models.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468
  1. from django.conf import settings
  2. from django.db import models, transaction
  3. from django.contrib.auth.models import BaseUserManager, AbstractBaseUser
  4. from django.utils import timezone
  5. from django.core.exceptions import SuspiciousOperation, ValidationError
  6. from desecapi import pdns, mixins
  7. import datetime, uuid
  8. from django.core.validators import MinValueValidator
  9. from rest_framework.authtoken.models import Token
  10. class MyUserManager(BaseUserManager):
  11. def create_user(self, email, password=None, registration_remote_ip=None, lock=False, dyn=False):
  12. """
  13. Creates and saves a User with the given email, date of
  14. birth and password.
  15. """
  16. if not email:
  17. raise ValueError('Users must have an email address')
  18. user = self.model(
  19. email=self.normalize_email(email),
  20. registration_remote_ip=registration_remote_ip,
  21. locked=timezone.now() if lock else None,
  22. dyn=dyn,
  23. )
  24. user.set_password(password)
  25. user.save(using=self._db)
  26. return user
  27. def create_superuser(self, email, password):
  28. """
  29. Creates and saves a superuser with the given email, date of
  30. birth and password.
  31. """
  32. user = self.create_user(email,
  33. password=password
  34. )
  35. user.is_admin = True
  36. user.save(using=self._db)
  37. return user
  38. class User(AbstractBaseUser):
  39. email = models.EmailField(
  40. verbose_name='email address',
  41. max_length=191,
  42. unique=True,
  43. )
  44. is_active = models.BooleanField(default=True)
  45. is_admin = models.BooleanField(default=False)
  46. registration_remote_ip = models.CharField(max_length=1024, blank=True)
  47. locked = models.DateTimeField(null=True,blank=True)
  48. created = models.DateTimeField(auto_now_add=True)
  49. limit_domains = models.IntegerField(default=settings.LIMIT_USER_DOMAIN_COUNT_DEFAULT,null=True,blank=True)
  50. dyn = models.BooleanField(default=False)
  51. objects = MyUserManager()
  52. USERNAME_FIELD = 'email'
  53. REQUIRED_FIELDS = []
  54. def get_full_name(self):
  55. return self.email
  56. def get_short_name(self):
  57. return self.email
  58. def get_token(self):
  59. token, created = Token.objects.get_or_create(user=self)
  60. return token.key
  61. def __str__(self):
  62. return self.email
  63. def has_perm(self, perm, obj=None):
  64. "Does the user have a specific permission?"
  65. # Simplest possible answer: Yes, always
  66. return True
  67. def has_module_perms(self, app_label):
  68. "Does the user have permissions to view the app `app_label`?"
  69. # Simplest possible answer: Yes, always
  70. return True
  71. @property
  72. def is_staff(self):
  73. "Is the user a member of staff?"
  74. # Simplest possible answer: All admins are staff
  75. return self.is_admin
  76. def unlock(self):
  77. # self.locked is used by domain.sync_to_pdns(), so call that first
  78. for domain in self.domains.all():
  79. domain.sync_to_pdns()
  80. self.locked = None
  81. self.save()
  82. class Domain(models.Model, mixins.SetterMixin):
  83. created = models.DateTimeField(auto_now_add=True)
  84. name = models.CharField(max_length=191, unique=True)
  85. owner = models.ForeignKey(settings.AUTH_USER_MODEL, related_name='domains')
  86. _dirtyName = False
  87. def setter_name(self, val):
  88. if val != self.name:
  89. self._dirtyName = True
  90. return val
  91. def clean(self):
  92. if self._dirtyName:
  93. raise ValidationError('You must not change the domain name')
  94. @property
  95. def keys(self):
  96. return pdns.get_keys(self)
  97. @property
  98. def pdns_id(self):
  99. if '/' in self.name or '?' in self.name:
  100. raise SuspiciousOperation('Invalid hostname ' + self.name)
  101. # Transform to be valid pdns API identifiers (:id in their docs). The
  102. # '/' case here is just a safety measure (this case should never occur due
  103. # to the above check).
  104. # See also pdns code, apiZoneNameToId() in ws-api.cc
  105. name = self.name.translate(str.maketrans({'/': '=2F', '_': '=5F'}))
  106. if not name.endswith('.'):
  107. name += '.'
