mirror of
https://gitlab.com/allianceauth/allianceauth.git
synced 2025-07-10 13:00:16 +02:00
961 lines
49 KiB
Python
Executable File
961 lines
49 KiB
Python
Executable File
from django.template import RequestContext
|
|
from django.shortcuts import HttpResponseRedirect
|
|
from django.shortcuts import render_to_response
|
|
from django.contrib.auth.decorators import login_required
|
|
from django.contrib.auth.decorators import permission_required
|
|
from django.contrib.auth.decorators import user_passes_test
|
|
from django.contrib.auth.models import Group
|
|
|
|
from eveonline.models import EveCharacter
|
|
from authentication.models import AuthServicesInfo
|
|
from managers.openfire_manager import OpenfireManager
|
|
from managers.phpbb3_manager import Phpbb3Manager
|
|
from managers.mumble_manager import MumbleManager
|
|
from managers.ipboard_manager import IPBoardManager
|
|
from managers.teamspeak3_manager import Teamspeak3Manager
|
|
from managers.discord_manager import DiscordManager
|
|
from managers.discourse_manager import DiscourseManager
|
|
from managers.ips4_manager import Ips4Manager
|
|
from managers.smf_manager import smfManager
|
|
from managers.market_manager import marketManager
|
|
from managers.pathfinder_manager import pathfinderManager
|
|
from authentication.managers import AuthServicesInfoManager
|
|
from eveonline.managers import EveManager
|
|
from celerytask.tasks import update_jabber_groups
|
|
from celerytask.tasks import update_mumble_groups
|
|
from celerytask.tasks import update_forum_groups
|
|
from celerytask.tasks import update_ipboard_groups
|
|
from celerytask.tasks import update_smf_groups
|
|
from celerytask.tasks import update_teamspeak3_groups
|
|
from celerytask.tasks import update_discord_groups
|
|
from celerytask.tasks import update_discourse_groups
|
|
from forms import JabberBroadcastForm
|
|
from forms import FleetFormatterForm
|
|
from forms import DiscordForm
|
|
from forms import ServicePasswordForm
|
|
from forms import TeamspeakJoinForm
|
|
from util import check_if_user_has_permission
|
|
|
|
import threading
|
|
import datetime
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
@login_required
|
|
def fleet_formatter_view(request):
|
|
logger.debug("fleet_formatter_view called by user %s" % request.user)
|
|
generated = ""
|
|
if request.method == 'POST':
|
|
form = FleetFormatterForm(request.POST)
|
|
logger.debug("Received POST request containing form, valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
generated = "Fleet Name: " + form.cleaned_data['fleet_name'] + "\n"
|
|
generated = generated + "FC: " + form.cleaned_data['fleet_commander'] + "\n"
|
|
generated = generated + "Comms: " + form.cleaned_data['fleet_comms'] + "\n"
|
|
generated = generated + "Fleet Type: " + form.cleaned_data['fleet_type'] + " || " + form.cleaned_data[
|
|
'ship_priorities'] + "\n"
|
|
generated = generated + "Form Up: " + form.cleaned_data['formup_location'] + " @ " + form.cleaned_data[
|
|
'formup_time'] + "\n"
|
|
generated = generated + "Duration: " + form.cleaned_data['expected_duration'] + "\n"
|
|
generated = generated + "Reimbursable: " + form.cleaned_data['reimbursable'] + "\n"
|
|
generated = generated + "Important: " + form.cleaned_data['important'] + "\n"
|
|
if form.cleaned_data['comments'] != "":
|
|
generated = generated + "Why: " + form.cleaned_data['comments'] + "\n"
|
|
logger.info("Formatted fleet broadcast for user %s" % request.user)
|
|
else:
|
|
form = FleetFormatterForm()
|
|
logger.debug("Returning empty form to user %s" % request.user)
|
|
|
|
context = {'form': form, 'generated': generated}
|
|
|
|
return render_to_response('registered/fleetformattertool.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@permission_required('auth.jabber_broadcast')
|
|
def jabber_broadcast_view(request):
|
|
logger.debug("jabber_broadcast_view called by user %s" % request.user)
|
|
success = False
|
|
allchoices = []
|
|
if check_if_user_has_permission(request.user, 'jabber_broadcast_all'):
|
|
allchoices.append(('all', 'all'))
|
|
for g in Group.objects.all():
|
|
allchoices.append((str(g.name), str(g.name)))
|
|
else:
|
|
for g in request.user.groups.all():
|
|
allchoices.append((str(g.name), str(g.name)))
|
|
if request.method == 'POST':
|
|
form = JabberBroadcastForm(request.POST)
|
|
form.fields['group'].choices = allchoices
|
|
logger.debug("Received POST request containing form, valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
user_info = AuthServicesInfo.objects.get(user=request.user)
|
|
main_char = EveCharacter.objects.get(character_id=user_info.main_char_id)
|
|
logger.debug("Processing jabber broadcast for user %s with main character %s" % (user_info, main_char))
|
|
if user_info.main_char_id != "":
|
|
message_to_send = form.cleaned_data['message'] + "\n##### SENT BY: " + "[" + main_char.corporation_ticker + "]" + main_char.character_name + " TO: " + form.cleaned_data['group'] + " WHEN: " + datetime.datetime.utcnow().strftime("%Y-%m-%d %H:%M:%S") + " #####\n##### Replies are NOT monitored #####\n"
