mirror of https://github.com/zulip/zulip.git
994 lines
39 KiB
Python
994 lines
39 KiB
Python
import secrets
|
|
from collections import defaultdict
|
|
from email.headerregistry import Address
|
|
from typing import Any
|
|
|
|
from django.conf import settings
|
|
from django.contrib.auth.tokens import PasswordResetTokenGenerator, default_token_generator
|
|
from django.db import transaction
|
|
from django.db.models import Q
|
|
from django.http import HttpRequest
|
|
from django.urls import reverse
|
|
from django.utils.http import urlsafe_base64_encode
|
|
from django.utils.timezone import now as timezone_now
|
|
from django.utils.translation import get_language
|
|
|
|
from zerver.actions.user_groups import (
|
|
do_send_user_group_members_update_event,
|
|
update_users_in_full_members_system_group,
|
|
)
|
|
from zerver.lib.avatar import get_avatar_field
|
|
from zerver.lib.bot_config import ConfigError, get_bot_config, get_bot_configs, set_bot_config
|
|
from zerver.lib.cache import bot_dict_fields
|
|
from zerver.lib.create_user import create_user
|
|
from zerver.lib.invites import revoke_invites_generated_by_user
|
|
from zerver.lib.remote_server import maybe_enqueue_audit_log_upload
|
|
from zerver.lib.send_email import FromAddress, clear_scheduled_emails, send_email
|
|
from zerver.lib.sessions import delete_user_sessions
|
|
from zerver.lib.soft_deactivation import queue_soft_reactivation
|
|
from zerver.lib.stream_subscription import bulk_get_subscriber_peer_info
|
|
from zerver.lib.stream_traffic import get_streams_traffic
|
|
from zerver.lib.streams import (
|
|
get_group_setting_value_dict_for_streams,
|
|
get_streams_for_user,
|
|
stream_to_dict,
|
|
)
|
|
from zerver.lib.types import AnonymousSettingGroupDict
|
|
from zerver.lib.user_counts import realm_user_count_by_role
|
|
from zerver.lib.user_groups import get_system_user_group_for_user
|
|
from zerver.lib.users import (
|
|
get_active_bots_owned_by_user,
|
|
get_user_ids_who_can_access_user,
|
|
get_users_involved_in_dms_with_target_users,
|
|
user_access_restricted_in_realm,
|
|
)
|
|
from zerver.models import (
|
|
GroupGroupMembership,
|
|
Message,
|
|
NamedUserGroup,
|
|
Realm,
|
|
RealmAuditLog,
|
|
Recipient,
|
|
Service,
|
|
Stream,
|
|
Subscription,
|
|
UserGroup,
|
|
UserGroupMembership,
|
|
UserProfile,
|
|
)
|
|
from zerver.models.bots import get_bot_services
|
|
from zerver.models.realm_audit_logs import AuditLogEventType
|
|
from zerver.models.realms import get_fake_email_domain
|
|
from zerver.models.users import (
|
|
active_non_guest_user_ids,
|
|
active_user_ids,
|
|
bot_owner_user_ids,
|
|
get_bot_dicts_in_realm,
|
|
get_user_profile_by_id,
|
|
)
|
|
from zerver.tornado.django_api import send_event_on_commit
|
|
|
|
|
|
def do_delete_user(user_profile: UserProfile, *, acting_user: UserProfile | None) -> None:
|
|
if user_profile.realm.is_zephyr_mirror_realm:
|
|
raise AssertionError("Deleting zephyr mirror users is not supported")
|
|
|
|
do_deactivate_user(user_profile, acting_user=acting_user)
|
|
|
|
to_resubscribe_recipient_ids = set(
|
|
Subscription.objects.filter(
|
|
user_profile=user_profile, recipient__type=Recipient.DIRECT_MESSAGE_GROUP
|
|
).values_list("recipient_id", flat=True)
|
|
)
|
|
user_id = user_profile.id
|
|
realm = user_profile.realm
|
|
date_joined = user_profile.date_joined
|
|
personal_recipient = user_profile.recipient
|
|
|
|
with transaction.atomic(durable=True):
|
|
user_profile.delete()
|
|
# Recipient objects don't get deleted through CASCADE, so we need to handle
|
|
# the user's personal recipient manually. This will also delete all Messages pointing
|
|
# to this recipient (all direct messages sent to the user).
|
|
assert personal_recipient is not None
|
|
personal_recipient.delete()
|
|
replacement_user = create_user(
|
|
force_id=user_id,
|
|
email=Address(
|
|
username=f"deleteduser{user_id}", domain=get_fake_email_domain(realm.host)
|
|
).addr_spec,
|
|
password=None,
|
|
realm=realm,
|
|
full_name=f"Deleted User {user_id}",
|
|
active=False,
|
|
is_mirror_dummy=True,
|
|
force_date_joined=date_joined,
|
|
)
|
|
subs_to_recreate = [
|
|
Subscription(
|
|
user_profile=replacement_user,
|
|
recipient=recipient,
|
|
is_user_active=replacement_user.is_active,
|
|
)
|
|
for recipient in Recipient.objects.filter(id__in=to_resubscribe_recipient_ids)
|
|
]
|
|
Subscription.objects.bulk_create(subs_to_recreate)
|
|
|
|
RealmAuditLog.objects.create(
|
|
realm=replacement_user.realm,
|
|
modified_user=replacement_user,
|
|
acting_user=acting_user,
|
|
event_type=AuditLogEventType.USER_DELETED,
|
|
event_time=timezone_now(),
|
|
)
|
|
|
|
|
|
def do_delete_user_preserving_messages(user_profile: UserProfile) -> None:
|
|
"""This is a version of do_delete_user which does not delete messages
|
|
that the user was a participant in, and thus is less potentially
|
|
disruptive to other users.
