2015-11-24 05:26:33 +01:00
|
|
|
from __future__ import absolute_import
|
|
|
|
|
2016-06-05 00:47:14 +02:00
|
|
|
from django.http import HttpRequest, HttpResponse
|
|
|
|
|
2016-05-25 15:02:02 +02:00
|
|
|
from django.utils.translation import ugettext as _
|
2015-11-24 05:26:33 +01:00
|
|
|
from django.shortcuts import redirect
|
|
|
|
from six.moves import map
|
|
|
|
|
2016-01-12 15:40:40 +01:00
|
|
|
from zerver.decorator import has_request_variables, REQ, JsonableError, \
|
|
|
|
require_realm_admin
|
2015-11-24 05:26:33 +01:00
|
|
|
from zerver.forms import CreateUserForm
|
|
|
|
from zerver.lib.actions import do_change_full_name, do_change_is_admin, \
|
|
|
|
do_create_user, subscribed_to_stream, do_deactivate_user, do_reactivate_user, \
|
|
|
|
do_change_default_events_register_stream, do_change_default_sending_stream, \
|
|
|
|
do_change_default_all_public_streams, do_regenerate_api_key, do_change_avatar_source
|
|
|
|
from zerver.lib.avatar import avatar_url, get_avatar_url
|
|
|
|
from zerver.lib.response import json_error, json_success
|
|
|
|
from zerver.lib.upload import upload_avatar_image
|
2016-09-27 14:25:52 +02:00
|
|
|
from zerver.lib.validator import check_bool, check_string
|
2016-06-05 00:47:14 +02:00
|
|
|
from zerver.models import UserProfile, Stream, Realm, get_user_profile_by_email, \
|
|
|
|
get_stream, email_allowed_for_realm
|
2015-11-24 05:26:33 +01:00
|
|
|
|
2016-06-05 00:47:14 +02:00
|
|
|
from six import text_type
|
|
|
|
from typing import Optional, Dict, Any
|
|
|
|
|
2015-11-24 05:26:33 +01:00
|
|
|
def deactivate_user_backend(request, user_profile, email):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
try:
|
|
|
|
target = get_user_profile_by_email(email)
|
|
|
|
except UserProfile.DoesNotExist:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such user'))
|
2015-11-24 05:26:33 +01:00
|
|
|
if target.is_bot:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such user'))
|
2015-11-24 05:26:33 +01:00
|
|
|
return _deactivate_user_profile_backend(request, user_profile, target)
|
|
|
|
|
2016-10-13 20:09:32 +02:00
|
|
|
def deactivate_user_own_backend(request, user_profile):
|
|
|
|
# type: (HttpRequest, UserProfile) -> HttpResponse
|
|
|
|
admins = set(user_profile.realm.get_admin_users())
|
|
|
|
|
|
|
|
if user_profile.is_realm_admin and len(admins) == 1:
|
|
|
|
return json_error(_('Cannot deactivate the only admin'))
|
|
|
|
do_deactivate_user(user_profile)
|
2016-10-21 07:34:04 +02:00
|
|
|
return json_success()
|
2016-10-13 20:09:32 +02:00
|
|
|
|
2015-11-24 05:26:33 +01:00
|
|
|
def deactivate_bot_backend(request, user_profile, email):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
try:
|
|
|
|
target = get_user_profile_by_email(email)
|
|
|
|
except UserProfile.DoesNotExist:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such bot'))
|
2015-11-24 05:26:33 +01:00
|
|
|
if not target.is_bot:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such bot'))
|
2015-11-24 05:26:33 +01:00
|
|
|
return _deactivate_user_profile_backend(request, user_profile, target)
|
|
|
|
|
|
|
|
def _deactivate_user_profile_backend(request, user_profile, target):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, UserProfile) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
if not user_profile.can_admin_user(target):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Insufficient permission'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
do_deactivate_user(target)
|
2016-10-21 07:34:04 +02:00
|
|
|
return json_success()
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
def reactivate_user_backend(request, user_profile, email):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
try:
|
|
|
|
target = get_user_profile_by_email(email)
|
|
|
|
except UserProfile.DoesNotExist:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such user'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
if not user_profile.can_admin_user(target):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Insufficient permission'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
do_reactivate_user(target)
|
2016-10-21 07:34:04 +02:00
|
|
|
return json_success()
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
@has_request_variables
|
|
|
|
def update_user_backend(request, user_profile, email,
|
2016-09-27 14:25:52 +02:00
|
|
|
full_name=REQ(default="", validator=check_string),
|
2015-11-24 05:26:33 +01:00
|
|
|
is_admin=REQ(default=None, validator=check_bool)):
|
2016-09-27 14:25:52 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type, Optional[text_type], Optional[bool]) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
try:
|
|
|
|
target = get_user_profile_by_email(email)
|
|
|
|
except UserProfile.DoesNotExist:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such user'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
if not user_profile.can_admin_user(target):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Insufficient permission'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
if is_admin is not None:
|
|
|
|
do_change_is_admin(target, is_admin)
|
2016-09-27 14:25:52 +02:00
|
|
|
|
|
|
|
if (full_name is not None and target.full_name != full_name and
|
|
|
|
full_name.strip() != ""):
