The get_or_create function is vulnerable to race conditions in MySQL, which can cause the model LoginFailure to, in some cases, have more than one row for the same user, breaking the login for that user. Addinf functionality to expect and clean the error by deleting extra rows (by oldest lockout date), leaving just one entry and allowing the user to login. Replayed and squashed by @efischer19, initially commited by @laq
2118 lines
77 KiB
Python
2118 lines
77 KiB
Python
"""
|
|
Models for User Information (students, staff, etc)
|
|
|
|
Migration Notes
|
|
|
|
If you make changes to this model, be sure to create an appropriate migration
|
|
file and check it in at the same time as your model changes. To do that,
|
|
|
|
1. Go to the edx-platform dir
|
|
2. ./manage.py lms schemamigration student --auto description_of_your_change
|
|
3. Add the migration file created in edx-platform/common/djangoapps/student/migrations/
|
|
"""
|
|
from collections import defaultdict, OrderedDict
|
|
from datetime import datetime, timedelta
|
|
from functools import total_ordering
|
|
import hashlib
|
|
from importlib import import_module
|
|
import json
|
|
import logging
|
|
from pytz import UTC
|
|
from urllib import urlencode
|
|
import uuid
|
|
|
|
import analytics
|
|
from config_models.models import ConfigurationModel
|
|
from django.utils.translation import ugettext_lazy as _
|
|
from django.conf import settings
|
|
from django.utils import timezone
|
|
from django.contrib.auth.models import User
|
|
from django.contrib.auth.hashers import make_password
|
|
from django.contrib.auth.signals import user_logged_in, user_logged_out
|
|
from django.db import models, IntegrityError, transaction
|
|
from django.db.models import Count
|
|
from django.db.models.signals import pre_save, post_save
|
|
from django.dispatch import receiver, Signal
|
|
from django.core.exceptions import ObjectDoesNotExist
|
|
from django.utils.translation import ugettext_noop
|
|
from django.core.cache import cache
|
|
from django_countries.fields import CountryField
|
|
import dogstats_wrapper as dog_stats_api
|
|
from eventtracking import tracker
|
|
from opaque_keys.edx.keys import CourseKey
|
|
from opaque_keys.edx.locations import SlashSeparatedCourseKey
|
|
from simple_history.models import HistoricalRecords
|
|
from track import contexts
|
|
from xmodule_django.models import CourseKeyField, NoneToEmptyManager
|
|
|
|
from certificates.models import GeneratedCertificate
|
|
from course_modes.models import CourseMode
|
|
from enrollment.api import _default_course_mode
|
|
from microsite_configuration import microsite
|
|
import lms.lib.comment_client as cc
|
|
from openedx.core.djangoapps.commerce.utils import ecommerce_api_client, ECOMMERCE_DATE_FORMAT
|
|
from openedx.core.djangoapps.content.course_overviews.models import CourseOverview
|
|
from util.model_utils import emit_field_changed_events, get_changed_fields_dict
|
|
from util.query import use_read_replica_if_available
|
|
from util.milestones_helpers import is_entrance_exams_enabled
|
|
|
|
|
|
UNENROLL_DONE = Signal(providing_args=["course_enrollment", "skip_refund"])
|
|
log = logging.getLogger(__name__)
|
|
AUDIT_LOG = logging.getLogger("audit")
|
|
SessionStore = import_module(settings.SESSION_ENGINE).SessionStore # pylint: disable=invalid-name
|
|
|
|
UNENROLLED_TO_ALLOWEDTOENROLL = 'from unenrolled to allowed to enroll'
|
|
ALLOWEDTOENROLL_TO_ENROLLED = 'from allowed to enroll to enrolled'
|
|
ENROLLED_TO_ENROLLED = 'from enrolled to enrolled'
|
|
ENROLLED_TO_UNENROLLED = 'from enrolled to unenrolled'
|
|
UNENROLLED_TO_ENROLLED = 'from unenrolled to enrolled'
|
|
ALLOWEDTOENROLL_TO_UNENROLLED = 'from allowed to enroll to enrolled'
|
|
UNENROLLED_TO_UNENROLLED = 'from unenrolled to unenrolled'
|
|
DEFAULT_TRANSITION_STATE = 'N/A'
|
|
|
|
TRANSITION_STATES = (
|
|
(UNENROLLED_TO_ALLOWEDTOENROLL, UNENROLLED_TO_ALLOWEDTOENROLL),
|
|
(ALLOWEDTOENROLL_TO_ENROLLED, ALLOWEDTOENROLL_TO_ENROLLED),
|
|
(ENROLLED_TO_ENROLLED, ENROLLED_TO_ENROLLED),
|
|
(ENROLLED_TO_UNENROLLED, ENROLLED_TO_UNENROLLED),
|
|
(UNENROLLED_TO_ENROLLED, UNENROLLED_TO_ENROLLED),
|
|
(ALLOWEDTOENROLL_TO_UNENROLLED, ALLOWEDTOENROLL_TO_UNENROLLED),
|
|
(UNENROLLED_TO_UNENROLLED, UNENROLLED_TO_UNENROLLED),
|
|
(DEFAULT_TRANSITION_STATE, DEFAULT_TRANSITION_STATE)
|
|
)
|
|
|
|
|
|
class AnonymousUserId(models.Model):
|
|
"""
|
|
This table contains user, course_Id and anonymous_user_id
|
|
|
|
Purpose of this table is to provide user by anonymous_user_id.
|
|
|
|
We generate anonymous_user_id using md5 algorithm,
|
|
and use result in hex form, so its length is equal to 32 bytes.
|
|
"""
|
|
|
|
objects = NoneToEmptyManager()
|
|
|
|
user = models.ForeignKey(User, db_index=True)
|
|
anonymous_user_id = models.CharField(unique=True, max_length=32)
|
|
course_id = CourseKeyField(db_index=True, max_length=255, blank=True)
|
|
unique_together = (user, course_id)
|
|
|
|
|
|
def anonymous_id_for_user(user, course_id, save=True):
|
|
"""
|
|
Return a unique id for a (user, course) pair, suitable for inserting
|
|
into e.g. personalized survey links.
|
|
|
|
If user is an `AnonymousUser`, returns `None`
|
|
|
|
Keyword arguments:
|
|
save -- Whether the id should be saved in an AnonymousUserId object.
|
|
"""
|
|
# This part is for ability to get xblock instance in xblock_noauth handlers, where user is unauthenticated.
|
|
if user.is_anonymous():
|
|
return None
|
|
|
|
cached_id = getattr(user, '_anonymous_id', {}).get(course_id)
|
|
if cached_id is not None:
|
|
return cached_id
|
|
|
|
# include the secret key as a salt, and to make the ids unique across different LMS installs.
|
|
hasher = hashlib.md5()
|
|
hasher.update(settings.SECRET_KEY)
|
|
hasher.update(unicode(user.id))
|
|
if course_id:
|
|
hasher.update(course_id.to_deprecated_string().encode('utf-8'))
|
|
digest = hasher.hexdigest()
|
|
|
|
if not hasattr(user, '_anonymous_id'):
|
|
user._anonymous_id = {} # pylint: disable=protected-access
|
|
|
|
user._anonymous_id[course_id] = digest # pylint: disable=protected-access
|
|
|
|
if save is False:
|
|
return digest
|
|
|
|
try:
|
|
anonymous_user_id, __ = AnonymousUserId.objects.get_or_create(
|
|
defaults={'anonymous_user_id': digest},
|
|
user=user,
|
|
course_id=course_id
|
|
)
|
|
if anonymous_user_id.anonymous_user_id != digest:
|
|
log.error(
|
|
u"Stored anonymous user id %r for user %r "
|
|
u"in course %r doesn't match computed id %r",
|
|
user,
|
|
course_id,
|
|
anonymous_user_id.anonymous_user_id,
|
|
digest
|
|
)
|
|
except IntegrityError:
|
|
# Another thread has already created this entry, so
|
|
# continue
|
|
pass
|
|
|
|
return digest
|
|
|
|
|
|
def user_by_anonymous_id(uid):
|
|
"""
|
|
Return user by anonymous_user_id using AnonymousUserId lookup table.
|
|
|
|
Do not raise `django.ObjectDoesNotExist` exception,
|
|
if there is no user for anonymous_student_id,
|
|
because this function will be used inside xmodule w/o django access.
|
|
"""
|
|
|
|
if uid is None:
|
|
return None
|
|
|
|
try:
|
|
return User.objects.get(anonymoususerid__anonymous_user_id=uid)
|
|
except ObjectDoesNotExist:
|
|
return None
|
|
|
|
|
|
class UserStanding(models.Model):
|
|
"""
|
|
This table contains a student's account's status.
|
|
Currently, we're only disabling accounts; in the future we can imagine
|
|
taking away more specific privileges, like forums access, or adding
|
|
more specific karma levels or probationary stages.
|
|
"""
|
|
ACCOUNT_DISABLED = "disabled"
|
|
ACCOUNT_ENABLED = "enabled"
|
|
USER_STANDING_CHOICES = (
|
|
(ACCOUNT_DISABLED, u"Account Disabled"),
|
|
(ACCOUNT_ENABLED, u"Account Enabled"),
|
|
)
|
|
|
|
user = models.OneToOneField(User, db_index=True, related_name='standing')
|
|
account_status = models.CharField(
|
|
blank=True, max_length=31, choices=USER_STANDING_CHOICES
|
|
)
|
|
changed_by = models.ForeignKey(User, blank=True)
|
|
standing_last_changed_at = models.DateTimeField(auto_now=True)
|
|
|
|
|
|
class UserProfile(models.Model):
|
|
"""This is where we store all the user demographic fields. We have a
|
|
separate table for this rather than extending the built-in Django auth_user.
|
|
|
|
Notes:
|
|
* Some fields are legacy ones from the first run of 6.002, from which
|
|
we imported many users.
|
|
* Fields like name and address are intentionally open ended, to account
|
|
for international variations. An unfortunate side-effect is that we
|
|
cannot efficiently sort on last names for instance.
|
|
|
|
Replication:
|
|
* Only the Portal servers should ever modify this information.
|
|
* All fields are replicated into relevant Course databases
|
|
|
|
Some of the fields are legacy ones that were captured during the initial
|
|
MITx fall prototype.
