zulip/zerver/lib/management.py

285 lines
11 KiB
Python

# Library code for use in management commands
import logging
import os
import sys
from argparse import ArgumentParser, BooleanOptionalAction, RawTextHelpFormatter, _ActionsContainer
from dataclasses import dataclass
from functools import reduce, wraps
from typing import Any, Protocol
from django.conf import settings
from django.core import validators
from django.core.exceptions import MultipleObjectsReturned, ValidationError
from django.core.management.base import BaseCommand, CommandError, CommandParser
from django.db.models import Q, QuerySet
from typing_extensions import override
from zerver.lib.context_managers import lockfile_nonblocking
from zerver.lib.initial_password import initial_password
from zerver.models import Client, Realm, UserProfile
from zerver.models.clients import get_client
def is_integer_string(val: str) -> bool:
try:
int(val)
return True
except ValueError:
return False
def check_config() -> None:
for setting_name, default in settings.REQUIRED_SETTINGS:
# if required setting is the same as default OR is not found in settings,
# throw error to add/set that setting in config
try:
if getattr(settings, setting_name) != default:
continue
except AttributeError:
pass
raise CommandError(f"Error: You must set {setting_name} in /etc/zulip/settings.py.")
class HandleMethod(Protocol):
def __call__(self, *args: Any, **kwargs: Any) -> None: ...
def abort_unless_locked(handle_func: HandleMethod) -> HandleMethod:
@wraps(handle_func)
def our_handle(self: BaseCommand, *args: Any, **kwargs: Any) -> None:
os.makedirs(settings.LOCKFILE_DIRECTORY, exist_ok=True)
# Trim out just the last part of the module name, which is the
# command name, to use as the lockfile name;
# `zerver.management.commands.send_zulip_update_announcements`
# becomes `/srv/zulip-locks/send_zulip_update_announcements.lock`
lockfile_name = handle_func.__module__.split(".")[-1]
lockfile_path = settings.LOCKFILE_DIRECTORY + "/" + lockfile_name + ".lock"
with lockfile_nonblocking(lockfile_path) as lock_acquired:
if not lock_acquired: # nocoverage
self.stdout.write(
self.style.ERROR(f"Lock {lockfile_path} is unavailable; exiting.")
)
sys.exit(1)
handle_func(self, *args, **kwargs)
return our_handle
@dataclass
class CreateUserParameters:
email: str
full_name: str
password: str | None
class ZulipBaseCommand(BaseCommand):
# Fix support for multi-line usage
@override
def create_parser(self, prog_name: str, subcommand: str, **kwargs: Any) -> CommandParser:
parser = super().create_parser(prog_name, subcommand, **kwargs)
parser.add_argument(
"--automated",
help="This command is run non-interactively (enables Sentry, etc)",
action=BooleanOptionalAction,
default=not sys.stdin.isatty(),
)
parser.formatter_class = RawTextHelpFormatter
return parser
@override
def execute(self, *args: Any, **options: Any) -> None:
if settings.SENTRY_DSN and not options["automated"]: # nocoverage
import sentry_sdk
# This deactivates Sentry
sentry_sdk.init()
super().execute(*args, **options)
def add_realm_args(
self, parser: ArgumentParser, *, required: bool = False, help: str | None = None
) -> None:
if help is None:
help = """The numeric or string ID (subdomain) of the Zulip organization to modify.
You can use the command list_realms to find ID of the realms in this server."""
parser.add_argument("-r", "--realm", dest="realm_id", required=required, help=help)
def add_create_user_args(self, parser: ArgumentParser) -> None:
parser.add_argument(
"email",
metavar="<email>",
nargs="?",
help="Email address for the new user",
)
parser.add_argument(
"full_name",
metavar="<full name>",
nargs="?",
help="Full name for the new user",
)
parser.add_argument(
"--password",
help="""\
Password for the new user. Recommended only in a development environment.
