2019-12-02 03:32:03 +00:00
|
|
|
import base64
|
|
|
|
import binascii
|
2018-03-31 00:32:46 +00:00
|
|
|
from functools import wraps
|
2019-12-07 13:20:40 +00:00
|
|
|
from flask import g, request, abort, current_app, render_template
|
2019-12-02 03:32:03 +00:00
|
|
|
from flask_login import current_user
|
2018-03-31 00:32:46 +00:00
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
from .models import User, ApiKey, Setting, Domain
|
|
|
|
from .lib.errors import RequestIsNotJSON, NotEnoughPrivileges
|
|
|
|
from .lib.errors import DomainAccessForbidden
|
2018-03-31 00:32:46 +00:00
|
|
|
|
|
|
|
|
|
|
|
def admin_role_required(f):
|
2018-08-31 04:57:06 +00:00
|
|
|
"""
|
|
|
|
Grant access if user is in Administrator role
|
|
|
|
"""
|
2018-03-31 00:32:46 +00:00
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
2019-12-02 03:32:03 +00:00
|
|
|
if current_user.role.name != 'Administrator':
|
|
|
|
abort(403)
|
2018-03-31 00:32:46 +00:00
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2018-03-31 00:32:46 +00:00
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
2018-08-31 04:57:06 +00:00
|
|
|
def operator_role_required(f):
|
|
|
|
"""
|
|
|
|
Grant access if user is in Operator role or higher
|
|
|
|
"""
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
2019-12-02 03:32:03 +00:00
|
|
|
if current_user.role.name not in ['Administrator', 'Operator']:
|
|
|
|
abort(403)
|
2018-08-31 04:57:06 +00:00
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2018-08-31 04:57:06 +00:00
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
2018-03-31 00:32:46 +00:00
|
|
|
def can_access_domain(f):
|
2018-08-31 04:57:06 +00:00
|
|
|
"""
|
|
|
|
Grant access if:
|
|
|
|
- user is in Operator role or higher, or
|
|
|
|
- user is in granted Account, or
|
|
|
|
- user is in granted Domain
|
|
|
|
"""
|
2018-03-31 00:32:46 +00:00
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
2019-12-02 03:32:03 +00:00
|
|
|
if current_user.role.name not in ['Administrator', 'Operator']:
|
2018-03-31 00:32:46 +00:00
|
|
|
domain_name = kwargs.get('domain_name')
|
2019-12-02 03:32:03 +00:00
|
|
|
domain = Domain.query.filter(Domain.name == domain_name).first()
|
|
|
|
|
|
|
|
if not domain:
|
|
|
|
abort(404)
|
|
|
|
|
|
|
|
valid_access = Domain(id=domain.id).is_valid_access(
|
|
|
|
current_user.id)
|
2018-03-31 00:32:46 +00:00
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
if not valid_access:
|
|
|
|
abort(403)
|
2018-03-31 00:32:46 +00:00
|
|
|
|
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2018-03-31 00:32:46 +00:00
|
|
|
return decorated_function
|
2018-06-07 02:28:14 +00:00
|
|
|
|
|
|
|
|
|
|
|
def can_configure_dnssec(f):
|
2018-08-31 04:57:06 +00:00
|
|
|
"""
|
|
|
|
Grant access if:
|
|
|
|
- user is in Operator role or higher, or
|
|
|
|
- dnssec_admins_only is off
|
|
|
|
"""
|
2018-06-07 02:28:14 +00:00
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
2019-12-02 03:32:03 +00:00
|
|
|
if current_user.role.name not in [
|
|
|
|
'Administrator', 'Operator'
|
|
|
|
] and Setting().get('dnssec_admins_only'):
|
|
|
|
abort(403)
|
2018-06-07 02:28:14 +00:00
|
|
|
|
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2018-06-07 02:28:14 +00:00
|
|
|
return decorated_function
|
2018-09-01 10:53:05 +00:00
|
|
|
|
|
|
|
|
|
|
|
def can_create_domain(f):
|
|
|
|
"""
|
|
|
|
Grant access if:
|
|
|
|
- user is in Operator role or higher, or
|
|
|
|
- allow_user_create_domain is on
|
|
|
|
"""
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
2019-12-02 03:32:03 +00:00
|
|
|
if current_user.role.name not in [
|
|
|
|
'Administrator', 'Operator'
|
|
|
|
] and not Setting().get('allow_user_create_domain'):
|
|
|
|
abort(403)
|
2019-03-01 22:49:31 +00:00
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2019-03-01 22:49:31 +00:00
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
|
|
|
def api_basic_auth(f):
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
|
|
|
auth_header = request.headers.get('Authorization')
|
|
|
|
if auth_header:
|
|
|
|
auth_header = auth_header.replace('Basic ', '', 1)
|
|
|
|
|
|
|
|
try:
|
|
|
|
auth_header = str(base64.b64decode(auth_header), 'utf-8')
|
|
|
|
username, password = auth_header.split(":")
|
2019-12-02 03:32:03 +00:00
|
|
|
except binascii.Error as e:
|
|
|
|
current_app.logger.error(
|
|
|
|
'Invalid base64-encoded of credential. Error {0}'.format(
|
|
|
|
e))
|
|
|
|
abort(401)
|
2019-03-01 22:49:31 +00:00
|
|
|
except TypeError as e:
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error('Error: {0}'.format(e))
|
2019-03-01 22:49:31 +00:00
|
|
|
abort(401)
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
user = User(username=username,
|
|
|
|
password=password,
|
|
|
|
plain_text_password=password)
|
2019-03-01 22:49:31 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
auth_method = request.args.get('auth_method', 'LOCAL')
|
|
|
|
auth_method = 'LDAP' if auth_method != 'LOCAL' else 'LOCAL'
|
2019-12-02 03:32:03 +00:00
|
|
|
auth = user.is_validate(method=auth_method,
|
|
|
|
src_ip=request.remote_addr)
|
2019-03-01 22:49:31 +00:00
|
|
|
|
|
|
|
if not auth:
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error('Checking user password failed')
|
2019-03-01 22:49:31 +00:00
|
|
|
abort(401)
|
|
|
|
else:
|
|
|
|
user = User.query.filter(User.username == username).first()
|
2019-12-02 03:32:03 +00:00
|
|
|
current_user = user
|
2019-03-01 22:49:31 +00:00
|
|
|
except Exception as e:
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error('Error: {0}'.format(e))
|
2019-03-01 22:49:31 +00:00
|
|
|
abort(401)
|
|
|
|
else:
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error('Error: Authorization header missing!')
