mirror of
https://gitlab.crans.org/bde/nk20
synced 2025-06-21 09:58:23 +02:00
Compare commits
31 Commits
food_trace
...
main
Author | SHA1 | Date | |
---|---|---|---|
763535bea4 | |||
df0d886db9 | |||
092cc37320 | |||
16b55e23af | |||
97621e8704 | |||
cf4c23d1ac | |||
d71105976f | |||
ff812a028c | |||
5a8acbde00 | |||
f60dc8cfa0 | |||
067dd6f9d1 | |||
7b1e32e514 | |||
e88dbfd597 | |||
3d34270959 | |||
3bb99671ec | |||
0d69383dfd | |||
7b9ff119e8 | |||
108a56745c | |||
9643d7652b | |||
fadb289ed7 | |||
905fc6e7cc | |||
cdd81c1444 | |||
4afafceba1 | |||
3065eacc96 | |||
71ef3aedd8 | |||
0cf11c6348 | |||
70abd0f490 | |||
03932672f3 | |||
d58a299a8b | |||
c4404ef995 | |||
f0e9a7d3dc |
19
apps/activity/migrations/0007_alter_guest_activity.py
Normal file
19
apps/activity/migrations/0007_alter_guest_activity.py
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
# Generated by Django 4.2.20 on 2025-05-08 19:07
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
import django.db.models.deletion
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('activity', '0006_guest_school'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name='guest',
|
||||||
|
name='activity',
|
||||||
|
field=models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, related_name='+', to='activity.activity'),
|
||||||
|
),
|
||||||
|
]
|
@ -234,7 +234,7 @@ class Guest(models.Model):
|
|||||||
"""
|
"""
|
||||||
activity = models.ForeignKey(
|
activity = models.ForeignKey(
|
||||||
Activity,
|
Activity,
|
||||||
on_delete=models.PROTECT,
|
on_delete=models.CASCADE,
|
||||||
related_name='+',
|
related_name='+',
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -95,5 +95,23 @@ SPDX-License-Identifier: GPL-3.0-or-later
|
|||||||
errMsg(xhr.responseJSON);
|
errMsg(xhr.responseJSON);
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
$("#delete_activity").click(function () {
|
||||||
|
if (!confirm("{% trans 'Are you sure you want to delete this activity?' %}")) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
$.ajax({
|
||||||
|
url: "/api/activity/activity/{{ activity.pk }}/",
|
||||||
|
type: "DELETE",
|
||||||
|
headers: {
|
||||||
|
"X-CSRFTOKEN": CSRF_TOKEN
|
||||||
|
}
|
||||||
|
}).done(function () {
|
||||||
|
addMsg("{% trans 'Activity deleted' %}", "success");
|
||||||
|
window.location.href = "/activity/"; // Redirige vers la liste des activités
|
||||||
|
}).fail(function (xhr) {
|
||||||
|
errMsg(xhr.responseJSON);
|
||||||
|
});
|
||||||
|
});
|
||||||
</script>
|
</script>
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
@ -70,7 +70,10 @@ SPDX-License-Identifier: GPL-3.0-or-later
|
|||||||
{% if ".change_"|has_perm:activity %}
|
{% if ".change_"|has_perm:activity %}
|
||||||
<a class="btn btn-primary btn-sm my-1" href="{% url 'activity:activity_update' pk=activity.pk %}" data-turbolinks="false"> {% trans "edit"|capfirst %}</a>
|
<a class="btn btn-primary btn-sm my-1" href="{% url 'activity:activity_update' pk=activity.pk %}" data-turbolinks="false"> {% trans "edit"|capfirst %}</a>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if activity.activity_type.can_invite and not activity_started %}
|
{% if not activity.valid and ".delete_"|has_perm:activity %}
|
||||||
|
