|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
#
|
|
|
|
|
|
|
|
import os
|
|
|
|
import json
|
|
|
|
import jms_storage
|
|
|
|
|
|
|
|
from smtplib import SMTPSenderRefused
|
|
|
|
from rest_framework import generics
|
|
|
|
from rest_framework.views import Response, APIView
|
|
|
|
from django.conf import settings
|
|
|
|
from django.core.mail import send_mail
|
|
|
|
from django.utils.translation import ugettext_lazy as _
|
|
|
|
|
|
|
|
from .models import Setting
|
|
|
|
from .utils import (
|
|
|
|
LDAPServerUtil, LDAPCacheUtil, LDAPImportUtil, LDAPSyncUtil,
|
|
|
|
LDAP_USE_CACHE_FLAGS
|
|
|
|
|
|
|
|
)
|
|
|
|
from .tasks import sync_ldap_user_task
|
|
|
|
from common.permissions import IsOrgAdmin, IsSuperUser
|
|
|
|
from common.utils import get_logger
|
|
|
|
from .serializers import MailTestSerializer, LDAPTestSerializer, LDAPUserSerializer
|
|
|
|
from users.models import User
|
|
|
|
|
|
|
|
|
|
|
|
logger = get_logger(__file__)
|
|
|
|
|
|
|
|
|
|
|
|
class MailTestingAPI(APIView):
|
|
|
|
permission_classes = (IsOrgAdmin,)
|
|
|
|
serializer_class = MailTestSerializer
|
|
|
|
success_message = _("Test mail sent to {}, please check")
|
|
|
|
|
|
|
|
def post(self, request):
|
|
|
|
serializer = self.serializer_class(data=request.data)
|
|
|
|
if serializer.is_valid():
|
|
|
|
email_from = serializer.validated_data["EMAIL_FROM"]
|
|
|
|
email_recipient = serializer.validated_data["EMAIL_RECIPIENT"]
|
|
|
|
email_host_user = serializer.validated_data["EMAIL_HOST_USER"]
|
|
|
|
for k, v in serializer.validated_data.items():
|
|
|
|
if k.startswith('EMAIL'):
|
|
|
|
setattr(settings, k, v)
|
|
|
|
try:
|
|
|
|
subject = "Test"
|
|
|
|
message = "Test smtp setting"
|
|
|
|
email_from = email_from or email_host_user
|
|
|
|
email_recipient = email_recipient or email_from
|
|
|
|
send_mail(subject, message, email_from, [email_recipient])
|
|
|
|
except SMTPSenderRefused as e:
|
|
|
|
resp = e.smtp_error
|
|
|
|
if isinstance(resp, bytes):
|
|
|
|
for coding in ('gbk', 'utf8'):
|
|
|
|
try:
|
|
|
|
resp = resp.decode(coding)
|
|
|
|
except UnicodeDecodeError:
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
break
|
|
|
|
return Response({"error": str(resp)}, status=401)
|
|
|
|
except Exception as e:
|
|
|
|
print(e)
|
|
|
|
return Response({"error": str(e)}, status=401)
|
|
|
|
return Response({"msg": self.success_message.format(email_recipient)})
|
|
|
|
else:
|
|
|
|
return Response({"error": str(serializer.errors)}, status=401)
|
|
|
|
|
|
|
|
|
|
|
|
class LDAPTestingAPI(APIView):
|
|
|
|
permission_classes = (IsOrgAdmin,)
|
|
|
|
serializer_class = LDAPTestSerializer
|
|
|
|
success_message = _("Test ldap success")
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def get_ldap_config(serializer):
|
|
|
|
server_uri = serializer.validated_data["AUTH_LDAP_SERVER_URI"]
|
|
|
|
bind_dn = serializer.validated_data["AUTH_LDAP_BIND_DN"]
|
|
|
|
