zulip/zephyr/views.py

569 lines
23 KiB
Python

from django.conf import settings
from django.contrib.auth import authenticate, login
from django.contrib.auth.decorators import login_required
from django.core.urlresolvers import reverse
from django.http import HttpResponse, HttpResponseRedirect, HttpResponseBadRequest
from django.shortcuts import render_to_response
from django.template import RequestContext
from django.shortcuts import render
from django.utils.timezone import utc
from django.core.exceptions import ValidationError
from django.contrib.auth.views import login as django_login_page
from django.contrib.auth.models import User
from zephyr.models import Message, UserProfile, ZephyrClass, Subscription, \
Recipient, get_display_recipient, get_huddle, Realm, \
create_user, do_send_message, mit_sync_table, create_user_if_needed, \
create_class_if_needed, PreregistrationUser
from zephyr.forms import RegistrationForm, HomepageForm, is_unique
from django.views.decorators.csrf import csrf_exempt
from zephyr.decorator import asynchronous
from zephyr.lib.query import last_n
from confirmation.models import Confirmation
import datetime
import simplejson
import socket
import re
import hashlib
import urllib
def require_post(view_func):
def _wrapped_view_func(request, *args, **kwargs):
if request.method != "POST":
return HttpResponseBadRequest('This form can only be submitted by POST.')
return view_func(request, *args, **kwargs)
return _wrapped_view_func
# api_key_required will add the authenticated user's user_profile to
# the view function's arguments list, since we have to look it up
# anyway.
def api_key_required(view_func):
def _wrapped_view_func(request, *args, **kwargs):
# Arguably @require_post should protect us from having to do
# this, but I don't want to count on us always getting the
# decorator ordering right.
if request.method != "POST":
return HttpResponseBadRequest('This form can only be submitted by POST.')
try:
user_profile = UserProfile.objects.get(user__email=request.POST.get("email"))
except UserProfile.DoesNotExist:
return json_error("Invalid user")
if user_profile is None or request.POST.get("api-key") != user_profile.api_key:
return json_error('Invalid API user/key pair.')
return view_func(request, user_profile, *args, **kwargs)
return _wrapped_view_func
def json_response(res_type="success", msg="", data={}, status=200):
content = {"result":res_type, "msg":msg}
content.update(data)
return HttpResponse(content=simplejson.dumps(content),
mimetype='application/json', status=status)
def json_success(data={}):
return json_response(data=data)
def json_error(msg, data={}):
return json_response(res_type="error", msg=msg, data=data, status=400)
def strip_html(x):
"""Sanitize an email, class name, etc."""
# We remove <> in order to avoid </script> within JSON embedded in HTML.
#
# FIXME: consider a whitelist
return x.replace('&', '&amp;').replace('<','&lt;').replace('>','&gt;')
def get_class(class_name, realm):
zephyr_class = ZephyrClass.objects.filter(name__iexact=class_name, realm=realm)
if zephyr_class:
return zephyr_class[0]
else:
return None
@require_post
def register(request):
key = request.POST['key']
email = Confirmation.objects.get(confirmation_key=key).content_object.email
company_name = email.split('@')[-1]
try:
is_unique(email)
except ValidationError:
return HttpResponseRedirect(reverse('django.contrib.auth.views.login') + '?email=' + urllib.quote_plus(email))
if request.POST.get('from_confirmation'):
form = RegistrationForm()
else:
form = RegistrationForm(request.POST)
if form.is_valid():
password = strip_html(form.cleaned_data['password'])
full_name = strip_html(form.cleaned_data['full_name'])
short_name = strip_html(email.split('@')[0])
domain = strip_html(form.cleaned_data['domain'])
realm = Realm.objects.filter(domain=domain)
if not realm:
realm = Realm(domain=domain)
realm.save()
else:
realm = Realm.objects.get(domain=domain)
# FIXME: sanitize email addresses
create_user(email, password, realm, full_name, short_name)
login(request, authenticate(username=email, password=password))
return HttpResponseRedirect(reverse('zephyr.views.home'))
return render(request, 'zephyr/register.html', {
'form': form, 'company_name': company_name, 'email': email, 'key': key,
})
def login_page(request, **kwargs):
template_response = django_login_page(request, **kwargs)
try:
template_response.context_data['email'] = strip_html(request.GET['email'])
except KeyError:
pass
return template_response
def accounts_home(request):
if request.method == 'POST':
form = HomepageForm(request.POST)
if form.is_valid():
try:
email = form.cleaned_data['email']
user = PreregistrationUser.objects.get(email=email)
except PreregistrationUser.DoesNotExist:
user = PreregistrationUser()
user.email = email
user.save()
Confirmation.objects.send_confirmation(user, user.email)
return HttpResponseRedirect(reverse('send_confirm', kwargs={'email':user.email}))
try:
email = request.POST['email']
is_unique(email)
except ValidationError:
return HttpResponseRedirect(reverse('django.contrib.auth.views.login') + '?email=' + strip_html(email))
return render_to_response('zephyr/accounts_home.html',
context_instance=RequestContext(request))
def home(request):
if not request.user.is_authenticated():
return HttpResponseRedirect(reverse('zephyr.views.accounts_home'))
user_profile = UserProfile.objects.get(user=request.user)
messages = Message.objects.filter(usermessage__user_profile=user_profile)
if user_profile.pointer == -1 and messages:
user_profile.pointer = min([message.id for message in messages])
user_profile.save()
