mirror of
				https://github.com/zulip/zulip.git
				synced 2025-11-04 05:53:43 +00:00 
			
		
		
		
	Make all strings passing through `json_error` and `JsonableError` translatable. Fixes #727
		
			
				
	
	
		
			548 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			548 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
from __future__ import absolute_import
 | 
						|
 | 
						|
from django.utils.translation import ugettext as _
 | 
						|
from django.http import HttpResponseRedirect
 | 
						|
from django.contrib.auth import REDIRECT_FIELD_NAME
 | 
						|
from django.views.decorators.csrf import csrf_exempt
 | 
						|
from django.http import QueryDict, HttpResponseNotAllowed
 | 
						|
from django.http.multipartparser import MultiPartParser
 | 
						|
from zerver.models import UserProfile, get_client, get_user_profile_by_email
 | 
						|
from zerver.lib.response import json_error, json_unauthorized
 | 
						|
from django.shortcuts import resolve_url
 | 
						|
from django.utils.decorators import available_attrs
 | 
						|
from django.utils.timezone import now
 | 
						|
from django.conf import settings
 | 
						|
from six.moves import cStringIO as StringIO
 | 
						|
from zerver.lib.queue import queue_json_publish
 | 
						|
from zerver.lib.timestamp import datetime_to_timestamp
 | 
						|
from zerver.lib.utils import statsd
 | 
						|
from zerver.exceptions import RateLimited
 | 
						|
from zerver.lib.rate_limiter import incr_ratelimit, is_ratelimited, \
 | 
						|
     api_calls_left
 | 
						|
from zerver.lib.request import REQ, has_request_variables, JsonableError, RequestVariableMissingError
 | 
						|
 | 
						|
from functools import wraps
 | 
						|
import base64
 | 
						|
import logging
 | 
						|
import cProfile
 | 
						|
from zerver.lib.mandrill_client import get_mandrill_client
 | 
						|
from six.moves import zip, urllib
 | 
						|
 | 
						|
if settings.ZULIP_COM:
 | 
						|
    from zilencer.models import get_deployment_by_domain, Deployment
 | 
						|
else:
 | 
						|
    from mock import Mock
 | 
						|
    get_deployment_by_domain = Mock()
 | 
						|
    Deployment = Mock() # type: ignore # https://github.com/JukkaL/mypy/issues/1188
 | 
						|
 | 
						|
def get_deployment_or_userprofile(role):
 | 
						|
    return get_user_profile_by_email(role) if "@" in role else get_deployment_by_domain(role)
 | 
						|
 | 
						|
class _RespondAsynchronously(object):
 | 
						|
    pass
 | 
						|
 | 
						|
# Return RespondAsynchronously from an @asynchronous view if the
 | 
						|
# response will be provided later by calling handler.zulip_finish(),
 | 
						|
# or has already been provided this way. We use this for longpolling
 | 
						|
# mode.
 | 
						|
RespondAsynchronously = _RespondAsynchronously()
 | 
						|
 | 
						|
def asynchronous(method):
 | 
						|
    @wraps(method)
 | 
						|
    def wrapper(request, *args, **kwargs):
 | 
						|
        return method(request, handler=request._tornado_handler, *args, **kwargs)
 | 
						|
    if getattr(method, 'csrf_exempt', False):
 | 
						|
        wrapper.csrf_exempt = True # type: ignore # https://github.com/JukkaL/mypy/issues/1170
 | 
						|
    return wrapper
 | 
						|
 | 
						|
def update_user_activity(request, user_profile):