|
|
"""
|
|
# cache key format e.g user.<user_id>.profile.country = 'SG'
|
|
PROFILE_COUNTRY_CACHE_KEY = u"user.{user_id}.profile.country"
|
|
|
|
class Meta(object):
|
|
db_table = "auth_userprofile"
|
|
|
|
# CRITICAL TODO/SECURITY
|
|
# Sanitize all fields.
|
|
# This is not visible to other users, but could introduce holes later
|
|
user = models.OneToOneField(User, unique=True, db_index=True, related_name='profile')
|
|
name = models.CharField(blank=True, max_length=255, db_index=True)
|
|
|
|
meta = models.TextField(blank=True) # JSON dictionary for future expansion
|
|
courseware = models.CharField(blank=True, max_length=255, default='course.xml')
|
|
|
|
# Location is no longer used, but is held here for backwards compatibility
|
|
# for users imported from our first class.
|
|
language = models.CharField(blank=True, max_length=255, db_index=True)
|
|
location = models.CharField(blank=True, max_length=255, db_index=True)
|
|
|
|
# Optional demographic data we started capturing from Fall 2012
|
|
this_year = datetime.now(UTC).year
|
|
VALID_YEARS = range(this_year, this_year - 120, -1)
|
|
year_of_birth = models.IntegerField(blank=True, null=True, db_index=True)
|
|
GENDER_CHOICES = (
|
|
('m', ugettext_noop('Male')),
|
|
('f', ugettext_noop('Female')),
|
|
# Translators: 'Other' refers to the student's gender
|
|
('o', ugettext_noop('Other/Prefer Not to Say'))
|
|
)
|
|
gender = models.CharField(
|
|
blank=True, null=True, max_length=6, db_index=True, choices=GENDER_CHOICES
|
|
)
|
|
|
|
# [03/21/2013] removed these, but leaving comment since there'll still be
|
|
# p_se and p_oth in the existing data in db.
|
|
# ('p_se', 'Doctorate in science or engineering'),
|
|
# ('p_oth', 'Doctorate in another field'),
|
|
LEVEL_OF_EDUCATION_CHOICES = (
|
|
('p', ugettext_noop('Doctorate')),
|
|
('m', ugettext_noop("Master's or professional degree")),
|
|
('b', ugettext_noop("Bachelor's degree")),
|
|
('a', ugettext_noop("Associate degree")),
|
|
('hs', ugettext_noop("Secondary/high school")),
|
|
('jhs', ugettext_noop("Junior secondary/junior high/middle school")),
|
|
('el', ugettext_noop("Elementary/primary school")),
|
|
# Translators: 'None' refers to the student's level of education
|
|
('none', ugettext_noop("No Formal Education")),
|
|
# Translators: 'Other' refers to the student's level of education
|
|
('other', ugettext_noop("Other Education"))
|
|
)
|
|
level_of_education = models.CharField(
|
|
blank=True, null=True, max_length=6, db_index=True,
|
|
choices=LEVEL_OF_EDUCATION_CHOICES
|
|
)
|
|
mailing_address = models.TextField(blank=True, null=True)
|
|
city = models.TextField(blank=True, null=True)
|
|
country = CountryField(blank=True, null=True)
|
|
goals = models.TextField(blank=True, null=True)
|
|
allow_certificate = models.BooleanField(default=1)
|
|
bio = models.CharField(blank=True, null=True, max_length=3000, db_index=False)
|
|
profile_image_uploaded_at = models.DateTimeField(null=True)
|
|
|
|
@property
|
|
def has_profile_image(self):
|
|
"""
|
|
Convenience method that returns a boolean indicating whether or not
|
|
this user has uploaded a profile image.
|
|
"""
|
|
return self.profile_image_uploaded_at is not None
|
|
|
|
@property
|
|
def age(self):
|
|
""" Convenience method that returns the age given a year_of_birth. """
|
|
year_of_birth = self.year_of_birth
|
|
year = datetime.now(UTC).year
|
|
if year_of_birth is not None:
|
|
return self._calculate_age(year, year_of_birth)
|
|
|
|
@property
|
|
def level_of_education_display(self):
|
|
""" Convenience method that returns the human readable level of education. """
|
|
if self.level_of_education:
|
|
return self.__enumerable_to_display(self.LEVEL_OF_EDUCATION_CHOICES, self.level_of_education)
|
|
|
|
@property
|
|
def gender_display(self):
|
|
""" Convenience method that returns the human readable gender. """
|
|
if self.gender:
|
|
return self.__enumerable_to_display(self.GENDER_CHOICES, self.gender)
|
|
|
|
def get_meta(self): # pylint: disable=missing-docstring
|
|
js_str = self.meta
|
|
if not js_str:
|
|
js_str = dict()
|
|
else:
|
|
js_str = json.loads(self.meta)
|
|
|
|
return js_str
|
|
|
|
def set_meta(self, meta_json): # pylint: disable=missing-docstring
|
|
self.meta = json.dumps(meta_json)
|
|
|
|
def set_login_session(self, session_id=None):
|
|
"""
|
|
Sets the current session id for the logged-in user.
|
|
If session_id doesn't match the existing session,
|
|
deletes the old session object.
|
|
"""
|
|
meta = self.get_meta()
|
|
old_login = meta.get('session_id', None)
|
|
if old_login:
|
|
SessionStore(session_key=old_login).delete()
|
|
meta['session_id'] = session_id
|
|
self.set_meta(meta)
|
|
self.save()
|
|
|
|
def requires_parental_consent(self, date=None, age_limit=None, default_requires_consent=True):
|
|
"""Returns true if this user requires parental consent.
|
|
|
|
Args:
|
|
date (Date): The date for which consent needs to be tested (defaults to now).
|
|
age_limit (int): The age limit at which parental consent is no longer required.
|
|
This defaults to the value of the setting 'PARENTAL_CONTROL_AGE_LIMIT'.
|
|
default_requires_consent (bool): True if users require parental consent if they
|
|
have no specified year of birth (default is True).
|
|
|
|
Returns:
|
|
True if the user requires parental consent.
|
|
"""
|
|
if age_limit is None:
|
|
age_limit = getattr(settings, 'PARENTAL_CONSENT_AGE_LIMIT', None)
|
|
if age_limit is None:
|
|
return False
|
|
|
|
# Return True if either:
|
|
# a) The user has a year of birth specified and that year is fewer years in the past than the limit.
|
|
# b) The user has no year of birth specified and the default is to require consent.
|
|
#
|
|
# Note: we have to be conservative using the user's year of birth as their birth date could be
|
|
# December 31st. This means that if the number of years since their birth year is exactly equal
|
|
# to the age limit then we have to assume that they might still not be old enough.
|
|
year_of_birth = self.year_of_birth
|
|
if year_of_birth is None:
|
|
return default_requires_consent
|
|
|
|
if date is None:
|
|
age = self.age
|
|
else:
|
|
age = self._calculate_age(date.year, year_of_birth)
|
|
|
|
return age < age_limit
|
|
|
|
def __enumerable_to_display(self, enumerables, enum_value):
|
|
""" Get the human readable value from an enumerable list of key-value pairs. """
|
|
return dict(enumerables)[enum_value]
|
|
|
|
def _calculate_age(self, year, year_of_birth):
|
|
"""Calculate the youngest age for a user with a given year of birth.
|
|
|
|
:param year: year
|
|
:param year_of_birth: year of birth
|
|
:return: youngest age a user could be for the given year
|
|
"""
|
|
# There are legal implications regarding how we can contact users and what information we can make public
|
|
# based on their age, so we must take the most conservative estimate.
|
|
return year - year_of_birth - 1
|
|
|
|
@classmethod
|
|
def country_cache_key_name(cls, user_id):
|
|
"""Return cache key name to be used to cache current country.
|
|
Args:
|
|
user_id(int): Id of user.
|
|
|
|
Returns:
|
|
Unicode cache key
|
|
"""
|
|
return cls.PROFILE_COUNTRY_CACHE_KEY.format(user_id=user_id)
|
|
|
|
|
|
@receiver(models.signals.post_save, sender=UserProfile)
|
|
def invalidate_user_profile_country_cache(sender, instance, **kwargs): # pylint: disable=unused-argument, invalid-name
|
|
"""Invalidate the cache of country in UserProfile model. """
|
|
|
|
changed_fields = getattr(instance, '_changed_fields', {})
|
|
|
|
if 'country' in changed_fields:
|
|
cache_key = UserProfile.country_cache_key_name(instance.user_id)
|
|
cache.delete(cache_key)
|
|
log.info("Country changed in UserProfile for %s, cache deleted", instance.user_id)
|
|
|
|
|
|
@receiver(pre_save, sender=UserProfile)
|
|
def user_profile_pre_save_callback(sender, **kwargs):
|
|
"""
|
|
Ensure consistency of a user profile before saving it.
|
|
"""
|
|
user_profile = kwargs['instance']
|
|
|
|
# Remove profile images for users who require parental consent
|
|
if user_profile.requires_parental_consent() and user_profile.has_profile_image:
|
|
user_profile.profile_image_uploaded_at = None
|
|
|
|
# Cache "old" field values on the model instance so that they can be
|
|
# retrieved in the post_save callback when we emit an event with new and
|
|
# old field values.
|
|
user_profile._changed_fields = get_changed_fields_dict(user_profile, sender)
|
|
|
|
|
|
@receiver(post_save, sender=UserProfile)
|
|
def user_profile_post_save_callback(sender, **kwargs):
|
|
"""
|
|
Emit analytics events after saving the UserProfile.
|
|
"""
|
|
user_profile = kwargs['instance']
|
|
# pylint: disable=protected-access
|
|
emit_field_changed_events(
|
|
user_profile,
|
|
user_profile.user,
|
|
sender._meta.db_table,
|
|
excluded_fields=['meta']
|
|
)
|
|
|
|
|
|
@receiver(pre_save, sender=User)
|
|
def user_pre_save_callback(sender, **kwargs):
|
|
"""
|
|
Capture old fields on the user instance before save and cache them as a
|
|
private field on the current model for use in the post_save callback.
|
|
"""
|
|
user = kwargs['instance']
|
|
user._changed_fields = get_changed_fields_dict(user, sender)
|
|
|
|
|
|
@receiver(post_save, sender=User)
|
|
def user_post_save_callback(sender, **kwargs):
|
|
"""
|
|
Emit analytics events after saving the User.
|
|
"""
|
|
user = kwargs['instance']
|
|
# pylint: disable=protected-access
|
|
emit_field_changed_events(
|
|
user,
|
|
user,
|
|
sender._meta.db_table,
|
|
excluded_fields=['last_login', 'first_name', 'last_name'],
|
|
hidden_fields=['password']
|
|
)
|
|
|
|
|
|
class UserSignupSource(models.Model):
|
|
"""
|
|
This table contains information about users registering
|
|
via Micro-Sites
|
|
"""
|
|
user = models.ForeignKey(User, db_index=True)
|
|
site = models.CharField(max_length=255, db_index=True)
|
|
|
|
|
|
def unique_id_for_user(user, save=True):
|
|
"""
|
|
Return a unique id for a user, suitable for inserting into
|
|
e.g. personalized survey links.
|
|
|
|
Keyword arguments:
|
|
save -- Whether the id should be saved in an AnonymousUserId object.
