From d317973696a5732dbf4f945f7f95b312e5c6cbed Mon Sep 17 00:00:00 2001 From: aliminuei Date: Fri, 1 Dec 2023 21:12:58 +0330 Subject: [PATCH 1/5] add file .gitignore to project --- .gitignore | 73 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100644 .gitignore diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..1491b39 --- /dev/null +++ b/.gitignore @@ -0,0 +1,73 @@ +# Django # +*.log +*.pot +*.pyc +__pycache__ +db.sqlite3 +code/db.sqlite3 +media + +# Backup files # +*.bak + + +# Python # +*.py[cod] +*$py.class + +# Distribution / packaging +.Python build/ +develop-eggs/ +dist/ +downloads/ +eggs/ +.eggs/ +lib/ +lib64/ +parts/ +sdist/ +var/ +wheels/ +*.egg-info/ +.installed.cfg +*.egg +*.manifest +*.spec + +# Installer logs +pip-log.txt +pip-delete-this-directory.txt + + +# pyenv +.python-version + +# celery +celerybeat-schedule.* + + +# Environments +.env +.venv +env/ +venv/ +ENV/ +env.bak/ +venv.bak/ +inspectionProfiles/ +.idea/ +*.idea + +# mkdocs documentation +/site + +# Visual Studio Code # +.vscode/* +!.vscode/settings.json +!.vscode/tasks.json +!.vscode/launch.json +!.vscode/extensions.json +.history +.vscode/launch.json + +code/upcircuit/local_settings.py From 9275db3e0ab35488b12020ed6a3a860d63d64f98 Mon Sep 17 00:00:00 2001 From: aliminuei Date: Fri, 1 Dec 2023 21:15:30 +0330 Subject: [PATCH 2/5] add prject with apps and logics models views and urls --- CryptoReader/__init__.py | 0 CryptoReader/asgi.py | 16 +++ CryptoReader/celery.py | 30 ++++++ CryptoReader/settings.py | 154 +++++++++++++++++++++++++++ CryptoReader/urls.py | 24 +++++ CryptoReader/wsgi.py | 16 +++ positions/__init__.py | 0 positions/admin.py | 9 ++ positions/apps.py | 6 ++ positions/functions.py | 43 ++++++++ positions/migrations/0001_initial.py | 29 +++++ positions/migrations/0002_initial.py | 23 ++++ positions/migrations/__init__.py | 0 positions/models.py | 21 ++++ positions/serializers.py | 12 +++ positions/tasks.py | 21 ++++ positions/tests.py | 3 + positions/urls.py | 5 + positions/views.py | 42 ++++++++ users/__init__.py | 0 users/admin.py | 10 ++ users/apps.py | 6 ++ users/migrations/0001_initial.py | 44 ++++++++ users/migrations/__init__.py | 0 users/models.py | 53 +++++++++ users/serializers.py | 30 ++++++ users/tests.py | 3 + users/urls.py | 11 ++ users/views.py | 19 ++++ 29 files changed, 630 insertions(+) create mode 100644 CryptoReader/__init__.py create mode 100644 CryptoReader/asgi.py create mode 100644 CryptoReader/celery.py create mode 100644 CryptoReader/settings.py create mode 100644 CryptoReader/urls.py create mode 100644 CryptoReader/wsgi.py create mode 100644 positions/__init__.py create mode 100644 positions/admin.py create mode 100644 positions/apps.py create mode 100644 positions/functions.py create mode 100644 positions/migrations/0001_initial.py create mode 100644 positions/migrations/0002_initial.py create mode 100644 positions/migrations/__init__.py create mode 100644 positions/models.py create mode 100644 positions/serializers.py create mode 100644 positions/tasks.py create mode 100644 positions/tests.py create mode 100644 positions/urls.py create mode 100644 positions/views.py create mode 100644 users/__init__.py create mode 100644 users/admin.py create mode 100644 users/apps.py create mode 100644 users/migrations/0001_initial.py create mode 100644 users/migrations/__init__.py create mode 100644 users/models.py create mode 100644 users/serializers.py create mode 100644 users/tests.py create mode 100644 users/urls.py create mode 100644 users/views.py diff --git a/CryptoReader/__init__.py b/CryptoReader/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/CryptoReader/asgi.py b/CryptoReader/asgi.py new file mode 100644 index 0000000..bb3ab0b --- /dev/null +++ b/CryptoReader/asgi.py @@ -0,0 +1,16 @@ +""" +ASGI config for CryptoReader project. + +It exposes the ASGI callable as a module-level variable named ``application``. + +For more information on this file, see +https://docs.djangoproject.com/en/4.2/howto/deployment/asgi/ +""" + +import os + +from django.core.asgi import get_asgi_application + +os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'CryptoReader.settings') + +application = get_asgi_application() diff --git a/CryptoReader/celery.py b/CryptoReader/celery.py new file mode 100644 index 0000000..a5f95e5 --- /dev/null +++ b/CryptoReader/celery.py @@ -0,0 +1,30 @@ +import os + +from celery import Celery +from celery.schedules import crontab + +# Set the default Django settings module for the 'celery' program. +os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'settings.py') + +app = Celery('crypto_reader') + +# Using a string here means the worker doesn't have to serialize +# the configuration object to child processes. +# - namespace='CELERY' means all celery-related configuration keys +# should have a `CELERY_` prefix. +app.config_from_object('django.conf:settings', namespace='CELERY') + +# Load task modules from all registered Django apps. +app.autodiscover_tasks() + +app.conf.beat_schedule = { + 'every-30-sec': { + 'task': 'positions.tasks.tracking_positions', + 'schedule': crontab(minute='*/2'), + }, +} + + +@app.task(bind=True, ignore_result=True) +def debug_task(self): + print(f'Request: {self.request!r}') diff --git a/CryptoReader/settings.py b/CryptoReader/settings.py new file mode 100644 index 0000000..8148ba1 --- /dev/null +++ b/CryptoReader/settings.py @@ -0,0 +1,154 @@ +""" +Django settings for CryptoReader project. + +Generated by 'django-admin startproject' using Django 4.2.7. + +For more information on this file, see +https://docs.djangoproject.com/en/4.2/topics/settings/ + +For the full list of settings and their values, see +https://docs.djangoproject.com/en/4.2/ref/settings/ +""" +import os +from datetime import timedelta +from pathlib import Path + +from decouple import config, Csv + +# Build paths inside the project like this: BASE_DIR / 'subdir'. +BASE_DIR = Path(__file__).resolve().parent.parent + +# Quick-start development settings - unsuitable for production +# See https://docs.djangoproject.com/en/4.2/howto/deployment/checklist/ + +# SECURITY WARNING: keep the secret key used in production secret! +SECRET_KEY = config('SECRET_KEY', 'DUMMY_KEY') + +DEBUG = config('DEBUG', cast=bool, default=False) + +ALLOWED_HOSTS = config('ALLOWED_HOSTS', cast=Csv(), default='*') +KUCOIN_API = 'https://api.kucoin.com' + +ENCRYPTION_KEY = config('ENCRYPTION_KEY') + +# Application definition + +INSTALLED_APPS = [ + 'django.contrib.admin', + 'django.contrib.auth', + 'django.contrib.contenttypes', + 'django.contrib.sessions', + 'django.contrib.messages', + 'django.contrib.staticfiles', + + # Third_party + 'rest_framework', + 'rest_framework_simplejwt', + 'django_celery_beat', + + # Local_apps + 'users.apps.UsersConfig', + 'positions.apps.PositionsConfig' +] + +MIDDLEWARE = [ + 'django.middleware.security.SecurityMiddleware', + 'django.contrib.sessions.middleware.SessionMiddleware', + 'django.middleware.common.CommonMiddleware', + 'django.middleware.csrf.CsrfViewMiddleware', + 'django.contrib.auth.middleware.AuthenticationMiddleware', + 'django.contrib.messages.middleware.MessageMiddleware', + 'django.middleware.clickjacking.XFrameOptionsMiddleware', +] + +ROOT_URLCONF = 'CryptoReader.urls' + +TEMPLATES = [ + { + 'BACKEND': 'django.template.backends.django.DjangoTemplates', + 'DIRS': [BASE_DIR / 'templates'] + , + 'APP_DIRS': True, + 'OPTIONS': { + 'context_processors': [ + 'django.template.context_processors.debug', + 'django.template.context_processors.request', + 'django.contrib.auth.context_processors.auth', + 'django.contrib.messages.context_processors.messages', + ], + }, + }, +] + +WSGI_APPLICATION = 'CryptoReader.wsgi.application' + +# Database +# https://docs.djangoproject.com/en/4.2/ref/settings/#databases + +DATABASES = { + 'default': { + 'ENGINE': 'django.db.backends.postgresql', + 'NAME': config('DB_NAME'), + 'USER': config('DB_USER'), + 'PASSWORD': config('DB_PASSWORD'), + 'HOST': config('DB_HOST'), + 'PORT': config('DB_PORT'), + }, +} + +# Password validation +# https://docs.djangoproject.com/en/4.2/ref/settings/#auth-password-validators + +AUTH_PASSWORD_VALIDATORS = [ + { + 'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator', + }, + { + 'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator', + }, + { + 'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator', + }, + { + 'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator', + }, +] + +# Internationalization +# https://docs.djangoproject.com/en/4.2/topics/i18n/ + +LANGUAGE_CODE = 'en-us' + +TIME_ZONE = 'UTC' + +USE_I18N = True + +USE_TZ = True + +AUTH_USER_MODEL = 'users.User' + +REST_FRAMEWORK = { + 'DEFAULT_AUTHENTICATION_CLASSES': ( + 'rest_framework_simplejwt.authentication.JWTAuthentication', + ) +} + +SIMPLE_JWT = { + 'ACCESS_TOKEN_LIFETIME': timedelta(hours=1), + 'REFRESH_TOKEN_LIFETIME': timedelta(days=1), +} + +# Celery Configs +CELERY_BROKER_URL = config('CELERY_BROKER_URL', default='redis://localhost:6379') +CELERY_RESULT_BACKEND = config('CELERY_RESULT_BACKEND', default='redis://localhost:6379') + +# Static files (CSS, JavaScript, Images) +# https://docs.djangoproject.com/en/4.2/howto/static-files/ + +STATIC_URL = 'static/' +STATIC_ROOT = os.path.join(BASE_DIR, 'static/') + +# Default primary key field type +# https://docs.djangoproject.com/en/4.2/ref/settings/#default-auto-field + +DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField' diff --git a/CryptoReader/urls.py b/CryptoReader/urls.py new file mode 100644 index 0000000..49023cd --- /dev/null +++ b/CryptoReader/urls.py @@ -0,0 +1,24 @@ +""" +URL configuration for CryptoReader project. + +The `urlpatterns` list routes URLs to views. For more information please see: + https://docs.djangoproject.com/en/4.2/topics/http/urls/ +Examples: +Function views + 1. Add an import: from my_app import views + 2. Add a URL to urlpatterns: path('', views.home, name='home') +Class-based views + 1. Add an import: from other_app.views import Home + 2. Add a URL to urlpatterns: path('', Home.as_view(), name='home') +Including another URLconf + 1. Import the include() function: from django.urls import include, path + 2. Add a URL to urlpatterns: path('blog/', include('blog.urls')) +""" +from django.contrib import admin +from django.urls import path, include + +urlpatterns = [ + path('admin/', admin.site.urls), + path('users/', include('users.urls')), # accounts app + path('positions/', include('positions.urls')), # kucoin app +] diff --git a/CryptoReader/wsgi.py b/CryptoReader/wsgi.py new file mode 100644 index 0000000..f7114a7 --- /dev/null +++ b/CryptoReader/wsgi.py @@ -0,0 +1,16 @@ +""" +WSGI config for CryptoReader project. + +It exposes the WSGI callable as a module-level variable named ``application``. + +For more information on this file, see +https://docs.djangoproject.com/en/4.2/howto/deployment/wsgi/ +""" + +import os + +from django.core.wsgi import get_wsgi_application + +os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'CryptoReader.settings') + +application = get_wsgi_application() diff --git a/positions/__init__.py b/positions/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/positions/admin.py b/positions/admin.py new file mode 100644 index 0000000..f2ff39a --- /dev/null +++ b/positions/admin.py @@ -0,0 +1,9 @@ +from django.contrib import admin +from .models import Order + + +@admin.register(Order) +class OrderAdmin(admin.ModelAdmin): + list_display = ('user', 'symbol', 'is_active', 'created_at',) + list_filter = ('is_active',) + search_fields = ('user', 'symbol',) diff --git a/positions/apps.py b/positions/apps.py new file mode 100644 index 0000000..490dbf8 --- /dev/null +++ b/positions/apps.py @@ -0,0 +1,6 @@ +from django.apps import AppConfig + + +class PositionsConfig(AppConfig): + default_auto_field = 'django.db.models.BigAutoField' + name = 'positions' diff --git a/positions/functions.py b/positions/functions.py new file mode 100644 index 0000000..a8fb299 --- /dev/null +++ b/positions/functions.py @@ -0,0 +1,43 @@ +import aiohttp +from django.conf import settings +from django.db import transaction + +from positions.models import Order +from utils.ex_request import kucoin_api + + +def update_orders(results): + if results: + with transaction.atomic(): + for user, items in results.items(): + items = results['data']['items'] + for item in items: + Order.objects.update_or_create( + user=user, + client_id=item['clientOid'], + side=item['side'], + symbol=item['symbol'], + type=item['type'], + remark=item['remark'], + stp=item['stp'], + trade_type=item['tradeType'], + is_active=item['isActive']) + + +async def get_headers(users): + endpoint = '/api/v1/orders' + headers = {} + for user in users: + headers[user] = await kucoin_api(user, endpoint) + return headers + + +async def fetch_all_users_order(users): + tasks = {} + headers = await get_headers(users) + async with aiohttp.ClientSession() as session: + url = settings.KUCOIN_API + '/api/v1/orders' + for user, header in headers.items(): + async with session.get(url, headers=header) as resp: + tasks[user] = await resp.json() + return tasks diff --git a/positions/migrations/0001_initial.py b/positions/migrations/0001_initial.py new file mode 100644 index 0000000..a47f5fc --- /dev/null +++ b/positions/migrations/0001_initial.py @@ -0,0 +1,29 @@ +# Generated by Django 4.2.7 on 2023-12-01 17:35 + +from django.db import migrations, models + + +class Migration(migrations.Migration): + + initial = True + + dependencies = [ + ] + + operations = [ + migrations.CreateModel( + name='Order', + fields=[ + ('id', models.BigAutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), + ('client_id', models.CharField(max_length=128)), + ('side', models.CharField(max_length=128)), + ('symbol', models.CharField(max_length=128)), + ('type', models.CharField(max_length=128)), + ('remark', models.CharField(max_length=128)), + ('stp', models.CharField(max_length=128)), + ('trade_type', models.CharField(max_length=128)), + ('is_active', models.BooleanField(default=False)), + ('created_at', models.DateTimeField(auto_now_add=True)), + ], + ), + ] diff --git a/positions/migrations/0002_initial.py b/positions/migrations/0002_initial.py new file mode 100644 index 0000000..4c4913a --- /dev/null +++ b/positions/migrations/0002_initial.py @@ -0,0 +1,23 @@ +# Generated by Django 4.2.7 on 2023-12-01 17:35 + +from django.conf import settings +from django.db import migrations, models +import django.db.models.deletion + + +class Migration(migrations.Migration): + + initial = True + + dependencies = [ + ('positions', '0001_initial'), + migrations.swappable_dependency(settings.AUTH_USER_MODEL), + ] + + operations = [ + migrations.AddField( + model_name='order', + name='user', + field=models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, to=settings.AUTH_USER_MODEL), + ), + ] diff --git a/positions/migrations/__init__.py b/positions/migrations/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/positions/models.py b/positions/models.py new file mode 100644 index 0000000..3d6156b --- /dev/null +++ b/positions/models.py @@ -0,0 +1,21 @@ +from django.contrib.auth import get_user_model +from django.db import models + +User = get_user_model() + + +class Order(models.Model): + user = models.ForeignKey(User, on_delete=models.CASCADE) + client_id = models.CharField(max_length=128) + side = models.CharField(max_length=128) + symbol = models.CharField(max_length=128) + type = models.CharField(max_length=128) + remark = models.CharField(max_length=128) + stp = models.CharField(max_length=128) + trade_type = models.CharField(max_length=128) + + is_active = models.BooleanField(default=False) + created_at = models.DateTimeField(auto_now_add=True) + + def __str__(self): + return f'{self.user.username} - {self.symbol}' diff --git a/positions/serializers.py b/positions/serializers.py new file mode 100644 index 0000000..8fa411c --- /dev/null +++ b/positions/serializers.py @@ -0,0 +1,12 @@ +from rest_framework import serializers +from .models import Order + + +class OrderSerializers(serializers.ModelSerializer): + class Meta: + model = Order + fields = '__all__' + + +class SymbolTrackSerializers(serializers.Serializer): + track = serializers.CharField(required=True, max_length=64) diff --git a/positions/tasks.py b/positions/tasks.py new file mode 100644 index 0000000..20cb3a3 --- /dev/null +++ b/positions/tasks.py @@ -0,0 +1,21 @@ +import asyncio + +from celery import shared_task +from celery.utils.log import get_task_logger +from django.contrib.auth import get_user_model + +from positions.functions import fetch_all_users_order, update_orders + +logger = get_task_logger(__name__) +User = get_user_model() + + +@shared_task +async def tracking_positions(): + """ + Tracking position of each user every 30 seconds + """ + users = User.objects.filter(is_active=True).all() + loop = asyncio.get_event_loop() + results = loop.run_until_complete(fetch_all_users_order(users)) + update_orders(results) diff --git a/positions/tests.py b/positions/tests.py new file mode 100644 index 0000000..7ce503c --- /dev/null +++ b/positions/tests.py @@ -0,0 +1,3 @@ +from django.test import TestCase + +# Create your tests here. diff --git a/positions/urls.py b/positions/urls.py new file mode 100644 index 0000000..d35aa47 --- /dev/null +++ b/positions/urls.py @@ -0,0 +1,5 @@ +from django.urls import path + + +urlpatterns = [ +] \ No newline at end of file diff --git a/positions/views.py b/positions/views.py new file mode 100644 index 0000000..909d301 --- /dev/null +++ b/positions/views.py @@ -0,0 +1,42 @@ +from rest_framework import pagination, status +from rest_framework.generics import GenericAPIView +from rest_framework.permissions import IsAuthenticated +from rest_framework.response import Response + +from .models import Order +from .serializers import OrderSerializers, SymbolTrackSerializers + + +class PositionPagination(pagination.PageNumberPagination): + page_size = 10 + page_size_query_param = 'page_size' + + +class OpenPositionsAPIView(GenericAPIView): + permission_classes = (IsAuthenticated,) + queryset = Order.objects.all().order_by('-created_at') + serializer_class = OrderSerializers + pagination_class = PositionPagination + + def get(self, request): + orders = Order.objects.filter(user=request.user, is_active=True) + data = OrderSerializers(orders, many=True).data + + paginator = PositionPagination() + result_page = paginator.paginate_queryset(data, request) + return paginator.get_paginated_response(result_page) + + +class TrackPositions(GenericAPIView): + permission_classes = (IsAuthenticated,) + serializer_class = SymbolTrackSerializers + queryset = Order.objects.all() + + def post(self, request): + serializer = SymbolTrackSerializers(data=request.data) + serializer.is_valid(raise_exception=True) + track = serializer.data['track'] + order_obj = Order.objects.filter(user=request.user, symbol=track).first() + if not order_obj: + return Response({'message': 'symbol not found in tracking position'}, status=status.HTTP_404_NOT_FOUND) + return Response(OrderSerializers(instance=order_obj).data, status=status.HTTP_200_OK) diff --git a/users/__init__.py b/users/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/users/admin.py b/users/admin.py new file mode 100644 index 0000000..021879a --- /dev/null +++ b/users/admin.py @@ -0,0 +1,10 @@ +from django.contrib import admin +from django.contrib.auth import get_user_model + +User = get_user_model() + + +@admin.register(User) +class UserAdmin(admin.ModelAdmin): + list_display = ('id', 'get_full_name', 'api_key',) + search_fields = ('id', 'api_key',) diff --git a/users/apps.py b/users/apps.py new file mode 100644 index 0000000..72b1401 --- /dev/null +++ b/users/apps.py @@ -0,0 +1,6 @@ +from django.apps import AppConfig + + +class UsersConfig(AppConfig): + default_auto_field = 'django.db.models.BigAutoField' + name = 'users' diff --git a/users/migrations/0001_initial.py b/users/migrations/0001_initial.py new file mode 100644 index 0000000..1c11834 --- /dev/null +++ b/users/migrations/0001_initial.py @@ -0,0 +1,44 @@ +# Generated by Django 4.2.7 on 2023-12-01 17:35 + +import django.contrib.auth.validators +from django.db import migrations, models +import django.utils.timezone +import uuid + + +class Migration(migrations.Migration): + + initial = True + + dependencies = [ + ('auth', '0012_alter_user_first_name_max_length'), + ] + + operations = [ + migrations.CreateModel( + name='User', + fields=[ + ('password', models.CharField(max_length=128, verbose_name='password')), + ('last_login', models.DateTimeField(blank=True, null=True, verbose_name='last login')), + ('is_superuser', models.BooleanField(default=False, help_text='Designates that this user has all permissions without explicitly assigning them.', verbose_name='superuser status')), + ('username', models.CharField(error_messages={'unique': 'A user with that username already exists.'}, help_text='Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only.', max_length=150, unique=True, validators=[django.contrib.auth.validators.UnicodeUsernameValidator()], verbose_name='username')), + ('first_name', models.CharField(blank=True, max_length=150, verbose_name='first name')), + ('last_name', models.CharField(blank=True, max_length=150, verbose_name='last name')), + ('email', models.EmailField(blank=True, max_length=254, verbose_name='email address')), + ('is_staff', models.BooleanField(default=False, help_text='Designates whether the user can log into this admin site.', verbose_name='staff status')), + ('is_active', models.BooleanField(default=True, help_text='Designates whether this user should be treated as active. Unselect this instead of deleting accounts.', verbose_name='active')), + ('date_joined', models.DateTimeField(default=django.utils.timezone.now, verbose_name='date joined')), + ('id', models.UUIDField(default=uuid.uuid4, editable=False, primary_key=True, serialize=False)), + ('api_key', models.CharField(max_length=255)), + ('api_secret', models.CharField(max_length=255)), + ('api_passphrase', models.CharField(max_length=255)), + ('groups', models.ManyToManyField(blank=True, help_text='The groups this user belongs to. A user will get all permissions granted to each of their groups.', related_name='user_set', related_query_name='user', to='auth.group', verbose_name='groups')), + ('user_permissions', models.ManyToManyField(blank=True, help_text='Specific permissions for this user.', related_name='user_set', related_query_name='user', to='auth.permission', verbose_name='user permissions')), + ], + options={ + 'verbose_name': 'user', + 'verbose_name_plural': 'users', + 'abstract': False, + }, + ), + ] diff --git a/users/migrations/__init__.py b/users/migrations/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/users/models.py b/users/models.py new file mode 100644 index 0000000..58a1982 --- /dev/null +++ b/users/models.py @@ -0,0 +1,53 @@ +import uuid + +from django.contrib.auth.base_user import BaseUserManager +from django.contrib.auth.models import AbstractUser +from django.db import models + +from utils.functions import encrypt, decrypt + + +class UserManager(BaseUserManager): + + def create_user(self, username, password=None, **extra_fields): + user = self.model(username=username, **extra_fields) + user.set_password(password) + user.api_key = encrypt(extra_fields.get('api_key')) + user.api_secret = encrypt(extra_fields.get('api_secret')) + user.api_passphrase = encrypt(extra_fields.get('api_passphrase')) + user.save() + + return user + + def create_superuser(self, username, password, **extra_fields): + extra_fields.setdefault('is_staff', True) + extra_fields.setdefault('is_superuser', True) + extra_fields.setdefault('is_active', True) + if extra_fields.get('is_staff') is not True: + raise ValueError('Please assign is_staff=True for superuser') + if extra_fields.get('is_superuser') is not True: + raise ValueError('Please assign is_superuser=True for superuser') + return self.create_user(username, password, **extra_fields) + + +class User(AbstractUser): + id = models.UUIDField(primary_key=True, editable=False, default=uuid.uuid4) + + # Add additional fields for KuCoin details + api_key = models.CharField(max_length=255) + api_secret = models.CharField(max_length=255) + api_passphrase = models.CharField(max_length=255) + + EMAIL_FIELD = None + USERNAME_FIELD = 'username' + REQUIRED_FIELDS = [] + + objects = UserManager() + + @property + def decrypt_kucoin_data(self): + return {'api_key': decrypt(self.api_key), 'api_secret': decrypt(self.api_secret), + 'api_passphrase': decrypt(self.api_passphrase)} + + def __str__(self): + return str(self.id) diff --git a/users/serializers.py b/users/serializers.py new file mode 100644 index 0000000..d5eae1d --- /dev/null +++ b/users/serializers.py @@ -0,0 +1,30 @@ +from django.contrib.auth import get_user_model +from django.contrib.auth.password_validation import validate_password +from rest_framework import serializers + +User = get_user_model() + + +class RegisterSerializer(serializers.ModelSerializer): + password = serializers.CharField(write_only=True, validators=[validate_password]) + password_confirm = serializers.CharField(write_only=True) + + class Meta: + model = User + fields = ('id', 'first_name', 'last_name', 'username', 'api_key', 'api_secret', 'api_passphrase', + 'password', 'password_confirm') + + extra_kwargs = { + 'api_key': {'write_only': True}, + 'api_secret': {'write_only': True}, + 'api_passphrase': {'write_only': True}, + } + + def validate(self, attrs): + if attrs['password'] != attrs['password_confirm']: + raise serializers.ValidationError({"password": "Password fields didn't match."}) + return super().validate(attrs) + + def create(self, validated_data) -> User: + validated_data.pop('password_confirm') + return User.objects.create_user(**validated_data) diff --git a/users/tests.py b/users/tests.py new file mode 100644 index 0000000..7ce503c --- /dev/null +++ b/users/tests.py @@ -0,0 +1,3 @@ +from django.test import TestCase + +# Create your tests here. diff --git a/users/urls.py b/users/urls.py new file mode 100644 index 0000000..85061f2 --- /dev/null +++ b/users/urls.py @@ -0,0 +1,11 @@ +from django.urls import path +from rest_framework_simplejwt.views import TokenObtainPairView, TokenRefreshView + +from users.views import RegisterAPIView + +urlpatterns = [ + path('register/', RegisterAPIView.as_view(), name="register"), + + path('token/', TokenObtainPairView.as_view(), name='token_obtain_pair'), + path('token/refresh/', TokenRefreshView.as_view(), name='token_refresh'), +] diff --git a/users/views.py b/users/views.py new file mode 100644 index 0000000..688a123 --- /dev/null +++ b/users/views.py @@ -0,0 +1,19 @@ +from rest_framework import generics, status +from rest_framework.permissions import AllowAny +from rest_framework.response import Response + +from users.models import User +from users.serializers import RegisterSerializer + + +class RegisterAPIView(generics.CreateAPIView): + permission_classes = (AllowAny,) + queryset = User.objects.all() + serializer_class = RegisterSerializer + + def create(self, request, *args, **kwargs): + serializer = self.serializer_class(data=request.data) + serializer.is_valid(raise_exception=True) + serializer.save() + + return Response({'message': 'User created successfully.'