2019-09-14 01:53:42 +02:00
|
|
|
from typing import Any, List, Dict, Optional, Tuple
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
from django.conf import settings
|
2018-01-30 06:05:25 +01:00
|
|
|
from django.urls import reverse
|
2017-01-07 21:19:52 +01:00
|
|
|
from django.http import HttpResponseRedirect, HttpResponse, HttpRequest
|
2017-03-16 14:14:31 +01:00
|
|
|
from django.shortcuts import redirect, render
|
2017-01-07 21:19:52 +01:00
|
|
|
from django.utils import translation
|
|
|
|
from django.utils.cache import patch_cache_control
|
|
|
|
|
2020-01-29 20:41:23 +01:00
|
|
|
from zerver.context_processors import latest_info_context
|
|
|
|
from zerver.decorator import zulip_login_required
|
2017-01-07 21:19:52 +01:00
|
|
|
from zerver.forms import ToSForm
|
2019-09-14 01:53:42 +02:00
|
|
|
from zerver.models import Message, Stream, UserProfile, \
|
2019-02-02 23:53:22 +01:00
|
|
|
Realm, UserMessage, \
|
|
|
|
PreregistrationUser, \
|
|
|
|
get_usermessage_by_message_id
|
2017-02-10 23:04:46 +01:00
|
|
|
from zerver.lib.events import do_events_register
|
2019-02-02 23:53:22 +01:00
|
|
|
from zerver.lib.actions import do_change_tos_version, \
|
2018-03-14 00:01:04 +01:00
|
|
|
realm_user_count
|
2017-01-07 21:19:52 +01:00
|
|
|
from zerver.lib.i18n import get_language_list, get_language_name, \
|
2018-05-03 11:08:50 +02:00
|
|
|
get_language_list_for_templates, get_language_translation_data
|
2017-01-07 21:19:52 +01:00
|
|
|
from zerver.lib.push_notifications import num_push_devices_for_user
|
2017-01-30 03:11:00 +01:00
|
|
|
from zerver.lib.streams import access_stream_by_name
|
2017-10-19 07:21:57 +02:00
|
|
|
from zerver.lib.subdomains import get_subdomain
|
2020-01-13 18:47:30 +01:00
|
|
|
from zerver.lib.users import compute_show_invites_and_add_streams
|
2018-04-11 20:10:36 +02:00
|
|
|
from zerver.lib.utils import statsd, generate_random_token
|
2020-02-28 09:55:29 +01:00
|
|
|
from zerver.views.compatibility import is_outdated_desktop_app
|
2017-07-17 07:17:21 +02:00
|
|
|
from two_factor.utils import default_device
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
import calendar
|
|
|
|
import logging
|
|
|
|
import time
|
|
|
|
|
2019-09-14 01:38:28 +02:00
|
|
|
def need_accept_tos(user_profile: Optional[UserProfile]) -> bool:
|
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
return False
|
|
|
|
|
|
|
|
if settings.TERMS_OF_SERVICE is None: # nocoverage
|
|
|
|
return False
|
|
|
|
|
|
|
|
if settings.TOS_VERSION is None:
|
|
|
|
return False
|
|
|
|
|
|
|
|
return int(settings.TOS_VERSION.split('.')[0]) > user_profile.major_tos_version()
|
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
@zulip_login_required
|
2017-11-27 09:28:57 +01:00
|
|
|
def accounts_accept_terms(request: HttpRequest) -> HttpResponse:
|