<a class="btn btn-danger btn-sm my-1" id="delete_activity"> {% trans "delete"|capfirst %} </a>
|
||||||
|
{% endif %}
|
||||||
|
{% if activity.activity_type.can_invite and not activity_started and activity.valid %}
|
||||||
<a class="btn btn-primary btn-sm my-1" href="{% url 'activity:activity_invite' pk=activity.pk %}" data-turbolinks="false"> {% trans "Invite" %}</a>
|
<a class="btn btn-primary btn-sm my-1" href="{% url 'activity:activity_invite' pk=activity.pk %}" data-turbolinks="false"> {% trans "Invite" %}</a>
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -15,4 +15,5 @@ urlpatterns = [
|
|||||||
path('<int:pk>/update/', views.ActivityUpdateView.as_view(), name='activity_update'),
|
path('<int:pk>/update/', views.ActivityUpdateView.as_view(), name='activity_update'),
|
||||||
path('new/', views.ActivityCreateView.as_view(), name='activity_create'),
|
path('new/', views.ActivityCreateView.as_view(), name='activity_create'),
|
||||||
path('calendar.ics', views.CalendarView.as_view(), name='calendar_ics'),
|
path('calendar.ics', views.CalendarView.as_view(), name='calendar_ics'),
|
||||||
|
path('<int:pk>/delete', views.ActivityDeleteView.as_view(), name='delete_activity'),
|
||||||
]
|
]
|
||||||
|
@ -9,7 +9,7 @@ from django.contrib.contenttypes.models import ContentType
|
|||||||
from django.core.exceptions import PermissionDenied
|
from django.core.exceptions import PermissionDenied
|
||||||
from django.db import transaction
|
from django.db import transaction
|
||||||
from django.db.models import F, Q
|
from django.db.models import F, Q
|
||||||
from django.http import HttpResponse
|
from django.http import HttpResponse, JsonResponse
|
||||||
from django.urls import reverse_lazy
|
from django.urls import reverse_lazy
|
||||||
from django.utils import timezone
|
from django.utils import timezone
|
||||||
from django.utils.decorators import method_decorator
|
from django.utils.decorators import method_decorator
|
||||||
@ -153,6 +153,34 @@ class ActivityUpdateView(ProtectQuerysetMixin, LoginRequiredMixin, UpdateView):
|
|||||||
return reverse_lazy('activity:activity_detail', kwargs={"pk": self.kwargs["pk"]})
|
return reverse_lazy('activity:activity_detail', kwargs={"pk": self.kwargs["pk"]})
|
||||||
|
|
||||||
|
|
||||||
|
class ActivityDeleteView(View):
|
||||||
|
"""
|
||||||
|
Deletes an Activity
|
||||||
|
"""
|
||||||
|
def delete(self, request, pk):
|
||||||
|
try:
|
||||||
|
activity = Activity.objects.get(pk=pk)
|
||||||
|
activity.delete()
|
||||||
|
return JsonResponse({"message": "Activity deleted"})
|
||||||
|
except Activity.DoesNotExist:
|
||||||
|
return JsonResponse({"error": "Activity not found"}, status=404)
|
||||||
|
|
||||||
|
def dispatch(self, *args, **kwargs):
|
||||||
|
"""
|
||||||
|
Don't display the delete button if the user has no right to delete.
|
||||||
|
"""
|
||||||
|
if not self.request.user.is_authenticated:
|
||||||
|
return self.handle_no_permission()
|
||||||
|
|
||||||
|
activity = Activity.objects.get(pk=self.kwargs["pk"])
|
||||||
|
if not PermissionBackend.check_perm(self.request, "activity.delete_activity", activity):
|
||||||
|
raise PermissionDenied(_("You are not allowed to delete this activity."))
|
||||||
|
|
||||||
|
if activity.valid:
|
||||||
|
raise PermissionDenied(_("This activity is valid."))
