mirror of
https://github.com/zulip/zulip.git
synced 2025-10-23 04:52:12 +00:00
When the slack import fails due to invalid zip file being uploaded, we take user back to the file upload page with an appropriate error message.
1645 lines
68 KiB
Python
1645 lines
68 KiB
Python
import logging
|
|
from collections.abc import Iterable
|
|
from contextlib import suppress
|
|
from typing import Annotated, Any
|
|
from urllib.parse import urlencode, urljoin
|
|
|
|
import orjson
|
|
from django.conf import settings
|
|
from django.contrib.auth import REDIRECT_FIELD_NAME, authenticate, get_backends
|
|
from django.contrib.auth.tokens import default_token_generator
|
|
from django.contrib.sessions.backends.base import SessionBase
|
|
from django.core import validators
|
|
from django.core.exceptions import ValidationError
|
|
from django.db import transaction
|
|
from django.db.models import Q
|
|
from django.db.utils import IntegrityError
|
|
from django.http import HttpRequest, HttpResponse, HttpResponseRedirect
|
|
from django.shortcuts import redirect, render
|
|
from django.template.response import TemplateResponse
|
|
from django.urls import reverse
|
|
from django.utils.translation import get_language
|
|
from django.utils.translation import gettext as _
|
|
from django_auth_ldap.backend import LDAPBackend, _LDAPUser
|
|
from pydantic import Json, NonNegativeInt, StringConstraints
|
|
|
|
from confirmation import settings as confirmation_settings
|
|
from confirmation.models import (
|
|
Confirmation,
|
|
ConfirmationKeyError,
|
|
RealmCreationKey,
|
|
create_confirmation_link,
|
|
get_object_from_key,
|
|
render_confirmation_key_error,
|
|
validate_key,
|
|
)
|
|
from zerver.actions.create_realm import do_create_realm
|
|
from zerver.actions.create_user import do_activate_mirror_dummy_user, do_create_user
|
|
from zerver.actions.default_streams import lookup_default_stream_groups
|
|
from zerver.actions.user_settings import (
|
|
do_change_full_name,
|
|
do_change_password,
|
|
do_change_user_delivery_email,
|
|
do_change_user_setting,
|
|
)
|
|
from zerver.actions.users import do_change_user_role, generate_password_reset_url
|
|
from zerver.context_processors import (
|
|
get_realm_create_form_context,
|
|
get_realm_from_request,
|
|
is_realm_import_enabled,
|
|
login_context,
|
|
)
|
|
from zerver.decorator import add_google_analytics, do_login, require_post
|
|
from zerver.forms import (
|
|
CaptchaRealmCreationForm,
|
|
FindMyTeamForm,
|
|
HomepageForm,
|
|
ImportRealmOwnerSelectionForm,
|
|
RealmCreationForm,
|
|
RealmRedirectForm,
|
|
RegistrationForm,
|
|
)
|
|
from zerver.lib.email_validation import email_allowed_for_realm, validate_email_not_already_in_realm
|
|
from zerver.lib.exceptions import JsonableError, RateLimitedError
|
|
from zerver.lib.i18n import (
|
|
get_browser_language_code,
|
|
get_default_language_for_anonymous_user,
|
|
get_default_language_for_new_user,
|
|
get_language_name,
|
|
)
|
|
from zerver.lib.pysa import mark_sanitized
|
|
from zerver.lib.queue import queue_json_publish_rollback_unsafe
|
|
from zerver.lib.rate_limiter import rate_limit_request_by_ip
|
|
from zerver.lib.response import json_success
|
|
from zerver.lib.send_email import EmailNotDeliveredError, FromAddress, send_email
|
|
from zerver.lib.sessions import get_expirable_session_var
|
|
from zerver.lib.subdomains import get_subdomain
|
|
from zerver.lib.typed_endpoint import (
|
|
ApiParamConfig,
|
|
PathOnly,
|
|
typed_endpoint,
|
|
typed_endpoint_without_parameters,
|
|
)
|
|
from zerver.lib.typed_endpoint_validators import (
|
|
check_int_in_validator,
|
|
non_negative_int_or_none_validator,
|
|
timezone_or_empty_validator,
|
|
)
|
|
from zerver.lib.upload import all_message_attachments
|
|
from zerver.lib.url_encoding import append_url_query_string
|
|
from zerver.lib.users import get_accounts_for_email
|
|
from zerver.lib.zephyr import compute_mit_user_fullname
|
|
from zerver.models import (
|
|
Message,
|
|
MultiuseInvite,
|
|
NamedUserGroup,
|
|
PreregistrationRealm,
|
|
PreregistrationUser,
|
|
Realm,
|
|
RealmUserDefault,
|
|
Stream,
|
|
UserProfile,
|
|
)
|
|
from zerver.models.constants import MAX_LANGUAGE_ID_LENGTH
|
|
from zerver.models.realm_audit_logs import AuditLogEventType, RealmAuditLog
|
|
from zerver.models.realms import (
|
|
DisposableEmailError,
|
|
DomainNotAllowedForRealmError,
|
|
EmailContainsPlusError,
|
|
get_org_type_display_name,
|
|
get_realm,
|
|
name_changes_disabled,
|
|
)
|
|
from zerver.models.streams import get_default_stream_groups
|
|
from zerver.models.users import (
|
|
get_source_profile,
|
|
get_user_by_delivery_email,
|
|
get_user_profile_by_id_in_realm,
|
|
)
|
|
from zerver.views.auth import (
|
|
create_preregistration_realm,
|
|
create_preregistration_user,
|
|
finish_desktop_flow,
|
|
finish_mobile_flow,
|
|
get_safe_redirect_to,
|
|
redirect_and_log_into_subdomain,
|
|
redirect_to_deactivation_notice,
|
|
)
|
|
from zerver.views.errors import config_error
|
|
from zproject.backends import (
|
|
ExternalAuthResult,
|
|
NoMatchingLDAPUserError,
|
|
ZulipLDAPAuthBackend,
|
|
email_auth_enabled,
|
|
email_belongs_to_ldap,
|
|
get_external_method_dicts,
|
|
ldap_auth_enabled,
|
|
password_auth_enabled,
|
|
)
|
|
|
|
|
|
@typed_endpoint
|
|
def get_prereg_key_and_redirect(
|
|
request: HttpRequest, *, confirmation_key: PathOnly[str], full_name: str | None = None
|
|
) -> HttpResponse:
|
|
"""
|
|
The purpose of this little endpoint is primarily to take a GET
|
|
request to a long URL containing a confirmation key, and render
|
|
a page that will via JavaScript immediately do a POST request to
|
|
/accounts/register, so that the user can create their account on
|
|
a page with a cleaner URL (and with the browser security and UX
|
|
benefits of an HTTP POST having generated the page).
|
|
|
|
The only thing it does before rendering that page is to check
|
|
the validity of the confirmation link. This is redundant with a
|
|
similar check in accounts_register, but it provides a slightly nicer
|
|
user-facing error handling experience if the URL you visited is
|
|
displayed in the browser. (E.g. you can debug that you
|
|
accidentally adding an extra character after pasting).
|
|
"""
|
|
try:
|
|
prereg_object, realm_creation = check_prereg_key(request, confirmation_key)
|
|
except ConfirmationKeyError as e:
|
|
return render_confirmation_key_error(request, e)
|
|
|
|
registration_url = reverse("accounts_register")
|
|
if realm_creation:
|
|
assert isinstance(prereg_object, PreregistrationRealm)
|
|
if prereg_object.data_import_metadata.get("import_from") == "slack":
|
|
registration_url = reverse("import_realm_from_slack")
|
|
else:
|
|
registration_url = reverse("realm_register")
|
|
|
|
return render(
|
|
request,
|
|
"confirmation/confirm_preregistrationuser.html",
|
|
context={
|
|
"key": confirmation_key,
|
|
"full_name": full_name,
|
|
"registration_url": registration_url,
|
|
},
|
|
)
|
|
|
|
|
|
def check_prereg_key(
|
|
request: HttpRequest, confirmation_key: str
|
|
) -> tuple[PreregistrationUser | PreregistrationRealm, bool]:
|
|
"""
|
|
Checks if the Confirmation key is valid, returning the PreregistrationUser or
|
|
PreregistrationRealm object in case of success and raising an appropriate
|
|
ConfirmationKeyError otherwise.
