Compare commits
2 Commits
Author | SHA1 | Date | |
---|---|---|---|
f1110506c0 | |||
f5bce7d7ff |
@ -168,6 +168,8 @@ class NewUserStrategy(ClientMergeStrategy):
|
||||
|
||||
class ExistingUnlinkedUserStrategy(ClientMergeStrategy):
|
||||
def process(self) -> LinkResult:
|
||||
# IF it was scheduled to be deleted. Unschedule it.
|
||||
self.user.delete_on = None
|
||||
partner_user = ensure_partner_user_exists_for_user(
|
||||
self.link_request, self.user, self.partner
|
||||
)
|
||||
@ -246,6 +248,8 @@ def link_user(
|
||||
) -> LinkResult:
|
||||
# Sanitize email just in case
|
||||
link_request.email = sanitize_email(link_request.email)
|
||||
# If it was scheduled to be deleted. Unschedule it.
|
||||
current_user.delete_on = None
|
||||
partner_user = ensure_partner_user_exists_for_user(
|
||||
link_request, current_user, partner
|
||||
)
|
||||
|
@ -33,6 +33,9 @@ def authorize_request() -> Optional[Tuple[str, int]]:
|
||||
if g.user.disabled:
|
||||
return jsonify(error="Disabled account"), 403
|
||||
|
||||
if not g.user.is_active():
|
||||
return jsonify(error="Account does not exist"), 401
|
||||
|
||||
g.api_key = api_key
|
||||
return None
|
||||
|
||||
|
@ -7,7 +7,7 @@ from app.config import URL, GOOGLE_CLIENT_ID, GOOGLE_CLIENT_SECRET
|
||||
from app.db import Session
|
||||
from app.log import LOG
|
||||
from app.models import User, File, SocialAuth
|
||||
from app.utils import random_string, sanitize_email
|
||||
from app.utils import random_string, sanitize_email, sanitize_next_url
|
||||
from .login_utils import after_login
|
||||
|
||||
_authorization_base_url = "https://accounts.google.com/o/oauth2/v2/auth"
|
||||
@ -29,7 +29,7 @@ def google_login():
|
||||
# to avoid flask-login displaying the login error message
|
||||
session.pop("_flashes", None)
|
||||
|
||||
next_url = request.args.get("next")
|
||||
next_url = sanitize_next_url(request.args.get("next"))
|
||||
|
||||
# Google does not allow to append param to redirect_url
|
||||
# we need to pass the next url by session
|
||||
|
@ -727,6 +727,11 @@ class User(Base, ModelMixin, UserMixin, PasswordOracle):
|
||||
|
||||
return True
|
||||
|
||||
def is_active(self) -> bool:
|
||||
if self.delete_on is None:
|
||||
return True
|
||||
return self.delete_on < arrow.now()
|
||||
|
||||
def in_trial(self):
|
||||
"""return True if user does not have lifetime licence or an active subscription AND is in trial period"""
|
||||
if self.lifetime_or_active_subscription():
|
||||
@ -828,6 +833,9 @@ class User(Base, ModelMixin, UserMixin, PasswordOracle):
|
||||
Whether user can create a new alias. User can't create a new alias if
|
||||
- has more than 15 aliases in the free plan, *even in the free trial*
|
||||
"""
|
||||
if not self.is_active():
|
||||
return False
|
||||
|
||||
if self.disabled:
|
||||
return False
|
||||
|
||||
|
@ -140,7 +140,7 @@ def authorize():
|
||||
Scope=Scope,
|
||||
)
|
||||
else: # POST - user allows or denies
|
||||
if not current_user.is_authenticated or not current_user.is_active:
|
||||
if not current_user.is_authenticated or not current_user.is_active():
|
||||
LOG.i(
|
||||
"Attempt to validate a OAUth allow request by an unauthenticated user"
|
||||
)
|
||||
|
13
app/cron.py
13
app/cron.py
@ -62,6 +62,8 @@ from app.proton.utils import get_proton_partner
|
||||