|
||||||
|
return super().dispatch(*args, **kwargs)
|
||||||
|
|
||||||
|
|
||||||
class ActivityInviteView(ProtectQuerysetMixin, ProtectedCreateView):
|
class ActivityInviteView(ProtectQuerysetMixin, ProtectedCreateView):
|
||||||
"""
|
"""
|
||||||
Invite a Guest, The rules to invites someone are defined in `forms:activity.GuestForm`
|
Invite a Guest, The rules to invites someone are defined in `forms:activity.GuestForm`
|
||||||
|
@ -169,7 +169,8 @@ class BasicFoodCreateView(ProtectQuerysetMixin, ProtectedCreateView):
|
|||||||
template_name = "food/food_update.html"
|
template_name = "food/food_update.html"
|
||||||
|
|
||||||
def get_sample_object(self):
|
def get_sample_object(self):
|
||||||
return BasicFood(
|
# We choose a club which may work or BDE else
|
||||||
|
food = BasicFood(
|
||||||
name="",
|
name="",
|
||||||
owner_id=1,
|
owner_id=1,
|
||||||
expiry_date=timezone.now(),
|
expiry_date=timezone.now(),
|
||||||
@ -178,6 +179,14 @@ class BasicFoodCreateView(ProtectQuerysetMixin, ProtectedCreateView):
|
|||||||
date_type='DLC',
|
date_type='DLC',
|
||||||
)
|
)
|
||||||
|
|
||||||
|
for membership in self.request.user.memberships.all():
|
||||||
|
club_id = membership.club.id
|
||||||
|
food.owner_id = club_id
|
||||||
|
if PermissionBackend.check_perm(self.request, "food.add_basicfood", food):
|
||||||
|
return food
|
||||||
|
|
||||||
|
return food
|
||||||
|
|
||||||
@transaction.atomic
|
@transaction.atomic
|
||||||
def form_valid(self, form):
|
def form_valid(self, form):
|
||||||
if QRCode.objects.filter(qr_code_number=self.kwargs['slug']).count() > 0:
|
if QRCode.objects.filter(qr_code_number=self.kwargs['slug']).count() > 0:
|
||||||
@ -228,13 +237,22 @@ class TransformedFoodCreateView(ProtectQuerysetMixin, ProtectedCreateView):
|
|||||||
template_name = "food/food_update.html"
|
template_name = "food/food_update.html"
|
||||||
|
|
||||||
def get_sample_object(self):
|
def get_sample_object(self):
|
||||||
return TransformedFood(
|
# We choose a club which may work or BDE else
|
||||||
|
food = TransformedFood(
|
||||||
name="",
|
name="",
|
||||||
owner_id=1,
|
owner_id=1,
|
||||||
expiry_date=timezone.now(),
|
expiry_date=timezone.now(),
|
||||||
is_ready=True,
|
is_ready=True,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
for membership in self.request.user.memberships.all():
|
||||||
|
club_id = membership.club.id
|
||||||
|
food.owner_id = club_id
|
||||||
|
if PermissionBackend.check_perm(self.request, "food.add_transformedfood", food):
|
||||||
|
return food
|
||||||
|
|
||||||
|
return food
|
||||||
|
|
||||||
@transaction.atomic
|
@transaction.atomic
|
||||||
def form_valid(self, form):
|
def form_valid(self, form):
|
||||||
form.instance.expiry_date = timezone.now() + timedelta(days=3)
|
form.instance.expiry_date = timezone.now() + timedelta(days=3)
|
||||||
@ -246,10 +264,10 @@ class TransformedFoodCreateView(ProtectQuerysetMixin, ProtectedCreateView):
|
|||||||
return reverse_lazy('food:transformedfood_view', kwargs={"pk": self.object.pk})
|
return reverse_lazy('food:transformedfood_view', kwargs={"pk": self.object.pk})
|
||||||
|
|
||||||
|
|
||||||
MAX_FORMS = 10
|
MAX_FORMS = 100
|
||||||
|
|
||||||
|
|
||||||
class ManageIngredientsView(ProtectQuerysetMixin, LoginRequiredMixin, UpdateView):
|
class ManageIngredientsView(LoginRequiredMixin, UpdateView):
|
||||||
"""
|
"""
|
||||||
