You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
jumpserver/apps/assets/api.py

124 lines
4.2 KiB

# ~*~ coding: utf-8 ~*~
8 years ago
from rest_framework import viewsets, generics, mixins
8 years ago
from rest_framework.response import Response
8 years ago
from rest_framework.views import APIView
from rest_framework_bulk import BulkListSerializer, BulkSerializerMixin, ListBulkCreateUpdateDestroyAPIView
8 years ago
from django.shortcuts import get_object_or_404
8 years ago
8 years ago
from common.mixins import IDInFilterMixin
8 years ago
from common.utils import get_object_or_none, signer
from .hands import IsSuperUserOrAppUser, IsSuperUser
8 years ago
from .models import AssetGroup, Asset, IDC, SystemUser, AdminUser
from . import serializers
8 years ago
class AssetViewSet(IDInFilterMixin, viewsets.ModelViewSet):
"""API endpoint that allows Asset to be viewed or edited."""
8 years ago
queryset = Asset.objects.all()
8 years ago
serializer_class = serializers.AssetSerializer
8 years ago
filter_fields = ('id', 'ip', 'hostname')
permission_classes = (IsSuperUserOrAppUser,)
8 years ago
def get_queryset(self):
queryset = super(AssetViewSet, self).get_queryset()
8 years ago
idc_id = self.request.query_params.get('idc_id', '')
asset_group_id = self.request.query_params.get('asset_group_id', '')
if idc_id:
queryset = queryset.filter(idc__id=idc_id)
if asset_group_id:
queryset = queryset.filter(groups__id=asset_group_id)
return queryset
8 years ago
class AssetGroupViewSet(viewsets.ModelViewSet):
""" API endpoint that allows AssetGroup to be viewed or edited.
some other comment
"""
queryset = AssetGroup.objects.all()
serializer_class = serializers.AssetGroupSerializer
8 years ago
8 years ago
class AssetUpdateGroupApi(generics.RetrieveUpdateAPIView):
queryset = Asset.objects.all()
serializer_class = serializers.AssetUpdateGroupSerializer
permission_classes = (IsSuperUser,)
8 years ago
8 years ago
8 years ago
class IDCViewSet(viewsets.ModelViewSet):
"""API endpoint that allows IDC to be viewed or edited."""
8 years ago
queryset = IDC.objects.all()
8 years ago
serializer_class = serializers.IDCSerializer
8 years ago
permission_classes = (IsSuperUser,)
8 years ago
8 years ago
class AdminUserViewSet(viewsets.ModelViewSet):
queryset = AdminUser.objects.all()
serializer_class = serializers.AdminUserSerializer
permission_classes = (IsSuperUser,)
8 years ago
8 years ago
class SystemUserViewSet(viewsets.ModelViewSet):
queryset = SystemUser.objects.all()
serializer_class = serializers.SystemUserSerializer
permission_classes = (IsSuperUser,)
8 years ago
8 years ago
class SystemUserUpdateApi(generics.RetrieveUpdateAPIView):
queryset = Asset.objects.all()
serializer_class = serializers.AssetUpdateSystemUserSerializer
permission_classes = (IsSuperUser,)
8 years ago
# class IDCAssetsApi(generics.ListAPIView):
# model = IDC
# serializer_class = serializers.AssetSerializer
#
# def get(self, request, *args, **kwargs):
# filter_kwargs = {self.lookup_field: self.kwargs[self.lookup_field]}
# self.object = get_object_or_404(self.model, **filter_kwargs)
# return super(IDCAssetsApi, self).get(request, *args, **kwargs)
#
# def get_queryset(self):
# return self.object.assets.all()
8 years ago
8 years ago
class AssetListUpdateApi(IDInFilterMixin, ListBulkCreateUpdateDestroyAPIView):
queryset = Asset.objects.all()
8 years ago
serializer_class = serializers.AssetSerializer
8 years ago
permission_classes = (IsSuperUser,)
8 years ago
8 years ago
class SystemUserAuthApi(APIView):
permission_classes = (IsSuperUserOrAppUser,)
8 years ago
8 years ago
def get(self, request, *args, **kwargs):
8 years ago
system_user_id = request.query_params.get('system_user_id', -1)
system_user_username = request.query_params.get('system_user_username', '')
8 years ago
8 years ago
system_user = get_object_or_none(SystemUser, id=system_user_id, username=system_user_username)
8 years ago
if system_user:
8 years ago
if system_user.password:
password = signer.sign(system_user.password)
else:
password = signer.sign('')
if system_user.private_key:
private_key = signer.sign(system_user.private_key)
else:
private_key = signer.sign(None)
8 years ago
response = {
'id': system_user.id,
'password': password,
'private_key': private_key,
}
return Response(response)
else:
return Response({'msg': 'error system user id or username'}, status=401)