jumpserver/apps/authentication/views/login.py

211 lines
7.7 KiB
Python
Raw Normal View History

2019-02-27 00:45:00 +00:00
# ~*~ coding: utf-8 ~*~
#
2019-02-27 00:45:00 +00:00
from __future__ import unicode_literals
import os
import datetime
2019-02-27 00:45:00 +00:00
from django.core.cache import cache
from django.contrib.auth import login as auth_login, logout as auth_logout
from django.http import HttpResponse
2019-02-27 00:45:00 +00:00
from django.shortcuts import reverse, redirect
from django.utils.decorators import method_decorator
from django.utils.translation import ugettext as _
from django.views.decorators.cache import never_cache
from django.views.decorators.csrf import csrf_protect
from django.views.decorators.debug import sensitive_post_parameters
from django.views.generic.base import TemplateView, RedirectView
2019-02-27 00:45:00 +00:00
from django.views.generic.edit import FormView
from django.conf import settings
2019-11-05 10:46:29 +00:00
from django.urls import reverse_lazy
2019-02-27 00:45:00 +00:00
from common.utils import get_request_ip, get_object_or_none
2019-02-28 09:58:53 +00:00
from users.models import User
from users.utils import (
2019-11-05 10:46:29 +00:00
get_user_or_tmp_user, increase_login_failed_count,
redirect_user_first_login_or_index
)
2019-02-28 09:58:53 +00:00
from ..signals import post_auth_success, post_auth_failed
2019-11-05 10:46:29 +00:00
from .. import forms, mixins, errors
2019-02-27 00:45:00 +00:00
__all__ = [
2019-11-05 10:46:29 +00:00
'UserLoginView', 'UserLogoutView',
'UserLoginGuardView', 'UserLoginWaitConfirmView',
2019-02-27 00:45:00 +00:00
]
@method_decorator(sensitive_post_parameters(), name='dispatch')
@method_decorator(csrf_protect, name='dispatch')
@method_decorator(never_cache, name='dispatch')
2019-11-05 10:46:29 +00:00
class UserLoginView(mixins.AuthMixin, FormView):
2019-02-27 00:45:00 +00:00
form_class = forms.UserLoginForm
form_class_captcha = forms.UserLoginCaptchaForm
key_prefix_captcha = "_LOGIN_INVALID_{}"
2019-11-05 10:46:29 +00:00
redirect_field_name = 'next'
2019-02-27 00:45:00 +00:00
def get_template_names(self):
2019-03-27 04:20:43 +00:00
template_name = 'authentication/login.html'
2019-02-27 00:45:00 +00:00
if not settings.XPACK_ENABLED:
return template_name
from xpack.plugins.license.models import License
if not License.has_valid_license():
return template_name
2019-10-25 11:20:28 +00:00
template_name = 'authentication/xpack_login.html'
2019-02-27 00:45:00 +00:00
return template_name
def get(self, request, *args, **kwargs):
if request.user.is_staff:
return redirect(redirect_user_first_login_or_index(
request, self.redirect_field_name)
)
# show jumpserver login page if request http://{JUMP-SERVER}/?admin=1
if settings.AUTH_OPENID and not self.request.GET.get('admin', 0):
query_string = request.GET.urlencode()
login_url = "{}?{}".format(settings.LOGIN_URL, query_string)
return redirect(login_url)
2019-02-27 00:45:00 +00:00
request.session.set_test_cookie()
return super().get(request, *args, **kwargs)
def form_valid(self, form):
if not self.request.session.test_cookie_worked():
return HttpResponse(_("Please enable cookies and try again."))
