jumpserver/apps/perms/api/user_permission.py

457 lines
16 KiB
Python
Raw Normal View History

2019-03-04 12:45:57 +00:00
# -*- coding: utf-8 -*-
#
2019-07-01 10:22:40 +00:00
import time
2019-07-01 13:48:25 +00:00
import traceback
2019-03-05 11:47:14 +00:00
from hashlib import md5
from django.core.cache import cache
from django.conf import settings
2019-03-04 12:45:57 +00:00
from django.shortcuts import get_object_or_404
from rest_framework.views import APIView, Response
from rest_framework.generics import (
2019-07-02 04:08:25 +00:00
ListAPIView, get_object_or_404, RetrieveAPIView
2019-03-04 12:45:57 +00:00
)
from rest_framework.pagination import LimitOffsetPagination
from common.permissions import IsValidUser, IsOrgAdminOrAppUser
from common.tree import TreeNodeSerializer
2019-03-05 11:47:14 +00:00
from common.utils import get_logger
2019-03-04 12:45:57 +00:00
from ..utils import (
AssetPermissionUtil, parse_asset_to_tree_node, parse_node_to_tree_node,
2019-03-04 12:45:57 +00:00
)
2019-07-01 13:48:25 +00:00
from ..hands import User, Asset, Node, SystemUser, NodeSerializer
2019-06-12 09:04:49 +00:00
from .. import serializers, const
2019-07-02 06:17:56 +00:00
from ..mixins import AssetsFilterMixin
2019-07-02 08:45:26 +00:00
from ..models import Action
2019-03-04 12:45:57 +00:00
2019-03-05 11:47:14 +00:00
logger = get_logger(__name__)
2019-03-04 12:45:57 +00:00
__all__ = [
'UserGrantedAssetsApi', 'UserGrantedNodesApi',
'UserGrantedNodesWithAssetsApi', 'UserGrantedNodeAssetsApi',
'ValidateUserAssetPermissionApi', 'UserGrantedNodeChildrenApi',
'UserGrantedNodesWithAssetsAsTreeApi', 'GetUserAssetPermissionActionsApi',
2019-03-04 12:45:57 +00:00
]
2019-03-26 11:46:04 +00:00
class UserPermissionCacheMixin:
2019-03-04 12:45:57 +00:00
cache_policy = '0'
2019-03-05 11:47:14 +00:00
RESP_CACHE_KEY = '_PERMISSION_RESPONSE_CACHE_{}'
CACHE_TIME = settings.ASSETS_PERM_CACHE_TIME
2019-03-26 11:46:04 +00:00
_object = None
2019-03-04 12:45:57 +00:00
2019-03-06 06:58:25 +00:00
def get_object(self):
2019-03-05 11:47:14 +00:00
return None
2019-03-26 11:46:04 +00:00
# 内部使用可控制缓存
def _get_object(self):
if not self._object:
self._object = self.get_object()
return self._object
2019-03-06 06:58:25 +00:00
2019-03-26 11:46:04 +00:00
def get_object_id(self):
obj = self._get_object()
if obj:
return str(obj.id)
return None
def get_request_md5(self):
path = self.request.path
query = {k: v for k, v in self.request.GET.items()}
query.pop("_", None)
query = "&".join(["{}={}".format(k, v) for k, v in query.items()])
full_path = "{}?{}".format(path, query)
2019-03-26 11:46:04 +00:00
return md5(full_path.encode()).hexdigest()
2019-03-06 06:58:25 +00:00
2019-03-26 11:46:04 +00:00
def get_meta_cache_id(self):
obj = self._get_object()
2019-03-05 11:47:14 +00:00
util = AssetPermissionUtil(obj, cache_policy=self.cache_policy)
2019-03-06 06:58:25 +00:00
meta_cache_id = util.cache_meta.get('id')
2019-03-26 11:46:04 +00:00
return meta_cache_id
def get_response_cache_id(self):
obj_id = self.get_object_id()
request_md5 = self.get_request_md5()
meta_cache_id = self.get_meta_cache_id()
resp_cache_id = '{}_{}_{}'.format(obj_id, request_md5, meta_cache_id)
2019-07-01 13:48:25 +00:00
resp_cache_id = md5(resp_cache_id.encode()).hexdigest()
2019-03-26 11:46:04 +00:00
return resp_cache_id
def get_response_from_cache(self):
2019-03-06 06:58:25 +00:00
# 没有数据缓冲
2019-03-26 11:46:04 +00:00
meta_cache_id = self.get_meta_cache_id()
2019-03-06 06:58:25 +00:00
if not meta_cache_id:
2019-07-01 13:48:25 +00:00
logger.debug("Not get meta id: {}".format(meta_cache_id))
2019-03-05 11:47:14 +00:00
return None
2019-03-26 11:46:04 +00:00
# 从响应缓冲里获取响应
2019-07-01 13:48:25 +00:00
key = self.get_response_key()
2019-03-05 11:47:14 +00:00
data = cache.get(key)
if not data:
2019-07-01 13:48:25 +00:00
logger.debug("Not get response from cache: {}".format(key))
2019-03-05 11:47:14 +00:00
return None
2019-03-26 11:46:04 +00:00
logger.debug("Get user permission from cache: {}".format(self.get_object()))
response = Response(data)
return response
2019-03-05 11:47:14 +00:00
2019-03-26 11:46:04 +00:00
def expire_response_cache(self):
obj_id = self.get_object_id()
expire_cache_id = '{}_{}'.format(obj_id, '*')
key = self.RESP_CACHE_KEY.format(expire_cache_id)
cache.delete_pattern(key)
2019-03-05 11:47:14 +00:00
2019-07-01 13:48:25 +00:00
def get_response_key(self):
2019-03-26 11:46:04 +00:00
resp_cache_id = self.get_response_cache_id()
key = self.RESP_CACHE_KEY.format(resp_cache_id)
2019-07-01 13:48:25 +00:00
return key
def set_response_to_cache(self, response):
key = self.get_response_key()
2019-03-05 11:47:14 +00:00
cache.set(key, response.data, self.CACHE_TIME)
2019-07-01 13:48:25 +00:00
logger.debug("Set response to cache: {}".format(key))
2019-03-04 12:45:57 +00:00
2019-03-26 11:46:04 +00:00
def get(self, request, *args, **kwargs):
self.cache_policy = request.GET.get('cache_policy', '0')
obj = self._get_object()
if obj is None:
2019-07-01 13:48:25 +00:00
logger.debug("Not get response from cache: obj is none")
2019-03-26 11:46:04 +00:00
return super().get(request, *args, **kwargs)
if AssetPermissionUtil.is_not_using_cache(self.cache_policy):
2019-07-01 13:48:25 +00:00
logger.debug("Not get resp from cache: {}".format(self.cache_policy))
2019-03-26 11:46:04 +00:00
return super().get(request, *args, **kwargs)
elif AssetPermissionUtil.is_refresh_cache(self.cache_policy):
2019-07-01 13:48:25 +00:00
logger.debug("Not get resp from cache: {}".format(self.cache_policy))
2019-03-26 11:46:04 +00:00
self.expire_response_cache()
2019-07-01 13:48:25 +00:00
logger.debug("Try get response from cache")
2019-03-26 11:46:04 +00:00
resp = self.get_response_from_cache()
if not resp:
resp = super().get(request, *args, **kwargs)
self.set_response_to_cache(resp)
return resp
2019-03-04 12:45:57 +00:00
2019-03-26 11:46:04 +00:00
class UserGrantedAssetsApi(UserPermissionCacheMixin, AssetsFilterMixin, ListAPIView):
2019-03-04 12:45:57 +00:00
"""
用户授权的所有资产
"""
permission_classes = (IsOrgAdminOrAppUser,)
serializer_class = serializers.AssetGrantedSerializer
2019-03-04 12:45:57 +00:00
pagination_class = LimitOffsetPagination
2019-03-05 11:47:14 +00:00
def get_object(self):
2019-03-04 12:45:57 +00:00
user_id = self.kwargs.get('pk', '')
if user_id:
user = get_object_or_404(User, id=user_id)
else:
user = self.request.user
2019-03-05 11:47:14 +00:00
return user
2019-03-04 12:45:57 +00:00
2019-03-05 11:47:14 +00:00
def get_queryset(self):
queryset = []
user = self.get_object()
2019-03-04 12:45:57 +00:00
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
assets = util.get_assets()
2019-07-02 06:17:56 +00:00
for asset, system_users in assets.items():
system_users_granted = []
2019-07-02 06:17:56 +00:00
for system_user, actions in system_users.items():
system_user.actions = actions
system_users_granted.append(system_user)
