2020-06-11 00:54:34 +02:00
|
|
|
import logging
|
|
|
|
from typing import Any, Dict, List, Optional, Tuple
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
from django.conf import settings
|
2020-06-11 00:54:34 +02:00
|
|
|
from django.http import HttpRequest, HttpResponse, HttpResponseRedirect
|
2017-03-16 14:14:31 +01:00
|
|
|
from django.shortcuts import redirect, render
|
2020-06-11 00:54:34 +02:00
|
|
|
from django.urls import reverse
|
2017-01-07 21:19:52 +01:00
|
|
|
from django.utils.cache import patch_cache_control
|
|
|
|
|
2020-01-29 20:41:23 +01:00
|
|
|
from zerver.decorator import zulip_login_required
|
2017-01-07 21:19:52 +01:00
|
|
|
from zerver.forms import ToSForm
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.lib.actions import do_change_tos_version, realm_user_count
|
2020-07-18 20:33:28 +02:00
|
|
|
from zerver.lib.home import (
|
|
|
|
build_page_params_for_home_page_load,
|
|
|
|
get_billing_info,
|
|
|
|
get_user_permission_info,
|
2020-06-11 00:54:34 +02:00
|
|
|
)
|
2017-01-07 21:19:52 +01:00
|
|
|
from zerver.lib.push_notifications import num_push_devices_for_user
|
2017-01-30 03:11:00 +01:00
|
|
|
from zerver.lib.streams import access_stream_by_name
|
2017-10-19 07:21:57 +02:00
|
|
|
from zerver.lib.subdomains import get_subdomain
|
2020-01-13 18:47:30 +01:00
|
|
|
from zerver.lib.users import compute_show_invites_and_add_streams
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.lib.utils import generate_random_token, statsd
|
2020-07-18 20:33:28 +02:00
|
|
|
from zerver.models import PreregistrationUser, Realm, Stream, UserProfile
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.views.compatibility import is_outdated_desktop_app, is_unsupported_browser
|
2020-05-08 06:37:58 +02:00
|
|
|
from zerver.views.portico import hello_view
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
|
2019-09-14 01:38:28 +02:00
|
|
|
def need_accept_tos(user_profile: Optional[UserProfile]) -> bool:
|
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
return False
|
|
|
|
|
|
|
|
if settings.TERMS_OF_SERVICE is None: # nocoverage
|
|
|
|
return False
|
|
|
|
|
|
|
|
if settings.TOS_VERSION is None:
|
|
|
|
return False
|
|
|
|
|
|
|
|
return int(settings.TOS_VERSION.split('.')[0]) > user_profile.major_tos_version()
|
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
@zulip_login_required
|
2017-11-27 09:28:57 +01:00
|
|
|
def accounts_accept_terms(request: HttpRequest) -> HttpResponse:
|
2017-01-07 21:19:52 +01:00
|
|
|
if request.method == "POST":
|
|
|
|
form = ToSForm(request.POST)
|
|
|
|
if form.is_valid():
|
|
|
|
do_change_tos_version(request.user, settings.TOS_VERSION)
|
|
|
|
return redirect(home)
|
|
|
|
else:
|
|
|
|
form = ToSForm()
|
|
|
|
|
2020-04-16 20:44:51 +02:00
|
|
|
email = request.user.delivery_email
|
2017-01-07 21:19:52 +01:00
|
|
|
special_message_template = None
|
|
|
|
if request.user.tos_version is None and settings.FIRST_TIME_TOS_TEMPLATE is not None:
|
|
|
|
special_message_template = 'zerver/' + settings.FIRST_TIME_TOS_TEMPLATE
|
2017-03-16 14:14:31 +01:00
|
|
|
return render(
|
|
|
|
request,
|
2017-01-07 21:19:52 +01:00
|
|
|
'zerver/accounts_accept_terms.html',
|
2017-03-16 14:14:31 +01:00
|
|
|
context={'form': form,
|
|
|
|
'email': email,
|
|
|
|
'special_message_template': special_message_template},
|
|
|
|
)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2019-09-14 01:53:42 +02:00
|
|
|
def detect_narrowed_window(request: HttpRequest,
|
|
|
|
user_profile: Optional[UserProfile]) -> Tuple[List[List[str]],
|
|
|
|
Optional[Stream],
|
|
|
|
Optional[str]]:
|
|
|
|
"""This function implements Zulip's support for a mini Zulip window
|
|
|
|
that just handles messages from a single narrow"""
|
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
return [], None, None
|
|
|
|
|
python: Convert assignment type annotations to Python 3.6 style.
