mirror of
				https://github.com/zulip/zulip.git
				synced 2025-10-31 03:53:50 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			746 lines
		
	
	
		
			32 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			746 lines
		
	
	
		
			32 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| from __future__ import absolute_import
 | |
| 
 | |
| from django.utils.translation import ugettext as _
 | |
| from django.http import HttpResponseRedirect, HttpResponse
 | |
| from django.contrib.auth import REDIRECT_FIELD_NAME
 | |
| from django.views.decorators.csrf import csrf_exempt
 | |
| from django.http import QueryDict, HttpResponseNotAllowed, HttpRequest
 | |
| from django.http.multipartparser import MultiPartParser
 | |
| from zerver.models import UserProfile, get_client, get_user_profile_by_email
 | |
| from zerver.lib.response import json_error, json_unauthorized, json_success
 | |
| from django.shortcuts import resolve_url
 | |
| from django.utils.decorators import available_attrs
 | |
| from django.utils.timezone import now as timezone_now
 | |
| from django.conf import settings
 | |
| from zerver.lib.queue import queue_json_publish
 | |
| from zerver.lib.timestamp import datetime_to_timestamp, timestamp_to_datetime
 | |
| from zerver.lib.utils import statsd, get_subdomain, check_subdomain, \
 | |
|     is_remote_server
 | |
| from zerver.exceptions import RateLimited
 | |
| from zerver.lib.rate_limiter import incr_ratelimit, is_ratelimited, \
 | |
|     api_calls_left
 | |
| from zerver.lib.request import REQ, has_request_variables, JsonableError, RequestVariableMissingError
 | |
| from django.core.handlers import base
 | |
| 
 | |
| from functools import wraps
 | |
| import base64
 | |
| import datetime
 | |
| import logging
 | |
| import cProfile
 | |
| import ujson
 | |
| from io import BytesIO
 | |
| from six.moves import zip, urllib
 | |
| 
 | |
| from typing import Union, Any, Callable, Sequence, Dict, Optional, TypeVar, Text, cast
 | |
| from zerver.lib.str_utils import force_bytes
 | |
| 
 | |
| # This is a hack to ensure that RemoteZulipServer always exists even
 | |
| # if Zilencer isn't enabled.
 | |
| if settings.ZILENCER_ENABLED:
 | |
|     from zilencer.models import get_remote_server_by_uuid, RemoteZulipServer
 | |
| else:
 | |
|     from mock import Mock
 | |
|     get_remote_server_by_uuid = Mock()
 | |
|     RemoteZulipServer = Mock()  # type: ignore # https://github.com/JukkaL/mypy/issues/1188
 | |
| 
 | |
| FuncT = TypeVar('FuncT', bound=Callable[..., Any])
 | |
| ViewFuncT = TypeVar('ViewFuncT', bound=Callable[..., HttpResponse])
 | |
| 
 | |
| ## logger setup
 | |
| log_format = "%(asctime)s: %(message)s"
 | |
| 
 | |
| formatter = logging.Formatter(log_format)
 | |
| file_handler = logging.FileHandler(
 | |
|     settings.API_KEY_ONLY_WEBHOOK_LOG_PATH)
 | |
| file_handler.setFormatter(formatter)
 | |
| 
 | |
| webhook_logger = logging.getLogger("zulip.zerver.webhooks")
 | |
| webhook_logger.setLevel(logging.DEBUG)
 | |
| webhook_logger.addHandler(file_handler)
 | |
| 
 | |
| class _RespondAsynchronously(object):
 | |
|     pass
 | |
| 
 | |
| # Return RespondAsynchronously from an @asynchronous view if the
 | |
| # response will be provided later by calling handler.zulip_finish(),
 | |
| # or has already been provided this way. We use this for longpolling
 | |
| # mode.
 | |
| RespondAsynchronously = _RespondAsynchronously()
 | |
| 
 | |
| def asynchronous(method):
 | |
|     # type: (Callable[..., Union[HttpResponse, _RespondAsynchronously]]) -> Callable[..., Union[HttpResponse, _RespondAsynchronously]]
 | |
|     # TODO: this should be the correct annotation when mypy gets fixed: type:
 | |
|     #   (Callable[[HttpRequest, base.BaseHandler, Sequence[Any], Dict[str, Any]], Union[HttpResponse, _RespondAsynchronously]]) ->
 | |
|     #   Callable[[HttpRequest, Sequence[Any], Dict[str, Any]], Union[HttpResponse, _RespondAsynchronously]]
 | |
|     # TODO: see https://github.com/python/mypy/issues/1655
 | |
|     @wraps(method)
 | |
|     def wrapper(request, *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> Union[HttpResponse, _RespondAsynchronously]
 | |
|         return method(request, handler=request._tornado_handler, *args, **kwargs)
 | |
|     if getattr(method, 'csrf_exempt', False):
 | |
|         wrapper.csrf_exempt = True  # type: ignore # https://github.com/JukkaL/mypy/issues/1170
 | |
|     return wrapper
 | |
| 
 | |
| def update_user_activity(request, user_profile):
 | |
|     # type: (HttpRequest, UserProfile) -> None
 | |
|     # update_active_status also pushes to rabbitmq, and it seems
 | |
|     # redundant to log that here as well.