}, status=status.HTTP_201_CREATED) From 7ea1be3b87cc26194861dc38c4c35bcae7e87d93 Mon Sep 17 00:00:00 2001 From: aliminuei Date: Fri, 1 Dec 2023 21:16:19 +0330 Subject: [PATCH 3/5] add sample env and requirements.txt --- env.sample | 10 ++++++++++ manage.py | 22 ++++++++++++++++++++++ requirements.txt | 13 +++++++++++++ 3 files changed, 45 insertions(+) create mode 100644 env.sample create mode 100755 manage.py create mode 100644 requirements.txt diff --git a/env.sample b/env.sample new file mode 100644 index 0000000..ffde35b --- /dev/null +++ b/env.sample @@ -0,0 +1,10 @@ +DB_USER=test +DB_PASSWORD=test +DB_NAME=test +DB_PORT=5432 +DB_HOST=test + +SECRET_KEY=DUMMY_KEY +DEBUG=True + +ENCRYPTION_KEY=DUMMY_KEY diff --git a/manage.py b/manage.py new file mode 100755 index 0000000..c73abfb --- /dev/null +++ b/manage.py @@ -0,0 +1,22 @@ +#!/usr/bin/env python +"""Django's command-line utility for administrative tasks.""" +import os +import sys + + +def main(): + """Run administrative tasks.""" + os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'CryptoReader.settings') + try: + from django.core.management import execute_from_command_line + except ImportError as exc: + raise ImportError( + "Couldn't import Django. Are you sure it's installed and " + "available on your PYTHONPATH environment variable? Did you " + "forget to activate a virtual environment?" + ) from exc + execute_from_command_line(sys.argv) + + +if __name__ == '__main__': + main() diff --git a/requirements.txt b/requirements.txt new file mode 100644 index 0000000..f0fbb21 --- /dev/null +++ b/requirements.txt @@ -0,0 +1,13 @@ +aiohttp==3.9.1 +Django==4.2.7 +python-decouple==3.8 +psycopg2-binary==2.9.6 +PyJWT==2.7.0 +djangorestframework==3.14.0 +djangorestframework-simplejwt==5.2.2 +redis==4.6.0 +requests==2.31.0 +celery==5.3.1 +django-celery-beat==2.5.0 +cryptography==41.0.0 +ipython==8.12.2 From 2df202b5c7eb80a314cd78ba6432ac44f1b1cc77 Mon Sep 17 00:00:00 2001 From: aliminuei Date: Fri, 1 Dec 2023 21:16:53 +0330 Subject: [PATCH 4/5] add functions like encrypt and decrypt and external request to kucoin --- utils/ex_request.py | 45 +++++++++++++++++++++++++++++++++++++++++++++ utils/functions.py | 31 +++++++++++++++++++++++++++++++ 2 files changed, 76 insertions(+) create mode 100644 utils/ex_request.py create mode 100644 utils/functions.py diff --git a/utils/ex_request.py b/utils/ex_request.py new file mode 100644 index 0000000..0f805d8 --- /dev/null +++ b/utils/ex_request.py @@ -0,0 +1,45 @@ +import base64 +import hashlib +import hmac +import time + + +def get_nonce(): + return str(int(time.time() * 1000)) + + +def create_signature(endpoint, nonce, secret): + message = f'{endpoint}/{nonce}' + signature = hmac.new(secret.encode('utf-8'), message.encode('utf-8'), hashlib.sha256).hexdigest() + return signature + + +def kucoin_api(user, endpoint): + user_kucoin_data = user.decrypt_kucoin_data() + api_key = user_kucoin_data['api_key'] + api_secret = user_kucoin_data['api_secret'] + api_passphrase = user_kucoin_data['api_passphrase'] + + nonce = get_nonce() + signature = create_signature(endpoint, nonce, api_secret) + + signature = base64.b64encode( + hmac.new(api_secret.encode('utf-8'), signature.encode('utf-8'), hashlib.sha256).digest()) + + passphrase = base64.b64encode( + hmac.new(api_secret.encode('utf-8'), api_passphrase.encode('utf-8'), hashlib.sha256).digest()) + + headers = { + 'KC-API-SIGN': signature, + 'KC-API-TIMESTAMP': nonce, + 'KC-API-KEY': api_key, + 'KC-API-PASSPHRASE': passphrase, + 'KC-API-KEY-VERSION': '2' + } + + return headers + + +def get_open_orders(user): + endpoint = '/api/v1/orders' + return kucoin_api(user, endpoint) diff --git a/utils/functions.py b/utils/functions.py new file mode 100644 index 0000000..736f490 --- /dev/null +++ b/utils/functions.py @@ -0,0 +1,31 @@ +import base64 + +from cryptography.fernet import Fernet +from django.conf import settings + + +def encrypt(raw_txt): + """ + Function to encrypt raw text using Fernet class + """ + try: + txt = str(raw_txt) + cipher_pass = Fernet(settings.ENCRYPTION_KEY) + encrypted_text = cipher_pass.encrypt(txt.encode('ascii')) + encrypted_text = base64.urlsafe_b64encode(encrypted_text).decode('ascii') + return encrypted_text + except Exception as e: + return None + + +def decrypt(encrypted_txt): + """ + Function to decrypt encrypted text using Fernet class + """ + try: + txt = base64.urlsafe_b64decode(encrypted_txt) + cipher_pass = Fernet(settings.ENCRYPTION_KEY) + decoded_text = cipher_pass.decrypt(txt).decode('ascii') + return decoded_text + except Exception as e: + return None From b1b56a0abdc9e18dde37b63c382438255517885a Mon Sep 17 00:00:00 2001 From: aliminuei