123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948 |
- from __future__ import annotations
- import binascii
- import ipaddress
- import json
- import logging
- import re
- import secrets
- import string
- import time
- import uuid
- from datetime import timedelta
- from functools import cached_property
- from hashlib import sha256
- import dns
- import psl_dns
- import rest_framework.authtoken.models
- from django.conf import settings
- from django.contrib.auth.hashers import make_password
- from django.contrib.auth.models import AbstractBaseUser, AnonymousUser, BaseUserManager
- from django.contrib.postgres.constraints import ExclusionConstraint
- from django.contrib.postgres.fields import ArrayField, CIEmailField, RangeOperators
- from django.core.exceptions import ValidationError
- from django.core.mail import EmailMessage, get_connection
- from django.core.validators import MinValueValidator, RegexValidator
- from django.db import models
- from django.db.models import Manager, Q
- from django.db.models.expressions import RawSQL
- from django.template.loader import get_template
- from django.utils import timezone
- from django_prometheus.models import ExportModelOperationsMixin
- from dns import rdataclass, rdatatype
- from dns.exception import Timeout
- from dns.rdtypes import ANY, IN
- from dns.resolver import NoNameservers
- from netfields import CidrAddressField, NetManager
- from rest_framework.exceptions import APIException
- from desecapi import metrics
- from desecapi import pdns
- from desecapi.dns import CDS, DLV, DS, LongQuotedTXT
- logger = logging.getLogger(__name__)
- psl = psl_dns.PSL(resolver=settings.PSL_RESOLVER, timeout=.5)
- def validate_lower(value):
- if value != value.lower():
- raise ValidationError('Invalid value (not lowercase): %(value)s',
- code='invalid',
- params={'value': value})
- def validate_upper(value):
- if value != value.upper():
- raise ValidationError('Invalid value (not uppercase): %(value)s',
- code='invalid',
- params={'value': value})
- class MyUserManager(BaseUserManager):
- def create_user(self, email, password, **extra_fields):
- """
- Creates and saves a User with the given email, date of
- birth and password.
- """
- if not email:
- raise ValueError('Users must have an email address')
- email = self.normalize_email(email)
- user = self.model(email=email, **extra_fields)
- user.set_password(password)
- user.save(using=self._db)
- return user
- def create_superuser(self, email, password):
- """
- Creates and saves a superuser with the given email, date of
- birth and password.
- """
- user = self.create_user(email, password=password)
- user.is_admin = True
- user.save(using=self._db)
- return user
- class User(ExportModelOperationsMixin('User'), AbstractBaseUser):
- @staticmethod
- def _limit_domains_default():
- return settings.LIMIT_USER_DOMAIN_COUNT_DEFAULT
- id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
- email = CIEmailField(
- verbose_name='email address',
- unique=True,
- )
- is_active = models.BooleanField(default=True)
- is_admin = models.BooleanField(default=False)
- created = models.DateTimeField(auto_now_add=True)
- limit_domains = models.IntegerField(default=_limit_domains_default.__func__, null=True, blank=True)
- needs_captcha = models.BooleanField(default=True)
- objects = MyUserManager()
- USERNAME_FIELD = 'email'
- REQUIRED_FIELDS = []
- def get_full_name(self):
- return self.email
- def get_short_name(self):
- return self.email
- def __str__(self):
- return self.email
- # noinspection PyMethodMayBeStatic
- def has_perm(self, *_):
- """Does the user have a specific permission?"""
- # Simplest possible answer: Yes, always
- return True
- # noinspection PyMethodMayBeStatic
- def has_module_perms(self, *_):
- """Does the user have permissions to view the app `app_label`?"""
- # Simplest possible answer: Yes, always
- return True
- @property
- def is_staff(self):
- """Is the user a member of staff?"""
