2020-02-02 16:17:04 +01:00
|
|
|
import argparse
|
2021-05-18 21:18:07 +02:00
|
|
|
import asyncio
|
2021-05-13 22:44:16 +02:00
|
|
|
import urllib.parse
|
2021-03-23 10:02:14 +01:00
|
|
|
from typing import List, Tuple
|
2020-02-02 16:17:04 +01:00
|
|
|
|
create BaseForm to enable CSRF
register page
redirect user to dashboard if they are logged in
enable csrf for login page
Set models more strict
bootstrap developer page
add helper method to ModelMixin, remove CRUDMixin
display list of clients on developer index, add copy client-secret to clipboard using clipboardjs
add toastr and use jquery non slim
display a toast when user copies the client-secret
create new client, generate client-id using unidecode
client detail page: can edit client
add delete client
implement /oauth/authorize and /oauth/allow-deny
implement /oauth/token
add /oauth/user_info endpoint
handle scopes: wip
take into account scope: display scope, return user data according to scope
create virtual-domain, gen email, client_user model WIP
create authorize_nonlogin_user page
user can choose to generate a new email
no need to interfere with root logger
log for before and after request
if user has already allowed a client: generate a auth-code and redirect user to client
get_user_info takes into account gen email
display list of clients that have user has authorised
use yk-client domain instead of localhost as cookie depends on the domain name
use wtforms instead of flask_wtf
Dockerfile
delete virtual domain
EMAIL_DOMAIN can come from env var
bind to host 0.0.0.0
fix signup error: use session as default csrf_context
rename yourkey to simplelogin
add python-dotenv, ipython, sqlalchemy_utils
create DB_URI, FLASK_SECRET. Load config from CONFIG file if exist
add shortcuts to logging
create shell
add psycopg2
do not add local data in Dockerfile
add drop_db into shell
add shell.prepare_db()
fix prepare_db
setup sentry
copy assets from tabler/dist
add icon downloaded from https://commons.wikimedia.org/wiki/File:Simpleicons_Interface_key-tool-1.svg
integrate tabler - login and register page
add favicon
template: default, header. Use gravatar for user avatar url
use default template for dashboard, developer page
use another icon
add clipboard and notie
prettify dashboard
add notie css
add fake gen email and client-user
prettify list client page, use notie for toast
add email, name scope to new client
display client scope in client list
prettify new-client, client-detail
add sentry-sdk and blinker
add arrow, add dt jinja filter, prettify logout, dashboard
comment "last used" in dashboard for now
prettify date display
add copy email to clipboard to dashboard
use "users" as table name for User as "user" is reserved key in postgres
call prepare_db() when creating new db
error page 400, 401, 403, 404
prettify authorize_login_user
create already_authorize.html for user who has already authorized a client
user can generate new email
display all other generated emails
add ENV variable, only reset DB when ENV=local
fix: not return other users gen emails
display nb users for each client
refactor shell: remove prepare_db()
add sendgrid
add /favicon.ico route
add new config: URL, SUPPORT_EMAIL, SENDGRID_API_KEY
user needs to activate their account before login
create copy button on dashboard
client can have multiple redirect uris, in client detail can add/remove redirect-uri,
use redirect_uri passed in /authorize
refactor: move get_user_info into ClientUser model
dashboard: display all apps, all generated emails
add "id" into user_info
add trigger email button
invalidate the session at each new version by changing the secret
centralize Client creation into Client.create_new
user can enable/disable email forwarding
setup auto dismiss alert: just add .alert-auto-dismiss
move name down in register form
add shell.add_real_data
move blueprint template to its own package
prettify authorize page for non-authenticated user
update readme, return error if not redirect_uri
add flask-wtf, use psycopg2-binary
use flask-wtf FlaskForm instead of Form
rename email -> email_utils
add AWS_REGION, BUCKET, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY to config
add s3 module
add File model, add Client.icon_id
handle client icon update
can create client with icon
display client icon in client list page
add Client.home_url
take into account Client.home_url
add boto3
register: ask name first
only show "trigger test email" if email forwarding is enabled
display gen email in alphabetical order, client in client.name alphabetical order
better error page
the modal does not get close when user clicks outside of modal
add Client.published column
discover page that displays all published Client
add missing bootstrap.bundle.min.js.map
developer can publish/unpublish their app in discover
use notie for display flash message
create hotmail account
fix missing jquery
add footer, add global jinja2 variable
strengthen model: use nullable=False whenever possible,
rename client_id to oauth_client_id, client_secret to oauth_client_secret
add flask-migrate
init migrate
1st migrate version
fix rename client_id -> oauth_client_id
prettify UI
use flask_migrate.upgrade() instead of db.create_all()
make sure requirejs.config is called for all page
enable sentry for js, use uppercase for global jinja2 variables
add flask-admin
add User.is_admin column
setup flask admin, only accessible to admin user
fix migration: add server_default
replace session[redirect_after_login] by "next" request args
add pyproject.toml: ignore migrations/ in black
add register waiting_activation_email page
better email wording
add pytest
add get_host_name_and_scheme and tests
example fail test
fix test
fix client-id display
add flask-cors
/user_info supports cors, add /me as /user_info synonym
return client in /me
support implicit flow
no need to use with "app.app_context()"
add watchtower to requirement
add param ENABLE_CLOUDWATCH, CLOUDWATCH_LOG_GROUP, CLOUDWATCH_LOG_STREAM
add cloudwatch logger if cloudwatch is enabled
add 500 error page
add help text for list of used client
display list of app/website that an email has been used
click on client name brings to client detail page
create style.css to add additional style, append its url with the current sha1 to avoid cache
POC on how to send email using postfix
add sqlalchemy-utils
use arrow instead of datetime
add new params STRIPE_API, STRIPE_YEARLY_SKU, STRIPE_MONTHLY_PLAN
show full error in local
add plan, plan_expiration to User, need to create enum directly in migration script, cf https://github.com/sqlalchemy/alembic/issues/67
reformat all html files: use space instead of tab
new user will have trial plan for 15 days
add new param MAX_NB_EMAIL_FREE_PLAN
only user with enough quota can create new email
if user cannot create new gen email, pick randomly one from existing gen emails. Use flush instead of commit
rename STRIPE_YEARLY_SKU -> STRIPE_YEARLY_PLAN
open client page in discover in a new tab
add stripe
not logging /static call: disable flask logging, replace by after_request
add param STRIPE_SECRET_KEY
add 3 columns stripe_customer_id, stripe_card_token, stripe_subscription_id
user can upgrade their pricing
add setting page as coming-soon
add GenEmail, ClientUser to admin
ignore /admin/static logging
add more fake data
add ondelete="cascade" whenever possible
rename plan_expiration -> trial_expiration
reset migration: delete old migrations, create new one
rename test_send_email -> poc_send_email to avoid the file being called by pytest
add new param LYRA_ANALYTICS_ID, add lyra analytics
add how to create new migration into readme
add drift to base.html
notify admin when new user signs up or pays subscription
log exception in case of 500
use sendgrid to notify admin
add alias /userinfo to user_info endpoint
add change_password to shell
add info on how payment is handled
invite user to retry if card not working
remove drift and add "contact us" link
move poc_send_email into poc/
support getting client-id, client-secret from form-data in addition to basic auth
client-id, client-secret is passed in form-data by passport-oauth2 for ex
add jwtRS256 private and public key
add jwk-jws-jwt poc
add new param OPENID_PRIVATE_KEY_PATH, OPENID_PRIVATE_KEY_PATH
add scope, redirect_url to AuthorizationCode and OauthToken
take into scope when creating oauth-token, authorization-code
add jwcrypto
add jose_utils: make_id_token and verify_id_token
add &scope to redirect uri
add "email_verified": True into user_info
fix user not activated
add /oauth2 as alias for /oauth
handle case where scope and state are empty
remove threaded=False
Use Email Alias as wording
remove help text
user can re-send activation email
add "expired" into ActivationCode
Handle the case activation code is expired
reformat: use form.validate_on_submit instead of request.method == post && form.validate
use error text instead of flash()
display client oauth-id and oauth-secret on client detail page
not display oauth-secret on client listing
fix expiration check
improve page title, footer
add /jwks and /.well-known/openid-configuration
init properly tests, fix blueprint conflict bug in flask-admin
create oauth_models module
rename Scope -> ScopeE to distinguish with Scope DB model
set app.url_map.strict_slashes = False
use ScopeE instead of SCOPE_NAME, ...
support access_token passed as args in /userinfo
merge /allow-deny into /authorize
improve wording
take into account the case response_type=code and openid is in scope
take into account response_type=id_token, id_token token, id_token code
make sure to use in-memory db in test
fix scope can be null
allow cross_origin for /.well-known/openid-configuration and /jwks
fix footer link
center authorize form
rename trial_expiration to plan_expiration
move stripe init to create_app()
use real email to be able to receive email notification
add user.profile_picture_id column
use user profile picture and fallback to gravatar
use nguyenkims+local@gm to distinguish with staging
handle plan cancel, reactivation, user profile update
fix can_create_new_email
create cron.py that set plan to free when expired
add crontab.yml
add yacron
use notify_admin instead of LOG.error
add ResetPasswordCode model
user can change password in setting
increase display time for notie
add forgot_password page
If login error: redirect to this page upon success login.
hide discover tab
add column user.is_developer
only show developer menu to developer
comment out the publish button
set local user to developer
make sure only developer can access /developer blueprint
User is invited to upgrade if they are in free plan or their trial ends soon
not sending email when in local mode
create Partner model
create become partner page
use normal error handling on local
fix migration
add "import sqlalchemy_utils" into migration template
small refactoring on setting page
handle promo code. TODO: add migration file
add migration for user.promo_codes
move email alias on top of apps in dashboard
add introjs
move encode_url to utils
create GenEmail.create_new_gen_email
create a first alias mail to show user how to use when they login
show intro when user visits the website the first time
fix register
2019-07-02 09:20:12 +02:00
|
|
|
import arrow
|
2021-05-13 22:44:16 +02:00
|
|
|
import requests
|
2024-03-15 10:13:06 +01:00
|
|
|
from sqlalchemy import func, desc, or_, and_
|
2022-01-06 18:30:46 +01:00
|
|
|
from sqlalchemy.ext.compiler import compiles
|
2021-07-29 09:35:00 +02:00
|
|
|
from sqlalchemy.orm import joinedload
|
2021-12-28 10:21:26 +01:00
|
|
|
from sqlalchemy.orm.exc import ObjectDeletedError
|
2023-10-02 10:50:02 +02:00
|
|
|
from sqlalchemy.sql import Insert, text
|
create BaseForm to enable CSRF
register page
redirect user to dashboard if they are logged in
enable csrf for login page
Set models more strict
bootstrap developer page
add helper method to ModelMixin, remove CRUDMixin
display list of clients on developer index, add copy client-secret to clipboard using clipboardjs
add toastr and use jquery non slim
display a toast when user copies the client-secret
create new client, generate client-id using unidecode
client detail page: can edit client
add delete client
implement /oauth/authorize and /oauth/allow-deny
implement /oauth/token
add /oauth/user_info endpoint
handle scopes: wip
take into account scope: display scope, return user data according to scope
create virtual-domain, gen email, client_user model WIP
create authorize_nonlogin_user page
user can choose to generate a new email
no need to interfere with root logger
log for before and after request
if user has already allowed a client: generate a auth-code and redirect user to client
get_user_info takes into account gen email
display list of clients that have user has authorised
use yk-client domain instead of localhost as cookie depends on the domain name
use wtforms instead of flask_wtf
Dockerfile
delete virtual domain
EMAIL_DOMAIN can come from env var
bind to host 0.0.0.0
fix signup error: use session as default csrf_context
rename yourkey to simplelogin
add python-dotenv, ipython, sqlalchemy_utils
create DB_URI, FLASK_SECRET. Load config from CONFIG file if exist
add shortcuts to logging
create shell
add psycopg2
do not add local data in Dockerfile
add drop_db into shell
add shell.prepare_db()
fix prepare_db
setup sentry
copy assets from tabler/dist
add icon downloaded from https://commons.wikimedia.org/wiki/File:Simpleicons_Interface_key-tool-1.svg
integrate tabler - login and register page
add favicon
template: default, header. Use gravatar for user avatar url
use default template for dashboard, developer page
use another icon
add clipboard and notie
prettify dashboard
add notie css
add fake gen email and client-user
prettify list client page, use notie for toast
add email, name scope to new client
display client scope in client list
prettify new-client, client-detail
add sentry-sdk and blinker
add arrow, add dt jinja filter, prettify logout, dashboard
comment "last used" in dashboard for now
prettify date display
add copy email to clipboard to dashboard
use "users" as table name for User as "user" is reserved key in postgres
call prepare_db() when creating new db
error page 400, 401, 403, 404
prettify authorize_login_user
create already_authorize.html for user who has already authorized a client
user can generate new email
display all other generated emails
add ENV variable, only reset DB when ENV=local
fix: not return other users gen emails
display nb users for each client
refactor shell: remove prepare_db()
add sendgrid
add /favicon.ico route
add new config: URL, SUPPORT_EMAIL, SENDGRID_API_KEY
user needs to activate their account before login
create copy button on dashboard
client can have multiple redirect uris, in client detail can add/remove redirect-uri,
use redirect_uri passed in /authorize
refactor: move get_user_info into ClientUser model
dashboard: display all apps, all generated emails
add "id" into user_info
add trigger email button
invalidate the session at each new version by changing the secret
centralize Client creation into Client.create_new
user can enable/disable email forwarding
setup auto dismiss alert: just add .alert-auto-dismiss
move name down in register form
add shell.add_real_data
move blueprint template to its own package
prettify authorize page for non-authenticated user
update readme, return error if not redirect_uri
add flask-wtf, use psycopg2-binary
use flask-wtf FlaskForm instead of Form
rename email -> email_utils
add AWS_REGION, BUCKET, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY to config
add s3 module
add File model, add Client.icon_id
handle client icon update
can create client with icon
display client icon in client list page
add Client.home_url
take into account Client.home_url
add boto3
register: ask name first
only show "trigger test email" if email forwarding is enabled
display gen email in alphabetical order, client in client.name alphabetical order
better error page
the modal does not get close when user clicks outside of modal
add Client.published column
discover page that displays all published Client
add missing bootstrap.bundle.min.js.map
developer can publish/unpublish their app in discover
use notie for display flash message
create hotmail account
fix missing jquery
add footer, add global jinja2 variable
strengthen model: use nullable=False whenever possible,
rename client_id to oauth_client_id, client_secret to oauth_client_secret
add flask-migrate
init migrate
1st migrate version
fix rename client_id -> oauth_client_id
prettify UI
use flask_migrate.upgrade() instead of db.create_all()
make sure requirejs.config is called for all page
enable sentry for js, use uppercase for global jinja2 variables
add flask-admin
add User.is_admin column
setup flask admin, only accessible to admin user
fix migration: add server_default
replace session[redirect_after_login] by "next" request args
add pyproject.toml: ignore migrations/ in black
add register waiting_activation_email page
better email wording
add pytest
add get_host_name_and_scheme and tests
example fail test
fix test
fix client-id display
add flask-cors
/user_info supports cors, add /me as /user_info synonym
return client in /me
support implicit flow
no need to use with "app.app_context()"
add watchtower to requirement
add param ENABLE_CLOUDWATCH, CLOUDWATCH_LOG_GROUP, CLOUDWATCH_LOG_STREAM
add cloudwatch logger if cloudwatch is enabled
add 500 error page
add help text for list of used client
display list of app/website that an email has been used
click on client name brings to client detail page
create style.css to add additional style, append its url with the current sha1 to avoid cache
POC on how to send email using postfix
add sqlalchemy-utils
use arrow instead of datetime
add new params STRIPE_API, STRIPE_YEARLY_SKU, STRIPE_MONTHLY_PLAN
show full error in local
add plan, plan_expiration to User, need to create enum directly in migration script, cf https://github.com/sqlalchemy/alembic/issues/67
reformat all html files: use space instead of tab
new user will have trial plan for 15 days
add new param MAX_NB_EMAIL_FREE_PLAN
only user with enough quota can create new email
if user cannot create new gen email, pick randomly one from existing gen emails. Use flush instead of commit
rename STRIPE_YEARLY_SKU -> STRIPE_YEARLY_PLAN
open client page in discover in a new tab
add stripe
not logging /static call: disable flask logging, replace by after_request
add param STRIPE_SECRET_KEY
add 3 columns stripe_customer_id, stripe_card_token, stripe_subscription_id
user can upgrade their pricing
add setting page as coming-soon
add GenEmail, ClientUser to admin
ignore /admin/static logging
add more fake data
add ondelete="cascade" whenever possible
rename plan_expiration -> trial_expiration
reset migration: delete old migrations, create new one
rename test_send_email -> poc_send_email to avoid the file being called by pytest
add new param LYRA_ANALYTICS_ID, add lyra analytics
add how to create new migration into readme
add drift to base.html
notify admin when new user signs up or pays subscription
log exception in case of 500
use sendgrid to notify admin
add alias /userinfo to user_info endpoint
add change_password to shell
add info on how payment is handled
invite user to retry if card not working
remove drift and add "contact us" link
move poc_send_email into poc/
support getting client-id, client-secret from form-data in addition to basic auth
client-id, client-secret is passed in form-data by passport-oauth2 for ex
add jwtRS256 private and public key
add jwk-jws-jwt poc
add new param OPENID_PRIVATE_KEY_PATH, OPENID_PRIVATE_KEY_PATH
add scope, redirect_url to AuthorizationCode and OauthToken
take into scope when creating oauth-token, authorization-code
add jwcrypto
add jose_utils: make_id_token and verify_id_token
add &scope to redirect uri
add "email_verified": True into user_info
fix user not activated
add /oauth2 as alias for /oauth
handle case where scope and state are empty
remove threaded=False
Use Email Alias as wording
remove help text
user can re-send activation email
add "expired" into ActivationCode
Handle the case activation code is expired
reformat: use form.validate_on_submit instead of request.method == post && form.validate
use error text instead of flash()
display client oauth-id and oauth-secret on client detail page
not display oauth-secret on client listing
fix expiration check
improve page title, footer
add /jwks and /.well-known/openid-configuration
init properly tests, fix blueprint conflict bug in flask-admin
create oauth_models module
rename Scope -> ScopeE to distinguish with Scope DB model
set app.url_map.strict_slashes = False
use ScopeE instead of SCOPE_NAME, ...