Date: Sat, 2 Dec 2023 14:36:22 +0330 Subject: [PATCH 5/5] cache current postion by user logic with functions and use in view if redis up else get data from database --- CryptoReader/settings.py | 8 ++++++++ env.sample | 4 ++++ positions/functions.py | 30 ++++++++++++++++++++++++++++ positions/migrations/0001_initial.py | 2 +- positions/migrations/0002_initial.py | 2 +- positions/views.py | 3 ++- users/migrations/0001_initial.py | 2 +- 7 files changed, 47 insertions(+), 4 deletions(-) diff --git a/CryptoReader/settings.py b/CryptoReader/settings.py index 8148ba1..4004cda 100644 --- a/CryptoReader/settings.py +++ b/CryptoReader/settings.py @@ -13,6 +13,7 @@ from datetime import timedelta from pathlib import Path +import redis from decouple import config, Csv # Build paths inside the project like this: BASE_DIR / 'subdir'. @@ -27,6 +28,13 @@ DEBUG = config('DEBUG', cast=bool, default=False) ALLOWED_HOSTS = config('ALLOWED_HOSTS', cast=Csv(), default='*') + +REDIS_HOST = config('REDIS_HOST', default='localhost') +REDIS_PORT = config('REDIS_PORT', default=6379) +REDIS_INSTANCE = redis.StrictRedis(host=REDIS_HOST, port=REDIS_PORT, db=0) + +POSITION_EXPIRE = 1 * 2 * 60 + KUCOIN_API = 'https://api.kucoin.com' ENCRYPTION_KEY = config('ENCRYPTION_KEY') diff --git a/env.sample b/env.sample index ffde35b..4892c64 100644 --- a/env.sample +++ b/env.sample @@ -8,3 +8,7 @@ SECRET_KEY=DUMMY_KEY DEBUG=True ENCRYPTION_KEY=DUMMY_KEY + + +REDIS_HOST=localhost +REDIS_PORT=6379 \ No newline at end of file diff --git a/positions/functions.py b/positions/functions.py index a8fb299..f8e402a 100644 --- a/positions/functions.py +++ b/positions/functions.py @@ -1,8 +1,12 @@ +import pickle + import aiohttp +import redis from django.conf import settings from django.db import transaction from positions.models import Order +from positions.serializers import OrderSerializers from utils.ex_request import kucoin_api @@ -41,3 +45,29 @@ async def fetch_all_users_order(users): async with session.get(url, headers=header) as resp: tasks[user] = await resp.json() return tasks + + +def generate_name(user): + return f'position-{user.id}' + + +def cache_position(user): + """ + Cache position in redis + """ + name = generate_name(user) # redis name + redis_instance = settings.REDIS_INSTANCE + try: + data = redis_instance.get(name) # get from redis + if data: + data = pickle.loads(data) + return data + + orders = Order.objects.filter(user=user, is_active=True).all() + redis_instance.set(name, pickle.dumps(orders), settings.POSITION_EXPIRE) # set in redis + + return orders + + except (redis.TimeoutError, redis.ConnectionError): # time out or connection error from redis + orders = Order.objects.filter(user=user, is_active=True).all() + return orders diff --git a/positions/migrations/0001_initial.py b/positions/migrations/0001_initial.py index a47f5fc..30c8ade 100644 --- a/positions/migrations/0001_initial.py +++ b/positions/migrations/0001_initial.py @@ -1,4 +1,4 @@ -# Generated by Django 4.2.7 on 2023-12-01 17:35 +# Generated by Django 4.2.7 on 2023-12-02 10:45 from django.db import migrations, models diff --git a/positions/migrations/0002_initial.py b/positions/migrations/0002_initial.py index 4c4913a..589e689 100644 --- a/positions/migrations/0002_initial.py +++ b/positions/migrations/0002_initial.py @@ -1,4 +1,4 @@ -# Generated by Django 4.2.7 on 2023-12-01 17:35 +# Generated by Django 4.2.7 on 2023-12-02 10:45 from django.conf import settings from django.db import migrations, models diff --git a/positions/views.py b/positions/views.py index 909d301..8dac8c7 100644 --- a/positions/views.py +++ b/positions/views.py @@ -3,6 +3,7 @@ from rest_framework.permissions import IsAuthenticated from rest_framework.response import Response +from .functions import cache_position from .models import Order from .serializers import OrderSerializers, SymbolTrackSerializers @@ -19,7 +20,7 @@ class OpenPositionsAPIView(GenericAPIView): pagination_class = PositionPagination def get(self, request): - orders = Order.objects.filter(user=request.user, is_active=True) + orders = cache_position(request.user) data = OrderSerializers(orders, many=True).data paginator = PositionPagination() diff --git a/users/migrations/0001_initial.py b/users/migrations/0001_initial.py index 1c11834..656c0f7 100644 --- a/users/migrations/0001_initial.py +++ b/users/migrations/0001_initial.py @@ -1,4 +1,4 @@ -# Generated by Django 4.2.7 on 2023-12-01 17:35 +# Generated by Django 4.2.7 on 2023-12-02 10:45 import django.contrib.auth.validators from django.db import migrations, models