Newer
Older
__copyright__ = "Copyright © Stichting SciPost (SciPost Foundation)"
__license__ = "AGPL v3"
from django.contrib import messages
from django.contrib.auth.decorators import login_required
from django.contrib.auth.mixins import UserPassesTestMixin
from django.contrib.contenttypes.models import ContentType
from django.core.exceptions import BadRequest
from django.template.response import TemplateResponse
from django.urls import reverse, reverse_lazy
from django.db import transaction
from django.db.models import Q, Count
from django.http import Http404, HttpResponse
from django.shortcuts import get_object_or_404, render, redirect
from django.views.generic.detail import DetailView
from django.views.generic.edit import CreateView, UpdateView, DeleteView
from django.views.generic.list import ListView
from guardian.decorators import permission_required
from common.views import HXDynselAutocomplete
from ontology.models.academic_field import AcademicField
from scipost.mixins import PermissionsMixin, PaginationMixin
from scipost.models import Contributor
from common.utils import Q_with_alternative_spellings
from invitations.models import RegistrationInvitation
from ontology.models import Specialty
from scipost.permissions import HTMXResponse, permission_required_htmx
from submissions.models import RefereeInvitation
from .models import Profile, ProfileEmail, Affiliation, ProfileNonDuplicates
from .forms import (
ProfileForm,
ProfileDynSelForm,
ProfileMergeForm,
################
# Autocomplete #
################
class HXDynselProfileAutocomplete(HXDynselAutocomplete):
model = Profile
def search(self, queryset, q):
return queryset.search(q)
class ProfileAutocompleteView(autocomplete.Select2QuerySetView):
"""
View to feed the Select2 widget.
"""
if not self.request.user.has_perm("scipost.can_view_profiles"):
return None
qs = Profile.objects.all()
if self.q:
qs = Profile.objects.search(self.q)
class ProfileCreateView(PermissionsMixin, CreateView):
"""
Formview to create a new Profile.
"""
permission_required = "scipost.can_create_profiles"
form_class = ProfileForm
template_name = "profiles/profile_form.html"
success_url = reverse_lazy("profiles:profiles")
def get_context_data(self, *args, **kwargs):
"""
When creating a Profile, if initial data obtained from another model
(Contributor, RefereeInvitation or RegistrationInvitation)
is provided, this fills the context with possible already-existing Profiles.
"""
context = super().get_context_data(*args, **kwargs)
from_type = self.kwargs.get("from_type", None)
pk = self.kwargs.get("pk", None)
context["from_type"] = from_type
context["pk"] = pk
if pk and from_type:
matching_profiles = Profile.objects.all()
if from_type == "contributor":
contributor = get_object_or_404(Contributor, pk=pk)
matching_profiles = matching_profiles.filter(
Q(last_name=contributor.user.last_name)
| Q(emails__email__in=contributor.user.email)
)
elif from_type == "refereeinvitation":
refinv = get_object_or_404(RefereeInvitation, pk=pk)
matching_profiles = matching_profiles.filter(
Q(last_name=refinv.last_name)
| Q(emails__email__in=refinv.email_address)
)
elif from_type == "registrationinvitation":
reginv = get_object_or_404(RegistrationInvitation, pk=pk)
matching_profiles = matching_profiles.filter(
Q(last_name=reginv.last_name) | Q(emails__email__in=reginv.email)
)
context["matching_profiles"] = matching_profiles.distinct().order_by(
"last_name", "first_name"
)
return context
def get_initial(self):
"""
Provide initial data based on kwargs.
The data can come from a Contributor, Invitation, ...
"""
initial = super().get_initial()
from_type = self.kwargs.get("from_type", None)
pk = self.kwargs.get("pk", None)
# Build initial data from GET parameters of the name.
first_name = self.request.GET.get("first_name", None)
last_name = self.request.GET.get("last_name", None)
if first_name:
initial.update({"first_name": first_name})
if last_name:
initial.update({"last_name": last_name})
if from_type == "contributor":
contributor = get_object_or_404(Contributor, pk=pk)
initial.update(
{
"first_name": contributor.user.first_name,
"last_name": contributor.user.last_name,
"email": contributor.user.email,
}
)
elif from_type == "refereeinvitation":
refinv = get_object_or_404(RefereeInvitation, pk=pk)
initial.update(
{
"title": refinv.title,
"first_name": refinv.first_name,
"last_name": refinv.last_name,
"email": refinv.email_address,
"acad_field": refinv.submission.acad_field.id,
"specialties": [
s.id for s in refinv.submission.specialties.all()
],
}
)
elif from_type == "registrationinvitation":
reginv = get_object_or_404(RegistrationInvitation, pk=pk)
initial.update(
{
"title": reginv.title,
"first_name": reginv.first_name,
"last_name": reginv.last_name,
"email": reginv.email,
}
)
initial.update(
{
"instance_from_type": from_type,
"instance_pk": pk,
}
)
@permission_required("scipost.can_create_profiles")
def profile_match(request, profile_id, from_type, pk):
"""
Links an existing Profile to one of existing
Contributor, RefereeInvitation or RegistrationInvitation.
