mirror of
https://gitlab.com/allianceauth/allianceauth.git
synced 2025-07-09 20:40:17 +02:00
191 lines
9.9 KiB
Python
Executable File
191 lines
9.9 KiB
Python
Executable File
from django.conf import settings
|
|
from django.http import HttpResponseRedirect
|
|
from django.shortcuts import render_to_response
|
|
from django.template import RequestContext
|
|
from django.contrib.auth.decorators import login_required
|
|
from django.contrib.auth.decorators import permission_required
|
|
|
|
from util import add_member_permission
|
|
from util import remove_member_permission
|
|
from util import check_if_user_has_permission
|
|
from forms import UpdateKeyForm
|
|
from managers import EveManager
|
|
from authentication.managers import AuthServicesInfoManager
|
|
from services.managers.eve_api_manager import EveApiManager
|
|
from util.common_task import add_user_to_group
|
|
from util.common_task import remove_user_from_group
|
|
from util.common_task import deactivate_services
|
|
from util.common_task import generate_corp_group_name
|
|
from eveonline.models import EveCorporationInfo
|
|
from eveonline.models import EveCharacter
|
|
from eveonline.models import EveApiKeyPair
|
|
from authentication.models import AuthServicesInfo
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
def disable_member(user, char_id):
|
|
logger.debug("Disabling user %s with character id %s" % (user, char_id))
|
|
remove_member_permission(user, 'member')
|
|
remove_user_from_group(user, settings.DEFAULT_AUTH_GROUP)
|
|
remove_user_from_group(user,
|
|
generate_corp_group_name(
|
|
EveManager.get_character_by_id(char_id).corporation_name))
|
|
deactivate_services(user)
|
|
logger.info("Disabled member %s" % user)
|
|
|
|
|
|
def disable_blue_member(user):
|
|
logger.debug("Disabling blue user %s" % user)
|
|
remove_member_permission(user, 'blue_member')
|
|
remove_user_from_group(user, settings.DEFAULT_BLUE_GROUP)
|
|
deactivate_services(user)
|
|
logger.info("Disabled blue user %s" % user)
|
|
|
|
@login_required
|
|
def add_api_key(request):
|
|
logger.debug("add_api_key called by user %s" % request.user)
|
|
if request.method == 'POST':
|
|
form = UpdateKeyForm(request.POST)
|
|
logger.debug("Request type POST with form valid: %s" % form.is_valid())
|
|
if form.is_valid():
|
|
EveManager.create_api_keypair(form.cleaned_data['api_id'],
|
|
form.cleaned_data['api_key'],
|
|
request.user)
|
|
|
|
# Grab characters associated with the key pair
|
|
characters = EveApiManager.get_characters_from_api(form.cleaned_data['api_id'],
|
|
form.cleaned_data['api_key'])
|
|
EveManager.create_characters_from_list(characters, request.user, form.cleaned_data['api_id'])
|
|
logger.info("Successfully processed api add form for user %s" % request.user)
|
|
return HttpResponseRedirect("/api_key_management/")
|
|
else:
|
|
logger.debug("Form invalid: returning to form.")
|
|
else:
|
|
logger.debug("Providing empty update key form for user %s" % request.user)
|
|
form = UpdateKeyForm()
|
|
context = {'form': form, 'apikeypairs': EveManager.get_api_key_pairs(request.user.id)}
|
|
return render_to_response('registered/addapikey.html', context,
|
|
context_instance=RequestContext(request))
|
|
|
|
|
|
@login_required
|
|
def api_key_management_view(request):
|
|
logger.debug("api_key_management_view called by user %s" % request.user)
|
|
context = {'apikeypairs': EveManager.get_api_key_pairs(request.user.id)}
|
|
|
|
return render_to_response('registered/apikeymanagment.html', context,
|
|
context_instance=RequestContext(request))
|
|
|
|
|
|
@login_required
|
|
def api_key_removal(request, api_id):
|
|
logger.debug("api_key_removal called by user %s for api id %s" % (request.user, api_id))
|
|
authinfo = AuthServicesInfoManager.get_auth_service_info(request.user)
|
|
# Check if our users main id is in the to be deleted characters
|
|
characters = EveManager.get_characters_by_owner_id(request.user.id)
|
|
if characters is not None:
|
|
for character in characters:
|
|
if character.character_id == authinfo.main_char_id:
|
|
if character.api_id == api_id:
|
|
# TODO: Remove services also
|
|
if authinfo.is_blue:
|
|
logger.debug("Blue user %s deleting api for main character. Disabling." % request.user)
|
|
disable_blue_member(request.user)
|
|
else:
|
|
logger.debug("User %s deleting api for main character. Disabling." % request.user)
|
|
disable_member(request.user, authinfo.main_char_id)
|
|
|
|
EveManager.delete_api_key_pair(api_id, request.user.id)
|
|
EveManager.delete_characters_by_api_id(api_id, request.user.id)
|
|
logger.info("Succesfully processed api delete request by user %s for api %s" % (request.user, api_id))
|
|
return HttpResponseRedirect("/api_key_management/")
|
|
|
|
|
|
@login_required
