|
@@ -1,800 +0,0 @@
|
|
|
-import base64
|
|
|
-import binascii
|
|
|
-from datetime import timedelta
|
|
|
-from functools import cached_property
|
|
|
-
|
|
|
-import django.core.exceptions
|
|
|
-from django.conf import settings
|
|
|
-from django.contrib.auth import user_logged_in
|
|
|
-from django.contrib.auth.hashers import is_password_usable
|
|
|
-from django.core.cache import cache
|
|
|
-from django.core.mail import EmailMessage
|
|
|
-from django.http import Http404
|
|
|
-from django.shortcuts import redirect
|
|
|
-from django.template.loader import get_template
|
|
|
-from rest_framework import generics, mixins, status, viewsets
|
|
|
-from rest_framework.authentication import get_authorization_header
|
|
|
-from rest_framework.exceptions import (NotAcceptable, NotFound, PermissionDenied, ValidationError)
|
|
|
-from rest_framework.permissions import IsAuthenticated, SAFE_METHODS
|
|
|
-from rest_framework.renderers import JSONRenderer, StaticHTMLRenderer
|
|
|
-from rest_framework.response import Response
|
|
|
-from rest_framework.reverse import reverse
|
|
|
-from rest_framework.settings import api_settings
|
|
|
-from rest_framework.views import APIView
|
|
|
-
|
|
|
-import desecapi.authentication as auth
|
|
|
-from desecapi import metrics, models, permissions, serializers
|
|
|
-from desecapi.exceptions import ConcurrencyException
|
|
|
-from desecapi.pdns import get_serials
|
|
|
-from desecapi.pdns_change_tracker import PDNSChangeTracker
|
|
|
-from desecapi.renderers import PlainTextRenderer
|
|
|
-
|
|
|
-
|
|
|
-class EmptyPayloadMixin:
|
|
|
- def initialize_request(self, request, *args, **kwargs):
|
|
|
- # noinspection PyUnresolvedReferences
|
|
|
- request = super().initialize_request(request, *args, **kwargs)
|
|
|
-
|
|
|
- try:
|
|
|
- no_data = request.stream is None
|
|
|
- except:
|
|
|
- no_data = True
|
|
|
-
|
|
|
- if no_data:
|
|
|
- # In this case, data and files are both empty, so we can set request.data=None (instead of the default {}).
|
|
|
- # This allows distinguishing missing payload from empty dict payload.
|
|
|
- # See https://github.com/encode/django-rest-framework/pull/7195
|
|
|
- request._full_data = None
|
|
|
-
|
|
|
- return request
|
|
|
-
|
|
|
-
|
|
|
-class IdempotentDestroyMixin:
|
|
|
-
|
|
|
- def destroy(self, request, *args, **kwargs):
|
|
|
- try:
|
|
|
- # noinspection PyUnresolvedReferences
|
|
|
- super().destroy(request, *args, **kwargs)
|
|
|
- except Http404:
|
|
|
- pass
|
|
|
- return Response(status=status.HTTP_204_NO_CONTENT)
|
|
|
-
|
|
|
-
|
|
|
-class TokenViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet):
|
|
|
- serializer_class = serializers.TokenSerializer
|
|
|
- permission_classes = (IsAuthenticated, permissions.HasManageTokensPermission,)
|
|
|
- throttle_scope = 'account_management_passive'
|
|
|
-
|
|
|
- def get_queryset(self):
|
|
|
- return self.request.user.token_set.all()
|
|
|
-
|
|
|
- def get_serializer(self, *args, **kwargs):
|
|
|
- # When creating a new token, return the plaintext representation
|
|
|
- if self.action == 'create':
|
|
|
- kwargs.setdefault('include_plain', True)
|
|
|
- return super().get_serializer(*args, **kwargs)
|
|
|
-
|
|
|
- def perform_create(self, serializer):
|
|
|
- serializer.save(user=self.request.user)
|
|
|
-
|
|
|
-
|
|
|
-class DomainViewSet(IdempotentDestroyMixin,
|
|
|
- mixins.CreateModelMixin,
|
|
|
- mixins.RetrieveModelMixin,
|
|
|
- mixins.DestroyModelMixin,
|
|
|
- mixins.ListModelMixin,
|
|
|
- viewsets.GenericViewSet):
|
|
|
- serializer_class = serializers.DomainSerializer
|
|
|
- lookup_field = 'name'
|
|
|
- lookup_value_regex = r'[^/]+'
|
|
|
-
|
|
|
- @property
|
|
|
- def permission_classes(self):
|
|
|
- ret = [IsAuthenticated, permissions.IsOwner]
|
|
|
- if self.action == 'create':
|
|
|
- ret.append(permissions.WithinDomainLimit)
|
|
|
- if self.request.method not in SAFE_METHODS:
|
|
|
- ret.append(permissions.TokenNoDomainPolicy)
|
|
|
- return ret
|
|
|
-
|
|
|
- @property
|
|
|
- def throttle_scope(self):
|
|
|
- return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_domains'
|
|
|
-
|
|
|
- @property
|
|
|
- def pagination_class(self):
|
|
|
- # Turn off pagination when filtering for covered qname, as pagination would re-order by `created` (not what we
|
|
|
- # want here) after taking a slice (that's forbidden anyway). But, we don't need pagination in this case anyways.