|
|
"""
|
|
# Setting course_id to '' makes it not affect the generated hash,
|
|
# and thus produce the old per-student anonymous id
|
|
return anonymous_id_for_user(user, None, save=save)
|
|
|
|
|
|
# TODO: Should be renamed to generic UserGroup, and possibly
|
|
# Given an optional field for type of group
|
|
class UserTestGroup(models.Model):
|
|
users = models.ManyToManyField(User, db_index=True)
|
|
name = models.CharField(blank=False, max_length=32, db_index=True)
|
|
description = models.TextField(blank=True)
|
|
|
|
|
|
class Registration(models.Model):
|
|
''' Allows us to wait for e-mail before user is registered. A
|
|
registration profile is created when the user creates an
|
|
account, but that account is inactive. Once the user clicks
|
|
on the activation key, it becomes active. '''
|
|
|
|
class Meta(object):
|
|
db_table = "auth_registration"
|
|
|
|
user = models.OneToOneField(User)
|
|
activation_key = models.CharField(('activation key'), max_length=32, unique=True, db_index=True)
|
|
|
|
def register(self, user):
|
|
# MINOR TODO: Switch to crypto-secure key
|
|
self.activation_key = uuid.uuid4().hex
|
|
self.user = user
|
|
self.save()
|
|
|
|
def activate(self):
|
|
self.user.is_active = True
|
|
self._track_activation()
|
|
self.user.save()
|
|
|
|
def _track_activation(self):
|
|
""" Update the isActive flag in mailchimp for activated users."""
|
|
has_segment_key = getattr(settings, 'LMS_SEGMENT_KEY', None)
|
|
has_mailchimp_id = hasattr(settings, 'MAILCHIMP_NEW_USER_LIST_ID')
|
|
if has_segment_key and has_mailchimp_id:
|
|
identity_args = [
|
|
self.user.id, # pylint: disable=no-member
|
|
{
|
|
'email': self.user.email,
|
|
'username': self.user.username,
|
|
'activated': 1,
|
|
},
|
|
{
|
|
"MailChimp": {
|
|
"listId": settings.MAILCHIMP_NEW_USER_LIST_ID
|
|
}
|
|
}
|
|
]
|
|
analytics.identify(*identity_args)
|
|
|
|
|
|
class PendingNameChange(models.Model):
|
|
user = models.OneToOneField(User, unique=True, db_index=True)
|
|
new_name = models.CharField(blank=True, max_length=255)
|
|
rationale = models.CharField(blank=True, max_length=1024)
|
|
|
|
|
|
class PendingEmailChange(models.Model):
|
|
user = models.OneToOneField(User, unique=True, db_index=True)
|
|
new_email = models.CharField(blank=True, max_length=255, db_index=True)
|
|
activation_key = models.CharField(('activation key'), max_length=32, unique=True, db_index=True)
|
|
|
|
def request_change(self, email):
|
|
"""Request a change to a user's email.
|
|
|
|
Implicitly saves the pending email change record.
|
|
|
|
Arguments:
|
|
email (unicode): The proposed new email for the user.
|
|
|
|
Returns:
|
|
unicode: The activation code to confirm the change.
|
|
|
|
"""
|
|
self.new_email = email
|
|
self.activation_key = uuid.uuid4().hex
|
|
self.save()
|
|
return self.activation_key
|
|
|
|
|
|
EVENT_NAME_ENROLLMENT_ACTIVATED = 'edx.course.enrollment.activated'
|
|
EVENT_NAME_ENROLLMENT_DEACTIVATED = 'edx.course.enrollment.deactivated'
|
|
EVENT_NAME_ENROLLMENT_MODE_CHANGED = 'edx.course.enrollment.mode_changed'
|
|
|
|
|
|
class PasswordHistory(models.Model):
|
|
"""
|
|
This model will keep track of past passwords that a user has used
|
|
as well as providing contraints (e.g. can't reuse passwords)
|
|
"""
|
|
user = models.ForeignKey(User)
|
|
password = models.CharField(max_length=128)
|
|
time_set = models.DateTimeField(default=timezone.now)
|
|
|
|
def create(self, user):
|
|
"""
|
|
This will copy over the current password, if any of the configuration has been turned on
|
|
"""
|
|
|
|
if not (PasswordHistory.is_student_password_reuse_restricted() or
|
|
PasswordHistory.is_staff_password_reuse_restricted() or
|
|
PasswordHistory.is_password_reset_frequency_restricted() or
|
|
PasswordHistory.is_staff_forced_password_reset_enabled() or
|
|
PasswordHistory.is_student_forced_password_reset_enabled()):
|
|
|
|
return
|
|
|
|
self.user = user
|
|
self.password = user.password
|
|
self.save()
|
|
|
|
@classmethod
|
|
def is_student_password_reuse_restricted(cls):
|
|
"""
|
|
Returns whether the configuration which limits password reuse has been turned on
|
|
"""
|
|
if not settings.FEATURES['ADVANCED_SECURITY']:
|
|
return False
|
|
min_diff_pw = settings.ADVANCED_SECURITY_CONFIG.get(
|
|
'MIN_DIFFERENT_STUDENT_PASSWORDS_BEFORE_REUSE', 0
|
|
)
|
|
return min_diff_pw > 0
|
|
|
|
@classmethod
|
|
def is_staff_password_reuse_restricted(cls):
|
|
"""
|
|
Returns whether the configuration which limits password reuse has been turned on
|
|
"""
|
|
if not settings.FEATURES['ADVANCED_SECURITY']:
|
|
return False
|
|
min_diff_pw = settings.ADVANCED_SECURITY_CONFIG.get(
|
|
'MIN_DIFFERENT_STAFF_PASSWORDS_BEFORE_REUSE', 0
|
|
)
|
|
return min_diff_pw > 0
|
|
|
|
@classmethod
|
|
def is_password_reset_frequency_restricted(cls):
|
|
"""
|
|
Returns whether the configuration which limits the password reset frequency has been turned on
|
|
"""
|
|
if not settings.FEATURES['ADVANCED_SECURITY']:
|
|
return False
|
|
min_days_between_reset = settings.ADVANCED_SECURITY_CONFIG.get(
|
|
'MIN_TIME_IN_DAYS_BETWEEN_ALLOWED_RESETS'
|
|
)
|
|
return min_days_between_reset
|
|
|
|
@classmethod
|
|
def is_staff_forced_password_reset_enabled(cls):
|
|
"""
|
|
Returns whether the configuration which forces password resets to occur has been turned on
|
|
"""
|
|
if not settings.FEATURES['ADVANCED_SECURITY']:
|
|
return False
|
|
min_days_between_reset = settings.ADVANCED_SECURITY_CONFIG.get(
|
|
'MIN_DAYS_FOR_STAFF_ACCOUNTS_PASSWORD_RESETS'
|
|
)
|
|
return min_days_between_reset
|
|
|
|
@classmethod
|
|
def is_student_forced_password_reset_enabled(cls):
|
|
"""
|
|
Returns whether the configuration which forces password resets to occur has been turned on
|
|
"""
|
|
if not settings.FEATURES['ADVANCED_SECURITY']:
|
|
return False
|
|
min_days_pw_reset = settings.ADVANCED_SECURITY_CONFIG.get(
|
|
'MIN_DAYS_FOR_STUDENT_ACCOUNTS_PASSWORD_RESETS'
|
|
)
|
|
return min_days_pw_reset
|
|
|
|
@classmethod
|
|
def should_user_reset_password_now(cls, user):
|
|
"""
|
|
Returns whether a password has 'expired' and should be reset. Note there are two different
|
|
expiry policies for staff and students
|
|
"""
|
|
if not settings.FEATURES['ADVANCED_SECURITY']:
|
|
return False
|
|
|
|
days_before_password_reset = None
|
|
if user.is_staff:
|
|
if cls.is_staff_forced_password_reset_enabled():
|
|
days_before_password_reset = \
|
|
settings.ADVANCED_SECURITY_CONFIG['MIN_DAYS_FOR_STAFF_ACCOUNTS_PASSWORD_RESETS']
|
|
elif cls.is_student_forced_password_reset_enabled():
|
|
days_before_password_reset = \
|
|
settings.ADVANCED_SECURITY_CONFIG['MIN_DAYS_FOR_STUDENT_ACCOUNTS_PASSWORD_RESETS']
|
|
|
|
if days_before_password_reset:
|
|
history = PasswordHistory.objects.filter(user=user).order_by('-time_set')
|
|
time_last_reset = None
|
|
|
|
if history:
|
|
# first element should be the last time we reset password
|
|
time_last_reset = history[0].time_set
|
|
else:
|
|
# no history, then let's take the date the user joined
|
|
time_last_reset = user.date_joined
|
|
|
|
now = timezone.now()
|
|
|
|
delta = now - time_last_reset
|
|
|
|
return delta.days >= days_before_password_reset
|
|
|
|
return False
|
|
|
|
@classmethod
|
|
def is_password_reset_too_soon(cls, user):
|
|
"""
|
|
Verifies that the password is not getting reset too frequently
|
|
"""
|
|
if not cls.is_password_reset_frequency_restricted():
|
|
return False
|
|
|
|
history = PasswordHistory.objects.filter(user=user).order_by('-time_set')
|
|
|
|
if not history:
|
|
return False
|
|
|
|
now = timezone.now()
|
|
|
|
delta = now - history[0].time_set
|
|
|
|
return delta.days < settings.ADVANCED_SECURITY_CONFIG['MIN_TIME_IN_DAYS_BETWEEN_ALLOWED_RESETS']
|
|
|
|
@classmethod
|
|
def is_allowable_password_reuse(cls, user, new_password):
|
|
"""
|
|
Verifies that the password adheres to the reuse policies
|
|
"""
|
|
if not settings.FEATURES['ADVANCED_SECURITY']:
|
|
return True
|
|
|
|
if user.is_staff and cls.is_staff_password_reuse_restricted():
|
|
min_diff_passwords_required = \
|
|
settings.ADVANCED_SECURITY_CONFIG['MIN_DIFFERENT_STAFF_PASSWORDS_BEFORE_REUSE']
|
|
elif cls.is_student_password_reuse_restricted():
|
|
min_diff_passwords_required = \
|
|
settings.ADVANCED_SECURITY_CONFIG['MIN_DIFFERENT_STUDENT_PASSWORDS_BEFORE_REUSE']
|
|
else:
|
|
min_diff_passwords_required = 0
|
|
|
|
# just limit the result set to the number of different
|
|
# password we need
|
|
history = PasswordHistory.objects.filter(user=user).order_by('-time_set')[:min_diff_passwords_required]
|
|
|
|
for entry in history:
|
|
|
|
# be sure to re-use the same salt
|
|
# NOTE, how the salt is serialized in the password field is dependent on the algorithm
|
|
# in pbkdf2_sha256 [LMS] it's the 3rd element, in sha1 [unit tests] it's the 2nd element
|
|
hash_elements = entry.password.split('$')
|
|
algorithm = hash_elements[0]
|
|
if algorithm == 'pbkdf2_sha256':
|
|
hashed_password = make_password(new_password, hash_elements[2])
|
|
elif algorithm == 'sha1':
|
|
hashed_password = make_password(new_password, hash_elements[1])
|
|
else:
|
|
# This means we got something unexpected. We don't want to throw an exception, but
|
|
# log as an error and basically allow any password reuse
|
|
AUDIT_LOG.error('''
|
|
Unknown password hashing algorithm "{0}" found in existing password
|
|
hash, password reuse policy will not be enforced!!!
