views.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492
  1. from __future__ import unicode_literals
  2. from django.core.mail import EmailMessage
  3. from desecapi.models import Domain, User, RRset
  4. from desecapi.serializers import (
  5. DomainSerializer, RRsetSerializer, DonationSerializer)
  6. from rest_framework import generics
  7. from desecapi.permissions import IsOwner, IsDomainOwner
  8. from rest_framework import permissions
  9. from django.http import Http404, HttpResponseRedirect
  10. from rest_framework.views import APIView
  11. from rest_framework.response import Response
  12. from rest_framework.reverse import reverse
  13. from rest_framework.authentication import (
  14. TokenAuthentication, get_authorization_header)
  15. from rest_framework.renderers import StaticHTMLRenderer
  16. from dns import resolver
  17. from django.template.loader import get_template
  18. from django.template import Context
  19. from desecapi.authentication import (
  20. BasicTokenAuthentication, URLParamAuthentication)
  21. import base64
  22. from desecapi import settings
  23. from rest_framework.exceptions import (
  24. APIException, MethodNotAllowed, PermissionDenied, ValidationError)
  25. import django.core.exceptions
  26. from djoser import views, signals
  27. from rest_framework import status
  28. from datetime import timedelta
  29. from django.utils import timezone
  30. from desecapi.forms import UnlockForm
  31. from django.shortcuts import render
  32. from django.db.models import Q
  33. from desecapi.emails import send_account_lock_email, send_token_email
  34. import re
  35. import ipaddress, os
  36. # TODO Generalize?
  37. patternDyn = re.compile(r'^[A-Za-z-][A-Za-z0-9_-]*\.dedyn\.io$')
  38. patternNonDyn = re.compile(r'^([A-Za-z0-9-][A-Za-z0-9_-]*\.)+[A-Za-z]+$')
  39. def get_client_ip(request):
  40. return request.META.get('REMOTE_ADDR')
  41. class DomainList(generics.ListCreateAPIView):
  42. serializer_class = DomainSerializer
  43. permission_classes = (permissions.IsAuthenticated, IsOwner,)
  44. def get_queryset(self):
  45. return Domain.objects.filter(owner=self.request.user.pk)
  46. def perform_create(self, serializer):
  47. pattern = patternDyn if self.request.user.dyn else patternNonDyn
  48. if pattern.match(serializer.validated_data['name']) is None:
  49. ex = ValidationError(detail={"detail": "This domain name is not well-formed, by policy.", "code": "domain-illformed"})
  50. ex.status_code = status.HTTP_409_CONFLICT
  51. raise ex
  52. # Generate a list containing this and all higher-level domain names
  53. list = [serializer.validated_data['name']]
  54. index = 0
  55. try:
  56. while True:
  57. index = list[0].index('.', index) + 1
  58. list.append(list[0][index:])
  59. except ValueError:
  60. pass
  61. queryset = Domain.objects.filter(Q(name=list[0]) | (Q(name__in=list[1:]) & ~Q(owner=self.request.user)))
  62. if queryset.exists():
  63. ex = ValidationError(detail={"detail": "This domain name is unavailable.", "code": "domain-unavailable"})
  64. ex.status_code = status.HTTP_409_CONFLICT
  65. raise ex
  66. if self.request.user.limit_domains is not None and self.request.user.domains.count() >= self.request.user.limit_domains:
  67. ex = ValidationError(detail={"detail": "You reached the maximum number of domains allowed for your account.", "code": "domain-limit"})
  68. ex.status_code = status.HTTP_403_FORBIDDEN
  69. raise ex
  70. try:
  71. obj = serializer.save(owner=self.request.user)
  72. except Exception as e:
  73. if str(e).endswith(' already exists'):
  74. ex = ValidationError(detail={"detail": "This domain name is unavailable.", "code": "domain-unavailable"})
  75. ex.status_code = status.HTTP_409_CONFLICT
  76. raise ex
  77. else:
  78. raise e
  79. def sendDynDnsEmail(domain):
  80. content_tmpl = get_template('emails/domain-dyndns/content.txt')
  81. subject_tmpl = get_template('emails/domain-dyndns/subject.txt')
  82. from_tmpl = get_template('emails/from.txt')
  83. context = Context({
  84. 'domain': domain.name,
  85. 'url': 'https://update.dedyn.io/',
  86. 'username': domain.name,
