views.py 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639
  1. import base64
  2. import binascii
  3. from django.conf import settings
  4. from django.contrib.auth import user_logged_in
  5. from django.contrib.auth.hashers import is_password_usable
  6. from django.core.mail import EmailMessage
  7. from django.http import Http404
  8. from django.shortcuts import redirect
  9. from django.template.loader import get_template
  10. from rest_framework import generics
  11. from rest_framework import mixins
  12. from rest_framework import status
  13. from rest_framework.authentication import get_authorization_header
  14. from rest_framework.exceptions import (NotAcceptable, NotFound, PermissionDenied, ValidationError)
  15. from rest_framework.permissions import IsAuthenticated
  16. from rest_framework.renderers import JSONRenderer, StaticHTMLRenderer
  17. from rest_framework.response import Response
  18. from rest_framework.reverse import reverse
  19. from rest_framework.views import APIView
  20. from rest_framework.viewsets import GenericViewSet
  21. import desecapi.authentication as auth
  22. from desecapi import serializers, models
  23. from desecapi.pdns_change_tracker import PDNSChangeTracker
  24. from desecapi.permissions import IsOwner, IsDomainOwner, WithinDomainLimitOnPOST
  25. from desecapi.renderers import PlainTextRenderer
  26. class IdempotentDestroy:
  27. def destroy(self, request, *args, **kwargs):
  28. try:
  29. # noinspection PyUnresolvedReferences
  30. super().destroy(request, *args, **kwargs)
  31. except Http404:
  32. pass
  33. return Response(status=status.HTTP_204_NO_CONTENT)
  34. class DomainView:
  35. def initial(self, request, *args, **kwargs):
  36. # noinspection PyUnresolvedReferences
  37. super().initial(request, *args, **kwargs)
  38. try:
  39. # noinspection PyAttributeOutsideInit, PyUnresolvedReferences
  40. self.domain = self.request.user.domains.get(name=self.kwargs['name'])
  41. except models.Domain.DoesNotExist:
  42. raise Http404
  43. class TokenViewSet(IdempotentDestroy,
  44. mixins.CreateModelMixin,
  45. mixins.RetrieveModelMixin,
  46. mixins.DestroyModelMixin,
  47. mixins.ListModelMixin,
  48. GenericViewSet):
  49. serializer_class = serializers.TokenSerializer
  50. permission_classes = (IsAuthenticated,)
  51. def get_queryset(self):
  52. return self.request.user.auth_tokens.all()
  53. def get_serializer(self, *args, **kwargs):
  54. # When creating a new token, return the plaintext representation
  55. if self.request.method == 'POST':
  56. kwargs.setdefault('include_plain', True)
  57. return super().get_serializer(*args, **kwargs)
  58. def perform_create(self, serializer):
  59. serializer.save(user=self.request.user)
  60. class DomainViewSet(IdempotentDestroy,
  61. mixins.CreateModelMixin,
  62. mixins.RetrieveModelMixin,
  63. mixins.DestroyModelMixin,
  64. mixins.ListModelMixin,
  65. GenericViewSet):
  66. serializer_class = serializers.DomainSerializer
  67. permission_classes = (IsAuthenticated, IsOwner, WithinDomainLimitOnPOST)
  68. lookup_field = 'name'
  69. lookup_value_regex = r'[^/]+'
  70. def get_queryset(self):
  71. return self.request.user.domains
  72. def get_serializer(self, *args, **kwargs):
  73. include_keys = (self.action in ['create', 'retrieve'])
  74. return super().get_serializer(*args, include_keys=include_keys, **kwargs)
  75. def perform_create(self, serializer):
  76. with PDNSChangeTracker():
  77. domain = serializer.save(owner=self.request.user)
  78. # TODO this line raises if the local public suffix is not in our database!