|
|
"""
|
|
confirmation_types = [
|
|
Confirmation.USER_REGISTRATION,
|
|
Confirmation.INVITATION,
|
|
Confirmation.REALM_CREATION,
|
|
]
|
|
|
|
prereg_object = get_object_from_key(
|
|
confirmation_key, confirmation_types, mark_object_used=False
|
|
)
|
|
assert isinstance(prereg_object, PreregistrationRealm | PreregistrationUser)
|
|
|
|
confirmation_obj = prereg_object.confirmation.get()
|
|
realm_creation = confirmation_obj.type == Confirmation.REALM_CREATION
|
|
|
|
if realm_creation:
|
|
assert isinstance(prereg_object, PreregistrationRealm)
|
|
if prereg_object.data_import_metadata.get("need_select_realm_owner"):
|
|
# Allow user to get back to the import page to select realm owner.
|
|
# This is for a special case where the realm import has finished
|
|
# but user closed the import process browser window and needs to
|
|
# get back to the import page from the email confirmation link.
|
|
assert prereg_object.created_realm is not None
|
|
else:
|
|
# Defensive assert to make sure no mix-up in how .status is set leading to reuse
|
|
# of a PreregistrationRealm object.
|
|
assert prereg_object.created_realm is None
|
|
else:
|
|
assert isinstance(prereg_object, PreregistrationUser)
|
|
# Defensive assert to make sure no mix-up in how .status is set leading to reuse
|
|
# of a PreregistrationUser object.
|
|
assert prereg_object.created_user is None
|
|
|
|
return prereg_object, realm_creation
|
|
|
|
|
|
def get_selected_realm_type_name(prereg_realm: PreregistrationRealm | None) -> str | None:
|
|
if prereg_realm is None:
|
|
# We show the selected realm type only when creating new realm.
|
|
return None
|
|
|
|
return get_org_type_display_name(prereg_realm.org_type)
|
|
|
|
|
|
def get_selected_realm_default_language_name(
|
|
prereg_realm: PreregistrationRealm | None,
|
|
) -> str | None:
|
|
if prereg_realm is None:
|
|
# We show the selected realm language only when creating new realm.
|
|
return None
|
|
|
|
return get_language_name(prereg_realm.default_language)
|
|
|
|
|
|
@add_google_analytics
|
|
@require_post
|
|
def realm_register(*args: Any, **kwargs: Any) -> HttpResponse:
|
|
return registration_helper(*args, **kwargs)
|
|
|
|
|
|
@require_post
|
|
def accounts_register(*args: Any, **kwargs: Any) -> HttpResponse:
|
|
return registration_helper(*args, **kwargs)
|
|
|
|
|
|
@require_post
|
|
def import_realm_from_slack(*args: Any, **kwargs: Any) -> HttpResponse:
|
|
return registration_helper(*args, **kwargs)
|
|
|
|
|
|
@typed_endpoint
|
|
def registration_helper(
|
|
request: HttpRequest,
|
|
*,
|
|
key: str = "",
|
|
timezone: Annotated[str, timezone_or_empty_validator()] = "",
|
|
from_confirmation: str | None = None,
|
|
form_full_name: Annotated[str | None, ApiParamConfig("full_name")] = None,
|
|
source_realm_id: Annotated[NonNegativeInt | None, non_negative_int_or_none_validator()] = None,
|
|
form_is_demo_organization: Annotated[str | None, ApiParamConfig("is_demo_organization")] = None,
|
|
slack_access_token: str | None = None,
|
|
start_slack_import: Json[bool] = False,
|
|
cancel_import: Json[bool] = False,
|
|
) -> HttpResponse:
|
|
try:
|
|
prereg_object, realm_creation = check_prereg_key(request, key)
|
|
except ConfirmationKeyError as e:
|
|
return render_confirmation_key_error(request, e)
|
|
|
|
email = prereg_object.email
|
|
prereg_realm = None
|
|
prereg_user = None
|
|
if realm_creation:
|
|
assert isinstance(prereg_object, PreregistrationRealm)
|
|
prereg_realm = prereg_object
|
|
|
|
if cancel_import:
|
|
if prereg_realm.created_realm or prereg_realm.data_import_metadata.get(
|
|
"is_import_work_queued"
|
|
):
|
|
# This cancellation flow is just to go back to normal
|
|
# realm creation before one has started it. If the
|
|
# user somehow triggers this operation (no longer
|
|
# visible in the UI) after that point, we just
|
|
# redirect user import status page with a message that
|
|
# import work has already started.
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/slack_import.html",
|
|
{
|
|
"import_poll_error_message": _(
|
|
"Unable to cancel import once it has started."
|
|
),
|
|
"poll_for_import_completion": True,
|
|
"key": key,
|
|
},
|
|
)
|
|
|
|
# If the user cancels the import process, it is critical
|
|
# to remove any metadata that was added during the import
|
|
# process.
|
|
# NOTE: Don't revoke the confirmation key here, to allow
|
|
# the user to continue with the registration process if
|
|
# no import flow has started. This is important otherwise
|
|
# the user will be unable to register using the same subdomain.
|
|
prereg_realm.data_import_metadata = {}
|
|
prereg_realm.save(update_fields=["data_import_metadata"])
|
|
# Return back to normal registration flow.
|
|
return HttpResponseRedirect(
|
|
reverse("get_prereg_key_and_redirect", kwargs={"confirmation_key": key})
|
|
)
|
|
|
|
if start_slack_import:
|
|
assert is_realm_import_enabled()
|
|
assert prereg_realm.data_import_metadata.get("slack_access_token") is not None
|
|
assert prereg_realm.data_import_metadata.get("uploaded_import_file_name") is not None
|
|
assert prereg_realm.data_import_metadata.get("is_import_work_queued") is not True
|
|
assert prereg_realm.created_realm is None
|
|
queue_json_publish_rollback_unsafe(
|
|
"deferred_work",
|
|
{
|
|
"type": "import_slack_data",
|
|
"preregistration_realm_id": prereg_realm.id,
|
|
"filename": f"import/{prereg_realm.id}/slack.zip",
|
|
"slack_access_token": prereg_realm.data_import_metadata["slack_access_token"],
|
|
},
|
|
)
|
|
# Avoid starting the import process multiple times.
|
|
prereg_realm.data_import_metadata["is_import_work_queued"] = True
|
|
prereg_realm.save(update_fields=["data_import_metadata"])
|
|
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/slack_import.html",
|
|
{
|
|
"poll_for_import_completion": True,
|
|
"key": key,
|
|
},
|
|
)
|
|
|
|
elif prereg_realm.data_import_metadata.get("import_from") == "slack":
|
|
if prereg_realm.data_import_metadata.get("need_select_realm_owner"):
|
|
return HttpResponseRedirect(
|
|
reverse("realm_import_post_process", kwargs={"confirmation_key": key})
|
|
)
|
|
|
|
assert is_realm_import_enabled()
|
|
context: dict[str, Any] = {
|
|
"key": key,
|
|
"max_file_size": settings.MAX_WEB_DATA_IMPORT_SIZE_MB,
|
|
}
|
|
|
|
saved_slack_access_token = prereg_realm.data_import_metadata.get("slack_access_token")
|
|
if saved_slack_access_token or slack_access_token is not None:
|
|
if (
|
|
slack_access_token is not None
|
|
and slack_access_token != saved_slack_access_token
|
|
):
|
|
# Verify slack token access.
|
|
from zerver.data_import.slack import (
|
|
SLACK_IMPORT_TOKEN_SCOPES,
|
|
check_token_access,
|
|
)
|
|
|
|
try:
|
|
check_token_access(slack_access_token, SLACK_IMPORT_TOKEN_SCOPES)
|
|
except Exception as e:
|
|
context["slack_access_token_validation_error"] = str(e)
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/slack_import.html",
|
|
context,
|
|
)
|
|
|
|
saved_slack_access_token = slack_access_token
|
|
prereg_realm.data_import_metadata["slack_access_token"] = slack_access_token
|
|
prereg_realm.save(update_fields=["data_import_metadata"])
|
|
|
|
context["slack_access_token"] = saved_slack_access_token
|
|
context["uploaded_import_file_name"] = prereg_realm.data_import_metadata.get(
|
|
"uploaded_import_file_name"
|
|
)
|
|
context["invalid_file_error_message"] = prereg_realm.data_import_metadata.get(
|
|
"invalid_file_error_message", ""
|
|
)
|
|
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/slack_import.html",
|
|
context,
|
|
)
|
|
|
|
password_required = True
|
|
role = UserProfile.ROLE_REALM_OWNER
|
|
else:
|
|
assert isinstance(prereg_object, PreregistrationUser)
|
|
prereg_user = prereg_object
|
|
password_required = prereg_object.password_required
|
|
role = prereg_object.invited_as
|
|
|
|
if form_is_demo_organization is None:
|
|
demo_organization_creation = False
|
|
else:
|
|
# Check the explicit strings that return false
|
|
# in django.forms.BooleanField.to_python.
|
|
false_strings = ("false", "0")
|
|
demo_organization_creation = form_is_demo_organization.strip().lower() not in false_strings
|
|
|
|
if email == "":
|
|
# Do not attempt to validate email for users without an email address.
|
|
# The assertions here are to help document the only circumstance under which
|
|
# this condition should be possible.
|
|
assert realm_creation and demo_organization_creation
|
|
# TODO: Remove settings.DEVELOPMENT when demo organization feature ready
|
|
# to be fully implemented.
|
|
assert settings.DEVELOPMENT
|
|
else:
|
|
try:
|
|
validators.validate_email(email)
|
|
except ValidationError:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/invalid_email.html",
|
|
context={"invalid_email": True},
|
|
status=400,
|
|
)
|
|
|
|
if realm_creation:
|
|
# For creating a new realm, there is no existing realm or domain
|
|
realm = None
|
|
else:
|
|
assert prereg_user is not None
|
|
assert prereg_user.realm is not None
|
|
if get_subdomain(request) != prereg_user.realm.string_id:
|
|
return render_confirmation_key_error(
|
|
request, ConfirmationKeyError(ConfirmationKeyError.DOES_NOT_EXIST)
|
|
)
|
|
realm = prereg_user.realm
|
|
try:
|
|
email_allowed_for_realm(email, realm)
|
|
except DomainNotAllowedForRealmError:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/invalid_email.html",
|
|
context={"realm_name": realm.name, "closed_domain": True},
|
|
status=400,
|
|
)
|
|
except DisposableEmailError:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/invalid_email.html",
|
|
context={"realm_name": realm.name, "disposable_emails_not_allowed": True},
|
|
status=400,
|
|
)
|
|
except EmailContainsPlusError:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/invalid_email.html",
|
|
context={"realm_name": realm.name, "email_contains_plus": True},
|
|
status=400,
|
|
)
|
|
|
|
if realm.deactivated:
|
|
# The user is trying to register for a deactivated realm. Advise them to
|
|
# contact support.
|
|
return redirect_to_deactivation_notice()
|
|
|
|
try:
|
|
validate_email_not_already_in_realm(realm, email)
|
|
except ValidationError:
|
|
return redirect_to_email_login_url(email)
|
|
|
|
if settings.BILLING_ENABLED:
|
|
from corporate.lib.registration import (
|
|
check_spare_licenses_available_for_registering_new_user,
|
|
)
|
|
from corporate.lib.stripe import LicenseLimitError
|
|
|
|
try:
|
|
check_spare_licenses_available_for_registering_new_user(realm, email, role=role)
|
|
except LicenseLimitError:
|
|
return TemplateResponse(request, "zerver/no_spare_licenses.html")
|
|
|
|
name_validated = False
|
|
require_ldap_password = False
|
|
|
|
if from_confirmation:
|
|
with suppress(KeyError):
|
|
del request.session["authenticated_full_name"]
|
|
|
|
ldap_full_name = None
|
|
if settings.POPULATE_PROFILE_VIA_LDAP:
|
|
# If the user can be found in LDAP, we'll take the full name from the directory,
|
|
# and further down create a form pre-filled with it.
|
|
for backend in get_backends():
|
|
if isinstance(backend, LDAPBackend):
|
|
try:
|
|
ldap_username = backend.django_to_ldap_username(email)
|
|
except NoMatchingLDAPUserError:
|
|
logging.warning("New account email %s could not be found in LDAP", email)
|
|
break
|
|
|
|
# Note that this `ldap_user` object is not a
|
|
# `ZulipLDAPUser` with a `Realm` attached, so
|
|
# calling `.populate_user()` on it will crash.
|
|
# This is OK, since we're just accessing this user
|
|
# to extract its name.
|
|
#
|
|
# TODO: We should potentially be accessing this
|
|
# user to sync its initial avatar and custom
|
|
# profile fields as well, if we indeed end up
|
|
# creating a user account through this flow,
|
|
# rather than waiting until `manage.py
|
|
# sync_ldap_user_data` runs to populate it.
|
|
ldap_user = _LDAPUser(backend, ldap_username)
|
|
|
|
try:
|
|
ldap_full_name = backend.get_mapped_name(ldap_user)
|
|
except TypeError:
|
|
break
|
|
|
|
# Check whether this is ZulipLDAPAuthBackend,
|
|
# which is responsible for authentication and
|
|
# requires that LDAP accounts enter their LDAP
|
|
# password to register, or ZulipLDAPUserPopulator,
|
|
# which just populates UserProfile fields (no auth).
|
|
require_ldap_password = isinstance(backend, ZulipLDAPAuthBackend)
|
|
break
|
|
|
|
initial_data = {}
|
|
if realm_creation:
|
|
assert prereg_realm is not None
|
|
initial_data = {
|
|
"realm_name": prereg_realm.name,
|
|
"realm_type": prereg_realm.org_type,
|
|
"realm_default_language": prereg_realm.default_language,
|
|
"realm_subdomain": prereg_realm.string_id,
|
|
}
|
|
|
|
if ldap_full_name:
|
|
# We don't add "full_name" to initial here, because if the realm
|
|
# already exists and form is complete (that is, no additional fields
|
|
# need to be filled out by the user) we want the form to validate,
|
|
# so they can be directly registered without having to go through
|
|
# this interstitial.
|
|
form = RegistrationForm(
|
|
{"full_name": ldap_full_name},
|
|
initial=initial_data,
|
|
realm_creation=realm_creation,
|
|
realm=realm,
|
|
)
|
|
request.session["authenticated_full_name"] = ldap_full_name
|
|
name_validated = True
|
|
elif realm is not None and realm.is_zephyr_mirror_realm:
|
|
# For MIT users, we can get an authoritative name from Hesiod.
|
|
# Technically we should check that this is actually an MIT
|
|
# realm, but we can cross that bridge if we ever get a non-MIT
|
|
# zephyr mirroring realm.
|
|
hesiod_name = compute_mit_user_fullname(email)
|
|
form = RegistrationForm(
|
|
initial={"full_name": hesiod_name if "@" not in hesiod_name else ""},
|
|
realm_creation=realm_creation,
|
|
realm=realm,
|
|
)
|
|
name_validated = True
|
|
elif prereg_user is not None and prereg_user.full_name:
|
|
if prereg_user.full_name_validated:
|
|
request.session["authenticated_full_name"] = prereg_user.full_name
|
|
name_validated = True
|
|
form = RegistrationForm(
|
|
{"full_name": prereg_user.full_name},
|
|
initial=initial_data,
|
|
realm_creation=realm_creation,
|
|
realm=realm,
|
|
)
|
|
else:
|
|
initial_data["full_name"] = prereg_user.full_name
|
|
form = RegistrationForm(
|
|
initial=initial_data,
|
|
realm_creation=realm_creation,
|
|
realm=realm,
|
|
)
|
|
elif form_full_name is not None:
|
|
initial_data["full_name"] = form_full_name
|
|
form = RegistrationForm(
|
|
initial=initial_data,
|
|
realm_creation=realm_creation,
|
|
realm=realm,
|
|
)
|
|
else:
|
|
form = RegistrationForm(
|
|
initial=initial_data, realm_creation=realm_creation, realm=realm
|
|
)
|
|
else:
|
|
postdata = request.POST.copy()
|
|
if name_changes_disabled(realm):
|
|
# If we populate profile information via LDAP and we have a
|
|
# verified name from you on file, use that. Otherwise, fall
|
|
# back to the full name in the request.
|
|
try:
|
|
postdata.update(full_name=request.session["authenticated_full_name"])
|
|
name_validated = True
|
|
except KeyError:
|
|
pass
|
|
form = RegistrationForm(postdata, realm_creation=realm_creation, realm=realm)
|
|
|
|
if not (password_auth_enabled(realm) and password_required):
|
|
form["password"].field.required = False
|
|
|
|
if form.is_valid():
|
|
if password_auth_enabled(realm) and form["password"].field.required:
|
|
password = form.cleaned_data["password"]
|
|
else:
|
|
# If the user wasn't prompted for a password when
|
|
# completing the authentication form (because they're
|
|
# signing up with SSO and no password is required), set
|
|
# the password field to `None` (Which causes Django to
|
|
# create an unusable password).
|
|
password = None
|
|
|
|
if realm_creation:
|
|
string_id = form.cleaned_data["realm_subdomain"]
|
|
realm_name = form.cleaned_data["realm_name"]
|
|
realm_type = form.cleaned_data["realm_type"]
|
|
realm_default_language = form.cleaned_data["realm_default_language"]
|
|
is_demo_organization = form.cleaned_data["is_demo_organization"]
|
|
how_realm_creator_found_zulip = RealmAuditLog.HOW_REALM_CREATOR_FOUND_ZULIP_OPTIONS[
|
|
form.cleaned_data["how_realm_creator_found_zulip"]
|
|
]
|
|
how_realm_creator_found_zulip_extra_context = ""
|
|
if (
|
|
how_realm_creator_found_zulip
|
|
== RealmAuditLog.HOW_REALM_CREATOR_FOUND_ZULIP_OPTIONS["other"]
|
|
):
|
|
how_realm_creator_found_zulip_extra_context = form.cleaned_data[
|
|
"how_realm_creator_found_zulip_other_text"
|
|
]
|
|
elif (
|
|
how_realm_creator_found_zulip
|
|
== RealmAuditLog.HOW_REALM_CREATOR_FOUND_ZULIP_OPTIONS["ad"]
|
|
):
|
|
how_realm_creator_found_zulip_extra_context = form.cleaned_data[
|
|
"how_realm_creator_found_zulip_where_ad"
|
|
]
|
|
elif (
|
|
how_realm_creator_found_zulip
|
|
== RealmAuditLog.HOW_REALM_CREATOR_FOUND_ZULIP_OPTIONS["existing_user"]
|
|
):
|
|
how_realm_creator_found_zulip_extra_context = form.cleaned_data[
|
|
"how_realm_creator_found_zulip_which_organization"
|
|
]
|
|
elif (
|
|
how_realm_creator_found_zulip
|
|
== RealmAuditLog.HOW_REALM_CREATOR_FOUND_ZULIP_OPTIONS["review_site"]
|
|
): # nocoverage
|
|
how_realm_creator_found_zulip_extra_context = form.cleaned_data[
|
|
"how_realm_creator_found_zulip_review_site"
|
|
]
|
|
|
|
realm = do_create_realm(
|
|
string_id,
|
|
realm_name,
|
|
org_type=realm_type,
|
|
default_language=realm_default_language,
|
|
is_demo_organization=is_demo_organization,
|
|
prereg_realm=prereg_realm,
|
|
how_realm_creator_found_zulip=how_realm_creator_found_zulip,
|
|
how_realm_creator_found_zulip_extra_context=how_realm_creator_found_zulip_extra_context,
|
|
)
|
|
assert realm is not None
|
|
|
|
full_name = form.cleaned_data["full_name"]
|
|
enable_marketing_emails = form.cleaned_data["enable_marketing_emails"]
|
|
email_address_visibility = form.cleaned_data["email_address_visibility"]
|
|
default_stream_group_names = request.POST.getlist("default_stream_group")
|
|
default_stream_groups = lookup_default_stream_groups(default_stream_group_names, realm)
|
|
|
|
if source_realm_id is not None:
|
|
# Non-integer realm_id values like "string" are treated
|
|
# like the "Do not import" value of "".
|
|
source_profile: UserProfile | None = get_source_profile(email, source_realm_id)
|
|
else:
|
|
source_profile = None
|
|
|
|
if not realm_creation:
|
|
try:
|
|
existing_user_profile: UserProfile | None = get_user_by_delivery_email(email, realm)
|
|
except UserProfile.DoesNotExist:
|
|
existing_user_profile = None
|
|
else:
|
|
existing_user_profile = None
|
|
|
|
user_profile: UserProfile | None = None
|
|
return_data: dict[str, bool] = {}
|
|
if ldap_auth_enabled(realm):
|
|
# If the user was authenticated using an external SSO
|
|
# mechanism like Google or GitHub auth, then authentication
|
|
# will have already been done before creating the
|
|
# PreregistrationUser object with password_required=False, and
|
|
# so we don't need to worry about passwords.
|
|
#
|
|
# If instead the realm is using EmailAuthBackend, we will
|
|
# set their password above.
|
|
#
|
|
# But if the realm is using LDAPAuthBackend, we need to verify
|
|
# their LDAP password (which will, as a side effect, create
|
|
# the user account) here using authenticate.
|
|
# prereg_user.realm_creation carries the information about whether
|
|
# we're in realm creation mode, and the ldap flow will handle
|
|
# that and create the user with the appropriate parameters.
|
|
user = authenticate(
|
|
request=request,
|
|
username=email,
|
|
password=password,
|
|
realm=realm,
|
|
prereg_user=prereg_user,
|
|
prereg_realm=prereg_realm,
|
|
return_data=return_data,
|
|
)
|
|
if user is None:
|
|
# This logic is security-sensitive. The user has NOT been successfully authenticated
|
|
# with LDAP and we need to carefully decide whether they should be permitted to proceed
|
|
# with account creation anyway or be stopped. There are three scenarios to consider:
|
|
#
|
|
# 1. EmailAuthBackend is enabled for the realm. That explicitly means that a user
|
|
# with a valid confirmation link should be able to create an account, because
|
|
# they were invited or organization permissions allowed sign up.
|
|
# 2. EmailAuthBackend is disabled - that means the organization wants to be authenticating
|
|
# users with an external source (LDAP or one of the ExternalAuthMethods). If the user
|
|
# came here through one of the ExternalAuthMethods, their identity can be considered
|
|
# verified and account creation can proceed.
|
|
# 3. EmailAuthBackend is disabled and the user did not come here through an ExternalAuthMethod.
|
|
# That means they came here by entering their email address on the registration page
|
|
# and clicking the confirmation link received. That means their identity needs to be
|
|
# verified with LDAP - and that has just failed above. Thus the account should NOT be
|
|
# created.
|
|
#
|
|
if email_auth_enabled(realm):
|
|
can_use_different_backend = True
|
|
# We can identify the user came here through an ExternalAuthMethod by password_required
|
|
# being set to False on the PreregistrationUser object.
|
|
elif len(get_external_method_dicts(realm)) > 0 and not password_required:
|
|
can_use_different_backend = True
|
|
else:
|
|
can_use_different_backend = False
|
|
|
|
if settings.LDAP_APPEND_DOMAIN:
|
|
# In LDAP_APPEND_DOMAIN configurations, we don't allow making a non-LDAP account
|
|
# if the email matches the ldap domain.
|
|
can_use_different_backend = can_use_different_backend and (
|
|
not email_belongs_to_ldap(realm, email)
|
|
)
|
|
if return_data.get("no_matching_ldap_user") and can_use_different_backend:
|
|
# If both the LDAP and Email or Social auth backends are
|
|
# enabled, and there's no matching user in the LDAP
|
|
# directory then the intent is to create a user in the
|
|
# realm with their email outside the LDAP organization
|
|
# (with e.g. a password stored in the Zulip database,
|
|
# not LDAP). So we fall through and create the new
|
|
# account.
|
|
pass
|
|
else:
|
|
# TODO: This probably isn't going to give a
|
|
# user-friendly error message, but it doesn't
|
|
# particularly matter, because the registration form
|
|
# is hidden for most users.
|
|
return HttpResponseRedirect(reverse("login", query={"email": email}))
|
|
else:
|
|
assert isinstance(user, UserProfile)
|
|
user_profile = user
|
|
if not realm_creation:
|
|
# Since we'll have created a user, we now just log them in.
|
|
return login_and_go_to_home(request, user_profile)
|
|
# With realm_creation=True, we're going to return further down,
|
|
# after finishing up the creation process.
|
|
|
|
if existing_user_profile is not None and existing_user_profile.is_mirror_dummy:
|
|
user_profile = existing_user_profile
|
|
with transaction.atomic(durable=True):