# Populate personals autocomplete list based on everyone in your
# realm. Later we might want a 2-layer autocomplete, where we
# consider specially some sort of "buddy list" who e.g. you've
# talked to before, but for small organizations, the right list is
# everyone in your realm.
people = [profile.user.email for profile in
UserProfile.objects.filter(realm=user_profile.realm) if
profile != user_profile]
subscriptions = Subscription.objects.filter(userprofile_id=user_profile, active=True)
classes = [get_display_recipient(sub.recipient) for sub in subscriptions
if sub.recipient.type == Recipient.CLASS]
return render_to_response('zephyr/index.html',
{'user_profile': user_profile,
'email_hash' : hashlib.md5(user_profile.user.email).hexdigest(),
'people' : simplejson.dumps(people),
'classes' : simplejson.dumps(classes),
'have_initial_messages':
'true' if messages else 'false',
'show_debug':
settings.DEBUG and ('show_debug' in request.GET) },
context_instance=RequestContext(request))
@login_required
@require_post
def update(request):
user_profile = UserProfile.objects.get(user=request.user)
pointer = request.POST.get('pointer')
if not pointer:
return json_error("Missing pointer")
try:
pointer = int(pointer)
except ValueError:
return json_error("Invalid pointer: must be an integer")
if pointer < 0:
return json_error("Invalid pointer value")
user_profile.pointer = pointer
user_profile.save()
return json_success()
def format_updates_response(messages, mit_sync_bot=False, apply_markdown=False, where='bottom'):
if mit_sync_bot:
messages = [m for m in messages if not mit_sync_table.get(m.id)]
return {'messages': [message.to_dict(apply_markdown) for message in messages],
"result": "success",
"msg": "",
'where': where}
def return_messages_immediately(request, handler, user_profile, **kwargs):
first = request.POST.get("first")
last = request.POST.get("last")
failures = request.POST.get("failures")
if first is None or last is None:
# When an API user is first querying the server to subscribe,
# there's no reason to reply immediately.
return False
first = int(first)
last = int(last)
if failures is not None:
failures = int(failures)
where = 'bottom'
query = Message.objects.filter(usermessage__user_profile = user_profile).order_by('id')
if last == -1:
# User has no messages yet
# Get a range around the pointer
ptr = user_profile.pointer
messages = (last_n(200, query.filter(id__lt=ptr))
+ list(query.filter(id__gte=ptr)[:200]))
else:
messages = query.filter(id__gt=last)[:400]
if not messages:
# No more messages in the future; try filling in from the past.
messages = last_n(400, query.filter(id__lt=first))
where = 'top'
if messages:
handler.finish(format_updates_response(messages, where=where, **kwargs))
return True
if failures >= 4:
# No messages, but still return immediately, to clear the
# user's failures count
handler.finish(format_updates_response([], where="bottom", **kwargs))
return True
return False
def get_updates_backend(request, user_profile, handler, **kwargs):
if return_messages_immediately(request, handler, user_profile, **kwargs):
return
def on_receive(messages):
if handler.request.connection.stream.closed():
return
try:
handler.finish(format_updates_response(messages, **kwargs))
except socket.error:
pass
user_profile.add_callback(handler.async_callback(on_receive))
@login_required
@asynchronous
@require_post
def get_updates(request, handler):
if not ('last' in request.POST and 'first' in request.POST):
return json_error("Missing message range")
user_profile = UserProfile.objects.get(user=request.user)
return get_updates_backend(request, user_profile, handler, apply_markdown=True)