2019-07-02 06:17:56 +00:00
asset.system_users_granted = system_users_granted
queryset.append(asset)
2019-03-04 12:45:57 +00:00
return queryset
def get_permissions(self):
if self.kwargs.get('pk') is None:
self.permission_classes = (IsValidUser,)
return super().get_permissions()
2019-03-26 11:46:04 +00:00
class UserGrantedNodesApi(UserPermissionCacheMixin, ListAPIView):
2019-03-04 12:45:57 +00:00
"""
2019-07-02 04:08:25 +00:00
查询用户授权的所有节点的API
2019-03-04 12:45:57 +00:00
"""
permission_classes = (IsOrgAdminOrAppUser,)
serializer_class = NodeSerializer
2019-03-05 11:47:14 +00:00
def get_object(self):
2019-03-04 12:45:57 +00:00
user_id = self.kwargs.get('pk', '')
if user_id:
user = get_object_or_404(User, id=user_id)
else:
user = self.request.user
2019-03-05 11:47:14 +00:00
return user
def get_queryset(self):
user = self.get_object()
2019-03-04 12:45:57 +00:00
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
2019-07-02 04:08:25 +00:00
nodes = util.get_nodes()
return nodes
2019-03-04 12:45:57 +00:00
def get_permissions(self):
if self.kwargs.get('pk') is None:
self.permission_classes = (IsValidUser,)
return super().get_permissions()
2019-03-26 11:46:04 +00:00
class UserGrantedNodesWithAssetsApi(UserPermissionCacheMixin, AssetsFilterMixin, ListAPIView):
2019-03-04 12:45:57 +00:00
"""
用户授权的节点并带着节点下资产的api
"""
permission_classes = (IsOrgAdminOrAppUser,)
serializer_class = serializers.NodeGrantedSerializer
2019-03-05 11:47:14 +00:00
def get_object(self):
2019-03-04 12:45:57 +00:00
user_id = self.kwargs.get('pk', '')
if not user_id:
user = self.request.user
else:
user = get_object_or_404(User, id=user_id)
2019-03-05 11:47:14 +00:00
return user
2019-03-04 12:45:57 +00:00
2019-03-05 11:47:14 +00:00
def get_queryset(self):
queryset = []
user = self.get_object()
2019-03-04 12:45:57 +00:00
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
nodes = util.get_nodes_with_assets()
for node, _assets in nodes.items():
assets = _assets.keys()
for k, v in _assets.items():
2019-07-01 11:08:47 +00:00
k.system_users_granted = v
2019-03-04 12:45:57 +00:00
node.assets_granted = assets
queryset.append(node)
return queryset
def sort_assets(self, queryset):
for node in queryset:
node.assets_granted = super().sort_assets(node.assets_granted)
return queryset
def get_permissions(self):
if self.kwargs.get('pk') is None:
self.permission_classes = (IsValidUser,)
return super().get_permissions()
2019-03-26 11:46:04 +00:00
class UserGrantedNodesWithAssetsAsTreeApi(UserPermissionCacheMixin, ListAPIView):
2019-03-04 12:45:57 +00:00
serializer_class = TreeNodeSerializer
permission_classes = (IsOrgAdminOrAppUser,)
show_assets = True
system_user_id = None
def get_permissions(self):
if self.kwargs.get('pk') is None:
self.permission_classes = (IsValidUser,)
return super().get_permissions()
2019-03-05 11:47:14 +00:00
def get_object(self):
2019-03-04 12:45:57 +00:00
user_id = self.kwargs.get('pk', '')
if not user_id:
user = self.request.user
else:
user = get_object_or_404(User, id=user_id)
2019-03-05 11:47:14 +00:00
return user
def get_queryset(self):
queryset = []
2019-03-26 11:46:04 +00:00
self.show_assets = self.request.query_params.get('show_assets', '1') == '1'
self.system_user_id = self.request.query_params.get('system_user')
2019-03-05 11:47:14 +00:00
user = self.get_object()
2019-03-04 12:45:57 +00:00
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
if self.system_user_id:
2019-03-26 11:46:04 +00:00