|
|
|
- if 'owns_qname' in self.request.query_params:
|
|
|
- return None
|
|
|
- else:
|
|
|
- return api_settings.DEFAULT_PAGINATION_CLASS
|
|
|
-
|
|
|
- def get_queryset(self):
|
|
|
- qs = self.request.user.domains
|
|
|
-
|
|
|
- owns_qname = self.request.query_params.get('owns_qname')
|
|
|
- if owns_qname is not None:
|
|
|
- qs = qs.filter_qname(owns_qname).order_by('-name_length')[:1]
|
|
|
-
|
|
|
- return qs
|
|
|
-
|
|
|
- def get_serializer(self, *args, **kwargs):
|
|
|
- include_keys = (self.action in ['create', 'retrieve'])
|
|
|
- return super().get_serializer(*args, include_keys=include_keys, **kwargs)
|
|
|
-
|
|
|
- def perform_create(self, serializer):
|
|
|
- with PDNSChangeTracker():
|
|
|
- domain = serializer.save(owner=self.request.user)
|
|
|
-
|
|
|
- # TODO this line raises if the local public suffix is not in our database!
|
|
|
- PDNSChangeTracker.track(lambda: self.auto_delegate(domain))
|
|
|
-
|
|
|
- @staticmethod
|
|
|
- def auto_delegate(domain: models.Domain):
|
|
|
- if domain.is_locally_registrable:
|
|
|
- parent_domain = models.Domain.objects.get(name=domain.parent_domain_name)
|
|
|
- parent_domain.update_delegation(domain)
|
|
|
-
|
|
|
- def perform_destroy(self, instance: models.Domain):
|
|
|
- with PDNSChangeTracker():
|
|
|
- instance.delete()
|
|
|
- if instance.is_locally_registrable:
|
|
|
- parent_domain = models.Domain.objects.get(name=instance.parent_domain_name)
|
|
|
- with PDNSChangeTracker():
|
|
|
- parent_domain.update_delegation(instance)
|
|
|
-
|
|
|
-
|
|
|
-class TokenPoliciesRoot(APIView):
|
|
|
- permission_classes = [
|
|
|
- IsAuthenticated,
|
|
|
- permissions.HasManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken,
|
|
|
- ]
|
|
|
-
|
|
|
- def get(self, request, *args, **kwargs):
|
|
|
- return Response({'domain': reverse('token_domain_policies-list', request=request, kwargs=kwargs)})
|
|
|
-
|
|
|
-
|
|
|
-class TokenDomainPolicyViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet):
|
|
|
- lookup_field = 'domain__name'
|
|
|
- lookup_value_regex = DomainViewSet.lookup_value_regex
|
|
|
- pagination_class = None
|
|
|
- serializer_class = serializers.TokenDomainPolicySerializer
|
|
|
- throttle_scope = 'account_management_passive'
|
|
|
-
|
|
|
- @property
|
|
|
- def permission_classes(self):
|
|
|
- ret = [IsAuthenticated]
|
|
|
- if self.request.method in SAFE_METHODS:
|
|
|
- ret.append(permissions.HasManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken)
|
|
|
- else:
|
|
|
- ret.append(permissions.HasManageTokensPermission)
|
|
|
- return ret
|
|
|
-
|
|
|
- def dispatch(self, request, *args, **kwargs):
|
|
|
- # map default policy onto domain_id IS NULL
|
|
|
- lookup_url_kwarg = self.lookup_url_kwarg or self.lookup_field
|
|
|
- try:
|
|
|
- if kwargs[lookup_url_kwarg] == 'default':
|
|
|
- kwargs[lookup_url_kwarg] = None
|
|
|
- except KeyError:
|
|
|
- pass
|
|
|
- return super().dispatch(request, *args, **kwargs)
|
|
|
-
|
|
|
- def get_queryset(self):
|
|
|
- return models.TokenDomainPolicy.objects.filter(token_id=self.kwargs['token_id'], token__user=self.request.user)
|
|
|
-
|
|
|
- def perform_destroy(self, instance):
|
|
|
- try:
|
|
|
- super().perform_destroy(instance)
|
|
|
- except django.core.exceptions.ValidationError as exc:
|
|
|
- raise ValidationError(exc.message_dict, code='precedence')
|
|
|
-
|
|
|
-
|
|
|
-class SerialListView(APIView):
|
|
|
- permission_classes = (permissions.IsVPNClient,)
|
|
|