  108. return name
  109. def sync_to_pdns(self):
  110. """
  111. Make sure that pdns gets the latest information about this domain/zone.
  112. Re-syncing is relatively expensive and should not happen routinely.
  113. This method should only be called for new domains or on user unlocking.
  114. For unlocked users, it assumes that the domain is a new one.
  115. """
  116. # Determine if this domain is expected to be new on pdns. This is the
  117. # case if the user is not locked (by assumption) or if the domain was
  118. # created after the user was locked. (If the user had this domain
  119. # before locking, it is not new on pdns.)
  120. new = self.owner.locked is None or self.owner.locked < self.created
  121. if new:
  122. # Create zone
  123. # Throws exception if pdns already knows this zone for some reason
  124. # which means that it is not ours and we should not mess with it.
  125. # We escalate the exception to let the next level deal with the
  126. # response.
  127. pdns.create_zone(self, settings.DEFAULT_NS)
  128. # Import RRsets that may have been created (e.g. during lock).
  129. rrsets = self.rrset_set.all()
  130. if rrsets:
  131. pdns.set_rrsets(self, rrsets)
  132. # Make our RRsets consistent with pdns (specifically, NS may exist)
  133. self.sync_from_pdns()
  134. # For dedyn.io domains, propagate NS and DS delegation RRsets
  135. subname, parent_pdns_id = self.pdns_id.split('.', 1)
  136. if parent_pdns_id == 'dedyn.io.':
  137. try:
  138. parent = Domain.objects.get(name='dedyn.io')
  139. except Domain.DoesNotExist:
  140. pass
  141. else:
  142. parent.write_rrsets([
  143. {'subname': subname, 'type': 'NS', 'ttl': 3600,
  144. 'contents': settings.DEFAULT_NS},
  145. {'subname': subname, 'type': 'DS', 'ttl': 60,
  146. 'contents': [ds for k in self.keys for ds in k['ds']]}
  147. ])
  148. else:
  149. # Zone exists. For the case that pdns knows records that we do not
  150. # (e.g. if a locked account has deleted an RRset), it is necessary
  151. # to purge all records here. However, there is currently no way to
  152. # do this through the pdns API (not to mention doing it atomically
  153. # with setting the new RRsets). So for now, we have disabled RRset
  154. # deletion for locked accounts.
  155. rrsets = self.rrset_set.all()
  156. if rrsets:
  157. pdns.set_rrsets(self, rrsets)
  158. @transaction.atomic
  159. def sync_from_pdns(self):
  160. self.rrset_set.all().delete()
  161. rrsets = []
  162. rrs = []
  163. for rrset_data in pdns.get_rrset_datas(self):
  164. if rrset_data['type'] in RRset.RESTRICTED_TYPES:
  165. continue
  166. records = rrset_data.pop('records')
  167. rrset = RRset(**rrset_data)
  168. rrsets.append(rrset)
  169. rrs.extend([RR(rrset=rrset, content=record) for record in records])
  170. RRset.objects.bulk_create(rrsets)
  171. RR.objects.bulk_create(rrs)
  172. def write_rrsets(self, datas):
  173. rrsets = {}
  174. for data in datas:
  175. rrset = RRset(domain=self, subname=data['subname'],
  176. type=data['type'], ttl=data['ttl'])
  177. rrsets[rrset] = [RR(rrset=rrset, content=content)
  178. for content in data['contents']]
  179. self._write_rrsets(rrsets)
  180. @transaction.atomic
  181. def _write_rrsets(self, rrsets):
  182. # Always-false Q object: https://stackoverflow.com/a/35894246/6867099
  183. rrsets_index = {}
  184. q_update = models.Q(pk__isnull=True)
  185. q_delete = models.Q(pk__isnull=True)
  186. # Determine which RRsets need to be updated or deleted
  187. for rrset, rrs in rrsets.items():
  188. if rrset.domain is not self:
  189. raise ValueError('RRset has wrong domain')
  190. if (rrset.subname, rrset.type) in rrsets_index:
  191. raise ValueError('RRset repeated with same subname and type')
  192. if not all(rr.rrset is rrset for rr in rrs):
  193. raise ValueError('RR has wrong parent RRset')
  194. # Book-keeping
  195. rrsets_index[(rrset.subname, rrset.type)] = rrset
  196. q = models.Q(subname=rrset.subname) & models.Q(type=rrset.type)
  197. if rrs:
  198. q_update |= q
  199. else:
  200. q_delete |= q
  201. # Lock RRsets
  202. RRset.objects.filter(q_update | q_delete, domain=self).select_for_update()
  203. # Figure out which RRsets are unchanged and can be excluded
  204. exclude_from_update = []
  205. qs_update = RRset.objects.filter(q_update, domain=self)
  206. for rrset_old in qs_update.prefetch_related('records').all():
  207. rrset_new = rrsets_index[(rrset_old.subname, rrset_old.type)]
  208. if rrset_old.ttl != rrset_new.ttl:
  209. continue
  210. rrs_new = {rr.content for rr in rrsets[rrset_new]}
  211. rrs_old = {rr.content for rr in rrset_old.records.all()}
  212. if rrs_new != rrs_old:
  213. continue
  214. # Old and new contents do not differ, so we can skip this RRset
  215. del rrsets[rrset_new]
  216. exclude_from_update.append(rrset_old)
  217. # Do not process new RRsets that are empty (and did not exist before)
  218. # This is to avoid unnecessary pdns requests like (A: ...; AAAA: None)
  219. qs_delete = RRset.objects.filter(q_delete, domain=self)
  220. qs_delete_values = qs_delete.values_list('subname', 'type')
  221. # We modify the rrsets dictionary and thus loop over a copy of it
  222. for rrset, rrs in list(rrsets.items()):
  223. if rrs or (rrset.subname, rrset.type) in qs_delete_values:
  224. continue
  225. # RRset up for deletion does not exist
  226. del rrsets[rrset]
  227. # Clear or delete RRsets
  228. RR.objects.filter(rrset__in=qs_update).exclude(rrset__in=exclude_from_update).delete()
  229. RRset.objects.filter(q_delete, domain=self).delete()
  230. # Prepare and save new RRset contents
  231. # We modify the rrsets dictionary and thus loop over a copy of it
  232. for rrset, rrs in list(rrsets.items()):
  233. if not rrs:
  234. continue
  235. # (Create and) get correct RRset and update dictionary accordingly
  236. del rrsets[rrset]
  237. (rrset, _) = RRset.objects.get_or_create(domain=self,
  238. subname=rrset.subname,
  239. type=rrset.type,
  240. ttl=rrset.ttl)
  241. rrsets[rrset] = [RR(rrset=rrset, content=rr.content) for rr in rrs]
  242. RR.objects.bulk_create([rr for rrs in rrsets.values() for rr in rrs])
  243. # Send changed RRsets to pdns
  244. if rrsets and not self.owner.locked:
  245. pdns.set_rrsets(self, rrsets)
  246. @transaction.atomic
  247. def delete(self, *args, **kwargs):
  248. # Delete delegation for dynDNS domains (direct child of dedyn.io)
  249. subname, parent_pdns_id = self.pdns_id.split('.', 1)
  250. if parent_pdns_id == 'dedyn.io.':
  251. try:
  252. parent = Domain.objects.get(name='dedyn.io')
  253. except Domain.DoesNotExist:
  254. pass
  255. else:
  256. rrsets = parent.rrset_set.filter(subname=subname,
  257. type__in=['NS', 'DS']).all()
  258. # Need to go RRset by RRset to trigger pdns sync
  259. # TODO can optimize using write_rrsets()
  260. for rrset in rrsets:
  261. rrset.delete()
  262. # Delete domain
  263. super().delete(*args, **kwargs)
  264. pdns.delete_zone(self)
  265. @transaction.atomic
  266. def save(self, *args, **kwargs):
  267. new = self.pk is None
  268. self.clean()
  269. super().save(*args, **kwargs)
  270. if new and not self.owner.locked:
  271. self.sync_to_pdns()
  272. def __str__(self):
  273. """
  274. Return domain name. Needed for serialization via StringRelatedField.
  275. (Must be unique.)
  276. """
  277. return self.name
  278. class Meta:
  279. ordering = ('created',)
  280. def get_default_value_created():
  281. return timezone.now()
  282. def get_default_value_due():
  283. return timezone.now() + datetime.timedelta(days=7)
  284. def get_default_value_mref():
  285. return "ONDON" + str((timezone.now() - timezone.datetime(1970,1,1,tzinfo=timezone.utc)).total_seconds())
  286. class Donation(models.Model):
  287. created = models.DateTimeField(default=get_default_value_created)
  288. name = models.CharField(max_length=255)
  289. iban = models.CharField(max_length=34)
  290. bic = models.CharField(max_length=11)
  291. amount = models.DecimalField(max_digits=8,decimal_places=2)
  292. message = models.CharField(max_length=255, blank=True)
  293. due = models.DateTimeField(default=get_default_value_due)
  294. mref = models.CharField(max_length=32,default=get_default_value_mref)
  295. email = models.EmailField(max_length=255, blank=True)
  296. def save(self, *args, **kwargs):
  297. self.iban = self.iban[:6] + "xxx" # do NOT save account details
  298. super().save(*args, **kwargs) # Call the "real" save() method.
  299. class Meta:
  300. ordering = ('created',)
  301. def validate_upper(value):
  302. if value != value.upper():
  303. raise ValidationError('Invalid value (not uppercase): %(value)s',
  304. code='invalid',
  305. params={'value': value})
  306. class RRset(models.Model, mixins.SetterMixin):
  307. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  308. created = models.DateTimeField(auto_now_add=True)
  309. updated = models.DateTimeField(null=True)
  310. domain = models.ForeignKey(Domain, on_delete=models.CASCADE)
  311. subname = models.CharField(max_length=178, blank=True)
  312. type = models.CharField(max_length=10, validators=[validate_upper])
  313. ttl = models.PositiveIntegerField(validators=[MinValueValidator(1)])
  314. _dirty = False
  315. RESTRICTED_TYPES = ('SOA', 'RRSIG', 'DNSKEY', 'NSEC3PARAM')
  316. class Meta:
  317. unique_together = (("domain","subname","type"),)
  318. def __init__(self, *args, **kwargs):
  319. self._dirties = set()
  320. super().__init__(*args, **kwargs)
  321. def setter_domain(self, val):
  322. if val != self.domain:
  323. self._dirties.add('domain')
  324. return val
  325. def setter_subname(self, val):
  326. # On PUT, RRsetSerializer sends None, denoting the unchanged value
  327. if val is None:
  328. return self.subname
  329. if val != self.subname:
  330. self._dirties.add('subname')
  331. return val
  332. def setter_type(self, val):
  333. if val != self.type:
  334. self._dirties.add('type')
  335. return val
  336. def setter_ttl(self, val):
  337. if val != self.ttl:
  338. self._dirties.add('ttl')
  339. return val
  340. def clean(self):
  341. errors = {}
  342. for field in (self._dirties & {'domain', 'subname', 'type'}):
  343. errors[field] = ValidationError(
  344. 'You cannot change the `%s` field.' % field)
  345. if errors:
  346. raise ValidationError(errors)
  347. def get_dirties(self):
  348. return self._dirties
  349. @property
  350. def name(self):
  351. return '.'.join(filter(None, [self.subname, self.domain.name])) + '.'
  352. @transaction.atomic
  353. def set_rrs(self, contents, sync=True, notify=True):
  354. self.records.all().delete()
  355. self.records.set([RR(content=x) for x in contents], bulk=False)
  356. if sync and not self.domain.owner.locked:
  357. pdns.set_rrset(self, notify=notify)
  358. @transaction.atomic
  359. def delete(self, *args, **kwargs):
  360. # For locked users, we can't easily sync deleted RRsets to pdns later,
  361. # so let's forbid it for now.
  362. assert not self.domain.owner.locked
  363. super().delete(*args, **kwargs)
  364. pdns.set_rrset(self)
  365. self._dirties = {}
  366. def save(self, *args, **kwargs):
  367. # If not new, the only thing that can change is the TTL
  368. if self.created is None or 'ttl' in self.get_dirties():
  369. self.updated = timezone.now()
  370. self.full_clean()
  371. super().save(*args, **kwargs)
  372. self._dirties = {}
  373. class RR(models.Model):
  374. created = models.DateTimeField(auto_now_add=True)
  375. rrset = models.ForeignKey(RRset, on_delete=models.CASCADE, related_name='records')
  376. # max_length is determined based on the calculation in
  377. # https://lists.isc.org/pipermail/bind-users/2008-April/070148.html
  378. content = models.CharField(max_length=4092)