2018-09-25 12:24:11 +02:00
|
|
|
import logging
|
2020-03-23 13:35:04 +01:00
|
|
|
from decimal import Decimal
|
2021-07-15 16:38:37 +02:00
|
|
|
from typing import Any, Dict, Optional
|
2018-09-25 12:24:11 +02:00
|
|
|
|
2021-08-29 15:33:29 +02:00
|
|
|
import stripe
|
2021-07-09 19:56:55 +02:00
|
|
|
from django import forms
|
2020-06-11 00:54:34 +02:00
|
|
|
from django.conf import settings
|
2018-09-25 12:24:11 +02:00
|
|
|
from django.core import signing
|
2021-07-09 19:56:55 +02:00
|
|
|
from django.db import transaction
|
2018-09-25 12:24:11 +02:00
|
|
|
from django.http import HttpRequest, HttpResponse, HttpResponseRedirect
|
2019-02-02 23:53:22 +01:00
|
|
|
from django.shortcuts import render
|
2018-09-25 12:24:11 +02:00
|
|
|
from django.urls import reverse
|
|
|
|
|
2020-06-11 00:54:34 +02:00
|
|
|
from corporate.lib.stripe import (
|
|
|
|
DEFAULT_INVOICE_DAYS_UNTIL_DUE,
|
|
|
|
MIN_INVOICED_LICENSES,
|
|
|
|
BillingError,
|
2021-08-29 15:33:29 +02:00
|
|
|
compute_plan_parameters,
|
|
|
|
ensure_realm_does_not_have_active_plan,
|
2020-06-11 00:54:34 +02:00
|
|
|
get_latest_seat_count,
|
2021-08-29 15:33:29 +02:00
|
|
|
is_free_trial_offer_enabled,
|
2020-10-14 18:45:57 +02:00
|
|
|
is_sponsored_realm,
|
2020-06-11 00:54:34 +02:00
|
|
|
process_initial_upgrade,
|
|
|
|
sign_string,
|
|
|
|
unsign_string,
|
2021-08-29 15:33:29 +02:00
|
|
|
update_or_create_stripe_customer,
|
2020-06-09 12:24:32 +02:00
|
|
|
update_sponsorship_status,
|
2020-12-17 16:33:19 +01:00
|
|
|
validate_licenses,
|
2020-06-11 00:54:34 +02:00
|
|
|
)
|
2021-09-29 19:51:55 +02:00
|
|
|
from corporate.lib.support import get_support_url
|
2020-06-11 00:54:34 +02:00
|
|
|
from corporate.models import (
|
|
|
|
CustomerPlan,
|
2021-08-29 15:33:29 +02:00
|
|
|
PaymentIntent,
|
|
|
|
Session,
|
2021-07-09 19:56:55 +02:00
|
|
|
ZulipSponsorshipRequest,
|
2020-06-11 00:54:34 +02:00
|
|
|
get_current_plan_by_customer,
|
|
|
|
get_customer_by_realm,
|
|
|
|
)
|
2023-02-13 20:40:51 +01:00
|
|
|
from corporate.views.billing_page import add_sponsorship_info_to_context, billing_home
|
2022-04-14 23:48:28 +02:00
|
|
|
from zerver.actions.users import do_make_user_billing_admin
|
2021-07-15 16:38:37 +02:00
|
|
|
from zerver.decorator import require_organization_member, zulip_login_required
|
2018-09-25 12:24:11 +02:00
|
|
|
from zerver.lib.request import REQ, has_request_variables
|
2021-07-04 08:19:18 +02:00
|
|
|
from zerver.lib.response import json_success
|
2020-06-09 12:24:32 +02:00
|
|
|
from zerver.lib.send_email import FromAddress, send_email
|
2021-07-29 19:01:59 +02:00
|
|
|
from zerver.lib.validator import check_bool, check_int, check_string_in
|
2023-02-13 20:40:51 +01:00
|
|
|
from zerver.models import UserProfile, get_org_type_display_name
|
2018-09-25 12:24:11 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
billing_logger = logging.getLogger("corporate.stripe")
|
2018-09-25 12:24:11 +02:00
|
|
|
|
2021-04-09 12:31:07 +02:00