  87. 'password': self.request.auth.key
  88. })
  89. email = EmailMessage(subject_tmpl.render(context),
  90. content_tmpl.render(context),
  91. from_tmpl.render(context),
  92. [self.request.user.email])
  93. email.send()
  94. if obj.name.endswith('.dedyn.io'):
  95. sendDynDnsEmail(obj)
  96. class DomainDetail(generics.RetrieveUpdateDestroyAPIView):
  97. serializer_class = DomainSerializer
  98. permission_classes = (permissions.IsAuthenticated, IsOwner,)
  99. def delete(self, request, *args, **kwargs):
  100. try:
  101. super(DomainDetail, self).delete(request, *args, **kwargs)
  102. except Http404:
  103. pass
  104. return Response(status=status.HTTP_204_NO_CONTENT)
  105. def get_queryset(self):
  106. return Domain.objects.filter(owner=self.request.user.pk)
  107. def update(self, request, *args, **kwargs):
  108. try:
  109. return super(DomainDetail, self).update(request, *args, **kwargs)
  110. except django.core.exceptions.ValidationError as e:
  111. ex = ValidationError(detail={"detail": str(e)})
  112. ex.status_code = status.HTTP_409_CONFLICT
  113. raise ex
  114. class DomainDetailByName(DomainDetail):
  115. lookup_field = 'name'
  116. class RRsetDetail(generics.RetrieveUpdateDestroyAPIView):
  117. lookup_field = 'type'
  118. serializer_class = RRsetSerializer
  119. permission_classes = (permissions.IsAuthenticated, IsDomainOwner,)
  120. restricted_types = ('SOA', 'RRSIG', 'DNSKEY', 'NSEC3PARAM')
  121. def delete(self, request, *args, **kwargs):
  122. try:
  123. super().delete(request, *args, **kwargs)
  124. except Http404:
  125. pass
  126. return Response(status=status.HTTP_204_NO_CONTENT)
  127. def get_queryset(self):
  128. name = self.kwargs['name']
  129. subname = self.kwargs['subname'].replace('=2F', '/')
  130. type_ = self.kwargs['type']
  131. if type_ in self.restricted_types:
  132. raise PermissionDenied("You cannot tinker with the %s RRset." % type_)
  133. return RRset.objects.filter(
  134. domain__owner=self.request.user.pk,
  135. domain__name=name, subname=subname, type=type_)
  136. def update(self, request, *args, **kwargs):
  137. if request.data.get('records') == []:
  138. return self.delete(request, *args, **kwargs)
  139. try:
  140. return super().update(request, *args, **kwargs)
  141. except django.core.exceptions.ValidationError as e:
  142. ex = ValidationError(detail=e.message_dict)
  143. ex.status_code = status.HTTP_409_CONFLICT
  144. raise ex
  145. class RRsetList(generics.ListCreateAPIView):
  146. serializer_class = RRsetSerializer
  147. permission_classes = (permissions.IsAuthenticated, IsDomainOwner,)
  148. def get_queryset(self):
  149. rrsets = RRset.objects.filter(domain__owner=self.request.user.pk,
  150. domain__name=self.kwargs['name'])
  151. for filter_field in ('subname', 'type'):
  152. value = self.request.query_params.get(filter_field)
  153. if value is not None:
  154. if filter_field == 'type' and value in RRsetDetail.restricted_types:
  155. raise PermissionDenied("You cannot tinker with the %s RRset." % value)
  156. rrsets = rrsets.filter(**{'%s__exact' % filter_field: value})
  157. return rrsets
  158. def create(self, request, *args, **kwargs):
  159. type_ = request.data.get('type', '')
  160. if type_ in RRsetDetail.restricted_types:
  161. raise PermissionDenied("You cannot tinker with the %s RRset." % type_)
  162. try:
  163. return super().create(request, *args, **kwargs)
  164. except Domain.DoesNotExist:
  165. raise Http404
  166. except django.core.exceptions.ValidationError as e:
  167. ex = ValidationError(detail=e.message_dict)
  168. ex.status_code = status.HTTP_422_UNPROCESSABLE_ENTITY
  169. raise ex
  170. def perform_create(self, serializer):
  171. # Associate RRset with proper domain
  172. domain = Domain.objects.get(name=self.kwargs['name'],
  173. owner=self.request.user.pk)
  174. kwargs = {'domain': domain}
  175. # If this RRset is new and a subname has not been given, set it empty
  176. #
  177. # Notes:
  178. # - We don't use default='' in the serializer so that during PUT, the
  179. # subname value is retained if omitted.)