password = serializer.validated_data["AUTH_LDAP_BIND_PASSWORD"]
|
|
|
|
use_ssl = serializer.validated_data.get("AUTH_LDAP_START_TLS", False)
|
|
|
|
search_ougroup = serializer.validated_data["AUTH_LDAP_SEARCH_OU"]
|
|
|
|
search_filter = serializer.validated_data["AUTH_LDAP_SEARCH_FILTER"]
|
|
|
|
attr_map = serializer.validated_data["AUTH_LDAP_USER_ATTR_MAP"]
|
|
|
|
config = {
|
|
|
|
'server_uri': server_uri,
|
|
|
|
'bind_dn': bind_dn,
|
|
|
|
'password': password,
|
|
|
|
'use_ssl': use_ssl,
|
|
|
|
'search_ougroup': search_ougroup,
|
|
|
|
'search_filter': search_filter,
|
|
|
|
'attr_map': json.loads(attr_map),
|
|
|
|
}
|
|
|
|
return config
|
|
|
|
|
|
|
|
def post(self, request):
|
|
|
|
serializer = self.serializer_class(data=request.data)
|
|
|
|
if not serializer.is_valid():
|
|
|
|
return Response({"error": str(serializer.errors)}, status=401)
|
|
|
|
|
|
|
|
attr_map = serializer.validated_data["AUTH_LDAP_USER_ATTR_MAP"]
|
|
|
|
try:
|
|
|
|
json.loads(attr_map)
|
|
|
|
except json.JSONDecodeError:
|
|
|
|
return Response({"error": "AUTH_LDAP_USER_ATTR_MAP not valid"}, status=401)
|
|
|
|
|
|
|
|
config = self.get_ldap_config(serializer)
|
|
|
|
util = LDAPServerUtil(config=config)
|
|
|
|
try:
|
|
|
|
users = util.search()
|
|
|
|
except Exception as e:
|
|
|
|
return Response({"error": str(e)}, status=401)
|
|
|
|
|
|
|
|
return Response({"msg": _("Match {} s users").format(len(users))})
|
|
|
|
|
|
|
|
|
|
|
|
class LDAPUserListApi(generics.ListAPIView):
|
|
|
|
permission_classes = (IsOrgAdmin,)
|
|
|
|
serializer_class = LDAPUserSerializer
|
|
|
|
|
|
|
|
def get_queryset_from_cache(self):
|
|
|
|
search_value = self.request.query_params.get('search')
|
|
|
|
users = LDAPCacheUtil().search(search_value=search_value)
|
|
|
|
return users
|
|
|
|
|
|
|
|
def get_queryset_from_server(self):
|
|
|
|
search_value = self.request.query_params.get('search')
|
|
|
|
users = LDAPServerUtil().search(search_value=search_value)
|
|
|
|
return users
|
|
|
|
|
|
|
|
def get_queryset(self):
|
|
|
|
if hasattr(self, 'swagger_fake_view'):
|
|
|
|
return []
|
|
|
|
cache_police = self.request.query_params.get('cache_police', True)
|
|
|
|
if cache_police in LDAP_USE_CACHE_FLAGS:
|
|
|
|
users = self.get_queryset_from_cache()
|
|
|
|
else:
|
|
|
|
users = self.get_queryset_from_server()
|
|
|
|
return users
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def processing_queryset(queryset):
|
|
|
|
db_username_list = User.objects.all().values_list('username', flat=True)
|
|
|
|
for q in queryset:
|
|
|
|
q['id'] = q['username']
|
|
|
|
q['existing'] = q['username'] in db_username_list
|
|
|
|
return queryset
|
|
|
|
|
|
|
|
def sort_queryset(self, queryset):
|
|
|
|
order_by = self.request.query_params.get('order')
|
|
|
|
if not order_by:
|
|
|
|
order_by = 'existing'
|
|
|
|
if order_by.startswith('-'):
|
|
|
|
order_by = order_by.lstrip('-')
|
|
|
|
reverse = True
|
|
|
|
else:
|
|
