models.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603
  1. from __future__ import annotations
  2. import json
  3. import logging
  4. import secrets
  5. import string
  6. import time
  7. import uuid
  8. from base64 import urlsafe_b64encode
  9. from datetime import timedelta
  10. from hashlib import sha256
  11. from os import urandom
  12. import psl_dns
  13. import rest_framework.authtoken.models
  14. from django.conf import settings
  15. from django.contrib.auth.hashers import make_password
  16. from django.contrib.auth.models import BaseUserManager, AbstractBaseUser, AnonymousUser
  17. from django.core.exceptions import ValidationError
  18. from django.core.mail import EmailMessage, get_connection
  19. from django.core.validators import RegexValidator
  20. from django.db import models
  21. from django.db.models import Manager, Q
  22. from django.template.loader import get_template
  23. from django.utils import timezone
  24. from dns.exception import Timeout
  25. from dns.resolver import NoNameservers
  26. from rest_framework.exceptions import APIException
  27. from desecapi import pdns
  28. logger = logging.getLogger(__name__)
  29. psl = psl_dns.PSL(resolver=settings.PSL_RESOLVER, timeout=.5)
  30. def validate_lower(value):
  31. if value != value.lower():
  32. raise ValidationError('Invalid value (not lowercase): %(value)s',
  33. code='invalid',
  34. params={'value': value})
  35. def validate_upper(value):
  36. if value != value.upper():
  37. raise ValidationError('Invalid value (not uppercase): %(value)s',
  38. code='invalid',
  39. params={'value': value})
  40. class MyUserManager(BaseUserManager):
  41. def create_user(self, email, password, **extra_fields):
  42. """
  43. Creates and saves a User with the given email, date of
  44. birth and password.
  45. """
  46. if not email:
  47. raise ValueError('Users must have an email address')
  48. email = self.normalize_email(email)
  49. user = self.model(email=email, **extra_fields)
  50. user.set_password(password)
  51. user.save(using=self._db)
  52. return user
  53. def create_superuser(self, email, password):
  54. """
  55. Creates and saves a superuser with the given email, date of
  56. birth and password.
  57. """
  58. user = self.create_user(email, password=password)
  59. user.is_admin = True
  60. user.save(using=self._db)
  61. return user
  62. class User(AbstractBaseUser):
  63. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  64. email = models.EmailField(
  65. verbose_name='email address',
  66. max_length=191,
  67. unique=True,
  68. )
  69. is_active = models.BooleanField(default=True)
  70. is_admin = models.BooleanField(default=False)
  71. created = models.DateTimeField(auto_now_add=True)
  72. limit_domains = models.IntegerField(default=settings.LIMIT_USER_DOMAIN_COUNT_DEFAULT, null=True, blank=True)
  73. objects = MyUserManager()
  74. USERNAME_FIELD = 'email'
  75. REQUIRED_FIELDS = []
  76. def get_full_name(self):
  77. return self.email
  78. def get_short_name(self):
  79. return self.email
  80. def __str__(self):
  81. return self.email
  82. # noinspection PyMethodMayBeStatic
  83. def has_perm(self, *_):
  84. """Does the user have a specific permission?"""
  85. # Simplest possible answer: Yes, always
  86. return True
  87. # noinspection PyMethodMayBeStatic
  88. def has_module_perms(self, *_):
  89. """Does the user have permissions to view the app `app_label`?"""
  90. # Simplest possible answer: Yes, always
  91. return True
  92. @property
  93. def is_staff(self):
  94. """Is the user a member of staff?"""