- # Simplest possible answer: All admins are staff
- return self.is_admin
- def activate(self):
- self.is_active = True
- self.needs_captcha = False
- self.save()
- def change_email(self, email):
- old_email = self.email
- self.email = email
- self.validate_unique()
- self.save()
- self.send_email('change-email-confirmation-old-email', recipient=old_email)
- def change_password(self, raw_password):
- self.set_password(raw_password)
- self.save()
- self.send_email('password-change-confirmation')
- def delete(self):
- pk = self.pk
- ret = super().delete()
- logger.warning(f'User {pk} deleted')
- return ret
- def send_email(self, reason, context=None, recipient=None):
- fast_lane = 'email_fast_lane'
- slow_lane = 'email_slow_lane'
- immediate_lane = 'email_immediate_lane'
- lanes = {
- 'activate': slow_lane,
- 'activate-with-domain': slow_lane,
- 'change-email': slow_lane,
- 'change-email-confirmation-old-email': fast_lane,
- 'password-change-confirmation': fast_lane,
- 'reset-password': fast_lane,
- 'delete-user': fast_lane,
- 'domain-dyndns': fast_lane,
- 'renew-domain': immediate_lane,
- }
- if reason not in lanes:
- raise ValueError(f'Cannot send email to user {self.pk} without a good reason: {reason}')
- context = context or {}
- content = get_template(f'emails/{reason}/content.txt').render(context)
- content += f'\nSupport Reference: user_id = {self.pk}\n'
- footer = get_template('emails/footer.txt').render()
- logger.warning(f'Queuing email for user account {self.pk} (reason: {reason}, lane: {lanes[reason]})')
- num_queued = EmailMessage(
- subject=get_template(f'emails/{reason}/subject.txt').render(context).strip(),
- body=content + footer,
- from_email=get_template('emails/from.txt').render(),
- to=[recipient or self.email],
- connection=get_connection(lane=lanes[reason], debug={'user': self.pk, 'reason': reason})
- ).send()
- metrics.get('desecapi_messages_queued').labels(reason, self.pk, lanes[reason]).observe(num_queued)
- return num_queued
- validate_domain_name = [
- validate_lower,
- RegexValidator(
- regex=r'^(([a-z0-9_-]{1,63})\.)*[a-z0-9-]{1,63}$',
- message='Domain names must be labels separated by dots. Labels may consist of up to 63 letters, digits, '
- 'hyphens, and underscores. The last label may not contain an underscore.',
- code='invalid_domain_name',
- flags=re.IGNORECASE
- )
- ]
- class Domain(ExportModelOperationsMixin('Domain'), models.Model):
- @staticmethod
- def _minimum_ttl_default():
- return settings.MINIMUM_TTL_DEFAULT
- class RenewalState(models.IntegerChoices):
- IMMORTAL = 0
- FRESH = 1
- NOTIFIED = 2
- WARNED = 3
- created = models.DateTimeField(auto_now_add=True)
- name = models.CharField(max_length=191,
- unique=True,
- validators=validate_domain_name)
- owner = models.ForeignKey(User, on_delete=models.PROTECT, related_name='domains')
- published = models.DateTimeField(null=True, blank=True)
- replicated = models.DateTimeField(null=True, blank=True)
- replication_duration = models.DurationField(null=True, blank=True)
- minimum_ttl = models.PositiveIntegerField(default=_minimum_ttl_default.__func__)
- renewal_state = models.IntegerField(choices=RenewalState.choices, default=RenewalState.IMMORTAL)
- renewal_changed = models.DateTimeField(auto_now_add=True)
- _keys = None
- def __init__(self, *args, **kwargs):
- if isinstance(kwargs.get('owner'), AnonymousUser):
- kwargs = {**kwargs, 'owner': None} # make a copy and override
- # Avoid super().__init__(owner=None, ...) to not mess up *values instantiation in django.db.models.Model.from_db
- super().__init__(*args, **kwargs)
- if self.pk is None and kwargs.get('renewal_state') is None and self.is_locally_registrable:
- self.renewal_state = Domain.RenewalState.FRESH
- @cached_property
- def public_suffix(self):
- try:
- public_suffix = psl.get_public_suffix(self.name)
- is_public_suffix = psl.is_public_suffix(self.name)
- except (Timeout, NoNameservers):
- public_suffix = self.name.rpartition('.')[2]
- is_public_suffix = ('.' not in self.name) # TLDs are public suffixes
- except psl_dns.exceptions.UnsupportedRule as e:
- # It would probably be fine to treat this as a non-public suffix (with the TLD acting as the
- # public suffix and setting both public_suffix and is_public_suffix accordingly).
