autoupdate
|
||||||
|
|
||||||
|
# Set the default language versions for the hooks
|
||||||
|
default_language_version:
|
||||||
|
python: python3 # Force all Python hooks to use Python 3
|
||||||
|
node: 22.12.0 # Force all Node hooks to use Node 22.12.0
|
||||||
|
|
||||||
|
# Globally exclude files
|
||||||
|
# https://pre-commit.com/#top_level-exclude
|
||||||
|
exclude: |
|
||||||
|
(?x)(
|
||||||
|
LICENSE|
|
||||||
|
allianceauth\/static\/allianceauth\/css\/themes\/bootstrap-locals.less|
|
||||||
|
\.min\.css|
|
||||||
|
\.min\.js|
|
||||||
|
\.po|
|
||||||
|
\.mo|
|
||||||
|
swagger\.json|
|
||||||
|
static/(.*)/libs/
|
||||||
|
)
|
||||||
|
|
||||||
|
repos:
|
||||||
|
# Code Upgrades
|
||||||
|
- repo: https://github.com/asottile/pyupgrade
|
||||||
|
rev: v3.20.0
|
||||||
|
hooks:
|
||||||
|
- id: pyupgrade
|
||||||
|
args: [--py38-plus]
|
||||||
|
- repo: https://github.com/adamchainz/django-upgrade
|
||||||
|
rev: 1.25.0
|
||||||
|
hooks:
|
||||||
|
- id: django-upgrade
|
||||||
|
args: [--target-version=4.2]
|
||||||
|
|
||||||
|
# Formatting
|
||||||
|
- repo: https://github.com/pre-commit/pre-commit-hooks
|
||||||
|
rev: v5.0.0
|
||||||
|
hooks:
|
||||||
|
# Identify invalid files
|
||||||
|
- id: check-ast
|
||||||
|
- id: check-yaml
|
||||||
|
- id: check-json
|
||||||
|
- id: check-toml
|
||||||
|
- id: check-xml
|
||||||
|
# git checks
|
||||||
|
- id: check-merge-conflict
|
||||||
|
- id: check-added-large-files
|
||||||
|
args: [--maxkb=1000]
|
||||||
|
- id: detect-private-key
|
||||||
|
- id: check-case-conflict
|
||||||
|
# Python checks
|
||||||
|
# - id: check-docstring-first
|
||||||
|
- id: debug-statements
|
||||||
|
# - id: requirements-txt-fixer
|
||||||
|
- id: fix-encoding-pragma
|
||||||
|
args: [--remove]
|
||||||
|
- id: fix-byte-order-marker
|
||||||
|
# General quality checks
|
||||||
|
- id: mixed-line-ending
|
||||||
|
args: [--fix=lf]
|
||||||
|
- id: trailing-whitespace
|
||||||
|
args: [--markdown-linebreak-ext=md]
|
||||||
|
- id: check-executables-have-shebangs
|
||||||
|
- id: end-of-file-fixer
|
||||||
|
- repo: https://github.com/editorconfig-checker/editorconfig-checker.python
|
||||||
|
rev: 3.2.1
|
||||||
|
hooks:
|
||||||
|
- id: editorconfig-checker
|
||||||
|
- repo: https://github.com/igorshubovych/markdownlint-cli
|
||||||
|
rev: v0.45.0
|
||||||
|
hooks:
|
||||||
|
- id: markdownlint
|
||||||
|
language: node
|
||||||
|
args:
|
||||||
|
- --disable=MD013
|
||||||
|
# Infrastructure
|
||||||
|
- repo: https://github.com/tox-dev/pyproject-fmt
|
||||||
|
rev: v2.6.0
|
||||||
|
hooks:
|
||||||
|
- id: pyproject-fmt
|
||||||
|
name: pyproject.toml formatter
|
||||||
|
description: "Format the pyproject.toml file."
|
||||||
|
args:
|
||||||
|
- --indent=4
|
||||||
|
additional_dependencies:
|
||||||
|
- tox==4.24.1 # https://github.com/tox-dev/tox/releases/latest
|
||||||
|
- repo: https://github.com/abravalheri/validate-pyproject
|
||||||
|
rev: v0.24.1
|
||||||
|
hooks:
|
||||||
|
- id: validate-pyproject
|
||||||
|
name: Validate pyproject.toml
|
||||||
|
description: "Validate the pyproject.toml file."
|
32
.readthedocs.yml
Normal file
32
.readthedocs.yml
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
# .readthedocs.yml
|
||||||
|
# Read the Docs configuration file
|
||||||
|
# See https://docs.readthedocs.io/en/stable/config-file/v2.html for details
|
||||||
|
|
||||||
|
# Required
|
||||||
|
version: 2
|
||||||
|
|
||||||
|
# Set the version of Python and other tools you might need
|
||||||
|
build:
|
||||||
|
os: ubuntu-22.04
|
||||||
|
apt_packages:
|
||||||
|
- redis
|
||||||
|
tools:
|
||||||
|
python: "3.11"
|
||||||
|
jobs:
|
||||||
|
post_system_dependencies:
|
||||||
|
- redis-server --daemonize yes
|
||||||
|
|
||||||
|
# Build documentation in the docs/ directory with Sphinx
|
||||||
|
sphinx:
|
||||||
|
configuration: docs/conf.py
|
||||||
|
|
||||||
|
# Optionally build your docs in additional formats such as PDF and ePub
|
||||||
|
formats: all
|
||||||
|
|
||||||
|
# Python requirements required to build your docs
|
||||||
|
python:
|
||||||
|
install:
|
||||||
|
- method: pip
|
||||||
|
path: .
|
||||||
|
extra_requirements:
|
||||||
|
- docs
|
14
.travis.yml
14
.travis.yml
@ -1,14 +0,0 @@
|
|||||||
language: python
|
|
||||||
python:
|
|
||||||
- "2.7"
|
|
||||||
- "3.5"
|
|
||||||
# command to install dependencies
|
|
||||||
install:
|
|
||||||
- pip install requests
|
|
||||||
- pip install -r requirements.txt
|
|
||||||
- pip install -r testing-requirements.txt
|
|
||||||
# command to run tests
|
|
||||||
script: coverage run runtests.py
|
|
||||||
cache: pip
|
|
||||||
after_success:
|
|
||||||
coveralls
|
|
10
.tx/transifex.yml
Normal file
10
.tx/transifex.yml
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
filters:
|
||||||
|
- filter_type: file
|
||||||
|
file_format: PO
|
||||||
|
source_file: allianceauth/locale/en/LC_MESSAGES/django.po
|
||||||
|
source_language: en
|
||||||
|
translation_files_expression: allianceauth/locale/<lang>/LC_MESSAGES/django.po
|
||||||
|
|
||||||
|
settings:
|
||||||
|
language_mapping:
|
||||||
|
zh-Hans: zh_Hans
|
1
LICENSE
1
LICENSE
@ -337,4 +337,3 @@ proprietary programs. If your program is a subroutine library, you may
|
|||||||
consider it more useful to permit linking proprietary applications with the
|
consider it more useful to permit linking proprietary applications with the
|
||||||
library. If this is what you want to do, use the GNU Lesser General
|
library. If this is what you want to do, use the GNU Lesser General
|
||||||
Public License instead of this License.
|
Public License instead of this License.
|
||||||
|
|
||||||
|
119
README.md
Executable file → Normal file
119
README.md
Executable file → Normal file
@ -1,55 +1,94 @@
|
|||||||
Alliance Auth
|
# Alliance Auth
|
||||||
============
|
|
||||||
|
|
||||||
[](https://gitter.im/R4stl1n/allianceauth?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge)
|
[](https://pypi.org/project/allianceauth/)
|
||||||
[](http://allianceauth.readthedocs.io/?badge=latest)
|
[](https://pypi.org/project/allianceauth/)
|
||||||
[](https://travis-ci.org/allianceauth/allianceauth)
|
[](https://pypi.org/project/allianceauth/)
|
||||||
[](https://coveralls.io/github/allianceauth/allianceauth?branch=master)
|
[](https://pypi.org/project/allianceauth/)
|
||||||
|
[](https://gitlab.com/allianceauth/allianceauth/commits/master)
|
||||||
|
[](https://allianceauth.readthedocs.io/?badge=latest)
|
||||||
|
[](https://gitlab.com/allianceauth/allianceauth/commits/master)
|
||||||
|
[](https://discord.gg/fjnHAmk)
|
||||||
|
|
||||||
|
A flexible authentication platform for EVE Online to help in-game organizations manage access to applications and services. AA provides both, a stable core, and a robust framework for community development and custom applications.
|
||||||
|
|
||||||
EVE service auth to help corps, alliances, and coalitions manage services.
|
## Content
|
||||||
Built for "The 99 Percent" open for anyone to use.
|
|
||||||
|
|
||||||
[Read the docs here.](http://allianceauth.rtfd.io)
|
- [Overview](#overview)
|
||||||
|
- [Documentation](https://allianceauth.rtfd.io)
|
||||||
|
- [Support](#support)
|
||||||
|
- [Release Notes](https://gitlab.com/allianceauth/allianceauth/-/releases)
|
||||||
|
- [Developer Team](#development-team)
|
||||||
|
- [Contributing](#contributing)
|
||||||
|
|
||||||
Special Permissions In Admin:
|
## Overview
|
||||||
|
|
||||||
auth | user | group_management ( Access to add members to groups within the alliance )
|
Alliance Auth (AA) is a platform that helps Eve Online organizations efficiently manage access to applications and services.
|
||||||
auth | user | jabber_broadcast ( Access to broadcast a message over jabber to own groups )
|
|
||||||
auth | user | jabber_broadcast_all ( Can choose from all groups and the 'all' option when broadcasting )
|
|
||||||
auth | user | corp_apis ( View APIs, and jackKnife, of all members in user's corp. )
|
|
||||||
auth | user | alliance_apis ( View APIs, and jackKnife, of all member in user's alliance member corps. )
|
|
||||||
auth | user | timer_management ( Access to create and remove timers )
|
|
||||||
auth | user | timer_view ( Access to timerboard to view timers )
|
|
||||||
auth | user | srp_management ( Allows for an individual to create and remove srp fleets and fleet data )
|
|
||||||
auth | user | sigtracker_management ( Allows for an individual to create and remove signitures )
|
|
||||||
auth | user | sigtracker_view ( Allows for an individual view signitures )
|
|
||||||
auth | user | optimer_management ( Allows for an individual to create and remove fleet operations )
|
|
||||||
auth | user | optimer_view ( Allows for an individual view fleet operations )
|
|
||||||
auth | user | logging_notifications ( Generate notifications from logging )
|
|
||||||
|
|
||||||
auth | user | human_resources ( View applications to user's corp )
|
Main features:
|
||||||
hrapplications | application | delete_application ( Can delete applications )
|
|
||||||
hrapplications | application | accept_application ( Can accept applications )
|
|
||||||
hrapplications | application | reject_application ( Can reject applications )
|
|
||||||
hrapplications | application | view_apis ( Can see applicant's API keys )
|
|
||||||
hrapplications | applicationcomment | add_applicationcomment ( Can comment on applications )
|
|
||||||
|
|
||||||
Vagrant Instructions:
|
- Automatically grants or revokes user access to external services (e.g.: Discord, Mumble) based on the user's current membership to [a variety of EVE Online affiliation](https://allianceauth.readthedocs.io/en/latest/features/core/states/) and [groups](https://allianceauth.readthedocs.io/en/latest/features/core/groups/)
|
||||||
|
|
||||||
Copy the scripts to the root directory before running
|
- Provides a central web site where users can directly access web apps (e.g. SRP requests, Fleet Schedule) and manage their access to external services and groups.
|
||||||
|
|
||||||
Active Developers:
|
- Includes a set of connectors (called ["Services"](https://allianceauth.readthedocs.io/en/latest/features/services/)) for integrating access management with many popular external applications / services like Discord, Mumble, Teamspeak 3, SMF and others
|
||||||
|
|
||||||
Adarnof
|
- Includes a set of web [Apps](https://allianceauth.readthedocs.io/en/latest/features/apps/) which add many useful functions, e.g.: fleet schedule, timer board, SRP request management, fleet activity tracker
|
||||||
basraah
|
|
||||||
|
|
||||||
Beta Testers/ Bug Fixers:
|
- Can be easily extended with additional services and apps. Many are provided by the community and can be found here: [Community Creations](https://gitlab.com/allianceauth/community-creations)
|
||||||
|
|
||||||
TrentBartlem ( Testing and Bug Fixes )
|
- English :flag_gb:, Chinese :flag_cn:, German :flag_de:, Spanish :flag_es:, Korean :flag_kr:, Russian :flag_ru:, Italian :flag_it:, French :flag_fr:, Japanese :flag_jp: and Ukrainian :flag_ua: Localization
|
||||||
IskFiend ( Bug Fixes and Server Configuration )
|
|
||||||
Mr McClain (Bug Fixes and server configuration )
|
|
||||||
|
|
||||||
Special Thanks:
|
For further details about AA - including an installation guide and a full list of included services and plugin apps - please see the [official documentation](https://allianceauth.rtfd.io).
|
||||||
|
|
||||||
Thanks to Nikdoof, without his old auth implementation this project wouldn't be as far as it is now.
|
## Screenshot
|
||||||
|
|
||||||
|
Here is an example of the Alliance Auth web site with a mixture of Services, Apps and Community Creations enabled:
|
||||||
|
|
||||||
|
### Flatly Theme
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Darkly Theme
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Support
|
||||||
|
|
||||||
|
[Get help on Discord](https://discord.gg/fjnHAmk) or submit an [issue](https://gitlab.com/allianceauth/allianceauth/issues).
|
||||||
|
|
||||||
|
## Development Team
|
||||||
|
|
||||||
|
### Active Developers
|
||||||
|
|
||||||
|
- [Aaron Kable](https://gitlab.com/aaronkable/)
|
||||||
|
- [Ariel Rin](https://gitlab.com/soratidus999/)
|
||||||
|
- [Col Crunch](https://gitlab.com/colcrunch/)
|
||||||
|
- [Erik Kalkoken](https://gitlab.com/ErikKalkoken/)
|
||||||
|
- [Rounon Dax](https://gitlab.com/ppfeufer)
|
||||||
|
- [snipereagle1](https://gitlab.com/mckernanin)
|
||||||
|
|
||||||
|
### Former Developers
|
||||||
|
|
||||||
|
- [Adarnof](https://gitlab.com/adarnof/)
|
||||||
|
- [Basraah](https://gitlab.com/basraah/)
|
||||||
|
|
||||||
|
### Beta Testers / Bug Fixers
|
||||||
|
|
||||||
|
- [ghoti](https://gitlab.com/ChainsawMcGinny/)
|
||||||
|
- [kaezon](https://github.com/kaezon/)
|
||||||
|
- [mmolitor87](https://gitlab.com/mmolitor87/)
|
||||||
|
- [orbitroom](https://github.com/orbitroom/)
|
||||||
|
- [TargetZ3R0](https://github.com/TargetZ3R0)
|
||||||
|
- [tehfiend](https://github.com/tehfiend/)
|
||||||
|
|
||||||
|
Special thanks to [Nikdoof](https://github.com/nikdoof/), as his [auth](https://github.com/nikdoof/test-auth) was the foundation for the original work on this project.
|
||||||
|
|
||||||
|
## Contributing
|
||||||
|
|
||||||
|
Alliance Auth is maintained and developed by the community and we welcome every contribution!
|
||||||
|
|
||||||
|
To see what needs to be worked on please review our issue list or chat with our active developers on Discord.
|
||||||
|
|
||||||
|
Also, please make sure you have signed the [License Agreement](https://developers.eveonline.com/resource/license-agreement) by logging in at [https://developers.eveonline.com](https://developers.eveonline.com) before submitting any pull requests.
|
||||||
|
|
||||||
|
In addition to the core AA system we also very much welcome contributions to our growing list of 3rd party services and plugin apps. Please see [AA Community Creations](https://gitlab.com/allianceauth/community-creations) for details.
|
||||||
|
2
alliance_auth/.gitignore
vendored
2
alliance_auth/.gitignore
vendored
@ -1,2 +0,0 @@
|
|||||||
/settings.py
|
|
||||||
!/*.example
|
|
@ -1,8 +0,0 @@
|
|||||||
from __future__ import absolute_import, unicode_literals
|
|
||||||
|
|
||||||
# This will make sure the app is always imported when
|
|
||||||
# Django starts so that shared_task will use this app.
|
|
||||||
from .celeryapp import app as celery_app # noqa
|
|
||||||
|
|
||||||
__version__ = '1.15.8'
|
|
||||||
NAME = 'Alliance Auth v%s' % __version__
|
|
@ -1,17 +0,0 @@
|
|||||||
from __future__ import absolute_import, unicode_literals
|
|
||||||
import os
|
|
||||||
from celery import Celery
|
|
||||||
|
|
||||||
# set the default Django settings module for the 'celery' program.
|
|
||||||
os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'alliance_auth.settings')
|
|
||||||
|
|
||||||
from django.conf import settings # noqa
|
|
||||||
|
|
||||||
app = Celery('alliance_auth')
|
|
||||||
|
|
||||||
# Using a string here means the worker don't have to serialize
|
|
||||||
# the configuration object to child processes.
|
|
||||||
app.config_from_object('django.conf:settings')
|
|
||||||
|
|
||||||
# Load task modules from all registered Django app configs.
|
|
||||||
app.autodiscover_tasks(lambda: settings.INSTALLED_APPS)
|
|
@ -1,706 +0,0 @@
|
|||||||
# -*- coding: UTF-8 -*-
|
|
||||||
"""
|
|
||||||
Django settings for alliance_auth project.
|
|
||||||
|
|
||||||
Generated by 'django-admin startproject' using Django 1.10.1.
|
|
||||||
|
|
||||||
For more information on this file, see
|
|
||||||
https://docs.djangoproject.com/en/1.10/topics/settings/
|
|
||||||
|
|
||||||
For the full list of settings and their values, see
|
|
||||||
https://docs.djangoproject.com/en/1.10/ref/settings/
|
|
||||||
"""
|
|
||||||
|
|
||||||
import os
|
|
||||||
|
|
||||||
from django.contrib import messages
|
|
||||||
from celery.schedules import crontab
|
|
||||||
|
|
||||||
# Celery configuration
|
|
||||||
BROKER_URL = 'redis://localhost:6379/0'
|
|
||||||
CELERYBEAT_SCHEDULER = "django_celery_beat.schedulers.DatabaseScheduler"
|
|
||||||
|
|
||||||
# Build paths inside the project like this: os.path.join(BASE_DIR, ...)
|
|
||||||
BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
|
|
||||||
|
|
||||||
|
|
||||||
# Quick-start development settings - unsuitable for production
|
|
||||||
# See https://docs.djangoproject.com/en/1.10/howto/deployment/checklist/
|
|
||||||
|
|
||||||
# SECURITY WARNING: keep the secret key used in production secret!
|
|
||||||
SECRET_KEY = ''
|
|
||||||
|
|
||||||
# SECURITY WARNING: don't run with debug turned on in production!
|
|
||||||
DEBUG = 'True' == os.environ.get('AA_DEBUG','True')
|
|
||||||
|
|
||||||
ALLOWED_HOSTS = []
|
|
||||||
|
|
||||||
|
|
||||||
# Application definition
|
|
||||||
|
|
||||||
INSTALLED_APPS = [
|
|
||||||
'django.contrib.admin',
|
|
||||||
'django.contrib.auth',
|
|
||||||
'django.contrib.contenttypes',
|
|
||||||
'django.contrib.sessions',
|
|
||||||
'django.contrib.messages',
|
|
||||||
'django.contrib.staticfiles',
|
|
||||||
'django.contrib.humanize',
|
|
||||||
'django_celery_beat',
|
|
||||||
'bootstrapform',
|
|
||||||
'authentication',
|
|
||||||
'services',
|
|
||||||
'eveonline',
|
|
||||||
'groupmanagement',
|
|
||||||
'hrapplications',
|
|
||||||
'timerboard',
|
|
||||||
'srp',
|
|
||||||
'optimer',
|
|
||||||
'corputils',
|
|
||||||
'fleetactivitytracking',
|
|
||||||
'fleetup',
|
|
||||||
'notifications',
|
|
||||||
'esi',
|
|
||||||
'permissions_tool',
|
|
||||||
'geelweb.django.navhelper',
|
|
||||||
'bootstrap_pagination',
|
|
||||||
'captcha',
|
|
||||||
|
|
||||||
# Services
|
|
||||||
'services.modules.mumble',
|
|
||||||
'services.modules.discord',
|
|
||||||
'services.modules.discourse',
|
|
||||||
'services.modules.ipboard',
|
|
||||||
'services.modules.ips4',
|
|
||||||
'services.modules.market',
|
|
||||||
'services.modules.openfire',
|
|
||||||
'services.modules.seat',
|
|
||||||
'services.modules.smf',
|
|
||||||
'services.modules.phpbb3',
|
|
||||||
'services.modules.xenforo',
|
|
||||||
'services.modules.teamspeak3',
|
|
||||||
]
|
|
||||||
|
|
||||||
MIDDLEWARE = [
|
|
||||||
'django.middleware.security.SecurityMiddleware',
|
|
||||||
'django.contrib.sessions.middleware.SessionMiddleware',
|
|
||||||
'django.middleware.common.CommonMiddleware',
|
|
||||||
'django.middleware.csrf.CsrfViewMiddleware',
|
|
||||||
'django.contrib.auth.middleware.AuthenticationMiddleware',
|
|
||||||
'django.contrib.messages.middleware.MessageMiddleware',
|
|
||||||
'django.middleware.clickjacking.XFrameOptionsMiddleware',
|
|
||||||
'django.middleware.locale.LocaleMiddleware',
|
|
||||||
]
|
|
||||||
|
|
||||||
ROOT_URLCONF = 'alliance_auth.urls'
|
|
||||||
|
|
||||||
LOCALE_PATHS = (
|
|
||||||
os.path.join(BASE_DIR, 'locale/'),
|
|
||||||
)
|
|
||||||
|
|
||||||
ugettext = lambda s: s
|
|
||||||
LANGUAGES = (
|
|
||||||
('en', ugettext('English')),
|
|
||||||
('de', ugettext('German')),
|
|
||||||
)
|
|
||||||
|
|
||||||
TEMPLATES = [
|
|
||||||
{
|
|
||||||
'BACKEND': 'django.template.backends.django.DjangoTemplates',
|
|
||||||
'DIRS': [
|
|
||||||
os.path.join(BASE_DIR, 'customization/templates'),
|
|
||||||
os.path.join(BASE_DIR, 'stock/templates'),
|
|
||||||
],
|
|
||||||
'APP_DIRS': True,
|
|
||||||
'OPTIONS': {
|
|
||||||
'context_processors': [
|
|
||||||
'django.template.context_processors.debug',
|
|
||||||
'django.template.context_processors.request',
|
|
||||||
'django.contrib.auth.context_processors.auth',
|
|
||||||
'django.contrib.messages.context_processors.messages',
|
|
||||||
'django.template.context_processors.i18n',
|
|
||||||
'django.template.context_processors.media',
|
|
||||||
'django.template.context_processors.static',
|
|
||||||
'django.template.context_processors.tz',
|
|
||||||
'services.context_processors.auth_settings',
|
|
||||||
'notifications.context_processors.user_notification_count',
|
|
||||||
'authentication.context_processors.states',
|
|
||||||
'authentication.context_processors.membership_state',
|
|
||||||
'groupmanagement.context_processors.can_manage_groups',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
]
|
|
||||||
|
|
||||||
WSGI_APPLICATION = 'alliance_auth.wsgi.application'
|
|
||||||
|
|
||||||
|
|
||||||
# Database
|
|
||||||
# https://docs.djangoproject.com/en/1.10/ref/settings/#databases
|
|
||||||
|
|
||||||
DATABASES = {
|
|
||||||
'default': {
|
|
||||||
'ENGINE': 'django.db.backends.mysql',
|
|
||||||
'NAME': 'alliance_auth',
|
|
||||||
'USER': os.environ.get('AA_DB_DEFAULT_USER', 'allianceserver'),
|
|
||||||
'PASSWORD': os.environ.get('AA_DB_DEFAULT_PASSWORD', 'password'),
|
|
||||||
'HOST': os.environ.get('AA_DB_DEFAULT_HOST', '127.0.0.1'),
|
|
||||||
'PORT': os.environ.get('AA_DB_DEFAULT_PORT', '3306'),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
# If you have run the authentication.0013_service_modules migration
|
|
||||||
# you will need to set this to True in order to install service modules
|
|
||||||
# which were involved in that migration after it has been run.
|
|
||||||
# If you are on a fresh install with no existing database you can safely
|
|
||||||
# set this to True
|
|
||||||
# If you have not run the authentication.0013_service_modules migration
|
|
||||||
# leave this set to False.
|
|
||||||
SERVICES_MIGRATED = False
|
|
||||||
|
|
||||||
# Password validation
|
|
||||||
# https://docs.djangoproject.com/en/1.10/ref/settings/#auth-password-validators
|
|
||||||
|
|
||||||
AUTH_PASSWORD_VALIDATORS = [
|
|
||||||
{
|
|
||||||
'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator',
|
|
||||||
},
|
|
||||||
{
|
|
||||||
'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator',
|
|
||||||
},
|
|
||||||
{
|
|
||||||
'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator',
|
|
||||||
},
|
|
||||||
{
|
|
||||||
'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator',
|
|
||||||
},
|
|
||||||
]
|
|
||||||
|
|
||||||
LOGIN_URL = 'auth_login_user'
|
|
||||||
|
|
||||||
SUPERUSER_STATE_BYPASS = 'True' == os.environ.get('AA_SUPERUSER_STATE_BYPASS', 'True')
|
|
||||||
|
|
||||||
# Internationalization
|
|
||||||
# https://docs.djangoproject.com/en/1.10/topics/i18n/
|
|
||||||
|
|
||||||
LANGUAGE_CODE = os.environ.get('AA_LANGUAGE_CODE', 'en-us')
|
|
||||||
|
|
||||||
TIME_ZONE = os.environ.get('AA_TIME_ZONE', 'UTC')
|
|
||||||
|
|
||||||
USE_I18N = True
|
|
||||||
|
|
||||||
USE_L10N = True
|
|
||||||
|
|
||||||
USE_TZ = True
|
|
||||||
|
|
||||||
|
|
||||||
# Static files (CSS, JavaScript, Images)
|
|
||||||
# https://docs.djangoproject.com/en/1.10/howto/static-files/
|
|
||||||
|
|
||||||
STATIC_URL = '/static/'
|
|
||||||
STATIC_ROOT = os.path.join(BASE_DIR, "static")
|
|
||||||
STATICFILES_DIRS = (
|
|
||||||
os.path.join(BASE_DIR, "customization/static"),
|
|
||||||
os.path.join(BASE_DIR, "stock/static"),
|
|
||||||
)
|
|
||||||
|
|
||||||
# Bootstrap messaging css workaround
|
|
||||||
MESSAGE_TAGS = {
|
|
||||||
messages.ERROR: 'danger'
|
|
||||||
}
|
|
||||||
|
|
||||||
CACHES = {
|
|
||||||
"default": {
|
|
||||||
"BACKEND": "redis_cache.RedisCache",
|
|
||||||
"LOCATION": "localhost:6379",
|
|
||||||
"OPTIONS": {
|
|
||||||
"DB": 1,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Google Recaptcha
|
|
||||||
|
|
||||||
CAPTCHA_ENABLED = False
|
|
||||||
|
|
||||||
RECAPTCHA_PUBLIC_KEY = 'MyRecaptchaKey'
|
|
||||||
RECAPTCHA_PRIVATE_KEY = 'MyRecaptchaPrivateKey'
|
|
||||||
|
|
||||||
NOCAPTCHA = True
|
|
||||||
|
|
||||||
#####################################################
|
|
||||||
##
|
|
||||||
## Auth configuration starts here
|
|
||||||
##
|
|
||||||
#####################################################
|
|
||||||
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# CELERY SCHEDULED TASKS
|
|
||||||
#########################
|
|
||||||
CELERYBEAT_SCHEDULE = {
|
|
||||||
'run_api_refresh': {
|
|
||||||
'task': 'eveonline.tasks.run_api_refresh',
|
|
||||||
'schedule': crontab(minute=0, hour="*/3"),
|
|
||||||
},
|
|
||||||
'run_corp_update': {
|
|
||||||
'task': 'eveonline.tasks.run_corp_update',
|
|
||||||
'schedule': crontab(minute=0, hour="*/2"),
|
|
||||||
},
|
|
||||||
'update_all_corpstats': {
|
|
||||||
'task': 'corputils.tasks.update_all_corpstats',
|
|
||||||
'schedule': crontab(minute=0, hour="*/6"),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
#################
|
|
||||||
# EMAIL SETTINGS
|
|
||||||
#################
|
|
||||||
# DOMAIN - The alliance auth domain_url
|
|
||||||
# EMAIL_HOST - SMTP Server URL
|
|
||||||
# EMAIL_PORT - SMTP Server PORT
|
|
||||||
# EMAIL_HOST_USER - Email Username (for gmail, the entire address)
|
|
||||||
# EMAIL_HOST_PASSWORD - Email Password
|
|
||||||
# EMAIL_USE_TLS - Set to use TLS encryption
|
|
||||||
#################
|
|
||||||
DOMAIN = os.environ.get('AA_DOMAIN', 'https://example.com')
|
|
||||||
EMAIL_HOST = os.environ.get('AA_EMAIL_HOST', 'smtp.gmail.com')
|
|
||||||
EMAIL_PORT = int(os.environ.get('AA_EMAIL_PORT', '587'))
|
|
||||||
EMAIL_HOST_USER = os.environ.get('AA_EMAIL_HOST_USER', '')
|
|
||||||
EMAIL_HOST_PASSWORD = os.environ.get('AA_EMAIL_HOST_PASSWORD', '')
|
|
||||||
EMAIL_USE_TLS = 'True' == os.environ.get('AA_EMAIL_USE_TLS', 'True')
|
|
||||||
|
|
||||||
####################
|
|
||||||
# Front Page Links
|
|
||||||
####################
|
|
||||||
# KILLBOARD_URL - URL for your killboard. Blank to hide link
|
|
||||||
# MEDIA_URL - URL for your media page (youtube etc). Blank to hide link
|
|
||||||
# FORUM_URL - URL for your forums. Blank to hide link
|
|
||||||
# SITE_NAME - Name of the auth site.
|
|
||||||
####################
|
|
||||||
KILLBOARD_URL = os.environ.get('AA_KILLBOARD_URL', '')
|
|
||||||
EXTERNAL_MEDIA_URL = os.environ.get('AA_EXTERNAL_MEDIA_URL', '')
|
|
||||||
FORUM_URL = os.environ.get('AA_FORUM_URL', '')
|
|
||||||
SITE_NAME = os.environ.get('AA_SITE_NAME', 'Alliance Auth')
|
|
||||||
|
|
||||||
###################
|
|
||||||
# SSO Settings
|
|
||||||
###################
|
|
||||||
# Get client ID and client secret from registering an app at
|
|
||||||
# https://developers.eveonline.com/
|
|
||||||
# Callback URL should be https://example.com/sso/callback
|
|
||||||
###################
|
|
||||||
ESI_SSO_CLIENT_ID = os.environ.get('AA_ESI_SSO_CLIENT_ID', '')
|
|
||||||
ESI_SSO_CLIENT_SECRET = os.environ.get('AA_ESI_SSO_CLIENT_SECRET', '')
|
|
||||||
ESI_SSO_CALLBACK_URL = os.environ.get('AA_ESI_SSO_CALLBACK_URL', '')
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Default Group Settings
|
|
||||||
#########################
|
|
||||||
# DEFAULT_AUTH_GROUP - Default group members are put in
|
|
||||||
# DEFAULT_BLUE_GROUP - Default group for blue members
|
|
||||||
# MEMBER_CORP_GROUPS - Assign members to a group representing their main corp
|
|
||||||
# BLUE_CORP_GROUPS - Assign blues to a group representing their main corp
|
|
||||||
#########################
|
|
||||||
DEFAULT_AUTH_GROUP = os.environ.get('AA_DEFAULT_ALLIANCE_GROUP', 'Member')
|
|
||||||
DEFAULT_BLUE_GROUP = os.environ.get('AA_DEFAULT_BLUE_GROUP', 'Blue')
|
|
||||||
MEMBER_CORP_GROUPS = 'True' == os.environ.get('AA_MEMBER_CORP_GROUPS', 'True')
|
|
||||||
MEMBER_ALLIANCE_GROUPS = 'True' == os.environ.get('AA_MEMBER_ALLIANCE_GROUPS', 'False')
|
|
||||||
BLUE_CORP_GROUPS = 'True' == os.environ.get('AA_BLUE_CORP_GROUPS', 'False')
|
|
||||||
BLUE_ALLIANCE_GROUPS = 'True' == os.environ.get('AA_BLUE_ALLIANCE_GROUPS', 'False')