- throttle_classes = [] # don't break slaves when they ask too often (our cached responses are cheap)
|
|
|
-
|
|
|
- def get(self, request, *args, **kwargs):
|
|
|
- key = 'desecapi.views.serials'
|
|
|
- serials = cache.get(key)
|
|
|
- if serials is None:
|
|
|
- serials = get_serials()
|
|
|
- cache.get_or_set(key, serials, timeout=15)
|
|
|
- return Response(serials)
|
|
|
-
|
|
|
-
|
|
|
-class RRsetView:
|
|
|
- serializer_class = serializers.RRsetSerializer
|
|
|
- permission_classes = (IsAuthenticated, permissions.IsDomainOwner, permissions.TokenHasDomainRRsetsPermission,)
|
|
|
-
|
|
|
- @property
|
|
|
- def domain(self):
|
|
|
- try:
|
|
|
- return self.request.user.domains.get(name=self.kwargs['name'])
|
|
|
- except models.Domain.DoesNotExist:
|
|
|
- raise Http404
|
|
|
-
|
|
|
- @property
|
|
|
- def throttle_scope(self):
|
|
|
- return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_rrsets'
|
|
|
-
|
|
|
- @property
|
|
|
- def throttle_scope_bucket(self):
|
|
|
- # Note: bucket should remain constant even when domain is recreated
|
|
|
- return None if self.request.method in SAFE_METHODS else self.kwargs['name']
|
|
|
-
|
|
|
- def get_queryset(self):
|
|
|
- return self.domain.rrset_set
|
|
|
-
|
|
|
- def get_serializer_context(self):
|
|
|
- # noinspection PyUnresolvedReferences
|
|
|
- return {**super().get_serializer_context(), 'domain': self.domain}
|
|
|
-
|
|
|
- def perform_update(self, serializer):
|
|
|
- with PDNSChangeTracker():
|
|
|
- super().perform_update(serializer)
|
|
|
-
|
|
|
-
|
|
|
-class RRsetDetail(RRsetView, IdempotentDestroyMixin, generics.RetrieveUpdateDestroyAPIView):
|
|
|
-
|
|
|
- def get_object(self):
|
|
|
- queryset = self.filter_queryset(self.get_queryset())
|
|
|
-
|
|
|
- filter_kwargs = {k: self.kwargs[k] for k in ['subname', 'type']}
|
|
|
- obj = generics.get_object_or_404(queryset, **filter_kwargs)
|
|
|
-
|
|
|
- # May raise a permission denied
|
|
|
- self.check_object_permissions(self.request, obj)
|
|
|
-
|
|
|
- return obj
|
|
|
-
|
|
|
- def update(self, request, *args, **kwargs):
|
|
|
- response = super().update(request, *args, **kwargs)
|
|
|
-
|
|
|
- if response.data is None:
|
|
|
- response.status_code = 204
|
|
|
- return response
|
|
|
-
|
|
|
- def perform_destroy(self, instance):
|
|
|
- with PDNSChangeTracker():
|
|
|
- super().perform_destroy(instance)
|
|
|
-
|
|
|
-
|
|
|
-class RRsetList(RRsetView, EmptyPayloadMixin, generics.ListCreateAPIView, generics.UpdateAPIView):
|
|
|
-
|
|
|
- def get_queryset(self):
|
|
|
- rrsets = super().get_queryset()
|
|
|
-
|
|
|
- for filter_field in ('subname', 'type'):
|
|
|
- value = self.request.query_params.get(filter_field)
|
|
|
-
|
|
|
- if value is not None:
|
|
|
- # TODO consider moving this
|
|
|
- if filter_field == 'type' and value in models.RR_SET_TYPES_AUTOMATIC:
|
|
|
- raise PermissionDenied("You cannot tinker with the %s RRset." % value)
|
|
|
-
|
|
|
- rrsets = rrsets.filter(**{'%s__exact' % filter_field: value})
|
|
|
-
|
|
|
- return rrsets.all() # without .all(), cache is sometimes inconsistent with actual state in bulk tests. (Why?)
|
|
|
-
|
|
|
- def get_object(self):
|
|
|
- # For this view, the object we're operating on is the queryset that one can also GET. Serializing a queryset
|
|
|
- # is fine as per https://www.django-rest-framework.org/api-guide/serializers/#serializing-multiple-objects.
|
|
|
- # We skip checking object permissions here to avoid evaluating the queryset. The user can access all his RRsets
|
|
|
- # anyways.