support access_token passed as args in /userinfo
merge /allow-deny into /authorize
improve wording
take into account the case response_type=code and openid is in scope
take into account response_type=id_token, id_token token, id_token code
make sure to use in-memory db in test
fix scope can be null
allow cross_origin for /.well-known/openid-configuration and /jwks
fix footer link
center authorize form
rename trial_expiration to plan_expiration
move stripe init to create_app()
use real email to be able to receive email notification
add user.profile_picture_id column
use user profile picture and fallback to gravatar
use nguyenkims+local@gm to distinguish with staging
handle plan cancel, reactivation, user profile update
fix can_create_new_email
create cron.py that set plan to free when expired
add crontab.yml
add yacron
use notify_admin instead of LOG.error
add ResetPasswordCode model
user can change password in setting
increase display time for notie
add forgot_password page
If login error: redirect to this page upon success login.
hide discover tab
add column user.is_developer
only show developer menu to developer
comment out the publish button
set local user to developer
make sure only developer can access /developer blueprint
User is invited to upgrade if they are in free plan or their trial ends soon
not sending email when in local mode
create Partner model
create become partner page
use normal error handling on local
fix migration
add "import sqlalchemy_utils" into migration template
small refactoring on setting page
handle promo code. TODO: add migration file
add migration for user.promo_codes
move email alias on top of apps in dashboard
add introjs
move encode_url to utils
create GenEmail.create_new_gen_email
create a first alias mail to show user how to use when they login
show intro when user visits the website the first time
fix register
2019-07-02 09:20:12 +02:00
|
|
|
|
2022-11-02 15:51:14 +01:00
|
|
|
from app import s3, config
|
2020-08-30 19:59:39 +02:00
|
|
|
from app.alias_utils import nb_email_log_for_mailbox
|
2020-04-19 11:18:27 +02:00
|
|
|
from app.api.views.apple import verify_receipt
|
2021-10-12 14:36:47 +02:00
|
|
|
from app.db import Session
|
2021-11-23 14:31:53 +01:00
|
|
|
from app.dns_utils import get_mx_domains, is_mx_equivalent
|
2020-06-09 17:12:34 +02:00
|
|
|
from app.email_utils import (
|
|
|
|
send_email,
|
|
|
|
send_trial_end_soon_email,
|
|
|
|
render,
|
2020-10-15 16:21:31 +02:00
|
|
|
email_can_be_used_as_mailbox,
|
2020-08-31 17:36:27 +02:00
|
|
|
send_email_with_rate_control,
|
2021-04-12 20:20:55 +02:00
|
|
|
get_email_domain_part,
|
2020-06-09 17:12:34 +02:00
|
|
|
)
|
2023-08-03 10:20:25 +02:00
|
|
|
from app.email_validation import is_valid_email, normalize_reply_email
|
2022-07-04 11:40:29 +02:00
|
|
|
from app.errors import ProtonPartnerNotSetUp
|
create BaseForm to enable CSRF
register page
redirect user to dashboard if they are logged in
enable csrf for login page
Set models more strict
bootstrap developer page
add helper method to ModelMixin, remove CRUDMixin
display list of clients on developer index, add copy client-secret to clipboard using clipboardjs
add toastr and use jquery non slim
display a toast when user copies the client-secret
create new client, generate client-id using unidecode
client detail page: can edit client
add delete client
implement /oauth/authorize and /oauth/allow-deny
implement /oauth/token
add /oauth/user_info endpoint
handle scopes: wip
take into account scope: display scope, return user data according to scope
create virtual-domain, gen email, client_user model WIP
create authorize_nonlogin_user page
user can choose to generate a new email
no need to interfere with root logger
log for before and after request
if user has already allowed a client: generate a auth-code and redirect user to client
get_user_info takes into account gen email
display list of clients that have user has authorised
use yk-client domain instead of localhost as cookie depends on the domain name
use wtforms instead of flask_wtf
Dockerfile
delete virtual domain
EMAIL_DOMAIN can come from env var
bind to host 0.0.0.0
fix signup error: use session as default csrf_context
rename yourkey to simplelogin
add python-dotenv, ipython, sqlalchemy_utils
create DB_URI, FLASK_SECRET. Load config from CONFIG file if exist
add shortcuts to logging
create shell
add psycopg2
do not add local data in Dockerfile
add drop_db into shell
add shell.prepare_db()
fix prepare_db
setup sentry
copy assets from tabler/dist
add icon downloaded from https://commons.wikimedia.org/wiki/File:Simpleicons_Interface_key-tool-1.svg
integrate tabler - login and register page
add favicon
template: default, header. Use gravatar for user avatar url
use default template for dashboard, developer page
use another icon
add clipboard and notie
prettify dashboard
add notie css
add fake gen email and client-user
prettify list client page, use notie for toast
add email, name scope to new client
display client scope in client list
prettify new-client, client-detail
add sentry-sdk and blinker
add arrow, add dt jinja filter, prettify logout, dashboard
comment "last used" in dashboard for now
prettify date display
add copy email to clipboard to dashboard
use "users" as table name for User as "user" is reserved key in postgres
call prepare_db() when creating new db
error page 400, 401, 403, 404
prettify authorize_login_user
create already_authorize.html for user who has already authorized a client
user can generate new email
display all other generated emails
add ENV variable, only reset DB when ENV=local
fix: not return other users gen emails
display nb users for each client
refactor shell: remove prepare_db()
add sendgrid
add /favicon.ico route
add new config: URL, SUPPORT_EMAIL, SENDGRID_API_KEY
user needs to activate their account before login
create copy button on dashboard
client can have multiple redirect uris, in client detail can add/remove redirect-uri,
use redirect_uri passed in /authorize
refactor: move get_user_info into ClientUser model
dashboard: display all apps, all generated emails
add "id" into user_info
add trigger email button
invalidate the session at each new version by changing the secret
centralize Client creation into Client.create_new
user can enable/disable email forwarding
setup auto dismiss alert: just add .alert-auto-dismiss
move name down in register form
add shell.add_real_data
move blueprint template to its own package
prettify authorize page for non-authenticated user
update readme, return error if not redirect_uri
add flask-wtf, use psycopg2-binary
use flask-wtf FlaskForm instead of Form
rename email -> email_utils
add AWS_REGION, BUCKET, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY to config
add s3 module
add File model, add Client.icon_id
handle client icon update
can create client with icon
display client icon in client list page
add Client.home_url
take into account Client.home_url
add boto3
register: ask name first
only show "trigger test email" if email forwarding is enabled
display gen email in alphabetical order, client in client.name alphabetical order
better error page
the modal does not get close when user clicks outside of modal
add Client.published column
discover page that displays all published Client
add missing bootstrap.bundle.min.js.map
developer can publish/unpublish their app in discover
use notie for display flash message
create hotmail account
fix missing jquery
add footer, add global jinja2 variable
strengthen model: use nullable=False whenever possible,
rename client_id to oauth_client_id, client_secret to oauth_client_secret
add flask-migrate
init migrate
1st migrate version
fix rename client_id -> oauth_client_id
prettify UI
use flask_migrate.upgrade() instead of db.create_all()
make sure requirejs.config is called for all page
enable sentry for js, use uppercase for global jinja2 variables
add flask-admin
add User.is_admin column
setup flask admin, only accessible to admin user
fix migration: add server_default
replace session[redirect_after_login] by "next" request args
add pyproject.toml: ignore migrations/ in black
add register waiting_activation_email page
better email wording
add pytest
add get_host_name_and_scheme and tests
example fail test
fix test
fix client-id display
add flask-cors
/user_info supports cors, add /me as /user_info synonym
return client in /me
support implicit flow
no need to use with "app.app_context()"
add watchtower to requirement
add param ENABLE_CLOUDWATCH, CLOUDWATCH_LOG_GROUP, CLOUDWATCH_LOG_STREAM
add cloudwatch logger if cloudwatch is enabled
add 500 error page
add help text for list of used client
display list of app/website that an email has been used
click on client name brings to client detail page
create style.css to add additional style, append its url with the current sha1 to avoid cache
POC on how to send email using postfix
add sqlalchemy-utils
use arrow instead of datetime
add new params STRIPE_API, STRIPE_YEARLY_SKU, STRIPE_MONTHLY_PLAN
show full error in local
add plan, plan_expiration to User, need to create enum directly in migration script, cf https://github.com/sqlalchemy/alembic/issues/67
reformat all html files: use space instead of tab
new user will have trial plan for 15 days
add new param MAX_NB_EMAIL_FREE_PLAN
only user with enough quota can create new email
if user cannot create new gen email, pick randomly one from existing gen emails. Use flush instead of commit
rename STRIPE_YEARLY_SKU -> STRIPE_YEARLY_PLAN
open client page in discover in a new tab
add stripe
not logging /static call: disable flask logging, replace by after_request
add param STRIPE_SECRET_KEY
add 3 columns stripe_customer_id, stripe_card_token, stripe_subscription_id
user can upgrade their pricing
add setting page as coming-soon
add GenEmail, ClientUser to admin
ignore /admin/static logging
add more fake data
add ondelete="cascade" whenever possible
rename plan_expiration -> trial_expiration
reset migration: delete old migrations, create new one
rename test_send_email -> poc_send_email to avoid the file being called by pytest
add new param LYRA_ANALYTICS_ID, add lyra analytics
add how to create new migration into readme
add drift to base.html
notify admin when new user signs up or pays subscription
log exception in case of 500
use sendgrid to notify admin
add alias /userinfo to user_info endpoint
add change_password to shell
add info on how payment is handled
invite user to retry if card not working
remove drift and add "contact us" link
move poc_send_email into poc/
support getting client-id, client-secret from form-data in addition to basic auth
client-id, client-secret is passed in form-data by passport-oauth2 for ex
add jwtRS256 private and public key
add jwk-jws-jwt poc
add new param OPENID_PRIVATE_KEY_PATH, OPENID_PRIVATE_KEY_PATH
add scope, redirect_url to AuthorizationCode and OauthToken
take into scope when creating oauth-token, authorization-code
add jwcrypto
add jose_utils: make_id_token and verify_id_token
add &scope to redirect uri
add "email_verified": True into user_info
fix user not activated
add /oauth2 as alias for /oauth
handle case where scope and state are empty
remove threaded=False
Use Email Alias as wording
remove help text
user can re-send activation email
add "expired" into ActivationCode
Handle the case activation code is expired
reformat: use form.validate_on_submit instead of request.method == post && form.validate
use error text instead of flash()
display client oauth-id and oauth-secret on client detail page
not display oauth-secret on client listing
fix expiration check
improve page title, footer
add /jwks and /.well-known/openid-configuration
init properly tests, fix blueprint conflict bug in flask-admin
create oauth_models module
rename Scope -> ScopeE to distinguish with Scope DB model
set app.url_map.strict_slashes = False
use ScopeE instead of SCOPE_NAME, ...
support access_token passed as args in /userinfo
merge /allow-deny into /authorize
improve wording
take into account the case response_type=code and openid is in scope
take into account response_type=id_token, id_token token, id_token code
make sure to use in-memory db in test
fix scope can be null
allow cross_origin for /.well-known/openid-configuration and /jwks
fix footer link
center authorize form
rename trial_expiration to plan_expiration
move stripe init to create_app()
use real email to be able to receive email notification
add user.profile_picture_id column
use user profile picture and fallback to gravatar
use nguyenkims+local@gm to distinguish with staging
handle plan cancel, reactivation, user profile update
fix can_create_new_email
create cron.py that set plan to free when expired
add crontab.yml
add yacron
use notify_admin instead of LOG.error
add ResetPasswordCode model
user can change password in setting
increase display time for notie
add forgot_password page
If login error: redirect to this page upon success login.
