jumpserver/jperm/views.py

600 lines
21 KiB
Python
Raw Normal View History

# -*- coding: utf-8 -*-
from django.db.models import Q
2015-11-25 08:01:07 +00:00
from paramiko import SSHException
from jperm.perm_api import *
from juser.user_api import gen_ssh_key
from juser.models import User, UserGroup
from jasset.models import Asset, AssetGroup
from jperm.models import PermRole, PermRule, PermSudo, PermPush
from jumpserver.models import Setting
2015-11-05 14:47:45 +00:00
from jperm.utils import updates_dict, gen_keys, get_rand_pass, get_add_sudo_script
from jperm.ansible_api import Tasks
from jperm.perm_api import get_role_info, get_role_push_host
2015-11-05 14:47:45 +00:00
from jumpserver.api import my_render, get_object, CRYPTOR
@require_role('admin')
def perm_rule_list(request):
"""
2015-11-16 05:49:39 +00:00
list rule page
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "授权规则", "规则管理", "查看规则"
# 获取所有规则
rules_list = PermRule.objects.all()
2015-11-05 14:47:45 +00:00
# TODO: 搜索和分页
keyword = request.GET.get('search', '')
if keyword:
rules_list = rules_list.filter(Q(name=keyword))
rules_list, p, rules, page_range, current_page, show_first, show_end = pages(rules_list, request)
2015-11-15 15:30:37 +00:00
return my_render('jperm/perm_rule_list.html', locals(), request)
2015-11-05 14:47:45 +00:00
@require_role('admin')
def perm_rule_detail(request):
2015-11-05 14:47:45 +00:00
"""
2015-11-16 05:49:39 +00:00
rule detail page
2015-11-05 14:47:45 +00:00
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "授权规则", "规则管理", "规则详情"
2015-11-05 14:47:45 +00:00
2015-11-13 09:17:22 +00:00
# 根据rule_id 取得rule对象
rule_id = request.GET.get("id")
rule_obj = PermRule.objects.get(id=rule_id)
user_obj = rule_obj.user.all()
asset_obj = rule_obj.asset.all()
roles_name = [role.name for role in rule_obj.role.all()]
2015-11-16 05:49:39 +00:00
# 渲染数据
roles_name = ','.join(roles_name)
rule = rule_obj
users = user_obj
assets = asset_obj
2015-11-05 14:47:45 +00:00
2015-11-15 15:30:37 +00:00
return my_render('jperm/perm_rule_detail.html', locals(), request)
2015-11-05 14:47:45 +00:00
def perm_rule_add(request):
"""
2015-11-16 05:49:39 +00:00
add rule page
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "授权规则", "规则管理", "添加规则"
2015-11-29 03:33:19 +00:00
# 渲染数据, 获取所有 用户,用户组,资产,资产组,用户角色, 用于添加授权规则
users = User.objects.all()
user_groups = UserGroup.objects.all()
assets = Asset.objects.all()
asset_groups = AssetGroup.objects.all()
roles = PermRole.objects.all()
2015-11-29 03:33:19 +00:00
if request.method == 'POST':
# 获取用户选择的 用户,用户组,资产,资产组,用户角色
users_select = request.POST.getlist('user', [])
user_groups_select = request.POST.getlist('usergroup', [])
assets_select = request.POST.getlist('asset', [])
asset_groups_select = request.POST.getlist('assetgroup', [])
roles_select = request.POST.getlist('role', [])
rule_name = request.POST.get('rulename')
2015-11-17 06:10:46 +00:00
rule_comment = request.POST.get('rule_comment')
2015-11-29 03:33:19 +00:00
try:
rule = get_object(PermRule, name=rule_name)
if rule:
raise ServerError(u'授权规则 %s 已存在' % rule_name)
# 获取需要授权的主机列表
assets_obj = [Asset.objects.get(id=asset_id) for asset_id in assets_select]
asset_groups_obj = [AssetGroup.objects.get(id=group_id) for group_id in asset_groups_select]