 | |
|     if request.META["PATH_INFO"] == '/json/users/me/presence':
 | |
|         return
 | |
| 
 | |
|     if hasattr(request, '_query'):
 | |
|         query = request._query
 | |
|     else:
 | |
|         query = request.META['PATH_INFO']
 | |
| 
 | |
|     event = {'query': query,
 | |
|              'user_profile_id': user_profile.id,
 | |
|              'time': datetime_to_timestamp(timezone_now()),
 | |
|              'client': request.client.name}
 | |
|     queue_json_publish("user_activity", event, lambda event: None)
 | |
| 
 | |
| # Based on django.views.decorators.http.require_http_methods
 | |
| def require_post(func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @wraps(func)
 | |
|     def wrapper(request, *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|         if (request.method != "POST" and
 | |
|             not (request.method == "SOCKET" and
 | |
|                  request.META['zulip.emulated_method'] == "POST")):
 | |
|             if request.method == "SOCKET":
 | |
|                 err_method = "SOCKET/%s" % (request.META['zulip.emulated_method'],)
 | |
|             else:
 | |
|                 err_method = request.method
 | |
|             logging.warning('Method Not Allowed (%s): %s', err_method, request.path,
 | |
|                             extra={'status_code': 405, 'request': request})
 | |
|             return HttpResponseNotAllowed(["POST"])
 | |
|         return func(request, *args, **kwargs)
 | |
|     return wrapper  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| def require_realm_admin(func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @wraps(func)
 | |
|     def wrapper(request, user_profile, *args, **kwargs):
 | |
|         # type: (HttpRequest, UserProfile, *Any, **Any) -> HttpResponse
 | |
|         if not user_profile.is_realm_admin:
 | |
|             raise JsonableError(_("Must be a realm administrator"))
 | |
|         return func(request, user_profile, *args, **kwargs)
 | |
|     return wrapper  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| from zerver.lib.user_agent import parse_user_agent
 | |
| 
 | |
| def get_client_name(request, is_json_view):
 | |
|     # type: (HttpRequest, bool) -> Text
 | |
|     # If the API request specified a client in the request content,
 | |
|     # that has priority.  Otherwise, extract the client from the
 | |
|     # User-Agent.
 | |
|     if 'client' in request.GET:
 | |
|         return request.GET['client']
 | |
|     if 'client' in request.POST:
 | |
|         return request.POST['client']
 | |
|     if "HTTP_USER_AGENT" in request.META:
 | |
|         user_agent = parse_user_agent(request.META["HTTP_USER_AGENT"])
 | |
|     else:
 | |
|         user_agent = None
 | |
|     if user_agent is not None:
 | |
|         # We could check for a browser's name being "Mozilla", but
 | |
|         # e.g. Opera and MobileSafari don't set that, and it seems
 | |
|         # more robust to just key off whether it was a json view
 | |
|         if is_json_view and user_agent["name"] not in {"ZulipDesktop", "ZulipElectron"}:
 | |
|             # Avoid changing the client string for browsers Once this
 | |
|             # is out to prod, we can name the field to something like
 | |
|             # Browser for consistency.
 | |
|             return "website"
 | |
|         else:
 | |
|             return user_agent["name"]
 | |
|     else:
 | |
|         # In the future, we will require setting USER_AGENT, but for
 | |
|         # now we just want to tag these requests so we can review them
 | |
|         # in logs and figure out the extent of the problem
 | |
|         if is_json_view:
 | |
|             return "website"
 | |
|         else:
 | |
|             return "Unspecified"
 | |
| 
 | |
| def process_client(request, user_profile, is_json_view=False, client_name=None,
 | |
|                    remote_server_request=False):
 | |
|     # type: (HttpRequest, UserProfile, bool, Optional[Text], bool) -> None
 | |
|     if client_name is None:
 | |
|         client_name = get_client_name(request, is_json_view)
 | |
| 
 | |
|     # Transitional hack for early 2014.  Eventually the ios clients
 | |
|     # will all report ZulipiOS, and we can remove the next couple lines.
 | |
|     if client_name == 'ios':
 | |
|         client_name = 'ZulipiOS'
 | |
| 
 | |
|     request.client = get_client(client_name)
 | |
|     if not remote_server_request:
 | |
|         update_user_activity(request, user_profile)
 | |
| 
 | |
| def validate_api_key(request, role, api_key, is_webhook=False):
 | |
|     # type: (HttpRequest, Text, Text, bool) -> Union[UserProfile, RemoteZulipServer]
 | |
|     # Remove whitespace to protect users from trivial errors.
