154 lines
4.6 KiB
Python
154 lines
4.6 KiB
Python
import re
|
|
|
|
from django.core.exceptions import ValidationError
|
|
from django.utils.translation import ugettext_lazy as _
|
|
|
|
from orchestra.plugins import Plugin
|
|
from orchestra.utils.functional import cached
|
|
from orchestra.utils.python import import_class
|
|
|
|
from . import settings
|
|
|
|
|
|
# TODO multiple and unique validation support in the formset
|
|
class SiteDirective(Plugin):
|
|
HTTPD = 'HTTPD'
|
|
SEC = 'ModSecurity'
|
|
SSL = 'SSL'
|
|
|
|
help_text = ""
|
|
unique = True
|
|
|
|
@classmethod
|
|
@cached
|
|
def get_plugins(cls):
|
|
plugins = []
|
|
for cls in settings.WEBSITES_ENABLED_DIRECTIVES:
|
|
plugins.append(import_class(cls))
|
|
return plugins
|
|
|
|
@classmethod
|
|
@cached
|
|
def get_option_groups(cls):
|
|
groups = {}
|
|
for opt in cls.get_plugins():
|
|
try:
|
|
groups[opt.group].append(opt)
|
|
except KeyError:
|
|
groups[opt.group] = [opt]
|
|
return groups
|
|
|
|
@classmethod
|
|
def get_plugin_choices(cls):
|
|
""" Generates grouped choices ready to use in Field.choices """
|
|
# generators can not be @cached
|
|
yield (None, '-------')
|
|
options = cls.get_option_groups()
|
|
for option in options.pop(None, ()):
|
|
yield (option.name, option.verbose_name)
|
|
for group, options in options.iteritems():
|
|
yield (group, [(op.name, op.verbose_name) for op in options])
|
|
|
|
def validate(self, website):
|
|
if self.regex and not re.match(self.regex, website.value):
|
|
raise ValidationError({
|
|
'value': ValidationError(_("'%(value)s' does not match %(regex)s."),
|
|
params={
|
|
'value': website.value,
|
|
'regex': self.regex
|
|
}),
|
|
})
|
|
|
|
|
|
class Redirect(SiteDirective):
|
|
name = 'redirect'
|
|
verbose_name = _("Redirection")
|
|
help_text = _("<tt><website path> <destination URL></tt>")
|
|
regex = r'^[^ ]+\s[^ ]+$'
|
|
group = SiteDirective.HTTPD
|
|
|
|
|
|
class Proxy(SiteDirective):
|
|
name = 'proxy'
|
|
verbose_name = _("Proxy")
|
|
help_text = _("<tt><website path> <target URL></tt>")
|
|
regex = r'^[^ ]+\shttp[^ ]+(timeout=[0-9]{1,3}|retry=[0-9]|\s)*$'
|
|
group = SiteDirective.HTTPD
|
|
|
|
|
|
class UserGroup(SiteDirective):
|
|
name = 'user_group'
|
|
verbose_name = _("SuexecUserGroup")
|
|
help_text = _("<tt>user [group]</tt>, username and optional groupname.")
|
|
regex = r'^[\w/_]+(\s[\w/_]+)*$'
|
|
group = SiteDirective.HTTPD
|
|
|
|
def validate(self, directive):
|
|
super(UserGroupDirective, self).validate(directive)
|
|
options = directive.split()
|
|
syetmusers = [options[0]]
|
|
if len(options) > 1:
|
|
systemusers.append(options[1])
|
|
# TODO not sure about this dependency maybe make it part of pangea only
|
|
from orchestra.apps.users.models import SystemUser
|
|
errors = []
|
|
for user in systemusers:
|
|
if not SystemUser.objects.filter(username=user).exists():
|
|
erros.append("")
|
|
if errors:
|
|
raise ValidationError({
|
|
'value': errors
|
|
})
|
|
|
|
|
|
class ErrorDocument(SiteDirective):
|
|
name = 'error_document'
|
|
verbose_name = _("ErrorDocumentRoot")
|
|
help_text = _("<error code> <URL/path/message><br>"
|
|
"<tt> 500 http://foo.example.com/cgi-bin/tester</tt><br>"
|
|
"<tt> 404 /cgi-bin/bad_urls.pl</tt><br>"
|
|
"<tt> 401 /subscription_info.html</tt><br>"
|
|
"<tt> 403 \"Sorry can't allow you access today\"</tt>")
|
|
regex = r'[45]0[0-9]\s.*'
|
|
group = SiteDirective.HTTPD
|
|
|
|
|
|
class SSLCA(SiteDirective):
|
|
name = 'ssl_ca'
|
|
verbose_name = _("SSL CA")
|
|
help_text = _("Filesystem path of the CA certificate file.")
|
|
regex = r'^[^ ]+$'
|
|
group = SiteDirective.SSL
|
|
|
|
|
|
class SSLCert(SiteDirective):
|
|
name = 'ssl_cert'
|
|
verbose_name = _("SSL cert")
|
|
help_text = _("Filesystem path of the certificate file.")
|
|
regex = r'^[^ ]+$'
|
|
group = SiteDirective.SSL
|
|
|
|
|
|
class SSLKey(SiteDirective):
|
|
name = 'ssl_key'
|
|
verbose_name = _("SSL key")
|
|
help_text = _("Filesystem path of the key file.")
|
|
regex = r'^[^ ]+$'
|
|
group = SiteDirective.SSL
|
|
|
|
|
|
class SecRuleRemove(SiteDirective):
|
|
name = 'sec_rule_remove'
|
|
verbose_name = _("SecRuleRemoveById")
|
|
help_text = _("Space separated ModSecurity rule IDs.")
|
|
regex = r'^[0-9\s]+$'
|
|
group = SiteDirective.SEC
|
|
|
|
|
|
class SecEngine(SiteDirective):
|
|
name = 'sec_engine'
|
|
verbose_name = _("Modsecurity engine")
|
|
help_text = _("URL location for disabling modsecurity engine.")
|
|
regex = r'^/[^ ]*$'
|
|
group = SiteDirective.SEC
|