Profile relates to Contributor as OneToOne.
Matching is thus only allowed if there are no duplicate objects for these elements.
For matching the Profile to a Contributor, the following preconditions are defined:
- the Profile has no association to another Contributor
- the Contributor has no association to another Profile
If these are not met, no action is taken.
"""
profile = get_object_or_404(Profile, pk=profile_id)
if from_type == "contributor":
if hasattr(profile, "contributor") and profile.contributor.id != pk:
messages.error(
request,
"Error: cannot math this Profile to this Contributor, "
"since this Profile already has a different Contributor.\n"
"Please merge the duplicate Contributors first.",
)
return redirect(reverse("profiles:profiles"))
contributor = get_object_or_404(Contributor, pk=pk)
if contributor.profile and contributor.profile.id != profile.id:
messages.error(
request,
"Error: cannot match this Profile to this Contributor, "
"since this Contributor already has a different Profile.\n"
"Please merge the duplicate Profiles first.",
)
return redirect(reverse("profiles:profiles"))
# Preconditions are met, match:
nr_rows = Contributor.objects.filter(pk=pk).update(profile=profile)
# Give priority to the email coming from Contributor
profile.emails.update(primary=False)
email, __ = ProfileEmail.objects.get_or_create(
profile=profile, email=contributor.user.email
)
profile.emails.filter(id=email.id).update(primary=True, still_valid=True)
elif from_type == "refereeinvitation":
nr_rows = RefereeInvitation.objects.filter(pk=pk).update(referee=profile)
elif from_type == "registrationinvitation":
nr_rows = RegistrationInvitation.objects.filter(pk=pk).update(profile=profile)
if nr_rows == 1:
messages.success(request, "Profile matched with %s" % from_type)
"Error: Profile matching with %s: updated %s rows instead of 1!"
"Please contact techsupport" % (from_type, nr_rows),
)
return redirect(reverse("profiles:profiles"))
class ProfileUpdateView(PermissionsMixin, UpdateView):
"""
Formview to update a Profile.
"""
permission_required = "scipost.can_create_profiles"
model = Profile
form_class = ProfileForm
template_name = "profiles/profile_form.html"
success_url = reverse_lazy("profiles:profiles")
class ProfileDeleteView(PermissionsMixin, DeleteView):
"""
Delete a Profile.
"""
permission_required = "scipost.can_create_profiles"
model = Profile
success_url = reverse_lazy("profiles:profiles")
class ProfileDetailView(PermissionsMixin, DetailView):
permission_required = "scipost.can_view_profiles"
model = Profile
class ProfileListView(PermissionsMixin, PaginationMixin, ListView):
"""
List Profile object instances.
"""
permission_required = "scipost.can_view_profiles"
model = Profile
paginate_by = 25
def get_queryset(self):
"""
Return a queryset of Profiles using optional GET data.
