models.py 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670
  1. from __future__ import annotations
  2. import json
  3. import logging
  4. import re
  5. import secrets
  6. import string
  7. import time
  8. import uuid
  9. from datetime import timedelta
  10. from functools import cached_property
  11. from hashlib import sha256
  12. import psl_dns
  13. import rest_framework.authtoken.models
  14. from django.conf import settings
  15. from django.contrib.auth.hashers import make_password
  16. from django.contrib.auth.models import BaseUserManager, AbstractBaseUser
  17. from django.core.exceptions import ValidationError
  18. from django.core.mail import EmailMessage, get_connection
  19. from django.core.validators import RegexValidator
  20. from django.db import models
  21. from django.db.models import Manager, Q
  22. from django.template.loader import get_template
  23. from django.utils import timezone
  24. from django_prometheus.models import ExportModelOperationsMixin
  25. from dns.exception import Timeout
  26. from dns.resolver import NoNameservers
  27. from rest_framework.exceptions import APIException
  28. from desecapi import metrics
  29. from desecapi import pdns
  30. logger = logging.getLogger(__name__)
  31. psl = psl_dns.PSL(resolver=settings.PSL_RESOLVER, timeout=.5)
  32. def validate_lower(value):
  33. if value != value.lower():
  34. raise ValidationError('Invalid value (not lowercase): %(value)s',
  35. code='invalid',
  36. params={'value': value})
  37. def validate_upper(value):
  38. if value != value.upper():
  39. raise ValidationError('Invalid value (not uppercase): %(value)s',
  40. code='invalid',
  41. params={'value': value})
  42. class MyUserManager(BaseUserManager):
  43. def create_user(self, email, password, **extra_fields):
  44. """
  45. Creates and saves a User with the given email, date of
  46. birth and password.
  47. """
  48. if not email:
  49. raise ValueError('Users must have an email address')
  50. email = self.normalize_email(email)
  51. user = self.model(email=email, **extra_fields)
  52. user.set_password(password)
  53. user.save(using=self._db)
  54. return user
  55. def create_superuser(self, email, password):
  56. """
  57. Creates and saves a superuser with the given email, date of
  58. birth and password.
  59. """
  60. user = self.create_user(email, password=password)
  61. user.is_admin = True
  62. user.save(using=self._db)
  63. return user
  64. class User(ExportModelOperationsMixin('User'), AbstractBaseUser):
  65. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  66. email = models.EmailField(
  67. verbose_name='email address',
  68. max_length=191,
  69. unique=True,
  70. )
  71. is_active = models.BooleanField(default=True)
  72. is_admin = models.BooleanField(default=False)
  73. created = models.DateTimeField(auto_now_add=True)
  74. limit_domains = models.IntegerField(default=settings.LIMIT_USER_DOMAIN_COUNT_DEFAULT, null=True, blank=True)
  75. objects = MyUserManager()
  76. USERNAME_FIELD = 'email'
  77. REQUIRED_FIELDS = []
  78. def get_full_name(self):
  79. return self.email
  80. def get_short_name(self):
  81. return self.email
  82. def __str__(self):
  83. return self.email
  84. # noinspection PyMethodMayBeStatic
  85. def has_perm(self, *_):
  86. """Does the user have a specific permission?"""
  87. # Simplest possible answer: Yes, always
  88. return True
  89. # noinspection PyMethodMayBeStatic
  90. def has_module_perms(self, *_):
  91. """Does the user have permissions to view the app `app_label`?"""
  92. # Simplest possible answer: Yes, always
  93. return True
  94. @property
  95. def is_staff(self):
  96. """Is the user a member of staff?"""