This commit was split by tabbott; this piece covers the vast majority
of files in Zulip, but excludes scripts/, tools/, and puppet/ to help
ensure we at least show the right error messages for Xenial systems.
We can likely further refine the remaining pieces with some testing.
Generated by com2ann, with whitespace fixes and various manual fixes
for runtime issues:
- invoiced_through: Optional[LicenseLedger] = models.ForeignKey(
+ invoiced_through: Optional["LicenseLedger"] = models.ForeignKey(
-_apns_client: Optional[APNsClient] = None
+_apns_client: Optional["APNsClient"] = None
- notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- signup_notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ signup_notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- author: Optional[UserProfile] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
+ author: Optional["UserProfile"] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
- bot_owner: Optional[UserProfile] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
+ bot_owner: Optional["UserProfile"] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
- default_sending_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
- default_events_register_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_sending_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_events_register_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
-descriptors_by_handler_id: Dict[int, ClientDescriptor] = {}
+descriptors_by_handler_id: Dict[int, "ClientDescriptor"] = {}
-worker_classes: Dict[str, Type[QueueProcessingWorker]] = {}
-queues: Dict[str, Dict[str, Type[QueueProcessingWorker]]] = {}
+worker_classes: Dict[str, Type["QueueProcessingWorker"]] = {}
+queues: Dict[str, Dict[str, Type["QueueProcessingWorker"]]] = {}
-AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional[LDAPSearch] = None
+AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional["LDAPSearch"] = None
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-22 01:09:50 +02:00
|
|
|
narrow: List[List[str]] = []
|
2019-09-14 01:53:42 +02:00
|
|
|
narrow_stream = None
|
|
|
|
narrow_topic = request.GET.get("topic")
|
|
|
|
|
|
|
|
if request.GET.get("stream"):
|
|
|
|
try:
|
|
|
|
# TODO: We should support stream IDs and PMs here as well.
|
|
|
|
narrow_stream_name = request.GET.get("stream")
|
|
|
|
(narrow_stream, ignored_rec, ignored_sub) = access_stream_by_name(
|
|
|
|
user_profile, narrow_stream_name)
|
|
|
|
narrow = [["stream", narrow_stream.name]]
|
|
|
|
except Exception:
|
|
|
|
logging.warning("Invalid narrow requested, ignoring", extra=dict(request=request))
|
|
|
|
if narrow_stream is not None and narrow_topic is not None:
|
|
|
|
narrow.append(["topic", narrow_topic])
|
|
|
|
return narrow, narrow_stream, narrow_topic
|
|
|
|
|
2019-09-14 01:56:29 +02:00
|
|
|
def update_last_reminder(user_profile: Optional[UserProfile]) -> None:
|
|
|
|
"""Reset our don't-spam-users-with-email counter since the
|
|
|
|
user has since logged in
|
|
|
|
"""
|
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
return
|
|
|
|
|
|
|
|
if user_profile.last_reminder is not None: # nocoverage
|
|
|
|
# TODO: Look into the history of last_reminder; we may have
|
|
|
|
# eliminated that as a useful concept for non-bot users.
|
|
|
|
user_profile.last_reminder = None
|
|
|
|
user_profile.save(update_fields=["last_reminder"])
|
|
|
|
|
2019-03-02 18:23:57 +01:00
|
|
|
def compute_navbar_logo_url(page_params: Dict[str, Any]) -> str:
|
2020-05-16 13:13:59 +02:00
|
|
|
if page_params["color_scheme"] == 2 and page_params["realm_night_logo_source"] != Realm.LOGO_DEFAULT:
|
2019-03-02 18:23:57 +01:00
|
|
|
navbar_logo_url = page_params["realm_night_logo_url"]
|
|
|
|
else:
|
|
|
|
navbar_logo_url = page_params["realm_logo_url"]
|
|
|
|
return navbar_logo_url
|
|
|
|
|
2017-11-27 09:28:57 +01:00
|
|
|
def home(request: HttpRequest) -> HttpResponse:
|
2017-08-25 04:32:16 +02:00
|
|
|
if not settings.ROOT_DOMAIN_LANDING_PAGE:
|
2017-01-07 21:19:52 +01:00
|
|
|
return home_real(request)
|
|
|
|
|
2017-08-25 04:32:16 +02:00
|
|
|
# If settings.ROOT_DOMAIN_LANDING_PAGE, sends the user the landing
|
2017-01-07 21:19:52 +01:00
|
|
|
# page, not the login form, on the root domain
|
|
|
|
|
|
|
|
subdomain = get_subdomain(request)
|
2017-10-20 02:56:49 +02:00
|
|
|
if subdomain != Realm.SUBDOMAIN_FOR_ROOT_DOMAIN:
|
2017-01-07 21:19:52 +01:00
|
|
|
return home_real(request)
|
|
|
|
|
2020-05-08 06:37:58 +02:00
|
|
|
return hello_view(request)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
@zulip_login_required
|
2017-11-27 09:28:57 +01:00
|
|
|
def home_real(request: HttpRequest) -> HttpResponse:
|
2020-03-25 02:00:28 +01:00
|
|
|
# Before we do any real work, check if the app is banned.
|
2020-04-20 14:00:03 +02:00
|
|
|
client_user_agent = request.META.get("HTTP_USER_AGENT", "")
|
2020-03-25 02:00:28 +01:00
|
|
|
(insecure_desktop_app, banned_desktop_app, auto_update_broken) = is_outdated_desktop_app(
|
2020-04-20 14:00:03 +02:00
|
|
|
client_user_agent)
|
2020-03-25 02:00:28 +01:00
|
|
|
if banned_desktop_app:
|
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
'zerver/insecure_desktop_app.html',
|
|
|
|
context={
|
|
|
|
"auto_update_broken": auto_update_broken,
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2020-03-25 02:00:28 +01:00
|
|
|
)
|
2020-04-20 14:00:03 +02:00
|
|
|
(unsupported_browser, browser_name) = is_unsupported_browser(client_user_agent)
|
|
|
|
if unsupported_browser:
|
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
'zerver/unsupported_browser.html',
|
|
|
|
context={
|
|
|
|
"browser_name": browser_name,
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
},
|
2020-04-20 14:00:03 +02:00
|
|
|
)
|
2020-03-25 02:00:28 +01:00
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
# We need to modify the session object every two weeks or it will expire.
|
|
|
|
# This line makes reloading the page a sufficient action to keep the
|
|
|
|
# session alive.
|
|
|
|
request.session.modified = True
|
|
|
|
|
2019-09-14 01:38:28 +02:00
|
|
|
if request.user.is_authenticated:
|
|
|
|
user_profile = request.user
|
|
|
|
else: # nocoverage
|
|
|
|
# This code path should not be reachable because of zulip_login_required above.
|
|
|
|
user_profile = None
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2020-07-18 19:00:04 +02:00
|
|
|
update_last_reminder(user_profile)
|
|
|
|
|
|
|
|
statsd.incr('views.home')
|
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
# If a user hasn't signed the current Terms of Service, send them there
|
2019-09-14 01:38:28 +02:00
|
|
|
if need_accept_tos(user_profile):
|
2017-01-07 21:19:52 +01:00
|
|
|
return accounts_accept_terms(request)
|
|
|
|
|
2019-09-14 01:53:42 +02:00
|
|
|
narrow, narrow_stream, narrow_topic = detect_narrowed_window(request, user_profile)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2019-09-14 02:09:27 +02:00
|
|
|
if user_profile is not None:
|
|
|
|
first_in_realm = realm_user_count(user_profile.realm) == 1
|
|
|
|
# If you are the only person in the realm and you didn't invite
|
|
|
|
# anyone, we'll continue to encourage you to do so on the frontend.
|
|
|
|
prompt_for_invites = (
|
|
|
|
first_in_realm and
|
|
|
|
not PreregistrationUser.objects.filter(referred_by=user_profile).count()
|
|
|
|
)