"""
queryset = (
Profile.objects.all()
.prefetch_related("specialties")
.select_related("contributor", "contributor__user")
)
if self.request.GET.get("field"):
queryset = queryset.filter(acad_field__slug=self.request.GET["field"])
if self.request.GET.get("specialty"):
queryset = queryset.filter(
specialties__slug__in=[self.request.GET["specialty"]]
)
if self.request.GET.get("contributor") == "False":
elif self.request.GET.get("contributor") == "True":
if search_text := self.request.GET.get("text"):
queryset = queryset.search(search_text)
return queryset
def get_context_data(self, **kwargs):
context = super().get_context_data(**kwargs)
contributors_w_duplicate_email = Contributor.objects.with_duplicate_email()
contributors_w_duplicate_names = Contributor.objects.with_duplicate_names()
contributors_wo_profile = Contributor.objects.nonduplicates().filter(
profile__isnull=True
)
nr_potential_duplicate_profiles = Profile.objects.potential_duplicates().count()
reginv_wo_profile = RegistrationInvitation.objects.filter(profile__isnull=True)
academic_fields = (
AcademicField.objects.annotate(nr_profiles=Count("profiles"))
.prefetch_related("specialties")
.prefetch_related("branch")
.order_by("branch")
)
context.update(
{
"searchform": SearchTextForm(
initial={"text": self.request.GET.get("text")}
),
"academic_fields": academic_fields,
"nr_contributors_w_duplicate_emails": contributors_w_duplicate_email.count(),
"nr_contributors_w_duplicate_names": contributors_w_duplicate_names.count(),
"nr_contributors_wo_profile": contributors_wo_profile.count(),
"nr_potential_duplicate_profiles": nr_potential_duplicate_profiles,
"next_contributor_wo_profile": contributors_wo_profile.first(),
"nr_reginv_wo_profile": reginv_wo_profile.count(),
"next_reginv_wo_profile": reginv_wo_profile.first(),
}
)
return context
@login_required
@permission_required("scipost.can_merge_profiles")
def profile_duplicates(request):
"""
List Profiles with potential duplicates; allow to merge if necessary.
"""
# profile_duplicates = Profile.objects.potential_duplicates()
# context = {
# "profile_duplicates": profile_duplicates,
# }
return render(request, "profiles/profile_duplicates.html")
@transaction.atomic
@permission_required_htmx(
"scipost.can_merge_profiles",
"You do not have permission to create profiles.",
)
def _hx_profile_mark_non_duplicate(request, profile1: int, profile2: int):
# Find already existing ProfileNonDuplicates object, or create one if it doesn't exist
prof_non_dupes = ProfileNonDuplicates.objects.filter(
profiles__in=[profile1, profile2]
).first() or ProfileNonDuplicates.objects.create(reason=constants.DIFFERENT_PEOPLE)
prof_non_dupes.profiles.add(profile1, profile2)
return HTMXResponse(
f"Profiles marked as different people.",
)
@transaction.atomic
@permission_required_htmx(
"scipost.can_merge_profiles",
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
"You do not have permission to create profiles.",
)
def _hx_profile_merge(request, to_merge: int, to_merge_into: int):
# Update the post data with the profiles to merge
duplicate_profiles = Profile.objects.potential_duplicates()
if request.method == "POST":
post_data = {
**(request.POST or {}),
"to_merge": to_merge,
"to_merge_into": to_merge_into,
}
merge_form = ProfileMergeForm(post_data)
if merge_form.is_valid():
profile = merge_form.save()
messages.success(request, "Profiles merged successfully.")
else:
merge_form = ProfileMergeForm(
queryset=duplicate_profiles,
initial={
"to_merge": duplicate_profiles[1].id,
"to_merge_into": duplicate_profiles[0].id,
},
)
context = {
"duplicate_profiles": duplicate_profiles,
"form": merge_form,
}
return render(request, "profiles/_hx_profile_merge.html", context)
@permission_required("scipost.can_merge_profiles")
def _hx_profile_comparison(request):
if request.method == "GET":
try:
context = {
"profile_to_merge": get_object_or_404(
Profile, pk=int(request.GET["to_merge"])
),
"profile_to_merge_into": get_object_or_404(
Profile, pk=int(request.GET["to_merge_into"])
),
except ValueError:
raise Http404
return render(request, "profiles/_hx_profile_comparison.html", context)
@permission_required("scipost.can_create_profiles")
def _hx_profile_dynsel_list(request):
form = ProfileDynSelForm(request.POST or None)
if form.is_valid():
profiles = form.search_results()
else:
profiles = Profile.objects.none()
context = {
"profiles": profiles,
"action_url_name": form.cleaned_data["action_url_name"],
"action_url_base_kwargs": (
form.cleaned_data["action_url_base_kwargs"]
if "action_url_base_kwargs" in form.cleaned_data
else {}
),
"action_target_element_id": form.cleaned_data["action_target_element_id"],
"action_target_swap": form.cleaned_data["action_target_swap"],
return render(request, "profiles/_hx_profile_dynsel_list.html", context)
@permission_required("scipost.can_create_profiles")
def _hx_profile_specialties(request, profile_id):
"""
Returns a snippet with current and possible specialties, with one-click actions.