# group_assets_obj = [asset for asset in [group.asset_set.all() for group in asset_groups_obj]]
# calc_assets = set(group_assets_obj) | set(assets_obj)
# 获取需要授权的用户列表
users_obj = [User.objects.get(id=user_id) for user_id in users_select]
user_groups_obj = [UserGroup.objects.get(id=group_id) for group_id in user_groups_select]
# group_users_obj = [user for user in [group.user_set.all() for group in user_groups_obj]]
# calc_users = set(group_users_obj) | set(users_obj)
# 获取授予的角色列表
roles_obj = [PermRole.objects.get(id=role_id) for role_id in roles_select]
2015-11-29 08:38:40 +00:00
for role in roles_obj:
push_assets_or_group = get_role_push_host(role=role, raw=True)
push_assets = push_assets_or_group.get('asset')
push_asset_groups = push_assets_or_group.get('asset_group')
no_push_assets = set(assets_obj) - set(push_assets)
no_push_asset_groups = set(asset_groups_obj) - set(push_asset_groups)
if no_push_assets:
raise ServerError(u'没有推送角色 %s 的主机 %s'
% (role.name, ','.join([asset.hostname for asset in no_push_assets])))
elif no_push_asset_groups:
raise ServerError(u'没有推送角色 %s 的主机组 %s'
% (role.name, ','.join(asset_group.name for asset_group in no_push_asset_groups)))
2015-11-29 03:33:19 +00:00
# 仅授权成功的,写回数据库(授权规则,用户,用户组,资产,资产组,用户角色)
rule = PermRule(name=rule_name, comment=rule_comment)
rule.save()
rule.user = users_obj
rule.user_group = user_groups_obj
rule.asset = assets_obj
rule.asset_group = asset_groups_obj
rule.role = roles_obj
rule.save()
msg = u"添加授权规则:%s" % rule.name
return HttpResponseRedirect('/jperm/rule/')
except ServerError, e:
error = e
return my_render('jperm/perm_rule_add.html', locals(), request)
2015-11-13 09:17:22 +00:00
@require_role('admin')
2015-11-13 09:17:22 +00:00
def perm_rule_edit(request):
"""
2015-11-16 05:49:39 +00:00
edit rule page
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "授权规则", "规则管理", "添加规则"
2015-11-05 14:47:45 +00:00
2015-11-13 09:17:22 +00:00
# 根据rule_id 取得rule对象
rule_id = request.GET.get("id")
2015-11-16 05:49:39 +00:00
rule = PermRule.objects.get(id=rule_id)
2015-11-05 14:47:45 +00:00
2015-11-13 09:17:22 +00:00
if request.method == 'GET' and rule_id:
# 渲染数据, 获取所选的rule对象
2015-11-17 06:10:46 +00:00
rule_comment = rule.comment
users_select = rule.user.all()
user_groups_select = rule.user_group.all()
assets_select = rule.asset.all()
asset_groups_select = rule.asset_group.all()
roles_select = rule.role.all()
users = User.objects.all()
user_groups = UserGroup.objects.all()
assets = Asset.objects.all()
asset_groups = AssetGroup.objects.all()
roles = PermRole.objects.all()
2015-11-15 15:30:37 +00:00
return my_render('jperm/perm_rule_edit.html', locals(), request)
2015-11-13 09:17:22 +00:00
elif request.method == 'POST' and rule_id:
2015-11-17 06:10:46 +00:00
# 获取用户选择的 用户,用户组,资产,资产组,用户角色
rule_name = request.POST.get('rule_name')
rule_comment = request.POST.get("rule_comment")
users_select = request.POST.getlist('user', [])
user_groups_select = request.POST.getlist('usergroup', [])
assets_select = request.POST.getlist('asset', [])
asset_groups_select = request.POST.getlist('assetgroup', [])
roles_select = request.POST.getlist('role', [])
2015-11-29 03:33:19 +00:00
assets_obj = [Asset.objects.get(id=asset_id) for asset_id in assets_select]
asset_groups_obj = [AssetGroup.objects.get(id=group_id) for group_id in asset_groups_select]
