2021-12-17 17:15:56 +05:30
|
|
|
import datetime
|
2022-04-30 01:28:25 +05:30
|
|
|
import json
|
2021-10-15 20:47:23 +05:30
|
|
|
import logging
|
|
|
|
import os
|
|
|
|
import random
|
2021-12-16 23:05:04 +05:30
|
|
|
import re
|
2021-10-15 20:47:23 +05:30
|
|
|
import string
|
|
|
|
import sys
|
|
|
|
from os import path, remove
|
|
|
|
|
2021-12-03 01:04:49 +05:30
|
|
|
import background_task
|
2021-12-17 19:23:32 +05:30
|
|
|
import jwt
|
2021-10-15 20:47:23 +05:30
|
|
|
from django.conf import settings
|
|
|
|
from django.core.mail import EmailMultiAlternatives
|
|
|
|
from django.http import Http404
|
|
|
|
from django.shortcuts import get_object_or_404
|
|
|
|
from django.template.loader import render_to_string
|
|
|
|
from django.utils.html import strip_tags
|
|
|
|
from google.auth.transport import requests
|
|
|
|
from google.oauth2 import id_token
|
|
|
|
from rest_framework import status
|
|
|
|
from rest_framework.response import Response
|
2022-04-10 23:12:02 +05:30
|
|
|
import requests as rq
|
2021-10-15 20:47:23 +05:30
|
|
|
|
2021-12-03 01:04:49 +05:30
|
|
|
from .constants import *
|
|
|
|
from .models import User, PrePlacementOffer, PlacementApplication
|
2021-10-15 20:47:23 +05:30
|
|
|
|
|
|
|
logger = logging.getLogger('db')
|
|
|
|
|
|
|
|
|
|
|
|
def precheck(required_data=None):
|
|
|
|
if required_data is None:
|
|
|
|
required_data = []
|
|
|
|
|
|
|
|
def decorator(view_func):
|
|
|
|
def wrapper_func(request, *args, **kwargs):
|
|
|
|
try:
|
|
|
|
request_data = None
|
|
|
|
if request.method == 'GET':
|
|
|
|
request_data = request.GET
|
|
|
|
elif request.method == 'POST':
|
|
|
|
request_data = request.data
|
|
|
|
if not len(request_data):
|
|
|
|
request_data = request.POST
|
|
|
|
if len(request_data):
|
|
|
|
for i in required_data:
|
|
|
|
if i not in request_data:
|
|
|
|
return Response({'action': "Pre check", 'message': str(i) + " Not Found"},
|
|
|
|
status=status.HTTP_400_BAD_REQUEST)
|
|
|
|
else:
|
|
|
|
return Response({'action': "Pre check", 'message': "Message Data not Found"},
|
|
|
|
status=status.HTTP_400_BAD_REQUEST)
|
|
|
|
|
|
|
|
return view_func(request, *args, **kwargs)
|
|
|
|
except:
|
2022-04-29 22:01:52 +05:30
|
|
|
logger.warning("Precheck: " + str(sys.exc_info()))
|
2021-12-12 20:13:47 +05:30
|
|
|
return Response({'action': "Pre check", 'message': "Something went wrong"},
|
2021-10-15 20:47:23 +05:30
|
|
|
status=status.HTTP_400_BAD_REQUEST)
|
|
|
|
|
|
|
|
return wrapper_func
|
|
|
|
|
|
|
|
return decorator
|
|
|
|
|
|
|
|
|
|
|
|
def isAuthorized(allowed_users=None):
|
|
|
|
if allowed_users is None:
|
|
|
|
allowed_users = []
|
|
|
|
|
|
|
|
def decorator(view_func):
|
|
|
|
def wrapper_func(request, *args, **kwargs):
|
|
|
|
try:
|
|
|
|
headers = request.META
|
|
|
|
if 'HTTP_AUTHORIZATION' in headers:
|
|
|
|
token_id = headers['HTTP_AUTHORIZATION'][7:]
|
|
|
|
idinfo = id_token.verify_oauth2_token(token_id, requests.Request(), CLIENT_ID)
|
|
|
|
email = idinfo[EMAIL]
|
|
|
|
print(email)
|
|
|
|
user = get_object_or_404(User, email=email)
|
|
|
|
if user:
|
|
|
|
|
|
|
|
if len(set(user.user_type).intersection(set(allowed_users))) or allowed_users == '*':
|
|
|
|
return view_func(request, user.id, user.email, user.user_type, *args, **kwargs)
|
|
|
|
else:
|
|
|
|
raise PermissionError("Access Denied. You are not allowed to use this service")
|
|
|
|
else:
|
|
|
|
raise PermissionError("Authorization Header Not Found")
|
|
|
|
|
2021-12-12 20:13:47 +05:30
|
|
|
except PermissionError:
|
|
|
|
return Response({'action': "Is Authorized?", 'message': 'Access Denied'},