- # However, in order to allow to investigate the situation, it's better not catch
- # this exception. For web requests, our error handler turns it into a 503 error
- # and makes sure admins are notified.
- raise e
- if is_public_suffix:
- return public_suffix
- # Take into account that any of the parent domains could be a local public suffix. To that
- # end, identify the longest local public suffix that is actually a suffix of domain_name.
- for local_public_suffix in settings.LOCAL_PUBLIC_SUFFIXES:
- has_local_public_suffix_parent = ('.' + self.name).endswith('.' + local_public_suffix)
- if has_local_public_suffix_parent and len(local_public_suffix) > len(public_suffix):
- public_suffix = local_public_suffix
- return public_suffix
- def is_covered_by_foreign_zone(self):
- # Generate a list of all domains connecting this one and its public suffix.
- # If another user owns a zone with one of these names, then the requested
- # domain is unavailable because it is part of the other user's zone.
- private_components = self.name.rsplit(self.public_suffix, 1)[0].rstrip('.')
- private_components = private_components.split('.') if private_components else []
- private_domains = ['.'.join(private_components[i:]) for i in range(0, len(private_components))]
- private_domains = [f'{private_domain}.{self.public_suffix}' for private_domain in private_domains]
- assert self.name == next(iter(private_domains), self.public_suffix)
- # Determine whether domain is covered by other users' zones
- return Domain.objects.filter(Q(name__in=private_domains) & ~Q(owner=self._owner_or_none)).exists()
- def covers_foreign_zone(self):
- # Note: This is not completely accurate: Ideally, we should only consider zones with identical public suffix.
- # (If a public suffix lies in between, it's ok.) However, as there could be many descendant zones, the accurate
- # check is expensive, so currently not implemented (PSL lookups for each of them).
- return Domain.objects.filter(Q(name__endswith=f'.{self.name}') & ~Q(owner=self._owner_or_none)).exists()
- def is_registrable(self):
- """
- Returns False if the domain name is reserved, a public suffix, or covered by / covers another user's domain.
- Otherwise, True is returned.
- """
- self.clean() # ensure .name is a domain name
- private_generation = self.name.count('.') - self.public_suffix.count('.')
- assert private_generation >= 0
- # .internal is reserved
- if f'.{self.name}'.endswith('.internal'):
- return False
- # Public suffixes can only be registered if they are local
- if private_generation == 0 and self.name not in settings.LOCAL_PUBLIC_SUFFIXES:
- return False
- # Disallow _acme-challenge.dedyn.io and the like. Rejects reserved direct children of public suffixes.
- reserved_prefixes = ('_', 'autoconfig.', 'autodiscover.',)
- if private_generation == 1 and any(self.name.startswith(prefix) for prefix in reserved_prefixes):
- return False
- # Domains covered by another user's zone can't be registered
- if self.is_covered_by_foreign_zone():
- return False
- # Domains that would cover another user's zone can't be registered
- if self.covers_foreign_zone():
- return False
- return True
- @property
- def keys(self):
- if not self._keys:
- self._keys = pdns.get_keys(self)
- return self._keys
- @property
- def touched(self):
- try:
- rrset_touched = max(updated for updated in self.rrset_set.values_list('touched', flat=True))
- # If the domain has not been published yet, self.published is None and max() would fail
- return rrset_touched if not self.published else max(rrset_touched, self.published)
- except ValueError:
- # This can be none if the domain was never published and has no records (but there should be at least NS)
- return self.published
- @property
- def is_locally_registrable(self):
- return self.parent_domain_name in settings.LOCAL_PUBLIC_SUFFIXES
- @property
- def _owner_or_none(self):
- try:
- return self.owner
- except Domain.owner.RelatedObjectDoesNotExist:
- return None
- @property
- def parent_domain_name(self):
- return self._partitioned_name[1]
- @property
- def _partitioned_name(self):
- subname, _, parent_name = self.name.partition('.')