# group_assets_obj = [asset for asset in [group.asset_set.all() for group in asset_groups_obj]]
# calc_assets = set(group_assets_obj) | set(assets_obj)
2015-11-17 06:10:46 +00:00
# 获取需要授权的用户列表
2015-11-29 03:33:19 +00:00
users_obj = [User.objects.get(id=user_id) for user_id in users_select]
user_groups_obj = [UserGroup.objects.get(id=group_id) for group_id in user_groups_select]
# group_users_obj = [user for user in [group.user_set.all() for group in user_groups_obj]]
# calc_users = set(group_users_obj) | set(users_obj)
2015-11-17 06:10:46 +00:00
# 获取授予的角色列表
2015-11-29 03:33:19 +00:00
roles_obj = [PermRole.objects.get(id=role_id) for role_id in roles_select]
2015-11-17 06:10:46 +00:00
# 仅授权成功的,写回数据库(授权规则,用户,用户组,资产,资产组,用户角色)
rule.user = users_obj
2015-11-29 03:33:19 +00:00
rule.user_group = user_groups_obj
2015-11-17 06:10:46 +00:00
rule.asset = assets_obj
rule.asset_group = asset_groups_obj
rule.role = roles_obj
rule.name = rule_name
rule.comment = rule.comment
rule.save()
msg = u"更新授权规则:%s" % rule.name
2015-11-29 03:33:19 +00:00
return HttpResponseRedirect('/jperm/rule/')
2015-11-13 09:17:22 +00:00
@require_role('admin')
def perm_rule_delete(request):
"""
use to delete rule
:param request:
:return:
"""
if request.method == 'POST':
# 根据rule_id 取得rule对象
rule_id = request.POST.get("id")
rule_obj = PermRule.objects.get(id=rule_id)
print rule_id, rule_obj
print rule_obj.name
rule_obj.delete()
return HttpResponse(u"删除授权规则:%s" % rule_obj.name)
else:
return HttpResponse(u"不支持该操作")
2015-11-05 14:47:45 +00:00
@require_role('admin')
def perm_role_list(request):
"""
2015-11-16 05:49:39 +00:00
list role page
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "系统角色", "角色管理", "查看角色"
# 获取所有系统角色
roles_list = PermRole.objects.all()
# TODO: 搜索和分页
keyword = request.GET.get('search', '')
if keyword:
roles_list = roles_list.filter(Q(name=keyword))
roles_list, p, roles, page_range, current_page, show_first, show_end = pages(roles_list, request)
2015-11-15 15:30:37 +00:00
return my_render('jperm/perm_role_list.html', locals(), request)
@require_role('admin')
def perm_role_add(request):
"""
2015-11-16 05:49:39 +00:00
add role page
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "系统角色", "角色管理", "添加角色"
2015-11-29 03:33:19 +00:00
sudos = PermSudo.objects.all()
2015-11-29 03:33:19 +00:00
if request.method == "POST":
# 获取参数: name, comment
name = request.POST.get("role_name", "")
comment = request.POST.get("role_comment", "")
password = request.POST.get("role_password", "")
key_content = request.POST.get("role_key", "")
sudo_ids = request.POST.getlist('sudo_name')
2015-11-25 06:59:57 +00:00
2015-11-29 03:33:19 +00:00
try:
if get_object(PermRole, name=name):
raise ServerError('已经存在该用户 %s' % name)
if password:
encrypt_pass = CRYPTOR.encrypt(password)
else:
encrypt_pass = CRYPTOR.encrypt(CRYPTOR.gen_rand_pass(20))
# 生成随机密码,生成秘钥对
sudos_obj = [get_object(PermSudo, id=sudo_id) for sudo_id in sudo_ids]
if key_content:
key_path = gen_keys(key=key_content)
else:
key_path = gen_keys()
logger.debug('generate role key: %s' % key_path)
role = PermRole(name=name, comment=comment, password=encrypt_pass, key_path=key_path)
role.save()
role.sudo = sudos_obj
msg = u"添加角色: %s" % name
return HttpResponseRedirect('/jperm/role/')