hide discover tab
add column user.is_developer
only show developer menu to developer
comment out the publish button
set local user to developer
make sure only developer can access /developer blueprint
User is invited to upgrade if they are in free plan or their trial ends soon
not sending email when in local mode
create Partner model
create become partner page
use normal error handling on local
fix migration
add "import sqlalchemy_utils" into migration template
small refactoring on setting page
handle promo code. TODO: add migration file
add migration for user.promo_codes
move email alias on top of apps in dashboard
add introjs
move encode_url to utils
create GenEmail.create_new_gen_email
create a first alias mail to show user how to use when they login
show intro when user visits the website the first time
fix register
2019-07-02 09:20:12 +02:00
|
|
|
from app.log import LOG
|
2022-11-02 15:51:14 +01:00
|
|
|
from app.mail_sender import load_unsent_mails_from_fs_and_resend
|
2019-12-15 08:52:20 +01:00
|
|
|
from app.models import (
|
|
|
|
Subscription,
|
|
|
|
User,
|
2020-03-17 11:51:40 +01:00
|
|
|
Alias,
|
2020-03-17 11:10:50 +01:00
|
|
|
EmailLog,
|
2019-12-15 08:52:20 +01:00
|
|
|
CustomDomain,
|
2019-12-15 08:57:24 +01:00
|
|
|
Client,
|
2020-02-23 11:01:23 +01:00
|
|
|
ManualSubscription,
|
2020-03-15 11:11:16 +01:00
|
|
|
RefusedEmail,
|
2020-04-19 11:18:27 +02:00
|
|
|
AppleSubscription,
|
2020-06-09 17:12:34 +02:00
|
|
|
Mailbox,
|
2020-08-17 14:02:59 +02:00
|
|
|
Monitoring,
|
2020-09-14 18:22:08 +02:00
|
|
|
Contact,
|
2020-12-13 19:18:58 +01:00
|
|
|
CoinbaseSubscription,
|
2021-01-26 09:54:58 +01:00
|
|
|
TransactionalEmail,
|
|
|
|
Bounce,
|
2021-03-23 10:23:40 +01:00
|
|
|
Metric2,
|
2021-04-12 20:20:55 +02:00
|
|
|
SLDomain,
|
|
|
|
DeletedAlias,
|
|
|
|
DomainDeletedAlias,
|
2021-05-14 19:59:32 +02:00
|
|
|
Hibp,
|
2021-07-29 09:55:36 +02:00
|
|
|
HibpNotifiedAlias,
|
2021-11-17 17:43:59 +01:00
|
|
|
Directory,
|
|
|
|
DeletedDirectory,
|
|
|
|
DeletedSubdomain,
|
2022-07-04 11:40:29 +02:00
|
|
|
PartnerSubscription,
|
|
|
|
PartnerUser,
|
2022-08-10 18:48:32 +02:00
|
|
|
ApiToCookieToken,
|
2019-12-15 08:57:24 +01:00
|
|
|
)
|
2022-09-01 15:10:11 +02:00
|
|
|
from app.pgp_utils import load_public_key_and_check, PGPException
|
2022-07-04 11:40:29 +02:00
|
|
|
from app.proton.utils import get_proton_partner
|
2021-03-23 10:50:49 +01:00
|
|
|
from app.utils import sanitize_email
|
2021-10-26 10:52:28 +02:00
|
|
|
from server import create_light_app
|
2024-03-18 16:00:21 +01:00
|
|
|
from tasks.cleanup_old_imports import cleanup_old_imports
|
|
|
|
from tasks.cleanup_old_jobs import cleanup_old_jobs
|
|
|
|
from tasks.cleanup_old_notifications import cleanup_old_notifications
|
create BaseForm to enable CSRF
register page
redirect user to dashboard if they are logged in
enable csrf for login page
Set models more strict
bootstrap developer page
add helper method to ModelMixin, remove CRUDMixin
display list of clients on developer index, add copy client-secret to clipboard using clipboardjs
add toastr and use jquery non slim
display a toast when user copies the client-secret
create new client, generate client-id using unidecode
client detail page: can edit client
add delete client
implement /oauth/authorize and /oauth/allow-deny
implement /oauth/token
add /oauth/user_info endpoint
handle scopes: wip
take into account scope: display scope, return user data according to scope
create virtual-domain, gen email, client_user model WIP
create authorize_nonlogin_user page
user can choose to generate a new email
no need to interfere with root logger
log for before and after request
if user has already allowed a client: generate a auth-code and redirect user to client
get_user_info takes into account gen email
display list of clients that have user has authorised
use yk-client domain instead of localhost as cookie depends on the domain name
use wtforms instead of flask_wtf
Dockerfile
delete virtual domain
EMAIL_DOMAIN can come from env var
bind to host 0.0.0.0
fix signup error: use session as default csrf_context
rename yourkey to simplelogin
add python-dotenv, ipython, sqlalchemy_utils
create DB_URI, FLASK_SECRET. Load config from CONFIG file if exist
add shortcuts to logging
create shell
add psycopg2
do not add local data in Dockerfile
add drop_db into shell
add shell.prepare_db()
fix prepare_db
setup sentry
copy assets from tabler/dist
add icon downloaded from https://commons.wikimedia.org/wiki/File:Simpleicons_Interface_key-tool-1.svg
integrate tabler - login and register page
add favicon
template: default, header. Use gravatar for user avatar url
use default template for dashboard, developer page
use another icon
add clipboard and notie
prettify dashboard
add notie css
add fake gen email and client-user
prettify list client page, use notie for toast
add email, name scope to new client
display client scope in client list
prettify new-client, client-detail
add sentry-sdk and blinker
add arrow, add dt jinja filter, prettify logout, dashboard
comment "last used" in dashboard for now
prettify date display
add copy email to clipboard to dashboard
use "users" as table name for User as "user" is reserved key in postgres
call prepare_db() when creating new db
error page 400, 401, 403, 404
prettify authorize_login_user
create already_authorize.html for user who has already authorized a client
user can generate new email
display all other generated emails
add ENV variable, only reset DB when ENV=local
fix: not return other users gen emails
display nb users for each client
refactor shell: remove prepare_db()
add sendgrid
add /favicon.ico route
add new config: URL, SUPPORT_EMAIL, SENDGRID_API_KEY
user needs to activate their account before login
create copy button on dashboard
client can have multiple redirect uris, in client detail can add/remove redirect-uri,
use redirect_uri passed in /authorize
refactor: move get_user_info into ClientUser model
dashboard: display all apps, all generated emails
add "id" into user_info
add trigger email button
invalidate the session at each new version by changing the secret
centralize Client creation into Client.create_new
user can enable/disable email forwarding
setup auto dismiss alert: just add .alert-auto-dismiss
move name down in register form
add shell.add_real_data
move blueprint template to its own package
prettify authorize page for non-authenticated user
update readme, return error if not redirect_uri
add flask-wtf, use psycopg2-binary
use flask-wtf FlaskForm instead of Form
rename email -> email_utils
add AWS_REGION, BUCKET, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY to config
add s3 module
add File model, add Client.icon_id
handle client icon update
can create client with icon
display client icon in client list page
add Client.home_url
take into account Client.home_url
add boto3
register: ask name first
only show "trigger test email" if email forwarding is enabled
display gen email in alphabetical order, client in client.name alphabetical order
better error page
the modal does not get close when user clicks outside of modal
add Client.published column
discover page that displays all published Client
add missing bootstrap.bundle.min.js.map
developer can publish/unpublish their app in discover
use notie for display flash message
create hotmail account
fix missing jquery
add footer, add global jinja2 variable
strengthen model: use nullable=False whenever possible,
rename client_id to oauth_client_id, client_secret to oauth_client_secret
add flask-migrate
init migrate
1st migrate version
fix rename client_id -> oauth_client_id
prettify UI
use flask_migrate.upgrade() instead of db.create_all()
make sure requirejs.config is called for all page
enable sentry for js, use uppercase for global jinja2 variables
add flask-admin
add User.is_admin column
setup flask admin, only accessible to admin user
fix migration: add server_default
replace session[redirect_after_login] by "next" request args
add pyproject.toml: ignore migrations/ in black
add register waiting_activation_email page
better email wording
add pytest
add get_host_name_and_scheme and tests
example fail test
fix test
fix client-id display
add flask-cors
/user_info supports cors, add /me as /user_info synonym
return client in /me
support implicit flow
no need to use with "app.app_context()"
add watchtower to requirement
add param ENABLE_CLOUDWATCH, CLOUDWATCH_LOG_GROUP, CLOUDWATCH_LOG_STREAM
add cloudwatch logger if cloudwatch is enabled
add 500 error page
add help text for list of used client
display list of app/website that an email has been used
click on client name brings to client detail page
create style.css to add additional style, append its url with the current sha1 to avoid cache
POC on how to send email using postfix
add sqlalchemy-utils
use arrow instead of datetime
add new params STRIPE_API, STRIPE_YEARLY_SKU, STRIPE_MONTHLY_PLAN
show full error in local
add plan, plan_expiration to User, need to create enum directly in migration script, cf https://github.com/sqlalchemy/alembic/issues/67
reformat all html files: use space instead of tab
new user will have trial plan for 15 days
add new param MAX_NB_EMAIL_FREE_PLAN
only user with enough quota can create new email
if user cannot create new gen email, pick randomly one from existing gen emails. Use flush instead of commit
rename STRIPE_YEARLY_SKU -> STRIPE_YEARLY_PLAN
open client page in discover in a new tab
add stripe
not logging /static call: disable flask logging, replace by after_request
add param STRIPE_SECRET_KEY
add 3 columns stripe_customer_id, stripe_card_token, stripe_subscription_id
user can upgrade their pricing
add setting page as coming-soon
add GenEmail, ClientUser to admin
ignore /admin/static logging
add more fake data
add ondelete="cascade" whenever possible
rename plan_expiration -> trial_expiration
reset migration: delete old migrations, create new one
rename test_send_email -> poc_send_email to avoid the file being called by pytest
add new param LYRA_ANALYTICS_ID, add lyra analytics
add how to create new migration into readme
add drift to base.html
notify admin when new user signs up or pays subscription
log exception in case of 500
use sendgrid to notify admin
add alias /userinfo to user_info endpoint
add change_password to shell
add info on how payment is handled
invite user to retry if card not working
remove drift and add "contact us" link
move poc_send_email into poc/
support getting client-id, client-secret from form-data in addition to basic auth
client-id, client-secret is passed in form-data by passport-oauth2 for ex
add jwtRS256 private and public key
add jwk-jws-jwt poc
add new param OPENID_PRIVATE_KEY_PATH, OPENID_PRIVATE_KEY_PATH
add scope, redirect_url to AuthorizationCode and OauthToken
take into scope when creating oauth-token, authorization-code
add jwcrypto
add jose_utils: make_id_token and verify_id_token
add &scope to redirect uri
add "email_verified": True into user_info
fix user not activated
add /oauth2 as alias for /oauth
handle case where scope and state are empty
remove threaded=False
Use Email Alias as wording
remove help text
user can re-send activation email
add "expired" into ActivationCode
Handle the case activation code is expired
reformat: use form.validate_on_submit instead of request.method == post && form.validate
use error text instead of flash()
display client oauth-id and oauth-secret on client detail page
not display oauth-secret on client listing
fix expiration check
improve page title, footer
add /jwks and /.well-known/openid-configuration
init properly tests, fix blueprint conflict bug in flask-admin
create oauth_models module
rename Scope -> ScopeE to distinguish with Scope DB model
set app.url_map.strict_slashes = False
use ScopeE instead of SCOPE_NAME, ...
support access_token passed as args in /userinfo
merge /allow-deny into /authorize
improve wording
take into account the case response_type=code and openid is in scope
take into account response_type=id_token, id_token token, id_token code
make sure to use in-memory db in test
fix scope can be null
allow cross_origin for /.well-known/openid-configuration and /jwks
fix footer link
center authorize form
rename trial_expiration to plan_expiration
move stripe init to create_app()
use real email to be able to receive email notification
add user.profile_picture_id column
use user profile picture and fallback to gravatar
use nguyenkims+local@gm to distinguish with staging
handle plan cancel, reactivation, user profile update
fix can_create_new_email
create cron.py that set plan to free when expired
add crontab.yml
add yacron
use notify_admin instead of LOG.error
add ResetPasswordCode model
user can change password in setting
increase display time for notie
add forgot_password page
If login error: redirect to this page upon success login.
hide discover tab
add column user.is_developer
only show developer menu to developer
comment out the publish button
set local user to developer
make sure only developer can access /developer blueprint
User is invited to upgrade if they are in free plan or their trial ends soon
not sending email when in local mode
create Partner model
create become partner page
use normal error handling on local
fix migration
add "import sqlalchemy_utils" into migration template
small refactoring on setting page
handle promo code. TODO: add migration file
add migration for user.promo_codes
move email alias on top of apps in dashboard
add introjs
move encode_url to utils
create GenEmail.create_new_gen_email
create a first alias mail to show user how to use when they login
show intro when user visits the website the first time
fix register
2019-07-02 09:20:12 +02:00
|
|
|
|
2024-02-22 17:38:34 +01:00
|
|
|
DELETE_GRACE_DAYS = 30
|
|
|
|
|
create BaseForm to enable CSRF
register page
redirect user to dashboard if they are logged in
enable csrf for login page
Set models more strict
bootstrap developer page
add helper method to ModelMixin, remove CRUDMixin
display list of clients on developer index, add copy client-secret to clipboard using clipboardjs
add toastr and use jquery non slim
display a toast when user copies the client-secret
create new client, generate client-id using unidecode
client detail page: can edit client
add delete client
implement /oauth/authorize and /oauth/allow-deny
implement /oauth/token
add /oauth/user_info endpoint
handle scopes: wip
take into account scope: display scope, return user data according to scope
create virtual-domain, gen email, client_user model WIP
create authorize_nonlogin_user page
user can choose to generate a new email
no need to interfere with root logger
log for before and after request
if user has already allowed a client: generate a auth-code and redirect user to client
get_user_info takes into account gen email
display list of clients that have user has authorised
use yk-client domain instead of localhost as cookie depends on the domain name
use wtforms instead of flask_wtf
Dockerfile
delete virtual domain
EMAIL_DOMAIN can come from env var
bind to host 0.0.0.0
fix signup error: use session as default csrf_context
rename yourkey to simplelogin
add python-dotenv, ipython, sqlalchemy_utils
create DB_URI, FLASK_SECRET. Load config from CONFIG file if exist
add shortcuts to logging
create shell
add psycopg2
do not add local data in Dockerfile
add drop_db into shell
add shell.prepare_db()
fix prepare_db
setup sentry
copy assets from tabler/dist
add icon downloaded from https://commons.wikimedia.org/wiki/File:Simpleicons_Interface_key-tool-1.svg
integrate tabler - login and register page
add favicon
template: default, header. Use gravatar for user avatar url
use default template for dashboard, developer page
use another icon
add clipboard and notie
prettify dashboard
add notie css
add fake gen email and client-user
prettify list client page, use notie for toast
add email, name scope to new client
display client scope in client list
prettify new-client, client-detail
add sentry-sdk and blinker
add arrow, add dt jinja filter, prettify logout, dashboard
comment "last used" in dashboard for now
prettify date display
add copy email to clipboard to dashboard
use "users" as table name for User as "user" is reserved key in postgres
call prepare_db() when creating new db
error page 400, 401, 403, 404
prettify authorize_login_user
create already_authorize.html for user who has already authorized a client
user can generate new email
display all other generated emails
add ENV variable, only reset DB when ENV=local
fix: not return other users gen emails
display nb users for each client
refactor shell: remove prepare_db()
add sendgrid
add /favicon.ico route
add new config: URL, SUPPORT_EMAIL, SENDGRID_API_KEY
user needs to activate their account before login
create copy button on dashboard
client can have multiple redirect uris, in client detail can add/remove redirect-uri,
use redirect_uri passed in /authorize
refactor: move get_user_info into ClientUser model
dashboard: display all apps, all generated emails
add "id" into user_info
add trigger email button
invalidate the session at each new version by changing the secret
centralize Client creation into Client.create_new
user can enable/disable email forwarding
setup auto dismiss alert: just add .alert-auto-dismiss
move name down in register form
add shell.add_real_data
move blueprint template to its own package
prettify authorize page for non-authenticated user
update readme, return error if not redirect_uri
add flask-wtf, use psycopg2-binary
use flask-wtf FlaskForm instead of Form
rename email -> email_utils
add AWS_REGION, BUCKET, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY to config
add s3 module
add File model, add Client.icon_id
handle client icon update
can create client with icon
display client icon in client list page
add Client.home_url
take into account Client.home_url
add boto3
register: ask name first
only show "trigger test email" if email forwarding is enabled
display gen email in alphabetical order, client in client.name alphabetical order
better error page
the modal does not get close when user clicks outside of modal
add Client.published column
discover page that displays all published Client
add missing bootstrap.bundle.min.js.map
developer can publish/unpublish their app in discover
use notie for display flash message
create hotmail account
fix missing jquery
add footer, add global jinja2 variable
strengthen model: use nullable=False whenever possible,
rename client_id to oauth_client_id, client_secret to oauth_client_secret
add flask-migrate
init migrate
1st migrate version
fix rename client_id -> oauth_client_id
prettify UI
use flask_migrate.upgrade() instead of db.create_all()
make sure requirejs.config is called for all page
enable sentry for js, use uppercase for global jinja2 variables
add flask-admin
add User.is_admin column
setup flask admin, only accessible to admin user
fix migration: add server_default
replace session[redirect_after_login] by "next" request args
add pyproject.toml: ignore migrations/ in black
add register waiting_activation_email page
better email wording
add pytest
add get_host_name_and_scheme and tests
example fail test
fix test
fix client-id display
add flask-cors
/user_info supports cors, add /me as /user_info synonym
return client in /me
support implicit flow
no need to use with "app.app_context()"
add watchtower to requirement
add param ENABLE_CLOUDWATCH, CLOUDWATCH_LOG_GROUP, CLOUDWATCH_LOG_STREAM
add cloudwatch logger if cloudwatch is enabled
add 500 error page
add help text for list of used client
display list of app/website that an email has been used
click on client name brings to client detail page
create style.css to add additional style, append its url with the current sha1 to avoid cache
POC on how to send email using postfix
add sqlalchemy-utils
use arrow instead of datetime
add new params STRIPE_API, STRIPE_YEARLY_SKU, STRIPE_MONTHLY_PLAN
show full error in local
add plan, plan_expiration to User, need to create enum directly in migration script, cf https://github.com/sqlalchemy/alembic/issues/67
reformat all html files: use space instead of tab
new user will have trial plan for 15 days
add new param MAX_NB_EMAIL_FREE_PLAN
only user with enough quota can create new email
if user cannot create new gen email, pick randomly one from existing gen emails. Use flush instead of commit
rename STRIPE_YEARLY_SKU -> STRIPE_YEARLY_PLAN
open client page in discover in a new tab
add stripe
not logging /static call: disable flask logging, replace by after_request
add param STRIPE_SECRET_KEY
add 3 columns stripe_customer_id, stripe_card_token, stripe_subscription_id
user can upgrade their pricing
add setting page as coming-soon
add GenEmail, ClientUser to admin
ignore /admin/static logging
add more fake data
add ondelete="cascade" whenever possible
rename plan_expiration -> trial_expiration
reset migration: delete old migrations, create new one
rename test_send_email -> poc_send_email to avoid the file being called by pytest
add new param LYRA_ANALYTICS_ID, add lyra analytics
add how to create new migration into readme
add drift to base.html
notify admin when new user signs up or pays subscription
log exception in case of 500
use sendgrid to notify admin
add alias /userinfo to user_info endpoint
add change_password to shell
add info on how payment is handled
invite user to retry if card not working
remove drift and add "contact us" link
move poc_send_email into poc/
support getting client-id, client-secret from form-data in addition to basic auth
client-id, client-secret is passed in form-data by passport-oauth2 for ex
add jwtRS256 private and public key
add jwk-jws-jwt poc
add new param OPENID_PRIVATE_KEY_PATH, OPENID_PRIVATE_KEY_PATH
add scope, redirect_url to AuthorizationCode and OauthToken
take into scope when creating oauth-token, authorization-code
add jwcrypto
add jose_utils: make_id_token and verify_id_token
add &scope to redirect uri
add "email_verified": True into user_info
fix user not activated
add /oauth2 as alias for /oauth
handle case where scope and state are empty
remove threaded=False
Use Email Alias as wording
remove help text
user can re-send activation email
add "expired" into ActivationCode
Handle the case activation code is expired
reformat: use form.validate_on_submit instead of request.method == post && form.validate
use error text instead of flash()
display client oauth-id and oauth-secret on client detail page
not display oauth-secret on client listing
fix expiration check
improve page title, footer
add /jwks and /.well-known/openid-configuration
init properly tests, fix blueprint conflict bug in flask-admin
create oauth_models module
rename Scope -> ScopeE to distinguish with Scope DB model
set app.url_map.strict_slashes = False
use ScopeE instead of SCOPE_NAME, ...
support access_token passed as args in /userinfo
merge /allow-deny into /authorize
improve wording
take into account the case response_type=code and openid is in scope
take into account response_type=id_token, id_token token, id_token code
make sure to use in-memory db in test
fix scope can be null
allow cross_origin for /.well-known/openid-configuration and /jwks
fix footer link
center authorize form
rename trial_expiration to plan_expiration
move stripe init to create_app()
use real email to be able to receive email notification
add user.profile_picture_id column
use user profile picture and fallback to gravatar
use nguyenkims+local@gm to distinguish with staging
handle plan cancel, reactivation, user profile update
fix can_create_new_email
create cron.py that set plan to free when expired
add crontab.yml
add yacron
use notify_admin instead of LOG.error
add ResetPasswordCode model
user can change password in setting
increase display time for notie
add forgot_password page
If login error: redirect to this page upon success login.
