test_domains.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370
  1. import json
  2. from django.conf import settings
  3. from django.core import mail
  4. from django.core.exceptions import ValidationError
  5. from psl_dns.exceptions import UnsupportedRule
  6. from rest_framework import status
  7. from desecapi.models import Domain
  8. from desecapi.pdns_change_tracker import PDNSChangeTracker
  9. from desecapi.tests.base import DesecTestCase, DomainOwnerTestCase, LockedDomainOwnerTestCase
  10. class UnauthenticatedDomainTests(DesecTestCase):
  11. def test_unauthorized_access(self):
  12. for url in [
  13. self.reverse('v1:domain-list'),
  14. self.reverse('v1:domain-detail', name='example.com.')
  15. ]:
  16. for method in [self.client.put, self.client.delete]:
  17. self.assertStatus(method(url), status.HTTP_401_UNAUTHORIZED)
  18. class DomainOwnerTestCase1(DomainOwnerTestCase):
  19. def test_name_validity(self):
  20. for name in [
  21. 'FOO.BAR.com',
  22. 'tEst.dedyn.io',
  23. 'ORG',
  24. '--BLAH.example.com',
  25. '_ASDF.jp',
  26. ]:
  27. with self.assertRaises(ValidationError):
  28. Domain(owner=self.owner, name=name).save()
  29. for name in [
  30. '_example.com', '_.example.com',
  31. '-dedyn.io', '--dedyn.io', '-.dedyn123.io',
  32. 'foobar.io', 'exam_ple.com',
  33. ]:
  34. with self.assertPdnsRequests(
  35. self.requests_desec_domain_creation(name=name)[:-1] # no serializer, no cryptokeys API call
  36. ), PDNSChangeTracker():
  37. Domain(owner=self.owner, name=name).save()
  38. def test_list_domains(self):
  39. with self.assertPdnsNoRequestsBut(self.request_pdns_zone_retrieve_crypto_keys()):
  40. response = self.client.get(self.reverse('v1:domain-list'))
  41. self.assertStatus(response, status.HTTP_200_OK)
  42. self.assertEqual(len(response.data), self.NUM_OWNED_DOMAINS)
  43. for i in range(self.NUM_OWNED_DOMAINS):
  44. self.assertEqual(response.data[i]['name'], self.my_domains[i].name)
  45. def test_delete_my_domain(self):
  46. url = self.reverse('v1:domain-detail', name=self.my_domain.name)
  47. with self.assertPdnsRequests(self.requests_desec_domain_deletion()):
  48. response = self.client.delete(url)
  49. self.assertStatus(response, status.HTTP_204_NO_CONTENT)
  50. self.assertFalse(Domain.objects.filter(pk=self.my_domain.pk).exists())
  51. response = self.client.get(url)
  52. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  53. def test_delete_other_domain(self):
  54. url = self.reverse('v1:domain-detail', name=self.other_domain.name)
  55. response = self.client.delete(url)
  56. self.assertStatus(response, status.HTTP_204_NO_CONTENT)
  57. self.assertTrue(Domain.objects.filter(pk=self.other_domain.pk).exists())
  58. def test_retrieve_my_domain(self):
  59. url = self.reverse('v1:domain-detail', name=self.my_domain.name)
  60. with self.assertPdnsRequests(
  61. self.request_pdns_zone_retrieve_crypto_keys(name=self.my_domain.name)
  62. ):
  63. response = self.client.get(url)
  64. self.assertStatus(response, status.HTTP_200_OK)
  65. self.assertEqual(response.data['name'], self.my_domain.name)
  66. self.assertTrue(isinstance(response.data['keys'], list))
  67. def test_retrieve_other_domains(self):
  68. for domain in self.other_domains:
  69. response = self.client.get(self.reverse('v1:domain-detail', name=domain.name))
  70. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  71. def test_update_my_domain_name(self):
  72. url = self.reverse('v1:domain-detail', name=self.my_domain.name)
  73. with self.assertPdnsRequests(self.request_pdns_zone_retrieve_crypto_keys(name=self.my_domain.name)):
  74. response = self.client.get(url)
  75. self.assertStatus(response, status.HTTP_200_OK)
  76. response.data['name'] = self.random_domain_name()
  77. response = self.client.put(url, response.data, format='json')
  78. self.assertStatus(response, status.HTTP_400_BAD_REQUEST)