|
|
|
VALID_BILLING_MODALITY_VALUES = ["send_invoice", "charge_automatically"]
|
2021-04-09 12:36:46 +02:00
|
|
|
VALID_BILLING_SCHEDULE_VALUES = ["annual", "monthly"]
|
2021-04-09 11:14:05 +02:00
|
|
|
VALID_LICENSE_MANAGEMENT_VALUES = ["automatic", "manual"]
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2018-12-22 05:29:25 +01:00
|
|
|
def unsign_seat_count(signed_seat_count: str, salt: str) -> int:
|
2018-09-25 12:24:11 +02:00
|
|
|
try:
|
2018-12-22 05:29:25 +01:00
|
|
|
return int(unsign_string(signed_seat_count, salt))
|
2018-09-25 12:24:11 +02:00
|
|
|
except signing.BadSignature:
|
2021-02-12 08:20:45 +01:00
|
|
|
raise BillingError("tampered seat count")
|
2018-12-22 05:29:25 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2018-12-22 05:29:25 +01:00
|
|
|
def check_upgrade_parameters(
|
2021-02-12 08:19:30 +01:00
|
|
|
billing_modality: str,
|
|
|
|
schedule: str,
|
|
|
|
license_management: Optional[str],
|
|
|
|
licenses: Optional[int],
|
|
|
|
seat_count: int,
|
2023-04-10 21:48:52 +02:00
|
|
|
exempt_from_license_number_check: bool,
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> None:
|
2021-05-07 18:51:15 +02:00
|
|
|
if billing_modality not in VALID_BILLING_MODALITY_VALUES: # nocoverage
|
2021-08-29 15:33:29 +02:00
|
|
|
raise BillingError("unknown billing_modality", "")
|
2021-05-07 18:51:15 +02:00
|
|
|
if schedule not in VALID_BILLING_SCHEDULE_VALUES: # nocoverage
|
2021-02-12 08:20:45 +01:00
|
|
|
raise BillingError("unknown schedule")
|
2021-05-07 18:51:15 +02:00
|
|
|
if license_management not in VALID_LICENSE_MANAGEMENT_VALUES: # nocoverage
|
2021-02-12 08:20:45 +01:00
|
|
|
raise BillingError("unknown license_management")
|
2023-04-10 21:48:52 +02:00
|
|
|
validate_licenses(
|
|
|
|
billing_modality == "charge_automatically",
|
|
|
|
licenses,
|
|
|
|
seat_count,
|
|
|
|
exempt_from_license_number_check,
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
|
2018-12-22 05:29:25 +01:00
|
|
|
|
2021-08-29 15:33:29 +02:00
|
|
|
def setup_upgrade_checkout_session_and_payment_intent(
|
|
|
|
user: UserProfile,
|
|
|
|
seat_count: int,
|
|
|
|
licenses: int,
|
|
|
|
license_management: str,
|
|
|
|
billing_schedule: int,
|
|
|
|
billing_modality: str,
|
|
|
|
onboarding: bool,
|
|
|
|
) -> stripe.checkout.Session:
|
|
|
|
customer = update_or_create_stripe_customer(user)
|
|
|
|
assert customer is not None # for mypy
|
|
|
|
free_trial = is_free_trial_offer_enabled()
|
|
|
|
_, _, _, price_per_license = compute_plan_parameters(
|
|
|
|
CustomerPlan.STANDARD,
|
|
|
|
license_management == "automatic",
|
|
|
|
billing_schedule,
|
|
|
|
customer.default_discount,
|
|
|
|
free_trial,
|
|
|
|
)
|
|
|
|
metadata = {
|
|
|
|
"billing_modality": billing_modality,
|
|
|
|
"billing_schedule": billing_schedule,
|
|
|
|
"licenses": licenses,
|
|
|
|
"license_management": license_management,
|
|
|
|
"price_per_license": price_per_license,
|
|
|
|
"seat_count": seat_count,
|
|
|
|
