2023-02-28 21:32:07 +01:00
|
|
|
import logging
|
2024-07-12 02:30:25 +02:00
|
|
|
from collections.abc import Collection, Sequence
|
2024-04-30 22:12:34 +02:00
|
|
|
from datetime import datetime, timedelta
|
2024-07-12 02:30:25 +02:00
|
|
|
from typing import Any
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
from django.conf import settings
|
|
|
|
from django.contrib.contenttypes.models import ContentType
|
2022-10-31 21:41:46 +01:00
|
|
|
from django.db import transaction
|
2024-04-17 05:28:33 +02:00
|
|
|
from django.db.models import Q, QuerySet, Sum
|
2022-04-14 23:36:07 +02:00
|
|
|
from django.utils.timezone import now as timezone_now
|
|
|
|
from django.utils.translation import gettext as _
|
2023-02-28 21:32:07 +01:00
|
|
|
from zxcvbn import zxcvbn
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
from analytics.lib.counts import COUNT_STATS, do_increment_logging_stat
|
|
|
|
from analytics.models import RealmCount
|
2022-09-12 00:39:43 +02:00
|
|
|
from confirmation import settings as confirmation_settings
|
2024-04-30 22:12:34 +02:00
|
|
|
from confirmation.models import (
|
|
|
|
Confirmation,
|
|
|
|
confirmation_url_for,
|
|
|
|
create_confirmation_link,
|
|
|
|
create_confirmation_object,
|
|
|
|
)
|
|
|
|
from zerver.context_processors import common_context
|
2022-04-14 23:36:07 +02:00
|
|
|
from zerver.lib.email_validation import (
|
|
|
|
get_existing_user_errors,
|
|
|
|
get_realm_email_validator,
|
|
|
|
validate_email_is_valid,
|
|
|
|
)
|
|
|
|
from zerver.lib.exceptions import InvitationError
|
2024-04-30 22:57:29 +02:00
|
|
|
from zerver.lib.invites import notify_invites_changed
|
2024-01-10 22:01:21 +01:00
|
|
|
from zerver.lib.queue import queue_event_on_commit
|
2024-04-30 22:12:34 +02:00
|
|
|
from zerver.lib.send_email import FromAddress, clear_scheduled_invitation_emails, send_future_email
|
2022-04-14 23:36:07 +02:00
|
|
|
from zerver.lib.timestamp import datetime_to_timestamp
|
2024-01-10 22:01:21 +01:00
|
|
|
from zerver.lib.utils import assert_is_not_none
|
2023-12-15 03:46:16 +01:00
|
|
|
from zerver.models import Message, MultiuseInvite, PreregistrationUser, Realm, Stream, UserProfile
|
|
|
|
from zerver.models.prereg_users import filter_to_valid_prereg_users
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
|
2024-04-17 05:28:33 +02:00
|
|
|
def estimate_recent_invites(realms: Collection[Realm] | QuerySet[Realm], *, days: int) -> int:
|
2022-04-14 23:36:07 +02:00
|
|
|
"""An upper bound on the number of invites sent in the last `days` days"""
|
|
|
|
recent_invites = RealmCount.objects.filter(
|
|
|
|
realm__in=realms,
|
|
|
|
property="invites_sent::day",
|
2023-11-19 19:45:19 +01:00
|
|
|
end_time__gte=timezone_now() - timedelta(days=days),