hide discover tab
add column user.is_developer
only show developer menu to developer
comment out the publish button
set local user to developer
make sure only developer can access /developer blueprint
User is invited to upgrade if they are in free plan or their trial ends soon
not sending email when in local mode
create Partner model
create become partner page
use normal error handling on local
fix migration
add "import sqlalchemy_utils" into migration template
small refactoring on setting page
handle promo code. TODO: add migration file
add migration for user.promo_codes
move email alias on top of apps in dashboard
add introjs
move encode_url to utils
create GenEmail.create_new_gen_email
create a first alias mail to show user how to use when they login
show intro when user visits the website the first time
fix register
2019-07-02 09:20:12 +02:00
|
|
|
|
2020-02-02 16:17:04 +01:00
|
|
|
def notify_trial_end():
|
2021-10-12 14:36:47 +02:00
|
|
|
for user in User.filter(
|
2023-07-31 15:14:13 +02:00
|
|
|
User.activated.is_(True),
|
|
|
|
User.trial_end.isnot(None),
|
|
|
|
User.trial_end >= arrow.now().shift(days=2),
|
|
|
|
User.trial_end < arrow.now().shift(days=3),
|
|
|
|
User.lifetime.is_(False),
|
2020-02-05 15:21:56 +01:00
|
|
|
).all():
|
2021-12-28 10:21:26 +01:00
|
|
|
try:
|
2023-07-31 15:14:13 +02:00
|
|
|
if user.in_trial():
|
2021-12-28 10:21:26 +01:00
|
|
|
LOG.d("Send trial end email to user %s", user)
|
|
|
|
send_trial_end_soon_email(user)
|
|
|
|
# happens if user has been deleted in the meantime
|
|
|
|
except ObjectDeletedError:
|
|
|
|
LOG.i("user has been deleted")
|
2020-01-30 08:19:09 +01:00
|
|
|
|
|
|
|
|
2021-01-26 09:54:58 +01:00
|
|
|
def delete_logs():
|
|
|
|
"""delete everything that are considered logs"""
|
|
|
|
delete_refused_emails()
|
|
|
|
delete_old_monitoring()
|
|
|
|
|
2023-10-02 10:50:02 +02:00
|
|
|
for t_email in TransactionalEmail.filter(
|
2021-01-26 09:54:58 +01:00
|
|
|
TransactionalEmail.created_at < arrow.now().shift(days=-7)
|
|
|
|
):
|
2023-10-02 10:50:02 +02:00
|
|
|
TransactionalEmail.delete(t_email.id)
|
2021-01-26 09:54:58 +01:00
|
|
|
|
2021-10-12 14:36:47 +02:00
|
|
|
for b in Bounce.filter(Bounce.created_at < arrow.now().shift(days=-7)):
|
2021-01-26 09:54:58 +01:00
|
|
|
Bounce.delete(b.id)
|
|
|
|
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.commit()
|
2021-01-26 09:54:58 +01:00
|
|
|
|
2023-10-02 10:50:02 +02:00
|
|
|
LOG.d("Deleting EmailLog older than 2 weeks")
|
2021-07-14 17:15:28 +02:00
|
|
|
|
2023-10-02 10:50:02 +02:00
|
|
|
total_deleted = 0
|
|
|
|
batch_size = 500
|
|
|
|
Session.execute("set session statement_timeout=30000").rowcount
|
|
|
|
queries_done = 0
|
|
|
|
cutoff_time = arrow.now().shift(days=-14)
|
|
|
|
rows_to_delete = EmailLog.filter(EmailLog.created_at < cutoff_time).count()
|
|
|
|
expected_queries = int(rows_to_delete / batch_size)
|
|
|
|
sql = text(
|
2023-11-21 16:42:18 +01:00
|
|
|
"DELETE FROM email_log WHERE id IN (SELECT id FROM email_log WHERE created_at < :cutoff_time order by created_at limit :batch_size)"
|
2023-10-02 10:50:02 +02:00
|
|
|
)
|
|
|
|
str_cutoff_time = cutoff_time.isoformat()
|
|
|
|
while total_deleted < rows_to_delete:
|
|
|
|
deleted_count = Session.execute(
|
|
|
|
sql, {"cutoff_time": str_cutoff_time, "batch_size": batch_size}
|
|
|
|
).rowcount
|
|
|
|
Session.commit()
|
|
|
|
total_deleted += deleted_count
|
|
|
|
queries_done += 1
|
|
|
|
LOG.i(
|
|
|
|
f"[{queries_done}/{expected_queries}] Deleted {total_deleted} EmailLog entries"
|
|
|
|
)
|
|
|
|
if deleted_count < batch_size:
|
|
|
|
break
|
2021-07-14 17:15:28 +02:00
|
|
|
|
2023-10-02 10:50:02 +02:00
|
|
|
LOG.i("Deleted %s email logs", total_deleted)
|
2021-07-14 17:15:28 +02:00
|
|
|
|
2021-01-26 09:54:58 +01:00
|
|
|
|
2020-03-15 11:11:16 +01:00
|
|
|
def delete_refused_emails():
|
2023-07-29 10:03:31 +02:00
|
|
|
for refused_email in (
|
|
|
|
RefusedEmail.filter_by(deleted=False).order_by(RefusedEmail.id).all()
|
|
|
|
):
|
2020-03-15 12:14:43 +01:00
|
|
|
if arrow.now().shift(days=1) > refused_email.delete_at >= arrow.now():
|
2020-03-15 11:11:16 +01:00
|
|
|
LOG.d("Delete refused email %s", refused_email)
|
2020-04-02 18:06:08 +02:00
|
|
|
if refused_email.path:
|
|
|
|
s3.delete(refused_email.path)
|
|
|
|
|
2020-03-15 11:11:16 +01:00
|
|
|
s3.delete(refused_email.full_report_path)
|
|
|
|
|
|
|
|
# do not set path and full_report_path to null
|
|
|
|
# so we can check later that the files are indeed deleted
|
2022-08-18 14:47:05 +02:00
|
|
|
refused_email.delete_at = arrow.now()
|
2020-03-15 11:11:16 +01:00
|
|
|
refused_email.deleted = True
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.commit()
|
2020-03-15 11:11:16 +01:00
|
|
|
|
|
|
|
LOG.d("Finish delete_refused_emails")
|
|
|
|
|
|
|
|
|
2020-03-05 09:35:20 +01:00
|
|
|
def notify_premium_end():
|
|
|
|
"""sent to user who has canceled their subscription and who has their subscription ending soon"""
|
2021-10-12 14:36:47 +02:00
|
|
|
for sub in Subscription.filter_by(cancelled=True).all():
|
2020-03-05 09:35:20 +01:00
|
|
|
if (
|
|
|
|
arrow.now().shift(days=3).date()
|
|
|
|
> sub.next_bill_date
|
|
|
|
>= arrow.now().shift(days=2).date()
|
|
|
|
):
|
|
|
|
user = sub.user
|
2021-09-27 15:51:09 +02:00
|
|
|
|
|
|
|
if user.lifetime:
|
|
|
|
continue
|
|
|
|
|
2020-03-05 09:35:20 +01:00
|
|
|
LOG.d(f"Send subscription ending soon email to user {user}")
|
|
|
|
|
|
|
|
send_email(
|
|
|
|
user.email,
|
2023-11-21 16:42:18 +01:00
|
|
|
"Your subscription will end soon",
|
2020-04-19 10:54:05 +02:00
|
|
|
render(
|
|
|
|
"transactional/subscription-end.txt",
|
|
|
|
user=user,
|
|
|
|
next_bill_date=sub.next_bill_date.strftime("%Y-%m-%d"),
|
|
|
|
),
|
|
|
|
render(
|
|
|
|
"transactional/subscription-end.html",
|
|
|
|
user=user,
|
|
|
|
next_bill_date=sub.next_bill_date.strftime("%Y-%m-%d"),
|
|
|
|
),
|
2021-12-28 16:42:01 +01:00
|
|
|
retries=3,
|
2020-03-05 09:35:20 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-02-23 11:01:23 +01:00
|
|
|
def notify_manual_sub_end():
|
2021-10-12 14:36:47 +02:00
|
|
|
for manual_sub in ManualSubscription.all():
|
2021-10-31 19:03:49 +01:00
|
|
|
manual_sub: ManualSubscription
|
2020-02-23 11:01:23 +01:00
|
|
|
need_reminder = False
|
|
|
|
if arrow.now().shift(days=14) > manual_sub.end_at > arrow.now().shift(days=13):
|
|
|
|
need_reminder = True
|
|
|
|
elif arrow.now().shift(days=4) > manual_sub.end_at > arrow.now().shift(days=3):
|
|
|
|
need_reminder = True
|
|
|
|
|
2021-11-28 12:35:03 +01:00
|
|
|
user = manual_sub.user
|
|
|
|
if user.lifetime:
|
|
|
|
LOG.d("%s has a lifetime licence", user)
|
|
|
|
continue
|
2021-10-31 19:03:49 +01:00
|
|
|
|
2022-06-20 14:34:20 +02:00
|
|
|
paddle_sub: Subscription = user.get_paddle_subscription()
|
2021-12-01 17:18:19 +01:00
|
|
|
if paddle_sub and not paddle_sub.cancelled:
|
|
|
|
LOG.d("%s has an active Paddle subscription", user)
|
|
|
|
continue
|
|
|
|
|
2021-11-28 12:35:03 +01:00
|
|
|
if need_reminder:
|
2021-10-31 19:03:49 +01:00
|
|
|
# user can have a (free) manual subscription but has taken a paid subscription via
|
|
|
|
# Paddle, Coinbase or Apple since then
|
|
|
|
if manual_sub.is_giveaway:
|
2022-06-20 14:34:20 +02:00
|
|
|
if user.get_paddle_subscription():
|
2021-10-31 19:03:49 +01:00
|
|
|
LOG.d("%s has a active Paddle subscription", user)
|
|
|
|
continue
|
|
|
|
|
|
|
|
coinbase_subscription: CoinbaseSubscription = (
|
|
|
|
CoinbaseSubscription.get_by(user_id=user.id)
|
|
|
|
)
|
|
|
|
if coinbase_subscription and coinbase_subscription.is_active():
|
|
|
|
LOG.d("%s has a active Coinbase subscription", user)
|
|
|
|
continue
|
|
|
|
|
|
|
|
apple_sub: AppleSubscription = AppleSubscription.get_by(user_id=user.id)
|
|
|
|
if apple_sub and apple_sub.is_valid():
|
|
|
|
LOG.d("%s has a active Apple subscription", user)
|
|
|
|
continue
|
|
|
|
|
2021-09-08 11:29:55 +02:00
|
|
|
LOG.d("Remind user %s that their manual sub is ending soon", user)
|
2020-02-23 11:01:23 +01:00
|
|
|
send_email(
|
|
|
|
user.email,
|
2023-11-21 16:42:18 +01:00
|
|
|
"Your subscription will end soon",
|
2020-02-23 11:01:23 +01:00
|
|
|
render(
|
|
|
|
"transactional/manual-subscription-end.txt",
|
|
|
|
user=user,
|
|
|
|
manual_sub=manual_sub,
|
|
|
|
),
|
|
|
|
render(
|
|
|
|
"transactional/manual-subscription-end.html",
|
|
|
|
user=user,
|
|
|
|
manual_sub=manual_sub,
|
|
|
|
),
|
2021-12-28 16:42:01 +01:00
|
|
|
retries=3,
|
2020-02-23 11:01:23 +01:00
|
|
|
)
|
|
|
|
|
2022-11-02 15:51:14 +01:00
|
|
|
extend_subscription_url = config.URL + "/dashboard/coinbase_checkout"
|
2021-10-12 14:36:47 +02:00
|
|
|
for coinbase_subscription in CoinbaseSubscription.all():
|
2020-12-13 19:18:58 +01:00
|
|
|
need_reminder = False
|
|
|
|
if (
|
|
|
|
arrow.now().shift(days=14)
|
|
|
|
> coinbase_subscription.end_at
|
|
|
|
> arrow.now().shift(days=13)
|
|
|
|
):
|
|
|
|
need_reminder = True
|
|
|
|
elif (
|
|
|
|
arrow.now().shift(days=4)
|
|
|
|
> coinbase_subscription.end_at
|
|
|
|
> arrow.now().shift(days=3)
|
|
|
|
):
|
|
|
|
need_reminder = True
|
|
|
|
|
|
|
|
if need_reminder:
|
|
|
|
user = coinbase_subscription.user
|
2022-08-30 22:41:08 +02:00
|
|
|
if user.lifetime:
|
|
|
|
continue
|
|
|
|
|
2021-09-08 11:29:55 +02:00
|
|
|
LOG.d(
|
2020-12-13 19:18:58 +01:00
|
|
|
"Remind user %s that their coinbase subscription is ending soon", user
|
|
|
|
)
|
|
|
|
send_email(
|
|
|
|
user.email,
|
2020-12-13 19:41:42 +01:00
|
|
|
"Your SimpleLogin subscription will end soon",
|
2020-12-13 19:18:58 +01:00
|
|
|
render(
|
|
|
|
"transactional/coinbase/reminder-subscription.txt",
|
|
|
|
coinbase_subscription=coinbase_subscription,
|
|
|
|
extend_subscription_url=extend_subscription_url,
|
|
|
|
),
|
|
|
|
render(
|
|
|
|
"transactional/coinbase/reminder-subscription.html",
|
|
|
|
coinbase_subscription=coinbase_subscription,
|
|
|
|
extend_subscription_url=extend_subscription_url,
|
|
|
|
),
|
2021-12-28 16:42:01 +01:00
|
|
|
retries=3,
|
2020-12-13 19:18:58 +01:00
|
|
|
)
|
|
|
|
|
2020-02-23 11:01:23 +01:00
|
|
|
|
2020-04-19 11:18:27 +02:00
|
|
|
def poll_apple_subscription():
|
|
|
|
"""Poll Apple API to update AppleSubscription"""
|
|
|
|
# todo: only near the end of the subscription
|
2021-10-12 14:36:47 +02:00
|
|
|
for apple_sub in AppleSubscription.all():
|
2022-10-25 19:45:53 +02:00
|
|
|
if not apple_sub.product_id:
|
|
|
|
LOG.d("Ignore %s", apple_sub)
|
|
|
|
continue
|
|
|
|
|
2020-04-19 11:18:27 +02:00
|
|
|
user = apple_sub.user
|
2022-10-25 19:45:53 +02:00
|
|
|
if "io.simplelogin.macapp.subscription" in apple_sub.product_id:
|
2022-11-02 15:51:14 +01:00
|
|
|
verify_receipt(apple_sub.receipt_data, user, config.MACAPP_APPLE_API_SECRET)
|
2022-10-25 19:45:53 +02:00
|
|
|
else:
|
2022-11-02 15:51:14 +01:00
|
|
|
verify_receipt(apple_sub.receipt_data, user, config.APPLE_API_SECRET)
|
2020-04-19 11:18:27 +02:00
|
|
|
|
|
|
|
LOG.d("Finish poll_apple_subscription")
|
|
|
|
|
|
|
|
|
2021-03-24 17:39:16 +01:00
|
|
|
def compute_metric2() -> Metric2:
|
|
|
|
now = arrow.now()
|
2021-07-28 18:31:59 +02:00
|
|
|
_24h_ago = now.shift(days=-1)
|
|
|
|
|
2021-03-23 10:50:32 +01:00
|
|
|
nb_referred_user_paid = 0
|
2023-07-31 15:14:13 +02:00
|
|
|
for user in (
|
|
|
|
User.filter(User.referral_id.isnot(None))
|
|
|
|
.yield_per(500)
|
|
|
|
.enable_eagerloads(False)
|
|
|
|
):
|
2021-03-23 10:50:32 +01:00
|
|
|
if user.is_paid():
|
|
|
|
nb_referred_user_paid += 1
|
|
|
|
|
2022-07-04 11:40:29 +02:00
|
|
|
# compute nb_proton_premium, nb_proton_user
|
|
|
|
nb_proton_premium = nb_proton_user = 0
|
|
|
|
try:
|
|
|
|
proton_partner = get_proton_partner()
|
|
|
|
nb_proton_premium = (
|
|
|
|
Session.query(PartnerSubscription, PartnerUser)
|
|
|
|
.filter(
|
|
|
|
PartnerSubscription.partner_user_id == PartnerUser.id,
|
|
|
|
PartnerUser.partner_id == proton_partner.id,
|
|
|
|
PartnerSubscription.end_at > now,
|
|
|
|
)
|
|
|
|
.count()
|
|
|
|
)
|
|
|
|
nb_proton_user = (
|
|
|
|
Session.query(PartnerUser)
|
|
|
|
.filter(
|
|
|
|
PartnerUser.partner_id == proton_partner.id,
|
|
|
|
)
|
|
|
|
.count()
|
|
|
|
)
|
|
|
|
except ProtonPartnerNotSetUp:
|
|
|
|
LOG.d("Proton partner not set up")
|
|
|
|
|
2021-03-23 10:50:32 +01:00
|
|
|
return Metric2.create(
|
|
|
|
date=now,
|
|
|
|
# user stats
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_user=User.count(),
|
|
|
|
nb_activated_user=User.filter_by(activated=True).count(),
|
2022-07-04 11:40:29 +02:00
|
|
|
nb_proton_user=nb_proton_user,
|
2021-03-23 10:50:32 +01:00
|
|
|
# subscription stats
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_premium=Subscription.filter(Subscription.cancelled.is_(False)).count(),
|
|
|
|
nb_cancelled_premium=Subscription.filter(
|
2021-03-23 10:50:32 +01:00
|
|
|
Subscription.cancelled.is_(True)
|
|
|
|
).count(),
|
|
|
|
# todo: filter by expires_date > now
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_apple_premium=AppleSubscription.count(),
|
|
|
|
nb_manual_premium=ManualSubscription.filter(
|
2021-03-23 10:50:32 +01:00
|
|
|
ManualSubscription.end_at > now,
|
|
|
|
ManualSubscription.is_giveaway.is_(False),
|
|
|
|
).count(),
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_coinbase_premium=CoinbaseSubscription.filter(
|
2021-03-23 10:50:32 +01:00
|
|
|
CoinbaseSubscription.end_at > now
|
|
|
|
).count(),
|
2022-07-04 11:40:29 +02:00
|
|
|
nb_proton_premium=nb_proton_premium,
|
2021-03-23 10:50:32 +01:00
|
|
|
# referral stats
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_referred_user=User.filter(User.referral_id.isnot(None)).count(),
|
2021-03-23 10:50:32 +01:00
|
|
|
nb_referred_user_paid=nb_referred_user_paid,
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_alias=Alias.count(),
|
2021-03-23 10:50:32 +01:00
|
|
|
# email log stats
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_forward_last_24h=EmailLog.filter(EmailLog.created_at > _24h_ago)
|
2021-07-28 18:31:59 +02:00
|
|
|
.filter_by(bounced=False, is_spam=False, is_reply=False, blocked=False)
|
|
|
|
.count(),
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_bounced_last_24h=EmailLog.filter(EmailLog.created_at > _24h_ago)
|
2021-07-28 18:31:59 +02:00
|
|
|
.filter_by(bounced=True)
|
|
|
|
.count(),
|
2021-10-15 10:47:07 +02:00
|
|
|
nb_total_bounced_last_24h=Bounce.filter(Bounce.created_at > _24h_ago).count(),
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_reply_last_24h=EmailLog.filter(EmailLog.created_at > _24h_ago)
|
2021-07-28 18:31:59 +02:00
|
|
|
.filter_by(is_reply=True)
|
|
|
|
.count(),
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_block_last_24h=EmailLog.filter(EmailLog.created_at > _24h_ago)
|
2021-07-28 18:31:59 +02:00
|
|
|
.filter_by(blocked=True)
|
|
|
|
.count(),
|
|
|
|
# other stats
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_verified_custom_domain=CustomDomain.filter_by(verified=True).count(),
|
2021-11-17 17:43:59 +01:00
|
|
|
nb_subdomain=CustomDomain.filter_by(is_sl_subdomain=True).count(),
|
|
|
|
nb_directory=Directory.count(),
|
|
|
|
nb_deleted_directory=DeletedDirectory.count(),
|
|
|
|
nb_deleted_subdomain=DeletedSubdomain.count(),
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_app=Client.count(),
|
2021-03-23 10:50:32 +01:00
|
|
|
commit=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-04-23 22:11:43 +02:00
|
|
|
def increase_percent(old, new) -> str:
|
|
|
|
if old == 0:
|
|
|
|
return "N/A"
|
|
|
|
|
2021-07-29 11:32:15 +02:00
|
|
|
if not old or not new:
|
|
|
|
return "N/A"
|
|
|
|
|
2020-04-23 22:11:43 +02:00
|
|
|
increase = (new - old) / old * 100
|
2021-07-29 09:55:36 +02:00
|
|
|
return f"{increase:.1f}%. Delta: {new - old}"
|
2020-04-23 22:11:43 +02:00
|
|
|
|
|
|
|
|
2021-03-23 10:02:14 +01:00
|
|
|
def bounce_report() -> List[Tuple[str, int]]:
|
|
|
|
"""return the accounts that have most bounces, e.g.
