views.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. from __future__ import unicode_literals
  2. from django.core.mail import EmailMessage
  3. from desecapi.models import Domain, User, RRset, RR
  4. from desecapi.serializers import (
  5. DomainSerializer, RRsetSerializer, DonationSerializer)
  6. from rest_framework import generics
  7. from desecapi.permissions import IsOwner, IsDomainOwner
  8. from rest_framework import permissions
  9. from django.http import Http404, HttpResponseRedirect
  10. from rest_framework.views import APIView
  11. from rest_framework.response import Response
  12. from rest_framework.reverse import reverse
  13. from rest_framework.authentication import (
  14. TokenAuthentication, get_authorization_header)
  15. from rest_framework.renderers import StaticHTMLRenderer
  16. from dns import resolver
  17. from django.template.loader import get_template
  18. import desecapi.authentication as auth
  19. import base64
  20. from desecapi import settings
  21. from rest_framework.exceptions import (
  22. APIException, MethodNotAllowed, PermissionDenied, ValidationError)
  23. import django.core.exceptions
  24. from djoser import views, signals
  25. from rest_framework import status
  26. from datetime import timedelta
  27. from django.utils import timezone
  28. from desecapi.forms import UnlockForm
  29. from django.shortcuts import render
  30. from django.db.models import Q
  31. from desecapi.emails import send_account_lock_email, send_token_email
  32. import re
  33. import ipaddress, os
  34. patternDyn = re.compile(r'^[A-Za-z-][A-Za-z0-9_-]*\.dedyn\.io$')
  35. patternNonDyn = re.compile(r'^([A-Za-z0-9-][A-Za-z0-9_-]*\.)+[A-Za-z]+$')
  36. def get_client_ip(request):
  37. return request.META.get('REMOTE_ADDR')
  38. class DomainList(generics.ListCreateAPIView):
  39. serializer_class = DomainSerializer
  40. permission_classes = (permissions.IsAuthenticated, IsOwner,)
  41. def get_queryset(self):
  42. return Domain.objects.filter(owner=self.request.user.pk)
  43. def perform_create(self, serializer):
  44. pattern = patternDyn if self.request.user.dyn else patternNonDyn
  45. if pattern.match(serializer.validated_data['name']) is None:
  46. ex = ValidationError(detail={"detail": "This domain name is not well-formed, by policy.", "code": "domain-illformed"})
  47. ex.status_code = status.HTTP_409_CONFLICT
  48. raise ex
  49. # Generate a list containing this and all higher-level domain names
  50. domain_name = serializer.validated_data['name']
  51. domain_parts = domain_name.split('.')
  52. domain_list = {'.'.join(domain_parts[i:]) for i in range(1, len(domain_parts))}
  53. # Remove public suffixes and then use this list to control registration
  54. public_suffixes = {'dedyn.io'}
  55. domain_list = domain_list - public_suffixes
  56. queryset = Domain.objects.filter(Q(name=domain_name) | (Q(name__in=domain_list) & ~Q(owner=self.request.user)))
  57. if queryset.exists():
  58. ex = ValidationError(detail={"detail": "This domain name is unavailable.", "code": "domain-unavailable"})
  59. ex.status_code = status.HTTP_409_CONFLICT
  60. raise ex
  61. if self.request.user.limit_domains is not None and self.request.user.domains.count() >= self.request.user.limit_domains:
  62. ex = ValidationError(detail={"detail": "You reached the maximum number of domains allowed for your account.", "code": "domain-limit"})
  63. ex.status_code = status.HTTP_403_FORBIDDEN
  64. raise ex
  65. try:
  66. obj = serializer.save(owner=self.request.user)
  67. except Exception as e:
  68. if str(e).endswith(' already exists'):
  69. ex = ValidationError(detail={"detail": "This domain name is unavailable.", "code": "domain-unavailable"})
  70. ex.status_code = status.HTTP_409_CONFLICT
  71. raise ex
  72. else:
  73. raise e
  74. def sendDynDnsEmail(domain):
  75. content_tmpl = get_template('emails/domain-dyndns/content.txt')
  76. subject_tmpl = get_template('emails/domain-dyndns/subject.txt')
  77. from_tmpl = get_template('emails/from.txt')
  78. context = {
  79. 'domain': domain.name,
  80. 'url': 'https://update.dedyn.io/',
  81. 'username': domain.name,
  82. 'password': self.request.auth.key
  83. }
  84. email = EmailMessage(subject_tmpl.render(context),
  85. content_tmpl.render(context),
  86. from_tmpl.render(context),
  87. [self.request.user.email])
  88. email.send()
  89. if obj.name.endswith('.dedyn.io'):
  90. sendDynDnsEmail(obj)
  91. class DomainDetail(generics.RetrieveUpdateDestroyAPIView):
  92. serializer_class = DomainSerializer
  93. permission_classes = (permissions.IsAuthenticated, IsOwner,)
  94. def delete(self, request, *args, **kwargs):
  95. try:
  96. super().delete(request, *args, **kwargs)
  97. except Http404:
  98. pass
  99. return Response(status=status.HTTP_204_NO_CONTENT)
  100. def get_queryset(self):
  101. return Domain.objects.filter(owner=self.request.user.pk)
  102. def update(self, request, *args, **kwargs):
  103. try:
  104. return super().update(request, *args, **kwargs)
  105. except django.core.exceptions.ValidationError as e:
  106. ex = ValidationError(detail={"detail": str(e)})
  107. ex.status_code = status.HTTP_409_CONFLICT
  108. raise ex
  109. class DomainDetailByName(DomainDetail):
  110. lookup_field = 'name'
  111. class RRsetDetail(generics.RetrieveUpdateDestroyAPIView):
  112. lookup_field = 'type'
  113. serializer_class = RRsetSerializer
  114. permission_classes = (permissions.IsAuthenticated, IsDomainOwner,)
  115. def delete(self, request, *args, **kwargs):
  116. if request.user.captcha_required:
  117. detail = "You cannot delete RRset while your account is locked."
  118. raise PermissionDenied(detail)
  119. try:
  120. super().delete(request, *args, **kwargs)
  121. except Http404:
  122. pass
  123. return Response(status=status.HTTP_204_NO_CONTENT)
  124. def get_queryset(self):
  125. name = self.kwargs['name']
  126. subname = self.kwargs['subname'].replace('=2F', '/')
  127. type_ = self.kwargs['type']
  128. if type_ in RRset.RESTRICTED_TYPES:
  129. raise PermissionDenied("You cannot tinker with the %s RRset." % type_)
  130. return RRset.objects.filter(
  131. domain__owner=self.request.user.pk,
  132. domain__name=name, subname=subname, type=type_)
  133. def update(self, request, *args, **kwargs):
  134. if request.data.get('records') == []:
  135. return self.delete(request, *args, **kwargs)
  136. try:
  137. return super().update(request, *args, **kwargs)
  138. except django.core.exceptions.ValidationError as e:
  139. ex = ValidationError(detail=e.message_dict)
  140. ex.status_code = status.HTTP_409_CONFLICT
  141. raise ex
  142. class RRsetList(generics.ListCreateAPIView):
  143. authentication_classes = (TokenAuthentication, auth.IPAuthentication,)
  144. serializer_class = RRsetSerializer
  145. permission_classes = (permissions.IsAuthenticated, IsDomainOwner,)
  146. def get_queryset(self):
  147. name = self.kwargs['name']
  148. rrsets = self.request.user.domains.get(name=name).rrset_set
  149. for filter_field in ('subname', 'type'):
  150. value = self.request.query_params.get(filter_field)
  151. if value is not None:
  152. if filter_field == 'type' and value in RRset.RESTRICTED_TYPES:
  153. raise PermissionDenied("You cannot tinker with the %s RRset." % value)
  154. rrsets = rrsets.filter(**{'%s__exact' % filter_field: value})
  155. return rrsets
  156. def create(self, request, *args, **kwargs):
  157. try:
  158. return super().create(request, *args, **kwargs)
  159. except Domain.DoesNotExist:
  160. raise Http404
  161. except django.core.exceptions.ValidationError as e:
  162. ex = ValidationError(detail=e.message_dict)
  163. ex.status_code = status.HTTP_422_UNPROCESSABLE_ENTITY
  164. raise ex
  165. def perform_create(self, serializer):
  166. # Associate RRset with proper domain
  167. domain = self.request.user.domains.get(name=self.kwargs['name'])
  168. kwargs = {'domain': domain}
  169. # If this RRset is new and a subname has not been given, set it empty
  170. #
  171. # Notes:
  172. # - We don't use default='' in the serializer so that during PUT, the
  173. # subname value is retained if omitted.)