- return subname, parent_name or None
- def save(self, *args, **kwargs):
- self.full_clean(validate_unique=False)
- super().save(*args, **kwargs)
- def update_delegation(self, child_domain: Domain):
- child_subname, child_domain_name = child_domain._partitioned_name
- if self.name != child_domain_name:
- raise ValueError('Cannot update delegation of %s as it is not an immediate child domain of %s.' %
- (child_domain.name, self.name))
- if child_domain.pk:
- # Domain real: set delegation
- child_keys = child_domain.keys
- if not child_keys:
- raise APIException('Cannot delegate %s, as it currently has no keys.' % child_domain.name)
- RRset.objects.create(domain=self, subname=child_subname, type='NS', ttl=3600, contents=settings.DEFAULT_NS)
- RRset.objects.create(domain=self, subname=child_subname, type='DS', ttl=300,
- contents=[ds for k in child_keys for ds in k['ds']])
- metrics.get('desecapi_autodelegation_created').inc()
- else:
- # Domain not real: remove delegation
- for rrset in self.rrset_set.filter(subname=child_subname, type__in=['NS', 'DS']):
- rrset.delete()
- metrics.get('desecapi_autodelegation_deleted').inc()
- def delete(self):
- ret = super().delete()
- logger.warning(f'Domain {self.name} deleted (owner: {self.owner.pk})')
- return ret
- def __str__(self):
- return self.name
- class Meta:
- ordering = ('created',)
- class Token(ExportModelOperationsMixin('Token'), rest_framework.authtoken.models.Token):
- @staticmethod
- def _allowed_subnets_default():
- return [ipaddress.IPv4Network('0.0.0.0/0'), ipaddress.IPv6Network('::/0')]
- id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
- key = models.CharField("Key", max_length=128, db_index=True, unique=True)
- user = models.ForeignKey(
- User, related_name='auth_tokens',
- on_delete=models.CASCADE, verbose_name="User"
- )
- name = models.CharField('Name', blank=True, max_length=64)
- last_used = models.DateTimeField(null=True, blank=True)
- perm_manage_tokens = models.BooleanField(default=False)
- allowed_subnets = ArrayField(CidrAddressField(), default=_allowed_subnets_default.__func__)
- max_age = models.DurationField(null=True, default=None, validators=[MinValueValidator(timedelta(0))])
- max_unused_period = models.DurationField(null=True, default=None, validators=[MinValueValidator(timedelta(0))])
- plain = None
- objects = NetManager()
- @property
- def is_valid(self):
- now = timezone.now()
- # Check max age
- try:
- if self.created + self.max_age < now:
- return False
- except TypeError:
- pass
- # Check regular usage requirement
- try:
- if (self.last_used or self.created) + self.max_unused_period < now:
- return False
- except TypeError:
- pass
- return True
- def generate_key(self):
- self.plain = secrets.token_urlsafe(21)
- self.key = Token.make_hash(self.plain)
- return self.key
- @staticmethod
- def make_hash(plain):
- return make_password(plain, salt='static', hasher='pbkdf2_sha256_iter1')
- class Donation(ExportModelOperationsMixin('Donation'), models.Model):
- @staticmethod
- def _created_default():
- return timezone.now()
- @staticmethod
- def _due_default():
- return timezone.now() + timedelta(days=7)
- @staticmethod
- def _mref_default():
- return "ONDON" + str(time.time())
- created = models.DateTimeField(default=_created_default.__func__)
- name = models.CharField(max_length=255)
- iban = models.CharField(max_length=34)
- bic = models.CharField(max_length=11, blank=True)
- amount = models.DecimalField(max_digits=8, decimal_places=2)
- message = models.CharField(max_length=255, blank=True)
- due = models.DateTimeField(default=_due_default.__func__)
- mref = models.CharField(max_length=32, default=_mref_default.__func__)
- email = models.EmailField(max_length=255, blank=True)
- class Meta:
- managed = False