|
|
|
- return self.filter_queryset(self.get_queryset())
|
|
|
-
|
|
|
- def get_serializer(self, *args, **kwargs):
|
|
|
- kwargs = kwargs.copy()
|
|
|
-
|
|
|
- if 'many' not in kwargs:
|
|
|
- if self.request.method in ['POST']:
|
|
|
- kwargs['many'] = isinstance(kwargs.get('data'), list)
|
|
|
- elif self.request.method in ['PATCH', 'PUT']:
|
|
|
- kwargs['many'] = True
|
|
|
-
|
|
|
- return super().get_serializer(*args, **kwargs)
|
|
|
-
|
|
|
- def perform_create(self, serializer):
|
|
|
- with PDNSChangeTracker():
|
|
|
- super().perform_create(serializer)
|
|
|
-
|
|
|
-
|
|
|
-class Root(APIView):
|
|
|
- def get(self, request, *args, **kwargs):
|
|
|
- if self.request.user.is_authenticated:
|
|
|
- routes = {
|
|
|
- 'account': {
|
|
|
- 'show': reverse('account', request=request),
|
|
|
- 'delete': reverse('account-delete', request=request),
|
|
|
- 'change-email': reverse('account-change-email', request=request),
|
|
|
- 'reset-password': reverse('account-reset-password', request=request),
|
|
|
- },
|
|
|
- 'logout': reverse('logout', request=request),
|
|
|
- 'tokens': reverse('token-list', request=request),
|
|
|
- 'domains': reverse('domain-list', request=request),
|
|
|
- }
|
|
|
- else:
|
|
|
- routes = {
|
|
|
- 'register': reverse('register', request=request),
|
|
|
- 'login': reverse('login', request=request),
|
|
|
- 'reset-password': reverse('account-reset-password', request=request),
|
|
|
- }
|
|
|
- return Response(routes)
|
|
|
-
|
|
|
-
|
|
|
-class DynDNS12UpdateView(generics.GenericAPIView):
|
|
|
- authentication_classes = (auth.TokenAuthentication, auth.BasicTokenAuthentication, auth.URLParamAuthentication,)
|
|
|
- permission_classes = (permissions.TokenHasDomainDynDNSPermission,)
|
|
|
- renderer_classes = [PlainTextRenderer]
|
|
|
- serializer_class = serializers.RRsetSerializer
|
|
|
- throttle_scope = 'dyndns'
|
|
|
-
|
|
|
- @property
|
|
|
- def throttle_scope_bucket(self):
|
|
|
- return self.domain.name
|
|
|
-
|
|
|
- def _find_ip(self, params, version):
|
|
|
- if version == 4:
|
|
|
- look_for = '.'
|
|
|
- elif version == 6:
|
|
|
- look_for = ':'
|
|
|
- else:
|
|
|
- raise Exception
|
|
|
-
|
|
|
- # Check URL parameters
|
|
|
- for p in params:
|
|
|
- if p in self.request.query_params:
|
|
|
- if not len(self.request.query_params[p]):
|
|
|
- return None
|
|
|
- if look_for in self.request.query_params[p]:
|
|
|
- return self.request.query_params[p]
|
|
|
-
|
|
|
- # Check remote IP address
|
|
|
- client_ip = self.request.META.get('REMOTE_ADDR')
|
|
|
- if look_for in client_ip:
|
|
|
- return client_ip
|
|
|
-
|
|
|
- # give up
|
|
|
- return None
|
|
|
-
|
|
|
- @cached_property
|
|
|
- def qname(self):
|
|
|
- # hostname parameter
|
|
|
- try:
|
|
|
- if self.request.query_params['hostname'] != 'YES':
|
|
|
- return self.request.query_params['hostname'].lower()
|
|
|
- except KeyError:
|
|
|
- pass
|
|
|
-
|
|
|
- # host_id parameter
|
|
|
- try:
|
|
|
- return self.request.query_params['host_id'].lower()
|
|
|
- except KeyError:
|
|
|
- pass
|
|
|
-
|
|
|
- # http basic auth username
|
|
|
- try:
|
|
|
- domain_name = base64.b64decode(
|
|
|
- get_authorization_header(self.request).decode().split(' ')[1].encode()).decode().split(':')[0]
|
|
|
- if domain_name and '@' not in domain_name:
|
|
|
- return domain_name.lower()
|
|
|
- except (binascii.Error, IndexError, UnicodeDecodeError):
|
|
|
- pass
|
|
|
-
|
|
|
- # username parameter
|
|
|
- try:
|
|
|
- return self.request.query_params['username'].lower()
|
|
|
- except KeyError:
|
|
|
- pass
|
|
|
-
|
|
|
- # only domain associated with this user account
|
|
|
- try:
|
|
|
- return self.request.user.domains.get().name
|
|
|
- except models.Domain.MultipleObjectsReturned:
|
|
|
- raise ValidationError(detail={
|
|
|
- "detail": "Request does not properly specify domain for update.",
|
|
|
- "code": "domain-unspecified"
|
|
|
- })
|
|
|
- except models.Domain.DoesNotExist:
|
|
|
- metrics.get('desecapi_dynDNS12_domain_not_found').inc()
|
|
|
- raise NotFound('nohost')
|
|
|
-
|
|
|
- @cached_property
|
|
|
- def domain(self):
|
|
|
- try:
|
|
|
- return models.Domain.objects.filter_qname(self.qname, owner=self.request.user).order_by('-name_length')[0]
|
|
|
- except (IndexError, ValueError):
|
|
|
- raise NotFound('nohost')