util.filter_permissions(
system_users=self.system_user_id
2019-03-05 11:47:14 +00:00
)
2019-03-04 12:45:57 +00:00
nodes = util.get_nodes_with_assets()
2019-07-02 14:08:50 +00:00
print(list(nodes.keys()))
2019-03-04 12:45:57 +00:00
for node, assets in nodes.items():
data = parse_node_to_tree_node(node)
queryset.append(data)
if not self.show_assets:
continue
for asset, system_users in assets.items():
data = parse_asset_to_tree_node(node, asset, system_users)
queryset.append(data)
return queryset
2019-03-26 11:46:04 +00:00
class UserGrantedNodeAssetsApi(UserPermissionCacheMixin, AssetsFilterMixin, ListAPIView):
2019-03-04 12:45:57 +00:00
"""
查询用户授权的节点下的资产的api, 与上面api不同的是只返回某个节点下的资产
"""
permission_classes = (IsOrgAdminOrAppUser,)
serializer_class = serializers.AssetGrantedSerializer
2019-03-04 12:45:57 +00:00
pagination_class = LimitOffsetPagination
2019-03-05 11:47:14 +00:00
def get_object(self):
2019-03-04 12:45:57 +00:00
user_id = self.kwargs.get('pk', '')
if user_id:
user = get_object_or_404(User, id=user_id)
else:
user = self.request.user
2019-03-05 11:47:14 +00:00
return user
def get_queryset(self):
user = self.get_object()
node_id = self.kwargs.get('node_id')
2019-03-04 12:45:57 +00:00
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
2019-07-01 11:08:47 +00:00
nodes = util.get_nodes_with_assets()
2019-06-12 09:04:49 +00:00
if str(node_id) == const.UNGROUPED_NODE_ID:
node = util.tree.ungrouped_node
else:
node = get_object_or_404(Node, id=node_id)
if node == util.tree.root_node:
assets = util.get_assets()
else:
assets = nodes.get(node, [])
2019-03-04 12:45:57 +00:00
for asset, system_users in assets.items():
asset.system_users_granted = system_users
assets = list(assets.keys())
return assets
def get_permissions(self):
if self.kwargs.get('pk') is None:
self.permission_classes = (IsValidUser,)
return super().get_permissions()
2019-03-26 11:46:04 +00:00
class UserGrantedNodeChildrenApi(UserPermissionCacheMixin, ListAPIView):
2019-03-04 12:45:57 +00:00
"""
获取用户自己授权节点下子节点的api
"""
permission_classes = (IsValidUser,)
serializer_class = serializers.AssetPermissionNodeSerializer
2019-03-05 11:47:14 +00:00
def get_object(self):
return self.request.user
2019-03-04 12:45:57 +00:00
def get_children_queryset(self):
2019-03-05 11:47:14 +00:00
user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
2019-03-04 12:45:57 +00:00
node_id = self.request.query_params.get('id')
nodes_granted = util.get_nodes_with_assets()
if not nodes_granted:
return []
root_nodes = [node for node in nodes_granted.keys() if node.is_root()]
queryset = []
if node_id and node_id in [str(node.id) for node in nodes_granted]:
node = [node for node in nodes_granted if str(node.id) == node_id][0]
elif len(root_nodes) == 1:
node = root_nodes[0]
node.assets_amount = len(nodes_granted[node])
queryset.append(node)
else:
for node in root_nodes:
node.assets_amount = len(nodes_granted[node])
queryset.append(node)
return queryset
children = []
for child in node.get_children():
if child in nodes_granted:
child.assets_amount = len(nodes_granted[node])
children.append(child)
children = sorted(children, key=lambda x: x.value)
queryset.extend(children)
fake_nodes = []
for asset, system_users in nodes_granted[node].items():
fake_node = asset.as_node()
fake_node.assets_amount = 0
system_users = [s for s in system_users if asset.has_protocol(s.protocol)]
2019-03-04 12:45:57 +00:00
fake_node.asset.system_users_granted = system_users