A view to manage ingredient for a transformed food
|
A view to manage ingredient for a transformed food
|
||||||
"""
|
"""
|
||||||
@ -280,6 +298,14 @@ class ManageIngredientsView(ProtectQuerysetMixin, LoginRequiredMixin, UpdateView
|
|||||||
ingredient.end_of_life = _('Fully used in {meal}'.format(
|
ingredient.end_of_life = _('Fully used in {meal}'.format(
|
||||||
meal=self.object.name))
|
meal=self.object.name))
|
||||||
ingredient.save()
|
ingredient.save()
|
||||||
|
# We recalculate new expiry date and allergens
|
||||||
|
self.object.expiry_date = self.object.creation_date + self.object.shelf_life
|
||||||
|
self.object.allergens.clear()
|
||||||
|
|
||||||
|
for ingredient in self.object.ingredients.iterator():
|
||||||
|
if not (ingredient.polymorphic_ctype.model == 'basicfood' and ingredient.date_type == 'DDM'):
|
||||||
|
self.object.expiry_date = min(self.object.expiry_date, ingredient.expiry_date)
|
||||||
|
self.object.allergens.set(self.object.allergens.union(ingredient.allergens.all()))
|
||||||
|
|
||||||
self.object.save(old_ingredients=old_ingredients, old_allergens=old_allergens)
|
self.object.save(old_ingredients=old_ingredients, old_allergens=old_allergens)
|
||||||
return HttpResponseRedirect(self.get_success_url())
|
return HttpResponseRedirect(self.get_success_url())
|
||||||
|
46
apps/member/migrations/0014_create_bda.py
Normal file
46
apps/member/migrations/0014_create_bda.py
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
from django.db import migrations
|
||||||
|
|
||||||
|
def create_bda(apps, schema_editor):
|
||||||
|
"""
|
||||||
|
The club BDA is now pre-injected.
|
||||||
|
"""
|
||||||
|
Club = apps.get_model("member", "club")
|
||||||
|
NoteClub = apps.get_model("note", "noteclub")
|
||||||
|
Alias = apps.get_model("note", "alias")
|
||||||
|
ContentType = apps.get_model('contenttypes', 'ContentType')
|
||||||
|
polymorphic_ctype_id = ContentType.objects.get_for_model(NoteClub).id
|
||||||
|
|
||||||
|
Club.objects.get_or_create(
|
||||||
|
id=10,
|
||||||
|
name="BDA",
|
||||||
|
email="bda.ensparissaclay@gmail.com",
|
||||||
|
require_memberships=True,
|
||||||
|
membership_fee_paid=750,
|
||||||
|
membership_fee_unpaid=750,
|
||||||
|
membership_duration=396,
|
||||||
|
membership_start="2024-08-01",
|
||||||
|
membership_end="2025-09-30",
|
||||||
|
)
|
||||||
|
NoteClub.objects.get_or_create(
|
||||||
|
id=1937,
|
||||||
|
club_id=10,
|
||||||
|
polymorphic_ctype_id=polymorphic_ctype_id,
|
||||||
|
)
|
||||||
|
Alias.objects.get_or_create(
|
||||||
|
id=1937,
|
||||||
|
note_id=1937,
|
||||||
|
name="BDA",
|
||||||
|
normalized_name="bda",
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('member', '0013_auto_20240801_1436'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.RunPython(create_bda),
|
||||||
|
]
|
||||||
|
|
@ -4091,8 +4091,8 @@
|
|||||||
158,
|
158,
|
||||||
159,
|
159,
|
||||||
160,
|
160,
|
||||||
212,
|
212,
|
||||||
222
|
222
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -4133,14 +4133,14 @@
|
|||||||
50,
|
50,
|
||||||
141,
|
141,
|
||||||
169,
|
169,
|
||||||
217,
|
217,
|
||||||
218,
|
218,
|
||||||
219,
|
219,
|
||||||
220,
|
220,
|
||||||
221,
|
221,
|
||||||
247,
|
247,
|
||||||
258,
|
258,
|
||||||
259
|
259
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -4152,8 +4152,8 @@
|
|||||||
"name": "Pr\u00e9sident\u22c5e de club",
|
"name": "Pr\u00e9sident\u22c5e de club",