|
|
# We reactivate the mirror dummy user, but we need to respect the role
|
|
# that was passed in via the PreregistrationUser. Mirror dummy users can
|
|
# come from data import from 3rd party tools, with their role not necessarily
|
|
# set to what the realm admins may want. Such users have to explicitly go through
|
|
# the sign up flow, and thus their final role should match what the administrators
|
|
# may have set in the invitation, to avoid surprises.
|
|
#
|
|
# It's also important to reactivate the account and adjust the role in a single
|
|
# transaction, to avoid security issues if the process is interrupted halfway,
|
|
# e.g. leaving the user reactivated but with the wrong role.
|
|
do_activate_mirror_dummy_user(user_profile, acting_user=user_profile)
|
|
do_change_user_role(user_profile, role, acting_user=user_profile)
|
|
do_change_password(user_profile, password)
|
|
do_change_full_name(user_profile, full_name, user_profile)
|
|
do_change_user_setting(user_profile, "timezone", timezone, acting_user=user_profile)
|
|
do_change_user_setting(
|
|
user_profile,
|
|
"default_language",
|
|
get_default_language_for_new_user(realm, request=request),
|
|
acting_user=None,
|
|
)
|
|
|
|
if user_profile is None:
|
|
try:
|
|
user_profile = do_create_user(
|
|
email,
|
|
password,
|
|
realm,
|
|
full_name,
|
|
prereg_user=prereg_user,
|
|
prereg_realm=prereg_realm,
|
|
role=role,
|
|
tos_version=settings.TERMS_OF_SERVICE_VERSION,
|
|
timezone=timezone,
|
|
default_language=get_default_language_for_new_user(realm, request=request),
|
|
default_stream_groups=default_stream_groups,
|
|
source_profile=source_profile,
|
|
realm_creation=realm_creation,
|
|
acting_user=None,
|
|
enable_marketing_emails=enable_marketing_emails,
|
|
email_address_visibility=email_address_visibility,
|
|
)
|
|
except IntegrityError:
|
|
# Race condition making the user, leading to a
|
|
# duplicate email address. Redirect them to the login
|
|
# form.
|
|
return redirect_to_email_login_url(email)
|
|
|
|
if realm_creation:
|
|
# Because for realm creation, registration happens on the
|
|
# root domain, we need to log them into the subdomain for
|
|
# their new realm.
|
|
return redirect_and_log_into_subdomain(
|
|
ExternalAuthResult(user_profile=user_profile, data_dict={"is_realm_creation": True})
|
|
)
|
|
|
|
# This dummy_backend check below confirms the user is
|
|
# authenticating to the correct subdomain.
|
|
auth_result = authenticate(
|
|
request=request,
|
|
username=user_profile.delivery_email,
|
|
realm=realm,
|
|
return_data=return_data,
|
|
use_dummy_backend=True,
|
|
)
|
|
if return_data.get("invalid_subdomain"):
|
|
# By construction, this should never happen.
|
|
logging.error(
|
|
"Subdomain mismatch in registration %s: %s",
|
|
realm.subdomain,
|
|
user_profile.delivery_email,
|
|
)
|
|
return redirect("/")
|
|
|
|
assert isinstance(auth_result, UserProfile)
|
|
return login_and_go_to_home(request, auth_result)
|
|
|
|
default_email_address_visibility = None
|
|
if realm is not None:
|
|
realm_user_default = RealmUserDefault.objects.get(realm=realm)
|
|
default_email_address_visibility = realm_user_default.email_address_visibility
|
|
|
|
context = {
|
|
"form": form,
|
|
"email": email,
|
|
"key": key,
|
|
"full_name": request.session.get("authenticated_full_name", None),
|
|
"lock_name": name_validated and name_changes_disabled(realm),
|
|
# password_auth_enabled is normally set via our context processor,
|
|
# but for the registration form, there is no logged in user yet, so
|
|
# we have to set it here.
|
|
"creating_new_realm": realm_creation,
|
|
"password_required": password_auth_enabled(realm) and password_required,
|
|
"require_ldap_password": require_ldap_password,
|
|
"password_auth_enabled": password_auth_enabled(realm),
|
|
"default_stream_groups": [] if realm is None else get_default_stream_groups(realm),
|
|
"accounts": get_accounts_for_email(email),
|
|
"MAX_NAME_LENGTH": str(UserProfile.MAX_NAME_LENGTH),
|
|
"MAX_PASSWORD_LENGTH": str(form.MAX_PASSWORD_LENGTH),
|
|
"corporate_enabled": settings.CORPORATE_ENABLED,
|
|
"default_email_address_visibility": default_email_address_visibility,
|
|
"selected_realm_type_name": get_selected_realm_type_name(prereg_realm),
|
|
"selected_realm_default_language_name": get_selected_realm_default_language_name(
|
|
prereg_realm
|
|
),
|
|
"email_address_visibility_admins_only": RealmUserDefault.EMAIL_ADDRESS_VISIBILITY_ADMINS,
|
|
"email_address_visibility_moderators": RealmUserDefault.EMAIL_ADDRESS_VISIBILITY_MODERATORS,
|
|
"email_address_visibility_nobody": RealmUserDefault.EMAIL_ADDRESS_VISIBILITY_NOBODY,
|
|
"email_address_visibility_options_dict": UserProfile.EMAIL_ADDRESS_VISIBILITY_ID_TO_NAME_MAP,
|
|
"how_realm_creator_found_zulip_options": RealmAuditLog.HOW_REALM_CREATOR_FOUND_ZULIP_OPTIONS.items(),
|
|
}
|
|
|
|
if realm_creation:
|
|
# Add context for realm creation part of the form.
|
|
context.update(get_realm_create_form_context())
|
|
|
|
return TemplateResponse(request, "zerver/register.html", context=context)
|
|
|
|
|
|
def login_and_go_to_home(request: HttpRequest, user_profile: UserProfile) -> HttpResponse:
|
|
mobile_flow_otp = get_expirable_session_var(
|
|
request.session, "registration_mobile_flow_otp", delete=True
|
|
)
|
|
desktop_flow_otp = get_expirable_session_var(
|
|
request.session, "registration_desktop_flow_otp", delete=True
|
|
)
|
|
if mobile_flow_otp is not None:
|
|
return finish_mobile_flow(request, user_profile, mobile_flow_otp)
|
|
elif desktop_flow_otp is not None:
|
|
params_to_store_in_authenticated_session = orjson.loads(
|
|
get_expirable_session_var(
|
|
request.session,
|
|
"registration_desktop_flow_params_to_store_in_authenticated_session",
|
|
default_value="{}",
|
|
delete=True,
|
|
)
|
|
)
|
|
return finish_desktop_flow(
|
|
request, user_profile, desktop_flow_otp, params_to_store_in_authenticated_session
|
|
)
|
|
|
|
do_login(request, user_profile)
|
|
# Using 'mark_sanitized' to work around false positive where Pysa thinks
|
|
# that 'user_profile' is user-controlled
|
|
return HttpResponseRedirect(mark_sanitized(user_profile.realm.url) + reverse("home"))
|
|
|
|
|
|
def prepare_activation_url(
|
|
email: str,
|
|
session: SessionBase,
|
|
*,
|
|
realm: Realm | None,
|
|
streams: Iterable[Stream] | None = None,
|
|
user_groups: Iterable[NamedUserGroup] | None = None,
|
|
invited_as: int | None = None,
|
|
include_realm_default_subscriptions: bool | None = None,
|
|
multiuse_invite: MultiuseInvite | None = None,
|
|
) -> str:
|
|
"""
|
|
Send an email with a confirmation link to the provided e-mail so the user
|
|
can complete their registration.