|
|
group_to_send = form.cleaned_data['group']
|
|
|
|
OpenfireManager.send_broadcast_threaded(group_to_send, message_to_send,)
|
|
|
|
else:
|
|
message_to_send = form.cleaned_data['message'] + "\n##### SENT BY: " + "No character but can send pings?" + " TO: " + form.cleaned_data['group'] + " WHEN: " + datetime.datetime.utcnow().strftime("%Y-%m-%d %H:%M:%S") + " #####\n##### Replies are NOT monitored #####\n"
|
|
group_to_send = form.cleaned_data['group']
|
|
|
|
OpenfireManager.send_broadcast_threaded(group_to_send, message_to_send,)
|
|
|
|
success = True
|
|
logger.info("Sent jabber broadcast on behalf of user %s" % request.user)
|
|
else:
|
|
form = JabberBroadcastForm()
|
|
form.fields['group'].choices = allchoices
|
|
logger.debug("Generated broadcast form for user %s containing %s groups" % (request.user, len(form.fields['group'].choices)))
|
|
|
|
context = {'form': form, 'success': success}
|
|
return render_to_response('registered/jabberbroadcast.html', context, context_instance=RequestContext(request))
|
|
|
|
|
|
@login_required
|
|
def services_view(request):
|
|
logger.debug("services_view called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
|
|
return render_to_response('registered/services.html', {'authinfo': authinfo},
|
|
context_instance=RequestContext(request))
|
|
|
|
|
|
def service_blue_alliance_test(user):
|
|
return check_if_user_has_permission(user, 'member') or check_if_user_has_permission(user, 'blue_member')
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_forum(request):
|
|
logger.debug("activate_forum called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
# Valid now we get the main characters
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding phpbb user for user %s with main character %s" % (request.user, character))
|
|
result = Phpbb3Manager.add_user(character.character_name, request.user.email, ['REGISTERED'], authinfo.main_char_id)
|
|
# if empty we failed
|
|
if result[0] != "":
|
|
AuthServicesInfoManager.update_user_forum_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with forum credentials. Updating groups." % request.user)
|
|
update_forum_groups.delay(request.user.pk)
|
|
logger.info("Succesfully activated forum for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate forum for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_forum(request):
|
|
logger.debug("deactivate_forum called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = Phpbb3Manager.disable_user(authinfo.forum_username)
|
|
# false we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_forum_info("", "", request.user)
|
|
logger.info("Succesfully deactivated forum for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate forum for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_forum_password(request):
|
|
logger.debug("reset_forum_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = Phpbb3Manager.update_user_password(authinfo.forum_username, authinfo.main_char_id)
|
|
# false we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_forum_info(authinfo.forum_username, result, request.user)
|
|
logger.info("Succesfully reset forum password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to reset forum password for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_ipboard_forum(request):
|
|
logger.debug("activate_ipboard_forum called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
# Valid now we get the main characters
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding ipboard user for user %s with main character %s" % (request.user, character))
|
|
result = IPBoardManager.add_user(character.character_name, request.user.email)
|
|
if result[0] != "":
|
|
AuthServicesInfoManager.update_user_ipboard_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with ipboard credentials. Updating groups." % request.user)
|
|
update_ipboard_groups.delay(request.user.pk)
|
|
logger.info("Succesfully activated ipboard for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate ipboard for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_ipboard_forum(request):
|
|
logger.debug("deactivate_ipboard_forum called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = IPBoardManager.disable_user(authinfo.ipboard_username)
|
|
# false we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_ipboard_info("", "", request.user)
|
|
logger.info("Succesfully deactivated ipboard for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to deactviate ipboard for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_ipboard_password(request):
|
|
logger.debug("reset_ipboard_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = IPBoardManager.update_user_password(authinfo.ipboard_username, request.user.email)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_ipboard_info(authinfo.ipboard_username, result, request.user)