  97. # Simplest possible answer: All admins are staff
  98. return self.is_admin
  99. def activate(self):
  100. self.is_active = True
  101. self.save()
  102. def change_email(self, email):
  103. old_email = self.email
  104. self.email = email
  105. self.validate_unique()
  106. self.save()
  107. self.send_email('change-email-confirmation-old-email', recipient=old_email)
  108. def change_password(self, raw_password):
  109. self.set_password(raw_password)
  110. self.save()
  111. self.send_email('password-change-confirmation')
  112. def send_email(self, reason, context=None, recipient=None):
  113. fast_lane = 'email_fast_lane'
  114. slow_lane = 'email_slow_lane'
  115. lanes = {
  116. 'activate': slow_lane,
  117. 'activate-with-domain': slow_lane,
  118. 'change-email': slow_lane,
  119. 'change-email-confirmation-old-email': fast_lane,
  120. 'password-change-confirmation': fast_lane,
  121. 'reset-password': fast_lane,
  122. 'delete-user': fast_lane,
  123. 'domain-dyndns': fast_lane,
  124. }
  125. if reason not in lanes:
  126. raise ValueError(f'Cannot send email to user {self.pk} without a good reason: {reason}')
  127. context = context or {}
  128. context.setdefault('link_expiration_hours',
  129. settings.VALIDITY_PERIOD_VERIFICATION_SIGNATURE // timedelta(hours=1))
  130. content = get_template(f'emails/{reason}/content.txt').render(context)
  131. content += f'\nSupport Reference: user_id = {self.pk}\n'
  132. footer = get_template('emails/footer.txt').render()
  133. logger.warning(f'Queuing email for user account {self.pk} (reason: {reason})')
  134. num_queued = EmailMessage(
  135. subject=get_template(f'emails/{reason}/subject.txt').render(context).strip(),
  136. body=content + footer,
  137. from_email=get_template('emails/from.txt').render(),
  138. to=[recipient or self.email],
  139. connection=get_connection(lane=lanes[reason], debug={'user': self.pk, 'reason': reason})
  140. ).send()
  141. metrics.get('desecapi_messages_queued').labels(reason, self.pk, lanes[reason]).observe(num_queued)
  142. return num_queued
  143. class Token(ExportModelOperationsMixin('Token'), rest_framework.authtoken.models.Token):
  144. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  145. key = models.CharField("Key", max_length=128, db_index=True, unique=True)
  146. user = models.ForeignKey(
  147. User, related_name='auth_tokens',
  148. on_delete=models.CASCADE, verbose_name="User"
  149. )
  150. name = models.CharField('Name', blank=True, max_length=64)
  151. last_used = models.DateTimeField(null=True, blank=True)
  152. plain = None
  153. def generate_key(self):
  154. self.plain = secrets.token_urlsafe(21)
  155. self.key = Token.make_hash(self.plain)
  156. return self.key
  157. @staticmethod
  158. def make_hash(plain):
  159. return make_password(plain, salt='static', hasher='pbkdf2_sha256_iter1')
  160. validate_domain_name = [
  161. validate_lower,
  162. RegexValidator(
  163. # TODO See how far this validation can be relaxed (allow for non-hostname domains?)
  164. regex=r'^(([a-z0-9][a-z0-9-]{0,61}[a-z0-9]|[a-z0-9])\.)*[a-z]{1,63}$',
  165. message='Domain names must be labels separated by dots. Labels may consist of up to 63 hyphens, digits, and '
  166. 'letters, and must not start or end with a hyphen. The last label may only contain letters.',
  167. code='invalid_domain_name',
  168. flags=re.IGNORECASE
  169. )
  170. ]
  171. def get_minimum_ttl_default():
  172. return settings.MINIMUM_TTL_DEFAULT
  173. class Domain(ExportModelOperationsMixin('Domain'), models.Model):
  174. created = models.DateTimeField(auto_now_add=True)
  175. name = models.CharField(max_length=191,
  176. unique=True,
  177. validators=validate_domain_name)
  178. owner = models.ForeignKey(User, on_delete=models.PROTECT, related_name='domains')
  179. published = models.DateTimeField(null=True, blank=True)
  180. minimum_ttl = models.PositiveIntegerField(default=get_minimum_ttl_default)
  181. _keys = None
  182. @cached_property
  183. def public_suffix(self):
  184. try:
  185. public_suffix = psl.get_public_suffix(self.name)
  186. is_public_suffix = psl.is_public_suffix(self.name)
  187. except (Timeout, NoNameservers):
  188. public_suffix = self.name.rpartition('.')[2]
  189. is_public_suffix = ('.' not in self.name) # TLDs are public suffixes
  190. except psl_dns.exceptions.UnsupportedRule as e:
  191. # It would probably be fine to treat this as a non-public suffix (with the TLD acting as the
  192. # public suffix and setting both public_suffix and is_public_suffix accordingly).