|
|
|
|
# We don't respect `name_changes_disabled` here because the request
|
|
|
|
# is on behalf of the administrator.
|
|
|
|
new_full_name = full_name.strip()
|
|
|
|
if len(new_full_name) > UserProfile.MAX_NAME_LENGTH:
|
|
|
|
return json_error(_("Name too long!"))
|
|
|
|
do_change_full_name(target, new_full_name)
|
|
|
|
|
2016-10-21 07:34:04 +02:00
|
|
|
return json_success()
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
def avatar(request, email):
|
2016-06-05 04:20:00 +02:00
|
|
|
# type: (HttpRequest, str) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
try:
|
|
|
|
user_profile = get_user_profile_by_email(email)
|
|
|
|
avatar_source = user_profile.avatar_source
|
|
|
|
except UserProfile.DoesNotExist:
|
|
|
|
avatar_source = 'G'
|
|
|
|
url = get_avatar_url(avatar_source, email)
|
2016-07-13 02:19:26 +02:00
|
|
|
|
|
|
|
# We can rely on the url already having query parameters. Because
|
|
|
|
# our templates depend on being able to use the ampersand to
|
|
|
|
# add query parameters to our url, get_avatar_url does '?x=x'
|
|
|
|
# hacks to prevent us from having to jump through decode/encode hoops.
|
|
|
|
assert '?' in url
|
|
|
|
url += '&' + request.META['QUERY_STRING']
|
2015-11-24 05:26:33 +01:00
|
|
|
return redirect(url)
|
|
|
|
|
|
|
|
def get_stream_name(stream):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (Stream) -> Optional[text_type]
|
2015-11-24 05:26:33 +01:00
|
|
|
if stream:
|
|
|
|
name = stream.name
|
|
|
|
else :
|
|
|
|
name = None
|
|
|
|
return name
|
|
|
|
|
|
|
|
def stream_or_none(stream_name, realm):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (text_type, Realm) -> Optional[Stream]
|
2015-11-24 05:26:33 +01:00
|
|
|
if stream_name == '':
|
|
|
|
return None
|
|
|
|
else:
|
|
|
|
stream = get_stream(stream_name, realm)
|
|
|
|
if not stream:
|
2016-05-25 15:02:02 +02:00
|
|
|
raise JsonableError(_('No such stream \'%s\'') % (stream_name,))
|
2015-11-24 05:26:33 +01:00
|
|
|
return stream
|
|
|
|
|
|
|
|
@has_request_variables
|
|
|
|
def patch_bot_backend(request, user_profile, email,
|
|
|
|
full_name=REQ(default=None),
|
|
|
|
default_sending_stream=REQ(default=None),
|
|
|
|
default_events_register_stream=REQ(default=None),
|
|
|
|
default_all_public_streams=REQ(default=None, validator=check_bool)):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type, Optional[text_type], Optional[text_type], Optional[text_type], Optional[bool]) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
try:
|
|
|
|
bot = get_user_profile_by_email(email)
|
|
|
|
except:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such user'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
if not user_profile.can_admin_user(bot):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Insufficient permission'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
if full_name is not None:
|
|
|
|
do_change_full_name(bot, full_name)
|
|
|
|
if default_sending_stream is not None:
|
|
|
|
stream = stream_or_none(default_sending_stream, bot.realm)
|
|
|
|
do_change_default_sending_stream(bot, stream)
|
|
|
|
if default_events_register_stream is not None:
|
|
|
|
stream = stream_or_none(default_events_register_stream, bot.realm)
|
|
|
|
do_change_default_events_register_stream(bot, stream)
|
|
|
|
if default_all_public_streams is not None:
|
|
|
|
do_change_default_all_public_streams(bot, default_all_public_streams)
|
|
|
|
|
|
|
|
if len(request.FILES) == 0:
|
|
|
|
pass
|
|
|
|
elif len(request.FILES) == 1:
|
2016-01-25 01:27:18 +01:00
|
|
|
user_file = list(request.FILES.values())[0]
|
2015-11-24 05:26:33 +01:00
|
|
|
upload_avatar_image(user_file, user_profile, bot.email)
|
|
|
|
avatar_source = UserProfile.AVATAR_FROM_USER
|
|
|
|
do_change_avatar_source(bot, avatar_source)
|
|
|
|
else:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_("You may only upload one file at a time"))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
json_result = dict(
|
|
|
|
full_name=bot.full_name,
|
|
|
|
avatar_url=avatar_url(bot),
|
|
|
|
default_sending_stream=get_stream_name(bot.default_sending_stream),