|
|
logger.info("Succesfully reset ipboard password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to reset ipboard password for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_jabber(request):
|
|
logger.debug("activate_jabber called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding jabber user for user %s with main character %s" % (request.user, character))
|
|
info = OpenfireManager.add_user(character.character_name)
|
|
# If our username is blank means we already had a user
|
|
if info[0] is not "":
|
|
AuthServicesInfoManager.update_user_jabber_info(info[0], info[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with jabber credentials. Updating groups." % request.user)
|
|
update_jabber_groups.delay(request.user.pk)
|
|
logger.info("Succesfully activated jabber for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate jabber for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_jabber(request):
|
|
logger.debug("deactivate_jabber called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = OpenfireManager.delete_user(authinfo.jabber_username)
|
|
# If our username is blank means we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_jabber_info("", "", request.user)
|
|
logger.info("Succesfully deactivated jabber for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to deactivate jabber for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_jabber_password(request):
|
|
logger.debug("reset_jabber_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = OpenfireManager.update_user_pass(authinfo.jabber_username)
|
|
# If our username is blank means we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_jabber_info(authinfo.jabber_username, result, request.user)
|
|
logger.info("Succesfully reset jabber password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to reset jabber for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_mumble(request):
|
|
logger.debug("activate_mumble called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
if check_if_user_has_permission(request.user, "blue_member"):
|
|
logger.debug("Adding mumble user for blue user %s with main character %s" % (request.user, character))
|
|
result = MumbleManager.create_blue_user(character.corporation_ticker, character.character_name)
|
|
else:
|
|
logger.debug("Adding mumble user for user %s with main character %s" % (request.user, character))
|
|
result = MumbleManager.create_user(character.corporation_ticker, character.character_name)
|
|
# if its empty we failed
|
|
if result[0] is not "":
|
|
AuthServicesInfoManager.update_user_mumble_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with mumble credentials. Updating groups." % request.user)
|
|
update_mumble_groups.delay(request.user.pk)
|
|
logger.info("Succesfully activated mumble for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to activate mumble for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_mumble(request):
|
|
logger.debug("deactivate_mumble called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = MumbleManager.delete_user(authinfo.mumble_username)
|
|
# if false we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_mumble_info("", "", request.user)
|
|
logger.info("Succesfully deactivated mumble for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to deactivate mumble for user %s" % request.user)
|
|
return HttpResponseRedirect("/")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_mumble_password(request):
|
|
logger.debug("reset_mumble_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = MumbleManager.update_user_password(authinfo.mumble_username)
|
|
|
|
# if blank we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_mumble_info(authinfo.mumble_username, result, request.user)
|
|
logger.info("Succesfully reset mumble password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to reset mumble password for user %s" % request.user)
|
|
return HttpResponseRedirect("/")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_teamspeak3(request):
|
|
logger.debug("activate_teamspeak3 called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
if check_if_user_has_permission(request.user, "blue_member"):
|
|
logger.debug("Adding TS3 user for blue user %s with main character %s" % (request.user, character))
|
|
result = Teamspeak3Manager.add_blue_user(character.character_name, character.corporation_ticker)
|
|
else:
|
|
logger.debug("Adding TS3 user for user %s with main character %s" % (request.user, character))
|
|
result = Teamspeak3Manager.add_user(character.character_name, character.corporation_ticker)
|
|
|
|
# if its empty we failed
|
|
if result[0] is not "":
|
|
AuthServicesInfoManager.update_user_teamspeak3_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with TS3 credentials. Updating groups." % request.user)
|
|
logger.info("Succesfully activated TS3 for user %s" % request.user)
|
|
return HttpResponseRedirect("/verify_teamspeak3/")
