import base64 import binascii from datetime import timedelta from functools import cached_property import django.core.exceptions from django.conf import settings from django.contrib.auth import user_logged_in from django.contrib.auth.hashers import is_password_usable from django.core.cache import cache from django.core.mail import EmailMessage from django.http import Http404 from django.shortcuts import redirect from django.template.loader import get_template from rest_framework import generics, mixins, status, viewsets from rest_framework.authentication import get_authorization_header from rest_framework.exceptions import (NotAcceptable, NotFound, PermissionDenied, ValidationError) from rest_framework.permissions import IsAuthenticated, SAFE_METHODS from rest_framework.renderers import JSONRenderer, StaticHTMLRenderer from rest_framework.response import Response from rest_framework.reverse import reverse from rest_framework.settings import api_settings from rest_framework.views import APIView import desecapi.authentication as auth from desecapi import metrics, models, permissions, serializers from desecapi.exceptions import ConcurrencyException from desecapi.pdns import get_serials from desecapi.pdns_change_tracker import PDNSChangeTracker from desecapi.renderers import PlainTextRenderer class EmptyPayloadMixin: def initialize_request(self, request, *args, **kwargs): # noinspection PyUnresolvedReferences request = super().initialize_request(request, *args, **kwargs) try: no_data = request.stream is None except: no_data = True if no_data: # In this case, data and files are both empty, so we can set request.data=None (instead of the default {}). # This allows distinguishing missing payload from empty dict payload. # See https://github.com/encode/django-rest-framework/pull/7195 request._full_data = None return request class IdempotentDestroyMixin: def destroy(self, request, *args, **kwargs): try: # noinspection PyUnresolvedReferences super().destroy(request, *args, **kwargs) except Http404: pass return Response(status=status.HTTP_204_NO_CONTENT) class TokenViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet): serializer_class = serializers.TokenSerializer permission_classes = (IsAuthenticated, permissions.HasManageTokensPermission,) throttle_scope = 'account_management_passive' def get_queryset(self): return self.request.user.token_set.all() def get_serializer(self, *args, **kwargs): # When creating a new token, return the plaintext representation if self.action == 'create': kwargs.setdefault('include_plain', True) return super().get_serializer(*args, **kwargs) def perform_create(self, serializer): serializer.save(user=self.request.user) class DomainViewSet(IdempotentDestroyMixin, mixins.CreateModelMixin, mixins.RetrieveModelMixin, mixins.DestroyModelMixin, mixins.ListModelMixin, viewsets.GenericViewSet): serializer_class = serializers.DomainSerializer lookup_field = 'name' lookup_value_regex = r'[^/]+' @property def permission_classes(self): ret = [IsAuthenticated, permissions.IsOwner] if self.action == 'create': ret.append(permissions.WithinDomainLimit) if self.request.method not in SAFE_METHODS: ret.append(permissions.TokenNoDomainPolicy) return ret @property def throttle_scope(self): return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_domains' @property def pagination_class(self): # Turn off pagination when filtering for covered qname, as pagination would re-order by `created` (not what we # want here) after taking a slice (that's forbidden anyway). But, we don't need pagination in this case anyways. if 'owns_qname' in self.request.query_params: return None else: return api_settings.DEFAULT_PAGINATION_CLASS def get_queryset(self): qs = self.request.user.domains owns_qname = self.request.query_params.get('owns_qname') if owns_qname is not None: qs = qs.filter_qname(owns_qname).order_by('-name_length')[:1] return qs def get_serializer(self, *args, **kwargs): include_keys = (self.action in ['create', 'retrieve']) return super().get_serializer(*args, include_keys=include_keys, **kwargs) def perform_create(self, serializer): with PDNSChangeTracker(): domain = serializer.save(owner=self.request.user) # TODO this line raises if the local public suffix is not in our database! PDNSChangeTracker.track(lambda: self.auto_delegate(domain)) @staticmethod def auto_delegate(domain: models.Domain): if domain.is_locally_registrable: parent_domain = models.Domain.objects.get(name=domain.parent_domain_name) parent_domain.update_delegation(domain) def