from django.conf import settings from django.db import transaction from django.http import HttpRequest, HttpResponse from django.utils.translation import gettext as _ from django.utils.translation import override as override_language from pydantic import Json from zerver.actions.message_send import do_send_messages, internal_prep_private_message from zerver.actions.user_groups import ( add_subgroups_to_user_group, bulk_add_members_to_user_groups, bulk_remove_members_from_user_groups, check_add_user_group, do_change_user_group_permission_setting, do_deactivate_user_group, do_update_user_group_description, do_update_user_group_name, remove_subgroups_from_user_group, ) from zerver.decorator import require_member_or_admin, require_user_group_create_permission from zerver.lib.exceptions import JsonableError from zerver.lib.mention import MentionBackend, silent_mention_syntax_for_user from zerver.lib.response import json_success from zerver.lib.typed_endpoint import PathOnly, typed_endpoint from zerver.lib.user_groups import ( AnonymousSettingGroupDict, GroupSettingChangeRequest, access_user_group_for_deactivation, access_user_group_for_setting, access_user_group_for_update, access_user_group_to_read_membership, check_user_group_name, get_direct_memberships_of_users, get_group_setting_value_for_api, get_subgroup_ids, get_user_group_direct_member_ids, get_user_group_member_ids, is_user_in_group, lock_subgroups_with_respect_to_supergroup, parse_group_setting_value, user_groups_in_realm_serialized, validate_group_setting_value_change, ) from zerver.lib.users import access_user_by_id, user_ids_to_users from zerver.models import NamedUserGroup, UserProfile from zerver.models.users import get_system_bot from zerver.views.streams import compose_views @transaction.atomic(durable=True) @require_user_group_create_permission @typed_endpoint def add_user_group( request: HttpRequest, user_profile: UserProfile, *, name: str, members: Json[list[int]], description: str, subgroups: Json[list[int]] | None = None, can_add_members_group: Json[int | AnonymousSettingGroupDict] | None = None, can_join_group: Json[int | AnonymousSettingGroupDict] | None = None, can_leave_group: Json[int | AnonymousSettingGroupDict] | None = None, can_manage_group: Json[int | AnonymousSettingGroupDict] | None = None, can_mention_group: Json[int | AnonymousSettingGroupDict] | None = None, ) -> HttpResponse: user_profiles = user_ids_to_users(members, user_profile.realm, allow_deactivated=False) name = check_user_group_name(name) group_settings_map = {} request_settings_dict = locals() for setting_name, permission_config in NamedUserGroup.GROUP_PERMISSION_SETTINGS.items(): if setting_name not in request_settings_dict: # nocoverage continue if request_settings_dict[setting_name] is not None: setting_value = parse_group_setting_value( request_settings_dict[setting_name], setting_name ) setting_value_group = access_user_group_for_setting( setting_value, user_profile, setting_name=setting_name, permission_configuration=permission_config, ) group_settings_map[setting_name] = setting_value_group user_group = check_add_user_group( user_profile.realm, name, user_profiles, description, group_settings_map=group_settings_map, acting_user=user_profile, ) if subgroups is not None and len(subgroups) != 0: with lock_subgroups_with_respect_to_supergroup( subgroups, user_group.id, user_profile, permission_setting=None, creating_group=True ) as context: add_subgroups_to_user_group( context.supergroup, context.direct_subgroups, acting_user=user_profile ) return json_success(request, data={"group_id": user_group.id}) @require_member_or_admin @typed_endpoint def get_user_groups( request: HttpRequest, user_profile: UserProfile, *, include_deactivated_groups: Json[bool] = False, ) -> HttpResponse: user_groups = user_groups_in_realm_serialized( user_profile.realm, include_deactivated_groups=include_deactivated_groups ) return json_success(request, data={"user_groups": user_groups}) @transaction.atomic(durable=True) @require_member_or_admin @typed_endpoint def edit_user_group( request: HttpRequest, user_profile: UserProfile, *, user_group_id: PathOnly[int], name: str | None = None, description: str | None = None, can_add_members_group: Json[GroupSettingChangeRequest] | None = None, can_join_group: Json[GroupSettingChangeRequest] | None = None, can_leave_group: Json[GroupSettingChangeRequest] | None = None, can_manage_group: Json[GroupSettingChangeRequest] | None = None, can_mention_group: Json[GroupSettingChangeRequest] | None = None, ) -> HttpResponse: if ( name is None and description is None and can_add_members_group is None and can_join_group is None and can_leave_group is None and can_manage_group is None and can_mention_group is None ): raise JsonableError(_("No new data supplied")) user_group = access_user_group_for_update( user_group_id, user_profile, permission_setting="can_manage_group", allow_deactivated=True ) if user_group.deactivated and ( description is not None or can_add_members_group is not None or can_join_group is not None or can_leave_group is not None or can_mention_group is not None or can_manage_group is not None ): raise JsonableError(_("You can only change name of deactivated user groups")) if name is not None and name != user_group.name: name = check_user_group_name(name) do_update_user_group_name(user_group, name, acting_user=user_profile) if description is not None and description != user_group.description: do_update_user_group_description(user_group, description, acting_user=user_profile) request_settings_dict = locals() for setting_name, permission_config in NamedUserGroup.GROUP_PERMISSION_SETTINGS.items(): if setting_name not in request_settings_dict: # nocoverage continue if request_settings_dict[setting_name] is None: continue setting_value = request_settings_dict[setting_name] new_setting_value = parse_group_setting_value(setting_value.new, setting_name) expected_current_setting_value = None if setting_value.old is not None: expected_current_setting_value = parse_group_setting_value( setting_value.old, setting_name ) current_value = getattr(user_group, setting_name) current_setting_api_value = get_group_setting_value_for_api(current_value) if validate_group_setting_value_change( current_setting_api_value, new_setting_value, expected_current_setting_value ): setting_value_group = access_user_group_for_setting( new_setting_value, user_profile, setting_name=setting_name, permission_configuration=permission_config, current_setting_value=current_value, ) do_change_user_group_permission_setting( user_group, setting_name, setting_value_group, old_setting_api_value=current_setting_api_value, acting_user=user_profile, ) return json_success(request) @typed_endpoint @transaction.atomic(durable=True) def deactivate_user_group( request: HttpRequest, user_profile: UserProfile, *, user_group_id: PathOnly[Json[int]], ) -> HttpResponse: user_group = access_user_group_for_deactivation(user_group_id, user_profile) do_deactivate_user_group(user_group, acting_user=user_profile) return json_success(request) @require_member_or_admin @typed_endpoint @transaction.atomic(durable=True) def update_user_group_backend( request: HttpRequest, user_profile: UserProfile, *, user_group_id: PathOnly[Json[int]], delete: Json[list[int]] | None = None, add: Json[list[int]] | None = None, delete_subgroups: Json[list[int]] | None = None, add_subgroups: Json[list[int]] | None = None, ) -> HttpResponse: if not add and not delete and not add_subgroups and not delete_subgroups: raise JsonableError( _( 'Nothing to do. Specify at least one of "add", "delete", "add_subgroups" or "delete_subgroups".' ) ) thunks = [] if add: thunks.append( lambda: add_members_to_group_backend( request, user_profile, user_group_id=user_group_id, members=add ) ) if delete: thunks.append( lambda: remove_members_from_group_backend( request, user_profile, user_group_id=user_group_id, members=delete ) ) if add_subgroups: thunks.append( lambda: add_subgroups_to_group_backend( request, user_profile, user_group_id=user_group_id, subgroup_ids=add_subgroups ) ) if delete_subgroups: thunks.append( lambda: remove_subgroups_from_group_backend( request, user_profile, user_group_id=user_group_id, subgroup_ids=delete_subgroups ) ) data = compose_views(thunks) return json_success(request, data) def notify_for_user_group_subscription_changes( acting_user: UserProfile, recipient_users: list[UserProfile], user_group: NamedUserGroup, *, send_subscription_message: bool = False, send_unsubscription_message: bool = False, ) -> None: realm = acting_user.realm mention_backend = MentionBackend(realm.id) notifications = [] notification_bot = get_system_bot(settings.NOTIFICATION_BOT, realm.id) for recipient_user in recipient_users: if recipient_user.id == acting_user.id: # Don't send notification message if you subscribed/unsubscribed yourself. continue if recipient_user.is_bot: # Don't send notification message to bots. continue assert recipient_user.is_active with override_language(recipient_user.default_language): if send_subscription_message: message = _("{user_full_name} added you to the group {group_name}.").format( user_full_name=silent_mention_syntax_for_user(acting_user), group_name=f"@_*{user_group.name}*", ) if send_unsubscription_message: message = _("{user_full_name} removed you from the group {group_name}.").format( user_full_name=silent_mention_syntax_for_user(acting_user), group_name=f"@_*{user_group.name}*", ) notifications.append( internal_prep_private_message( sender=notification_bot, recipient_user=recipient_user, content=message, mention_backend=mention_backend, ) ) if len(notifications) > 0: do_send_messages(notifications) def add_members_to_group_backend( request: HttpRequest, user_profile: UserProfile, user_group_id: int, members: list[int], ) -> HttpResponse: if len(members) == 1 and user_profile.id == members[0]: try: user_group = access_user_group_for_update( user_group_id, user_profile, permission_setting="can_join_group" ) except JsonableError: # User can still join the group if user has permission to add # anyone in the group. user_group = access_user_group_for_update( user_group_id, user_profile, permission_setting="can_add_members_group" ) else: user_group = access_user_group_for_update( user_group_id, user_profile, permission_setting="can_add_members_group" ) member_users = user_ids_to_users(members, user_profile.realm, allow_deactivated=False) existing_member_ids = set( get_direct_memberships_of_users(user_group.usergroup_ptr, member_users) ) for member_user in member_users: if member_user.id in existing_member_ids: raise JsonableError( _("User {user_id} is already a member of this group").format( user_id=member_user.id, ) ) member_user_ids = [member_user.id for member_user in member_users] bulk_add_members_to_user_groups([user_group], member_user_ids, acting_user=user_profile) notify_for_user_group_subscription_changes( acting_user=user_profile, recipient_users=member_users, user_group=user_group, send_subscription_message=True, ) return json_success(request) def remove_members_from_group_backend( request: HttpRequest, user_profile: UserProfile, user_group_id: int, members: list[int], ) -> HttpResponse: user_profiles = user_ids_to_users(members, user_profile.realm, allow_deactivated=False) if len(members) == 1 and user_profile.id == members[0]: user_group = access_user_group_for_update( user_group_id, user_profile, permission_setting="can_leave_group" ) else: user_group = access_user_group_for_update( user_group_id, user_profile, permission_setting="can_manage_group" ) group_member_ids = get_user_group_direct_member_ids(user_group) for member in members: if member not in group_member_ids: raise JsonableError( _("There is no member '{user_id}' in this user group").format(user_id=member) ) user_profile_ids = [user.id for user in user_profiles] bulk_remove_members_from_user_groups([user_group], user_profile_ids, acting_user=user_profile) notify_for_user_group_subscription_changes( acting_user=user_profile, recipient_users=user_profiles, user_group=user_group, send_unsubscription_message=True, ) return json_success(request) def add_subgroups_to_group_backend( request: HttpRequest, user_profile: UserProfile, user_group_id: int, subgroup_ids: list[int], ) -> HttpResponse: with lock_subgroups_with_respect_to_supergroup( subgroup_ids, user_group_id, user_profile, permission_setting="can_add_members_group" ) as context: existing_direct_subgroup_ids = context.supergroup.direct_subgroups.all().values_list( "id", flat=True ) for group in context.direct_subgroups: if group.id in existing_direct_subgroup_ids: raise JsonableError( _("User group {group_id} is already a subgroup of this group.").format( group_id=group.id ) ) recursive_subgroup_ids = { recursive_subgroup.id for recursive_subgroup in context.recursive_subgroups } if user_group_id in recursive_subgroup_ids: raise JsonableError( _( "User group {user_group_id} is already a subgroup of one of the passed subgroups." ).format(user_group_id=user_group_id) ) add_subgroups_to_user_group( context.supergroup, context.direct_subgroups, acting_user=user_profile ) return json_success(request) def remove_subgroups_from_group_backend( request: HttpRequest, user_profile: UserProfile, user_group_id: int, subgroup_ids: list[int], ) -> HttpResponse: with lock_subgroups_with_respect_to_supergroup( subgroup_ids, user_group_id, user_profile, permission_setting="can_manage_group" ) as context: # While the recursive subgroups in the context are not used, it is important that # we acquire a lock for these rows while updating the subgroups to acquire the locks # in a consistent order for subgroup membership changes. existing_direct_subgroup_ids = context.supergroup.direct_subgroups.all().values_list( "id", flat=True ) for group in context.direct_subgroups: if group.id not in existing_direct_subgroup_ids: raise JsonableError( _("User group {group_id} is not a subgroup of this group.").format( group_id=group.id ) ) remove_subgroups_from_user_group( context.supergroup, context.direct_subgroups, acting_user=user_profile ) return json_success(request) @require_member_or_admin @typed_endpoint @transaction.atomic(durable=True) def update_subgroups_of_user_group( request: HttpRequest, user_profile: UserProfile, *, user_group_id: PathOnly[Json[int]], delete: Json[list[int]] | None = None, add: Json[list[int]] | None = None, ) -> HttpResponse: if not add and not delete: raise JsonableError(_('Nothing to do. Specify at least one of "add" or "delete".')) thunks = [] if add: thunks.append( lambda: add_subgroups_to_group_backend( request, user_profile, user_group_id=user_group_id, subgroup_ids=add ) ) if delete: thunks.append( lambda: remove_subgroups_from_group_backend( request, user_profile, user_group_id=user_group_id, subgroup_ids=delete ) ) data = compose_views(thunks) return json_success(request, data) @require_member_or_admin @typed_endpoint def get_is_user_group_member( request: HttpRequest, user_profile: UserProfile, *, user_group_id: PathOnly[Json[int]], user_id: PathOnly[Json[int]], direct_member_only: Json[bool] = False, ) -> HttpResponse: user_group = access_user_group_to_read_membership(user_group_id, user_profile.realm) target_user = access_user_by_id(user_profile, user_id, for_admin=False) return json_success( request, data={ "is_user_group_member": is_user_in_group( user_group, target_user, direct_member_only=direct_member_only ) }, ) @require_member_or_admin @typed_endpoint def get_user_group_members( request: HttpRequest, user_profile: UserProfile, *, user_group_id: PathOnly[Json[int]], direct_member_only: Json[bool] = False, ) -> HttpResponse: user_group = access_user_group_to_read_membership(user_group_id, user_profile.realm) return json_success( request, data={ "members": get_user_group_member_ids(user_group, direct_member_only=direct_member_only) }, ) @require_member_or_admin @typed_endpoint def get_subgroups_of_user_group( request: HttpRequest, user_profile: UserProfile, *, user_group_id: PathOnly[Json[int]], direct_subgroup_only: Json[bool] = False, ) -> HttpResponse: user_group = access_user_group_to_read_membership(user_group_id, user_profile.realm) return json_success( request, data={"subgroups": get_subgroup_ids(user_group, direct_subgroup_only=direct_subgroup_only)}, )