|
|
|
|
(email1, 30)
|
|
|
|
(email2, 20)
|
|
|
|
|
|
|
|
Produce this query
|
|
|
|
|
|
|
|
```
|
|
|
|
SELECT
|
|
|
|
count(*) AS c,
|
|
|
|
users.email
|
|
|
|
FROM
|
|
|
|
email_log,
|
|
|
|
users
|
|
|
|
WHERE
|
|
|
|
email_log.user_id = users.id
|
|
|
|
AND email_log.created_at > '2021-3-20'
|
|
|
|
and email_log.bounced = true
|
|
|
|
GROUP BY
|
|
|
|
users.email
|
|
|
|
ORDER BY
|
|
|
|
c DESC;
|
|
|
|
```
|
|
|
|
|
|
|
|
"""
|
|
|
|
min_dt = arrow.now().shift(days=-1)
|
|
|
|
query = (
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.query(User.email, func.count(EmailLog.id).label("count"))
|
2021-03-23 10:02:14 +01:00
|
|
|
.join(EmailLog, EmailLog.user_id == User.id)
|
|
|
|
.filter(EmailLog.bounced, EmailLog.created_at > min_dt)
|
|
|
|
.group_by(User.email)
|
|
|
|
.having(func.count(EmailLog.id) > 5)
|
|
|
|
.order_by(desc("count"))
|
|
|
|
)
|
|
|
|
|
|
|
|
res = []
|
|
|
|
for email, count in query:
|
|
|
|
res.append((email, count))
|
|
|
|
|
|
|
|
return res
|
|
|
|
|
|
|
|
|
2021-10-23 18:40:02 +02:00
|
|
|
def all_bounce_report() -> str:
|
|
|
|
"""
|
|
|
|
Return a report for all mailboxes that have most bounces. Using this query to get mailboxes that have bounces.
|
|
|
|
For each mailbox in the list, return the first bounce info.
|
|
|
|
|
|
|
|
```
|
|
|
|
SELECT
|
|
|
|
email,
|
|
|
|
count(*) AS nb_bounce
|
|
|
|
FROM
|
|
|
|
bounce
|
|
|
|
WHERE
|
|
|
|
created_at > '2021-10-16'
|
|
|
|
GROUP BY
|
|
|
|
email
|
|
|
|
ORDER BY
|
|
|
|
nb_bounce DESC
|
|
|
|
```
|
|
|
|
|
|
|
|
"""
|
2021-10-26 13:03:57 +02:00
|
|
|
res = ""
|
2021-10-23 18:40:02 +02:00
|
|
|
min_dt = arrow.now().shift(days=-1)
|
|
|
|
query = (
|
|
|
|
Session.query(Bounce.email, func.count(Bounce.id).label("nb_bounce"))
|
|
|
|
.filter(Bounce.created_at > min_dt)
|
|
|
|
.group_by(Bounce.email)
|
|
|
|
# not return mailboxes that have too little bounces
|
2021-11-06 12:41:37 +01:00
|
|
|
.having(func.count(Bounce.id) > 3)
|
2021-10-23 18:40:02 +02:00
|
|
|
.order_by(desc("nb_bounce"))
|
|
|
|
)
|
|
|
|
|
|
|
|
for email, count in query:
|
|
|
|
res += f"{email}: {count} bounces. "
|
|
|
|
most_recent: Bounce = (
|
|
|
|
Bounce.filter(Bounce.email == email)
|
|
|
|
.order_by(Bounce.created_at.desc())
|
|
|
|
.first()
|
|
|
|
)
|
2021-12-26 22:25:00 +01:00
|
|
|
# most_recent.info can be very verbose
|
2021-12-28 10:51:43 +01:00
|
|
|
res += f"Most recent cause: \n{most_recent.info[:1000] if most_recent.info else 'N/A'}"
|
2021-11-04 14:28:19 +01:00
|
|
|
res += "\n----\n"
|
2021-10-23 18:40:02 +02:00
|
|
|
|
|
|
|
return res
|
|
|
|
|
|
|
|
|
2021-03-29 10:10:25 +02:00
|
|
|
def alias_creation_report() -> List[Tuple[str, int]]:
|
|
|
|
"""return the accounts that have created most aliases in the last 7 days, e.g.
|
|
|
|
(email1, 2021-3-21, 30)
|
|
|
|
(email2, 2021-3-20, 20)
|
|
|
|
|
|
|
|
Produce this query
|
|
|
|
|
|
|
|
```
|
|
|
|
SELECT
|
|
|
|
count(*) AS c,
|
|
|
|
users.email,
|
|
|
|
date(alias.created_at) AS d
|
|
|
|
FROM
|
|
|
|
alias,
|
|
|
|
users
|
|
|
|
WHERE
|
|
|
|
alias.user_id = users.id
|
|
|
|
AND alias.created_at > '2021-3-22'
|
|
|
|
GROUP BY
|
|
|
|
users.email,
|
|
|
|
d
|
|
|
|
HAVING
|
|
|
|
count(*) > 50
|
|
|
|
ORDER BY
|
|
|
|
c DESC;
|
|
|
|
```
|
|
|
|
|
|
|
|
"""
|
|
|
|
min_dt = arrow.now().shift(days=-7)
|
|
|
|
query = (
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.query(
|
2021-03-29 10:10:25 +02:00
|
|
|
User.email,
|
|
|
|
func.count(Alias.id).label("count"),
|
|
|
|
func.date(Alias.created_at).label("date"),
|
|
|
|
)
|
|
|
|
.join(Alias, Alias.user_id == User.id)
|
|
|
|
.filter(Alias.created_at > min_dt)
|
|
|
|
.group_by(User.email, "date")
|
|
|
|
.having(func.count(Alias.id) > 50)
|
|
|
|
.order_by(desc("count"))
|
|
|
|
)
|
|
|
|
|
|
|
|
res = []
|
|
|
|
for email, count, date in query:
|
|
|
|
res.append((email, count, date))
|
|
|
|
|
|
|
|
return res
|
|
|
|
|
|
|
|
|
2022-02-28 10:13:19 +01:00
|
|
|
def stats():
|
2020-04-23 22:11:43 +02:00
|
|
|
"""send admin stats everyday"""
|
2022-11-02 15:51:14 +01:00
|
|
|
if not config.ADMIN_EMAIL:
|
2022-02-04 15:45:21 +01:00
|
|
|
LOG.w("ADMIN_EMAIL not set, nothing to do")
|
2020-04-23 22:11:43 +02:00
|
|
|
return
|
|
|
|
|
2021-03-24 17:39:16 +01:00
|
|
|
stats_today = compute_metric2()
|
2021-03-24 17:38:17 +01:00
|
|
|
stats_yesterday = (
|
2021-10-12 14:36:47 +02:00
|
|
|
Metric2.filter(Metric2.date < stats_today.date)
|
2021-03-24 17:38:17 +01:00
|
|
|
.order_by(Metric2.date.desc())
|
|
|
|
.first()
|
|
|
|
)
|
2020-04-23 22:11:43 +02:00
|
|
|
|
2019-11-24 19:42:29 +01:00
|
|
|
today = arrow.now().format()
|
|
|
|
|
2022-02-28 10:13:19 +01:00
|
|
|
growth_stats = f"""
|
2022-02-04 15:45:21 +01:00
|
|
|
Growth Stats for {today}
|
2021-10-26 12:48:01 +02:00
|
|
|
|
|
|
|
nb_user: {stats_today.nb_user} - {increase_percent(stats_yesterday.nb_user, stats_today.nb_user)}
|
2022-07-05 18:00:28 +02:00
|
|
|
nb_proton_user: {stats_today.nb_proton_user} - {increase_percent(stats_yesterday.nb_proton_user, stats_today.nb_proton_user)}
|
2021-10-26 12:48:01 +02:00
|
|
|
nb_premium: {stats_today.nb_premium} - {increase_percent(stats_yesterday.nb_premium, stats_today.nb_premium)}
|
|
|
|
nb_cancelled_premium: {stats_today.nb_cancelled_premium} - {increase_percent(stats_yesterday.nb_cancelled_premium, stats_today.nb_cancelled_premium)}
|
|
|
|
nb_apple_premium: {stats_today.nb_apple_premium} - {increase_percent(stats_yesterday.nb_apple_premium, stats_today.nb_apple_premium)}
|
|
|
|
nb_manual_premium: {stats_today.nb_manual_premium} - {increase_percent(stats_yesterday.nb_manual_premium, stats_today.nb_manual_premium)}
|
|
|
|
nb_coinbase_premium: {stats_today.nb_coinbase_premium} - {increase_percent(stats_yesterday.nb_coinbase_premium, stats_today.nb_coinbase_premium)}
|
2022-07-05 18:00:28 +02:00
|
|
|
nb_proton_premium: {stats_today.nb_proton_premium} - {increase_percent(stats_yesterday.nb_proton_premium, stats_today.nb_proton_premium)}
|
2021-10-26 12:48:01 +02:00
|
|
|
nb_alias: {stats_today.nb_alias} - {increase_percent(stats_yesterday.nb_alias, stats_today.nb_alias)}
|
|
|
|
|
|
|
|
nb_forward_last_24h: {stats_today.nb_forward_last_24h} - {increase_percent(stats_yesterday.nb_forward_last_24h, stats_today.nb_forward_last_24h)}
|
|
|
|
nb_reply_last_24h: {stats_today.nb_reply_last_24h} - {increase_percent(stats_yesterday.nb_reply_last_24h, stats_today.nb_reply_last_24h)}
|
|
|
|
nb_block_last_24h: {stats_today.nb_block_last_24h} - {increase_percent(stats_yesterday.nb_block_last_24h, stats_today.nb_block_last_24h)}
|
|
|
|
nb_bounced_last_24h: {stats_today.nb_bounced_last_24h} - {increase_percent(stats_yesterday.nb_bounced_last_24h, stats_today.nb_bounced_last_24h)}
|
|
|
|
|
|
|
|
nb_custom_domain: {stats_today.nb_verified_custom_domain} - {increase_percent(stats_yesterday.nb_verified_custom_domain, stats_today.nb_verified_custom_domain)}
|
2021-11-17 17:43:59 +01:00
|
|
|
nb_subdomain: {stats_today.nb_subdomain} - {increase_percent(stats_yesterday.nb_subdomain, stats_today.nb_subdomain)}
|
|
|
|
nb_directory: {stats_today.nb_directory} - {increase_percent(stats_yesterday.nb_directory, stats_today.nb_directory)}
|
|
|
|
nb_deleted_directory: {stats_today.nb_deleted_directory} - {increase_percent(stats_yesterday.nb_deleted_directory, stats_today.nb_deleted_directory)}
|
|
|
|
nb_deleted_subdomain: {stats_today.nb_deleted_subdomain} - {increase_percent(stats_yesterday.nb_deleted_subdomain, stats_today.nb_deleted_subdomain)}
|
|
|
|
|
2021-10-26 12:48:01 +02:00
|
|
|
nb_app: {stats_today.nb_app} - {increase_percent(stats_yesterday.nb_app, stats_today.nb_app)}
|
|
|
|
nb_referred_user: {stats_today.nb_referred_user} - {increase_percent(stats_yesterday.nb_referred_user, stats_today.nb_referred_user)}
|
|
|
|
nb_referred_user_upgrade: {stats_today.nb_referred_user_paid} - {increase_percent(stats_yesterday.nb_referred_user_paid, stats_today.nb_referred_user_paid)}
|
2021-03-23 09:47:57 +01:00
|
|
|
"""
|
|
|
|
|
2022-02-28 10:13:19 +01:00
|
|
|
LOG.d("growth_stats email: %s", growth_stats)
|
2022-02-04 15:45:21 +01:00
|
|
|
|
|
|
|
send_email(
|
2022-11-02 15:51:14 +01:00
|
|
|
config.ADMIN_EMAIL,
|
2022-02-04 15:45:21 +01:00
|
|
|
subject=f"SimpleLogin Growth Stats for {today}",
|
2022-02-28 10:13:19 +01:00
|
|
|
plaintext=growth_stats,
|
2022-02-04 15:45:21 +01:00
|
|
|
retries=3,
|
|
|
|
)
|
|
|
|
|
2022-02-28 10:13:19 +01:00
|
|
|
monitoring_report = f"""
|
2022-02-04 15:45:21 +01:00
|
|
|
Monitoring Stats for {today}
|
|
|
|
|
|
|
|
nb_alias: {stats_today.nb_alias} - {increase_percent(stats_yesterday.nb_alias, stats_today.nb_alias)}
|
|
|
|
|
|
|
|
nb_forward_last_24h: {stats_today.nb_forward_last_24h} - {increase_percent(stats_yesterday.nb_forward_last_24h, stats_today.nb_forward_last_24h)}
|
|
|
|
nb_reply_last_24h: {stats_today.nb_reply_last_24h} - {increase_percent(stats_yesterday.nb_reply_last_24h, stats_today.nb_reply_last_24h)}
|
|
|
|
nb_block_last_24h: {stats_today.nb_block_last_24h} - {increase_percent(stats_yesterday.nb_block_last_24h, stats_today.nb_block_last_24h)}
|
|
|
|
nb_bounced_last_24h: {stats_today.nb_bounced_last_24h} - {increase_percent(stats_yesterday.nb_bounced_last_24h, stats_today.nb_bounced_last_24h)}
|
|
|
|
nb_total_bounced_last_24h: {stats_today.nb_total_bounced_last_24h} - {increase_percent(stats_yesterday.nb_total_bounced_last_24h, stats_today.nb_total_bounced_last_24h)}
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
2022-02-28 10:13:19 +01:00
|
|
|
monitoring_report += "\n====================================\n"
|
2023-11-21 16:42:18 +01:00
|
|
|
monitoring_report += """
|
2021-11-04 14:28:19 +01:00
|
|
|
# Account bounce report:
|
|
|
|
"""
|
|
|
|
|
|
|
|
for email, bounces in bounce_report():
|
2022-02-28 10:13:19 +01:00
|
|
|
monitoring_report += f"{email}: {bounces}\n"
|
2021-11-04 14:28:19 +01:00
|
|
|
|
2023-11-21 16:42:18 +01:00
|
|
|
monitoring_report += """\n
|
2021-11-04 14:28:19 +01:00
|
|
|
# Alias creation report:
|
|
|
|
"""
|
|
|
|
|
|
|
|
for email, nb_alias, date in alias_creation_report():
|
2022-02-28 10:13:19 +01:00
|
|
|
monitoring_report += f"{email}, {date}: {nb_alias}\n"
|
2021-11-04 14:28:19 +01:00
|
|
|
|
2023-11-21 16:42:18 +01:00
|
|
|
monitoring_report += """\n
|
2021-11-04 14:28:19 +01:00
|
|
|
# Full bounce detail report:
|
|
|
|
"""
|
2022-02-28 10:13:19 +01:00
|
|
|
monitoring_report += all_bounce_report()
|
2021-10-24 10:39:47 +02:00
|
|
|
|
2022-02-28 10:13:19 +01:00
|
|
|
LOG.d("monitoring_report email: %s", monitoring_report)
|
2021-03-23 10:50:32 +01:00
|
|
|
|
2021-03-23 09:47:57 +01:00
|
|
|
send_email(
|
2022-11-02 15:51:14 +01:00
|
|
|
config.MONITORING_EMAIL,
|
2022-02-04 15:45:21 +01:00
|
|
|
subject=f"SimpleLogin Monitoring Report for {today}",
|
2022-02-28 10:13:19 +01:00
|
|
|
plaintext=monitoring_report,
|
2021-12-28 16:42:01 +01:00
|
|
|
retries=3,
|
2019-11-24 19:42:29 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-04-12 20:20:55 +02:00
|
|
|
def migrate_domain_trash():
|
|
|
|
"""Move aliases from global trash to domain trash if applicable"""
|
2022-01-06 18:30:46 +01:00
|
|
|
|
|
|
|
# ignore duplicate when insert
|
|
|
|
# copied from https://github.com/sqlalchemy/sqlalchemy/issues/5374
|
|
|
|
@compiles(Insert, "postgresql")
|
|
|
|
def postgresql_on_conflict_do_nothing(insert, compiler, **kw):
|
|
|
|
statement = compiler.visit_insert(insert, **kw)
|
|
|
|
# IF we have a "RETURNING" clause, we must insert before it
|
|
|
|
returning_position = statement.find("RETURNING")
|
|
|
|
if returning_position >= 0:
|
|
|
|
return (
|
|
|
|
statement[:returning_position]
|
|
|
|
+ "ON CONFLICT DO NOTHING "
|
|
|
|
+ statement[returning_position:]
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
return statement + " ON CONFLICT DO NOTHING"
|
|
|
|
|
|
|
|
sl_domains = [sl.domain for sl in SLDomain.all()]
|
|
|
|
count = 0
|
|
|
|
domain_deleted_aliases = []
|
|
|
|
deleted_alias_ids = []
|
2022-01-06 18:52:14 +01:00
|
|
|
for deleted_alias in DeletedAlias.yield_per_query():
|
2022-01-06 18:30:46 +01:00
|
|
|
if count % 1000 == 0:
|
|
|
|
LOG.d("process %s", count)
|
|
|
|
|
|
|
|
count += 1
|
|
|
|
|
2021-04-12 20:20:55 +02:00
|
|
|
alias_domain = get_email_domain_part(deleted_alias.email)
|
2022-01-06 18:30:46 +01:00
|
|
|
if alias_domain not in sl_domains:
|
2021-04-12 20:20:55 +02:00
|
|
|
custom_domain = CustomDomain.get_by(domain=alias_domain)
|
|
|
|
if custom_domain:
|
2022-01-06 15:36:43 +01:00
|
|
|
LOG.w("move %s to domain %s trash", deleted_alias, custom_domain)
|
2022-01-06 18:30:46 +01:00
|
|
|
domain_deleted_aliases.append(
|
2021-04-12 20:20:55 +02:00
|
|
|
DomainDeletedAlias(
|
|
|
|
user_id=custom_domain.user_id,
|
|
|
|
email=deleted_alias.email,
|
|
|
|
domain_id=custom_domain.id,
|
|
|
|
created_at=deleted_alias.created_at,