 | |
|     role, api_key = role.strip(), api_key.strip()
 | |
| 
 | |
|     if not is_remote_server(role):
 | |
|         try:
 | |
|             profile = get_user_profile_by_email(role)  # type: Union[UserProfile, RemoteZulipServer]
 | |
|         except UserProfile.DoesNotExist:
 | |
|             raise JsonableError(_("Invalid user: %s") % (role,))
 | |
|     else:
 | |
|         try:
 | |
|             profile = get_remote_server_by_uuid(role)
 | |
|         except RemoteZulipServer.DoesNotExist:
 | |
|             raise JsonableError(_("Invalid Zulip server: %s") % (role,))
 | |
| 
 | |
|     if api_key != profile.api_key:
 | |
|         if len(api_key) != 32:
 | |
|             reason = _("Incorrect API key length (keys should be 32 "
 | |
|                        "characters long) for role '%s'")
 | |
|         else:
 | |
|             reason = _("Invalid API key for role '%s'")
 | |
|         raise JsonableError(reason % (role,))
 | |
| 
 | |
|     # early exit for RemoteZulipServer instances
 | |
|     if settings.ZILENCER_ENABLED and isinstance(profile, RemoteZulipServer):
 | |
|         if not check_subdomain(get_subdomain(request), ""):
 | |
|             raise JsonableError(_("This API key only works on the root subdomain"))
 | |
|         return profile
 | |
| 
 | |
|     profile = cast(UserProfile, profile)  # is UserProfile
 | |
|     if not profile.is_active:
 | |
|         raise JsonableError(_("Account not active"))
 | |
|     if profile.is_incoming_webhook and not is_webhook:
 | |
|         raise JsonableError(_("Account is not valid to post webhook messages"))
 | |
| 
 | |
|     if profile.realm.deactivated:
 | |
|         raise JsonableError(_("Realm for account has been deactivated"))
 | |
| 
 | |
|     if (not check_subdomain(get_subdomain(request), profile.realm.subdomain) and
 | |
|         # Allow access to localhost for Tornado
 | |
|         not (settings.RUNNING_INSIDE_TORNADO and
 | |
|              request.META["SERVER_NAME"] == "127.0.0.1" and
 | |
|              request.META["REMOTE_ADDR"] == "127.0.0.1")):
 | |
|         logging.warning("User %s attempted to access API on wrong subdomain %s" % (
 | |
|             profile.email, get_subdomain(request)))
 | |
|         raise JsonableError(_("Account is not associated with this subdomain"))
 | |
| 
 | |
|     return profile
 | |
| 
 | |
| # Use this for webhook views that don't get an email passed in.
 | |
| def api_key_only_webhook_view(client_name):
 | |
|     # type: (Text) ->  Callable[..., HttpResponse]
 | |
|     # This function can't be typed perfectly because returning a generic function
 | |
|     # isn't supported in mypy - https://github.com/python/mypy/issues/1551.
 | |
|     def _wrapped_view_func(view_func):
 | |
|         # type: (Callable[..., HttpResponse]) -> Callable[..., HttpResponse]
 | |
|         @csrf_exempt
 | |
|         @has_request_variables
 | |
|         @wraps(view_func)
 | |
|         def _wrapped_func_arguments(request, api_key=REQ(),
 | |
|                                     *args, **kwargs):
 | |
|             # type: (HttpRequest, Text, *Any, **Any) -> HttpResponse
 | |
|             try:
 | |
|                 user_profile = UserProfile.objects.get(api_key=api_key)
 | |
|             except UserProfile.DoesNotExist:
 | |
|                 raise JsonableError(_("Invalid API key"))
 | |
|             if not user_profile.is_active:
 | |
|                 raise JsonableError(_("Account not active"))
 | |
|             if user_profile.realm.deactivated:
 | |
|                 raise JsonableError(_("Realm for account has been deactivated"))
 | |
|             if not check_subdomain(get_subdomain(request), user_profile.realm.subdomain):
 | |
|                 logging.warning("User %s attempted to access webhook API on wrong subdomain %s" % (
 | |
|                     user_profile.email, get_subdomain(request)))
 | |
|                 raise JsonableError(_("Account is not associated with this subdomain"))
 | |
| 
 | |
|             request.user = user_profile
 | |
|             request._email = user_profile.email
 | |
|             webhook_client_name = "Zulip{}Webhook".format(client_name)
 | |
|             process_client(request, user_profile, client_name=webhook_client_name)
 | |
|             if settings.RATE_LIMITING:
 | |
|                 rate_limit_user(request, user_profile, domain='all')
 | |
|             try:
 | |
|                 return view_func(request, user_profile, *args, **kwargs)
 | |
|             except Exception:
 | |
|                 if request.content_type == 'application/json':
 | |
|                     request_body = ujson.dumps(ujson.loads(request.body), indent=4)
 | |
|                 else:
 | |
