views.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566
  1. from __future__ import unicode_literals
  2. from django.core.mail import EmailMessage
  3. from rest_framework.generics import get_object_or_404
  4. from desecapi.models import Domain, User, RRset, Token
  5. from desecapi.serializers import (
  6. DomainSerializer, RRsetSerializer, DonationSerializer, TokenSerializer)
  7. from rest_framework import generics
  8. from desecapi.permissions import *
  9. from rest_framework import permissions
  10. from django.http import Http404, HttpResponseRedirect
  11. from rest_framework.views import APIView
  12. from rest_framework.response import Response
  13. from rest_framework.reverse import reverse
  14. from rest_framework.authentication import get_authorization_header
  15. from desecapi.renderers import PlainTextRenderer
  16. from dns import resolver
  17. from django.template.loader import get_template
  18. import desecapi.authentication as auth
  19. import base64, binascii
  20. from api import settings
  21. from rest_framework.exceptions import (NotFound, PermissionDenied, ValidationError)
  22. import django.core.exceptions
  23. from djoser import views, signals
  24. from rest_framework import status
  25. from datetime import timedelta
  26. from django.utils import timezone
  27. from desecapi.forms import UnlockForm
  28. from django.shortcuts import render
  29. from django.db.models import Q
  30. from desecapi.emails import send_account_lock_email, send_token_email
  31. import re
  32. import ipaddress, os
  33. from rest_framework_bulk import ListBulkCreateUpdateAPIView
  34. from django.contrib.auth import user_logged_in, user_logged_out
  35. import djoser.views
  36. from djoser.serializers import TokenSerializer as DjoserTokenSerializer
  37. from rest_framework.viewsets import GenericViewSet
  38. from rest_framework import mixins
  39. from rest_framework.settings import api_settings
  40. patternDyn = re.compile(r'^[A-Za-z-][A-Za-z0-9_-]*\.dedyn\.io$')
  41. patternNonDyn = re.compile(r'^([A-Za-z0-9-][A-Za-z0-9_-]*\.)+[A-Za-z]+$')
  42. def get_client_ip(request):
  43. return request.META.get('REMOTE_ADDR')
  44. class TokenCreateView(djoser.views.TokenCreateView):
  45. def _action(self, serializer):
  46. user = serializer.user
  47. token = Token(user=user, name="login")
  48. token.save()
  49. user_logged_in.send(sender=user.__class__, request=self.request, user=user)
  50. token_serializer_class = DjoserTokenSerializer
  51. return Response(
  52. data=token_serializer_class(token).data,
  53. status=status.HTTP_201_CREATED,
  54. )
  55. class TokenDestroyView(djoser.views.TokenDestroyView):
  56. def post(self, request):
  57. _, token = auth.TokenAuthentication().authenticate(request)
  58. token.delete()
  59. user_logged_out.send(
  60. sender=request.user.__class__, request=request, user=request.user
  61. )
  62. return Response(status=status.HTTP_204_NO_CONTENT)
  63. class TokenViewSet(mixins.CreateModelMixin,
  64. mixins.DestroyModelMixin,
  65. mixins.ListModelMixin,
  66. GenericViewSet):
  67. serializer_class = TokenSerializer
  68. permission_classes = (permissions.IsAuthenticated, )
  69. lookup_field = 'user_specific_id'
  70. def get_queryset(self):
  71. return self.request.user.auth_tokens.all()
  72. def destroy(self, request, *args, **kwargs):
  73. try:
  74. super().destroy(request, *args, **kwargs)
  75. except Http404:
  76. pass
  77. return Response(status=status.HTTP_204_NO_CONTENT)
  78. def perform_create(self, serializer):
  79. serializer.save(user=self.request.user)
  80. class DomainList(generics.ListCreateAPIView):
  81. serializer_class = DomainSerializer
  82. permission_classes = (permissions.IsAuthenticated, IsOwner, IsUnlockedOrDyn,)
  83. def get_queryset(self):
  84. return Domain.objects.filter(owner=self.request.user.pk)
  85. def perform_create(self, serializer):
  86. pattern = patternDyn if self.request.user.dyn else patternNonDyn
  87. if pattern.match(serializer.validated_data['name']) is None:
  88. ex = ValidationError(detail={"detail": "This domain name is not well-formed, by policy.", "code": "domain-illformed"})
  89. ex.status_code = status.HTTP_409_CONFLICT
  90. raise ex
  91. # Generate a list containing this and all higher-level domain names
  92. domain_name = serializer.validated_data['name']
  93. domain_parts = domain_name.split('.')
  94. domain_list = {'.'.join(domain_parts[i:]) for i in range(1, len(domain_parts))}
  95. # Remove public suffixes and then use this list to control registration
  96. public_suffixes = {'dedyn.io'}
  97. domain_list = domain_list - public_suffixes
  98. queryset = Domain.objects.filter(Q(name=domain_name) | (Q(name__in=domain_list) & ~Q(owner=self.request.user)))
  99. if queryset.exists():
  100. ex = ValidationError(detail={"detail": "This domain name is unavailable.", "code": "domain-unavailable"})
  101. ex.status_code = status.HTTP_409_CONFLICT
  102. raise ex
  103. if self.request.user.limit_domains is not None and self.request.user.domains.count() >= self.request.user.limit_domains:
  104. ex = ValidationError(detail={"detail": "You reached the maximum number of domains allowed for your account.", "code": "domain-limit"})
  105. ex.status_code = status.HTTP_403_FORBIDDEN
  106. raise ex
  107. try:
  108. obj = serializer.save(owner=self.request.user)
  109. except Exception as e:
  110. if str(e).endswith(' already exists'):
  111. ex = ValidationError(detail={"detail": "This domain name is unavailable.", "code": "domain-unavailable"})
  112. ex.status_code = status.HTTP_409_CONFLICT
  113. raise ex
  114. else:
  115. raise e
  116. def sendDynDnsEmail(domain):
  117. content_tmpl = get_template('emails/domain-dyndns/content.txt')
  118. subject_tmpl = get_template('emails/domain-dyndns/subject.txt')
  119. from_tmpl = get_template('emails/from.txt')
  120. context = {
  121. 'domain': domain.name,
  122. 'url': 'https://update.dedyn.io/',
  123. 'username': domain.name,
  124. 'password': self.request.auth.key
  125. }
  126. email = EmailMessage(subject_tmpl.render(context),
  127. content_tmpl.render(context),
  128. from_tmpl.render(context),
  129. [self.request.user.email])
  130. email.send()
  131. if obj.name.endswith('.dedyn.io'):
  132. sendDynDnsEmail(obj)
  133. class DomainDetail(generics.RetrieveUpdateDestroyAPIView):
  134. serializer_class = DomainSerializer
  135. permission_classes = (permissions.IsAuthenticated, IsOwner, IsUnlocked,)
  136. lookup_field = 'name'
  137. def delete(self, request, *args, **kwargs):
  138. try:
  139. super().delete(request, *args, **kwargs)
  140. except Http404:
  141. pass
  142. return Response(status=status.HTTP_204_NO_CONTENT)
  143. def get_queryset(self):
  144. return Domain.objects.filter(owner=self.request.user.pk)
  145. def update(self, request, *args, **kwargs):
  146. try:
  147. return super().update(request, *args, **kwargs)
  148. except django.core.exceptions.ValidationError as e:
  149. raise ValidationError(detail={"detail": e.message})
  150. class RRsetDetail(generics.RetrieveUpdateDestroyAPIView):
  151. serializer_class = RRsetSerializer
  152. permission_classes = (permissions.IsAuthenticated, IsDomainOwner, IsUnlocked,)
  153. def delete(self, request, *args, **kwargs):
  154. try:
  155. super().delete(request, *args, **kwargs)
  156. except Http404:
  157. pass
  158. return Response(status=status.HTTP_204_NO_CONTENT)
  159. def get_queryset(self):
  160. domain_name = self.kwargs['name']
  161. try:
  162. return self.request.user.domains.get(name=domain_name).rrset_set
  163. except Domain.DoesNotExist:
  164. raise Http404()
  165. def get_object(self):
  166. queryset = self.filter_queryset(self.get_queryset())
  167. rrset_type = self.kwargs['type']
  168. if rrset_type in RRset.RESTRICTED_TYPES:
  169. raise PermissionDenied("You cannot tinker with the %s RRset." % rrset_type)
  170. obj = get_object_or_404(queryset, type=rrset_type, subname=self.kwargs['subname'])
  171. self.check_object_permissions(self.request, obj)
  172. return obj
  173. def update(self, request, *args, **kwargs):
  174. if not isinstance(request.data, dict):
  175. raise ValidationError({
  176. api_settings.NON_FIELD_ERRORS_KEY: ['Invalid data. Expected a JSON object.']
