Skip to content
✏️ Registration for HackUPC
Python HTML JavaScript CSS Shell
Branch: master
Clone or download
Pull request Compare This branch is 441 commits ahead of HackAssistant:master.
sanchyy Merge pull request #92 from hackupc/new_judging
add new votes for secondary criteria judgin hackupc 2019
Latest commit 386845b Oct 13, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.circleci fix docker container issue Oct 7, 2019
.github Update PULL_REQUEST_TEMPLATE.md Oct 7, 2019
app change date Oct 12, 2019
applications add new votes for secondary criteria judgin hackupc 2019 Oct 13, 2019
baggage fixed baggage by Closa Oct 11, 2019
checkin
files ignore files directory Nov 4, 2017
fixtures Add line breaks and indentation to fixture json Jul 4, 2017
hardware add new votes for secondary criteria judgin hackupc 2019 Oct 13, 2019
judging admin petava Oct 13, 2019
meals Various fixes to offers, meals, etc (#88) Oct 10, 2019
offer Enable hardware and ddeployment fixes Oct 4, 2019
organizers Merge branch 'master' of github.com:HackAssistant/registration Aug 9, 2019
reimbursement Merge pull request #73 from HackAssistant/master Sep 3, 2019
stats fix indent errors Dec 19, 2018
teams
user Enable Sponsor, Volunteer, etc tracking in Meals (#87) Oct 10, 2019
.editorconfig replace pep8 to flake8 to allow for longer lines Aug 7, 2017
.flake8 fix styling issues Jul 12, 2018
.gitignore add vscode in gitignore Aug 4, 2019
.travis.yml Enable hardware and ddeployment fixes Oct 4, 2019
LICENSE update to hackAssistant Nov 20, 2017
Procfile add release script to migrate database on heroku Dec 7, 2017
README.md
USER_GUIDE.md Update USER_GUIDE.md Jul 3, 2019
app.json Merge remote-tracking branch 'ha/master' Jul 5, 2019
manage.py fix styling Oct 25, 2017
management.sh.template add reimbursement stats Jan 28, 2018
requirements.txt requieriments.txt fixed Oct 8, 2019
restart.sh.template
server.sh.template update documentation Nov 20, 2017

README.md

HackUPC Fall 2016

Maintainability CircleCI

📝 Registration for hackathons. Forked from HackAssistant/registration. Previously known as hackupc/backend. Medium article. User Guide

Features

  • Email sign up ✉️
  • Travel reimbursement management 💰
  • Hackathon registration form 📝
  • Check-in interface with QR scanner 📱
  • Review applications interface for organizers (includes vote) ⚖️
  • Email verification 📨
  • Forgot password 🤔
  • Automatic progress save on draft applications ⚙️
  • Internal user role management: Hacker, Organizer, Volunteer, Director and Admin ☕️
  • Automatic control of confirmation, expiration and cancellation flows 🔄
  • Django Admin dashboard to manually edit applications, reimbursement and users 👓
  • Flexible email backend (SendGrid is the default and recommended supported backend) 📮
  • (Optional) Separate applications from dubious hackers to manually contact them 🧐
  • (Optional) Automated slack invites on confirm #️⃣
  • (Optional) MyMLH sign up 📥

Setup

Needs: Python 3.X, virtualenv

  • git clone https://github.com/hackupc/registration && cd registration
  • virtualenv env --python=python3
  • source ./env/bin/activate
  • pip install -r requirements.txt
  • (Optional) If using Postgres, set up the necessary environment variables for its usage before this step
  • python manage.py migrate
  • python manage.py createsuperuser (creates super user to manage all the app)