|                     request_body = str(request.body)
 | |
|                 message = """
 | |
| user: {email} ({realm})
 | |
| client: {client_name}
 | |
| URL: {path_info}
 | |
| body:
 | |
| 
 | |
| {body}
 | |
|                 """.format(
 | |
|                     email=user_profile.email,
 | |
|                     realm=user_profile.realm.string_id,
 | |
|                     client_name=webhook_client_name,
 | |
|                     body=request_body,
 | |
|                     path_info=request.META.get('PATH_INFO', None),
 | |
|                 )
 | |
|                 webhook_logger.exception(message)
 | |
|                 raise
 | |
| 
 | |
|         return _wrapped_func_arguments
 | |
|     return _wrapped_view_func
 | |
| 
 | |
| # From Django 1.8, modified to leave off ?next=/
 | |
| def redirect_to_login(next, login_url=None,
 | |
|                       redirect_field_name=REDIRECT_FIELD_NAME):
 | |
|     # type: (Text, Optional[Text], Text) -> HttpResponseRedirect
 | |
|     """
 | |
|     Redirects the user to the login page, passing the given 'next' page
 | |
|     """
 | |
|     resolved_url = resolve_url(login_url or settings.LOGIN_URL)
 | |
| 
 | |
|     login_url_parts = list(urllib.parse.urlparse(resolved_url))
 | |
|     if redirect_field_name:
 | |
|         querystring = QueryDict(login_url_parts[4], mutable=True)
 | |
|         querystring[redirect_field_name] = next
 | |
|         # Don't add ?next=/, to keep our URLs clean
 | |
|         if next != '/':
 | |
|             login_url_parts[4] = querystring.urlencode(safe='/')
 | |
| 
 | |
|     return HttpResponseRedirect(urllib.parse.urlunparse(login_url_parts))
 | |
| 
 | |
| # From Django 1.8
 | |
| def user_passes_test(test_func, login_url=None, redirect_field_name=REDIRECT_FIELD_NAME):
 | |
|     # type: (Callable[[HttpResponse], bool], Optional[Text], Text) -> Callable[[Callable[..., HttpResponse]], Callable[..., HttpResponse]]
 | |
|     """
 | |
|     Decorator for views that checks that the user passes the given test,
 | |
|     redirecting to the log-in page if necessary. The test should be a callable
 | |
|     that takes the user object and returns True if the user passes.
 | |
|     """
 | |
|     def decorator(view_func):
 | |
|         # type: (Callable[..., HttpResponse]) -> Callable[..., HttpResponse]
 | |
|         @wraps(view_func, assigned=available_attrs(view_func))
 | |
|         def _wrapped_view(request, *args, **kwargs):
 | |
|             # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|             if test_func(request):
 | |
|                 return view_func(request, *args, **kwargs)
 | |
|             path = request.build_absolute_uri()
 | |
|             resolved_login_url = resolve_url(login_url or settings.LOGIN_URL)
 | |
|             # If the login url is the same scheme and net location then just
 | |
|             # use the path as the "next" url.
 | |
|             login_scheme, login_netloc = urllib.parse.urlparse(resolved_login_url)[:2]
 | |
|             current_scheme, current_netloc = urllib.parse.urlparse(path)[:2]
 | |
|             if ((not login_scheme or login_scheme == current_scheme) and
 | |
|                     (not login_netloc or login_netloc == current_netloc)):
 | |
|                 path = request.get_full_path()
 | |
|             return redirect_to_login(
 | |
|                 path, resolved_login_url, redirect_field_name)
 | |
|         return _wrapped_view
 | |
|     return decorator
 | |
| 
 | |
| def logged_in_and_active(request):
 | |
|     # type: (HttpRequest) -> bool
 | |
|     if not request.user.is_authenticated:
 | |
|         return False
 | |
|     if not request.user.is_active:
 | |
|         return False
 | |
|     if request.user.realm.deactivated:
 | |
|         return False
 | |
|     return check_subdomain(get_subdomain(request), request.user.realm.subdomain)
 | |
| 
 | |
| def add_logging_data(view_func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @wraps(view_func)
 | |
|     def _wrapped_view_func(request, *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|         request._email = request.user.email
 | |
|         request._query = view_func.__name__
 | |
|         process_client(request, request.user, is_json_view=True)
 | |
|         return rate_limit()(view_func)(request, *args, **kwargs)
 | |
|     return _wrapped_view_func  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| def human_users_only(view_func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @wraps(view_func)
 | |
|     def _wrapped_view_func(request, *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|         if request.user.is_bot:
 | |
|             return json_error(_("This endpoint does not accept bot requests."))