 | 
						|
    # update_active_status also pushes to rabbitmq, and it seems
 | 
						|
    # redundant to log that here as well.
 | 
						|
    if request.META["PATH_INFO"] == '/json/users/me/presence':
 | 
						|
        return
 | 
						|
 | 
						|
    if hasattr(request, '_query'):
 | 
						|
        query = request._query
 | 
						|
    else:
 | 
						|
        query = request.META['PATH_INFO']
 | 
						|
 | 
						|
    event={'query': query,
 | 
						|
           'user_profile_id': user_profile.id,
 | 
						|
           'time': datetime_to_timestamp(now()),
 | 
						|
           'client': request.client.name}
 | 
						|
    queue_json_publish("user_activity", event, lambda event: None)
 | 
						|
 | 
						|
# Based on django.views.decorators.http.require_http_methods
 | 
						|
def require_post(func):
 | 
						|
    @wraps(func)
 | 
						|
    def wrapper(request, *args, **kwargs):
 | 
						|
        if (request.method != "POST"
 | 
						|
            and not (request.method == "SOCKET"
 | 
						|
                     and request.META['zulip.emulated_method'] == "POST")):
 | 
						|
            if request.method == "SOCKET":
 | 
						|
                err_method = "SOCKET/%s" % (request.META['zulip.emulated_method'],)
 | 
						|
            else:
 | 
						|
                err_method = request.method
 | 
						|
            logging.warning('Method Not Allowed (%s): %s', err_method, request.path,
 | 
						|
                            extra={'status_code': 405, 'request': request})
 | 
						|
            return HttpResponseNotAllowed(["POST"])
 | 
						|
        return func(request, *args, **kwargs)
 | 
						|
    return wrapper
 | 
						|
 | 
						|
def require_realm_admin(func):
 | 
						|
    @wraps(func)
 | 
						|
    def wrapper(request, user_profile, *args, **kwargs):
 | 
						|
        if not user_profile.is_realm_admin:
 | 
						|
            raise JsonableError(_("Must be a realm administrator"))
 | 
						|
        return func(request, user_profile, *args, **kwargs)
 | 
						|
    return wrapper
 | 
						|
 | 
						|
from zerver.lib.user_agent import parse_user_agent
 | 
						|
 | 
						|
def get_client_name(request, is_json_view):
 | 
						|
    # If the API request specified a client in the request content,
 | 
						|
    # that has priority.  Otherwise, extract the client from the
 | 
						|
    # User-Agent.
 | 
						|
    if 'client' in request.REQUEST:
 | 
						|
        return request.REQUEST['client']
 | 
						|
    elif "HTTP_USER_AGENT" in request.META:
 | 
						|
        user_agent = parse_user_agent(request.META["HTTP_USER_AGENT"])
 | 
						|
        # We could check for a browser's name being "Mozilla", but
 | 
						|
        # e.g. Opera and MobileSafari don't set that, and it seems
 | 
						|
        # more robust to just key off whether it was a json view
 | 
						|
        if user_agent["name"] != "ZulipDesktop" and is_json_view:
 | 
						|
            # Avoid changing the client string for browsers Once this
 | 
						|
            # is out to prod, we can name the field to something like
 | 
						|
            # Browser for consistency.
 | 
						|
            return "website"
 | 
						|
        else:
 | 
						|
            return user_agent["name"]
 | 
						|
    else:
 | 
						|
        # In the future, we will require setting USER_AGENT, but for
 | 
						|
        # now we just want to tag these requests so we can review them
 | 
						|
        # in logs and figure out the extent of the problem
 | 
						|
        if is_json_view:
 | 
						|
            return "website"
 | 
						|
        else:
 | 
						|
             return "Unspecified"
 | 
						|
 | 
						|
def process_client(request, user_profile, is_json_view=False, client_name=None):
 | 
						|
    if client_name is None:
 | 
						|
        client_name = get_client_name(request, is_json_view)
 | 
						|
 | 
						|
    # Transitional hack for early 2014.  Eventually the ios clients
 | 
						|
    # will all report ZulipiOS, and we can remove the next couple lines.
 | 
						|
    if client_name == 'ios':
 | 
						|
        client_name = 'ZulipiOS'
 | 
						|
 | 
						|
    request.client = get_client(client_name)
 | 
						|
    update_user_activity(request, user_profile)
 | 
						|
 | 
						|
def validate_api_key(role, api_key):