"type": "upgrade",
|
|
|
|
"user_email": user.delivery_email,
|
|
|
|
"realm_id": user.realm.id,
|
|
|
|
"realm_str": user.realm.string_id,
|
2021-12-03 00:23:56 +01:00
|
|
|
"user_id": user.id,
|
2021-08-29 15:33:29 +02:00
|
|
|
}
|
|
|
|
if free_trial:
|
|
|
|
if onboarding:
|
|
|
|
session_type = Session.FREE_TRIAL_UPGRADE_FROM_ONBOARDING_PAGE
|
|
|
|
else:
|
|
|
|
session_type = Session.FREE_TRIAL_UPGRADE_FROM_BILLING_PAGE
|
|
|
|
payment_intent = None
|
|
|
|
else:
|
|
|
|
session_type = Session.UPGRADE_FROM_BILLING_PAGE
|
|
|
|
stripe_payment_intent = stripe.PaymentIntent.create(
|
|
|
|
amount=price_per_license * licenses,
|
|
|
|
currency="usd",
|
|
|
|
customer=customer.stripe_customer_id,
|
2022-02-05 08:29:54 +01:00
|
|
|
description=f"Upgrade to Zulip Cloud Standard, ${price_per_license/100} x {licenses}",
|
2021-08-29 15:33:29 +02:00
|
|
|
receipt_email=user.delivery_email,
|
|
|
|
confirm=False,
|
2022-02-05 08:29:54 +01:00
|
|
|
statement_descriptor="Zulip Cloud Standard",
|
2021-08-29 15:33:29 +02:00
|
|
|
metadata=metadata,
|
|
|
|
)
|
|
|
|
payment_intent = PaymentIntent.objects.create(
|
|
|
|
customer=customer,
|
|
|
|
stripe_payment_intent_id=stripe_payment_intent.id,
|
|
|
|
status=PaymentIntent.get_status_integer_from_status_text(stripe_payment_intent.status),
|
|
|
|
)
|
|
|
|
stripe_session = stripe.checkout.Session.create(
|
|
|
|
cancel_url=f"{user.realm.uri}/upgrade/",
|
|
|
|
customer=customer.stripe_customer_id,
|
|
|
|
mode="setup",
|
|
|
|
payment_method_types=["card"],
|
|
|
|
metadata=metadata,
|
|
|
|
setup_intent_data={"metadata": metadata},
|
|
|
|
success_url=f"{user.realm.uri}/billing/event_status?stripe_session_id={{CHECKOUT_SESSION_ID}}",
|
|
|
|
)
|
|
|
|
session = Session.objects.create(
|
|
|
|
customer=customer, stripe_session_id=stripe_session.id, type=session_type
|
|
|
|
)
|
|
|
|
if payment_intent is not None:
|
|
|
|
session.payment_intent = payment_intent
|
|
|
|
session.save(update_fields=["payment_intent"])
|
|
|
|
return stripe_session
|
2020-05-08 12:43:52 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2020-07-15 22:18:32 +02:00
|
|
|
@require_organization_member
|
2018-12-07 18:43:22 +01:00
|
|
|
@has_request_variables
|
2021-02-12 08:19:30 +01:00
|
|
|
def upgrade(
|
|
|
|
request: HttpRequest,
|
|
|
|
user: UserProfile,
|
2021-04-09 12:43:44 +02:00
|
|
|
billing_modality: str = REQ(str_validator=check_string_in(VALID_BILLING_MODALITY_VALUES)),
|
|
|
|
schedule: str = REQ(str_validator=check_string_in(VALID_BILLING_SCHEDULE_VALUES)),
|
|
|
|
signed_seat_count: str = REQ(),
|
|
|
|
salt: str = REQ(),
|
2021-08-29 15:33:29 +02:00
|
|
|
onboarding: bool = REQ(default=False, json_validator=check_bool),
|
2021-04-09 12:43:44 +02:00
|
|
|
license_management: Optional[str] = REQ(
|
|
|
|
default=None, str_validator=check_string_in(VALID_LICENSE_MANAGEMENT_VALUES)
|
|
|
|
),
|
2021-04-07 22:00:44 +02:00
|
|
|
licenses: Optional[int] = REQ(json_validator=check_int, default=None),
