2020-06-11 00:54:34 +02:00
|
|
|
import logging
|
|
|
|
import urllib
|
2022-06-23 20:07:19 +02:00
|
|
|
from typing import Any, Dict, Iterable, List, Optional
|
2020-09-13 00:37:41 +02:00
|
|
|
from urllib.parse import urlencode
|
2017-01-07 21:46:03 +01:00
|
|
|
|
|
|
|
from django.conf import settings
|
2017-08-25 01:11:30 +02:00
|
|
|
from django.contrib.auth import authenticate, get_backends
|
2022-06-21 00:01:15 +02:00
|
|
|
from django.contrib.sessions.backends.base import SessionBase
|
2017-01-07 21:46:03 +01:00
|
|
|
from django.core import validators
|
2020-06-11 00:54:34 +02:00
|
|
|
from django.core.exceptions import ValidationError
|
2020-08-01 15:25:54 +02:00
|
|
|
from django.db.models import Q
|
2020-06-11 00:54:34 +02:00
|
|
|
from django.http import HttpRequest, HttpResponse, HttpResponseRedirect
|
|
|
|
from django.shortcuts import redirect, render
|
|
|
|
from django.urls import reverse
|
2022-05-30 06:18:57 +02:00
|
|
|
from django.utils.translation import get_language
|
2021-04-16 00:57:30 +02:00
|
|
|
from django.utils.translation import gettext as _
|
2017-01-07 21:46:03 +01:00
|
|
|
from django_auth_ldap.backend import LDAPBackend, _LDAPUser
|
2020-06-11 00:54:34 +02:00
|
|
|
|
|
|
|
from confirmation.models import (
|
|
|
|
Confirmation,
|
|
|
|
ConfirmationKeyException,
|
|
|
|
RealmCreationKey,
|
|
|
|
create_confirmation_link,
|
|
|
|
get_object_from_key,
|
|
|
|
render_confirmation_key_error,
|
|
|
|
validate_key,
|
|
|
|
)
|
2022-04-14 23:58:15 +02:00
|
|
|
from zerver.actions.create_realm import do_create_realm
|
2022-04-14 23:53:15 +02:00
|
|
|
from zerver.actions.create_user import do_activate_mirror_dummy_user, do_create_user
|
2022-04-14 23:34:23 +02:00
|
|
|
from zerver.actions.default_streams import lookup_default_stream_groups
|
2022-04-14 23:49:26 +02:00
|
|
|
from zerver.actions.user_settings import (
|
|
|
|
do_change_full_name,
|
|
|
|
do_change_password,
|
|
|
|
do_change_user_setting,
|
|
|
|
)
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.context_processors import get_realm_from_request, login_context
|
2022-08-05 17:40:03 +02:00
|
|
|
from zerver.decorator import do_login, require_post
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.forms import (
|
|
|
|
FindMyTeamForm,
|
|
|
|
HomepageForm,
|
|
|
|
RealmCreationForm,
|
|
|
|
RealmRedirectForm,
|
|
|
|
RegistrationForm,
|
|
|
|
)
|
|
|
|
from zerver.lib.email_validation import email_allowed_for_realm, validate_email_not_already_in_realm
|
2021-07-25 17:07:06 +02:00
|
|
|
from zerver.lib.exceptions import RateLimited
|
2021-04-04 16:58:41 +02:00
|
|
|
from zerver.lib.i18n import get_default_language_for_new_user
|
2019-12-20 00:00:45 +01:00
|
|
|
from zerver.lib.pysa import mark_sanitized
|
2022-08-05 17:40:03 +02:00
|
|
|
from zerver.lib.rate_limiter import rate_limit_request_by_ip
|
2021-07-29 18:44:18 +02:00
|
|
|
from zerver.lib.request import REQ, has_request_variables
|
2021-04-03 12:14:01 +02:00
|
|
|
from zerver.lib.send_email import EmailNotDeliveredException, FromAddress, send_email
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.lib.sessions import get_expirable_session_var
|
2017-10-19 07:42:03 +02:00
|
|
|
from zerver.lib.subdomains import get_subdomain, is_root_domain_available
|
2021-10-14 01:45:34 +02:00
|
|
|
from zerver.lib.url_encoding import append_url_query_string
|
2018-06-19 10:55:56 +02:00
|
|
|
from zerver.lib.users import get_accounts_for_email
|
2021-07-29 18:44:18 +02:00
|
|
|
from zerver.lib.validator import to_converted_or_fallback, to_non_negative_int, to_timezone_or_empty
|
2018-08-11 16:26:46 +02:00
|
|
|
from zerver.lib.zephyr import compute_mit_user_fullname
|
2020-06-11 00:54:34 +02:00
|
|
|
from zerver.models import (
|
|
|
|
DisposableEmailError,
|
|
|
|
DomainNotAllowedForRealmError,
|
|
|
|
EmailContainsPlusError,
|
|
|
|
MultiuseInvite,
|
2021-12-02 16:16:22 +01:00
|
|
|
PreregistrationUser,
|
2020-06-11 00:54:34 +02:00
|
|
|
Realm,
|
|
|
|
Stream,
|
|
|
|
UserProfile,
|
|
|
|
get_default_stream_groups,
|
|
|
|
get_realm,
|
|
|
|
get_source_profile,
|
|
|
|
get_user_by_delivery_email,
|
|
|
|
name_changes_disabled,
|
|
|
|
)
|
|
|
|
from zerver.views.auth import (
|
|
|
|
create_preregistration_user,
|
|
|
|
finish_desktop_flow,
|
|
|
|
finish_mobile_flow,
|
|
|
|
get_safe_redirect_to,
|
|
|
|
redirect_and_log_into_subdomain,
|
|
|
|
redirect_to_deactivation_notice,
|
|
|
|
)
|
|
|
|
from zproject.backends import (
|
|
|
|
ExternalAuthResult,
|
|
|
|
ZulipLDAPAuthBackend,
|
|
|
|
ZulipLDAPExceptionNoMatchingLDAPUser,
|
|
|
|
email_auth_enabled,
|
|
|
|
email_belongs_to_ldap,
|
2021-07-18 23:39:37 +02:00
|
|
|
get_external_method_dicts,
|
2020-06-11 00:54:34 +02:00
|
|
|
ldap_auth_enabled,
|
|
|
|
password_auth_enabled,
|
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-05-28 15:57:08 +02:00
|
|
|
if settings.BILLING_ENABLED:
|
|
|
|
from corporate.lib.registration import check_spare_licenses_available_for_registering_new_user
|
|
|
|
from corporate.lib.stripe import LicenseLimitError
|
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-07-29 18:44:18 +02:00
|
|
|
@has_request_variables
|
2021-11-29 16:20:59 +01:00
|
|
|
def get_prereg_key_and_redirect(
|
2021-07-29 18:44:18 +02:00
|
|
|
request: HttpRequest, confirmation_key: str, full_name: Optional[str] = REQ(default=None)
|
|
|
|
) -> HttpResponse:
|
2021-12-02 18:37:16 +01:00
|
|
|
"""
|
|
|
|
The purpose of this little endpoint is primarily to take a GET
|
|
|
|
request to a long URL containing a confirmation key, and render
|
|
|
|
a page that will via JavaScript immediately do a POST request to
|
|
|
|
/accounts/register, so that the user can create their account on
|
|
|
|
a page with a cleaner URL (and with the browser security and UX
|
|
|
|
benefits of an HTTP POST having generated the page).
|
|
|
|
|
|
|
|
The only thing it does before rendering that page is to check
|
|
|
|
the validity of the confirmation link. This is redundant with a
|
|
|
|
similar check in accounts_register, but it provides a slightly nicer
|
|
|
|
user-facing error handling experience if the URL you visited is
|
|
|
|
displayed in the browser. (E.g. you can debug that you
|
|
|
|
accidentally adding an extra character after pasting).
