views.py 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820
  1. import base64
  2. import binascii
  3. from datetime import timedelta
  4. from functools import cached_property
  5. import django.core.exceptions
  6. from django.conf import settings
  7. from django.contrib.auth import user_logged_in
  8. from django.contrib.auth.hashers import is_password_usable
  9. from django.core.cache import cache
  10. from django.core.mail import EmailMessage
  11. from django.http import Http404
  12. from django.shortcuts import redirect
  13. from django.template.loader import get_template
  14. from rest_framework import generics, mixins, status, viewsets
  15. from rest_framework.authentication import get_authorization_header
  16. from rest_framework.exceptions import (NotAcceptable, NotFound, PermissionDenied, ValidationError)
  17. from rest_framework.permissions import IsAuthenticated, SAFE_METHODS
  18. from rest_framework.renderers import JSONRenderer, StaticHTMLRenderer
  19. from rest_framework.response import Response
  20. from rest_framework.reverse import reverse
  21. from rest_framework.settings import api_settings
  22. from rest_framework.views import APIView
  23. import desecapi.authentication as auth
  24. from desecapi import metrics, models, permissions, serializers
  25. from desecapi.exceptions import ConcurrencyException
  26. from desecapi.pdns import get_serials
  27. from desecapi.pdns_change_tracker import PDNSChangeTracker
  28. from desecapi.renderers import PlainTextRenderer
  29. def generate_confirmation_link(request, action_serializer, viewname, **kwargs):
  30. action = action_serializer.Meta.model(**kwargs)
  31. action_data = action_serializer(action).data
  32. confirmation_link = reverse(viewname, request=request, args=[action_data['code']])
  33. return confirmation_link, action_serializer.validity_period
  34. class EmptyPayloadMixin:
  35. def initialize_request(self, request, *args, **kwargs):
  36. # noinspection PyUnresolvedReferences
  37. request = super().initialize_request(request, *args, **kwargs)
  38. try:
  39. no_data = request.stream is None
  40. except:
  41. no_data = True
  42. if no_data:
  43. # In this case, data and files are both empty, so we can set request.data=None (instead of the default {}).
  44. # This allows distinguishing missing payload from empty dict payload.
  45. # See https://github.com/encode/django-rest-framework/pull/7195
  46. request._full_data = None
  47. return request
  48. class IdempotentDestroyMixin:
  49. def destroy(self, request, *args, **kwargs):
  50. try:
  51. # noinspection PyUnresolvedReferences
  52. super().destroy(request, *args, **kwargs)
  53. except Http404:
  54. pass
  55. return Response(status=status.HTTP_204_NO_CONTENT)
  56. class TokenViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet):
  57. serializer_class = serializers.TokenSerializer
  58. permission_classes = (IsAuthenticated, permissions.HasManageTokensPermission,)
  59. throttle_scope = 'account_management_passive'
  60. def get_queryset(self):
  61. return self.request.user.token_set.all()
  62. def get_serializer(self, *args, **kwargs):
  63. # When creating a new token, return the plaintext representation
  64. if self.action == 'create':
  65. kwargs.setdefault('include_plain', True)
  66. return super().get_serializer(*args, **kwargs)
  67. def perform_create(self, serializer):
  68. serializer.save(user=self.request.user)
  69. class DomainViewSet(IdempotentDestroyMixin,
  70. mixins.CreateModelMixin,
  71. mixins.RetrieveModelMixin,
  72. mixins.DestroyModelMixin,
  73. mixins.ListModelMixin,
  74. viewsets.GenericViewSet):
  75. serializer_class = serializers.DomainSerializer
  76. lookup_field = 'name'
  77. lookup_value_regex = r'[^/]+'
  78. @property
  79. def permission_classes(self):
  80. ret = [IsAuthenticated, permissions.IsOwner]
  81. if self.action == 'create':
  82. ret.append(permissions.WithinDomainLimit)
  83. if self.request.method not in SAFE_METHODS:
  84. ret.append(permissions.TokenNoDomainPolicy)
  85. return ret
  86. @property
  87. def throttle_scope(self):
  88. return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_domains'
  89. @property
  90. def pagination_class(self):
  91. # Turn off pagination when filtering for covered qname, as pagination would re-order by `created` (not what we
  92. # want here) after taking a slice (that's forbidden anyway). But, we don't need pagination in this case anyways.
  93. if 'owns_qname' in self.request.query_params:
  94. return None
  95. else:
  96. return api_settings.DEFAULT_PAGINATION_CLASS
  97. def get_queryset(self):
  98. qs = self.request.user.domains
  99. owns_qname = self.request.query_params.get('owns_qname')
  100. if owns_qname is not None:
  101. qs = qs.filter_qname(owns_qname).order_by('-name_length')[:1]
  102. return qs
  103. def get_serializer(self, *args, **kwargs):
  104. include_keys = (self.action in ['create', 'retrieve'])
  105. return super().get_serializer(*args, include_keys=include_keys, **kwargs)
  106. def perform_create(self, serializer):
  107. with PDNSChangeTracker():
  108. domain = serializer.save(owner=self.request.user)
  109. # TODO this line raises if the local public suffix is not in our database!
  110. PDNSChangeTracker.track(lambda: self.auto_delegate(domain))
  111. @staticmethod
  112. def auto_delegate(domain: models.Domain):
  113. if domain.is_locally_registrable:
  114. parent_domain = models.Domain.objects.get(name=domain.parent_domain_name)
  115. parent_domain.update_delegation(domain)
  116. def perform_destroy(self, instance: models.Domain):
  117. with PDNSChangeTracker():
  118. instance.delete()
  119. if instance.is_locally_registrable:
  120. parent_domain = models.Domain.objects.get(name=instance.parent_domain_name)
  121. with PDNSChangeTracker():
  122. parent_domain.update_delegation(instance)
  123. class TokenPoliciesRoot(APIView):
  124. permission_classes = [
  125. IsAuthenticated,
  126. permissions.HasManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken,
  127. ]
  128. def get(self, request, *args, **kwargs):
  129. return Response({'domain': reverse('token_domain_policies-list', request=request, kwargs=kwargs)})
  130. class TokenDomainPolicyViewSet(IdempotentDestroyMixin, viewsets.ModelViewSet):
  131. lookup_field = 'domain__name'
  132. lookup_value_regex = DomainViewSet.lookup_value_regex
  133. pagination_class = None
  134. serializer_class = serializers.TokenDomainPolicySerializer
  135. throttle_scope = 'account_management_passive'
  136. @property
  137. def permission_classes(self):
  138. ret = [IsAuthenticated]
  139. if self.request.method in SAFE_METHODS:
  140. ret.append(permissions.HasManageTokensPermission | permissions.AuthTokenCorrespondsToViewToken)
  141. else:
  142. ret.append(permissions.HasManageTokensPermission)
  143. return ret
  144. def dispatch(self, request, *args, **kwargs):
  145. # map default policy onto domain_id IS NULL
  146. lookup_url_kwarg = self.lookup_url_kwarg or self.lookup_field
  147. try:
  148. if kwargs[lookup_url_kwarg] == 'default':
  149. kwargs[lookup_url_kwarg] = None
  150. except KeyError:
  151. pass
  152. return super().dispatch(request, *args, **kwargs)
  153. def get_queryset(self):
  154. return models.TokenDomainPolicy.objects.filter(token_id=self.kwargs['token_id'], token__user=self.request.user)
  155. def perform_destroy(self, instance):
  156. try:
  157. super().perform_destroy(instance)
  158. except django.core.exceptions.ValidationError as exc:
  159. raise ValidationError(exc.message_dict, code='precedence')
  160. class SerialListView(APIView):
  161. permission_classes = (permissions.IsVPNClient,)
  162. throttle_classes = [] # don't break slaves when they ask too often (our cached responses are cheap)
  163. def get(self, request, *args, **kwargs):
  164. key = 'desecapi.views.serials'
  165. serials = cache.get(key)
  166. if serials is None:
  167. serials = get_serials()
  168. cache.get_or_set(key, serials, timeout=15)
  169. return Response(serials)
  170. class RRsetView:
  171. serializer_class = serializers.RRsetSerializer
  172. permission_classes = (IsAuthenticated, permissions.IsDomainOwner, permissions.TokenHasDomainRRsetsPermission,)
  173. @property
  174. def domain(self):
  175. try:
  176. return self.request.user.domains.get(name=self.kwargs['name'])
  177. except models.Domain.DoesNotExist:
  178. raise Http404
  179. @property
  180. def throttle_scope(self):
  181. return 'dns_api_read' if self.request.method in SAFE_METHODS else 'dns_api_write_rrsets'
  182. @property
  183. def throttle_scope_bucket(self):
  184. # Note: bucket should remain constant even when domain is recreated
  185. return None if self.request.method in SAFE_METHODS else self.kwargs['name']
  186. def get_queryset(self):
  187. return self.domain.rrset_set
  188. def get_serializer_context(self):
  189. # noinspection PyUnresolvedReferences
  190. return {**super().get_serializer_context(), 'domain': self.domain}
  191. def perform_update(self, serializer):
  192. with PDNSChangeTracker():
  193. super().perform_update(serializer)
  194. class RRsetDetail(RRsetView, IdempotentDestroyMixin, generics.RetrieveUpdateDestroyAPIView):
  195. def get_object(self):
  196. queryset = self.filter_queryset(self.get_queryset())
  197. filter_kwargs = {k: self.kwargs[k] for k in ['subname', 'type']}
  198. obj = generics.get_object_or_404(queryset, **filter_kwargs)
  199. # May raise a permission denied
  200. self.check_object_permissions(self.request, obj)
  201. return obj
  202. def update(self, request, *args, **kwargs):
  203. response = super().update(request, *args, **kwargs)
  204. if response.data is None:
  205. response.status_code = 204
  206. return response
  207. def perform_destroy(self, instance):
  208. with PDNSChangeTracker():
  209. super().perform_destroy(instance)
  210. class RRsetList(RRsetView, EmptyPayloadMixin, generics.ListCreateAPIView, generics.UpdateAPIView):
  211. def get_queryset(self):
  212. rrsets = super().get_queryset()
  213. for filter_field in ('subname', 'type'):
  214. value = self.request.query_params.get(filter_field)
  215. if value is not None:
  216. # TODO consider moving this
  217. if filter_field == 'type' and value in models.RR_SET_TYPES_AUTOMATIC:
  218. raise PermissionDenied("You cannot tinker with the %s RRset." % value)
  219. rrsets = rrsets.filter(**{'%s__exact' % filter_field: value})
  220. return rrsets.all() # without .all(), cache is sometimes inconsistent with actual state in bulk tests. (Why?)
  221. def get_object(self):
  222. # For this view, the object we're operating on is the queryset that one can also GET. Serializing a queryset
  223. # is fine as per https://www.django-rest-framework.org/api-guide/serializers/#serializing-multiple-objects.
  224. # We skip checking object permissions here to avoid evaluating the queryset. The user can access all his RRsets
  225. # anyways.
  226. return self.filter_queryset(self.get_queryset())
  227. def get_serializer(self, *args, **kwargs):
  228. kwargs = kwargs.copy()
  229. if 'many' not in kwargs:
  230. if self.request.method in ['POST']:
  231. kwargs['many'] = isinstance(kwargs.get('data'), list)
  232. elif self.request.method in ['PATCH', 'PUT']:
  233. kwargs['many'] = True
  234. return super().get_serializer(*args, **kwargs)
  235. def perform_create(self, serializer):
  236. with PDNSChangeTracker():
  237. super().perform_create(serializer)
  238. class Root(APIView):
  239. def get(self, request, *args, **kwargs):
  240. if self.request.user.is_authenticated:
  241. routes = {
  242. 'account': {
  243. 'show': reverse('account', request=request),
  244. 'delete': reverse('account-delete', request=request),
  245. 'change-email': reverse('account-change-email', request=request),
  246. 'reset-password': reverse('account-reset-password', request=request),
  247. },
  248. 'logout': reverse('logout', request=request),
  249. 'tokens': reverse('token-list', request=request),
  250. 'domains': reverse('domain-list', request=request),
  251. }
  252. else:
  253. routes = {
  254. 'register': reverse('register', request=request),
  255. 'login': reverse('login', request=request),
  256. 'reset-password': reverse('account-reset-password', request=request),
  257. }
  258. return Response(routes)
  259. class DynDNS12UpdateView(generics.GenericAPIView):
  260. authentication_classes = (auth.TokenAuthentication, auth.BasicTokenAuthentication, auth.URLParamAuthentication,)
  261. permission_classes = (permissions.TokenHasDomainDynDNSPermission,)
  262. renderer_classes = [PlainTextRenderer]
  263. serializer_class = serializers.RRsetSerializer
  264. throttle_scope = 'dyndns'
  265. @property
  266. def throttle_scope_bucket(self):
  267. return self.domain.name
  268. def _find_ip(self, params, version):
  269. if version == 4:
  270. look_for = '.'
  271. elif version == 6:
  272. look_for = ':'
  273. else:
  274. raise Exception
  275. # Check URL parameters
  276. for p in params:
  277. if p in self.request.query_params:
  278. if not len(self.request.query_params[p]):
  279. return None
  280. if look_for in self.request.query_params[p]:
  281. return self.request.query_params[p]
  282. # Check remote IP address
  283. client_ip = self.request.META.get('REMOTE_ADDR')
  284. if look_for in client_ip:
  285. return client_ip
  286. # give up
  287. return None
  288. @cached_property
  289. def qname(self):
  290. # hostname parameter
  291. try:
  292. if self.request.query_params['hostname'] != 'YES':
  293. return self.request.query_params['hostname'].lower()
  294. except KeyError:
  295. pass
  296. # host_id parameter
  297. try:
  298. return self.request.query_params['host_id'].lower()
  299. except KeyError:
  300. pass
  301. # http basic auth username
  302. try:
  303. domain_name = base64.b64decode(
  304. get_authorization_header(self.request).decode().split(' ')[1].encode()).decode().split(':')[0]
  305. if domain_name and '@' not in domain_name:
  306. return domain_name.lower()
  307. except (binascii.Error, IndexError, UnicodeDecodeError):
  308. pass
  309. # username parameter
  310. try:
  311. return self.request.query_params['username'].lower()
  312. except KeyError:
  313. pass
  314. # only domain associated with this user account
  315. try:
  316. return self.request.user.domains.get().name
  317. except models.Domain.MultipleObjectsReturned:
  318. raise ValidationError(detail={
  319. "detail": "Request does not properly specify domain for update.",
  320. "code": "domain-unspecified"
  321. })
  322. except models.Domain.DoesNotExist:
  323. metrics.get('desecapi_dynDNS12_domain_not_found').inc()
  324. raise NotFound('nohost')
  325. @cached_property
  326. def domain(self):
  327. try:
  328. return models.Domain.objects.filter_qname(self.qname, owner=self.request.user).order_by('-name_length')[0]
  329. except (IndexError, ValueError):
  330. raise NotFound('nohost')
  331. @property
  332. def subname(self):
  333. return self.qname.rpartition(f'.{self.domain.name}')[0]
  334. def get_serializer_context(self):
  335. return {**super().get_serializer_context(), 'domain': self.domain, 'minimum_ttl': 60}
  336. def get_queryset(self):
  337. return self.domain.rrset_set.filter(subname=self.subname, type__in=['A', 'AAAA'])
  338. def get(self, request, *args, **kwargs):
  339. instances = self.get_queryset().all()
  340. ipv4 = self._find_ip(['myip', 'myipv4', 'ip'], version=4)
  341. ipv6 = self._find_ip(['myipv6', 'ipv6', 'myip', 'ip'], version=6)
  342. data = [
  343. {'type': 'A', 'subname': self.subname, 'ttl': 60, 'records': [ipv4] if ipv4 else []},
  344. {'type': 'AAAA', 'subname': self.subname, 'ttl': 60, 'records': [ipv6] if ipv6 else []},
  345. ]
  346. serializer = self.get_serializer(instances, data=data, many=True, partial=True)
  347. try:
  348. serializer.is_valid(raise_exception=True)
  349. except ValidationError as e:
  350. if any(
  351. any(
  352. getattr(non_field_error, 'code', '') == 'unique'
  353. for non_field_error
  354. in err.get('non_field_errors', [])
  355. )
  356. for err in e.detail
  357. ):
  358. raise ConcurrencyException from e
  359. raise e
  360. with PDNSChangeTracker():
  361. serializer.save()
  362. return Response('good', content_type='text/plain')
  363. class DonationList(generics.CreateAPIView):
  364. serializer_class = serializers.DonationSerializer
  365. def perform_create(self, serializer):
  366. instance = serializer.save()
  367. context = {
  368. 'donation': instance,
  369. 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
  370. 'creditorname': settings.SEPA['CREDITOR_NAME'],
  371. }
  372. # internal desec notification
  373. content_tmpl = get_template('emails/donation/desec-content.txt')
  374. subject_tmpl = get_template('emails/donation/desec-subject.txt')
  375. attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
  376. from_tmpl = get_template('emails/from.txt')
  377. email = EmailMessage(subject_tmpl.render(context),
  378. content_tmpl.render(context),
  379. from_tmpl.render(context),
  380. ['donation@desec.io'],
  381. attachments=[
  382. ('jameica-directdebit.xml',
  383. attachment_tmpl.render(context),
  384. 'text/xml')
  385. ])
  386. email.send()
  387. # donor notification
  388. if instance.email:
  389. content_tmpl = get_template('emails/donation/donor-content.txt')
  390. subject_tmpl = get_template('emails/donation/donor-subject.txt')
  391. footer_tmpl = get_template('emails/footer.txt')
  392. email = EmailMessage(subject_tmpl.render(context),
  393. content_tmpl.render(context) + footer_tmpl.render(),
  394. from_tmpl.render(context),
  395. [instance.email])
  396. email.send()
  397. class AccountCreateView(generics.CreateAPIView):
  398. serializer_class = serializers.RegisterAccountSerializer
  399. throttle_scope = 'account_management_active'
  400. def create(self, request, *args, **kwargs):
  401. # Create user and send trigger email verification.
  402. # Alternative would be to create user once email is verified, but this could be abused for bulk email.
  403. serializer = self.get_serializer(data=request.data)
  404. activation_required = settings.USER_ACTIVATION_REQUIRED
  405. try:
  406. serializer.is_valid(raise_exception=True)
  407. except ValidationError as e:
  408. # Hide existing users
  409. email_detail = e.detail.pop('email', [])
  410. email_detail = [detail for detail in email_detail if detail.code != 'unique']
  411. if email_detail:
  412. e.detail['email'] = email_detail
  413. if e.detail:
  414. raise e
  415. else:
  416. # create user
  417. user = serializer.save(is_active=(not activation_required))
  418. # send email if needed
  419. domain = serializer.validated_data.get('domain')
  420. if domain or activation_required:
  421. link, validity_period = generate_confirmation_link(request,
  422. serializers.AuthenticatedActivateUserActionSerializer,
  423. 'confirm-activate-account', user=user, domain=domain)
  424. user.send_email('activate-with-domain' if domain else 'activate', context={
  425. 'confirmation_link': link,
  426. 'link_expiration_hours': validity_period // timedelta(hours=1),
  427. 'domain': domain,
  428. })
  429. # This request is unauthenticated, so don't expose whether we did anything.
  430. message = 'Welcome! Please check your mailbox.' if activation_required else 'Welcome!'
  431. return Response(data={'detail': message}, status=status.HTTP_202_ACCEPTED)
  432. class AccountView(generics.RetrieveAPIView):
  433. permission_classes = (IsAuthenticated, permissions.TokenNoDomainPolicy,)
  434. serializer_class = serializers.UserSerializer
  435. throttle_scope = 'account_management_passive'
  436. def get_object(self):
  437. return self.request.user
  438. class AccountDeleteView(APIView):
  439. authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
  440. permission_classes = (IsAuthenticated,)
  441. response_still_has_domains = Response(
  442. data={'detail': 'To delete your user account, first delete all of your domains.'},
  443. status=status.HTTP_409_CONFLICT,
  444. )
  445. throttle_scope = 'account_management_active'
  446. def post(self, request, *args, **kwargs):
  447. if self.request.user.domains.exists():
  448. return self.response_still_has_domains
  449. link, validity_period = generate_confirmation_link(request,
  450. serializers.AuthenticatedDeleteUserActionSerializer,
  451. 'confirm-delete-account', user=self.request.user)
  452. request.user.send_email('delete-user', context={
  453. 'confirmation_link': link,
  454. 'link_expiration_hours': validity_period // timedelta(hours=1),
  455. })
  456. return Response(data={'detail': 'Please check your mailbox for further account deletion instructions.'},
  457. status=status.HTTP_202_ACCEPTED)
  458. class AccountLoginView(generics.GenericAPIView):
  459. authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
  460. permission_classes = (IsAuthenticated,)
  461. serializer_class = serializers.TokenSerializer
  462. throttle_scope = 'account_management_passive'
  463. def post(self, request, *args, **kwargs):
  464. user = self.request.user
  465. token = models.Token.objects.create(user=user, name="login", perm_manage_tokens=True,
  466. max_age=timedelta(days=7), max_unused_period=timedelta(hours=1))
  467. user_logged_in.send(sender=user.__class__, request=self.request, user=user)
  468. data = self.get_serializer(token, include_plain=True).data
  469. return Response(data)
  470. class AccountLogoutView(APIView, mixins.DestroyModelMixin):
  471. authentication_classes = (auth.TokenAuthentication,)
  472. permission_classes = (IsAuthenticated,)
  473. throttle_classes = [] # always allow people to log out
  474. def get_object(self):
  475. # self.request.auth contains the hashed key as it is stored in the database
  476. return models.Token.objects.get(key=self.request.auth)
  477. def post(self, request, *args, **kwargs):
  478. return self.destroy(request, *args, **kwargs)
  479. class AccountChangeEmailView(generics.GenericAPIView):
  480. authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
  481. permission_classes = (IsAuthenticated,)
  482. serializer_class = serializers.ChangeEmailSerializer
  483. throttle_scope = 'account_management_active'
  484. def post(self, request, *args, **kwargs):
  485. # Check password and extract email
  486. serializer = self.get_serializer(data=request.data)
  487. serializer.is_valid(raise_exception=True)
  488. new_email = serializer.validated_data['new_email']
  489. link, validity_period = generate_confirmation_link(request,
  490. serializers.AuthenticatedChangeEmailUserActionSerializer,
  491. 'confirm-change-email', user=request.user, new_email=new_email)
  492. request.user.send_email('change-email', recipient=new_email, context={
  493. 'confirmation_link': link,
  494. 'link_expiration_hours': validity_period // timedelta(hours=1),
  495. 'old_email': request.user.email,
  496. 'new_email': new_email,
  497. })
  498. # At this point, we know that we are talking to the user, so we can tell that we sent an email.
  499. return Response(data={'detail': 'Please check your mailbox to confirm email address change.'},
  500. status=status.HTTP_202_ACCEPTED)
  501. class AccountResetPasswordView(generics.GenericAPIView):
  502. serializer_class = serializers.ResetPasswordSerializer
  503. throttle_scope = 'account_management_active'
  504. def post(self, request, *args, **kwargs):
  505. serializer = self.get_serializer(data=request.data)
  506. serializer.is_valid(raise_exception=True)
  507. try:
  508. email = serializer.validated_data['email']
  509. user = models.User.objects.get(email=email, is_active=True)
  510. except models.User.DoesNotExist:
  511. pass
  512. else:
  513. self.send_reset_token(user, request)
  514. # This request is unauthenticated, so don't expose whether we did anything.
  515. return Response(data={'detail': 'Please check your mailbox for further password reset instructions. '
  516. 'If you did not receive an email, please contact support.'},
  517. status=status.HTTP_202_ACCEPTED)
  518. @staticmethod
  519. def send_reset_token(user, request):
  520. link, validity_period = generate_confirmation_link(request,
  521. serializers.AuthenticatedResetPasswordUserActionSerializer,
  522. 'confirm-reset-password', user=user)
  523. user.send_email('reset-password', context={
  524. 'confirmation_link': link,
  525. 'link_expiration_hours': validity_period // timedelta(hours=1),
  526. })
  527. class AuthenticatedActionView(generics.GenericAPIView):
  528. """
  529. Abstract class. Deserializes the given payload according the serializers specified by the view extending
  530. this class. If the `serializer.is_valid`, `act` is called on the action object.
  531. Summary of the behavior depending on HTTP method and Accept: header:
  532. GET POST other method
  533. Accept: text/html forward to `self.html_url` if any perform action 405 Method Not Allowed
  534. else HTTP 406 Not Acceptable perform action 405 Method Not Allowed
  535. """
  536. authenticated_action = None
  537. html_url = None # Redirect GET requests to this webapp GUI URL
  538. http_method_names = ['get', 'post'] # GET is for redirect only
  539. renderer_classes = [JSONRenderer, StaticHTMLRenderer]
  540. @property
  541. def authentication_classes(self):
  542. # This prevents both code evaluation and user-specific throttling when we only want a redirect
  543. return () if self.request.method in SAFE_METHODS else (auth.AuthenticatedBasicUserActionAuthentication,)
  544. @property
  545. def throttle_scope(self):
  546. return 'account_management_passive' if self.request.method in SAFE_METHODS else 'account_management_active'
  547. def get_serializer_context(self):
  548. return {
  549. **super().get_serializer_context(),
  550. 'code': self.kwargs['code'],
  551. 'validity_period': self.get_serializer_class().validity_period,
  552. }
  553. def get(self, request, *args, **kwargs):
  554. # Redirect browsers to frontend if available
  555. is_redirect = (request.accepted_renderer.format == 'html') and self.html_url is not None
  556. if is_redirect:
  557. # Careful: This can generally lead to an open redirect if values contain slashes!
  558. # However, it cannot happen for Django view kwargs.
  559. return redirect(self.html_url.format(**kwargs))
  560. else:
  561. raise NotAcceptable
  562. def post(self, request, *args, **kwargs):
  563. super().perform_authentication(request)
  564. serializer = self.get_serializer(data=request.data)
  565. serializer.is_valid(raise_exception=True)
  566. try:
  567. self.authenticated_action = serializer.Meta.model(**serializer.validated_data)
  568. except ValueError: # this happens when state cannot be verified
  569. ex = ValidationError('This action cannot be carried out because another operation has been performed, '
  570. 'invalidating this one. (Are you trying to perform this action twice?)')
  571. ex.status_code = status.HTTP_409_CONFLICT
  572. raise ex
  573. self.authenticated_action.act()
  574. return self.finalize()
  575. def finalize(self):
  576. raise NotImplementedError
  577. class AuthenticatedActivateUserActionView(AuthenticatedActionView):
  578. html_url = '/confirm/activate-account/{code}/'
  579. serializer_class = serializers.AuthenticatedActivateUserActionSerializer
  580. def finalize(self):
  581. if not self.authenticated_action.domain:
  582. return self._finalize_without_domain()
  583. else:
  584. domain = self._create_domain()
  585. return self._finalize_with_domain(domain)
  586. def _create_domain(self):
  587. serializer = serializers.DomainSerializer(
  588. data={'name': self.authenticated_action.domain},
  589. context=self.get_serializer_context()
  590. )
  591. try:
  592. serializer.is_valid(raise_exception=True)
  593. except ValidationError as e: # e.g. domain name unavailable
  594. self.authenticated_action.user.delete()
  595. reasons = ', '.join([detail.code for detail in e.detail.get('name', [])])
  596. raise ValidationError(
  597. f'The requested domain {self.authenticated_action.domain} could not be registered (reason: {reasons}). '
  598. f'Please start over and sign up again.'
  599. )
  600. # TODO the following line is subject to race condition and can fail, as for the domain name, we have that
  601. # time-of-check != time-of-action
  602. return PDNSChangeTracker.track(lambda: serializer.save(owner=self.authenticated_action.user))
  603. def _finalize_without_domain(self):
  604. if not is_password_usable(self.authenticated_action.user.password):
  605. AccountResetPasswordView.send_reset_token(self.authenticated_action.user, self.request)
  606. return Response({
  607. 'detail': 'Success! We sent you instructions on how to set your password.'
  608. })
  609. return Response({
  610. 'detail': 'Success! Your account has been activated, and you can now log in.'
  611. })
  612. def _finalize_with_domain(self, domain):
  613. if domain.is_locally_registrable:
  614. # TODO the following line raises Domain.DoesNotExist under unknown conditions
  615. PDNSChangeTracker.track(lambda: DomainViewSet.auto_delegate(domain))
  616. token = models.Token.objects.create(user=domain.owner, name='dyndns')
  617. return Response({
  618. 'detail': 'Success! Here is the password ("token") to configure your router (or any other dynDNS '
  619. 'client). This password is different from your account password for security reasons.',
  620. 'domain': serializers.DomainSerializer(domain).data,
  621. **serializers.TokenSerializer(token, include_plain=True).data,
  622. })
  623. else:
  624. return Response({
  625. 'detail': 'Success! Please check the docs for the next steps, https://desec.readthedocs.io/.',
  626. 'domain': serializers.DomainSerializer(domain, include_keys=True).data,
  627. })
  628. class AuthenticatedChangeEmailUserActionView(AuthenticatedActionView):
  629. html_url = '/confirm/change-email/{code}/'
  630. serializer_class = serializers.AuthenticatedChangeEmailUserActionSerializer
  631. def finalize(self):
  632. return Response({
  633. 'detail': f'Success! Your email address has been changed to {self.authenticated_action.user.email}.'
  634. })
  635. class AuthenticatedResetPasswordUserActionView(AuthenticatedActionView):
  636. html_url = '/confirm/reset-password/{code}/'
  637. serializer_class = serializers.AuthenticatedResetPasswordUserActionSerializer
  638. def finalize(self):
  639. return Response({'detail': 'Success! Your password has been changed.'})
  640. class AuthenticatedDeleteUserActionView(AuthenticatedActionView):
  641. html_url = '/confirm/delete-account/{code}/'
  642. serializer_class = serializers.AuthenticatedDeleteUserActionSerializer
  643. def post(self, request, *args, **kwargs):
  644. if self.request.user.domains.exists():
  645. return AccountDeleteView.response_still_has_domains
  646. return super().post(request, *args, **kwargs)
  647. def finalize(self):
  648. return Response({'detail': 'All your data has been deleted. Bye bye, see you soon! <3'})
  649. class AuthenticatedRenewDomainBasicUserActionView(AuthenticatedActionView):
  650. html_url = '/confirm/renew-domain/{code}/'
  651. serializer_class = serializers.AuthenticatedRenewDomainBasicUserActionSerializer
  652. def finalize(self):
  653. return Response({'detail': f'We recorded that your domain {self.authenticated_action.domain} is still in use.'})
  654. class CaptchaView(generics.CreateAPIView):
  655. serializer_class = serializers.CaptchaSerializer
  656. throttle_scope = 'account_management_passive'