perform_destroy(self, instance: models.Domain): with PDNSChangeTracker(): instance.delete() if instance.is_locally_registrable: parent_domain = models.Domain.objects.get(name=instance.parent_domain_name) with PDNSChangeTracker(): parent_domain.update_delegation(instance) class TokenPoliciesRoot(APIView): permission_classes = [ IsAuthenticated, permissions.HasManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken, ] def get(self, request, *args, **kwargs): return Response({'domain': reverse('token_domain_policies-list', request=request, kwargs=kwargs)}) class TokenDomainPolicyViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet): lookup_field = 'domain__name' lookup_value_regex = DomainViewSet.lookup_value_regex pagination_class = None serializer_class = serializers.TokenDomainPolicySerializer throttle_scope = 'account_management_passive' @property def permission_classes(self): ret = [IsAuthenticated] if self.request.method in SAFE_METHODS: ret.append(permissions.HasManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken) else: ret.append(permissions.HasManageTokensPermission) return ret def dispatch(self, request, *args, **kwargs): # map default policy onto domain_id IS NULL lookup_url_kwarg = self.lookup_url_kwarg or self.lookup_field try: if kwargs[lookup_url_kwarg] == 'default': kwargs[lookup_url_kwarg] = None except KeyError: pass return super().dispatch(request, *args, **kwargs) def get_queryset(self): return models.TokenDomainPolicy.objects.filter(token_id=self.kwargs['token_id'], token__user=self.request.user) def perform_destroy(self, instance): try: super().perform_destroy(instance) except django.core.exceptions.ValidationError as exc: raise ValidationError(exc.message_dict, code='precedence') class SerialListView(APIView): permission_classes = (permissions.IsVPNClient,) throttle_classes = [] # don't break slaves when they ask too often (our cached responses are cheap) def get(self, request, *args, **kwargs): key = 'desecapi.views.serials' serials = cache.get(key) if serials is None: serials = get_serials() cache.get_or_set(key, serials, timeout=15) return Response(serials) class RRsetView: serializer_class = serializers.RRsetSerializer permission_classes = (IsAuthenticated, permissions.IsDomainOwner, permissions.TokenHasDomainRRsetsPermission,) @property def domain(self): try: return self.request.user.domains.get(name=self.kwargs['name']) except models.Domain.DoesNotExist: raise Http404 @property def throttle_scope(self): return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_rrsets' @property def throttle_scope_bucket(self): # Note: bucket should remain constant even when domain is recreated return None if self.request.method in SAFE_METHODS else self.kwargs['name'] def get_queryset(self): return self.domain.rrset_set def get_serializer_context(self): # noinspection PyUnresolvedReferences return {**super().get_serializer_context(), 'domain': self.domain} def perform_update(self, serializer): with PDNSChangeTracker(): super().perform_update(serializer) class RRsetDetail(RRsetView, IdempotentDestroyMixin, generics.RetrieveUpdateDestroyAPIView): def get_object(self): queryset = self.filter_queryset(self.get_queryset()) filter_kwargs = {k: self.kwargs[k] for k in ['subname', 'type']} obj = generics.get_object_or_404(queryset, **filter_kwargs) # May raise a permission denied self.check_object_permissions(self.request, obj) return obj def update(self, request, *args, **kwargs): response = super().update(request, *args, **kwargs) if response.data is None: response.status_code = 204 return response def perform_destroy(self, instance): with PDNSChangeTracker(): super().perform_destroy(instance) class RRsetList(RRsetView, EmptyPayloadMixin, generics.ListCreateAPIView, generics.UpdateAPIView): def get_queryset(self): rrsets = super().get_queryset() for filter_field in ('subname', 'type'): value = self.request.query_params.get(filter_field) if value is not None: # TODO consider moving this if filter_field == 'type' and value in models.RR_SET_TYPES_AUTOMATIC: raise PermissionDenied("You cannot tinker with the %s RRset." % value) rrsets = rrsets.filter(**{'%s__exact' % filter_field: value}) return rrsets.all() # without .all(), cache is sometimes inconsistent with actual state in bulk tests. (Why?) def get_object(self): # For this view, the object we're operating on is the queryset that one can also GET. Serializing a queryset # is fine as per https://www.django-rest-framework.org/api-guide/serializers/#serializing-multiple-objects. # We skip