|
2019-03-01 22:49:31 +00:00
|
|
|
abort(401)
|
|
|
|
|
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2019-03-01 22:49:31 +00:00
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
|
|
|
def is_json(f):
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
|
|
|
if request.method in ['POST', 'PUT', 'PATCH']:
|
|
|
|
if not request.is_json:
|
|
|
|
raise RequestIsNotJSON()
|
|
|
|
return f(*args, **kwargs)
|
|
|
|
|
|
|
|
return decorated_function
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2019-03-01 22:49:31 +00:00
|
|
|
def api_can_create_domain(f):
|
|
|
|
"""
|
|
|
|
Grant access if:
|
|
|
|
- user is in Operator role or higher, or
|
|
|
|
- allow_user_create_domain is on
|
|
|
|
"""
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
2019-12-02 03:32:03 +00:00
|
|
|
if current_user.role.name not in [
|
|
|
|
'Administrator', 'Operator'
|
|
|
|
] and not Setting().get('allow_user_create_domain'):
|
2019-03-01 22:49:31 +00:00
|
|
|
msg = "User {0} does not have enough privileges to create domain"
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error(msg.format(current_user.username))
|
2019-03-01 22:49:31 +00:00
|
|
|
raise NotEnoughPrivileges()
|
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2019-03-01 22:49:31 +00:00
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
|
|
|
def apikey_is_admin(f):
|
|
|
|
"""
|
|
|
|
Grant access if user is in Administrator role
|
|
|
|
"""
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
|
|
|
if g.apikey.role.name != 'Administrator':
|
|
|
|
msg = "Apikey {0} does not have enough privileges to create domain"
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error(msg.format(g.apikey.id))
|
2019-03-01 22:49:31 +00:00
|
|
|
raise NotEnoughPrivileges()
|
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2019-03-01 22:49:31 +00:00
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
|
|
|
def apikey_can_access_domain(f):
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
|
|
|
apikey = g.apikey
|
|
|
|
if g.apikey.role.name not in ['Administrator', 'Operator']:
|
|
|
|
domains = apikey.domains
|
|
|
|
zone_id = kwargs.get('zone_id')
|
|
|
|
domain_names = [item.name for item in domains]
|
|
|
|
|
|
|
|
if zone_id not in domain_names:
|
|
|
|
raise DomainAccessForbidden()
|
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
2019-03-01 22:49:31 +00:00
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
|
|
|
def apikey_auth(f):
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
|
|
|
auth_header = request.headers.get('X-API-KEY')
|
|
|
|
if auth_header:
|
|
|
|
try:
|
|
|
|
apikey_val = str(base64.b64decode(auth_header), 'utf-8')
|
2019-12-02 03:32:03 +00:00
|
|
|
except binascii.Error as e:
|
|
|
|
current_app.logger.error(
|
|
|
|
'Invalid base64-encoded of credential. Error {0}'.format(
|
|
|
|
e))
|
|
|
|
abort(401)
|
2019-03-01 22:49:31 +00:00
|
|
|
except TypeError as e:
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error('Error: {0}'.format(e))
|
2019-03-01 22:49:31 +00:00
|
|
|
abort(401)
|
|
|
|
|
2019-12-02 03:32:03 +00:00
|
|
|
apikey = ApiKey(key=apikey_val)
|
2019-03-01 22:49:31 +00:00
|
|
|
apikey.plain_text_password = apikey_val
|
|
|
|
|
|
|
|
try:
|
|
|
|
auth_method = 'LOCAL'
|
2019-12-02 03:32:03 +00:00
|
|
|
auth = apikey.is_validate(method=auth_method,
|
|
|
|
src_ip=request.remote_addr)
|
2019-03-01 22:49:31 +00:00
|
|
|
|
|
|
|
g.apikey = auth
|
|
|
|
except Exception as e:
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error('Error: {0}'.format(e))
|
2019-03-01 22:49:31 +00:00
|
|
|
abort(401)
|
|
|
|
else:
|
2019-12-02 03:32:03 +00:00
|
|
|
current_app.logger.error('Error: API key header missing!')
|
2019-03-01 22:49:31 +00:00
|
|
|
abort(401)
|
2018-09-01 10:53:05 +00:00
|
|
|
|
|
|
|
return f(*args, **kwargs)
|
2019-12-02 03:32:03 +00:00
|
|
|
|
|
|
|
return decorated_function
|
|
|
|
|
|
|
|
|
|
|
|
def dyndns_login_required(f):
|
|
|
|
@wraps(f)
|
|
|
|
def decorated_function(*args, **kwargs):
|
|
|
|
if current_user.is_authenticated is False:
|
|
|
|
return render_template('dyndns.html', response='badauth'), 200
|
|
|
|
return f(*args, **kwargs)
|
|
|
|
|
2018-09-01 10:53:05 +00:00
|
|
|
return decorated_function
|