2022-10-08 19:33:40 +02:00
|
|
|
from typing import Dict, List
|
2017-11-16 00:43:10 +01:00
|
|
|
|
|
|
|
from django.http import HttpRequest, HttpResponse
|
2023-08-14 23:48:25 +02:00
|
|
|
from pydantic import Json
|
|
|
|
from typing_extensions import Annotated
|
2017-11-16 00:43:10 +01:00
|
|
|
|
2020-08-20 00:32:15 +02:00
|
|
|
from zerver.decorator import webhook_view
|
2019-02-02 23:53:55 +01:00
|
|
|
from zerver.lib.response import json_success
|
2023-08-14 23:48:25 +02:00
|
|
|
from zerver.lib.typed_endpoint import ApiParamConfig, typed_endpoint
|
|
|
|
from zerver.lib.validator import WildValue, check_string
|
2018-03-16 22:53:50 +01:00
|
|
|
from zerver.lib.webhooks.common import check_send_webhook_message
|
2017-05-02 01:00:50 +02:00
|
|
|
from zerver.models import UserProfile
|
2016-12-22 16:11:51 +01:00
|
|
|
|
2018-10-04 17:23:27 +02:00
|
|
|
IS_AWAITING_SIGNATURE = "is awaiting the signature of {awaiting_recipients}"
|
|
|
|
WAS_JUST_SIGNED_BY = "was just signed by {signed_recipients}"
|
|
|
|
BODY = "The `{contract_title}` document {actions}."
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2022-10-08 19:33:40 +02:00
|
|
|
def get_message_body(payload: WildValue) -> str:
|
|
|
|
contract_title = payload["signature_request"]["title"].tame(check_string)
|
python: Convert assignment type annotations to Python 3.6 style.
This commit was split by tabbott; this piece covers the vast majority
of files in Zulip, but excludes scripts/, tools/, and puppet/ to help
ensure we at least show the right error messages for Xenial systems.
We can likely further refine the remaining pieces with some testing.
Generated by com2ann, with whitespace fixes and various manual fixes
for runtime issues:
- invoiced_through: Optional[LicenseLedger] = models.ForeignKey(
+ invoiced_through: Optional["LicenseLedger"] = models.ForeignKey(
-_apns_client: Optional[APNsClient] = None
+_apns_client: Optional["APNsClient"] = None
- notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- signup_notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ signup_notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- author: Optional[UserProfile] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
+ author: Optional["UserProfile"] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
- bot_owner: Optional[UserProfile] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
+ bot_owner: Optional["UserProfile"] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
- default_sending_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
- default_events_register_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_sending_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_events_register_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
-descriptors_by_handler_id: Dict[int, ClientDescriptor] = {}
+descriptors_by_handler_id: Dict[int, "ClientDescriptor"] = {}
-worker_classes: Dict[str, Type[QueueProcessingWorker]] = {}
-queues: Dict[str, Dict[str, Type[QueueProcessingWorker]]] = {}
+worker_classes: Dict[str, Type["QueueProcessingWorker"]] = {}
+queues: Dict[str, Dict[str, Type["QueueProcessingWorker"]]] = {}
-AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional[LDAPSearch] = None
+AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional["LDAPSearch"] = None
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-22 01:09:50 +02:00
|
|
|
recipients: Dict[str, List[str]] = {}
|
2021-02-12 08:20:45 +01:00
|
|
|
signatures = payload["signature_request"]["signatures"]
|
2018-10-04 17:23:27 +02:00
|
|
|
|
|
|
|
for signature in signatures:
|
2022-10-08 19:33:40 +02:00
|
|
|
status_code = signature["status_code"].tame(check_string)
|
|
|
|
recipients.setdefault(status_code, [])
|
|
|
|
recipients[status_code].append(signature["signer_name"].tame(check_string))
|
2018-10-04 17:23:27 +02:00
|
|
|
|
|
|
|
recipients_text = ""
|
2021-02-12 08:20:45 +01:00
|
|
|
if recipients.get("awaiting_signature"):
|
2018-10-04 17:23:27 +02:00
|
|
|
recipients_text += IS_AWAITING_SIGNATURE.format(
|
2021-02-12 08:20:45 +01:00
|
|
|
awaiting_recipients=get_recipients_text(recipients["awaiting_signature"]),
|
2018-10-04 17:23:27 +02:00
|
|
|
)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
if recipients.get("signed"):
|
2018-10-04 17:23:27 +02:00
|
|
|
text = WAS_JUST_SIGNED_BY.format(
|
2021-02-12 08:20:45 +01:00
|
|
|
signed_recipients=get_recipients_text(recipients["signed"]),
|
2018-10-04 17:23:27 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
if recipients_text:
|
2020-06-09 00:25:09 +02:00
|
|
|
recipients_text = f"{recipients_text}, and {text}"
|
2018-10-04 17:23:27 +02:00
|
|
|
else:
|
|
|
|
recipients_text = text
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
return BODY.format(contract_title=contract_title, actions=recipients_text).strip()
|
|
|
|
|
2018-10-04 17:23:27 +02:00
|
|
|
|
|
|
|
def get_recipients_text(recipients: List[str]) -> str:
|
|
|
|
recipients_text = ""
|
|
|
|
if len(recipients) == 1:
|
|
|
|
recipients_text = "{}".format(*recipients)
|
|
|
|
else:
|
|
|
|
for recipient in recipients[:-1]:
|
2020-06-09 00:25:09 +02:00
|
|
|
recipients_text += f"{recipient}, "
|
|
|
|
recipients_text += f"and {recipients[-1]}"
|
2018-10-04 17:23:27 +02:00
|
|
|
|
|
|
|
return recipients_text
|
2016-12-22 16:11:51 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
@webhook_view("HelloSign")
|
2023-08-14 23:48:25 +02:00
|
|
|
@typed_endpoint
|
2021-02-12 08:19:30 +01:00
|
|
|
def api_hellosign_webhook(
|
|
|
|
request: HttpRequest,
|
|
|
|
user_profile: UserProfile,
|
2023-08-14 23:48:25 +02:00
|
|
|
*,
|
|
|
|
payload: Annotated[Json[WildValue], ApiParamConfig("json")],
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> HttpResponse:
|
2020-02-08 00:24:39 +01:00
|
|
|
if "signature_request" in payload:
|
|
|
|
body = get_message_body(payload)
|
2024-01-17 15:53:30 +01:00
|
|
|
topic_name = payload["signature_request"]["title"].tame(check_string)
|
|
|
|
check_send_webhook_message(request, user_profile, topic_name, body)
|
2020-02-08 00:24:39 +01:00
|
|
|
|
2022-01-31 13:44:02 +01:00
|
|
|
return json_success(request, data={"msg": "Hello API Event Received"})
|