  79. PDNSChangeTracker.track(lambda: self.auto_delegate(domain))
  80. @staticmethod
  81. def auto_delegate(domain: models.Domain):
  82. if domain.is_locally_registrable:
  83. parent_domain = models.Domain.objects.get(name=domain.parent_domain_name)
  84. parent_domain.update_delegation(domain)
  85. def perform_destroy(self, instance: models.Domain):
  86. with PDNSChangeTracker():
  87. instance.delete()
  88. if instance.is_locally_registrable:
  89. parent_domain = models.Domain.objects.get(name=instance.parent_domain_name)
  90. with PDNSChangeTracker():
  91. parent_domain.update_delegation(instance)
  92. class RRsetDetail(IdempotentDestroy, DomainView, generics.RetrieveUpdateDestroyAPIView):
  93. serializer_class = serializers.RRsetSerializer
  94. permission_classes = (IsAuthenticated, IsDomainOwner,)
  95. def get_queryset(self):
  96. return self.domain.rrset_set
  97. def get_object(self):
  98. queryset = self.filter_queryset(self.get_queryset())
  99. filter_kwargs = {k: self.kwargs[k] for k in ['subname', 'type']}
  100. obj = generics.get_object_or_404(queryset, **filter_kwargs)
  101. # May raise a permission denied
  102. self.check_object_permissions(self.request, obj)
  103. return obj
  104. def get_serializer(self, *args, **kwargs):
  105. return super().get_serializer(domain=self.domain, *args, **kwargs)
  106. def update(self, request, *args, **kwargs):
  107. response = super().update(request, *args, **kwargs)
  108. if response.data is None:
  109. response.status_code = 204
  110. return response
  111. def perform_update(self, serializer):
  112. with PDNSChangeTracker():
  113. super().perform_update(serializer)
  114. def perform_destroy(self, instance):
  115. with PDNSChangeTracker():
  116. super().perform_destroy(instance)
  117. class RRsetList(DomainView, generics.ListCreateAPIView, generics.UpdateAPIView):
  118. serializer_class = serializers.RRsetSerializer
  119. permission_classes = (IsAuthenticated, IsDomainOwner,)
  120. def get_queryset(self):
  121. rrsets = models.RRset.objects.filter(domain=self.domain)
  122. for filter_field in ('subname', 'type'):
  123. value = self.request.query_params.get(filter_field)
  124. if value is not None:
  125. # TODO consider moving this
  126. if filter_field == 'type' and value in models.RRset.RESTRICTED_TYPES:
  127. raise PermissionDenied("You cannot tinker with the %s RRset." % value)
  128. rrsets = rrsets.filter(**{'%s__exact' % filter_field: value})
  129. return rrsets
  130. def get_object(self):
  131. # For this view, the object we're operating on is the queryset that one can also GET. Serializing a queryset
  132. # is fine as per https://www.django-rest-framework.org/api-guide/serializers/#serializing-multiple-objects.
  133. # We skip checking object permissions here to avoid evaluating the queryset. The user can access all his RRsets
  134. # anyways.
  135. return self.filter_queryset(self.get_queryset())
  136. def get_serializer(self, *args, **kwargs):
  137. kwargs = kwargs.copy()
  138. data = kwargs.get('data')
  139. if data and 'many' not in kwargs:
  140. if self.request.method == 'POST':
  141. kwargs['many'] = isinstance(data, list)
  142. elif self.request.method in ['PATCH', 'PUT']:
  143. kwargs['many'] = True
  144. return super().get_serializer(domain=self.domain, *args, **kwargs)
  145. def perform_create(self, serializer):
  146. with PDNSChangeTracker():
  147. serializer.save(domain=self.domain)
  148. def perform_update(self, serializer):
  149. with PDNSChangeTracker():
  150. serializer.save(domain=self.domain)
  151. class Root(APIView):
  152. def get(self, request, *_):
  153. if self.request.user.is_authenticated:
  154. routes = {
  155. 'account': {
  156. 'show': reverse('account', request=request),
  157. 'delete': reverse('account-delete', request=request),
  158. 'change-email': reverse('account-change-email', request=request),
  159. 'reset-password': reverse('account-reset-password', request=request),
  160. },
  161. 'logout': reverse('logout', request=request),
  162. 'tokens': reverse('token-list', request=request),
  163. 'domains': reverse('domain-list', request=request),
  164. }
  165. else:
  166. routes = {
  167. 'register': reverse('register', request=request),
  168. 'login': reverse('login', request=request),
  169. 'reset-password': reverse('account-reset-password', request=request),
  170. }
  171. return Response(routes)
  172. class DynDNS12Update(APIView):
  173. authentication_classes = (auth.TokenAuthentication, auth.BasicTokenAuthentication, auth.URLParamAuthentication,)
  174. renderer_classes = [PlainTextRenderer]
  175. def _find_domain(self, request):
  176. def find_domain_name(r):