  177. }, code='invalid')
  178. if request.data.get('records') == []:
  179. return self.delete(request, *args, **kwargs)
  180. # Attach URL parameters (self.kwargs) to the request body object (request.data),
  181. # the latter having preference with both are given.
  182. for k in ('type', 'subname'):
  183. # This works because we exclusively use JSONParser which causes request.data to be
  184. # a dict (and not an immutable QueryDict, as is the case for other parsers)
  185. request.data[k] = request.data.pop(k, self.kwargs[k])
  186. try:
  187. return super().update(request, *args, **kwargs)
  188. except django.core.exceptions.ValidationError as e:
  189. ex = ValidationError(detail=e.message_dict)
  190. ex.status_code = status.HTTP_409_CONFLICT
  191. raise ex
  192. class RRsetList(ListBulkCreateUpdateAPIView):
  193. serializer_class = RRsetSerializer
  194. permission_classes = (permissions.IsAuthenticated, IsDomainOwner, IsUnlocked,)
  195. def get_queryset(self):
  196. name = self.kwargs['name']
  197. try:
  198. rrsets = self.request.user.domains.get(name=name).rrset_set
  199. except Domain.DoesNotExist:
  200. raise Http404
  201. for filter_field in ('subname', 'type'):
  202. value = self.request.query_params.get(filter_field)
  203. if value is not None:
  204. if filter_field == 'type' and value in RRset.RESTRICTED_TYPES:
  205. raise PermissionDenied("You cannot tinker with the %s RRset." % value)
  206. rrsets = rrsets.filter(**{'%s__exact' % filter_field: value})
  207. return rrsets
  208. def create(self, request, *args, **kwargs):
  209. try:
  210. return super().create(request, *args, **kwargs)
  211. except Domain.DoesNotExist:
  212. raise Http404
  213. except ValidationError as e:
  214. if isinstance(e.detail, dict):
  215. detail = e.detail.get('__all__')
  216. if isinstance(detail, list) \
  217. and any(m.endswith(' already exists.') for m in detail):
  218. e.status_code = status.HTTP_409_CONFLICT
  219. raise e
  220. def perform_create(self, serializer):
  221. # For new RRsets without a subname, set it empty. We don't use
  222. # default='' in the serializer field definition so that during PUT, the
  223. # subname value is retained if omitted.
  224. if isinstance(self.request.data, list):
  225. serializer._validated_data = [{**{'subname': ''}, **data}
  226. for data in serializer.validated_data]
  227. else:
  228. serializer._validated_data = {**{'subname': ''}, **serializer.validated_data}
  229. # Associate RRset with proper domain
  230. domain = self.request.user.domains.get(name=self.kwargs['name'])
  231. serializer.save(domain=domain)
  232. def get(self, request, *args, **kwargs):
  233. name = self.kwargs['name']
  234. if not Domain.objects.filter(name=name, owner=self.request.user.pk):
  235. raise Http404
  236. return super().get(request, *args, **kwargs)
  237. class Root(APIView):
  238. def get(self, request, format=None):
  239. if self.request.user and self.request.user.is_authenticated:
  240. return Response({
  241. 'domains': reverse('domain-list', request=request),
  242. 'user': reverse('user', request=request),
  243. 'logout': reverse('token-destroy', request=request), # TODO change interface to token-destroy, too?