|
|
logger.error("Unsuccessful attempt to activate TS3 for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def verify_teamspeak3(request):
|
|
logger.debug("verify_teamspeak3 called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
if not authinfo.teamspeak3_uid:
|
|
logger.warn("Unable to validate user %s teamspeak: no teamspeak data" % request.user)
|
|
return HttpResponseRedirect("/services")
|
|
if request.method == "POST":
|
|
form = TeamspeakJoinForm(request.POST)
|
|
if form.is_valid():
|
|
update_teamspeak3_groups.delay(request.user.pk)
|
|
logger.debug("Validated user %s joined TS server")
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
form = TeamspeakJoinForm({'username':authinfo.teamspeak3_uid})
|
|
context = {
|
|
'form': form,
|
|
'authinfo': authinfo,
|
|
}
|
|
return render_to_response('registered/teamspeakjoin.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_teamspeak3(request):
|
|
logger.debug("deactivate_teamspeak3 called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = Teamspeak3Manager.delete_user(authinfo.teamspeak3_uid)
|
|
|
|
# if false we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_teamspeak3_info("", "", request.user)
|
|
logger.info("Succesfully deactivated TS3 for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to deactivate TS3 for user %s" % request.user)
|
|
return HttpResponseRedirect("/")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_teamspeak3_perm(request):
|
|
logger.debug("reset_teamspeak3_perm called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Deleting TS3 user for user %s" % request.user)
|
|
Teamspeak3Manager.delete_user(authinfo.teamspeak3_uid)
|
|
|
|
if check_if_user_has_permission(request.user, "blue_member"):
|
|
logger.debug("Generating new permission key for blue user %s with main character %s" % (request.user, character))
|
|
result = Teamspeak3Manager.generate_new_blue_permissionkey(authinfo.teamspeak3_uid, character.character_name,
|
|
character.corporation_ticker)
|
|
else:
|
|
logger.debug("Generating new permission key for user %s with main character %s" % (request.user, character))
|
|
result = Teamspeak3Manager.generate_new_permissionkey(authinfo.teamspeak3_uid, character.character_name,
|
|
character.corporation_ticker)
|
|
|
|
# if blank we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_teamspeak3_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with TS3 credentials. Updating groups." % request.user)
|
|
update_teamspeak3_groups.delay(request.user)
|
|
logger.info("Successfully reset TS3 permission key for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to reset TS3 permission key for user %s" % request.user)
|
|
return HttpResponseRedirect("/")
|
|
|
|
@login_required
|
|
def fleet_fits(request):
|
|
logger.debug("fleet_fits called by user %s" % request.user)
|
|
context = {}
|
|
return render_to_response('registered/fleetfits.html', context,
|
|
context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_discord(request):
|
|
logger.debug("deactivate_discord called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = DiscordManager.delete_user(authinfo.discord_uid)
|
|
if result:
|
|
AuthServicesInfoManager.update_user_discord_info("", request.user)
|
|
logger.info("Succesfully deactivated discord for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to deactivate discord for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_discord(request):
|
|
logger.debug("reset_discord called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = DiscordManager.delete_user(authinfo.discord_uid)
|
|
if result:
|
|
AuthServicesInfoManager.update_user_discord_info("",request.user)
|
|
logger.info("Succesfully deleted discord user for user %s - forwarding to discord activation." % request.user)
|
|
return HttpResponseRedirect("/activate_discord/")
|
|
logger.error("Unsuccessful attempt to reset discord for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_discord(request):
|
|
logger.debug("activate_discord called by user %s" % request.user)
|
|
success = False
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = DiscordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
email = form.cleaned_data['email']
|
|
logger.debug("Form contains email address beginning with %s" % email[0:3])
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
try:
|
|
user_id = DiscordManager.add_user(email, password, request.user)
|
|
logger.debug("Received discord uid %s" % user_id)
|
|
if user_id != "":
|
|
AuthServicesInfoManager.update_user_discord_info(user_id, request.user)
|
|
logger.debug("Updated discord id %s for user %s" % (user_id, request.user))
|
|
update_discord_groups.delay(request.user.pk)
|
|
logger.debug("Updated discord groups for user %s." % request.user)
|
|
success = True
|
|
logger.info("Succesfully activated discord for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
except:
|
|
logger.exception("An unhandled exception has occured.")