2017-01-07 21:19:52 +01:00
|
|
|
if request.method == "POST":
|
|
|
|
form = ToSForm(request.POST)
|
|
|
|
if form.is_valid():
|
|
|
|
do_change_tos_version(request.user, settings.TOS_VERSION)
|
|
|
|
return redirect(home)
|
|
|
|
else:
|
|
|
|
form = ToSForm()
|
|
|
|
|
|
|
|
email = request.user.email
|
|
|
|
special_message_template = None
|
|
|
|
if request.user.tos_version is None and settings.FIRST_TIME_TOS_TEMPLATE is not None:
|
|
|
|
special_message_template = 'zerver/' + settings.FIRST_TIME_TOS_TEMPLATE
|
2017-03-16 14:14:31 +01:00
|
|
|
return render(
|
|
|
|
request,
|
2017-01-07 21:19:52 +01:00
|
|
|
'zerver/accounts_accept_terms.html',
|
2017-03-16 14:14:31 +01:00
|
|
|
context={'form': form,
|
|
|
|
'email': email,
|
|
|
|
'special_message_template': special_message_template},
|
|
|
|
)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2019-09-14 01:53:42 +02:00
|
|
|
def detect_narrowed_window(request: HttpRequest,
|
|
|
|
user_profile: Optional[UserProfile]) -> Tuple[List[List[str]],
|
|
|
|
Optional[Stream],
|
|
|
|
Optional[str]]:
|
|
|
|
"""This function implements Zulip's support for a mini Zulip window
|
|
|
|
that just handles messages from a single narrow"""
|
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
return [], None, None
|
|
|
|
|
|
|
|
narrow = [] # type: List[List[str]]
|
|
|
|
narrow_stream = None
|
|
|
|
narrow_topic = request.GET.get("topic")
|
|
|
|
|
|
|
|
if request.GET.get("stream"):
|
|
|
|
try:
|
|
|
|
# TODO: We should support stream IDs and PMs here as well.
|
|
|
|
narrow_stream_name = request.GET.get("stream")
|
|
|
|
(narrow_stream, ignored_rec, ignored_sub) = access_stream_by_name(
|
|
|
|
user_profile, narrow_stream_name)
|
|
|
|
narrow = [["stream", narrow_stream.name]]
|
|
|
|
except Exception:
|
|
|
|
logging.warning("Invalid narrow requested, ignoring", extra=dict(request=request))
|
|
|
|
if narrow_stream is not None and narrow_topic is not None:
|
|
|
|
narrow.append(["topic", narrow_topic])
|
|
|
|
return narrow, narrow_stream, narrow_topic
|
|
|
|
|
2019-09-14 01:56:29 +02:00
|
|
|
def update_last_reminder(user_profile: Optional[UserProfile]) -> None:
|
|
|
|
"""Reset our don't-spam-users-with-email counter since the
|
|
|
|
user has since logged in
|
|
|
|
"""
|
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
return
|
|
|
|
|
|
|
|
if user_profile.last_reminder is not None: # nocoverage
|
|
|
|
# TODO: Look into the history of last_reminder; we may have
|
|
|
|
# eliminated that as a useful concept for non-bot users.
|
|
|
|
user_profile.last_reminder = None
|
|
|
|
user_profile.save(update_fields=["last_reminder"])
|
|
|
|
|
2017-11-27 09:28:57 +01:00
|
|
|
def sent_time_in_epoch_seconds(user_message: Optional[UserMessage]) -> Optional[float]:
|
2017-08-09 01:48:33 +02:00
|
|
|
if user_message is None:
|
2017-01-07 21:19:52 +01:00
|
|
|
return None
|
|
|
|
# We have USE_TZ = True, so our datetime objects are timezone-aware.
|
|
|
|
# Return the epoch seconds in UTC.
|
2019-08-28 02:43:19 +02:00
|
|
|
return calendar.timegm(user_message.message.date_sent.utctimetuple())
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2019-09-14 02:09:27 +02:00
|
|
|
def get_bot_types(user_profile: Optional[UserProfile]) -> List[Dict[str, object]]:
|
|
|
|
bot_types = [] # type: List[Dict[str, object]]
|
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
return bot_types
|
|
|
|
|
2017-11-22 23:58:58 +01:00
|
|
|
for type_id, name in UserProfile.BOT_TYPES.items():
|
|
|
|
bot_types.append({
|
|
|
|
'type_id': type_id,
|
|
|
|
'name': name,
|
2017-11-24 16:24:24 +01:00
|
|
|
'allowed': type_id in user_profile.allowed_bot_types
|
2017-11-22 23:58:58 +01:00
|
|
|
})
|
|
|
|
return bot_types
|
|
|
|
|
2019-03-02 18:23:57 +01:00
|
|
|
def compute_navbar_logo_url(page_params: Dict[str, Any]) -> str:
|
|
|
|
if page_params["night_mode"] and page_params["realm_night_logo_source"] != Realm.LOGO_DEFAULT:
|
|
|
|
navbar_logo_url = page_params["realm_night_logo_url"]
|
|
|
|
else:
|
|
|
|
navbar_logo_url = page_params["realm_logo_url"]
|
|
|
|
return navbar_logo_url
|
|
|
|
|
2017-11-27 09:28:57 +01:00
|
|
|
def home(request: HttpRequest) -> HttpResponse:
|
2017-08-25 04:32:16 +02:00
|
|
|
if not settings.ROOT_DOMAIN_LANDING_PAGE:
|
2017-01-07 21:19:52 +01:00
|
|
|
return home_real(request)
|
|
|
|
|
2017-08-25 04:32:16 +02:00
|
|
|
# If settings.ROOT_DOMAIN_LANDING_PAGE, sends the user the landing
|
2017-01-07 21:19:52 +01:00
|
|
|
# page, not the login form, on the root domain
|
|
|
|
|
|
|
|
subdomain = get_subdomain(request)
|
2017-10-20 02:56:49 +02:00
|
|
|
if subdomain != Realm.SUBDOMAIN_FOR_ROOT_DOMAIN:
|
2017-01-07 21:19:52 +01:00
|
|
|
return home_real(request)
|
|
|
|
|
2019-03-20 13:13:44 +01:00
|
|
|
return render(request, 'zerver/hello.html', latest_info_context())
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
@zulip_login_required
|
2017-11-27 09:28:57 +01:00
|
|
|
def home_real(request: HttpRequest) -> HttpResponse:
|
2020-03-25 02:00:28 +01:00
|
|
|
# Before we do any real work, check if the app is banned.
|
|
|
|
(insecure_desktop_app, banned_desktop_app, auto_update_broken) = is_outdated_desktop_app(
|
|
|
|
request.META.get("HTTP_USER_AGENT", ""))
|
|
|
|
if banned_desktop_app:
|
|
|
|
return render(
|
|
|
|
request,
|
|
|
|
'zerver/insecure_desktop_app.html',
|
|
|
|
context={
|
|
|
|
"auto_update_broken": auto_update_broken,
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
# We need to modify the session object every two weeks or it will expire.
|
|
|
|
# This line makes reloading the page a sufficient action to keep the
|
|
|
|
# session alive.
|
|
|
|
request.session.modified = True
|
|
|
|
|
2019-09-14 01:38:28 +02:00
|
|
|
if request.user.is_authenticated:
|
|
|
|
user_profile = request.user
|
|
|
|
else: # nocoverage
|
|
|
|
# This code path should not be reachable because of zulip_login_required above.
|
|
|
|
user_profile = None
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
# If a user hasn't signed the current Terms of Service, send them there
|
2019-09-14 01:38:28 +02:00
|
|
|
if need_accept_tos(user_profile):
|
2017-01-07 21:19:52 +01:00
|
|
|
return accounts_accept_terms(request)
|
|
|
|
|
2019-09-14 01:53:42 +02:00
|
|
|
narrow, narrow_stream, narrow_topic = detect_narrowed_window(request, user_profile)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
register_ret = do_events_register(user_profile, request.client,
|
2017-11-02 20:19:49 +01:00
|
|
|
apply_markdown=True, client_gravatar=True,
|
2020-02-02 17:29:05 +01:00
|
|
|
slim_presence=True,
|
2019-02-13 10:22:16 +01:00
|
|
|
notification_settings_null=True,
|
2017-10-31 18:36:18 +01:00
|
|
|
narrow=narrow)
|
2017-01-07 21:19:52 +01:00
|
|
|
user_has_messages = (register_ret['max_message_id'] != -1)
|
2019-09-14 01:56:29 +02:00
|
|
|
update_last_reminder(user_profile)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2019-09-14 02:09:27 +02:00
|
|
|
if user_profile is not None:
|
|
|
|
first_in_realm = realm_user_count(user_profile.realm) == 1
|
|
|
|
# If you are the only person in the realm and you didn't invite
|
|
|
|
# anyone, we'll continue to encourage you to do so on the frontend.
|
|
|
|
prompt_for_invites = (
|
|
|
|
first_in_realm and
|
|
|
|
not PreregistrationUser.objects.filter(referred_by=user_profile).count()
|
|
|
|
)
|
|
|
|
needs_tutorial = user_profile.tutorial_status == UserProfile.TUTORIAL_WAITING
|
|
|
|
else: # nocoverage
|
|
|
|
first_in_realm = False
|
|
|
|
prompt_for_invites = False
|
|
|
|
# The current tutorial doesn't super make sense for logged-out users.
|
|
|
|
needs_tutorial = False
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2019-09-14 02:09:27 +02:00
|
|
|
if user_profile is None: # nocoverage
|
|
|
|
furthest_read_time = time.time() # type: Optional[float]
|
|
|
|
elif user_profile.pointer == -1:
|
|
|
|
if user_has_messages:
|
|
|
|
# Put the new user's pointer at the bottom
|
|
|
|
#
|
|
|
|
# This improves performance, because we limit backfilling of messages
|
|
|
|
# before the pointer. It's also likely that someone joining an
|
|
|
|
# organization is interested in recent messages more than the very
|
|
|
|
# first messages on the system.
|
|
|
|
|
|
|
|
register_ret['pointer'] = register_ret['max_message_id']
|
|
|
|
user_profile.last_pointer_updater = request.session.session_key
|
|
|
|
furthest_read_time = None
|
2017-01-07 21:19:52 +01:00
|
|
|
else:
|
2018-07-27 11:47:07 +02:00
|
|
|
latest_read = get_usermessage_by_message_id(user_profile, user_profile.pointer)
|
|
|
|
if latest_read is None:
|
2017-01-07 21:19:52 +01:00
|
|
|
# Don't completely fail if your saved pointer ID is invalid
|
2019-11-16 01:58:47 +01:00
|
|
|
logging.warning("User %s has invalid pointer %s" % (user_profile.id, user_profile.pointer))
|
2019-09-14 02:09:27 +02:00
|
|
|
furthest_read_time = sent_time_in_epoch_seconds(latest_read)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2018-05-30 17:30:33 +02:00
|
|
|
# We pick a language for the user as follows:
|
|
|
|
# * First priority is the language in the URL, for debugging.
|
|
|
|
# * If not in the URL, we use the language from the user's settings.
|
|
|
|
request_language = translation.get_language_from_path(request.path_info)
|
|
|
|
if request_language is None:
|
|
|
|
request_language = register_ret['default_language']
|
|
|
|
translation.activate(request_language)
|
|
|
|
# We also save the language to the user's session, so that
|
|
|
|
# something reasonable will happen in logged-in portico pages.
|
|
|
|
request.session[translation.LANGUAGE_SESSION_KEY] = translation.get_language()
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2019-09-14 02:09:27 +02:00
|
|
|
two_fa_enabled = settings.TWO_FACTOR_AUTHENTICATION_ENABLED and user_profile is not None