  174. # - Don't use kwargs['subname'] = self.request.data.get('subname', ''),
  175. # giving preference to what's in serializer.validated_data at this point
  176. if self.request.method == 'POST' and self.request.data.get('subname') is None:
  177. kwargs['subname'] = ''
  178. serializer.save(**kwargs)
  179. def get(self, request, *args, **kwargs):
  180. name = self.kwargs['name']
  181. if not Domain.objects.filter(name=name, owner=self.request.user.pk):
  182. raise Http404
  183. return super().get(request, *args, **kwargs)
  184. class Root(APIView):
  185. def get(self, request, format=None):
  186. if self.request.user and self.request.user.is_authenticated():
  187. return Response({
  188. 'domains': reverse('domain-list'),
  189. 'user': reverse('user'),
  190. 'logout': reverse('token-destroy'), # TODO change interface to token-destroy, too?
  191. })
  192. else:
  193. return Response({
  194. 'login': reverse('token-create', request=request, format=format), # TODO change interface to token-create, too?
  195. 'register': reverse('register', request=request, format=format),
  196. })
  197. class DnsQuery(APIView):
  198. def get(self, request, format=None):
  199. desecio = resolver.Resolver()
  200. if not 'domain' in request.GET:
  201. return Response(status=status.HTTP_400_BAD_REQUEST)
  202. domain = str(request.GET['domain'])
  203. def getRecords(domain, type_):
  204. records = []
  205. try:
  206. for ip in desecio.query(domain, type_):
  207. records.append(str(ip))
  208. except resolver.NoAnswer:
  209. return []
  210. except resolver.NoNameservers:
  211. return []
  212. except resolver.NXDOMAIN:
  213. return []
  214. return records
  215. # find currently active NS records
  216. nsrecords = getRecords(domain, 'NS')
  217. # find desec.io nameserver IP address with standard nameserver
  218. ips = desecio.query('ns2.desec.io')
  219. desecio.nameservers = []
  220. for ip in ips:
  221. desecio.nameservers.append(str(ip))
  222. # query desec.io nameserver for A and AAAA records
  223. arecords = getRecords(domain, 'A')
  224. aaaarecords = getRecords(domain, 'AAAA')
  225. return Response({
  226. 'domain': domain,
  227. 'ns': nsrecords,
  228. 'a': arecords,
  229. 'aaaa': aaaarecords,
  230. '_nameserver': desecio.nameservers
  231. })
  232. class DynDNS12Update(APIView):
  233. authentication_classes = (TokenAuthentication, auth.BasicTokenAuthentication, auth.URLParamAuthentication,)
  234. renderer_classes = [StaticHTMLRenderer]
  235. def findDomain(self, request):
  236. def findDomainname(request):
  237. # 1. hostname parameter
  238. if 'hostname' in request.query_params and request.query_params['hostname'] != 'YES':
  239. return request.query_params['hostname']
  240. # 2. host_id parameter
  241. if 'host_id' in request.query_params:
  242. return request.query_params['host_id']
  243. # 3. http basic auth username
  244. try:
  245. domainname = base64.b64decode(get_authorization_header(request).decode().split(' ')[1].encode()).decode().split(':')[0]
  246. if domainname:
  247. return domainname
  248. except IndexError:
  249. pass
  250. except UnicodeDecodeError:
  251. pass
  252. # 4. username parameter
  253. if 'username' in request.query_params:
  254. return request.query_params['username']
  255. # 5. only domain associated with this user account
  256. if len(request.user.domains.all()) == 1:
  257. return request.user.domains.all()[0].name
  258. if len(request.user.domains.all()) > 1:
  259. ex = ValidationError(detail={"detail": "Request does not specify domain unambiguously.", "code": "domain-ambiguous"})
  260. ex.status_code = status.HTTP_409_CONFLICT
  261. raise ex
  262. return None
  263. name = findDomainname(request)
  264. try:
  265. return self.request.user.domains.get(name=name)
  266. except Domain.DoesNotExist:
  267. return None
  268. def findIP(self, request, params, version=4):
  269. if version == 4:
  270. lookfor = '.'