|
|
|
|
"""
|
2021-12-02 18:11:31 +01:00
|
|
|
try:
|
|
|
|
check_prereg_key(request, confirmation_key)
|
|
|
|
except ConfirmationKeyException as e:
|
|
|
|
return render_confirmation_key_error(request, e)
|
|
|
|
|
2021-11-29 16:20:59 +01:00
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"confirmation/confirm_preregistrationuser.html",
|
|
|
|
context={"key": confirmation_key, "full_name": full_name},
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-12-02 18:11:31 +01:00
|
|
|
def check_prereg_key(request: HttpRequest, confirmation_key: str) -> PreregistrationUser:
|
2021-11-29 16:20:59 +01:00
|
|
|
"""
|
2021-12-02 16:16:22 +01:00
|
|
|
Checks if the Confirmation key is valid, returning the PreregistrationUser object in case of success
|
2021-12-02 18:11:31 +01:00
|
|
|
and raising an appropriate ConfirmationKeyException otherwise.
|
2021-11-29 16:20:59 +01:00
|
|
|
"""
|
2021-12-02 16:34:05 +01:00
|
|
|
confirmation_types = [
|
2021-02-12 08:19:30 +01:00
|
|
|
Confirmation.USER_REGISTRATION,
|
|
|
|
Confirmation.INVITATION,
|
|
|
|
Confirmation.REALM_CREATION,
|
2021-12-02 16:34:05 +01:00
|
|
|
]
|
2020-05-01 01:52:45 +02:00
|
|
|
|
2022-07-19 21:08:19 +02:00
|
|
|
prereg_user = get_object_from_key(confirmation_key, confirmation_types, mark_object_used=False)
|
2022-06-28 21:52:24 +02:00
|
|
|
assert isinstance(prereg_user, PreregistrationUser)
|
2017-11-30 05:07:18 +01:00
|
|
|
|
2022-05-06 21:02:24 +02:00
|
|
|
# Defensive assert to make sure no mix-up in how .status is set leading to re-use
|
|
|
|
# of a PreregistrationUser object.
|
|
|
|
assert prereg_user.created_user is None
|
|
|
|
|
2021-12-02 16:16:22 +01:00
|
|
|
return prereg_user
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-11-30 05:07:18 +01:00
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
@require_post
|
2021-07-29 18:44:18 +02:00
|
|
|
@has_request_variables
|
|
|
|
def accounts_register(
|
|
|
|
request: HttpRequest,
|
|
|
|
key: str = REQ(default=""),
|
|
|
|
timezone: str = REQ(default="", converter=to_timezone_or_empty),
|
|
|
|
from_confirmation: Optional[str] = REQ(default=None),
|
|
|
|
form_full_name: Optional[str] = REQ("full_name", default=None),
|
|
|
|
source_realm_id: Optional[int] = REQ(
|
|
|
|
default=None, converter=to_converted_or_fallback(to_non_negative_int, None)
|
|
|
|
),
|
|
|
|
) -> HttpResponse:
|
2021-12-02 18:11:31 +01:00
|
|
|
try:
|
|
|
|
prereg_user = check_prereg_key(request, key)
|
|
|
|
except ConfirmationKeyException as e:
|
|
|
|
return render_confirmation_key_error(request, e)
|
2020-05-02 00:23:19 +02:00
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
email = prereg_user.email
|
|
|
|
realm_creation = prereg_user.realm_creation
|
2017-08-04 08:09:25 +02:00
|
|
|
password_required = prereg_user.password_required
|
2020-06-03 01:11:36 +02:00
|
|
|
|
users: Remove redundant get_role_for_new_user in lib/create_user.py.
The function get_role_for_new_user was added to get role from the
invited_as value, as invited_as values were one of (1,2,3,4)
previously, but it was then changed to be the actual role value,
i.e. one of (100, 200, 400, 600), in 1f8f227444.
So, we can safely remove this function now and use invited_as value
directly and handle realm_creation case by using an if condition.
2021-04-30 14:37:48 +02:00
|
|
|
role = prereg_user.invited_as
|
|
|
|
if realm_creation:
|
|
|
|
role = UserProfile.ROLE_REALM_OWNER
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2018-04-06 19:33:02 +02:00
|
|
|
try:
|
|
|
|
validators.validate_email(email)
|
|
|
|
except ValidationError:
|
|
|
|
return render(request, "zerver/invalid_email.html", context={"invalid_email": True})
|
|
|
|
|
2017-11-08 22:02:59 +01:00
|
|
|
if realm_creation:
|
2017-01-07 21:46:03 +01:00
|
|
|
# For creating a new realm, there is no existing realm or domain
|
|
|
|
realm = None
|
|
|
|
else:
|
2021-12-02 16:16:22 +01:00
|
|
|
assert prereg_user.realm is not None
|
2019-05-04 04:47:44 +02:00
|
|
|
if get_subdomain(request) != prereg_user.realm.string_id:
|
2017-12-02 01:07:52 +01:00
|
|
|
return render_confirmation_key_error(
|
2021-02-12 08:19:30 +01:00
|
|
|
request, ConfirmationKeyException(ConfirmationKeyException.DOES_NOT_EXIST)
|
|
|
|
)
|
2019-05-04 04:47:44 +02:00
|
|
|
realm = prereg_user.realm
|
2018-03-14 12:54:05 +01:00
|
|
|
try:
|
|
|
|
email_allowed_for_realm(email, realm)
|
|
|
|
except DomainNotAllowedForRealmError:
|
2021-02-12 08:19:30 +01:00
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/invalid_email.html",
|
|
|
|
context={"realm_name": realm.name, "closed_domain": True},
|
|
|
|
)
|
2018-03-14 13:25:26 +01:00
|
|
|
except DisposableEmailError:
|
2021-02-12 08:19:30 +01:00
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/invalid_email.html",
|
|
|
|
context={"realm_name": realm.name, "disposable_emails_not_allowed": True},
|
|
|
|
)
|
2018-06-20 13:08:07 +02:00
|
|
|
except EmailContainsPlusError:
|
2021-02-12 08:19:30 +01:00
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/invalid_email.html",
|
|
|
|
context={"realm_name": realm.name, "email_contains_plus": True},
|
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2017-12-02 01:13:17 +01:00
|
|
|
if realm.deactivated:
|
|
|
|
# The user is trying to register for a deactivated realm. Advise them to
|
|
|
|
# contact support.
|
|
|
|
return redirect_to_deactivation_notice()
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2017-11-22 20:22:11 +01:00
|
|
|
try:
|
2020-03-02 13:24:50 +01:00
|
|
|
validate_email_not_already_in_realm(realm, email)
|
2019-11-03 23:02:37 +01:00
|
|
|
except ValidationError:
|
2021-01-07 20:18:45 +01:00
|
|
|
return redirect_to_email_login_url(email)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-05-28 15:57:08 +02:00
|
|
|
if settings.BILLING_ENABLED:
|
|
|
|
try:
|
|
|
|
check_spare_licenses_available_for_registering_new_user(realm, email)
|
|
|
|
except LicenseLimitError:
|
|
|
|
return render(request, "zerver/no_spare_licenses.html")
|
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
name_validated = False
|
2019-01-16 09:56:17 +01:00
|
|
|
require_ldap_password = False
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-07-29 18:44:18 +02:00
|
|
|
if from_confirmation:
|
2017-01-07 21:46:03 +01:00
|
|
|
try:
|
2021-02-12 08:20:45 +01:00
|
|
|
del request.session["authenticated_full_name"]
|
2017-01-07 21:46:03 +01:00
|
|
|
except KeyError:
|
|
|
|
pass
|
2019-11-09 07:01:05 +01:00
|
|
|
|
|
|
|
ldap_full_name = None
|
|
|
|
if settings.POPULATE_PROFILE_VIA_LDAP:
|
|
|
|
# If the user can be found in LDAP, we'll take the full name from the directory,
|
|
|
|
# and further down create a form pre-filled with it.
|
2017-01-07 21:46:03 +01:00
|
|
|
for backend in get_backends():
|
|
|
|
if isinstance(backend, LDAPBackend):
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
try:
|
2018-05-31 23:04:47 +02:00
|
|
|
ldap_username = backend.django_to_ldap_username(email)
|
2019-10-25 02:26:05 +02:00
|
|
|
except ZulipLDAPExceptionNoMatchingLDAPUser:
|
2020-05-02 08:44:14 +02:00
|
|
|
logging.warning("New account email %s could not be found in LDAP", email)
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
break
|
|
|
|
|
2019-11-09 00:27:18 +01:00
|
|
|
# Note that this `ldap_user` object is not a
|
|
|
|
# `ZulipLDAPUser` with a `Realm` attached, so
|
|
|
|
# calling `.populate_user()` on it will crash.
|
|
|
|
# This is OK, since we're just accessing this user
|
|
|
|
# to extract its name.
|
|
|
|
#
|
|
|
|
# TODO: We should potentially be accessing this
|
|
|
|
# user to sync its initial avatar and custom
|
|
|
|
# profile fields as well, if we indeed end up
|
|
|
|
# creating a user account through this flow,
|
|
|
|
# rather than waiting until `manage.py
|
|
|
|
# sync_ldap_user_data` runs to populate it.
|
2019-01-16 09:08:52 +01:00
|
|
|
ldap_user = _LDAPUser(backend, ldap_username)
|
2018-05-31 23:04:47 +02:00
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
try:
|
2020-07-17 20:22:10 +02:00
|
|
|
ldap_full_name = backend.get_mapped_name(ldap_user)
|
2017-01-07 21:46:03 +01:00
|
|
|
except TypeError:
|
2019-11-09 07:01:05 +01:00
|
|
|
break
|
|
|
|
|
|
|
|
# Check whether this is ZulipLDAPAuthBackend,
|
|
|
|
# which is responsible for authentication and
|
|
|
|
# requires that LDAP accounts enter their LDAP
|
|
|
|
# password to register, or ZulipLDAPUserPopulator,
|
|
|
|
# which just populates UserProfile fields (no auth).
|
|
|
|
require_ldap_password = isinstance(backend, ZulipLDAPAuthBackend)
|
|
|
|
break
|
|
|
|
|
|
|
|
if ldap_full_name:
|
|
|
|
# We don't use initial= here, because if the form is
|
|
|
|
# complete (that is, no additional fields need to be
|
|
|
|
# filled out by the user) we want the form to validate,
|
|
|
|
# so they can be directly registered without having to
|
|
|
|
# go through this interstitial.
|
2021-02-12 08:20:45 +01:00
|
|
|
form = RegistrationForm({"full_name": ldap_full_name}, realm_creation=realm_creation)
|
|
|
|
request.session["authenticated_full_name"] = ldap_full_name
|
2019-11-09 07:01:05 +01:00
|
|
|
name_validated = True
|
|
|
|
elif realm is not None and realm.is_zephyr_mirror_realm:
|
|
|
|
# For MIT users, we can get an authoritative name from Hesiod.
|
|
|
|
# Technically we should check that this is actually an MIT
|
|
|
|
# realm, but we can cross that bridge if we ever get a non-MIT
|
|
|
|
# zephyr mirroring realm.
|
|
|
|
hesiod_name = compute_mit_user_fullname(email)
|
|
|
|
form = RegistrationForm(
|
2021-02-12 08:20:45 +01:00
|
|
|
initial={"full_name": hesiod_name if "@" not in hesiod_name else ""},
|
2021-02-12 08:19:30 +01:00
|
|
|
realm_creation=realm_creation,
|
|
|
|
)
|
2019-11-09 07:01:05 +01:00
|
|
|
name_validated = True
|
2019-11-01 00:00:36 +01:00
|
|
|
elif prereg_user.full_name:
|
|
|
|
if prereg_user.full_name_validated:
|
2021-02-12 08:20:45 +01:00
|
|
|
request.session["authenticated_full_name"] = prereg_user.full_name
|
2019-11-01 00:00:36 +01:00
|
|
|
name_validated = True
|
2021-02-12 08:19:30 +01:00
|
|
|
form = RegistrationForm(
|
2021-02-12 08:20:45 +01:00
|
|
|
{"full_name": prereg_user.full_name}, realm_creation=realm_creation
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-11-01 00:00:36 +01:00
|
|
|
else:
|
2021-02-12 08:19:30 +01:00
|
|
|
form = RegistrationForm(
|
2021-02-12 08:20:45 +01:00
|
|
|
initial={"full_name": prereg_user.full_name}, realm_creation=realm_creation
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2021-07-29 18:44:18 +02:00
|
|
|
elif form_full_name is not None:
|
2017-01-07 21:46:03 +01:00
|
|
|
form = RegistrationForm(
|
2021-07-29 18:44:18 +02:00
|
|
|
initial={"full_name": form_full_name},
|
python: Use trailing commas consistently.
Automatically generated by the following script, based on the output
of lint with flake8-comma:
import re
import sys
last_filename = None
last_row = None
lines = []
for msg in sys.stdin:
m = re.match(
r"\x1b\[35mflake8 \|\x1b\[0m \x1b\[1;31m(.+):(\d+):(\d+): (\w+)", msg
)
if m:
filename, row_str, col_str, err = m.groups()
row, col = int(row_str), int(col_str)
if filename == last_filename:
assert last_row != row
else:
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
with open(filename) as f:
lines = f.readlines()
last_filename = filename
last_row = row
line = lines[row - 1]
if err in ["C812", "C815"]:
lines[row - 1] = line[: col - 1] + "," + line[col - 1 :]
elif err in ["C819"]:
assert line[col - 2] == ","
lines[row - 1] = line[: col - 2] + line[col - 1 :].lstrip(" ")
if last_filename is not None:
with open(last_filename, "w") as f:
f.writelines(lines)
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-10 05:23:40 +02:00
|
|
|
realm_creation=realm_creation,
|
2017-01-07 21:46:03 +01:00
|
|
|
)
|
|
|
|
else:
|
2017-06-15 19:24:38 +02:00
|
|
|
form = RegistrationForm(realm_creation=realm_creation)
|
2017-01-07 21:46:03 +01:00
|
|
|
else:
|
|
|
|
postdata = request.POST.copy()
|
|
|
|
if name_changes_disabled(realm):
|
|
|
|
# If we populate profile information via LDAP and we have a
|
|
|
|
# verified name from you on file, use that. Otherwise, fall
|
|
|
|
# back to the full name in the request.
|
|
|
|
try:
|
2021-02-12 08:20:45 +01:00
|
|
|
postdata.update(full_name=request.session["authenticated_full_name"])
|
2017-01-07 21:46:03 +01:00
|
|
|
name_validated = True
|
|
|
|
except KeyError:
|
|
|
|
pass
|
2017-06-15 19:24:38 +02:00
|
|
|
form = RegistrationForm(postdata, realm_creation=realm_creation)
|
2019-10-30 20:06:46 +01:00
|
|
|
|
|
|
|
if not (password_auth_enabled(realm) and password_required):
|
2021-02-12 08:20:45 +01:00
|
|
|
form["password"].field.required = False
|
2017-01-07 21:46:03 +01:00
|
|
|
|
|
|
|
if form.is_valid():
|
2021-02-12 08:20:45 +01:00
|
|
|
if password_auth_enabled(realm) and form["password"].field.required:
|
|
|
|
password = form.cleaned_data["password"]
|
2017-01-07 21:46:03 +01:00
|
|
|
else:
|
2019-11-18 07:57:36 +01:00
|
|
|
# If the user wasn't prompted for a password when
|
|
|
|
# completing the authentication form (because they're
|
|
|
|
# signing up with SSO and no password is required), set
|
|
|
|
# the password field to `None` (Which causes Django to
|
|
|
|
# create an unusable password).
|
2017-01-07 21:46:03 +01:00
|
|
|
password = None
|
|
|
|
|
|
|
|
if realm_creation:
|
2021-02-12 08:20:45 +01:00
|
|
|
string_id = form.cleaned_data["realm_subdomain"]
|
|
|
|
realm_name = form.cleaned_data["realm_name"]
|
2021-06-24 20:05:06 +02:00
|
|
|
realm_type = form.cleaned_data["realm_type"]
|
2021-08-13 20:37:15 +02:00
|
|
|
is_demo_org = form.cleaned_data["is_demo_organization"]
|
|
|
|
realm = do_create_realm(
|
|
|
|
string_id, realm_name, org_type=realm_type, is_demo_organization=is_demo_org
|
|
|
|
)
|
2021-02-12 08:19:30 +01:00
|
|
|
assert realm is not None
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
full_name = form.cleaned_data["full_name"]
|
2021-08-16 21:03:33 +02:00
|
|
|
enable_marketing_emails = form.cleaned_data["enable_marketing_emails"]
|
2021-02-12 08:20:45 +01:00
|
|
|
default_stream_group_names = request.POST.getlist("default_stream_group")
|
2017-10-26 20:31:43 +02:00
|
|
|
default_stream_groups = lookup_default_stream_groups(default_stream_group_names, realm)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-07-29 18:44:18 +02:00
|
|
|
if source_realm_id is not None:
|
2021-04-20 03:21:29 +02:00
|
|
|
# Non-integer realm_id values like "string" are treated
|
|
|
|
# like the "Do not import" value of "".
|
2021-07-29 18:44:18 +02:00
|
|
|
source_profile: Optional[UserProfile] = get_source_profile(email, source_realm_id)
|
2018-05-22 18:13:51 +02:00
|
|
|
else:
|
|
|
|
source_profile = None
|
|
|
|
|
2017-11-28 03:01:44 +01:00
|
|
|
if not realm_creation:
|
|
|
|
try:
|
2021-02-12 08:19:30 +01:00
|
|
|
existing_user_profile: Optional[UserProfile] = get_user_by_delivery_email(
|
|
|
|
email, realm
|
|
|
|
)
|
2017-11-28 03:01:44 +01:00
|
|
|
except UserProfile.DoesNotExist:
|
|
|
|
existing_user_profile = None
|
|
|
|
else:
|
2017-08-25 07:05:27 +02:00
|
|
|
existing_user_profile = None
|
|
|
|
|
python: Convert assignment type annotations to Python 3.6 style.
This commit was split by tabbott; this piece covers the vast majority
of files in Zulip, but excludes scripts/, tools/, and puppet/ to help
ensure we at least show the right error messages for Xenial systems.
We can likely further refine the remaining pieces with some testing.
Generated by com2ann, with whitespace fixes and various manual fixes
for runtime issues:
- invoiced_through: Optional[LicenseLedger] = models.ForeignKey(
+ invoiced_through: Optional["LicenseLedger"] = models.ForeignKey(
-_apns_client: Optional[APNsClient] = None
+_apns_client: Optional["APNsClient"] = None
- notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- signup_notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ signup_notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- author: Optional[UserProfile] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
+ author: Optional["UserProfile"] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
- bot_owner: Optional[UserProfile] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
+ bot_owner: Optional["UserProfile"] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
- default_sending_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
- default_events_register_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_sending_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_events_register_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
-descriptors_by_handler_id: Dict[int, ClientDescriptor] = {}
+descriptors_by_handler_id: Dict[int, "ClientDescriptor"] = {}
-worker_classes: Dict[str, Type[QueueProcessingWorker]] = {}
-queues: Dict[str, Dict[str, Type[QueueProcessingWorker]]] = {}
+worker_classes: Dict[str, Type["QueueProcessingWorker"]] = {}
+queues: Dict[str, Dict[str, Type["QueueProcessingWorker"]]] = {}
-AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional[LDAPSearch] = None
+AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional["LDAPSearch"] = None
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-22 01:09:50 +02:00
|
|
|
user_profile: Optional[UserProfile] = None
|
|
|
|
return_data: Dict[str, bool] = {}
|
2017-10-24 19:38:31 +02:00
|
|
|
if ldap_auth_enabled(realm):
|
|
|
|
# If the user was authenticated using an external SSO
|
|
|
|
# mechanism like Google or GitHub auth, then authentication
|
|
|
|
# will have already been done before creating the
|
|
|
|
# PreregistrationUser object with password_required=False, and
|
|
|
|
# so we don't need to worry about passwords.
|
|
|
|
#
|
|
|
|
# If instead the realm is using EmailAuthBackend, we will
|
|
|
|
# set their password above.
|
|
|
|
#
|
|
|
|
# But if the realm is using LDAPAuthBackend, we need to verify
|
|
|
|
# their LDAP password (which will, as a side effect, create
|
|
|
|
# the user account) here using authenticate.
|
2022-02-08 00:13:33 +01:00
|
|
|
# prereg_user.realm_creation carries the information about whether
|
2019-11-07 05:13:08 +01:00
|
|
|
# we're in realm creation mode, and the ldap flow will handle
|
|
|
|
# that and create the user with the appropriate parameters.
|
2022-05-31 03:17:38 +02:00
|
|
|
user = authenticate(
|
2021-02-12 08:19:30 +01:00
|
|
|
request=request,
|
|
|
|
username=email,
|
|
|
|
password=password,
|
|
|
|
realm=realm,
|
|
|
|
prereg_user=prereg_user,
|
|
|
|
return_data=return_data,
|
|
|
|
)
|
2022-05-31 03:17:38 +02:00
|
|
|
if user is None:
|
2021-07-18 23:39:37 +02:00
|
|
|
can_use_different_backend = email_auth_enabled(realm) or (
|
|
|
|
len(get_external_method_dicts(realm)) > 0
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2019-11-23 18:17:41 +01:00
|
|
|
if settings.LDAP_APPEND_DOMAIN:
|
2020-10-23 02:43:28 +02:00
|
|
|
# In LDAP_APPEND_DOMAIN configurations, we don't allow making a non-LDAP account
|
2019-11-23 18:17:41 +01:00
|
|
|
# if the email matches the ldap domain.
|
|
|
|
can_use_different_backend = can_use_different_backend and (
|
2021-02-12 08:19:30 +01:00
|
|
|
not email_belongs_to_ldap(realm, email)
|
|
|
|
)
|
2019-11-23 18:17:41 +01:00
|
|
|
if return_data.get("no_matching_ldap_user") and can_use_different_backend:
|
2019-11-21 14:48:49 +01:00
|
|
|
# If both the LDAP and Email or Social auth backends are
|
2019-11-07 04:26:46 +01:00
|
|
|
# enabled, and there's no matching user in the LDAP
|
|
|
|
# directory then the intent is to create a user in the
|
|
|
|
# realm with their email outside the LDAP organization
|
|
|
|
# (with e.g. a password stored in the Zulip database,
|
|
|
|
# not LDAP). So we fall through and create the new
|
|
|
|
# account.
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
# TODO: This probably isn't going to give a
|
|
|
|
# user-friendly error message, but it doesn't
|
|
|
|
# particularly matter, because the registration form
|
|
|
|
# is hidden for most users.
|
2021-02-12 08:20:45 +01:00
|
|
|
view_url = reverse("login")
|
2020-09-13 00:37:41 +02:00
|
|
|
query = urlencode({"email": email})
|
2021-10-14 01:45:34 +02:00
|
|
|
redirect_url = append_url_query_string(view_url, query)
|
2020-03-02 19:38:16 +01:00
|
|
|
return HttpResponseRedirect(redirect_url)
|
2019-11-07 05:13:08 +01:00
|
|
|
else:
|
2022-05-31 03:17:38 +02:00
|
|
|
assert isinstance(user, UserProfile)
|
|
|
|
user_profile = user
|
|
|
|
if not realm_creation:
|
|
|
|
# Since we'll have created a user, we now just log them in.
|
|
|
|
return login_and_go_to_home(request, user_profile)
|
2019-11-07 05:13:08 +01:00
|
|
|
# With realm_creation=True, we're going to return further down,
|
|
|
|
# after finishing up the creation process.
|
auth: Improve interactions between LDAPAuthBackend and EmailAuthBackend.