|
|
'''.format(algorithm))
|
|
return True
|
|
|
|
if entry.password == hashed_password:
|
|
return False
|
|
|
|
return True
|
|
|
|
|
|
class LoginFailures(models.Model):
|
|
"""
|
|
This model will keep track of failed login attempts
|
|
"""
|
|
user = models.ForeignKey(User)
|
|
failure_count = models.IntegerField(default=0)
|
|
lockout_until = models.DateTimeField(null=True)
|
|
|
|
@classmethod
|
|
def _get_record_for_user(cls, user):
|
|
"""
|
|
Gets a user's record, and fixes any duplicates that may have arisen due to get_or_create
|
|
race conditions. See https://code.djangoproject.com/ticket/13906 for details.
|
|
|
|
Use this method in place of `LoginFailures.objects.get(user=user)`
|
|
"""
|
|
records = LoginFailures.objects.filter(user=user).order_by('-lockout_until')
|
|
for extra_record in records[1:]:
|
|
extra_record.delete()
|
|
return records.get()
|
|
|
|
@classmethod
|
|
def is_feature_enabled(cls):
|
|
"""
|
|
Returns whether the feature flag around this functionality has been set
|
|
"""
|
|
return settings.FEATURES['ENABLE_MAX_FAILED_LOGIN_ATTEMPTS']
|
|
|
|
@classmethod
|
|
def is_user_locked_out(cls, user):
|
|
"""
|
|
Static method to return in a given user has his/her account locked out
|
|
"""
|
|
try:
|
|
record = cls._get_record_for_user(user)
|
|
if not record.lockout_until:
|
|
return False
|
|
|
|
now = datetime.now(UTC)
|
|
until = record.lockout_until
|
|
is_locked_out = until and now < until
|
|
|
|
return is_locked_out
|
|
except ObjectDoesNotExist:
|
|
return False
|
|
|
|
@classmethod
|
|
def increment_lockout_counter(cls, user):
|
|
"""
|
|
Ticks the failed attempt counter
|
|
"""
|
|
record, _ = LoginFailures.objects.get_or_create(user=user)
|
|
record.failure_count = record.failure_count + 1
|
|
max_failures_allowed = settings.MAX_FAILED_LOGIN_ATTEMPTS_ALLOWED
|
|
|
|
# did we go over the limit in attempts
|
|
if record.failure_count >= max_failures_allowed:
|
|
# yes, then store when this account is locked out until
|
|
lockout_period_secs = settings.MAX_FAILED_LOGIN_ATTEMPTS_LOCKOUT_PERIOD_SECS
|
|
record.lockout_until = datetime.now(UTC) + timedelta(seconds=lockout_period_secs)
|
|
|
|
record.save()
|
|
|
|
@classmethod
|
|
def clear_lockout_counter(cls, user):
|
|
"""
|
|
Removes the lockout counters (normally called after a successful login)
|
|
"""
|
|
try:
|
|
entry = cls._get_record_for_user(user)
|
|
entry.delete()
|
|
except ObjectDoesNotExist:
|
|
return
|
|
|
|
|
|
class CourseEnrollmentException(Exception):
|
|
pass
|
|
|
|
|
|
class NonExistentCourseError(CourseEnrollmentException):
|
|
pass
|
|
|
|
|
|
class EnrollmentClosedError(CourseEnrollmentException):
|
|
pass
|
|
|
|
|
|
class CourseFullError(CourseEnrollmentException):
|
|
pass
|
|
|
|
|
|
class AlreadyEnrolledError(CourseEnrollmentException):
|
|
pass
|
|
|
|
|
|
class CourseEnrollmentManager(models.Manager):
|
|
"""
|
|
Custom manager for CourseEnrollment with Table-level filter methods.
|
|
"""
|
|
|
|
def num_enrolled_in(self, course_id):
|
|
"""
|
|
Returns the count of active enrollments in a course.
|
|
|
|
'course_id' is the course_id to return enrollments
|
|
"""
|
|
|
|
enrollment_number = super(CourseEnrollmentManager, self).get_queryset().filter(
|
|
course_id=course_id,
|
|
is_active=1
|
|
).count()
|
|
|
|
return enrollment_number
|
|
|
|
def is_course_full(self, course):
|
|
"""
|
|
Returns a boolean value regarding whether a course has already reached it's max enrollment
|
|
capacity
|
|
"""
|
|
is_course_full = False
|
|
if course.max_student_enrollments_allowed is not None:
|
|
is_course_full = self.num_enrolled_in(course.id) >= course.max_student_enrollments_allowed
|
|
return is_course_full
|
|
|
|
def users_enrolled_in(self, course_id):
|
|
"""Return a queryset of User for every user enrolled in the course."""
|
|
return User.objects.filter(
|
|
courseenrollment__course_id=course_id,
|
|
courseenrollment__is_active=True
|
|
)
|
|
|
|
def enrollment_counts(self, course_id):
|
|
"""
|
|
Returns a dictionary that stores the total enrollment count for a course, as well as the
|
|
enrollment count for each individual mode.
|
|
"""
|
|
# Unfortunately, Django's "group by"-style queries look super-awkward
|
|
query = use_read_replica_if_available(
|
|
super(CourseEnrollmentManager, self).get_queryset().filter(course_id=course_id, is_active=True).values(
|
|
'mode').order_by().annotate(Count('mode')))
|
|
total = 0
|
|
enroll_dict = defaultdict(int)
|
|
for item in query:
|
|
enroll_dict[item['mode']] = item['mode__count']
|
|
total += item['mode__count']
|
|
enroll_dict['total'] = total
|
|
return enroll_dict
|
|
|
|
def enrolled_and_dropped_out_users(self, course_id):
|
|
"""Return a queryset of Users in the course."""
|
|
return User.objects.filter(
|
|
courseenrollment__course_id=course_id
|
|
)
|
|
|
|
|
|
class CourseEnrollment(models.Model):
|
|
"""
|
|
Represents a Student's Enrollment record for a single Course. You should
|
|
generally not manipulate CourseEnrollment objects directly, but use the
|
|
classmethods provided to enroll, unenroll, or check on the enrollment status
|
|
of a given student.
|
|
|
|
We're starting to consolidate course enrollment logic in this class, but
|
|
more should be brought in (such as checking against CourseEnrollmentAllowed,
|
|
checking course dates, user permissions, etc.) This logic is currently
|
|
scattered across our views.
|
|
"""
|
|
MODEL_TAGS = ['course_id', 'is_active', 'mode']
|
|
|
|
user = models.ForeignKey(User)
|
|
course_id = CourseKeyField(max_length=255, db_index=True)
|
|
created = models.DateTimeField(auto_now_add=True, null=True, db_index=True)
|
|
|
|
# If is_active is False, then the student is not considered to be enrolled
|
|
# in the course (is_enrolled() will return False)
|
|
is_active = models.BooleanField(default=True)
|
|
|
|
# Represents the modes that are possible. We'll update this later with a
|
|
# list of possible values.
|
|
mode = models.CharField(default=CourseMode.DEFAULT_MODE_SLUG, max_length=100)
|
|
|
|
objects = CourseEnrollmentManager()
|
|
|
|
# Maintain a history of requirement status updates for auditing purposes
|
|
history = HistoricalRecords()
|
|
|
|
# cache key format e.g enrollment.<username>.<course_key>.mode = 'honor'
|
|
COURSE_ENROLLMENT_CACHE_KEY = u"enrollment.{}.{}.mode"
|
|
|
|
class Meta(object):
|
|
unique_together = (('user', 'course_id'),)
|
|
ordering = ('user', 'course_id')
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
super(CourseEnrollment, self).__init__(*args, **kwargs)
|
|
|
|
# Private variable for storing course_overview to minimize calls to the database.
|
|
# When the property .course_overview is accessed for the first time, this variable will be set.
|
|
self._course_overview = None
|
|
|
|
def __unicode__(self):
|
|
return (
|
|
"[CourseEnrollment] {}: {} ({}); active: ({})"
|
|
).format(self.user, self.course_id, self.created, self.is_active)
|
|
|
|
@classmethod
|
|
@transaction.atomic
|
|
def get_or_create_enrollment(cls, user, course_key):
|
|
"""
|
|
Create an enrollment for a user in a class. By default *this enrollment
|
|
is not active*. This is useful for when an enrollment needs to go
|
|
through some sort of approval process before being activated. If you
|
|
don't need this functionality, just call `enroll()` instead.
|
|
|
|
Returns a CoursewareEnrollment object.
|
|
|
|
`user` is a Django User object. If it hasn't been saved yet (no `.id`
|
|
attribute), this method will automatically save it before
|
|
adding an enrollment for it.
|
|
|
|
`course_id` is our usual course_id string (e.g. "edX/Test101/2013_Fall)
|
|
|
|
It is expected that this method is called from a method which has already
|
|
verified the user authentication and access.
|
|
"""
|
|
# If we're passing in a newly constructed (i.e. not yet persisted) User,
|
|
# save it to the database so that it can have an ID that we can throw
|
|
# into our CourseEnrollment object. Otherwise, we'll get an
|
|
# IntegrityError for having a null user_id.
|
|
assert isinstance(course_key, CourseKey)
|
|
|
|
if user.id is None:
|
|
user.save()
|
|
|
|
enrollment, created = cls.objects.get_or_create(
|
|
user=user,
|
|
course_id=course_key,
|
|
)
|
|
|
|
# If we *did* just create a new enrollment, set some defaults
|
|
if created:
|
|
enrollment.mode = CourseMode.DEFAULT_MODE_SLUG
|
|
enrollment.is_active = False
|
|
enrollment.save()
|
|
|
|
return enrollment
|
|
|
|
@classmethod
|
|
def get_enrollment(cls, user, course_key):
|
|
"""Returns a CoursewareEnrollment object.
|
|
|
|
Args:
|
|
user (User): The user associated with the enrollment.
|
|
course_id (CourseKey): The key of the course associated with the enrollment.
