def insert_into_tables(self, policy, date): """ Inserts set of policies into table """ print "policy inside insert_into_tables" print policy if self.check_default(policy) == 0: id_pwpolicy = 0 else: id_pwpolicy = db.insert('pw_policy', plen=policy['plen'], psets=policy['psets'], pdict=policy['pdict'], phist=policy['phist'], prenew=policy['prenew'], pattempts=policy['pattempts'], precovery=policy['precovery']) db.insert('policies', user_id=context.user_id(), location=policy['location'], employee=policy['employee'], device=policy['device'], bio_id=policy['bdata'], pass_id=policy['pdata'], pw_id=id_pwpolicy, date=date)
def insert_into_tables(self, policy, date): """ Inserts set of policies into table """ if self.check_default(policy) == 0: id_pwpolicy = 0 else: id_pwpolicy = db.insert( "pw_policy", plen=policy["plen"], psets=policy["psets"], pdict=policy["pdict"], phist=policy["phist"], prenew=policy["prenew"], pattempts=policy["pattempts"], precovery=policy["precovery"], ) db.insert( "policies", user_id=context.user_id(), location=policy["location"], employee=policy["employee"], device=policy["device"], bio_id=policy["bdata"], pass_id=policy["pdata"], pw_id=id_pwpolicy, date=date, )
def request_password(cls, token, user_id): """ Creates password recovery ticket in password_recovery table. Returns recipient email address if user found, else empty string """ user_list = cls.select_users(user_id=user_id) if len(user_list) == 1: user = user_list[0] db.insert('password_recovery', user_id=user.user_id, timestamp=web.SQLLiteral('NOW()'), token=token, invalid=0) return user.email else: return ''
def register(cls, username, password, email): """ Attempts to insert new user data into users table. Returns ID of user if successfully registered, 0 if user already exists, -1 if database error. """ if len(cls.select_users(username=username)) > 0: return 0 else: if username == '' or email == '': return -1 db.insert('users', username=username, email=email, password=hash_utils.hash_password(password)) user_lookup = cls.select_users(username=username) if len(user_lookup) == 1: return user_lookup[0].user_id else: return -1
def request_password(cls, token, user_id): """ Creates password recovery ticket in password_recovery table. Returns recipient email address if user found, else empty string """ user_list = cls.select_users(user_id=user_id) if len(user_list) == 1: user = user_list[0] db.insert('password_recovery', user_id=user.user_id, datetime=web.SQLLiteral('NOW()'), token=token, invalid=0) return user.email else: return ''
def get_calendar(cls, user_id, data, cost, date): sim = simulation() risk = sim.calc_risk_prob() cost = sim.calc_prod_cost() calendar = records.record_prophecy(user_id, risk) # dtt = datetime.strptime(date, "%Y/%m/%d") # string_time = dtt.strftime("%Y/%m/%d") db.insert('scores', userid=user_id, score_type=1, score_value=risk, date=date, rank=0) db.insert('scores', userid=user_id, score_type=2, score_value=cost, date=date, rank=0) db.insert('pw_policy', userid=user_id, date=date, plen=data["plen"], psets=data["psets"], pdict=data["pdict"], phist=data["phist"], prenew=data["prenew"], pattempts=data["pattempts"], precovery=data["precovery"]) #return json.dumps([{"value": new_date.strftime("%Y/%m/%d %H:%M:%S")}]) return calendar
def insert_score(self, user_id, score_type, score_value, date): db.insert('scores', userid=user_id, score_type=score_type, score_value=score_value, date=date)