|
|
|
|
)
|
|
|
|
)
|
2022-01-06 18:30:46 +01:00
|
|
|
deleted_alias_ids.append(deleted_alias.id)
|
2021-04-12 20:20:55 +02:00
|
|
|
|
2022-01-06 18:30:46 +01:00
|
|
|
LOG.d("create %s DomainDeletedAlias", len(domain_deleted_aliases))
|
|
|
|
Session.bulk_save_objects(domain_deleted_aliases)
|
|
|
|
|
|
|
|
LOG.d("delete %s DeletedAlias", len(deleted_alias_ids))
|
|
|
|
DeletedAlias.filter(DeletedAlias.id.in_(deleted_alias_ids)).delete(
|
|
|
|
synchronize_session=False
|
|
|
|
)
|
|
|
|
|
|
|
|
Session.commit()
|
2021-04-12 20:20:55 +02:00
|
|
|
|
|
|
|
|
|
|
|
def set_custom_domain_for_alias():
|
|
|
|
"""Go through all aliases and make sure custom_domain is correctly set"""
|
2021-10-12 14:36:47 +02:00
|
|
|
sl_domains = [sl_domain.domain for sl_domain in SLDomain.all()]
|
2022-01-06 18:52:14 +01:00
|
|
|
for alias in Alias.yield_per_query().filter(Alias.custom_domain_id.is_(None)):
|
2021-04-12 20:20:55 +02:00
|
|
|
if (
|
|
|
|
not any(alias.email.endswith(f"@{sl_domain}") for sl_domain in sl_domains)
|
|
|
|
and not alias.custom_domain_id
|
|
|
|
):
|
|
|
|
alias_domain = get_email_domain_part(alias.email)
|
|
|
|
custom_domain = CustomDomain.get_by(domain=alias_domain)
|
|
|
|
if custom_domain:
|
2021-09-08 11:29:55 +02:00
|
|
|
LOG.e("set %s for %s", custom_domain, alias)
|
2021-04-12 20:20:55 +02:00
|
|
|
alias.custom_domain_id = custom_domain.id
|
|
|
|
else: # phantom domain
|
|
|
|
LOG.d("phantom domain %s %s %s", alias.user, alias, alias.enabled)
|
|
|
|
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.commit()
|
2021-04-12 20:20:55 +02:00
|
|
|
|
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
def sanitize_alias_address_name():
|
|
|
|
count = 0
|
|
|
|
# using Alias.all() will take all the memory
|
|
|
|
for alias in Alias.yield_per_query():
|
|
|
|
if count % 1000 == 0:
|
|
|
|
LOG.d("process %s", count)
|
2022-01-06 15:13:59 +01:00
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
count += 1
|
2022-01-06 15:13:59 +01:00
|
|
|
if sanitize_email(alias.email) != alias.email:
|
|
|
|
LOG.e("Alias %s email not sanitized", alias)
|
|
|
|
|
|
|
|
if alias.name and "\n" in alias.name:
|
|
|
|
alias.name = alias.name.replace("\n", "")
|
|
|
|
Session.commit()
|
|
|
|
LOG.e("Alias %s name contains linebreak %s", alias, alias.name)
|
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
|
|
|
|
def sanity_check():
|
|
|
|
LOG.d("sanitize user email")
|
|
|
|
for user in User.filter_by(activated=True).all():
|
|
|
|
if sanitize_email(user.email) != user.email:
|
|
|
|
LOG.e("%s does not have sanitized email", user)
|
|
|
|
|
|
|
|
LOG.d("sanitize alias address & name")
|
|
|
|
sanitize_alias_address_name()
|
|
|
|
|
|
|
|
LOG.d("sanity contact address")
|
2022-01-06 15:13:59 +01:00
|
|
|
contact_email_sanity_date = arrow.get("2021-01-12")
|
2022-01-06 18:52:14 +01:00
|
|
|
for contact in Contact.yield_per_query():
|
2022-01-06 15:13:59 +01:00
|
|
|
if sanitize_email(contact.reply_email) != contact.reply_email:
|
|
|
|
LOG.e("Contact %s reply-email not sanitized", contact)
|
|
|
|
|
|
|
|
if (
|
|
|
|
sanitize_email(contact.website_email, not_lower=True)
|
|
|
|
!= contact.website_email
|
|
|
|
and contact.created_at > contact_email_sanity_date
|
|
|
|
):
|
|
|
|
LOG.e("Contact %s website-email not sanitized", contact)
|
|
|
|
|
|
|
|
if not contact.invalid_email and not is_valid_email(contact.website_email):
|
|
|
|
LOG.e("%s invalid email", contact)
|
|
|
|
contact.invalid_email = True
|
2022-01-06 18:52:14 +01:00
|
|
|
Session.commit()
|
2022-01-06 15:13:59 +01:00
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
LOG.d("sanitize mailbox address")
|
|
|
|
for mailbox in Mailbox.yield_per_query():
|
2022-01-06 15:13:59 +01:00
|
|
|
if sanitize_email(mailbox.email) != mailbox.email:
|
|
|
|
LOG.e("Mailbox %s address not sanitized", mailbox)
|
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
LOG.d("normalize reverse alias")
|
|
|
|
for contact in Contact.yield_per_query():
|
2022-01-06 15:13:59 +01:00
|
|
|
if normalize_reply_email(contact.reply_email) != contact.reply_email:
|
|
|
|
LOG.e(
|
|
|
|
"Contact %s reply email is not normalized %s",
|
|
|
|
contact,
|
|
|
|
contact.reply_email,
|
|
|
|
)
|
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
LOG.d("clean domain name")
|
|
|
|
for domain in CustomDomain.yield_per_query():
|
2022-01-06 15:13:59 +01:00
|
|
|
if domain.name and "\n" in domain.name:
|
|
|
|
LOG.e("Domain %s name contain linebreak %s", domain, domain.name)
|
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
LOG.d("migrate domain trash if needed")
|
2022-01-06 15:13:59 +01:00
|
|
|
migrate_domain_trash()
|
2022-01-06 18:52:14 +01:00
|
|
|
|
|
|
|
LOG.d("fix custom domain for alias")
|
2022-01-06 15:13:59 +01:00
|
|
|
set_custom_domain_for_alias()
|
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
LOG.d("check mailbox valid domain")
|
2022-01-06 15:13:59 +01:00
|
|
|
check_mailbox_valid_domain()
|
|
|
|
|
2022-09-01 15:10:11 +02:00
|
|
|
LOG.d("check mailbox valid PGP keys")
|
|
|
|
check_mailbox_valid_pgp_keys()
|
|
|
|
|
2022-01-06 18:52:14 +01:00
|
|
|
LOG.d(
|
|
|
|
"""check if there's an email that starts with "\u200f" (right-to-left mark (RLM))"""
|
|
|
|
)
|
|
|
|
for contact in (
|
|
|
|
Contact.yield_per_query()
|
|
|
|
.filter(Contact.website_email.startswith("\u200f"))
|
|
|
|
.all()
|
|
|
|
):
|
2022-01-06 15:13:59 +01:00
|
|
|
contact.website_email = contact.website_email.replace("\u200f", "")
|
|
|
|
LOG.e("remove right-to-left mark (RLM) from %s", contact)
|
|
|
|
Session.commit()
|
|
|
|
|
|
|
|
LOG.d("Finish sanity check")
|
|
|
|
|
|
|
|
|
|
|
|
def check_mailbox_valid_domain():
|
|
|
|
"""detect if there's mailbox that's using an invalid domain"""
|
2020-10-12 13:28:21 +02:00
|
|
|
mailbox_ids = (
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.query(Mailbox.id)
|
2020-12-06 13:36:32 +01:00
|
|
|
.filter(Mailbox.verified.is_(True), Mailbox.disabled.is_(False))
|
2020-10-12 13:28:21 +02:00
|
|
|
.all()
|
|
|
|
)
|
2020-09-25 10:06:50 +02:00
|
|
|
mailbox_ids = [e[0] for e in mailbox_ids]
|
|
|
|
# iterate over id instead of mailbox directly
|
2022-09-01 15:10:11 +02:00
|
|
|
# as a mailbox can be deleted in the meantime
|
2020-09-25 10:06:50 +02:00
|
|
|
for mailbox_id in mailbox_ids:
|
|
|
|
mailbox = Mailbox.get(mailbox_id)
|
|
|
|
# a mailbox has been deleted
|
|
|
|
if not mailbox:
|
|
|
|
continue
|
|
|
|
|
2022-01-10 15:05:15 +01:00
|
|
|
if email_can_be_used_as_mailbox(mailbox.email):
|
|
|
|
LOG.d("Mailbox %s valid", mailbox)
|
|
|
|
mailbox.nb_failed_checks = 0
|
|
|
|
else:
|
2020-06-28 11:18:06 +02:00
|
|
|
mailbox.nb_failed_checks += 1
|
2020-08-30 19:59:39 +02:00
|
|
|
nb_email_log = nb_email_log_for_mailbox(mailbox)
|
2020-10-12 13:28:21 +02:00
|
|
|
|
2022-01-10 15:05:15 +01:00
|
|
|
LOG.w(
|
|
|
|
"issue with mailbox %s domain. #alias %s, nb email log %s",
|
|
|
|
mailbox,
|
|
|
|
mailbox.nb_alias(),
|
|
|
|
nb_email_log,
|
|
|
|
)
|
|
|
|
|
2020-10-12 13:28:21 +02:00
|
|
|
# send a warning
|
|
|
|
if mailbox.nb_failed_checks == 5:
|
|
|
|
if mailbox.user.email != mailbox.email:
|
|
|
|
send_email(
|
|
|
|
mailbox.user.email,
|
|
|
|
f"Mailbox {mailbox.email} is disabled",
|
|
|
|
render(
|
2021-11-02 11:40:02 +01:00
|
|
|
"transactional/disable-mailbox-warning.txt.jinja2",
|
|
|
|
mailbox=mailbox,
|
2020-10-12 13:28:21 +02:00
|
|
|
),
|
|
|
|
render(
|
|
|
|
"transactional/disable-mailbox-warning.html",
|
|
|
|
mailbox=mailbox,
|
|
|
|
),
|
2021-12-28 16:42:01 +01:00
|
|
|
retries=3,
|
2020-10-12 13:28:21 +02:00
|
|
|
)
|
2020-08-30 19:59:39 +02:00
|
|
|
|
|
|
|
# alert if too much fail and nb_email_log > 100
|
|
|
|
if mailbox.nb_failed_checks > 10 and nb_email_log > 100:
|
2020-10-12 13:28:21 +02:00
|
|
|
mailbox.disabled = True
|
|
|
|
|
|
|
|
if mailbox.user.email != mailbox.email:
|
|
|
|
send_email(
|
|
|
|
mailbox.user.email,
|
|
|
|
f"Mailbox {mailbox.email} is disabled",
|
2021-11-02 11:41:01 +01:00
|
|
|
render(
|
|
|
|
"transactional/disable-mailbox.txt.jinja2", mailbox=mailbox
|
|
|
|
),
|
2020-10-12 13:28:21 +02:00
|
|
|
render("transactional/disable-mailbox.html", mailbox=mailbox),
|
2021-12-28 16:42:01 +01:00
|
|
|
retries=3,
|
2020-10-12 13:28:21 +02:00
|
|
|
)
|
2020-06-28 11:18:06 +02:00
|
|
|
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.commit()
|
2020-06-09 17:12:34 +02:00
|
|
|
|
|
|
|
|
2022-09-01 15:10:11 +02:00
|
|
|
def check_mailbox_valid_pgp_keys():
|
|
|
|
mailbox_ids = (
|
|
|
|
Session.query(Mailbox.id)
|
|
|
|
.filter(
|
|
|
|
Mailbox.verified.is_(True),
|
|
|
|
Mailbox.pgp_public_key.isnot(None),
|
|
|
|
Mailbox.disable_pgp.is_(False),
|
|
|
|
)
|
|
|
|
.all()
|
|
|
|
)
|
|
|
|
mailbox_ids = [e[0] for e in mailbox_ids]
|
|
|
|
# iterate over id instead of mailbox directly
|
|
|
|
# as a mailbox can be deleted in the meantime
|
|
|
|
for mailbox_id in mailbox_ids:
|
|
|
|
mailbox = Mailbox.get(mailbox_id)
|
|
|
|
# a mailbox has been deleted
|
|
|
|
if not mailbox:
|
2022-09-02 11:47:04 +02:00
|
|
|
LOG.d(f"Mailbox {mailbox_id} not found")
|
2022-09-01 15:10:11 +02:00
|
|
|
continue
|
|
|
|
|
2022-09-02 11:47:04 +02:00
|
|
|
LOG.d(f"Checking PGP key for {mailbox}")
|
|
|
|
|
2022-09-01 15:10:11 +02:00
|
|
|
try:
|
|
|
|
load_public_key_and_check(mailbox.pgp_public_key)
|
|
|
|
except PGPException:
|
|
|
|
LOG.i(f"{mailbox} PGP key invalid")
|
|
|
|
send_email(
|
|
|
|
mailbox.user.email,
|
|
|
|
f"Mailbox {mailbox.email}'s PGP Key is invalid",
|
|
|
|
render(
|
|
|
|
"transactional/invalid-mailbox-pgp-key.txt.jinja2",
|
|
|
|
mailbox=mailbox,
|
|
|
|
),
|
|
|
|
retries=3,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-08-29 19:05:32 +02:00
|
|
|
def check_custom_domain():
|
|
|
|
LOG.d("Check verified domain for DNS issues")
|
|
|
|
|
2021-10-12 14:36:47 +02:00
|
|
|
for custom_domain in CustomDomain.filter_by(verified=True): # type: CustomDomain
|
2022-01-03 10:07:41 +01:00
|
|
|
try:
|
|
|
|
check_single_custom_domain(custom_domain)
|
|
|
|
except ObjectDeletedError:
|
|
|
|
LOG.i("custom domain has been deleted")
|
2022-01-03 10:06:56 +01:00
|
|
|
|
|
|
|
|
|
|
|
def check_single_custom_domain(custom_domain):
|
|
|
|
mx_domains = get_mx_domains(custom_domain.domain)
|
2022-11-02 15:51:14 +01:00
|
|
|
if not is_mx_equivalent(mx_domains, config.EMAIL_SERVERS_WITH_PRIORITY):
|
2022-01-03 10:06:56 +01:00
|
|
|
user = custom_domain.user
|
|
|
|
LOG.w(
|
|
|
|
"The MX record is not correctly set for %s %s %s",
|
|
|
|
custom_domain,
|
|
|
|
user,
|
|
|
|
mx_domains,
|
|
|
|
)
|
2020-08-29 19:05:32 +02:00
|
|
|
|
2022-01-03 10:06:56 +01:00
|
|
|
custom_domain.nb_failed_checks += 1
|
|
|
|
|
|
|
|
# send alert if fail for 5 consecutive days
|
|
|
|
if custom_domain.nb_failed_checks > 5:
|
2022-11-02 15:51:14 +01:00
|
|
|
domain_dns_url = f"{config.URL}/dashboard/domains/{custom_domain.id}/dns"
|
2022-01-03 10:06:56 +01:00
|
|
|
LOG.w("Alert domain MX check fails %s about %s", user, custom_domain)
|
|
|
|
send_email_with_rate_control(
|
2020-08-29 19:05:32 +02:00
|
|
|
user,
|
2022-11-02 15:51:14 +01:00
|
|
|
config.AlERT_WRONG_MX_RECORD_CUSTOM_DOMAIN,
|
2022-01-03 10:06:56 +01:00
|
|
|
user.email,
|
|
|
|
f"Please update {custom_domain.domain} DNS on SimpleLogin",
|
|
|
|
render(
|
|
|
|
"transactional/custom-domain-dns-issue.txt.jinja2",
|
|
|
|
custom_domain=custom_domain,
|
|
|
|
domain_dns_url=domain_dns_url,
|
|
|
|
),
|
|
|
|
max_nb_alert=1,
|
|
|
|
nb_day=30,
|
|
|
|
retries=3,
|
2020-08-29 19:05:32 +02:00
|
|
|
)
|
2020-10-20 16:51:25 +02:00
|
|
|
# reset checks
|
|
|
|
custom_domain.nb_failed_checks = 0
|
2022-01-03 10:06:56 +01:00
|
|
|
else:
|
|
|
|
# reset checks
|
|
|
|
custom_domain.nb_failed_checks = 0
|
|
|
|
Session.commit()
|
2020-08-29 19:05:32 +02:00
|
|
|
|
|
|
|
|
2020-08-17 14:02:59 +02:00
|
|
|
def delete_old_monitoring():
|
|
|
|
"""
|
|
|
|
Delete old monitoring records
|
|
|
|
"""
|
|
|
|
max_time = arrow.now().shift(days=-30)
|
2021-10-12 14:36:47 +02:00
|
|
|
nb_row = Monitoring.filter(Monitoring.created_at < max_time).delete()
|
|
|
|
Session.commit()
|
2020-08-17 14:02:59 +02:00
|
|
|
LOG.d("delete monitoring records older than %s, nb row %s", max_time, nb_row)
|
|
|
|
|
|
|
|
|
2022-08-10 18:48:32 +02:00
|
|
|
def delete_expired_tokens():
|
|
|
|
"""
|
|
|
|
Delete old tokens
|
|
|
|
"""
|
|
|
|
max_time = arrow.now().shift(hours=-1)
|
|
|
|
nb_row = ApiToCookieToken.filter(ApiToCookieToken.created_at < max_time).delete()
|
|
|
|
Session.commit()
|
|
|
|
LOG.d("Delete api to cookie tokens older than %s, nb row %s", max_time, nb_row)
|
|
|
|
|
|
|
|
|
2021-05-18 21:18:07 +02:00
|
|
|
async def _hibp_check(api_key, queue):
|
2021-05-13 22:44:16 +02:00
|
|
|
"""
|
2021-05-15 23:23:59 +02:00
|
|
|
Uses a single API key to check the queue as fast as possible.