  193. # However, in order to allow to investigate the situation, it's better not catch
  194. # this exception. For web requests, our error handler turns it into a 503 error
  195. # and makes sure admins are notified.
  196. raise e
  197. if is_public_suffix:
  198. return public_suffix
  199. # Take into account that any of the parent domains could be a local public suffix. To that
  200. # end, identify the longest local public suffix that is actually a suffix of domain_name.
  201. for local_public_suffix in settings.LOCAL_PUBLIC_SUFFIXES:
  202. has_local_public_suffix_parent = ('.' + self.name).endswith('.' + local_public_suffix)
  203. if has_local_public_suffix_parent and len(local_public_suffix) > len(public_suffix):
  204. public_suffix = local_public_suffix
  205. return public_suffix
  206. def is_covered_by_foreign_zone(self):
  207. # Generate a list of all domains connecting this one and its public suffix.
  208. # If another user owns a zone with one of these names, then the requested
  209. # domain is unavailable because it is part of the other user's zone.
  210. private_components = self.name.rsplit(self.public_suffix, 1)[0].rstrip('.')
  211. private_components = private_components.split('.') if private_components else []
  212. private_domains = ['.'.join(private_components[i:]) for i in range(0, len(private_components))]
  213. private_domains = [f'{private_domain}.{self.public_suffix}' for private_domain in private_domains]
  214. assert self.name == next(iter(private_domains), self.public_suffix)
  215. # Determine whether domain is covered by other users' zones
  216. return Domain.objects.filter(Q(name__in=private_domains) & ~Q(owner=self._owner_or_none)).exists()
  217. def covers_foreign_zone(self):
  218. # Note: This is not completely accurate: Ideally, we should only consider zones with identical public suffix.
  219. # (If a public suffix lies in between, it's ok.) However, as there could be many descendant zones, the accurate
  220. # check is expensive, so currently not implemented (PSL lookups for each of them).
  221. return Domain.objects.filter(Q(name__endswith=f'.{self.name}') & ~Q(owner=self._owner_or_none)).exists()
  222. def is_registrable(self):
  223. """
  224. Returns False if the domain name is reserved, a public suffix, or covered by / covers another user's domain.
  225. Otherwise, True is returned.
  226. """
  227. self.clean() # ensure .name is a domain name
  228. private_generation = self.name.count('.') - self.public_suffix.count('.')
  229. assert private_generation >= 0
  230. # .internal is reserved
  231. if f'.{self.name}'.endswith('.internal'):
  232. return False
  233. # Public suffixes can only be registered if they are local
  234. if private_generation == 0 and self.name not in settings.LOCAL_PUBLIC_SUFFIXES:
  235. return False
  236. # Disallow _acme-challenge.dedyn.io and the like. Rejects reserved direct children of public suffixes.
  237. reserved_prefixes = ('_', 'autoconfig.', 'autodiscover.',)
  238. if private_generation == 1 and any(self.name.startswith(prefix) for prefix in reserved_prefixes):
  239. return False
  240. # Domains covered by another user's zone can't be registered
  241. if self.is_covered_by_foreign_zone():
  242. return False
  243. # Domains that would cover another user's zone can't be registered
  244. if self.covers_foreign_zone():
  245. return False
  246. return True
  247. @property
  248. def keys(self):
  249. if not self._keys:
  250. self._keys = pdns.get_keys(self)
  251. return self._keys
  252. @property
  253. def touched(self):
  254. try:
  255. rrset_touched = max(updated for updated in self.rrset_set.values_list('touched', flat=True))
  256. # If the domain has not been published yet, self.published is None and max() would fail
  257. return rrset_touched if not self.published else max(rrset_touched, self.published)
  258. except ValueError:
  259. # This can be none if the domain was never published and has no records (but there should be at least NS)
  260. return self.published
  261. @property
  262. def is_locally_registrable(self):
  263. return self.parent_domain_name in settings.LOCAL_PUBLIC_SUFFIXES
  264. @property
  265. def _owner_or_none(self):
  266. try:
  267. return self.owner
  268. except Domain.owner.RelatedObjectDoesNotExist:
  269. return None
  270. @property
  271. def parent_domain_name(self):
  272. return self._partitioned_name[1]
  273. @property
  274. def _partitioned_name(self):
  275. subname, _, parent_name = self.name.partition('.')