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Tenant Configuration
|
|
||||||
#########################
|
|
||||||
# CORP_IDS - A list of corporation IDs to treat as members.
|
|
||||||
# ALLIANCE_IDS - A list of alliance IDs to treat as members.
|
|
||||||
# Any corps in a specified alliance will be treated as members, so do not include them in CORP_IDS
|
|
||||||
#########################
|
|
||||||
CORP_IDS = []
|
|
||||||
ALLIANCE_IDS = []
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Standings Configuration
|
|
||||||
#########################
|
|
||||||
# Add a corp API key to add blue standings to grant access.
|
|
||||||
# CORP_API_ID - Set this to the api id for the corp API key
|
|
||||||
# CORP_API_VCODE - Set this to the api vcode for the corp API key
|
|
||||||
# BLUE_STANDING - The lowest standings value to consider blue
|
|
||||||
# STANDING_LEVEL - The level of standings to query. Accepted values are 'corp' and 'alliance'.
|
|
||||||
# BLUE_CORP_IDS - A list of corps to remain blue regardless of in-game standings
|
|
||||||
# BLUE_ALLIANCE_IDS - A list of alliances to remain blue regardless of in-game standings
|
|
||||||
########################
|
|
||||||
CORP_API_ID = os.environ.get('AA_CORP_API_ID', '')
|
|
||||||
CORP_API_VCODE = os.environ.get('AA_CORP_API_VCODE', '')
|
|
||||||
BLUE_STANDING = float(os.environ.get('AA_BLUE_STANDING', '5.0'))
|
|
||||||
STANDING_LEVEL = os.environ.get('AA_STANDING_LEVEL', 'corp')
|
|
||||||
BLUE_CORP_IDS = []
|
|
||||||
BLUE_ALLIANCE_IDS = []
|
|
||||||
|
|
||||||
########################
|
|
||||||
# API Configuration
|
|
||||||
########################
|
|
||||||
# MEMBER_API_MASK - Numeric value of minimum API mask required for members
|
|
||||||
# MEMBER_API_ACCOUNT - Require API to be for Account and not character restricted
|
|
||||||
# BLUE_API_MASK - Numeric value of minimum API mask required for blues
|
|
||||||
# BLUE_API_ACCOUNT - Require API to be for Account and not character restricted
|
|
||||||
# REJECT_OLD_APIS - Require each submitted API be newer than the latest submitted API
|
|
||||||
# REJECT_OLD_APIS_MARGIN - Margin from latest submitted API ID within which a newly submitted API is still accepted
|
|
||||||
# API_SSO_VALIDATION - Require users to prove ownership of newly entered API keys via SSO
|
|
||||||
# Requires SSO to be configured.
|
|
||||||
#######################
|
|
||||||
MEMBER_API_MASK = os.environ.get('AA_MEMBER_API_MASK', 268435455)
|
|
||||||
MEMBER_API_ACCOUNT = 'True' == os.environ.get('AA_MEMBER_API_ACCOUNT', 'True')
|
|
||||||
BLUE_API_MASK = os.environ.get('AA_BLUE_API_MASK', 8388608)
|
|
||||||
BLUE_API_ACCOUNT = 'True' == os.environ.get('AA_BLUE_API_ACCOUNT', 'False')
|
|
||||||
REJECT_OLD_APIS = 'True' == os.environ.get('AA_REJECT_OLD_APIS', 'False')
|
|
||||||
REJECT_OLD_APIS_MARGIN = os.environ.get('AA_REJECT_OLD_APIS_MARGIN', 50)
|
|
||||||
API_SSO_VALIDATION = 'True' == os.environ.get('AA_API_SSO_VALIDATION', 'False')
|
|
||||||
|
|
||||||
#######################
|
|
||||||
# EVE Provider Settings
|
|
||||||
#######################
|
|
||||||
# EVEONLINE_CHARACTER_PROVIDER - Name of default data source for getting eve character data
|
|
||||||
# EVEONLINE_CORP_PROVIDER - Name of default data source for getting eve corporation data
|
|
||||||
# EVEONLINE_ALLIANCE_PROVIDER - Name of default data source for getting eve alliance data
|
|
||||||
# EVEONLINE_ITEMTYPE_PROVIDER - Name of default data source for getting eve item type data
|
|
||||||
#
|
|
||||||
# Available sources are 'esi' and 'xml'. Leaving blank results in the default 'esi' being used.
|
|
||||||
#######################
|
|
||||||
EVEONLINE_CHARACTER_PROVIDER = os.environ.get('AA_EVEONLINE_CHARACTER_PROVIDER', '')
|
|
||||||
EVEONLINE_CORP_PROVIDER = os.environ.get('AA_EVEONLINE_CORP_PROVIDER', '')
|
|
||||||
EVEONLINE_ALLIANCE_PROVIDER = os.environ.get('AA_EVEONLINE_ALLIANCE_PROVIDER', '')
|
|
||||||
EVEONLINE_ITEMTYPE_PROVIDER = os.environ.get('AA_EVEONLINE_ITEMTYPE_PROVIDER', '')
|
|
||||||
|
|
||||||
#####################
|
|
||||||
# Alliance Market
|
|
||||||
#####################
|
|
||||||
MARKET_URL = os.environ.get('AA_MARKET_URL', 'http://example.com/market')
|
|
||||||
MARKET_DB = {
|
|
||||||
'ENGINE': 'django.db.backends.mysql',
|
|
||||||
'NAME': 'alliance_market',
|
|
||||||
'USER': os.environ.get('AA_DB_MARKET_USER', 'allianceserver-market'),
|
|
||||||
'PASSWORD': os.environ.get('AA_DB_MARKET_PASSWORD', 'password'),
|
|
||||||
'HOST': os.environ.get('AA_DB_MARKET_HOST', '127.0.0.1'),
|
|
||||||
'PORT': os.environ.get('AA_DB_MARKET_PORT', '3306'),
|
|
||||||
}
|
|
||||||
|
|
||||||
#####################
|
|
||||||
# HR Configuration
|
|
||||||
#####################
|
|
||||||
# API_KEY_AUDIT_URL - URL for viewing API keys.
|
|
||||||
# Other URLs are supported. Use string formatting notation {} with parameter names api_id, vcode, pk
|
|
||||||
# Example URL formats are shown below:
|
|
||||||
# Old Jacknife: 'https://example.com/jacknife/eveapi/audit.php?usid={api_id}&apik={vcode}'
|
|
||||||
# New Jacknife: 'https://example.com/jacknife/?usid={api_id}&apik={vcode}'
|
|
||||||
# SeAT: 'https://seat.example.com/api-key/detail/{api_id}'
|
|
||||||
# Django Admin: '/admin/eveonline/eveapikeypair/{pk}/change'
|
|
||||||
# Leave blank for the verification code to be shown in a popup on click.
|
|
||||||
#####################
|
|
||||||
API_KEY_AUDIT_URL = os.environ.get('AA_API_KEY_AUDIT_URL', '')
|
|
||||||
|
|
||||||
#####################
|
|
||||||
# Forum Configuration
|
|
||||||
#####################
|
|
||||||
# IPBOARD_ENDPOINT - Api endpoint if using ipboard
|
|
||||||
# IPBOARD_APIKEY - Api key to interact with ipboard
|
|
||||||
# IPBOARD_APIMODULE - Module for alliance auth *leave alone*
|
|
||||||
#####################
|
|
||||||
IPBOARD_ENDPOINT = os.environ.get('AA_IPBOARD_ENDPOINT', 'example.com/interface/board/index.php')
|
|
||||||
IPBOARD_APIKEY = os.environ.get('AA_IPBOARD_APIKEY', 'somekeyhere')
|
|
||||||
IPBOARD_APIMODULE = 'aa'
|
|
||||||
|
|
||||||
########################
|
|
||||||
# XenForo Configuration
|
|
||||||
########################
|
|
||||||
XENFORO_ENDPOINT = os.environ.get('AA_XENFORO_ENDPOINT', 'example.com/api.php')
|
|
||||||
XENFORO_DEFAULT_GROUP = os.environ.get('AA_XENFORO_DEFAULT_GROUP', 0)
|
|
||||||
XENFORO_APIKEY = os.environ.get('AA_XENFORO_APIKEY', 'yourapikey')
|
|
||||||
#####################
|
|
||||||
|
|
||||||
######################
|
|
||||||
# Jabber Configuration
|
|
||||||
######################
|
|
||||||
# JABBER_URL - Jabber address url
|
|
||||||
# JABBER_PORT - Jabber service portal
|
|
||||||
# JABBER_SERVER - Jabber server url
|
|
||||||
# OPENFIRE_ADDRESS - Address of the openfire admin console including port
|
|
||||||
# Please use http with 9090 or https with 9091
|
|
||||||
# OPENFIRE_SECRET_KEY - Openfire REST API secret key
|
|
||||||
# BROADCAST_USER - Broadcast user JID
|
|
||||||
# BROADCAST_USER_PASSWORD - Broadcast user password
|
|
||||||
######################
|
|
||||||
JABBER_URL = os.environ.get('AA_JABBER_URL', "example.com")
|
|
||||||
JABBER_PORT = int(os.environ.get('AA_JABBER_PORT', '5223'))
|
|
||||||
JABBER_SERVER = os.environ.get('AA_JABBER_SERVER', "example.com")
|
|
||||||
OPENFIRE_ADDRESS = os.environ.get('AA_OPENFIRE_ADDRESS', "http://example.com:9090")
|
|
||||||
OPENFIRE_SECRET_KEY = os.environ.get('AA_OPENFIRE_SECRET_KEY', "somekey")
|
|
||||||
BROADCAST_USER = os.environ.get('AA_BROADCAST_USER', "broadcast@") + JABBER_URL
|
|
||||||
BROADCAST_USER_PASSWORD = os.environ.get('AA_BROADCAST_USER_PASSWORD', "somepassword")
|
|
||||||
BROADCAST_SERVICE_NAME = os.environ.get('AA_BROADCAST_SERVICE_NAME', "broadcast")
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Mumble Configuration
|
|
||||||
######################################
|
|
||||||
# MUMBLE_URL - Mumble server host
|
|
||||||
# Do not include leading http:// or mumble://
|
|
||||||
######################################
|
|
||||||
MUMBLE_URL = os.environ.get('AA_MUMBLE_URL', "example.com")
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# PHPBB3 Configuration
|
|
||||||
######################################
|
|
||||||
PHPBB3_DB = {
|
|
||||||
'ENGINE': 'django.db.backends.mysql',
|
|
||||||
'NAME': 'alliance_forum',
|
|
||||||
'USER': os.environ.get('AA_DB_PHPBB3_USER', 'allianceserver-phpbb3'),
|
|
||||||
'PASSWORD': os.environ.get('AA_DB_PHPBB3_PASSWORD', 'password'),
|
|
||||||
'HOST': os.environ.get('AA_DB_PHPBB3_HOST', '127.0.0.1'),
|
|
||||||
'PORT': os.environ.get('AA_DB_PHPBB3_PORT', '3306'),
|
|
||||||
}
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Teamspeak3 Configuration
|
|
||||||
######################################
|
|
||||||
# TEAMSPEAK3_SERVER_IP - Teamspeak3 server ip
|
|
||||||
# TEAMSPEAK3_SERVER_PORT - Teamspeak3 server port
|
|
||||||
# TEAMSPEAK3_SERVERQUERY_USER - Teamspeak3 serverquery username
|
|
||||||
# TEAMSPEAK3_SERVERQUERY_PASSWORD - Teamspeak3 serverquery password
|
|
||||||
# TEAMSPEAK3_VIRTUAL_SERVER - Virtual server id
|
|
||||||
# TEAMSPEAK3_AUTHED_GROUP_ID - Default authed group id
|
|
||||||
# TEAMSPEAK3_PUBLIC_URL - teamspeak3 public url used for link creation
|
|
||||||
######################################
|
|
||||||
TEAMSPEAK3_SERVER_IP = os.environ.get('AA_TEAMSPEAK3_SERVER_IP', '127.0.0.1')
|
|
||||||
TEAMSPEAK3_SERVER_PORT = int(os.environ.get('AA_TEAMSPEAK3_SERVER_PORT', '10011'))
|
|
||||||
TEAMSPEAK3_SERVERQUERY_USER = os.environ.get('AA_TEAMSPEAK3_SERVERQUERY_USER', 'serveradmin')
|
|
||||||
TEAMSPEAK3_SERVERQUERY_PASSWORD = os.environ.get('AA_TEAMSPEAK3_SERVERQUERY_PASSWORD', 'passwordhere')
|
|
||||||
TEAMSPEAK3_VIRTUAL_SERVER = int(os.environ.get('AA_TEAMSPEAK3_VIRTUAL_SERVER', '1'))
|
|
||||||
TEAMSPEAK3_PUBLIC_URL = os.environ.get('AA_TEAMSPEAK3_PUBLIC_URL', 'example.com')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Discord Configuration
|
|
||||||
######################################
|
|
||||||
# DISCORD_GUILD_ID - ID of the guild to manage
|
|
||||||
# DISCORD_BOT_TOKEN - oauth token of the app bot user
|
|
||||||
# DISCORD_APP_ID - oauth app client ID
|
|
||||||
# DISCORD_APP_SECRET - oauth app secret
|
|
||||||
# DISCORD_CALLBACK_URL - oauth callback url
|
|
||||||
# DISCORD_SYNC_NAMES - enable to force discord nicknames to be set to eve char name (bot needs Manage Nicknames permission)
|
|
||||||
######################################
|
|
||||||
DISCORD_GUILD_ID = os.environ.get('AA_DISCORD_GUILD_ID', '')
|
|
||||||
DISCORD_BOT_TOKEN = os.environ.get('AA_DISCORD_BOT_TOKEN', '')
|
|
||||||
DISCORD_APP_ID = os.environ.get('AA_DISCORD_APP_ID', '')
|
|
||||||
DISCORD_APP_SECRET = os.environ.get('AA_DISCORD_APP_SECRET', '')
|
|
||||||
DISCORD_CALLBACK_URL = os.environ.get('AA_DISCORD_CALLBACK_URL', 'http://example.com/discord/callback')
|
|
||||||
DISCORD_SYNC_NAMES = 'True' == os.environ.get('AA_DISCORD_SYNC_NAMES', 'False')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Discourse Configuration
|
|
||||||
######################################
|
|
||||||
# DISCOURSE_URL - Web address of the forums (no trailing slash)
|
|
||||||
# DISCOURSE_API_USERNAME - API account username
|
|
||||||
# DISCOURSE_API_KEY - API Key
|
|
||||||
# DISCOURSE_SSO_SECRET - SSO secret key
|
|
||||||
######################################
|
|
||||||
DISCOURSE_URL = os.environ.get('AA_DISCOURSE_URL', '')
|
|
||||||
DISCOURSE_API_USERNAME = os.environ.get('AA_DISCOURSE_API_USERNAME', '')
|
|
||||||
DISCOURSE_API_KEY = os.environ.get('AA_DISCOURSE_API_KEY', '')
|
|
||||||
DISCOURSE_SSO_SECRET = os.environ.get('AA_DISCOURSE_SSO_SECRET', '')
|
|
||||||
|
|
||||||
#####################################
|
|
||||||
# IPS4 Configuration
|
|
||||||
#####################################
|
|
||||||
# IPS4_URL - base url of the IPS4 install (no trailing slash)
|
|
||||||
# IPS4_API_KEY - API key provided by IPS4
|
|
||||||
#####################################
|
|
||||||
IPS4_URL = os.environ.get('AA_IPS4_URL', 'http://example.com/ips4')
|
|
||||||
IPS4_API_KEY = os.environ.get('AA_IPS4_API_KEY', '')
|
|
||||||
IPS4_DB = {
|
|
||||||
'ENGINE': 'django.db.backends.mysql',
|
|
||||||
'NAME': 'alliance_ips4',
|
|
||||||
'USER': os.environ.get('AA_DB_IPS4_USER', 'allianceserver-ips4'),
|
|
||||||
'PASSWORD': os.environ.get('AA_DB_IPS4_PASSWORD', 'password'),
|
|
||||||
'HOST': os.environ.get('AA_DB_IPS4_HOST', '127.0.0.1'),
|
|
||||||
'PORT': os.environ.get('AA_DB_IPS4_PORT', '3306'),
|
|
||||||
}
|
|
||||||
|
|
||||||
#####################################
|
|
||||||
# SEAT Configuration
|
|
||||||
#####################################
|
|
||||||
# SEAT_URL - base url of the seat install (no trailing slash)
|
|
||||||
# SEAT_XTOKEN - API key X-Token provided by SeAT
|
|
||||||
#####################################
|
|
||||||
SEAT_URL = os.environ.get('AA_SEAT_URL', 'http://example.com/seat')
|
|
||||||
SEAT_XTOKEN = os.environ.get('AA_SEAT_XTOKEN', '')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# SMF Configuration
|
|
||||||
######################################
|
|
||||||
SMF_URL = os.environ.get('AA_SMF_URL', 'https://example.com')
|
|
||||||
SMF_DB = {
|
|
||||||
'ENGINE': 'django.db.backends.mysql',
|
|
||||||
'NAME': 'alliance_smf',
|
|
||||||
'USER': os.environ.get('AA_DB_SMF_USER', 'allianceserver-smf'),
|
|
||||||
'PASSWORD': os.environ.get('AA_DB_SMF_PASSWORD', 'password'),
|
|
||||||
'HOST': os.environ.get('AA_DB_SMF_HOST', '127.0.0.1'),
|
|
||||||
'PORT': os.environ.get('AA_DB_SMF_PORT', '3306'),
|
|
||||||
}
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Fleet-Up Configuration
|
|
||||||
######################################
|
|
||||||
# FLEETUP_APP_KEY - The app key from http://fleet-up.com/Api/MyApps
|
|
||||||
# FLEETUP_USER_ID - The user id from http://fleet-up.com/Api/MyKeys
|
|
||||||
# FLEETUP_API_ID - The API id from http://fleet-up.com/Api/MyKeys
|
|
||||||
# FLEETUP_GROUP_ID - The id of the group you want to pull data from, see http://fleet-up.com/Api/Endpoints#groups_mygroupmemberships
|
|
||||||
######################################
|
|
||||||
FLEETUP_APP_KEY = os.environ.get('AA_FLEETUP_APP_KEY', '')
|
|
||||||
FLEETUP_USER_ID = os.environ.get('AA_FLEETUP_USER_ID', '')
|
|
||||||
FLEETUP_API_ID = os.environ.get('AA_FLEETUP_API_ID', '')
|
|
||||||
FLEETUP_GROUP_ID = os.environ.get('AA_FLEETUP_GROUP_ID', '')
|
|
||||||
|
|
||||||
#####################################
|
|
||||||
# Logging Configuration
|
|
||||||
#####################################
|
|
||||||
# Set log_file and console level to desired state:
|
|
||||||
# DEBUG - basically stack trace, explains every step
|
|
||||||
# INFO - model creation, deletion, updates, etc
|
|
||||||
# WARN - unexpected function outcomes that do not impact user
|
|
||||||
# ERROR - unexcpeted function outcomes which prevent user from achieving desired outcome
|
|
||||||
# EXCEPTION - something critical went wrong, unhandled
|
|
||||||
#####################################
|
|
||||||
# Recommended level for log_file is INFO, console is DEBUG
|
|
||||||
# Change log level of individual apps below to narrow your debugging
|
|
||||||
#####################################
|
|
||||||
LOGGING = {
|
|
||||||
'version': 1,
|
|
||||||
'disable_existing_loggers': False,
|
|
||||||
'formatters': {
|
|
||||||
'verbose': {
|
|
||||||
'format' : "[%(asctime)s] %(levelname)s [%(name)s:%(lineno)s] %(message)s",
|
|
||||||
'datefmt' : "%d/%b/%Y %H:%M:%S"
|
|
||||||
},
|
|
||||||
'simple': {
|
|
||||||
'format': '%(levelname)s %(message)s'
|
|
||||||
},
|
|
||||||
},
|
|
||||||
'handlers': {
|
|
||||||
'log_file': {
|
|
||||||
'level': 'INFO', # edit this line to change logging level to file
|
|
||||||
'class': 'logging.handlers.RotatingFileHandler',
|
|
||||||
'filename': os.path.join(BASE_DIR,'log/allianceauth.log'),
|
|
||||||
'formatter': 'verbose',
|
|
||||||
'maxBytes': 1024*1024*5, # edit this line to change max log file size
|
|
||||||
'backupCount': 5, # edit this line to change number of log backups
|
|
||||||
},
|
|
||||||
'console': {
|
|
||||||
'level': 'DEBUG', # edit this line to change logging level to console
|
|
||||||
'class': 'logging.StreamHandler',
|
|
||||||
'formatter': 'verbose',
|
|
||||||
},
|
|
||||||
'notifications': { # creates notifications for users with logging_notifications permission
|
|
||||||
'level': 'ERROR', # edit this line to change logging level to notifications
|
|
||||||
'class': 'notifications.handlers.NotificationHandler',
|
|
||||||
'formatter': 'verbose',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
'loggers': {
|
|
||||||
'authentication': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'celerytask': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'eveonline': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'groupmanagement': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'hrapplications': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'portal': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'registration': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'services': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'srp': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'timerboard': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'sigtracker': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'optimer': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'corputils': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'fleetactivitytracking': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'ERROR',
|
|
||||||
},
|
|
||||||
'fleetup': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'util': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'django': {
|
|
||||||
'handlers': ['log_file', 'console', 'notifications'],
|
|
||||||
'level': 'ERROR',
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Conditionally add databases only if configured
|
|
||||||
if 'services.modules.phpbb3' in INSTALLED_APPS:
|
|
||||||
DATABASES['phpbb3'] = PHPBB3_DB
|
|
||||||
if 'services.modules.smf' in INSTALLED_APPS:
|
|
||||||
DATABASES['smf'] = SMF_DB
|
|
||||||
if 'services.modules.market' in INSTALLED_APPS:
|
|
||||||
DATABASES['market'] = MARKET_DB
|
|
||||||
if 'services.modules.ips4' in INSTALLED_APPS:
|
|
||||||
DATABASES['ips4'] = IPS4_DB
|
|
||||||
|
|
||||||
# Ensure corp/alliance IDs are expected types
|
|
||||||
STR_CORP_IDS = [str(id) for id in CORP_IDS]
|
|
||||||
STR_ALLIANCE_IDS = [str(id) for id in ALLIANCE_IDS]
|
|
||||||
STR_BLUE_CORP_IDS = [str(id) for id in BLUE_CORP_IDS]
|
|
||||||
STR_BLUE_ALLIANCE_IDS = [str(id) for id in BLUE_ALLIANCE_IDS]
|
|
||||||
|
|
||||||
# Conditionally add periodic tasks for services if installed
|
|
||||||
if 'services.modules.teamspeak3' in INSTALLED_APPS:
|
|
||||||
CELERYBEAT_SCHEDULE['run_ts3_group_update'] = {
|
|
||||||
'task': 'services.modules.teamspeak3.tasks.run_ts3_group_update',
|
|
||||||
'schedule': crontab(minute='*/30'),
|
|
||||||
}
|
|
||||||
|
|
||||||
if 'services.modules.seat' in INSTALLED_APPS:
|
|
||||||
CELERYBEAT_SCHEDULE['run_seat_api_sync'] = {
|
|
||||||
'task': 'services.modules.seat.tasks.run_api_sync',
|
|
||||||
'schedule': crontab(minute='*/30'),
|
|
||||||
}
|
|
@ -1,98 +0,0 @@
|
|||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db.models.signals import m2m_changed, pre_save
|
|
||||||
from django.contrib.auth.models import User, Group, Permission
|
|
||||||
|
|
||||||
from services.signals import m2m_changed_user_groups, pre_save_user
|
|
||||||
from services.signals import m2m_changed_group_permissions, m2m_changed_user_permissions
|
|
||||||
from authentication.signals import pre_save_auth_state
|
|
||||||
|
|
||||||
from authentication.tasks import make_member, make_blue
|
|
||||||
from authentication.models import AuthServicesInfo
|
|
||||||
from authentication.states import MEMBER_STATE, BLUE_STATE, NONE_STATE
|
|
||||||
|
|
||||||
from eveonline.models import EveCharacter
|
|
||||||
|
|
||||||
|
|
||||||
class AuthUtils:
|
|
||||||
def __init__(self):
|
|
||||||
pass
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def _create_user(username):
|
|
||||||
return User.objects.create(username=username)
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def create_user(cls, username, disconnect_signals=False):
|
|
||||||
if disconnect_signals:
|
|
||||||
cls.disconnect_signals()
|
|
||||||
user = cls._create_user(username)
|
|
||||||
user.authservicesinfo.state = NONE_STATE
|
|
||||||
user.authservicesinfo.save()
|
|
||||||
if disconnect_signals:
|
|
||||||
cls.connect_signals()
|
|
||||||
return user
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def create_member(cls, username):
|
|
||||||
cls.disconnect_signals()
|
|
||||||
user = cls._create_user(username)
|
|
||||||
user.authservicesinfo.state = MEMBER_STATE
|
|
||||||
user.authservicesinfo.save()
|
|
||||||
make_member(user.authservicesinfo)
|
|
||||||
cls.connect_signals()
|
|
||||||
return user
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def create_blue(cls, username):
|
|
||||||
cls.disconnect_signals()
|
|
||||||
user = cls._create_user(username)
|
|
||||||
user.authservicesinfo.state = BLUE_STATE
|
|
||||||
user.authservicesinfo.save()
|
|
||||||
make_blue(user.authservicesinfo)
|
|
||||||
cls.connect_signals()
|
|
||||||
return user
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def disconnect_signals(cls):
|
|
||||||
m2m_changed.disconnect(m2m_changed_user_groups, sender=User.groups.through)
|
|
||||||
m2m_changed.disconnect(m2m_changed_group_permissions, sender=Group.permissions.through)
|
|
||||||
m2m_changed.disconnect(m2m_changed_user_permissions, sender=User.user_permissions.through)
|
|
||||||
pre_save.disconnect(pre_save_user, sender=User)
|
|
||||||
pre_save.disconnect(pre_save_auth_state, sender=AuthServicesInfo)
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def connect_signals(cls):
|
|
||||||
m2m_changed.connect(m2m_changed_user_groups, sender=User.groups.through)
|
|
||||||
m2m_changed.connect(m2m_changed_group_permissions, sender=Group.permissions.through)
|
|
||||||
m2m_changed.connect(m2m_changed_user_permissions, sender=User.user_permissions.through)
|
|
||||||
pre_save.connect(pre_save_user, sender=User)
|
|
||||||
pre_save.connect(pre_save_auth_state, sender=AuthServicesInfo)
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def add_main_character(cls, user, name, character_id, corp_id='', corp_name='', corp_ticker='', alliance_id='',
|
|
||||||
alliance_name=''):
|
|
||||||
EveCharacter.objects.create(
|
|
||||||
character_id=character_id,
|
|
||||||
character_name=name,
|
|
||||||
corporation_id=corp_id,
|
|
||||||
corporation_name=corp_name,
|
|
||||||
corporation_ticker=corp_ticker,
|
|
||||||
alliance_id=alliance_id,
|
|
||||||
alliance_name=alliance_name,
|
|
||||||
api_id='1234',
|
|
||||||
user=user
|
|
||||||
)
|
|
||||||
AuthServicesInfo.objects.update_or_create(user=user, defaults={'main_char_id': character_id})
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def add_permissions_to_groups(cls, perms, groups, disconnect_signals=True):
|
|
||||||
if disconnect_signals:
|
|
||||||
cls.disconnect_signals()
|
|
||||||
|
|
||||||
for group in groups:
|
|
||||||
for perm in perms:
|
|
||||||
group.permissions.add(perm)
|
|
||||||
|
|
||||||
if disconnect_signals:
|
|
||||||
cls.connect_signals()
|
|
@ -1,556 +0,0 @@
|
|||||||
"""
|
|
||||||
Alliance Auth Test Suite Django settings.