|
2021-05-13 22:44:16 +02:00
|
|
|
|
2021-05-15 23:23:59 +02:00
|
|
|
This function to be ran simultaneously (multiple _hibp_check functions with different keys on the same queue) to make maximum use of multiple API keys.
|
|
|
|
"""
|
2024-03-04 13:12:38 +01:00
|
|
|
default_rate_sleep = (60.0 / config.HIBP_RPM) + 0.1
|
|
|
|
rate_sleep = default_rate_sleep
|
|
|
|
rate_hit_counter = 0
|
2021-05-15 23:23:59 +02:00
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
alias_id = queue.get_nowait()
|
2021-05-18 21:18:07 +02:00
|
|
|
except asyncio.QueueEmpty:
|
2021-05-15 23:23:59 +02:00
|
|
|
return
|
2021-05-13 22:44:16 +02:00
|
|
|
|
2021-05-15 23:23:59 +02:00
|
|
|
alias = Alias.get(alias_id)
|
2021-05-22 16:36:09 +02:00
|
|
|
if not alias:
|
2024-03-04 13:12:38 +01:00
|
|
|
continue
|
|
|
|
user = alias.user
|
|
|
|
if user.disabled or not user.is_paid():
|
2024-03-14 16:03:43 +01:00
|
|
|
# Mark it as hibp done to skip it as if it had been checked
|
|
|
|
alias.hibp_last_check = arrow.utcnow()
|
|
|
|
Session.commit()
|
2024-03-04 13:12:38 +01:00
|
|
|
continue
|
2021-05-22 16:36:09 +02:00
|
|
|
|
2021-05-15 23:23:59 +02:00
|
|
|
LOG.d("Checking HIBP for %s", alias)
|
2021-05-13 22:44:16 +02:00
|
|
|
|
|
|
|
request_headers = {
|
|
|
|
"user-agent": "SimpleLogin",
|
2021-05-15 23:23:59 +02:00
|
|
|
"hibp-api-key": api_key,
|
2021-05-13 22:44:16 +02:00
|
|
|
}
|
2021-05-14 19:59:32 +02:00
|
|
|
r = requests.get(
|
|
|
|
f"https://haveibeenpwned.com/api/v3/breachedaccount/{urllib.parse.quote(alias.email)}",
|
|
|
|
headers=request_headers,
|
|
|
|
)
|
2021-05-13 22:44:16 +02:00
|
|
|
if r.status_code == 200:
|
|
|
|
# Breaches found
|
2021-05-17 21:29:29 +02:00
|
|
|
alias.hibp_breaches = [
|
|
|
|
Hibp.get_by(name=entry["Name"]) for entry in r.json()
|
|
|
|
]
|
2021-05-19 12:46:55 +02:00
|
|
|
if len(alias.hibp_breaches) > 0:
|
|
|
|
LOG.w("%s appears in HIBP breaches %s", alias, alias.hibp_breaches)
|
2024-03-04 13:12:38 +01:00
|
|
|
if rate_hit_counter > 0:
|
|
|
|
rate_hit_counter -= 1
|
2021-05-13 22:44:16 +02:00
|
|
|
elif r.status_code == 404:
|
|
|
|
# No breaches found
|
|
|
|
alias.hibp_breaches = []
|
2021-06-19 19:56:18 +02:00
|
|
|
elif r.status_code == 429:
|
|
|
|
# rate limited
|
|
|
|
LOG.w("HIBP rate limited, check alias %s in the next run", alias)
|
2024-03-04 13:12:38 +01:00
|
|
|
rate_hit_counter += 1
|
|
|
|
rate_sleep = default_rate_sleep + (0.2 * rate_hit_counter)
|
|
|
|
if rate_hit_counter > 10:
|
|
|
|
LOG.w(f"HIBP rate limited too many times stopping with alias {alias}")
|
|
|
|
return
|
|
|
|
# Just sleep for a while
|
|
|
|
asyncio.sleep(5)
|
2021-06-17 23:04:25 +02:00
|
|
|
elif r.status_code > 500:
|
|
|
|
LOG.w("HIBP server 5** error %s", r.status_code)
|
|
|
|
return
|
2021-05-13 22:44:16 +02:00
|
|
|
else:
|
2021-05-14 19:59:32 +02:00
|
|
|
LOG.error(
|
2024-03-04 13:12:38 +01:00
|
|
|
"An error occurred while checking alias %s: %s - %s",
|
2021-05-14 19:59:32 +02:00
|
|
|
alias,
|
|
|
|
r.status_code,
|
|
|
|
r.text,
|
|
|
|
)
|
2021-05-15 23:23:59 +02:00
|
|
|
return
|
2021-05-13 22:44:16 +02:00
|
|
|
|
2021-05-20 19:00:11 +02:00
|
|
|
alias.hibp_last_check = arrow.utcnow()
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.add(alias)
|
|
|
|
Session.commit()
|
2021-05-13 22:44:16 +02:00
|
|
|
|
2024-03-04 13:12:38 +01:00
|
|
|
LOG.d("Updated breach info for %s", alias)
|
|
|
|
await asyncio.sleep(rate_sleep)
|
2021-05-15 23:23:59 +02:00
|
|
|
|
|
|
|
|
2024-03-15 10:13:06 +01:00
|
|
|
def get_alias_to_check_hibp(
|
|
|
|
oldest_hibp_allowed: arrow.Arrow,
|
|
|
|
user_ids_to_skip: list[int],
|
|
|
|
min_alias_id: int,
|
|
|
|
max_alias_id: int,
|
|
|
|
):
|
|
|
|
now = arrow.now()
|
|
|
|
alias_query = (
|
|
|
|
Session.query(Alias)
|
|
|
|
.join(User, User.id == Alias.user_id)
|
|
|
|
.join(Subscription, User.id == Subscription.user_id, isouter=True)
|
|
|
|
.join(ManualSubscription, User.id == ManualSubscription.user_id, isouter=True)
|
|
|
|
.join(AppleSubscription, User.id == AppleSubscription.user_id, isouter=True)
|
|
|
|
.join(
|
|
|
|
CoinbaseSubscription,
|
|
|
|
User.id == CoinbaseSubscription.user_id,
|
|
|
|
isouter=True,
|
|
|
|
)
|
|
|
|
.join(PartnerUser, User.id == PartnerUser.user_id, isouter=True)
|
|
|
|
.join(
|
|
|
|
PartnerSubscription,
|
|
|
|
PartnerSubscription.partner_user_id == PartnerUser.id,
|
|
|
|
isouter=True,
|
|
|
|
)
|
|
|
|
.filter(
|
|
|
|
or_(
|
|
|
|
Alias.hibp_last_check.is_(None),
|
|
|
|
Alias.hibp_last_check < oldest_hibp_allowed,
|
|
|
|
),
|
|
|
|
Alias.user_id.notin_(user_ids_to_skip),
|
|
|
|
Alias.enabled,
|
|
|
|
Alias.id >= min_alias_id,
|
|
|
|
Alias.id < max_alias_id,
|
|
|
|
User.disabled == False, # noqa: E712
|
2024-04-12 10:39:23 +02:00
|
|
|
User.enable_data_breach_check,
|
2024-03-15 10:13:06 +01:00
|
|
|
or_(
|
|
|
|
User.lifetime,
|
|
|
|
ManualSubscription.end_at > now,
|
|
|
|
Subscription.next_bill_date > now.date(),
|
|
|
|
AppleSubscription.expires_date > now,
|
|
|
|
CoinbaseSubscription.end_at > now,
|
|
|
|
PartnerSubscription.end_at > now,
|
|
|
|
),
|
|
|
|
)
|
|
|
|
)
|
|
|
|
if config.HIBP_SKIP_PARTNER_ALIAS:
|
|
|
|
alias_query = alias_query.filter(
|
|
|
|
Alias.flags.op("&")(Alias.FLAG_PARTNER_CREATED) == 0
|
|
|
|
)
|
|
|
|
for alias in (
|
|
|
|
alias_query.order_by(Alias.id.asc()).enable_eagerloads(False).yield_per(500)
|
|
|
|
):
|
|
|
|
yield alias
|
|
|
|
|
|
|
|
|
2021-05-18 21:18:07 +02:00
|
|
|
async def check_hibp():
|
2021-05-15 23:23:59 +02:00
|
|
|
"""
|
|
|
|
Check all aliases on the HIBP (Have I Been Pwned) API
|
|
|
|
"""
|
|
|
|
LOG.d("Checking HIBP API for aliases in breaches")
|
|
|
|
|
2022-11-02 15:51:14 +01:00
|
|
|
if len(config.HIBP_API_KEYS) == 0:
|
2021-09-08 11:29:55 +02:00
|
|
|
LOG.e("No HIBP API keys")
|
2021-05-15 23:23:59 +02:00
|
|
|
return
|
|
|
|
|
|
|
|
LOG.d("Updating list of known breaches")
|
|
|
|
r = requests.get("https://haveibeenpwned.com/api/v3/breaches")
|
|
|
|
for entry in r.json():
|
2021-07-29 08:51:21 +02:00
|
|
|
hibp_entry = Hibp.get_or_create(name=entry["Name"])
|
|
|
|
hibp_entry.date = arrow.get(entry["BreachDate"])
|
|
|
|
hibp_entry.description = entry["Description"]
|
2021-05-15 23:23:59 +02:00
|
|
|
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.commit()
|
2021-05-15 23:23:59 +02:00
|
|
|
LOG.d("Updated list of known breaches")
|
|
|
|
|
2024-03-04 13:12:38 +01:00
|
|
|
LOG.d("Getting the list of users to skip")
|
|
|
|
query = "select u.id, count(a.id) from users u, alias a where a.user_id=u.id group by u.id having count(a.id) > :max_alias"
|
|
|
|
rows = Session.execute(query, {"max_alias": config.HIBP_MAX_ALIAS_CHECK})
|
|
|
|
user_ids = [row[0] for row in rows]
|
|
|
|
LOG.d("Got %d users to skip" % len(user_ids))
|
|
|
|
|
2024-03-14 16:03:43 +01:00
|
|
|
LOG.d("Checking aliases")
|
2021-05-18 21:18:07 +02:00
|
|
|
queue = asyncio.Queue()
|
2024-03-14 16:03:43 +01:00
|
|
|
min_alias_id = 0
|
|
|
|
max_alias_id = Session.query(func.max(Alias.id)).scalar()
|
2024-03-15 10:13:06 +01:00
|
|
|
step = 10000
|
|
|
|
now = arrow.now()
|
|
|
|
oldest_hibp_allowed = now.shift(days=-config.HIBP_SCAN_INTERVAL_DAYS)
|
2024-03-14 16:03:43 +01:00
|
|
|
alias_checked = 0
|
|
|
|
for alias_batch_id in range(min_alias_id, max_alias_id, step):
|
2024-03-15 10:13:06 +01:00
|
|
|
for alias in get_alias_to_check_hibp(
|
|
|
|
oldest_hibp_allowed, user_ids, alias_batch_id, alias_batch_id + step
|
|
|
|
):
|
2024-03-14 16:03:43 +01:00
|
|
|
await queue.put(alias.id)
|
|
|
|
|
|
|
|
alias_checked += queue.qsize()
|
2024-03-15 10:13:06 +01:00
|
|
|
LOG.d(
|
|
|
|
f"Need to check about {queue.qsize()} aliases in this loop {alias_batch_id}/{max_alias_id}"
|
|
|
|
)
|
2024-03-14 16:03:43 +01:00
|
|
|
|
|
|
|
# Start one checking process per API key
|
|
|
|
# Each checking process will take one alias from the queue, get the info
|
|
|
|
# and then sleep for 1.5 seconds (due to HIBP API request limits)
|
|
|
|
checkers = []
|
|
|
|
for i in range(len(config.HIBP_API_KEYS)):
|
|
|
|
checker = asyncio.create_task(
|
|
|
|
_hibp_check(
|
|
|
|
config.HIBP_API_KEYS[i],
|
|
|
|
queue,
|
|
|
|
)
|
|
|
|
)
|
|
|
|
checkers.append(checker)
|
2021-05-15 23:23:59 +02:00
|
|
|
|
2024-03-14 16:03:43 +01:00
|
|
|
# Wait until all checking processes are done
|
|
|
|
for checker in checkers:
|
|
|
|
await checker
|
2021-05-15 23:23:59 +02:00
|
|
|
|
2024-03-14 16:03:43 +01:00
|
|
|
LOG.d(f"Done checking {alias_checked} HIBP API for aliases in breaches")
|
2021-05-13 22:44:16 +02:00
|
|
|
|
|
|
|
|
2021-07-29 09:35:00 +02:00
|
|
|
def notify_hibp():
|
|
|
|
"""
|
|
|
|
Send aggregated email reports for HIBP breaches
|
|
|
|
"""
|
|
|
|
# to get a list of users that have at least a breached alias
|
|
|
|
alias_query = (
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.query(Alias)
|
2021-07-29 09:35:00 +02:00
|
|
|
.options(joinedload(Alias.hibp_breaches))
|
|
|
|
.filter(Alias.hibp_breaches.any())
|
2021-10-12 14:36:47 +02:00
|
|
|
.filter(Alias.id.notin_(Session.query(HibpNotifiedAlias.alias_id)))
|
2021-07-29 09:35:00 +02:00
|
|
|
.distinct(Alias.user_id)
|
|
|
|
.all()
|
|
|
|
)
|
|
|
|
|
|
|
|
user_ids = [alias.user_id for alias in alias_query]
|
|
|
|
|
2021-10-12 14:36:47 +02:00
|
|
|
for user in User.filter(User.id.in_(user_ids)):
|
2021-07-29 09:35:00 +02:00
|
|
|
breached_aliases = (
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.query(Alias)
|
2021-07-29 09:35:00 +02:00
|
|
|
.options(joinedload(Alias.hibp_breaches))
|
|
|
|
.filter(Alias.hibp_breaches.any(), Alias.user_id == user.id)
|
|
|
|
.all()
|
|
|
|
)
|
|
|
|
|
2021-07-29 09:55:36 +02:00
|
|
|
LOG.d(
|
2023-11-21 16:42:18 +01:00
|
|
|
"Send new breaches found email to %s for %s breaches aliases",
|
2021-07-29 09:55:36 +02:00
|
|
|
user,
|
|
|
|
len(breached_aliases),
|
|
|
|
)
|
2021-07-29 09:35:00 +02:00
|
|
|
|
|
|
|
send_email(
|
|
|
|
user.email,
|
2023-11-21 16:42:18 +01:00
|
|
|
"You were in a data breach",
|
2021-07-29 09:35:00 +02:00
|
|
|
render(
|
|
|
|
"transactional/hibp-new-breaches.txt.jinja2",
|
|
|
|
user=user,
|
|
|
|
breached_aliases=breached_aliases,
|
|
|
|
),
|
|
|
|
render(
|
|
|
|
"transactional/hibp-new-breaches.html",
|
|
|
|
user=user,
|
|
|
|
breached_aliases=breached_aliases,
|
|
|
|
),
|
2021-12-28 16:42:01 +01:00
|
|
|
retries=3,
|
2021-07-29 09:35:00 +02:00
|
|
|
)
|
|
|
|
|
2021-07-29 09:55:36 +02:00
|
|
|
# add the breached aliases to HibpNotifiedAlias to avoid sending another email
|
|
|
|
for alias in breached_aliases:
|
|
|
|
HibpNotifiedAlias.create(user_id=user.id, alias_id=alias.id)
|
2021-10-12 14:36:47 +02:00
|
|
|
Session.commit()
|
2021-07-29 09:55:36 +02:00
|
|
|
|
2021-07-29 09:35:00 +02:00
|
|
|
|
2024-02-22 17:38:34 +01:00
|
|
|
def clear_users_scheduled_to_be_deleted(dry_run=False):
|
2023-09-10 22:11:50 +02:00
|
|
|
users = User.filter(
|
2024-02-22 17:38:34 +01:00
|
|
|
and_(
|
|
|
|
User.delete_on.isnot(None),
|
|
|
|
User.delete_on <= arrow.now().shift(days=-DELETE_GRACE_DAYS),
|
|
|
|
)
|
2023-09-10 22:11:50 +02:00
|
|
|
).all()
|
|
|
|
for user in users:
|
|
|
|
LOG.i(
|
|
|
|
f"Scheduled deletion of user {user} with scheduled delete on {user.delete_on}"
|
|
|
|
)
|
2024-02-22 17:38:34 +01:00
|
|
|
if dry_run:
|
|
|
|
continue
|
2023-09-10 22:11:50 +02:00
|
|
|
User.delete(user.id)
|
|
|
|
Session.commit()
|
|
|
|
|
|
|
|
|
2024-03-18 16:00:21 +01:00
|
|
|
def delete_old_data():
|
|
|
|
oldest_valid = arrow.now().shift(days=-config.KEEP_OLD_DATA_DAYS)
|
|
|
|
cleanup_old_imports(oldest_valid)
|
|
|
|
cleanup_old_jobs(oldest_valid)
|
|
|
|
cleanup_old_notifications(oldest_valid)
|
|
|
|
|
|
|
|
|
create BaseForm to enable CSRF
register page
redirect user to dashboard if they are logged in
enable csrf for login page
Set models more strict
bootstrap developer page
add helper method to ModelMixin, remove CRUDMixin
display list of clients on developer index, add copy client-secret to clipboard using clipboardjs
add toastr and use jquery non slim
display a toast when user copies the client-secret
create new client, generate client-id using unidecode
client detail page: can edit client
add delete client
implement /oauth/authorize and /oauth/allow-deny
implement /oauth/token
add /oauth/user_info endpoint
handle scopes: wip
take into account scope: display scope, return user data according to scope
create virtual-domain, gen email, client_user model WIP
create authorize_nonlogin_user page
user can choose to generate a new email
no need to interfere with root logger
log for before and after request
if user has already allowed a client: generate a auth-code and redirect user to client
get_user_info takes into account gen email
display list of clients that have user has authorised
use yk-client domain instead of localhost as cookie depends on the domain name
use wtforms instead of flask_wtf
Dockerfile
delete virtual domain
EMAIL_DOMAIN can come from env var
bind to host 0.0.0.0
fix signup error: use session as default csrf_context
rename yourkey to simplelogin