  276. return subname, parent_name or None
  277. def save(self, *args, **kwargs):
  278. self.full_clean(validate_unique=False)
  279. super().save(*args, **kwargs)
  280. def update_delegation(self, child_domain: Domain):
  281. child_subname, child_domain_name = child_domain._partitioned_name
  282. if self.name != child_domain_name:
  283. raise ValueError('Cannot update delegation of %s as it is not an immediate child domain of %s.' %
  284. (child_domain.name, self.name))
  285. if child_domain.pk:
  286. # Domain real: set delegation
  287. child_keys = child_domain.keys
  288. if not child_keys:
  289. raise APIException('Cannot delegate %s, as it currently has no keys.' % child_domain.name)
  290. RRset.objects.create(domain=self, subname=child_subname, type='NS', ttl=3600, contents=settings.DEFAULT_NS)
  291. RRset.objects.create(domain=self, subname=child_subname, type='DS', ttl=300,
  292. contents=[ds for k in child_keys for ds in k['ds']])
  293. metrics.get('desecapi_autodelegation_created').inc()
  294. else:
  295. # Domain not real: remove delegation
  296. for rrset in self.rrset_set.filter(subname=child_subname, type__in=['NS', 'DS']):
  297. rrset.delete()
  298. metrics.get('desecapi_autodelegation_deleted').inc()
  299. def delete(self):
  300. ret = super().delete()
  301. logger.warning(f'Domain {self.name} deleted (owner: {self.owner.pk})')
  302. return ret
  303. def __str__(self):
  304. return self.name
  305. class Meta:
  306. ordering = ('created',)
  307. def get_default_value_created():
  308. return timezone.now()
  309. def get_default_value_due():
  310. return timezone.now() + timedelta(days=7)
  311. def get_default_value_mref():
  312. return "ONDON" + str(time.time())
  313. class Donation(ExportModelOperationsMixin('Donation'), models.Model):
  314. created = models.DateTimeField(default=get_default_value_created)
  315. name = models.CharField(max_length=255)
  316. iban = models.CharField(max_length=34)
  317. bic = models.CharField(max_length=11, blank=True)
  318. amount = models.DecimalField(max_digits=8, decimal_places=2)
  319. message = models.CharField(max_length=255, blank=True)
  320. due = models.DateTimeField(default=get_default_value_due)
  321. mref = models.CharField(max_length=32, default=get_default_value_mref)
  322. email = models.EmailField(max_length=255, blank=True)
  323. class Meta:
  324. managed = False
  325. class RRsetManager(Manager):
  326. def create(self, contents=None, **kwargs):
  327. rrset = super().create(**kwargs)
  328. for content in contents or []:
  329. RR.objects.create(rrset=rrset, content=content)
  330. return rrset
  331. class RRset(ExportModelOperationsMixin('RRset'), models.Model):
  332. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  333. created = models.DateTimeField(auto_now_add=True)
  334. touched = models.DateTimeField(auto_now=True)
  335. domain = models.ForeignKey(Domain, on_delete=models.CASCADE)
  336. subname = models.CharField(
  337. max_length=178,
  338. blank=True,
  339. validators=[
  340. validate_lower,
  341. RegexValidator(
  342. regex=r'^([*]|(([*][.])?[a-z0-9_.-]*))$',
  343. message='Subname can only use (lowercase) a-z, 0-9, ., -, and _, '
  344. 'may start with a \'*.\', or just be \'*\'.',
  345. code='invalid_subname'
  346. )
  347. ]
  348. )
  349. type = models.CharField(
  350. max_length=10,
  351. validators=[
  352. validate_upper,
  353. RegexValidator(
  354. regex=r'^[A-Z][A-Z0-9]*$',
  355. message='Type must be uppercase alphanumeric and start with a letter.',
  356. code='invalid_type'
  357. )
  358. ]
  359. )
  360. ttl = models.PositiveIntegerField()
  361. objects = RRsetManager()
  362. DEAD_TYPES = ('ALIAS', 'DNAME')
  363. RESTRICTED_TYPES = ('SOA', 'RRSIG', 'DNSKEY', 'NSEC3PARAM', 'OPT')
  364. class Meta:
  365. unique_together = (("domain", "subname", "type"),)
  366. @staticmethod
  367. def construct_name(subname, domain_name):
  368. return '.'.join(filter(None, [subname, domain_name])) + '.'