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> HttpResponse:
|
2021-08-29 15:33:29 +02:00
|
|
|
ensure_realm_does_not_have_active_plan(user.realm)
|
2018-12-07 18:43:22 +01:00
|
|
|
try:
|
2018-12-22 05:29:25 +01:00
|
|
|
seat_count = unsign_seat_count(signed_seat_count, salt)
|
2021-02-12 08:20:45 +01:00
|
|
|
if billing_modality == "charge_automatically" and license_management == "automatic":
|
2018-12-22 01:43:44 +01:00
|
|
|
licenses = seat_count
|
2021-02-12 08:20:45 +01:00
|
|
|
if billing_modality == "send_invoice":
|
|
|
|
schedule = "annual"
|
|
|
|
license_management = "manual"
|
2023-04-10 21:48:52 +02:00
|
|
|
|
|
|
|
customer = get_customer_by_realm(user.realm)
|
|
|
|
exempt_from_license_number_check = (
|
|
|
|
customer is not None and customer.exempt_from_license_number_check
|
|
|
|
)
|
2018-12-22 05:29:25 +01:00
|
|
|
check_upgrade_parameters(
|
2023-04-10 21:48:52 +02:00
|
|
|
billing_modality,
|
|
|
|
schedule,
|
|
|
|
license_management,
|
|
|
|
licenses,
|
|
|
|
seat_count,
|
|
|
|
exempt_from_license_number_check,
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-08-29 15:33:29 +02:00
|
|
|
assert licenses is not None and license_management is not None
|
2021-02-12 08:20:45 +01:00
|
|
|
automanage_licenses = license_management == "automatic"
|
2021-08-29 15:33:29 +02:00
|
|
|
charge_automatically = billing_modality == "charge_automatically"
|
2018-12-22 05:29:25 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
billing_schedule = {"annual": CustomerPlan.ANNUAL, "monthly": CustomerPlan.MONTHLY}[
|
2021-02-12 08:19:30 +01:00
|
|
|
schedule
|
|
|
|
]
|
2021-08-29 15:33:29 +02:00
|
|
|
if charge_automatically:
|
|
|
|
stripe_checkout_session = setup_upgrade_checkout_session_and_payment_intent(
|
|
|
|
user,
|
|
|
|
seat_count,
|
|
|
|
licenses,
|
2021-02-12 08:19:30 +01:00
|
|
|
license_management,
|
2021-08-29 15:33:29 +02:00
|
|
|
billing_schedule,
|
|
|
|
billing_modality,
|
|
|
|
onboarding,
|
|
|
|
)
|
|
|
|
return json_success(
|
2022-01-31 13:44:02 +01:00
|
|
|
request,
|
2021-08-29 15:33:29 +02:00
|
|
|
data={
|
|
|
|
"stripe_session_url": stripe_checkout_session.url,
|
|
|
|
"stripe_session_id": stripe_checkout_session.id,
|
2022-01-31 13:44:02 +01:00
|
|
|
},
|
2021-08-29 15:33:29 +02:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
process_initial_upgrade(
|
|
|
|
user,
|
2021-02-12 08:19:30 +01:00
|
|
|
licenses,
|
2021-08-29 15:33:29 +02:00
|
|
|
automanage_licenses,
|
|
|
|
billing_schedule,
|
|
|
|
False,
|
|
|
|
is_free_trial_offer_enabled(),
|
2020-05-02 20:57:12 +02:00
|
|
|
)
|
2022-01-31 13:44:02 +01:00
|
|
|
return json_success(request)
|
2021-08-29 15:33:29 +02:00
|
|
|
|
|
|
|
except BillingError as e:
|
|
|
|
billing_logger.warning(
|
|
|
|
"BillingError during upgrade: %s. user=%s, realm=%s (%s), billing_modality=%s, "
|
|
|
|
"schedule=%s, license_management=%s, licenses=%s",
|
|
|
|
e.error_description,
|
|
|
|
user.id,
|
|
|
|