"""
profile = get_object_or_404(Profile, pk=profile_id)
if profile.acad_field is not None:
specialties = Specialty.objects.filter(acad_field=profile.acad_field)
else:
specialties = Specialty.objects.all()
if request.method == "POST":
specialty = get_object_or_404(specialties, slug=request.POST.get("spec_slug"))
if request.POST.get("action") == "add":
profile.specialties.add(specialty)
elif request.POST.get("action") == "remove":
profile.specialties.remove(specialty)
other_specialties = specialties.exclude(slug__in=profile.specialties.values("slug"))
context = {
"profile": profile,
"other_specialties": other_specialties,
}
return render(request, "profiles/_hx_profile_specialties.html", context)
def _hx_add_profile_email(request, profile_id):
"""
profile = get_object_or_404(Profile, pk=profile_id)
is_self_profile = request.user.contributor.profile == profile
can_add_any_emails = request.user.has_perm("scipost.can_add_profile_emails")
if not (is_self_profile or can_add_any_emails):
return HTMXResponse(
"You do not have the required permissions to add an email to this profile.",
tag="danger",
)
form = AddProfileEmailForm(
request.POST or None,
profile=profile,
request=request,
hx_attrs={
"hx-post": reverse(
"profiles:_hx_add_profile_email", kwargs={"profile_id": profile.id}
),
"hx-target": "next tbody",
"hx-swap": "beforeend",
},
cancel_parent_tag="form",
)
profile_email = form.save()
response = TemplateResponse(
request,
"profiles/_hx_profile_emails_table_row.html",
{"profile_mail": profile_email},
)
return TemplateResponse(
request, "profiles/_hx_add_profile_email_form.html", {"form": form}
)
def _hx_profile_email_mark_primary(request, email_id):
"""
Make this email the primary one for this Profile.
If the email's owner is a registered Contributor, only they and users
with the `scipost.can_mark_profile_emails_primary` permission can mark it as primary.
Otherwise, anyone with the `scipost.can_validate_profile_emails` permission can do so.
If the latter try when the user is registered, they are instructed to open a ticket.
"""
profile_email = get_object_or_404(ProfileEmail, pk=email_id)
is_mail_owner = request.user.contributor.profile == profile_email.profile
can_validate_emails = request.user.has_perm("scipost.can_validate_profile_emails")
can_mark_primary = request.user.has_perm("scipost.can_mark_profile_emails_primary")
# If the email's owner is a registered Contributor, only they and users
# with the `scipost.can_mark_profile_emails_primary` permission can mark it as primary.
# Warn users with the `scipost.can_validate_profile_emails` permission to open a ticket.
if (
profile_email.profile.has_active_contributor
and not (can_mark_primary or is_mail_owner)
and can_validate_emails
):
ticket_url = reverse(
"helpdesk:ticket_create",
kwargs={
"concerning_type_id": ContentType.objects.get_for_model(Profile).id,
"concerning_object_id": profile_email.profile.id,
},
)
"There exists a Contributor for this email address "
"who is the authoritative source for this information. "
"If you believe this email should be marked as primary, "
"please open a <a href='{}'>support ticket</a>.".format(ticket_url),
tag="danger",
)
if not (is_mail_owner or can_validate_emails or can_mark_primary):
return HTMXResponse(
"You do not have the required permissions to mark this email as primary.",
tag="danger",
if request.method == "PATCH":
ProfileEmail.objects.filter(profile=profile_email.profile).update(primary=False)
profile_email.primary = True
profile_email.save()
return TemplateResponse(
request,
"profiles/_hx_profile_emails_table.html",
{"profile": profile_email.profile},
)
def _hx_profile_email_toggle_valid(request, email_id):
"""Toggle valid/deprecated status of ProfileEmail."""
profile_email = get_object_or_404(ProfileEmail, pk=email_id)
is_mail_owner = request.user.contributor.profile == profile_email.profile
can_validate_emails = request.user.has_perm("scipost.can_validate_profile_emails")
if not (is_mail_owner or can_validate_emails):
return HTMXResponse(
"You do not have the required permissions to validate this email.",
if request.method == "PATCH":
profile_email.still_valid = not profile_email.still_valid
profile_email.save()
return TemplateResponse(
request,
"profiles/_hx_profile_emails_table_row.html",
{"profile_mail": profile_email},
def _hx_profile_email_request_verification(request, email_id):
"""Toggle verified/unverified status of ProfileEmail."""