|
|
|
|
needs_tutorial = user_profile.tutorial_status == UserProfile.TUTORIAL_WAITING
|
2020-02-19 21:59:26 +01:00
|
|
|
|
2019-09-14 02:09:27 +02:00
|
|
|
else: # nocoverage
|
|
|
|
first_in_realm = False
|
|
|
|
prompt_for_invites = False
|
|
|
|
# The current tutorial doesn't super make sense for logged-out users.
|
|
|
|
needs_tutorial = False
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2020-07-18 20:33:28 +02:00
|
|
|
has_mobile_devices = user_profile is not None and num_push_devices_for_user(user_profile) > 0
|
|
|
|
|
|
|
|
queue_id, page_params = build_page_params_for_home_page_load(
|
|
|
|
request=request,
|
|
|
|
user_profile=user_profile,
|
|
|
|
insecure_desktop_app=insecure_desktop_app,
|
|
|
|
has_mobile_devices=has_mobile_devices,
|
|
|
|
narrow=narrow,
|
|
|
|
narrow_stream=narrow_stream,
|
|
|
|
narrow_topic=narrow_topic,
|
|
|
|
first_in_realm=first_in_realm,
|
|
|
|
prompt_for_invites=prompt_for_invites,
|
|
|
|
needs_tutorial=needs_tutorial,
|
2017-01-07 21:19:52 +01:00
|
|
|
)
|
|
|
|
|
2020-01-13 18:47:30 +01:00
|
|
|
show_invites, show_add_streams = compute_show_invites_and_add_streams(user_profile)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2020-07-18 18:13:59 +02:00
|
|
|
billing_info = get_billing_info(user_profile)
|
2018-08-15 18:49:25 +02:00
|
|
|
|
2020-07-18 20:33:28 +02:00
|
|
|
request._log_data['extra'] = "[{}]".format(queue_id)
|
2018-05-03 11:08:50 +02:00
|
|
|
|
2018-04-11 20:10:36 +02:00
|
|
|
csp_nonce = generate_random_token(48)
|
2020-07-18 18:13:59 +02:00
|
|
|
|
|
|
|
user_permission_info = get_user_permission_info(user_profile)
|
2019-03-02 18:23:57 +01:00
|
|
|
|
|
|
|
navbar_logo_url = compute_navbar_logo_url(page_params)
|
|
|
|
|
2018-04-22 07:02:19 +02:00
|
|
|
response = render(request, 'zerver/app/index.html',
|
2017-03-16 14:14:31 +01:00
|
|
|
context={'user_profile': user_profile,
|
2019-09-13 01:15:53 +02:00
|
|
|
'page_params': page_params,
|
2018-04-11 20:10:36 +02:00
|
|
|
'csp_nonce': csp_nonce,
|
2018-07-14 11:39:33 +02:00
|
|
|
'search_pills_enabled': settings.SEARCH_PILLS_ENABLED,
|
2017-03-16 14:14:31 +01:00
|
|
|
'show_invites': show_invites,
|
2019-05-11 19:44:27 +02:00
|
|
|
'show_add_streams': show_add_streams,
|
2020-07-18 18:13:59 +02:00
|
|
|
'show_billing': billing_info.show_billing,
|
2020-05-04 09:24:19 +02:00
|
|
|
'corporate_enabled': settings.CORPORATE_ENABLED,
|
2020-07-18 18:13:59 +02:00
|
|
|
'show_plans': billing_info.show_plans,
|
|
|
|
'is_owner': user_permission_info.is_realm_owner,
|
|
|
|
'is_admin': user_permission_info.is_realm_admin,
|
|
|
|
'is_guest': user_permission_info.is_guest,
|
|
|
|
'color_scheme': user_permission_info.color_scheme,
|
2019-03-02 18:23:57 +01:00
|
|
|
'navbar_logo_url': navbar_logo_url,
|
2020-07-18 18:13:59 +02:00
|
|
|
'show_webathena': user_permission_info.show_webathena,
|
2017-03-16 14:14:31 +01:00
|
|
|
'embedded': narrow_stream is not None,
|
2018-12-30 11:06:12 +01:00
|
|
|
'invite_as': PreregistrationUser.INVITE_AS,
|
2020-05-08 06:57:19 +02:00
|
|
|
'max_file_upload_size_mib': settings.MAX_FILE_UPLOAD_SIZE,
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
})
|
2017-01-07 21:19:52 +01:00
|
|
|
patch_cache_control(response, no_cache=True, no_store=True, must_revalidate=True)
|
|
|
|
return response
|
|
|
|
|
|
|
|
@zulip_login_required
|
2017-11-27 09:28:57 +01:00
|
|
|
def desktop_home(request: HttpRequest) -> HttpResponse:
|
2017-01-07 21:19:52 +01:00
|
|
|
return HttpResponseRedirect(reverse('zerver.views.home.home'))
|