|
|
|
|
Returns:
|
|
Course enrollment object or None
|
|
"""
|
|
try:
|
|
return cls.objects.get(
|
|
user=user,
|
|
course_id=course_key
|
|
)
|
|
except cls.DoesNotExist:
|
|
return None
|
|
|
|
@classmethod
|
|
def is_enrollment_closed(cls, user, course):
|
|
"""
|
|
Returns a boolean value regarding whether the user has access to enroll in the course. Returns False if the
|
|
enrollment has been closed.
|
|
"""
|
|
# Disable the pylint error here, as per ormsbee. This local import was previously
|
|
# in CourseEnrollment.enroll
|
|
from courseware.access import has_access # pylint: disable=import-error
|
|
return not has_access(user, 'enroll', course)
|
|
|
|
def update_enrollment(self, mode=None, is_active=None, skip_refund=False):
|
|
"""
|
|
Updates an enrollment for a user in a class. This includes options
|
|
like changing the mode, toggling is_active True/False, etc.
|
|
|
|
Also emits relevant events for analytics purposes.
|
|
|
|
This saves immediately.
|
|
|
|
"""
|
|
activation_changed = False
|
|
# if is_active is None, then the call to update_enrollment didn't specify
|
|
# any value, so just leave is_active as it is
|
|
if self.is_active != is_active and is_active is not None:
|
|
self.is_active = is_active
|
|
activation_changed = True
|
|
|
|
mode_changed = False
|
|
# if mode is None, the call to update_enrollment didn't specify a new
|
|
# mode, so leave as-is
|
|
if self.mode != mode and mode is not None:
|
|
self.mode = mode
|
|
mode_changed = True
|
|
|
|
if activation_changed or mode_changed:
|
|
self.save()
|
|
|
|
if activation_changed:
|
|
if self.is_active:
|
|
self.emit_event(EVENT_NAME_ENROLLMENT_ACTIVATED)
|
|
|
|
dog_stats_api.increment(
|
|
"common.student.enrollment",
|
|
tags=[u"org:{}".format(self.course_id.org),
|
|
u"offering:{}".format(self.course_id.offering),
|
|
u"mode:{}".format(self.mode)]
|
|
)
|
|
|
|
else:
|
|
UNENROLL_DONE.send(sender=None, course_enrollment=self, skip_refund=skip_refund)
|
|
|
|
self.emit_event(EVENT_NAME_ENROLLMENT_DEACTIVATED)
|
|
|
|
dog_stats_api.increment(
|
|
"common.student.unenrollment",
|
|
tags=[u"org:{}".format(self.course_id.org),
|
|
u"offering:{}".format(self.course_id.offering),
|
|
u"mode:{}".format(self.mode)]
|
|
)
|
|
if mode_changed:
|
|
# Only emit mode change events when the user's enrollment
|
|
# mode has changed from its previous setting
|
|
self.emit_event(EVENT_NAME_ENROLLMENT_MODE_CHANGED)
|
|
|
|
def emit_event(self, event_name):
|
|
"""
|
|
Emits an event to explicitly track course enrollment and unenrollment.
|
|
"""
|
|
|
|
try:
|
|
context = contexts.course_context_from_course_id(self.course_id)
|
|
assert isinstance(self.course_id, CourseKey)
|
|
data = {
|
|
'user_id': self.user.id,
|
|
'course_id': self.course_id.to_deprecated_string(),
|
|
'mode': self.mode,
|
|
}
|
|
|
|
with tracker.get_tracker().context(event_name, context):
|
|
tracker.emit(event_name, data)
|
|
|
|
if hasattr(settings, 'LMS_SEGMENT_KEY') and settings.LMS_SEGMENT_KEY:
|
|
tracking_context = tracker.get_tracker().resolve_context()
|
|
analytics.track(self.user_id, event_name, {
|
|
'category': 'conversion',
|
|
'label': self.course_id.to_deprecated_string(),
|
|
'org': self.course_id.org,
|
|
'course': self.course_id.course,
|
|
'run': self.course_id.run,
|
|
'mode': self.mode,
|
|
}, context={
|
|
'ip': tracking_context.get('ip'),
|
|
'Google Analytics': {
|
|
'clientId': tracking_context.get('client_id')
|
|
}
|
|
})
|
|
|
|
except: # pylint: disable=bare-except
|
|
if event_name and self.course_id:
|
|
log.exception(
|
|
u'Unable to emit event %s for user %s and course %s',
|
|
event_name,
|
|
self.user.username,
|
|
self.course_id,
|
|
)
|
|
|
|
@classmethod
|
|
def enroll(cls, user, course_key, mode=None, check_access=False):
|
|
"""
|
|
Enroll a user in a course. This saves immediately.
|
|
|
|
Returns a CoursewareEnrollment object.
|
|
|
|
`user` is a Django User object. If it hasn't been saved yet (no `.id`
|
|
attribute), this method will automatically save it before
|
|
adding an enrollment for it.
|
|
|
|
`course_key` is our usual course_id string (e.g. "edX/Test101/2013_Fall)
|
|
|
|
`mode` is a string specifying what kind of enrollment this is. The
|
|
default is the default course mode, 'audit'. Other options
|
|
include 'professional', 'verified', 'honor',
|
|
'no-id-professional' and 'credit'.
|
|
See CourseMode in common/djangoapps/course_modes/models.py.
|
|
|
|
`check_access`: if True, we check that an accessible course actually
|
|
exists for the given course_key before we enroll the student.
|
|
The default is set to False to avoid breaking legacy code or
|
|
code with non-standard flows (ex. beta tester invitations), but
|
|
for any standard enrollment flow you probably want this to be True.
|
|
|
|
Exceptions that can be raised: NonExistentCourseError,
|
|
EnrollmentClosedError, CourseFullError, AlreadyEnrolledError. All these
|
|
are subclasses of CourseEnrollmentException if you want to catch all of
|
|
them in the same way.
|
|
|
|
It is expected that this method is called from a method which has already
|
|
verified the user authentication.
|
|
|
|
Also emits relevant events for analytics purposes.
|
|
"""
|
|
if mode is None:
|
|
mode = _default_course_mode(unicode(course_key))
|
|
# All the server-side checks for whether a user is allowed to enroll.
|
|
try:
|
|
course = CourseOverview.get_from_id(course_key)
|
|
except CourseOverview.DoesNotExist:
|
|
# This is here to preserve legacy behavior which allowed enrollment in courses
|
|
# announced before the start of content creation.
|
|
if check_access:
|
|
log.warning(u"User %s failed to enroll in non-existent course %s", user.username, unicode(course_key))
|
|
raise NonExistentCourseError
|
|
|
|
if check_access:
|
|
if cls.is_enrollment_closed(user, course):
|
|
log.warning(
|
|
u"User %s failed to enroll in course %s because enrollment is closed",
|
|
user.username,
|
|
course_key.to_deprecated_string()
|
|
)
|
|
raise EnrollmentClosedError
|
|
|
|
if cls.objects.is_course_full(course):
|
|
log.warning(
|
|
u"Course %s has reached its maximum enrollment of %d learners. User %s failed to enroll.",
|
|
course_key.to_deprecated_string(),
|
|
course.max_student_enrollments_allowed,
|
|
user.username,
|
|
)
|
|
raise CourseFullError
|
|
if cls.is_enrolled(user, course_key):
|
|
log.warning(
|
|
u"User %s attempted to enroll in %s, but they were already enrolled",
|
|
user.username,
|
|
course_key.to_deprecated_string()
|
|
)
|
|
if check_access:
|
|
raise AlreadyEnrolledError
|
|
|
|
# User is allowed to enroll if they've reached this point.
|
|
enrollment = cls.get_or_create_enrollment(user, course_key)
|
|
enrollment.update_enrollment(is_active=True, mode=mode)
|
|
return enrollment
|
|
|
|
@classmethod
|
|
def enroll_by_email(cls, email, course_id, mode=None, ignore_errors=True):
|
|
"""
|
|
Enroll a user in a course given their email. This saves immediately.
|
|
|
|
Note that enrolling by email is generally done in big batches and the
|
|
error rate is high. For that reason, we supress User lookup errors by
|
|
default.
|
|
|
|
Returns a CoursewareEnrollment object. If the User does not exist and
|
|
`ignore_errors` is set to `True`, it will return None.
|
|
|
|
`email` Email address of the User to add to enroll in the course.
|
|
|
|
`course_id` is our usual course_id string (e.g. "edX/Test101/2013_Fall)
|
|
|
|
`mode` is a string specifying what kind of enrollment this is. The
|
|
default is the default course mode, 'audit'. Other options
|
|
include 'professional', 'verified', 'honor',
|
|
'no-id-professional' and 'credit'.
|
|
See CourseMode in common/djangoapps/course_modes/models.py.
|
|
|
|
`ignore_errors` is a boolean indicating whether we should suppress
|
|
`User.DoesNotExist` errors (returning None) or let it
|
|
bubble up.
|
|
|
|
It is expected that this method is called from a method which has already
|
|
verified the user authentication and access.
|
|
"""
|
|
try:
|
|
user = User.objects.get(email=email)
|
|
return cls.enroll(user, course_id, mode)
|
|
except User.DoesNotExist:
|
|
err_msg = u"Tried to enroll email {} into course {}, but user not found"
|
|
log.error(err_msg.format(email, course_id))
|
|
if ignore_errors:
|
|
return None
|
|
raise
|
|
|
|
@classmethod
|
|
def unenroll(cls, user, course_id, skip_refund=False):
|
|
"""
|
|
Remove the user from a given course. If the relevant `CourseEnrollment`
|
|
object doesn't exist, we log an error but don't throw an exception.
|
|
|
|
`user` is a Django User object. If it hasn't been saved yet (no `.id`
|
|
attribute), this method will automatically save it before
|
|
adding an enrollment for it.
|
|
|
|
`course_id` is our usual course_id string (e.g. "edX/Test101/2013_Fall)
|
|
|
|
`skip_refund` can be set to True to avoid the refund process.
|
|
"""
|
|
try:
|
|
record = cls.objects.get(user=user, course_id=course_id)
|
|
record.update_enrollment(is_active=False, skip_refund=skip_refund)
|
|
|
|
except cls.DoesNotExist:
|
|
log.error(
|
|
u"Tried to unenroll student %s from %s but they were not enrolled",
|
|
user,
|
|
course_id
|
|
)
|
|
|
|
@classmethod
|
|
def unenroll_by_email(cls, email, course_id):
|
|
"""
|
|
Unenroll a user from a course given their email. This saves immediately.
|
|
User lookup errors are logged but will not throw an exception.
|
|
|
|
`email` Email address of the User to unenroll from the course.