|
2022-04-14 23:36:07 +02:00
|
|
|
).aggregate(Sum("value"))["value__sum"]
|
|
|
|
if recent_invites is None:
|
|
|
|
return 0
|
|
|
|
return recent_invites
|
|
|
|
|
|
|
|
|
2023-03-15 20:20:55 +01:00
|
|
|
def too_many_recent_realm_invites(realm: Realm, num_invitees: int) -> bool:
|
|
|
|
# Basic check that we're blow the realm-set limit
|
|
|
|
recent_invites = estimate_recent_invites([realm], days=1)
|
|
|
|
if num_invitees + recent_invites > realm.max_invites:
|
|
|
|
return True
|
|
|
|
|
2023-03-07 22:37:17 +01:00
|
|
|
if realm.plan_type != Realm.PLAN_TYPE_LIMITED:
|
2023-03-15 20:20:55 +01:00
|
|
|
return False
|
2023-03-07 20:14:09 +01:00
|
|
|
if realm.max_invites != settings.INVITES_DEFAULT_REALM_DAILY_MAX:
|
2023-03-15 20:20:55 +01:00
|
|
|
return False
|
2023-03-07 22:37:17 +01:00
|
|
|
|
|
|
|
# If they're a non-paid plan with default invitation limits,
|
|
|
|
# we further limit how many invitations can be sent in a day
|
|
|
|
# as a function of how many current users they have. The
|
|
|
|
# allowed ratio has some heuristics to lock down likely-spammy
|
|
|
|
# realms. This ratio likely only matters for the first
|
|
|
|
# handful of invites; if those users accept, then the realm is
|
|
|
|
# unlikely to hit these limits. If a real realm hits them,
|
|
|
|
# the resulting message suggests that they contact support if
|
|
|
|
# they have a real use case.
|
2023-03-15 20:20:55 +01:00
|
|
|
warning_flags = []
|
2023-03-07 22:37:17 +01:00
|
|
|
if zxcvbn(realm.string_id)["score"] == 4:
|
|
|
|
# Very high entropy realm names are suspicious
|
2023-03-15 20:20:55 +01:00
|
|
|
warning_flags.append("random-realm-name")
|
2023-03-07 22:37:17 +01:00
|
|
|
|
|
|
|
if not realm.description:
|
2023-03-15 20:20:55 +01:00
|
|
|
warning_flags.append("no-realm-description")
|
2023-03-07 22:37:17 +01:00
|
|
|
|
|
|
|
if realm.icon_source == Realm.ICON_FROM_GRAVATAR:
|
2023-03-15 20:20:55 +01:00
|
|
|
warning_flags.append("no-realm-icon")
|
2023-03-07 22:37:17 +01:00
|
|
|
|
2023-11-19 19:45:19 +01:00
|
|
|
if realm.date_created >= timezone_now() - timedelta(hours=1):
|
2023-03-15 20:20:55 +01:00
|
|
|
warning_flags.append("realm-created-in-last-hour")
|
2023-03-07 22:37:17 +01:00
|
|
|
|
2024-04-12 21:58:15 +02:00
|
|
|
current_user_count = UserProfile.objects.filter(
|
|
|
|
realm=realm, is_bot=False, is_active=True
|
|
|
|
).count()
|
2023-03-07 22:37:17 +01:00
|
|
|
if current_user_count == 1:
|
2023-03-15 20:20:55 +01:00
|
|
|
warning_flags.append("only-one-user")
|
2023-03-07 22:37:17 +01:00
|
|
|
|
|
|
|
estimated_sent = RealmCount.objects.filter(
|
|
|
|
realm=realm, property="messages_sent:message_type:day"
|
|
|
|
).aggregate(messages=Sum("value"))
|
2023-03-20 18:17:51 +01:00