2019-11-05 10:46:29 +00:00
try:
self.check_user_auth()
except errors.AuthFailedError as e:
form.add_error(None, e.msg)
ip = self.get_request_ip()
cache.set(self.key_prefix_captcha.format(ip), 1, 3600)
context = self.get_context_data(form=form)
return self.render_to_response(context)
return self.redirect_to_guard_view()
2019-02-27 00:45:00 +00:00
2019-11-05 10:46:29 +00:00
def redirect_to_guard_view(self):
guard_url = reverse('authentication:login-guard')
args = self.request.META.get('QUERY_STRING', '')
2019-11-06 06:40:41 +00:00
if args:
2019-11-05 10:46:29 +00:00
guard_url = "%s?%s" % (guard_url, args)
return redirect(guard_url)
2019-10-25 11:20:28 +00:00
2019-02-27 00:45:00 +00:00
def get_form_class(self):
ip = get_request_ip(self.request)
if cache.get(self.key_prefix_captcha.format(ip)):
return self.form_class_captcha
else:
return self.form_class
def get_context_data(self, **kwargs):
context = {
'demo_mode': os.environ.get("DEMO_MODE"),
'AUTH_OPENID': settings.AUTH_OPENID,
}
kwargs.update(context)
return super().get_context_data(**kwargs)
2019-11-05 10:46:29 +00:00
class UserLoginGuardView(mixins.AuthMixin, RedirectView):
2019-10-25 11:20:28 +00:00
redirect_field_name = 'next'
2019-11-05 10:46:29 +00:00
login_url = reverse_lazy('authentication:login')
login_otp_url = reverse_lazy('authentication:login-otp')
login_confirm_url = reverse_lazy('authentication:login-wait-confirm')
def format_redirect_url(self, url):
args = self.request.META.get('QUERY_STRING', '')
if args and self.query_string:
url = "%s?%s" % (url, args)
return url
2019-10-25 11:20:28 +00:00
def get_redirect_url(self, *args, **kwargs):
if not self.request.session.get('auth_password'):
2019-11-05 10:46:29 +00:00
return self.format_redirect_url(self.login_url)
user = self.get_user_from_session()
# 启用并设置了otp
2019-10-25 11:20:28 +00:00
if user.otp_enabled and user.otp_secret_key and \
2019-11-05 10:46:29 +00:00
not self.request.session.get('auth_mfa'):
return self.format_redirect_url(self.login_otp_url)
2019-10-31 10:23:43 +00:00
confirm_setting = user.get_login_confirm_setting()
if confirm_setting and not self.request.session.get('auth_confirm'):
2019-11-07 10:06:58 +00:00
ticket = confirm_setting.create_confirm_ticket(self.request)
self.request.session['auth_ticket_id'] = str(ticket.id)
2019-11-05 10:46:29 +00:00
url = self.format_redirect_url(self.login_confirm_url)
return url
2019-10-25 11:20:28 +00:00
self.login_success(user)
2019-11-05 10:46:29 +00:00
self.clear_auth_mark()
# 启用但是没有设置otp
2019-10-25 11:20:28 +00:00
if user.otp_enabled and not user.otp_secret_key:
# 1,2,mfa_setting & F
return reverse('users:user-otp-enable-authentication')
url = redirect_user_first_login_or_index(
self.request, self.redirect_field_name
)
return url
def login_success(self, user):
auth_login(self.request, user)
self.send_auth_signal(success=True, user=user)
2019-02-27 00:45:00 +00:00
def send_auth_signal(self, success=True, user=None, username='', reason=''):
if success:
post_auth_success.send(sender=self.__class__, user=user, request=self.request)
else:
post_auth_failed.send(
sender=self.__class__, username=username,
request=self.request, reason=reason
)
2019-10-25 11:20:28 +00:00
class UserLoginWaitConfirmView(TemplateView):
template_name = 'authentication/login_wait_confirm.html'
def get_context_data(self, **kwargs):
2019-11-07 10:06:58 +00:00
from tickets.models import LoginConfirmTicket
ticket_id = self.request.session.get("auth_ticket_id")
if not ticket_id:
ticket = None
else:
2019-11-07 10:06:58 +00:00
ticket = get_object_or_none(LoginConfirmTicket, pk=ticket_id)
context = super().get_context_data(**kwargs)
2019-11-07 10:06:58 +00:00
if ticket:
ticket_detail_url = reverse('tickets:login-confirm-ticket-detail', kwargs={'pk': ticket_id})
timestamp_created = datetime.datetime.timestamp(ticket.date_created)
msg = _("""Wait for <b>{}</b> confirm, You also can copy link to her/him <br/>
2019-11-07 10:06:58 +00:00
Don't close this page""").format(ticket.assignees_display)
else:
timestamp_created = 0
2019-11-07 10:06:58 +00:00
ticket_detail_url = ''
msg = _("No ticket found")
context.update({
"msg": msg,
"timestamp": timestamp_created,
2019-11-07 10:06:58 +00:00
"ticket_detail_url": ticket_detail_url
})
return context
2019-10-25 11:20:28 +00:00
2019-02-27 00:45:00 +00:00
@method_decorator(never_cache, name='dispatch')
class UserLogoutView(TemplateView):
template_name = 'flash_message_standalone.html'
def get(self, request, *args, **kwargs):
auth_logout(request)
next_uri = request.COOKIES.get("next")
if next_uri:
return redirect(next_uri)
response = super().get(request, *args, **kwargs)
return response
def get_context_data(self, **kwargs):
context = {
'title': _('Logout success'),
'messages': _('Logout success, return login page'),
'interval': 1,
'redirect_url': reverse('authentication:login'),
2019-02-27 00:45:00 +00:00
'auto_redirect': True,
}
kwargs.update(context)
return super().get_context_data(**kwargs)