- # RR set types: the good, the bad, and the ugly
- # known, but unsupported types
- RR_SET_TYPES_UNSUPPORTED = {
- 'ALIAS', # Requires signing at the frontend, hence unsupported in desec-stack
- 'DNAME', # "do not combine with DNSSEC", https://doc.powerdns.com/authoritative/settings.html#dname-processing
- 'IPSECKEY', # broken in pdns, https://github.com/PowerDNS/pdns/issues/9055 TODO enable with pdns auth 4.5.0
- 'KEY', # Application use restricted by RFC 3445, DNSSEC use replaced by DNSKEY and handled automatically
- 'WKS', # General usage not recommended, "SHOULD NOT" be used in SMTP (RFC 1123)
- }
- # restricted types are managed in use by the API, and cannot directly be modified by the API client
- RR_SET_TYPES_AUTOMATIC = {
- # corresponding functionality is automatically managed:
- 'KEY', 'NSEC', 'NSEC3', 'OPT', 'RRSIG',
- # automatically managed by the API:
- 'NSEC3PARAM', 'SOA'
- }
- # backend types are types that are the types supported by the backend(s)
- RR_SET_TYPES_BACKEND = pdns.SUPPORTED_RRSET_TYPES
- # validation types are types supported by the validation backend, currently: dnspython
- RR_SET_TYPES_VALIDATION = set(ANY.__all__) | set(IN.__all__) \
- | {'HTTPS', 'SVCB'} # https://github.com/rthalley/dnspython/pull/624
- # manageable types are directly managed by the API client
- RR_SET_TYPES_MANAGEABLE = \
- (RR_SET_TYPES_BACKEND & RR_SET_TYPES_VALIDATION) - RR_SET_TYPES_UNSUPPORTED - RR_SET_TYPES_AUTOMATIC
- class RRsetManager(Manager):
- def create(self, contents=None, **kwargs):
- rrset = super().create(**kwargs)
- for content in contents or []:
- RR.objects.create(rrset=rrset, content=content)
- return rrset
- class RRset(ExportModelOperationsMixin('RRset'), models.Model):
- id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
- created = models.DateTimeField(auto_now_add=True)
- touched = models.DateTimeField(auto_now=True)
- domain = models.ForeignKey(Domain, on_delete=models.CASCADE)
- subname = models.CharField(
- max_length=178,
- blank=True,
- validators=[
- validate_lower,
- RegexValidator(
- regex=r'^([*]|(([*][.])?([a-z0-9_-]{1,63}[.])*[a-z0-9_-]{1,63}))$',
- message='Subname can only use (lowercase) a-z, 0-9, ., -, and _, '
- 'may start with a \'*.\', or just be \'*\'. Components may not exceed 63 characters.',
- code='invalid_subname'
- )
- ]
- )
- type = models.CharField(
- max_length=10,
- validators=[
- validate_upper,
- RegexValidator(
- regex=r'^[A-Z][A-Z0-9]*$',
- message='Type must be uppercase alphanumeric and start with a letter.',
- code='invalid_type'
- )
- ]
- )
- ttl = models.PositiveIntegerField()
- objects = RRsetManager()
- class Meta:
- constraints = [
- ExclusionConstraint(
- name='cname_exclusivity',
- expressions=[
- ('domain', RangeOperators.EQUAL),
- ('subname', RangeOperators.EQUAL),
- (RawSQL("int4(type = 'CNAME')", ()), RangeOperators.NOT_EQUAL),
- ],
- ),
- ]
- unique_together = (("domain", "subname", "type"),)
- @staticmethod
- def construct_name(subname, domain_name):
- return '.'.join(filter(None, [subname, domain_name])) + '.'
- @property
- def name(self):
- return self.construct_name(self.subname, self.domain.name)
- def save(self, *args, **kwargs):
- self.full_clean(validate_unique=False)
- super().save(*args, **kwargs)
- def clean_records(self, records_presentation_format):
- """
- Validates the records belonging to this set. Validation rules follow the DNS specification; some types may
- incur additional validation rules.
- Raises ValidationError if violation of DNS specification is found.
- Returns a set of records in canonical presentation format.
- :param records_presentation_format: iterable of records in presentation format
- """
- errors = []
- if self.type == 'CNAME':
- if self.subname == '':
- errors.append('CNAME RRset cannot have empty subname.')