  95. # Simplest possible answer: All admins are staff
  96. return self.is_admin
  97. def activate(self):
  98. self.is_active = True
  99. self.save()
  100. def change_email(self, email):
  101. old_email = self.email
  102. self.email = email
  103. self.validate_unique()
  104. self.save()
  105. self.send_email('change-email-confirmation-old-email', recipient=old_email)
  106. def change_password(self, raw_password):
  107. self.set_password(raw_password)
  108. self.save()
  109. self.send_email('password-change-confirmation')
  110. def send_email(self, reason, context=None, recipient=None):
  111. fast_lane = 'email_fast_lane'
  112. slow_lane = 'email_slow_lane'
  113. lanes = {
  114. 'activate': slow_lane,
  115. 'activate-with-domain': slow_lane,
  116. 'change-email': slow_lane,
  117. 'change-email-confirmation-old-email': fast_lane,
  118. 'password-change-confirmation': fast_lane,
  119. 'reset-password': fast_lane,
  120. 'delete-user': fast_lane,
  121. 'domain-dyndns': fast_lane,
  122. }
  123. if reason not in lanes:
  124. raise ValueError(f'Cannot send email to user {self.pk} without a good reason: {reason}')
  125. context = context or {}
  126. content = get_template(f'emails/{reason}/content.txt').render(context)
  127. content += f'\nSupport Reference: user_id = {self.pk}\n'
  128. footer = get_template('emails/footer.txt').render()
  129. logger.warning(f'Queuing email for user account {self.pk} (reason: {reason})')
  130. return EmailMessage(
  131. subject=get_template(f'emails/{reason}/subject.txt').render(context).strip(),
  132. body=content + footer,
  133. from_email=get_template('emails/from.txt').render(),
  134. to=[recipient or self.email],
  135. connection=get_connection(lane=lanes[reason], debug={'user': self.pk, 'reason': reason})
  136. ).send()
  137. class Token(rest_framework.authtoken.models.Token):
  138. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  139. key = models.CharField("Key", max_length=128, db_index=True, unique=True)
  140. user = models.ForeignKey(
  141. User, related_name='auth_tokens',
  142. on_delete=models.CASCADE, verbose_name="User"
  143. )
  144. name = models.CharField("Name", max_length=64, default="")
  145. plain = None
  146. def generate_key(self):
  147. self.plain = urlsafe_b64encode(urandom(21)).decode()
  148. self.key = Token.make_hash(self.plain)
  149. return self.key
  150. @staticmethod
  151. def make_hash(plain):
  152. return make_password(plain, salt='static', hasher='pbkdf2_sha256_iter1')
  153. validate_domain_name = [
  154. validate_lower,
  155. RegexValidator(
  156. regex=r'^([a-z0-9_-]{1,63}\.)*[a-z]{1,63}$',
  157. message='Invalid value (not a DNS name).',
  158. code='invalid_domain_name'
  159. )
  160. ]
  161. def get_minimum_ttl_default():
  162. return settings.MINIMUM_TTL_DEFAULT
  163. class Domain(models.Model):
  164. created = models.DateTimeField(auto_now_add=True)
  165. name = models.CharField(max_length=191,
  166. unique=True,
  167. validators=validate_domain_name)
  168. owner = models.ForeignKey(User, on_delete=models.PROTECT, related_name='domains')
  169. published = models.DateTimeField(null=True, blank=True)
  170. minimum_ttl = models.PositiveIntegerField(default=get_minimum_ttl_default)
  171. _keys = None
  172. @classmethod
  173. def is_registrable(cls, domain_name: str, user: User):
  174. """
  175. Returns False in any of the following cases:
  176. (a) the domain name is under .internal,
  177. (b) the domain_name appears on the public suffix list,
  178. (c) the domain is descendant to a zone that belongs to any user different from the given one,
  179. unless it's parent is a public suffix, either through the Internet PSL or local settings.
  180. Otherwise, True is returned.
  181. """
  182. if domain_name != domain_name.lower():
  183. raise ValueError
  184. if f'.{domain_name}'.endswith('.internal'):
  185. return False
  186. try:
  187. public_suffix = psl.get_public_suffix(domain_name)
  188. is_public_suffix = psl.is_public_suffix(domain_name)
  189. except (Timeout, NoNameservers):
  190. public_suffix = domain_name.rpartition('.')[2]
  191. is_public_suffix = ('.' not in domain_name) # TLDs are public suffixes
  192. except psl_dns.exceptions.UnsupportedRule as e:
  193. # It would probably be fine to treat this as a non-public suffix (with the TLD acting as the
  194. # public suffix and setting both public_suffix and is_public_suffix accordingly).
  195. # However, in order to allow to investigate the situation, it's better not catch
  196. # this exception. For web requests, our error handler turns it into a 503 error
  197. # and makes sure admins are notified.