# Yes, this has a name similar to the previous function. I think this
# new name is better and expect the old function to be deleted and
# replaced by the new one soon, so I'm not going to worry about it.
@csrf_exempt
@asynchronous
@require_post
@api_key_required
def api_get_messages(request, user_profile, handler):
return get_updates_backend(request, user_profile, handler,
apply_markdown=(request.POST.get("apply_markdown") is not None),
mit_sync_bot=request.POST.get("mit_sync_bot"))
@csrf_exempt
@require_post
@api_key_required
def api_send_message(request, user_profile):
return send_message_backend(request, user_profile, user_profile.user)
@login_required
@require_post
def send_message(request):
user_profile = UserProfile.objects.get(user=request.user)
if 'time' in request.POST:
return json_error("Invalid field 'time'")
return send_message_backend(request, user_profile, request.user)
# TODO: This should have a real superuser security check
def is_super_user_api(request):
return request.POST.get("api-key") == "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
def already_sent_forged_message(request):
email = strip_html(request.POST['sender']).lower()
if Message.objects.filter(sender__user__email=email,
content=request.POST['content'],
pub_date__gt=datetime.datetime.utcfromtimestamp(float(request.POST['time']) - 10).replace(tzinfo=utc),
pub_date__lt=datetime.datetime.utcfromtimestamp(float(request.POST['time']) + 10).replace(tzinfo=utc)):
return True
return False
def create_forged_message_users(request, user_profile):
# Create a user for the sender, if needed
email = strip_html(request.POST['sender']).lower()
user = create_user_if_needed(user_profile.realm, email, "test",
strip_html(request.POST['fullname']),
strip_html(request.POST['shortname']))
# Create users for huddle recipients, if needed.
if request.POST['type'] == 'personal':
if ',' in request.POST['recipient']:
# Huddle message
for user_email in [e.strip() for e in request.POST["recipient"].split(",")]:
create_user_if_needed(user_profile.realm, user_email, "test",
user_email.split('@')[0],
user_email.split('@')[0])
else:
user_email = request.POST["recipient"].strip()
create_user_if_needed(user_profile.realm, user_email, "test",
user_email.split('@')[0],
user_email.split('@')[0])
return user
# We do not @require_login for send_message_backend, since it is used
# both from the API and the web service. Code calling
# send_message_backend should either check the API key or check that
# the user is logged in.
@require_post
def send_message_backend(request, user_profile, sender):
if "type" not in request.POST:
return json_error("Missing type")
if "content" not in request.POST:
return json_error("Missing message contents")
if "forged" in request.POST:
if not is_super_user_api(request):
return json_error("User not authorized for this query")
if "time" not in request.POST:
return json_error("Missing time")
if already_sent_forged_message(request):
return json_success()
sender = create_forged_message_users(request, user_profile)
message_type_name = request.POST["type"]
if message_type_name == 'class':
if "class" not in request.POST:
return json_error("Missing class")
if "instance" not in request.POST:
return json_error("Missing instance")
zephyr_class_name = strip_html(request.POST['class']).strip()
instance_name = strip_html(request.POST['instance']).strip()
if not valid_class_name(zephyr_class_name):
return json_error("Invalid class name")
## FIXME: Commented out temporarily while we figure out what we want
# if not valid_class_name(instance_name):
# return json_error("Invalid instance name")
zephyr_class = create_class_if_needed(user_profile.realm, zephyr_class_name)
recipient = Recipient.objects.get(type_id=zephyr_class.id, type=Recipient.CLASS)
elif message_type_name == 'personal':
if "recipient" not in request.POST:
return json_error("Missing recipient")
recipient_data = strip_html(request.POST['recipient'])
if ',' in recipient_data:
# This is actually a huddle message, which shares the
# "personal" message sending form
recipients = [r.strip() for r in recipient_data.split(',')]
# Ignore any blank recipients
recipients = [r for r in recipients if r]
recipient_ids = []
for recipient in recipients:
try:
recipient_ids.append(
UserProfile.objects.get(user=User.objects.get(email=recipient)).id)
except User.DoesNotExist:
return json_error("Invalid email '%s'" % (recipient))
# Make sure the sender is included in the huddle
recipient_ids.append(UserProfile.objects.get(user=sender).id)
huddle = get_huddle(recipient_ids)
recipient = Recipient.objects.get(type_id=huddle.id, type=Recipient.HUDDLE)
else:
# This is actually a personal message
if not User.objects.filter(email=recipient_data):
return json_error("Invalid email")
recipient_user = User.objects.get(email=recipient_data)
recipient_user_profile = UserProfile.objects.get(user=recipient_user)
recipient = Recipient.objects.get(type_id=recipient_user_profile.id,
type=Recipient.PERSONAL)
else:
return json_error("Invalid message type")
message = Message()
message.sender = UserProfile.objects.get(user=sender)
message.content = strip_html(request.POST['content'])
message.recipient = recipient
if message_type_name == 'class':
message.instance = instance_name
if 'time' in request.POST:
# Forged messages come with a timestamp
message.pub_date = datetime.datetime.utcfromtimestamp(float(request.POST['time'])).replace(tzinfo=utc)
else:
message.pub_date = datetime.datetime.utcnow().replace(tzinfo=utc)