except ServerError, e:
error = e
2015-11-25 06:59:57 +00:00
return my_render('jperm/perm_role_add.html', locals(), request)
2015-11-16 05:49:39 +00:00
@require_role('admin')
def perm_role_delete(request):
"""
2015-11-16 05:49:39 +00:00
delete role page
"""
if request.method == "POST":
# 获取参数删除的role对象
role_id = request.POST.get("id")
role = PermRole.objects.get(id=role_id)
role_key = role.key_path
# 删除存储的秘钥,以及目录
key_files = os.listdir(role_key)
for key_file in key_files:
os.remove(os.path.join(role_key, key_file))
os.rmdir(role_key)
# 数据库里删除记录
role.delete()
return HttpResponse(u"删除角色: %s" % role.name)
else:
return HttpResponse(u"不支持该操作")
@require_role('admin')
def perm_role_detail(request):
"""
2015-11-16 05:49:39 +00:00
the role detail page
the role_info data like:
{'asset_groups': [],
'assets': [<Asset: 192.168.10.148>],
'rules': [<PermRule: PermRule object>],
2015-11-16 05:49:39 +00:00
'': [],
'': [<User: user1>]}
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "系统角色", "角色管理", "角色详情"
if request.method == "GET":
role_id = request.GET.get("id")
role_info = get_role_info(role_id)
2015-11-16 05:49:39 +00:00
# 渲染数据
2015-11-17 06:10:46 +00:00
rules = role_info.get("rules")
assets = role_info.get("assets")
asset_groups = role_info.get("asset_groups")
users = role_info.get("users")
user_groups = role_info.get("user_groups")
push_info = get_role_push_host(PermRole.objects.get(id=role_id))
2015-11-17 06:10:46 +00:00
2015-11-15 15:30:37 +00:00
return my_render('jperm/perm_role_detail.html', locals(), request)
2015-11-14 13:52:09 +00:00
@require_role('admin')
def perm_role_edit(request):
"""
2015-11-16 05:49:39 +00:00
edit role page
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "系统角色", "角色管理", "角色编辑"
2015-11-17 06:10:46 +00:00
# 渲染数据
role_id = request.GET.get("id")
role = PermRole.objects.get(id=role_id)
role_pass = CRYPTOR.decrypt(role.password)
2015-11-29 03:33:19 +00:00
sudo_all = PermSudo.objects.all()
role_sudos = role.sudo.all()
2015-11-28 14:54:59 +00:00
sudo_all = PermSudo.objects.all()
if request.method == "GET":
2015-11-15 15:30:37 +00:00
return my_render('jperm/perm_role_edit.html', locals(), request)
if request.method == "POST":
2015-11-17 06:10:46 +00:00
# 获取 POST 数据
role_name = request.POST.get("role_name")
role_password = request.POST.get("role_password")
role_comment = request.POST.get("role_comment")
role_sudo_names = request.POST.getlist("sudo_name")
2015-11-29 03:33:19 +00:00
role_sudos = [PermSudo.objects.get(id=sudo_id) for sudo_id in role_sudo_names]
2015-11-25 06:59:57 +00:00
key_content = request.POST.get("role_key", "")
2015-11-28 14:54:59 +00:00
2015-11-25 06:59:57 +00:00
try:
if not role:
raise ServerError('角色用户不能存在')
if role_password:
encrypt_pass = CRYPTOR.encrypt(role_password)
role.password = encrypt_pass
# 生成随机密码,生成秘钥对
if key_content:
2015-11-25 08:01:07 +00:00
try:
key_path = gen_keys(key=key_content, key_path_dir=role.key_path)
except SSHException:
raise ServerError('输入的密钥不合法')
2015-11-25 06:59:57 +00:00
logger.debug('Recreate role key: %s' % role.key_path)
# 写入数据库
role.name = role_name
role.comment = role_comment
2015-11-28 13:02:23 +00:00
role.sudo = role_sudos
2015-11-25 06:59:57 +00:00
role.save()
msg = u"更新系统角色: %s" % role.name
return HttpResponseRedirect('/jperm/role/')