|
|
|
|
The code is a bit tricky, because we want to, at some point, call
|
|
user_profile.delete() to trigger cascading deletions of related
|
|
models - but we need to avoid the cascades deleting all messages
|
|
sent by the user to avoid messing up history of public stream
|
|
conversations that they may have participated in.
|
|
|
|
Not recommended for general use due to the following quirks:
|
|
* Does not live-update other clients via `send_event_on_commit`
|
|
about the user's new name, email, or other attributes.
|
|
* Not guaranteed to clear caches containing the deleted users. The
|
|
temporary user may be visible briefly in caches due to the
|
|
UserProfile model's post_save hook.
|
|
* Deletes `acting_user`/`modified_user` entries in RealmAuditLog,
|
|
potentially leading to corruption in audit tables if the user had,
|
|
for example, changed organization-level settings previously.
|
|
* May violate invariants like deleting the only subscriber to a
|
|
stream/group or the last owner in a realm.
|
|
* Will remove MutedUser records for other users who might have
|
|
muted this user.
|
|
* Will destroy Attachment/ArchivedAttachment records for files
|
|
uploaded by the user, making them inaccessible.
|
|
* Will destroy ArchivedMessage records associated with the user,
|
|
making them impossible to restore from backups.
|
|
* Will destroy Reaction/Submessage objects for reactions/poll
|
|
votes done by the user.
|
|
|
|
Most of these issues are not relevant for the common case that the
|
|
user being deleted hasn't used Zulip extensively.
|
|
|
|
It is possible a different algorithm that worked via overwriting
|
|
the UserProfile's values with RealmUserDefault values, as well as
|
|
a targeted set of deletions of cascading models (`Subscription`,
|
|
`UserMessage`, `CustomProfileFieldValue`, etc.) would be a cleaner
|
|
path to a high quality system.
|
|
|
|
Other lesser quirks to be aware of:
|
|
* The deleted user will disappear from all "Read receipts"
|
|
displays, as all UserMessage rows will have been deleted.
|
|
* Raw Markdown syntax mentioning the user still contain their
|
|
original name (though modern clients will look up the user via
|
|
`data-user-id` and display the current name). This is hard to
|
|
change, and not important, since nothing prevents other users from
|
|
just typing the user's name in their own messages.
|
|
* Consumes a user ID sequence number, resulting in gaps in the
|
|
space of user IDs that contain actual users.
|
|
|
|
"""
|
|
if user_profile.realm.is_zephyr_mirror_realm:
|
|
raise AssertionError("Deleting zephyr mirror users is not supported")
|
|
|
|
do_deactivate_user(user_profile, acting_user=None)
|
|
|
|
user_id = user_profile.id
|
|
personal_recipient = user_profile.recipient
|
|
realm = user_profile.realm
|
|
date_joined = user_profile.date_joined
|
|
|
|
with transaction.atomic(durable=True):
|
|
# The strategy is that before calling user_profile.delete(), we need to
|
|
# reassign Messages sent by the user to a dummy user, so that they don't
|
|
# get affected by CASCADE. We cannot yet create a dummy user with .id
|
|
# matching that of the user_profile, so the general scheme is:
|
|
# 1. We create a *temporary* dummy for the initial re-assignment of messages.
|
|
# 2. We delete the UserProfile.
|
|
# 3. We create a replacement dummy user with its id matching what the UserProfile had.
|
|
# 4. This is the intended, final replacement UserProfile, so we re-assign
|
|
# the messages from step (1) to it and delete the temporary dummy.
|
|
#
|
|
# We also do the same for Subscriptions - while they could be handled like
|
|
# in do_delete_user by re-creating the objects after CASCADE deletion, the code
|
|
# is cleaner by using the same re-assignment approach for them together with Messages.
|
|
random_token = secrets.token_hex(16)
|
|
temp_replacement_user = create_user(
|
|
email=Address(
|
|
username=f"temp_deleteduser{random_token}", domain=get_fake_email_domain(realm.host)
|
|
).addr_spec,
|
|
password=None,
|
|
realm=realm,
|
|
full_name=f"Deleted User {user_id} (temp)",
|
|
active=False,
|
|
is_mirror_dummy=True,
|
|
force_date_joined=date_joined,
|
|
create_personal_recipient=False,
|
|
)
|
|
# Uses index: zerver_message_realm_sender_recipient (prefix)
|
|
Message.objects.filter(realm_id=realm.id, sender=user_profile).update(
|
|
sender=temp_replacement_user
|
|
)
|
|
Subscription.objects.filter(
|
|
user_profile=user_profile, recipient__type=Recipient.DIRECT_MESSAGE_GROUP
|
|
).update(user_profile=temp_replacement_user)
|
|
user_profile.delete()
|
|
|
|
replacement_user = create_user(
|
|
force_id=user_id,
|
|
email=Address(
|
|
username=f"deleteduser{user_id}", domain=get_fake_email_domain(realm.host)
|
|
).addr_spec,
|
|
password=None,
|
|
realm=realm,
|
|
full_name=f"Deleted User {user_id}",
|
|
active=False,
|
|
is_mirror_dummy=True,
|
|
force_date_joined=date_joined,
|
|
create_personal_recipient=False,
|
|
)