|
|
||||||
"""
|
|
||||||
|
|
||||||
import os
|
|
||||||
|
|
||||||
from django.contrib import messages
|
|
||||||
|
|
||||||
import alliance_auth
|
|
||||||
|
|
||||||
# Use nose to run all tests
|
|
||||||
TEST_RUNNER = 'django_nose.NoseTestSuiteRunner'
|
|
||||||
|
|
||||||
NOSE_ARGS = [
|
|
||||||
#'--with-coverage',
|
|
||||||
#'--cover-package=',
|
|
||||||
#'--exe', # If your tests need this to be found/run, check they py files are not chmodded +x
|
|
||||||
]
|
|
||||||
|
|
||||||
# Celery configuration
|
|
||||||
CELERY_ALWAYS_EAGER = True # Forces celery to run locally for testing
|
|
||||||
|
|
||||||
# Build paths inside the project like this: os.path.join(BASE_DIR, ...)
|
|
||||||
BASE_DIR = os.path.dirname(os.path.dirname(os.path.abspath(alliance_auth.__file__)))
|
|
||||||
|
|
||||||
SECRET_KEY = 'testing only'
|
|
||||||
|
|
||||||
DEBUG = True
|
|
||||||
|
|
||||||
# Application definition
|
|
||||||
|
|
||||||
INSTALLED_APPS = [
|
|
||||||
'django.contrib.admin',
|
|
||||||
'django.contrib.auth',
|
|
||||||
'django.contrib.contenttypes',
|
|
||||||
'django.contrib.sessions',
|
|
||||||
'django.contrib.messages',
|
|
||||||
'django.contrib.staticfiles',
|
|
||||||
'django.contrib.humanize',
|
|
||||||
'django_celery_beat',
|
|
||||||
'bootstrapform',
|
|
||||||
'authentication',
|
|
||||||
'services',
|
|
||||||
'eveonline',
|
|
||||||
'groupmanagement',
|
|
||||||
'hrapplications',
|
|
||||||
'timerboard',
|
|
||||||
'srp',
|
|
||||||
'optimer',
|
|
||||||
'corputils',
|
|
||||||
'fleetactivitytracking',
|
|
||||||
'fleetup',
|
|
||||||
'notifications',
|
|
||||||
'esi',
|
|
||||||
'permissions_tool',
|
|
||||||
'geelweb.django.navhelper',
|
|
||||||
'bootstrap_pagination',
|
|
||||||
'services.modules.mumble',
|
|
||||||
'services.modules.discord',
|
|
||||||
'services.modules.discourse',
|
|
||||||
'services.modules.ipboard',
|
|
||||||
'services.modules.ips4',
|
|
||||||
'services.modules.market',
|
|
||||||
'services.modules.openfire',
|
|
||||||
'services.modules.seat',
|
|
||||||
'services.modules.smf',
|
|
||||||
'services.modules.phpbb3',
|
|
||||||
'services.modules.xenforo',
|
|
||||||
'services.modules.teamspeak3',
|
|
||||||
'django_nose',
|
|
||||||
]
|
|
||||||
|
|
||||||
MIDDLEWARE = [
|
|
||||||
'django.middleware.security.SecurityMiddleware',
|
|
||||||
'django.contrib.sessions.middleware.SessionMiddleware',
|
|
||||||
'django.middleware.common.CommonMiddleware',
|
|
||||||
'django.middleware.csrf.CsrfViewMiddleware',
|
|
||||||
'django.contrib.auth.middleware.AuthenticationMiddleware',
|
|
||||||
'django.contrib.messages.middleware.MessageMiddleware',
|
|
||||||
'django.middleware.clickjacking.XFrameOptionsMiddleware',
|
|
||||||
'django.middleware.locale.LocaleMiddleware',
|
|
||||||
]
|
|
||||||
|
|
||||||
ROOT_URLCONF = 'alliance_auth.urls'
|
|
||||||
|
|
||||||
LOCALE_PATHS = (
|
|
||||||
os.path.join(BASE_DIR, 'locale/'),
|
|
||||||
)
|
|
||||||
|
|
||||||
ugettext = lambda s: s
|
|
||||||
LANGUAGES = (
|
|
||||||
('en', ugettext('English')),
|
|
||||||
('de', ugettext('German')),
|
|
||||||
)
|
|
||||||
|
|
||||||
TEMPLATES = [
|
|
||||||
{
|
|
||||||
'BACKEND': 'django.template.backends.django.DjangoTemplates',
|
|
||||||
'DIRS': [
|
|
||||||
os.path.join(BASE_DIR, 'customization/templates'),
|
|
||||||
os.path.join(BASE_DIR, 'stock/templates'),
|
|
||||||
],
|
|
||||||
'APP_DIRS': True,
|
|
||||||
'OPTIONS': {
|
|
||||||
'context_processors': [
|
|
||||||
'django.template.context_processors.debug',
|
|
||||||
'django.template.context_processors.request',
|
|
||||||
'django.contrib.auth.context_processors.auth',
|
|
||||||
'django.contrib.messages.context_processors.messages',
|
|
||||||
'django.template.context_processors.i18n',
|
|
||||||
'django.template.context_processors.media',
|
|
||||||
'django.template.context_processors.static',
|
|
||||||
'django.template.context_processors.tz',
|
|
||||||
'services.context_processors.auth_settings',
|
|
||||||
'notifications.context_processors.user_notification_count',
|
|
||||||
'authentication.context_processors.states',
|
|
||||||
'authentication.context_processors.membership_state',
|
|
||||||
'groupmanagement.context_processors.can_manage_groups',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
]
|
|
||||||
|
|
||||||
# Database
|
|
||||||
# https://docs.djangoproject.com/en/1.10/ref/settings/#databases
|
|
||||||
|
|
||||||
DATABASES = {
|
|
||||||
'default': {
|
|
||||||
'ENGINE': 'django.db.backends.sqlite3',
|
|
||||||
'NAME': 'alliance_auth',
|
|
||||||
'USER': os.environ.get('AA_DB_DEFAULT_USER', None),
|
|
||||||
'PASSWORD': os.environ.get('AA_DB_DEFAULT_PASSWORD', None),
|
|
||||||
'HOST': os.environ.get('AA_DB_DEFAULT_HOST', None)
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
LOGIN_URL = 'auth_login_user'
|
|
||||||
|
|
||||||
SUPERUSER_STATE_BYPASS = 'True' == os.environ.get('AA_SUPERUSER_STATE_BYPASS', 'True')
|
|
||||||
|
|
||||||
# Internationalization
|
|
||||||
# https://docs.djangoproject.com/en/1.10/topics/i18n/
|
|
||||||
|
|
||||||
LANGUAGE_CODE = os.environ.get('AA_LANGUAGE_CODE', 'en')
|
|
||||||
|
|
||||||
TIME_ZONE = os.environ.get('AA_TIME_ZONE', 'UTC')
|
|
||||||
|
|
||||||
USE_I18N = True
|
|
||||||
|
|
||||||
USE_L10N = True
|
|
||||||
|
|
||||||
USE_TZ = True
|
|
||||||
|
|
||||||
|
|
||||||
# Static files (CSS, JavaScript, Images)
|
|
||||||
|
|
||||||
STATIC_URL = '/static/'
|
|
||||||
STATIC_ROOT = os.path.join(BASE_DIR, "static")
|
|
||||||
STATICFILES_DIRS = (
|
|
||||||
os.path.join(BASE_DIR, "customization/static"),
|
|
||||||
os.path.join(BASE_DIR, "stock/static"),
|
|
||||||
)
|
|
||||||
|
|
||||||
# Bootstrap messaging css workaround
|
|
||||||
MESSAGE_TAGS = {
|
|
||||||
messages.ERROR: 'danger'
|
|
||||||
}
|
|
||||||
|
|
||||||
CACHES = {
|
|
||||||
'default': {
|
|
||||||
'BACKEND': 'django.core.cache.backends.dummy.DummyCache',
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#####################################################
|
|
||||||
##
|
|
||||||
## Auth configuration starts here
|
|
||||||
##
|
|
||||||
#####################################################
|
|
||||||
|
|
||||||
###########################
|
|
||||||
# ALLIANCE / CORP TOGGLE
|
|
||||||
###########################
|
|
||||||
# Specifies to run membership checks against corp or alliance
|
|
||||||
# Set to FALSE for alliance
|
|
||||||
# Set to TRUE for corp
|
|
||||||
###########################
|
|
||||||
IS_CORP = 'True' == os.environ.get('AA_IS_CORP', 'True')
|
|
||||||
|
|
||||||
#################
|
|
||||||
# EMAIL SETTINGS
|
|
||||||
#################
|
|
||||||
# DOMAIN - The alliance auth domain_url
|
|
||||||
# EMAIL_HOST - SMTP Server URL
|
|
||||||
# EMAIL_PORT - SMTP Server PORT
|
|
||||||
# EMAIL_HOST_USER - Email Username (for gmail, the entire address)
|
|
||||||
# EMAIL_HOST_PASSWORD - Email Password
|
|
||||||
# EMAIL_USE_TLS - Set to use TLS encryption
|
|
||||||
#################
|
|
||||||
DOMAIN = os.environ.get('AA_DOMAIN', 'https://example.com')
|
|
||||||
EMAIL_HOST = os.environ.get('AA_EMAIL_HOST', 'smtp.example.com')
|
|
||||||
EMAIL_PORT = int(os.environ.get('AA_EMAIL_PORT', '587'))
|
|
||||||
EMAIL_HOST_USER = os.environ.get('AA_EMAIL_HOST_USER', '')
|
|
||||||
EMAIL_HOST_PASSWORD = os.environ.get('AA_EMAIL_HOST_PASSWORD', '')
|
|
||||||
EMAIL_USE_TLS = 'True' == os.environ.get('AA_EMAIL_USE_TLS', 'True')
|
|
||||||
|
|
||||||
####################
|
|
||||||
# Front Page Links
|
|
||||||
####################
|
|
||||||
# KILLBOARD_URL - URL for your killboard. Blank to hide link
|
|
||||||
# MEDIA_URL - URL for your media page (youtube etc). Blank to hide link
|
|
||||||
# FORUM_URL - URL for your forums. Blank to hide link
|
|
||||||
# SITE_NAME - Name of the auth site.
|
|
||||||
####################
|
|
||||||
KILLBOARD_URL = os.environ.get('AA_KILLBOARD_URL', '')
|
|
||||||
EXTERNAL_MEDIA_URL = os.environ.get('AA_EXTERNAL_MEDIA_URL', '')
|
|
||||||
FORUM_URL = os.environ.get('AA_FORUM_URL', '')
|
|
||||||
SITE_NAME = os.environ.get('AA_SITE_NAME', 'Test Alliance Auth')
|
|
||||||
|
|
||||||
###################
|
|
||||||
# SSO Settings
|
|
||||||
###################
|
|
||||||
# Optional SSO.
|
|
||||||
# Get client ID and client secret from registering an app at
|
|
||||||
# https://developers.eveonline.com/
|
|
||||||
# Callback URL should be http://mydomain.com/sso/callback
|
|
||||||
# Leave callback blank to hide SSO button on login page
|
|
||||||
###################
|
|
||||||
ESI_SSO_CLIENT_ID = os.environ.get('AA_ESI_SSO_CLIENT_ID', '')
|
|
||||||
ESI_SSO_CLIENT_SECRET = os.environ.get('AA_ESI_SSO_CLIENT_SECRET', '')
|
|
||||||
ESI_SSO_CALLBACK_URL = os.environ.get('AA_ESI_SSO_CALLBACK_URL', '')
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Default Group Settings
|
|
||||||
#########################
|
|
||||||
# DEFAULT_AUTH_GROUP - Default group members are put in
|
|
||||||
# DEFAULT_BLUE_GROUP - Default group for blue members
|
|
||||||
# MEMBER_CORP_GROUPS - Assign members to a group representing their main corp
|
|
||||||
# BLUE_CORP_GROUPS - Assign blues to a group representing their main corp
|
|
||||||
#########################
|
|
||||||
DEFAULT_AUTH_GROUP = os.environ.get('AA_DEFAULT_ALLIANCE_GROUP', 'Member')
|
|
||||||
DEFAULT_BLUE_GROUP = os.environ.get('AA_DEFAULT_BLUE_GROUP', 'Blue')
|
|
||||||
MEMBER_CORP_GROUPS = 'True' == os.environ.get('AA_MEMBER_CORP_GROUPS', 'True')
|
|
||||||
MEMBER_ALLIANCE_GROUPS = 'True' == os.environ.get('AA_MEMBER_ALLIANCE_GROUPS', 'False')
|
|
||||||
BLUE_CORP_GROUPS = 'True' == os.environ.get('AA_BLUE_CORP_GROUPS', 'False')
|
|
||||||
BLUE_ALLIANCE_GROUPS = 'True' == os.environ.get('AA_BLUE_ALLIANCE_GROUPS', 'False')
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Corp Configuration
|
|
||||||
#########################
|
|
||||||
# If running in alliance mode, the following should be for the executor corp#
|
|
||||||
# CORP_ID - Set this to your corp ID (get this from https://zkillboard.com/corporation/#######)
|
|
||||||
# CORP_NAME - Set this to your Corporation Name
|
|
||||||
# CORP_API_ID - Set this to the api id for the corp API key
|
|
||||||
# CORP_API_VCODE - Set this to the api vcode for the corp API key
|
|
||||||
########################
|
|
||||||
CORP_ID = os.environ.get('AA_CORP_ID', '1234')
|
|
||||||
CORP_NAME = os.environ.get('AA_CORP_NAME', 'Alliance Auth Test Corp')
|
|
||||||
CORP_API_ID = os.environ.get('AA_CORP_API_ID', '')
|
|
||||||
CORP_API_VCODE = os.environ.get('AA_CORP_API_VCODE', '')
|
|
||||||
|
|
||||||
#########################
|
|
||||||
# Alliance Configuration
|
|
||||||
#########################
|
|
||||||
# ALLIANCE_ID - Set this to your Alliance ID (get this from https://zkillboard.com/alliance/#######)
|
|
||||||
# ALLIANCE_NAME - Set this to your Alliance Name
|
|
||||||
########################
|
|
||||||
ALLIANCE_ID = os.environ.get('AA_ALLIANCE_ID', '12345')
|
|
||||||
ALLIANCE_NAME = os.environ.get('AA_ALLIANCE_NAME', 'Alliance Auth Test Alliance')
|
|
||||||
|
|
||||||
########################
|
|
||||||
# API Configuration
|
|
||||||
########################
|
|
||||||
# MEMBER_API_MASK - Numeric value of minimum API mask required for members
|
|
||||||
# MEMBER_API_ACCOUNT - Require API to be for Account and not character restricted
|
|
||||||
# BLUE_API_MASK - Numeric value of minimum API mask required for blues
|
|
||||||
# BLUE_API_ACCOUNT - Require API to be for Account and not character restricted
|
|
||||||
# REJECT_OLD_APIS - Require each submitted API be newer than the latest submitted API
|
|
||||||
# REJECT_OLD_APIS_MARGIN - Margin from latest submitted API ID within which a newly submitted API is still accepted
|
|
||||||
# API_SSO_VALIDATION - Require users to prove ownership of newly entered API keys via SSO
|
|
||||||
# Requires SSO to be configured.
|
|
||||||
#######################
|
|
||||||
MEMBER_API_MASK = os.environ.get('AA_MEMBER_API_MASK', 268435455)
|
|
||||||
MEMBER_API_ACCOUNT = 'True' == os.environ.get('AA_MEMBER_API_ACCOUNT', 'True')
|
|
||||||
BLUE_API_MASK = os.environ.get('AA_BLUE_API_MASK', 8388608)
|
|
||||||
BLUE_API_ACCOUNT = 'True' == os.environ.get('AA_BLUE_API_ACCOUNT', 'True')
|
|
||||||
REJECT_OLD_APIS = 'True' == os.environ.get('AA_REJECT_OLD_APIS', 'False')
|
|
||||||
REJECT_OLD_APIS_MARGIN = os.environ.get('AA_REJECT_OLD_APIS_MARGIN', 50)
|
|
||||||
API_SSO_VALIDATION = 'True' == os.environ.get('AA_API_SSO_VALIDATION', 'False')
|
|
||||||
|
|
||||||
#######################
|
|
||||||
# EVE Provider Settings
|
|
||||||
#######################
|
|
||||||
# EVEONLINE_CHARACTER_PROVIDER - Name of default data source for getting eve character data
|
|
||||||
# EVEONLINE_CORP_PROVIDER - Name of default data source for getting eve corporation data
|
|
||||||
# EVEONLINE_ALLIANCE_PROVIDER - Name of default data source for getting eve alliance data
|
|
||||||
# EVEONLINE_ITEMTYPE_PROVIDER - Name of default data source for getting eve item type data
|
|
||||||
#
|
|
||||||
# Available sources are 'esi' and 'xml'. Leaving blank results in the default 'esi' being used.
|
|
||||||
#######################
|
|
||||||
EVEONLINE_CHARACTER_PROVIDER = os.environ.get('AA_EVEONLINE_CHARACTER_PROVIDER', 'xml')
|
|
||||||
EVEONLINE_CORP_PROVIDER = os.environ.get('AA_EVEONLINE_CORP_PROVIDER', 'xml')
|
|
||||||
EVEONLINE_ALLIANCE_PROVIDER = os.environ.get('AA_EVEONLINE_ALLIANCE_PROVIDER', 'xml')
|
|
||||||
EVEONLINE_ITEMTYPE_PROVIDER = os.environ.get('AA_EVEONLINE_ITEMTYPE_PROVIDER', 'xml')
|
|
||||||
|
|
||||||
#####################
|
|
||||||
# Alliance Market
|
|
||||||
#####################
|
|
||||||
MARKET_URL = os.environ.get('AA_MARKET_URL', 'http://yourdomain.com/market')
|
|
||||||
|
|
||||||
#####################
|
|
||||||
# HR Configuration
|
|
||||||
#####################
|
|
||||||
# JACK_KNIFE_URL - Url for the audit page of API Jack knife
|
|
||||||
# Should seriously replace with your own.
|
|
||||||
#####################
|
|
||||||
JACK_KNIFE_URL = os.environ.get('AA_JACK_KNIFE_URL', 'http://example.com/eveapi/audit.php')
|
|
||||||
|
|
||||||
#####################
|
|
||||||
# Forum Configuration
|
|
||||||
#####################
|
|
||||||
# IPBOARD_ENDPOINT - Api endpoint if using ipboard
|
|
||||||
# IPBOARD_APIKEY - Api key to interact with ipboard
|
|
||||||
# IPBOARD_APIMODULE - Module for alliance auth *leave alone*
|
|
||||||
#####################
|
|
||||||
IPBOARD_ENDPOINT = os.environ.get('AA_IPBOARD_ENDPOINT', 'example.com/interface/board/index.php')
|
|
||||||
IPBOARD_APIKEY = os.environ.get('AA_IPBOARD_APIKEY', 'somekeyhere')
|
|
||||||
IPBOARD_APIMODULE = 'aa'
|
|
||||||
|
|
||||||
########################
|
|
||||||
# XenForo Configuration
|
|
||||||
########################
|
|
||||||
XENFORO_ENDPOINT = os.environ.get('AA_XENFORO_ENDPOINT', 'example.com/api.php')
|
|
||||||
XENFORO_DEFAULT_GROUP = os.environ.get('AA_XENFORO_DEFAULT_GROUP', 0)
|
|
||||||
XENFORO_APIKEY = os.environ.get('AA_XENFORO_APIKEY', 'yourapikey')
|
|
||||||
#####################
|
|
||||||
|
|
||||||
######################
|
|
||||||
# Jabber Configuration
|
|
||||||
######################
|
|
||||||
# JABBER_URL - Jabber address url
|
|
||||||
# JABBER_PORT - Jabber service portal
|
|
||||||
# JABBER_SERVER - Jabber server url
|
|
||||||
# OPENFIRE_ADDRESS - Address of the openfire admin console including port
|
|
||||||
# Please use http with 9090 or https with 9091
|
|
||||||
# OPENFIRE_SECRET_KEY - Openfire REST API secret key
|
|
||||||
# BROADCAST_USER - Broadcast user JID
|
|
||||||
# BROADCAST_USER_PASSWORD - Broadcast user password
|
|
||||||
######################
|
|
||||||
JABBER_URL = os.environ.get('AA_JABBER_URL', "example.com")
|
|
||||||
JABBER_PORT = int(os.environ.get('AA_JABBER_PORT', '5223'))
|
|
||||||
JABBER_SERVER = os.environ.get('AA_JABBER_SERVER', "example.com")
|
|
||||||
OPENFIRE_ADDRESS = os.environ.get('AA_OPENFIRE_ADDRESS', "http://example.com:9090")
|
|
||||||
OPENFIRE_SECRET_KEY = os.environ.get('AA_OPENFIRE_SECRET_KEY', "somekey")
|
|
||||||
BROADCAST_USER = os.environ.get('AA_BROADCAST_USER', "broadcast@") + JABBER_URL
|
|
||||||
BROADCAST_USER_PASSWORD = os.environ.get('AA_BROADCAST_USER_PASSWORD', "somepassword")
|
|
||||||
BROADCAST_SERVICE_NAME = os.environ.get('AA_BROADCAST_SERVICE_NAME', "broadcast")
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Mumble Configuration
|
|
||||||
######################################
|
|
||||||
# MUMBLE_URL - Mumble server url
|
|
||||||
# MUMBLE_SERVER_ID - Mumble server id
|
|
||||||
######################################
|
|
||||||
MUMBLE_URL = os.environ.get('AA_MUMBLE_URL', "example.com")
|
|
||||||
MUMBLE_SERVER_ID = int(os.environ.get('AA_MUMBLE_SERVER_ID', '1'))
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# PHPBB3 Configuration
|
|
||||||
######################################
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Teamspeak3 Configuration
|
|
||||||
######################################
|
|
||||||
# TEAMSPEAK3_SERVER_IP - Teamspeak3 server ip
|
|
||||||
# TEAMSPEAK3_SERVER_PORT - Teamspeak3 server port
|
|
||||||
# TEAMSPEAK3_SERVERQUERY_USER - Teamspeak3 serverquery username
|
|
||||||
# TEAMSPEAK3_SERVERQUERY_PASSWORD - Teamspeak3 serverquery password
|
|
||||||
# TEAMSPEAK3_VIRTUAL_SERVER - Virtual server id
|
|
||||||
# TEAMSPEAK3_AUTHED_GROUP_ID - Default authed group id
|
|
||||||
# TEAMSPEAK3_PUBLIC_URL - teamspeak3 public url used for link creation
|
|
||||||
######################################
|
|
||||||
TEAMSPEAK3_SERVER_IP = os.environ.get('AA_TEAMSPEAK3_SERVER_IP', '127.0.0.1')
|
|
||||||
TEAMSPEAK3_SERVER_PORT = int(os.environ.get('AA_TEAMSPEAK3_SERVER_PORT', '10011'))
|
|
||||||
TEAMSPEAK3_SERVERQUERY_USER = os.environ.get('AA_TEAMSPEAK3_SERVERQUERY_USER', 'serveradmin')
|
|
||||||
TEAMSPEAK3_SERVERQUERY_PASSWORD = os.environ.get('AA_TEAMSPEAK3_SERVERQUERY_PASSWORD', 'passwordhere')
|
|
||||||
TEAMSPEAK3_VIRTUAL_SERVER = int(os.environ.get('AA_TEAMSPEAK3_VIRTUAL_SERVER', '1'))
|
|
||||||
TEAMSPEAK3_PUBLIC_URL = os.environ.get('AA_TEAMSPEAK3_PUBLIC_URL', 'example.com')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Discord Configuration
|
|
||||||
######################################
|
|
||||||
# DISCORD_GUILD_ID - ID of the guild to manage
|
|
||||||
# DISCORD_BOT_TOKEN - oauth token of the app bot user
|
|
||||||
# DISCORD_INVITE_CODE - invite code to the server
|
|
||||||
# DISCORD_APP_ID - oauth app client ID
|
|
||||||
# DISCORD_APP_SECRET - oauth app secret
|
|
||||||
# DISCORD_CALLBACK_URL - oauth callback url
|
|
||||||
# DISCORD_SYNC_NAMES - enable to force discord nicknames to be set to eve char name (bot needs Manage Nicknames permission)
|
|
||||||
######################################
|
|
||||||
DISCORD_GUILD_ID = os.environ.get('AA_DISCORD_GUILD_ID', '0118999')
|
|
||||||
DISCORD_BOT_TOKEN = os.environ.get('AA_DISCORD_BOT_TOKEN', 'bottoken')
|
|
||||||
DISCORD_INVITE_CODE = os.environ.get('AA_DISCORD_INVITE_CODE', 'invitecode')
|
|
||||||
DISCORD_APP_ID = os.environ.get('AA_DISCORD_APP_ID', 'appid')
|
|
||||||
DISCORD_APP_SECRET = os.environ.get('AA_DISCORD_APP_SECRET', 'secret')
|
|
||||||
DISCORD_CALLBACK_URL = os.environ.get('AA_DISCORD_CALLBACK_URL', 'http://example.com/discord/callback')
|
|
||||||
DISCORD_SYNC_NAMES = 'True' == os.environ.get('AA_DISCORD_SYNC_NAMES', 'False')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Discourse Configuration
|
|
||||||
######################################
|
|
||||||
# DISCOURSE_URL - Web address of the forums (no trailing slash)
|
|
||||||
# DISCOURSE_API_USERNAME - API account username
|
|
||||||
# DISCOURSE_API_KEY - API Key
|
|
||||||
# DISCOURSE_SSO_SECRET - SSO secret key
|
|
||||||
######################################
|
|
||||||
DISCOURSE_URL = os.environ.get('AA_DISCOURSE_URL', 'https://example.com')
|
|
||||||
DISCOURSE_API_USERNAME = os.environ.get('AA_DISCOURSE_API_USERNAME', '')
|
|
||||||
DISCOURSE_API_KEY = os.environ.get('AA_DISCOURSE_API_KEY', '')
|
|
||||||
DISCOURSE_SSO_SECRET = 'd836444a9e4084d5b224a60c208dce14'
|
|
||||||
# Example secret from https://meta.discourse.org/t/official-single-sign-on-for-discourse/13045
|
|
||||||
|
|
||||||
#####################################
|
|
||||||
# IPS4 Configuration
|
|
||||||
#####################################
|
|
||||||
# IPS4_URL - base url of the IPS4 install (no trailing slash)
|
|
||||||
# IPS4_API_KEY - API key provided by IPS4
|
|
||||||
#####################################
|
|
||||||
IPS4_URL = os.environ.get('AA_IPS4_URL', 'http://example.com/ips4')
|
|
||||||
IPS4_API_KEY = os.environ.get('AA_IPS4_API_KEY', '')
|
|
||||||
|
|
||||||
#####################################
|
|
||||||
# SEAT Configuration
|
|
||||||
#####################################
|
|
||||||
# SEAT_URL - base url of the seat install (no trailing slash)
|
|
||||||
# SEAT_XTOKEN - API key X-Token provided by SeAT
|
|
||||||
#####################################
|
|
||||||
SEAT_URL = os.environ.get('AA_SEAT_URL', 'http://example.com/seat')
|
|
||||||
SEAT_XTOKEN = os.environ.get('AA_SEAT_XTOKEN', 'tokentokentoken')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# SMF Configuration
|
|
||||||
######################################
|
|
||||||
SMF_URL = os.environ.get('AA_SMF_URL', '')
|
|
||||||
|
|
||||||
######################################
|
|
||||||
# Fleet-Up Configuration
|
|
||||||
######################################
|
|
||||||
# FLEETUP_APP_KEY - The app key from http://fleet-up.com/Api/MyApps
|
|
||||||
# FLEETUP_USER_ID - The user id from http://fleet-up.com/Api/MyKeys
|
|
||||||
# FLEETUP_API_ID - The API id from http://fleet-up.com/Api/MyKeys
|
|
||||||
# FLEETUP_GROUP_ID - The id of the group you want to pull data from, see http://fleet-up.com/Api/Endpoints#groups_mygroupmemberships
|
|
||||||
######################################
|
|
||||||
FLEETUP_APP_KEY = os.environ.get('AA_FLEETUP_APP_KEY', '')
|
|
||||||
FLEETUP_USER_ID = os.environ.get('AA_FLEETUP_USER_ID', '')
|
|
||||||
FLEETUP_API_ID = os.environ.get('AA_FLEETUP_API_ID', '')
|
|
||||||
FLEETUP_GROUP_ID = os.environ.get('AA_FLEETUP_GROUP_ID', '')
|
|
||||||
|
|
||||||
PASSWORD_HASHERS = [
|
|
||||||
'django.contrib.auth.hashers.MD5PasswordHasher',
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
LOGGING = {
|
|
||||||
'version': 1,
|
|
||||||
'disable_existing_loggers': False,
|
|
||||||
'formatters': {
|
|
||||||
'verbose': {
|
|
||||||
'format' : "[%(asctime)s] %(levelname)s [%(name)s:%(lineno)s] %(message)s",
|
|
||||||
'datefmt' : "%d/%b/%Y %H:%M:%S"
|
|
||||||
},
|
|
||||||
'simple': {
|
|
||||||
'format': '%(levelname)s %(message)s'
|
|
||||||
},
|
|
||||||
},
|
|
||||||
'handlers': {
|
|
||||||
'console': {
|
|
||||||
'level': 'DEBUG', # edit this line to change logging level to console
|
|
||||||
'class': 'logging.StreamHandler',
|
|
||||||
'formatter': 'verbose',
|
|
||||||
},
|
|
||||||
'notifications': { # creates notifications for users with logging_notifications permission
|
|
||||||
'level': 'ERROR', # edit this line to change logging level to notifications
|
|
||||||
'class': 'notifications.handlers.NotificationHandler',
|
|
||||||
'formatter': 'verbose',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
'loggers': {
|
|
||||||
'authentication': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'celerytask': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'eveonline': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'groupmanagement': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'hrapplications': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'portal': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'registration': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'services': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'srp': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'timerboard': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'sigtracker': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'optimer': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'corputils': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'fleetactivitytracking': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'ERROR',
|
|
||||||
},
|
|
||||||
'util': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'DEBUG',
|
|
||||||
},
|
|
||||||
'django': {
|
|
||||||
'handlers': ['console', 'notifications'],
|
|
||||||
'level': 'ERROR',
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
LOGGING = None # Comment out to enable logging for debugging
|
|
@ -1,222 +0,0 @@
|
|||||||
from django.conf.urls import include, url
|
|
||||||
|
|
||||||
from django.conf.urls.i18n import i18n_patterns
|
|
||||||
from django.utils.translation import ugettext_lazy as _
|
|
||||||
from django.contrib import admin
|
|
||||||
import django.contrib.auth.views
|
|
||||||
import authentication.views
|
|
||||||
import eveonline.views
|
|
||||||
import services.views
|
|
||||||
import groupmanagement.views
|
|
||||||
import optimer.views
|
|
||||||
import timerboard.views
|
|
||||||
import fleetactivitytracking.views
|
|
||||||
import fleetup.urls
|
|
||||||
import srp.views
|
|
||||||
import notifications.views
|
|
||||||
import hrapplications.views
|
|
||||||
import corputils.urls
|
|
||||||
import esi.urls
|
|
||||||
import permissions_tool.urls
|
|
||||||
from alliance_auth import NAME
|
|
||||||
|
|
||||||
admin.site.site_header = NAME
|
|
||||||
|
|
||||||
from alliance_auth.hooks import get_hooks
|
|
||||||
|
|
||||||
# Functional/Untranslated URL's
|
|
||||||
urlpatterns = [
|
|
||||||
# Locale
|
|
||||||
url(r'^i18n/', include('django.conf.urls.i18n')),
|
|
||||||
|
|
||||||
# Admin urls
|
|
||||||
url(r'^admin/', include(admin.site.urls)),
|
|
||||||
|
|
||||||
# SSO
|
|
||||||
url(r'^sso/', include(esi.urls, namespace='esi')),
|
|
||||||
url(r'^sso/login$', authentication.views.sso_login, name='auth_sso_login'),
|
|
||||||
|
|
||||||
# Index
|
|
||||||
url(_(r'^$'), authentication.views.index_view, name='auth_index'),
|
|
||||||
|
|
||||||
# Authentication
|
|
||||||
url(r'^logout_user/', authentication.views.logout_user, name='auth_logout_user'),
|
|
||||||
|
|
||||||
# Eve Online
|
|
||||||
url(r'^main_character_change/(\w+)/$', eveonline.views.main_character_change,
|
|
||||||
name='auth_main_character_change'),
|
|
||||||
url(r'^api_verify_owner/(\w+)/$', eveonline.views.api_sso_validate, name='auth_api_sso'),
|
|
||||||
|
|
||||||
# SRP URLS
|
|
||||||
url(r'^srp_fleet_remove/(\w+)$', srp.views.srp_fleet_remove, name='auth_srp_fleet_remove'),
|
|
||||||
url(r'^srp_fleet_disable/(\w+)$', srp.views.srp_fleet_disable, name='auth_srp_fleet_disable'),
|
|
||||||
url(r'^srp_fleet_enable/(\w+)$', srp.views.srp_fleet_enable, name='auth_srp_fleet_enable'),
|
|
||||||
url(r'^srp_fleet_mark_completed/(\w+)', srp.views.srp_fleet_mark_completed,
|
|
||||||
name='auth_srp_fleet_mark_completed'),
|
|
||||||
url(r'^srp_fleet_mark_uncompleted/(\w+)', srp.views.srp_fleet_mark_uncompleted,
|
|
||||||
name='auth_srp_fleet_mark_uncompleted'),
|
|
||||||
url(r'^srp_request_remove/', srp.views.srp_request_remove,
|
|
||||||
name="auth_srp_request_remove"),
|
|
||||||
url(r'srp_request_approve/', srp.views.srp_request_approve,
|
|
||||||
name='auth_srp_request_approve'),
|
|
||||||
url(r'srp_request_reject/', srp.views.srp_request_reject,
|
|
||||||
name='auth_srp_request_reject'),
|
|
||||||
url(_(r'srp_request_amount_update/(\w+)'), srp.views.srp_request_update_amount,
|
|
||||||
name="auth_srp_request_update_amount"),
|
|
||||||
|
|
||||||
# Notifications
|
|
||||||
url(r'^remove_notifications/(\w+)/$', notifications.views.remove_notification, name='auth_remove_notification'),
|
|
||||||
url(r'^notifications/mark_all_read/$', notifications.views.mark_all_read, name='auth_mark_all_notifications_read'),
|
|
||||||
url(r'^notifications/delete_all_read/$', notifications.views.delete_all_read,
|
|