 | |
|         return view_func(request, *args, **kwargs)
 | |
|     return _wrapped_view_func  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| # Based on Django 1.8's @login_required
 | |
| def zulip_login_required(function=None,
 | |
|                          redirect_field_name=REDIRECT_FIELD_NAME,
 | |
|                          login_url=settings.HOME_NOT_LOGGED_IN):
 | |
|     # type: (Optional[Callable[..., HttpResponse]], Text, Text) -> Union[Callable[[Callable[..., HttpResponse]], Callable[..., HttpResponse]], Callable[..., HttpResponse]]
 | |
|     actual_decorator = user_passes_test(
 | |
|         logged_in_and_active,
 | |
|         login_url=login_url,
 | |
|         redirect_field_name=redirect_field_name
 | |
|     )
 | |
|     if function:
 | |
|         # Add necessary logging data via add_logging_data
 | |
|         return actual_decorator(add_logging_data(function))
 | |
|     return actual_decorator
 | |
| 
 | |
| def require_server_admin(view_func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @zulip_login_required
 | |
|     @wraps(view_func)
 | |
|     def _wrapped_view_func(request, *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|         request._query = view_func.__name__
 | |
|         if not request.user.is_staff:
 | |
|             return HttpResponseRedirect(settings.HOME_NOT_LOGGED_IN)
 | |
| 
 | |
|         return add_logging_data(view_func)(request, *args, **kwargs)
 | |
|     return _wrapped_view_func  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| # authenticated_api_view will add the authenticated user's
 | |
| # user_profile to the view function's arguments list, since we have to
 | |
| # look it up anyway.  It is deprecated in favor on the REST API
 | |
| # versions.
 | |
| def authenticated_api_view(is_webhook=False):
 | |
|     # type: (bool) -> Callable[[Callable[..., HttpResponse]], Callable[..., HttpResponse]]
 | |
|     def _wrapped_view_func(view_func):
 | |
|         # type: (Callable[..., HttpResponse]) -> Callable[..., HttpResponse]
 | |
|         @csrf_exempt
 | |
|         @require_post
 | |
|         @has_request_variables
 | |
|         @wraps(view_func)
 | |
|         def _wrapped_func_arguments(request, email=REQ(), api_key=REQ(default=None),
 | |
|                                     api_key_legacy=REQ('api-key', default=None),
 | |
|                                     *args, **kwargs):
 | |
|             # type: (HttpRequest, Text, Optional[Text], Optional[Text], *Any, **Any) -> HttpResponse
 | |
|             if api_key is None:
 | |
|                 api_key = api_key_legacy
 | |
|             if api_key is None:
 | |
|                 raise RequestVariableMissingError("api_key")
 | |
|             user_profile = validate_api_key(request, email, api_key, is_webhook)
 | |
|             request.user = user_profile
 | |
|             request._email = user_profile.email
 | |
|             process_client(request, user_profile)
 | |
|             # Apply rate limiting
 | |
|             limited_func = rate_limit()(view_func)
 | |
|             return limited_func(request, user_profile, *args, **kwargs)
 | |
|         return _wrapped_func_arguments
 | |
|     return _wrapped_view_func
 | |
| 
 | |
| # A more REST-y authentication decorator, using, in particular, HTTP Basic
 | |
| # authentication.
 | |
| def authenticated_rest_api_view(is_webhook=False):
 | |
|     # type: (bool) -> Callable[[Callable[..., HttpResponse]], Callable[..., HttpResponse]]
 | |
|     def _wrapped_view_func(view_func):
 | |
|         # type: (Callable[..., HttpResponse]) -> Callable[..., HttpResponse]
 | |
|         @csrf_exempt
 | |
|         @wraps(view_func)
 | |
|         def _wrapped_func_arguments(request, *args, **kwargs):
 | |
|             # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|             # First try block attempts to get the credentials we need to do authentication
 | |
|             try:
 | |
|                 # Grab the base64-encoded authentication string, decode it, and split it into
 | |
|                 # the email and API key
 | |
|                 auth_type, credentials = request.META['HTTP_AUTHORIZATION'].split()
 | |
|                 # case insensitive per RFC 1945
 | |
|                 if auth_type.lower() != "basic":
 | |
|                     return json_error(_("This endpoint requires HTTP basic authentication."))