|
|
# We don't delete the personal recipient to preserve personal messages!
|
|
# Now, the personal recipient belong to replacement_user, because
|
|
# personal_recipient.type_id is equal to replacement_user.id.
|
|
replacement_user.recipient = personal_recipient
|
|
replacement_user.save(update_fields=["recipient"])
|
|
|
|
# Uses index: zerver_message_realm_sender_recipient (prefix)
|
|
Message.objects.filter(realm_id=realm.id, sender=temp_replacement_user).update(
|
|
sender=replacement_user
|
|
)
|
|
Subscription.objects.filter(
|
|
user_profile=temp_replacement_user, recipient__type=Recipient.DIRECT_MESSAGE_GROUP
|
|
).update(user_profile=replacement_user, is_user_active=replacement_user.is_active)
|
|
temp_replacement_user.delete()
|
|
|
|
RealmAuditLog.objects.create(
|
|
realm=replacement_user.realm,
|
|
modified_user=replacement_user,
|
|
acting_user=None,
|
|
event_type=AuditLogEventType.USER_DELETED_PRESERVING_MESSAGES,
|
|
event_time=timezone_now(),
|
|
)
|
|
|
|
|
|
def change_user_is_active(user_profile: UserProfile, value: bool) -> None:
|
|
"""
|
|
Helper function for changing the .is_active field. Not meant as a standalone function
|
|
in production code as properly activating/deactivating users requires more steps.
|
|
This changes the is_active value and saves it, while ensuring
|
|
Subscription.is_user_active values are updated in the same db transaction.
|
|
"""
|
|
with transaction.atomic(savepoint=False):
|
|
user_profile.is_active = value
|
|
user_profile.save(update_fields=["is_active"])
|
|
Subscription.objects.filter(user_profile=user_profile).update(is_user_active=value)
|
|
|
|
|
|
def send_group_update_event_for_anonymous_group_setting(
|
|
setting_group: UserGroup,
|
|
group_members_dict: dict[int, list[int]],
|
|
group_subgroups_dict: dict[int, list[int]],
|
|
named_group: NamedUserGroup,
|
|
notify_user_ids: list[int],
|
|
) -> None:
|
|
realm = setting_group.realm
|
|
for setting_name in NamedUserGroup.GROUP_PERMISSION_SETTINGS:
|
|
if getattr(named_group, setting_name + "_id") == setting_group.id:
|
|
new_setting_value = AnonymousSettingGroupDict(
|
|
direct_members=group_members_dict[setting_group.id],
|
|
direct_subgroups=group_subgroups_dict[setting_group.id],
|
|
)
|
|
event = dict(
|
|
type="user_group",
|
|
op="update",
|
|
group_id=named_group.id,
|
|
data={setting_name: new_setting_value},
|
|
)
|
|
send_event_on_commit(realm, event, notify_user_ids)
|
|
return
|
|
|
|
|
|
def send_realm_update_event_for_anonymous_group_setting(
|
|
setting_group: UserGroup,
|
|
group_members_dict: dict[int, list[int]],
|
|
group_subgroups_dict: dict[int, list[int]],
|
|
notify_user_ids: list[int],
|
|
) -> None:
|
|
realm = setting_group.realm
|
|
for setting_name in Realm.REALM_PERMISSION_GROUP_SETTINGS:
|
|
if getattr(realm, setting_name + "_id") == setting_group.id:
|
|
new_setting_value = AnonymousSettingGroupDict(
|
|
direct_members=group_members_dict[setting_group.id],
|
|
direct_subgroups=group_subgroups_dict[setting_group.id],
|
|
)
|
|
event = dict(
|
|
type="realm",
|
|
op="update_dict",
|
|
property="default",
|
|
data={setting_name: new_setting_value},
|
|
)
|
|
send_event_on_commit(realm, event, notify_user_ids)
|
|
return
|
|
|
|
|
|
def send_update_events_for_anonymous_group_settings(
|
|
setting_groups: list[UserGroup], realm: Realm, notify_user_ids: list[int]
|
|
) -> None:
|
|
setting_group_ids = [group.id for group in setting_groups]
|
|
membership = (
|
|
UserGroupMembership.objects.filter(user_group_id__in=setting_group_ids)
|
|
.exclude(user_profile__is_active=False)
|
|
.values_list("user_group_id", "user_profile_id")
|
|
)
|
|
|
|
group_membership = GroupGroupMembership.objects.filter(
|
|
supergroup_id__in=setting_group_ids
|
|
).values_list("subgroup_id", "supergroup_id")
|
|
|
|
group_members = defaultdict(list)
|
|
for user_group_id, user_profile_id in membership:
|
|
group_members[user_group_id].append(user_profile_id)
|
|
|
|
group_subgroups = defaultdict(list)
|
|
for subgroup_id, supergroup_id in group_membership:
|
|
group_subgroups[supergroup_id].append(subgroup_id)
|
|
|
|
group_setting_query = Q()
|
|
for setting_name in NamedUserGroup.GROUP_PERMISSION_SETTINGS:
|
|
group_setting_query |= Q(**{f"{setting_name}__in": setting_group_ids})
|
|
|
|
named_groups_using_setting_groups_dict = {}
|
|
named_groups_using_setting_groups = NamedUserGroup.objects.filter(realm=realm).filter(
|
|
group_setting_query
|
|
)
|
|
for group in named_groups_using_setting_groups:
|
|
for setting_name in NamedUserGroup.GROUP_PERMISSION_SETTINGS:
|
|
setting_value_id = getattr(group, setting_name + "_id")
|
|
if setting_value_id in setting_group_ids:
|
|
named_groups_using_setting_groups_dict[setting_value_id] = group
|
|
|
|
for setting_group in setting_groups:
|
|
if setting_group.id in named_groups_using_setting_groups_dict:
|
|
named_group = named_groups_using_setting_groups_dict[setting_group.id]
|
|
send_group_update_event_for_anonymous_group_setting(
|
|
setting_group,
|
|
group_members,
|
|
group_subgroups,
|
|
named_group,
|
|
notify_user_ids,
|
|
)
|
|
else:
|
|
send_realm_update_event_for_anonymous_group_setting(
|
|
setting_group,
|
|
group_members,
|
|
group_subgroups,
|
|
notify_user_ids,
|
|
)
|
|
|
|
|
|
def send_events_for_user_deactivation(user_profile: UserProfile) -> None:
|
|
event_deactivate_user = dict(
|
|
type="realm_user",
|
|
op="update",
|
|
person=dict(user_id=user_profile.id, is_active=False),
|
|
)
|
|
realm = user_profile.realm
|
|
|
|
if not user_access_restricted_in_realm(user_profile):
|
|
send_event_on_commit(realm, event_deactivate_user, active_user_ids(realm.id))
|
|
return
|
|
|
|
non_guest_user_ids = active_non_guest_user_ids(realm.id)
|
|
users_involved_in_dms_dict = get_users_involved_in_dms_with_target_users([user_profile], realm)