 | 
						|
    # Remove whitespace to protect users from trivial errors.
 | 
						|
    role, api_key = role.strip(), api_key.strip()
 | 
						|
 | 
						|
    try:
 | 
						|
        profile = get_deployment_or_userprofile(role)
 | 
						|
    except UserProfile.DoesNotExist:
 | 
						|
        raise JsonableError(_("Invalid user: %s") % (role,))
 | 
						|
    except Deployment.DoesNotExist:
 | 
						|
        raise JsonableError(_("Invalid deployment: %s") % (role,))
 | 
						|
 | 
						|
    if api_key != profile.api_key:
 | 
						|
        if len(api_key) != 32:
 | 
						|
            reason = _("Incorrect API key length (keys should be 32 "
 | 
						|
                       "characters long) for role '%s'")
 | 
						|
        else:
 | 
						|
            reason = _("Invalid API key for role '%s'")
 | 
						|
        raise JsonableError(reason % (role,))
 | 
						|
    if not profile.is_active:
 | 
						|
        raise JsonableError(_("Account not active"))
 | 
						|
    try:
 | 
						|
        if profile.realm.deactivated:
 | 
						|
            raise JsonableError(_("Realm for account has been deactivated"))
 | 
						|
    except AttributeError:
 | 
						|
        # Deployment objects don't have realms
 | 
						|
        pass
 | 
						|
    return profile
 | 
						|
 | 
						|
# Use this for webhook views that don't get an email passed in.
 | 
						|
def api_key_only_webhook_view(client_name):
 | 
						|
    def _wrapped_view_func(view_func):
 | 
						|
        @csrf_exempt
 | 
						|
        @has_request_variables
 | 
						|
        @wraps(view_func)
 | 
						|
        def _wrapped_func_arguments(request, api_key=REQ(),
 | 
						|
                                    *args, **kwargs):
 | 
						|
 | 
						|
            try:
 | 
						|
                user_profile = UserProfile.objects.get(api_key=api_key)
 | 
						|
            except UserProfile.DoesNotExist:
 | 
						|
                raise JsonableError(_("Invalid API key"))
 | 
						|
            if not user_profile.is_active:
 | 
						|
                raise JsonableError(_("Account not active"))
 | 
						|
            if user_profile.realm.deactivated:
 | 
						|
                raise JsonableError(_("Realm for account has been deactivated"))
 | 
						|
 | 
						|
            request.user = user_profile
 | 
						|
            request._email = user_profile.email
 | 
						|
            webhook_client_name = "Zulip{}Webhook".format(client_name)
 | 
						|
            process_client(request, user_profile, client_name=webhook_client_name)
 | 
						|
            if settings.RATE_LIMITING:
 | 
						|
                rate_limit_user(request, user_profile, domain='all')
 | 
						|
            return view_func(request, user_profile, request.client, *args, **kwargs)
 | 
						|
        return _wrapped_func_arguments
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
# From Django 1.8, modified to leave off ?next=/
 | 
						|
def redirect_to_login(next, login_url=None,
 | 
						|
                      redirect_field_name=REDIRECT_FIELD_NAME):
 | 
						|
    """
 | 
						|
    Redirects the user to the login page, passing the given 'next' page
 | 
						|
    """
 | 
						|
    resolved_url = resolve_url(login_url or settings.LOGIN_URL)
 | 
						|
 | 
						|
    login_url_parts = list(urllib.parse.urlparse(resolved_url))
 | 
						|
    if redirect_field_name:
 | 
						|
        querystring = QueryDict(login_url_parts[4], mutable=True)
 | 
						|
        querystring[redirect_field_name] = next
 | 
						|
        # Don't add ?next=/, to keep our URLs clean
 | 
						|
        if next != '/':
 | 
						|
            login_url_parts[4] = querystring.urlencode(safe='/')
 | 
						|
 | 
						|
    return HttpResponseRedirect(urllib.parse.urlunparse(login_url_parts))
 | 
						|
 | 
						|
# From Django 1.8
 | 
						|
def user_passes_test(test_func, login_url=None, redirect_field_name=REDIRECT_FIELD_NAME):
 | 
						|
    """
 | 
						|
    Decorator for views that checks that the user passes the given test,
 | 
						|
    redirecting to the log-in page if necessary. The test should be a callable
 | 
						|
    that takes the user object and returns True if the user passes.