checking object permissions here to avoid evaluating the queryset. The user can access all his RRsets # anyways. return self.filter_queryset(self.get_queryset()) def get_serializer(self, *args, **kwargs): kwargs = kwargs.copy() if 'many' not in kwargs: if self.request.method in ['POST']: kwargs['many'] = isinstance(kwargs.get('data'), list) elif self.request.method in ['PATCH', 'PUT']: kwargs['many'] = True return super().get_serializer(*args, **kwargs) def perform_create(self, serializer): with PDNSChangeTracker(): super().perform_create(serializer) class Root(APIView): def get(self, request, *args, **kwargs): if self.request.user.is_authenticated: routes = { 'account': { 'show': reverse('account', request=request), 'delete': reverse('account-delete', request=request), 'change-email': reverse('account-change-email', request=request), 'reset-password': reverse('account-reset-password', request=request), }, 'logout': reverse('logout', request=request), 'tokens': reverse('token-list', request=request), 'domains': reverse('domain-list', request=request), } else: routes = { 'register': reverse('register', request=request), 'login': reverse('login', request=request), 'reset-password': reverse('account-reset-password', request=request), } return Response(routes) class DynDNS12UpdateView(generics.GenericAPIView): authentication_classes = (auth.TokenAuthentication, auth.BasicTokenAuthentication, auth.URLParamAuthentication,) permission_classes = (permissions.TokenHasDomainDynDNSPermission,) renderer_classes = [PlainTextRenderer] serializer_class = serializers.RRsetSerializer throttle_scope = 'dyndns' @property def throttle_scope_bucket(self): return self.domain.name def _find_ip(self, params, version): if version == 4: look_for = '.' elif version == 6: look_for = ':' else: raise Exception # Check URL parameters for p in params: if p in self.request.query_params: if not len(self.request.query_params[p]): return None if look_for in self.request.query_params[p]: return self.request.query_params[p] # Check remote IP address client_ip = self.request.META.get('REMOTE_ADDR') if look_for in client_ip: return client_ip # give up return None @cached_property def qname(self): # hostname parameter try: if self.request.query_params['hostname'] != 'YES': return self.request.query_params['hostname'].lower() except KeyError: pass # host_id parameter try: return self.request.query_params['host_id'].lower() except KeyError: pass # http basic auth username try: domain_name = base64.b64decode( get_authorization_header(self.request).decode().split(' ')[1].encode()).decode().split(':')[0] if domain_name and '@' not in domain_name: return domain_name.lower() except (binascii.Error, IndexError, UnicodeDecodeError): pass # username parameter try: return self.request.query_params['username'].lower() except KeyError: pass # only domain associated with this user account try: return self.request.user.domains.get().name except models.Domain.MultipleObjectsReturned: raise ValidationError(detail={ "detail": "Request does not properly specify domain for update.", "code": "domain-unspecified" }) except models.Domain.DoesNotExist: metrics.get('desecapi_dynDNS12_domain_not_found').inc() raise NotFound('nohost') @cached_property def domain(self): try: return models.Domain.objects.filter_qname(self.qname, owner=self.request.user).order_by('-name_length')[0] except (IndexError, ValueError): raise NotFound('nohost') @property def subname(self): return self.qname.rpartition(f'.{self.domain.name}')[0] def get_serializer_context(self): return {**super().get_serializer_context(), 'domain': self.domain, 'minimum_ttl': 60} def get_queryset(self): return self.domain.rrset_set.filter(subname=self.subname, type__in=['A', 'AAAA']) def get(self, request, *args, **kwargs): instances = self.get_queryset().all() ipv4 = self._find_ip(['myip', 'myipv4', 'ip'], version=4) ipv6 = self._find_ip(['myipv6', 'ipv6', 'myip', 'ip'], version=6) data = [ {'type': 'A', 'subname': self.subname, 'ttl': 60, 'records': [ipv4] if ipv4 else []}, {'type': 'AAAA', 'subname': self.subname, 'ttl': 60, 'records': [ipv6] if ipv6 else []}, ] serializer = self.get_serializer(instances, data=data, many=True, partial=True) try: serializer.is_valid(raise_exception=True) except ValidationError as e: if any( any( getattr(non_field_error, 'code', '') == 'unique' for non_field_error in err.get('non_field_errors', []) ) for err in e.detail ): raise ConcurrencyException from e raise e with PDNSChangeTracker(): serializer.save() return