||||||
name='auth_delete_all_read_notifications'),
|
|
||||||
]
|
|
||||||
|
|
||||||
# User viewed/translated URLS
|
|
||||||
urlpatterns += i18n_patterns(
|
|
||||||
|
|
||||||
# Fleetup
|
|
||||||
url(r'^fleetup/', include(fleetup.urls.urlpatterns)),
|
|
||||||
|
|
||||||
# Authentication
|
|
||||||
url(_(r'^login_user/'), authentication.views.login_user, name='auth_login_user'),
|
|
||||||
url(_(r'^register_user/'), authentication.views.register_user_view, name='auth_register_user'),
|
|
||||||
|
|
||||||
url(_(r'^user/password/$'), django.contrib.auth.views.password_change, name='password_change'),
|
|
||||||
url(_(r'^user/password/done/$'), django.contrib.auth.views.password_change_done,
|
|
||||||
name='password_change_done'),
|
|
||||||
url(_(r'^user/password/reset/$'), django.contrib.auth.views.password_reset,
|
|
||||||
name='password_reset'),
|
|
||||||
url(_(r'^user/password/password/reset/done/$'), django.contrib.auth.views.password_reset_done,
|
|
||||||
name='password_reset_done'),
|
|
||||||
url(_(r'^user/password/reset/complete/$'), django.contrib.auth.views.password_reset_complete,
|
|
||||||
name='password_reset_complete'),
|
|
||||||
url(_(r'^user/password/reset/confirm/(?P<uidb64>[0-9A-Za-z_\-]+)/(?P<token>.+)/$'),
|
|
||||||
django.contrib.auth.views.password_reset_confirm, name='password_reset_confirm'),
|
|
||||||
|
|
||||||
# Portal Urls
|
|
||||||
url(_(r'^dashboard/$'), eveonline.views.dashboard_view, name='auth_dashboard'),
|
|
||||||
url(_(r'^help/$'), authentication.views.help_view, name='auth_help'),
|
|
||||||
|
|
||||||
# Eveonline Urls
|
|
||||||
url(_(r'^add_api_key/'), eveonline.views.add_api_key, name='auth_add_api_key'),
|
|
||||||
url(_(r'^refresh_api_pair/([0-9]+)/$'), eveonline.views.user_refresh_api, name='auth_user_refresh_api'),
|
|
||||||
url(_(r'^delete_api_pair/(\w+)/$'), eveonline.views.api_key_removal, name='auth_api_key_removal'),
|
|
||||||
url(_(r'^characters/'), eveonline.views.characters_view, name='auth_characters'),
|
|
||||||
|
|
||||||
# Corputils
|
|
||||||
url(_(r'^corpstats/'), include(corputils.urls, namespace='corputils')),
|
|
||||||
|
|
||||||
# Group management
|
|
||||||
url(_(r'^groups/'), groupmanagement.views.groups_view, name='auth_groups'),
|
|
||||||
url(_(r'^group/management/'), groupmanagement.views.group_management,
|
|
||||||
name='auth_group_management'),
|
|
||||||
url(_(r'^group/membership/$'), groupmanagement.views.group_membership,
|
|
||||||
name='auth_group_membership'),
|
|
||||||
url(_(r'^group/membership/(\w+)/$'), groupmanagement.views.group_membership_list,
|
|
||||||
name='auth_group_membership_list'),
|
|
||||||
url(_(r'^group/membership/(\w+)/remove/(\w+)/$'), groupmanagement.views.group_membership_remove,
|
|
||||||
name='auth_group_membership_remove'),
|
|
||||||
url(_(r'^group/request_add/(\w+)'), groupmanagement.views.group_request_add,
|
|
||||||
name='auth_group_request_add'),
|
|
||||||
url(_(r'^group/request/accept/(\w+)'), groupmanagement.views.group_accept_request,
|
|
||||||
name='auth_group_accept_request'),
|
|
||||||
url(_(r'^group/request/reject/(\w+)'), groupmanagement.views.group_reject_request,
|
|
||||||
name='auth_group_reject_request'),
|
|
||||||
|
|
||||||
url(_(r'^group/request_leave/(\w+)'), groupmanagement.views.group_request_leave,
|
|
||||||
name='auth_group_request_leave'),
|
|
||||||
url(_(r'group/leave_request/accept/(\w+)'), groupmanagement.views.group_leave_accept_request,
|
|
||||||
name='auth_group_leave_accept_request'),
|
|
||||||
url(_(r'^group/leave_request/reject/(\w+)'), groupmanagement.views.group_leave_reject_request,
|
|
||||||
name='auth_group_leave_reject_request'),
|
|
||||||
|
|
||||||
# HR Application Management
|
|
||||||
url(_(r'^hr_application_management/'), hrapplications.views.hr_application_management_view,
|
|
||||||
name="auth_hrapplications_view"),
|
|
||||||
url(_(r'^hr_application_create/$'), hrapplications.views.hr_application_create_view,
|
|
||||||
name="auth_hrapplication_create_view"),
|
|
||||||
url(_(r'^hr_application_create/(\d+)'), hrapplications.views.hr_application_create_view,
|
|
||||||
name="auth_hrapplication_create_view"),
|
|
||||||
url(_(r'^hr_application_remove/(\w+)'), hrapplications.views.hr_application_remove,
|
|
||||||
name="auth_hrapplication_remove"),
|
|
||||||
url(_(r'hr_application_view/(\w+)'), hrapplications.views.hr_application_view,
|
|
||||||
name="auth_hrapplication_view"),
|
|
||||||
url(_(r'hr_application_personal_view/(\w+)'), hrapplications.views.hr_application_personal_view,
|
|
||||||
name="auth_hrapplication_personal_view"),
|
|
||||||
url(_(r'hr_application_personal_removal/(\w+)'),
|
|
||||||
hrapplications.views.hr_application_personal_removal,
|
|
||||||
name="auth_hrapplication_personal_removal"),
|
|
||||||
url(_(r'hr_application_approve/(\w+)'), hrapplications.views.hr_application_approve,
|
|
||||||
name="auth_hrapplication_approve"),
|
|
||||||
url(_(r'hr_application_reject/(\w+)'), hrapplications.views.hr_application_reject,
|
|
||||||
name="auth_hrapplication_reject"),
|
|
||||||
url(_(r'hr_application_search/'), hrapplications.views.hr_application_search,
|
|
||||||
name="auth_hrapplication_search"),
|
|
||||||
url(_(r'hr_mark_in_progress/(\w+)'), hrapplications.views.hr_application_mark_in_progress,
|
|
||||||
name="auth_hrapplication_mark_in_progress"),
|
|
||||||
|
|
||||||
# Fleet Operations Timers
|
|
||||||
url(_(r'^optimer/$'), optimer.views.optimer_view, name='auth_optimer_view'),
|
|
||||||
url(_(r'^add_optimer/$'), optimer.views.add_optimer_view, name='auth_add_optimer_view'),
|
|
||||||
url(_(r'^remove_optimer/(\w+)'), optimer.views.remove_optimer, name='auth_remove_optimer'),
|
|
||||||
url(_(r'^edit_optimer/(\w+)$'), optimer.views.edit_optimer, name='auth_edit_optimer'),
|
|
||||||
|
|
||||||
# Service Urls
|
|
||||||
url(_(r'^services/$'), services.views.services_view, name='auth_services'),
|
|
||||||
|
|
||||||
# Timer URLS
|
|
||||||
url(_(r'^timers/$'), timerboard.views.timer_view, name='auth_timer_view'),
|
|
||||||
url(_(r'^add_timer/$'), timerboard.views.add_timer_view, name='auth_add_timer_view'),
|
|
||||||
url(_(r'^remove_timer/(\w+)'), timerboard.views.remove_timer, name='auth_remove_timer'),
|
|
||||||
url(_(r'^edit_timer/(\w+)$'), timerboard.views.edit_timer, name='auth_edit_timer'),
|
|
||||||
|
|
||||||
# SRP URLS
|
|
||||||
url(_(r'^srp/$'), srp.views.srp_management, name='auth_srp_management_view'),
|
|
||||||
url(_(r'^srp_all/$'), srp.views.srp_management_all, name='auth_srp_management_all_view'),
|
|
||||||
url(_(r'^srp_fleet_view/(\w+)$'), srp.views.srp_fleet_view, name='auth_srp_fleet_view'),
|
|
||||||
url(_(r'^srp_fleet_add_view/$'), srp.views.srp_fleet_add_view, name='auth_srp_fleet_add_view'),
|
|
||||||
url(_(r'^srp_fleet_edit/(\w+)$'), srp.views.srp_fleet_edit_view, name='auth_srp_fleet_edit_view'),
|
|
||||||
url(_(r'^srp_request/(\w+)'), srp.views.srp_request_view, name='auth_srp_request_view'),
|
|
||||||
|
|
||||||
# Tools
|
|
||||||
url(_(r'^tool/fleet_formatter_tool/$'), services.views.fleet_formatter_view,
|
|
||||||
name='auth_fleet_format_tool_view'),
|
|
||||||
|
|
||||||
# Notifications
|
|
||||||
url(_(r'^notifications/$'), notifications.views.notification_list, name='auth_notification_list'),
|
|
||||||
url(_(r'^notifications/(\w+)/$'), notifications.views.notification_view, name='auth_notification_view'),
|
|
||||||
|
|
||||||
# FleetActivityTracking (FAT)
|
|
||||||
url(r'^fat/$', fleetactivitytracking.views.fatlink_view, name='auth_fatlink_view'),
|
|
||||||
url(r'^fat/statistics/$', fleetactivitytracking.views.fatlink_statistics_view, name='auth_fatlink_view_statistics'),
|
|
||||||
url(r'^fat/statistics/corp/(\w+)$', fleetactivitytracking.views.fatlink_statistics_corp_view, name='auth_fatlink_view_statistics_corp'),
|
|
||||||
url(r'^fat/statistics/corp/(?P<corpid>\w+)/(?P<year>[0-9]+)/(?P<month>[0-9]+)/', fleetactivitytracking.views.fatlink_statistics_corp_view,
|
|
||||||
name='auth_fatlink_view_statistics_corp_month'),
|
|
||||||
url(r'^fat/statistics/(?P<year>[0-9]+)/(?P<month>[0-9]+)/$', fleetactivitytracking.views.fatlink_statistics_view,
|
|
||||||
name='auth_fatlink_view_statistics_month'),
|
|
||||||
url(r'^fat/user/statistics/$', fleetactivitytracking.views.fatlink_personal_statistics_view,
|
|
||||||
name='auth_fatlink_view_personal_statistics'),
|
|
||||||
url(r'^fat/user/statistics/(?P<year>[0-9]+)/$', fleetactivitytracking.views.fatlink_personal_statistics_view,
|
|
||||||
name='auth_fatlink_view_personal_statistics_year'),
|
|
||||||
url(r'^fat/user/statistics/(?P<year>[0-9]+)/(?P<month>[0-9]+)/$',
|
|
||||||
fleetactivitytracking.views.fatlink_monthly_personal_statistics_view,
|
|
||||||
name='auth_fatlink_view_personal_statistics_month'),
|
|
||||||
url(r'^fat/user/(?P<char_id>[0-9]+)/statistics/(?P<year>[0-9]+)/(?P<month>[0-9]+)/$',
|
|
||||||
fleetactivitytracking.views.fatlink_monthly_personal_statistics_view,
|
|
||||||
name='auth_fatlink_view_user_statistics_month'),
|
|
||||||
url(r'^fat/create/$', fleetactivitytracking.views.create_fatlink_view, name='auth_create_fatlink_view'),
|
|
||||||
url(r'^fat/modify/$', fleetactivitytracking.views.modify_fatlink_view, name='auth_modify_fatlink_view'),
|
|
||||||
url(r'^fat/modify/(?P<hash>[a-zA-Z0-9_-]+)/([a-z0-9_-]+)$',
|
|
||||||
fleetactivitytracking.views.modify_fatlink_view),
|
|
||||||
url(r'^fat/link/$', fleetactivitytracking.views.fatlink_view, name='auth_click_fatlink_view'),
|
|
||||||
url(r'^fat/link/(?P<hash>[a-zA-Z0-9]+)/(?P<fatname>[a-z0-9_-]+)/$',
|
|
||||||
fleetactivitytracking.views.click_fatlink_view),
|
|
||||||
|
|
||||||
url(r'^permissions/', include(permissions_tool.urls))
|
|
||||||
)
|
|
||||||
|
|
||||||
# Append hooked service urls
|
|
||||||
services = get_hooks('services_hook')
|
|
||||||
for svc in services:
|
|
||||||
urlpatterns += svc().urlpatterns
|
|
||||||
|
|
@ -1,20 +0,0 @@
|
|||||||
"""
|
|
||||||
WSGI config for alliance_auth project.
|
|
||||||
|
|
||||||
It exposes the WSGI callable as a module-level variable named ``application``.
|
|
||||||
|
|
||||||
For more information on this file, see
|
|
||||||
https://docs.djangoproject.com/en/1.6/howto/deployment/wsgi/
|
|
||||||
"""
|
|
||||||
|
|
||||||
import os
|
|
||||||
from django.core.wsgi import get_wsgi_application
|
|
||||||
|
|
||||||
os.environ.setdefault("DJANGO_SETTINGS_MODULE", "alliance_auth.settings")
|
|
||||||
|
|
||||||
# virtualenv wrapper, uncomment below to activate
|
|
||||||
# activate_env=os.path.join(os.path.dirname(os.path.abspath(__file__)), 'env/bin/activate_this.py')
|
|
||||||
# execfile(activate_env, dict(__file__=activate_env))
|
|
||||||
|
|
||||||
|
|
||||||
application = get_wsgi_application()
|
|
11
allianceauth/__init__.py
Normal file
11
allianceauth/__init__.py
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
"""An auth system for EVE Online to help in-game organizations
|
||||||
|
manage online service access.
|
||||||
|
"""
|
||||||
|
|
||||||
|
# This will make sure the app is always imported when
|
||||||
|
# Django starts so that shared_task will use this app.
|
||||||
|
|
||||||
|
__version__ = '4.8.0'
|
||||||
|
__title__ = 'Alliance Auth'
|
||||||
|
__url__ = 'https://gitlab.com/allianceauth/allianceauth'
|
||||||
|
NAME = f'{__title__} v{__version__}'
|
16
allianceauth/analytics/admin.py
Normal file
16
allianceauth/analytics/admin.py
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
from django.contrib import admin
|
||||||
|
|
||||||
|
from .models import AnalyticsIdentifier, AnalyticsTokens
|
||||||
|
from solo.admin import SingletonModelAdmin
|
||||||
|
|
||||||
|
|
||||||
|
@admin.register(AnalyticsIdentifier)
|
||||||
|
class AnalyticsIdentifierAdmin(SingletonModelAdmin):
|
||||||
|
search_fields = ['identifier', ]
|
||||||
|
list_display = ['identifier', ]
|
||||||
|
|
||||||
|
|
||||||
|
@admin.register(AnalyticsTokens)
|
||||||
|
class AnalyticsTokensAdmin(admin.ModelAdmin):
|
||||||
|
search_fields = ['name', ]
|
||||||
|
list_display = ['name', 'type', ]
|
8
allianceauth/analytics/apps.py
Normal file
8
allianceauth/analytics/apps.py
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
from django.apps import AppConfig
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
|
|
||||||
|
class AnalyticsConfig(AppConfig):
|
||||||
|
name = 'allianceauth.analytics'
|
||||||
|
label = 'analytics'
|
||||||
|
verbose_name = _('Analytics')
|
20
allianceauth/analytics/fixtures/disable_analytics.json
Normal file
20
allianceauth/analytics/fixtures/disable_analytics.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
[
|
||||||
|
{
|
||||||
|
"model": "analytics.AnalyticsTokens",
|
||||||
|
"pk": 1,
|
||||||
|
"fields": {
|
||||||
|
"name": "AA Team Public Google Analytics (V4)",
|
||||||
|
"type": "GA-V4",
|
||||||
|
"token": "G-6LYSMYK8DE",
|
||||||
|
"secret": "KLlpjLZ-SRGozS5f5wb_kw",
|
||||||
|
"send_stats": "False"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "analytics.AnalyticsIdentifier",
|
||||||
|
"pk": 1,
|
||||||
|
"fields": {
|
||||||
|
"identifier": "ab33e241fbf042b6aa77c7655a768af7"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
42
allianceauth/analytics/migrations/0001_initial.py
Normal file
42
allianceauth/analytics/migrations/0001_initial.py
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
# Generated by Django 3.1.4 on 2020-12-30 13:11
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
import uuid
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
initial = True
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='AnalyticsIdentifier',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')),
|
||||||
|
('identifier', models.UUIDField(default=uuid.uuid4, editable=False)),
|
||||||
|
],
|
||||||
|
),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='AnalyticsPath',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')),
|
||||||
|
('ignore_path', models.CharField(default='/example/', max_length=254)),
|
||||||
|
],
|
||||||
|
),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='AnalyticsTokens',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')),
|
||||||
|
('name', models.CharField(max_length=254)),
|
||||||
|
('type', models.CharField(choices=[('GA-U', 'Google Analytics Universal'), ('GA-V4', 'Google Analytics V4')], max_length=254)),
|
||||||
|
('token', models.CharField(max_length=254)),
|
||||||
|
('send_page_views', models.BooleanField(default=False)),
|
||||||
|
('send_celery_tasks', models.BooleanField(default=False)),
|
||||||
|
('send_stats', models.BooleanField(default=False)),
|
||||||
|
('ignore_paths', models.ManyToManyField(blank=True, to='analytics.AnalyticsPath')),
|
||||||
|
],
|
||||||
|
),
|
||||||
|
]
|
34
allianceauth/analytics/migrations/0002_add_AA_Team_Token.py
Normal file
34
allianceauth/analytics/migrations/0002_add_AA_Team_Token.py
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
# Generated by Django 3.1.4 on 2020-12-30 08:53
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
def add_aa_team_token(apps, schema_editor):
|
||||||
|
# We can't import the Person model directly as it may be a newer
|
||||||
|
# version than this migration expects. We use the historical version.
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
token = Tokens()
|
||||||
|
token.type = 'GA-U'
|
||||||
|
token.token = 'UA-186249766-2'
|
||||||
|
token.send_page_views = True
|
||||||
|
token.send_celery_tasks = True
|
||||||
|
token.send_stats = True
|
||||||
|
token.name = 'AA Team Public Google Analytics (Universal)'
|
||||||
|
token.save()
|
||||||
|
|
||||||
|
|
||||||
|
def remove_aa_team_token(apps, schema_editor):
|
||||||
|
# Have to define some code to remove this identifier
|
||||||
|
# In case of migration rollback?
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
token = Tokens.objects.filter(token="UA-186249766-2").delete()
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0001_initial'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [migrations.RunPython(add_aa_team_token, remove_aa_team_token)
|
||||||
|
]
|
@ -0,0 +1,30 @@
|
|||||||
|
# Generated by Django 3.1.4 on 2020-12-30 08:53
|
||||||
|
|
||||||
|
from uuid import uuid4
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
def generate_identifier(apps, schema_editor):
|
||||||
|
# We can't import the Person model directly as it may be a newer
|
||||||
|
# version than this migration expects. We use the historical version.
|
||||||
|
Identifier = apps.get_model('analytics', 'AnalyticsIdentifier')
|
||||||
|
identifier = Identifier()
|
||||||
|
identifier.id = 1
|
||||||
|
identifier.save()
|
||||||
|
|
||||||
|
|
||||||
|
def zero_identifier(apps, schema_editor):
|
||||||
|
# Have to define some code to remove this identifier
|
||||||
|
# In case of migration rollback?
|
||||||
|
Identifier = apps.get_model('analytics', 'AnalyticsIdentifier')
|
||||||
|
Identifier.objects.filter(id=1).delete()
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0002_add_AA_Team_Token'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [migrations.RunPython(generate_identifier, zero_identifier)
|
||||||
|
]
|
42
allianceauth/analytics/migrations/0004_auto_20211015_0502.py
Normal file
42
allianceauth/analytics/migrations/0004_auto_20211015_0502.py
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
# Generated by Django 3.1.13 on 2021-10-15 05:02
|
||||||
|
|
||||||
|
from django.core.exceptions import ObjectDoesNotExist
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
def modify_aa_team_token_add_page_ignore_paths(apps, schema_editor):
|
||||||
|
# Add /admin/ and /user_notifications_count/ path to ignore
|
||||||
|
|
||||||
|
AnalyticsPath = apps.get_model('analytics', 'AnalyticsPath')
|
||||||
|
admin = AnalyticsPath.objects.create(ignore_path=r"^\/admin\/.*")
|
||||||
|
user_notifications_count = AnalyticsPath.objects.create(ignore_path=r"^\/user_notifications_count\/.*")
|
||||||
|
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
token = Tokens.objects.get(token="UA-186249766-2")
|
||||||
|
token.ignore_paths.add(admin, user_notifications_count)
|
||||||
|
|
||||||
|
|
||||||
|
def undo_modify_aa_team_token_add_page_ignore_paths(apps, schema_editor):
|
||||||
|
#
|
||||||
|
AnalyticsPath = apps.get_model('analytics', 'AnalyticsPath')
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
|
||||||
|
token = Tokens.objects.get(token="UA-186249766-2")
|
||||||
|
try:
|
||||||
|
admin = AnalyticsPath.objects.get(ignore_path=r"^\/admin\/.*", analyticstokens=token)
|
||||||
|
user_notifications_count = AnalyticsPath.objects.get(ignore_path=r"^\/user_notifications_count\/.*", analyticstokens=token)
|
||||||
|
admin.delete()
|
||||||
|
user_notifications_count.delete()
|
||||||
|
except ObjectDoesNotExist:
|
||||||
|
# Its fine if it doesnt exist, we just dont want them building up when re-migrating
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0003_Generate_Identifier'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [migrations.RunPython(modify_aa_team_token_add_page_ignore_paths, undo_modify_aa_team_token_add_page_ignore_paths)
|
||||||
|
]
|
@ -0,0 +1,18 @@
|
|||||||
|
# Generated by Django 3.2.8 on 2021-10-17 16:26
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0004_auto_20211015_0502'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name='analyticspath',
|
||||||
|
name='ignore_path',
|
||||||
|
field=models.CharField(default='/example/', help_text='Regex Expression, If matched no Analytics Page View is sent', max_length=254),
|
||||||
|
),
|
||||||
|
]
|
40
allianceauth/analytics/migrations/0006_more_ignore_paths.py
Normal file
40
allianceauth/analytics/migrations/0006_more_ignore_paths.py
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
# Generated by Django 3.2.8 on 2021-10-19 01:47
|
||||||
|
|
||||||
|
from django.core.exceptions import ObjectDoesNotExist
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
def modify_aa_team_token_add_page_ignore_paths(apps, schema_editor):
|
||||||
|
# Add the /account/activate path to ignore
|
||||||
|
|
||||||
|
AnalyticsPath = apps.get_model('analytics', 'AnalyticsPath')
|
||||||
|
account_activate = AnalyticsPath.objects.create(ignore_path=r"^\/account\/activate\/.*")
|
||||||
|
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
token = Tokens.objects.get(token="UA-186249766-2")
|
||||||
|
token.ignore_paths.add(account_activate)
|
||||||
|
|
||||||
|
|
||||||
|
def undo_modify_aa_team_token_add_page_ignore_paths(apps, schema_editor):
|
||||||
|
#
|
||||||
|
AnalyticsPath = apps.get_model('analytics', 'AnalyticsPath')
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
|
||||||
|
token = Tokens.objects.get(token="UA-186249766-2")
|
||||||
|
|
||||||
|
try:
|
||||||
|
account_activate = AnalyticsPath.objects.get(ignore_path=r"^\/account\/activate\/.*", analyticstokens=token)
|
||||||
|
account_activate.delete()
|
||||||
|
except ObjectDoesNotExist:
|
||||||
|
# Its fine if it doesnt exist, we just dont want them building up when re-migrating
|
||||||
|
pass
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0005_alter_analyticspath_ignore_path'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.RunPython(modify_aa_team_token_add_page_ignore_paths, undo_modify_aa_team_token_add_page_ignore_paths)
|
||||||
|
]
|
@ -0,0 +1,18 @@
|
|||||||
|
# Generated by Django 4.0.6 on 2022-08-30 05:47
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0006_more_ignore_paths'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AddField(
|
||||||
|
model_name='analyticstokens',
|
||||||
|
name='secret',
|
||||||
|
field=models.CharField(blank=True, max_length=254),
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,64 @@
|
|||||||
|
# Generated by Django 3.1.4 on 2020-12-30 08:53
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
from django.core.exceptions import ObjectDoesNotExist
|
||||||
|
|
||||||
|
|
||||||
|
def add_aa_team_token(apps, schema_editor):
|
||||||
|
# We can't import the Person model directly as it may be a newer
|
||||||
|
# version than this migration expects. We use the historical version.
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
AnalyticsPath = apps.get_model('analytics', 'AnalyticsPath')
|
||||||
|
token = Tokens()
|
||||||
|
try:
|
||||||
|
ua_token = Tokens.objects.get(token="UA-186249766-2")
|
||||||
|
original_send_page_views = ua_token.send_page_views
|
||||||
|
original_send_celery_tasks = ua_token.send_celery_tasks
|
||||||
|
original_send_stats = ua_token.send_stats
|
||||||
|
except ObjectDoesNotExist:
|
||||||
|
original_send_page_views = True
|
||||||
|
original_send_celery_tasks = True
|
||||||
|
original_send_stats = True
|
||||||
|
|
||||||
|
try:
|
||||||
|
user_notifications_count = AnalyticsPath.objects.get(ignore_path=r"^\/user_notifications_count\/.*",)
|
||||||
|
except ObjectDoesNotExist:
|
||||||
|
user_notifications_count = AnalyticsPath.objects.create(ignore_path=r"^\/user_notifications_count\/.*")
|
||||||
|
|
||||||
|
try:
|
||||||
|
admin = AnalyticsPath.objects.get(ignore_path=r"^\/admin\/.*")
|
||||||
|
except ObjectDoesNotExist:
|
||||||
|
admin = AnalyticsPath.objects.create(ignore_path=r"^\/admin\/.*")
|
||||||
|
|
||||||
|
try:
|
||||||
|
account_activate = AnalyticsPath.objects.get(ignore_path=r"^\/account\/activate\/.*")
|
||||||
|
except ObjectDoesNotExist:
|
||||||
|
account_activate = AnalyticsPath.objects.create(ignore_path=r"^\/account\/activate\/.*")
|
||||||
|
|
||||||
|
token.type = 'GA-V4'
|
||||||
|
token.token = 'G-6LYSMYK8DE'
|
||||||
|
token.secret = 'KLlpjLZ-SRGozS5f5wb_kw'
|
||||||
|
token.send_page_views = original_send_page_views
|
||||||
|
token.send_celery_tasks = original_send_celery_tasks
|
||||||
|
token.send_stats = original_send_stats
|
||||||
|
token.name = 'AA Team Public Google Analytics (V4)'
|
||||||
|
token.save()
|
||||||
|
token.ignore_paths.add(admin, user_notifications_count, account_activate)
|
||||||
|
token.save()
|
||||||
|
|
||||||
|
|
||||||
|
def remove_aa_team_token(apps, schema_editor):
|
||||||
|
# Have to define some code to remove this identifier
|
||||||
|
# In case of migration rollback?
|
||||||
|
Tokens = apps.get_model('analytics', 'AnalyticsTokens')
|
||||||
|
token = Tokens.objects.filter(token="G-6LYSMYK8DE").delete()
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0007_analyticstokens_secret'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [migrations.RunPython(
|
||||||
|
add_aa_team_token, remove_aa_team_token)]
|
@ -0,0 +1,28 @@
|
|||||||
|
# Generated by Django 4.0.10 on 2023-05-08 05:24
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0008_add_AA_GA-4_Team_Token '),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='analyticstokens',
|
||||||
|
name='ignore_paths',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='analyticstokens',
|
||||||
|
name='send_celery_tasks',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='analyticstokens',
|
||||||
|
name='send_page_views',
|
||||||
|
),
|
||||||
|
migrations.DeleteModel(
|
||||||
|
name='AnalyticsPath',
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,17 @@
|
|||||||
|
# Generated by Django 4.2.16 on 2024-12-11 02:17
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('analytics', '0009_remove_analyticstokens_ignore_paths_and_more'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterModelOptions(
|
||||||
|
name='analyticsidentifier',
|
||||||
|
options={'verbose_name': 'Analytics Identifier'},
|
||||||
|
),
|
||||||
|
]
|
29
allianceauth/analytics/models.py
Normal file
29
allianceauth/analytics/models.py
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
from typing import Literal
|
||||||
|
from django.db import models
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
from solo.models import SingletonModel
|
||||||
|
from uuid import uuid4
|
||||||
|
|
||||||
|
|
||||||
|
class AnalyticsIdentifier(SingletonModel):
|
||||||
|
|
||||||
|
identifier = models.UUIDField(default=uuid4, editable=False)
|
||||||
|
|
||||||
|
def __str__(self) -> Literal['Analytics Identifier']:
|
||||||
|
return "Analytics Identifier"
|
||||||
|
|
||||||
|
class Meta:
|
||||||
|
verbose_name = "Analytics Identifier"
|
||||||
|
|
||||||
|
|
||||||
|
class AnalyticsTokens(models.Model):
|
||||||
|
|
||||||
|
class Analytics_Type(models.TextChoices):
|
||||||
|
GA_U = 'GA-U', _('Google Analytics Universal')
|
||||||
|
GA_V4 = 'GA-V4', _('Google Analytics V4')
|
||||||
|
|
||||||
|
name = models.CharField(max_length=254)
|
||||||
|
type = models.CharField(max_length=254, choices=Analytics_Type.choices)
|
||||||
|
token = models.CharField(max_length=254, blank=False)
|
||||||
|
secret = models.CharField(max_length=254, blank=True)
|
||||||
|
send_stats = models.BooleanField(default=False)
|
207
allianceauth/analytics/tasks.py
Normal file
207
allianceauth/analytics/tasks.py
Normal file
@ -0,0 +1,207 @@
|
|||||||
|
import requests
|
||||||
|
import logging
|
||||||
|
from django.conf import settings
|
||||||
|
from django.apps import apps
|
||||||
|
from celery import shared_task
|
||||||
|
from .models import AnalyticsTokens, AnalyticsIdentifier
|
||||||
|
from .utils import (
|
||||||
|
existence_baremetal_or_docker,
|
||||||
|
install_stat_addons,
|
||||||
|
install_stat_tokens,
|
||||||
|
install_stat_users)
|
||||||
|
|
||||||
|
from allianceauth import __version__
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
BASE_URL = "https://www.google-analytics.com"
|
||||||
|
|
||||||
|
DEBUG_URL = f"{BASE_URL}/debug/mp/collect"
|
||||||
|
COLLECTION_URL = f"{BASE_URL}/mp/collect"
|
||||||
|
|
||||||
|
if getattr(settings, "ANALYTICS_ENABLE_DEBUG", False) and settings.DEBUG:
|
||||||
|
# Force sending of analytics data during in a debug/test environment
|
||||||
|
# Useful for developers working on this feature.
|
||||||
|
logger.warning(
|
||||||
|
"You have 'ANALYTICS_ENABLE_DEBUG' Enabled! "
|
||||||
|
"This debug instance will send analytics data!")