|
|
|
if (
|
|
|
|
not estimated_sent["messages"]
|
|
|
|
# Only after we've done the rough-estimate check, take the
|
|
|
|
# time to do the exact check:
|
2023-08-30 21:19:37 +02:00
|
|
|
and not Message.objects.filter(
|
|
|
|
# Uses index: zerver_message_realm_sender_recipient (prefix)
|
|
|
|
realm=realm,
|
|
|
|
sender__is_bot=False,
|
|
|
|
).exists()
|
2023-03-20 18:17:51 +01:00
|
|
|
):
|
2023-03-15 20:20:55 +01:00
|
|
|
warning_flags.append("no-messages-sent")
|
2023-03-07 22:37:17 +01:00
|
|
|
|
2023-03-15 20:20:55 +01:00
|
|
|
if len(warning_flags) == 6:
|
2023-03-07 22:37:17 +01:00
|
|
|
permitted_ratio = 2
|
2023-03-15 20:20:55 +01:00
|
|
|
elif len(warning_flags) >= 3:
|
2023-03-07 22:37:17 +01:00
|
|
|
permitted_ratio = 3
|
|
|
|
else:
|
|
|
|
permitted_ratio = 5
|
|
|
|
|
2023-03-15 20:20:55 +01:00
|
|
|
ratio = (num_invitees + recent_invites) / current_user_count
|
|
|
|
logging.log(
|
|
|
|
logging.WARNING if ratio > permitted_ratio else logging.INFO,
|
|
|
|
"%s (!: %s) inviting %d more, have %d recent, but only %d current users. Ratio %.1f, %d allowed",
|
2023-03-07 22:37:17 +01:00
|
|
|
realm.string_id,
|
2023-03-15 20:20:55 +01:00
|
|
|
",".join(warning_flags),
|
2023-03-07 22:37:17 +01:00
|
|
|
num_invitees,
|
|
|
|
recent_invites,
|
|
|
|
current_user_count,
|
2023-03-15 20:20:55 +01:00
|
|
|
ratio,
|
2023-03-07 22:37:17 +01:00
|
|
|
permitted_ratio,
|
|
|
|
)
|
2023-03-15 20:20:55 +01:00
|
|
|
return ratio > permitted_ratio
|
2023-03-07 22:37:17 +01:00
|
|
|
|
|
|
|
|
2022-04-14 23:36:07 +02:00
|
|
|
def check_invite_limit(realm: Realm, num_invitees: int) -> None:
|
|
|
|
"""Discourage using invitation emails as a vector for carrying spam."""
|
|
|
|
msg = _(
|
|
|
|
"To protect users, Zulip limits the number of invitations you can send in one day. Because you have reached the limit, no invitations were sent."
|
|
|
|
)
|
|
|
|
if not settings.OPEN_REALM_CREATION:
|
|
|
|
return
|
|
|
|
|
2023-03-15 20:20:55 +01:00
|
|
|
if too_many_recent_realm_invites(realm, num_invitees):
|
2022-04-14 23:36:07 +02:00
|
|
|
raise InvitationError(
|
|
|
|
msg,
|
|
|
|
[],
|
|
|
|
sent_invitations=False,
|
|
|
|
daily_limit_reached=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
default_max = settings.INVITES_DEFAULT_REALM_DAILY_MAX
|
2023-11-19 19:45:19 +01:00
|
|
|
newrealm_age = timedelta(days=settings.INVITES_NEW_REALM_DAYS)
|
2022-04-14 23:36:07 +02:00
|
|
|
if realm.date_created <= timezone_now() - newrealm_age:
|
|
|
|
# If this isn't a "newly-created" realm, we're done. The
|
|
|
|
# remaining code applies an aggregate limit across all
|
|
|
|
# "new" realms, to address sudden bursts of spam realms.
|
|
|
|
return
|
|
|
|
|
|
|
|
if realm.max_invites > default_max:
|
|
|
|
# If a user is on a realm where we've bumped up
|
|
|
|
# max_invites, then we exempt them from invite limits.
|
|
|
|
return
|
|
|
|
|
|
|
|
new_realms = Realm.objects.filter(
|
|
|
|
date_created__gte=timezone_now() - newrealm_age,
|
|
|
|
_max_invites__lte=default_max,
|
|
|
|
).all()
|
|
|
|
|
|
|
|
for days, count in settings.INVITES_NEW_REALM_LIMIT_DAYS:
|
|
|
|
recent_invites = estimate_recent_invites(new_realms, days=days)
|
|
|
|
if num_invitees + recent_invites > count:
|
|
|
|
raise InvitationError(
|
|
|
|
msg,
|
|
|
|
[],
|
|
|
|
sent_invitations=False,
|
|
|
|
daily_limit_reached=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2024-01-10 22:01:21 +01:00
|
|
|
@transaction.atomic
|
2022-04-14 23:36:07 +02:00
|
|
|
def do_invite_users(
|
|
|
|
user_profile: UserProfile,
|
|
|
|
invitee_emails: Collection[str],
|
|
|
|
streams: Collection[Stream],
|
2024-04-18 19:38:47 +02:00
|
|
|
notify_referrer_on_join: bool = True,
|
2022-04-14 23:36:07 +02:00
|
|
|
*,
|
2024-07-12 02:30:23 +02:00
|
|
|
invite_expires_in_minutes: int | None,
|
2023-05-25 16:06:13 +02:00
|
|
|
include_realm_default_subscriptions: bool,
|
2022-04-14 23:36:07 +02:00
|
|
|
invite_as: int = PreregistrationUser.INVITE_AS["MEMBER"],
|
2024-07-12 02:30:17 +02:00
|
|
|
) -> list[tuple[str, str, bool]]:
|
2022-04-14 23:36:07 +02:00
|
|
|
num_invites = len(invitee_emails)
|
|
|
|
|
2024-01-10 22:01:21 +01:00
|
|
|
# Lock the realm, since we need to not race with other invitations
|
|
|
|
realm = Realm.objects.select_for_update().get(id=user_profile.realm_id)
|
|
|
|
check_invite_limit(realm, num_invites)
|
|
|
|
|
2022-04-14 23:36:07 +02:00
|
|
|
if settings.BILLING_ENABLED:
|
|
|
|
from corporate.lib.registration import check_spare_licenses_available_for_inviting_new_users
|
|
|
|
|
2022-08-14 19:42:55 +02:00
|
|
|
if invite_as == PreregistrationUser.INVITE_AS["GUEST_USER"]:
|
|
|
|
check_spare_licenses_available_for_inviting_new_users(
|
2024-01-10 22:01:21 +01:00
|
|
|
realm, extra_guests_count=num_invites
|
2022-08-14 19:42:55 +02:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
check_spare_licenses_available_for_inviting_new_users(
|
2024-01-10 22:01:21 +01:00
|
|
|
realm, extra_non_guests_count=num_invites
|
2022-08-14 19:42:55 +02:00
|
|
|
)
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
if not realm.invite_required:
|
|
|
|
# Inhibit joining an open realm to send spam invitations.
|
2023-11-19 19:45:19 +01:00
|
|
|
min_age = timedelta(days=settings.INVITES_MIN_USER_AGE_DAYS)
|
2022-04-14 23:36:07 +02:00
|
|
|
if user_profile.date_joined > timezone_now() - min_age and not user_profile.is_realm_admin:
|
|
|
|
raise InvitationError(
|
|
|
|
_(
|
|
|
|
"Your account is too new to send invites for this organization. "
|
|
|
|
"Ask an organization admin, or a more experienced user."