  369. @property
  370. def name(self):
  371. return self.construct_name(self.subname, self.domain.name)
  372. def save(self, *args, **kwargs):
  373. self.full_clean(validate_unique=False)
  374. super().save(*args, **kwargs)
  375. def __str__(self):
  376. return '<RRSet %s domain=%s type=%s subname=%s>' % (self.pk, self.domain.name, self.type, self.subname)
  377. class RRManager(Manager):
  378. def bulk_create(self, rrs, **kwargs):
  379. ret = super().bulk_create(rrs, **kwargs)
  380. # For each rrset, save once to set RRset.updated timestamp and trigger signal for post-save processing
  381. rrsets = {rr.rrset for rr in rrs}
  382. for rrset in rrsets:
  383. rrset.save()
  384. return ret
  385. class RR(ExportModelOperationsMixin('RR'), models.Model):
  386. created = models.DateTimeField(auto_now_add=True)
  387. rrset = models.ForeignKey(RRset, on_delete=models.CASCADE, related_name='records')
  388. # The pdns lmdb backend used on our slaves does not only store the record contents itself, but other metadata (such
  389. # as type etc.) Both together have to fit into the lmdb backend's current total limit of 512 bytes per RR, see
  390. # https://github.com/PowerDNS/pdns/issues/8012
  391. # I found the additional data to be 12 bytes (by trial and error). I believe these are the 12 bytes mentioned here:
  392. # https://lists.isc.org/pipermail/bind-users/2008-April/070137.html So we can use 500 bytes for the actual content.
  393. # Note: This is a conservative estimate, as record contents may be stored more efficiently depending on their type,
  394. # effectively allowing a longer length in "presentation format". For example, A record contents take up 4 bytes,
  395. # although the presentation format (usual IPv4 representation) takes up to 15 bytes. Similarly, OPENPGPKEY contents
  396. # are base64-decoded before storage in binary format, so a "presentation format" value (which is the value our API
  397. # sees) can have up to 668 bytes. Instead of introducing per-type limits, setting it to 500 should always work.
  398. content = models.CharField(max_length=500) #
  399. objects = RRManager()
  400. def __str__(self):
  401. return '<RR %s %s rr_set=%s>' % (self.pk, self.content, self.rrset.pk)
  402. class AuthenticatedAction(ExportModelOperationsMixin('AuthenticatedAction'), models.Model):
  403. """
  404. Represents a procedure call on a defined set of arguments.
  405. Subclasses can define additional arguments by adding Django model fields and must define the action to be taken by
  406. implementing the `_act` method.
  407. AuthenticatedAction provides the `state` property which by default is a hash of the action type (defined by the
  408. action's class path). Other information such as user state can be included in the state hash by (carefully)
  409. overriding the `_state_fields` property. Instantiation of the model, if given a `state` kwarg, will raise an error
  410. if the given state argument does not match the state computed from `_state_fields` at the moment of instantiation.
  411. The same applies to the `act` method: If called on an object that was instantiated without a `state` kwargs, an
  412. error will be raised.
  413. This effectively allows hash-authenticated procedure calls by third parties as long as the server-side state is
  414. unaltered, according to the following protocol:
  415. (1) Instantiate the AuthenticatedAction subclass representing the action to be taken (no `state` kwarg here),
  416. (2) provide information on how to instantiate the instance, and the state hash, to a third party,
  417. (3) when provided with data that allows instantiation and a valid state hash, take the defined action, possibly with
  418. additional parameters chosen by the third party that do not belong to the verified state.
  419. """
  420. _validated = False
  421. class Meta:
  422. managed = False
  423. def __init__(self, *args, **kwargs):
  424. state = kwargs.pop('state', None)
  425. super().__init__(*args, **kwargs)
  426. if state is not None:
  427. self._validated = self.validate_state(state)
  428. if not self._validated:
  429. raise ValueError
  430. @property
  431. def _state_fields(self):
  432. """
  433. Returns a list that defines the state of this action (used for authentication of this action).
  434. Return value must be JSON-serializable.
  435. Values not included in the return value will not be used for authentication, i.e. those values can be varied
  436. freely and function as unauthenticated action input parameters.
