Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(org member invite): OrganizationMemberInviteDetails PUT endpoint #88409

Open
wants to merge 6 commits into
base: master
Choose a base branch
from

Conversation

mifu67
Copy link
Contributor

@mifu67 mifu67 commented Apr 1, 2025

Implement the PUT method on the OrganizationMemberInviteDetails endpoint. The method supports the following functionality:

  • Allow members to reinvite users that they invited
  • Allow org managers/owners to approve invites
  • Allow org managers/owners to edit invitation details

@github-actions github-actions bot added the Scope: Backend Automatically applied to PRs that change backend components label Apr 1, 2025
Base automatically changed from mifu67/member-invite/omi-details-get to master April 1, 2025 16:04
@mifu67 mifu67 force-pushed the mifu67/member-invite/omi-details-put branch from b998826 to 1a75bd2 Compare April 1, 2025 16:12
try:
invited_member.validate_invitation(approving_user, allowed_roles)
except UnableToAcceptMemberInvitationException as err:
raise serializers.ValidationError(str(err))

Check warning

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Copilot Autofix

AI 2 days ago

To fix the problem, we should avoid exposing the detailed exception message to the end user. Instead, we should log the detailed error message on the server and return a generic error message to the user. This can be achieved by modifying the exception handling in the validate_approve method to log the exception and raise a generic ValidationError.

Suggested changeset 1
src/sentry/api/serializers/rest_framework/organizationmemberinvite.py

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/src/sentry/api/serializers/rest_framework/organizationmemberinvite.py b/src/sentry/api/serializers/rest_framework/organizationmemberinvite.py
--- a/src/sentry/api/serializers/rest_framework/organizationmemberinvite.py
+++ b/src/sentry/api/serializers/rest_framework/organizationmemberinvite.py
@@ -15,3 +15,5 @@
 from sentry.users.services.user.service import user_service
+import logging
 
+logger = logging.getLogger(__name__)
 
@@ -166,3 +168,4 @@
         except UnableToAcceptMemberInvitationException as err:
-            raise serializers.ValidationError(str(err))
+            logger.error(f"Unable to accept member invitation: {err}")
+            raise serializers.ValidationError("An error occurred while processing the invitation.")
 
EOF
@@ -15,3 +15,5 @@
from sentry.users.services.user.service import user_service
import logging

logger = logging.getLogger(__name__)

@@ -166,3 +168,4 @@
except UnableToAcceptMemberInvitationException as err:
raise serializers.ValidationError(str(err))
logger.error(f"Unable to accept member invitation: {err}")
raise serializers.ValidationError("An error occurred while processing the invitation.")

Copilot is powered by AI and may make mistakes. Always verify output.
@mifu67 mifu67 marked this pull request as ready for review April 1, 2025 16:32
@mifu67 mifu67 requested a review from cathteng April 1, 2025 16:32
Copy link

codecov bot commented Apr 1, 2025

Codecov Report

Attention: Patch coverage is 94.55128% with 17 lines in your changes missing coverage. Please review.

✅ All tests successful. No failed tests found.

Files with missing lines Patch % Lines
...dpoints/test_organization_member_invite_details.py 92.82% 14 Missing ⚠️
...pi/endpoints/organization_member_invite/details.py 96.92% 2 Missing ⚠️
src/sentry/models/organizationmemberinvite.py 97.05% 1 Missing ⚠️
Additional details and impacted files
@@           Coverage Diff            @@
##           master   #88409    +/-   ##
========================================
  Coverage   87.72%   87.73%            
========================================
  Files       10003    10004     +1     
  Lines      566676   567124   +448     
  Branches    22265    22265            
========================================
+ Hits       497108   497538   +430     
- Misses      69150    69168    +18     
  Partials      418      418            

@mifu67 mifu67 requested a review from leedongwei April 1, 2025 16:58

if result.get("orgRole"):
invited_member.set_org_role(result["orgRole"])
if result.get("teams"):
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The original OrganizationMemberDetails endpoint allows you to set team roles for invited members. Do we want to continue to allow this behavior? We don't set team roles when inviting members, so users would be required to make an additional PUT request for an invited member.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

probably a good idea to try to replicate existing behavior where possible

@mifu67 mifu67 requested a review from sentaur-athena April 1, 2025 18:43
Copy link
Member

@cathteng cathteng left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

might be helpful to diagram out all the possible flows within this PUT 😵‍💫

return Response({"detail": ERR_INSUFFICIENT_SCOPE}, status=400)
if invited_member.token_expired:
return Response({"detail": ERR_EXPIRED}, status=400)
invited_member.send_invite_email()
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what happened to sending SSO linked emails?


if result.get("orgRole"):
invited_member.set_org_role(result["orgRole"])
if result.get("teams"):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

probably a good idea to try to replicate existing behavior where possible

Comment on lines +197 to +198
if request.data["approve"] is False:
return Response({"detail": ERR_WRONG_METHOD}, status=400)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can this be in the validator?

if not is_invite_from_user:
return Response({"detail": ERR_MEMBER_INVITE}, status=403)

if result.get("reinvite"):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it seems like we ignore the other fields if reinvite is true. should this be moved to the top of the method so we don't attempt to validate the other fields? although it also doesn't seem like an implausible situation to use the API to update AND reinvite, even if it's not surfaced in the UI

Comment on lines +165 to +183
is_member = not request.access.has_scope("member:admin") and (
request.access.has_scope("member:invite")
)
members_can_invite = not organization.flags.disable_member_invite
# Members can only resend invites
is_reinvite_request_only = (
set(result.keys()).issubset({"reinvite", "regenerate"})
and "approve" not in request.data
)

# Members can only resend invites that they sent
is_invite_from_user = invited_member.inviter_id == request.user.id

if is_member:
if not (members_can_invite and is_reinvite_request_only):
# this check blocks members from doing anything but reinviting
raise PermissionDenied
if not is_invite_from_user:
return Response({"detail": ERR_MEMBER_INVITE}, status=403)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we be checking member permissions before validating the incoming data? i would also put this into its own function if possible

"sentry.roles.organization_roles.get",
wraps=mock_organization_roles_get_factory(organization_roles.get),
)
def test_update_teams_invalid__a(self, mock_get):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
def test_update_teams_invalid__a(self, mock_get):
def test_update_teams_invalid__team_assignments_change_orgrole(self, mock_get):

?

== "You do not have permission to approve a member invitation with the role owner."
)

@with_feature({"organizations:invite-members": False})
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the default is True, should we just remove this FF?

@mifu67 mifu67 requested a review from saponifi3d April 1, 2025 22:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Scope: Backend Automatically applied to PRs that change backend components
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants