123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820 |
- import base64
- import binascii
- from datetime import timedelta
- from functools import cached_property
- import django.core.exceptions
- from django.conf import settings
- from django.contrib.auth import user_logged_in
- from django.contrib.auth.hashers import is_password_usable
- from django.core.cache import cache
- from django.core.mail import EmailMessage
- from django.http import Http404
- from django.shortcuts import redirect
- from django.template.loader import get_template
- from rest_framework import generics, mixins, status, viewsets
- from rest_framework.authentication import get_authorization_header
- from rest_framework.exceptions import (NotAcceptable, NotFound, PermissionDenied, ValidationError)
- from rest_framework.permissions import IsAuthenticated, SAFE_METHODS
- from rest_framework.renderers import JSONRenderer, StaticHTMLRenderer
- from rest_framework.response import Response
- from rest_framework.reverse import reverse
- from rest_framework.settings import api_settings
- from rest_framework.views import APIView
- import desecapi.authentication as auth
- from desecapi import metrics, models, permissions, serializers
- from desecapi.exceptions import ConcurrencyException
- from desecapi.pdns import get_serials
- from desecapi.pdns_change_tracker import PDNSChangeTracker
- from desecapi.renderers import PlainTextRenderer
- def generate_confirmation_link(request, action_serializer, viewname, **kwargs):
- action = action_serializer.Meta.model(**kwargs)
- action_data = action_serializer(action).data
- confirmation_link = reverse(viewname, request=request, args=[action_data['code']])
- return confirmation_link, action_serializer.validity_period
- class EmptyPayloadMixin:
- def initialize_request(self, request, *args, **kwargs):
- # noinspection PyUnresolvedReferences
- request = super().initialize_request(request, *args, **kwargs)
- try:
- no_data = request.stream is None
- except:
- no_data = True
- if no_data:
- # In this case, data and files are both empty, so we can set request.data=None (instead of the default {}).
- # This allows distinguishing missing payload from empty dict payload.
- # See https://github.com/encode/django-rest-framework/pull/7195
- request._full_data = None
- return request
- class IdempotentDestroyMixin:
- def destroy(self, request, *args, **kwargs):
- try:
- # noinspection PyUnresolvedReferences
- super().destroy(request, *args, **kwargs)
- except Http404:
- pass
- return Response(status=status.HTTP_204_NO_CONTENT)
- class TokenViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet):
- serializer_class = serializers.TokenSerializer
- permission_classes = (IsAuthenticated, permissions.ManageTokensPermission,)
- throttle_scope = 'account_management_passive'
- def get_queryset(self):
- return self.request.user.token_set.all()
- def get_serializer(self, *args, **kwargs):
- # When creating a new token, return the plaintext representation
- if self.action == 'create':
- kwargs.setdefault('include_plain', True)
- return super().get_serializer(*args, **kwargs)
- def perform_create(self, serializer):
- serializer.save(user=self.request.user)
- class DomainViewSet(IdempotentDestroyMixin,
- mixins.CreateModelMixin,
- mixins.RetrieveModelMixin,
- mixins.DestroyModelMixin,
- mixins.ListModelMixin,
- viewsets.GenericViewSet):
- serializer_class = serializers.DomainSerializer
- lookup_field = 'name'
- lookup_value_regex = r'[^/]+'
- @property
- def permission_classes(self):
- ret = [IsAuthenticated, permissions.IsOwner]
- if self.action == 'create':
- ret.append(permissions.WithinDomainLimit)
- if self.request.method not in SAFE_METHODS:
- ret.append(permissions.TokenNoDomainPolicy)
- return ret
- @property
- def throttle_scope(self):
- return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_domains'
- @property
- def pagination_class(self):
- # Turn off pagination when filtering for covered qname, as pagination would re-order by `created` (not what we
- # want here) after taking a slice (that's forbidden anyway). But, we don't need pagination in this case anyways.
- if 'owns_qname' in self.request.query_params:
- return None
- else:
- return api_settings.DEFAULT_PAGINATION_CLASS
- def get_queryset(self):
- qs = self.request.user.domains
- owns_qname = self.request.query_params.get('owns_qname')
- if owns_qname is not None:
- qs = qs.filter_qname(owns_qname).order_by('-name_length')[:1]
- return qs
- def get_serializer(self, *args, **kwargs):
- include_keys = (self.action in ['create', 'retrieve'])
- return super().get_serializer(*args, include_keys=include_keys, **kwargs)
- def perform_create(self, serializer):
- with PDNSChangeTracker():
- domain = serializer.save(owner=self.request.user)
- # TODO this line raises if the local public suffix is not in our database!
- PDNSChangeTracker.track(lambda: self.auto_delegate(domain))
- @staticmethod
- def auto_delegate(domain: models.Domain):
- if domain.is_locally_registrable:
- parent_domain = models.Domain.objects.get(name=domain.parent_domain_name)
- parent_domain.update_delegation(domain)
- def perform_destroy(self, instance: models.Domain):
- with PDNSChangeTracker():
- instance.delete()
- if instance.is_locally_registrable:
- parent_domain = models.Domain.objects.get(name=instance.parent_domain_name)
- with PDNSChangeTracker():
- parent_domain.update_delegation(instance)
- class TokenPoliciesRoot(APIView):
- permission_classes = [
- IsAuthenticated,
- permissions.HasManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken,
- ]
- def get(self, request, *args, **kwargs):
- return Response({'domain': reverse('token_domain_policies-list', request=request, kwargs=kwargs)})
- class TokenDomainPolicyViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet):
- lookup_field = 'domain__name'
- lookup_value_regex = DomainViewSet.lookup_value_regex
- pagination_class = None
- serializer_class = serializers.TokenDomainPolicySerializer
- throttle_scope = 'account_management_passive'
- @property
- def permission_classes(self):
- ret = [IsAuthenticated]
- if self.request.method in SAFE_METHODS:
- ret.append(permissions.ManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken)
- else:
- ret.append(permissions.ManageTokensPermission)
- return ret
- def dispatch(self, request, *args, **kwargs):
- # map default policy onto domain_id IS NULL
- lookup_url_kwarg = self.lookup_url_kwarg or self.lookup_field
- try:
- if kwargs[lookup_url_kwarg] == 'default':
- kwargs[lookup_url_kwarg] = None
- except KeyError:
- pass
- return super().dispatch(request, *args, **kwargs)
- def get_queryset(self):
- return models.TokenDomainPolicy.objects.filter(token_id=self.kwargs['token_id'], token__user=self.request.user)
- def perform_destroy(self, instance):
- try:
- super().perform_destroy(instance)
- except django.core.exceptions.ValidationError as exc:
- raise ValidationError(exc.message_dict, code='precedence')
- class SerialListView(APIView):
- permission_classes = (permissions.IsVPNClient,)
- throttle_classes = [] # don't break slaves when they ask too often (our cached responses are cheap)
- def get(self, request, *args, **kwargs):
- key = 'desecapi.views.serials'
- serials = cache.get(key)
- if serials is None:
- serials = get_serials()
- cache.get_or_set(key, serials, timeout=15)
- return Response(serials)
- class RRsetView:
- serializer_class = serializers.RRsetSerializer
- permission_classes = (IsAuthenticated, permissions.IsDomainOwner, permissions.TokenHasDomainRRsetsPermission,)
- @property
- def domain(self):
- try:
- return self.request.user.domains.get(name=self.kwargs['name'])
- except models.Domain.DoesNotExist:
- raise Http404
- @property
- def throttle_scope(self):
- return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_rrsets'
- @property
- def throttle_scope_bucket(self):
- # Note: bucket should remain constant even when domain is recreated
- return None if self.request.method in SAFE_METHODS else self.kwargs['name']
- def get_queryset(self):
- return self.domain.rrset_set
- def get_serializer_context(self):
- # noinspection PyUnresolvedReferences
- return {**super().get_serializer_context(), 'domain': self.domain}
- def perform_update(self, serializer):
- with PDNSChangeTracker():
- super().perform_update(serializer)
- class RRsetDetail(RRsetView, IdempotentDestroyMixin, generics.RetrieveUpdateDestroyAPIView):
- def get_object(self):
- queryset = self.filter_queryset(self.get_queryset())
- filter_kwargs = {k: self.kwargs[k] for k in ['subname', 'type']}
- obj = generics.get_object_or_404(queryset, **filter_kwargs)
- # May raise a permission denied
- self.check_object_permissions(self.request, obj)
- return obj
- def update(self, request, *args, **kwargs):
- response = super().update(request, *args, **kwargs)
- if response.data is None:
- response.status_code = 204
- return response
- def perform_destroy(self, instance):
- with PDNSChangeTracker():
- super().perform_destroy(instance)
- class RRsetList(RRsetView, EmptyPayloadMixin, generics.ListCreateAPIView, generics.UpdateAPIView):
- def get_queryset(self):
- rrsets = super().get_queryset()
- for filter_field in ('subname', 'type'):
- value = self.request.query_params.get(filter_field)
- if value is not None:
- # TODO consider moving this
- if filter_field == 'type' and value in models.RR_SET_TYPES_AUTOMATIC:
- raise PermissionDenied("You cannot tinker with the %s RRset." % value)
- rrsets = rrsets.filter(**{'%s__exact' % filter_field: value})
- return rrsets.all() # without .all(), cache is sometimes inconsistent with actual state in bulk tests. (Why?)
- def get_object(self):
- # For this view, the object we're operating on is the queryset that one can also GET. Serializing a queryset
- # is fine as per https://www.django-rest-framework.org/api-guide/serializers/#serializing-multiple-objects.
- # We skip checking object permissions here to avoid evaluating the queryset. The user can access all his RRsets
- # anyways.
- return self.filter_queryset(self.get_queryset())
- def get_serializer(self, *args, **kwargs):
- kwargs = kwargs.copy()
- if 'many' not in kwargs:
- if self.request.method in ['POST']:
- kwargs['many'] = isinstance(kwargs.get('data'), list)
- elif self.request.method in ['PATCH', 'PUT']:
- kwargs['many'] = True
- return super().get_serializer(*args, **kwargs)
- def perform_create(self, serializer):
- with PDNSChangeTracker():
- super().perform_create(serializer)
- class Root(APIView):
- def get(self, request, *args, **kwargs):
- if self.request.user.is_authenticated:
- routes = {
- 'account': {
- 'show': reverse('account', request=request),
- 'delete': reverse('account-delete', request=request),
- 'change-email': reverse('account-change-email', request=request),
- 'reset-password': reverse('account-reset-password', request=request),
- },
- 'logout': reverse('logout', request=request),
- 'tokens': reverse('token-list', request=request),
- 'domains': reverse('domain-list', request=request),
- }
- else:
- routes = {
- 'register': reverse('register', request=request),
- 'login': reverse('login', request=request),
- 'reset-password': reverse('account-reset-password', request=request),
- }
- return Response(routes)
- class DynDNS12UpdateView(generics.GenericAPIView):
- authentication_classes = (auth.TokenAuthentication, auth.BasicTokenAuthentication, auth.URLParamAuthentication,)
- permission_classes = (permissions.TokenHasDomainDynDNSPermission,)
- renderer_classes = [PlainTextRenderer]
- serializer_class = serializers.RRsetSerializer
- throttle_scope = 'dyndns'
- @property
- def throttle_scope_bucket(self):
- return self.domain.name
- def _find_ip(self, params, version):
- if version == 4:
- look_for = '.'