|
||||||
|
DEBUG_URL = COLLECTION_URL
|
||||||
|
|
||||||
|
ANALYTICS_URL = COLLECTION_URL
|
||||||
|
|
||||||
|
if settings.DEBUG is True:
|
||||||
|
ANALYTICS_URL = DEBUG_URL
|
||||||
|
|
||||||
|
|
||||||
|
def analytics_event(namespace: str,
|
||||||
|
task: str,
|
||||||
|
label: str = "",
|
||||||
|
result: str = "",
|
||||||
|
value: int = 1,
|
||||||
|
event_type: str = 'Celery'):
|
||||||
|
"""
|
||||||
|
Send a Google Analytics Event for each token stored
|
||||||
|
Includes check for if its enabled/disabled
|
||||||
|
|
||||||
|
Args:
|
||||||
|
`namespace` (str): Celery Namespace
|
||||||
|
`task` (str): Task Name
|
||||||
|
`label` (str): Optional, additional task label
|
||||||
|
`result` (str): Optional, Task Success/Exception
|
||||||
|
`value` (int): Optional, If bulk, Query size, can be a Boolean
|
||||||
|
`event_type` (str): Optional, Celery or Stats only, Default to Celery
|
||||||
|
"""
|
||||||
|
for token in AnalyticsTokens.objects.filter(type='GA-V4'):
|
||||||
|
if event_type == 'Stats':
|
||||||
|
allowed = token.send_stats
|
||||||
|
else:
|
||||||
|
allowed = False
|
||||||
|
|
||||||
|
if allowed is True:
|
||||||
|
send_ga_tracking_celery_event.s(
|
||||||
|
measurement_id=token.token,
|
||||||
|
secret=token.secret,
|
||||||
|
namespace=namespace,
|
||||||
|
task=task,
|
||||||
|
label=label,
|
||||||
|
result=result,
|
||||||
|
value=value).apply_async(priority=9)
|
||||||
|
|
||||||
|
|
||||||
|
@shared_task
|
||||||
|
def analytics_daily_stats() -> None:
|
||||||
|
"""Celery Task: Do not call directly
|
||||||
|
|
||||||
|
Gathers a series of daily statistics
|
||||||
|
Sends analytics events containing them
|
||||||
|
"""
|
||||||
|
users = install_stat_users()
|
||||||
|
tokens = install_stat_tokens()
|
||||||
|
addons = install_stat_addons()
|
||||||
|
existence_type = existence_baremetal_or_docker()
|
||||||
|
logger.debug("Running Daily Analytics Upload")
|
||||||
|
|
||||||
|
analytics_event(namespace='allianceauth.analytics',
|
||||||
|
task='send_install_stats',
|
||||||
|
label='existence',
|
||||||
|
value=1,
|
||||||
|
event_type='Stats')
|
||||||
|
analytics_event(namespace='allianceauth.analytics',
|
||||||
|
task='send_install_stats',
|
||||||
|
label=existence_type,
|
||||||
|
value=1,
|
||||||
|
event_type='Stats')
|
||||||
|
analytics_event(namespace='allianceauth.analytics',
|
||||||
|
task='send_install_stats',
|
||||||
|
label='users',
|
||||||
|
value=users,
|
||||||
|
event_type='Stats')
|
||||||
|
analytics_event(namespace='allianceauth.analytics',
|
||||||
|
task='send_install_stats',
|
||||||
|
label='tokens',
|
||||||
|
value=tokens,
|
||||||
|
event_type='Stats')
|
||||||
|
analytics_event(namespace='allianceauth.analytics',
|
||||||
|
task='send_install_stats',
|
||||||
|
label='addons',
|
||||||
|
value=addons,
|
||||||
|
event_type='Stats')
|
||||||
|
for appconfig in apps.get_app_configs():
|
||||||
|
if appconfig.label in [
|
||||||
|
"django_celery_beat",
|
||||||
|
"bootstrapform",
|
||||||
|
"messages",
|
||||||
|
"sessions",
|
||||||
|
"auth",
|
||||||
|
"staticfiles",
|
||||||
|
"users",
|
||||||
|
"addons",
|
||||||
|
"admin",
|
||||||
|
"humanize",
|
||||||
|
"contenttypes",
|
||||||
|
"sortedm2m",
|
||||||
|
"django_bootstrap5",
|
||||||
|
"tokens",
|
||||||
|
"authentication",
|
||||||
|
"services",
|
||||||
|
"framework",
|
||||||
|
"notifications"
|
||||||
|
"eveonline",
|
||||||
|
"navhelper",
|
||||||
|
"analytics",
|
||||||
|
"menu",
|
||||||
|
"theme"
|
||||||
|
]:
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
analytics_event(namespace='allianceauth.analytics',
|
||||||
|
task='send_extension_stats',
|
||||||
|
label=appconfig.label,
|
||||||
|
value=1,
|
||||||
|
event_type='Stats')
|
||||||
|
|
||||||
|
|
||||||
|
@shared_task
|
||||||
|
def send_ga_tracking_celery_event(
|
||||||
|
measurement_id: str,
|
||||||
|
secret: str,
|
||||||
|
namespace: str,
|
||||||
|
task: str,
|
||||||
|
label: str = "",
|
||||||
|
result: str = "",
|
||||||
|
value: int = 1):
|
||||||
|
"""Celery Task: Do not call directly
|
||||||
|
|
||||||
|
Sends an events to GA
|
||||||
|
|
||||||
|
Parameters
|
||||||
|
----------
|
||||||
|
`measurement_id` (str): GA Token
|
||||||
|
`secret` (str): GA Authentication Secret
|
||||||
|
`namespace` (str): Celery Namespace
|
||||||
|
`task` (str): Task Name
|
||||||
|
`label` (str): Optional, additional task label
|
||||||
|
`result` (str): Optional, Task Success/Exception
|
||||||
|
`value` (int): Optional, If bulk, Query size, can be a binary True/False
|
||||||
|
"""
|
||||||
|
|
||||||
|
parameters = {
|
||||||
|
'measurement_id': measurement_id,
|
||||||
|
'api_secret': secret
|
||||||
|
}
|
||||||
|
|
||||||
|
payload = {
|
||||||
|
'client_id': AnalyticsIdentifier.get_solo().identifier.hex,
|
||||||
|
"user_properties": {
|
||||||
|
"allianceauth_version": {
|
||||||
|
"value": __version__
|
||||||
|
}
|
||||||
|
},
|
||||||
|
'non_personalized_ads': True,
|
||||||
|
"events": [{
|
||||||
|
"name": "celery_event",
|
||||||
|
"params": {
|
||||||
|
"namespace": namespace,
|
||||||
|
"task": task,
|
||||||
|
'result': result,
|
||||||
|
'label': label,
|
||||||
|
"value": value
|
||||||
|
}
|
||||||
|
}]
|
||||||
|
}
|
||||||
|
try:
|
||||||
|
response = requests.post(
|
||||||
|
ANALYTICS_URL,
|
||||||
|
params=parameters,
|
||||||
|
json=payload,
|
||||||
|
timeout=10)
|
||||||
|
response.raise_for_status()
|
||||||
|
logger.debug(
|
||||||
|
f"Analytics Celery/Stats Event HTTP{response.status_code}")
|
||||||
|
return response.status_code
|
||||||
|
except requests.exceptions.HTTPError as e:
|
||||||
|
logger.debug(e)
|
||||||
|
return response.status_code
|
||||||
|
except requests.exceptions.ConnectionError as e:
|
||||||
|
logger.debug(e)
|
||||||
|
return "Failed"
|
16
allianceauth/analytics/tests/test_models.py
Normal file
16
allianceauth/analytics/tests/test_models.py
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
from allianceauth.analytics.models import AnalyticsIdentifier
|
||||||
|
|
||||||
|
from django.test.testcases import TestCase
|
||||||
|
|
||||||
|
from uuid import uuid4
|
||||||
|
|
||||||
|
|
||||||
|
# Identifiers
|
||||||
|
uuid_1 = "ab33e241fbf042b6aa77c7655a768af7"
|
||||||
|
uuid_2 = "7aa6bd70701f44729af5e3095ff4b55c"
|
||||||
|
|
||||||
|
|
||||||
|
class TestAnalyticsIdentifier(TestCase):
|
||||||
|
|
||||||
|
def test_identifier_random(self):
|
||||||
|
self.assertNotEqual(AnalyticsIdentifier.get_solo(), uuid4)
|
69
allianceauth/analytics/tests/test_tasks.py
Normal file
69
allianceauth/analytics/tests/test_tasks.py
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
import requests_mock
|
||||||
|
|
||||||
|
from django.test.utils import override_settings
|
||||||
|
|
||||||
|
from allianceauth.analytics.tasks import (
|
||||||
|
analytics_event,
|
||||||
|
send_ga_tracking_celery_event)
|
||||||
|
from allianceauth.utils.testing import NoSocketsTestCase
|
||||||
|
|
||||||
|
|
||||||
|
GOOGLE_ANALYTICS_DEBUG_URL = 'https://www.google-analytics.com/debug/mp/collect'
|
||||||
|
|
||||||
|
|
||||||
|
@override_settings(CELERY_ALWAYS_EAGER=True, CELERY_EAGER_PROPAGATES_EXCEPTIONS=True)
|
||||||
|
@requests_mock.Mocker()
|
||||||
|
class TestAnalyticsTasks(NoSocketsTestCase):
|
||||||
|
def test_analytics_event(self, requests_mocker):
|
||||||
|
requests_mocker.register_uri('POST', GOOGLE_ANALYTICS_DEBUG_URL)
|
||||||
|
analytics_event(
|
||||||
|
namespace='allianceauth.analytics',
|
||||||
|
task='send_tests',
|
||||||
|
label='test',
|
||||||
|
value=1,
|
||||||
|
result="Success",
|
||||||
|
event_type='Stats')
|
||||||
|
|
||||||
|
def test_send_ga_tracking_celery_event_sent(self, requests_mocker):
|
||||||
|
# given
|
||||||
|
requests_mocker.register_uri('POST', GOOGLE_ANALYTICS_DEBUG_URL)
|
||||||
|
token = 'G-6LYSMYK8DE'
|
||||||
|
secret = 'KLlpjLZ-SRGozS5f5wb_kw',
|
||||||
|
category = 'test'
|
||||||
|
action = 'test'
|
||||||
|
label = 'test'
|
||||||
|
value = '1'
|
||||||
|
# when
|
||||||
|
task = send_ga_tracking_celery_event(
|
||||||
|
token,
|
||||||
|
secret,
|
||||||
|
category,
|
||||||
|
action,
|
||||||
|
label,
|
||||||
|
value)
|
||||||
|
# then
|
||||||
|
self.assertEqual(task, 200)
|
||||||
|
|
||||||
|
def test_send_ga_tracking_celery_event_success(self, requests_mocker):
|
||||||
|
# given
|
||||||
|
requests_mocker.register_uri(
|
||||||
|
'POST',
|
||||||
|
GOOGLE_ANALYTICS_DEBUG_URL,
|
||||||
|
json={"validationMessages": []}
|
||||||
|
)
|
||||||
|
token = 'G-6LYSMYK8DE'
|
||||||
|
secret = 'KLlpjLZ-SRGozS5f5wb_kw',
|
||||||
|
category = 'test'
|
||||||
|
action = 'test'
|
||||||
|
label = 'test'
|
||||||
|
value = '1'
|
||||||
|
# when
|
||||||
|
task = send_ga_tracking_celery_event(
|
||||||
|
token,
|
||||||
|
secret,
|
||||||
|
category,
|
||||||
|
action,
|
||||||
|
label,
|
||||||
|
value)
|
||||||
|
# then
|
||||||
|
self.assertTrue(task, 200)
|
55
allianceauth/analytics/tests/test_utils.py
Normal file
55
allianceauth/analytics/tests/test_utils.py
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
from django.apps import apps
|
||||||
|
from allianceauth.authentication.models import User
|
||||||
|
from esi.models import Token
|
||||||
|
from allianceauth.analytics.utils import install_stat_users, install_stat_tokens, install_stat_addons
|
||||||
|
|
||||||
|
from django.test.testcases import TestCase
|
||||||
|
|
||||||
|
|
||||||
|
def create_testdata():
|
||||||
|
User.objects.all().delete()
|
||||||
|
User.objects.create_user(
|
||||||
|
'user_1'
|
||||||
|
'abc@example.com',
|
||||||
|
'password'
|
||||||
|
)
|
||||||
|
User.objects.create_user(
|
||||||
|
'user_2'
|
||||||
|
'abc@example.com',
|
||||||
|
'password'
|
||||||
|
)
|
||||||
|
# Token.objects.all().delete()
|
||||||
|
# Token.objects.create(
|
||||||
|
# character_id=101,
|
||||||
|
# character_name='character1',
|
||||||
|
# access_token='my_access_token'
|
||||||
|
# )
|
||||||
|
# Token.objects.create(
|
||||||
|
# character_id=102,
|
||||||
|
# character_name='character2',
|
||||||
|
# access_token='my_access_token'
|
||||||
|
# )
|
||||||
|
|
||||||
|
|
||||||
|
class TestAnalyticsUtils(TestCase):
|
||||||
|
|
||||||
|
def test_install_stat_users(self):
|
||||||
|
create_testdata()
|
||||||
|
expected = 2
|
||||||
|
|
||||||
|
users = install_stat_users()
|
||||||
|
self.assertEqual(users, expected)
|
||||||
|
|
||||||
|
# def test_install_stat_tokens(self):
|
||||||
|
# create_testdata()
|
||||||
|
# expected = 2
|
||||||
|
#
|
||||||
|
# tokens = install_stat_tokens()
|
||||||
|
# self.assertEqual(tokens, expected)
|
||||||
|
|
||||||
|
def test_install_stat_addons(self):
|
||||||
|
# this test does what its testing...
|
||||||
|
# but helpful for existing as a sanity check
|
||||||
|
expected = len(list(apps.get_app_configs()))
|
||||||
|
addons = install_stat_addons()
|
||||||
|
self.assertEqual(addons, expected)
|
50
allianceauth/analytics/utils.py
Normal file
50
allianceauth/analytics/utils.py
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
import os
|
||||||
|
from django.apps import apps
|
||||||
|
from allianceauth.authentication.models import User
|
||||||
|
from esi.models import Token
|
||||||
|
|
||||||
|
|
||||||
|
def install_stat_users() -> int:
|
||||||
|
"""Count and Return the number of User accounts
|
||||||
|
|
||||||
|
Returns
|
||||||
|
-------
|
||||||
|
int
|
||||||
|
The Number of User objects"""
|
||||||
|
users = User.objects.count()
|
||||||
|
return users
|
||||||
|
|
||||||
|
|
||||||
|
def install_stat_tokens() -> int:
|
||||||
|
"""Count and Return the number of ESI Tokens Stored
|
||||||
|
|
||||||
|
Returns
|
||||||
|
-------
|
||||||
|
int
|
||||||
|
The Number of Token Objects"""
|
||||||
|
tokens = Token.objects.count()
|
||||||
|
return tokens
|
||||||
|
|
||||||
|
|
||||||
|
def install_stat_addons() -> int:
|
||||||
|
"""Count and Return the number of Django Applications Installed
|
||||||
|
|
||||||
|
Returns
|
||||||
|
-------
|
||||||
|
int
|
||||||
|
The Number of Installed Apps"""
|
||||||
|
addons = len(list(apps.get_app_configs()))
|
||||||
|
return addons
|
||||||
|
|
||||||
|
|
||||||
|
def existence_baremetal_or_docker() -> str:
|
||||||
|
"""Checks the Installation Type of an install
|
||||||
|
|
||||||
|
Returns
|
||||||
|
-------
|
||||||
|
str
|
||||||
|
existence_baremetal or existence_docker"""
|
||||||
|
docker_tag = os.getenv('AA_DOCKER_TAG')
|
||||||
|
if docker_tag:
|
||||||
|
return "existence_docker"
|
||||||
|
return "existence_baremetal"
|
8
allianceauth/apps.py
Normal file
8
allianceauth/apps.py
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
from django.apps import AppConfig
|
||||||
|
|
||||||
|
|
||||||
|
class AllianceAuthConfig(AppConfig):
|
||||||
|
name = 'allianceauth'
|
||||||
|
|
||||||
|
def ready(self) -> None:
|
||||||
|
import allianceauth.checks # noqa
|
639
allianceauth/authentication/admin.py
Normal file
639
allianceauth/authentication/admin.py
Normal file
@ -0,0 +1,639 @@
|
|||||||
|
from django.contrib import admin
|
||||||
|
from django.contrib.auth.admin import UserAdmin as BaseUserAdmin
|
||||||
|
from django.contrib.auth.models import Group
|
||||||
|
from django.contrib.auth.models import Permission as BasePermission
|
||||||
|
from django.contrib.auth.models import User as BaseUser
|
||||||
|
from django.db.models import Count, Q
|
||||||
|
from django.db.models.functions import Lower
|
||||||
|
from django.db.models.signals import (
|
||||||
|
m2m_changed,
|
||||||
|
post_delete,
|
||||||
|
post_save,
|
||||||
|
pre_delete,
|
||||||
|
pre_save
|
||||||
|
)
|
||||||
|
from django.dispatch import receiver
|
||||||
|
from django.urls import reverse
|
||||||
|
from django.utils.html import format_html
|
||||||
|
from django.utils.text import slugify
|
||||||
|
|
||||||
|
from allianceauth.authentication.models import (
|
||||||
|
CharacterOwnership,
|
||||||
|
OwnershipRecord,
|
||||||
|
State,
|
||||||
|
UserProfile,
|
||||||
|
get_guest_state
|
||||||
|
)
|
||||||
|
from allianceauth.eveonline.models import (
|
||||||
|
EveAllianceInfo,
|
||||||
|
EveCharacter,
|
||||||
|
EveCorporationInfo,
|
||||||
|
EveFactionInfo
|
||||||
|
)
|
||||||
|
from allianceauth.eveonline.tasks import update_character
|
||||||
|
from allianceauth.hooks import get_hooks
|
||||||
|
from allianceauth.services.hooks import ServicesHook
|
||||||
|
|
||||||
|
from .app_settings import (
|
||||||
|
AUTHENTICATION_ADMIN_USERS_MAX_CHARS,
|
||||||
|
AUTHENTICATION_ADMIN_USERS_MAX_GROUPS
|
||||||
|
)
|
||||||
|
from .forms import UserChangeForm, UserProfileForm
|
||||||
|
|
||||||
|
|
||||||
|
def make_service_hooks_update_groups_action(service):
|
||||||
|
"""
|
||||||
|
Make a admin action for the given service
|
||||||
|
:param service: services.hooks.ServicesHook
|
||||||
|
:return: fn to update services groups for the selected users
|
||||||
|
"""
|
||||||
|
def update_service_groups(modeladmin, request, queryset):
|
||||||
|
if hasattr(service, 'update_groups_bulk'):
|
||||||
|
service.update_groups_bulk(queryset)
|
||||||
|
else:
|
||||||
|
for user in queryset: # queryset filtering doesn't work here?
|
||||||
|
service.update_groups(user)
|
||||||
|
|
||||||
|
update_service_groups.__name__ = str(f'update_{slugify(service.name)}_groups')
|
||||||
|
update_service_groups.short_description = f"Sync groups for selected {service.title} accounts"
|
||||||
|
return update_service_groups
|
||||||
|
|
||||||
|
|
||||||
|
def make_service_hooks_sync_nickname_action(service):
|
||||||
|
"""
|
||||||
|
Make a sync_nickname admin action for the given service
|
||||||
|
:param service: services.hooks.ServicesHook
|
||||||
|
:return: fn to sync nickname for the selected users
|
||||||
|
"""
|
||||||
|
def sync_nickname(modeladmin, request, queryset):
|
||||||
|
if hasattr(service, 'sync_nicknames_bulk'):
|
||||||
|
service.sync_nicknames_bulk(queryset)
|
||||||
|
else:
|
||||||
|
for user in queryset: # queryset filtering doesn't work here?
|
||||||
|
service.sync_nickname(user)
|
||||||
|
|
||||||
|
sync_nickname.__name__ = str(f'sync_{slugify(service.name)}_nickname')
|
||||||
|
sync_nickname.short_description = f"Sync nicknames for selected {service.title} accounts"
|
||||||
|
return sync_nickname
|
||||||
|
|
||||||
|
|
||||||
|
class UserProfileInline(admin.StackedInline):
|
||||||
|
model = UserProfile
|
||||||
|
readonly_fields = ('state',)
|
||||||
|
form = UserProfileForm
|
||||||
|
verbose_name = ''
|
||||||
|
verbose_name_plural = 'Profile'
|
||||||
|
|
||||||
|
def get_formset(self, request, obj=None, **kwargs):
|
||||||
|
# main_character field can only show current value or unclaimed alts
|
||||||
|
# if superuser, allow selecting from any unclaimed main
|
||||||
|
query = Q()
|
||||||
|
if obj and obj.profile.main_character:
|
||||||
|
query |= Q(pk=obj.profile.main_character_id)
|
||||||
|
if request.user.is_superuser:
|
||||||
|
query |= Q(userprofile__isnull=True)
|
||||||
|
else:
|
||||||
|
query |= Q(character_ownership__user=obj)
|
||||||
|
formset = super().get_formset(request, obj=obj, **kwargs)
|
||||||
|
|
||||||
|
def get_kwargs(self, index):
|
||||||
|
return {'querysets': {'main_character': EveCharacter.objects.filter(query)}}
|
||||||
|
formset.get_form_kwargs = get_kwargs
|
||||||
|
return formset
|
||||||
|
|
||||||
|
def has_add_permission(self, request, obj=None):
|
||||||
|
return False
|
||||||
|
|
||||||
|
def has_delete_permission(self, request, obj=None):
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
@admin.display(description="")
|
||||||
|
def user_profile_pic(obj):
|
||||||
|
"""profile pic column data for user objects
|
||||||
|
|
||||||
|
works for both User objects and objects with `user` as FK to User
|
||||||
|
To be used for all user based admin lists (requires CSS)
|
||||||
|
"""
|
||||||
|
user_obj = obj.user if hasattr(obj, 'user') else obj
|
||||||
|
if user_obj.profile.main_character:
|
||||||
|
return format_html(
|
||||||
|
'<img src="{}" class="img-circle">',
|
||||||
|
user_obj.profile.main_character.portrait_url(size=32)
|
||||||
|
)
|
||||||
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
@admin.display(description="user / main", ordering="username")
|
||||||
|
def user_username(obj):
|
||||||
|
"""user column data for user objects
|
||||||
|
|
||||||
|
works for both User objects and objects with `user` as FK to User
|
||||||
|
To be used for all user based admin lists
|
||||||
|
"""
|
||||||
|
link = reverse(
|
||||||
|
'admin:{}_{}_change'.format(
|
||||||
|
obj._meta.app_label,
|
||||||
|
type(obj).__name__.lower()
|
||||||
|
),
|
||||||
|
args=(obj.pk,)
|
||||||
|
)
|
||||||
|
user_obj = obj.user if hasattr(obj, 'user') else obj
|
||||||
|
if user_obj.profile.main_character:
|
||||||
|
return format_html(
|
||||||
|
'<strong><a href="{}">{}</a></strong><br>{}',
|
||||||
|
link,
|
||||||
|
user_obj.username,
|
||||||
|
user_obj.profile.main_character.character_name
|
||||||
|
)
|
||||||
|
return format_html(
|
||||||
|
'<strong><a href="{}">{}</a></strong>',
|
||||||
|
link,
|
||||||
|
user_obj.username,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@admin.display(
|
||||||
|
description="Corporation / Alliance (Main)",
|
||||||
|
ordering="profile__main_character__corporation_name"
|
||||||
|
)
|
||||||
|
def user_main_organization(obj):
|
||||||
|
"""main organization column data for user objects
|
||||||
|
|
||||||
|
works for both User objects and objects with `user` as FK to User
|
||||||
|
To be used for all user based admin lists
|
||||||
|
"""
|
||||||
|
user_obj = obj.user if hasattr(obj, 'user') else obj
|
||||||
|
if not user_obj.profile.main_character:
|
||||||
|
return ''
|
||||||
|
result = user_obj.profile.main_character.corporation_name
|
||||||
|
if user_obj.profile.main_character.alliance_id:
|
||||||
|
result += f'<br>{user_obj.profile.main_character.alliance_name}'
|
||||||
|
elif user_obj.profile.main_character.faction_name:
|
||||||
|
result += f'<br>{user_obj.profile.main_character.faction_name}'
|
||||||
|
return format_html(result)
|
||||||
|
|
||||||
|
|
||||||
|
class MainCorporationsFilter(admin.SimpleListFilter):
|
||||||
|
"""Custom filter to filter on corporations from mains only
|
||||||
|
|
||||||
|
works for both User objects and objects with `user` as FK to User
|
||||||
|
To be used for all user based admin lists
|
||||||
|
"""
|
||||||
|
title = 'corporation'
|
||||||
|
parameter_name = 'main_corporation_id__exact'
|
||||||
|
|
||||||
|
def lookups(self, request, model_admin):
|
||||||
|
qs = EveCharacter.objects\
|
||||||
|
.exclude(userprofile=None)\
|
||||||
|
.values('corporation_id', 'corporation_name')\
|
||||||
|
.distinct()\
|
||||||
|
.order_by(Lower('corporation_name'))
|
||||||
|
return tuple(
|
||||||
|
(x['corporation_id'], x['corporation_name']) for x in qs
|
||||||
|
)
|
||||||
|
|
||||||
|
def queryset(self, request, qs):
|
||||||
|
if self.value() is None:
|
||||||
|
return qs.all()
|
||||||
|
if qs.model == User:
|
||||||
|
return qs.filter(
|
||||||
|
profile__main_character__corporation_id=self.value()
|
||||||
|
)
|
||||||
|
return qs.filter(
|
||||||
|
user__profile__main_character__corporation_id=self.value()
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class MainAllianceFilter(admin.SimpleListFilter):
|
||||||
|
"""Custom filter to filter on alliances from mains only
|
||||||
|
|
||||||
|
works for both User objects and objects with `user` as FK to User
|
||||||
|
To be used for all user based admin lists
|
||||||
|
"""
|
||||||
|
title = 'alliance'
|
||||||
|
parameter_name = 'main_alliance_id__exact'
|
||||||
|
|
||||||
|
def lookups(self, request, model_admin):
|
||||||
|
qs = (
|
||||||
|
EveCharacter.objects
|
||||||
|
.exclude(alliance_id=None)
|
||||||
|
.exclude(userprofile=None)
|
||||||
|
.values('alliance_id', 'alliance_name')
|
||||||
|
.distinct()
|
||||||
|
.order_by(Lower('alliance_name'))
|
||||||
|
)
|
||||||
|
return tuple(
|
||||||
|
(x['alliance_id'], x['alliance_name']) for x in qs
|
||||||
|
)
|
||||||
|
|
||||||
|
def queryset(self, request, qs):
|
||||||
|
if self.value() is None:
|
||||||
|
return qs.all()
|
||||||
|
if qs.model == User:
|
||||||
|
return qs.filter(profile__main_character__alliance_id=self.value())
|
||||||
|
return qs.filter(
|
||||||
|
user__profile__main_character__alliance_id=self.value()
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class MainFactionFilter(admin.SimpleListFilter):
|
||||||
|
"""Custom filter to filter on factions from mains only
|
||||||
|
|
||||||
|
works for both User objects and objects with `user` as FK to User
|
||||||
|
To be used for all user based admin lists
|
||||||
|
"""
|
||||||
|
title = 'faction'
|
||||||
|
parameter_name = 'main_faction_id__exact'
|
||||||
|
|
||||||
|
def lookups(self, request, model_admin):
|
||||||
|
qs = (
|
||||||
|
EveCharacter.objects
|
||||||
|
.exclude(faction_id=None)
|
||||||
|
.exclude(userprofile=None)
|
||||||
|
.values('faction_id', 'faction_name')
|
||||||
|
.distinct()
|
||||||
|
.order_by(Lower('faction_name'))
|
||||||
|
)
|
||||||
|
return tuple(
|
||||||
|
(x['faction_id'], x['faction_name']) for x in qs
|
||||||
|
)
|
||||||
|
|
||||||
|
def queryset(self, request, qs):
|
||||||
|
if self.value() is None:
|
||||||
|
return qs.all()
|
||||||
|
if qs.model == User:
|
||||||
|
return qs.filter(profile__main_character__faction_id=self.value())
|
||||||
|
return qs.filter(
|
||||||
|
user__profile__main_character__faction_id=self.value()
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@admin.display(description="Update main character model from ESI")
|
||||||
|
def update_main_character_model(modeladmin, request, queryset):
|
||||||
|
tasks_count = 0
|
||||||
|
for obj in queryset:
|
||||||
|
if obj.profile.main_character:
|
||||||
|
update_character.delay(obj.profile.main_character.character_id)
|
||||||
|
tasks_count += 1
|
||||||
|
|
||||||
|
modeladmin.message_user(
|
||||||
|
request, f'Update from ESI started for {tasks_count} characters'
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class UserAdmin(BaseUserAdmin):
|
||||||
|
"""Extending Django's UserAdmin model
|
||||||
|
|
||||||
|
Behavior of groups and characters columns can be configured via settings
|
||||||
|
"""
|
||||||
|
|
||||||
|
inlines = [UserProfileInline]
|
||||||
|
ordering = ('username', )
|
||||||
|
list_select_related = ('profile__state', 'profile__main_character')
|
||||||
|
show_full_result_count = True
|
||||||
|
list_display = (
|
||||||
|
user_profile_pic,
|
||||||
|
user_username,
|
||||||
|
'_state',
|
||||||
|
'_groups',
|
||||||
|
user_main_organization,
|
||||||
|
'_characters',
|
||||||
|
'is_active',
|
||||||
|
'date_joined',
|
||||||
|
'_role'
|
||||||
|
)
|
||||||
|
list_display_links = None
|
||||||
|
list_filter = (
|
||||||
|
'profile__state',
|
||||||
|
'groups',
|
||||||
|
MainCorporationsFilter,
|
||||||
|
MainAllianceFilter,
|
||||||
|
MainFactionFilter,
|
||||||
|
'is_active',
|
||||||
|
'date_joined',
|
||||||
|
'is_staff',
|
||||||
|
'is_superuser'
|
||||||
|
)
|
||||||
|
search_fields = ('username', 'character_ownerships__character__character_name')
|
||||||
|
readonly_fields = ('date_joined', 'last_login')
|
||||||
|
filter_horizontal = ('groups', 'user_permissions',)
|
||||||
|
form = UserChangeForm
|
||||||
|
|
||||||
|
class Media:
|
||||||
|
css = {
|
||||||
|
"all": ("allianceauth/authentication/css/admin.css",)
|
||||||
|
}
|
||||||
|
|
||||||
|
def get_queryset(self, request):
|
||||||
|
qs = super().get_queryset(request)
|
||||||
|
return qs.prefetch_related("character_ownerships__character", "groups")
|
||||||
|
|
||||||
|
def get_form(self, request, obj=None, **kwargs):
|
||||||
|
"""Inject current request into change form object."""
|
||||||
|
|
||||||
|
MyForm = super().get_form(request, obj, **kwargs)
|
||||||
|
if obj:
|
||||||
|
class MyFormInjected(MyForm):
|
||||||
|
def __new__(cls, *args, **kwargs):
|
||||||
|
kwargs['request'] = request
|
||||||
|
return MyForm(*args, **kwargs)
|
||||||
|
|
||||||
|
return MyFormInjected
|
||||||
|
return MyForm
|
||||||
|
|
||||||
|
def get_actions(self, request):
|
||||||
|
actions = super().get_actions(request)
|
||||||
|
actions[update_main_character_model.__name__] = (
|
||||||
|
update_main_character_model,
|
||||||
|
update_main_character_model.__name__,
|
||||||
|
update_main_character_model.short_description
|
||||||
|
)
|
||||||
|
|
||||||
|
for hook in get_hooks('services_hook'):
|
||||||
|
svc = hook()
|
||||||
|
# Check update_groups is redefined/overloaded
|
||||||
|
if svc.update_groups.__module__ != ServicesHook.update_groups.__module__:
|
||||||
|
action = make_service_hooks_update_groups_action(svc)
|
||||||
|
actions[action.__name__] = (
|
||||||
|
action,
|
||||||
|
action.__name__,
|
||||||
|
action.short_description
|
||||||
|
)
|
||||||
|
|
||||||
|
# Create sync nickname action if service implements it
|
||||||
|
if svc.sync_nickname.__module__ != ServicesHook.sync_nickname.__module__:
|
||||||
|
action = make_service_hooks_sync_nickname_action(svc)
|
||||||
|
actions[action.__name__] = (
|
||||||
|
action, action.__name__,
|
||||||
|
action.short_description
|
||||||
|
)
|
||||||
|
return actions
|
||||||
|
|
||||||
|
def _list_2_html_w_tooltips(self, my_items: list, max_items: int) -> str:
|
||||||
|
"""converts list of strings into HTML with cutoff and tooltip"""
|
||||||
|
items_truncated_str = ', '.join(my_items[:max_items])
|
||||||
|
if not my_items:
|
||||||
|
result = None
|
||||||
|
elif len(my_items) <= max_items:
|
||||||
|
result = items_truncated_str
|
||||||
|
else:
|
||||||
|
items_truncated_str += ', (...)'