from app.utils import sanitize_email
|
||||
from server import create_light_app
|
||||
|
||||
DELETE_GRACE_DAYS = 30
|
||||
|
||||
|
||||
def notify_trial_end():
|
||||
for user in User.filter(
|
||||
@ -1126,14 +1128,19 @@ def notify_hibp():
|
||||
Session.commit()
|
||||
|
||||
|
||||
def clear_users_scheduled_to_be_deleted():
|
||||
def clear_users_scheduled_to_be_deleted(dry_run=False):
|
||||
users = User.filter(
|
||||
and_(User.delete_on.isnot(None), User.delete_on < arrow.now())
|
||||
and_(
|
||||
User.delete_on.isnot(None),
|
||||
User.delete_on <= arrow.now().shift(days=-DELETE_GRACE_DAYS),
|
||||
)
|
||||
).all()
|
||||
for user in users:
|
||||
LOG.i(
|
||||
f"Scheduled deletion of user {user} with scheduled delete on {user.delete_on}"
|
||||
)
|
||||
if dry_run:
|
||||
continue
|
||||
User.delete(user.id)
|
||||
Session.commit()
|
||||
|
||||
@ -1206,4 +1213,4 @@ if __name__ == "__main__":
|
||||
load_unsent_mails_from_fs_and_resend()
|
||||
elif args.job == "delete_scheduled_users":
|
||||
LOG.d("Deleting users scheduled to be deleted")
|
||||
clear_users_scheduled_to_be_deleted()
|
||||
clear_users_scheduled_to_be_deleted(dry_run=True)
|
||||
|
@ -62,7 +62,7 @@ jobs:
|
||||
captureStderr: true
|
||||
|
||||
- name: SimpleLogin delete users scheduled to be deleted
|
||||
command: echo disabled_user_deletion #python /code/cron.py -j delete_scheduled_users
|
||||
command: python /code/cron.py -j delete_scheduled_users
|
||||
shell: /bin/bash
|
||||
schedule: "15 11 * * *"
|
||||
captureStderr: true
|
||||
|
@ -236,15 +236,16 @@ def get_or_create_contact(from_header: str, mail_from: str, alias: Alias) -> Con
|
||||
Session.commit()
|
||||
else:
|
||||
try:
|
||||
contact_email_for_reply = (
|
||||
contact_email if is_valid_email(contact_email) else ""
|
||||
)
|
||||
contact = Contact.create(
|
||||
user_id=alias.user_id,
|
||||
alias_id=alias.id,
|
||||
website_email=contact_email,
|
||||
name=contact_name,
|
||||
mail_from=mail_from,
|
||||
reply_email=generate_reply_email(contact_email, alias)
|
||||
if is_valid_email(contact_email)
|
||||
else NOREPLY,
|
||||
reply_email=generate_reply_email(contact_email_for_reply, alias),
|
||||
automatic_created=True,
|
||||
)
|
||||
if not contact_email:
|
||||
@ -636,6 +637,10 @@ def handle_forward(envelope, msg: Message, rcpt_to: str) -> List[Tuple[bool, str
|
||||
|
||||
user = alias.user
|
||||
|
||||
if not user.is_active():
|
||||
LOG.w(f"User {user} has been soft deleted")
|
||||
return False, status.E502
|
||||
|
||||
if not user.can_send_or_receive():
|
||||
LOG.i(f"User {user} cannot receive emails")
|
||||
if should_ignore_bounce(envelope.mail_from):
|
||||
@ -1055,6 +1060,9 @@ def handle_reply(envelope, msg: Message, rcpt_to: str) -> (bool, str):
|
||||
if not contact:
|
||||
LOG.w(f"No contact with {reply_email} as reverse alias")
|
||||
return False, status.E502
|
||||
if not contact.user.is_active():
|
||||
LOG.w(f"User {contact.user} has been soft deleted")
|
||||
return False, status.E502
|
||||
|
||||
alias = contact.alias
|
||||
alias_address: str = contact.alias.email
|
||||
@ -1921,6 +1929,9 @@ def handle_bounce(envelope, email_log: EmailLog, msg: Message) -> str:
|
||||
contact,
|
||||
alias,
|
||||
)
|
||||
if not email_log.user.is_active():
|
||||
LOG.d(f"User {email_log.user} is not active")