|
|
def characters_view(request):
|
|
logger.debug("characters_view called by user %s" % request.user)
|
|
render_items = {'characters': EveManager.get_characters_by_owner_id(request.user.id),
|
|
'authinfo': AuthServicesInfoManager.get_auth_service_info(request.user)}
|
|
return render_to_response('registered/characters.html', render_items, context_instance=RequestContext(request))
|
|
|
|
|
|
@login_required
|
|
def main_character_change(request, char_id):
|
|
logger.debug("main_character_change called by user %s for character id %s" % (request.user, char_id))
|
|
if EveManager.check_if_character_owned_by_user(char_id, request.user):
|
|
previousmainid = AuthServicesInfoManager.get_auth_service_info(request.user).main_char_id
|
|
AuthServicesInfoManager.update_main_char_Id(char_id, request.user)
|
|
# Check if character is in the alliance
|
|
character_info = EveManager.get_character_by_id(char_id)
|
|
corporation_info = EveManager.get_corporation_info_by_id(character_info.corporation_id)
|
|
logger.debug("User %s changing main character to %s in corp %s" % (request.user, character_info, corporation_info))
|
|
if (settings.IS_CORP and EveManager.get_charater_corporation_id_by_id(char_id) == settings.CORP_ID) or (not settings.IS_CORP and EveManager.get_charater_alliance_id_by_id(char_id) == settings.ALLIANCE_ID):
|
|
add_member_permission(request.user, 'member')
|
|
add_user_to_group(request.user, settings.DEFAULT_AUTH_GROUP)
|
|
add_user_to_group(request.user,
|
|
generate_corp_group_name(EveManager.get_character_by_id(char_id).corporation_name))
|
|
logger.info("User %s transitioned to full member by chaning main character to %s" % (request.user, character_info))
|
|
|
|
elif corporation_info != None:
|
|
if corporation_info.is_blue:
|
|
add_member_permission(request.user, 'blue_member')
|
|
add_user_to_group(request.user, settings.DEFAULT_BLUE_GROUP)
|
|
AuthServicesInfoManager.update_is_blue(True, request.user)
|
|
logger.info("User %s transitioned to blue by changing main character to %s" % (request.user, character_info))
|
|
else:
|
|
if check_if_user_has_permission(request.user, 'member'):
|
|
disable_member(request.user, previousmainid)
|
|
|
|
if check_if_user_has_permission(request.user, 'blue_member'):
|
|
disable_blue_member(request.user)
|
|
logger.info("User %s disabled as new main character %s not member nor blue." % (request.user, character_info))
|
|
else:
|
|
# TODO: disable serivces
|
|
if check_if_user_has_permission(request.user, 'member'):
|
|
disable_member(request.user, previousmainid)
|
|
|
|
if check_if_user_has_permission(request.user, 'blue_member'):
|
|
disable_blue_member(request.user)
|
|
logger.info("User %s disabled as new main character %s does not have corp model to check." % (request.user, character_info))
|
|
|
|
return HttpResponseRedirect("/characters")
|
|
return HttpResponseRedirect("/characters")
|
|
|
|
|
|
@login_required
|
|
@permission_required('auth.corp_stats')
|
|
def corp_stats_view(request):
|
|
logger.debug("corp_stats_view called by user %s" % request.user)
|
|
# Get the corp the member is in
|
|
auth_info = AuthServicesInfo.objects.get(user=request.user)
|
|
logger.debug("Got user %s authservicesinfo model %s" % (request.user, auth_info))
|
|
if EveCharacter.objects.filter(character_id=auth_info.main_char_id).exists():
|
|
main_char = EveCharacter.objects.get(character_id=auth_info.main_char_id)
|
|
logger.debug("Got user %s main character model %s" % (request.user, main_char))
|
|
if EveCorporationInfo.objects.filter(corporation_id=main_char.corporation_id).exists():
|
|
current_count = 0
|
|
allcharacters = {}
|
|
corp = EveCorporationInfo.objects.get(corporation_id=main_char.corporation_id)
|
|
logger.debug("Got user %s main character's corp model %s" % (request.user, corp))
|
|
all_characters = EveCharacter.objects.all()
|
|
for char in all_characters:
|
|
if char:
|
|
try:
|
|
if char.corporation_id == corp.corporation_id:
|
|
current_count = current_count + 1
|
|
allcharacters[char.character_name] = EveApiKeyPair.objects.get(api_id=char.api_id)
|
|
except:
|
|
pass
|
|
context = {"corp": corp,
|
|
"currentCount": current_count,
|
|
"characters": allcharacters}
|
|
return render_to_response('registered/corpstats.html', context, context_instance=RequestContext(request))
|
|
else:
|
|
logger.error("Unable to locate user %s main character's corp model with id %s. Cannot provide corp stats." % (request.user, main_char.corporation_id))
|
|
else:
|
|
logger.error("Unable to locate user %s main character model with id %s. Cannot provide corp stats." % (request.user, auth_info.main_char_id))
|
|
return render_to_response('registered/corpstats.html', None, context_instance=RequestContext(request))
|