  437. Use caution when overriding this method. You will usually want to append a value to the list returned by the
  438. parent. Overriding the behavior altogether could result in reducing the state to fewer variables, resulting
  439. in valid signatures when they were intended to be invalid. The suggested method for overriding is
  440. @property
  441. def _state_fields:
  442. return super()._state_fields + [self.important_value, self.another_added_value]
  443. :return: List of values to be signed.
  444. """
  445. # TODO consider adding a "last change" attribute of the user to the state to avoid code
  446. # re-use after the the state has been changed and changed back.
  447. name = '.'.join([self.__module__, self.__class__.__qualname__])
  448. return [name]
  449. @property
  450. def state(self):
  451. state = json.dumps(self._state_fields).encode()
  452. hash = sha256()
  453. hash.update(state)
  454. return hash.hexdigest()
  455. def validate_state(self, value):
  456. return value == self.state
  457. def _act(self):
  458. """
  459. Conduct the action represented by this class.
  460. :return: None
  461. """
  462. raise NotImplementedError
  463. def act(self):
  464. if not self._validated:
  465. raise RuntimeError('Action state could not be verified.')
  466. return self._act()
  467. class AuthenticatedUserAction(ExportModelOperationsMixin('AuthenticatedUserAction'), AuthenticatedAction):
  468. """
  469. Abstract AuthenticatedAction involving an user instance, incorporating the user's id, email, password, and
  470. is_active flag into the Message Authentication Code state.
  471. """
  472. user = models.ForeignKey(User, on_delete=models.DO_NOTHING)
  473. class Meta:
  474. managed = False
  475. @property
  476. def _state_fields(self):
  477. return super()._state_fields + [str(self.user.id), self.user.email, self.user.password, self.user.is_active]
  478. def _act(self):
  479. raise NotImplementedError
  480. class AuthenticatedActivateUserAction(ExportModelOperationsMixin('AuthenticatedActivateUserAction'), AuthenticatedUserAction):
  481. domain = models.CharField(max_length=191)
  482. class Meta:
  483. managed = False
  484. @property
  485. def _state_fields(self):
  486. return super()._state_fields + [self.domain]
  487. def _act(self):
  488. self.user.activate()
  489. class AuthenticatedChangeEmailUserAction(ExportModelOperationsMixin('AuthenticatedChangeEmailUserAction'), AuthenticatedUserAction):
  490. new_email = models.EmailField()
  491. class Meta:
  492. managed = False
  493. @property
  494. def _state_fields(self):
  495. return super()._state_fields + [self.new_email]
  496. def _act(self):
  497. self.user.change_email(self.new_email)
  498. class AuthenticatedResetPasswordUserAction(ExportModelOperationsMixin('AuthenticatedResetPasswordUserAction'), AuthenticatedUserAction):
  499. new_password = models.CharField(max_length=128)
  500. class Meta:
  501. managed = False
  502. def _act(self):
  503. self.user.change_password(self.new_password)
  504. class AuthenticatedDeleteUserAction(ExportModelOperationsMixin('AuthenticatedDeleteUserAction'), AuthenticatedUserAction):
  505. class Meta:
  506. managed = False
  507. def _act(self):
  508. self.user.delete()
  509. def captcha_default_content():
  510. alphabet = (string.ascii_uppercase + string.digits).translate({ord(c): None for c in 'IO0'})
  511. content = ''.join([secrets.choice(alphabet) for _ in range(5)])
  512. metrics.get('desecapi_captcha_content_created').inc()
  513. return content
  514. class Captcha(ExportModelOperationsMixin('Captcha'), models.Model):
  515. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  516. created = models.DateTimeField(auto_now_add=True)
  517. content = models.CharField(
  518. max_length=24,
  519. default=captcha_default_content,
  520. )
  521. def verify(self, solution: str):
  522. age = timezone.now() - self.created
  523. self.delete()
  524. return (
  525. str(solution).upper().strip() == self.content # solution correct
  526. and
  527. age <= settings.CAPTCHA_VALIDITY_PERIOD # not expired
  528. )