except ServerError, e:
error = e
return my_render('jperm/perm_role_edit.html', locals(), request)
2015-11-17 06:10:46 +00:00
2015-11-14 13:52:09 +00:00
@require_role('admin')
def perm_role_push(request):
"""
2015-11-16 05:49:39 +00:00
the role push page
2015-11-14 13:52:09 +00:00
"""
2015-11-16 05:49:39 +00:00
# 渲染数据
header_title, path1, path2 = "系统角色", "角色管理", "角色推送"
2015-11-14 13:52:09 +00:00
2015-11-29 07:18:05 +00:00
roles = PermRole.objects.all()
assets = Asset.objects.all()
asset_groups = AssetGroup.objects.all()
2015-11-14 13:52:09 +00:00
if request.method == "POST":
2015-11-14 14:54:29 +00:00
# 获取推荐角色的名称列表
2015-11-29 07:18:05 +00:00
role_ids = request.POST.getlist("roles")
2015-11-14 14:54:29 +00:00
# 计算出需要推送的资产列表
2015-11-29 07:18:05 +00:00
asset_ids = request.POST.getlist("assets")
asset_group_ids = request.POST.getlist("asset_groups")
assets_obj = [Asset.objects.get(id=asset_id) for asset_id in asset_ids]
asset_groups_obj = [AssetGroup.objects.get(id=asset_group_id) for asset_group_id in asset_group_ids]
2015-11-14 14:54:29 +00:00
group_assets_obj = []
for asset_group in asset_groups_obj:
group_assets_obj.extend(asset_group.asset_set.all())
2015-11-28 14:08:47 +00:00
calc_assets = list(set(assets_obj) | set(group_assets_obj))
2015-11-14 14:54:29 +00:00
# 生成Inventory
2015-11-28 14:08:47 +00:00
# push_resource = []
# for asset in calc_assets:
# if asset.use_default_auth:
# username = Setting.field1
# port = Setting.field2
# password = Setting.field3
# else:
# username = asset.username
# password = asset.password
# port = asset.port
# push_resource.append({"hostname": asset.ip,
# "port": port,
# "username": username,
# "password": password})
push_resource = gen_resource(calc_assets)
2015-11-14 14:54:29 +00:00
# 获取角色的推送方式,以及推送需要的信息
2015-11-29 07:18:05 +00:00
roles_obj = [PermRole.objects.get(id=role_id) for role_id in role_ids]
role_pass = {}
role_key = {}
2015-11-14 14:54:29 +00:00
for role in roles_obj:
role_pass[role.name] = role.password
role_key[role.name] = os.path.join(role.key_path, 'id_rsa.pub')
2015-11-14 14:54:29 +00:00
# 调用Ansible API 进行推送
2015-11-14 14:54:29 +00:00
password_push = request.POST.get("use_password")
key_push = request.POST.get("use_publicKey")
task = Tasks(push_resource)
ret = {}
ret_failed = {}
2015-11-17 06:10:46 +00:00
# 因为要先建立用户所以password 是必选项而push key是在 password也完成的情况下的 可选项
# 1. 以password 方式推送角色
if password_push:
ret["password_push"] = task.add_multi_user(**role_pass)
if ret["password_push"].get("status") != "success":
ret_failed["step1"] == "failed"
2015-11-17 06:10:46 +00:00
# 2. 以秘钥 方式推送角色
2015-11-14 14:54:29 +00:00
if key_push:
ret["password_push"] = task.add_multi_user(**role_pass)
if ret["password_push"].get("status") != "success":
ret_failed["step2-1"] = "failed"
ret["key_push"] = task.push_multi_key(**role_key)
2015-11-15 14:12:28 +00:00
if ret["key_push"].get("status") != "success":
ret_failed["step2-2"] = "failed"
2015-11-14 13:52:09 +00:00
# 3. 推送sudo配置文件
2015-11-29 07:18:05 +00:00
role_chosen_aliase = {} # {'dev': [sudo1, sudo2], 'sa': [sudo2, sudo3]}
sudo_alias = set() # set(sudo1, sudo2, sudo3)
for role in roles_obj:
2015-11-29 07:18:05 +00:00
sudos = set([sudo for sudo in role.sudo.all()])
sudo_alias.update(sudos)
role_chosen_aliase[role.name] = sudos