user.realm.id,
|
|
|
|
user.realm.string_id,
|
|
|
|
billing_modality,
|
|
|
|
schedule,
|
|
|
|
license_management,
|
|
|
|
licenses,
|
|
|
|
)
|
|
|
|
raise e
|
2020-06-12 01:35:37 +02:00
|
|
|
except Exception:
|
2020-08-11 03:19:00 +02:00
|
|
|
billing_logger.exception("Uncaught exception in billing:", stack_info=True)
|
2020-10-17 03:42:50 +02:00
|
|
|
error_message = BillingError.CONTACT_SUPPORT.format(email=settings.ZULIP_ADMINISTRATOR)
|
2018-12-07 18:43:22 +01:00
|
|
|
error_description = "uncaught exception during upgrade"
|
2021-07-04 08:19:18 +02:00
|
|
|
raise BillingError(error_description, error_message)
|
2018-12-07 18:43:22 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2018-09-25 12:24:11 +02:00
|
|
|
@zulip_login_required
|
2021-07-29 19:01:59 +02:00
|
|
|
@has_request_variables
|
|
|
|
def initial_upgrade(
|
|
|
|
request: HttpRequest, onboarding: bool = REQ(default=False, json_validator=check_bool)
|
|
|
|
) -> HttpResponse:
|
2018-09-25 12:24:11 +02:00
|
|
|
user = request.user
|
2021-07-24 20:37:35 +02:00
|
|
|
assert user.is_authenticated
|
2020-06-09 12:24:32 +02:00
|
|
|
|
2020-07-15 22:18:32 +02:00
|
|
|
if not settings.BILLING_ENABLED or user.is_guest:
|
|
|
|
return render(request, "404.html", status=404)
|
|
|
|
|
2020-09-22 02:54:44 +02:00
|
|
|
billing_page_url = reverse(billing_home)
|
2020-08-21 14:45:43 +02:00
|
|
|
|
2020-03-23 13:35:04 +01:00
|
|
|
customer = get_customer_by_realm(user.realm)
|
2021-02-12 08:19:30 +01:00
|
|
|
if customer is not None and (
|
|
|
|
get_current_plan_by_customer(customer) is not None or customer.sponsorship_pending
|
|
|
|
):
|
2021-07-29 19:01:59 +02:00
|
|
|
if onboarding:
|
2020-06-09 00:25:09 +02:00
|
|
|
billing_page_url = f"{billing_page_url}?onboarding=true"
|
2020-05-22 15:42:46 +02:00
|
|
|
return HttpResponseRedirect(billing_page_url)
|
2018-09-25 12:24:11 +02:00
|
|
|
|
2020-10-14 18:45:57 +02:00
|
|
|
if is_sponsored_realm(user.realm):
|
2020-08-21 14:45:43 +02:00
|
|
|
return HttpResponseRedirect(billing_page_url)
|
|
|
|
|
2020-03-23 13:35:04 +01:00
|
|
|
percent_off = Decimal(0)
|
2018-12-12 19:41:03 +01:00
|
|
|
if customer is not None and customer.default_discount is not None:
|
|
|
|
percent_off = customer.default_discount
|
2018-11-30 02:27:01 +01:00
|
|
|
|
2023-04-10 21:48:52 +02:00
|
|
|
exempt_from_license_number_check = (
|
|
|
|
customer is not None and customer.exempt_from_license_number_check
|
|
|
|
)
|
|
|
|
|
2019-10-07 19:21:29 +02:00
|
|
|
seat_count = get_latest_seat_count(user.realm)
|
2018-09-25 12:24:11 +02:00
|
|
|
signed_seat_count, salt = sign_string(str(seat_count))
|
python: Convert assignment type annotations to Python 3.6 style.
This commit was split by tabbott; this piece covers the vast majority
of files in Zulip, but excludes scripts/, tools/, and puppet/ to help
ensure we at least show the right error messages for Xenial systems.
We can likely further refine the remaining pieces with some testing.