  79. with self.assertPdnsRequests(self.request_pdns_zone_retrieve_crypto_keys(name=self.my_domain.name)):
  80. response = self.client.get(url)
  81. self.assertStatus(response, status.HTTP_200_OK)
  82. self.assertEqual(response.data['name'], self.my_domain.name)
  83. def test_update_other_domains(self):
  84. url = self.reverse('v1:domain-detail', name=self.other_domain.name)
  85. response = self.client.put(url, {}, format='json')
  86. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  87. def test_create_domains(self):
  88. self.owner.limit_domains = 100
  89. self.owner.save()
  90. for name in [
  91. '0.8.0.0.0.1.c.a.2.4.6.0.c.e.e.d.4.4.0.1.a.0.1.0.8.f.4.0.1.0.a.2.ip6.arpa',
  92. 'very.long.domain.name.' + self.random_domain_name(),
  93. self.random_domain_name(),
  94. 'very.long.domain.name.with_underscore.' + self.random_domain_name(),
  95. ]:
  96. with self.assertPdnsRequests(self.requests_desec_domain_creation(name)):
  97. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  98. self.assertStatus(response, status.HTTP_201_CREATED)
  99. self.assertEqual(len(mail.outbox), 0)
  100. with self.assertPdnsRequests(self.request_pdns_zone_retrieve_crypto_keys(name)):
  101. self.assertStatus(
  102. self.client.get(self.reverse('v1:domain-detail', name=name), {'name': name}),
  103. status.HTTP_200_OK
  104. )
  105. response = self.client.get_rr_sets(name, type='NS', subname='')
  106. self.assertStatus(response, status.HTTP_200_OK)
  107. self.assertContainsRRSets(response.data, [dict(subname='', records=settings.DEFAULT_NS, type='NS')])
  108. def test_create_api_known_domain(self):
  109. url = self.reverse('v1:domain-list')
  110. for name in [
  111. self.random_domain_name(),
  112. 'www.' + self.my_domain.name,
  113. ]:
  114. with self.assertPdnsRequests(self.requests_desec_domain_creation(name)):
  115. response = self.client.post(url, {'name': name})
  116. self.assertStatus(response, status.HTTP_201_CREATED)
  117. response = self.client.post(url, {'name': name})
  118. self.assertStatus(response, status.HTTP_400_BAD_REQUEST)
  119. def test_create_pdns_known_domain(self):
  120. url = self.reverse('v1:domain-list')
  121. name = self.random_domain_name()
  122. with self.assertPdnsRequests(self.request_pdns_zone_create_already_exists(existing_domains=[name])):
  123. response = self.client.post(url, {'name': name})
  124. self.assertStatus(response, status.HTTP_400_BAD_REQUEST)
  125. def test_create_domain_with_whitespace(self):
  126. for name in [
  127. ' ' + self.random_domain_name(),
  128. self.random_domain_name() + ' ',
  129. ]:
  130. self.assertResponse(
  131. self.client.post(self.reverse('v1:domain-list'), {'name': name}),
  132. status.HTTP_400_BAD_REQUEST,
  133. {'name': ['Domain name malformed.']},
  134. )
  135. def test_create_public_suffixes(self):
  136. for name in self.PUBLIC_SUFFIXES:
  137. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  138. self.assertStatus(response, status.HTTP_409_CONFLICT)
  139. self.assertEqual(response.data['code'], 'domain-unavailable')
  140. def test_create_domain_under_public_suffix_with_private_parent(self):
  141. name = 'amazonaws.com'
  142. with self.assertPdnsRequests(self.requests_desec_domain_creation(name)[:-1]), PDNSChangeTracker():
  143. Domain(owner=self.create_user(), name=name).save()
  144. self.assertTrue(Domain.objects.filter(name=name).exists())
  145. # If amazonaws.com is owned by another user, we cannot register test.s4.amazonaws.com
  146. name = 'test.s4.amazonaws.com'
  147. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  148. self.assertStatus(response, status.HTTP_409_CONFLICT)
  149. self.assertEqual(response.data['code'], 'domain-unavailable')
  150. # s3.amazonaws.com is a public suffix. Therefore, test.s3.amazonaws.com can be
  151. # registered even if the parent zone amazonaws.com is owned by another user
  152. name = 'test.s3.amazonaws.com'
  153. psl_cm = self.get_psl_context_manager('s3.amazonaws.com')
