django-orchestra/orchestra/apps/accounts/models.py

137 lines
5.4 KiB
Python
Raw Normal View History

from django.contrib.auth import models as auth
2014-07-29 20:10:37 +00:00
from django.conf import settings as djsettings
from django.core import validators
2014-05-08 16:59:35 +00:00
from django.db import models
from django.utils import timezone
2014-05-08 16:59:35 +00:00
from django.utils.translation import ugettext_lazy as _
2014-07-10 10:03:22 +00:00
from orchestra.core import services
2014-09-04 15:55:43 +00:00
from orchestra.utils import send_email_template
2014-07-10 10:03:22 +00:00
2014-05-08 16:59:35 +00:00
from . import settings
class Account(auth.AbstractBaseUser):
username = models.CharField(_("username"), max_length=64, unique=True,
help_text=_("Required. 30 characters or fewer. Letters, digits and ./-/_ only."),
validators=[validators.RegexValidator(r'^[\w.-]+$',
_("Enter a valid username."), 'invalid')])
first_name = models.CharField(_("first name"), max_length=30, blank=True)
last_name = models.CharField(_("last name"), max_length=30, blank=True)
email = models.EmailField(_('email address'), help_text=_("Used for password recovery"))
2014-07-29 20:10:37 +00:00
type = models.CharField(_("type"), choices=settings.ACCOUNTS_TYPES,
max_length=32, default=settings.ACCOUNTS_DEFAULT_TYPE)
2014-05-08 16:59:35 +00:00
language = models.CharField(_("language"), max_length=2,
choices=settings.ACCOUNTS_LANGUAGES,
default=settings.ACCOUNTS_DEFAULT_LANGUAGE)
comments = models.TextField(_("comments"), max_length=256, blank=True)
is_superuser = models.BooleanField(_("superuser status"), default=False,
help_text=_("Designates that this user has all permissions without "
"explicitly assigning them."))
is_active = models.BooleanField(_("active"), default=True,
help_text=_("Designates whether this account should be treated as active. "
"Unselect this instead of deleting accounts."))
date_joined = models.DateTimeField(_("date joined"), default=timezone.now)
objects = auth.UserManager()
USERNAME_FIELD = 'username'
REQUIRED_FIELDS = ['email']
2014-05-08 16:59:35 +00:00
def __unicode__(self):
return self.name
2014-09-14 09:52:45 +00:00
@property
2014-05-08 16:59:35 +00:00
def name(self):
return self.username
@property
def is_staff(self):
return self.is_superuser
2014-08-19 18:59:23 +00:00
2014-10-10 14:39:46 +00:00
@property
def main_systemuser(self):
return self.systemusers.get(is_main=True)
2014-08-19 18:59:23 +00:00
@classmethod
def get_main(cls):
return cls.objects.get(pk=settings.ACCOUNTS_MAIN_PK)
2014-09-04 15:55:43 +00:00
def clean(self):
""" unique usernames between accounts and system users """
if not self.pk and hasattr(self, 'systemusers'):
if self.systemusers.model.objects.filter(username=self.username).exists():
raise validators.ValidationError(_("A user with this name already exists"))
def save(self, *args, **kwargs):
created = not self.pk
super(Account, self).save(*args, **kwargs)
if created and hasattr(self, 'systemusers'):
2014-10-10 14:39:46 +00:00
self.systemusers.create(username=self.username, account=self,
password=self.password, is_main=True)
2014-10-07 13:50:59 +00:00
def disable(self):
self.is_active = False
# self.save(update_fields=['is_active'])
for rel in self._meta.get_all_related_objects():
if not rel.model in services:
continue
try:
rel.model._meta.get_field_by_name('is_active')
except models.FieldDoesNotExist:
continue
else:
for obj in getattr(self, rel.get_accessor_name()).all():
obj.save(update_fields=[])
2014-09-04 15:55:43 +00:00
def send_email(self, template, context, contacts=[], attachments=[], html=None):
contacts = self.contacts.filter(email_usages=contacts)
email_to = contacts.values_list('email', flat=True)
send_email_template(template, context, email_to, html=html, attachments=attachments)
def get_full_name(self):
full_name = '%s %s' % (self.first_name, self.last_name)
return full_name.strip() or self.username
def get_short_name(self):
""" Returns the short name for the user """
return self.first_name
def has_perm(self, perm, obj=None):
"""
Returns True if the user has the specified permission. This method
queries all available auth backends, but returns immediately if any
backend returns True. Thus, a user who has permission from a single
auth backend is assumed to have permission in general. If an object is
provided, permissions for this specific object are checked.
"""
# Active superusers have all permissions.
if self.is_active and self.is_superuser:
return True
# Otherwise we need to check the backends.
return auth._user_has_perm(self, perm, obj)
def has_perms(self, perm_list, obj=None):
"""
Returns True if the user has each of the specified permissions. If
object is passed, it checks if the user has all required perms for this
object.
"""
for perm in perm_list:
if not self.has_perm(perm, obj):
return False
return True
def has_module_perms(self, app_label):
"""
Returns True if the user has any permissions in the given app label.
Uses pretty much the same logic as has_perm, above.
"""
# Active superusers have all permissions.
if self.is_active and self.is_superuser:
return True
return auth._user_has_module_perms(self, app_label)
2014-07-10 10:03:22 +00:00
services.register(Account, menu=False)