|
|
|
|
# This code path is parallel to
|
|
# get_subscribers_of_target_user_subscriptions, but can't reuse it
|
|
# because we need to process stream and direct_message_group
|
|
# subscriptions separately.
|
|
deactivated_user_subs = Subscription.objects.filter(
|
|
user_profile=user_profile,
|
|
recipient__type__in=[Recipient.STREAM, Recipient.DIRECT_MESSAGE_GROUP],
|
|
active=True,
|
|
).values_list("recipient_id", flat=True)
|
|
subscribers_in_deactivated_user_subs = Subscription.objects.filter(
|
|
recipient_id__in=list(deactivated_user_subs),
|
|
recipient__type__in=[Recipient.STREAM, Recipient.DIRECT_MESSAGE_GROUP],
|
|
is_user_active=True,
|
|
active=True,
|
|
).values_list("recipient__type", "user_profile_id")
|
|
|
|
peer_stream_subscribers = set()
|
|
peer_direct_message_group_subscribers = set()
|
|
for recipient_type, user_id in subscribers_in_deactivated_user_subs:
|
|
if recipient_type == Recipient.DIRECT_MESSAGE_GROUP:
|
|
peer_direct_message_group_subscribers.add(user_id)
|
|
else:
|
|
peer_stream_subscribers.add(user_id)
|
|
|
|
users_with_access_to_deactivated_user = (
|
|
set(non_guest_user_ids)
|
|
| users_involved_in_dms_dict[user_profile.id]
|
|
| peer_direct_message_group_subscribers
|
|
)
|
|
if users_with_access_to_deactivated_user:
|
|
send_event_on_commit(
|
|
realm, event_deactivate_user, list(users_with_access_to_deactivated_user)
|
|
)
|
|
|
|
all_active_user_ids = active_user_ids(realm.id)
|
|
users_without_access_to_deactivated_user = (
|
|
set(all_active_user_ids) - users_with_access_to_deactivated_user
|
|
)
|
|
if users_without_access_to_deactivated_user:
|
|
# Guests who have access to the deactivated user receive
|
|
# 'realm_user/update' event and can update the user groups
|
|
# data, but guests who cannot access the deactivated user
|
|
# need an explicit 'user_group/remove_members' event to
|
|
# update the user groups data.
|
|
deactivated_user_groups = user_profile.direct_groups.select_related(
|
|
"named_user_group"
|
|
).order_by("id")
|
|
deactivated_user_named_groups = []
|
|
deactivated_user_setting_groups = []
|
|
for group in deactivated_user_groups:
|
|
if not hasattr(group, "named_user_group"):
|
|
deactivated_user_setting_groups.append(group)
|
|
else:
|
|
deactivated_user_named_groups.append(group)
|
|
for user_group in deactivated_user_named_groups:
|
|
event = dict(
|
|
type="user_group",
|
|
op="remove_members",
|
|
group_id=user_group.id,
|
|
user_ids=[user_profile.id],
|
|
)
|
|
send_event_on_commit(
|
|
user_group.realm, event, list(users_without_access_to_deactivated_user)
|
|
)
|
|
|
|
if deactivated_user_setting_groups:
|
|
send_update_events_for_anonymous_group_settings(
|
|
deactivated_user_setting_groups,
|
|
user_profile.realm,
|
|
list(users_without_access_to_deactivated_user),
|
|
)
|
|
|
|
users_losing_access_to_deactivated_user = (
|
|
peer_stream_subscribers - users_with_access_to_deactivated_user
|
|
)
|
|
if users_losing_access_to_deactivated_user:
|
|
event_remove_user = dict(
|
|
type="realm_user",
|
|
op="remove",
|
|
person=dict(user_id=user_profile.id, full_name=str(UserProfile.INACCESSIBLE_USER_NAME)),
|
|
)
|
|
send_event_on_commit(
|
|
realm, event_remove_user, list(users_losing_access_to_deactivated_user)
|
|
)
|
|
|
|
|
|
def do_deactivate_user(
|
|
user_profile: UserProfile, _cascade: bool = True, *, acting_user: UserProfile | None
|
|
) -> None:
|
|
if not user_profile.is_active:
|
|
return
|
|
|
|
if settings.BILLING_ENABLED:
|
|
from corporate.lib.stripe import RealmBillingSession
|
|
|
|
if _cascade:
|
|
# We need to deactivate bots before the target user, to ensure
|
|
# that a failure partway through this function cannot result
|
|
# in only the user being deactivated.
|
|
bot_profiles = get_active_bots_owned_by_user(user_profile)
|
|
for profile in bot_profiles:
|
|
do_deactivate_user(profile, _cascade=False, acting_user=acting_user)
|
|
|
|
with transaction.atomic(savepoint=False):
|
|
if user_profile.realm.is_zephyr_mirror_realm: # nocoverage
|
|
# For zephyr mirror users, we need to make them a mirror dummy
|
|
# again; otherwise, other users won't get the correct behavior
|
|
# when trying to send messages to this person inside Zulip.
|
|
#
|
|
# Ideally, we need to also ensure their zephyr mirroring bot
|
|
# isn't running, but that's a separate issue.
|
|
user_profile.is_mirror_dummy = True
|
|
user_profile.save(update_fields=["is_mirror_dummy"])
|
|
|
|
change_user_is_active(user_profile, False)
|
|
|
|
clear_scheduled_emails(user_profile.id)
|
|
revoke_invites_generated_by_user(user_profile)
|
|
|
|
event_time = timezone_now()
|
|
RealmAuditLog.objects.create(
|
|
realm=user_profile.realm,
|
|
modified_user=user_profile,
|
|
acting_user=acting_user,
|
|
event_type=AuditLogEventType.USER_DEACTIVATED,
|
|
event_time=event_time,
|
|
extra_data={
|
|
RealmAuditLog.ROLE_COUNT: realm_user_count_by_role(user_profile.realm),
|
|
},
|
|
)
|
|
maybe_enqueue_audit_log_upload(user_profile.realm)
|
|
if settings.BILLING_ENABLED:
|
|
billing_session = RealmBillingSession(user=user_profile, realm=user_profile.realm)
|
|
billing_session.update_license_ledger_if_needed(event_time)
|
|
|
|
transaction.on_commit(lambda: delete_user_sessions(user_profile))
|
|
|
|
send_events_for_user_deactivation(user_profile)
|
|
|
|
if user_profile.is_bot:
|
|
event_deactivate_bot = dict(
|
|
type="realm_bot",
|
|
op="update",
|
|
bot=dict(user_id=user_profile.id, is_active=False),
|
|
)
|
|
send_event_on_commit(
|
|
user_profile.realm, event_deactivate_bot, bot_owner_user_ids(user_profile)
|
|
)
|
|
|
|
|
|
def send_stream_events_for_role_update(
|
|
user_profile: UserProfile, old_accessible_streams: list[Stream]
|
|
) -> None:
|
|
current_accessible_streams = get_streams_for_user(
|
|
user_profile,
|
|
include_all_active=user_profile.is_realm_admin,
|
|
include_web_public=True,
|
|
)
|
|
|
|
old_accessible_stream_ids = {stream.id for stream in old_accessible_streams}
|
|
current_accessible_stream_ids = {stream.id for stream in current_accessible_streams}
|
|
|
|
now_accessible_stream_ids = current_accessible_stream_ids - old_accessible_stream_ids
|
|
if now_accessible_stream_ids:
|
|
recent_traffic = get_streams_traffic(now_accessible_stream_ids, user_profile.realm)
|
|
|
|
now_accessible_streams = [
|
|
stream
|
|
for stream in current_accessible_streams
|
|
if stream.id in now_accessible_stream_ids
|
|
]
|
|
|
|
setting_groups_dict = get_group_setting_value_dict_for_streams(now_accessible_streams)
|
|
|
|
event = dict(
|
|
type="stream",
|
|
op="create",
|
|
streams=[
|
|
stream_to_dict(stream, recent_traffic, setting_groups_dict)
|
|
for stream in now_accessible_streams
|
|
],
|
|
)
|
|
send_event_on_commit(user_profile.realm, event, [user_profile.id])
|
|
|
|
subscriber_peer_info = bulk_get_subscriber_peer_info(
|
|
user_profile.realm, now_accessible_streams
|
|
)
|
|
for stream_id, stream_subscriber_set in subscriber_peer_info.subscribed_ids.items():
|
|
peer_add_event = dict(
|
|
type="subscription",
|
|
op="peer_add",
|
|
stream_ids=[stream_id],
|
|
user_ids=sorted(stream_subscriber_set),
|
|
)
|
|
send_event_on_commit(user_profile.realm, peer_add_event, [user_profile.id])
|
|
|
|
now_inaccessible_stream_ids = old_accessible_stream_ids - current_accessible_stream_ids
|
|
if now_inaccessible_stream_ids:
|
|
now_inaccessible_streams = [
|
|
stream for stream in old_accessible_streams if stream.id in now_inaccessible_stream_ids
|
|
]
|
|
event = dict(
|
|
type="stream",
|
|
op="delete",
|
|
streams=[stream_to_dict(stream) for stream in now_inaccessible_streams],
|
|
)
|
|
send_event_on_commit(user_profile.realm, event, [user_profile.id])
|
|
|
|
|
|
@transaction.atomic(savepoint=False)
|
|
def do_change_user_role(
|
|
user_profile: UserProfile, value: int, *, acting_user: UserProfile | None
|
|
) -> None:
|
|
# We want to both (a) take a lock on the UserProfile row, and (b)
|
|
# modify the passed-in UserProfile object, so that callers see the
|
|
# changes in the object they hold. Unfortunately,
|
|
# `select_for_update` cannot be combined with `refresh_from_db`
|
|
# (https://code.djangoproject.com/ticket/28344). Call
|
|
# `select_for_update` and throw away the result, so that we know
|
|
# we have the lock on the row, then re-fill the `user_profile`
|
|
# object with the values now that the lock exists.
|
|
UserProfile.objects.select_for_update().get(id=user_profile.id)
|
|
user_profile.refresh_from_db()
|
|
|
|
old_value = user_profile.role
|
|
if old_value == value:
|
|
return
|
|
old_system_group = get_system_user_group_for_user(user_profile)
|
|
|
|
previously_accessible_streams = get_streams_for_user(
|
|
user_profile,
|
|
include_web_public=True,
|
|
include_all_active=user_profile.is_realm_admin,
|
|
)
|
|
|
|
user_profile.role = value
|
|
user_profile.save(update_fields=["role"])
|
|
RealmAuditLog.objects.create(
|
|
realm=user_profile.realm,
|
|
modified_user=user_profile,
|
|
acting_user=acting_user,
|
|
event_type=AuditLogEventType.USER_ROLE_CHANGED,
|
|
event_time=timezone_now(),
|
|
extra_data={
|
|
RealmAuditLog.OLD_VALUE: old_value,
|
|
RealmAuditLog.NEW_VALUE: value,
|
|
RealmAuditLog.ROLE_COUNT: realm_user_count_by_role(user_profile.realm),
|
|
},
|
|
)
|
|
maybe_enqueue_audit_log_upload(user_profile.realm)
|
|
if settings.BILLING_ENABLED and UserProfile.ROLE_GUEST in [old_value, value]:
|
|
from corporate.lib.stripe import RealmBillingSession
|
|
|
|
billing_session = RealmBillingSession(user=user_profile, realm=user_profile.realm)
|
|
billing_session.update_license_ledger_if_needed(timezone_now())
|
|
|
|
event = dict(
|
|
type="realm_user", op="update", person=dict(user_id=user_profile.id, role=user_profile.role)
|
|
)
|
|
send_event_on_commit(user_profile.realm, event, get_user_ids_who_can_access_user(user_profile))
|
|
|
|
UserGroupMembership.objects.filter(
|
|
user_profile=user_profile, user_group=old_system_group
|
|
).delete()
|
|
|
|
system_group = get_system_user_group_for_user(user_profile)
|
|
now = timezone_now()
|
|
UserGroupMembership.objects.create(user_profile=user_profile, user_group=system_group)
|
|
RealmAuditLog.objects.bulk_create(
|
|
[
|
|
RealmAuditLog(
|
|
realm=user_profile.realm,
|
|
modified_user=user_profile,
|
|
modified_user_group=old_system_group,
|
|
event_type=AuditLogEventType.USER_GROUP_DIRECT_USER_MEMBERSHIP_REMOVED,
|
|
event_time=now,
|
|
acting_user=acting_user,
|
|
),
|
|
RealmAuditLog(
|
|
realm=user_profile.realm,
|
|
modified_user=user_profile,
|
|
modified_user_group=system_group,
|
|
event_type=AuditLogEventType.USER_GROUP_DIRECT_USER_MEMBERSHIP_ADDED,
|
|
event_time=now,
|
|
acting_user=acting_user,
|
|
),
|
|
]
|
|
)
|
|
|
|
do_send_user_group_members_update_event("remove_members", old_system_group, [user_profile.id])
|
|
|
|
do_send_user_group_members_update_event("add_members", system_group, [user_profile.id])
|
|
|
|
if UserProfile.ROLE_MEMBER in [old_value, value]:
|
|
update_users_in_full_members_system_group(
|
|
user_profile.realm, [user_profile.id], acting_user=acting_user
|
|
)
|
|
|
|
send_stream_events_for_role_update(user_profile, previously_accessible_streams)
|
|
|
|
|
|
@transaction.atomic(savepoint=False)
|
|
def do_change_is_billing_admin(user_profile: UserProfile, value: bool) -> None:
|
|
event_time = timezone_now()
|
|
old_value = user_profile.is_billing_admin
|
|
|
|
user_profile.is_billing_admin = value
|
|
user_profile.save(update_fields=["is_billing_admin"])
|
|
|
|
RealmAuditLog.objects.create(
|
|
realm=user_profile.realm,
|
|
event_type=AuditLogEventType.USER_SPECIAL_PERMISSION_CHANGED,
|
|
event_time=event_time,
|
|
acting_user=None,
|
|
modified_user=user_profile,
|
|
extra_data={
|
|
RealmAuditLog.OLD_VALUE: old_value,
|
|
RealmAuditLog.NEW_VALUE: value,
|
|
"property": "is_billing_admin",
|
|
},
|
|
)
|
|
|
|
event = dict(
|
|
type="realm_user", op="update", person=dict(user_id=user_profile.id, is_billing_admin=value)