  154. with psl_cm, self.assertPdnsRequests(self.requests_desec_domain_creation(name)):
  155. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  156. self.assertStatus(response, status.HTTP_201_CREATED)
  157. def test_create_domain_under_unsupported_public_suffix_rule(self):
  158. # Show lenience if the PSL library produces an UnsupportedRule exception
  159. name = 'unsupported.wildcard.test'
  160. psl_cm = self.get_psl_context_manager(UnsupportedRule)
  161. with psl_cm, self.assertPdnsRequests():
  162. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  163. self.assertStatus(response, status.HTTP_503_SERVICE_UNAVAILABLE)
  164. def test_create_domain_policy(self):
  165. name = '*.' + self.random_domain_name()
  166. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  167. self.assertStatus(response, status.HTTP_400_BAD_REQUEST)
  168. self.assertTrue("Domain name malformed." in response.data['name'][0])
  169. def test_create_domain_other_parent(self):
  170. name = 'something.' + self.other_domain.name
  171. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  172. self.assertStatus(response, status.HTTP_409_CONFLICT)
  173. self.assertIn('domain name is unavailable.', response.data['detail'])
  174. def test_create_domain_atomicity(self):
  175. name = self.random_domain_name()
  176. with self.assertPdnsRequests(self.request_pdns_zone_create_422()):
  177. self.client.post(self.reverse('v1:domain-list'), {'name': name})
  178. self.assertFalse(Domain.objects.filter(name=name).exists())
  179. def test_create_domain_punycode(self):
  180. names = ['公司.cn', 'aéroport.ci']
  181. for name in names:
  182. self.assertStatus(
  183. self.client.post(self.reverse('v1:domain-list'), {'name': name}),
  184. status.HTTP_400_BAD_REQUEST
  185. )
  186. for name in [n.encode('idna').decode('ascii') for n in names]:
  187. with self.assertPdnsRequests(self.requests_desec_domain_creation(name=name)):
  188. self.assertStatus(
  189. self.client.post(self.reverse('v1:domain-list'), {'name': name}),
  190. status.HTTP_201_CREATED
  191. )
  192. def test_create_domain_name_validation(self):
  193. for name in [
  194. 'with space.dedyn.io',
  195. 'another space.de',
  196. ' spaceatthebeginning.com',
  197. 'percentage%sign.com',
  198. '%percentagesign.dedyn.io',
  199. 'slash/desec.io',
  200. '/slashatthebeginning.dedyn.io',
  201. '\\backslashatthebeginning.dedyn.io',
  202. 'backslash\\inthemiddle.at',
  203. '@atsign.com',
  204. 'at@sign.com',
  205. ]:
  206. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  207. self.assertStatus(response, status.HTTP_400_BAD_REQUEST)
  208. self.assertEqual(len(mail.outbox), 0)
  209. class LockedDomainOwnerTestCase1(LockedDomainOwnerTestCase):
  210. def test_create_domains(self):
  211. name = self.random_domain_name()
  212. with self.assertPdnsRequests(self.requests_desec_domain_creation(name)):
  213. self.assertStatus(
  214. self.client.post(self.reverse('v1:domain-list'), {'name': name}),
  215. status.HTTP_201_CREATED
  216. )
  217. def test_update_domains(self):
  218. url = self.reverse('v1:domain-detail', name=self.my_domain.name)
  219. name = self.random_domain_name()
  220. for method in [self.client.patch, self.client.put]:
  221. with PDNSChangeTracker():
  222. response = method(url, {'name': name})
  223. self.assertStatus(response, status.HTTP_400_BAD_REQUEST) # TODO fix docs, consider to change code
  224. with self.assertPdnsRequests(self.requests_desec_domain_deletion(name=self.my_domain.name)):
  225. response = self.client.delete(url)
  226. self.assertStatus(response, status.HTTP_204_NO_CONTENT)
  227. def test_create_rr_sets(self):
  228. data = {'records': ['1.2.3.4'], 'ttl': 60, 'type': 'A'}
  229. response = self.client.post_rr_set(self.my_domain.name, **data)
  230. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  231. def test_update_rr_sets(self):
  232. type_ = 'A'
  233. for subname in ['', '*', 'asdf', 'asdf.adsf.asdf']:
  234. data = {'records': ['1.2.3.4'], 'ttl': 60}
  235. response = self.client.put_rr_set(self.my_domain.name, subname, type_, data)
  236. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  237. for patch_request in [
  238. {'records': ['1.2.3.4'], 'ttl': 60},
  239. {'records': [], 'ttl': 60},
  240. {'records': []},
  241. {'ttl': 60},
  242. {},
  243. ]:
  244. response = self.client.patch_rr_set(self.my_domain.name, subname, type_, patch_request)
  245. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  246. # Try DELETE
  247. response = self.client.delete_rr_set(self.my_domain.name, subname, type_)
  248. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  249. class AutoDelegationDomainOwnerTests(DomainOwnerTestCase):
  250. DYN = True
  251. def test_delete_my_domain(self):
  252. url = self.reverse('v1:domain-detail', name=self.my_domain.name)
  253. with self.assertPdnsRequests(
  254. self.requests_desec_domain_deletion_auto_delegation(name=self.my_domain.name)
  255. ):
  256. response = self.client.delete(url)
  257. self.assertStatus(response, status.HTTP_204_NO_CONTENT)
  258. response = self.client.get(url)
  259. self.assertStatus(response, status.HTTP_404_NOT_FOUND)
  260. def test_delete_other_domains(self):
  261. url = self.reverse('v1:domain-detail', name=self.other_domain.name)
  262. with self.assertPdnsRequests():
  263. response = self.client.delete(url)
  264. self.assertStatus(response, status.HTTP_204_NO_CONTENT)
  265. self.assertTrue(Domain.objects.filter(pk=self.other_domain.pk).exists())
  266. def test_create_auto_delegated_domains(self):
  267. for i, suffix in enumerate(self.AUTO_DELEGATION_DOMAINS):
  268. name = self.random_domain_name(suffix)
  269. with self.assertPdnsRequests(self.requests_desec_domain_creation_auto_delegation(name=name)):
  270. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  271. self.assertStatus(response, status.HTTP_201_CREATED)
  272. self.assertEqual(len(mail.outbox), i + 1)
  273. email = str(mail.outbox[0].message())
  274. self.assertTrue(name in email)
  275. self.assertTrue(self.token.key in email)
  276. self.assertFalse(self.user.plain_password in email)
  277. def test_create_regular_domains(self):
  278. for name in [
  279. self.random_domain_name(),
  280. 'very.long.domain.' + self.random_domain_name()
  281. ]:
  282. response = self.client.post(self.reverse('v1:domain-list'), {'name': name})
  283. self.assertStatus(response, status.HTTP_409_CONFLICT)
  284. self.assertEqual(response.data['code'], 'domain-illformed')
  285. def test_domain_limit(self):
  286. url = self.reverse('v1:domain-list')
  287. user_quota = settings.LIMIT_USER_DOMAIN_COUNT_DEFAULT - self.NUM_OWNED_DOMAINS
  288. for i in range(user_quota):
  289. name = self.random_domain_name(self.AUTO_DELEGATION_DOMAINS)
  290. with self.assertPdnsRequests(self.requests_desec_domain_creation_auto_delegation(name)):
  291. response = self.client.post(url, {'name': name})
  292. self.assertStatus(response, status.HTTP_201_CREATED)
  293. self.assertEqual(len(mail.outbox), i + 1)
  294. response = self.client.post(url, {'name': self.random_domain_name(self.AUTO_DELEGATION_DOMAINS)})
  295. self.assertStatus(response, status.HTTP_403_FORBIDDEN)
  296. self.assertEqual(len(mail.outbox), user_quota)
  297. class LockedAutoDelegationDomainOwnerTests(LockedDomainOwnerTestCase):
  298. DYN = True
  299. def test_create_domain(self):
  300. name = self.random_domain_name(suffix=self.AUTO_DELEGATION_DOMAINS)
  301. with self.assertPdnsRequests(self.requests_desec_domain_creation_auto_delegation(name)):
  302. self.assertStatus(
  303. self.client.post(self.reverse('v1:domain-list'), {'name': name}),
  304. status.HTTP_201_CREATED
  305. )
  306. def test_create_rrset(self):
  307. self.assertStatus(
  308. self.client.post_rr_set(self.my_domain.name, type='A', records=['1.1.1.1']),
  309. status.HTTP_403_FORBIDDEN
  310. )