|
|
|
|
default_events_register_stream=get_stream_name(bot.default_events_register_stream),
|
|
|
|
default_all_public_streams=bot.default_all_public_streams,
|
|
|
|
)
|
|
|
|
return json_success(json_result)
|
|
|
|
|
|
|
|
@has_request_variables
|
|
|
|
def regenerate_bot_api_key(request, user_profile, email):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
try:
|
|
|
|
bot = get_user_profile_by_email(email)
|
|
|
|
except:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('No such user'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
if not user_profile.can_admin_user(bot):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Insufficient permission'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
do_regenerate_api_key(bot)
|
|
|
|
json_result = dict(
|
|
|
|
api_key = bot.api_key
|
|
|
|
)
|
|
|
|
return json_success(json_result)
|
|
|
|
|
|
|
|
@has_request_variables
|
2016-05-31 16:29:39 +02:00
|
|
|
def add_bot_backend(request, user_profile, full_name=REQ(), short_name=REQ(),
|
2016-06-05 00:47:14 +02:00
|
|
|
default_sending_stream_name=REQ('default_sending_stream', default=None),
|
|
|
|
default_events_register_stream_name=REQ('default_events_register_stream', default=None),
|
2015-11-24 05:26:33 +01:00
|
|
|
default_all_public_streams=REQ(validator=check_bool, default=None)):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type, text_type, Optional[text_type], Optional[text_type], Optional[bool]) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
short_name += "-bot"
|
|
|
|
email = short_name + "@" + user_profile.realm.domain
|
|
|
|
form = CreateUserForm({'full_name': full_name, 'email': email})
|
|
|
|
if not form.is_valid():
|
|
|
|
# We validate client-side as well
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Bad name or username'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
try:
|
|
|
|
get_user_profile_by_email(email)
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_("Username already in use"))
|
2015-11-24 05:26:33 +01:00
|
|
|
except UserProfile.DoesNotExist:
|
|
|
|
pass
|
|
|
|
|
|
|
|
if len(request.FILES) == 0:
|
|
|
|
avatar_source = UserProfile.AVATAR_FROM_GRAVATAR
|
|
|
|
elif len(request.FILES) != 1:
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_("You may only upload one file at a time"))
|
2015-11-24 05:26:33 +01:00
|
|
|
else:
|
2016-01-25 01:27:18 +01:00
|
|
|
user_file = list(request.FILES.values())[0]
|
2015-11-24 05:26:33 +01:00
|
|
|
upload_avatar_image(user_file, user_profile, email)
|
|
|
|
avatar_source = UserProfile.AVATAR_FROM_USER
|
|
|
|
|
2016-06-05 00:47:14 +02:00
|
|
|
default_sending_stream = None
|
|
|
|
if default_sending_stream_name is not None:
|
|
|
|
default_sending_stream = stream_or_none(default_sending_stream_name, user_profile.realm)
|
2015-11-24 05:26:33 +01:00
|
|
|
if default_sending_stream and not default_sending_stream.is_public() and not \
|
|
|
|
subscribed_to_stream(user_profile, default_sending_stream):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Insufficient permission'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
2016-06-05 00:47:14 +02:00
|
|
|
default_events_register_stream = None
|
|
|
|
if default_events_register_stream_name is not None:
|
|
|
|
default_events_register_stream = stream_or_none(default_events_register_stream_name,
|
|
|
|
user_profile.realm)
|
2015-11-24 05:26:33 +01:00
|
|
|
if default_events_register_stream and not default_events_register_stream.is_public() and not \
|
|
|
|
subscribed_to_stream(user_profile, default_events_register_stream):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Insufficient permission'))
|
2015-11-24 05:26:33 +01:00
|
|
|
|
|
|
|
|
|
|
|
bot_profile = do_create_user(email=email, password='',
|
|
|
|
realm=user_profile.realm, full_name=full_name,
|
2016-05-18 20:23:03 +02:00
|
|
|
short_name=short_name, active=True,
|
|
|
|
bot_type=UserProfile.DEFAULT_BOT,
|
2015-11-24 05:26:33 +01:00
|
|
|
bot_owner=user_profile,
|
|
|
|
avatar_source=avatar_source,
|
|
|
|
default_sending_stream=default_sending_stream,
|
|
|
|
