2017-11-16 00:43:27 +01:00
|
|
|
from argparse import ArgumentParser
|
2016-06-04 16:52:18 +02:00
|
|
|
from typing import Any
|
|
|
|
|
2017-08-07 20:32:44 +02:00
|
|
|
from django.core.management.base import CommandError
|
2013-06-24 21:42:46 +02:00
|
|
|
|
2020-05-21 00:13:06 +02:00
|
|
|
from zerver.lib.actions import do_change_user_role, do_change_is_api_super_user
|
2017-08-07 20:32:44 +02:00
|
|
|
from zerver.lib.management import ZulipBaseCommand
|
2020-05-21 00:13:06 +02:00
|
|
|
from zerver.models import UserProfile
|
2013-06-24 21:42:46 +02:00
|
|
|
|
2020-01-14 21:59:46 +01:00
|
|
|
|
2017-08-07 20:32:44 +02:00
|
|
|
class Command(ZulipBaseCommand):
|
2013-06-24 21:42:46 +02:00
|
|
|
help = """Give an existing user administrative permissions over their (own) Realm.
|
|
|
|
|
|
|
|
ONLY perform this on customer request from an authorized person.
|
|
|
|
"""
|
|
|
|
|
2017-10-26 11:35:57 +02:00
|
|
|
def add_arguments(self, parser: ArgumentParser) -> None:
|
2015-08-21 02:10:41 +02:00
|
|
|
parser.add_argument('-f', '--for-real',
|
|
|
|
dest='ack',
|
|
|
|
action="store_true",
|
|
|
|
default=False,
|
|
|
|
help='Acknowledgement that this is done according to policy.')
|
|
|
|
parser.add_argument('--revoke',
|
|
|
|
dest='grant',
|
|
|
|
action="store_false",
|
|
|
|
default=True,
|
|
|
|
help='Remove an administrator\'s rights.')
|
2015-09-20 19:32:01 +02:00
|
|
|
parser.add_argument('--permission',
|
|
|
|
dest='permission',
|
|
|
|
action="store",
|
|
|
|
default='administer',
|
2018-05-15 18:07:33 +02:00
|
|
|
choices=['administer', 'api_super_user', ],
|
2015-09-20 19:32:01 +02:00
|
|
|
help='Permission to grant/remove.')
|
2015-08-21 02:10:41 +02:00
|
|
|
parser.add_argument('email', metavar='<email>', type=str,
|
|
|
|
help="email of user to knight")
|
2017-08-07 20:32:44 +02:00
|
|
|
self.add_realm_args(parser, True)
|
2013-06-24 21:42:46 +02:00
|
|
|
|
2017-10-26 11:35:57 +02:00
|
|
|
def handle(self, *args: Any, **options: Any) -> None:
|
2015-08-21 02:10:41 +02:00
|
|
|
email = options['email']
|
2017-08-07 20:32:44 +02:00
|
|
|
realm = self.get_realm(options)
|
|
|
|
|
2019-07-08 22:42:05 +02:00
|
|
|
user = self.get_user(email, realm)
|
2013-06-24 21:57:40 +02:00
|
|
|
|
|
|
|
if options['grant']:
|
2019-07-08 22:43:54 +02:00
|
|
|
if (user.is_realm_admin and options['permission'] == "administer" or
|
|
|
|
user.is_api_super_user and options['permission'] == "api_super_user"):
|
2013-06-24 21:57:40 +02:00
|
|
|
raise CommandError("User already has permission for this realm.")
|
|
|
|
else:
|
2013-06-27 23:42:41 +02:00
|
|
|
if options['ack']:
|
2020-05-21 00:13:06 +02:00
|
|
|
if options['permission'] == "api_super_user":
|
|
|
|
do_change_is_api_super_user(user, True)
|
|
|
|
elif options['permission'] == "administer":
|
|
|
|
do_change_user_role(user, UserProfile.ROLE_REALM_ADMINISTRATOR)
|
2015-11-01 17:11:06 +01:00
|
|
|
print("Done!")
|
2013-06-27 23:42:41 +02:00
|
|
|
else:
|
2016-07-08 18:57:01 +02:00
|
|
|
print("Would have granted %s %s rights for %s" % (
|
2019-07-08 22:42:05 +02:00
|
|
|
email, options['permission'], user.realm.string_id))
|
2013-06-24 21:42:46 +02:00
|
|
|
else:
|
2019-07-08 22:43:54 +02:00
|
|
|
if (user.is_realm_admin and options['permission'] == "administer" or
|
|
|
|
user.is_api_super_user and options['permission'] == "api_super_user"):
|
2013-06-27 23:42:41 +02:00
|
|
|
if options['ack']:
|
2020-05-21 00:13:06 +02:00
|
|
|
if options['permission'] == "api_super_user":
|
|
|
|
do_change_is_api_super_user(user, False)
|
|
|
|
elif options['permission'] == "administer":
|
|
|
|
do_change_user_role(user, UserProfile.ROLE_MEMBER)
|
2015-11-01 17:11:06 +01:00
|
|
|
print("Done!")
|
2013-06-27 23:42:41 +02:00
|
|
|
else:
|
2015-11-01 17:11:06 +01:00
|
|
|
print("Would have removed %s's %s rights on %s" % (email, options['permission'],
|
2019-07-08 22:42:05 +02:00
|
|
|
user.realm.string_id))
|
2013-06-24 21:57:40 +02:00
|
|
|
else:
|
|
|
|
raise CommandError("User did not have permission for this realm!")
|