|
|
|
-
|
|
|
- @property
|
|
|
- def subname(self):
|
|
|
- return self.qname.rpartition(f'.{self.domain.name}')[0]
|
|
|
-
|
|
|
- def get_serializer_context(self):
|
|
|
- return {**super().get_serializer_context(), 'domain': self.domain, 'minimum_ttl': 60}
|
|
|
-
|
|
|
- def get_queryset(self):
|
|
|
- return self.domain.rrset_set.filter(subname=self.subname, type__in=['A', 'AAAA'])
|
|
|
-
|
|
|
- def get(self, request, *args, **kwargs):
|
|
|
- instances = self.get_queryset().all()
|
|
|
-
|
|
|
- ipv4 = self._find_ip(['myip', 'myipv4', 'ip'], version=4)
|
|
|
- ipv6 = self._find_ip(['myipv6', 'ipv6', 'myip', 'ip'], version=6)
|
|
|
-
|
|
|
- data = [
|
|
|
- {'type': 'A', 'subname': self.subname, 'ttl': 60, 'records': [ipv4] if ipv4 else []},
|
|
|
- {'type': 'AAAA', 'subname': self.subname, 'ttl': 60, 'records': [ipv6] if ipv6 else []},
|
|
|
- ]
|
|
|
-
|
|
|
- serializer = self.get_serializer(instances, data=data, many=True, partial=True)
|
|
|
- try:
|
|
|
- serializer.is_valid(raise_exception=True)
|
|
|
- except ValidationError as e:
|
|
|
- if any(
|
|
|
- any(
|
|
|
- getattr(non_field_error, 'code', '') == 'unique'
|
|
|
- for non_field_error
|
|
|
- in err.get('non_field_errors', [])
|
|
|
- )
|
|
|
- for err in e.detail
|
|
|
- ):
|
|
|
- raise ConcurrencyException from e
|
|
|
- raise e
|
|
|
-
|
|
|
- with PDNSChangeTracker():
|
|
|
- serializer.save()
|
|
|
-
|
|
|
- return Response('good', content_type='text/plain')
|
|
|
-
|
|
|
-
|
|
|
-class DonationList(generics.CreateAPIView):
|
|
|
- serializer_class = serializers.DonationSerializer
|
|
|
-
|
|
|
- def perform_create(self, serializer):
|
|
|
- instance = serializer.save()
|
|
|
-
|
|
|
- context = {
|
|
|
- 'donation': instance,
|
|
|
- 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
|
|
|
- 'creditorname': settings.SEPA['CREDITOR_NAME'],
|
|
|
- }
|
|
|
-
|
|
|
- # internal desec notification
|
|
|
- content_tmpl = get_template('emails/donation/desec-content.txt')
|
|
|
- subject_tmpl = get_template('emails/donation/desec-subject.txt')
|
|
|
- attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
|
|
|
- from_tmpl = get_template('emails/from.txt')
|
|
|
- email = EmailMessage(subject_tmpl.render(context),
|
|
|
- content_tmpl.render(context),
|
|
|
- from_tmpl.render(context),
|
|
|
- [settings.DEFAULT_FROM_EMAIL],
|
|
|
- attachments=[('jameica-directdebit.xml', attachment_tmpl.render(context), 'text/xml')],
|
|
|
- reply_to=[instance.email] if instance.email else None
|
|
|
- )
|
|
|
- email.send()
|
|
|
-
|
|
|
- # donor notification
|
|
|
- if instance.email:
|
|
|
- content_tmpl = get_template('emails/donation/donor-content.txt')
|
|
|
- subject_tmpl = get_template('emails/donation/donor-subject.txt')
|
|
|
- email = EmailMessage(subject_tmpl.render(context),
|
|
|
- content_tmpl.render(context),
|
|
|
- from_tmpl.render(context),
|
|
|
- [instance.email])
|
|
|
- email.send()
|
|
|
-
|
|
|
-
|
|
|
-class AccountCreateView(generics.CreateAPIView):
|
|
|
- serializer_class = serializers.RegisterAccountSerializer
|
|
|
- throttle_scope = 'account_management_active'
|
|
|
-
|
|
|
- def create(self, request, *args, **kwargs):
|
|
|
- # Create user and send trigger email verification.
|
|
|
- # Alternative would be to create user once email is verified, but this could be abused for bulk email.
|
|
|
-
|
|
|
- serializer = self.get_serializer(data=request.data)
|
|
|
- activation_required = settings.USER_ACTIVATION_REQUIRED
|
|
|
- try:
|
|
|
- serializer.is_valid(raise_exception=True)
|
|
|
- except ValidationError as e:
|
|
|
- # Hide existing users
|
|
|
- email_detail = e.detail.pop('email', [])
|
|
|
- email_detail = [detail for detail in email_detail if detail.code != 'unique']
|
|
|
- if email_detail:
|
|
|
- e.detail['email'] = email_detail
|
|
|
- if e.detail:
|
|
|
- raise e
|
|
|
- else:
|
|
|
- # create user
|
|
|
- user = serializer.save(is_active=None if activation_required else True)
|
|
|
-
|
|
|
- # send email if needed
|
|
|
- domain = serializer.validated_data.get('domain')
|
|
|
- if domain or activation_required:
|
|
|
- serializers.AuthenticatedActivateUserActionSerializer.build_and_save(user=user, domain=domain)
|
|
|
-
|
|
|
- # This request is unauthenticated, so don't expose whether we did anything.