- elif version == 6:
- look_for = ':'
- else:
- raise Exception
- # Check URL parameters
- for p in params:
- if p in self.request.query_params:
- if not len(self.request.query_params[p]):
- return None
- if look_for in self.request.query_params[p]:
- return self.request.query_params[p]
- # Check remote IP address
- client_ip = self.request.META.get('REMOTE_ADDR')
- if look_for in client_ip:
- return client_ip
- # give up
- return None
- @cached_property
- def qname(self):
- # hostname parameter
- try:
- if self.request.query_params['hostname'] != 'YES':
- return self.request.query_params['hostname'].lower()
- except KeyError:
- pass
- # host_id parameter
- try:
- return self.request.query_params['host_id'].lower()
- except KeyError:
- pass
- # http basic auth username
- try:
- domain_name = base64.b64decode(
- get_authorization_header(self.request).decode().split(' ')[1].encode()).decode().split(':')[0]
- if domain_name and '@' not in domain_name:
- return domain_name.lower()
- except (binascii.Error, IndexError, UnicodeDecodeError):
- pass
- # username parameter
- try:
- return self.request.query_params['username'].lower()
- except KeyError:
- pass
- # only domain associated with this user account
- try:
- return self.request.user.domains.get().name
- except models.Domain.MultipleObjectsReturned:
- raise ValidationError(detail={
- "detail": "Request does not properly specify domain for update.",
- "code": "domain-unspecified"
- })
- except models.Domain.DoesNotExist:
- metrics.get('desecapi_dynDNS12_domain_not_found').inc()
- raise NotFound('nohost')
- @cached_property
- def domain(self):
- try:
- return models.Domain.objects.filter_qname(self.qname, owner=self.request.user).order_by('-name_length')[0]
- except (IndexError, ValueError):
- raise NotFound('nohost')
- @property
- def subname(self):
- return self.qname.rpartition(f'.{self.domain.name}')[0]
- def get_serializer_context(self):
- return {**super().get_serializer_context(), 'domain': self.domain, 'minimum_ttl': 60}
- def get_queryset(self):
- return self.domain.rrset_set.filter(subname=self.subname, type__in=['A', 'AAAA'])
- def get(self, request, *args, **kwargs):
- instances = self.get_queryset().all()
- ipv4 = self._find_ip(['myip', 'myipv4', 'ip'], version=4)
- ipv6 = self._find_ip(['myipv6', 'ipv6', 'myip', 'ip'], version=6)
- data = [
- {'type': 'A', 'subname': self.subname, 'ttl': 60, 'records': [ipv4] if ipv4 else []},
- {'type': 'AAAA', 'subname': self.subname, 'ttl': 60, 'records': [ipv6] if ipv6 else []},
- ]
- serializer = self.get_serializer(instances, data=data, many=True, partial=True)
- try:
- serializer.is_valid(raise_exception=True)
- except ValidationError as e:
- if any(
- any(
- getattr(non_field_error, 'code', '') == 'unique'
- for non_field_error
- in err.get('non_field_errors', [])
- )
- for err in e.detail
- ):
- raise ConcurrencyException from e
- raise e
- with PDNSChangeTracker():
- serializer.save()
- return Response('good', content_type='text/plain')
- class DonationList(generics.CreateAPIView):
- serializer_class = serializers.DonationSerializer
- def perform_create(self, serializer):
- instance = serializer.save()
- context = {
- 'donation': instance,
- 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
- 'creditorname': settings.SEPA['CREDITOR_NAME'],
- }
- # internal desec notification
- content_tmpl = get_template('emails/donation/desec-content.txt')
- subject_tmpl = get_template('emails/donation/desec-subject.txt')
- attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
- from_tmpl = get_template('emails/from.txt')
- email = EmailMessage(subject_tmpl.render(context),
- content_tmpl.render(context),
- from_tmpl.render(context),
- ['donation@desec.io'],
- attachments=[
- ('jameica-directdebit.xml',
- attachment_tmpl.render(context),
- 'text/xml')
- ])
- email.send()
- # donor notification
- if instance.email:
- content_tmpl = get_template('emails/donation/donor-content.txt')
- subject_tmpl = get_template('emails/donation/donor-subject.txt')
- footer_tmpl = get_template('emails/footer.txt')
- email = EmailMessage(subject_tmpl.render(context),
- content_tmpl.render(context) + footer_tmpl.render(),
- from_tmpl.render(context),
- [instance.email])
- email.send()
- class AccountCreateView(generics.CreateAPIView):
- serializer_class = serializers.RegisterAccountSerializer
- throttle_scope = 'account_management_active'
- def create(self, request, *args, **kwargs):
- # Create user and send trigger email verification.
- # Alternative would be to create user once email is verified, but this could be abused for bulk email.
- serializer = self.get_serializer(data=request.data)
- activation_required = settings.USER_ACTIVATION_REQUIRED
- try:
- serializer.is_valid(raise_exception=True)
- except ValidationError as e:
- # Hide existing users
- email_detail = e.detail.pop('email', [])
- email_detail = [detail for detail in email_detail if detail.code != 'unique']
- if email_detail:
- e.detail['email'] = email_detail
- if e.detail:
- raise e
- else:
- # create user
- user = serializer.save(is_active=(not activation_required))
- # send email if needed
- domain = serializer.validated_data.get('domain')
- if domain or activation_required:
- link, validity_period = generate_confirmation_link(request,
- serializers.AuthenticatedActivateUserActionSerializer,
- 'confirm-activate-account', user=user, domain=domain)
- user.send_email('activate-with-domain' if domain else 'activate', context={
- 'confirmation_link': link,
- 'link_expiration_hours': validity_period // timedelta(hours=1),
- 'domain': domain,
- })
- # This request is unauthenticated, so don't expose whether we did anything.
- message = 'Welcome! Please check your mailbox.' if activation_required else 'Welcome!'
- return Response(data={'detail': message}, status=status.HTTP_202_ACCEPTED)
- class AccountView(generics.RetrieveAPIView):
- permission_classes = (IsAuthenticated, permissions.TokenNoDomainPolicy,)
- serializer_class = serializers.UserSerializer
- throttle_scope = 'account_management_passive'
- def get_object(self):
- return self.request.user
- class AccountDeleteView(APIView):
- authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
- permission_classes = (IsAuthenticated,)
- response_still_has_domains = Response(
- data={'detail': 'To delete your user account, first delete all of your domains.'},
- status=status.HTTP_409_CONFLICT,
- )
- throttle_scope = 'account_management_active'
- def post(self, request, *args, **kwargs):
- if self.request.user.domains.exists():
- return self.response_still_has_domains
- link, validity_period = generate_confirmation_link(request,
- serializers.AuthenticatedDeleteUserActionSerializer,
- 'confirm-delete-account', user=self.request.user)
- request.user.send_email('delete-user', context={
- 'confirmation_link': link,
- 'link_expiration_hours': validity_period // timedelta(hours=1),
- })
- return Response(data={'detail': 'Please check your mailbox for further account deletion instructions.'},
- status=status.HTTP_202_ACCEPTED)
- class AccountLoginView(generics.GenericAPIView):
- authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
- permission_classes = (IsAuthenticated,)
- serializer_class = serializers.TokenSerializer
- throttle_scope = 'account_management_passive'
- def post(self, request, *args, **kwargs):
- user = self.request.user
- token = models.Token.objects.create(user=user, name="login", perm_manage_tokens=True,
- max_age=timedelta(days=7), max_unused_period=timedelta(hours=1))
- user_logged_in.send(sender=user.__class__, request=self.request, user=user)
- data = self.get_serializer(token, include_plain=True).data
- return Response(data)
- class AccountLogoutView(APIView, mixins.DestroyModelMixin):
- authentication_classes = (auth.TokenAuthentication,)
- permission_classes = (IsAuthenticated,)
- throttle_classes = [] # always allow people to log out
- def get_object(self):
- # self.request.auth contains the hashed key as it is stored in the database
- return models.Token.objects.get(key=self.request.auth)
- def post(self, request, *args, **kwargs):
- return self.destroy(request, *args, **kwargs)
- class AccountChangeEmailView(generics.GenericAPIView):
- authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
- permission_classes = (IsAuthenticated,)
- serializer_class = serializers.ChangeEmailSerializer
- throttle_scope = 'account_management_active'
- def post(self, request, *args, **kwargs):
- # Check password and extract email
- serializer = self.get_serializer(data=request.data)
- serializer.is_valid(raise_exception=True)
- new_email = serializer.validated_data['new_email']
- link, validity_period = generate_confirmation_link(request,
- serializers.AuthenticatedChangeEmailUserActionSerializer,
- 'confirm-change-email', user=request.user, new_email=new_email)
- request.user.send_email('change-email', recipient=new_email, context={
- 'confirmation_link': link,
- 'link_expiration_hours': validity_period // timedelta(hours=1),
- 'old_email': request.user.email,
- 'new_email': new_email,
- })
- # At this point, we know that we are talking to the user, so we can tell that we sent an email.