  177. # 1. hostname parameter
  178. if 'hostname' in r.query_params and r.query_params['hostname'] != 'YES':
  179. return r.query_params['hostname']
  180. # 2. host_id parameter
  181. if 'host_id' in r.query_params:
  182. return r.query_params['host_id']
  183. # 3. http basic auth username
  184. try:
  185. domain_name = base64.b64decode(
  186. get_authorization_header(r).decode().split(' ')[1].encode()).decode().split(':')[0]
  187. if domain_name and '@' not in domain_name:
  188. return domain_name
  189. except IndexError:
  190. pass
  191. except UnicodeDecodeError:
  192. pass
  193. except binascii.Error:
  194. pass
  195. # 4. username parameter
  196. if 'username' in r.query_params:
  197. return r.query_params['username']
  198. # 5. only domain associated with this user account
  199. if len(r.user.domains.all()) == 1:
  200. return r.user.domains.all()[0].name
  201. if len(r.user.domains.all()) > 1:
  202. ex = ValidationError(detail={
  203. "detail": "Request does not specify domain unambiguously.",
  204. "code": "domain-ambiguous"
  205. })
  206. ex.status_code = status.HTTP_409_CONFLICT
  207. raise ex
  208. return None
  209. name = find_domain_name(request).lower()
  210. try:
  211. return self.request.user.domains.get(name=name)
  212. except models.Domain.DoesNotExist:
  213. return None
  214. @staticmethod
  215. def find_ip(request, params, version=4):
  216. if version == 4:
  217. look_for = '.'
  218. elif version == 6:
  219. look_for = ':'
  220. else:
  221. raise Exception
  222. # Check URL parameters
  223. for p in params:
  224. if p in request.query_params:
  225. if not len(request.query_params[p]):
  226. return None
  227. if look_for in request.query_params[p]:
  228. return request.query_params[p]
  229. # Check remote IP address
  230. client_ip = request.META.get('REMOTE_ADDR')
  231. if look_for in client_ip:
  232. return client_ip
  233. # give up
  234. return None
  235. def _find_ip_v4(self, request):
  236. return self.find_ip(request, ['myip', 'myipv4', 'ip'])
  237. def _find_ip_v6(self, request):
  238. return self.find_ip(request, ['myipv6', 'ipv6', 'myip', 'ip'], version=6)
  239. def get(self, request, *_):
  240. domain = self._find_domain(request)
  241. if domain is None:
  242. raise NotFound('nohost')
  243. ipv4 = self._find_ip_v4(request)
  244. ipv6 = self._find_ip_v6(request)
  245. data = [
  246. {'type': 'A', 'subname': '', 'ttl': 60, 'records': [ipv4] if ipv4 else []},
  247. {'type': 'AAAA', 'subname': '', 'ttl': 60, 'records': [ipv6] if ipv6 else []},
  248. ]
  249. instances = domain.rrset_set.filter(subname='', type__in=['A', 'AAAA']).all()
  250. serializer = serializers.RRsetSerializer(instances, domain=domain, data=data, many=True, partial=True)
  251. try:
  252. serializer.is_valid(raise_exception=True)
  253. except ValidationError as e:
  254. raise e
  255. with PDNSChangeTracker():
  256. serializer.save(domain=domain)
  257. return Response('good', content_type='text/plain')
  258. class DonationList(generics.CreateAPIView):
  259. serializer_class = serializers.DonationSerializer
  260. def perform_create(self, serializer):
  261. instance = self.serializer_class.Meta.model(**serializer.validated_data)
  262. context = {
  263. 'donation': instance,
  264. 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
  265. 'creditorname': settings.SEPA['CREDITOR_NAME'],
  266. }
  267. # internal desec notification
  268. content_tmpl = get_template('emails/donation/desec-content.txt')
  269. subject_tmpl = get_template('emails/donation/desec-subject.txt')
  270. attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
  271. from_tmpl = get_template('emails/from.txt')
  272. email = EmailMessage(subject_tmpl.render(context),
  273. content_tmpl.render(context),
  274. from_tmpl.render(context),
  275. ['donation@desec.io'],
  276. attachments=[
  277. ('jameica-directdebit.xml',
  278. attachment_tmpl.render(context),
  279. 'text/xml')
  280. ])
  281. email.send()
  282. # donor notification
  283. if instance.email:
  284. content_tmpl = get_template('emails/donation/donor-content.txt')
  285. subject_tmpl = get_template('emails/donation/donor-subject.txt')
  286. footer_tmpl = get_template('emails/footer.txt')
  287. email = EmailMessage(subject_tmpl.render(context),
  288. content_tmpl.render(context) + footer_tmpl.render(),
  289. from_tmpl.render(context),
  290. [instance.email])
  291. email.send()
  292. class AccountCreateView(generics.CreateAPIView):
  293. serializer_class = serializers.RegisterAccountSerializer
  294. def create(self, request, *args, **kwargs):
  295. # Create user and send trigger email verification.