default_events_register_stream=default_events_register_stream,
|
|
|
|
default_all_public_streams=default_all_public_streams)
|
|
|
|
json_result = dict(
|
|
|
|
api_key=bot_profile.api_key,
|
|
|
|
avatar_url=avatar_url(bot_profile),
|
|
|
|
default_sending_stream=get_stream_name(bot_profile.default_sending_stream),
|
|
|
|
default_events_register_stream=get_stream_name(bot_profile.default_events_register_stream),
|
|
|
|
default_all_public_streams=bot_profile.default_all_public_streams,
|
|
|
|
)
|
|
|
|
return json_success(json_result)
|
|
|
|
|
|
|
|
def get_bots_backend(request, user_profile):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
bot_profiles = UserProfile.objects.filter(is_bot=True, is_active=True,
|
|
|
|
bot_owner=user_profile)
|
|
|
|
bot_profiles = bot_profiles.select_related('default_sending_stream', 'default_events_register_stream')
|
|
|
|
bot_profiles = bot_profiles.order_by('date_joined')
|
|
|
|
|
|
|
|
def bot_info(bot_profile):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (UserProfile) -> Dict[str, Any]
|
2015-11-24 05:26:33 +01:00
|
|
|
default_sending_stream = get_stream_name(bot_profile.default_sending_stream)
|
|
|
|
default_events_register_stream = get_stream_name(bot_profile.default_events_register_stream)
|
|
|
|
|
|
|
|
return dict(
|
|
|
|
username=bot_profile.email,
|
|
|
|
full_name=bot_profile.full_name,
|
|
|
|
api_key=bot_profile.api_key,
|
|
|
|
avatar_url=avatar_url(bot_profile),
|
|
|
|
default_sending_stream=default_sending_stream,
|
|
|
|
default_events_register_stream=default_events_register_stream,
|
|
|
|
default_all_public_streams=bot_profile.default_all_public_streams,
|
|
|
|
)
|
|
|
|
|
|
|
|
return json_success({'bots': list(map(bot_info, bot_profiles))})
|
|
|
|
|
|
|
|
def get_members_backend(request, user_profile):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile) -> HttpResponse
|
2015-11-24 05:26:33 +01:00
|
|
|
realm = user_profile.realm
|
|
|
|
admins = set(user_profile.realm.get_admin_users())
|
|
|
|
members = []
|
|
|
|
for profile in UserProfile.objects.select_related().filter(realm=realm):
|
|
|
|
avatar_url = get_avatar_url(
|
|
|
|
profile.avatar_source,
|
|
|
|
profile.email
|
|
|
|
)
|
|
|
|
member = {"full_name": profile.full_name,
|
|
|
|
"is_bot": profile.is_bot,
|
|
|
|
"is_active": profile.is_active,
|
|
|
|
"is_admin": (profile in admins),
|
|
|
|
"email": profile.email,
|
|
|
|
"avatar_url": avatar_url,}
|
|
|
|
if profile.is_bot and profile.bot_owner is not None:
|
|
|
|
member["bot_owner"] = profile.bot_owner.email
|
|
|
|
members.append(member)
|
|
|
|
return json_success({'members': members})
|
2016-01-12 15:40:40 +01:00
|
|
|
|
|
|
|
@require_realm_admin
|
|
|
|
@has_request_variables
|
2016-05-31 16:29:39 +02:00
|
|
|
def create_user_backend(request, user_profile, email=REQ(), password=REQ(),
|
|
|
|
full_name=REQ(), short_name=REQ()):
|
2016-06-05 00:47:14 +02:00
|
|
|
# type: (HttpRequest, UserProfile, text_type, text_type, text_type, text_type) -> HttpResponse
|
2016-01-12 15:40:40 +01:00
|
|
|
form = CreateUserForm({'full_name': full_name, 'email': email})
|
|
|
|
if not form.is_valid():
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_('Bad name or username'))
|
2016-01-12 15:40:40 +01:00
|
|
|
|
|
|
|
# Check that the new user's email address belongs to the admin's realm
|
|
|
|
# (Since this is an admin API, we don't require the user to have been
|
|
|
|
# invited first.)
|
|
|
|
realm = user_profile.realm
|
2016-01-12 16:34:37 +01:00
|
|
|
if not email_allowed_for_realm(email, user_profile.realm):
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_("Email '%(email)s' does not belong to domain '%(domain)s'") %
|
|
|
|
{'email': email, 'domain': realm.domain})
|
2016-01-12 15:40:40 +01:00
|
|
|
|
|
|
|
try:
|
|
|
|
get_user_profile_by_email(email)
|
2016-05-25 15:02:02 +02:00
|
|
|
return json_error(_("Email '%s' already in use") % (email,))
|
2016-01-12 15:40:40 +01:00
|
|
|
except UserProfile.DoesNotExist:
|
|
|
|
pass
|
|
|
|
|
|
|
|
do_create_user(email, password, realm, full_name, short_name)
|
|
|
|
return json_success()
|