Response('good', content_type='text/plain') class DonationList(generics.CreateAPIView): serializer_class = serializers.DonationSerializer def perform_create(self, serializer): instance = serializer.save() context = { 'donation': instance, 'creditoridentifier': settings.SEPA['CREDITOR_ID'], 'creditorname': settings.SEPA['CREDITOR_NAME'], } # internal desec notification content_tmpl = get_template('emails/donation/desec-content.txt') subject_tmpl = get_template('emails/donation/desec-subject.txt') attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt') from_tmpl = get_template('emails/from.txt') email = EmailMessage(subject_tmpl.render(context), content_tmpl.render(context), from_tmpl.render(context), [settings.DEFAULT_FROM_EMAIL], attachments=[('jameica-directdebit.xml', attachment_tmpl.render(context), 'text/xml')], reply_to=[instance.email] if instance.email else None ) email.send() # donor notification if instance.email: content_tmpl = get_template('emails/donation/donor-content.txt') subject_tmpl = get_template('emails/donation/donor-subject.txt') email = EmailMessage(subject_tmpl.render(context), content_tmpl.render(context), from_tmpl.render(context), [instance.email]) email.send() class AccountCreateView(generics.CreateAPIView): serializer_class = serializers.RegisterAccountSerializer throttle_scope = 'account_management_active' def create(self, request, *args, **kwargs): # Create user and send trigger email verification. # Alternative would be to create user once email is verified, but this could be abused for bulk email. serializer = self.get_serializer(data=request.data) activation_required = settings.USER_ACTIVATION_REQUIRED try: serializer.is_valid(raise_exception=True) except ValidationError as e: # Hide existing users email_detail = e.detail.pop('email', []) email_detail = [detail for detail in email_detail if detail.code != 'unique'] if email_detail: e.detail['email'] = email_detail if e.detail: raise e else: # create user user = serializer.save(is_active=None if activation_required else True) # send email if needed domain = serializer.validated_data.get('domain') if domain or activation_required: serializers.AuthenticatedActivateUserActionSerializer.build_and_save(user=user, domain=domain) # This request is unauthenticated, so don't expose whether we did anything. message = 'Welcome! Please check your mailbox.' if activation_required else 'Welcome!' return Response(data={'detail': message}, status=status.HTTP_202_ACCEPTED) class AccountView(generics.RetrieveUpdateAPIView): permission_classes = (IsAuthenticated, permissions.TokenNoDomainPolicy,) serializer_class = serializers.UserSerializer throttle_scope = 'account_management_passive' def get_object(self): return self.request.user class AccountDeleteView(APIView): authentication_classes = (auth.EmailPasswordPayloadAuthentication,) permission_classes = (IsAuthenticated,) response_still_has_domains = Response( data={'detail': 'To delete your user account, first delete all of your domains.'}, status=status.HTTP_409_CONFLICT, ) throttle_scope = 'account_management_active' def post(self, request, *args, **kwargs): if request.user.domains.exists(): return self.response_still_has_domains serializers.AuthenticatedDeleteUserActionSerializer.build_and_save(user=request.user) return Response(data={'detail': 'Please check your mailbox for further account deletion instructions.'}, status=status.HTTP_202_ACCEPTED) class AccountLoginView(generics.GenericAPIView): authentication_classes = (auth.EmailPasswordPayloadAuthentication,) permission_classes = (IsAuthenticated,) serializer_class = serializers.TokenSerializer throttle_scope = 'account_management_passive' def post(self, request, *args, **kwargs): user = self.request.user token = models.Token.objects.create(user=user, name="login", perm_manage_tokens=True, max_age=timedelta(days=7), max_unused_period=timedelta(hours=1)) user_logged_in.send(sender=user.