 | 
						|
    """
 | 
						|
    def decorator(view_func):
 | 
						|
        @wraps(view_func, assigned=available_attrs(view_func))
 | 
						|
        def _wrapped_view(request, *args, **kwargs):
 | 
						|
            if test_func(request.user):
 | 
						|
                return view_func(request, *args, **kwargs)
 | 
						|
            path = request.build_absolute_uri()
 | 
						|
            resolved_login_url = resolve_url(login_url or settings.LOGIN_URL)
 | 
						|
            # If the login url is the same scheme and net location then just
 | 
						|
            # use the path as the "next" url.
 | 
						|
            login_scheme, login_netloc = urllib.parse.urlparse(resolved_login_url)[:2]
 | 
						|
            current_scheme, current_netloc = urllib.parse.urlparse(path)[:2]
 | 
						|
            if ((not login_scheme or login_scheme == current_scheme) and
 | 
						|
                    (not login_netloc or login_netloc == current_netloc)):
 | 
						|
                path = request.get_full_path()
 | 
						|
            return redirect_to_login(
 | 
						|
                path, resolved_login_url, redirect_field_name)
 | 
						|
        return _wrapped_view
 | 
						|
    return decorator
 | 
						|
 | 
						|
def logged_in_and_active(user_profile):
 | 
						|
    if not user_profile.is_authenticated():
 | 
						|
        return False
 | 
						|
    if not user_profile.is_active:
 | 
						|
        return False
 | 
						|
    if user_profile.realm.deactivated:
 | 
						|
        return False
 | 
						|
    return True
 | 
						|
 | 
						|
# Based on Django 1.8's @login_required
 | 
						|
def zulip_login_required(function=None,
 | 
						|
                         redirect_field_name=REDIRECT_FIELD_NAME,
 | 
						|
                         login_url=settings.HOME_NOT_LOGGED_IN):
 | 
						|
    actual_decorator = user_passes_test(
 | 
						|
        logged_in_and_active,
 | 
						|
        login_url=login_url,
 | 
						|
        redirect_field_name=redirect_field_name
 | 
						|
    )
 | 
						|
    if function:
 | 
						|
        return actual_decorator(function)
 | 
						|
    return actual_decorator
 | 
						|
 | 
						|
def zulip_internal(view_func):
 | 
						|
    @zulip_login_required
 | 
						|
    @wraps(view_func)
 | 
						|
    def _wrapped_view_func(request, *args, **kwargs):
 | 
						|
        request._query = view_func.__name__
 | 
						|
        if request.user.realm.domain != 'zulip.com':
 | 
						|
            return HttpResponseRedirect(settings.HOME_NOT_LOGGED_IN)
 | 
						|
 | 
						|
        request._email = request.user.email
 | 
						|
        process_client(request, request.user)
 | 
						|
        return view_func(request, *args, **kwargs)
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
# authenticated_api_view will add the authenticated user's
 | 
						|
# user_profile to the view function's arguments list, since we have to
 | 
						|
# look it up anyway.  It is deprecated in favor on the REST API
 | 
						|
# versions.
 | 
						|
def authenticated_api_view(view_func):
 | 
						|
    @csrf_exempt
 | 
						|
    @require_post
 | 
						|
    @has_request_variables
 | 
						|
    @wraps(view_func)
 | 
						|
    def _wrapped_view_func(request, email=REQ(), api_key=REQ('api_key', default=None),
 | 
						|
                           api_key_legacy=REQ('api-key', default=None),
 | 
						|
                           *args, **kwargs):
 | 
						|
        if not api_key and not api_key_legacy:
 | 
						|
            raise RequestVariableMissingError("api_key")
 | 
						|
        elif not api_key:
 | 
						|
            api_key = api_key_legacy
 | 
						|
        user_profile = validate_api_key(email, api_key)
 | 
						|
        request.user = user_profile
 | 
						|
        request._email = user_profile.email
 | 
						|
        process_client(request, user_profile)
 | 
						|
        # Apply rate limiting
 | 
						|
        limited_func = rate_limit()(view_func)
 | 
						|
        return limited_func(request, user_profile, *args, **kwargs)