|
||||||
|
items_all_str = ', '.join(my_items)
|
||||||
|
result = format_html(
|
||||||
|
'<span data-tooltip="{}" class="tooltip">{}</span>',
|
||||||
|
items_all_str,
|
||||||
|
items_truncated_str
|
||||||
|
)
|
||||||
|
return result
|
||||||
|
|
||||||
|
def _characters(self, obj):
|
||||||
|
character_ownerships = list(obj.character_ownerships.all())
|
||||||
|
characters = [obj.character.character_name for obj in character_ownerships]
|
||||||
|
return self._list_2_html_w_tooltips(
|
||||||
|
sorted(characters),
|
||||||
|
AUTHENTICATION_ADMIN_USERS_MAX_CHARS
|
||||||
|
)
|
||||||
|
|
||||||
|
@admin.display(ordering="profile__state")
|
||||||
|
def _state(self, obj):
|
||||||
|
return obj.profile.state.name
|
||||||
|
|
||||||
|
def _groups(self, obj):
|
||||||
|
my_groups = sorted(group.name for group in list(obj.groups.all()))
|
||||||
|
return self._list_2_html_w_tooltips(
|
||||||
|
my_groups, AUTHENTICATION_ADMIN_USERS_MAX_GROUPS
|
||||||
|
)
|
||||||
|
|
||||||
|
def _role(self, obj):
|
||||||
|
if obj.is_superuser:
|
||||||
|
role = 'Superuser'
|
||||||
|
elif obj.is_staff:
|
||||||
|
role = 'Staff'
|
||||||
|
else:
|
||||||
|
role = 'User'
|
||||||
|
return role
|
||||||
|
|
||||||
|
def has_change_permission(self, request, obj=None):
|
||||||
|
return request.user.has_perm('auth.change_user')
|
||||||
|
|
||||||
|
def has_add_permission(self, request, obj=None):
|
||||||
|
return request.user.has_perm('auth.add_user')
|
||||||
|
|
||||||
|
def has_delete_permission(self, request, obj=None):
|
||||||
|
return request.user.has_perm('auth.delete_user')
|
||||||
|
|
||||||
|
def get_object(self, *args , **kwargs):
|
||||||
|
obj = super().get_object(*args , **kwargs)
|
||||||
|
self.obj = obj # storing current object for use in formfield_for_manytomany
|
||||||
|
return obj
|
||||||
|
|
||||||
|
def formfield_for_manytomany(self, db_field, request, **kwargs):
|
||||||
|
if db_field.name == "groups":
|
||||||
|
groups_qs = Group.objects.filter(authgroup__states__isnull=True)
|
||||||
|
obj_state = self.obj.profile.state
|
||||||
|
if obj_state:
|
||||||
|
matching_groups_qs = Group.objects.filter(authgroup__states=obj_state)
|
||||||
|
groups_qs = groups_qs | matching_groups_qs
|
||||||
|
kwargs["queryset"] = groups_qs.order_by(Lower("name"))
|
||||||
|
return super().formfield_for_manytomany(db_field, request, **kwargs)
|
||||||
|
|
||||||
|
def get_readonly_fields(self, request, obj=None):
|
||||||
|
if obj and not request.user.is_superuser:
|
||||||
|
return self.readonly_fields + (
|
||||||
|
"is_staff", "is_superuser", "user_permissions"
|
||||||
|
)
|
||||||
|
return self.readonly_fields
|
||||||
|
|
||||||
|
|
||||||
|
@admin.register(State)
|
||||||
|
class StateAdmin(admin.ModelAdmin):
|
||||||
|
list_select_related = True
|
||||||
|
list_display = ('name', 'priority', '_user_count')
|
||||||
|
|
||||||
|
def get_queryset(self, request):
|
||||||
|
qs = super().get_queryset(request)
|
||||||
|
return qs.annotate(user_count=Count("userprofile__id"))
|
||||||
|
|
||||||
|
@admin.display(description="Users", ordering="user_count")
|
||||||
|
def _user_count(self, obj):
|
||||||
|
return obj.user_count
|
||||||
|
|
||||||
|
fieldsets = (
|
||||||
|
(None, {
|
||||||
|
'fields': ('name', 'permissions', 'priority'),
|
||||||
|
}),
|
||||||
|
('Membership', {
|
||||||
|
'fields': (
|
||||||
|
'public',
|
||||||
|
'member_characters',
|
||||||
|
'member_corporations',
|
||||||
|
'member_alliances',
|
||||||
|
'member_factions'
|
||||||
|
),
|
||||||
|
})
|
||||||
|
)
|
||||||
|
filter_horizontal = [
|
||||||
|
'member_characters',
|
||||||
|
'member_corporations',
|
||||||
|
'member_alliances',
|
||||||
|
'member_factions',
|
||||||
|
'permissions'
|
||||||
|
]
|
||||||
|
|
||||||
|
def formfield_for_manytomany(self, db_field, request, **kwargs):
|
||||||
|
"""overriding this formfield to have sorted lists in the form"""
|
||||||
|
if db_field.name == "member_characters":
|
||||||
|
kwargs["queryset"] = EveCharacter.objects.all()\
|
||||||
|
.order_by(Lower('character_name'))
|
||||||
|
elif db_field.name == "member_corporations":
|
||||||
|
kwargs["queryset"] = EveCorporationInfo.objects.all()\
|
||||||
|
.order_by(Lower('corporation_name'))
|
||||||
|
elif db_field.name == "member_alliances":
|
||||||
|
kwargs["queryset"] = EveAllianceInfo.objects.all()\
|
||||||
|
.order_by(Lower('alliance_name'))
|
||||||
|
elif db_field.name == "member_factions":
|
||||||
|
kwargs["queryset"] = EveFactionInfo.objects.all()\
|
||||||
|
.order_by(Lower('faction_name'))
|
||||||
|
elif db_field.name == "permissions":
|
||||||
|
kwargs["queryset"] = Permission.objects.select_related("content_type").all()
|
||||||
|
return super().formfield_for_manytomany(db_field, request, **kwargs)
|
||||||
|
|
||||||
|
def has_delete_permission(self, request, obj=None):
|
||||||
|
if obj == get_guest_state():
|
||||||
|
return False
|
||||||
|
return super().has_delete_permission(request, obj=obj)
|
||||||
|
|
||||||
|
def get_fieldsets(self, request, obj=None):
|
||||||
|
if obj == get_guest_state():
|
||||||
|
return (
|
||||||
|
(None, {
|
||||||
|
'fields': ('permissions', 'priority'),
|
||||||
|
}),
|
||||||
|
)
|
||||||
|
return super().get_fieldsets(request, obj=obj)
|
||||||
|
|
||||||
|
def get_readonly_fields(self, request, obj=None):
|
||||||
|
if not request.user.is_superuser:
|
||||||
|
return self.readonly_fields + ("permissions",)
|
||||||
|
return self.readonly_fields
|
||||||
|
|
||||||
|
|
||||||
|
class BaseOwnershipAdmin(admin.ModelAdmin):
|
||||||
|
list_select_related = (
|
||||||
|
'user__profile__state', 'user__profile__main_character', 'character')
|
||||||
|
list_display = (
|
||||||
|
user_profile_pic,
|
||||||
|
user_username,
|
||||||
|
user_main_organization,
|
||||||
|
'character',
|
||||||
|
)
|
||||||
|
search_fields = (
|
||||||
|
'user__username',
|
||||||
|
'character__character_name',
|
||||||
|
'character__corporation_name',
|
||||||
|
'character__alliance_name',
|
||||||
|
'character__faction_name'
|
||||||
|
)
|
||||||
|
list_filter = (
|
||||||
|
MainCorporationsFilter,
|
||||||
|
MainAllianceFilter,
|
||||||
|
)
|
||||||
|
|
||||||
|
class Media:
|
||||||
|
css = {
|
||||||
|
"all": ("allianceauth/authentication/css/admin.css",)
|
||||||
|
}
|
||||||
|
|
||||||
|
def get_readonly_fields(self, request, obj=None):
|
||||||
|
if obj and obj.pk:
|
||||||
|
return 'owner_hash', 'character'
|
||||||
|
return tuple()
|
||||||
|
|
||||||
|
|
||||||
|
@admin.register(OwnershipRecord)
|
||||||
|
class OwnershipRecordAdmin(BaseOwnershipAdmin):
|
||||||
|
list_display = BaseOwnershipAdmin.list_display + ('created',)
|
||||||
|
|
||||||
|
|
||||||
|
@admin.register(CharacterOwnership)
|
||||||
|
class CharacterOwnershipAdmin(BaseOwnershipAdmin):
|
||||||
|
def has_add_permission(self, request):
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
class PermissionAdmin(admin.ModelAdmin):
|
||||||
|
actions = None
|
||||||
|
readonly_fields = [field.name for field in BasePermission._meta.fields]
|
||||||
|
search_fields = ('codename', )
|
||||||
|
list_display = ('admin_name', 'name', 'codename', 'content_type')
|
||||||
|
list_filter = ('content_type__app_label',)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def admin_name(obj):
|
||||||
|
return str(obj)
|
||||||
|
|
||||||
|
def has_add_permission(self, request, obj=None):
|
||||||
|
return False
|
||||||
|
|
||||||
|
def has_delete_permission(self, request, obj=None):
|
||||||
|
return False
|
||||||
|
|
||||||
|
def has_module_permission(self, request):
|
||||||
|
return True
|
||||||
|
|
||||||
|
def has_change_permission(self, request, obj=None):
|
||||||
|
# can see list but not edit it
|
||||||
|
return not obj
|
||||||
|
|
||||||
|
|
||||||
|
# Hack to allow registration of django.contrib.auth models in our authentication app
|
||||||
|
class User(BaseUser):
|
||||||
|
class Meta:
|
||||||
|
proxy = True
|
||||||
|
verbose_name = BaseUser._meta.verbose_name
|
||||||
|
verbose_name_plural = BaseUser._meta.verbose_name_plural
|
||||||
|
|
||||||
|
|
||||||
|
class Permission(BasePermission):
|
||||||
|
class Meta:
|
||||||
|
proxy = True
|
||||||
|
verbose_name = BasePermission._meta.verbose_name
|
||||||
|
verbose_name_plural = BasePermission._meta.verbose_name_plural
|
||||||
|
|
||||||
|
|
||||||
|
try:
|
||||||
|
admin.site.unregister(BaseUser)
|
||||||
|
finally:
|
||||||
|
admin.site.register(User, UserAdmin)
|
||||||
|
admin.site.register(Permission, PermissionAdmin)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(pre_save, sender=User)
|
||||||
|
def redirect_pre_save(sender, signal=None, *args, **kwargs):
|
||||||
|
pre_save.send(BaseUser, *args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(post_save, sender=User)
|
||||||
|
def redirect_post_save(sender, signal=None, *args, **kwargs):
|
||||||
|
post_save.send(BaseUser, *args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(pre_delete, sender=User)
|
||||||
|
def redirect_pre_delete(sender, signal=None, *args, **kwargs):
|
||||||
|
pre_delete.send(BaseUser, *args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(post_delete, sender=User)
|
||||||
|
def redirect_post_delete(sender, signal=None, *args, **kwargs):
|
||||||
|
post_delete.send(BaseUser, *args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(m2m_changed, sender=User.groups.through)
|
||||||
|
def redirect_m2m_changed_groups(sender, signal=None, *args, **kwargs):
|
||||||
|
m2m_changed.send(BaseUser, *args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(m2m_changed, sender=User.user_permissions.through)
|
||||||
|
def redirect_m2m_changed_permissions(sender, signal=None, *args, **kwargs):
|
||||||
|
m2m_changed.send(BaseUser, *args, **kwargs)
|
45
allianceauth/authentication/app_settings.py
Normal file
45
allianceauth/authentication/app_settings.py
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
from django.conf import settings
|
||||||
|
|
||||||
|
|
||||||
|
def _clean_setting(
|
||||||
|
name: str,
|
||||||
|
default_value: object,
|
||||||
|
min_value: int = None,
|
||||||
|
max_value: int = None,
|
||||||
|
required_type: type = None
|
||||||
|
):
|
||||||
|
"""cleans the input for a custom setting
|
||||||
|
|
||||||
|
Will use `default_value` if settings does not exit or has the wrong type
|
||||||
|
or is outside define boundaries (for int only)
|
||||||
|
|
||||||
|
Need to define `required_type` if `default_value` is `None`
|
||||||
|
|
||||||
|
Will assume `min_value` of 0 for int (can be overriden)
|
||||||
|
|
||||||
|
Returns cleaned value for setting
|
||||||
|
"""
|
||||||
|
if default_value is None and not required_type:
|
||||||
|
raise ValueError('You must specify a required_type for None defaults')
|
||||||
|
|
||||||
|
if not required_type:
|
||||||
|
required_type = type(default_value)
|
||||||
|
|
||||||
|
if min_value is None and required_type == int:
|
||||||
|
min_value = 0
|
||||||
|
|
||||||
|
if (hasattr(settings, name)
|
||||||
|
and isinstance(getattr(settings, name), required_type)
|
||||||
|
and (min_value is None or getattr(settings, name) >= min_value)
|
||||||
|
and (max_value is None or getattr(settings, name) <= max_value)
|
||||||
|
):
|
||||||
|
return getattr(settings, name)
|
||||||
|
else:
|
||||||
|
return default_value
|
||||||
|
|
||||||
|
|
||||||
|
AUTHENTICATION_ADMIN_USERS_MAX_GROUPS = \
|
||||||
|
_clean_setting('AUTHENTICATION_ADMIN_USERS_MAX_GROUPS', 10)
|
||||||
|
|
||||||
|
AUTHENTICATION_ADMIN_USERS_MAX_CHARS = \
|
||||||
|
_clean_setting('AUTHENTICATION_ADMIN_USERS_MAX_CHARS', 5)
|
18
allianceauth/authentication/apps.py
Normal file
18
allianceauth/authentication/apps.py
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
from django.apps import AppConfig
|
||||||
|
from django.core.checks import register, Tags
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
|
|
||||||
|
class AuthenticationConfig(AppConfig):
|
||||||
|
name = "allianceauth.authentication"
|
||||||
|
label = "authentication"
|
||||||
|
verbose_name = _("Authentication")
|
||||||
|
|
||||||
|
def ready(self):
|
||||||
|
from allianceauth.authentication import checks, signals # noqa: F401
|
||||||
|
from allianceauth.authentication.task_statistics import (
|
||||||
|
signals as celery_signals,
|
||||||
|
)
|
||||||
|
|
||||||
|
register(Tags.security)(checks.check_login_scopes_setting)
|
||||||
|
celery_signals.reset_counters()
|
59
allianceauth/authentication/auth_hooks.py
Normal file
59
allianceauth/authentication/auth_hooks.py
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
from allianceauth.hooks import DashboardItemHook
|
||||||
|
from allianceauth import hooks
|
||||||
|
from .views import dashboard_characters, dashboard_esi_check, dashboard_groups, dashboard_admin
|
||||||
|
|
||||||
|
|
||||||
|
class UserCharactersHook(DashboardItemHook):
|
||||||
|
def __init__(self):
|
||||||
|
DashboardItemHook.__init__(
|
||||||
|
self,
|
||||||
|
dashboard_characters,
|
||||||
|
5
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class UserGroupsHook(DashboardItemHook):
|
||||||
|
def __init__(self):
|
||||||
|
DashboardItemHook.__init__(
|
||||||
|
self,
|
||||||
|
dashboard_groups,
|
||||||
|
5
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class AdminHook(DashboardItemHook):
|
||||||
|
def __init__(self):
|
||||||
|
DashboardItemHook.__init__(
|
||||||
|
self,
|
||||||
|
dashboard_admin,
|
||||||
|
1
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class ESICheckHook(DashboardItemHook):
|
||||||
|
def __init__(self):
|
||||||
|
DashboardItemHook.__init__(
|
||||||
|
self,
|
||||||
|
dashboard_esi_check,
|
||||||
|
0
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.register('dashboard_hook')
|
||||||
|
def register_character_hook():
|
||||||
|
return UserCharactersHook()
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.register('dashboard_hook')
|
||||||
|
def register_groups_hook():
|
||||||
|
return UserGroupsHook()
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.register('dashboard_hook')
|
||||||
|
def register_admin_hook():
|
||||||
|
return AdminHook()
|
||||||
|
|
||||||
|
|
||||||
|
@hooks.register('dashboard_hook')
|
||||||
|
def register_esi_hook():
|
||||||
|
return ESICheckHook()
|
105
allianceauth/authentication/backends.py
Normal file
105
allianceauth/authentication/backends.py
Normal file
@ -0,0 +1,105 @@
|
|||||||
|
import logging
|
||||||
|
|
||||||
|
from django.contrib.auth.backends import ModelBackend
|
||||||
|
from django.contrib.auth.models import User, Permission
|
||||||
|
|
||||||
|
from .models import UserProfile, CharacterOwnership, OwnershipRecord
|
||||||
|
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class StateBackend(ModelBackend):
|
||||||
|
@staticmethod
|
||||||
|
def _get_state_permissions(user_obj):
|
||||||
|
"""returns permissions for state of given user object"""
|
||||||
|
if hasattr(user_obj, "profile") and user_obj.profile:
|
||||||
|
return Permission.objects.filter(state=user_obj.profile.state)
|
||||||
|
else:
|
||||||
|
return Permission.objects.none()
|
||||||
|
|
||||||
|
def get_state_permissions(self, user_obj, obj=None):
|
||||||
|
return self._get_permissions(user_obj, obj, 'state')
|
||||||
|
|
||||||
|
def get_all_permissions(self, user_obj, obj=None):
|
||||||
|
if not user_obj.is_active or user_obj.is_anonymous or obj is not None:
|
||||||
|
return set()
|
||||||
|
if not hasattr(user_obj, '_perm_cache'):
|
||||||
|
user_obj._perm_cache = self.get_user_permissions(user_obj)
|
||||||
|
user_obj._perm_cache.update(self.get_group_permissions(user_obj))
|
||||||
|
user_obj._perm_cache.update(self.get_state_permissions(user_obj))
|
||||||
|
return user_obj._perm_cache
|
||||||
|
|
||||||
|
def authenticate(self, request=None, token=None, **credentials):
|
||||||
|
if not token:
|
||||||
|
return None
|
||||||
|
try:
|
||||||
|
ownership = CharacterOwnership.objects.get(character__character_id=token.character_id)
|
||||||
|
if ownership.owner_hash == token.character_owner_hash:
|
||||||
|
logger.debug(f'Authenticating {ownership.user} by ownership of character {token.character_name}')
|
||||||
|
if ownership.user.profile.main_character:
|
||||||
|
if ownership.user.profile.main_character.character_id == token.character_id:
|
||||||
|
return ownership.user
|
||||||
|
else: # this is an alt, enforce main only.
|
||||||
|
return None
|
||||||
|
else:
|
||||||
|
logger.debug(f'{token.character_name} has changed ownership. Creating new user account.')
|
||||||
|
ownership.delete()
|
||||||
|
return self.create_user(token)
|
||||||
|
except CharacterOwnership.DoesNotExist:
|
||||||
|
try:
|
||||||
|
# insecure legacy main check for pre-sso registration auth installs
|
||||||
|
profile = UserProfile.objects.get(main_character__character_id=token.character_id)
|
||||||
|
logger.debug(f'Authenticating {profile.user} by their main character {profile.main_character} without active ownership.')
|
||||||
|
# attach an ownership
|
||||||
|
token.user = profile.user
|
||||||
|
CharacterOwnership.objects.create_by_token(token)
|
||||||
|
return profile.user
|
||||||
|
except UserProfile.DoesNotExist:
|
||||||
|
# now we check historical records to see if this is a returning user
|
||||||
|
records = OwnershipRecord.objects.filter(owner_hash=token.character_owner_hash).filter(character__character_id=token.character_id)
|
||||||
|
if records.exists():
|
||||||
|
# we've seen this character owner before. Re-attach to their old user account
|
||||||
|
user = records[0].user
|
||||||
|
if user.profile.main_character:
|
||||||
|
if user.profile.main_character.character_id != token.character_id:
|
||||||
|
# this is an alt, enforce main only due to trust issues in SSO.
|
||||||
|
return None
|
||||||
|
|
||||||
|
token.user = user
|
||||||
|
co = CharacterOwnership.objects.create_by_token(token)
|
||||||
|
logger.debug(f'Authenticating {user} by matching owner hash record of character {co.character}')
|
||||||
|
|
||||||
|
# set this as their main by default as they have none
|
||||||
|
user.profile.main_character = co.character
|
||||||
|
user.profile.save()
|
||||||
|
return user
|
||||||
|
logger.debug(f'Unable to authenticate character {token.character_name}. Creating new user.')
|
||||||
|
return self.create_user(token)
|
||||||
|
|
||||||
|
def create_user(self, token):
|
||||||
|
username = self.iterate_username(token.character_name) # build unique username off character name
|
||||||
|
user = User.objects.create_user(username, is_active=False) # prevent login until email set
|
||||||
|
user.set_unusable_password() # prevent login via password
|
||||||
|
user.save()
|
||||||
|
token.user = user
|
||||||
|
co = CharacterOwnership.objects.create_by_token(token) # assign ownership to this user
|
||||||
|
user.profile.main_character = co.character # assign main character as token character
|
||||||
|
user.profile.save()
|
||||||
|
logger.debug(f'Created new user {user}')
|
||||||
|
return user
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def iterate_username(name):
|
||||||
|
name = str.replace(name, "'", "")
|
||||||
|
name = str.replace(name, ' ', '_')
|
||||||
|
if User.objects.filter(username__startswith=name).exists():
|
||||||
|
u = User.objects.filter(username__startswith=name)
|
||||||
|
num = len(u)
|
||||||
|
username = f"{name}_{num}"
|
||||||
|
while u.filter(username=username).exists():
|
||||||
|
num += 1
|
||||||
|
username = f"{name}_{num}"
|
||||||
|
else:
|
||||||
|
username = name
|
||||||
|
return username
|
12
allianceauth/authentication/checks.py
Normal file
12
allianceauth/authentication/checks.py
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
from django.core.checks import Error
|
||||||
|
from django.conf import settings
|
||||||
|
|
||||||
|
|
||||||
|
def check_login_scopes_setting(*args, **kwargs):
|
||||||
|
errors = []
|
||||||
|
try:
|
||||||
|
assert settings.LOGIN_TOKEN_SCOPES
|
||||||
|
except (AssertionError, AttributeError):
|
||||||
|
errors.append(Error('LOGIN_TOKEN_SCOPES setting cannot be blank.',
|
||||||
|
hint='SSO tokens used for logging in must require scopes to be refreshable.'))
|
||||||
|
return errors
|
12
allianceauth/authentication/constants.py
Normal file
12
allianceauth/authentication/constants.py
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
|
# Overide ESI messages in the dashboard widget
|
||||||
|
# when the returned messages are not helpful or out of date
|
||||||
|
ESI_ERROR_MESSAGE_OVERRIDES = {
|
||||||
|
420: _("This software has exceeded the error limit for ESI. "
|
||||||
|
"If you are a user, please contact the maintainer of this software."
|
||||||
|
" If you are a developer/maintainer, please make a greater "
|
||||||
|
"effort in the future to receive valid responses. For tips on how, "
|
||||||
|
"come have a chat with us in ##3rd-party-dev-and-esi on the EVE "
|
||||||
|
"Online Discord. https://www.eveonline.com/discord")
|
||||||
|
}
|
48
allianceauth/authentication/core/celery_workers.py
Normal file
48
allianceauth/authentication/core/celery_workers.py
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
"""API for interacting with celery workers."""
|
||||||
|
|
||||||
|
import itertools
|
||||||
|
import logging
|
||||||
|
from typing import Optional
|
||||||
|
|
||||||
|
from amqp.exceptions import ChannelError
|
||||||
|
from celery import current_app
|
||||||
|
|
||||||
|
from django.conf import settings
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
def active_tasks_count() -> Optional[int]:
|
||||||
|
"""Return count of currently active tasks
|
||||||
|
or None if celery workers are not online.
|
||||||
|
"""
|
||||||
|
inspect = current_app.control.inspect()
|
||||||
|
return _tasks_count(inspect.active())
|
||||||
|
|
||||||
|
|
||||||
|
def _tasks_count(data: dict) -> Optional[int]:
|
||||||
|
"""Return count of tasks in data from celery inspect API."""
|
||||||
|
try:
|
||||||
|
tasks = itertools.chain(*data.values())
|
||||||
|
except AttributeError:
|
||||||
|
return None
|
||||||
|
return len(list(tasks))
|
||||||
|
|
||||||
|
|
||||||
|
def queued_tasks_count() -> Optional[int]:
|
||||||
|
"""Return count of queued tasks. Return None if there was an error."""
|
||||||
|
try:
|
||||||
|
with current_app.connection_or_acquire() as conn:
|
||||||
|
result = conn.default_channel.queue_declare(
|
||||||
|
queue=getattr(settings, "CELERY_DEFAULT_QUEUE", "celery"), passive=True
|
||||||
|
)
|
||||||
|
return result.message_count
|
||||||
|
|
||||||
|
except ChannelError:
|
||||||
|
# Queue doesn't exist, probably empty
|
||||||
|
return 0
|
||||||
|
|
||||||
|
except Exception:
|
||||||
|
logger.exception("Failed to get celery queue length")
|
||||||
|
|
||||||
|
return None
|
83
allianceauth/authentication/decorators.py
Normal file
83
allianceauth/authentication/decorators.py
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
from django.urls import include
|
||||||
|
from django.contrib.auth.decorators import user_passes_test
|
||||||
|
from django.core.exceptions import PermissionDenied
|
||||||
|
from functools import wraps
|
||||||
|
from typing import Callable, Iterable, Optional
|
||||||
|
|
||||||
|
from django.urls import include
|
||||||
|
from django.contrib import messages
|
||||||
|
from django.contrib.auth.decorators import login_required, user_passes_test
|
||||||
|
from django.core.exceptions import PermissionDenied
|
||||||
|
from django.shortcuts import redirect
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
|
|
||||||
|
def user_has_main_character(user):
|
||||||
|
return bool(user.profile.main_character)
|
||||||
|
|
||||||
|
|
||||||
|
def decorate_url_patterns(
|
||||||
|
urls, decorator: Callable, excluded_views: Optional[Iterable] = None
|
||||||
|
):
|
||||||
|
"""Decorate views given in url patterns except when they are explicitly excluded.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
- urls: Django URL patterns
|
||||||
|
- decorator: Decorator to be added to each view
|
||||||
|
- exclude_views: Optional iterable of view names to be excluded
|
||||||
|
"""
|
||||||
|
url_list, app_name, namespace = include(urls)
|
||||||
|
|
||||||
|
def process_patterns(url_patterns):
|
||||||
|
for pattern in url_patterns:
|
||||||
|
if hasattr(pattern, 'url_patterns'):
|
||||||
|
# this is an include - apply to all nested patterns
|
||||||
|
process_patterns(pattern.url_patterns)
|
||||||
|
else:
|
||||||
|
# this is a pattern
|
||||||
|
if excluded_views and pattern.lookup_str in excluded_views:
|
||||||
|
return
|
||||||
|
pattern.callback = decorator(pattern.callback)
|
||||||
|
|
||||||
|
process_patterns(url_list)
|
||||||
|
return url_list, app_name, namespace
|
||||||
|
|
||||||
|
|
||||||
|
def main_character_required(view_func):
|
||||||
|
@wraps(view_func)
|
||||||
|
def _wrapped_view(request, *args, **kwargs):
|
||||||
|
if user_has_main_character(request.user):
|
||||||
|
return view_func(request, *args, **kwargs)
|
||||||
|
|
||||||
|
messages.error(request, _('A main character is required to perform that action. Add one below.'))
|
||||||
|
return redirect('authentication:dashboard')
|
||||||
|
return login_required(_wrapped_view)
|
||||||
|
|
||||||
|
|
||||||
|
def permissions_required(perm, login_url=None, raise_exception=False):
|
||||||
|
"""
|
||||||
|
Decorator for views that checks whether a user has a particular permission
|
||||||
|
enabled, redirecting to the log-in page if necessary.
|
||||||
|
If the raise_exception parameter is given the PermissionDenied exception
|
||||||
|
is raised.
|
||||||
|
|
||||||
|
This decorator is identical to the django permission_required except it
|
||||||
|
allows for passing a tuple/list of perms that will return true if any one
|
||||||
|
of them is present.
|
||||||
|
"""
|
||||||
|
def check_perms(user):
|
||||||
|
if isinstance(perm, str):
|
||||||
|
perms = (perm,)
|
||||||
|
else:
|
||||||
|
perms = perm
|
||||||
|
# First check if the user has the permission (even anon users)
|
||||||
|
for perm_ in perms:
|
||||||
|
perm_ = (perm_,)
|
||||||
|
if user.has_perms(perm_):
|
||||||
|
return True
|
||||||
|
# In case the 403 handler should be called raise the exception
|
||||||
|
if raise_exception:
|
||||||
|
raise PermissionDenied
|
||||||
|
# As the last resort, show the login form
|
||||||
|
return False
|
||||||
|
return user_passes_test(check_perms, login_url=login_url)
|
66
allianceauth/authentication/forms.py
Normal file
66
allianceauth/authentication/forms.py
Normal file
@ -0,0 +1,66 @@
|
|||||||
|
from django import forms
|
||||||
|
from django.contrib.auth.forms import UserChangeForm as BaseUserChangeForm
|
||||||
|
from django.contrib.auth.models import Group
|
||||||
|
from django.core.exceptions import ValidationError
|
||||||
|
from django.forms import ModelForm
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
|
from allianceauth.authentication.models import User
|
||||||
|
|
||||||
|
|
||||||
|
class RegistrationForm(forms.Form):
|
||||||
|
email = forms.EmailField(label=_('Email'), max_length=254, required=True)
|
||||||
|
|
||||||
|
class _meta:
|
||||||
|
model = User
|
||||||
|
|
||||||
|
|
||||||
|
class UserProfileForm(ModelForm):
|
||||||
|
"""Allows specifying FK querysets through kwarg"""
|
||||||
|
|
||||||
|
def __init__(self, querysets=None, *args, **kwargs):
|
||||||
|
querysets = querysets or {}
|
||||||
|
super().__init__(*args, **kwargs)
|
||||||
|
for field, qs in querysets.items():
|
||||||
|
self.fields[field].queryset = qs
|
||||||
|
|
||||||
|
|
||||||
|
class UserChangeForm(BaseUserChangeForm):
|
||||||
|
"""Add custom cleaning to UserChangeForm"""
|
||||||
|
|
||||||
|
def __init__(self, *args, **kwargs):
|
||||||
|
self.request = kwargs.pop("request") # Inject current request into form object
|
||||||
|
super().__init__(*args, **kwargs)
|
||||||
|
|
||||||
|
def clean(self):
|
||||||
|
cleaned_data = super().clean()
|
||||||
|
if not self.request.user.is_superuser:
|
||||||
|
if self.instance:
|
||||||
|
current_restricted = set(
|
||||||
|
self.instance.groups.filter(
|
||||||
|
authgroup__restricted=True
|
||||||
|
).values_list("pk", flat=True)
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
current_restricted = set()
|
||||||
|
new_restricted = set(
|
||||||
|
cleaned_data["groups"].filter(
|
||||||
|
authgroup__restricted=True
|
||||||
|
).values_list("pk", flat=True)
|
||||||
|
)
|
||||||
|
if current_restricted != new_restricted:
|
||||||
|
restricted_removed = current_restricted - new_restricted
|
||||||
|
restricted_added = new_restricted - current_restricted
|
||||||
|
restricted_changed = restricted_removed | restricted_added
|
||||||
|
restricted_names_qs = Group.objects.filter(
|
||||||
|
pk__in=restricted_changed
|
||||||
|
).values_list("name", flat=True)
|
||||||
|
restricted_names = ",".join(list(restricted_names_qs))
|
||||||
|
raise ValidationError(
|
||||||
|
{
|
||||||
|
"groups": _(
|
||||||
|
"You are not allowed to add or remove these "
|
||||||
|
"restricted groups: %s" % restricted_names
|
||||||
|
)
|
||||||
|
}
|
||||||
|
)
|
13
allianceauth/authentication/hmac_urls.py
Normal file
13
allianceauth/authentication/hmac_urls.py
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
from allianceauth.authentication import views
|
||||||
|
from django.urls import include, re_path, path
|
||||||
|
|
||||||
|
urlpatterns = [
|
||||||
|
path('activate/complete/', views.activation_complete, name='registration_activation_complete'),
|
||||||
|
# The activation key can make use of any character from the
|
||||||
|
# URL-safe base64 alphabet, plus the colon as a separator.
|
||||||
|
re_path(r'^activate/(?P<activation_key>[-:\w]+)/$', views.ActivationView.as_view(), name='registration_activate'),
|
||||||
|
path('register/', views.RegistrationView.as_view(), name='registration_register'),
|
||||||
|
path('register/complete/', views.registration_complete, name='registration_complete'),
|
||||||
|
path('register/closed/', views.registration_closed, name='registration_disallowed'),
|
||||||
|
path('', include('django.contrib.auth.urls')),
|
||||||
|
]
|
@ -0,0 +1,20 @@
|
|||||||
|
from django.core.management.base import BaseCommand
|
||||||
|
from allianceauth.authentication.models import UserProfile
|
||||||
|
|
||||||
|
|
||||||
|
class Command(BaseCommand):
|
||||||
|
help = 'Ensures all main characters have an active ownership'
|
||||||
|
|
||||||
|
def handle(self, *args, **options):
|
||||||
|
profiles = UserProfile.objects.filter(main_character__isnull=False).filter(
|
||||||
|
main_character__character_ownership__isnull=True)
|
||||||
|
if profiles.exists():
|
||||||
|
for profile in profiles:
|
||||||
|
self.stdout.write(self.style.ERROR(
|
||||||
|
'{} does not have an ownership. Resetting user {} main character.'.format(profile.main_character,
|
||||||
|
profile.user)))
|
||||||
|
profile.main_character = None
|
||||||
|
profile.save()
|
||||||
|
self.stdout.write(self.style.WARNING(f'Reset {profiles.count()} main characters.'))