__class__, request=self.request, user=user) data = self.get_serializer(token, include_plain=True).data return Response(data) class AccountLogoutView(APIView, mixins.DestroyModelMixin): authentication_classes = (auth.TokenAuthentication,) permission_classes = (IsAuthenticated,) throttle_classes = [] # always allow people to log out def get_object(self): # self.request.auth contains the hashed key as it is stored in the database return models.Token.objects.get(key=self.request.auth) def post(self, request, *args, **kwargs): return self.destroy(request, *args, **kwargs) class AccountChangeEmailView(generics.GenericAPIView): authentication_classes = (auth.EmailPasswordPayloadAuthentication,) permission_classes = (IsAuthenticated,) serializer_class = serializers.ChangeEmailSerializer throttle_scope = 'account_management_active' def post(self, request, *args, **kwargs): # Check password and extract `new_email` field serializer = self.get_serializer(data=request.data) serializer.is_valid(raise_exception=True) new_email = serializer.validated_data['new_email'] serializers.AuthenticatedChangeEmailUserActionSerializer.build_and_save(user=request.user, new_email=new_email) # At this point, we know that we are talking to the user, so we can tell that we sent an email. return Response(data={'detail': 'Please check your mailbox to confirm email address change.'}, status=status.HTTP_202_ACCEPTED) class AccountResetPasswordView(generics.GenericAPIView): serializer_class = serializers.ResetPasswordSerializer throttle_scope = 'account_management_active' def post(self, request, *args, **kwargs): serializer = self.get_serializer(data=request.data) serializer.is_valid(raise_exception=True) try: email = serializer.validated_data['email'] user = models.User.objects.get(email=email, is_active=True) except models.User.DoesNotExist: pass else: serializers.AuthenticatedResetPasswordUserActionSerializer.build_and_save(user=user) # This request is unauthenticated, so don't expose whether we did anything. return Response(data={'detail': 'Please check your mailbox for further password reset instructions. ' 'If you did not receive an email, please contact support.'}, status=status.HTTP_202_ACCEPTED) class AuthenticatedActionView(generics.GenericAPIView): """ Abstract class. Deserializes the given payload according the serializers specified by the view extending this class. If the `serializer.is_valid`, `act` is called on the action object. Summary of the behavior depending on HTTP method and Accept: header: GET POST other method Accept: text/html forward to `self.html_url` if any perform action 405 Method Not Allowed else HTTP 406 Not Acceptable perform action 405 Method Not Allowed """ authenticated_action = None html_url = None # Redirect GET requests to this webapp GUI URL http_method_names = ['get', 'post'] # GET is for redirect only renderer_classes = [JSONRenderer, StaticHTMLRenderer] _authenticated_action = None @property def authenticated_action(self): if self._authenticated_action is None: serializer = self.get_serializer(data=self.request.data) serializer.is_valid(raise_exception=True) try: self._authenticated_action = serializer.Meta.model(**serializer.validated_data) except ValueError: # this happens when state cannot be verified ex = ValidationError('This action cannot be carried out because another operation has been performed, ' 'invalidating this one. (Are you trying to perform this action twice?)') ex.status_code = status.HTTP_409_CONFLICT raise ex return self._authenticated_action @property def authentication_classes(self): # This prevents both auth action code evaluation and user-specific throttling when we only want a redirect return () if self.request.method in SAFE_METHODS else (auth.AuthenticatedBasicUserActionAuthentication,) @property def permission_classes(self): return () if self.request.method in SAFE_METHODS else (permissions.IsActiveUser,) @property def throttle_scope(self): return 'account_management_passive' if self.request.method in SAFE_METHODS else 'account_management_active' def get_serializer_context(self): return { **super().get_serializer_context(), 'code': self.kwargs['code'], 'validity_period': self.get_serializer_class().validity_period, } def get(self, request, *args, **kwargs): # Redirect browsers to frontend if available is_redirect = (request.accepted_renderer.format == 'html') and self.html_url is not None if is_redirect: # Careful: This can generally lead to an open redirect if values contain slashes! # However, it cannot happen for Django view kwargs. return redirect(self.html_url.format(**kwargs)) else: raise NotAcceptable def post(self, request, *args, **kwargs): self.authenticated_action.act() return Response(status=status.HTTP_202_ACCEPTED) class AuthenticatedChangeOutreachPreferenceUserActionView(AuthenticatedActionView): html_url = '/confirm/change-outreach-preference/{code}/' serializer_class = serializers.AuthenticatedChangeOutreachPreferenceUserActionSerializer def post(self, request, *args, **kwargs): super().post(request, *args, **kwargs) return Response({'detail': 'Thank you! We have recorded that you would not like to receive outreach messages.'