|
|
pass
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = DiscordForm()
|
|
|
|
logger.debug("Rendering form for user %s with success %s" % (request.user, success))
|
|
context = {'form': form, 'success': success}
|
|
return render_to_response('registered/discord.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_forum_password(request):
|
|
logger.debug("set_forum_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = Phpbb3Manager.update_user_password(authinfo.forum_username, authinfo.main_char_id, password=password)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_forum_info(authinfo.forum_username, result, request.user)
|
|
logger.info("Succesfully reset forum password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom forum password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'Forum'}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_mumble_password(request):
|
|
logger.debug("set_mumble_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = MumbleManager.update_user_password(authinfo.mumble_username, password=password)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_mumble_info(authinfo.mumble_username, result, request.user)
|
|
logger.info("Succesfully reset forum password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom mumble password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'Mumble', 'error': error}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_jabber_password(request):
|
|
logger.debug("set_jabber_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = OpenfireManager.update_user_pass(authinfo.jabber_username, password=password)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_jabber_info(authinfo.jabber_username, result, request.user)
|
|
logger.info("Succesfully reset forum password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom jabber password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'Jabber', 'error': error}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_ipboard_password(request):
|
|
logger.debug("set_ipboard_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = IPBoardManager.update_user_password(authinfo.ipboard_username, request.user.email, plain_password=password)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_ipboard_info(authinfo.ipboard_username, result, request.user)
|
|
logger.info("Succesfully reset forum password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom ipboard password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'IPBoard', 'error': error}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_discourse(request):
|
|
logger.debug("activate_discourse called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding discourse user for user %s with main character %s" % (request.user, character))
|
|
result = DiscourseManager.add_user(character.character_name, request.user.email)
|
|
if result[0] != "":
|
|
AuthServicesInfoManager.update_user_discourse_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with discourse credentials. Updating groups." % request.user)
|
|
update_discourse_groups.delay(request.user.pk)
|
|
logger.info("Successfully activated discourse for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to activate forum for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_discourse(request):
|
|
logger.debug("deactivate_discourse called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = DiscourseManager.delete_user(authinfo.discourse_username)
|
|
if result:
|
|
AuthServicesInfoManager.update_user_discourse_info("", "", request.user)
|
|
logger.info("Successfully deactivated discourse for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to activate discourse for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_ips4(request):
|
|
logger.debug("activate_ips4 called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
# Valid now we get the main characters
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding IPS4 user for user %s with main character %s" % (request.user, character))
|
|
result = Ips4Manager.add_user(character.character_name, request.user.email)
|
|
# if empty we failed
|
|
if result[0] != "":
|
|
AuthServicesInfoManager.update_user_ips4_info(result[0], result[1], result[2], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with IPS4 credentials." % request.user)
|
|
#update_ips4_groups.delay(request.user.pk)
|
|
logger.info("Succesfully activated IPS4 for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate IPS4 for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_ips4_password(request):
|
|
logger.debug("reset_ips4_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = Ips4Manager.update_user_password(authinfo.ips4_username)
|
|
member_id = Ips4Manager.get_user_id(authinfo.ips4_username)
|
|
# false we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_ips4_info(authinfo.ips4_username, result, member_id, request.user)
|
|
logger.info("Succesfully reset IPS4 password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to reset IPS4 password for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_ips4_password(request):
|
|
logger.debug("set_ips4_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = Ips4Manager.update_custom_password(authinfo.ips4_username, plain_password=password)
|
|
member_id = Ips4Manager.get_user_id(authinfo.ips4_username)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_ips4_info(authinfo.ips4_username, result, member_id, request.user)
|
|
logger.info("Succesfully reset IPS4 password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom IPS4 password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'IPS4', 'error': error}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_ips4(request):
|
|
logger.debug("deactivate_ips4 called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = Ips4Manager.delete_user(authinfo.ips4_id)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_ips4_info("", "", "", request.user)
|
|
logger.info("Succesfully deactivated IPS4 for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to deactivate IPS4 for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_smf(request):
|
|
logger.debug("activate_smf called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
# Valid now we get the main characters
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding smf user for user %s with main character %s" % (request.user, character))
|
|
result = smfManager.add_user(character.character_name, request.user.email, ['Member'], authinfo.main_char_id)
|
|
# if empty we failed
|
|
if result[0] != "":
|
|
AuthServicesInfoManager.update_user_smf_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with smf credentials. Updating groups." % request.user)
|
|
update_smf_groups.delay(request.user.pk)
|
|
logger.info("Succesfully activated smf for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate smf for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_smf(request):
|
|
logger.debug("deactivate_smf called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = smfManager.disable_user(authinfo.smf_username)
