models.py 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. # -*- coding: utf-8 -*-
  2. from __future__ import unicode_literals
  3. from django.db import models
  4. from django.core.exceptions import ValidationError
  5. from django.conf import settings
  6. from django.core.urlresolvers import reverse
  7. from netfields import InetAddressField, NetManager
  8. import ldapdb.models
  9. from ldapdb.models.fields import CharField, ListField
  10. from coin.mixins import CoinLdapSyncMixin
  11. from coin.configuration.models import Configuration
  12. # from coin.offers.backends import ValidateBackendType
  13. from coin import utils
  14. from coin import validation
  15. """BIG FAT WARNING
  16. Ce code requiert une sévère factorisation avec housing/models.py et
  17. vps/models.py
  18. """
  19. class VPNConfiguration(CoinLdapSyncMixin, Configuration):
  20. url_namespace = "vpn"
  21. # backend_name = "openvpn_ldap"
  22. # administrative_subscription = models.OneToOneField(
  23. # 'offers.OfferSubscription',
  24. # related_name=backend_name,
  25. # validators=[ValidateBackendType(backend_name)])
  26. activated = models.BooleanField(default=False, verbose_name='activé')
  27. login = models.CharField(max_length=50, unique=True, blank=True,
  28. verbose_name="identifiant",
  29. help_text="Laisser vide pour une génération automatique")
  30. password = models.CharField(max_length=256, verbose_name="mot de passe",
  31. blank=True, null=True)
  32. ipv4_endpoint = InetAddressField(validators=[validation.validate_v4],
  33. verbose_name="IPv4", blank=True, null=True,
  34. help_text="Adresse IPv4 utilisée par "
  35. "défaut sur le VPN")
  36. ipv6_endpoint = InetAddressField(validators=[validation.validate_v6],
  37. verbose_name="IPv6", blank=True, null=True,
  38. help_text="Adresse IPv6 utilisée par "
  39. "défaut sur le VPN")
  40. crypto_link = models.URLField(verbose_name="Matériel cryptographique", blank=True,
  41. null=True, help_text="Lien à usage unique (détruit après ouverture)")
  42. objects = NetManager()
  43. def get_absolute_url(self):
  44. return reverse('vpn:details', args=[str(self.pk)])
  45. # This method is part of the general configuration interface.
  46. def subnet_event(self):
  47. self.check_endpoints(delete=True)
  48. # We potentially changed the endpoints, so we need to save. Also,
  49. # saving will update the subnets in the LDAP backend.
  50. self.full_clean()
  51. self.save()
  52. def get_subnets(self, version):
  53. subnets = self.ip_subnet.all()
  54. return [subnet for subnet in subnets if subnet.inet.version == version]
  55. def sync_to_ldap(self, creation, *args, **kwargs):
  56. if creation:
  57. config = LdapVPNConfig()
  58. else:
  59. config = LdapVPNConfig.objects.get(pk=self.login)
  60. config.login = config.sn = self.login
  61. config.password = self.password
  62. config.active = 'yes' if self.activated else 'no'
  63. config.ipv4_endpoint = utils.str_or_none(self.ipv4_endpoint)
  64. config.ipv6_endpoint = utils.str_or_none(self.ipv6_endpoint)
  65. config.ranges_v4 = [str(s) for s in self.get_subnets(4)]
  66. config.ranges_v6 = [str(s) for s in self.get_subnets(6)]
  67. config.save()
  68. def delete_from_ldap(self):
  69. LdapVPNConfig.objects.get(pk=self.login).delete()
  70. def generate_endpoints(self, v4=True, v6=True):
  71. """Generate IP endpoints in one of the attributed IP subnets. If there is
  72. no available subnet for a given address family, then no endpoint
  73. is generated for this address family. If there already is an
  74. endpoint, do nothing.