|
||||
return status.E510
|
||||
|
||||
if email_log.is_reply:
|
||||
content_type = msg.get_content_type().lower()
|
||||
@ -1982,6 +1993,9 @@ def send_no_reply_response(mail_from: str, msg: Message):
|
||||
if not mailbox:
|
||||
LOG.d("Unknown sender. Skipping reply from {}".format(NOREPLY))
|
||||
return
|
||||
if not mailbox.user.is_active():
|
||||
LOG.d(f"User {mailbox.user} is soft-deleted. Skipping sending reply response")
|
||||
return
|
||||
send_email_at_most_times(
|
||||
mailbox.user,
|
||||
ALERT_TO_NOREPLY,
|
||||
|
@ -7460,9 +7460,7 @@ villain
|
||||
vindicate
|
||||
vineyard
|
||||
vintage
|
||||
violate
|
||||
violation
|
||||
violator
|
||||
violet
|
||||
violin
|
||||
viper
|
||||
|
53
app/oneshot/replace_noreply_in_cotnacts.py
Normal file
53
app/oneshot/replace_noreply_in_cotnacts.py
Normal file
@ -0,0 +1,53 @@
|
||||
#!/usr/bin/env python3
|
||||
import argparse
|
||||
import time
|
||||
|
||||
|
||||
from app import config
|
||||
from app.email_utils import generate_reply_email
|
||||
from app.email_validation import is_valid_email
|
||||
from app.models import Alias
|
||||
from app.db import Session
|
||||
|
||||
parser = argparse.ArgumentParser(
|
||||
prog=f"Replace {config.NOREPLY}",
|
||||
description=f"Replace {config.NOREPLY} from contacts reply email",
|
||||
)
|
||||
args = parser.parse_args()
|
||||
|
||||
el_query = "SELECT id, alias_id, website_email from contact where id>=:last_id AND reply_email=:reply_email ORDER BY id ASC LIMIT :step"
|
||||
update_query = "UPDATE contact SET reply_email=:reply_email WHERE id=:contact_id "
|
||||
updated = 0
|
||||
start_time = time.time()
|
||||
step = 100
|
||||
last_id = 0
|
||||
print(f"Replacing contacts with reply_email={config.NOREPLY}")
|
||||
while True:
|
||||
rows = Session.execute(
|
||||
el_query, {"last_id": last_id, "reply_email": config.NOREPLY, "step": step}
|
||||
)
|
||||
loop_updated = 0
|
||||
for row in rows:
|
||||
contact_id = row[0]
|
||||
alias_id = row[1]
|
||||
last_id = contact_id
|
||||
website_email = row[2]
|
||||
contact_email_for_reply = website_email if is_valid_email(website_email) else ""
|
||||
alias = Alias.get(alias_id)
|
||||
if alias is None:
|
||||
print(f"CANNOT find alias {alias_id} in database for contact {contact_id}")
|
||||
reply_email = generate_reply_email(contact_email_for_reply, alias)
|
||||
print(
|
||||
f"Replacing contact {contact_id} with {website_email} reply_email for {reply_email}"
|
||||
)
|
||||
Session.execute(
|
||||
update_query, {"contact_id": row[0], "reply_email": reply_email}
|
||||
)
|
||||
Session.commit()
|
||||
updated += 1
|
||||
loop_updated += 1
|
||||
elapsed = time.time() - start_time
|
||||
print(f"\rContact {last_id} done")
|
||||
if loop_updated == 0:
|
||||
break
|
||||
print("")
|
@ -228,6 +228,8 @@ def load_user(alternative_id):
|
||||
sentry_sdk.set_user({"email": user.email, "id": user.id})
|
||||
if user.disabled:
|
||||
return None
|
||||
if not user.is_active():
|
||||
return None
|
||||
|
||||
return user
|
||||
|
||||
|
@ -6,16 +6,27 @@ from tests.utils import create_new_user
|
||||
|
||||
|
||||
def test_unactivated_user_login(flask_client):
|
||||
user = create_new_user()
|
||||
user.activated = False
|
||||
Session.commit()
|
||||
"""
|
||||
Test function for logging in with an unactivated user.