Dummy data

Coming soon

Available enviroment variables

  • SG_KEY: SendGrid API Key. Mandatory if you want to use SendGrid as your email backend. You can manage them here. Note that if you don't add it the system will write all emails in the filesystem for preview. You can replace the email backend easily. See more here.
  • PROD_MODE(optional): Disables Django debug mode.
  • SECRET(optional): Sets web application secret. You can generate a random secret with python running: os.urandom(24)
  • DATABASE_URL(optional): URL to connect to the database. If not sets, defaults to django default SQLite database. See schema for different databases here.
  • DATABASE_SECURE(optional): Whether or not to use SSL to connect to the database. Defaults to true.
  • DOMAIN(optional): Domain where app will be running. Default: localhost:8000
  • SL_TOKEN(optional): Slack token to invite hackers automatically on confirmation. You can obtain it here
  • SL_TEAM(optional): Slack team name (xxx on xxx.slack.com)
  • DROPBOX_OAUTH2_TOKEN(optional): Enables DropBox as file upload server instead of local computer. (See "Set up Dropbox storage for uploaded files" below)
  • SL_BOT_ID(optional): Slack bot ID to send messages from.
  • SL_BOT_TOKEN(optional): Slack bot token to send messages.
  • SL_BOT_CHANNEL(optional): General channel to refer from the bot messages.
  • SL_BOT_DIRECTOR1(optional): User ID of one of the directors.
  • SL_BOT_DIRECTOR2(optional): User ID of the other director.
  • MLH_CLIENT_SECRET(optional): Enables MyMLH as a sign up option. Format is client_id@client_secret (See "Set up MyMLH" below)

Server

Local environment

  • Set up (see above)
  • python manage.py runserver
  • Sit back, relax and enjoy. That's it!

Heroku deploy

You can deploy this project into heroku for free. You will need to verify your account to use the scheduler for automatic application expirations emails. See "Use in your hackathon" for more details on using in your hackathon.

Deploy

Production environment

Inspired on this tutorial to understand and set it up as in our server.

  • Set up (see above)
  • Create server.sh from template: cp server.sh.template server.sh
  • chmod +x server.sh
  • Edit variables to match your environment and add extra if required (see environment variables available above)
  • Create restart.sh from template: cp restart.sh.template restart.sh
  • chmod +x restart.sh
  • Edit variables to match your environment and add extra if required (see environment variables available above)
  • Run restart.sh. This will update the database, dependecies and static files.
  • Set up Systemd (read next section)

Set up gunicorn service in Systemd

Needs: Systemd.

  • Edit this file /etc/systemd/system/backend.service
  • Add this content
[Unit]
Description=backend daemon
After=network.target

[Service]
User=user
Group=www-data
WorkingDirectory=/home/user/project_folder
ExecStart=/home/user/project_folder/server.sh >>/home/user/project_folder/out.log 2>>/home/user/project_folder/error.log

[Install]
WantedBy=multi-user.target

  • Replace user for your linux user.
  • Replace project_folder by the name of the folder where the project is located
  • Create and enable service: sudo systemctl start backend && sudo systemctl enable backend

Set up Postgres

Needs: PostgreSQL installed

  • Enter PSQL console: sudo -u postgres psql
  • Create database: CREATE DATABASE backend;
  • Create user for database: CREATE USER backenduser WITH PASSWORD 'password'; (make sure to include a strong password)
  • Prepare user for Django
ALTER ROLE backenduser SET client_encoding TO 'utf8';
ALTER ROLE backenduser SET default_transaction_isolation TO 'read committed';
ALTER ROLE backenduser SET timezone TO 'UTC';
  • Grant all priviledges to your user for the created database: GRANT ALL PRIVILEGES ON DATABASE myproject TO myprojectuser;
  • Exit PSQL console: \q

Other SQL engines may be used, we recommend PostgreSQL for it's robustness. To use other please check this documentation for more information on SQL engines in Django.

Automatic Dropbox backup

Hackers data is really important. To ensure that you don't lose any data we encourage you to set up automatic backups. One option that is free and reliable is using the PostgresSQLDropboxBackup script.