  296. # Alternative would be to create user once email is verified, but this could be abused for bulk email.
  297. serializer = self.get_serializer(data=request.data)
  298. activation_required = settings.USER_ACTIVATION_REQUIRED
  299. try:
  300. serializer.is_valid(raise_exception=True)
  301. except ValidationError as e:
  302. # Hide existing users
  303. email_detail = e.detail.pop('email', [])
  304. email_detail = [detail for detail in email_detail if detail.code != 'unique']
  305. if email_detail:
  306. e.detail['email'] = email_detail
  307. if e.detail:
  308. raise e
  309. else:
  310. # create user
  311. user = serializer.save(is_active=(not activation_required))
  312. # send email if needed
  313. domain = serializer.validated_data.get('domain')
  314. if domain or activation_required:
  315. action = models.AuthenticatedActivateUserAction(user=user, domain=domain)
  316. verification_code = serializers.AuthenticatedActivateUserActionSerializer(action).data['code']
  317. user.send_email('activate-with-domain' if domain else 'activate', context={
  318. 'confirmation_link': reverse('confirm-activate-account', request=request, args=[verification_code]),
  319. 'domain': domain,
  320. })
  321. # This request is unauthenticated, so don't expose whether we did anything.
  322. message = 'Welcome! Please check your mailbox.' if activation_required else 'Welcome!'
  323. return Response(data={'detail': message}, status=status.HTTP_202_ACCEPTED)
  324. class AccountView(generics.RetrieveAPIView):
  325. permission_classes = (IsAuthenticated,)
  326. serializer_class = serializers.UserSerializer
  327. def get_object(self):
  328. return self.request.user
  329. class AccountDeleteView(generics.GenericAPIView):
  330. authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
  331. permission_classes = (IsAuthenticated,)
  332. response_still_has_domains = Response(
  333. data={'detail': 'To delete your user account, first delete all of your domains.'},
  334. status=status.HTTP_409_CONFLICT,
  335. )
  336. def post(self, request, *args, **kwargs):
  337. if self.request.user.domains.exists():
  338. return self.response_still_has_domains
  339. action = models.AuthenticatedDeleteUserAction(user=self.request.user)
  340. verification_code = serializers.AuthenticatedDeleteUserActionSerializer(action).data['code']
  341. request.user.send_email('delete-user', context={
  342. 'confirmation_link': reverse('confirm-delete-account', request=request, args=[verification_code])
  343. })
  344. return Response(data={'detail': 'Please check your mailbox for further account deletion instructions.'},
  345. status=status.HTTP_202_ACCEPTED)
  346. class AccountLoginView(generics.GenericAPIView):
  347. authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
  348. permission_classes = (IsAuthenticated,)
  349. def post(self, request, *args, **kwargs):
  350. user = self.request.user
  351. token = models.Token.objects.create(user=user, name="login")
  352. user_logged_in.send(sender=user.__class__, request=self.request, user=user)
  353. data = serializers.TokenSerializer(token, include_plain=True).data
  354. return Response(data)
  355. class AccountLogoutView(generics.GenericAPIView, mixins.DestroyModelMixin):
  356. authentication_classes = (auth.TokenAuthentication,)
  357. permission_classes = (IsAuthenticated,)
  358. def get_object(self):
  359. # self.request.auth contains the hashed key as it is stored in the database
  360. return models.Token.objects.get(key=self.request.auth)
  361. def post(self, request, *args, **kwargs):