 | |
|                 role, api_key = base64.b64decode(force_bytes(credentials)).decode('utf-8').split(":")
 | |
|             except ValueError:
 | |
|                 return json_unauthorized(_("Invalid authorization header for basic auth"))
 | |
|             except KeyError:
 | |
|                 return json_unauthorized("Missing authorization header for basic auth")
 | |
| 
 | |
|             # Now we try to do authentication or die
 | |
|             try:
 | |
|                 # profile is a Union[UserProfile, RemoteZulipServer]
 | |
|                 profile = validate_api_key(request, role, api_key, is_webhook)
 | |
|             except JsonableError as e:
 | |
|                 return json_unauthorized(e.error)
 | |
|             request.user = profile
 | |
|             if is_remote_server(role):
 | |
|                 assert isinstance(profile, RemoteZulipServer)  # type: ignore # https://github.com/python/mypy/issues/2957
 | |
|                 request._email = "zulip-server:" + role
 | |
|                 profile.rate_limits = ""
 | |
|                 process_client(request, profile, remote_server_request=True)
 | |
|             else:
 | |
|                 assert isinstance(profile, UserProfile)  # type: ignore # https://github.com/python/mypy/issues/2957
 | |
|                 request._email = profile.email
 | |
|                 process_client(request, profile)
 | |
|             # Apply rate limiting
 | |
|             return rate_limit()(view_func)(request, profile, *args, **kwargs)
 | |
|         return _wrapped_func_arguments
 | |
|     return _wrapped_view_func
 | |
| 
 | |
| def process_as_post(view_func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @wraps(view_func)
 | |
|     def _wrapped_view_func(request, *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|         # Adapted from django/http/__init__.py.
 | |
|         # So by default Django doesn't populate request.POST for anything besides
 | |
|         # POST requests. We want this dict populated for PATCH/PUT, so we have to
 | |
|         # do it ourselves.
 | |
|         #
 | |
|         # This will not be required in the future, a bug will be filed against
 | |
|         # Django upstream.
 | |
| 
 | |
|         if not request.POST:
 | |
|             # Only take action if POST is empty.
 | |
|             if request.META.get('CONTENT_TYPE', '').startswith('multipart'):
 | |
|                 # Note that request._files is just the private attribute that backs the
 | |
|                 # FILES property, so we are essentially setting request.FILES here.  (In
 | |
|                 # Django 1.5 FILES was still a read-only property.)
 | |
|                 request.POST, request._files = MultiPartParser(
 | |
|                     request.META,
 | |
|                     BytesIO(request.body),
 | |
|                     request.upload_handlers,
 | |
|                     request.encoding
 | |
|                 ).parse()
 | |
|             else:
 | |
|                 request.POST = QueryDict(request.body, encoding=request.encoding)
 | |
| 
 | |
|         return view_func(request, *args, **kwargs)
 | |
| 
 | |
|     return _wrapped_view_func  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| def authenticate_log_and_execute_json(request, view_func, *args, **kwargs):
 | |
|     # type: (HttpRequest, Callable[..., HttpResponse], *Any, **Any) -> HttpResponse
 | |
|     if not request.user.is_authenticated:
 | |
|         return json_error(_("Not logged in"), status=401)
 | |
|     user_profile = request.user
 | |
|     if not user_profile.is_active:
 | |
|         raise JsonableError(_("Account not active"))
 | |
|     if user_profile.realm.deactivated:
 | |
|         raise JsonableError(_("Realm for account has been deactivated"))
 | |
|     if user_profile.is_incoming_webhook:
 | |
|         raise JsonableError(_("Webhook bots can only access webhooks"))
 | |
|     if (not check_subdomain(get_subdomain(request), user_profile.realm.subdomain) and
 | |
|         # Exclude the SOCKET requests from this filter; they were
 | |
|         # checked when the original websocket request reached Tornado
 | |
|         not (request.method == "SOCKET" and
 | |
|              request.META['SERVER_NAME'] == "127.0.0.1")):
 | |
|         logging.warning("User %s attempted to access JSON API on wrong subdomain %s" % (
 | |
|             user_profile.email, get_subdomain(request)))
 | |
|         raise JsonableError(_("Account is not associated with this subdomain"))
 | |
| 
 | |
|     process_client(request, user_profile, True)
 | |
|     request._email = user_profile.email
 | |
|     return rate_limit()(view_func)(request, user_profile, *args, **kwargs)
 | |
| 
 | |
| # Checks if the request is a POST request and that the user is logged
 | |
| # in.  If not, return an error (the @login_required behavior of
 | |
| # redirecting to a login page doesn't make sense for json views)
 | |
| def authenticated_json_post_view(view_func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @require_post
 | |
|     @has_request_variables
 | |
|     @wraps(view_func)
 | |
|     def _wrapped_view_func(request,
 | |
|                            *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|         return authenticate_log_and_execute_json(request, view_func, *args, **kwargs)
 | |
|     return _wrapped_view_func  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| def authenticated_json_view(view_func):
 | |
|     # type: (ViewFuncT) -> ViewFuncT
 | |
|     @wraps(view_func)
 | |
|     def _wrapped_view_func(request,
 | |
|                            *args, **kwargs):
 | |
|         # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|         return authenticate_log_and_execute_json(request, view_func, *args, **kwargs)
 | |
|     return _wrapped_view_func  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| def is_local_addr(addr):
 | |
|     # type: (Text) -> bool
 | |
|     return addr in ('127.0.0.1', '::1')
 | |
| 
 | |
| # These views are used by the main Django server to notify the Tornado server
 | |
| # of events.  We protect them from the outside world by checking a shared
 | |
| # secret, and also the originating IP (for now).