|
|
|
|
`course_id` is our usual course_id string (e.g. "edX/Test101/2013_Fall)
|
|
"""
|
|
try:
|
|
user = User.objects.get(email=email)
|
|
return cls.unenroll(user, course_id)
|
|
except User.DoesNotExist:
|
|
log.error(
|
|
u"Tried to unenroll email %s from course %s, but user not found",
|
|
email,
|
|
course_id
|
|
)
|
|
|
|
@classmethod
|
|
def is_enrolled(cls, user, course_key):
|
|
"""
|
|
Returns True if the user is enrolled in the course (the entry must exist
|
|
and it must have `is_active=True`). Otherwise, returns False.
|
|
|
|
`user` is a Django User object. If it hasn't been saved yet (no `.id`
|
|
attribute), this method will automatically save it before
|
|
adding an enrollment for it.
|
|
|
|
`course_id` is our usual course_id string (e.g. "edX/Test101/2013_Fall)
|
|
"""
|
|
if not user.is_authenticated():
|
|
return False
|
|
|
|
try:
|
|
record = cls.objects.get(user=user, course_id=course_key)
|
|
return record.is_active
|
|
except cls.DoesNotExist:
|
|
return False
|
|
|
|
@classmethod
|
|
def is_enrolled_by_partial(cls, user, course_id_partial):
|
|
"""
|
|
Returns `True` if the user is enrolled in a course that starts with
|
|
`course_id_partial`. Otherwise, returns False.
|
|
|
|
Can be used to determine whether a student is enrolled in a course
|
|
whose run name is unknown.
|
|
|
|
`user` is a Django User object. If it hasn't been saved yet (no `.id`
|
|
attribute), this method will automatically save it before
|
|
adding an enrollment for it.
|
|
|
|
`course_id_partial` (CourseKey) is missing the run component
|
|
"""
|
|
assert isinstance(course_id_partial, CourseKey)
|
|
assert not course_id_partial.run # None or empty string
|
|
course_key = SlashSeparatedCourseKey(course_id_partial.org, course_id_partial.course, '')
|
|
querystring = unicode(course_key.to_deprecated_string())
|
|
try:
|
|
return cls.objects.filter(
|
|
user=user,
|
|
course_id__startswith=querystring,
|
|
is_active=1
|
|
).exists()
|
|
except cls.DoesNotExist:
|
|
return False
|
|
|
|
@classmethod
|
|
def enrollment_mode_for_user(cls, user, course_id):
|
|
"""
|
|
Returns the enrollment mode for the given user for the given course
|
|
|
|
`user` is a Django User object
|
|
`course_id` is our usual course_id string (e.g. "edX/Test101/2013_Fall)
|
|
|
|
Returns (mode, is_active) where mode is the enrollment mode of the student
|
|
and is_active is whether the enrollment is active.
|
|
Returns (None, None) if the courseenrollment record does not exist.
|
|
"""
|
|
try:
|
|
record = cls.objects.get(user=user, course_id=course_id)
|
|
return (record.mode, record.is_active)
|
|
except cls.DoesNotExist:
|
|
return (None, None)
|
|
|
|
@classmethod
|
|
def enrollments_for_user(cls, user):
|
|
return cls.objects.filter(user=user, is_active=1)
|
|
|
|
def is_paid_course(self):
|
|
"""
|
|
Returns True, if course is paid
|
|
"""
|
|
paid_course = CourseMode.is_white_label(self.course_id)
|
|
if paid_course or CourseMode.is_professional_slug(self.mode):
|
|
return True
|
|
|
|
return False
|
|
|
|
def activate(self):
|
|
"""Makes this `CourseEnrollment` record active. Saves immediately."""
|
|
self.update_enrollment(is_active=True)
|
|
|
|
def deactivate(self):
|
|
"""Makes this `CourseEnrollment` record inactive. Saves immediately. An
|
|
inactive record means that the student is not enrolled in this course.
|
|
"""
|
|
self.update_enrollment(is_active=False)
|
|
|
|
def change_mode(self, mode):
|
|
"""Changes this `CourseEnrollment` record's mode to `mode`. Saves immediately."""
|
|
self.update_enrollment(mode=mode)
|
|
|
|
def refundable(self):
|
|
"""
|
|
For paid/verified certificates, students may receive a refund if they have
|
|
a verified certificate and the deadline for refunds has not yet passed.
|
|
"""
|
|
# In order to support manual refunds past the deadline, set can_refund on this object.
|
|
# On unenrolling, the "UNENROLL_DONE" signal calls CertificateItem.refund_cert_callback(),
|
|
# which calls this method to determine whether to refund the order.
|
|
# This can't be set directly because refunds currently happen as a side-effect of unenrolling.
|
|
# (side-effects are bad)
|
|
if getattr(self, 'can_refund', None) is not None:
|
|
return True
|
|
|
|
# If the student has already been given a certificate they should not be refunded
|
|
if GeneratedCertificate.certificate_for_student(self.user, self.course_id) is not None:
|
|
return False
|
|
|
|
# If it is after the refundable cutoff date they should not be refunded.
|
|
refund_cutoff_date = self.refund_cutoff_date()
|
|
if refund_cutoff_date and datetime.now(UTC) > refund_cutoff_date:
|
|
return False
|
|
|
|
course_mode = CourseMode.mode_for_course(self.course_id, 'verified')
|
|
if course_mode is None:
|
|
return False
|
|
else:
|
|
return True
|
|
|
|
def refund_cutoff_date(self):
|
|
""" Calculate and return the refund window end date. """
|
|
try:
|
|
attribute = self.attributes.get(namespace='order', name='order_number')
|
|
except ObjectDoesNotExist:
|
|
return None
|
|
|
|
order_number = attribute.value
|
|
order = ecommerce_api_client(self.user).orders(order_number).get()
|
|
refund_window_start_date = max(
|
|
datetime.strptime(order['date_placed'], ECOMMERCE_DATE_FORMAT),
|
|
self.course_overview.start.replace(tzinfo=None)
|
|
)
|
|
|
|
return refund_window_start_date.replace(tzinfo=UTC) + EnrollmentRefundConfiguration.current().refund_window
|
|
|
|
@property
|
|
def username(self):
|
|
return self.user.username
|
|
|
|
@property
|
|
def course(self):
|
|
# Deprecated. Please use the `course_overview` property instead.
|
|
return self.course_overview
|
|
|
|
@property
|
|
def course_overview(self):
|
|
"""
|
|
Returns a CourseOverview of the course to which this enrollment refers.
|
|
Returns None if an error occurred while trying to load the course.
|
|
|
|
Note:
|
|
If the course is re-published within the lifetime of this
|
|
CourseEnrollment object, then the value of this property will
|
|
become stale.
|
|
"""
|
|
if not self._course_overview:
|
|
try:
|
|
self._course_overview = CourseOverview.get_from_id(self.course_id)
|
|
except (CourseOverview.DoesNotExist, IOError):
|
|
self._course_overview = None
|
|
return self._course_overview
|
|
|
|
def is_verified_enrollment(self):
|
|
"""
|
|
Check the course enrollment mode is verified or not
|
|
"""
|
|
return CourseMode.is_verified_slug(self.mode)
|
|
|
|
def is_professional_enrollment(self):
|
|
"""
|
|
Check the course enrollment mode is professional or not
|
|
"""
|
|
return CourseMode.is_professional_slug(self.mode)
|
|
|
|
@classmethod
|
|
def is_enrolled_as_verified(cls, user, course_key):
|
|
"""
|
|
Check whether the course enrollment is for a verified mode.
|
|
|
|
Arguments:
|
|
user (User): The user object.
|
|
course_key (CourseKey): The identifier for the course.
|
|
|
|
Returns: bool
|
|
|
|
"""
|
|
enrollment = cls.get_enrollment(user, course_key)
|
|
return (
|
|
enrollment is not None and
|
|
enrollment.is_active and
|
|
enrollment.is_verified_enrollment()
|
|
)
|
|
|
|
@classmethod
|
|
def cache_key_name(cls, user_id, course_key):
|
|
"""Return cache key name to be used to cache current configuration.
|
|
Args:
|
|
user_id(int): Id of user.
|
|
course_key(unicode): Unicode of course key
|
|
|
|
Returns:
|
|
Unicode cache key
|
|
"""
|
|
return cls.COURSE_ENROLLMENT_CACHE_KEY.format(user_id, unicode(course_key))
|
|
|
|
|
|
@receiver(models.signals.post_save, sender=CourseEnrollment)
|
|
@receiver(models.signals.post_delete, sender=CourseEnrollment)
|
|
def invalidate_enrollment_mode_cache(sender, instance, **kwargs): # pylint: disable=unused-argument, invalid-name
|
|
"""Invalidate the cache of CourseEnrollment model. """
|
|
|
|
cache_key = CourseEnrollment.cache_key_name(
|
|
instance.user.id,
|
|
unicode(instance.course_id)
|
|
)
|
|
cache.delete(cache_key)
|
|
|
|
|
|
class ManualEnrollmentAudit(models.Model):
|
|
"""
|
|
Table for tracking which enrollments were performed through manual enrollment.
|
|
"""
|
|
enrollment = models.ForeignKey(CourseEnrollment, null=True)
|
|
enrolled_by = models.ForeignKey(User, null=True)
|
|
enrolled_email = models.CharField(max_length=255, db_index=True)
|
|
time_stamp = models.DateTimeField(auto_now_add=True, null=True)
|
|
state_transition = models.CharField(max_length=255, choices=TRANSITION_STATES)
|
|
reason = models.TextField(null=True)
|
|
|
|
@classmethod
|
|
def create_manual_enrollment_audit(cls, user, email, state_transition, reason, enrollment=None):
|
|
"""
|
|
saves the student manual enrollment information
|
|
"""
|
|
return cls.objects.create(
|
|
enrolled_by=user,
|
|
enrolled_email=email,
|
|
state_transition=state_transition,
|
|
reason=reason,
|
|
enrollment=enrollment
|
|
)
|
|
|
|
@classmethod
|
|
def get_manual_enrollment_by_email(cls, email):
|
|
"""
|
|
if matches returns the most recent entry in the table filtered by email else returns None.
|
|
"""
|
|
try:
|
|
manual_enrollment = cls.objects.filter(enrolled_email=email).latest('time_stamp')
|
|
except cls.DoesNotExist:
|
|
manual_enrollment = None
|
|
return manual_enrollment
|
|
|
|
@classmethod
|
|
def get_manual_enrollment(cls, enrollment):
|
|
"""
|
|
if matches returns the most recent entry in the table filtered by enrollment else returns None,
|
|
"""
|
|
try:
|
|
manual_enrollment = cls.objects.filter(enrollment=enrollment).latest('time_stamp')
|
|
except cls.DoesNotExist:
|
|
manual_enrollment = None
|
|
return manual_enrollment
|
|
|
|
|
|
class CourseEnrollmentAllowed(models.Model):
|
|
"""
|
|
Table of users (specified by email address strings) who are allowed to enroll in a specified course.