|
|
)
|
|
send_event_on_commit(user_profile.realm, event, get_user_ids_who_can_access_user(user_profile))
|
|
|
|
|
|
@transaction.atomic(savepoint=False)
|
|
def do_change_can_forge_sender(user_profile: UserProfile, value: bool) -> None:
|
|
event_time = timezone_now()
|
|
old_value = user_profile.can_forge_sender
|
|
|
|
user_profile.can_forge_sender = value
|
|
user_profile.save(update_fields=["can_forge_sender"])
|
|
|
|
RealmAuditLog.objects.create(
|
|
realm=user_profile.realm,
|
|
event_type=AuditLogEventType.USER_SPECIAL_PERMISSION_CHANGED,
|
|
event_time=event_time,
|
|
acting_user=None,
|
|
modified_user=user_profile,
|
|
extra_data={
|
|
RealmAuditLog.OLD_VALUE: old_value,
|
|
RealmAuditLog.NEW_VALUE: value,
|
|
"property": "can_forge_sender",
|
|
},
|
|
)
|
|
|
|
|
|
@transaction.atomic(savepoint=False)
|
|
def do_change_can_create_users(user_profile: UserProfile, value: bool) -> None:
|
|
event_time = timezone_now()
|
|
old_value = user_profile.can_create_users
|
|
|
|
user_profile.can_create_users = value
|
|
user_profile.save(update_fields=["can_create_users"])
|
|
|
|
RealmAuditLog.objects.create(
|
|
realm=user_profile.realm,
|
|
event_type=AuditLogEventType.USER_SPECIAL_PERMISSION_CHANGED,
|
|
event_time=event_time,
|
|
acting_user=None,
|
|
modified_user=user_profile,
|
|
extra_data={
|
|
RealmAuditLog.OLD_VALUE: old_value,
|
|
RealmAuditLog.NEW_VALUE: value,
|
|
"property": "can_create_users",
|
|
},
|
|
)
|
|
|
|
|
|
@transaction.atomic(savepoint=False)
|
|
def do_change_can_change_user_emails(user_profile: UserProfile, value: bool) -> None:
|
|
event_time = timezone_now()
|
|
old_value = user_profile.can_change_user_emails
|
|
|
|
user_profile.can_change_user_emails = value
|
|
user_profile.save(update_fields=["can_change_user_emails"])
|
|
|
|
RealmAuditLog.objects.create(
|
|
realm=user_profile.realm,
|
|
event_type=AuditLogEventType.USER_SPECIAL_PERMISSION_CHANGED,
|
|
event_time=event_time,
|
|
acting_user=None,
|
|
modified_user=user_profile,
|
|
extra_data={
|
|
RealmAuditLog.OLD_VALUE: old_value,
|
|
RealmAuditLog.NEW_VALUE: value,
|
|
"property": "can_change_user_emails",
|
|
},
|
|
)
|
|
|
|
|
|
@transaction.atomic(durable=True)
|
|
def do_update_outgoing_webhook_service(
|
|
bot_profile: UserProfile, service_interface: int, service_payload_url: str
|
|
) -> None:
|
|
# TODO: First service is chosen because currently one bot can only have one service.
|
|
# Update this once multiple services are supported.
|
|
service = get_bot_services(bot_profile.id)[0]
|
|
service.base_url = service_payload_url
|
|
service.interface = service_interface
|
|
service.save()
|
|
send_event_on_commit(
|
|
bot_profile.realm,
|
|
dict(
|
|
type="realm_bot",
|
|
op="update",
|
|
bot=dict(
|
|
user_id=bot_profile.id,
|
|
services=[
|
|
dict(
|
|
base_url=service.base_url, interface=service.interface, token=service.token
|
|
)
|
|
],
|
|
),
|
|
),
|
|
bot_owner_user_ids(bot_profile),
|
|
)
|
|
|
|
|
|
@transaction.atomic(durable=True)
|
|
def do_update_bot_config_data(bot_profile: UserProfile, config_data: dict[str, str]) -> None:
|
|
for key, value in config_data.items():
|
|
set_bot_config(bot_profile, key, value)
|
|
updated_config_data = get_bot_config(bot_profile)
|
|
send_event_on_commit(
|
|
bot_profile.realm,
|
|
dict(
|
|
type="realm_bot",
|
|
op="update",
|
|
bot=dict(
|
|
user_id=bot_profile.id,
|
|
services=[dict(config_data=updated_config_data)],
|
|
),
|
|
),
|
|
bot_owner_user_ids(bot_profile),
|
|
)
|
|
|
|
|
|
def get_service_dicts_for_bot(user_profile_id: int) -> list[dict[str, Any]]:
|
|
user_profile = get_user_profile_by_id(user_profile_id)
|
|
services = get_bot_services(user_profile_id)
|
|
if user_profile.bot_type == UserProfile.OUTGOING_WEBHOOK_BOT:
|
|
return [
|
|
{
|
|
"base_url": service.base_url,
|
|
"interface": service.interface,
|
|
"token": service.token,
|
|
}
|
|
for service in services
|
|
]
|
|
elif user_profile.bot_type == UserProfile.EMBEDDED_BOT:
|
|
try:
|
|
return [
|
|
{
|
|
"config_data": get_bot_config(user_profile),
|
|
"service_name": services[0].name,
|
|
}
|
|
]