Previously, if you had LDAPAuthBackend enabled, we basically blocked
any other auth backends from working at all, by requiring the user's
login flow include verifying the user's LDAP password.
We still want to enforce that in the case that the account email
matches LDAP_APPEND_DOMAIN, but there's a reasonable corner case:
Having effectively guest users from outside the LDAP domain.
We don't want to allow creating a Zulip-level password for a user
inside the LDAP domain, so we still verify the LDAP password in that
flow, but if the email is allowed to register (due to invite or
whatever) but is outside the LDAP domain for the organization, we
allow it to create an account and set a password.
For the moment, this solution only covers EmailAuthBackend. It's
likely that just extending the list of other backends we check for in
the new conditional on `email_auth_backend` would be correct, but we
haven't done any testing for those cases, and with auth code paths,
it's better to disallow than allow untested code paths.
Fixes #9422.
2018-05-29 06:52:06 +02:00
|
|
|
|
|
|
|
if existing_user_profile is not None and existing_user_profile.is_mirror_dummy:
|
2017-03-19 01:42:40 +01:00
|
|
|
user_profile = existing_user_profile
|
2021-07-09 02:27:06 +02:00
|
|
|
do_activate_mirror_dummy_user(user_profile, acting_user=user_profile)
|
2017-03-19 01:42:40 +01:00
|
|
|
do_change_password(user_profile, password)
|
2017-04-07 07:28:28 +02:00
|
|
|
do_change_full_name(user_profile, full_name, user_profile)
|
2021-09-08 13:25:50 +02:00
|
|
|
do_change_user_setting(user_profile, "timezone", timezone, acting_user=user_profile)
|
2021-04-04 16:58:41 +02:00
|
|
|
do_change_user_setting(
|
|
|
|
user_profile,
|
|
|
|
"default_language",
|
|
|
|
get_default_language_for_new_user(request, realm),
|
|
|
|
acting_user=None,
|
|
|
|
)
|
2021-07-09 02:27:06 +02:00
|
|
|
# TODO: When we clean up the `do_activate_mirror_dummy_user` code path,
|
2017-10-27 20:22:19 +02:00
|
|
|
# make it respect invited_as_admin / is_realm_admin.
|
2019-11-07 05:13:08 +01:00
|
|
|
|
|
|
|
if user_profile is None:
|
2021-02-12 08:19:30 +01:00
|
|
|
user_profile = do_create_user(
|
|
|
|
email,
|
|
|
|
password,
|
|
|
|
realm,
|
|
|
|
full_name,
|
|
|
|
prereg_user=prereg_user,
|
|
|
|
role=role,
|
2021-12-07 02:23:24 +01:00
|
|
|
tos_version=settings.TERMS_OF_SERVICE_VERSION,
|
2021-02-12 08:19:30 +01:00
|
|
|
timezone=timezone,
|
2021-04-04 16:58:41 +02:00
|
|
|
default_language=get_default_language_for_new_user(request, realm),
|
2021-02-12 08:19:30 +01:00
|
|
|
default_stream_groups=default_stream_groups,
|
|
|
|
source_profile=source_profile,
|
|
|
|
realm_creation=realm_creation,
|
|
|
|
acting_user=None,
|
2021-08-16 21:03:33 +02:00
|
|
|
enable_marketing_emails=enable_marketing_emails,
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2017-08-05 08:48:20 +02:00
|
|
|
if realm_creation:
|
2017-01-07 21:46:03 +01:00
|
|
|
# Because for realm creation, registration happens on the
|
|
|
|
# root domain, we need to log them into the subdomain for
|
|
|
|
# their new realm.
|
2021-02-12 08:19:30 +01:00
|
|
|
return redirect_and_log_into_subdomain(
|
2021-02-12 08:20:45 +01:00
|
|
|
ExternalAuthResult(user_profile=user_profile, data_dict={"is_realm_creation": True})
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
|
|
|
# This dummy_backend check below confirms the user is
|
|
|
|
# authenticating to the correct subdomain.
|
2021-02-12 08:19:30 +01:00
|
|
|
auth_result = authenticate(
|
|
|
|
username=user_profile.delivery_email,
|
|
|
|
realm=realm,
|
|
|
|
return_data=return_data,
|
|
|
|
use_dummy_backend=True,
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
if return_data.get("invalid_subdomain"):
|
2017-01-07 21:46:03 +01:00
|
|
|
# By construction, this should never happen.
|
2020-05-02 08:44:14 +02:00
|
|
|
logging.error(
|
|
|
|
"Subdomain mismatch in registration %s: %s",
|
2021-02-12 08:19:30 +01:00
|
|
|
realm.subdomain,
|
|
|
|
user_profile.delivery_email,
|
2020-05-02 08:44:14 +02:00
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
return redirect("/")
|
2017-08-23 01:14:45 +02:00
|
|
|
|
2022-05-31 03:17:38 +02:00
|
|
|
assert isinstance(auth_result, UserProfile)
|
2017-10-24 19:37:14 +02:00
|
|
|
return login_and_go_to_home(request, auth_result)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2017-03-16 14:28:08 +01:00