  198. raise e
  199. if not is_public_suffix:
  200. # Take into account that any of the parent domains could be a local public suffix. To that
  201. # end, identify the longest local public suffix that is actually a suffix of domain_name.
  202. # Then, override the global PSL result.
  203. for local_public_suffix in settings.LOCAL_PUBLIC_SUFFIXES:
  204. has_local_public_suffix_parent = ('.' + domain_name).endswith('.' + local_public_suffix)
  205. if has_local_public_suffix_parent and len(local_public_suffix) > len(public_suffix):
  206. public_suffix = local_public_suffix
  207. is_public_suffix = (public_suffix == domain_name)
  208. if is_public_suffix and domain_name not in settings.LOCAL_PUBLIC_SUFFIXES:
  209. return False
  210. # Generate a list of all domains connecting this one and its public suffix.
  211. # If another user owns a zone with one of these names, then the requested
  212. # domain is unavailable because it is part of the other user's zone.
  213. private_components = domain_name.rsplit(public_suffix, 1)[0].rstrip('.')
  214. private_components = private_components.split('.') if private_components else []
  215. private_components += [public_suffix]
  216. private_domains = ['.'.join(private_components[i:]) for i in range(0, len(private_components) - 1)]
  217. assert is_public_suffix or domain_name == private_domains[0]
  218. # Deny registration for non-local public suffixes and for domains covered by other users' zones
  219. user = user if not isinstance(user, AnonymousUser) else None
  220. return not cls.objects.filter(Q(name__in=private_domains) & ~Q(owner=user)).exists()
  221. @property
  222. def keys(self):
  223. if not self._keys:
  224. self._keys = pdns.get_keys(self)
  225. return self._keys
  226. @property
  227. def is_locally_registrable(self):
  228. return self.parent_domain_name in settings.LOCAL_PUBLIC_SUFFIXES
  229. @property
  230. def parent_domain_name(self):
  231. return self._partitioned_name[1]
  232. @property
  233. def _partitioned_name(self):
  234. subname, _, parent_name = self.name.partition('.')
  235. return subname, parent_name or None
  236. def save(self, *args, **kwargs):
  237. self.full_clean(validate_unique=False)
  238. super().save(*args, **kwargs)
  239. def update_delegation(self, child_domain: Domain):
  240. child_subname, child_domain_name = child_domain._partitioned_name
  241. if self.name != child_domain_name:
  242. raise ValueError('Cannot update delegation of %s as it is not an immediate child domain of %s.' %
  243. (child_domain.name, self.name))
  244. if child_domain.pk:
  245. # Domain real: set delegation
  246. child_keys = child_domain.keys
  247. if not child_keys:
  248. raise APIException('Cannot delegate %s, as it currently has no keys.' % child_domain.name)
  249. RRset.objects.create(domain=self, subname=child_subname, type='NS', ttl=3600, contents=settings.DEFAULT_NS)
  250. RRset.objects.create(domain=self, subname=child_subname, type='DS', ttl=300,
  251. contents=[ds for k in child_keys for ds in k['ds']])
  252. else:
  253. # Domain not real: remove delegation
  254. for rrset in self.rrset_set.filter(subname=child_subname, type__in=['NS', 'DS']):
  255. rrset.delete()
  256. def __str__(self):
  257. return self.name
  258. class Meta:
  259. ordering = ('created',)
  260. def get_default_value_created():
  261. return timezone.now()
  262. def get_default_value_due():
  263. return timezone.now() + timedelta(days=7)
  264. def get_default_value_mref():
  265. return "ONDON" + str(time.time())
  266. class Donation(models.Model):
  267. created = models.DateTimeField(default=get_default_value_created)
  268. name = models.CharField(max_length=255)
  269. iban = models.CharField(max_length=34)
  270. bic = models.CharField(max_length=11, blank=True)
  271. amount = models.DecimalField(max_digits=8, decimal_places=2)
  272. message = models.CharField(max_length=255, blank=True)
  273. due = models.DateTimeField(default=get_default_value_due)
  274. mref = models.CharField(max_length=32, default=get_default_value_mref)
  275. email = models.EmailField(max_length=255, blank=True)
  276. class Meta:
  277. managed = False
  278. class RRsetManager(Manager):
  279. def create(self, contents=None, **kwargs):
  280. rrset = super().create(**kwargs)
  281. for content in contents or []:
  282. RR.objects.create(rrset=rrset, content=content)
  283. return rrset
  284. class RRset(models.Model):
  285. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  286. created = models.DateTimeField(auto_now_add=True)
  287. updated = models.DateTimeField(null=True) # undocumented, used for debugging only
  288. domain = models.ForeignKey(Domain, on_delete=models.CASCADE)
  289. subname = models.CharField(
  290. max_length=178,
  291. blank=True,
  292. validators=[
  293. validate_lower,
  294. RegexValidator(
  295. regex=r'^([*]|(([*][.])?[a-z0-9_.-]*))$',
  296. message='Subname can only use (lowercase) a-z, 0-9, ., -, and _, '
  297. 'may start with a \'*.\', or just be \'*\'.',
  298. code='invalid_subname'
  299. )
  300. ]
  301. )
  302. type = models.CharField(
  303. max_length=10,
  304. validators=[
  305. validate_upper,
  306. RegexValidator(
  307. regex=r'^[A-Z][A-Z0-9]*$',
  308. message='Type must be uppercase alphanumeric and start with a letter.',
  309. code='invalid_type'
  310. )
  311. ]
  312. )
  313. ttl = models.PositiveIntegerField()
  314. objects = RRsetManager()
  315. DEAD_TYPES = ('ALIAS', 'DNAME')
  316. RESTRICTED_TYPES = ('SOA', 'RRSIG', 'DNSKEY', 'NSEC3PARAM', 'OPT')
  317. class Meta:
  318. unique_together = (("domain", "subname", "type"),)
  319. @staticmethod
  320. def construct_name(subname, domain_name):
  321. return '.'.join(filter(None, [subname, domain_name])) + '.'
  322. @property
  323. def name(self):
  324. return self.construct_name(self.subname, self.domain.name)
  325. def save(self, *args, **kwargs):
  326. self.updated = timezone.now()
  327. self.full_clean(validate_unique=False)
  328. super().save(*args, **kwargs)
  329. def __str__(self):
  330. return '<RRSet %s domain=%s type=%s subname=%s>' % (self.pk, self.domain.name, self.type, self.subname)
  331. class RRManager(Manager):
  332. def bulk_create(self, rrs, **kwargs):
  333. ret = super().bulk_create(rrs, **kwargs)
  334. # For each rrset, save once to set RRset.updated timestamp and trigger signal for post-save processing
  335. rrsets = {rr.rrset for rr in rrs}
  336. for rrset in rrsets:
  337. rrset.save()
  338. return ret
  339. class RR(models.Model):
  340. created = models.DateTimeField(auto_now_add=True)
  341. rrset = models.ForeignKey(RRset, on_delete=models.CASCADE, related_name='records')
  342. # max_length is determined based on the calculation in
  343. # https://lists.isc.org/pipermail/bind-users/2008-April/070148.html
  344. content = models.CharField(max_length=4092)
  345. objects = RRManager()
  346. def __str__(self):
  347. return '<RR %s %s rr_set=%s>' % (self.pk, self.content, self.rrset.pk)
  348. class AuthenticatedAction(models.Model):
  349. """
  350. Represents a procedure call on a defined set of arguments.
  351. Subclasses can define additional arguments by adding Django model fields and must define the action to be taken by
  352. implementing the `_act` method.
  353. AuthenticatedAction provides the `state` property which by default is a hash of the action type (defined by the
  354. action's class path). Other information such as user state can be included in the state hash by (carefully)
  355. overriding the `_state_fields` property. Instantiation of the model, if given a `state` kwarg, will raise an error
  356. if the given state argument does not match the state computed from `_state_fields` at the moment of instantiation.
  357. The same applies to the `act` method: If called on an object that was instantiated without a `state` kwargs, an
  358. error will be raised.
  359. This effectively allows hash-authenticated procedure calls by third parties as long as the server-side state is
  360. unaltered, according to the following protocol:
  361. (1) Instantiate the AuthenticatedAction subclass representing the action to be taken (no `state` kwarg here),
  362. (2) provide information on how to instantiate the instance, and the state hash, to a third party,
  363. (3) when provided with data that allows instantiation and a valid state hash, take the defined action, possibly with
  364. additional parameters chosen by the third party that do not belong to the verified state.
  365. """
  366. _validated = False
  367. class Meta:
  368. managed = False
  369. def __init__(self, *args, **kwargs):
  370. state = kwargs.pop('state', None)
  371. super().__init__(*args, **kwargs)
  372. if state is not None:
  373. self._validated = self.validate_state(state)
  374. if not self._validated:
  375. raise ValueError
  376. @property
  377. def _state_fields(self):
  378. """
  379. Returns a list that defines the state of this action (used for authentication of this action).
  380. Return value must be JSON-serializable.
  381. Values not included in the return value will not be used for authentication, i.e. those values can be varied
  382. freely and function as unauthenticated action input parameters.
  383. Use caution when overriding this method. You will usually want to append a value to the list returned by the
  384. parent. Overriding the behavior altogether could result in reducing the state to fewer variables, resulting
  385. in valid signatures when they were intended to be invalid. The suggested method for overriding is
  386. @property
  387. def _state_fields:
  388. return super()._state_fields + [self.important_value, self.another_added_value]
  389. :return: List of values to be signed.
  390. """
  391. # TODO consider adding a "last change" attribute of the user to the state to avoid code
  392. # re-use after the the state has been changed and changed back.
  393. name = '.'.join([self.__module__, self.__class__.__qualname__])
  394. return [name]
  395. @property
  396. def state(self):
  397. state = json.dumps(self._state_fields).encode()
  398. hash = sha256()
  399. hash.update(state)
  400. return hash.hexdigest()
  401. def validate_state(self, value):
  402. return value == self.state
  403. def _act(self):
  404. """
  405. Conduct the action represented by this class.
  406. :return: None
  407. """
  408. raise NotImplementedError
  409. def act(self):
  410. if not self._validated:
  411. raise RuntimeError('Action state could not be verified.')
  412. return self._act()
  413. class AuthenticatedUserAction(AuthenticatedAction):
  414. """
  415. Abstract AuthenticatedAction involving an user instance, incorporating the user's id, email, password, and
  416. is_active flag into the Message Authentication Code state.
  417. """
  418. user = models.ForeignKey(User, on_delete=models.DO_NOTHING)
  419. class Meta:
  420. managed = False
  421. @property
  422. def _state_fields(self):
  423. return super()._state_fields + [str(self.user.id), self.user.email, self.user.password, self.user.is_active]
  424. def _act(self):
  425. raise NotImplementedError
  426. class AuthenticatedActivateUserAction(AuthenticatedUserAction):
  427. domain = models.CharField(max_length=191)
  428. class Meta:
  429. managed = False
  430. @property
  431. def _state_fields(self):
  432. return super()._state_fields + [self.domain]
  433. def _act(self):
  434. self.user.activate()
  435. class AuthenticatedChangeEmailUserAction(AuthenticatedUserAction):
  436. new_email = models.EmailField()
  437. class Meta:
  438. managed = False
  439. @property
  440. def _state_fields(self):
  441. return super()._state_fields + [self.new_email]
  442. def _act(self):
  443. self.user.change_email(self.new_email)
  444. class AuthenticatedResetPasswordUserAction(AuthenticatedUserAction):
  445. new_password = models.CharField(max_length=128)
  446. class Meta:
  447. managed = False
  448. def _act(self):
  449. self.user.change_password(self.new_password)
  450. class AuthenticatedDeleteUserAction(AuthenticatedUserAction):
  451. class Meta:
  452. managed = False
  453. def _act(self):
  454. self.user.delete()
  455. def captcha_default_content():
  456. alphabet = (string.ascii_uppercase + string.digits).translate({ord(c): None for c in 'IO0'})
  457. return ''.join([secrets.choice(alphabet) for _ in range(5)])
  458. class Captcha(models.Model):
  459. id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
  460. created = models.DateTimeField(auto_now_add=True)
  461. content = models.CharField(
  462. max_length=24,
  463. default=captcha_default_content,
  464. )
  465. def verify(self, solution: str):
  466. age = timezone.now() - self.created
  467. self.delete()
  468. return (
  469. str(solution).upper().strip() == self.content # solution correct
  470. and
  471. age <= settings.CAPTCHA_VALIDITY_PERIOD # not expired
  472. )