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
# A more REST-y authentication decorator, using, in particular, HTTP Basic
 | 
						|
# authentication.
 | 
						|
def authenticated_rest_api_view(view_func):
 | 
						|
    @csrf_exempt
 | 
						|
    @wraps(view_func)
 | 
						|
    def _wrapped_view_func(request, *args, **kwargs):
 | 
						|
        # First try block attempts to get the credentials we need to do authentication
 | 
						|
        try:
 | 
						|
            # Grab the base64-encoded authentication string, decode it, and split it into
 | 
						|
            # the email and API key
 | 
						|
            auth_type, encoded_value = request.META['HTTP_AUTHORIZATION'].split()
 | 
						|
            # case insensitive per RFC 1945
 | 
						|
            if auth_type.lower() != "basic":
 | 
						|
                return json_error(_("Only Basic authentication is supported."))
 | 
						|
            role, api_key = base64.b64decode(encoded_value).split(":")
 | 
						|
        except ValueError:
 | 
						|
            return json_error(_("Invalid authorization header for basic auth"))
 | 
						|
        except KeyError:
 | 
						|
            return json_unauthorized("Missing authorization header for basic auth")
 | 
						|
 | 
						|
        # Now we try to do authentication or die
 | 
						|
        try:
 | 
						|
            # Could be a UserProfile or a Deployment
 | 
						|
            profile = validate_api_key(role, api_key)
 | 
						|
        except JsonableError as e:
 | 
						|
            return json_unauthorized(e.error)
 | 
						|
        request.user = profile
 | 
						|
        process_client(request, profile)
 | 
						|
        if isinstance(profile, UserProfile):
 | 
						|
            request._email = profile.email
 | 
						|
        else:
 | 
						|
            request._email = "deployment:" + role
 | 
						|
            profile.rate_limits = ""
 | 
						|
        # Apply rate limiting
 | 
						|
        return rate_limit()(view_func)(request, profile, *args, **kwargs)
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
def process_as_post(view_func):
 | 
						|
    @wraps(view_func)
 | 
						|
    def _wrapped_view_func(request, *args, **kwargs):
 | 
						|
        # Adapted from django/http/__init__.py.
 | 
						|
        # So by default Django doesn't populate request.POST for anything besides
 | 
						|
        # POST requests. We want this dict populated for PATCH/PUT, so we have to
 | 
						|
        # do it ourselves.
 | 
						|
        #
 | 
						|
        # This will not be required in the future, a bug will be filed against
 | 
						|
        # Django upstream.
 | 
						|
 | 
						|
        if not request.POST:
 | 
						|
            # Only take action if POST is empty.
 | 
						|
            if request.META.get('CONTENT_TYPE', '').startswith('multipart'):
 | 
						|
                # Note that request._files is just the private attribute that backs the
 | 
						|
                # FILES property, so we are essentially setting request.FILES here.  (In
 | 
						|
                # Django 1.5 FILES was still a read-only property.)
 | 
						|
                request.POST, request._files = MultiPartParser(request.META, StringIO(request.body),
 | 
						|
                        request.upload_handlers, request.encoding).parse()
 | 
						|
            else:
 | 
						|
                request.POST = QueryDict(request.body, encoding=request.encoding)
 | 
						|
 | 
						|
        return view_func(request, *args, **kwargs)
 | 
						|
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
def authenticate_log_and_execute_json(request, view_func, *args, **kwargs):
 | 
						|
    if not request.user.is_authenticated():
 | 
						|
        return json_error(_("Not logged in"), status=401)
 | 
						|
    user_profile = request.user
 | 
						|
    if not user_profile.is_active:
 | 
						|
        raise JsonableError(_("Account not active"))
 | 
						|
    if user_profile.realm.deactivated:
 | 
						|
        raise JsonableError(_("Realm for account has been deactivated"))
 | 
						|
    process_client(request, user_profile, True)
 | 
						|
    request._email = user_profile.email
 | 
						|
    return view_func(request, user_profile, *args, **kwargs)
 | 
						|
 | 
						|
# Checks if the request is a POST request and that the user is logged
 | 
						|
# in.  If not, return an error (the @login_required behavior of
 | 
						|
# redirecting to a login page doesn't make sense for json views)
 | 
						|
def authenticated_json_post_view(view_func):
 | 
						|
    @require_post
 | 
						|
    @has_request_variables
 | 
						|
    @wraps(view_func)
 | 
						|
    def _wrapped_view_func(request,
 | 
						|
                           *args, **kwargs):
 | 
						|
        return authenticate_log_and_execute_json(request, view_func, *args, **kwargs)
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
def authenticated_json_view(view_func):
 | 
						|
    @wraps(view_func)
 | 
						|
    def _wrapped_view_func(request,
 | 
						|
                           *args, **kwargs):
 | 
						|
        return authenticate_log_and_execute_json(request, view_func, *args, **kwargs)