|
|
|
- message = 'Welcome! Please check your mailbox.' if activation_required else 'Welcome!'
|
|
|
- return Response(data={'detail': message}, status=status.HTTP_202_ACCEPTED)
|
|
|
-
|
|
|
-
|
|
|
-class AccountView(generics.RetrieveUpdateAPIView):
|
|
|
- permission_classes = (IsAuthenticated, permissions.TokenNoDomainPolicy,)
|
|
|
- serializer_class = serializers.UserSerializer
|
|
|
- throttle_scope = 'account_management_passive'
|
|
|
-
|
|
|
- def get_object(self):
|
|
|
- return self.request.user
|
|
|
-
|
|
|
-
|
|
|
-class AccountDeleteView(APIView):
|
|
|
- authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
|
|
|
- permission_classes = (IsAuthenticated,)
|
|
|
- response_still_has_domains = Response(
|
|
|
- data={'detail': 'To delete your user account, first delete all of your domains.'},
|
|
|
- status=status.HTTP_409_CONFLICT,
|
|
|
- )
|
|
|
- throttle_scope = 'account_management_active'
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- if request.user.domains.exists():
|
|
|
- return self.response_still_has_domains
|
|
|
- serializers.AuthenticatedDeleteUserActionSerializer.build_and_save(user=request.user)
|
|
|
-
|
|
|
- return Response(data={'detail': 'Please check your mailbox for further account deletion instructions.'},
|
|
|
- status=status.HTTP_202_ACCEPTED)
|
|
|
-
|
|
|
-
|
|
|
-class AccountLoginView(generics.GenericAPIView):
|
|
|
- authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
|
|
|
- permission_classes = (IsAuthenticated,)
|
|
|
- serializer_class = serializers.TokenSerializer
|
|
|
- throttle_scope = 'account_management_passive'
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- user = self.request.user
|
|
|
- token = models.Token.objects.create(user=user, name="login", perm_manage_tokens=True,
|
|
|
- max_age=timedelta(days=7), max_unused_period=timedelta(hours=1))
|
|
|
- user_logged_in.send(sender=user.__class__, request=self.request, user=user)
|
|
|
-
|
|
|
- data = self.get_serializer(token, include_plain=True).data
|
|
|
- return Response(data)
|
|
|
-
|
|
|
-
|
|
|
-class AccountLogoutView(APIView, mixins.DestroyModelMixin):
|
|
|
- authentication_classes = (auth.TokenAuthentication,)
|
|
|
- permission_classes = (IsAuthenticated,)
|
|
|
- throttle_classes = [] # always allow people to log out
|
|
|
-
|
|
|
- def get_object(self):
|
|
|
- # self.request.auth contains the hashed key as it is stored in the database
|
|
|
- return models.Token.objects.get(key=self.request.auth)
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- return self.destroy(request, *args, **kwargs)
|
|
|
-
|
|
|
-
|
|
|
-class AccountChangeEmailView(generics.GenericAPIView):
|
|
|
- authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
|
|
|
- permission_classes = (IsAuthenticated,)
|
|
|
- serializer_class = serializers.ChangeEmailSerializer
|
|
|
- throttle_scope = 'account_management_active'
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- # Check password and extract `new_email` field
|
|
|
- serializer = self.get_serializer(data=request.data)
|
|
|
- serializer.is_valid(raise_exception=True)
|
|
|
- new_email = serializer.validated_data['new_email']
|
|
|
- serializers.AuthenticatedChangeEmailUserActionSerializer.build_and_save(user=request.user, new_email=new_email)
|
|
|
-
|
|
|
- # At this point, we know that we are talking to the user, so we can tell that we sent an email.
|
|
|
- return Response(data={'detail': 'Please check your mailbox to confirm email address change.'},
|
|
|
- status=status.HTTP_202_ACCEPTED)
|
|
|
-
|
|
|
-
|
|
|
-class AccountResetPasswordView(generics.GenericAPIView):
|
|
|
- serializer_class = serializers.ResetPasswordSerializer
|
|
|
- throttle_scope = 'account_management_active'
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- serializer = self.get_serializer(data=request.data)
|
|
|
- serializer.is_valid(raise_exception=True)
|
|
|
- try:
|
|
|
- email = serializer.validated_data['email']
|
|
|
- user = models.User.objects.get(email=email, is_active=True)
|
|
|
- except models.User.DoesNotExist:
|
|
|
- pass
|
|
|
- else:
|
|
|
- serializers.AuthenticatedResetPasswordUserActionSerializer.build_and_save(user=user)
|
|
|
-
|
|
|
- # This request is unauthenticated, so don't expose whether we did anything.