  362. return self.destroy(request, *args, **kwargs)
  363. class AccountChangeEmailView(generics.GenericAPIView):
  364. authentication_classes = (auth.EmailPasswordPayloadAuthentication,)
  365. permission_classes = (IsAuthenticated,)
  366. serializer_class = serializers.ChangeEmailSerializer
  367. def post(self, request, *args, **kwargs):
  368. # Check password and extract email
  369. serializer = self.get_serializer(data=request.data)
  370. serializer.is_valid(raise_exception=True)
  371. new_email = serializer.validated_data['new_email']
  372. action = models.AuthenticatedChangeEmailUserAction(user=request.user, new_email=new_email)
  373. verification_code = serializers.AuthenticatedChangeEmailUserActionSerializer(action).data['code']
  374. request.user.send_email('change-email', recipient=new_email, context={
  375. 'confirmation_link': reverse('confirm-change-email', request=request, args=[verification_code]),
  376. 'old_email': request.user.email,
  377. 'new_email': new_email,
  378. })
  379. # At this point, we know that we are talking to the user, so we can tell that we sent an email.
  380. return Response(data={'detail': 'Please check your mailbox to confirm email address change.'},
  381. status=status.HTTP_202_ACCEPTED)
  382. class AccountResetPasswordView(generics.GenericAPIView):
  383. serializer_class = serializers.ResetPasswordSerializer
  384. def post(self, request, *args, **kwargs):
  385. serializer = self.get_serializer(data=request.data)
  386. serializer.is_valid(raise_exception=True)
  387. try:
  388. email = serializer.validated_data['email']
  389. user = models.User.objects.get(email=email, is_active=True)
  390. except models.User.DoesNotExist:
  391. pass
  392. else:
  393. self.send_reset_token(user, request)
  394. # This request is unauthenticated, so don't expose whether we did anything.
  395. return Response(data={'detail': 'Please check your mailbox for further password reset instructions. '
  396. 'If you did not receive an email, please contact support.'},
  397. status=status.HTTP_202_ACCEPTED)
  398. @staticmethod
  399. def send_reset_token(user, request):
  400. action = models.AuthenticatedResetPasswordUserAction(user=user)
  401. verification_code = serializers.AuthenticatedResetPasswordUserActionSerializer(action).data['code']
  402. user.send_email('reset-password', context={
  403. 'confirmation_link': reverse('confirm-reset-password', request=request, args=[verification_code])
  404. })
  405. class AuthenticatedActionView(generics.GenericAPIView):
  406. """
  407. Abstract class. Deserializes the given payload according the serializers specified by the view extending
  408. this class. If the `serializer.is_valid`, `act` is called on the action object.
  409. """
  410. authentication_classes = (auth.AuthenticatedActionAuthentication,)
  411. authentication_exception = ValidationError
  412. html_url = None
  413. http_method_names = ['get', 'post'] # GET is for redirect only
  414. renderer_classes = [JSONRenderer, StaticHTMLRenderer]
  415. def perform_authentication(self, request):
  416. # Delay authentication until request.auth or request.user is first accessed.
  417. # This allows returning a redirect or status 405 without validating the action code.
  418. pass
  419. def get(self, request, *args, **kwargs):
  420. # Redirect browsers to frontend if available
  421. is_redirect = (request.accepted_renderer.format == 'html') and self.html_url is not None
  422. if is_redirect:
  423. # Careful: This can generally lead to an open redirect if values contain slashes!
  424. # However, it cannot happen for Django view kwargs.