  244. })
  245. else:
  246. return Response({
  247. 'login': reverse('token-create', request=request),
  248. 'register': reverse('register', request=request),
  249. })
  250. class DnsQuery(APIView):
  251. def get(self, request, format=None):
  252. desecio = resolver.Resolver()
  253. if not 'domain' in request.GET:
  254. return Response(status=status.HTTP_400_BAD_REQUEST)
  255. domain = str(request.GET['domain'])
  256. def getRecords(domain, type_):
  257. records = []
  258. try:
  259. for ip in desecio.query(domain, type_):
  260. records.append(str(ip))
  261. except resolver.NoAnswer:
  262. return []
  263. except resolver.NoNameservers:
  264. return []
  265. except resolver.NXDOMAIN:
  266. return []
  267. return records
  268. # find currently active NS records
  269. nsrecords = getRecords(domain, 'NS')
  270. # find desec.io nameserver IP address with standard nameserver
  271. ips = desecio.query('ns2.desec.io')
  272. desecio.nameservers = []
  273. for ip in ips:
  274. desecio.nameservers.append(str(ip))
  275. # query desec.io nameserver for A and AAAA records
  276. arecords = getRecords(domain, 'A')
  277. aaaarecords = getRecords(domain, 'AAAA')
  278. return Response({
  279. 'domain': domain,
  280. 'ns': nsrecords,
  281. 'a': arecords,
  282. 'aaaa': aaaarecords,
  283. '_nameserver': desecio.nameservers
  284. })
  285. class DynDNS12Update(APIView):
  286. authentication_classes = (auth.TokenAuthentication, auth.BasicTokenAuthentication, auth.URLParamAuthentication,)
  287. renderer_classes = [PlainTextRenderer]
  288. def findDomain(self, request):
  289. if self.request.user.locked:
  290. # Error code from https://help.dyn.com/remote-access-api/return-codes/
  291. raise PermissionDenied('abuse')
  292. def findDomainname(request):
  293. # 1. hostname parameter
  294. if 'hostname' in request.query_params and request.query_params['hostname'] != 'YES':
  295. return request.query_params['hostname']
  296. # 2. host_id parameter
  297. if 'host_id' in request.query_params:
  298. return request.query_params['host_id']
  299. # 3. http basic auth username
  300. try:
  301. domainname = base64.b64decode(get_authorization_header(request).decode().split(' ')[1].encode()).decode().split(':')[0]
  302. if domainname:
  303. return domainname
  304. except IndexError:
  305. pass
  306. except UnicodeDecodeError:
  307. pass
  308. except binascii.Error:
  309. pass
  310. # 4. username parameter
  311. if 'username' in request.query_params:
  312. return request.query_params['username']
  313. # 5. only domain associated with this user account
  314. if len(request.user.domains.all()) == 1:
  315. return request.user.domains.all()[0].name
  316. if len(request.user.domains.all()) > 1:
  317. ex = ValidationError(detail={"detail": "Request does not specify domain unambiguously.", "code": "domain-ambiguous"})
  318. ex.status_code = status.HTTP_409_CONFLICT
  319. raise ex
  320. return None
  321. name = findDomainname(request)
  322. try:
  323. return self.request.user.domains.get(name=name)
  324. except Domain.DoesNotExist:
  325. return None
  326. def findIP(self, request, params, version=4):
  327. if version == 4:
  328. lookfor = '.'
  329. elif version == 6:
  330. lookfor = ':'
  331. else:
  332. raise Exception
  333. # Check URL parameters
  334. for p in params:
  335. if p in request.query_params:
  336. if not len(request.query_params[p]):
  337. return None
  338. if lookfor in request.query_params[p]:
  339. return request.query_params[p]
  340. # Check remote IP address
  341. client_ip = get_client_ip(request)
  342. if lookfor in client_ip:
  343. return client_ip
  344. # give up
  345. return None
  346. def findIPv4(self, request):
  347. return self.findIP(request, ['myip', 'myipv4', 'ip'])
  348. def findIPv6(self, request):
  349. return self.findIP(request, ['myipv6', 'ipv6', 'myip', 'ip'], version=6)
  350. def get(self, request, format=None):
  351. domain = self.findDomain(request)
  352. if domain is None:
  353. raise NotFound('nohost')
  354. datas = {'A': self.findIPv4(request), 'AAAA': self.findIPv6(request)}
  355. rrsets = RRset.plain_to_RRsets(
  356. [{'subname': '', 'type': type_, 'ttl': 60,
  357. 'contents': [ip] if ip is not None else []}