|
2019-01-27 18:57:15 +01:00
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
# Pass parameters to the client-side JavaScript code.
|
|
|
|
# These end up in a global JavaScript Object named 'page_params'.
|
|
|
|
page_params = dict(
|
2017-02-28 23:41:41 +01:00
|
|
|
# Server settings.
|
2017-01-07 21:19:52 +01:00
|
|
|
development_environment = settings.DEVELOPMENT,
|
|
|
|
debug_mode = settings.DEBUG,
|
|
|
|
test_suite = settings.TEST_SUITE,
|
|
|
|
poll_timeout = settings.POLL_TIMEOUT,
|
2020-03-25 02:00:28 +01:00
|
|
|
insecure_desktop_app = insecure_desktop_app,
|
2017-01-07 21:19:52 +01:00
|
|
|
login_page = settings.HOME_NOT_LOGGED_IN,
|
2017-08-28 23:01:18 +02:00
|
|
|
root_domain_uri = settings.ROOT_DOMAIN_URI,
|
2019-05-03 17:55:04 +02:00
|
|
|
max_file_upload_size = settings.MAX_FILE_UPLOAD_SIZE,
|
2017-03-06 06:22:28 +01:00
|
|
|
max_avatar_file_size = settings.MAX_AVATAR_FILE_SIZE,
|
2017-01-07 21:19:52 +01:00
|
|
|
server_generation = settings.SERVER_GENERATION,
|
2017-02-28 23:41:41 +01:00
|
|
|
save_stacktraces = settings.SAVE_FRONTEND_STACKTRACES,
|
2018-01-26 22:09:38 +01:00
|
|
|
warn_no_email = settings.WARN_NO_EMAIL,
|
2017-03-13 14:42:03 +01:00
|
|
|
server_inline_image_preview = settings.INLINE_IMAGE_PREVIEW,
|
|
|
|
server_inline_url_embed_preview = settings.INLINE_URL_EMBED_PREVIEW,
|
2017-07-06 22:32:29 +02:00
|
|
|
password_min_length = settings.PASSWORD_MIN_LENGTH,
|
passwords: Express the quality threshold as guesses required.
The original "quality score" was invented purely for populating
our password-strength progress bar, and isn't expressed in terms
that are particularly meaningful. For configuration and the core
accept/reject logic, it's better to use units that are readily
understood. Switch to those.
I considered using "bits of entropy", defined loosely as the log
of this number, but both the zxcvbn paper and the linked CACM
article (which I recommend!) are written in terms of the number
of guesses. And reading (most of) those two papers made me
less happy about referring to "entropy" in our terminology.
I already knew that notion was a little fuzzy if looked at
too closely, and I gained a better appreciation of how it's
contributed to confusion in discussing password policies and
to adoption of perverse policies that favor "Password1!" over
"derived unusual ravioli raft". So, "guesses" it is.
And although the log is handy for some analysis purposes
(certainly for a graph like those in the zxcvbn paper), it adds
a layer of abstraction, and I think makes it harder to think
clearly about attacks, especially in the online setting. So
just use the actual number, and if someone wants to set a
gigantic value, they will have the pleasure of seeing just
how many digits are involved.
(Thanks to @YJDave for a prototype that the code changes in this
commit are based on.)