# To avoid message loops, we must pass whether the message was
# synced from MIT message here.
do_send_message(message, synced_from_mit = 'time' in request.POST)
return json_success()
def gather_subscriptions(user_profile):
subscriptions = Subscription.objects.filter(userprofile=user_profile, active=True)
# For now, don't display the subscription for your ability to receive personals.
return sorted([get_display_recipient(sub.recipient) for sub in subscriptions
if sub.recipient.type == Recipient.CLASS])
@login_required
def subscriptions(request):
user_profile = UserProfile.objects.get(user=request.user)
return render_to_response('zephyr/subscriptions.html',
{'subscriptions': gather_subscriptions(user_profile),
'user_profile': user_profile},
context_instance=RequestContext(request))
@login_required
def json_list_subscriptions(request):
subs = gather_subscriptions(UserProfile.objects.get(user=request.user))
return HttpResponse(content=simplejson.dumps({"subscriptions": subs}),
mimetype='application/json', status=200)
@login_required
@require_post
def json_remove_subscription(request):
user_profile = UserProfile.objects.get(user=request.user)
if 'subscription' not in request.POST:
return json_error("Missing subscriptions")
sub_name = request.POST.get('subscription')
zephyr_class = get_class(sub_name, user_profile.realm)
if not zephyr_class:
return json_error("Not subscribed, so you can't unsubscribe")
recipient = Recipient.objects.get(type_id=zephyr_class.id,
type=Recipient.CLASS)
subscription = Subscription.objects.get(
userprofile=user_profile, recipient=recipient)
subscription.active = False
subscription.save()
return json_success({"data": sub_name})
def valid_class_name(name):
# Classes must start with a letter or number.
return re.match("^[.a-zA-Z0-9][.a-z A-Z0-9_-]*$", name)
@login_required
@require_post
def json_add_subscription(request):
user_profile = UserProfile.objects.get(user=request.user)
if "new_subscription" not in request.POST:
return HttpResponseRedirect(reverse('zephyr.views.subscriptions'))
sub_name = request.POST.get('new_subscription').strip()
if not valid_class_name(sub_name):
return json_error("Invalid characters in class names")
zephyr_class = create_class_if_needed(user_profile.realm, sub_name)
recipient = Recipient.objects.get(type_id=zephyr_class.id,
type=Recipient.CLASS)
subscription = Subscription.objects.filter(userprofile=user_profile,
recipient=recipient)
if subscription:
subscription = subscription[0]
if not subscription.active:
# Activating old subscription.
subscription.active = True
subscription.save()
actually_new_sub = sub_name
else:
# Subscription already exists and is active
return json_error("Subscription already exists")
else:
new_subscription = Subscription(userprofile=user_profile,
recipient=recipient)
new_subscription.save()
actually_new_sub = sub_name
return json_success({"data": actually_new_sub})
@login_required
def manage_settings(request):
user_profile = UserProfile.objects.get(user=request.user)
return render_to_response('zephyr/settings.html',
{'user_profile': user_profile,
'email_hash': hashlib.md5(user_profile.user.email).hexdigest(),
},
context_instance=RequestContext(request))
@login_required
@require_post
def change_settings(request):
user_profile = UserProfile.objects.get(user=request.user)
# First validate all the inputs
if "full_name" not in request.POST:
return json_error("Invalid settings request -- missing full_name.")
if "short_name" not in request.POST:
return json_error("Invalid settings request -- missing short_name.")
if "timezone" not in request.POST:
return json_error("Invalid settings request -- missing timezone.")
if "new_password" not in request.POST:
return json_error("Invalid settings request -- missing new_password.")
if "old_password" not in request.POST:
return json_error("Invalid settings request -- missing old_password.")
if "confirm_password" not in request.POST:
return json_error("Invalid settings request -- missing confirm_password.")
old_password = request.POST['old_password']
new_password = request.POST['new_password']
confirm_password = request.POST['confirm_password']
full_name = strip_html(request.POST['full_name'])
short_name = strip_html(request.POST['short_name'])
if new_password != "":
if new_password != confirm_password:
return json_error("New password must match confirmation password!")
if not authenticate(username=user_profile.user.email, password=old_password):
return json_error("Wrong password!")
user_profile.user.set_password(new_password)
result = {}
if user_profile.full_name != full_name:
user_profile.full_name = full_name
result['full_name'] = full_name
if user_profile.short_name != short_name:
user_profile.short_name = short_name
result['short_name'] = short_name
user_profile.user.save()
user_profile.save()
return json_success(result)
@login_required
def class_exists(request, zephyr_class):
if not valid_class_name(zephyr_class):
return json_error("Invalid characters in class name")
return HttpResponse(
bool(get_class(zephyr_class,
UserProfile.objects.get(user=request.user).realm)))