  271. elif version == 6:
  272. lookfor = ':'
  273. else:
  274. raise Exception
  275. # Check URL parameters
  276. for p in params:
  277. if p in request.query_params:
  278. if not len(request.query_params[p]):
  279. return None
  280. if lookfor in request.query_params[p]:
  281. return request.query_params[p]
  282. # Check remote IP address
  283. client_ip = get_client_ip(request)
  284. if lookfor in client_ip:
  285. return client_ip
  286. # give up
  287. return None
  288. def findIPv4(self, request):
  289. return self.findIP(request, ['myip', 'myipv4', 'ip'])
  290. def findIPv6(self, request):
  291. return self.findIP(request, ['myipv6', 'ipv6', 'myip', 'ip'], version=6)
  292. def get(self, request, format=None):
  293. domain = self.findDomain(request)
  294. if domain is None:
  295. raise Http404
  296. datas = {'A': self.findIPv4(request), 'AAAA': self.findIPv6(request)}
  297. domain.write_rrsets([{'subname': '', 'type': type_, 'ttl': 60,
  298. 'contents': [ip] if ip is not None else []}
  299. for type_, ip in datas.items()])
  300. return Response('good')
  301. class DonationList(generics.CreateAPIView):
  302. serializer_class = DonationSerializer
  303. def perform_create(self, serializer):
  304. iban = serializer.validated_data['iban']
  305. obj = serializer.save()
  306. def sendDonationEmails(donation):
  307. context = {
  308. 'donation': donation,
  309. 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
  310. 'complete_iban': iban
  311. }
  312. # internal desec notification
  313. content_tmpl = get_template('emails/donation/desec-content.txt')
  314. subject_tmpl = get_template('emails/donation/desec-subject.txt')
  315. attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
  316. from_tmpl = get_template('emails/from.txt')
  317. email = EmailMessage(subject_tmpl.render(context),
  318. content_tmpl.render(context),
  319. from_tmpl.render(context),
  320. ['donation@desec.io'],
  321. attachments=[
  322. ('jameica-directdebit.xml',
  323. attachment_tmpl.render(context),
  324. 'text/xml')
  325. ])
  326. email.send()
  327. # donor notification
  328. if donation.email:
  329. content_tmpl = get_template('emails/donation/donor-content.txt')
  330. subject_tmpl = get_template('emails/donation/donor-subject.txt')
  331. email = EmailMessage(subject_tmpl.render(context),
  332. content_tmpl.render(context),
  333. from_tmpl.render(context),
  334. [donation.email])
  335. email.send()
  336. # send emails
  337. sendDonationEmails(obj)
  338. class UserCreateView(views.UserCreateView):
  339. """
  340. Extends the djoser UserCreateView to record the remote IP address of any registration.
  341. """
  342. def create(self, request, *args, **kwargs):
  343. serializer = self.get_serializer(data=request.data)
  344. serializer.is_valid(raise_exception=True)
  345. self.perform_create(serializer, get_client_ip(request))
  346. headers = self.get_success_headers(serializer.data)
  347. return Response(serializer.data, status=status.HTTP_201_CREATED, headers=headers)
  348. def perform_create(self, serializer, remote_ip):
  349. captcha = (
  350. ipaddress.ip_address(remote_ip) not in ipaddress.IPv6Network(os.environ['DESECSTACK_IPV6_SUBNET'])
  351. and (
  352. User.objects.filter(
  353. created__gte=timezone.now()-timedelta(hours=settings.ABUSE_BY_REMOTE_IP_PERIOD_HRS),
  354. registration_remote_ip=remote_ip
  355. ).count() >= settings.ABUSE_BY_REMOTE_IP_LIMIT
  356. or
  357. User.objects.filter(
  358. created__gte=timezone.now() - timedelta(hours=settings.ABUSE_BY_EMAIL_HOSTNAME_PERIOD_HRS),
  359. email__endswith=serializer.validated_data['email'].split('@')[-1]
  360. ).count() >= settings.ABUSE_BY_EMAIL_HOSTNAME_LIMIT
  361. )
  362. )
  363. user = serializer.save(registration_remote_ip=remote_ip, captcha_required=captcha)
  364. if user.captcha_required:
  365. send_account_lock_email(self.request, user)
  366. elif not user.dyn:
  367. context = {'token': user.get_token()}
  368. send_token_email(context, user)
  369. signals.user_registered.send(sender=self.__class__, user=user, request=self.request)
  370. def unlock(request, email):
  371. # if this is a POST request we need to process the form data
  372. if request.method == 'POST':
  373. # create a form instance and populate it with data from the request:
  374. form = UnlockForm(request.POST)
  375. # check whether it's valid:
  376. if form.is_valid():
  377. try:
  378. user = User.objects.get(email=email)
  379. user.unlock()
  380. if not user.dyn:
  381. context = {'token': user.get_token()}
  382. send_token_email(context, user)
  383. except User.DoesNotExist:
  384. pass # fail silently, otherwise people can find out if email addresses are registered with us
  385. return HttpResponseRedirect(reverse('unlock/done'))
  386. # if a GET (or any other method) we'll create a blank form
  387. else:
  388. form = UnlockForm()
  389. return render(request, 'unlock.html', {'form': form})
  390. def unlock_done(request):
  391. return render(request, 'unlock-done.html')