  425. return redirect(self.html_url.format(**kwargs))
  426. else:
  427. raise NotAcceptable
  428. def post(self, request, *args, **kwargs):
  429. self.request.auth.act() # execute the action (triggers authentication if not yet done)
  430. return self.finalize()
  431. def finalize(self):
  432. raise NotImplementedError
  433. class AuthenticatedActivateUserActionView(AuthenticatedActionView):
  434. html_url = '/confirm/activate-account/{code}/'
  435. serializer_class = serializers.AuthenticatedActivateUserActionSerializer
  436. def finalize(self):
  437. if not self.request.auth.domain:
  438. return self._finalize_without_domain()
  439. else:
  440. domain = self._create_domain()
  441. return self._finalize_with_domain(domain)
  442. def _create_domain(self):
  443. action = self.request.auth
  444. serializer = serializers.DomainSerializer(
  445. data={'name': action.domain},
  446. context=self.get_serializer_context()
  447. )
  448. try:
  449. serializer.is_valid(raise_exception=True)
  450. except ValidationError as e: # e.g. domain name unavailable
  451. action.user.delete()
  452. reasons = ', '.join([detail.code for detail in e.detail.get('name', [])])
  453. raise ValidationError(
  454. f'The requested domain {action.domain} could not be registered (reason: {reasons}). '
  455. f'Please start over and sign up again.'
  456. )
  457. # TODO the following line is subject to race condition and can fail, as for the domain name, we have that
  458. # time-of-check != time-of-action
  459. return PDNSChangeTracker.track(lambda: serializer.save(owner=action.user))
  460. def _finalize_without_domain(self):
  461. if not is_password_usable(self.request.auth.user.password):
  462. AccountResetPasswordView.send_reset_token(self.request.auth.user, self.request)
  463. return Response({
  464. 'detail': 'Success! We sent you instructions on how to set your password.'
  465. })
  466. login_url = self.request.build_absolute_uri(reverse('v1:login'))
  467. return Response({
  468. 'detail': f'Success! Please log in at {login_url}.'
  469. })
  470. def _finalize_with_domain(self, domain):
  471. if domain.is_locally_registrable:
  472. # TODO the following line raises Domain.DoesNotExist under unknown conditions
  473. PDNSChangeTracker.track(lambda: DomainViewSet.auto_delegate(domain))
  474. token = models.Token.objects.create(user=domain.owner, name='dyndns')
  475. return Response({
  476. 'detail': 'Success! Here is the password ("token") to configure your router (or any other dynDNS '
  477. 'client). This password is different from your account password for security reasons.',
  478. 'domain': serializers.DomainSerializer(domain).data,
  479. **serializers.TokenSerializer(token, include_plain=True).data,
  480. })
  481. else:
  482. return Response({
  483. 'detail': 'Success! Please check the docs for the next steps, https://desec.readthedocs.io/.'
  484. })
  485. class AuthenticatedChangeEmailUserActionView(AuthenticatedActionView):
  486. html_url = '/confirm/change-email/{code}/'
  487. serializer_class = serializers.AuthenticatedChangeEmailUserActionSerializer
  488. def finalize(self):
  489. return Response({
  490. 'detail': f'Success! Your email address has been changed to {self.request.user.email}.'
  491. })
  492. class AuthenticatedResetPasswordUserActionView(AuthenticatedActionView):
  493. html_url = '/confirm/reset-password/{code}/'
  494. serializer_class = serializers.AuthenticatedResetPasswordUserActionSerializer
  495. def finalize(self):
  496. login_url = self.request.build_absolute_uri(reverse('v1:login'))
  497. return Response({'detail': f'Success! Your password has been changed. Log in at {login_url}.'})
  498. class AuthenticatedDeleteUserActionView(AuthenticatedActionView):
  499. html_url = '/confirm/delete-account/{code}/'
  500. serializer_class = serializers.AuthenticatedDeleteUserActionSerializer
  501. def post(self, request, *args, **kwargs):
  502. if self.request.user.domains.exists():
  503. return AccountDeleteView.response_still_has_domains
  504. return super().post(request, *args, **kwargs)
  505. def finalize(self):
  506. return Response({'detail': 'All your data has been deleted. Bye bye, see you soon! <3'})
  507. class CaptchaView(generics.CreateAPIView):
  508. serializer_class = serializers.CaptchaSerializer