|
|
reverse = False
|
|
|
|
queryset = sorted(queryset, key=lambda x: x[order_by], reverse=reverse)
|
|
|
|
return queryset
|
|
|
|
|
|
|
|
def filter_queryset(self, queryset):
|
|
|
|
if queryset is None:
|
|
|
|
return queryset
|
|
|
|
queryset = self.processing_queryset(queryset)
|
|
|
|
queryset = self.sort_queryset(queryset)
|
|
|
|
return queryset
|
|
|
|
|
|
|
|
def list(self, request, *args, **kwargs):
|
|
|
|
cache_police = self.request.query_params.get('cache_police', True)
|
|
|
|
# 不是用缓存
|
|
|
|
if cache_police not in LDAP_USE_CACHE_FLAGS:
|
|
|
|
return super().list(request, *args, **kwargs)
|
|
|
|
|
|
|
|
try:
|
|
|
|
queryset = self.get_queryset()
|
|
|
|
except Exception as e:
|
|
|
|
data = {'error': str(e)}
|
|
|
|
return Response(data=data, status=400)
|
|
|
|
|
|
|
|
# 缓存有数据
|
|
|
|
if queryset is not None:
|
|
|
|
return super().list(request, *args, **kwargs)
|
|
|
|
|
|
|
|
sync_util = LDAPSyncUtil()
|
|
|
|
# 还没有同步任务
|
|
|
|
if sync_util.task_no_start:
|
|
|
|
task = sync_ldap_user_task.delay()
|
|
|
|
data = {'msg': 'Cache no data, sync task {} started.'.format(task.id)}
|
|
|
|
return Response(data=data, status=409)
|
|
|
|
# 同步任务正在执行
|
|
|
|
if sync_util.task_is_running:
|
|
|
|
data = {'msg': 'synchronization is running.'}
|
|
|
|
return Response(data=data, status=409)
|
|
|
|
# 同步任务执行结束
|
|
|
|
if sync_util.task_is_over:
|
|
|
|
msg = sync_util.get_task_error_msg()
|
|
|
|
data = {'error': 'Synchronization task report error: {}'.format(msg)}
|
|
|
|
return Response(data=data, status=400)
|
|
|
|
|
|
|
|
return super().list(request, *args, **kwargs)
|
|
|
|
|
|
|
|
|
|
|
|
class LDAPUserImportAPI(APIView):
|
|
|
|
permission_classes = (IsOrgAdmin,)
|
|
|
|
|
|
|
|
def get_ldap_users(self):
|
|
|
|
username_list = self.request.data.get('username_list', [])
|
|
|
|
cache_police = self.request.query_params.get('cache_police', True)
|
|
|
|
if cache_police in LDAP_USE_CACHE_FLAGS:
|
|
|
|
users = LDAPCacheUtil().search(search_users=username_list)
|
|
|
|
else:
|
|
|
|
users = LDAPServerUtil().search(search_users=username_list)
|
|
|
|
return users
|
|
|
|
|
|
|
|
def post(self, request):
|
|
|
|
try:
|
|
|
|
users = self.get_ldap_users()
|
|
|
|
except Exception as e:
|
|
|
|
return Response({'error': str(e)}, status=401)
|
|
|
|
|
|
|
|
if users is None:
|
|
|
|
return Response({'msg': 'Get ldap users is None'}, status=401)
|
|
|
|
|
|
|
|
errors = LDAPImportUtil().perform_import(users)
|
|
|
|
if errors:
|
|
|
|
return Response({'errors': errors}, status=401)
|
|
|
|
|
|
|
|
count = users if users is None else len(users)
|
|
|
|
return Response({'msg': 'Imported {} users successfully'.format(count)})
|
|
|
|
|
|
|
|
|
|
|
|
class LDAPCacheRefreshAPI(generics.RetrieveAPIView):
|
|
|
|
|
|
|
|
def retrieve(self, request, *args, **kwargs):
|
|
|
|
try:
|
|
|
|
LDAPSyncUtil().clear_cache()
|
|
|
|
except Exception as e:
|
|
|
|
logger.error(str(e))
|
|
|
|