|
||||||
|
else:
|
||||||
|
self.stdout.write(self.style.SUCCESS('All main characters have active ownership.'))
|
76
allianceauth/authentication/managers.py
Normal file
76
allianceauth/authentication/managers.py
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
import logging
|
||||||
|
|
||||||
|
from django.db import transaction
|
||||||
|
from django.db.models import Manager, QuerySet, Q
|
||||||
|
|
||||||
|
from allianceauth.eveonline.models import EveCharacter
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
def available_states_query(character):
|
||||||
|
query = Q(public=True)
|
||||||
|
if character.character_id:
|
||||||
|
query |= Q(member_characters__character_id=character.character_id)
|
||||||
|
if character.corporation_id:
|
||||||
|
query |= Q(member_corporations__corporation_id=character.corporation_id)
|
||||||
|
if character.alliance_id:
|
||||||
|
query |= Q(member_alliances__alliance_id=character.alliance_id)
|
||||||
|
if character.faction_id:
|
||||||
|
query |= Q(member_factions__faction_id=character.faction_id)
|
||||||
|
return query
|
||||||
|
|
||||||
|
|
||||||
|
class CharacterOwnershipManager(Manager):
|
||||||
|
def create_by_token(self, token):
|
||||||
|
if not EveCharacter.objects.filter(character_id=token.character_id).exists():
|
||||||
|
EveCharacter.objects.create_character(token.character_id)
|
||||||
|
return self.create(character=EveCharacter.objects.get(character_id=token.character_id), user=token.user, owner_hash=token.character_owner_hash)
|
||||||
|
|
||||||
|
|
||||||
|
class StateQuerySet(QuerySet):
|
||||||
|
def available_to_character(self, character):
|
||||||
|
return self.filter(available_states_query(character))
|
||||||
|
|
||||||
|
def available_to_user(self, user):
|
||||||
|
if user.profile.main_character:
|
||||||
|
return self.available_to_character(user.profile.main_character)
|
||||||
|
else:
|
||||||
|
return self.none()
|
||||||
|
|
||||||
|
def get_for_user(self, user):
|
||||||
|
states = self.available_to_user(user)
|
||||||
|
if states.exists():
|
||||||
|
return states[0]
|
||||||
|
else:
|
||||||
|
from allianceauth.authentication.models import get_guest_state
|
||||||
|
return get_guest_state()
|
||||||
|
|
||||||
|
def delete(self):
|
||||||
|
with transaction.atomic():
|
||||||
|
for state in self:
|
||||||
|
for profile in state.userprofile_set.all():
|
||||||
|
profile.assign_state(state=self.model.objects.exclude(pk=state.pk).get_for_user(profile.user))
|
||||||
|
super().delete()
|
||||||
|
|
||||||
|
|
||||||
|
class StateManager(Manager):
|
||||||
|
def get_queryset(self):
|
||||||
|
return StateQuerySet(self.model, using=self._db)
|
||||||
|
|
||||||
|
def available_to_character(self, character):
|
||||||
|
return self.get_queryset().available_to_character(character)
|
||||||
|
|
||||||
|
def available_to_user(self, user):
|
||||||
|
return self.get_queryset().available_to_user(user)
|
||||||
|
|
||||||
|
def get_for_character(self, character):
|
||||||
|
states = self.get_queryset().available_to_character(character)
|
||||||
|
if states.exists():
|
||||||
|
return states[0]
|
||||||
|
else:
|
||||||
|
from allianceauth.authentication.models import get_guest_state
|
||||||
|
return get_guest_state()
|
||||||
|
|
||||||
|
def get_for_user(self, user):
|
||||||
|
return self.get_queryset().get_for_user(user)
|
55
allianceauth/authentication/middleware.py
Normal file
55
allianceauth/authentication/middleware.py
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
from django.conf import settings
|
||||||
|
from django.utils.deprecation import MiddlewareMixin
|
||||||
|
|
||||||
|
import logging
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class UserSettingsMiddleware(MiddlewareMixin):
|
||||||
|
def process_response(self, request, response):
|
||||||
|
"""Django Middleware: User Settings."""
|
||||||
|
|
||||||
|
# Intercept the built in django /setlang/ view and also save it to Database.
|
||||||
|
# Note the annoymous user check, only logged in users will ever hit the DB here
|
||||||
|
if request.path == '/i18n/setlang/' and not request.user.is_anonymous:
|
||||||
|
try:
|
||||||
|
request.user.profile.language = request.POST['language']
|
||||||
|
request.user.profile.save()
|
||||||
|
except Exception as e:
|
||||||
|
logger.exception(e)
|
||||||
|
|
||||||
|
# Only act during the login flow, _after_ user is activated (step 2: post-sso)
|
||||||
|
elif request.path == '/sso/login' and not request.user.is_anonymous:
|
||||||
|
# Set the Language Cookie, if it doesnt match the DB
|
||||||
|
# Null = hasnt been set by the user ever, dont act.
|
||||||
|
try:
|
||||||
|
if request.user.profile.language != request.LANGUAGE_CODE and request.user.profile.language is not None:
|
||||||
|
response.set_cookie(key=settings.LANGUAGE_COOKIE_NAME,
|
||||||
|
value=request.user.profile.language,
|
||||||
|
max_age=settings.LANGUAGE_COOKIE_AGE)
|
||||||
|
except Exception as e:
|
||||||
|
logger.exception(e)
|
||||||
|
|
||||||
|
# AA v3 NIGHT_MODE
|
||||||
|
# Set our Night mode flag from the DB
|
||||||
|
# Null = hasnt been set by the user ever, dont act.
|
||||||
|
#
|
||||||
|
# Night mode intercept is not needed in this middleware.
|
||||||
|
# is saved direct to DB in NightModeRedirectView
|
||||||
|
try:
|
||||||
|
if request.user.profile.night_mode is not None:
|
||||||
|
request.session["NIGHT_MODE"] = request.user.profile.night_mode
|
||||||
|
except Exception as e:
|
||||||
|
logger.exception(e)
|
||||||
|
|
||||||
|
# AA v4 Themes
|
||||||
|
# Null = has not been set by the user ever, dont act
|
||||||
|
# DEFAULT_THEME or DEFAULT_THEME_DARK will be used in get_theme()
|
||||||
|
try:
|
||||||
|
if request.user.profile.theme is not None:
|
||||||
|
request.session["THEME"] = request.user.profile.theme
|
||||||
|
except Exception as e:
|
||||||
|
logger.exception(e)
|
||||||
|
|
||||||
|
return response
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2016-09-05 21:38
|
# Generated by Django 1.10.1 on 2016-09-05 21:38
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
from django.db import migrations, models
|
from django.db import migrations, models
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2016-09-07 19:14
|
# Generated by Django 1.10.1 on 2016-09-07 19:14
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations
|
from django.db import migrations
|
||||||
|
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2016-09-09 20:29
|
# Generated by Django 1.10.1 on 2016-09-09 20:29
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations, models
|
from django.db import migrations, models
|
||||||
|
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2016-09-09 23:19
|
# Generated by Django 1.10.1 on 2016-09-09 23:19
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations
|
from django.db import migrations
|
||||||
|
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2016-09-09 23:11
|
# Generated by Django 1.10.1 on 2016-09-09 23:11
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations
|
from django.db import migrations
|
||||||
|
|
||||||
@ -17,7 +15,7 @@ def create_permissions(apps, schema_editor):
|
|||||||
Permission = apps.get_model('auth', 'Permission')
|
Permission = apps.get_model('auth', 'Permission')
|
||||||
ct = ContentType.objects.get_for_model(User)
|
ct = ContentType.objects.get_for_model(User)
|
||||||
Permission.objects.get_or_create(codename="member", content_type=ct, name="member")
|
Permission.objects.get_or_create(codename="member", content_type=ct, name="member")
|
||||||
Permission.objects.get_or_create(codename="blue_member", content_type=ct, name="blue_member")
|
Permission.objects.get_or_create(codename="blue_member", content_type=ct, name="blue_member")
|
||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2016-09-10 05:42
|
# Generated by Django 1.10.1 on 2016-09-10 05:42
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations
|
from django.db import migrations
|
||||||
|
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2016-09-10 21:50
|
# Generated by Django 1.10.1 on 2016-09-10 21:50
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations
|
from django.db import migrations
|
||||||
|
|
15
allianceauth/authentication/migrations/0008_set_state.py
Normal file
15
allianceauth/authentication/migrations/0008_set_state.py
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
# Generated by Django 1.10.1 on 2016-09-12 13:04
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0007_remove_authservicesinfo_is_blue'),
|
||||||
|
('eveonline', '0001_initial'),
|
||||||
|
('auth', '0001_initial'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
]
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.2 on 2016-10-21 02:28
|
# Generated by Django 1.10.2 on 2016-10-21 02:28
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations, models
|
from django.db import migrations, models
|
||||||
|
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2017-01-07 06:47
|
# Generated by Django 1.10.1 on 2017-01-07 06:47
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations
|
from django.db import migrations
|
||||||
|
|
||||||
@ -10,7 +8,7 @@ def count_completed_fields(model):
|
|||||||
def forward(apps, schema_editor):
|
def forward(apps, schema_editor):
|
||||||
# this ensures only one model exists per user
|
# this ensures only one model exists per user
|
||||||
AuthServicesInfo = apps.get_model('authentication', 'AuthServicesInfo')
|
AuthServicesInfo = apps.get_model('authentication', 'AuthServicesInfo')
|
||||||
users = set([a.user for a in AuthServicesInfo.objects.all()])
|
users = {a.user for a in AuthServicesInfo.objects.all()}
|
||||||
for u in users:
|
for u in users:
|
||||||
auths = AuthServicesInfo.objects.filter(user=u)
|
auths = AuthServicesInfo.objects.filter(user=u)
|
||||||
if auths.count() > 1:
|
if auths.count() > 1:
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.1 on 2017-01-07 07:11
|
# Generated by Django 1.10.1 on 2017-01-07 07:11
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
from django.db import migrations, models
|
from django.db import migrations, models
|
@ -1,6 +1,4 @@
|
|||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Generated by Django 1.10.5 on 2017-01-12 00:59
|
# Generated by Django 1.10.5 on 2017-01-12 00:59
|
||||||
from __future__ import unicode_literals
|
|
||||||
|
|
||||||
from django.db import migrations, models
|
from django.db import migrations, models
|
||||||
|
|
@ -0,0 +1,70 @@
|
|||||||
|
# Generated by Django 1.10.2 on 2016-12-11 23:14
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
import logging
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0012_remove_add_delete_authservicesinfo_permissions'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
# Remove fields
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='discord_uid',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='discourse_enabled',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='forum_username',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='ipboard_username',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='ips4_id',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='ips4_username',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='jabber_username',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='market_username',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='mumble_username',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='smf_username',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='teamspeak3_perm_key',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='teamspeak3_uid',
|
||||||
|
),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='xenforo_username',
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,22 @@
|
|||||||
|
# Generated by Django 1.10.1 on 2016-09-09 23:19
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
def create_permission(apps, schema_editor):
|
||||||
|
User = apps.get_model('auth', 'User')
|
||||||
|
ContentType = apps.get_model('contenttypes', 'ContentType')
|
||||||
|
Permission = apps.get_model('auth', 'Permission')
|
||||||
|
ct = ContentType.objects.get_for_model(User)
|
||||||
|
Permission.objects.get_or_create(codename="view_fleetup", content_type=ct, name="view_fleetup")
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0013_service_modules'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.RunPython(create_permission, migrations.RunPython.noop)
|
||||||
|
]
|
282
allianceauth/authentication/migrations/0015_user_profiles.py
Normal file
282
allianceauth/authentication/migrations/0015_user_profiles.py
Normal file
@ -0,0 +1,282 @@
|
|||||||
|
# Generated by Django 1.10.5 on 2017-03-22 23:09
|
||||||
|
|
||||||
|
import allianceauth.authentication.models
|
||||||
|
import django.db.models.deletion
|
||||||
|
from django.conf import settings
|
||||||
|
from django.contrib.auth.hashers import make_password
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
def create_guest_state(apps, schema_editor):
|
||||||
|
State = apps.get_model('authentication', 'State')
|
||||||
|
State.objects.update_or_create(name='Guest', defaults={'priority': 0, 'public': True})
|
||||||
|
|
||||||
|
|
||||||
|
def create_member_state(apps, schema_editor):
|
||||||
|
Group = apps.get_model('auth', 'Group')
|
||||||
|
State = apps.get_model('authentication', 'State')
|
||||||
|
EveAllianceInfo = apps.get_model('eveonline', 'EveAllianceInfo')
|
||||||
|
EveCorporationInfo = apps.get_model('eveonline', 'EveCorporationInfo')
|
||||||
|
|
||||||
|
member_state_name = getattr(settings, 'DEFAULT_AUTH_GROUP', 'Member')
|
||||||
|
s = State.objects.update_or_create(name=member_state_name, defaults={'priority': 100, 'public': False})[0]
|
||||||
|
try:
|
||||||
|
# move group permissions to state
|
||||||
|
g = Group.objects.get(name=member_state_name)
|
||||||
|
[s.permissions.add(p.pk) for p in g.permissions.all()]
|
||||||
|
g.delete()
|
||||||
|
except Group.DoesNotExist:
|
||||||
|
pass
|
||||||
|
|
||||||
|
# auto-populate member IDs
|
||||||
|
CORP_IDS = getattr(settings, 'CORP_IDS', [])
|
||||||
|
ALLIANCE_IDS = getattr(settings, 'ALLIANCE_IDS', [])
|
||||||
|
[s.member_corporations.add(c.pk) for c in EveCorporationInfo.objects.filter(corporation_id__in=CORP_IDS)]
|
||||||
|
[s.member_alliances.add(a.pk) for a in EveAllianceInfo.objects.filter(alliance_id__in=ALLIANCE_IDS)]
|
||||||
|
|
||||||
|
|
||||||
|
def create_member_group(apps, schema_editor):
|
||||||
|
Group = apps.get_model('auth', 'Group')
|
||||||
|
State = apps.get_model('authentication', 'State')
|
||||||
|
member_state_name = getattr(settings, 'DEFAULT_AUTH_GROUP', 'Member')
|
||||||
|
|
||||||
|
try:
|
||||||
|
g, _ = Group.objects.get_or_create(name=member_state_name)
|
||||||
|
# move permissions back
|
||||||
|
state = State.objects.get(name=member_state_name)
|
||||||
|
[g.permissions.add(p.pk) for p in state.permissions.all()]
|
||||||
|
|
||||||
|
# move users back
|
||||||
|
for profile in state.userprofile_set.all().select_related('user'):
|
||||||
|
profile.user.groups.add(g.pk)
|
||||||
|
except State.DoesNotExist:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
def create_blue_state(apps, schema_editor):
|
||||||
|
Group = apps.get_model('auth', 'Group')
|
||||||
|
State = apps.get_model('authentication', 'State')
|
||||||
|
EveAllianceInfo = apps.get_model('eveonline', 'EveAllianceInfo')
|
||||||
|
EveCorporationInfo = apps.get_model('eveonline', 'EveCorporationInfo')
|
||||||
|
blue_state_name = getattr(settings, 'DEFAULT_BLUE_GROUP', 'Blue')
|
||||||
|
|
||||||
|
s = State.objects.update_or_create(name=blue_state_name, defaults={'priority': 50, 'public': False})[0]
|
||||||
|
try:
|
||||||
|
# move group permissions to state
|
||||||
|
g = Group.objects.get(name=blue_state_name)
|
||||||
|
[s.permissions.add(p.pk) for p in g.permissions.all()]
|
||||||
|
g.delete()
|
||||||
|
except Group.DoesNotExist:
|
||||||
|
pass
|
||||||
|
|
||||||
|
# auto-populate blue member IDs
|
||||||
|
BLUE_CORP_IDS = getattr(settings, 'BLUE_CORP_IDS', [])
|
||||||
|
BLUE_ALLIANCE_IDS = getattr(settings, 'BLUE_ALLIANCE_IDS', [])
|
||||||
|
[s.member_corporations.add(c.pk) for c in EveCorporationInfo.objects.filter(corporation_id__in=BLUE_CORP_IDS)]
|
||||||
|
[s.member_alliances.add(a.pk) for a in EveAllianceInfo.objects.filter(alliance_id__in=BLUE_ALLIANCE_IDS)]
|
||||||
|
|
||||||
|
|
||||||
|
def create_blue_group(apps, schema_editor):
|
||||||
|
Group = apps.get_model('auth', 'Group')
|
||||||
|
State = apps.get_model('authentication', 'State')
|
||||||
|
blue_state_name = getattr(settings, 'DEFAULT_BLUE_GROUP', 'Blue')
|
||||||
|
|
||||||
|
try:
|
||||||
|
g, _ = Group.objects.get_or_create(name=blue_state_name)
|
||||||
|
# move permissions back
|
||||||
|
state = State.objects.get(name=blue_state_name)
|
||||||
|
[g.permissions.add(p.pk) for p in state.permissions.all()]
|
||||||
|
|
||||||
|
# move users back
|
||||||
|
for profile in state.userprofile_set.all().select_related('user'):
|
||||||
|
profile.user.groups.add(g.pk)
|
||||||
|
except State.DoesNotExist:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
def purge_tokens(apps, schema_editor):
|
||||||
|
Token = apps.get_model('esi', 'Token')
|
||||||
|
Token.objects.filter(refresh_token__isnull=True).delete()
|
||||||
|
|
||||||
|
|
||||||
|
def populate_ownerships(apps, schema_editor):
|
||||||
|
Token = apps.get_model('esi', 'Token')
|
||||||
|
CharacterOwnership = apps.get_model('authentication', 'CharacterOwnership')
|
||||||
|
EveCharacter = apps.get_model('eveonline', 'EveCharacter')
|
||||||
|
|
||||||
|
unique_character_owners = [t['character_id'] for t in
|
||||||
|
Token.objects.all().values('character_id').annotate(n=models.Count('user')) if
|
||||||
|
t['n'] == 1 and EveCharacter.objects.filter(character_id=t['character_id']).exists()]
|
||||||
|
|
||||||
|
tokens = Token.objects.filter(character_id__in=unique_character_owners)
|
||||||
|
for c_id in unique_character_owners:
|
||||||
|
# find newest refreshable token and use it as basis for CharacterOwnership
|
||||||
|
ts = tokens.filter(character_id=c_id).exclude(refresh_token__isnull=True).order_by('created')
|
||||||
|
if ts.exists():
|
||||||
|
token = ts[0]
|
||||||
|
char = EveCharacter.objects.get(character_id=token.character_id)
|
||||||
|
CharacterOwnership.objects.create(user_id=token.user_id, character_id=char.id, owner_hash=token.character_owner_hash)
|
||||||
|
|
||||||
|
|
||||||
|
def create_profiles(apps, schema_editor):
|
||||||
|
AuthServicesInfo = apps.get_model('authentication', 'AuthServicesInfo')
|
||||||
|
State = apps.get_model('authentication', 'State')
|
||||||
|
UserProfile = apps.get_model('authentication', 'UserProfile')
|
||||||
|
EveCharacter = apps.get_model('eveonline', 'EveCharacter')
|
||||||
|
|
||||||
|
# grab AuthServicesInfo if they have a unique main_char_id and the EveCharacter exists
|
||||||
|
unique_mains = [auth['main_char_id'] for auth in
|
||||||
|
AuthServicesInfo.objects.exclude(main_char_id='').values('main_char_id').annotate(
|
||||||
|
n=models.Count('main_char_id')) if
|
||||||
|
auth['n'] == 1 and EveCharacter.objects.filter(character_id=auth['main_char_id']).exists()]
|
||||||
|
|
||||||
|
auths = AuthServicesInfo.objects.filter(main_char_id__in=unique_mains).select_related('user')
|
||||||
|
|
||||||
|
blue_state_name = getattr(settings, 'DEFAULT_BLUE_GROUP', 'Blue')
|
||||||
|
member_state_name = getattr(settings, 'DEFAULT_AUTH_GROUP', 'Member')
|
||||||
|
|
||||||
|
states = {
|
||||||
|
'Member': State.objects.get(name=member_state_name),
|
||||||
|
'Blue': State.objects.get(name=blue_state_name),
|
||||||
|
}
|
||||||
|
guest_state = State.objects.get(name='Guest')
|
||||||
|
|
||||||
|
for auth in auths:
|
||||||
|
# carry states and mains forward
|
||||||
|
state = states.get(auth.state, guest_state)
|
||||||
|
char = EveCharacter.objects.get(character_id=auth.main_char_id)
|
||||||
|
UserProfile.objects.create(user=auth.user, state=state, main_character=char)
|
||||||
|
for auth in AuthServicesInfo.objects.exclude(main_char_id__in=unique_mains).select_related('user'):
|
||||||
|
# prepare empty profiles
|
||||||
|
UserProfile.objects.create(user=auth.user, state=guest_state)
|
||||||
|
|
||||||
|
|
||||||
|
def recreate_authservicesinfo(apps, schema_editor):
|
||||||
|
AuthServicesInfo = apps.get_model('authentication', 'AuthServicesInfo')
|
||||||
|
UserProfile = apps.get_model('authentication', 'UserProfile')
|
||||||
|
User = apps.get_model('auth', 'User')
|
||||||
|
|
||||||
|
blue_state_name = getattr(settings, 'DEFAULT_BLUE_GROUP', 'Blue')
|
||||||
|
member_state_name = getattr(settings, 'DEFAULT_AUTH_GROUP', 'Member')
|
||||||
|
|
||||||
|
states = {
|
||||||
|
member_state_name: 'Member',
|
||||||
|
blue_state_name: 'Blue',
|
||||||
|
}
|
||||||
|
|
||||||
|
# recreate all missing AuthServicesInfo models
|
||||||
|
AuthServicesInfo.objects.bulk_create([AuthServicesInfo(user_id=u.pk) for u in User.objects.all()])
|
||||||
|
|
||||||
|
# repopulate main characters
|
||||||
|
for profile in UserProfile.objects.exclude(main_character__isnull=True).select_related('user', 'main_character'):
|
||||||
|
AuthServicesInfo.objects.update_or_create(user=profile.user, defaults={'main_char_id': profile.main_character.character_id})
|
||||||
|
|
||||||
|
# repopulate states we understand
|
||||||
|
for profile in UserProfile.objects.exclude(state__name='Guest').filter(
|
||||||
|
state__name__in=[member_state_name, blue_state_name]).select_related('user', 'state'):
|
||||||
|
AuthServicesInfo.objects.update_or_create(user=profile.user, defaults={'state': states[profile.state.name]})
|
||||||
|
|
||||||
|
|
||||||
|
def disable_passwords(apps, schema_editor):
|
||||||
|
User = apps.get_model('auth', 'User')
|
||||||
|
for u in User.objects.exclude(is_staff=True):
|
||||||
|
# remove passwords for non-staff users to prevent password-based authentication
|
||||||
|
# set_unusable_password is unavailable in migrations because :reasons:
|
||||||
|
u.password = make_password(None)
|
||||||
|
u.save()
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
dependencies = [
|
||||||
|
('auth', '0008_alter_user_username_max_length'),
|
||||||
|
migrations.swappable_dependency(settings.AUTH_USER_MODEL),
|
||||||
|
('eveonline', '0008_remove_apikeys'),
|
||||||
|
('authentication', '0014_fleetup_permission'),
|
||||||
|
('esi', '0001_initial'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='CharacterOwnership',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')),
|
||||||
|
('owner_hash', models.CharField(max_length=28, unique=True)),
|
||||||
|
('character', models.OneToOneField(on_delete=django.db.models.deletion.CASCADE, related_name='character_ownership', to='eveonline.EveCharacter')),
|
||||||
|
('user', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, related_name='character_ownerships', to=settings.AUTH_USER_MODEL)),
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
'default_permissions': ('change', 'delete'),
|
||||||
|
'ordering': ['user', 'character__character_name'],
|
||||||
|
},
|
||||||
|
),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='State',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')),
|
||||||
|
('name', models.CharField(max_length=20, unique=True)),
|
||||||
|
('priority', models.IntegerField(help_text='Users get assigned the state with the highest priority available to them.', unique=True)),
|
||||||
|
('public', models.BooleanField(default=False, help_text='Make this state available to any character.')),
|
||||||
|
('member_alliances', models.ManyToManyField(blank=True, help_text='Alliances to whose members this state is available.', to='eveonline.EveAllianceInfo')),
|
||||||
|
('member_characters', models.ManyToManyField(blank=True, help_text='Characters to which this state is available.', to='eveonline.EveCharacter')),
|
||||||
|
('member_corporations', models.ManyToManyField(blank=True, help_text='Corporations to whose members this state is available.', to='eveonline.EveCorporationInfo')),
|
||||||
|
('permissions', models.ManyToManyField(blank=True, to='auth.Permission')),
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
'ordering': ['-priority'],
|
||||||
|
},
|
||||||
|
),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='UserProfile',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')),
|
||||||
|
('main_character', models.OneToOneField(blank=True, null=True, on_delete=django.db.models.deletion.SET_NULL, to='eveonline.EveCharacter')),
|
||||||
|
('state', models.ForeignKey(default=allianceauth.authentication.models.get_guest_state_pk, on_delete=django.db.models.deletion.SET_DEFAULT, to='authentication.State')),
|
||||||
|
('user', models.OneToOneField(on_delete=django.db.models.deletion.CASCADE, related_name='profile', to=settings.AUTH_USER_MODEL)),
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
'default_permissions': ('change',),
|
||||||
|
},
|
||||||
|
),
|
||||||
|
migrations.RunPython(create_guest_state, migrations.RunPython.noop),
|
||||||
|
migrations.RunPython(create_member_state, create_member_group),
|
||||||
|
migrations.RunPython(create_blue_state, create_blue_group),
|
||||||
|
migrations.RunPython(purge_tokens, migrations.RunPython.noop),
|
||||||
|
migrations.RunPython(populate_ownerships, migrations.RunPython.noop),
|
||||||
|
migrations.RunPython(create_profiles, recreate_authservicesinfo),
|
||||||
|
migrations.RemoveField(
|
||||||
|
model_name='authservicesinfo',
|
||||||
|
name='user',
|
||||||
|
),
|
||||||
|
migrations.DeleteModel(
|
||||||
|
name='AuthServicesInfo',
|
||||||
|
),
|
||||||
|
migrations.RunPython(disable_passwords, migrations.RunPython.noop),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='Permission',
|
||||||
|
fields=[
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
'proxy': True,
|
||||||
|
'verbose_name': 'permission',
|
||||||
|
'verbose_name_plural': 'permissions',
|
||||||
|
},
|
||||||
|
bases=('auth.permission',),
|
||||||
|
managers=[
|
||||||
|
('objects', django.contrib.auth.models.PermissionManager()),
|
||||||
|
],
|
||||||
|
),
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='User',
|
||||||
|
fields=[
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
'proxy': True,
|
||||||
|
'verbose_name': 'user',
|
||||||
|
'verbose_name_plural': 'users',
|
||||||
|
},
|
||||||
|
bases=('auth.user',),
|
||||||
|
managers=[
|
||||||
|
('objects', django.contrib.auth.models.UserManager()),
|
||||||
|
],
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,40 @@
|
|||||||
|
# Generated by Django 2.0.4 on 2018-04-14 18:28
|
||||||
|
|
||||||
|
from django.conf import settings
|
||||||
|
from django.db import migrations, models
|
||||||
|
import django.db.models.deletion
|
||||||
|
|
||||||
|
|
||||||
|
def create_initial_records(apps, schema_editor):
|
||||||
|
OwnershipRecord = apps.get_model('authentication', 'OwnershipRecord')
|
||||||
|
CharacterOwnership = apps.get_model('authentication', 'CharacterOwnership')
|
||||||
|
|
||||||
|
OwnershipRecord.objects.bulk_create([
|
||||||
|
OwnershipRecord(user=o.user, character=o.character, owner_hash=o.owner_hash) for o in CharacterOwnership.objects.all()
|
||||||
|
])
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
migrations.swappable_dependency(settings.AUTH_USER_MODEL),
|
||||||
|
('eveonline', '0009_on_delete'),
|
||||||
|
('authentication', '0015_user_profiles'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.CreateModel(
|
||||||
|
name='OwnershipRecord',
|
||||||
|
fields=[
|
||||||
|
('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')),
|
||||||
|
('owner_hash', models.CharField(db_index=True, max_length=28)),
|
||||||
|
('created', models.DateTimeField(auto_now=True)),
|
||||||
|
('character', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, related_name='ownership_records', to='eveonline.EveCharacter')),
|
||||||
|
('user', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, related_name='ownership_records', to=settings.AUTH_USER_MODEL)),
|
||||||
|
],
|
||||||
|
options={
|
||||||
|
'ordering': ['-created'],
|
||||||
|
},
|
||||||
|
),
|
||||||
|
migrations.RunPython(create_initial_records, migrations.RunPython.noop)
|
||||||
|
]
|
@ -0,0 +1,20 @@
|
|||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
def remove_permission(apps, schema_editor):
|
||||||
|
User = apps.get_model('auth', 'User')
|
||||||
|
ContentType = apps.get_model('contenttypes', 'ContentType')
|
||||||
|
Permission = apps.get_model('auth', 'Permission')
|
||||||
|
ct = ContentType.objects.get_for_model(User)
|
||||||
|
Permission.objects.filter(codename="view_fleetup", content_type=ct, name="view_fleetup").delete()
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0016_ownershiprecord'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.RunPython(remove_permission, migrations.RunPython.noop)
|
||||||
|
]
|
@ -0,0 +1,18 @@
|
|||||||
|
# Generated by Django 3.2.8 on 2021-10-20 05:22
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0017_remove_fleetup_permission'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name='state',
|
||||||
|
name='name',
|
||||||
|
field=models.CharField(max_length=32, unique=True),
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,19 @@
|
|||||||
|
# Generated by Django 3.1.13 on 2021-10-12 20:21
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('eveonline', '0015_factions'),
|
||||||
|
('authentication', '0017_remove_fleetup_permission'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AddField(
|
||||||
|
model_name='state',
|
||||||
|
name='member_factions',
|
||||||
|
field=models.ManyToManyField(blank=True, help_text='Factions to whose members this state is available.', to='eveonline.EveFactionInfo'),
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,14 @@
|
|||||||
|
# Generated by Django 3.2.8 on 2021-10-26 09:19
|
||||||
|
|
||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0018_alter_state_name_length'),
|
||||||
|
('authentication', '0018_state_member_factions'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
]
|
@ -0,0 +1,23 @@
|
|||||||
|
# Generated by Django 4.0.2 on 2022-02-26 03:45
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0019_merge_20211026_0919'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AddField(
|
||||||
|
model_name='userprofile',
|
||||||
|
name='language',
|
||||||
|
field=models.CharField(blank=True, choices=[('en', 'English'), ('de', 'German'), ('es', 'Spanish'), ('zh-hans', 'Chinese Simplified'), ('ru', 'Russian'), ('ko', 'Korean'), ('fr', 'French'), ('ja', 'Japanese'), ('it', 'Italian')], default='', max_length=10, verbose_name='Language'),
|
||||||
|
),
|
||||||
|
migrations.AddField(
|
||||||
|
model_name='userprofile',
|
||||||
|
name='night_mode',
|
||||||
|
field=models.BooleanField(blank=True, null=True, verbose_name='Night Mode'),
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,34 @@
|
|||||||
|
# Generated by Django 4.0.10 on 2023-05-28 15:36
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
dependencies = [
|
||||||
|
("authentication", "0020_userprofile_language_userprofile_night_mode"),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name="userprofile",
|
||||||
|
name="language",
|
||||||
|
field=models.CharField(
|
||||||
|
blank=True,
|
||||||
|
choices=[
|
||||||
|
("en", "English"),
|
||||||
|
("de", "German"),
|
||||||
|
("es", "Spanish"),
|
||||||
|
("zh-hans", "Chinese Simplified"),
|
||||||
|
("ru", "Russian"),
|
||||||
|
("ko", "Korean"),
|
||||||
|
("fr", "French"),
|
||||||
|
("ja", "Japanese"),
|
||||||
|
("it", "Italian"),
|
||||||
|
("uk", "Ukrainian"),
|
||||||
|
],
|
||||||
|
default="",
|
||||||
|
max_length=10,
|
||||||
|
verbose_name="Language",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,18 @@
|
|||||||
|
# Generated by Django 4.0.10 on 2023-10-07 07:59
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0021_alter_userprofile_language'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AddField(
|
||||||
|
model_name='userprofile',
|
||||||
|
name='theme',
|
||||||
|
field=models.CharField(blank=True, help_text='Bootstrap 5 Themes from https://bootswatch.com/ or Community Apps', max_length=200, null=True, verbose_name='Theme'),
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,18 @@
|
|||||||
|
# Generated by Django 4.2.13 on 2024-05-12 09:44
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0022_userprofile_theme'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name='userprofile',
|
||||||
|
name='language',
|
||||||
|
field=models.CharField(blank=True, choices=[('en', 'English'), ('de', 'German'), ('es', 'Spanish'), ('zh-hans', 'Chinese Simplified'), ('ru', 'Russian'), ('ko', 'Korean'), ('fr', 'French'), ('ja', 'Japanese'), ('it', 'Italian'), ('uk', 'Ukrainian'), ('pl', 'Polish')], default='', max_length=10, verbose_name='Language'),
|
||||||
|
),
|
||||||
|
]
|
@ -0,0 +1,18 @@
|
|||||||
|
# Generated by Django 4.2 on 2024-09-13 09:46
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('authentication', '0023_alter_userprofile_language'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name='userprofile',
|
||||||
|
name='language',
|
||||||
|
field=models.CharField(blank=True, choices=[('en', 'English'), ('cs-cz', 'Czech'), ('de', 'German'), ('es', 'Spanish'), ('it-it', 'Italian'), ('ja', 'Japanese'), ('ko-kr', 'Korean'), ('fr-fr', 'French'), ('ru', 'Russian'), ('nl-nl', 'Dutch'), ('pl-pl', 'Polish'), ('uk', 'Ukrainian'), ('zh-hans', 'Simplified Chinese')], default='', max_length=10, verbose_name='Language'),
|
||||||
|
),
|
||||||
|
]
|
170
allianceauth/authentication/models.py
Normal file
170
allianceauth/authentication/models.py
Normal file
@ -0,0 +1,170 @@
|
|||||||
|
import logging
|
||||||
|
from typing import ClassVar
|
||||||
|
|
||||||
|
from django.contrib.auth.models import User, Permission
|
||||||
|
from django.db import models, transaction
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
from allianceauth.eveonline.models import EveCharacter, EveCorporationInfo, EveAllianceInfo, EveFactionInfo
|
||||||
|
from allianceauth.notifications import notify
|
||||||
|
from django.conf import settings
|
||||||
|
|
||||||
|
from .managers import CharacterOwnershipManager, StateManager
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class State(models.Model):
|
||||||
|
name = models.CharField(max_length=32, unique=True)
|
||||||
|
permissions = models.ManyToManyField(Permission, blank=True)
|
||||||
|
priority = models.IntegerField(unique=True, help_text="Users get assigned the state with the highest priority available to them.")