|
|
# A ConfigError just means that there are no config entries for user_profile.
|
|
except ConfigError:
|
|
return []
|
|
else:
|
|
return []
|
|
|
|
|
|
def get_service_dicts_for_bots(
|
|
bot_dicts: list[dict[str, Any]], realm: Realm
|
|
) -> dict[int, list[dict[str, Any]]]:
|
|
bot_profile_ids = [bot_dict["id"] for bot_dict in bot_dicts]
|
|
bot_services_by_uid: dict[int, list[Service]] = defaultdict(list)
|
|
for service in Service.objects.filter(user_profile_id__in=bot_profile_ids):
|
|
bot_services_by_uid[service.user_profile_id].append(service)
|
|
|
|
embedded_bot_ids = [
|
|
bot_dict["id"] for bot_dict in bot_dicts if bot_dict["bot_type"] == UserProfile.EMBEDDED_BOT
|
|
]
|
|
embedded_bot_configs = get_bot_configs(embedded_bot_ids)
|
|
|
|
service_dicts_by_uid: dict[int, list[dict[str, Any]]] = {}
|
|
for bot_dict in bot_dicts:
|
|
bot_profile_id = bot_dict["id"]
|
|
bot_type = bot_dict["bot_type"]
|
|
services = bot_services_by_uid[bot_profile_id]
|
|
service_dicts: list[dict[str, Any]] = []
|
|
if bot_type == UserProfile.OUTGOING_WEBHOOK_BOT:
|
|
service_dicts = [
|
|
{
|
|
"base_url": service.base_url,
|
|
"interface": service.interface,
|
|
"token": service.token,
|
|
}
|
|
for service in services
|
|
]
|
|
elif bot_type == UserProfile.EMBEDDED_BOT and bot_profile_id in embedded_bot_configs:
|
|
bot_config = embedded_bot_configs[bot_profile_id]
|
|
service_dicts = [
|
|
{
|
|
"config_data": bot_config,
|
|
"service_name": services[0].name,
|
|
}
|
|
]
|
|
service_dicts_by_uid[bot_profile_id] = service_dicts
|
|
return service_dicts_by_uid
|
|
|
|
|
|
def get_owned_bot_dicts(
|
|
user_profile: UserProfile, include_all_realm_bots_if_admin: bool = True
|
|
) -> list[dict[str, Any]]:
|
|
if user_profile.is_realm_admin and include_all_realm_bots_if_admin:
|
|
result = get_bot_dicts_in_realm(user_profile.realm)
|
|
else:
|
|
result = UserProfile.objects.filter(
|
|
realm=user_profile.realm, is_bot=True, bot_owner=user_profile
|
|
).values(*bot_dict_fields)
|
|
services_by_ids = get_service_dicts_for_bots(result, user_profile.realm)
|
|
return [
|
|
{
|
|
"email": botdict["email"],
|
|
"user_id": botdict["id"],
|
|
"full_name": botdict["full_name"],
|
|
"bot_type": botdict["bot_type"],
|
|
"is_active": botdict["is_active"],
|
|
"api_key": botdict["api_key"],
|
|
"default_sending_stream": botdict["default_sending_stream__name"],
|
|
"default_events_register_stream": botdict["default_events_register_stream__name"],
|
|
"default_all_public_streams": botdict["default_all_public_streams"],
|
|
"owner_id": botdict["bot_owner_id"],
|
|
"avatar_url": get_avatar_field(
|
|
user_id=botdict["id"],
|
|
realm_id=botdict["realm_id"],
|
|
email=botdict["email"],
|
|
avatar_source=botdict["avatar_source"],
|
|
avatar_version=botdict["avatar_version"],
|
|
medium=False,
|
|
client_gravatar=False,
|
|
),
|
|
"services": services_by_ids[botdict["id"]],
|
|
}
|
|
for botdict in result
|
|
]
|
|
|
|
|
|
def generate_password_reset_url(
|
|
user_profile: UserProfile, token_generator: PasswordResetTokenGenerator
|
|
) -> str:
|
|
token = token_generator.make_token(user_profile)
|
|
uid = urlsafe_base64_encode(str(user_profile.id).encode())
|
|
endpoint = reverse("password_reset_confirm", kwargs=dict(uidb64=uid, token=token))
|
|
return f"{user_profile.realm.url}{endpoint}"
|
|
|
|
|
|
def do_send_password_reset_email(
|
|
email: str,
|
|
realm: Realm,
|
|
user_profile: UserProfile | None,
|
|
*,
|
|
token_generator: PasswordResetTokenGenerator = default_token_generator,
|
|
request: HttpRequest | None = None,
|
|
) -> None:
|
|
context: dict[str, object] = {
|
|
"email": email,
|
|
"realm_url": realm.url,
|
|
"realm_name": realm.name,
|
|
}
|
|
if user_profile is not None and not user_profile.is_active:
|
|
context["user_deactivated"] = True
|
|
user_profile = None
|
|
|
|
if user_profile is not None:
|
|
queue_soft_reactivation(user_profile.id)
|
|
context["active_account_in_realm"] = True
|
|
context["reset_url"] = generate_password_reset_url(user_profile, token_generator)
|
|
send_email(
|
|
"zerver/emails/password_reset",
|
|
to_user_ids=[user_profile.id],
|
|
from_name=FromAddress.security_email_from_name(user_profile=user_profile),
|
|
from_address=FromAddress.tokenized_no_reply_address(),
|
|
context=context,
|
|
realm=realm,
|
|
request=request,
|
|
)
|
|
else:
|
|
context["active_account_in_realm"] = False
|
|
active_accounts_in_other_realms = UserProfile.objects.filter(
|
|
delivery_email__iexact=email, is_active=True
|
|
)
|
|
if active_accounts_in_other_realms:
|
|
context["active_accounts_in_other_realms"] = active_accounts_in_other_realms
|
|
language = get_language()
|
|
|
|
send_email(
|
|
"zerver/emails/password_reset",
|
|
to_emails=[email],
|
|
from_name=FromAddress.security_email_from_name(language=language),
|
|
from_address=FromAddress.tokenized_no_reply_address(),
|
|
language=language,
|
|
context=context,
|
|
realm=realm,
|
|
request=request,
|
|
)
|