|
2021-10-15 20:47:23 +05:30
|
|
|
status=status.HTTP_401_UNAUTHORIZED)
|
|
|
|
except Http404:
|
|
|
|
return Response({'action': "Is Authorized?", 'message': "User Not Found. Contact CDC for more details"},
|
|
|
|
status=status.HTTP_404_NOT_FOUND)
|
|
|
|
except ValueError as e:
|
2021-12-12 20:13:47 +05:30
|
|
|
logger.error("Problem with Google Oauth2.0 " + str(e))
|
|
|
|
return Response({'action': "Is Authorized?", 'message': 'Problem with Google Sign In'},
|
2021-10-15 20:47:23 +05:30
|
|
|
status=status.HTTP_401_UNAUTHORIZED)
|
|
|
|
except:
|
2021-12-03 01:04:49 +05:30
|
|
|
logger.warning("Is Authorized? " + str(sys.exc_info()))
|
|
|
|
return Response(
|
|
|
|
{'action': "Is Authorized?", 'message': "Something went wrong. Contact CDC for more details"},
|
|
|
|
status=status.HTTP_400_BAD_REQUEST)
|
2021-10-15 20:47:23 +05:30
|
|
|
|
|
|
|
return wrapper_func
|
|
|
|
|
|
|
|
return decorator
|
|
|
|
|
|
|
|
|
|
|
|
def generateRandomString():
|
|
|
|
try:
|
|
|
|
N = 15
|
2021-12-17 17:15:56 +05:30
|
|
|
res = ''.join(random.choices(string.ascii_uppercase + string.ascii_lowercase + string.digits, k=N))
|
2021-10-15 20:47:23 +05:30
|
|
|
return res
|
|
|
|
except:
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
|
|
|
def saveFile(file, location):
|
|
|
|
prefix = generateRandomString()
|
|
|
|
file_name = prefix + "_" + file.name
|
|
|
|
|
2021-12-16 23:05:04 +05:30
|
|
|
file_name = re.sub(r'[\\/:*?"<>|]', '_', file_name)
|
|
|
|
|
2021-10-15 20:47:23 +05:30
|
|
|
if not path.isdir(location):
|
2021-12-16 23:05:04 +05:30
|
|
|
os.makedirs(location)
|
2021-10-15 20:47:23 +05:30
|
|
|
|
2021-12-03 01:04:49 +05:30
|
|
|
destination_path = location + str(file_name)
|
2021-10-15 20:47:23 +05:30
|
|
|
if path.exists(destination_path):
|
|
|
|
remove(destination_path)
|
|
|
|
|
|
|
|
with open(destination_path, 'wb+') as destination:
|
|
|
|
for chunk in file.chunks():
|
|
|
|
destination.write(chunk)
|
|
|
|
return file_name
|
|
|
|
|
|
|
|
|
2021-12-03 01:04:49 +05:30
|
|
|
@background_task.background(schedule=10)
|
2021-10-15 20:47:23 +05:30
|
|
|
def sendEmail(email_to, subject, data, template):
|
|
|
|
try:
|
2022-04-30 01:28:25 +05:30
|
|
|
if not isinstance(data, dict):
|
|
|
|
data = json.loads(data)
|
|
|
|
html_content = render_to_string(template, ndata) # render with dynamic value
|
2021-10-15 20:47:23 +05:30
|
|
|
text_content = strip_tags(html_content)
|
|
|
|
|
|
|
|
email_from = settings.EMAIL_HOST_USER
|
|
|
|
recipient_list = [str(email_to), ]
|
|
|
|
|
|
|
|
msg = EmailMultiAlternatives(subject, text_content, email_from, recipient_list)
|
|
|
|
msg.attach_alternative(html_content, "text/html")
|
|
|
|
msg.send()
|
|
|
|
return True
|
|
|
|
except:
|
2021-12-03 01:04:49 +05:30
|
|
|
logger.error("Send Email: " + str(sys.exc_info()))
|
2021-10-15 20:47:23 +05:30
|
|
|
print(str(sys.exc_info()[1]))
|
2021-12-03 01:04:49 +05:30
|
|
|
return False
|
2021-10-15 20:47:23 +05:30
|
|
|
|
|
|
|
|
|
|
|
def PlacementApplicationConditions(student, placement):
|
|
|
|
try:
|
|
|
|
selected_companies = PlacementApplication.objects.filter(student=student, selected=True)
|
|
|
|
selected_companies_PSU = [i for i in selected_companies if i.placement.tier == 'psu']
|
2021-12-03 01:04:49 +05:30
|
|
|
PPO = PrePlacementOffer.objects.filter(student=student, accepted=True)
|
2021-10-15 20:47:23 +05:30
|
|
|
|
2021-12-03 01:04:49 +05:30
|
|
|
if len(selected_companies) + len(PPO) >= MAX_OFFERS_PER_STUDENT:
|
2021-10-15 20:47:23 +05:30
|
|
|
raise PermissionError("Max Applications Reached for the Season")