|
|
|
|
),
|
|
|
|
[],
|
|
|
|
sent_invitations=False,
|
|
|
|
)
|
|
|
|
|
2024-07-12 02:30:17 +02:00
|
|
|
good_emails: set[str] = set()
|
|
|
|
errors: list[tuple[str, str, bool]] = []
|
2024-01-10 22:01:21 +01:00
|
|
|
validate_email_allowed_in_realm = get_realm_email_validator(realm)
|
2022-04-14 23:36:07 +02:00
|
|
|
for email in invitee_emails:
|
|
|
|
if email == "":
|
|
|
|
continue
|
|
|
|
email_error = validate_email_is_valid(
|
|
|
|
email,
|
|
|
|
validate_email_allowed_in_realm,
|
|
|
|
)
|
|
|
|
|
|
|
|
if email_error:
|
|
|
|
errors.append((email, email_error, False))
|
|
|
|
else:
|
|
|
|
good_emails.add(email)
|
|
|
|
|
|
|
|
"""
|
|
|
|
good_emails are emails that look ok so far,
|
|
|
|
but we still need to make sure they're not
|
|
|
|
gonna conflict with existing users
|
|
|
|
"""
|
2024-01-10 22:01:21 +01:00
|
|
|
error_dict = get_existing_user_errors(realm, good_emails)
|
2022-04-14 23:36:07 +02:00
|
|
|
|
2024-07-12 02:30:17 +02:00
|
|
|
skipped: list[tuple[str, str, bool]] = []
|
2022-04-14 23:36:07 +02:00
|
|
|
for email in error_dict:
|
|
|
|
msg, deactivated = error_dict[email]
|
|
|
|
skipped.append((email, msg, deactivated))
|
|
|
|
good_emails.remove(email)
|
|
|
|
|
|
|
|
validated_emails = list(good_emails)
|
|
|
|
|
|
|
|
if errors:
|
|
|
|
raise InvitationError(
|
|
|
|
_("Some emails did not validate, so we didn't send any invitations."),
|
|
|
|
errors + skipped,
|
|
|
|
sent_invitations=False,
|
|
|
|
)
|
|
|
|
|
|
|
|
if skipped and len(skipped) == len(invitee_emails):
|
|
|
|
# All e-mails were skipped, so we didn't actually invite anyone.
|
|
|
|
raise InvitationError(
|
|
|
|
_("We weren't able to invite anyone."), skipped, sent_invitations=False
|
|
|
|
)
|
|
|
|
|
|
|
|
# Now that we are past all the possible errors, we actually create
|
|
|
|
# the PreregistrationUser objects and trigger the email invitations.
|
|
|
|
for email in validated_emails:
|
|
|
|
# The logged in user is the referrer.
|
|
|
|
prereg_user = PreregistrationUser(
|
2023-05-25 16:06:13 +02:00
|
|
|
email=email,
|
|
|
|
referred_by=user_profile,
|
|
|
|
invited_as=invite_as,
|
|
|
|
realm=realm,
|
|
|
|
include_realm_default_subscriptions=include_realm_default_subscriptions,
|
2024-04-18 19:38:47 +02:00
|
|
|
notify_referrer_on_join=notify_referrer_on_join,
|
2022-04-14 23:36:07 +02:00
|
|
|
)
|
|
|
|
prereg_user.save()
|
|
|
|
stream_ids = [stream.id for stream in streams]
|
|
|
|
prereg_user.streams.set(stream_ids)
|
|
|
|
|
2024-04-30 22:12:34 +02:00
|
|
|
confirmation = create_confirmation_object(
|
|
|
|
prereg_user, Confirmation.INVITATION, validity_in_minutes=invite_expires_in_minutes
|
|
|
|
)
|
|
|
|
do_send_user_invite_email(
|
|
|
|
prereg_user,
|
|
|
|
confirmation=confirmation,
|
|
|
|
invite_expires_in_minutes=invite_expires_in_minutes,
|
|
|
|
)
|
2022-04-14 23:36:07 +02:00
|
|
|
|
2024-01-10 22:01:21 +01:00
|
|
|
notify_invites_changed(realm, changed_invite_referrer=user_profile)
|
|
|
|
|
|
|
|
return skipped
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
|
2024-07-12 02:30:23 +02:00
|
|
|
def get_invitation_expiry_date(confirmation_obj: Confirmation) -> int | None:
|
2022-04-14 23:36:07 +02:00
|
|
|
expiry_date = confirmation_obj.expiry_date
|
|
|
|
if expiry_date is None:
|
|
|
|
return expiry_date
|
|
|
|
return datetime_to_timestamp(expiry_date)
|
|
|
|
|
|
|
|
|
2024-07-12 02:30:17 +02:00
|
|
|
def do_get_invites_controlled_by_user(user_profile: UserProfile) -> list[dict[str, Any]]:
|
2022-04-14 23:36:07 +02:00
|
|
|
"""
|
|
|
|
Returns a list of dicts representing invitations that can be controlled by user_profile.