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
# These views are used by the main Django server to notify the Tornado server
 | 
						|
# of events.  We protect them from the outside world by checking a shared
 | 
						|
# secret, and also the originating IP (for now).
 | 
						|
def authenticate_notify(request):
 | 
						|
    return (request.META['REMOTE_ADDR'] in ('127.0.0.1', '::1')
 | 
						|
            and request.POST.get('secret') == settings.SHARED_SECRET)
 | 
						|
 | 
						|
def internal_notify_view(view_func):
 | 
						|
    @csrf_exempt
 | 
						|
    @require_post
 | 
						|
    @wraps(view_func)
 | 
						|
    def _wrapped_view_func(request, *args, **kwargs):
 | 
						|
        if not authenticate_notify(request):
 | 
						|
            return json_error(_('Access denied'), status=403)
 | 
						|
        if not hasattr(request, '_tornado_handler'):
 | 
						|
            # We got called through the non-Tornado server somehow.
 | 
						|
            # This is not a security check; it's an internal assertion
 | 
						|
            # to help us find bugs.
 | 
						|
            raise RuntimeError('notify view called with no Tornado handler')
 | 
						|
        request._email = "internal"
 | 
						|
        return view_func(request, *args, **kwargs)
 | 
						|
    return _wrapped_view_func
 | 
						|
 | 
						|
# Converter functions for use with has_request_variables
 | 
						|
def to_non_negative_int(x):
 | 
						|
    x = int(x)
 | 
						|
    if x < 0:
 | 
						|
        raise ValueError("argument is negative")
 | 
						|
    return x
 | 
						|
 | 
						|
def to_non_negative_float(x):
 | 
						|
    x = float(x)
 | 
						|
    if x < 0:
 | 
						|
        raise ValueError("argument is negative")
 | 
						|
    return x
 | 
						|
 | 
						|
def flexible_boolean(boolean):
 | 
						|
    """Returns True for any of "1", "true", or "True".  Returns False otherwise."""
 | 
						|
    if boolean in ("1", "true", "True"):
 | 
						|
        return True
 | 
						|
    else:
 | 
						|
        return False
 | 
						|
 | 
						|
def statsd_increment(counter, val=1):
 | 
						|
    """Increments a statsd counter on completion of the
 | 
						|
    decorated function.
 | 
						|
 | 
						|
    Pass the name of the counter to this decorator-returning function."""
 | 
						|
    def wrapper(func):
 | 
						|
        @wraps(func)
 | 
						|
        def wrapped_func(*args, **kwargs):
 | 
						|
            ret = func(*args, **kwargs)
 | 
						|
            statsd.incr(counter, val)
 | 
						|
            return ret
 | 
						|
        return wrapped_func
 | 
						|
    return wrapper
 | 
						|
 | 
						|
def rate_limit_user(request, user, domain):
 | 
						|
    """Returns whether or not a user was rate limited. Will raise a RateLimited exception
 | 
						|
    if the user has been rate limited, otherwise returns and modifies request to contain
 | 
						|
    the rate limit information"""
 | 
						|
 | 
						|
    ratelimited, time = is_ratelimited(user, domain)
 | 
						|
    request._ratelimit_applied_limits = True
 | 
						|
    request._ratelimit_secs_to_freedom = time
 | 
						|
    request._ratelimit_over_limit = ratelimited
 | 
						|
    # Abort this request if the user is over her rate limits
 | 
						|
    if ratelimited:
 | 
						|
        statsd.incr("ratelimiter.limited.%s.%s" % (type(user), user.id))
 | 
						|
        raise RateLimited()
 | 
						|
 | 
						|
    incr_ratelimit(user, domain)
 | 
						|
    calls_remaining, time_reset = api_calls_left(user, domain)
 | 
						|
 | 
						|
    request._ratelimit_remaining = calls_remaining
 | 
						|
    request._ratelimit_secs_to_freedom = time_reset
 | 
						|
 | 
						|
def rate_limit(domain='all'):
 | 
						|
    """Rate-limits a view. Takes an optional 'domain' param if you wish to rate limit different
 | 
						|
    types of API calls independently.