|
|
|
return render(
|
|
|
|
request,
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver/register.html",
|
2021-02-12 08:19:30 +01:00
|
|
|
context={
|
2021-02-12 08:20:45 +01:00
|
|
|
"form": form,
|
|
|
|
"email": email,
|
|
|
|
"key": key,
|
|
|
|
"full_name": request.session.get("authenticated_full_name", None),
|
|
|
|
"lock_name": name_validated and name_changes_disabled(realm),
|
2021-02-12 08:19:30 +01:00
|
|
|
# password_auth_enabled is normally set via our context processor,
|
|
|
|
# but for the registration form, there is no logged in user yet, so
|
|
|
|
# we have to set it here.
|
2021-02-12 08:20:45 +01:00
|
|
|
"creating_new_team": realm_creation,
|
|
|
|
"password_required": password_auth_enabled(realm) and password_required,
|
|
|
|
"require_ldap_password": require_ldap_password,
|
|
|
|
"password_auth_enabled": password_auth_enabled(realm),
|
|
|
|
"root_domain_available": is_root_domain_available(),
|
|
|
|
"default_stream_groups": [] if realm is None else get_default_stream_groups(realm),
|
|
|
|
"accounts": get_accounts_for_email(email),
|
|
|
|
"MAX_REALM_NAME_LENGTH": str(Realm.MAX_REALM_NAME_LENGTH),
|
|
|
|
"MAX_NAME_LENGTH": str(UserProfile.MAX_NAME_LENGTH),
|
|
|
|
"MAX_PASSWORD_LENGTH": str(form.MAX_PASSWORD_LENGTH),
|
|
|
|
"MAX_REALM_SUBDOMAIN_LENGTH": str(Realm.MAX_REALM_SUBDOMAIN_LENGTH),
|
2022-01-05 23:53:40 +01:00
|
|
|
"corporate_enabled": settings.CORPORATE_ENABLED,
|
2021-06-24 20:05:06 +02:00
|
|
|
"sorted_realm_types": sorted(
|
|
|
|
Realm.ORG_TYPES.values(), key=lambda d: d["display_order"]
|
|
|
|
),
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
2017-03-16 14:28:08 +01:00
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-11-27 09:28:57 +01:00
|
|
|
def login_and_go_to_home(request: HttpRequest, user_profile: UserProfile) -> HttpResponse:
|
2021-02-12 08:19:30 +01:00
|
|
|
mobile_flow_otp = get_expirable_session_var(
|
2021-02-12 08:20:45 +01:00
|
|
|
request.session, "registration_mobile_flow_otp", delete=True
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
desktop_flow_otp = get_expirable_session_var(
|
2021-02-12 08:20:45 +01:00
|
|
|
request.session, "registration_desktop_flow_otp", delete=True
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2020-02-06 18:27:10 +01:00
|
|
|
if mobile_flow_otp is not None:
|
|
|
|
return finish_mobile_flow(request, user_profile, mobile_flow_otp)
|
|
|
|
elif desktop_flow_otp is not None:
|
2020-02-22 15:55:32 +01:00
|
|
|
return finish_desktop_flow(request, user_profile, desktop_flow_otp)
|
2020-02-06 18:27:10 +01:00
|
|
|
|
2017-10-24 19:37:14 +02:00
|
|
|
do_login(request, user_profile)
|
2019-12-20 00:00:45 +01:00
|
|
|
# Using 'mark_sanitized' to work around false positive where Pysa thinks
|
|
|
|
# that 'user_profile' is user-controlled
|
2021-02-12 08:20:45 +01:00
|
|
|
return HttpResponseRedirect(mark_sanitized(user_profile.realm.uri) + reverse("home"))
|
2017-10-24 19:37:14 +02:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
|
|
|
def prepare_activation_url(
|
|
|
|
email: str,
|
2022-06-21 00:01:15 +02:00
|
|
|
session: SessionBase,
|
2022-01-23 20:37:40 +01:00
|
|
|
*,
|
|
|
|
realm: Optional[Realm],
|
2021-02-12 08:19:30 +01:00
|
|
|
realm_creation: bool = False,
|
2022-06-23 20:07:19 +02:00
|
|
|
streams: Optional[Iterable[Stream]] = None,
|
2021-02-12 08:19:30 +01:00
|
|
|
invited_as: Optional[int] = None,
|
2022-07-21 23:38:59 +02:00
|
|
|
multiuse_invite: Optional[MultiuseInvite] = None,
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> str:
|
2017-01-07 21:46:03 +01:00
|
|
|
"""
|
|
|
|
Send an email with a confirmation link to the provided e-mail so the user
|
|
|
|
can complete their registration.
|
|
|
|
"""
|
2022-07-21 23:38:59 +02:00
|
|
|
prereg_user = create_preregistration_user(
|
|
|
|
email, realm, realm_creation, multiuse_invite=multiuse_invite
|
|
|
|
)
|
2017-08-10 22:33:14 +02:00
|
|
|
|
|
|
|
if streams is not None:
|
2018-01-31 08:22:07 +01:00
|
|
|
prereg_user.streams.set(streams)
|
2017-08-10 22:33:14 +02:00
|
|
|
|
2019-02-06 22:57:14 +01:00
|
|
|
if invited_as is not None:
|
|
|
|
prereg_user.invited_as = invited_as
|
|
|
|
prereg_user.save()
|
|
|
|
|
2017-11-30 01:06:25 +01:00
|
|
|
confirmation_type = Confirmation.USER_REGISTRATION
|
|
|
|
if realm_creation:
|
|
|
|
confirmation_type = Confirmation.REALM_CREATION
|
|
|
|
|
2020-06-14 01:36:12 +02:00
|
|
|
activation_url = create_confirmation_link(prereg_user, confirmation_type)
|
2017-06-11 00:58:00 +02:00
|
|
|
if settings.DEVELOPMENT and realm_creation:
|
2022-01-23 20:37:40 +01:00
|
|
|
session["confirmation_key"] = {"confirmation_key": activation_url.split("/")[-1]}
|
2018-01-26 20:50:22 +01:00
|
|
|
return activation_url
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
|
|
|
def send_confirm_registration_email(
|
2021-08-31 22:01:13 +02:00
|
|
|
email: str,
|
|
|
|
activation_url: str,
|
|
|
|
*,
|
|
|
|
realm: Optional[Realm] = None,
|
|
|
|
request: Optional[HttpRequest] = None,
|
2021-02-12 08:19:30 +01:00
|
|
|
) -> None:
|
|
|
|
send_email(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver/emails/confirm_registration",
|
2021-02-12 08:19:30 +01:00
|
|
|
to_emails=[email],
|
|
|
|
from_address=FromAddress.tokenized_no_reply_address(),
|
2022-05-30 06:18:57 +02:00
|
|
|
language=get_language() if request is not None else None,
|
2021-05-26 19:40:12 +02:00
|
|
|
context={
|
|
|
|
"create_realm": (realm is None),
|
|
|
|
"activate_url": activation_url,
|
|
|
|
},
|
2021-02-12 08:19:30 +01:00
|
|
|
realm=realm,
|
2021-08-31 22:01:13 +02:00
|
|
|
request=request,
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2017-11-27 09:28:57 +01:00
|
|
|
def redirect_to_email_login_url(email: str) -> HttpResponseRedirect:
|
2021-02-12 08:20:45 +01:00
|
|
|
login_url = reverse("login")
|
2021-10-14 01:45:34 +02:00
|
|
|
redirect_url = append_url_query_string(
|
2021-02-12 08:19:30 +01:00
|
|
|
login_url, urlencode({"email": email, "already_registered": 1})
|
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
return HttpResponseRedirect(redirect_url)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
|
|
|
def create_realm(request: HttpRequest, creation_key: Optional[str] = None) -> HttpResponse:
|
2018-01-29 20:54:49 +01:00
|
|
|
try:
|
|
|
|
key_record = validate_key(creation_key)
|
|
|
|
except RealmCreationKey.Invalid:
|
2021-02-12 08:19:30 +01:00
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/realm_creation_failed.html",
|
|
|
|
context={
|
2021-02-12 08:20:45 +01:00
|
|
|
"message": _("The organization creation link has expired" " or is not valid.")
|
2021-02-12 08:19:30 +01:00
|
|
|
},
|
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
if not settings.OPEN_REALM_CREATION:
|
2018-01-29 20:54:49 +01:00
|
|
|
if key_record is None:
|
2021-02-12 08:19:30 +01:00
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/realm_creation_failed.html",
|
2021-02-12 08:20:45 +01:00
|
|
|
context={"message": _("New organization creation disabled")},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
|
|
|
# When settings.OPEN_REALM_CREATION is enabled, anyone can create a new realm,
|
2018-11-09 18:51:12 +01:00
|
|
|
# with a few restrictions on their email address.
|
2021-02-12 08:20:45 +01:00
|
|
|
if request.method == "POST":
|
2017-01-07 21:46:03 +01:00
|
|
|
form = RealmCreationForm(request.POST)
|
|
|
|
if form.is_valid():
|
2021-07-25 17:07:06 +02:00
|
|
|
try:
|
2021-11-03 21:40:28 +01:00
|
|
|
rate_limit_request_by_ip(request, domain="sends_email_by_ip")
|
2021-07-25 17:07:06 +02:00
|
|
|
except RateLimited as e:
|
|
|
|
assert e.secs_to_freedom is not None
|
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/rate_limit_exceeded.html",
|
|
|
|
context={"retry_after": int(e.secs_to_freedom)},
|
|
|
|
status=429,
|
|
|
|
)
|
2021-07-19 20:31:09 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
email = form.cleaned_data["email"]
|
2022-01-23 20:37:40 +01:00
|
|
|
activation_url = prepare_activation_url(
|
|
|
|
email, request.session, realm=None, realm_creation=True
|
|
|
|
)
|
2018-01-26 21:12:58 +01:00
|
|
|
if key_record is not None and key_record.presume_email_valid:
|
|
|
|
# The user has a token created from the server command line;
|
|
|
|
# skip confirming the email is theirs, taking their word for it.
|
|
|
|
# This is essential on first install if the admin hasn't stopped
|
|
|
|
# to configure outbound email up front, or it isn't working yet.
|
|
|
|
key_record.delete()
|
|
|
|
return HttpResponseRedirect(activation_url)
|
|
|
|
|
2017-08-17 19:59:17 +02:00
|
|
|
try:
|
2021-08-31 22:01:13 +02:00
|
|
|
send_confirm_registration_email(email, activation_url, request=request)
|
2021-04-03 12:14:01 +02:00
|
|
|
except EmailNotDeliveredException:
|
|
|
|
logging.error("Error in create_realm")
|
2017-08-17 19:59:17 +02:00
|
|
|
return HttpResponseRedirect("/config-error/smtp")
|
|
|
|
|
2018-01-29 20:54:49 +01:00
|
|
|
if key_record is not None:
|
|
|
|
key_record.delete()
|
2021-02-12 08:20:45 +01:00
|
|
|
return HttpResponseRedirect(reverse("new_realm_send_confirm", kwargs={"email": email}))
|
2017-01-07 21:46:03 +01:00
|
|
|
else:
|
|
|
|
form = RealmCreationForm()
|
2021-02-12 08:19:30 +01:00
|
|
|
return render(
|
|
|
|
request,
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver/create_realm.html",
|
|
|
|
context={"form": form, "current_url": request.get_full_path},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
def accounts_home(
|
|
|
|
request: HttpRequest,
|
|
|
|
multiuse_object_key: str = "",
|
|
|
|
multiuse_object: Optional[MultiuseInvite] = None,
|
|
|
|
) -> HttpResponse:
|
2019-05-04 04:47:44 +02:00
|
|
|
try:
|
|
|
|
realm = get_realm(get_subdomain(request))
|
|
|
|
except Realm.DoesNotExist:
|
2020-09-22 02:54:44 +02:00
|
|
|
return HttpResponseRedirect(reverse(find_account))
|
2017-11-23 02:59:51 +01:00
|
|
|
if realm.deactivated:
|
2017-08-24 09:58:44 +02:00
|
|
|
return redirect_to_deactivation_notice()
|
|
|
|
|
2017-08-10 22:34:17 +02:00
|
|
|
from_multiuse_invite = False
|
|
|
|
streams_to_subscribe = None
|
2019-02-06 22:57:14 +01:00
|
|
|
invited_as = None
|
2017-08-10 22:34:17 +02:00
|
|
|
|
|
|
|
if multiuse_object:
|
2022-01-23 13:22:12 +01:00
|
|
|
# multiuse_object's realm should have been validated by the caller,
|
|
|
|
# so this code shouldn't be reachable with a multiuse_object which
|
|
|
|
# has its realm mismatching the realm of the request.
|
|
|
|
assert realm == multiuse_object.realm
|
|
|
|
|
2017-08-10 22:34:17 +02:00
|
|
|
streams_to_subscribe = multiuse_object.streams.all()
|
|
|
|
from_multiuse_invite = True
|
2019-02-06 22:57:14 +01:00
|
|
|
invited_as = multiuse_object.invited_as
|
2017-08-10 22:34:17 +02:00
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
if request.method == "POST":
|
2017-08-10 22:34:17 +02:00
|
|
|
form = HomepageForm(request.POST, realm=realm, from_multiuse_invite=from_multiuse_invite)
|
2017-01-07 21:46:03 +01:00
|
|
|
if form.is_valid():
|
2021-11-04 18:26:53 +01:00
|
|
|
try:
|
|
|
|
rate_limit_request_by_ip(request, domain="sends_email_by_ip")
|
|
|
|
except RateLimited as e:
|
|
|
|
assert e.secs_to_freedom is not None
|
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/rate_limit_exceeded.html",
|
|
|
|
context={"retry_after": int(e.secs_to_freedom)},
|
|
|
|
status=429,
|
|
|
|
)
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
email = form.cleaned_data["email"]
|
2021-01-06 18:41:44 +01:00
|
|
|
|
|
|
|
try:
|
|
|
|
validate_email_not_already_in_realm(realm, email)
|
|
|
|
except ValidationError:
|
|
|
|
return redirect_to_email_login_url(email)
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
activation_url = prepare_activation_url(
|
2022-01-23 20:37:40 +01:00
|
|
|
email,
|
|
|
|
request.session,
|
|
|
|
realm=realm,
|
|
|
|
streams=streams_to_subscribe,
|
|
|
|
invited_as=invited_as,
|
2022-07-21 23:38:59 +02:00
|
|
|
multiuse_invite=multiuse_object,
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-08-17 18:28:21 +02:00
|
|
|
try:
|
2021-08-31 22:01:13 +02:00
|
|
|
send_confirm_registration_email(email, activation_url, request=request, realm=realm)
|
2021-04-03 12:14:01 +02:00
|
|
|
except EmailNotDeliveredException:
|
|
|
|
logging.error("Error in accounts_home")
|
2017-08-17 18:28:21 +02:00
|
|
|
return HttpResponseRedirect("/config-error/smtp")
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
return HttpResponseRedirect(reverse("signup_send_confirm", kwargs={"email": email}))
|
2017-08-25 07:05:27 +02:00
|
|
|
|
2017-01-07 21:46:03 +01:00
|
|
|
else:
|
|
|
|
form = HomepageForm(realm=realm)
|
2019-03-20 13:13:44 +01:00
|
|
|
context = login_context(request)
|
2021-02-12 08:19:30 +01:00
|
|
|
context.update(
|
|
|
|
form=form,
|
|
|
|
current_url=request.get_full_path,
|
|
|
|
multiuse_object_key=multiuse_object_key,
|
|
|
|
from_multiuse_invite=from_multiuse_invite,
|
|
|
|
)
|
2021-02-12 08:20:45 +01:00
|
|
|
return render(request, "zerver/accounts_home.html", context=context)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
|
2017-11-27 09:28:57 +01:00
|
|
|
def accounts_home_from_multiuse_invite(request: HttpRequest, confirmation_key: str) -> HttpResponse:
|
2022-01-23 13:22:12 +01:00
|
|
|
realm = get_realm_from_request(request)
|
2022-06-28 21:52:24 +02:00
|
|
|
multiuse_object: Optional[MultiuseInvite] = None
|
2017-08-10 22:34:17 +02:00
|
|
|
try:
|
2022-07-19 21:13:32 +02:00
|
|
|
confirmation_obj = get_object_from_key(
|
|
|
|
confirmation_key, [Confirmation.MULTIUSE_INVITE], mark_object_used=False
|
|
|
|
)
|
2022-06-28 21:52:24 +02:00
|
|
|
assert isinstance(confirmation_obj, MultiuseInvite)
|
|
|
|
multiuse_object = confirmation_obj
|
2022-01-23 13:22:12 +01:00
|
|
|
if realm != multiuse_object.realm:
|
|
|
|
return render(request, "confirmation/link_does_not_exist.html", status=404)
|
2021-05-10 07:02:14 +02:00
|
|
|
# Required for OAuth 2
|
2017-08-10 22:34:17 +02:00
|
|
|
except ConfirmationKeyException as exception:
|
|
|
|
if realm is None or realm.invite_required:
|
|
|
|
return render_confirmation_key_error(request, exception)
|
2021-02-12 08:19:30 +01:00
|
|
|
return accounts_home(
|
|
|
|
request, multiuse_object_key=confirmation_key, multiuse_object=multiuse_object
|
|
|
|
)
|
|
|
|
|
2017-08-10 22:34:17 +02:00
|
|
|
|
2021-07-29 18:44:18 +02:00
|
|
|
@has_request_variables
|
|
|
|
def find_account(
|
|
|
|
request: HttpRequest, raw_emails: Optional[str] = REQ("emails", default=None)
|
|
|
|
) -> HttpResponse:
|
2021-02-12 08:20:45 +01:00
|
|
|
url = reverse("find_account")
|
2017-01-07 21:46:03 +01:00
|
|
|
|
python: Convert assignment type annotations to Python 3.6 style.
This commit was split by tabbott; this piece covers the vast majority
of files in Zulip, but excludes scripts/, tools/, and puppet/ to help
ensure we at least show the right error messages for Xenial systems.