  75. Returns True if an endpoint was generated.
  76. TODO: this should be factored for other technologies (DSL, etc)
  77. """
  78. subnets = self.ip_subnet.all()
  79. updated = False
  80. if v4 and self.ipv4_endpoint is None:
  81. subnets_v4 = [s for s in subnets if s.inet.version == 4]
  82. if len(subnets_v4) > 0:
  83. self.ipv4_endpoint = subnets_v4[0].inet.ip
  84. updated = True
  85. if v6 and self.ipv6_endpoint is None:
  86. subnets_v6 = [s for s in subnets if s.inet.version == 6]
  87. if len(subnets_v6) > 0:
  88. # With v6, we choose the second host of the subnet (cafe::1)
  89. gen = subnets_v6[0].inet.iter_hosts()
  90. gen.next()
  91. self.ipv6_endpoint = gen.next()
  92. updated = True
  93. return updated
  94. def check_endpoints(self, delete=False):
  95. """Check that the IP endpoints are included in one of the attributed IP
  96. subnets.
  97. If [delete] is True, then simply delete the faulty endpoints
  98. instead of raising an exception.
  99. """
  100. error = "L'IP {} n'est pas dans un réseau attribué."
  101. subnets = self.ip_subnet.all()
  102. is_faulty = lambda endpoint : endpoint and not any([endpoint in subnet.inet for subnet in subnets])
  103. if is_faulty(self.ipv4_endpoint):
  104. if delete:
  105. self.ipv4_endpoint = None
  106. else:
  107. raise ValidationError(error.format(self.ipv4_endpoint))
  108. if is_faulty(self.ipv6_endpoint):
  109. if delete:
  110. self.ipv6_endpoint = None
  111. else:
  112. raise ValidationError(error.format(self.ipv6_endpoint))
  113. def clean(self):
  114. # Generate VPN login, of the form "login-vpnX". The resulting
  115. # login should not contain any ".", because graphite uses "." as a
  116. # separator.
  117. if not self.login:
  118. username = self.offersubscription.member.username
  119. vpns = VPNConfiguration.objects.filter(offersubscription__member__username=username)
  120. # This is the list of existing VPN logins for this user.
  121. logins = [vpn.login for vpn in vpns]
  122. # 100 VPNs ought to be enough for anybody.
  123. for login in ["{}-vpn{}".format(username, k) for k in range(1, 101)]:
  124. if login not in logins:
  125. self.login = login
  126. break
  127. # We may have failed.
  128. if not self.login:
  129. ValidationError("Impossible de générer un login VPN")
  130. # Hash password if needed
  131. self.password = utils.ldap_hash(self.password)
  132. # If saving for the first time and IP endpoints are not specified,
  133. # generate them automatically.
  134. if self.pk is None:
  135. self.generate_endpoints()
  136. self.check_endpoints()
  137. def __unicode__(self):
  138. return 'VPN ' + self.login
  139. class Meta:
  140. verbose_name = 'VPN'
  141. verbose_name_plural = 'VPN'
  142. class LdapVPNConfig(ldapdb.models.Model):
  143. base_dn = settings.VPN_CONF_BASE_DN
  144. object_classes = [b'person', b'organizationalPerson', b'inetOrgPerson',
  145. b'top', b'radiusprofile']
  146. login = CharField(db_column=b'cn', primary_key=True, max_length=255)
  147. sn = CharField(db_column=b'sn', max_length=255)
  148. password = CharField(db_column=b'userPassword', max_length=255)
  149. active = CharField(db_column=b'dialupAccess', max_length=3)
  150. ipv4_endpoint = CharField(db_column=b'radiusFramedIPAddress', max_length=16)
  151. ipv6_endpoint = CharField(db_column=b'postalAddress', max_length=40)
  152. ranges_v4 = ListField(db_column=b'radiusFramedRoute')
  153. ranges_v6 = ListField(db_column=b'registeredAddress')
  154. def __unicode__(self):
  155. return self.login
  156. class Meta:
  157. managed = False # Indique à South de ne pas gérer le model LdapUser