|
||||||
"permissions": [
|
"permissions": [
|
||||||
62,
|
62,
|
||||||
142,
|
135,
|
||||||
135
|
142
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -4538,8 +4538,8 @@
|
|||||||
"name": "GC anti-VSS",
|
"name": "GC anti-VSS",
|
||||||
"permissions": [
|
"permissions": [
|
||||||
42,
|
42,
|
||||||
135,
|
135,
|
||||||
150,
|
150,
|
||||||
163,
|
163,
|
||||||
164
|
164
|
||||||
]
|
]
|
||||||
@ -4555,13 +4555,140 @@
|
|||||||
137,
|
137,
|
||||||
211,
|
211,
|
||||||
212,
|
212,
|
||||||
213,
|
213,
|
||||||
214,
|
214,
|
||||||
215,
|
215,
|
||||||
216
|
216
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 23,
|
||||||
|
"fields": {
|
||||||
|
"for_club": 2,
|
||||||
|
"name": "Darbonne",
|
||||||
|
"permissions": [
|
||||||
|
30,
|
||||||
|
31,
|
||||||
|
32
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 24,
|
||||||
|
"fields": {
|
||||||
|
"for_club": null,
|
||||||
|
"name": "Staffeur⋅euse (S&L,Respo Tech,...)",
|
||||||
|
"permissions": []
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 25,
|
||||||
|
"fields": {
|
||||||
|
"for_club": null,
|
||||||
|
"name": "Référent⋅e Bus",
|
||||||
|
"permissions": [
|
||||||
|
22,
|
||||||
|
84,
|
||||||
|
115,
|
||||||
|
117,
|
||||||
|
118,
|
||||||
|
119,
|
||||||
|
120,
|
||||||
|
121,
|
||||||
|
122
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 28,
|
||||||
|
"fields": {
|
||||||
|
"for_club": 10,
|
||||||
|
"name": "Trésorièr⸱e BDA",
|
||||||
|
"permissions": [
|
||||||
|
55,
|
||||||
|
56,
|
||||||
|
57,
|
||||||
|
58,
|
||||||
|
135,
|
||||||
|
143,
|
||||||
|
176,
|
||||||
|
177,
|
||||||
|
178,
|
||||||
|
243,
|
||||||
|
260,
|
||||||
|
261,
|
||||||
|
262,
|
||||||
|
263,
|
||||||
|
264,
|
||||||
|
265,
|
||||||
|
266,
|
||||||
|
267,
|
||||||
|
268,
|
||||||
|
269
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 30,
|
||||||
|
"fields": {
|
||||||
|
"for_club": 10,
|
||||||
|
"name": "Respo sorties",
|
||||||
|
"permissions": [
|
||||||
|
49,
|
||||||
|
62,
|
||||||
|
141,
|
||||||
|
241,
|
||||||
|
242,
|
||||||
|
243
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 31,
|
||||||
|
"fields": {
|
||||||
|
"for_club": 1,
|
||||||
|
"name": "Respo comm",
|
||||||
|
"permissions": [
|
||||||
|
135,
|
||||||
|
244
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 32,
|
||||||
|
"fields": {
|
||||||
|
"for_club": 10,
|
||||||
|
"name": "Respo comm Art",
|
||||||
|
"permissions": [
|
||||||
|
135,
|
||||||
|
245
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "permission.role",
|
||||||
|
"pk": 33,
|
||||||
|
"fields": {
|
||||||
|
"for_club": 10,
|
||||||
|
"name": "Respo Jam",
|
||||||
|
"permissions": [
|
||||||
|
247,
|
||||||
|
250,
|
||||||
|
251,
|
||||||
|
252,
|
||||||
|
253,
|
||||||
|
254
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"model": "wei.weirole",
|
"model": "wei.weirole",
|
||||||
"pk": 12,
|
"pk": 12,
|
||||||
@ -4596,5 +4723,15 @@
|
|||||||
"model": "wei.weirole",
|
"model": "wei.weirole",
|
||||||
"pk": 18,
|
"pk": 18,
|
||||||
"fields": {}
|
"fields": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "wei.weirole",
|
||||||
|
"pk": 24,
|
||||||
|
"fields": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"model": "wei.weirole",
|
||||||
|
"pk": 25,
|
||||||
|
"fields": {}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -1,8 +1,10 @@
|
|||||||
# Copyright (C) 2018-2025 by BDE ENS Paris-Saclay
|