|
||||||
|
|
||||||
|
member_characters = models.ManyToManyField(EveCharacter, blank=True,
|
||||||
|
help_text="Characters to which this state is available.")
|
||||||
|
member_corporations = models.ManyToManyField(EveCorporationInfo, blank=True,
|
||||||
|
help_text="Corporations to whose members this state is available.")
|
||||||
|
member_alliances = models.ManyToManyField(EveAllianceInfo, blank=True,
|
||||||
|
help_text="Alliances to whose members this state is available.")
|
||||||
|
member_factions = models.ManyToManyField(EveFactionInfo, blank=True,
|
||||||
|
help_text="Factions to whose members this state is available.")
|
||||||
|
public = models.BooleanField(default=False, help_text="Make this state available to any character.")
|
||||||
|
|
||||||
|
objects: ClassVar[StateManager] = StateManager()
|
||||||
|
|
||||||
|
class Meta:
|
||||||
|
ordering = ['-priority']
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return self.name
|
||||||
|
|
||||||
|
def available_to_character(self, character):
|
||||||
|
return self in State.objects.available_to_character(character)
|
||||||
|
|
||||||
|
def available_to_user(self, user):
|
||||||
|
return self in State.objects.available_to_user(user)
|
||||||
|
|
||||||
|
def delete(self, **kwargs):
|
||||||
|
with transaction.atomic():
|
||||||
|
for profile in self.userprofile_set.all():
|
||||||
|
profile.assign_state(state=State.objects.exclude(pk=self.pk).get_for_user(profile.user))
|
||||||
|
super().delete(**kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
def get_guest_state():
|
||||||
|
try:
|
||||||
|
return State.objects.get(name='Guest')
|
||||||
|
except State.DoesNotExist:
|
||||||
|
return State.objects.create(name='Guest', priority=0, public=True)
|
||||||
|
|
||||||
|
|
||||||
|
def get_guest_state_pk():
|
||||||
|
return get_guest_state().pk
|
||||||
|
|
||||||
|
|
||||||
|
class UserProfile(models.Model):
|
||||||
|
class Meta:
|
||||||
|
default_permissions = ('change',)
|
||||||
|
|
||||||
|
class Language(models.TextChoices):
|
||||||
|
"""
|
||||||
|
Choices for UserProfile.language
|
||||||
|
"""
|
||||||
|
# Sorted by Language Code alphabetical order + English at top
|
||||||
|
ENGLISH = 'en', _('English')
|
||||||
|
CZECH = 'cs-cz', _("Czech") # Not yet at 50% translated
|
||||||
|
GERMAN = 'de', _('German')
|
||||||
|
SPANISH = 'es', _('Spanish')
|
||||||
|
ITALIAN = 'it-it', _('Italian')
|
||||||
|
JAPANESE = 'ja', _('Japanese')
|
||||||
|
KOREAN = 'ko-kr', _('Korean')
|
||||||
|
FRENCH = 'fr-fr', _('French')
|
||||||
|
RUSSIAN = 'ru', _('Russian')
|
||||||
|
DUTCH = 'nl-nl', _("Dutch")
|
||||||
|
POLISH = 'pl-pl', _("Polish")
|
||||||
|
UKRAINIAN = 'uk', _('Ukrainian')
|
||||||
|
CHINESE = 'zh-hans', _('Simplified Chinese')
|
||||||
|
|
||||||
|
user = models.OneToOneField(
|
||||||
|
User,
|
||||||
|
related_name='profile',
|
||||||
|
on_delete=models.CASCADE)
|
||||||
|
main_character = models.OneToOneField(
|
||||||
|
EveCharacter,
|
||||||
|
blank=True,
|
||||||
|
null=True,
|
||||||
|
on_delete=models.SET_NULL)
|
||||||
|
state = models.ForeignKey(
|
||||||
|
State,
|
||||||
|
on_delete=models.SET_DEFAULT,
|
||||||
|
default=get_guest_state_pk)
|
||||||
|
language = models.CharField(
|
||||||
|
_("Language"), max_length=10,
|
||||||
|
choices=Language.choices,
|
||||||
|
blank=True,
|
||||||
|
default='')
|
||||||
|
night_mode = models.BooleanField(
|
||||||
|
_("Night Mode"),
|
||||||
|
blank=True,
|
||||||
|
null=True)
|
||||||
|
theme = models.CharField(
|
||||||
|
_("Theme"),
|
||||||
|
max_length=200,
|
||||||
|
blank=True,
|
||||||
|
null=True,
|
||||||
|
help_text="Bootstrap 5 Themes from https://bootswatch.com/ or Community Apps"
|
||||||
|
)
|
||||||
|
|
||||||
|
def assign_state(self, state=None, commit=True):
|
||||||
|
if not state:
|
||||||
|
state = State.objects.get_for_user(self.user)
|
||||||
|
if self.state != state:
|
||||||
|
self.state = state
|
||||||
|
if commit:
|
||||||
|
logger.info(f'Updating {self.user} state to {self.state}')
|
||||||
|
self.save(update_fields=['state'])
|
||||||
|
notify(
|
||||||
|
self.user,
|
||||||
|
_('State changed to: %s' % state),
|
||||||
|
_('Your user\'s state is now: %(state)s')
|
||||||
|
% ({'state': state}),
|
||||||
|
'info'
|
||||||
|
)
|
||||||
|
from allianceauth.authentication.signals import state_changed
|
||||||
|
|
||||||
|
# We need to ensure we get up to date perms here as they will have just changed.
|
||||||
|
# Clear all attribute caches and reload the model that will get passed to the signals!
|
||||||
|
self.refresh_from_db()
|
||||||
|
|
||||||
|
state_changed.send(
|
||||||
|
sender=self.__class__, user=self.user, state=self.state
|
||||||
|
)
|
||||||
|
|
||||||
|
def __str__(self) -> str:
|
||||||
|
return str(self.user)
|
||||||
|
|
||||||
|
|
||||||
|
class CharacterOwnership(models.Model):
|
||||||
|
class Meta:
|
||||||
|
default_permissions = ('change', 'delete')
|
||||||
|
ordering = ['user', 'character__character_name']
|
||||||
|
|
||||||
|
character = models.OneToOneField(EveCharacter, on_delete=models.CASCADE, related_name='character_ownership')
|
||||||
|
owner_hash = models.CharField(max_length=28, unique=True)
|
||||||
|
user = models.ForeignKey(User, on_delete=models.CASCADE, related_name='character_ownerships')
|
||||||
|
|
||||||
|
objects: ClassVar[CharacterOwnershipManager] = CharacterOwnershipManager()
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return f"{self.user}: {self.character}"
|
||||||
|
|
||||||
|
|
||||||
|
class OwnershipRecord(models.Model):
|
||||||
|
character = models.ForeignKey(EveCharacter, on_delete=models.CASCADE, related_name='ownership_records')
|
||||||
|
owner_hash = models.CharField(max_length=28, db_index=True)
|
||||||
|
user = models.ForeignKey(User, on_delete=models.CASCADE, related_name='ownership_records')
|
||||||
|
created = models.DateTimeField(auto_now=True)
|
||||||
|
|
||||||
|
class Meta:
|
||||||
|
ordering = ['-created']
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return f"{self.user}: {self.character} on {self.created}"
|
164
allianceauth/authentication/signals.py
Normal file
164
allianceauth/authentication/signals.py
Normal file
@ -0,0 +1,164 @@
|
|||||||
|
import logging
|
||||||
|
|
||||||
|
from .models import (
|
||||||
|
CharacterOwnership,
|
||||||
|
UserProfile,
|
||||||
|
get_guest_state,
|
||||||
|
State,
|
||||||
|
OwnershipRecord)
|
||||||
|
from django.contrib.auth.models import User
|
||||||
|
from django.db.models import Q
|
||||||
|
from django.db.models.signals import pre_save, post_save, pre_delete, post_delete, m2m_changed
|
||||||
|
from django.dispatch import receiver, Signal
|
||||||
|
from esi.models import Token
|
||||||
|
|
||||||
|
from allianceauth.eveonline.models import EveCharacter
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
state_changed = Signal()
|
||||||
|
|
||||||
|
|
||||||
|
def trigger_state_check(state):
|
||||||
|
# evaluate all current members to ensure they still have access
|
||||||
|
for profile in state.userprofile_set.all():
|
||||||
|
profile.assign_state()
|
||||||
|
|
||||||
|
# we may now be available to others with lower states
|
||||||
|
check_states = State.objects.filter(priority__lt=state.priority)
|
||||||
|
for profile in UserProfile.objects.filter(state__in=check_states):
|
||||||
|
if state.available_to_user(profile.user):
|
||||||
|
profile.assign_state(state)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(m2m_changed, sender=State.member_characters.through)
|
||||||
|
def state_member_characters_changed(sender, instance, action, *args, **kwargs):
|
||||||
|
if action.startswith('post_'):
|
||||||
|
logger.debug(f'State {instance} member characters changed. Re-evaluating membership.')
|
||||||
|
trigger_state_check(instance)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(m2m_changed, sender=State.member_corporations.through)
|
||||||
|
def state_member_corporations_changed(sender, instance, action, *args, **kwargs):
|
||||||
|
if action.startswith('post_'):
|
||||||
|
logger.debug(f'State {instance} member corporations changed. Re-evaluating membership.')
|
||||||
|
trigger_state_check(instance)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(m2m_changed, sender=State.member_alliances.through)
|
||||||
|
def state_member_alliances_changed(sender, instance, action, *args, **kwargs):
|
||||||
|
if action.startswith('post_'):
|
||||||
|
logger.debug(f'State {instance} member alliances changed. Re-evaluating membership.')
|
||||||
|
trigger_state_check(instance)
|
||||||
|
|
||||||
|
@receiver(m2m_changed, sender=State.member_factions.through)
|
||||||
|
def state_member_factions_changed(sender, instance, action, *args, **kwargs):
|
||||||
|
if action.startswith('post_'):
|
||||||
|
logger.debug(f'State {instance} member factions changed. Re-evaluating membership.')
|
||||||
|
trigger_state_check(instance)
|
||||||
|
|
||||||
|
@receiver(post_save, sender=State)
|
||||||
|
def state_saved(sender, instance, *args, **kwargs):
|
||||||
|
logger.debug(f'State {instance} saved. Re-evaluating membership.')
|
||||||
|
trigger_state_check(instance)
|
||||||
|
|
||||||
|
|
||||||
|
# Is there a smarter way to intercept pre_save with a diff main_character or state?
|
||||||
|
@receiver(post_save, sender=UserProfile)
|
||||||
|
def reassess_on_profile_save(sender, instance, created, *args, **kwargs):
|
||||||
|
# catches post_save from profiles to trigger necessary service and state checks
|
||||||
|
if not created:
|
||||||
|
update_fields = kwargs.pop('update_fields', []) or []
|
||||||
|
if 'state' not in update_fields:
|
||||||
|
logger.debug(f'Profile for {instance.user} saved without state change. Re-evaluating state.')
|
||||||
|
instance.assign_state()
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(post_save, sender=User)
|
||||||
|
def create_required_models(sender, instance, created, *args, **kwargs):
|
||||||
|
# ensure all users have our Sub-Models
|
||||||
|
if created:
|
||||||
|
logger.debug(f'User {instance} created. Creating default UserProfile.')
|
||||||
|
UserProfile.objects.get_or_create(user=instance)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(post_save, sender=Token)
|
||||||
|
def record_character_ownership(sender, instance, created, *args, **kwargs):
|
||||||
|
if created:
|
||||||
|
logger.debug(f'New token for {instance.user} character {instance.character_name} saved. Evaluating ownership.')
|
||||||
|
if instance.user:
|
||||||
|
query = Q(owner_hash=instance.character_owner_hash) & Q(user=instance.user)
|
||||||
|
else:
|
||||||
|
query = Q(owner_hash=instance.character_owner_hash)
|
||||||
|
# purge ownership records if the hash or auth user account has changed
|
||||||
|
CharacterOwnership.objects.filter(character__character_id=instance.character_id).exclude(query).delete()
|
||||||
|
# create character if needed
|
||||||
|
if EveCharacter.objects.filter(character_id=instance.character_id).exists() is False:
|
||||||
|
logger.debug(f'Token is for a new character. Creating model for {instance.character_name} ({instance.character_id})')
|
||||||
|
EveCharacter.objects.create_character(instance.character_id)
|
||||||
|
char = EveCharacter.objects.get(character_id=instance.character_id)
|
||||||
|
# check if we need to create ownership
|
||||||
|
if instance.user and not CharacterOwnership.objects.filter(
|
||||||
|
character__character_id=instance.character_id).exists():
|
||||||
|
logger.debug(f"Character {instance.character_name} is not yet owned. Assigning ownership to {instance.user}")
|
||||||
|
CharacterOwnership.objects.update_or_create(character=char, defaults={'owner_hash': instance.character_owner_hash, 'user': instance.user})
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(pre_delete, sender=CharacterOwnership)
|
||||||
|
def validate_main_character(sender, instance, *args, **kwargs):
|
||||||
|
try:
|
||||||
|
if instance.user.profile.main_character == instance.character:
|
||||||
|
logger.info("Ownership of a main character {} has been revoked. Resetting {} main character.".format(
|
||||||
|
instance.character, instance.user))
|
||||||
|
# clear main character as user no longer owns them
|
||||||
|
instance.user.profile.main_character = None
|
||||||
|
instance.user.profile.save()
|
||||||
|
except UserProfile.DoesNotExist:
|
||||||
|
# a user is being deleted
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(post_delete, sender=Token)
|
||||||
|
def validate_ownership(sender, instance, *args, **kwargs):
|
||||||
|
if not Token.objects.filter(character_owner_hash=instance.character_owner_hash).filter(refresh_token__isnull=False).exists():
|
||||||
|
logger.info(f"No remaining tokens to validate ownership of character {instance.character_name}. Revoking ownership.")
|
||||||
|
CharacterOwnership.objects.filter(owner_hash=instance.character_owner_hash).delete()
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(pre_save, sender=User)
|
||||||
|
def assign_state_on_active_change(sender, instance, *args, **kwargs):
|
||||||
|
# set to guest state if inactive, assign proper state if reactivated
|
||||||
|
if instance.pk:
|
||||||
|
old_instance = User.objects.get(pk=instance.pk)
|
||||||
|
if old_instance.is_active != instance.is_active:
|
||||||
|
if instance.is_active:
|
||||||
|
logger.debug(f"User {instance} has been activated. Assigning state.")
|
||||||
|
instance.profile.assign_state()
|
||||||
|
else:
|
||||||
|
logger.debug(
|
||||||
|
f"User {instance} has been deactivated. Revoking state and assigning to guest state.")
|
||||||
|
instance.profile.state = get_guest_state()
|
||||||
|
instance.profile.save(update_fields=['state'])
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(post_save, sender=EveCharacter)
|
||||||
|
def check_state_on_character_update(sender, instance, *args, **kwargs):
|
||||||
|
# if this is a main character updating, check that user's state
|
||||||
|
try:
|
||||||
|
logger.debug(f"Character {instance} has been saved. Assessing owner's state for changes.")
|
||||||
|
instance.userprofile.assign_state()
|
||||||
|
except UserProfile.DoesNotExist:
|
||||||
|
logger.debug(f"Character {instance} is not a main character. No state assessment required.")
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(post_save, sender=CharacterOwnership)
|
||||||
|
def ownership_record_creation(sender, instance, created, *args, **kwargs):
|
||||||
|
if created:
|
||||||
|
records = OwnershipRecord.objects.filter(owner_hash=instance.owner_hash).filter(character=instance.character)
|
||||||
|
if records.exists():
|
||||||
|
if records[0].user == instance.user: # most recent record is sorted first
|
||||||
|
logger.debug(f"Already have ownership record of {instance.character} by user {instance.user}")
|
||||||
|
return
|
||||||
|
logger.info(f"Character {instance.character} has a new owner {instance.user}. Creating ownership record.")
|
||||||
|
OwnershipRecord.objects.create(user=instance.user, character=instance.character, owner_hash=instance.owner_hash)
|
@ -0,0 +1,31 @@
|
|||||||
|
/*
|
||||||
|
CSS for allianceauth admin site
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* styling for profile pic */
|
||||||
|
.img-circle {
|
||||||
|
border-radius: 50%;
|
||||||
|
}
|
||||||
|
|
||||||
|
.column-user_profile_pic {
|
||||||
|
white-space: nowrap;
|
||||||
|
width: 1px;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* tooltip */
|
||||||
|
.tooltip {
|
||||||
|
position: relative;
|
||||||
|
}
|
||||||
|
|
||||||
|
.tooltip:hover::after {
|
||||||
|
background-color: rgb(255 255 204);
|
||||||
|
border: 1px rgb(128 128 128) solid;
|
||||||
|
color: rgb(0 0 0);
|
||||||
|
content: attr(data-tooltip);
|
||||||
|
left: 1em;
|
||||||
|
min-width: 200px;
|
||||||
|
padding: 8px;
|
||||||
|
position: absolute;
|
||||||
|
top: 1.1em;
|
||||||
|
z-index: 1;
|
||||||
|
}
|
Binary file not shown.
After Width: | Height: | Size: 158 KiB |
Before Width: | Height: | Size: 2.3 KiB After Width: | Height: | Size: 2.3 KiB |
Before Width: | Height: | Size: 2.2 KiB After Width: | Height: | Size: 2.2 KiB |
45
allianceauth/authentication/task_statistics/counters.py
Normal file
45
allianceauth/authentication/task_statistics/counters.py
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
"""Counters for Task Statistics."""
|
||||||
|
|
||||||
|
import datetime as dt
|
||||||
|
from typing import NamedTuple, Optional
|
||||||
|
|
||||||
|
from .event_series import EventSeries
|
||||||
|
|
||||||
|
# Global series for counting task events.
|
||||||
|
succeeded_tasks = EventSeries("SUCCEEDED_TASKS")
|
||||||
|
retried_tasks = EventSeries("RETRIED_TASKS")
|
||||||
|
failed_tasks = EventSeries("FAILED_TASKS")
|
||||||
|
|
||||||
|
|
||||||
|
class _TaskCounts(NamedTuple):
|
||||||
|
succeeded: int
|
||||||
|
retried: int
|
||||||
|
failed: int
|
||||||
|
total: int
|
||||||
|
earliest_task: Optional[dt.datetime]
|
||||||
|
hours: int
|
||||||
|
|
||||||
|
|
||||||
|
def dashboard_results(hours: int) -> _TaskCounts:
|
||||||
|
"""Counts of all task events within the given time frame."""
|
||||||
|
|
||||||
|
def earliest_if_exists(events: EventSeries, earliest: dt.datetime) -> list:
|
||||||
|
my_earliest = events.first_event(earliest=earliest)
|
||||||
|
return [my_earliest] if my_earliest else []
|
||||||
|
|
||||||
|
earliest = dt.datetime.utcnow() - dt.timedelta(hours=hours)
|
||||||
|
earliest_events = []
|
||||||
|
succeeded_count = succeeded_tasks.count(earliest=earliest)
|
||||||
|
earliest_events += earliest_if_exists(succeeded_tasks, earliest)
|
||||||
|
retried_count = retried_tasks.count(earliest=earliest)
|
||||||
|
earliest_events += earliest_if_exists(retried_tasks, earliest)
|
||||||
|
failed_count = failed_tasks.count(earliest=earliest)
|
||||||
|
earliest_events += earliest_if_exists(failed_tasks, earliest)
|
||||||
|
return _TaskCounts(
|
||||||
|
succeeded=succeeded_count,
|
||||||
|
retried=retried_count,
|
||||||
|
failed=failed_count,
|
||||||
|
total=succeeded_count + retried_count + failed_count,
|
||||||
|
earliest_task=min(earliest_events) if earliest_events else None,
|
||||||
|
hours=hours,
|
||||||
|
)
|
100
allianceauth/authentication/task_statistics/event_series.py
Normal file
100
allianceauth/authentication/task_statistics/event_series.py
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
"""Event series for Task Statistics."""
|
||||||
|
|
||||||
|
import datetime as dt
|
||||||
|
import logging
|
||||||
|
from typing import List, Optional
|
||||||
|
|
||||||
|
from pytz import utc
|
||||||
|
from redis import Redis
|
||||||
|
|
||||||
|
from .helpers import get_redis_client_or_stub
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class EventSeries:
|
||||||
|
"""API for recording and analyzing a series of events."""
|
||||||
|
|
||||||
|
_ROOT_KEY = "ALLIANCEAUTH_EVENT_SERIES"
|
||||||
|
|
||||||
|
def __init__(self, key_id: str, redis: Optional[Redis] = None) -> None:
|
||||||
|
self._redis = get_redis_client_or_stub() if not redis else redis
|
||||||
|
self._key_id = str(key_id)
|
||||||
|
self.clear()
|
||||||
|
|
||||||
|
@property
|
||||||
|
def is_disabled(self):
|
||||||
|
"""True when this object is disabled, e.g. Redis was not available at startup."""
|
||||||
|
return hasattr(self._redis, "IS_STUB")
|
||||||
|
|
||||||
|
@property
|
||||||
|
def _key_counter(self):
|
||||||
|
return f"{self._ROOT_KEY}_{self._key_id}_COUNTER"
|
||||||
|
|
||||||
|
@property
|
||||||
|
def _key_sorted_set(self):
|
||||||
|
return f"{self._ROOT_KEY}_{self._key_id}_SORTED_SET"
|
||||||
|
|
||||||
|
def add(self, event_time: dt.datetime = None) -> None:
|
||||||
|
"""Add event.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
- event_time: timestamp of event. Will use current time if not specified.
|
||||||
|
"""
|
||||||
|
if not event_time:
|
||||||
|
event_time = dt.datetime.utcnow()
|
||||||
|
my_id = self._redis.incr(self._key_counter)
|
||||||
|
self._redis.zadd(self._key_sorted_set, {my_id: event_time.timestamp()})
|
||||||
|
|
||||||
|
def all(self) -> List[dt.datetime]:
|
||||||
|
"""List of all known events."""
|
||||||
|
return [
|
||||||
|
event[1]
|
||||||
|
for event in self._redis.zrangebyscore(
|
||||||
|
self._key_sorted_set,
|
||||||
|
"-inf",
|
||||||
|
"+inf",
|
||||||
|
withscores=True,
|
||||||
|
score_cast_func=self._cast_scores_to_dt,
|
||||||
|
)
|
||||||
|
]
|
||||||
|
|
||||||
|
def clear(self) -> None:
|
||||||
|
"""Clear all events."""
|
||||||
|
self._redis.delete(self._key_sorted_set)
|
||||||
|
self._redis.delete(self._key_counter)
|
||||||
|
|
||||||
|
def count(self, earliest: dt.datetime = None, latest: dt.datetime = None) -> int:
|
||||||
|
"""Count of events, can be restricted to given time frame.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
- earliest: Date of first events to count(inclusive), or -infinite if not specified
|
||||||
|
- latest: Date of last events to count(inclusive), or +infinite if not specified
|
||||||
|
"""
|
||||||
|
minimum = "-inf" if not earliest else earliest.timestamp()
|
||||||
|
maximum = "+inf" if not latest else latest.timestamp()
|
||||||
|
return self._redis.zcount(self._key_sorted_set, min=minimum, max=maximum)
|
||||||
|
|
||||||
|
def first_event(self, earliest: dt.datetime = None) -> Optional[dt.datetime]:
|
||||||
|
"""Date/Time of first event. Returns `None` if series has no events.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
- earliest: Date of first events to count(inclusive), or any if not specified
|
||||||
|
"""
|
||||||
|
minimum = "-inf" if not earliest else earliest.timestamp()
|
||||||
|
event = self._redis.zrangebyscore(
|
||||||
|
self._key_sorted_set,
|
||||||
|
minimum,
|
||||||
|
"+inf",
|
||||||
|
withscores=True,
|
||||||
|
start=0,
|
||||||
|
num=1,
|
||||||
|
score_cast_func=self._cast_scores_to_dt,
|
||||||
|
)
|
||||||
|
if not event:
|
||||||
|
return None
|
||||||
|
return event[0][1]
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def _cast_scores_to_dt(score) -> dt.datetime:
|
||||||
|
return dt.datetime.fromtimestamp(float(score), tz=utc)
|
49
allianceauth/authentication/task_statistics/helpers.py
Normal file
49
allianceauth/authentication/task_statistics/helpers.py
Normal file
@ -0,0 +1,49 @@
|
|||||||
|
"""Helpers for Task Statistics."""
|
||||||
|
|
||||||
|
import logging
|
||||||
|
|
||||||
|
from redis import Redis, RedisError
|
||||||
|
|
||||||
|
from allianceauth.utils.cache import get_redis_client
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class _RedisStub:
|
||||||
|
"""Stub of a Redis client.
|
||||||
|
|
||||||
|
It's purpose is to prevent EventSeries objects from trying to access Redis
|
||||||
|
when it is not available. e.g. when the Sphinx docs are rendered by readthedocs.org.
|
||||||
|
"""
|
||||||
|
|
||||||
|
IS_STUB = True
|
||||||
|
|
||||||
|
def delete(self, *args, **kwargs):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def incr(self, *args, **kwargs):
|
||||||
|
return 0
|
||||||
|
|
||||||
|
def zadd(self, *args, **kwargs):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def zcount(self, *args, **kwargs):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def zrangebyscore(self, *args, **kwargs):
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
def get_redis_client_or_stub() -> Redis:
|
||||||
|
"""Return AA's default cache client or a stub if Redis is not available."""
|
||||||
|
redis = get_redis_client()
|
||||||
|
try:
|
||||||
|
if not redis.ping():
|
||||||
|
raise RuntimeError()
|
||||||
|
except (AttributeError, RedisError, RuntimeError):
|
||||||
|
logger.exception(
|
||||||
|
"Failed to establish a connection with Redis. "
|
||||||
|
"This EventSeries object is disabled.",
|
||||||
|
)
|
||||||
|
return _RedisStub()
|
||||||
|
return redis
|
53
allianceauth/authentication/task_statistics/signals.py
Normal file
53
allianceauth/authentication/task_statistics/signals.py
Normal file
@ -0,0 +1,53 @@
|
|||||||
|
"""Signals for Task Statistics."""
|
||||||
|
|
||||||
|
from celery.signals import (
|
||||||
|
task_failure, task_internal_error, task_retry, task_success, worker_ready,
|
||||||
|
)
|
||||||
|
|
||||||
|
from django.conf import settings
|
||||||
|
|
||||||
|
from .counters import failed_tasks, retried_tasks, succeeded_tasks
|
||||||
|
|
||||||
|
|
||||||
|
def reset_counters():
|
||||||
|
"""Reset all counters for the celery status."""
|
||||||
|
succeeded_tasks.clear()
|
||||||
|
failed_tasks.clear()
|
||||||
|
retried_tasks.clear()
|
||||||
|
|
||||||
|
|
||||||
|
def is_enabled() -> bool:
|
||||||
|
"""Return True if task statistics are enabled, else return False."""
|
||||||
|
return not bool(
|
||||||
|
getattr(settings, "ALLIANCEAUTH_DASHBOARD_TASK_STATISTICS_DISABLED", False)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@worker_ready.connect
|
||||||
|
def reset_counters_when_celery_restarted(*args, **kwargs):
|
||||||
|
if is_enabled():
|
||||||
|
reset_counters()
|
||||||
|
|
||||||
|
|
||||||
|
@task_success.connect
|
||||||
|
def record_task_succeeded(*args, **kwargs):
|
||||||
|
if is_enabled():
|
||||||
|
succeeded_tasks.add()
|
||||||
|
|
||||||
|
|
||||||
|
@task_retry.connect
|
||||||
|
def record_task_retried(*args, **kwargs):
|
||||||
|
if is_enabled():
|
||||||
|
retried_tasks.add()
|
||||||
|
|
||||||
|
|
||||||
|
@task_failure.connect
|
||||||
|
def record_task_failed(*args, **kwargs):
|
||||||
|
if is_enabled():
|
||||||
|
failed_tasks.add()
|
||||||
|
|
||||||
|
|
||||||
|
@task_internal_error.connect
|
||||||
|
def record_task_internal_error(*args, **kwargs):
|
||||||
|
if is_enabled():
|
||||||
|
failed_tasks.add()
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user