|
|
|
|
This isn't necessarily the same as all the invitations generated by the user, as administrators
|
|
|
|
can control also invitations that they did not themselves create.
|
|
|
|
"""
|
|
|
|
if user_profile.is_realm_admin:
|
|
|
|
prereg_users = filter_to_valid_prereg_users(
|
2024-07-10 19:09:10 +02:00
|
|
|
PreregistrationUser.objects.filter(realm=user_profile.realm, referred_by__isnull=False)
|
2022-04-14 23:36:07 +02:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
prereg_users = filter_to_valid_prereg_users(
|
|
|
|
PreregistrationUser.objects.filter(referred_by=user_profile)
|
|
|
|
)
|
|
|
|
|
|
|
|
invites = []
|
|
|
|
|
|
|
|
for invitee in prereg_users:
|
2022-06-15 05:17:23 +02:00
|
|
|
assert invitee.referred_by is not None
|
2022-04-14 23:36:07 +02:00
|
|
|
invites.append(
|
|
|
|
dict(
|
|
|
|
email=invitee.email,
|
|
|
|
invited_by_user_id=invitee.referred_by.id,
|
|
|
|
invited=datetime_to_timestamp(invitee.invited_at),
|
|
|
|
expiry_date=get_invitation_expiry_date(invitee.confirmation.get()),
|
|
|
|
id=invitee.id,
|
|
|
|
invited_as=invitee.invited_as,
|
|
|
|
is_multiuse=False,
|
2024-04-18 19:38:47 +02:00
|
|
|
notify_referrer_on_join=invitee.notify_referrer_on_join,
|
2022-04-14 23:36:07 +02:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
2023-08-05 12:41:47 +02:00
|
|
|
if user_profile.is_realm_admin:
|
|
|
|
multiuse_confirmation_objs = Confirmation.objects.filter(
|
|
|
|
realm=user_profile.realm, type=Confirmation.MULTIUSE_INVITE
|
|
|
|
).filter(Q(expiry_date__gte=timezone_now()) | Q(expiry_date=None))
|
|
|
|
else:
|
|
|
|
multiuse_invite_ids = MultiuseInvite.objects.filter(referred_by=user_profile).values_list(
|
|
|
|
"id", flat=True
|
|
|
|
)
|
|
|
|
multiuse_confirmation_objs = Confirmation.objects.filter(
|
|
|
|
type=Confirmation.MULTIUSE_INVITE,
|
|
|
|
object_id__in=multiuse_invite_ids,
|
|
|
|
).filter(Q(expiry_date__gte=timezone_now()) | Q(expiry_date=None))
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
for confirmation_obj in multiuse_confirmation_objs:
|
|
|
|
invite = confirmation_obj.content_object
|
|
|
|
assert invite is not None
|
2022-11-15 13:32:20 +01:00
|
|
|
|
|
|
|
# This should be impossible, because revoking a multiuse invite
|
|
|
|
# deletes the Confirmation object, so it couldn't have been fetched above.
|
|
|
|
assert invite.status != confirmation_settings.STATUS_REVOKED
|
2022-04-14 23:36:07 +02:00
|
|
|
invites.append(
|
|
|
|
dict(
|
|
|
|
invited_by_user_id=invite.referred_by.id,
|
|
|
|
invited=datetime_to_timestamp(confirmation_obj.date_sent),
|
|
|
|
expiry_date=get_invitation_expiry_date(confirmation_obj),
|
|
|
|
id=invite.id,
|
2024-04-30 22:12:34 +02:00
|
|
|
link_url=confirmation_url_for(confirmation_obj),
|
2022-04-14 23:36:07 +02:00
|
|
|
invited_as=invite.invited_as,
|
|
|
|
is_multiuse=True,
|
|
|
|
)
|
|
|
|
)
|
|
|
|
return invites
|
|
|
|
|
|
|
|
|
2024-05-02 03:44:35 +02:00
|
|
|
@transaction.atomic
|
2022-04-14 23:36:07 +02:00
|
|
|
def do_create_multiuse_invite_link(
|
|
|
|
referred_by: UserProfile,
|
|
|
|
invited_as: int,
|
2024-07-12 02:30:23 +02:00
|
|
|
invite_expires_in_minutes: int | None,
|
2023-05-25 16:06:13 +02:00
|
|
|
include_realm_default_subscriptions: bool,
|
2022-04-14 23:36:07 +02:00
|
|
|
streams: Sequence[Stream] = [],
|
|
|
|
) -> str:
|
|
|
|
realm = referred_by.realm
|
2023-05-25 16:06:13 +02:00
|
|
|
invite = MultiuseInvite.objects.create(
|
|
|
|
realm=realm,
|
|
|
|
referred_by=referred_by,
|
|
|
|
include_realm_default_subscriptions=include_realm_default_subscriptions,
|
|
|
|
)
|
2022-04-14 23:36:07 +02:00
|
|
|
if streams:
|
|
|
|
invite.streams.set(streams)
|
|
|
|
invite.invited_as = invited_as
|
|
|
|
invite.save()
|
2023-08-05 14:50:19 +02:00
|
|
|
notify_invites_changed(referred_by.realm, changed_invite_referrer=referred_by)
|
2022-04-14 23:36:07 +02:00
|
|
|
return create_confirmation_link(
|
2022-02-10 11:52:34 +01:00
|
|
|
invite, Confirmation.MULTIUSE_INVITE, validity_in_minutes=invite_expires_in_minutes
|
2022-04-14 23:36:07 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2024-05-02 03:44:35 +02:00
|
|
|
@transaction.atomic
|
2022-04-14 23:36:07 +02:00
|
|
|
def do_revoke_user_invite(prereg_user: PreregistrationUser) -> None:
|
|
|
|
email = prereg_user.email
|
|
|
|
realm = prereg_user.realm
|
|
|
|
assert realm is not None
|
|
|
|
|
|
|
|
# Delete both the confirmation objects and the prereg_user object.
|
|
|
|
# TODO: Probably we actually want to set the confirmation objects
|
|
|
|
# to a "revoked" status so that we can give the invited user a better
|
|
|
|
# error message.
|
|
|
|
content_type = ContentType.objects.get_for_model(PreregistrationUser)
|
2024-05-02 03:44:35 +02:00
|
|
|
Confirmation.objects.filter(content_type=content_type, object_id=prereg_user.id).delete()
|
|
|
|
prereg_user.delete()
|
|
|
|
clear_scheduled_invitation_emails(email)
|
2023-08-05 14:50:19 +02:00
|
|
|
notify_invites_changed(realm, changed_invite_referrer=prereg_user.referred_by)
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
|
2024-05-02 03:44:35 +02:00
|
|
|
@transaction.atomic
|
2022-04-14 23:36:07 +02:00
|
|
|
def do_revoke_multi_use_invite(multiuse_invite: MultiuseInvite) -> None:
|
|
|
|
realm = multiuse_invite.referred_by.realm
|
|
|
|
|
|
|
|
content_type = ContentType.objects.get_for_model(MultiuseInvite)
|
2024-05-02 03:44:35 +02:00
|
|
|
Confirmation.objects.filter(content_type=content_type, object_id=multiuse_invite.id).delete()