add_sudo_script = get_add_sudo_script(role_chosen_aliase, sudo_alias)
ret_sudo = task.push_sudo_file(add_sudo_script)
2015-11-14 13:52:09 +00:00
if ret_sudo["step1"] != "ok" or ret_sudo["step2"] != "ok":
ret_failed["step3"] = "failed"
2015-11-29 07:18:05 +00:00
os.remove(add_sudo_script)
2015-11-28 14:08:47 +00:00
print ret
# 结果汇总统计
2015-11-15 14:12:28 +00:00
if ret_failed:
# 推送失败
error = u"推送失败, 原因: %s 失败" % ','.join(ret_failed.keys())
2015-11-15 14:12:28 +00:00
else:
# 推送成功 回写push表
2015-11-29 07:18:05 +00:00
msg = u"推送系统角色: %s" % ','.join(role_chosen_aliase.keys())
push = PermPush(is_public_key=bool(key_push), is_password=bool(password_push))
push.save()
push.asset_group = asset_groups_obj
push.asset = calc_assets
push.role = roles_obj
push.save()
2015-11-29 07:18:05 +00:00
return my_render('jperm/perm_role_push.html', locals(), request)
2015-11-14 13:52:09 +00:00
@require_role('admin')
def perm_sudo_list(request):
"""
list sudo commands alias
:param request:
:return:
"""
# 渲染数据
header_title, path1, path2 = "Sudo命令", "别名管理", "查看别名"
# 获取所有sudo 命令别名
sudos_list = PermSudo.objects.all()
# TODO: 搜索和分页
keyword = request.GET.get('search', '')
if keyword:
sudos_list = sudos_list.filter(Q(name=keyword))
sudos_list, p, sudos, page_range, current_page, show_first, show_end = pages(sudos_list, request)
return my_render('jperm/perm_sudo_list.html', locals(), request)
@require_role('admin')
def perm_sudo_add(request):
"""
list sudo commands alias
:param request:
:return:
"""
# 渲染数据
header_title, path1, path2 = "Sudo命令", "别名管理", "添加别名"
2015-11-29 07:18:05 +00:00
if request.method == "POST":
# 获取参数: name, comment
2015-11-29 07:18:05 +00:00
name = request.POST.get("sudo_name").strip()
runas = request.POST.get('sudo_runas', 'root').strip()
comment = request.POST.get("sudo_comment").strip()
commands = request.POST.get("sudo_commands").strip()
2015-11-29 07:18:05 +00:00
if get_object(PermSudo, name=name):
error = 'Sudo别名 %s已经存在' % name
else:
sudo = PermSudo(name=name.strip(), runas=runas, comment=comment, commands=commands.strip())
sudo.save()
msg = u"添加Sudo命令别名: %s" % name
# 渲染数据
2015-11-29 07:18:05 +00:00
return my_render('jperm/perm_sudo_add.html', locals(), request)
@require_role('admin')
def perm_sudo_edit(request):
"""
list sudo commands alias
:param request:
:return:
"""
# 渲染数据
header_title, path1, path2 = "Sudo命令", "别名管理", "编辑别名"
sudo_id = request.GET.get("id")
sudo = PermSudo.objects.get(id=sudo_id)
if request.method == "POST":
name = request.POST.get("sudo_name")
commands = request.POST.get("sudo_commands")
2015-11-29 07:18:05 +00:00
runas = request.POST.get('sudo_runas', 'root')
comment = request.POST.get("sudo_comment")
sudo.name = name.strip()
sudo.commands = commands.strip()
2015-11-29 07:18:05 +00:00
sudo.runas = runas.strip()
sudo.comment = comment
sudo.save()
msg = u"更新命令别名: %s" % name
2015-11-29 07:18:05 +00:00
return my_render('jperm/perm_sudo_edit.html', locals(), request)
@require_role('admin')
def perm_sudo_delete(request):
"""
list sudo commands alias
:param request:
:return:
"""
if request.method == "POST":
# 获取参数删除的role对象
sudo_id = request.POST.get("id")
sudo = PermSudo.objects.get(id=sudo_id)
# 数据库里删除记录
sudo.delete()
return HttpResponse(u"删除角色: %s" % sudo.name)
else:
return HttpResponse(u"不支持该操作")
2015-11-14 13:52:09 +00:00