We can likely further refine the remaining pieces with some testing.
Generated by com2ann, with whitespace fixes and various manual fixes
for runtime issues:
- invoiced_through: Optional[LicenseLedger] = models.ForeignKey(
+ invoiced_through: Optional["LicenseLedger"] = models.ForeignKey(
-_apns_client: Optional[APNsClient] = None
+_apns_client: Optional["APNsClient"] = None
- notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- signup_notifications_stream: Optional[Stream] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
+ signup_notifications_stream: Optional["Stream"] = models.ForeignKey('Stream', related_name='+', null=True, blank=True, on_delete=CASCADE)
- author: Optional[UserProfile] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
+ author: Optional["UserProfile"] = models.ForeignKey('UserProfile', blank=True, null=True, on_delete=CASCADE)
- bot_owner: Optional[UserProfile] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
+ bot_owner: Optional["UserProfile"] = models.ForeignKey('self', null=True, on_delete=models.SET_NULL)
- default_sending_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
- default_events_register_stream: Optional[Stream] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_sending_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
+ default_events_register_stream: Optional["Stream"] = models.ForeignKey('zerver.Stream', null=True, related_name='+', on_delete=CASCADE)
-descriptors_by_handler_id: Dict[int, ClientDescriptor] = {}
+descriptors_by_handler_id: Dict[int, "ClientDescriptor"] = {}
-worker_classes: Dict[str, Type[QueueProcessingWorker]] = {}
-queues: Dict[str, Dict[str, Type[QueueProcessingWorker]]] = {}
+worker_classes: Dict[str, Type["QueueProcessingWorker"]] = {}
+queues: Dict[str, Dict[str, Type["QueueProcessingWorker"]]] = {}
-AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional[LDAPSearch] = None
+AUTH_LDAP_REVERSE_EMAIL_SEARCH: Optional["LDAPSearch"] = None
Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
2020-04-22 01:09:50 +02:00
|
|
|
emails: List[str] = []
|
2021-02-12 08:20:45 +01:00
|
|
|
if request.method == "POST":
|
2017-01-07 21:46:03 +01:00
|
|
|
form = FindMyTeamForm(request.POST)
|
|
|
|
if form.is_valid():
|
2021-02-12 08:20:45 +01:00
|
|
|
emails = form.cleaned_data["emails"]
|
2021-08-05 11:13:22 +02:00
|
|
|
for i in range(len(emails)):
|
|
|
|
try:
|
2021-11-03 21:40:28 +01:00
|
|
|
rate_limit_request_by_ip(request, domain="sends_email_by_ip")
|
2021-08-05 11:13:22 +02:00
|
|
|
except RateLimited as e:
|
|
|
|
assert e.secs_to_freedom is not None
|
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
"zerver/rate_limit_exceeded.html",
|
|
|
|
context={"retry_after": int(e.secs_to_freedom)},
|
|
|
|
status=429,
|
|
|
|
)
|
2020-08-01 15:25:54 +02:00
|
|
|
|
|
|
|
# Django doesn't support __iexact__in lookup with EmailField, so we have
|
|
|
|
# to use Qs to get around that without needing to do multiple queries.
|
|
|
|
emails_q = Q()
|
|
|
|
for email in emails:
|
|
|
|
emails_q |= Q(delivery_email__iexact=email)
|
|
|
|
|
2021-09-15 15:29:15 +02:00
|
|
|
user_profiles = UserProfile.objects.filter(
|
2021-02-12 08:19:30 +01:00
|
|
|
emails_q, is_active=True, is_bot=False, realm__deactivated=False
|
2021-09-15 15:29:15 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
# We organize the data in preparation for sending exactly
|
|
|
|
# one outgoing email per provided email address, with each
|
|
|
|
# email listing all of the accounts that email address has
|
|
|
|
# with the current Zulip server.
|
|
|
|
context: Dict[str, Dict[str, Any]] = {}
|
|
|
|
for user in user_profiles:
|
|
|
|
key = user.delivery_email.lower()
|
|
|
|
context.setdefault(key, {})
|
|
|
|
context[key].setdefault("realms", [])
|
|
|
|
context[key]["realms"].append(user.realm)
|
|
|
|
context[key]["external_host"] = settings.EXTERNAL_HOST
|
|
|
|
# This value will end up being the last user ID among
|
|
|
|
# matching accounts; since it's only used for minor
|
|
|
|
# details like language, that arbitrary choice is OK.
|
|
|
|
context[key]["to_user_id"] = user.id
|
|
|
|
|
|
|
|
for delivery_email, realm_context in context.items():
|
|
|
|
realm_context["email"] = delivery_email
|
2021-02-12 08:19:30 +01:00
|
|
|
send_email(
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver/emails/find_team",
|
2021-09-15 15:29:15 +02:00
|
|
|
to_user_ids=[realm_context["to_user_id"]],
|
|
|
|
context=realm_context,
|
2021-02-12 08:19:30 +01:00
|
|
|
from_address=FromAddress.SUPPORT,
|
2021-08-31 22:01:13 +02:00
|
|
|
request=request,
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
2017-01-07 21:46:03 +01:00
|
|
|
|
|
|
|
# Note: Show all the emails in the result otherwise this
|
|
|
|
# feature can be used to ascertain which email addresses
|
|
|
|
# are associated with Zulip.
|
2021-02-12 08:20:45 +01:00
|
|
|
data = urllib.parse.urlencode({"emails": ",".join(emails)})
|
2021-10-14 01:45:34 +02:00
|
|
|
return redirect(append_url_query_string(url, data))
|
2017-01-07 21:46:03 +01:00
|
|
|
else:
|
|
|
|
form = FindMyTeamForm()
|
2017-08-25 08:30:33 +02:00
|
|
|
# The below validation is perhaps unnecessary, in that we
|
|
|
|
# shouldn't get able to get here with an invalid email unless
|
|
|
|
# the user hand-edits the URLs.
|
2021-07-29 18:44:18 +02:00
|
|
|
if raw_emails:
|
|
|
|
for email in raw_emails.split(","):
|
2017-01-07 21:46:03 +01:00
|
|
|
try:
|
|
|
|
validators.validate_email(email)
|
|
|
|
emails.append(email)
|
|
|
|
except ValidationError:
|
|
|
|
pass
|
|
|
|
|
2021-02-12 08:19:30 +01:00
|
|
|
return render(
|
|
|
|
request,
|
2021-02-12 08:20:45 +01:00
|
|
|
"zerver/find_account.html",
|
|
|
|
context={"form": form, "current_url": lambda: url, "emails": emails},
|
2021-02-12 08:19:30 +01:00
|
|
|
)
|
|
|
|
|
2018-08-25 14:06:17 +02:00
|
|
|
|
2021-07-29 18:44:18 +02:00
|
|
|
@has_request_variables
|
|
|
|
def realm_redirect(request: HttpRequest, next: str = REQ(default="")) -> HttpResponse:
|
2021-02-12 08:20:45 +01:00
|
|
|
if request.method == "POST":
|
2018-08-25 14:06:17 +02:00
|
|
|
form = RealmRedirectForm(request.POST)
|
|
|
|
if form.is_valid():
|
2021-02-12 08:20:45 +01:00
|
|
|
subdomain = form.cleaned_data["subdomain"]
|
2018-08-25 14:06:17 +02:00
|
|
|
realm = get_realm(subdomain)
|
2021-07-29 18:44:18 +02:00
|
|
|
redirect_to = get_safe_redirect_to(next, realm.uri)
|
2018-08-25 14:06:17 +02:00
|
|
|
return HttpResponseRedirect(redirect_to)
|
|
|
|
else:
|
|
|
|
form = RealmRedirectForm()
|
|
|
|
|
2021-02-12 08:20:45 +01:00
|
|
|
return render(request, "zerver/realm_redirect.html", context={"form": form})
|