 | 
						|
 | 
						|
    Returns a decorator"""
 | 
						|
    def wrapper(func):
 | 
						|
        @wraps(func)
 | 
						|
        def wrapped_func(request, *args, **kwargs):
 | 
						|
            # Don't rate limit requests from Django that come from our own servers,
 | 
						|
            # and don't rate-limit dev instances
 | 
						|
            no_limits = False
 | 
						|
            if request.client and request.client.name.lower() == 'internal' and \
 | 
						|
               (request.META['REMOTE_ADDR'] in ['::1', '127.0.0.1'] or settings.DEBUG):
 | 
						|
                no_limits = True
 | 
						|
 | 
						|
            if no_limits:
 | 
						|
                return func(request, *args, **kwargs)
 | 
						|
 | 
						|
            try:
 | 
						|
                user = request.user
 | 
						|
            except:
 | 
						|
                user = None
 | 
						|
 | 
						|
            # Rate-limiting data is stored in redis
 | 
						|
            # We also only support rate-limiting authenticated
 | 
						|
            # views right now.
 | 
						|
            # TODO(leo) - implement per-IP non-authed rate limiting
 | 
						|
            if not settings.RATE_LIMITING or not user:
 | 
						|
                if not user:
 | 
						|
                    logging.error("Requested rate-limiting on %s but user is not authenticated!" % \
 | 
						|
                                     func.__name__)
 | 
						|
                return func(request, *args, **kwargs)
 | 
						|
 | 
						|
            rate_limit_user(request, user, domain)
 | 
						|
 | 
						|
            return func(request, *args, **kwargs)
 | 
						|
        return wrapped_func
 | 
						|
    return wrapper
 | 
						|
 | 
						|
def profiled(func):
 | 
						|
    """
 | 
						|
    This decorator should obviously be used only in a dev environment.
 | 
						|
    It works best when surrounding a function that you expect to be
 | 
						|
    called once.  One strategy is to write a backend test and wrap the
 | 
						|
    test case with the profiled decorator.
 | 
						|
 | 
						|
    You can run a single test case like this:
 | 
						|
 | 
						|
        # edit zerver/tests/test_external.py and place @profiled above the test case below
 | 
						|
        ./tools/test-backend zerver.tests.test_external.RateLimitTests.test_ratelimit_decrease
 | 
						|
 | 
						|
    Then view the results like this:
 | 
						|
 | 
						|
        ./tools/show-profile-results.py test_ratelimit_decrease.profile
 | 
						|
 | 
						|
    """
 | 
						|
    @wraps(func)
 | 
						|
    def wrapped_func(*args, **kwargs):
 | 
						|
        fn = func.__name__ + ".profile"
 | 
						|
        prof = cProfile.Profile()
 | 
						|
        retval = prof.runcall(func, *args, **kwargs)
 | 
						|
        prof.dump_stats(fn)
 | 
						|
        return retval
 | 
						|
    return wrapped_func
 | 
						|
 | 
						|
def uses_mandrill(func):
 | 
						|
    """
 | 
						|
    This decorator takes a function with keyword argument "mail_client" and
 | 
						|
    fills it in with the mail_client for the Mandrill account.
 | 
						|
    """
 | 
						|
    @wraps(func)
 | 
						|
    def wrapped_func(*args, **kwargs):
 | 
						|
        kwargs['mail_client'] = get_mandrill_client()
 | 
						|
        return func(*args, **kwargs)
 | 
						|
    return wrapped_func
 | 
						|
 |