# Copyright (C) 2018-2025 by BDE ENS Paris-Saclay
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
from oauth2_provider.oauth2_validators import OAuth2Validator
|
from oauth2_provider.oauth2_validators import OAuth2Validator
|
||||||
from oauth2_provider.scopes import BaseScopes
|
from oauth2_provider.scopes import BaseScopes
|
||||||
from member.models import Club
|
from member.models import Club
|
||||||
|
from note.models import Alias
|
||||||
from note_kfet.middlewares import get_current_request
|
from note_kfet.middlewares import get_current_request
|
||||||
|
|
||||||
from .backends import PermissionBackend
|
from .backends import PermissionBackend
|
||||||
@ -17,25 +19,46 @@ class PermissionScopes(BaseScopes):
|
|||||||
"""
|
"""
|
||||||
|
|
||||||
def get_all_scopes(self):
|
def get_all_scopes(self):
|
||||||
return {f"{p.id}_{club.id}": f"{p.description} (club {club.name})"
|
scopes = {f"{p.id}_{club.id}": f"{p.description} (club {club.name})"
|
||||||
for p in Permission.objects.all() for club in Club.objects.all()}
|
for p in Permission.objects.all() for club in Club.objects.all()}
|
||||||
|
scopes['openid'] = "OpenID Connect"
|
||||||
|
return scopes
|
||||||
|
|
||||||
def get_available_scopes(self, application=None, request=None, *args, **kwargs):
|
def get_available_scopes(self, application=None, request=None, *args, **kwargs):
|
||||||
if not application:
|
if not application:
|
||||||
return []
|
return []
|
||||||
return [f"{p.id}_{p.membership.club.id}"
|
scopes = [f"{p.id}_{p.membership.club.id}"
|
||||||
for t in Permission.PERMISSION_TYPES
|
for t in Permission.PERMISSION_TYPES
|
||||||
for p in PermissionBackend.get_raw_permissions(get_current_request(), t[0])]
|
for p in PermissionBackend.get_raw_permissions(get_current_request(), t[0])]
|
||||||
|
scopes.append('openid')
|
||||||
|
return scopes
|
||||||
|
|
||||||
def get_default_scopes(self, application=None, request=None, *args, **kwargs):
|
def get_default_scopes(self, application=None, request=None, *args, **kwargs):
|
||||||
if not application:
|
if not application:
|
||||||
return []
|
return []
|
||||||
return [f"{p.id}_{p.membership.club.id}"
|
scopes = [f"{p.id}_{p.membership.club.id}"
|
||||||
for p in PermissionBackend.get_raw_permissions(get_current_request(), 'view')]
|
for p in PermissionBackend.get_raw_permissions(get_current_request(), 'view')]
|
||||||
|
scopes.append('openid')
|
||||||
|
return scopes
|
||||||
|
|
||||||
|
|
||||||
class PermissionOAuth2Validator(OAuth2Validator):
|
class PermissionOAuth2Validator(OAuth2Validator):
|
||||||
oidc_claim_scope = None # fix breaking change of django-oauth-toolkit 2.0.0
|
oidc_claim_scope = OAuth2Validator.oidc_claim_scope
|
||||||
|
oidc_claim_scope.update({"name": 'openid',
|
||||||
|
"normalized_name": 'openid',
|
||||||
|
"email": 'openid',
|
||||||
|
})
|
||||||
|
|
||||||
|
def get_additional_claims(self, request):
|
||||||
|
return {
|
||||||
|
"name": request.user.username,
|
||||||
|
"normalized_name": Alias.normalize(request.user.username),
|
||||||
|
"email": request.user.email,
|
||||||
|
}
|
||||||
|
|
||||||
|
def get_discovery_claims(self, request):
|
||||||
|
claims = super().get_discovery_claims(self)
|
||||||
|
return claims + ["name", "normalized_name", "email"]
|
||||||
|
|
||||||
def validate_scopes(self, client_id, scopes, client, request, *args, **kwargs):
|
