models.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608
  1. from __future__ import annotations
  2. import json
  3. import logging
  4. import random
  5. import secrets
  6. import string
  7. import time
  8. import uuid
  9. from base64 import b64encode
  10. from datetime import datetime, timedelta
  11. from os import urandom
  12. import psl_dns
  13. import rest_framework.authtoken.models
  14. from django.conf import settings
  15. from django.contrib.auth.models import BaseUserManager, AbstractBaseUser, AnonymousUser
  16. from django.core.exceptions import ValidationError
  17. from django.core.mail import EmailMessage
  18. from django.core.signing import Signer
  19. from django.core.validators import RegexValidator
  20. from django.db import models
  21. from django.db.models import Manager, Q
  22. from django.template.loader import get_template
  23. from django.utils import timezone
  24. from django.utils.crypto import constant_time_compare
  25. from rest_framework.exceptions import APIException
  26. from desecapi import pdns
  27. logger = logging.getLogger(__name__)
  28. psl = psl_dns.PSL(resolver=settings.PSL_RESOLVER)
  29. def validate_lower(value):
  30. if value != value.lower():
  31. raise ValidationError('Invalid value (not lowercase): %(value)s',
  32. code='invalid',
  33. params={'value': value})
  34. def validate_upper(value):
  35. if value != value.upper():
  36. raise ValidationError('Invalid value (not uppercase): %(value)s',
  37. code='invalid',
  38. params={'value': value})
  39. class MyUserManager(BaseUserManager):
  40. def create_user(self, email, password, **extra_fields):
  41. """
  42. Creates and saves a User with the given email, date of
  43. birth and password.
  44. """
  45. if not email:
  46. raise ValueError('Users must have an email address')
  47. email = self.normalize_email(email)
  48. user = self.model(email=email, **extra_fields)
  49. user.set_password(password)
  50. user.save(using=self._db)
  51. return user
  52. def create_superuser(self, email, password):
  53. """
  54. Creates and saves a superuser with the given email, date of
  55. birth and password.
  56. """
  57. user = self.create_user(email, password=password)
  58. user.is_admin = True
  59. user.save(using=self._db)
  60. return user
  61. class User(AbstractBaseUser):
  62. email = models.EmailField(
  63. verbose_name='email address',
  64. max_length=191,
  65. unique=True,
  66. )
  67. is_active = models.BooleanField(default=True)
  68. is_admin = models.BooleanField(default=False)
  69. created = models.DateTimeField(auto_now_add=True)
  70. limit_domains = models.IntegerField(default=settings.LIMIT_USER_DOMAIN_COUNT_DEFAULT, null=True, blank=True)
  71. objects = MyUserManager()
  72. USERNAME_FIELD = 'email'
  73. REQUIRED_FIELDS = []
  74. def get_full_name(self):
  75. return self.email
  76. def get_short_name(self):
  77. return self.email
  78. def get_or_create_first_token(self):
  79. try:
  80. token = Token.objects.filter(user=self).earliest('created')
  81. except Token.DoesNotExist:
  82. token = Token.objects.create(user=self)
  83. return token.key
  84. def __str__(self):
  85. return self.email
  86. # noinspection PyMethodMayBeStatic
  87. def has_perm(self, *_):
  88. """Does the user have a specific permission?"""
  89. # Simplest possible answer: Yes, always
  90. return True
  91. # noinspection PyMethodMayBeStatic
  92. def has_module_perms(self, *_):
  93. """Does the user have permissions to view the app `app_label`?"""
  94. # Simplest possible answer: Yes, always
  95. return True
  96. @property
  97. def is_staff(self):
  98. """Is the user a member of staff?"""
  99. # Simplest possible answer: All admins are staff
  100. return self.is_admin
  101. def activate(self):
  102. self.is_active = True
  103. self.save()
  104. def change_email(self, email):
  105. old_email = self.email
  106. self.email = email
  107. self.validate_unique()
  108. self.save()
  109. self.send_email('change-email-confirmation-old-email', recipient=old_email)
  110. def change_password(self, raw_password):
  111. self.set_password(raw_password)
  112. self.save()
  113. self.send_email('password-change-confirmation')
  114. def send_email(self, reason, context=None, recipient=None):
  115. context = context or {}
  116. reasons = [
  117. 'activate',
  118. 'activate-with-domain',
  119. 'change-email',
  120. 'change-email-confirmation-old-email',
  121. 'password-change-confirmation',
  122. 'reset-password',
  123. 'delete-user',
  124. 'domain-dyndns',
  125. ]
  126. recipient = recipient or self.email
  127. if reason not in reasons:
  128. raise ValueError('Cannot send email to user {} without a good reason: {}'.format(self.pk, reason))
  129. content_tmpl = get_template('emails/{}/content.txt'.format(reason))
  130. subject_tmpl = get_template('emails/{}/subject.txt'.format(reason))
  131. from_tmpl = get_template('emails/from.txt')
  132. footer_tmpl = get_template('emails/footer.txt')
  133. email = EmailMessage(subject_tmpl.render(context).strip(),
  134. content_tmpl.render(context) + footer_tmpl.render(),
  135. from_tmpl.render(),
  136. [recipient])
  137. logger.warning('Sending email for user account %s (reason: %s)', str(self.pk), reason)
  138. email.send()
  139. class Token(rest_framework.authtoken.models.Token):
  140. key = models.CharField("Key", max_length=40, db_index=True, unique=True)
  141. # relation to user is a ForeignKey, so each user can have more than one token
  142. user = models.ForeignKey(
  143. User, related_name='auth_tokens',
  144. on_delete=models.CASCADE, verbose_name="User"
  145. )
  146. name = models.CharField("Name", max_length=64, default="")
  147. user_specific_id = models.BigIntegerField("User-Specific ID")
  148. def save(self, *args, **kwargs):
  149. if not self.user_specific_id:
  150. self.user_specific_id = random.randrange(16 ** 8)
  151. super().save(*args, **kwargs) # Call the "real" save() method.
  152. def generate_key(self):
  153. return b64encode(urandom(21)).decode('utf-8').replace('/', '-').replace('=', '_').replace('+', '.')
  154. class Meta:
  155. abstract = False
  156. unique_together = (('user', 'user_specific_id'),)
  157. validate_domain_name = [
  158. validate_lower,
  159. RegexValidator(
  160. regex=r'^[a-z0-9_.-]*[a-z]$',
  161. message='Invalid value (not a DNS name).',
  162. code='invalid_domain_name'
  163. )
  164. ]
  165. def get_minimum_ttl_default():
  166. return settings.MINIMUM_TTL_DEFAULT
  167. class Domain(models.Model):
  168. created = models.DateTimeField(auto_now_add=True)
  169. name = models.CharField(max_length=191,
  170. unique=True,
  171. validators=validate_domain_name)
  172. owner = models.ForeignKey(User, on_delete=models.PROTECT, related_name='domains')
  173. published = models.DateTimeField(null=True, blank=True)
  174. minimum_ttl = models.PositiveIntegerField(default=get_minimum_ttl_default)
  175. @classmethod
  176. def is_registrable(cls, domain_name: str, user: User):
  177. """
  178. Returns False in any of the following cases:
  179. (a) the domain_name appears on the public suffix list,
  180. (b) the domain is descendant to a zone that belongs to any user different from the given one,
  181. unless it's parent is a public suffix, either through the Internet PSL or local settings.
  182. Otherwise, True is returned.
  183. """
  184. if domain_name != domain_name.lower():
  185. raise ValueError
  186. try:
  187. public_suffix = psl.get_public_suffix(domain_name)
  188. is_public_suffix = psl.is_public_suffix(domain_name)
  189. except psl_dns.exceptions.UnsupportedRule as e:
  190. # It would probably be fine to just return True (with the TLD acting as the
  191. # public suffix and setting both public_suffix and is_public_suffix accordingly).
  192. # However, in order to allow to investigate the situation, it's better not catch
  193. # this exception. For web requests, our error handler turns it into a 503 error
  194. # and makes sure admins are notified.
  195. raise e
  196. if not is_public_suffix:
  197. # Take into account that any of the parent domains could be a local public suffix. To that
  198. # end, identify the longest local public suffix that is actually a suffix of domain_name.
  199. # Then, override the global PSL result.
  200. for local_public_suffix in settings.LOCAL_PUBLIC_SUFFIXES:
  201. has_local_public_suffix_parent = ('.' + domain_name).endswith('.' + local_public_suffix)
  202. if has_local_public_suffix_parent and len(local_public_suffix) > len(public_suffix):
  203. public_suffix = local_public_suffix
  204. is_public_suffix = (public_suffix == domain_name)
  205. if is_public_suffix and domain_name not in settings.LOCAL_PUBLIC_SUFFIXES:
  206. return False
  207. # Generate a list of all domains connecting this one and its public suffix.
  208. # If another user owns a zone with one of these names, then the requested
  209. # domain is unavailable because it is part of the other user's zone.
  210. private_components = domain_name.rsplit(public_suffix, 1)[0].rstrip('.')
  211. private_components = private_components.split('.') if private_components else []
  212. private_components += [public_suffix]
  213. private_domains = ['.'.join(private_components[i:]) for i in range(0, len(private_components) - 1)]
  214. assert is_public_suffix or domain_name == private_domains[0]
  215. # Deny registration for non-local public suffixes and for domains covered by other users' zones
  216. user = user if not isinstance(user, AnonymousUser) else None
  217. return not cls.objects.filter(Q(name__in=private_domains) & ~Q(owner=user)).exists()
  218. @property
  219. def keys(self):
  220. return pdns.get_keys(self)
  221. @property
  222. def is_locally_registrable(self):
  223. return self.parent_domain_name in settings.LOCAL_PUBLIC_SUFFIXES
  224. @property
  225. def parent_domain_name(self):
  226. return self._partitioned_name[1]
  227. @property
  228. def _partitioned_name(self):
  229. subname, _, parent_name = self.name.partition('.')
  230. return subname, parent_name or None
  231. def save(self, *args, **kwargs):
  232. self.full_clean(validate_unique=False)
  233. super().save(*args, **kwargs)
  234. def update_delegation(self, child_domain: Domain):
  235. child_subname, child_domain_name = child_domain._partitioned_name
  236. if self.name != child_domain_name:
  237. raise ValueError('Cannot update delegation of %s as it is not an immediate child domain of %s.' %
  238. (child_domain.name, self.name))
  239. if child_domain.pk:
  240. # Domain real: set delegation
  241. child_keys = child_domain.keys
  242. if not child_keys:
  243. raise APIException('Cannot delegate %s, as it currently has no keys.' % child_domain.name)
  244. RRset.objects.create(domain=self, subname=child_subname, type='NS', ttl=3600, contents=settings.DEFAULT_NS)
  245. RRset.objects.create(domain=self, subname=child_subname, type='DS', ttl=300,
  246. contents=[ds for k in child_keys for ds in k['ds']])
  247. else:
  248. # Domain not real: remove delegation
  249. for rrset in self.rrset_set.filter(subname=child_subname, type__in=['NS', 'DS']):
  250. rrset.delete()
  251. def __str__(self):
  252. return self.name
  253. class Meta:
  254. ordering = ('created',)
  255. def get_default_value_created():
  256. return timezone.now()
  257. def get_default_value_due():
  258. return timezone.now() + timedelta(days=7)
  259. def get_default_value_mref():
  260. return "ONDON" + str(time.time())
  261. class Donation(models.Model):
  262. created = models.DateTimeField(default=get_default_value_created)
  263. name = models.CharField(max_length=255)
  264. iban = models.CharField(max_length=34)
  265. bic = models.CharField(max_length=11)
  266. amount = models.DecimalField(max_digits=8, decimal_places=2)
  267. message = models.CharField(max_length=255, blank=True)
  268. due = models.DateTimeField(default=get_default_value_due)
  269. mref = models.CharField(max_length=32, default=get_default_value_mref)
  270. email = models.EmailField(max_length=255, blank=True)
  271. def save(self, *args, **kwargs):
  272. self.iban = self.iban[:6] + "xxx" # do NOT save account details
  273. super().save(*args, **kwargs)
  274. class Meta:
  275. ordering = ('created',)
  276. class RRsetManager(Manager):
  277. def create(self, contents=None, **kwargs):
  278. rrset = super().create(**kwargs)
  279. for content in contents or []:
  280. RR.objects.create(rrset=rrset, content=content)
  281. return rrset
  282. class RRset(models.Model):
  283. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  284. created = models.DateTimeField(auto_now_add=True)
  285. updated = models.DateTimeField(null=True)
  286. domain = models.ForeignKey(Domain, on_delete=models.CASCADE)
  287. subname = models.CharField(
  288. max_length=178,
  289. blank=True,
  290. validators=[
  291. validate_lower,
  292. RegexValidator(
  293. regex=r'^([*]|(([*][.])?[a-z0-9_.-]*))$',
  294. message='Subname can only use (lowercase) a-z, 0-9, ., -, and _, '
  295. 'may start with a \'*.\', or just be \'*\'.',
  296. code='invalid_subname'
  297. )
  298. ]
  299. )
  300. type = models.CharField(
  301. max_length=10,
  302. validators=[
  303. validate_upper,
  304. RegexValidator(
  305. regex=r'^[A-Z][A-Z0-9]*$',
  306. message='Type must be uppercase alphanumeric and start with a letter.',
  307. code='invalid_type'
  308. )
  309. ]
  310. )
  311. ttl = models.PositiveIntegerField()
  312. objects = RRsetManager()
  313. DEAD_TYPES = ('ALIAS', 'DNAME')
  314. RESTRICTED_TYPES = ('SOA', 'RRSIG', 'DNSKEY', 'NSEC3PARAM', 'OPT')
  315. class Meta:
  316. unique_together = (("domain", "subname", "type"),)
  317. @staticmethod
  318. def construct_name(subname, domain_name):
  319. return '.'.join(filter(None, [subname, domain_name])) + '.'
  320. @property
  321. def name(self):
  322. return self.construct_name(self.subname, self.domain.name)
  323. def save(self, *args, **kwargs):
  324. self.updated = timezone.now()
  325. self.full_clean(validate_unique=False)
  326. super().save(*args, **kwargs)
  327. def __str__(self):
  328. return '<RRSet domain=%s type=%s subname=%s>' % (self.domain.name, self.type, self.subname)
  329. class RRManager(Manager):
  330. def bulk_create(self, rrs, **kwargs):
  331. ret = super().bulk_create(rrs, **kwargs)
  332. # For each rrset, save once to update published timestamp and trigger signal for post-save processing
  333. rrsets = {rr.rrset for rr in rrs}
  334. for rrset in rrsets:
  335. rrset.save()
  336. return ret
  337. class RR(models.Model):
  338. created = models.DateTimeField(auto_now_add=True)
  339. rrset = models.ForeignKey(RRset, on_delete=models.CASCADE, related_name='records')
  340. # max_length is determined based on the calculation in
  341. # https://lists.isc.org/pipermail/bind-users/2008-April/070148.html
  342. content = models.CharField(max_length=4092)
  343. objects = RRManager()
  344. def __str__(self):
  345. return '<RR %s>' % self.content
  346. class AuthenticatedAction(models.Model):
  347. """
  348. Represents a procedure call on a defined set of arguments.
  349. Subclasses can define additional arguments by adding Django model fields and must define the action to be taken by
  350. implementing the `act` method.
  351. AuthenticatedAction provides the `mac` property that returns a Message Authentication Code (MAC) based on the
  352. state. By default, the state contains the action's name (defined by the `name` property) and a timestamp; the
  353. state can be extended by (carefully) overriding the `_mac_state` property. Any AuthenticatedAction instance of
  354. the same subclass and state will deterministically have the same MAC, effectively allowing authenticated
  355. procedure calls by third parties according to the following protocol:
  356. (1) Instantiate the AuthenticatedAction subclass representing the action to be taken with the desired state,
  357. (2) provide information on how to instantiate the instance and the MAC to a third party,
  358. (3) when provided with data that allows instantiation and a valid MAC, take the defined action, possibly with
  359. additional parameters chosen by the third party that do not belong to the verified state.
  360. """
  361. created = models.PositiveIntegerField(default=lambda: int(datetime.timestamp(timezone.now())))
  362. class Meta:
  363. managed = False
  364. def __init__(self, *args, **kwargs):
  365. # silently ignore any value supplied for the mac value, that makes it easier to use with DRF serializers
  366. kwargs.pop('mac', None)
  367. super().__init__(*args, **kwargs)
  368. @property
  369. def mac(self):
  370. """
  371. Deterministically generates a message authentication code (MAC) for this action, based on the state as defined
  372. by `self._mac_state`. Identical state is guaranteed to yield identical MAC.
  373. :return:
  374. """
  375. return Signer().signature(json.dumps(self._mac_state))
  376. def validate_mac(self, mac):
  377. """
  378. Checks if the message authentication code (MAC) provided by the first argument matches the MAC of this action.
  379. Note that expiration is not verified by this method.
  380. :param mac: Message Authentication Code
  381. :return: True, if MAC is valid; False otherwise.
  382. """
  383. return constant_time_compare(
  384. mac,
  385. self.mac,
  386. )
  387. def is_expired(self):
  388. """
  389. Checks if the action's timestamp is older than the given validity period. Note that the message
  390. authentication code itself is not verified by this method.
  391. :return: True if expired, False otherwise.
  392. """
  393. created = datetime.fromtimestamp(self.created, tz=timezone.utc)
  394. return timezone.now() - created > settings.VALIDITY_PERIOD_VERIFICATION_SIGNATURE
  395. @property
  396. def _mac_state(self):
  397. """
  398. Returns a list that defines the state of this action (used for MAC calculation).
  399. Return value must be JSON-serializable.
  400. Values not included in the return value will not be used for MAC calculation, i.e. the MAC will be independent
  401. of them.
  402. Use caution when overriding this method. You will usually want to append a value to the list returned by the
  403. parent. Overriding the behavior altogether could result in reducing the state to fewer variables, resulting
  404. in valid signatures when they were intended to be invalid. The suggested method for overriding is
  405. @property
  406. def _mac_state:
  407. return super()._mac_state + [self.important_value, self.another_added_value]
  408. :return: List of values to be signed.
  409. """
  410. # TODO consider adding a "last change" attribute of the user to the state to avoid code
  411. # re-use after the the state has been changed and changed back.
  412. name = '.'.join([self.__module__, self.__class__.__qualname__])
  413. return [name, self.created]
  414. def act(self):
  415. """
  416. Conduct the action represented by this class.
  417. :return: None
  418. """
  419. raise NotImplementedError
  420. class AuthenticatedUserAction(AuthenticatedAction):
  421. """
  422. Abstract AuthenticatedAction involving an user instance, incorporating the user's id, email, password, and
  423. is_active flag into the Message Authentication Code state.
  424. """
  425. user = models.ForeignKey(User, on_delete=models.DO_NOTHING)
  426. class Meta:
  427. managed = False
  428. @property
  429. def _mac_state(self):
  430. return super()._mac_state + [self.user.id, self.user.email, self.user.password, self.user.is_active]
  431. def act(self):
  432. raise NotImplementedError
  433. class AuthenticatedActivateUserAction(AuthenticatedUserAction):
  434. domain = models.CharField(max_length=191)
  435. class Meta:
  436. managed = False
  437. @property
  438. def _mac_state(self):
  439. return super()._mac_state + [self.domain]
  440. def act(self):
  441. self.user.activate()
  442. class AuthenticatedChangeEmailUserAction(AuthenticatedUserAction):
  443. new_email = models.EmailField()
  444. class Meta:
  445. managed = False
  446. @property
  447. def _mac_state(self):
  448. return super()._mac_state + [self.new_email]
  449. def act(self):
  450. self.user.change_email(self.new_email)
  451. class AuthenticatedResetPasswordUserAction(AuthenticatedUserAction):
  452. new_password = models.CharField(max_length=128)
  453. class Meta:
  454. managed = False
  455. def act(self):
  456. self.user.change_password(self.new_password)
  457. class AuthenticatedDeleteUserAction(AuthenticatedUserAction):
  458. class Meta:
  459. managed = False
  460. def act(self):
  461. self.user.delete()
  462. def captcha_default_content():
  463. alphabet = (string.ascii_uppercase + string.digits).translate({ord(c): None for c in 'IO0'})
  464. return ''.join([secrets.choice(alphabet) for _ in range(5)])
  465. class Captcha(models.Model):
  466. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  467. created = models.DateTimeField(auto_now_add=True)
  468. content = models.CharField(
  469. max_length=24,
  470. default=captcha_default_content,
  471. )
  472. def verify(self, solution: str):
  473. age = timezone.now() - self.created
  474. self.delete()
  475. return (
  476. str(solution).upper().strip() == self.content # solution correct
  477. and
  478. age <= settings.CAPTCHA_VALIDITY_PERIOD # not expired
  479. )