jumpserver/apps/users/api.py

157 lines
5.5 KiB
Python
Raw Normal View History

2016-08-09 09:27:37 +00:00
# ~*~ coding: utf-8 ~*~
2016-08-23 16:11:13 +00:00
#
2016-08-09 09:27:37 +00:00
2016-10-31 10:58:23 +00:00
import base64
2016-10-31 10:58:23 +00:00
from django.shortcuts import get_object_or_404
from django.core.cache import cache
from django.conf import settings
2016-11-09 11:29:15 +00:00
from rest_framework import generics, status, viewsets
from rest_framework.response import Response
2016-10-31 10:58:23 +00:00
from rest_framework.views import APIView
2016-11-09 11:29:15 +00:00
from rest_framework_bulk import ListBulkCreateUpdateDestroyAPIView, BulkModelViewSet
2016-10-31 10:58:23 +00:00
from rest_framework import authentication
2016-08-23 16:11:13 +00:00
2016-10-15 08:04:54 +00:00
from common.mixins import BulkDeleteApiMixin
from common.utils import get_logger
2016-10-31 10:58:23 +00:00
from .utils import check_user_valid, token_gen
2016-08-24 09:14:21 +00:00
from .models import User, UserGroup
2016-11-10 15:54:21 +00:00
from .hands import write_login_log_async
2016-10-17 07:24:41 +00:00
from .backends import IsSuperUser, IsTerminalUser, IsValidUser, IsSuperUserOrTerminalUser
2016-11-10 15:54:21 +00:00
from . import serializers
2016-08-23 16:11:13 +00:00
2016-10-07 15:54:29 +00:00
logger = get_logger(__name__)
2016-08-26 08:56:50 +00:00
2016-11-09 11:29:15 +00:00
class UserViewSet(BulkModelViewSet):
2016-08-24 09:14:21 +00:00
queryset = User.objects.all()
2016-11-09 11:29:15 +00:00
serializer_class = serializers.UserSerializer
2016-10-15 09:14:56 +00:00
permission_classes = (IsSuperUser,)
2016-08-24 09:14:21 +00:00
2016-11-14 16:48:48 +00:00
class UserUpdateGroupApi(generics.RetrieveUpdateAPIView):
2016-11-09 15:49:10 +00:00
queryset = User.objects.all()
2016-11-14 16:48:48 +00:00
serializer_class = serializers.UserUpdateGroupSerializer
2016-11-09 15:49:10 +00:00
permission_classes = (IsSuperUser,)
class UserResetPasswordApi(generics.UpdateAPIView):
queryset = User.objects.all()
2016-11-09 11:29:15 +00:00
serializer_class = serializers.UserSerializer
def perform_update(self, serializer):
# Note: we are not updating the user object here.
# We just do the reset-password staff.
import uuid
2016-11-09 11:29:15 +00:00
from .utils import send_reset_password_mail
user = self.get_object()
user.password_raw = str(uuid.uuid4())
user.save()
send_reset_password_mail(user)
2016-11-09 15:49:10 +00:00
class UserResetPKApi(generics.UpdateAPIView):
queryset = User.objects.all()
2016-11-09 11:29:15 +00:00
serializer_class = serializers.UserSerializer
def perform_update(self, serializer):
2016-11-09 11:29:15 +00:00
from .utils import send_reset_ssh_key_mail
user = self.get_object()
2016-09-18 06:28:34 +00:00
user.is_public_key_valid = False
user.save()
send_reset_ssh_key_mail(user)
2016-09-18 06:28:34 +00:00
2016-11-09 15:49:10 +00:00
class UserUpdatePKApi(generics.UpdateAPIView):
queryset = User.objects.all()
serializer_class = serializers.UserPKUpdateSerializer
def perform_update(self, serializer):
user = self.get_object()
user.public_key = serializer.validated_data['_public_key']
user.save()
2016-11-14 16:48:48 +00:00
class UserGroupViewSet(viewsets.ModelViewSet):
queryset = UserGroup.objects.all()
serializer_class = serializers.UserGroupSerializer
class UserGroupUpdateUserApi(generics.RetrieveUpdateAPIView):
queryset = UserGroup.objects.all()
serializer_class = serializers.UserGroupUpdateMemeberSerializer
permission_classes = (IsSuperUser,)