  180. # - Don't use kwargs['subname'] = self.request.data.get('subname', ''),
  181. # giving preference to what's in serializer.validated_data at this point
  182. if self.request.method == 'POST' and self.request.data.get('subname') is None:
  183. kwargs['subname'] = ''
  184. serializer.save(**kwargs)
  185. def get(self, request, *args, **kwargs):
  186. name = self.kwargs['name']
  187. if not Domain.objects.filter(name=name, owner=self.request.user.pk):
  188. raise Http404
  189. return super().get(request, *args, **kwargs)
  190. class Root(APIView):
  191. def get(self, request, format=None):
  192. if self.request.user and self.request.user.is_authenticated():
  193. return Response({
  194. 'domains': reverse('domain-list'),
  195. 'user': reverse('user'),
  196. 'logout:': reverse('logout'),
  197. })
  198. else:
  199. return Response({
  200. 'login': reverse('login', request=request, format=format),
  201. 'register': reverse('register', request=request, format=format),
  202. })
  203. class DnsQuery(APIView):
  204. def get(self, request, format=None):
  205. desecio = resolver.Resolver()
  206. if not 'domain' in request.GET:
  207. return Response(status=status.HTTP_400_BAD_REQUEST)
  208. domain = str(request.GET['domain'])
  209. def getRecords(domain, type_):
  210. records = []
  211. try:
  212. for ip in desecio.query(domain, type_):
  213. records.append(str(ip))
  214. except resolver.NoAnswer:
  215. return []
  216. except resolver.NoNameservers:
  217. return []
  218. except resolver.NXDOMAIN:
  219. return []
  220. return records
  221. # find currently active NS records
  222. nsrecords = getRecords(domain, 'NS')
  223. # find desec.io nameserver IP address with standard nameserver
  224. ips = desecio.query('ns2.desec.io')
  225. desecio.nameservers = []
  226. for ip in ips:
  227. desecio.nameservers.append(str(ip))
  228. # query desec.io nameserver for A and AAAA records
  229. arecords = getRecords(domain, 'A')
  230. aaaarecords = getRecords(domain, 'AAAA')
  231. return Response({
  232. 'domain': domain,
  233. 'ns': nsrecords,
  234. 'a': arecords,
  235. 'aaaa': aaaarecords,
  236. '_nameserver': desecio.nameservers
  237. })
  238. class DynDNS12Update(APIView):
  239. authentication_classes = (TokenAuthentication, BasicTokenAuthentication, URLParamAuthentication,)
  240. renderer_classes = [StaticHTMLRenderer]
  241. def findDomain(self, request):
  242. def findDomainname(request):
  243. # 1. hostname parameter
  244. if 'hostname' in request.query_params and request.query_params['hostname'] != 'YES':
  245. return request.query_params['hostname']
  246. # 2. host_id parameter
  247. if 'host_id' in request.query_params:
  248. return request.query_params['host_id']
  249. # 3. http basic auth username
  250. try:
  251. domainname = base64.b64decode(get_authorization_header(request).decode().split(' ')[1].encode()).decode().split(':')[0]
  252. if domainname:
  253. return domainname
  254. except IndexError:
  255. pass
  256. except UnicodeDecodeError:
  257. pass
  258. # 4. username parameter
  259. if 'username' in request.query_params:
  260. return request.query_params['username']
  261. # 5. only domain associated with this user account
  262. if len(request.user.domains.all()) == 1:
  263. return request.user.domains.all()[0].name
  264. if len(request.user.domains.all()) > 1:
  265. ex = ValidationError(detail={"detail": "Request does not specify domain unambiguously.", "code": "domain-ambiguous"})
  266. ex.status_code = status.HTTP_409_CONFLICT
  267. raise ex
  268. return None
  269. domainname = findDomainname(request)
  270. domain = None
  271. # load and check permissions
  272. try:
  273. domain = Domain.objects.filter(owner=self.request.user.pk, name=domainname).all()[0]
  274. except:
  275. pass
  276. return domain
  277. def findIP(self, request, params, version=4):
  278. if version == 4:
  279. lookfor = '.'