|
|
The user may or may not (yet) exist. Enrollment by users listed in this table is allowed
|
|
even if the enrollment time window is past.
|
|
"""
|
|
email = models.CharField(max_length=255, db_index=True)
|
|
course_id = CourseKeyField(max_length=255, db_index=True)
|
|
auto_enroll = models.BooleanField(default=0)
|
|
|
|
created = models.DateTimeField(auto_now_add=True, null=True, db_index=True)
|
|
|
|
class Meta(object):
|
|
unique_together = (('email', 'course_id'),)
|
|
|
|
def __unicode__(self):
|
|
return "[CourseEnrollmentAllowed] %s: %s (%s)" % (self.email, self.course_id, self.created)
|
|
|
|
@classmethod
|
|
def may_enroll_and_unenrolled(cls, course_id):
|
|
"""
|
|
Return QuerySet of students who are allowed to enroll in a course.
|
|
|
|
Result excludes students who have already enrolled in the
|
|
course.
|
|
|
|
`course_id` identifies the course for which to compute the QuerySet.
|
|
"""
|
|
enrolled = CourseEnrollment.objects.users_enrolled_in(course_id=course_id).values_list('email', flat=True)
|
|
return CourseEnrollmentAllowed.objects.filter(course_id=course_id).exclude(email__in=enrolled)
|
|
|
|
|
|
@total_ordering
|
|
class CourseAccessRole(models.Model):
|
|
"""
|
|
Maps users to org, courses, and roles. Used by student.roles.CourseRole and OrgRole.
|
|
To establish a user as having a specific role over all courses in the org, create an entry
|
|
without a course_id.
|
|
"""
|
|
|
|
objects = NoneToEmptyManager()
|
|
|
|
user = models.ForeignKey(User)
|
|
# blank org is for global group based roles such as course creator (may be deprecated)
|
|
org = models.CharField(max_length=64, db_index=True, blank=True)
|
|
# blank course_id implies org wide role
|
|
course_id = CourseKeyField(max_length=255, db_index=True, blank=True)
|
|
role = models.CharField(max_length=64, db_index=True)
|
|
|
|
class Meta(object):
|
|
unique_together = ('user', 'org', 'course_id', 'role')
|
|
|
|
@property
|
|
def _key(self):
|
|
"""
|
|
convenience function to make eq overrides easier and clearer. arbitrary decision
|
|
that role is primary, followed by org, course, and then user
|
|
"""
|
|
return (self.role, self.org, self.course_id, self.user_id)
|
|
|
|
def __eq__(self, other):
|
|
"""
|
|
Overriding eq b/c the django impl relies on the primary key which requires fetch. sometimes we
|
|
just want to compare roles w/o doing another fetch.
|
|
"""
|
|
return type(self) == type(other) and self._key == other._key # pylint: disable=protected-access
|
|
|
|
def __hash__(self):
|
|
return hash(self._key)
|
|
|
|
def __lt__(self, other):
|
|
"""
|
|
Lexigraphic sort
|
|
"""
|
|
return self._key < other._key # pylint: disable=protected-access
|
|
|
|
def __unicode__(self):
|
|
return "[CourseAccessRole] user: {} role: {} org: {} course: {}".format(self.user.username, self.role, self.org, self.course_id)
|
|
|
|
|
|
#### Helper methods for use from python manage.py shell and other classes.
|
|
|
|
|
|
def get_user_by_username_or_email(username_or_email):
|
|
"""
|
|
Return a User object, looking up by email if username_or_email contains a
|
|
'@', otherwise by username.
|
|
|
|
Raises:
|
|
User.DoesNotExist is lookup fails.
|
|
"""
|
|
if '@' in username_or_email:
|
|
return User.objects.get(email=username_or_email)
|
|
else:
|
|
return User.objects.get(username=username_or_email)
|
|
|
|
|
|
def get_user(email):
|
|
user = User.objects.get(email=email)
|
|
u_prof = UserProfile.objects.get(user=user)
|
|
return user, u_prof
|
|
|
|
|
|
def user_info(email):
|
|
user, u_prof = get_user(email)
|
|
print "User id", user.id
|
|
print "Username", user.username
|
|
print "E-mail", user.email
|
|
print "Name", u_prof.name
|
|
print "Location", u_prof.location
|
|
print "Language", u_prof.language
|
|
return user, u_prof
|
|
|
|
|
|
def change_email(old_email, new_email):
|
|
user = User.objects.get(email=old_email)
|
|
user.email = new_email
|
|
user.save()
|
|
|
|
|
|
def change_name(email, new_name):
|
|
_user, u_prof = get_user(email)
|
|
u_prof.name = new_name
|
|
u_prof.save()
|
|
|
|
|
|
def user_count():
|
|
print "All users", User.objects.all().count()
|
|
print "Active users", User.objects.filter(is_active=True).count()
|
|
return User.objects.all().count()
|
|
|
|
|
|
def active_user_count():
|
|
return User.objects.filter(is_active=True).count()
|
|
|
|
|
|
def create_group(name, description):
|
|
utg = UserTestGroup()
|
|
utg.name = name
|
|
utg.description = description
|
|
utg.save()
|
|
|
|
|
|
def add_user_to_group(user, group):
|
|
utg = UserTestGroup.objects.get(name=group)
|
|
utg.users.add(User.objects.get(username=user))
|
|
utg.save()
|
|
|
|
|
|
def remove_user_from_group(user, group):
|
|
utg = UserTestGroup.objects.get(name=group)
|
|
utg.users.remove(User.objects.get(username=user))
|
|
utg.save()
|
|
|
|
DEFAULT_GROUPS = {
|
|
'email_future_courses': 'Receive e-mails about future MITx courses',
|
|
'email_helpers': 'Receive e-mails about how to help with MITx',
|
|
'mitx_unenroll': 'Fully unenrolled -- no further communications',
|
|
'6002x_unenroll': 'Took and dropped 6002x'
|
|
}
|
|
|
|
|
|
def add_user_to_default_group(user, group):
|
|
try:
|
|
utg = UserTestGroup.objects.get(name=group)
|
|
except UserTestGroup.DoesNotExist:
|
|
utg = UserTestGroup()
|
|
utg.name = group
|
|
utg.description = DEFAULT_GROUPS[group]
|
|
utg.save()
|
|
utg.users.add(User.objects.get(username=user))
|
|
utg.save()
|
|
|
|
|
|
def create_comments_service_user(user):
|
|
if not settings.FEATURES['ENABLE_DISCUSSION_SERVICE']:
|
|
# Don't try--it won't work, and it will fill the logs with lots of errors
|
|
return
|
|
try:
|
|
cc_user = cc.User.from_django_user(user)
|
|
cc_user.save()
|
|
except Exception: # pylint: disable=broad-except
|
|
log = logging.getLogger("edx.discussion") # pylint: disable=redefined-outer-name
|
|
log.error(
|
|
"Could not create comments service user with id {}".format(user.id),
|
|
exc_info=True
|
|
)
|
|
|
|
# Define login and logout handlers here in the models file, instead of the views file,
|
|
# so that they are more likely to be loaded when a Studio user brings up the Studio admin
|
|
# page to login. These are currently the only signals available, so we need to continue
|
|
# identifying and logging failures separately (in views).
|
|
|
|
|
|
@receiver(user_logged_in)
|
|
def log_successful_login(sender, request, user, **kwargs): # pylint: disable=unused-argument
|
|
"""Handler to log when logins have occurred successfully."""
|
|
if settings.FEATURES['SQUELCH_PII_IN_LOGS']:
|
|
AUDIT_LOG.info(u"Login success - user.id: {0}".format(user.id))
|
|
else:
|
|
AUDIT_LOG.info(u"Login success - {0} ({1})".format(user.username, user.email))
|
|
|
|
|
|
@receiver(user_logged_out)
|
|
def log_successful_logout(sender, request, user, **kwargs): # pylint: disable=unused-argument
|
|
"""Handler to log when logouts have occurred successfully."""
|
|
if hasattr(request, 'user'):
|
|
if settings.FEATURES['SQUELCH_PII_IN_LOGS']:
|
|
AUDIT_LOG.info(u"Logout - user.id: {0}".format(request.user.id)) # pylint: disable=logging-format-interpolation
|
|
else:
|
|
AUDIT_LOG.info(u"Logout - {0}".format(request.user)) # pylint: disable=logging-format-interpolation
|
|
|
|
|
|
@receiver(user_logged_in)
|
|
@receiver(user_logged_out)
|
|
def enforce_single_login(sender, request, user, signal, **kwargs): # pylint: disable=unused-argument
|
|
"""
|
|
Sets the current session id in the user profile,
|
|
to prevent concurrent logins.
|
|
"""
|
|
if settings.FEATURES.get('PREVENT_CONCURRENT_LOGINS', False):
|
|
if signal == user_logged_in:
|
|
key = request.session.session_key
|
|
else:
|
|
key = None
|
|
if user:
|
|
user.profile.set_login_session(key)
|
|
|
|
|
|
class DashboardConfiguration(ConfigurationModel):
|
|
"""Dashboard Configuration settings.
|
|
|
|
Includes configuration options for the dashboard, which impact behavior and rendering for the application.
|
|
|
|
"""
|
|
recent_enrollment_time_delta = models.PositiveIntegerField(
|
|
default=0,
|
|
help_text="The number of seconds in which a new enrollment is considered 'recent'. "
|
|
"Used to display notifications."
|
|
)
|
|
|
|
@property
|
|
def recent_enrollment_seconds(self):
|
|
return self.recent_enrollment_time_delta
|
|
|
|
|
|
class LinkedInAddToProfileConfiguration(ConfigurationModel):
|
|
"""
|
|
LinkedIn Add to Profile Configuration
|
|
|
|
This configuration enables the "Add to Profile" LinkedIn
|
|
button on the student dashboard. The button appears when
|
|
users have a certificate available; when clicked,
|
|
users are sent to the LinkedIn site with a pre-filled
|
|
form allowing them to add the certificate to their
|
|
LinkedIn profile.