add python-dotenv, ipython, sqlalchemy_utils
create DB_URI, FLASK_SECRET. Load config from CONFIG file if exist
add shortcuts to logging
create shell
add psycopg2
do not add local data in Dockerfile
add drop_db into shell
add shell.prepare_db()
fix prepare_db
setup sentry
copy assets from tabler/dist
add icon downloaded from https://commons.wikimedia.org/wiki/File:Simpleicons_Interface_key-tool-1.svg
integrate tabler - login and register page
add favicon
template: default, header. Use gravatar for user avatar url
use default template for dashboard, developer page
use another icon
add clipboard and notie
prettify dashboard
add notie css
add fake gen email and client-user
prettify list client page, use notie for toast
add email, name scope to new client
display client scope in client list
prettify new-client, client-detail
add sentry-sdk and blinker
add arrow, add dt jinja filter, prettify logout, dashboard
comment "last used" in dashboard for now
prettify date display
add copy email to clipboard to dashboard
use "users" as table name for User as "user" is reserved key in postgres
call prepare_db() when creating new db
error page 400, 401, 403, 404
prettify authorize_login_user
create already_authorize.html for user who has already authorized a client
user can generate new email
display all other generated emails
add ENV variable, only reset DB when ENV=local
fix: not return other users gen emails
display nb users for each client
refactor shell: remove prepare_db()
add sendgrid
add /favicon.ico route
add new config: URL, SUPPORT_EMAIL, SENDGRID_API_KEY
user needs to activate their account before login
create copy button on dashboard
client can have multiple redirect uris, in client detail can add/remove redirect-uri,
use redirect_uri passed in /authorize
refactor: move get_user_info into ClientUser model
dashboard: display all apps, all generated emails
add "id" into user_info
add trigger email button
invalidate the session at each new version by changing the secret
centralize Client creation into Client.create_new
user can enable/disable email forwarding
setup auto dismiss alert: just add .alert-auto-dismiss
move name down in register form
add shell.add_real_data
move blueprint template to its own package
prettify authorize page for non-authenticated user
update readme, return error if not redirect_uri
add flask-wtf, use psycopg2-binary
use flask-wtf FlaskForm instead of Form
rename email -> email_utils
add AWS_REGION, BUCKET, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY to config
add s3 module
add File model, add Client.icon_id
handle client icon update
can create client with icon
display client icon in client list page
add Client.home_url
take into account Client.home_url
add boto3
register: ask name first
only show "trigger test email" if email forwarding is enabled
display gen email in alphabetical order, client in client.name alphabetical order
better error page
the modal does not get close when user clicks outside of modal
add Client.published column
discover page that displays all published Client
add missing bootstrap.bundle.min.js.map
developer can publish/unpublish their app in discover
use notie for display flash message
create hotmail account
fix missing jquery
add footer, add global jinja2 variable
strengthen model: use nullable=False whenever possible,
rename client_id to oauth_client_id, client_secret to oauth_client_secret
add flask-migrate
init migrate
1st migrate version
fix rename client_id -> oauth_client_id
prettify UI
use flask_migrate.upgrade() instead of db.create_all()
make sure requirejs.config is called for all page
enable sentry for js, use uppercase for global jinja2 variables
add flask-admin
add User.is_admin column
setup flask admin, only accessible to admin user
fix migration: add server_default
replace session[redirect_after_login] by "next" request args
add pyproject.toml: ignore migrations/ in black
add register waiting_activation_email page
better email wording
add pytest
add get_host_name_and_scheme and tests
example fail test
fix test
fix client-id display
add flask-cors
/user_info supports cors, add /me as /user_info synonym
return client in /me
support implicit flow
no need to use with "app.app_context()"
add watchtower to requirement
add param ENABLE_CLOUDWATCH, CLOUDWATCH_LOG_GROUP, CLOUDWATCH_LOG_STREAM
add cloudwatch logger if cloudwatch is enabled
add 500 error page
add help text for list of used client
display list of app/website that an email has been used
click on client name brings to client detail page
create style.css to add additional style, append its url with the current sha1 to avoid cache
POC on how to send email using postfix
add sqlalchemy-utils
use arrow instead of datetime
add new params STRIPE_API, STRIPE_YEARLY_SKU, STRIPE_MONTHLY_PLAN
show full error in local
add plan, plan_expiration to User, need to create enum directly in migration script, cf https://github.com/sqlalchemy/alembic/issues/67
reformat all html files: use space instead of tab
new user will have trial plan for 15 days
add new param MAX_NB_EMAIL_FREE_PLAN
only user with enough quota can create new email
if user cannot create new gen email, pick randomly one from existing gen emails. Use flush instead of commit
rename STRIPE_YEARLY_SKU -> STRIPE_YEARLY_PLAN
open client page in discover in a new tab
add stripe
not logging /static call: disable flask logging, replace by after_request
add param STRIPE_SECRET_KEY
add 3 columns stripe_customer_id, stripe_card_token, stripe_subscription_id
user can upgrade their pricing
add setting page as coming-soon
add GenEmail, ClientUser to admin
ignore /admin/static logging
add more fake data
add ondelete="cascade" whenever possible
rename plan_expiration -> trial_expiration
reset migration: delete old migrations, create new one
rename test_send_email -> poc_send_email to avoid the file being called by pytest
add new param LYRA_ANALYTICS_ID, add lyra analytics
add how to create new migration into readme
add drift to base.html
notify admin when new user signs up or pays subscription
log exception in case of 500
use sendgrid to notify admin
add alias /userinfo to user_info endpoint
add change_password to shell
add info on how payment is handled
invite user to retry if card not working
remove drift and add "contact us" link
move poc_send_email into poc/
support getting client-id, client-secret from form-data in addition to basic auth
client-id, client-secret is passed in form-data by passport-oauth2 for ex
add jwtRS256 private and public key
add jwk-jws-jwt poc
add new param OPENID_PRIVATE_KEY_PATH, OPENID_PRIVATE_KEY_PATH
add scope, redirect_url to AuthorizationCode and OauthToken
take into scope when creating oauth-token, authorization-code
add jwcrypto
add jose_utils: make_id_token and verify_id_token
add &scope to redirect uri
add "email_verified": True into user_info
fix user not activated
add /oauth2 as alias for /oauth
handle case where scope and state are empty
remove threaded=False
Use Email Alias as wording
remove help text
user can re-send activation email
add "expired" into ActivationCode
Handle the case activation code is expired
reformat: use form.validate_on_submit instead of request.method == post && form.validate
use error text instead of flash()
display client oauth-id and oauth-secret on client detail page
not display oauth-secret on client listing
fix expiration check
improve page title, footer
add /jwks and /.well-known/openid-configuration
init properly tests, fix blueprint conflict bug in flask-admin
create oauth_models module
rename Scope -> ScopeE to distinguish with Scope DB model
set app.url_map.strict_slashes = False
use ScopeE instead of SCOPE_NAME, ...
support access_token passed as args in /userinfo
merge /allow-deny into /authorize
improve wording
take into account the case response_type=code and openid is in scope
take into account response_type=id_token, id_token token, id_token code
make sure to use in-memory db in test
fix scope can be null
allow cross_origin for /.well-known/openid-configuration and /jwks
fix footer link
center authorize form
rename trial_expiration to plan_expiration
move stripe init to create_app()
use real email to be able to receive email notification
add user.profile_picture_id column
use user profile picture and fallback to gravatar
use nguyenkims+local@gm to distinguish with staging
handle plan cancel, reactivation, user profile update
fix can_create_new_email
create cron.py that set plan to free when expired
add crontab.yml
add yacron
use notify_admin instead of LOG.error
add ResetPasswordCode model
user can change password in setting
increase display time for notie
add forgot_password page
If login error: redirect to this page upon success login.
hide discover tab
add column user.is_developer
only show developer menu to developer
comment out the publish button
set local user to developer
make sure only developer can access /developer blueprint
User is invited to upgrade if they are in free plan or their trial ends soon
not sending email when in local mode
create Partner model
create become partner page
use normal error handling on local
fix migration
add "import sqlalchemy_utils" into migration template
small refactoring on setting page
handle promo code. TODO: add migration file
add migration for user.promo_codes
move email alias on top of apps in dashboard
add introjs
move encode_url to utils
create GenEmail.create_new_gen_email
create a first alias mail to show user how to use when they login
show intro when user visits the website the first time
fix register
2019-07-02 09:20:12 +02:00
|
|
|
if __name__ == "__main__":
|
|
|
|
LOG.d("Start running cronjob")
|
2020-02-02 16:17:04 +01:00
|
|
|
parser = argparse.ArgumentParser()
|
|
|
|
parser.add_argument(
|
|
|
|
"-j",
|
|
|
|
"--job",
|
|
|
|
help="Choose a cron job to run",
|
|
|
|
type=str,
|
2020-03-05 09:35:20 +01:00
|
|
|
choices=[
|
2022-02-28 10:13:19 +01:00
|
|
|
"stats",
|
2020-03-05 09:35:20 +01:00
|
|
|
"notify_trial_end",
|
|
|
|
"notify_manual_subscription_end",
|
|
|
|
"notify_premium_end",
|
2021-01-26 09:54:58 +01:00
|
|
|
"delete_logs",
|
2024-03-18 16:00:21 +01:00
|
|
|
"delete_old_data",
|
2020-04-19 11:20:44 +02:00
|
|
|
"poll_apple_subscription",
|
2020-06-09 17:12:34 +02:00
|
|
|
"sanity_check",
|
2020-08-17 14:02:59 +02:00
|
|
|
"delete_old_monitoring",
|
2020-08-29 19:05:32 +02:00
|
|
|
"check_custom_domain",
|
2021-05-14 19:59:32 +02:00
|
|
|
"check_hibp",
|
2021-07-29 09:35:00 +02:00
|
|
|
"notify_hibp",
|
2022-08-10 18:48:32 +02:00
|
|
|
"cleanup_tokens",
|
2022-11-02 15:51:14 +01:00
|
|
|
"send_undelivered_mails",
|
2020-03-05 09:35:20 +01:00
|
|
|
],
|
2020-02-02 16:17:04 +01:00
|
|
|
)
|
|
|
|
args = parser.parse_args()
|
2021-10-26 10:52:28 +02:00
|
|
|
# wrap in an app context to benefit from app setup like database cleanup, sentry integration, etc
|
|
|
|
with create_light_app().app_context():
|
2022-02-28 10:13:19 +01:00
|
|
|
if args.job == "stats":
|
|
|
|
LOG.d("Compute growth and daily monitoring stats")
|
|
|
|
stats()
|
2021-10-26 10:52:28 +02:00
|
|
|
elif args.job == "notify_trial_end":
|
|
|
|
LOG.d("Notify users with trial ending soon")
|
|
|
|
notify_trial_end()
|
|
|
|
elif args.job == "notify_manual_subscription_end":
|
|
|
|
LOG.d("Notify users with manual subscription ending soon")
|
|
|
|
notify_manual_sub_end()
|
|
|
|
elif args.job == "notify_premium_end":
|
|
|
|
LOG.d("Notify users with premium ending soon")
|
|
|
|
notify_premium_end()
|
|
|
|
elif args.job == "delete_logs":
|
|
|
|
LOG.d("Deleted Logs")
|
|
|
|
delete_logs()
|
2024-03-18 16:00:21 +01:00
|
|
|
elif args.job == "delete_old_data":
|
|
|
|
LOG.d("Delete old data")
|
|
|
|
delete_old_data()
|
2021-10-26 10:52:28 +02:00
|
|
|
elif args.job == "poll_apple_subscription":
|
|
|
|
LOG.d("Poll Apple Subscriptions")
|
|
|
|
poll_apple_subscription()
|
|
|
|
elif args.job == "sanity_check":
|
|
|
|
LOG.d("Check data consistency")
|
|
|
|
sanity_check()
|
|
|
|
elif args.job == "delete_old_monitoring":
|
|
|
|
LOG.d("Delete old monitoring records")
|
|
|
|
delete_old_monitoring()
|
|
|
|
elif args.job == "check_custom_domain":
|
|
|
|
LOG.d("Check custom domain")
|
|
|
|
check_custom_domain()
|
|
|
|
elif args.job == "check_hibp":
|
|
|
|
LOG.d("Check HIBP")
|
|
|
|
asyncio.run(check_hibp())
|
|
|
|
elif args.job == "notify_hibp":
|
|
|
|
LOG.d("Notify users about HIBP breaches")
|
|
|
|
notify_hibp()
|
2022-08-10 18:48:32 +02:00
|
|
|
elif args.job == "cleanup_tokens":
|
|
|
|
LOG.d("Cleanup expired tokens")
|
|
|
|
delete_expired_tokens()
|
2022-11-02 15:51:14 +01:00
|
|
|
elif args.job == "send_undelivered_mails":
|
|
|
|
LOG.d("Sending undelivered emails")
|
|
|
|
load_unsent_mails_from_fs_and_resend()
|
2023-09-10 22:11:50 +02:00
|
|
|
elif args.job == "delete_scheduled_users":
|
|
|
|
LOG.d("Deleting users scheduled to be deleted")
|
2024-02-22 17:38:34 +01:00
|
|
|
clear_users_scheduled_to_be_deleted(dry_run=True)
|