}) class AuthenticatedActivateUserActionView(AuthenticatedActionView): html_url = '/confirm/activate-account/{code}/' permission_classes = () # don't require that user is activated already serializer_class = serializers.AuthenticatedActivateUserActionSerializer def post(self, request, *args, **kwargs): super().post(request, *args, **kwargs) if not self.authenticated_action.domain: return self._finalize_without_domain() else: domain = self._create_domain() return self._finalize_with_domain(domain) def _create_domain(self): serializer = serializers.DomainSerializer( data={'name': self.authenticated_action.domain}, context=self.get_serializer_context() ) try: serializer.is_valid(raise_exception=True) except ValidationError as e: # e.g. domain name unavailable self.request.user.delete() reasons = ', '.join([detail.code for detail in e.detail.get('name', [])]) raise ValidationError( f'The requested domain {self.authenticated_action.domain} could not be registered (reason: {reasons}). ' f'Please start over and sign up again.' ) # TODO the following line is subject to race condition and can fail, as for the domain name, we have that # time-of-check != time-of-action return PDNSChangeTracker.track(lambda: serializer.save(owner=self.request.user)) def _finalize_without_domain(self): if not is_password_usable(self.request.user.password): serializers.AuthenticatedResetPasswordUserActionSerializer.build_and_save(user=self.request.user) return Response({'detail': 'Success! We sent you instructions on how to set your password.'}) return Response({'detail': 'Success! Your account has been activated, and you can now log in.'}) def _finalize_with_domain(self, domain): if domain.is_locally_registrable: # TODO the following line raises Domain.DoesNotExist under unknown conditions PDNSChangeTracker.track(lambda: DomainViewSet.auto_delegate(domain)) token = models.Token.objects.create(user=domain.owner, name='dyndns') return Response({ 'detail': 'Success! Here is the password ("token") to configure your router (or any other dynDNS ' 'client). This password is different from your account password for security reasons.', 'domain': serializers.DomainSerializer(domain).data, **serializers.TokenSerializer(token, include_plain=True).data, }) else: return Response({ 'detail': 'Success! Please check the docs for the next steps, https://desec.readthedocs.io/.', 'domain': serializers.DomainSerializer(domain, include_keys=True).data, }) class AuthenticatedChangeEmailUserActionView(AuthenticatedActionView): html_url = '/confirm/change-email/{code}/' serializer_class = serializers.AuthenticatedChangeEmailUserActionSerializer def post(self, request, *args, **kwargs): super().post(request, *args, **kwargs) return Response({ 'detail': f'Success! Your email address has been changed to {self.authenticated_action.user.email}.' }) class AuthenticatedConfirmAccountUserActionView(AuthenticatedActionView): html_url = '/confirm/confirm-account/{code}' serializer_class = serializers.AuthenticatedConfirmAccountUserActionSerializer def post(self, request, *args, **kwargs): super().post(request, *args, **kwargs) return Response({'detail': 'Success! Your account status has been confirmed.'}) class AuthenticatedResetPasswordUserActionView(AuthenticatedActionView): html_url = '/confirm/reset-password/{code}/' serializer_class = serializers.AuthenticatedResetPasswordUserActionSerializer def post(self, request, *args, **kwargs): super().post(request, *args, **kwargs) return Response({'detail': 'Success! Your password has been changed.'}) class AuthenticatedDeleteUserActionView(AuthenticatedActionView): html_url = '/confirm/delete-account/{code}/' serializer_class = serializers.AuthenticatedDeleteUserActionSerializer def post(self, request, *args, **kwargs): if self.request.user.domains.exists(): return AccountDeleteView.response_still_has_domains super().post(request, *args, **kwargs) return Response({'detail': 'All your data has been deleted. Bye bye, see you soon! <3'}) class AuthenticatedRenewDomainBasicUserActionView(AuthenticatedActionView): html_url = '/confirm/renew-domain/{code}/' serializer_class = serializers.AuthenticatedRenewDomainBasicUserActionSerializer def post(self, request, *args, **kwargs): super().post(request, *args, **kwargs) return Response({'detail': f'We recorded that your domain {self.authenticated_action.domain} is still in use.'}) class CaptchaView(generics.CreateAPIView): serializer_class = serializers.CaptchaSerializer throttle_scope = 'account_management_passive'