  358. for type_, ip in datas.items()],
  359. domain=domain)
  360. domain.write_rrsets(rrsets)
  361. return Response('good', content_type='text/plain')
  362. class DonationList(generics.CreateAPIView):
  363. serializer_class = DonationSerializer
  364. def perform_create(self, serializer):
  365. iban = serializer.validated_data['iban']
  366. obj = serializer.save()
  367. def sendDonationEmails(donation):
  368. context = {
  369. 'donation': donation,
  370. 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
  371. 'creditorname': settings.SEPA['CREDITOR_NAME'],
  372. 'complete_iban': iban
  373. }
  374. # internal desec notification
  375. content_tmpl = get_template('emails/donation/desec-content.txt')
  376. subject_tmpl = get_template('emails/donation/desec-subject.txt')
  377. attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
  378. from_tmpl = get_template('emails/from.txt')
  379. email = EmailMessage(subject_tmpl.render(context),
  380. content_tmpl.render(context),
  381. from_tmpl.render(context),
  382. ['donation@desec.io'],
  383. attachments=[
  384. ('jameica-directdebit.xml',
  385. attachment_tmpl.render(context),
  386. 'text/xml')
  387. ])
  388. email.send()
  389. # donor notification
  390. if donation.email:
  391. content_tmpl = get_template('emails/donation/donor-content.txt')
  392. subject_tmpl = get_template('emails/donation/donor-subject.txt')
  393. email = EmailMessage(subject_tmpl.render(context),
  394. content_tmpl.render(context),
  395. from_tmpl.render(context),
  396. [donation.email])
  397. email.send()
  398. # send emails
  399. sendDonationEmails(obj)
  400. class UserCreateView(views.UserCreateView):
  401. """
  402. Extends the djoser UserCreateView to record the remote IP address of any registration.
  403. """
  404. def create(self, request, *args, **kwargs):
  405. serializer = self.get_serializer(data=request.data)
  406. serializer.is_valid(raise_exception=True)
  407. self.perform_create(serializer, get_client_ip(request))
  408. headers = self.get_success_headers(serializer.data)
  409. return Response(serializer.data, status=status.HTTP_201_CREATED, headers=headers)
  410. def perform_create(self, serializer, remote_ip):
  411. lock = (
  412. ipaddress.ip_address(remote_ip) not in ipaddress.IPv6Network(os.environ['DESECSTACK_IPV6_SUBNET'])
  413. and (
  414. User.objects.filter(
  415. created__gte=timezone.now()-timedelta(hours=settings.ABUSE_BY_REMOTE_IP_PERIOD_HRS),
  416. registration_remote_ip=remote_ip
  417. ).count() >= settings.ABUSE_BY_REMOTE_IP_LIMIT
  418. or
  419. User.objects.filter(
  420. created__gte=timezone.now() - timedelta(hours=settings.ABUSE_BY_EMAIL_HOSTNAME_PERIOD_HRS),
  421. email__endswith='@{0}'.format(serializer.validated_data['email'].split('@')[-1])
  422. ).count() >= settings.ABUSE_BY_EMAIL_HOSTNAME_LIMIT
  423. )
  424. )
  425. user = serializer.save(registration_remote_ip=remote_ip, lock=lock)
  426. if user.locked:
  427. send_account_lock_email(self.request, user)
  428. if not user.dyn:
  429. context = {'token': user.get_or_create_first_token()}
  430. send_token_email(context, user)
  431. signals.user_registered.send(sender=self.__class__, user=user, request=self.request)
  432. def unlock(request, email):
  433. # if this is a POST request we need to process the form data
  434. if request.method == 'POST':
  435. # create a form instance and populate it with data from the request:
  436. form = UnlockForm(request.POST)
  437. # check whether it's valid:
  438. if form.is_valid():
  439. try:
  440. user = User.objects.get(email=email)
  441. if user.locked:
  442. user.unlock()
  443. if not user.dyn:
  444. context = {'token': user.get_or_create_first_token()}
  445. send_token_email(context, user)
  446. except User.DoesNotExist:
  447. # fail silently, so people can't probe registered addresses
  448. pass
  449. return HttpResponseRedirect(reverse('v1:unlock/done', request=request)) # TODO remove dependency on v1
  450. # if a GET (or any other method) we'll create a blank form
  451. else:
  452. form = UnlockForm()
  453. return render(request, 'unlock.html', {'form': form})
  454. def unlock_done(request):
  455. return render(request, 'unlock-done.html')