2017-10-03 19:48:06 +02:00
|
|
|
password_min_guesses = settings.PASSWORD_MIN_GUESSES,
|
2018-04-03 01:46:55 +02:00
|
|
|
jitsi_server_url = settings.JITSI_SERVER_URL,
|
2018-07-14 11:32:08 +02:00
|
|
|
search_pills_enabled = settings.SEARCH_PILLS_ENABLED,
|
2019-04-29 08:41:00 +02:00
|
|
|
server_avatar_changes_disabled = settings.AVATAR_CHANGES_DISABLED,
|
2019-05-03 08:09:03 +02:00
|
|
|
server_name_changes_disabled = settings.NAME_CHANGES_DISABLED,
|
2017-02-28 23:41:41 +01:00
|
|
|
|
|
|
|
# Misc. extra data.
|
|
|
|
have_initial_messages = user_has_messages,
|
2017-05-17 22:10:00 +02:00
|
|
|
initial_servertime = time.time(), # Used for calculating relative presence age
|
2017-02-28 23:41:41 +01:00
|
|
|
default_language_name = get_language_name(register_ret['default_language']),
|
|
|
|
language_list_dbl_col = get_language_list_for_templates(register_ret['default_language']),
|
|
|
|
language_list = get_language_list(),
|
|
|
|
needs_tutorial = needs_tutorial,
|
|
|
|
first_in_realm = first_in_realm,
|
|
|
|
prompt_for_invites = prompt_for_invites,
|
2019-09-14 02:09:27 +02:00
|
|
|
furthest_read_time = furthest_read_time,
|
|
|
|
has_mobile_devices = user_profile is not None and num_push_devices_for_user(user_profile) > 0,
|
2017-11-24 16:24:24 +01:00
|
|
|
bot_types = get_bot_types(user_profile),
|
2017-07-17 07:17:21 +02:00
|
|
|
two_fa_enabled = two_fa_enabled,
|
|
|
|
# Adding two_fa_enabled as condition saves us 3 queries when
|
|
|
|
# 2FA is not enabled.
|
|
|
|
two_fa_enabled_user = two_fa_enabled and bool(default_device(user_profile)),
|
2017-01-07 21:19:52 +01:00
|
|
|
)
|
|
|
|
|
2017-05-14 07:49:35 +02:00
|
|
|
undesired_register_ret_fields = [
|
|
|
|
'streams',
|
2017-02-28 23:31:10 +01:00
|
|
|
]
|
2017-05-14 07:49:35 +02:00
|
|
|
for field_name in set(register_ret.keys()) - set(undesired_register_ret_fields):
|
2017-02-28 23:31:10 +01:00
|
|
|
page_params[field_name] = register_ret[field_name]
|
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
if narrow_stream is not None:
|
|
|
|
# In narrow_stream context, initial pointer is just latest message
|
2019-12-05 23:26:24 +01:00
|
|
|
recipient = narrow_stream.recipient
|
2017-01-07 21:19:52 +01:00
|
|
|
try:
|
|
|
|
initial_pointer = Message.objects.filter(recipient=recipient).order_by('id').reverse()[0].id
|
|
|
|
except IndexError:
|
|
|
|
initial_pointer = -1
|
|
|
|
page_params["narrow_stream"] = narrow_stream.name
|
|
|
|
if narrow_topic is not None:
|
|
|
|
page_params["narrow_topic"] = narrow_topic
|
|
|
|
page_params["narrow"] = [dict(operator=term[0], operand=term[1]) for term in narrow]
|
|
|
|
page_params["max_message_id"] = initial_pointer
|
2017-04-24 21:33:48 +02:00
|
|
|
page_params["pointer"] = initial_pointer
|
2017-01-07 21:19:52 +01:00
|
|
|
page_params["have_initial_messages"] = (initial_pointer != -1)
|
2017-04-29 08:13:47 +02:00
|
|
|
page_params["enable_desktop_notifications"] = False
|
2017-01-07 21:19:52 +01:00
|
|
|
|
|
|
|
statsd.incr('views.home')
|
2020-01-13 18:47:30 +01:00
|
|
|
show_invites, show_add_streams = compute_show_invites_and_add_streams(user_profile)
|
2017-01-07 21:19:52 +01:00
|
|
|
|
2018-08-15 18:49:25 +02:00
|
|
|
show_billing = False
|
|
|
|