2016-11-09 11:29:15 +00:00
# class GroupDetailApi(generics.RetrieveUpdateDestroyAPIView):
# queryset = UserGroup.objects.all()
# serializer_class = serializers.GroupDetailSerializer
#
# def perform_update(self, serializer):
# users = serializer.validated_data.get('users')
# if users:
# group = self.get_object()
# Note: use `list` method to force hitting the db.
# group_users = list(group.users.all())
# serializer.save()
# group.users.set(users + group_users)
# group.save()
# return
# serializer.save()
2016-11-09 15:49:10 +00:00
2016-11-09 11:29:15 +00:00
# class UserListUpdateApi(BulkDeleteApiMixin, ListBulkCreateUpdateDestroyAPIView):
# queryset = User.objects.all()
# serializer_class = serializers.UserBulkUpdateSerializer
# permission_classes = (IsSuperUserOrTerminalUser,)
#
# def get(self, request, *args, **kwargs):
# return super(UserListUpdateApi, self).get(request, *args, **kwargs)
2016-11-09 15:49:10 +00:00
2016-11-09 11:29:15 +00:00
#
# class GroupListUpdateApi(BulkDeleteApiMixin, ListBulkCreateUpdateDestroyAPIView):
# queryset = UserGroup.objects.all()
# serializer_class = serializers.GroupBulkUpdateSerializer
2016-11-09 15:49:10 +00:00
#
2016-10-15 09:14:56 +00:00
2016-11-09 11:29:15 +00:00
# class DeleteUserFromGroupApi(generics.DestroyAPIView):
# queryset = UserGroup.objects.all()
# serializer_class = serializers.GroupDetailSerializer
#
# def destroy(self, request, *args, **kwargs):
# group = self.get_object()
# self.perform_destroy(group, **kwargs)
# return Response(status=status.HTTP_204_NO_CONTENT)
#
# def perform_destroy(self, instance, **kwargs):
# user_id = kwargs.get('uid')
# user = get_object_or_404(User, id=user_id)
# instance.users.remove(user)
#
#
class UserAuthApi(APIView):
2016-10-31 10:58:23 +00:00
permission_classes = ()
expiration = settings.CONFIG.TOKEN_EXPIRATION or 3600
def post(self, request, *args, **kwargs):
username = request.data.get('username', '')
password = request.data.get('password', '')
public_key = request.data.get('public_key', '')
2016-11-10 15:54:21 +00:00
remote_addr = request.data.get('remote_addr', '')
terminal = request.data.get('terminal', '')
login_type = request.data.get('login_type', 'T')
2016-10-31 10:58:23 +00:00
user = check_user_valid(username=username, password=password, public_key=public_key)
2016-11-09 11:29:15 +00:00
2016-10-31 10:58:23 +00:00
if user:
token = cache.get('%s_%s' % (user.id, remote_addr))
if not token:
token = token_gen(user)
cache.set(token, user.id, self.expiration)
cache.set('%s_%s' % (user.id, remote_addr), token, self.expiration)
2016-11-10 15:54:21 +00:00
write_login_log_async.delay(user.username, name=user.name, terminal=terminal,
login_ip=remote_addr, login_type=login_type)
2016-11-01 09:21:16 +00:00
return Response({'token': token, 'id': user.id, 'username': user.username, 'name': user.name})
2016-10-31 10:58:23 +00:00
else:
2016-11-07 08:59:52 +00:00
return Response({'msg': 'Invalid password or public key or user is not active or expired'}, status=401)