return Response(data={'msg': str(e)}, status=400)
|
|
|
|
return Response(data={'msg': 'success'})
|
|
|
|
|
|
|
|
|
|
|
|
class ReplayStorageCreateAPI(APIView):
|
|
|
|
permission_classes = (IsSuperUser,)
|
|
|
|
|
|
|
|
def post(self, request):
|
|
|
|
storage_data = request.data
|
|
|
|
|
|
|
|
if storage_data.get('TYPE') == 'ceph':
|
|
|
|
port = storage_data.get('PORT')
|
|
|
|
if port.isdigit():
|
|
|
|
storage_data['PORT'] = int(storage_data.get('PORT'))
|
|
|
|
|
|
|
|
storage_name = storage_data.pop('NAME')
|
|
|
|
data = {storage_name: storage_data}
|
|
|
|
|
|
|
|
if not self.is_valid(storage_data):
|
|
|
|
return Response({
|
|
|
|
"error": _("Error: Account invalid (Please make sure the "
|
|
|
|
"information such as Access key or Secret key is correct)")},
|
|
|
|
status=401
|
|
|
|
)
|
|
|
|
|
|
|
|
Setting.save_storage('TERMINAL_REPLAY_STORAGE', data)
|
|
|
|
return Response({"msg": _('Create succeed')}, status=200)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def is_valid(storage_data):
|
|
|
|
if storage_data.get('TYPE') == 'server':
|
|
|
|
return True
|
|
|
|
storage = jms_storage.get_object_storage(storage_data)
|
|
|
|
target = 'tests.py'
|
|
|
|
src = os.path.join(settings.BASE_DIR, 'common', target)
|
|
|
|
return storage.is_valid(src, target)
|
|
|
|
|
|
|
|
|
|
|
|
class ReplayStorageDeleteAPI(APIView):
|
|
|
|
permission_classes = (IsSuperUser,)
|
|
|
|
|
|
|
|
def post(self, request):
|
|
|
|
storage_name = str(request.data.get('name'))
|
|
|
|
Setting.delete_storage('TERMINAL_REPLAY_STORAGE', storage_name)
|
|
|
|
return Response({"msg": _('Delete succeed')}, status=200)
|
|
|
|
|
|
|
|
|
|
|
|
class CommandStorageCreateAPI(APIView):
|
|
|
|
permission_classes = (IsSuperUser,)
|
|
|
|
|
|
|
|
def post(self, request):
|
|
|
|
storage_data = request.data
|
|
|
|
storage_name = storage_data.pop('NAME')
|
|
|
|
data = {storage_name: storage_data}
|
|
|
|
if not self.is_valid(storage_data):
|
|
|
|
return Response(
|
|
|
|
{"error": _("Error: Account invalid (Please make sure the "
|
|
|
|
"information such as Access key or Secret key is correct)")},
|
|
|
|
status=401
|
|
|
|
)
|
|
|
|
|
|
|
|
Setting.save_storage('TERMINAL_COMMAND_STORAGE', data)
|
|
|
|
return Response({"msg": _('Create succeed')}, status=200)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def is_valid(storage_data):
|
|
|
|
if storage_data.get('TYPE') == 'server':
|
|
|
|
return True
|
|
|
|
try:
|
|
|
|
storage = jms_storage.get_log_storage(storage_data)
|
|
|
|
except Exception:
|
|
|
|
return False
|
|
|
|
|
|
|
|
return storage.ping()
|
|
|
|
|
|
|
|
|
|
|
|
class CommandStorageDeleteAPI(APIView):
|
|
|
|
permission_classes = (IsSuperUser,)
|
|
|
|
|
|
|
|
def post(self, request):
|
|
|
|
storage_name = str(request.data.get('name'))
|
|
|
|
Setting.delete_storage('TERMINAL_COMMAND_STORAGE', storage_name)
|
|
|
|
return Response({"msg": _('Delete succeed')}, status=200)
|