- if len(records_presentation_format) > 1:
- errors.append('CNAME RRset cannot have multiple records.')
- def _error_msg(record, detail):
- return f'Record content of {self.type} {self.name} invalid: \'{record}\': {detail}'
- records_canonical_format = set()
- for r in records_presentation_format:
- try:
- r_canonical_format = RR.canonical_presentation_format(r, self.type)
- except ValueError as ex:
- errors.append(_error_msg(r, str(ex)))
- else:
- if r_canonical_format in records_canonical_format:
- errors.append(_error_msg(r, f'Duplicate record content: this is identical to '
- f'\'{r_canonical_format}\''))
- else:
- records_canonical_format.add(r_canonical_format)
- if any(errors):
- raise ValidationError(errors)
- return records_canonical_format
- def save_records(self, records):
- """
- Updates this RR set's resource records, discarding any old values.
- Records are expected in presentation format and are converted to canonical
- presentation format (e.g., 127.00.0.1 will be converted to 127.0.0.1).
- Raises if a invalid set of records is provided.
- This method triggers the following database queries:
- - one DELETE query
- - one SELECT query for comparison of old with new records
- - one INSERT query, if one or more records were added
- Changes are saved to the database immediately.
- :param records: list of records in presentation format
- """
- new_records = self.clean_records(records)
- # Delete RRs that are not in the new record list from the DB
- self.records.exclude(content__in=new_records).delete() # one DELETE
- # Retrieve all remaining RRs from the DB
- unchanged_records = set(r.content for r in self.records.all()) # one SELECT
- # Save missing RRs from the new record list to the DB
- added_records = new_records - unchanged_records
- rrs = [RR(rrset=self, content=content) for content in added_records]
- RR.objects.bulk_create(rrs) # One INSERT
- def __str__(self):
- return '<RRSet %s domain=%s type=%s subname=%s>' % (self.pk, self.domain.name, self.type, self.subname)
- class RRManager(Manager):
- def bulk_create(self, rrs, **kwargs):
- ret = super().bulk_create(rrs, **kwargs)
- # For each rrset, save once to set RRset.updated timestamp and trigger signal for post-save processing
- rrsets = {rr.rrset for rr in rrs}
- for rrset in rrsets:
- rrset.save()
- return ret
- class RR(ExportModelOperationsMixin('RR'), models.Model):
- created = models.DateTimeField(auto_now_add=True)
- rrset = models.ForeignKey(RRset, on_delete=models.CASCADE, related_name='records')
- content = models.TextField()
- objects = RRManager()
- _type_map = {
- dns.rdatatype.CDS: CDS, # TODO remove when https://github.com/rthalley/dnspython/pull/625 is in main codebase
- dns.rdatatype.DLV: DLV, # TODO remove when https://github.com/rthalley/dnspython/pull/625 is in main codebase
- dns.rdatatype.DS: DS, # TODO remove when https://github.com/rthalley/dnspython/pull/625 is in main codebase
- dns.rdatatype.TXT: LongQuotedTXT, # we slightly deviate from RFC 1035 and allow tokens longer than 255 bytes
- dns.rdatatype.SPF: LongQuotedTXT, # we slightly deviate from RFC 1035 and allow tokens longer than 255 bytes
- }
- @staticmethod
- def canonical_presentation_format(any_presentation_format, type_):
- """
- Converts any valid presentation format for a RR into it's canonical presentation format.
- Raises if provided presentation format is invalid.
- """
- rdtype = rdatatype.from_text(type_)
- try:
- # Convert to wire format, ensuring input validation.
- cls = RR._type_map.get(rdtype, dns.rdata)
- wire = cls.from_text(
- rdclass=rdataclass.IN,
- rdtype=rdtype,
- tok=dns.tokenizer.Tokenizer(any_presentation_format),
- relativize=False
- ).to_digestable()
- if len(wire) > 64000:
- raise ValidationError(f'Ensure this value has no more than 64000 byte in wire format (it has {len(wire)}).')
- parser = dns.wire.Parser(wire, current=0)
- with parser.restrict_to(len(wire)):
- rdata = cls.from_wire_parser(rdclass=rdataclass.IN, rdtype=rdtype, parser=parser)
- # Convert to canonical presentation format, disable chunking of records.
- # Exempt types which have chunksize hardcoded (prevents "got multiple values for keyword argument 'chunksize'").
- chunksize_exception_types = (dns.rdatatype.OPENPGPKEY, dns.rdatatype.EUI48, dns.rdatatype.EUI64)
- if rdtype in chunksize_exception_types:
- return rdata.to_text()
- else:
- return rdata.to_text(chunksize=0)
- except binascii.Error:
- # e.g., odd-length string
- raise ValueError('Cannot parse hexadecimal or base64 record contents')
- except dns.exception.SyntaxError as e:
- # e.g., A/127.0.0.999
- if 'quote' in e.args[0]:
- raise ValueError(f'Data for {type_} records must be given using quotation marks.')
- else:
- raise ValueError(f'Record content for type {type_} malformed: {",".join(e.args)}')
- except dns.name.NeedAbsoluteNameOrOrigin:
- raise ValueError('Hostname must be fully qualified (i.e., end in a dot: "example.com.")')
- except ValueError as ex:
- # e.g., string ("asdf") cannot be parsed into int on base 10
- raise ValueError(f'Cannot parse record contents: {ex}')
- except Exception as e:
- # TODO see what exceptions raise here for faulty input
- raise e
- def __str__(self):
- return '<RR %s %s rr_set=%s>' % (self.pk, self.content, self.rrset.pk)
- class AuthenticatedAction(models.Model):
- """
- Represents a procedure call on a defined set of arguments.
- Subclasses can define additional arguments by adding Django model fields and must define the action to be taken by
- implementing the `_act` method.
- AuthenticatedAction provides the `state` property which by default is a hash of the action type (defined by the
- action's class path). Other information such as user state can be included in the state hash by (carefully)
- overriding the `_state_fields` property. Instantiation of the model, if given a `state` kwarg, will raise an error
- if the given state argument does not match the state computed from `_state_fields` at the moment of instantiation.
- The same applies to the `act` method: If called on an object that was instantiated without a `state` kwargs, an
- error will be raised.
- This effectively allows hash-authenticated procedure calls by third parties as long as the server-side state is
- unaltered, according to the following protocol:
- (1) Instantiate the AuthenticatedAction subclass representing the action to be taken (no `state` kwarg here),
- (2) provide information on how to instantiate the instance, and the state hash, to a third party,
- (3) when provided with data that allows instantiation and a valid state hash, take the defined action, possibly with
- additional parameters chosen by the third party that do not belong to the verified state.
- """
- _validated = False
- class Meta:
- managed = False
- def __init__(self, *args, **kwargs):
- state = kwargs.pop('state', None)
- super().__init__(*args, **kwargs)
- if state is not None:
- self._validated = self.validate_state(state)
- if not self._validated:
- raise ValueError
- @property
- def _state_fields(self):
- """
- Returns a list that defines the state of this action (used for authentication of this action).
- Return value must be JSON-serializable.
- Values not included in the return value will not be used for authentication, i.e. those values can be varied
- freely and function as unauthenticated action input parameters.
- Use caution when overriding this method. You will usually want to append a value to the list returned by the
- parent. Overriding the behavior altogether could result in reducing the state to fewer variables, resulting
- in valid signatures when they were intended to be invalid. The suggested method for overriding is
- @property
- def _state_fields:
- return super()._state_fields + [self.important_value, self.another_added_value]
- :return: List of values to be signed.
- """
- name = '.'.join([self.__module__, self.__class__.__qualname__])
- return [name]
- @property
- def state(self):
- state = json.dumps(self._state_fields).encode()
- hash = sha256()
- hash.update(state)
- return hash.hexdigest()
- def validate_state(self, value):
- return value == self.state
- def _act(self):
- """
- Conduct the action represented by this class.
- :return: None
- """
- raise NotImplementedError
- def act(self):
- if not self._validated:
- raise RuntimeError('Action state could not be verified.')
- return self._act()
- class AuthenticatedBasicUserAction(AuthenticatedAction):
- """
- Abstract AuthenticatedAction involving a user instance.