- return Response(data={'detail': 'Please check your mailbox to confirm email address change.'},
- status=status.HTTP_202_ACCEPTED)
- class AccountResetPasswordView(generics.GenericAPIView):
- serializer_class = serializers.ResetPasswordSerializer
- throttle_scope = 'account_management_active'
- def post(self, request, *args, **kwargs):
- serializer = self.get_serializer(data=request.data)
- serializer.is_valid(raise_exception=True)
- try:
- email = serializer.validated_data['email']
- user = models.User.objects.get(email=email, is_active=True)
- except models.User.DoesNotExist:
- pass
- else:
- self.send_reset_token(user, request)
- # This request is unauthenticated, so don't expose whether we did anything.
- return Response(data={'detail': 'Please check your mailbox for further password reset instructions. '
- 'If you did not receive an email, please contact support.'},
- status=status.HTTP_202_ACCEPTED)
- @staticmethod
- def send_reset_token(user, request):
- link, validity_period = generate_confirmation_link(request,
- serializers.AuthenticatedResetPasswordUserActionSerializer,
- 'confirm-reset-password', user=user)
- user.send_email('reset-password', context={
- 'confirmation_link': link,
- 'link_expiration_hours': validity_period // timedelta(hours=1),
- })
- class AuthenticatedActionView(generics.GenericAPIView):
- """
- Abstract class. Deserializes the given payload according the serializers specified by the view extending
- this class. If the `serializer.is_valid`, `act` is called on the action object.
- Summary of the behavior depending on HTTP method and Accept: header:
- GET POST other method
- Accept: text/html forward to `self.html_url` if any perform action 405 Method Not Allowed
- else HTTP 406 Not Acceptable perform action 405 Method Not Allowed
- """
- authenticated_action = None
- html_url = None # Redirect GET requests to this webapp GUI URL
- http_method_names = ['get', 'post'] # GET is for redirect only
- renderer_classes = [JSONRenderer, StaticHTMLRenderer]
- @property
- def authentication_classes(self):
- # This prevents both code evaluation and user-specific throttling when we only want a redirect
- return () if self.request.method in SAFE_METHODS else (auth.AuthenticatedBasicUserActionAuthentication,)
- @property
- def throttle_scope(self):
- return 'account_management_passive' if self.request.method in SAFE_METHODS else 'account_management_active'
- def get_serializer_context(self):
- return {
- **super().get_serializer_context(),
- 'code': self.kwargs['code'],
- 'validity_period': self.get_serializer_class().validity_period,
- }
- def get(self, request, *args, **kwargs):
- # Redirect browsers to frontend if available
- is_redirect = (request.accepted_renderer.format == 'html') and self.html_url is not None
- if is_redirect:
- # Careful: This can generally lead to an open redirect if values contain slashes!
- # However, it cannot happen for Django view kwargs.
- return redirect(self.html_url.format(**kwargs))
- else:
- raise NotAcceptable
- def post(self, request, *args, **kwargs):
- super().perform_authentication(request)
- serializer = self.get_serializer(data=request.data)
- serializer.is_valid(raise_exception=True)
- try:
- self.authenticated_action = serializer.Meta.model(**serializer.validated_data)
- except ValueError: # this happens when state cannot be verified
- ex = ValidationError('This action cannot be carried out because another operation has been performed, '
- 'invalidating this one. (Are you trying to perform this action twice?)')