show_plans = False
|
2019-09-14 02:24:21 +02:00
|
|
|
if settings.CORPORATE_ENABLED and user_profile is not None:
|
2019-01-31 22:58:28 +01:00
|
|
|
from corporate.models import Customer, CustomerPlan
|
2018-08-15 18:49:25 +02:00
|
|
|
if user_profile.is_billing_admin or user_profile.is_realm_admin:
|
|
|
|
customer = Customer.objects.filter(realm=user_profile.realm).first()
|
2019-01-31 22:58:28 +01:00
|
|
|
if customer is not None and CustomerPlan.objects.filter(customer=customer).exists():
|
2018-08-15 18:49:25 +02:00
|
|
|
show_billing = True
|
|
|
|
if user_profile.realm.plan_type == Realm.LIMITED:
|
|
|
|
show_plans = True
|
|
|
|
|
2017-01-07 21:19:52 +01:00
|
|
|
request._log_data['extra'] = "[%s]" % (register_ret["queue_id"],)
|
2018-04-11 20:10:36 +02:00
|
|
|
|
2018-05-03 11:08:50 +02:00
|
|
|
page_params['translation_data'] = {}
|
2018-05-30 17:30:33 +02:00
|
|
|
if request_language != 'en':
|
|
|
|
page_params['translation_data'] = get_language_translation_data(request_language)
|
2018-05-03 11:08:50 +02:00
|
|
|
|
2018-04-11 20:10:36 +02:00
|
|
|
csp_nonce = generate_random_token(48)
|
2019-09-14 02:24:21 +02:00
|
|
|
if user_profile is not None:
|
2019-09-14 02:30:23 +02:00
|
|
|
night_mode = user_profile.night_mode
|
|
|
|
is_guest = user_profile.is_guest
|
|
|
|
is_realm_admin = user_profile.is_realm_admin
|
|
|
|
show_webathena = user_profile.realm.webathena_enabled
|
2019-09-14 02:24:21 +02:00
|
|
|
else: # nocoverage
|
2019-09-14 02:30:23 +02:00
|
|
|
night_mode = False
|
|
|
|
is_guest = False
|
|
|
|
is_realm_admin = False
|
|
|
|
show_webathena = False
|
2019-03-02 18:23:57 +01:00
|
|
|
|
|
|
|
navbar_logo_url = compute_navbar_logo_url(page_params)
|
|
|
|
|
2018-04-22 07:02:19 +02:00
|
|
|
response = render(request, 'zerver/app/index.html',
|
2017-03-16 14:14:31 +01:00
|
|
|
context={'user_profile': user_profile,
|
2019-09-13 01:15:53 +02:00
|
|
|
'page_params': page_params,
|
2018-04-11 20:10:36 +02:00
|
|
|
'csp_nonce': csp_nonce,
|
2018-07-14 11:39:33 +02:00
|
|
|
'search_pills_enabled': settings.SEARCH_PILLS_ENABLED,
|
2017-03-16 14:14:31 +01:00
|
|
|
'show_invites': show_invites,
|
2019-05-11 19:44:27 +02:00
|
|
|
'show_add_streams': show_add_streams,
|
2018-08-15 18:49:25 +02:00
|
|
|
'show_billing': show_billing,
|
|
|
|
'show_plans': show_plans,
|
2019-09-14 02:30:23 +02:00
|
|
|
'is_admin': is_realm_admin,
|
|
|
|
'is_guest': is_guest,
|
|
|
|
'night_mode': night_mode,
|
2019-03-02 18:23:57 +01:00
|
|
|
'navbar_logo_url': navbar_logo_url,
|
2019-09-14 02:30:23 +02:00
|
|
|
'show_webathena': show_webathena,
|
2017-03-16 14:14:31 +01:00
|
|
|
'embedded': narrow_stream is not None,
|
2018-12-30 11:06:12 +01:00
|
|
|
'invite_as': PreregistrationUser.INVITE_AS,
|
2019-05-04 20:24:36 +02:00
|
|
|
'max_file_upload_size': settings.MAX_FILE_UPLOAD_SIZE,
|
2017-03-16 14:14:31 +01:00
|
|
|
},)
|
2017-01-07 21:19:52 +01:00
|
|
|
patch_cache_control(response, no_cache=True, no_store=True, must_revalidate=True)
|
|
|
|
return response
|
|
|
|
|
|
|
|
@zulip_login_required
|
2017-11-27 09:28:57 +01:00
|
|
|
def desktop_home(request: HttpRequest) -> HttpResponse:
|
2017-01-07 21:19:52 +01:00
|
|
|
return HttpResponseRedirect(reverse('zerver.views.home.home'))
|