|
|
|
|
|
|
|
|
if len(selected_companies_PSU) > 0:
|
|
|
|
raise PermissionError('Selected for PSU Can\'t apply anymore')
|
|
|
|
|
|
|
|
if placement.tier == 'psu':
|
|
|
|
return True, "Conditions Satisfied"
|
|
|
|
|
|
|
|
for i in selected_companies:
|
|
|
|
print(int(i.placement.tier) < int(placement.tier), int(i.placement.tier), int(placement.tier))
|
|
|
|
if int(i.placement.tier) < int(placement.tier):
|
|
|
|
return False, "Can't apply for this tier"
|
|
|
|
|
|
|
|
return True, "Conditions Satisfied"
|
|
|
|
|
|
|
|
except PermissionError as e:
|
|
|
|
return False, e
|
|
|
|
except:
|
|
|
|
print(sys.exc_info())
|
|
|
|
logger.warning("Utils - PlacementApplicationConditions: " + str(sys.exc_info()))
|
|
|
|
return False, "_"
|
2021-12-03 01:04:49 +05:30
|
|
|
|
|
|
|
|
|
|
|
def getTier(compensation_gross, is_psu=False):
|
|
|
|
try:
|
|
|
|
if is_psu:
|
|
|
|
return True, 'psu'
|
|
|
|
if compensation_gross < 0:
|
|
|
|
raise ValueError("Negative Compensation")
|
|
|
|
elif compensation_gross < 600000: # Tier 7 If less than 600,000
|
|
|
|
return True, "7"
|
|
|
|
# Tier 6 If less than 800,000 and greater than or equal to 600,000
|
|
|
|
elif compensation_gross < 800000:
|
|
|
|
return True, "6"
|
|
|
|
# Tier 5 If less than 1,000,000 and greater than or equal to 800,000
|
|
|
|
elif compensation_gross < 1000000:
|
|
|
|
return True, "5"
|
|
|
|
# Tier 4 If less than 1,200,000 and greater than or equal to 1,000,000
|
|
|
|
elif compensation_gross < 1200000:
|
|
|
|
return True, "4"
|
|
|
|
# Tier 3 If less than 1,500,000 and greater than or equal to 1,200,000
|
|
|
|
elif compensation_gross < 1500000:
|
|
|
|
return True, "3"
|
|
|
|
# Tier 2 If less than 1,800,000 and greater than or equal to 1,500,000
|
|
|
|
elif compensation_gross < 1800000:
|
|
|
|
return True, "2"
|
|
|
|
# Tier 1 If greater than or equal to 1,800,000
|
|
|
|
elif compensation_gross >= 1800000:
|
|
|
|
return True, "1"
|
|
|
|
else:
|
|
|
|
raise ValueError("Invalid Compensation")
|
|
|
|
|
|
|
|
except ValueError as e:
|
|
|
|
logger.warning("Utils - getTier: " + str(sys.exc_info()))
|
|
|
|
return False, e
|
|
|
|
except:
|
|
|
|
print(sys.exc_info())
|
|
|
|
logger.warning("Utils - getTier: " + str(sys.exc_info()))
|
|
|
|
return False, "_"
|
2021-12-17 17:15:56 +05:30
|
|
|
|
|
|
|
|
|
|
|
def generateOneTimeVerificationLink(email, opening_id, opening_type):
|
|
|
|
try:
|
|
|
|
token_payload = {
|
|
|
|
"email": email,
|
|
|
|
"opening_id": opening_id,
|
|
|
|
"opening_type": opening_type,
|
|
|
|
'exp': datetime.datetime.utcnow() + datetime.timedelta(hours=EMAIL_VERIFICATION_TOKEN_TTL)
|
|
|
|
}
|
|
|
|
token = jwt.encode(token_payload, os.environ.get("EMAIL_VERIFICATION_SECRET_KEY"), algorithm="HS256")
|
|
|
|
link = LINK_TO_EMAIl_VERIFICATION_API.format(token=token)
|
|
|
|
return True, link
|
|
|
|
except:
|
|
|
|
print(sys.exc_info())
|
|
|
|
logger.warning("Utils - generateOneTimeVerificationLink: " + str(sys.exc_info()))
|
|
|
|
return False, "_"
|
2022-04-10 23:12:02 +05:30
|
|
|
|
|
|
|
def verify_recaptcha(request):
|
|
|
|
try:
|
|
|
|
data = {
|
|
|
|
'secret': settings.RECAPTCHA_SECRET_KEY,
|
|
|
|
'response': request
|
|
|
|
}
|
|
|
|
r = rq.post('https://www.google.com/recaptcha/api/siteverify', data=data)
|
|
|
|
result = r.json()
|
|
|
|
# logger.info("Recaptcha Response: " + str(result)+"request: "+str(data))
|
|
|
|
return result['success']
|
|
|
|
except:
|
|
|
|
print(sys.exc_info())
|
|
|
|
logger.warning("Utils - verify_recaptcha: " + str(sys.exc_info()))
|
|
|
|
return False, "_"
|