Find the script and usage instructions here

Set up Dropbox storage for uploaded files

This will need to be used for Heroku or some Docker deployments. File uploads sometimes don't work properly on containerized systems.

  1. Create a new Dropbox app
  2. Generate Access token here
  3. Set token as environment variable DROPBOX_OAUTH2_TOKEN

Set up MyMLH

MyMLH is a centralized login system used by MLH. It makes it easier for hackers to sign up for more events without re-entering their data every time around.

This integration allows hackers to have part of their application completed using their information from MLH.

As of the moment, MyMLH can only be used to sign up. This decision is due to the fact that MyMLH can have accounts with emails not verified. This can be a security concern as someone could create an account with someone else's email and it would totally invalidate our verification email system. In that direction the approach taken is to extract fields and use them for the application during the sign up process.

  1. Create a new MyMLH app.
  2. Add https://DOMAIN//user/callback/mlh/ as a Redirect URI. Replace DOMAIN for the domain used to deploy your system. Ex: http://registration.gerard.space/user/callback/mlh/.
  3. Set MLH_CLIENT_SECRET using the strings in Application ID and Secret fields, concatenated with a @. Ex: application_id@secret.

Note that to test locally you will need to add a line where DOMAIN is localhost:8000.

Set up nginx

Needs: Nginx

  • sudo vim /etc/nginx/sites-available/default
  • Add site:
server {
    listen 80;
    listen [::]:80;

    server_name my.hackupc.com;


    location = /favicon.ico { access_log off; log_not_found off; }
    location /static/ {
        alias /home/user/project_folder/staticfiles/;
    }
    
    location /files/ {
        alias /home/user/project_folder/files/;
    }
    
    location / {
        include proxy_params;
        proxy_pass http://unix:/home/user/project_folder/backend.sock;
        client_max_body_size 5MB;
    }


}

Deploy new version

  • git pull
  • ./restart.sh
  • sudo service backend restart

Management

Automated expiration

  • Create management.sh from template: cp management.sh.template management.sh
  • chmod +x management.sh
  • Edit variables to match your environment and add extra if required (see environment variables available above)
  • Add to crontab: crontab -e
*/5 * * * * cd /home/user/project_folder/ && ./management.sh > /home/user/project_folder/management.log 2> /home/user/project_folder/management_err.log

User roles

  • is_volunteer: Allows user to check-in hackers with QR and list view
  • is_organizer: Allows user to vote, see voting ranking and check-in hackers.
  • is_director: Allows user to send invites to hackers as well as send reimbursement. Also can review dubious applications.
  • is_admin: Allows user to enter Django Admin interface
  • can_review_dubious: User can review and mark as safe applications that seem weird.

Important SQL queries

Here are several queries that may be useful during the hackathon application process.

  1. source ./env/bin/activate
  2. python manage.py dbshell
  3. Run SQL query
  4. Extract results

Missing applications emails

Emails from users that have registered but have not completed the application.

SELECT u.email
FROM user_user u
WHERE NOT is_director AND NOT is_volunteer AND NOT is_organizer
AND u.id NOT IN 
(SELECT a.user_id FROM applications_application a);

Use in your hackathon

You can use this for your own hackathon. How?

Personalization

Style

Content

Update emails:

You can update emails related to

Update hackathon variables

Check all available variables at app/hackathon_variables.py.template. You can set the ones that you prefer at app/hackathon_variables.py

Update registration form

You can change the form, titles, texts in applications/forms.py

Update application model

If you need extra labels for your hackathon, you can change the model and add your own fields.

  • Update model with specific fields: applications/models.py
  • python manage.py makemigrations
  • python manage.py migrate

Want to Contribute?

Read these guidelines carefully.

By making a contribution, in any form (including, but not limited to, Issues and Pull Requests), you agree to abide by the Code of Conduct. Report any incidents to devs@hackupc.com and appropriate action will be taken against the offender after investigation.

License

MIT © Hackers@UPC

You can’t perform that action at this time.