Sending passwords via command-line arguments is insecure,
since it can be snooped by any process running on the
server via `ps -ef` or reading bash history. Prefer
--password-file.""",
)
parser.add_argument("--password-file", help="File containing a password for the new user.")
def add_user_list_args(
self,
parser: _ActionsContainer,
help: str = "A comma-separated list of email addresses.",
all_users_help: str = "All users in realm.",
) -> None:
parser.add_argument("-u", "--users", help=help)
parser.add_argument("-a", "--all-users", action="store_true", help=all_users_help)
def get_realm(self, options: dict[str, Any]) -> Realm | None:
val = options["realm_id"]
if val is None:
return None
# If they specified a realm argument, we need to ensure the
# realm exists. We allow two formats: the numeric ID for the
# realm and the string ID of the realm.
try:
if is_integer_string(val):
return Realm.objects.get(id=val)
return Realm.objects.get(string_id=val)
except Realm.DoesNotExist:
raise CommandError(
"There is no realm with id '{}'. Aborting.".format(options["realm_id"])
)
def get_users(
self,
options: dict[str, Any],
realm: Realm | None,
is_bot: bool | None = None,
include_deactivated: bool = False,
) -> QuerySet[UserProfile]:
if "all_users" in options:
all_users = options["all_users"]
if not options["users"] and not all_users:
raise CommandError("You have to pass either -u/--users or -a/--all-users.")
if options["users"] and all_users:
raise CommandError("You can't use both -u/--users and -a/--all-users.")
if all_users and realm is None:
raise CommandError("The --all-users option requires a realm; please pass --realm.")
if all_users:
user_profiles = UserProfile.objects.filter(realm=realm)
if not include_deactivated:
user_profiles = user_profiles.filter(is_active=True)
if is_bot is not None:
return user_profiles.filter(is_bot=is_bot)
return user_profiles
if options["users"] is None:
return UserProfile.objects.none()
emails = {email.strip() for email in options["users"].split(",")}
# This is inefficient, but we fetch (and throw away) the
# get_user of each email, so that we verify that the email
# address/realm returned only one result; it may return more
# if realm is not specified but email address was.
for email in emails:
self.get_user(email, realm)
user_profiles = UserProfile.objects.all().select_related("realm")
if realm is not None:
user_profiles = user_profiles.filter(realm=realm)
email_matches = [Q(delivery_email__iexact=e) for e in emails]
user_profiles = user_profiles.filter(reduce(lambda a, b: a | b, email_matches)).order_by(
"id"
)
# Return the single query, for ease of composing.
return user_profiles
def get_user(self, email: str, realm: Realm | None) -> UserProfile:
# If a realm is specified, try to find the user there, and
# throw an error if they don't exist.
if realm is not None:
try:
return UserProfile.objects.select_related("realm").get(
delivery_email__iexact=email.strip(), realm=realm
)
except UserProfile.DoesNotExist:
raise CommandError(
f"The realm '{realm}' does not contain a user with email '{email}'"
)
# Realm is None in the remaining code path. Here, we
# optimistically try to see if there is exactly one user with
# that email; if so, we'll return it.
try:
return UserProfile.objects.select_related("realm").get(
delivery_email__iexact=email.strip()
)
except MultipleObjectsReturned:
raise CommandError(
"This Zulip server contains multiple users with that email (in different realms);"
" please pass `--realm` to specify which one to modify."
)
except UserProfile.DoesNotExist:
raise CommandError(f"This Zulip server does not contain a user with email '{email}'")
def get_client(self) -> Client:
"""Returns a Zulip Client object to be used for things done in management commands"""
return get_client("ZulipServer")
def get_create_user_params(self, options: dict[str, Any]) -> CreateUserParameters: # nocoverage
"""
Parses parameters for user creation defined in add_create_user_args.
"""
if options["email"] is None:
email = input("Email: ")
else:
email = options["email"]
try:
validators.validate_email(email)
except ValidationError:
raise CommandError("Invalid email address.")
if options["full_name"] is None:
full_name = input("Full name: ")
else:
full_name = options["full_name"]
if options["password_file"] is not None:
with open(options["password_file"]) as f:
password: str | None = f.read().strip()
elif options["password"] is not None:
logging.warning(
"Passing password on the command line is insecure; prefer --password-file."
)
password = options["password"]
else:
# initial_password will return a random password that
# is a salted hash of the email address in a
# development environment, and None in a production
# environment.
user_initial_password = initial_password(email)
if user_initial_password is None:
logging.info("User will be created with a disabled password.")
else:
assert settings.DEVELOPMENT
logging.info("Password will be available via `./manage.py print_initial_password`.")
password = user_initial_password
return CreateUserParameters(
email=email,
full_name=full_name,
password=password,
)