|
|
# false we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_smf_info("", "", request.user)
|
|
logger.info("Succesfully deactivated smf for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate smf for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_smf_password(request):
|
|
logger.debug("reset_smf_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = smfManager.update_user_password(authinfo.smf_username, authinfo.main_char_id)
|
|
# false we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_smf_info(authinfo.smf_username, result, request.user)
|
|
logger.info("Succesfully reset smf password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to reset smf password for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_smf_password(request):
|
|
logger.debug("set_smf_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = smfManager.update_user_password(authinfo.smf_username, authinfo.main_char_id, password=password)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_smf_info(authinfo.smf_username, result, request.user)
|
|
logger.info("Succesfully reset smf password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom smf password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'SMF'}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_market(request):
|
|
logger.debug("activate_market called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
# Valid now we get the main characters
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding market user for user %s with main character %s" % (request.user, character))
|
|
result = marketManager.add_user(character.character_name, request.user.email, authinfo.main_char_id, character.character_name)
|
|
# if empty we failed
|
|
if result[0] != "":
|
|
AuthServicesInfoManager.update_user_market_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with market credentials." % request.user)
|
|
logger.info("Succesfully activated market for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate market for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_market(request):
|
|
logger.debug("deactivate_market called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = marketManager.disable_user(authinfo.market_username)
|
|
# false we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_market_info("", "", request.user)
|
|
logger.info("Succesfully deactivated market for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate market for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_market_password(request):
|
|
logger.debug("reset_market_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = marketManager.update_user_password(authinfo.market_username)
|
|
# false we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_market_info(authinfo.market_username, result, request.user)
|
|
logger.info("Succesfully reset market password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to reset market password for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_market_password(request):
|
|
logger.debug("set_market_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = marketManager.update_custom_password(authinfo.market_username, password)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_market_info(authinfo.market_username, result, request.user)
|
|
logger.info("Succesfully reset market password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom market password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'Market'}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def activate_pathfinder(request):
|
|
logger.debug("activate_pathfinder called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
# Valid now we get the main characters
|
|
character = EveManager.get_character_by_id(authinfo.main_char_id)
|
|
logger.debug("Adding pathfinder for user %s with main character %s" % (request.user, character))
|
|
result = pathfinderManager.add_user(character.character_name, request.user.email, character.character_name)
|
|
# if empty we failed
|
|
if result[0] != "":
|
|
AuthServicesInfoManager.update_user_pathfinder_info(result[0], result[1], request.user)
|
|
logger.debug("Updated authserviceinfo for user %s with pathfinder credentials." % request.user)
|
|
logger.info("Succesfully activated pathfinder for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate pathfinder for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def deactivate_pathfinder(request):
|
|
logger.debug("deactivate_pathfinder called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = pathfinderManager.disable_user(authinfo.pathfinder_username)
|
|
# false we failed
|
|
if result:
|
|
AuthServicesInfoManager.update_user_pathfinder_info("", "", request.user)
|
|
logger.info("Succesfully deactivated pathfinder for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccesful attempt to activate pathfinder for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def reset_pathfinder_password(request):
|
|
logger.debug("reset_pathfinder_password called by user %s" % request.user)
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = pathfinderManager.update_user_info(authinfo.pathfinder_username)
|
|
# false we failed
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_pathfinder_info(authinfo.pathfinder_username, result[1], request.user)
|
|
logger.info("Succesfully reset pathfinder password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
logger.error("Unsuccessful attempt to reset pathfinder password for user %s" % request.user)
|
|
return HttpResponseRedirect("/dashboard")
|
|
|
|
@login_required
|
|
@user_passes_test(service_blue_alliance_test)
|
|
def set_pathfinder_password(request):
|
|
logger.debug("set_pathfinder_password called by user %s" % request.user)
|
|
error = None
|
|
if request.method == 'POST':
|
|
logger.debug("Received POST request with form.")
|
|
form = ServicePasswordForm(request.POST)
|
|
logger.debug("Form is valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
password = form.cleaned_data['password']
|
|
logger.debug("Form contains password of length %s" % len(password))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
result = pathfinderManager.update_custom_password(authinfo.pathfinder_username, password)
|
|
if result != "":
|
|
AuthServicesInfoManager.update_user_pathfinder_info(authinfo.pathfinder_username, result, request.user)
|
|
logger.info("Succesfully reset pathfinder password for user %s" % request.user)
|
|
return HttpResponseRedirect("/services/")
|
|
else:
|
|
logger.error("Failed to install custom pathfinder password for user %s" % request.user)
|
|
error = "Failed to install custom password."
|
|
else:
|
|
error = "Invalid password provided"
|
|
else:
|
|
logger.debug("Request is not type POST - providing empty form.")
|
|
form = ServicePasswordForm()
|
|
|
|
logger.debug("Rendering form for user %s" % request.user)
|
|
context = {'form': form, 'service': 'Pathfinder'}
|
|
return render_to_response('registered/service_password.html', context, context_instance=RequestContext(request))
|