fake_node.key = node.key + ':0'
fake_nodes.append(fake_node)
fake_nodes = sorted(fake_nodes, key=lambda x: x.value)
queryset.extend(fake_nodes)
return queryset
def get_search_queryset(self, keyword):
2019-03-05 11:47:14 +00:00
user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
2019-03-04 12:45:57 +00:00
nodes_granted = util.get_nodes_with_assets()
queryset = []
for node, assets in nodes_granted.items():
matched_assets = []
node_matched = node.value.lower().find(keyword.lower()) >= 0
asset_has_matched = False
for asset, system_users in assets.items():
asset_matched = (asset.hostname.lower().find(keyword.lower()) >= 0) \
or (asset.ip.find(keyword.lower()) >= 0)
if node_matched or asset_matched:
asset_has_matched = True
fake_node = asset.as_node()
fake_node.assets_amount = 0
system_users = [s for s in system_users if
asset.has_protocol(s.protocol)]
2019-03-04 12:45:57 +00:00
fake_node.asset.system_users_granted = system_users
fake_node.key = node.key + ':0'
matched_assets.append(fake_node)
if asset_has_matched:
node.assets_amount = len(matched_assets)
queryset.append(node)
queryset.extend(sorted(matched_assets, key=lambda x: x.value))
return queryset
def get_queryset(self):
keyword = self.request.query_params.get('search')
if keyword:
return self.get_search_queryset(keyword)
else:
return self.get_children_queryset()
2019-03-26 11:46:04 +00:00
class ValidateUserAssetPermissionApi(UserPermissionCacheMixin, APIView):
2019-03-04 12:45:57 +00:00
permission_classes = (IsOrgAdminOrAppUser,)
2019-03-05 11:47:14 +00:00
def get(self, request, *args, **kwargs):
2019-03-04 12:45:57 +00:00
user_id = request.query_params.get('user_id', '')
asset_id = request.query_params.get('asset_id', '')
system_id = request.query_params.get('system_user_id', '')
action_name = request.query_params.get('action_name', '')
2019-03-04 12:45:57 +00:00
user = get_object_or_404(User, id=user_id)
asset = get_object_or_404(Asset, id=asset_id)
su = get_object_or_404(SystemUser, id=system_id)
2019-03-04 12:45:57 +00:00
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
granted_assets = util.get_assets()
granted_system_users = granted_assets.get(asset, {})
if su not in granted_system_users:
return Response({'msg': False}, status=403)
action = granted_system_users[su]
2019-07-02 08:45:26 +00:00
choices = Action.value_to_choices(action)
if action_name not in choices:
2019-03-04 12:45:57 +00:00
return Response({'msg': False}, status=403)
return Response({'msg': True}, status=200)
2019-07-02 02:51:48 +00:00
class GetUserAssetPermissionActionsApi(UserPermissionCacheMixin, RetrieveAPIView):
permission_classes = (IsOrgAdminOrAppUser,)
serializer_class = serializers.ActionsSerializer
2019-07-02 02:51:48 +00:00
def get_object(self):
user_id = self.request.query_params.get('user_id', '')
asset_id = self.request.query_params.get('asset_id', '')
system_id = self.request.query_params.get('system_user_id', '')
2019-03-04 12:45:57 +00:00
user = get_object_or_404(User, id=user_id)
asset = get_object_or_404(Asset, id=asset_id)
su = get_object_or_404(SystemUser, id=system_id)
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
granted_assets = util.get_assets()
2019-07-02 02:51:48 +00:00
granted_system_users = granted_assets.get(asset, {})
_object = {}
2019-07-02 02:51:48 +00:00
if su not in granted_system_users:
_object['actions'] = 0
else:
_object['actions'] = granted_system_users[su]
return _object