|
||||
|
||||
Steps:
|
||||
1. Creates a new user.
|
||||
2. Sets the user's activated status to False.
|
||||
3. Sends a POST request to the login route with user credentials.
|
||||
4. Checks the response status code and content for expected messages.
|
||||
"""
|
||||
user = create_new_user() # Creating a new user
|
||||
user.activated = False # Setting the user's activated status to False
|
||||
Session.commit() # Committing the session changes
|
||||
|
||||
# Sending a POST request to the login route with user credentials and following redirects
|
||||
r = flask_client.post(
|
||||
url_for("auth.login"),
|
||||
data={"email": user.email, "password": "password"},
|
||||
follow_redirects=True,
|
||||
)
|
||||
|
||||
# Asserting the response status code and content for expected messages
|
||||
assert r.status_code == 200
|
||||
assert (
|
||||
b"Please check your inbox for the activation email. You can also have this email re-sent"
|
||||
@ -24,59 +35,98 @@ def test_unactivated_user_login(flask_client):
|
||||
|
||||
|
||||
def test_non_canonical_login(flask_client):
|
||||
email = f"pre.{random_string(10)}@gmail.com"
|
||||
name = f"NAME-{random_string(10)}"
|
||||
user = create_new_user(email, name)
|
||||
Session.commit()
|
||||
"""
|
||||
Test function for logging in with a non-canonical email.
|
||||
|
||||
Steps:
|
||||
1. Creates a new user with a non-canonical email.
|
||||
2. Sends a POST request to the login route with user credentials.
|
||||
3. Checks the response status code and content for expected messages.
|
||||
4. Checks the canonicalization of the email.
|
||||
5. Logs out the user.
|
||||
6. Sends a POST request to the login route with the canonicalized email.
|
||||
7. Checks the response status code and content for expected messages.
|
||||
"""
|
||||
email = f"pre.{random_string(10)}@gmail.com" # Generating a non-canonical email
|
||||
name = f"NAME-{random_string(10)}" # Generating a random name
|
||||
user = create_new_user(
|
||||
email, name
|
||||
) # Creating a new user with the generated email and name
|
||||
Session.commit() # Committing the session changes
|
||||
|
||||
# Sending a POST request to the login route with user credentials and following redirects
|
||||
r = flask_client.post(
|
||||
url_for("auth.login"),
|
||||
data={"email": user.email, "password": "password"},
|
||||
follow_redirects=True,
|
||||
)
|
||||
|
||||
# Asserting the response status code and content for expected messages
|
||||
assert r.status_code == 200
|
||||
assert name.encode("utf-8") in r.data
|
||||
|
||||
# Canonicalizing the email
|
||||
canonical_email = canonicalize_email(email)
|
||||
assert canonical_email != email
|
||||
assert (
|
||||
canonical_email != email
|
||||
) # Checking if the canonical email is different from the original email
|
||||
|
||||
flask_client.get(url_for("auth.logout"))
|
||||
flask_client.get(url_for("auth.logout")) # Logging out the user
|
||||
|
||||
# Sending a POST request to the login route with the canonicalized email and following redirects
|
||||
r = flask_client.post(
|
||||
url_for("auth.login"),
|
||||
data={"email": canonical_email, "password": "password"},
|
||||
follow_redirects=True,
|
||||
)
|
||||
|
||||
# Asserting the response status code and content for expected messages
|
||||
assert r.status_code == 200
|
||||
assert name.encode("utf-8") not in r.data
|
||||
|
||||
|
||||
def test_canonical_login_with_non_canonical_email(flask_client):
|
||||
suffix = f"{random_string(10)}@gmail.com"
|
||||
canonical_email = f"pre{suffix}"
|
||||
non_canonical_email = f"pre.{suffix}"
|
||||
name = f"NAME-{random_string(10)}"
|
||||
create_new_user(canonical_email, name)
|
||||
Session.commit()
|
||||
"""
|
||||
Test function for logging in with a canonical email and a non-canonical email.