|
|
|
|
multiuse_invite.status = confirmation_settings.STATUS_REVOKED
|
|
|
|
multiuse_invite.save(update_fields=["status"])
|
2023-08-05 14:50:19 +02:00
|
|
|
notify_invites_changed(realm, changed_invite_referrer=multiuse_invite.referred_by)
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
|
2024-01-10 22:01:21 +01:00
|
|
|
@transaction.atomic
|
2024-04-30 22:12:34 +02:00
|
|
|
def do_send_user_invite_email(
|
|
|
|
prereg_user: PreregistrationUser,
|
|
|
|
*,
|
2024-07-12 02:30:23 +02:00
|
|
|
confirmation: Confirmation | None = None,
|
|
|
|
event_time: datetime | None = None,
|
|
|
|
invite_expires_in_minutes: float | None = None,
|
2024-04-30 22:12:34 +02:00
|
|
|
) -> None:
|
2024-01-10 22:01:21 +01:00
|
|
|
# Take a lock on the realm, so we can check for invitation limits without races
|
|
|
|
realm_id = assert_is_not_none(prereg_user.realm_id)
|
|
|
|
realm = Realm.objects.select_for_update().get(id=realm_id)
|
|
|
|
check_invite_limit(realm, 1)
|
2024-04-30 22:12:34 +02:00
|
|
|
referrer = assert_is_not_none(prereg_user.referred_by)
|
2022-04-14 23:36:07 +02:00
|
|
|
|
2024-04-30 22:12:34 +02:00
|
|
|
if event_time is None:
|
|
|
|
event_time = prereg_user.invited_at
|
|
|
|
do_increment_logging_stat(realm, COUNT_STATS["invites_sent::day"], None, event_time)
|
2022-04-14 23:36:07 +02:00
|
|
|
|
2024-04-30 22:12:34 +02:00
|
|
|
if confirmation is None:
|
|
|
|
confirmation = prereg_user.confirmation.get()
|
2022-04-14 23:36:07 +02:00
|
|
|
|
|
|
|
event = {
|
2024-04-30 22:12:34 +02:00
|
|
|
"template_prefix": "zerver/emails/invitation",
|
|
|
|
"to_emails": [prereg_user.email],
|
|
|
|
"from_address": FromAddress.tokenized_no_reply_address(),
|
|
|
|
"language": realm.default_language,
|
|
|
|
"context": {
|
|
|
|
"referrer_full_name": referrer.full_name,
|
|
|
|
"referrer_email": referrer.delivery_email,
|
|
|
|
"activate_url": confirmation_url_for(confirmation),
|
|
|
|
"referrer_realm_name": realm.name,
|
|
|
|
"corporate_enabled": settings.CORPORATE_ENABLED,
|
|
|
|
},
|
|
|
|
"realm_id": realm.id,
|
2022-04-14 23:36:07 +02:00
|
|
|
}
|
2024-04-30 22:12:34 +02:00
|
|
|
queue_event_on_commit("email_senders", event)
|
|
|
|
|
|
|
|
clear_scheduled_invitation_emails(prereg_user.email)
|
|
|
|
if invite_expires_in_minutes is None and confirmation.expiry_date is not None:
|
|
|
|
# Pull the remaining time from the confirmation object
|
|
|
|
invite_expires_in_minutes = (confirmation.expiry_date - event_time).total_seconds() / 60
|
|
|
|
|
|
|
|
if invite_expires_in_minutes is None or invite_expires_in_minutes < 4 * 24 * 60:
|
|
|
|
# We do not queue reminder email for never expiring
|
|
|
|
# invitations. This is probably a low importance bug; it
|
|
|
|
# would likely be more natural to send a reminder after 7
|
|
|
|
# days.
|
|
|
|
return
|
|
|
|
|
|
|
|
context = common_context(referrer)
|
|
|
|
context.update(
|
|
|
|
activate_url=confirmation_url_for(confirmation),
|
|
|
|
referrer_name=referrer.full_name,
|
|
|
|
referrer_email=referrer.delivery_email,
|
|
|
|
referrer_realm_name=realm.name,
|
|
|
|
)
|
|
|
|
send_future_email(
|
|
|
|
"zerver/emails/invitation_reminder",
|
|
|
|
realm,
|
|
|
|
to_emails=[prereg_user.email],
|
|
|
|
from_address=FromAddress.tokenized_no_reply_placeholder,
|
|
|
|
language=realm.default_language,
|
|
|
|
context=context,
|
|
|
|
delay=timedelta(minutes=invite_expires_in_minutes - (2 * 24 * 60)),
|
|
|
|
)
|