profile_email = get_object_or_404(ProfileEmail, pk=email_id)
if not request.method == "PATCH":
raise BadRequest("Invalid request method")
is_mail_owner = request.user.contributor.profile == profile_email.profile
can_verify_emails = request.user.has_perm("scipost.can_verify_profile_emails")
if not (is_mail_owner or can_verify_emails):
return HTMXResponse(
"You do not have the required permissions to verify this email.",
tag="danger",
)
if not (profile_email.verified and profile_email.verification_token is not None):
profile_email.send_verification_email()
messages.success(
request,
f"Verification email sent to {profile_email.email}.",
)
else:
messages.warning(
request,
f"{profile_email.email} is already verified.",
)
return TemplateResponse(
request,
"profiles/_hx_profile_emails_table_row.html",
{"profile_mail": profile_email},
)
def verify_profile_email(request, email_id, token: str):
"""Verify a ProfileEmail."""
profile_email = get_object_or_404(ProfileEmail, pk=email_id)
is_token_correct = profile_email.verification_token == token
was_previously_verified = profile_email.verified
if (
not profile_email.has_token_expired
and is_token_correct
and not was_previously_verified
):
profile_email.verified = True
profile_email.save()
return TemplateResponse(
request,
"profiles/verify_profile_email.html",
{
"profile_email": profile_email,
"is_token_correct": is_token_correct,
"was_previously_verified": was_previously_verified,
},
)
@permission_required_htmx("scipost.can_delete_profile_emails")
def _hx_profile_email_delete(request, email_id):
"""Delete ProfileEmail."""
profile_email = get_object_or_404(ProfileEmail, pk=email_id)
if request.method == "DELETE":
profile_email.delete()
return HttpResponse("")
class AffiliationCreateView(UserPassesTestMixin, CreateView):
model = Affiliation
form_class = AffiliationForm
template_name = "profiles/affiliation_form.html"
def test_func(self):
"""
Allow creating an Affiliation if user is Admin, EdAdmin or is
the Contributor to which this Profile is related.
"""
if self.request.user.has_perm("scipost.can_create_profiles"):
return (
self.request.user.is_authenticated
and self.request.user.contributor.profile.id
== int(self.kwargs.get("profile_id"))
)
def get_initial(self, *args, **kwargs):
initial = super().get_initial(*args, **kwargs)
profile = get_object_or_404(Profile, pk=self.kwargs.get("profile_id"))
initial.update({"profile": profile})
return initial
def get_success_url(self):
"""
If request.user is Admin or EdAdmin, redirect to profile detail view.
Otherwise if request.user is Profile owner, return to personal page.
"""
if self.request.user.has_perm("scipost.can_create_profiles"):
return reverse_lazy(
"profiles:profile_detail", kwargs={"pk": self.object.profile.id}
)
return reverse_lazy("scipost:personal_page")
class AffiliationUpdateView(UserPassesTestMixin, UpdateView):
model = Affiliation
form_class = AffiliationForm
template_name = "profiles/affiliation_form.html"
Allow updating an Affiliation if user is Admin, EdAdmin or is
the Contributor to which this Profile is related.
"""
if self.request.user.has_perm("scipost.can_create_profiles"):
return (
self.request.user.is_authenticated
and self.request.user.contributor.profile.id
== int(self.kwargs.get("profile_id"))
)
def get_success_url(self):
"""
If request.user is Admin or EdAdmin, redirect to profile detail view.
Otherwise if request.user is Profile owner, return to personal page.
"""
if self.request.user.has_perm("scipost.can_create_profiles"):
return reverse_lazy(
"profiles:profile_detail", kwargs={"pk": self.object.profile.id}
)
return reverse_lazy("scipost:personal_page")
class AffiliationDeleteView(UserPassesTestMixin, DeleteView):
model = Affiliation
def test_func(self):
"""
Allow deleting an Affiliation if user is Admin, EdAdmin or is
the Contributor to which this Profile is related.
"""
if self.request.user.has_perm("scipost.can_create_profiles"):
return (
self.request.user.is_authenticated
and self.request.user.contributor.profile.id
== int(self.kwargs.get("profile_id"))
)
def get_success_url(self):
"""
If request.user is Admin or EdAdmin, redirect to profile detail view.
Otherwise if request.user is Profile owner, return to personal page.
"""
if self.request.user.has_perm("scipost.can_create_profiles"):
return reverse_lazy(
"profiles:profile_detail", kwargs={"pk": self.object.profile.id}
)
return reverse_lazy("scipost:personal_page")
class ProfileSendEmailView(PermissionsMixin, MailView):
"""Send a custom email to the profile."""
permission_required = "scipost.can_email_profiles"
queryset = Profile.objects.all()
mail_code = "profiles/profile_send_mail"
def get_success_url(self):
return self.object.get_absolute_url()