Generated by com2ann, with whitespace fixes and various manual fixes
for runtime issues:
- invoiced_through: Optional[LicenseLedger] = models.ForeignKey(
+ invoiced_through: Optional["LicenseLedger"] = models.ForeignKey(
-_apns_client: Optional[APNsClient] = None
+_apns_client: Optional["APNsClient"] = None
- notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- signup_notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ signup_notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- author: Optional[UserProfile] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
+ author: Optional["UserProfile"] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
- bot_owner: Optional[UserProfile] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
+ bot_owner: Optional["UserProfile"] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
- default_sending_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
- default_events_register_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_sending_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_events_register_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
-descriptors_by_handler_id: Dict[int, ClientDescriptor] = {}
+descriptors_by_handler_id: Dict[int, "ClientDescriptor"] = {}
-worker_classes: Dict[str, Type[QueueProcessingWorker]] = {}
-queues: Dict[str, Dict[str, Type[QueueProcessingWorker]]] = {}
+worker_classes: Dict[str, Type["QueueProcessingWorker"]] = {}
+queues: Dict[str, Dict[str, Type["QueueProcessingWorker"]]] = {}
-AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional[LDAPSearch] = None
+AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional["LDAPSearch"] = None
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-22 01:09:50 +02:00
|
|
|
context: Dict[str, Any] = {
|
2021-02-12 08:20:45 +01:00
|
|
|
"realm": user.realm,
|
|
|
|
"email": user.delivery_email,
|
|
|
|
"seat_count": seat_count,
|
|
|
|
"signed_seat_count": signed_seat_count,
|
|
|
|
"salt": salt,
|
|
|
|
"min_invoiced_licenses": max(seat_count, MIN_INVOICED_LICENSES),
|
|
|
|
"default_invoice_days_until_due": DEFAULT_INVOICE_DAYS_UNTIL_DUE,
|
2023-04-10 21:48:52 +02:00
|
|
|
"exempt_from_license_number_check": exempt_from_license_number_check,
|
2022-02-05 08:29:54 +01:00
|
|
|
"plan": "Zulip Cloud Standard",
|
2020-05-14 18:21:23 +02:00
|
|
|
"free_trial_days": settings.FREE_TRIAL_DAYS,
|
2021-07-29 19:01:59 +02:00
|
|
|
"onboarding": onboarding,
|
2021-02-12 08:20:45 +01:00
|
|
|
"page_params": {
|
|
|
|
"seat_count": seat_count,
|
|
|
|
"annual_price": 8000,
|
|
|
|
"monthly_price": 800,
|
|
|
|
"percent_off": float(percent_off),
|
2021-12-27 21:25:38 +01:00
|
|
|
"demo_organization_scheduled_deletion_date": user.realm.demo_organization_scheduled_deletion_date,
|
2019-09-13 01:15:53 +02:00
|
|
|
},
|
2021-12-27 21:25:38 +01:00
|
|
|
"is_demo_organization": user.realm.demo_organization_scheduled_deletion_date is not None,
|
python: Convert assignment type annotations to Python 3.6 style.
This commit was split by tabbott; this piece covers the vast majority
of files in Zulip, but excludes scripts/, tools/, and puppet/ to help
ensure we at least show the right error messages for Xenial systems.
We can likely further refine the remaining pieces with some testing.
Generated by com2ann, with whitespace fixes and various manual fixes
for runtime issues:
- invoiced_through: Optional[LicenseLedger] = models.ForeignKey(
+ invoiced_through: Optional["LicenseLedger"] = models.ForeignKey(
-_apns_client: Optional[APNsClient] = None
+_apns_client: Optional["APNsClient"] = None
- notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- signup_notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ signup_notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- author: Optional[UserProfile] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
+ author: Optional["UserProfile"] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
- bot_owner: Optional[UserProfile] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
+ bot_owner: Optional["UserProfile"] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
- default_sending_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
- default_events_register_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_sending_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_events_register_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