|
||||
|
||||
Steps:
|
||||
1. Generates canonical and non-canonical email addresses.
|
||||
2. Creates a new user with the canonical email.
|
||||
3. Sends a POST request to the login route with the non-canonical email.
|
||||
4. Checks the response status code and content for expected messages.
|
||||
5. Logs out the user.
|
||||
6. Sends a POST request to the login route with the canonical email.
|
||||
7. Checks the response status code and content for expected messages.
|
||||
"""
|
||||
suffix = f"{random_string(10)}@gmail.com" # Generating a random suffix for emails
|
||||
canonical_email = f"pre{suffix}" # Generating a canonical email
|
||||
non_canonical_email = f"pre.{suffix}" # Generating a non-canonical email
|
||||
name = f"NAME-{random_string(10)}" # Generating a random name
|
||||
create_new_user(
|
||||
canonical_email, name
|
||||
) # Creating a new user with the canonical email
|
||||
Session.commit() # Committing the session changes
|
||||
|
||||
# Sending a POST request to the login route with the non-canonical email and following redirects
|
||||
r = flask_client.post(
|
||||
url_for("auth.login"),
|
||||
data={"email": non_canonical_email, "password": "password"},
|
||||
follow_redirects=True,
|
||||
)
|
||||
|
||||
# Asserting the response status code and content for expected messages
|
||||
assert r.status_code == 200
|
||||
assert name.encode("utf-8") in r.data
|
||||
|
||||
flask_client.get(url_for("auth.logout"))
|
||||
flask_client.get(url_for("auth.logout")) # Logging out the user
|
||||
|
||||
# Sending a POST request to the login route with the canonical email and following redirects
|
||||
r = flask_client.post(
|
||||
url_for("auth.login"),
|
||||
data={"email": canonical_email, "password": "password"},
|
||||
follow_redirects=True,
|
||||
)
|
||||
|
||||
# Asserting the response status code and content for expected messages
|
||||
assert r.status_code == 200
|
||||
assert name.encode("utf-8") in r.data
|
||||
|
@ -39,15 +39,17 @@ def test_cleanup_tokens(flask_client):
|
||||
|
||||
def test_cleanup_users():
|
||||
u_delete_none_id = create_new_user().id
|
||||
u_delete_after = create_new_user()
|
||||
u_delete_after_id = u_delete_after.id
|
||||
u_delete_before = create_new_user()
|
||||
u_delete_before_id = u_delete_before.id
|
||||
u_delete_grace_has_expired = create_new_user()
|
||||
u_delete_grace_has_expired_id = u_delete_grace_has_expired.id
|
||||
u_delete_grace_has_not_expired = create_new_user()
|
||||
u_delete_grace_has_not_expired_id = u_delete_grace_has_not_expired.id
|
||||
now = arrow.now()
|
||||
u_delete_after.delete_on = now.shift(minutes=1)
|
||||
u_delete_before.delete_on = now.shift(minutes=-1)
|
||||
u_delete_grace_has_expired.delete_on = now.shift(days=-(cron.DELETE_GRACE_DAYS + 1))
|
||||
u_delete_grace_has_not_expired.delete_on = now.shift(
|
||||
days=-(cron.DELETE_GRACE_DAYS - 1)
|
||||
)
|
||||
Session.flush()
|
||||
cron.clear_users_scheduled_to_be_deleted()
|
||||
assert User.get(u_delete_none_id) is not None
|
||||
assert User.get(u_delete_after_id) is not None
|
||||
assert User.get(u_delete_before_id) is None
|
||||
assert User.get(u_delete_grace_has_not_expired_id) is not None
|
||||
assert User.get(u_delete_grace_has_expired_id) is None
|
||||
|
Reference in New Issue
Block a user