|
|
"""
|
|
prereg_user = create_preregistration_user(email, realm, multiuse_invite=multiuse_invite)
|
|
|
|
if streams is not None:
|
|
prereg_user.streams.set(streams)
|
|
|
|
if user_groups is not None:
|
|
prereg_user.groups.set(user_groups)
|
|
|
|
if invited_as is not None:
|
|
prereg_user.invited_as = invited_as
|
|
|
|
if include_realm_default_subscriptions is not None:
|
|
prereg_user.include_realm_default_subscriptions = include_realm_default_subscriptions
|
|
|
|
if invited_as is not None or include_realm_default_subscriptions is not None:
|
|
prereg_user.save()
|
|
|
|
confirmation_type = Confirmation.USER_REGISTRATION
|
|
|
|
activation_url = create_confirmation_link(prereg_user, confirmation_type)
|
|
return activation_url
|
|
|
|
|
|
def prepare_realm_activation_url(
|
|
email: str,
|
|
session: SessionBase,
|
|
realm_name: str,
|
|
string_id: str,
|
|
org_type: int,
|
|
default_language: str,
|
|
import_form: str,
|
|
) -> str:
|
|
prereg_realm = create_preregistration_realm(
|
|
email,
|
|
realm_name,
|
|
string_id,
|
|
org_type,
|
|
default_language,
|
|
import_form,
|
|
)
|
|
activation_url = create_confirmation_link(
|
|
prereg_realm, Confirmation.REALM_CREATION, no_associated_realm_object=True
|
|
)
|
|
|
|
if settings.DEVELOPMENT:
|
|
session["confirmation_key"] = {"confirmation_key": activation_url.split("/")[-1]}
|
|
return activation_url
|
|
|
|
|
|
def send_confirm_registration_email(
|
|
email: str,
|
|
activation_url: str,
|
|
*,
|
|
realm: Realm | None = None,
|
|
realm_subdomain: str | None = None,
|
|
realm_type: int | None = None,
|
|
request: HttpRequest | None = None,
|
|
) -> None:
|
|
org_url = ""
|
|
org_type = ""
|
|
if realm is None:
|
|
assert realm_subdomain is not None
|
|
org_url = f"{realm_subdomain}.{settings.EXTERNAL_HOST}"
|
|
assert realm_type is not None
|
|
org_type = get_org_type_display_name(realm_type)
|
|
send_email(
|
|
"zerver/emails/confirm_registration",
|
|
to_emails=[email],
|
|
from_address=FromAddress.tokenized_no_reply_address(),
|
|
language=get_language() if request is not None else None,
|
|
context={
|
|
"create_realm": realm is None,
|
|
"activate_url": activation_url,
|
|
"corporate_enabled": settings.CORPORATE_ENABLED,
|
|
"organization_url": org_url,
|
|
"organization_type": org_type,
|
|
},
|
|
realm=realm,
|
|
request=request,
|
|
)
|
|
|
|
|
|
def redirect_to_email_login_url(email: str) -> HttpResponseRedirect:
|
|
return HttpResponseRedirect(reverse("login", query={"email": email, "already_registered": 1}))
|
|
|
|
|
|
@typed_endpoint
|
|
def realm_import_status(
|
|
request: HttpRequest,
|
|
*,
|
|
confirmation_key: str,
|
|
) -> HttpResponse: # nocoverage
|
|
try:
|
|
preregistration_realm = get_object_from_key(
|
|
confirmation_key,
|
|
[Confirmation.REALM_CREATION],
|
|
mark_object_used=False,
|
|
allow_used=True,
|
|
)
|
|
except ConfirmationKeyError:
|
|
raise JsonableError(_("Unauthenticated"))
|
|
|
|
assert isinstance(preregistration_realm, PreregistrationRealm)
|
|
try:
|
|
realm = Realm.objects.get(string_id=preregistration_realm.string_id)
|
|
except Realm.DoesNotExist:
|
|
# TODO: Either store the path to the temporary conversion directory on
|
|
# preregistration_realm.data_import_metadata, or have the conversion
|
|
# process support writing updates to this for a better progress indicator.
|
|
if preregistration_realm.data_import_metadata.get("is_import_work_queued"):
|
|
return json_success(
|
|
request, {"status": _("Converting Slack data… This may take a while.")}
|
|
)
|
|
elif preregistration_realm.data_import_metadata.get("invalid_file_error_message"):
|
|
# Redirect user the file upload page if we have an error message to display.
|
|
result = {
|
|
"status": preregistration_realm.data_import_metadata.get(
|
|
"invalid_file_error_message"
|
|
),
|
|
"redirect": reverse(
|
|
"get_prereg_key_and_redirect", kwargs={"confirmation_key": confirmation_key}
|
|
),
|
|
}
|
|
return json_success(request, result)
|
|
# TODO: If there is something we need to fix for the import, we should notify the user.
|
|
|
|
if realm.deactivated:
|
|
# These "if" cases are in the inverse order than they're done
|
|
# in the import process, so we get the latest step that it's
|
|
# on.
|
|
if Message.objects.filter(realm_id=realm.id).exists():
|
|
return json_success(request, {"status": _("Importing messages…")})
|
|
try:
|
|
next(all_message_attachments(prefix=f"{realm.id}/"))
|
|
return json_success(request, {"status": _("Importing attachment data…")})
|
|
except StopIteration:
|
|
pass
|
|
return json_success(request, {"status": _("Importing converted Slack data…")})
|
|
|
|
if (
|
|
not preregistration_realm.data_import_metadata["need_select_realm_owner"]
|
|
and preregistration_realm.created_realm is None
|
|
):
|
|
return json_success(request, {"status": _("Finalizing import…")})
|
|
|
|
# We have a non-deactivated realm and it's linked to the prereg key
|
|
result = {"status": _("Done!")}
|
|
if not preregistration_realm.data_import_metadata["need_select_realm_owner"]:
|
|
importing_user = get_user_by_delivery_email(preregistration_realm.email, realm)
|
|
# Sanity check that this is a normal user account that can login.
|
|
assert (
|
|
importing_user.is_active
|
|
and not importing_user.is_bot
|
|
and not importing_user.is_mirror_dummy
|
|
)
|
|
|
|
# Allow setting an initial password for this first account,
|
|
# being careful to ensure this data import confirmation link
|
|
# can't be abused to reset the importing user's password in
|
|
# the future.
|
|
if (
|
|
not importing_user.has_usable_password()
|
|
and not RealmAuditLog.objects.filter(
|
|
modified_user=importing_user, event_type=AuditLogEventType.USER_PASSWORD_CHANGED
|
|
).exists()
|
|
):
|
|
result["redirect"] = generate_password_reset_url(
|
|
importing_user, default_token_generator
|
|
)
|
|
else:
|
|
result["redirect"] = get_safe_redirect_to(reverse("login"), realm.url)
|
|
else:
|
|
# The email address in the import may not match the email
|
|
# address they provided. Ask user which user they want to become.
|
|
result["status"] = _("No users matching provided email.")
|
|
result["redirect"] = reverse(
|
|
"realm_import_post_process", kwargs={"confirmation_key": confirmation_key}
|
|
)
|
|
|
|
return json_success(request, result)
|
|
|
|
|
|
@transaction.atomic(durable=True)
|
|
def realm_import_post_process(
|
|
request: HttpRequest,
|
|
confirmation_key: str,
|
|
) -> HttpResponse:
|
|
try:
|
|
preregistration_realm = get_object_from_key(
|
|
confirmation_key,
|
|
[Confirmation.REALM_CREATION],
|
|
mark_object_used=False,
|
|
allow_used=True,
|
|
)
|
|
except ConfirmationKeyError as exception:
|
|
return render_confirmation_key_error(request, exception)
|
|
|
|
assert isinstance(preregistration_realm, PreregistrationRealm)
|
|
try:
|
|
realm = Realm.objects.get(string_id=preregistration_realm.string_id)
|
|
except Realm.DoesNotExist:
|
|
# If we cannot find the realm, likely means there was
|
|
# something wrong with the import process, or it has been
|
|
# since deleted. Revoke the confirmation key to force user to
|
|
# restart the process.
|
|
preregistration_realm.status = confirmation_settings.STATUS_REVOKED
|
|
preregistration_realm.save(update_fields=["status"])
|
|
|
|
return render_confirmation_key_error(
|
|
request, ConfirmationKeyError(ConfirmationKeyError.EXPIRED)
|
|
)
|
|
|
|
if not preregistration_realm.data_import_metadata["need_select_realm_owner"]:
|
|
return HttpResponseRedirect(get_safe_redirect_to(reverse("login"), realm.url))
|
|
|
|
if request.method == "POST":
|
|
form = ImportRealmOwnerSelectionForm(request.POST)
|
|
if form.is_valid():
|
|
# This is a highly sensitive code path, since what we're
|
|
# about to do is take control of another user account AND
|
|
# promote that account to organization owner.
|
|
#
|
|
# We need this code path for Slack import if the importing
|
|
# user's account doesn't exist in the Slack import, but we
|
|
# must be VERY careful to make sure we're in that situation.
|
|
|
|
# Validate that this PreregistrationRealm object is in the
|
|
# expected state, with no user matching the email address,
|
|
# and and having created this realm.
|
|
assert preregistration_realm.data_import_metadata["need_select_realm_owner"]
|
|
assert preregistration_realm.created_realm_id == realm.id
|
|
assert preregistration_realm.status != confirmation_settings.STATUS_USED
|
|
|
|
# ID of the imported user account that the importing user has
|
|
# selected to become their account.
|
|
user_id = form.cleaned_data["user_id"]
|
|
|
|
# Validate that a normal user account that can login was selected.
|
|
importing_user = get_user_profile_by_id_in_realm(user_id, realm)
|
|
assert (
|
|
importing_user.is_active
|
|
and not importing_user.is_bot
|
|
and not importing_user.is_mirror_dummy
|
|
)