|
|
|
- return Response(data={'detail': 'Please check your mailbox for further password reset instructions. '
|
|
|
- 'If you did not receive an email, please contact support.'},
|
|
|
- status=status.HTTP_202_ACCEPTED)
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedActionView(generics.GenericAPIView):
|
|
|
- """
|
|
|
- Abstract class. Deserializes the given payload according the serializers specified by the view extending
|
|
|
- this class. If the `serializer.is_valid`, `act` is called on the action object.
|
|
|
-
|
|
|
- Summary of the behavior depending on HTTP method and Accept: header:
|
|
|
-
|
|
|
- GET POST other method
|
|
|
- Accept: text/html forward to `self.html_url` if any perform action 405 Method Not Allowed
|
|
|
- else HTTP 406 Not Acceptable perform action 405 Method Not Allowed
|
|
|
- """
|
|
|
- authenticated_action = None
|
|
|
- html_url = None # Redirect GET requests to this webapp GUI URL
|
|
|
- http_method_names = ['get', 'post'] # GET is for redirect only
|
|
|
- renderer_classes = [JSONRenderer, StaticHTMLRenderer]
|
|
|
- _authenticated_action = None
|
|
|
-
|
|
|
- @property
|
|
|
- def authenticated_action(self):
|
|
|
- if self._authenticated_action is None:
|
|
|
- serializer = self.get_serializer(data=self.request.data)
|
|
|
- serializer.is_valid(raise_exception=True)
|
|
|
- try:
|
|
|
- self._authenticated_action = serializer.Meta.model(**serializer.validated_data)
|
|
|
- except ValueError: # this happens when state cannot be verified
|
|
|
- ex = ValidationError('This action cannot be carried out because another operation has been performed, '
|
|
|
- 'invalidating this one. (Are you trying to perform this action twice?)')
|
|
|
- ex.status_code = status.HTTP_409_CONFLICT
|
|
|
- raise ex
|
|
|
- return self._authenticated_action
|
|
|
-
|
|
|
- @property
|
|
|
- def authentication_classes(self):
|
|
|
- # This prevents both auth action code evaluation and user-specific throttling when we only want a redirect
|
|
|
- return () if self.request.method in SAFE_METHODS else (auth.AuthenticatedBasicUserActionAuthentication,)
|
|
|
-
|
|
|
- @property
|
|
|
- def permission_classes(self):
|
|
|
- return () if self.request.method in SAFE_METHODS else (permissions.IsActiveUser,)
|
|
|
-
|
|
|
- @property
|
|
|
- def throttle_scope(self):
|
|
|
- return 'account_management_passive' if self.request.method in SAFE_METHODS else 'account_management_active'
|
|
|
-
|
|
|
- def get_serializer_context(self):
|
|
|
- return {
|
|
|
- **super().get_serializer_context(),
|
|
|
- 'code': self.kwargs['code'],
|
|
|
- 'validity_period': self.get_serializer_class().validity_period,
|
|
|
- }
|
|
|
-
|
|
|
- def get(self, request, *args, **kwargs):
|
|
|
- # Redirect browsers to frontend if available
|
|
|
- is_redirect = (request.accepted_renderer.format == 'html') and self.html_url is not None
|
|
|
- if is_redirect:
|
|
|
- # Careful: This can generally lead to an open redirect if values contain slashes!
|
|
|
- # However, it cannot happen for Django view kwargs.
|
|
|
- return redirect(self.html_url.format(**kwargs))
|
|
|
- else:
|
|
|
- raise NotAcceptable
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- self.authenticated_action.act()
|
|
|
- return Response(status=status.HTTP_202_ACCEPTED)
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedChangeOutreachPreferenceUserActionView(AuthenticatedActionView):
|
|
|
- html_url = '/confirm/change-outreach-preference/{code}/'
|
|
|
- serializer_class = serializers.AuthenticatedChangeOutreachPreferenceUserActionSerializer
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- super().post(request, *args, **kwargs)
|
|
|
- return Response({'detail': 'Thank you! We have recorded that you would not like to receive outreach messages.'})
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedActivateUserActionView(AuthenticatedActionView):
|
|
|
- html_url = '/confirm/activate-account/{code}/'
|
|
|
- permission_classes = () # don't require that user is activated already
|
|
|
- serializer_class = serializers.AuthenticatedActivateUserActionSerializer
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- super().post(request, *args, **kwargs)
|
|
|
- if not self.authenticated_action.domain:
|
|
|
- return self._finalize_without_domain()
|
|
|
- else:
|
|
|
- domain = self._create_domain()
|
|
|
- return self._finalize_with_domain(domain)
|
|
|
-
|
|
|
- def _create_domain(self):
|
|
|
- serializer = serializers.DomainSerializer(
|
|
|
- data={'name': self.authenticated_action.domain},
|
|
|
- context=self.get_serializer_context()
|
|
|
- )
|
|
|
- try:
|
|
|
- serializer.is_valid(raise_exception=True)
|
|
|
- except ValidationError as e: # e.g. domain name unavailable
|
|
|
- self.request.user.delete()
|
|
|
- reasons = ', '.join([detail.code for detail in e.detail.get('name', [])])
|
|
|
- raise ValidationError(
|
|
|
- f'The requested domain {self.authenticated_action.domain} could not be registered (reason: {reasons}). '
|
|
|
- f'Please start over and sign up again.'