- """
- user = models.ForeignKey(User, on_delete=models.DO_NOTHING)
- class Meta:
- managed = False
- @property
- def _state_fields(self):
- return super()._state_fields + [str(self.user.id)]
- class AuthenticatedUserAction(AuthenticatedBasicUserAction):
- """
- Abstract AuthenticatedBasicUserAction, incorporating the user's id, email, password, and is_active flag into the
- Message Authentication Code state.
- """
- class Meta:
- managed = False
- @property
- def _state_fields(self):
- # TODO consider adding a "last change" attribute of the user to the state to avoid code
- # re-use after the the state has been changed and changed back.
- return super()._state_fields + [self.user.email, self.user.password, self.user.is_active]
- class AuthenticatedActivateUserAction(AuthenticatedUserAction):
- domain = models.CharField(max_length=191)
- class Meta:
- managed = False
- @property
- def _state_fields(self):
- return super()._state_fields + [self.domain]
- def _act(self):
- self.user.activate()
- class AuthenticatedChangeEmailUserAction(AuthenticatedUserAction):
- new_email = models.EmailField()
- class Meta:
- managed = False
- @property
- def _state_fields(self):
- return super()._state_fields + [self.new_email]
- def _act(self):
- self.user.change_email(self.new_email)
- class AuthenticatedResetPasswordUserAction(AuthenticatedUserAction):
- new_password = models.CharField(max_length=128)
- class Meta:
- managed = False
- def _act(self):
- self.user.change_password(self.new_password)
- class AuthenticatedDeleteUserAction(AuthenticatedUserAction):
- class Meta:
- managed = False
- def _act(self):
- self.user.delete()
- class AuthenticatedDomainBasicUserAction(AuthenticatedBasicUserAction):
- """
- Abstract AuthenticatedUserAction involving an domain instance, incorporating the domain's id, name as well as the
- owner ID into the Message Authentication Code state.
- """
- domain = models.ForeignKey(Domain, on_delete=models.DO_NOTHING)
- class Meta:
- managed = False
- @property
- def _state_fields(self):
- return super()._state_fields + [
- str(self.domain.id), # ensures the domain object is identical
- self.domain.name, # exclude renamed domains
- str(self.domain.owner.id), # exclude transferred domains
- ]
- class AuthenticatedRenewDomainBasicUserAction(AuthenticatedDomainBasicUserAction):
- class Meta:
- managed = False
- @property
- def _state_fields(self):
- return super()._state_fields + [str(self.domain.renewal_changed)]
- def _act(self):
- self.domain.renewal_state = Domain.RenewalState.FRESH
- self.domain.renewal_changed = timezone.now()
- self.domain.save(update_fields=['renewal_state', 'renewal_changed'])
- def captcha_default_content(kind: str) -> str:
- if kind == Captcha.Kind.IMAGE:
- alphabet = (string.ascii_uppercase + string.digits).translate({ord(c): None for c in 'IO0'})
- length = 5
- elif kind == Captcha.Kind.AUDIO:
- alphabet = string.digits
- length = 8
- else:
- raise ValueError(f'Unknown Captcha kind: {kind}')
- content = ''.join([secrets.choice(alphabet) for _ in range(length)])
- metrics.get('desecapi_captcha_content_created').labels(kind).inc()
- return content
- class Captcha(ExportModelOperationsMixin('Captcha'), models.Model):
- class Kind(models.TextChoices):
- IMAGE = 'image'
- AUDIO = 'audio'
- id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
- created = models.DateTimeField(auto_now_add=True)
- content = models.CharField(max_length=24, default="")
- kind = models.CharField(choices=Kind.choices, default=Kind.IMAGE, max_length=24)
- def __init__(self, *args, **kwargs):
- super().__init__(*args, **kwargs)
- if not self.content:
- self.content = captcha_default_content(self.kind)
- def verify(self, solution: str):
- age = timezone.now() - self.created
- self.delete()
- return (
- str(solution).upper().strip() == self.content # solution correct
- and
- age <= settings.CAPTCHA_VALIDITY_PERIOD # not expired
- )
|