|
|
|
|
# Promote to realm owner and set email address to what
|
|
# we've validated. This is safe because we've previously
|
|
# validated that this specific confirmation link was used
|
|
# to create this specific realm and cannot have been used
|
|
# to finish creating an account yet.
|
|
do_change_user_role(
|
|
importing_user, UserProfile.ROLE_REALM_OWNER, acting_user=importing_user
|
|
)
|
|
do_change_user_delivery_email(
|
|
importing_user, preregistration_realm.email, acting_user=importing_user
|
|
)
|
|
|
|
preregistration_realm.status = confirmation_settings.STATUS_USED
|
|
preregistration_realm.data_import_metadata["need_select_realm_owner"] = False
|
|
preregistration_realm.save()
|
|
|
|
# End by letting the importing user set a password for their new account.
|
|
assert (
|
|
not importing_user.has_usable_password()
|
|
and not RealmAuditLog.objects.filter(
|
|
modified_user=importing_user, event_type=AuditLogEventType.USER_PASSWORD_CHANGED
|
|
).exists()
|
|
)
|
|
return HttpResponseRedirect(
|
|
generate_password_reset_url(importing_user, default_token_generator)
|
|
)
|
|
|
|
claimable_users = UserProfile.objects.filter(
|
|
realm=realm, is_active=True, is_bot=False, is_mirror_dummy=False
|
|
)
|
|
context = {
|
|
"users": claimable_users,
|
|
"verified_email": preregistration_realm.email,
|
|
"key": confirmation_key,
|
|
}
|
|
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/realm_import_post_process.html",
|
|
context,
|
|
)
|
|
|
|
|
|
@add_google_analytics
|
|
def create_realm(request: HttpRequest, creation_key: str | None = None) -> HttpResponse:
|
|
try:
|
|
key_record = validate_key(creation_key)
|
|
except RealmCreationKey.InvalidError:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/portico_error_pages/realm_creation_link_invalid.html",
|
|
)
|
|
if key_record is None:
|
|
if not settings.OPEN_REALM_CREATION:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/portico_error_pages/realm_creation_disabled.html",
|
|
)
|
|
if not password_auth_enabled():
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/portico_error_pages/realm_creation_disabled.html",
|
|
)
|
|
|
|
# When settings.OPEN_REALM_CREATION is enabled, anyone can create a new realm,
|
|
# with a few restrictions on their email address.
|
|
if request.method == "POST":
|
|
if settings.USING_CAPTCHA:
|
|
form: RealmCreationForm = CaptchaRealmCreationForm(data=request.POST, request=request)
|
|
else:
|
|
form = RealmCreationForm(request.POST)
|
|
if form.is_valid():
|
|
try:
|
|
rate_limit_request_by_ip(request, domain="sends_email_by_ip")
|
|
except RateLimitedError as e:
|
|
assert e.secs_to_freedom is not None
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/portico_error_pages/rate_limit_exceeded.html",
|
|
context={"retry_after": int(e.secs_to_freedom)},
|
|
status=429,
|
|
)
|
|
|
|
email = form.cleaned_data["email"]
|
|
realm_name = form.cleaned_data["realm_name"]
|
|
realm_type = form.cleaned_data["realm_type"]
|
|
realm_default_language = form.cleaned_data["realm_default_language"]
|
|
realm_subdomain = form.cleaned_data["realm_subdomain"]
|
|
import_from = form.cleaned_data["import_from"]
|
|
activation_url = prepare_realm_activation_url(
|
|
email,
|
|
request.session,
|
|
realm_name,
|
|
realm_subdomain,
|
|
realm_type,
|
|
realm_default_language,
|
|
import_from,
|
|
)
|
|
if key_record is not None and key_record.presume_email_valid:
|
|
# The user has a token created from the server command line;
|
|
# skip confirming the email is theirs, taking their word for it.
|
|
# This is essential on first install if the admin hasn't stopped
|
|
# to configure outbound email up front, or it isn't working yet.
|
|
key_record.delete()
|
|
return HttpResponseRedirect(activation_url)
|
|
|
|
try:
|
|
send_confirm_registration_email(
|
|
email,
|
|
activation_url,
|
|
realm_subdomain=realm_subdomain,
|
|
realm_type=realm_type,
|
|
request=request,
|
|
)
|
|
except EmailNotDeliveredError:
|
|
logging.exception("Failed to deliver email during realm creation")
|
|
if settings.CORPORATE_ENABLED:
|
|
return render(request, "500.html", status=500)
|
|
return config_error(request, "smtp")
|
|
|
|
if key_record is not None:
|
|
key_record.delete()
|
|
url = reverse(
|
|
"new_realm_send_confirm",
|
|
query={
|
|
"email": email,
|
|
"realm_name": realm_name,
|
|
"realm_type": realm_type,
|
|
"realm_default_language": realm_default_language,
|
|
"realm_subdomain": realm_subdomain,
|
|
},
|
|
)
|
|
return HttpResponseRedirect(url)
|
|
else:
|
|
default_language_code = get_browser_language_code(request)
|
|
if default_language_code is None:
|
|
default_language_code = "en"
|
|
|
|
initial_data = {
|
|
"realm_default_language": default_language_code,
|
|
}
|
|
if settings.USING_CAPTCHA:
|
|
form = CaptchaRealmCreationForm(request=request, initial=initial_data)
|
|
else:
|
|
form = RealmCreationForm(initial=initial_data)
|
|
|
|
context = get_realm_create_form_context()
|
|
context.update(
|
|
{
|
|
"has_captcha": settings.USING_CAPTCHA,
|
|
"form": form,
|
|
"current_url": request.get_full_path,
|
|
}
|
|
)
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/create_realm.html",
|
|
context=context,
|
|
)
|
|
|
|
|
|
@typed_endpoint
|
|
def signup_send_confirm(request: HttpRequest, *, email: str) -> HttpResponse:
|
|
try:
|
|
# Because we interpolate the email directly into the template
|
|
# from the query parameter, do a simple validation that it
|
|
# looks a at least a bit like an email address.
|
|
validators.validate_email(email)
|
|
except ValidationError:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/invalid_email.html",
|
|
context={"invalid_email": True},
|
|
status=400,
|
|
)
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/accounts_send_confirm.html",
|
|
context={"email": email},
|
|
)
|
|
|
|
|
|
@add_google_analytics
|
|
@typed_endpoint
|
|
def new_realm_send_confirm(
|
|
request: HttpRequest,
|
|
*,
|
|
email: str,
|
|
realm_name: Annotated[str, StringConstraints(max_length=Realm.MAX_REALM_NAME_LENGTH)],
|
|
realm_type: Annotated[Json[int], check_int_in_validator(Realm.ORG_TYPE_IDS)],
|
|
realm_default_language: Annotated[str, StringConstraints(max_length=MAX_LANGUAGE_ID_LENGTH)],
|
|
realm_subdomain: Annotated[str, StringConstraints(max_length=Realm.MAX_REALM_SUBDOMAIN_LENGTH)],
|
|
) -> HttpResponse:
|
|
return TemplateResponse(
|
|
request,
|
|
"zerver/accounts_send_confirm.html",
|
|
context={
|
|
"email": email,
|
|
# Using "new_realm_name" key here since "realm_name" key is already present in
|
|
# the context provided by zulip_default_context and it is "None" during realm
|
|
# creation.
|
|
"new_realm_name": realm_name,
|
|
"realm_type": realm_type,
|
|
"realm_default_language": realm_default_language,
|
|
"realm_subdomain": realm_subdomain,
|
|
"realm_creation": True,
|
|
},
|
|
)
|
|
|
|
|
|
def accounts_home(
|
|
request: HttpRequest,
|
|
multiuse_object_key: str = "",
|
|
multiuse_object: MultiuseInvite | None = None,
|
|
) -> HttpResponse:
|
|
try:
|
|
realm = get_realm(get_subdomain(request))
|
|
except Realm.DoesNotExist:
|
|
return HttpResponseRedirect(reverse(find_account))
|
|
if realm.deactivated:
|
|
return redirect_to_deactivation_notice()
|
|
|
|
from_multiuse_invite = False
|
|
streams_to_subscribe = None
|
|
user_groups_to_subscribe = None
|
|
invited_as = None
|
|
include_realm_default_subscriptions = None
|
|
|
|
if multiuse_object:
|
|
# multiuse_object's realm should have been validated by the caller,
|
|
# so this code shouldn't be reachable with a multiuse_object which
|
|
# has its realm mismatching the realm of the request.
|
|
assert realm == multiuse_object.realm
|
|
|
|
streams_to_subscribe = multiuse_object.streams.all()
|
|
user_groups_to_subscribe = multiuse_object.groups.all()
|
|
from_multiuse_invite = True
|
|
invited_as = multiuse_object.invited_as
|
|
include_realm_default_subscriptions = multiuse_object.include_realm_default_subscriptions
|
|
|
|
if request.method == "POST":
|
|
form = HomepageForm(
|
|
request.POST,
|
|
realm=realm,
|
|
require_password_backend=True,
|
|
from_multiuse_invite=from_multiuse_invite,
|
|
invited_as=invited_as,
|
|
)
|
|
if form.is_valid():
|
|
try:
|
|
rate_limit_request_by_ip(request, domain="sends_email_by_ip")
|
|
except RateLimitedError as e:
|
|
assert e.secs_to_freedom is not None
|
|
return render(
|
|
request,
|
|
"zerver/portico_error_pages/rate_limit_exceeded.html",
|
|
context={"retry_after": int(e.secs_to_freedom)},
|
|
status=429,
|
|
)
|
|
|
|
email = form.cleaned_data["email"]
|
|
|
|
try:
|
|
validate_email_not_already_in_realm(realm, email)
|
|
except ValidationError:
|
|
return redirect_to_email_login_url(email)
|
|
|
|
activation_url = prepare_activation_url(
|
|
email,
|
|
request.session,
|
|
realm=realm,
|
|
streams=streams_to_subscribe,
|
|
user_groups=user_groups_to_subscribe,
|
|
invited_as=invited_as,
|
|
include_realm_default_subscriptions=include_realm_default_subscriptions,
|
|
multiuse_invite=multiuse_object,
|
|
)
|
|
try:
|
|
send_confirm_registration_email(email, activation_url, request=request, realm=realm)
|
|
except EmailNotDeliveredError:
|
|
logging.exception("Failed to deliver email during user registration")
|
|
if settings.CORPORATE_ENABLED:
|
|
return render(request, "500.html", status=500)
|
|
return config_error(request, "smtp")
|
|
return HttpResponseRedirect(reverse("signup_send_confirm", query={"email": email}))
|
|
|
|
else:
|
|
form = HomepageForm(realm=realm)
|
|
context = login_context(request)
|
|
context.update(
|
|
form=form,
|
|
current_url=request.get_full_path,
|
|
multiuse_object_key=multiuse_object_key,
|
|
from_multiuse_invite=from_multiuse_invite,
|
|
)
|
|
return render(request, "zerver/accounts_home.html", context=context)
|
|
|
|
|
|
def accounts_home_from_multiuse_invite(request: HttpRequest, confirmation_key: str) -> HttpResponse:
|
|
realm = get_realm_from_request(request)
|
|
multiuse_object: MultiuseInvite | None = None
|
|
try:
|
|
confirmation_obj = get_object_from_key(
|
|
confirmation_key, [Confirmation.MULTIUSE_INVITE], mark_object_used=False
|
|
)
|
|
assert isinstance(confirmation_obj, MultiuseInvite)
|
|
multiuse_object = confirmation_obj
|
|
if realm != multiuse_object.realm:
|
|
return render(request, "confirmation/link_does_not_exist.html", status=404)
|
|
# Required for OAuth 2
|
|
except ConfirmationKeyError as exception:
|
|
if realm is None or realm.invite_required:
|
|
return render_confirmation_key_error(request, exception)
|
|
return accounts_home(
|
|
request, multiuse_object_key=confirmation_key, multiuse_object=multiuse_object
|
|
)
|
|
|
|
|
|
@typed_endpoint_without_parameters
|
|
def find_account(request: HttpRequest) -> HttpResponse:
|
|
url = reverse("find_account")
|
|
form = FindMyTeamForm()
|
|
emails: list[str] = []
|
|
if request.method == "POST":
|
|
form = FindMyTeamForm(request.POST)
|
|
if form.is_valid():
|
|
# Note: Show all the emails in the POST request response
|
|
# otherwise this feature can be used to ascertain which
|
|
# email addresses are associated with Zulip.
|
|
emails = form.cleaned_data["emails"]
|
|
for i in range(len(emails)):
|
|
try:
|
|
rate_limit_request_by_ip(request, domain="sends_email_by_ip")
|
|
except RateLimitedError as e:
|
|
assert e.secs_to_freedom is not None
|
|
return render(
|
|
request,
|
|
"zerver/portico_error_pages/rate_limit_exceeded.html",
|
|
context={"retry_after": int(e.secs_to_freedom)},
|
|
status=429,
|
|
)
|
|
|
|
# Django doesn't support __iexact__in lookup with EmailField, so we have
|
|
# to use Qs to get around that without needing to do multiple queries.
|
|
emails_q = Q()
|
|
for email in emails:
|
|
emails_q |= Q(delivery_email__iexact=email)
|
|
|
|
user_profiles = UserProfile.objects.filter(
|
|
emails_q, is_active=True, is_bot=False, realm__deactivated=False
|
|
)
|
|
|
|
# We organize the data in preparation for sending exactly
|
|
# one outgoing email per provided email address, with each
|
|
# email listing all of the accounts that email address has
|
|
# with the current Zulip server.
|
|
emails_account_found: set[str] = set()
|
|
context: dict[str, dict[str, Any]] = {}
|
|
for user in user_profiles:
|
|
key = user.delivery_email.lower()
|
|
context.setdefault(key, {})
|
|
context[key].setdefault("realms", [])
|
|
context[key]["realms"].append(
|
|
{
|
|
"name": user.realm.name,
|
|
"host": user.realm.host,
|
|
"url": user.realm.url,
|
|
}
|
|
)
|
|
# This value will end up being the last user ID among
|
|
# matching accounts; since it's only used for minor
|
|
# details like language, that arbitrary choice is OK.
|
|
context[key]["to_user_id"] = user.id
|
|
emails_account_found.add(user.delivery_email)
|
|
|
|
# Links in find_team emails use the server's information
|
|
# and not any particular realm's information.
|
|
external_host_base_url = f"{settings.EXTERNAL_URI_SCHEME}{settings.EXTERNAL_HOST}"
|
|
help_base_url = f"{external_host_base_url}/help"
|
|
help_reset_password_link = (
|
|
f"{help_base_url}/change-your-password#if-youve-forgotten-or-never-had-a-password"
|
|
)
|
|
help_logging_in_link = f"{help_base_url}/logging-in#find-the-zulip-log-in-url"
|
|
find_accounts_link = f"{external_host_base_url}/accounts/find/"
|
|
|
|
for delivery_email, realm_context in context.items():
|
|
send_email(
|
|
"zerver/emails/find_team",
|
|
to_user_ids=[realm_context["to_user_id"]],
|
|
context={
|
|
"account_found": True,
|
|
"external_host": settings.EXTERNAL_HOST,
|
|
"corporate_enabled": settings.CORPORATE_ENABLED,
|
|
"help_reset_password_link": help_reset_password_link,
|
|
"realms": realm_context["realms"],
|
|
"email": delivery_email,
|
|
},
|
|
from_address=FromAddress.SUPPORT,
|
|
request=request,
|
|
)
|
|
|
|
emails_lower_with_account = {email.lower() for email in emails_account_found}
|
|
emails_without_account: set[str] = {
|
|
email for email in emails if email.lower() not in emails_lower_with_account
|
|
}
|
|
if emails_without_account:
|
|
send_email(
|
|
"zerver/emails/find_team",
|
|
to_emails=list(emails_without_account),
|
|
context=(
|
|
{
|
|
"account_found": False,
|
|
"external_host": settings.EXTERNAL_HOST,
|
|
"corporate_enabled": settings.CORPORATE_ENABLED,
|
|
"find_accounts_link": find_accounts_link,
|
|
"help_logging_in_link": help_logging_in_link,
|
|
}
|
|
),
|
|
from_address=FromAddress.SUPPORT,
|
|
request=request,
|
|
language=get_default_language_for_anonymous_user(request),
|
|
)
|
|
return render(
|
|
request,
|
|
"zerver/find_account.html",
|
|
context={"form": form, "current_url": url, "emails": emails},
|
|
)
|
|
|
|
|
|
@typed_endpoint
|
|
def realm_redirect(request: HttpRequest, *, next: str = "") -> HttpResponse:
|
|
if request.method == "POST":
|
|
form = RealmRedirectForm(request.POST)
|
|
if form.is_valid():
|
|
subdomain = form.cleaned_data["subdomain"]
|
|
realm = get_realm(subdomain)
|
|
redirect_to = urljoin(realm.url, settings.HOME_NOT_LOGGED_IN)
|
|
|
|
if next:
|
|
redirect_to = append_url_query_string(
|
|
redirect_to, urlencode({REDIRECT_FIELD_NAME: next})
|
|
)
|
|
|
|
return HttpResponseRedirect(redirect_to)
|
|
else:
|
|
form = RealmRedirectForm()
|
|
|
|
return render(request, "zerver/realm_redirect.html", context={"form": form})
|