 | |
| def authenticate_notify(request):
 | |
|     # type: (HttpRequest) -> bool
 | |
|     return (is_local_addr(request.META['REMOTE_ADDR']) and
 | |
|             request.POST.get('secret') == settings.SHARED_SECRET)
 | |
| 
 | |
| def client_is_exempt_from_rate_limiting(request):
 | |
|     # type: (HttpRequest) -> bool
 | |
| 
 | |
|     # Don't rate limit requests from Django that come from our own servers,
 | |
|     # and don't rate-limit dev instances
 | |
|     return ((request.client and request.client.name.lower() == 'internal') and
 | |
|             (is_local_addr(request.META['REMOTE_ADDR']) or
 | |
|              settings.DEBUG_RATE_LIMITING))
 | |
| 
 | |
| def internal_notify_view(is_tornado_view):
 | |
|     # type: (bool) ->  Callable[..., HttpResponse]
 | |
|     # This function can't be typed perfectly because returning a generic function
 | |
|     # isn't supported in mypy - https://github.com/python/mypy/issues/1551.
 | |
|     """Used for situations where something running on the Zulip server
 | |
|     needs to make a request to the (other) Django/Tornado processes running on
 | |
|     the server."""
 | |
|     def _wrapped_view_func(view_func):
 | |
|         # type: (Callable[..., HttpResponse]) -> Callable[..., HttpResponse]
 | |
|         @csrf_exempt
 | |
|         @require_post
 | |
|         @wraps(view_func)
 | |
|         def _wrapped_func_arguments(request, *args, **kwargs):
 | |
|             # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
|             if not authenticate_notify(request):
 | |
|                 return json_error(_('Access denied'), status=403)
 | |
|             is_tornado_request = hasattr(request, '_tornado_handler')
 | |
|             # These next 2 are not security checks; they are internal
 | |
|             # assertions to help us find bugs.
 | |
|             if is_tornado_view and not is_tornado_request:
 | |
|                 raise RuntimeError('Tornado notify view called with no Tornado handler')
 | |
|             if not is_tornado_view and is_tornado_request:
 | |
|                 raise RuntimeError('Django notify view called with Tornado handler')
 | |
|             request._email = "internal"
 | |
|             return view_func(request, *args, **kwargs)
 | |
|         return _wrapped_func_arguments
 | |
|     return _wrapped_view_func
 | |
| 
 | |
| # Converter functions for use with has_request_variables
 | |
| def to_non_negative_int(s):
 | |
|     # type: (Text) -> int
 | |
|     x = int(s)
 | |
|     if x < 0:
 | |
|         raise ValueError("argument is negative")
 | |
|     return x
 | |
| 
 | |
| 
 | |
| def to_not_negative_int_or_none(s):
 | |
|     # type: (Text) -> Optional[int]
 | |
|     if s:
 | |
|         return to_non_negative_int(s)
 | |
|     return None
 | |
| 
 | |
| 
 | |
| def flexible_boolean(boolean):
 | |
|     # type: (Text) -> bool
 | |
|     """Returns True for any of "1", "true", or "True".  Returns False otherwise."""
 | |
|     if boolean in ("1", "true", "True"):
 | |
|         return True
 | |
|     else:
 | |
|         return False
 | |
| 
 | |
| def to_utc_datetime(timestamp):
 | |
|     # type: (Text) -> datetime.datetime
 | |
|     return timestamp_to_datetime(float(timestamp))
 | |
| 
 | |
| def statsd_increment(counter, val=1):
 | |
|     # type: (Text, int) -> Callable[[Callable[..., Any]], Callable[..., Any]]
 | |
|     """Increments a statsd counter on completion of the
 | |
|     decorated function.
 | |
| 
 | |
|     Pass the name of the counter to this decorator-returning function."""