- ex.status_code = status.HTTP_409_CONFLICT
- raise ex
- self.authenticated_action.act()
- return self.finalize()
- def finalize(self):
- raise NotImplementedError
- class AuthenticatedActivateUserActionView(AuthenticatedActionView):
- html_url = '/confirm/activate-account/{code}/'
- serializer_class = serializers.AuthenticatedActivateUserActionSerializer
- def finalize(self):
- if not self.authenticated_action.domain:
- return self._finalize_without_domain()
- else:
- domain = self._create_domain()
- return self._finalize_with_domain(domain)
- def _create_domain(self):
- serializer = serializers.DomainSerializer(
- data={'name': self.authenticated_action.domain},
- context=self.get_serializer_context()
- )
- try:
- serializer.is_valid(raise_exception=True)
- except ValidationError as e: # e.g. domain name unavailable
- self.authenticated_action.user.delete()
- reasons = ', '.join([detail.code for detail in e.detail.get('name', [])])
- raise ValidationError(
- f'The requested domain {self.authenticated_action.domain} could not be registered (reason: {reasons}). '
- f'Please start over and sign up again.'
- )
- # TODO the following line is subject to race condition and can fail, as for the domain name, we have that
- # time-of-check != time-of-action
- return PDNSChangeTracker.track(lambda: serializer.save(owner=self.authenticated_action.user))
- def _finalize_without_domain(self):
- if not is_password_usable(self.authenticated_action.user.password):
- AccountResetPasswordView.send_reset_token(self.authenticated_action.user, self.request)
- return Response({
- 'detail': 'Success! We sent you instructions on how to set your password.'
- })
- return Response({
- 'detail': 'Success! Your account has been activated, and you can now log in.'
- })
- def _finalize_with_domain(self, domain):
- if domain.is_locally_registrable:
- # TODO the following line raises Domain.DoesNotExist under unknown conditions
- PDNSChangeTracker.track(lambda: DomainViewSet.auto_delegate(domain))
- token = models.Token.objects.create(user=domain.owner, name='dyndns')
- return Response({
- 'detail': 'Success! Here is the password ("token") to configure your router (or any other dynDNS '
- 'client). This password is different from your account password for security reasons.',
- 'domain': serializers.DomainSerializer(domain).data,
- **serializers.TokenSerializer(token, include_plain=True).data,
- })
- else:
- return Response({
- 'detail': 'Success! Please check the docs for the next steps, https://desec.readthedocs.io/.',
- 'domain': serializers.DomainSerializer(domain, include_keys=True).data,
- })
- class AuthenticatedChangeEmailUserActionView(AuthenticatedActionView):
- html_url = '/confirm/change-email/{code}/'
- serializer_class = serializers.AuthenticatedChangeEmailUserActionSerializer
- def finalize(self):
- return Response({
- 'detail': f'Success! Your email address has been changed to {self.authenticated_action.user.email}.'
- })
- class AuthenticatedResetPasswordUserActionView(AuthenticatedActionView):
- html_url = '/confirm/reset-password/{code}/'
- serializer_class = serializers.AuthenticatedResetPasswordUserActionSerializer
- def finalize(self):
- return Response({'detail': 'Success! Your password has been changed.'})
- class AuthenticatedDeleteUserActionView(AuthenticatedActionView):
- html_url = '/confirm/delete-account/{code}/'
- serializer_class = serializers.AuthenticatedDeleteUserActionSerializer
- def post(self, request, *args, **kwargs):
- if self.request.user.domains.exists():
- return AccountDeleteView.response_still_has_domains
- return super().post(request, *args, **kwargs)
- def finalize(self):
- return Response({'detail': 'All your data has been deleted. Bye bye, see you soon! <3'})
- class AuthenticatedRenewDomainBasicUserActionView(AuthenticatedActionView):
- html_url = '/confirm/renew-domain/{code}/'
- serializer_class = serializers.AuthenticatedRenewDomainBasicUserActionSerializer
- def finalize(self):
- return Response({'detail': f'We recorded that your domain {self.authenticated_action.domain} is still in use.'})
- class CaptchaView(generics.CreateAPIView):
- serializer_class = serializers.CaptchaSerializer
- throttle_scope = 'account_management_passive'
|