|
|
"""
|
|
|
|
MODE_TO_CERT_NAME = {
|
|
"honor": _(u"{platform_name} Honor Code Certificate for {course_name}"),
|
|
"verified": _(u"{platform_name} Verified Certificate for {course_name}"),
|
|
"professional": _(u"{platform_name} Professional Certificate for {course_name}"),
|
|
"no-id-professional": _(
|
|
u"{platform_name} Professional Certificate for {course_name}"
|
|
),
|
|
}
|
|
|
|
company_identifier = models.TextField(
|
|
help_text=_(
|
|
u"The company identifier for the LinkedIn Add-to-Profile button "
|
|
u"e.g 0_0dPSPyS070e0HsE9HNz_13_d11_"
|
|
)
|
|
)
|
|
|
|
# Deprecated
|
|
dashboard_tracking_code = models.TextField(default="", blank=True)
|
|
|
|
trk_partner_name = models.CharField(
|
|
max_length=10,
|
|
default="",
|
|
blank=True,
|
|
help_text=_(
|
|
u"Short identifier for the LinkedIn partner used in the tracking code. "
|
|
u"(Example: 'edx') "
|
|
u"If no value is provided, tracking codes will not be sent to LinkedIn."
|
|
)
|
|
)
|
|
|
|
def add_to_profile_url(self, course_key, course_name, cert_mode, cert_url, source="o", target="dashboard"):
|
|
"""Construct the URL for the "add to profile" button.
|
|
|
|
Arguments:
|
|
course_key (CourseKey): The identifier for the course.
|
|
course_name (unicode): The display name of the course.
|
|
cert_mode (str): The course mode of the user's certificate (e.g. "verified", "honor", "professional")
|
|
cert_url (str): The download URL for the certificate.
|
|
|
|
Keyword Arguments:
|
|
source (str): Either "o" (for onsite/UI), "e" (for emails), or "m" (for mobile)
|
|
target (str): An identifier for the occurrance of the button.
|
|
|
|
"""
|
|
company_identifier = microsite.get_value('LINKEDIN_COMPANY_ID', self.company_identifier)
|
|
params = OrderedDict([
|
|
('_ed', company_identifier),
|
|
('pfCertificationName', self._cert_name(course_name, cert_mode).encode('utf-8')),
|
|
('pfCertificationUrl', cert_url),
|
|
('source', source)
|
|
])
|
|
|
|
tracking_code = self._tracking_code(course_key, cert_mode, target)
|
|
if tracking_code is not None:
|
|
params['trk'] = tracking_code
|
|
|
|
return u'http://www.linkedin.com/profile/add?{params}'.format(
|
|
params=urlencode(params)
|
|
)
|
|
|
|
def _cert_name(self, course_name, cert_mode):
|
|
"""Name of the certification, for display on LinkedIn. """
|
|
return self.MODE_TO_CERT_NAME.get(
|
|
cert_mode,
|
|
_(u"{platform_name} Certificate for {course_name}")
|
|
).format(
|
|
platform_name=microsite.get_value('platform_name', settings.PLATFORM_NAME),
|
|
course_name=course_name
|
|
)
|
|
|
|
def _tracking_code(self, course_key, cert_mode, target):
|
|
"""Create a tracking code for the button.
|
|
|
|
Tracking codes are used by LinkedIn to collect
|
|
analytics about certifications users are adding
|
|
to their profiles.
|
|
|
|
The tracking code format is:
|
|
&trk=[partner name]-[certificate type]-[date]-[target field]
|
|
|
|
In our case, we're sending:
|
|
&trk=edx-{COURSE ID}_{COURSE MODE}-{TARGET}
|
|
|
|
If no partner code is configured, then this will
|
|
return None, indicating that tracking codes are disabled.
|
|
|
|
Arguments:
|
|
|
|
course_key (CourseKey): The identifier for the course.
|
|
cert_mode (str): The enrollment mode for the course.
|
|
target (str): Identifier for where the button is located.
|
|
|
|
Returns:
|
|
unicode or None
|
|
|
|
"""
|
|
return (
|
|
u"{partner}-{course_key}_{cert_mode}-{target}".format(
|
|
partner=self.trk_partner_name,
|
|
course_key=unicode(course_key),
|
|
cert_mode=cert_mode,
|
|
target=target
|
|
)
|
|
if self.trk_partner_name else None
|
|
)
|
|
|
|
|
|
class EntranceExamConfiguration(models.Model):
|
|
"""
|
|
Represents a Student's entrance exam specific data for a single Course
|
|
"""
|
|
|
|
user = models.ForeignKey(User, db_index=True)
|
|
course_id = CourseKeyField(max_length=255, db_index=True)
|
|
created = models.DateTimeField(auto_now_add=True, null=True, db_index=True)
|
|
updated = models.DateTimeField(auto_now=True, db_index=True)
|
|
|
|
# if skip_entrance_exam is True, then student can skip entrance exam
|
|
# for the course
|
|
skip_entrance_exam = models.BooleanField(default=True)
|
|
|
|
class Meta(object):
|
|
unique_together = (('user', 'course_id'), )
|
|
|
|
def __unicode__(self):
|
|
return "[EntranceExamConfiguration] %s: %s (%s) = %s" % (
|
|
self.user, self.course_id, self.created, self.skip_entrance_exam
|
|
)
|
|
|
|
@classmethod
|
|
def user_can_skip_entrance_exam(cls, user, course_key):
|
|
"""
|
|
Return True if given user can skip entrance exam for given course otherwise False.
|
|
"""
|
|
can_skip = False
|
|
if is_entrance_exams_enabled():
|
|
try:
|
|
record = EntranceExamConfiguration.objects.get(user=user, course_id=course_key)
|
|
can_skip = record.skip_entrance_exam
|
|
except EntranceExamConfiguration.DoesNotExist:
|
|
can_skip = False
|
|
return can_skip
|
|
|
|
|
|
class LanguageField(models.CharField):
|
|
"""Represents a language from the ISO 639-1 language set."""
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
"""Creates a LanguageField.
|
|
|
|
Accepts all the same kwargs as a CharField, except for max_length and
|
|
choices. help_text defaults to a description of the ISO 639-1 set.
|
|
"""
|
|
kwargs.pop('max_length', None)
|
|
kwargs.pop('choices', None)
|
|
help_text = kwargs.pop(
|
|
'help_text',
|
|
_("The ISO 639-1 language code for this language."),
|
|
)
|
|
super(LanguageField, self).__init__(
|
|
max_length=16,
|
|
choices=settings.ALL_LANGUAGES,
|
|
help_text=help_text,
|
|
*args,
|
|
**kwargs
|
|
)
|
|
|
|
|
|
class LanguageProficiency(models.Model):
|
|
"""
|
|
Represents a user's language proficiency.
|
|
|
|
Note that we have not found a way to emit analytics change events by using signals directly on this
|
|
model or on UserProfile. Therefore if you are changing LanguageProficiency values, it is important
|
|
to go through the accounts API (AccountsView) defined in
|
|
/edx-platform/openedx/core/djangoapps/user_api/accounts/views.py or its associated api method
|
|
(update_account_settings) so that the events are emitted.
|
|
"""
|
|
class Meta(object):
|
|
unique_together = (('code', 'user_profile'),)
|
|
|
|
user_profile = models.ForeignKey(UserProfile, db_index=True, related_name='language_proficiencies')
|
|
code = models.CharField(
|
|
max_length=16,
|
|
blank=False,
|
|
choices=settings.ALL_LANGUAGES,
|
|
help_text=_("The ISO 639-1 language code for this language.")
|
|
)
|
|
|
|
|
|
class CourseEnrollmentAttribute(models.Model):
|
|
"""
|
|
Provide additional information about the user's enrollment.
|
|
"""
|
|
enrollment = models.ForeignKey(CourseEnrollment, related_name="attributes")
|
|
namespace = models.CharField(
|
|
max_length=255,
|
|
help_text=_("Namespace of enrollment attribute")
|
|
)
|
|
name = models.CharField(
|
|
max_length=255,
|
|
help_text=_("Name of the enrollment attribute")
|
|
)
|
|
value = models.CharField(
|
|
max_length=255,
|
|
help_text=_("Value of the enrollment attribute")
|
|
)
|
|
|
|
def __unicode__(self):
|
|
"""Unicode representation of the attribute. """
|
|
return u"{namespace}:{name}, {value}".format(
|
|
namespace=self.namespace,
|
|
name=self.name,
|
|
value=self.value,
|
|
)
|
|
|
|
@classmethod
|
|
def add_enrollment_attr(cls, enrollment, data_list):
|
|
"""Delete all the enrollment attributes for the given enrollment and
|
|
add new attributes.
|
|
|
|
Args:
|
|
enrollment(CourseEnrollment): 'CourseEnrollment' for which attribute is to be added
|
|
data(list): list of dictionaries containing data to save
|
|
"""
|
|
cls.objects.filter(enrollment=enrollment).delete()
|
|
attributes = [
|
|
cls(enrollment=enrollment, namespace=data['namespace'], name=data['name'], value=data['value'])
|
|
for data in data_list
|
|
]
|
|
cls.objects.bulk_create(attributes)
|
|
|
|
@classmethod
|
|
def get_enrollment_attributes(cls, enrollment):
|
|
"""Retrieve list of all enrollment attributes.
|
|
|
|
Args:
|
|
enrollment(CourseEnrollment): 'CourseEnrollment' for which list is to retrieve
|
|
|
|
Returns: list
|
|
|
|
Example:
|
|
>>> CourseEnrollmentAttribute.get_enrollment_attributes(CourseEnrollment)
|
|
[
|
|
{
|
|
"namespace": "credit",
|
|
"name": "provider_id",
|
|
"value": "hogwarts",
|
|
},
|
|
]
|
|
"""
|
|
return [
|
|
{
|
|
"namespace": attribute.namespace,
|
|
"name": attribute.name,
|
|
"value": attribute.value,
|
|
}
|
|
for attribute in cls.objects.filter(enrollment=enrollment)
|
|
]
|
|
|
|
|
|
class EnrollmentRefundConfiguration(ConfigurationModel):
|
|
"""
|
|
Configuration for course enrollment refunds.
|
|
"""
|
|
|
|
# TODO: Django 1.8 introduces a DurationField
|
|
# (https://docs.djangoproject.com/en/1.8/ref/models/fields/#durationfield)
|
|
# for storing timedeltas which uses MySQL's bigint for backing
|
|
# storage. After we've completed the Django upgrade we should be
|
|
# able to replace this field with a DurationField named
|
|
# `refund_window` without having to run a migration or change
|
|
# other code.
|
|
refund_window_microseconds = models.BigIntegerField(
|
|
default=1209600000000,
|
|
help_text=_(
|
|
"The window of time after enrolling during which users can be granted"
|
|
" a refund, represented in microseconds. The default is 14 days."
|
|
)
|
|
)
|
|
|
|
@property
|
|
def refund_window(self):
|
|
"""Return the configured refund window as a `datetime.timedelta`."""
|
|
return timedelta(microseconds=self.refund_window_microseconds)
|
|
|
|
@refund_window.setter
|
|
def refund_window(self, refund_window):
|
|
"""Set the current refund window to the given timedelta."""
|
|
self.refund_window_microseconds = int(refund_window.total_seconds() * 1000000)
|