|
|
|
- )
|
|
|
- # TODO the following line is subject to race condition and can fail, as for the domain name, we have that
|
|
|
- # time-of-check != time-of-action
|
|
|
- return PDNSChangeTracker.track(lambda: serializer.save(owner=self.request.user))
|
|
|
-
|
|
|
- def _finalize_without_domain(self):
|
|
|
- if not is_password_usable(self.request.user.password):
|
|
|
- serializers.AuthenticatedResetPasswordUserActionSerializer.build_and_save(user=self.request.user)
|
|
|
- return Response({'detail': 'Success! We sent you instructions on how to set your password.'})
|
|
|
- return Response({'detail': 'Success! Your account has been activated, and you can now log in.'})
|
|
|
-
|
|
|
- def _finalize_with_domain(self, domain):
|
|
|
- if domain.is_locally_registrable:
|
|
|
- # TODO the following line raises Domain.DoesNotExist under unknown conditions
|
|
|
- PDNSChangeTracker.track(lambda: DomainViewSet.auto_delegate(domain))
|
|
|
- token = models.Token.objects.create(user=domain.owner, name='dyndns')
|
|
|
- return Response({
|
|
|
- 'detail': 'Success! Here is the password ("token") to configure your router (or any other dynDNS '
|
|
|
- 'client). This password is different from your account password for security reasons.',
|
|
|
- 'domain': serializers.DomainSerializer(domain).data,
|
|
|
- **serializers.TokenSerializer(token, include_plain=True).data,
|
|
|
- })
|
|
|
- else:
|
|
|
- return Response({
|
|
|
- 'detail': 'Success! Please check the docs for the next steps, https://desec.readthedocs.io/.',
|
|
|
- 'domain': serializers.DomainSerializer(domain, include_keys=True).data,
|
|
|
- })
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedChangeEmailUserActionView(AuthenticatedActionView):
|
|
|
- html_url = '/confirm/change-email/{code}/'
|
|
|
- serializer_class = serializers.AuthenticatedChangeEmailUserActionSerializer
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- super().post(request, *args, **kwargs)
|
|
|
- return Response({
|
|
|
- 'detail': f'Success! Your email address has been changed to {self.authenticated_action.user.email}.'
|
|
|
- })
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedConfirmAccountUserActionView(AuthenticatedActionView):
|
|
|
- html_url = '/confirm/confirm-account/{code}'
|
|
|
- serializer_class = serializers.AuthenticatedConfirmAccountUserActionSerializer
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- super().post(request, *args, **kwargs)
|
|
|
- return Response({'detail': 'Success! Your account status has been confirmed.'})
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedResetPasswordUserActionView(AuthenticatedActionView):
|
|
|
- html_url = '/confirm/reset-password/{code}/'
|
|
|
- serializer_class = serializers.AuthenticatedResetPasswordUserActionSerializer
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- super().post(request, *args, **kwargs)
|
|
|
- return Response({'detail': 'Success! Your password has been changed.'})
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedDeleteUserActionView(AuthenticatedActionView):
|
|
|
- html_url = '/confirm/delete-account/{code}/'
|
|
|
- serializer_class = serializers.AuthenticatedDeleteUserActionSerializer
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- if self.request.user.domains.exists():
|
|
|
- return AccountDeleteView.response_still_has_domains
|
|
|
- super().post(request, *args, **kwargs)
|
|
|
- return Response({'detail': 'All your data has been deleted. Bye bye, see you soon! <3'})
|
|
|
-
|
|
|
-
|
|
|
-class AuthenticatedRenewDomainBasicUserActionView(AuthenticatedActionView):
|
|
|
- html_url = '/confirm/renew-domain/{code}/'
|
|
|
- serializer_class = serializers.AuthenticatedRenewDomainBasicUserActionSerializer
|
|
|
-
|
|
|
- def post(self, request, *args, **kwargs):
|
|
|
- super().post(request, *args, **kwargs)
|
|
|
- return Response({'detail': f'We recorded that your domain {self.authenticated_action.domain} is still in use.'})
|
|
|
-
|
|
|
-
|
|
|
-class CaptchaView(generics.CreateAPIView):
|
|
|
- serializer_class = serializers.CaptchaSerializer
|
|
|
- throttle_scope = 'account_management_passive'
|