  280. elif version == 6:
  281. lookfor = ':'
  282. else:
  283. raise Exception
  284. # Check URL parameters
  285. for p in params:
  286. if p in request.query_params and lookfor in request.query_params[p]:
  287. return request.query_params[p]
  288. # Check remote IP address
  289. client_ip = get_client_ip(request)
  290. if lookfor in client_ip:
  291. return client_ip
  292. # give up
  293. return ''
  294. def findIPv4(self, request):
  295. return self.findIP(request, ['myip', 'myipv4', 'ip'])
  296. def findIPv6(self, request):
  297. return self.findIP(request, ['myipv6', 'ipv6', 'myip', 'ip'], version=6)
  298. def get(self, request, format=None):
  299. domain = self.findDomain(request)
  300. if domain is None:
  301. raise Http404
  302. domain.arecord = self.findIPv4(request)
  303. domain.aaaarecord = self.findIPv6(request)
  304. domain.save()
  305. return Response('good')
  306. class DonationList(generics.CreateAPIView):
  307. serializer_class = DonationSerializer
  308. def perform_create(self, serializer):
  309. iban = serializer.validated_data['iban']
  310. obj = serializer.save()
  311. def sendDonationEmails(donation):
  312. context = Context({
  313. 'donation': donation,
  314. 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
  315. 'complete_iban': iban
  316. })
  317. # internal desec notification
  318. content_tmpl = get_template('emails/donation/desec-content.txt')
  319. subject_tmpl = get_template('emails/donation/desec-subject.txt')
  320. attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
  321. from_tmpl = get_template('emails/from.txt')
  322. email = EmailMessage(subject_tmpl.render(context),
  323. content_tmpl.render(context),
  324. from_tmpl.render(context),
  325. ['donation@desec.io'],
  326. attachments=[
  327. ('jameica-directdebit.xml',
  328. attachment_tmpl.render(context),
  329. 'text/xml')
  330. ])
  331. email.send()
  332. # donor notification
  333. if donation.email:
  334. content_tmpl = get_template('emails/donation/donor-content.txt')
  335. subject_tmpl = get_template('emails/donation/donor-subject.txt')
  336. test = content_tmpl.render(context)
  337. email = EmailMessage(subject_tmpl.render(context),
  338. content_tmpl.render(context),
  339. from_tmpl.render(context),
  340. [donation.email])
  341. email.send()
  342. # send emails
  343. sendDonationEmails(obj)
  344. class RegistrationView(views.RegistrationView):
  345. """
  346. Extends the djoser RegistrationView to record the remote IP address of any registration.
  347. """
  348. def create(self, request, *args, **kwargs):
  349. serializer = self.get_serializer(data=request.data)
  350. serializer.is_valid(raise_exception=True)
  351. self.perform_create(serializer, get_client_ip(request))
  352. headers = self.get_success_headers(serializer.data)
  353. return Response(serializer.data, status=status.HTTP_201_CREATED, headers=headers)
  354. def perform_create(self, serializer, remote_ip):
  355. captcha = (
  356. ipaddress.ip_address(remote_ip) not in ipaddress.IPv6Network(os.environ['DESECSTACK_IPV6_SUBNET'])
  357. and (
  358. User.objects.filter(
  359. created__gte=timezone.now()-timedelta(hours=settings.ABUSE_BY_REMOTE_IP_PERIOD_HRS),
  360. registration_remote_ip=remote_ip
  361. ).count() >= settings.ABUSE_BY_REMOTE_IP_LIMIT
  362. or
  363. User.objects.filter(
  364. created__gte=timezone.now() - timedelta(hours=settings.ABUSE_BY_EMAIL_HOSTNAME_PERIOD_HRS),
  365. email__endswith=serializer.validated_data['email'].split('@')[-1]
  366. ).count() >= settings.ABUSE_BY_EMAIL_HOSTNAME_LIMIT
  367. )
  368. )
  369. user = serializer.save(registration_remote_ip=remote_ip, captcha_required=captcha)
  370. if captcha:
  371. send_account_lock_email(self.request, user)
  372. elif not user.dyn:
  373. context = Context({'token': user.get_token()})
  374. send_token_email(context, user)
  375. signals.user_registered.send(sender=self.__class__, user=user, request=self.request)
  376. def unlock(request, email):
  377. # if this is a POST request we need to process the form data
  378. if request.method == 'POST':
  379. # create a form instance and populate it with data from the request:
  380. form = UnlockForm(request.POST)
  381. # check whether it's valid:
  382. if form.is_valid():
  383. try:
  384. user = User.objects.get(email=email)
  385. user.unlock()
  386. if not user.dyn:
  387. context = Context({'token': user.get_token()})
  388. send_token_email(context, user)
  389. except User.DoesNotExist:
  390. pass # fail silently, otherwise people can find out if email addresses are registered with us
  391. return HttpResponseRedirect(reverse('unlock/done'))
  392. # if a GET (or any other method) we'll create a blank form
  393. else:
  394. form = UnlockForm()
  395. return render(request, 'unlock.html', {'form': form})
  396. def unlock_done(request):
  397. return render(request, 'unlock-done.html')