def validate_scopes(self, client_id, scopes, client, request, *args, **kwargs):
|
||||||
"""
|
"""
|
||||||
@ -54,6 +77,8 @@ class PermissionOAuth2Validator(OAuth2Validator):
|
|||||||
if scope in scopes:
|
if scope in scopes:
|
||||||
valid_scopes.add(scope)
|
valid_scopes.add(scope)
|
||||||
|
|
||||||
request.scopes = valid_scopes
|
if 'openid' in scopes:
|
||||||
|
valid_scopes.add('openid')
|
||||||
|
|
||||||
|
request.scopes = valid_scopes
|
||||||
return valid_scopes
|
return valid_scopes
|
||||||
|
@ -19,6 +19,7 @@ EXCLUDED = [
|
|||||||
'oauth2_provider.accesstoken',
|
'oauth2_provider.accesstoken',
|
||||||
'oauth2_provider.grant',
|
'oauth2_provider.grant',
|
||||||
'oauth2_provider.refreshtoken',
|
'oauth2_provider.refreshtoken',
|
||||||
|
'oauth2_provider.idtoken',
|
||||||
'sessions.session',
|
'sessions.session',
|
||||||
]
|
]
|
||||||
|
|
||||||
|
@ -171,7 +171,7 @@ class ScopesView(LoginRequiredMixin, TemplateView):
|
|||||||
available_scopes = scopes.get_available_scopes(app)
|
available_scopes = scopes.get_available_scopes(app)
|
||||||
context["scopes"][app] = OrderedDict()
|
context["scopes"][app] = OrderedDict()
|
||||||
items = [(k, v) for (k, v) in all_scopes.items() if k in available_scopes]
|
items = [(k, v) for (k, v) in all_scopes.items() if k in available_scopes]
|
||||||
items.sort(key=lambda x: (int(x[0].split("_")[1]), int(x[0].split("_")[0])))
|
# items.sort(key=lambda x: (int(x[0].split("_")[1]), int(x[0].split("_")[0])))
|
||||||
for k, v in items:
|
for k, v in items:
|
||||||
context["scopes"][app][k] = v
|
context["scopes"][app][k] = v
|
||||||
|
|
||||||
|
@ -136,7 +136,7 @@ de diffusion utiles.
|
|||||||
Faîtes attention, donc où la sortie est stockée.
|
Faîtes attention, donc où la sortie est stockée.
|
||||||
|
|
||||||
|
|
||||||
Il prend 2 options :
|
Il prend 4 options :
|
||||||
|
|
||||||
* ``--type``, qui prend en argument ``members`` (défaut), ``clubs``, ``events``, ``art``,
|
* ``--type``, qui prend en argument ``members`` (défaut), ``clubs``, ``events``, ``art``,
|
||||||
``sport``, qui permet respectivement de sortir la liste des adresses mails des adhérent⋅es
|
``sport``, qui permet respectivement de sortir la liste des adresses mails des adhérent⋅es
|
||||||
@ -149,7 +149,10 @@ Il prend 2 options :
|
|||||||
pour la ML Adhérents, pour exporter les mails des adhérents au BDE pendant n'importe
|
pour la ML Adhérents, pour exporter les mails des adhérents au BDE pendant n'importe
|
||||||
laquelle des ``n+1`` dernières années.
|
laquelle des ``n+1`` dernières années.
|
||||||
|
|
||||||
Le script sort sur la sortie standard la liste des adresses mails à inscrire.
|
* ``--email``, qui prend en argument une chaine de caractère contenant une adresse email.
|
||||||
|
|
||||||
|
Si aucun email n'est renseigné, le script sort sur la sortie standard la liste des adresses mails à inscrire.
|
||||||
|
Dans le cas contraire, la liste est envoyée à l'adresse passée en argument.
|
||||||
|
|
||||||
Attention : il y a parfois certains cas particuliers à prendre en compte, il n'est
|
Attention : il y a parfois certains cas particuliers à prendre en compte, il n'est
|
||||||
malheureusement pas aussi simple que de simplement supposer que ces listes sont exhaustives.
|
malheureusement pas aussi simple que de simplement supposer que ces listes sont exhaustives.
|
||||||
|
Reference in New Issue
Block a user