-descriptors_by_handler_id: Dict[int, ClientDescriptor] = {}
+descriptors_by_handler_id: Dict[int, "ClientDescriptor"] = {}
-worker_classes: Dict[str, Type[QueueProcessingWorker]] = {}
-queues: Dict[str, Dict[str, Type[QueueProcessingWorker]]] = {}
+worker_classes: Dict[str, Type["QueueProcessingWorker"]] = {}
+queues: Dict[str, Dict[str, Type["QueueProcessingWorker"]]] = {}
-AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional[LDAPSearch] = None
+AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional["LDAPSearch"] = None
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-22 01:09:50 +02:00
|
|
|
}
|
2023-02-13 20:40:51 +01:00
|
|
|
add_sponsorship_info_to_context(context, user)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
response = render(request, "corporate/upgrade.html", context=context)
|
2018-09-25 12:24:11 +02:00
|
|
|
return response
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2021-07-09 19:56:55 +02:00
|
|
|
class SponsorshipRequestForm(forms.Form):
|
2021-08-10 20:52:01 +02:00
|
|
|
website = forms.URLField(max_length=ZulipSponsorshipRequest.MAX_ORG_URL_LENGTH, required=False)
|
2021-07-09 19:56:55 +02:00
|
|
|
organization_type = forms.IntegerField()
|
|
|
|
description = forms.CharField(widget=forms.Textarea)
|
|
|
|
|
|
|
|
|
2020-07-15 22:18:32 +02:00
|
|
|
@require_organization_member
|
2020-06-09 12:24:32 +02:00
|
|
|
@has_request_variables
|
2021-02-12 08:19:30 +01:00
|
|
|
def sponsorship(
|
|
|
|
request: HttpRequest,
|
|
|
|
user: UserProfile,
|
2021-04-09 12:43:44 +02:00
|
|
|
organization_type: str = REQ("organization-type"),
|
|
|
|
website: str = REQ(),
|
|
|
|
description: str = REQ(),
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> HttpResponse:
|
2020-06-09 12:24:32 +02:00
|
|
|
realm = user.realm
|
|
|
|
|
|
|
|
requested_by = user.full_name
|
2020-07-21 02:25:28 +02:00
|
|
|
user_role = user.get_role_name()
|
2021-09-29 19:51:55 +02:00
|
|
|
support_url = get_support_url(realm)
|
2020-06-09 12:24:32 +02:00
|
|
|
|
2021-07-09 19:56:55 +02:00
|
|
|
post_data = request.POST.copy()
|
|
|
|
# We need to do this because the field name in the template
|
|
|
|
# for organization type contains a hyphen and the form expects
|
|
|
|
# an underscore.
|
|
|
|
post_data.update(organization_type=organization_type)
|
|
|
|
form = SponsorshipRequestForm(post_data)
|
|
|
|
|
2021-08-10 20:52:01 +02:00
|
|
|
if form.is_valid():
|
|
|
|
with transaction.atomic():
|
2021-07-09 19:56:55 +02:00
|
|
|
sponsorship_request = ZulipSponsorshipRequest(
|
|
|
|
realm=realm,
|
|
|
|
requested_by=user,
|
|
|
|
org_website=form.cleaned_data["website"],
|
|
|
|
org_description=form.cleaned_data["description"],
|
|
|
|
org_type=form.cleaned_data["organization_type"],
|
|
|
|
)
|
|
|
|
sponsorship_request.save()
|
|
|
|
|
2021-07-19 03:59:40 +02:00
|
|
|
org_type = form.cleaned_data["organization_type"]
|
|
|
|
if realm.org_type != org_type:
|
|
|
|
realm.org_type = org_type
|
|
|
|
realm.save(update_fields=["org_type"])
|
|
|
|
|
2021-08-10 20:52:01 +02:00
|
|
|
update_sponsorship_status(realm, True, acting_user=user)
|
|
|
|
do_make_user_billing_admin(user)
|
|
|
|
|
|
|
|
org_type_display_name = get_org_type_display_name(org_type)
|
|
|
|
|
|
|
|
context = {
|
|
|
|
"requested_by": requested_by,
|
|
|
|
"user_role": user_role,
|
|
|
|
"string_id": realm.string_id,
|
|
|
|
"support_url": support_url,
|
|
|
|
"organization_type": org_type_display_name,
|
|
|
|
"website": website,
|
|
|
|
"description": description,
|
|
|
|
}
|
|
|
|
send_email(
|
|
|
|
"zerver/emails/sponsorship_request",
|
|
|
|
to_emails=[FromAddress.SUPPORT],
|
|
|
|
from_name="Zulip sponsorship",
|
|
|
|
from_address=FromAddress.tokenized_no_reply_address(),
|
|
|
|
reply_to_email=user.delivery_email,
|
|
|
|
context=context,
|
|
|
|
)
|
2020-06-09 12:24:32 +02:00
|
|
|
|
2022-01-31 13:44:02 +01:00
|
|
|
return json_success(request)
|
2021-08-10 20:52:01 +02:00
|
|
|
else:
|
2023-07-31 22:52:35 +02:00
|
|
|
message = " ".join(
|
|
|
|
error["message"]
|
|
|
|
for error_list in form.errors.get_json_data().values()
|
|
|
|
for error in error_list
|
|
|
|
)
|
2021-08-10 20:52:01 +02:00
|
|
|
raise BillingError("Form validation error", message=message)
|