 | |
|     def wrapper(func):
 | |
|         # type: (Callable[..., Any]) -> Callable[..., Any]
 | |
|         @wraps(func)
 | |
|         def wrapped_func(*args, **kwargs):
 | |
|             # type: (*Any, **Any) -> Any
 | |
|             ret = func(*args, **kwargs)
 | |
|             statsd.incr(counter, val)
 | |
|             return ret
 | |
|         return wrapped_func
 | |
|     return wrapper
 | |
| 
 | |
| def rate_limit_user(request, user, domain):
 | |
|     # type: (HttpRequest, UserProfile, Text) -> None
 | |
|     """Returns whether or not a user was rate limited. Will raise a RateLimited exception
 | |
|     if the user has been rate limited, otherwise returns and modifies request to contain
 | |
|     the rate limit information"""
 | |
| 
 | |
|     ratelimited, time = is_ratelimited(user, domain)
 | |
|     request._ratelimit_applied_limits = True
 | |
|     request._ratelimit_secs_to_freedom = time
 | |
|     request._ratelimit_over_limit = ratelimited
 | |
|     # Abort this request if the user is over their rate limits
 | |
|     if ratelimited:
 | |
|         statsd.incr("ratelimiter.limited.%s.%s" % (type(user), user.id))
 | |
|         raise RateLimited()
 | |
| 
 | |
|     incr_ratelimit(user, domain)
 | |
|     calls_remaining, time_reset = api_calls_left(user, domain)
 | |
| 
 | |
|     request._ratelimit_remaining = calls_remaining
 | |
|     request._ratelimit_secs_to_freedom = time_reset
 | |
| 
 | |
| def rate_limit(domain='all'):
 | |
|     # type: (Text) -> Callable[[Callable[..., HttpResponse]], Callable[..., HttpResponse]]
 | |
|     """Rate-limits a view. Takes an optional 'domain' param if you wish to
 | |
|     rate limit different types of API calls independently.
 | |
| 
 | |
|     Returns a decorator"""
 | |
|     def wrapper(func):
 | |
|         # type: (Callable[..., HttpResponse]) -> Callable[..., HttpResponse]
 | |
|         @wraps(func)
 | |
|         def wrapped_func(request, *args, **kwargs):
 | |
|             # type: (HttpRequest, *Any, **Any) -> HttpResponse
 | |
| 
 | |
|             # It is really tempting to not even wrap our original function
 | |
|             # when settings.RATE_LIMITING is False, but it would make
 | |
|             # for awkward unit testing in some situations.
 | |
|             if not settings.RATE_LIMITING:
 | |
|                 return func(request, *args, **kwargs)
 | |
| 
 | |
|             if client_is_exempt_from_rate_limiting(request):
 | |
|                 return func(request, *args, **kwargs)
 | |
| 
 | |
|             try:
 | |
|                 user = request.user
 | |
|             except Exception:
 | |
|                 # TODO: This logic is not tested, and I'm not sure we are
 | |
|                 # doing the right thing here.
 | |
|                 user = None
 | |
| 
 | |
|             if not user:
 | |
|                 logging.error("Requested rate-limiting on %s but user is not authenticated!" %
 | |
|                               func.__name__)
 | |
|                 return func(request, *args, **kwargs)
 | |
| 
 | |
|             # Rate-limiting data is stored in redis
 | |
|             # We also only support rate-limiting authenticated
 | |
|             # views right now.
 | |
|             # TODO(leo) - implement per-IP non-authed rate limiting
 | |
|             rate_limit_user(request, user, domain)
 | |
| 
 | |
|             return func(request, *args, **kwargs)
 | |
|         return wrapped_func
 | |
|     return wrapper
 | |
| 
 | |
| def profiled(func):
 | |
|     # type: (FuncT) -> FuncT
 | |
|     """
 | |
|     This decorator should obviously be used only in a dev environment.
 | |
|     It works best when surrounding a function that you expect to be
 | |
|     called once.  One strategy is to write a backend test and wrap the
 | |
|     test case with the profiled decorator.
 | |
| 
 | |
|     You can run a single test case like this:
 | |
| 
 | |
|         # edit zerver/tests/test_external.py and place @profiled above the test case below
 | |
|         ./tools/test-backend zerver.tests.test_external.RateLimitTests.test_ratelimit_decrease
 | |
| 
 | |
|     Then view the results like this:
 | |
| 
 | |
|         ./tools/show-profile-results.py test_ratelimit_decrease.profile
 | |
| 
 | |
|     """
 | |
|     @wraps(func)
 | |
|     def wrapped_func(*args, **kwargs):
 | |
|         # type: (*Any, **Any) -> Any
 | |
|         fn = func.__name__ + ".profile"
 | |
|         prof = cProfile.Profile()
 | |
|         retval = prof.runcall(func, *args, **kwargs)  # type: Any
 | |
|         prof.dump_stats(fn)
 | |
|         return retval
 | |
|     return wrapped_func  # type: ignore # https://github.com/python/mypy/issues/1927
 | |
| 
 | |
| def return_success_on_head_request(view_func):
 | |
|     # type: (Callable) -> Callable
 | |
|     @wraps(view_func)
 | |
|     def _wrapped_view_func(request, *args, **kwargs):
 | |
|         # type: (HttpResponse, *Any, **Any) -> Callable
 | |
|         if request.method == 'HEAD':
 | |
|             return json_success()
 | |
|         return view_func(request, *args, **kwargs)
 | |
|     return _wrapped_view_func
 |