2022-12-07 07:09:01 +00:00
|
|
|
|
import base64
|
|
|
|
|
import json
|
2022-10-27 09:20:31 +00:00
|
|
|
|
from datetime import timedelta
|
2022-11-28 07:01:16 +00:00
|
|
|
|
|
|
|
|
|
from django.conf import settings
|
2022-12-07 07:09:01 +00:00
|
|
|
|
from django.core.cache import cache
|
2022-11-28 07:01:16 +00:00
|
|
|
|
from django.db import models
|
2022-04-13 12:24:56 +00:00
|
|
|
|
from django.utils import timezone
|
2021-10-18 10:41:41 +00:00
|
|
|
|
from django.utils.translation import ugettext_lazy as _
|
2022-11-22 13:54:40 +00:00
|
|
|
|
from rest_framework.exceptions import PermissionDenied
|
2019-02-28 09:58:53 +00:00
|
|
|
|
|
2022-11-28 07:01:16 +00:00
|
|
|
|
from assets.const import Protocol
|
2023-04-12 03:43:06 +00:00
|
|
|
|
from assets.const.host import GATEWAY_NAME
|
2023-02-14 08:53:10 +00:00
|
|
|
|
from common.db.fields import EncryptTextField
|
2023-02-10 11:40:35 +00:00
|
|
|
|
from common.exceptions import JMSException
|
|
|
|
|
from common.utils import lazyproperty, pretty_string, bulk_get
|
2022-07-11 10:09:06 +00:00
|
|
|
|
from common.utils.timezone import as_current_tz
|
2022-12-20 12:23:42 +00:00
|
|
|
|
from orgs.mixins.models import JMSOrgBaseModel
|
2022-12-07 07:09:01 +00:00
|
|
|
|
from terminal.models import Applet
|
2022-02-17 12:13:31 +00:00
|
|
|
|
|
|
|
|
|
|
2022-07-11 10:09:06 +00:00
|
|
|
|
def date_expired_default():
|
|
|
|
|
return timezone.now() + timedelta(seconds=settings.CONNECTION_TOKEN_EXPIRATION)
|
|
|
|
|
|
|
|
|
|
|
2022-12-20 12:23:42 +00:00
|
|
|
|
class ConnectionToken(JMSOrgBaseModel):
|
2022-11-25 15:09:55 +00:00
|
|
|
|
value = models.CharField(max_length=64, default='', verbose_name=_("Value"))
|
2022-07-11 10:09:06 +00:00
|
|
|
|
user = models.ForeignKey(
|
2022-11-28 07:01:16 +00:00
|
|
|
|
'users.User', on_delete=models.SET_NULL, null=True, blank=True,
|
2022-10-27 07:47:05 +00:00
|
|
|
|
related_name='connection_tokens', verbose_name=_('User')
|
2022-07-11 10:09:06 +00:00
|
|
|
|
)
|
|
|
|
|
asset = models.ForeignKey(
|
2022-10-27 07:47:05 +00:00
|
|
|
|
'assets.Asset', on_delete=models.SET_NULL, null=True, blank=True,
|
|
|
|
|
related_name='connection_tokens', verbose_name=_('Asset'),
|
2022-07-11 10:09:06 +00:00
|
|
|
|
)
|
2022-12-05 04:42:15 +00:00
|
|
|
|
account = models.CharField(max_length=128, verbose_name=_("Account name")) # 登录账号Name
|
2022-12-05 03:06:50 +00:00
|
|
|
|
input_username = models.CharField(max_length=128, default='', blank=True, verbose_name=_("Input username"))
|
2023-02-14 08:53:10 +00:00
|
|
|
|
input_secret = EncryptTextField(max_length=64, default='', blank=True, verbose_name=_("Input secret"))
|
2022-12-05 03:06:50 +00:00
|
|
|
|
protocol = models.CharField(max_length=16, default=Protocol.ssh, verbose_name=_("Protocol"))
|
2022-11-28 14:58:43 +00:00
|
|
|
|
connect_method = models.CharField(max_length=32, verbose_name=_("Connect method"))
|
2022-10-28 07:01:17 +00:00
|
|
|
|
user_display = models.CharField(max_length=128, default='', verbose_name=_("User display"))
|
|
|
|
|
asset_display = models.CharField(max_length=128, default='', verbose_name=_("Asset display"))
|
2022-12-05 03:06:50 +00:00
|
|
|
|
date_expired = models.DateTimeField(default=date_expired_default, verbose_name=_("Date expired"))
|
2023-01-16 11:02:09 +00:00
|
|
|
|
from_ticket = models.OneToOneField(
|
|
|
|
|
'tickets.ApplyLoginAssetTicket', related_name='connection_token',
|
|
|
|
|
on_delete=models.SET_NULL, null=True, blank=True,
|
|
|
|
|
verbose_name=_('From ticket')
|
|
|
|
|
)
|
|
|
|
|
is_active = models.BooleanField(default=True, verbose_name=_("Active"))
|
2022-02-17 12:13:31 +00:00
|
|
|
|
|
|
|
|
|
class Meta:
|
2022-07-11 10:09:06 +00:00
|
|
|
|
ordering = ('-date_expired',)
|
2022-03-02 12:48:43 +00:00
|
|
|
|
verbose_name = _('Connection token')
|
2022-03-10 03:25:33 +00:00
|
|
|
|
permissions = [
|
|
|
|
|
('view_connectiontokensecret', _('Can view connection token secret'))
|
|
|
|
|
]
|
2022-03-02 12:48:43 +00:00
|
|
|
|
|
2022-07-11 10:09:06 +00:00
|
|
|
|
@property
|
|
|
|
|
def is_expired(self):
|
|
|
|
|
return self.date_expired < timezone.now()
|
|
|
|
|
|
2022-07-12 10:27:07 +00:00
|
|
|
|
@property
|
|
|
|
|
def expire_time(self):
|
|
|
|
|
interval = self.date_expired - timezone.now()
|
|
|
|
|
seconds = interval.total_seconds()
|
|
|
|
|
if seconds < 0:
|
|
|
|
|
seconds = 0
|
|
|
|
|
return int(seconds)
|
|
|
|
|
|
2022-11-22 13:54:40 +00:00
|
|
|
|
def save(self, *args, **kwargs):
|
|
|
|
|
self.asset_display = pretty_string(self.asset, max_length=128)
|
|
|
|
|
self.user_display = pretty_string(self.user, max_length=128)
|
|
|
|
|
return super().save(*args, **kwargs)
|
2022-10-27 07:47:05 +00:00
|
|
|
|
|
|
|
|
|
def expire(self):
|
|
|
|
|
self.date_expired = timezone.now()
|
|
|
|
|
self.save()
|
2022-07-11 10:09:06 +00:00
|
|
|
|
|
|
|
|
|
def renewal(self):
|
|
|
|
|
""" 续期 Token,将来支持用户自定义创建 token 后,续期策略要修改 """
|
2022-11-22 13:54:40 +00:00
|
|
|
|
self.date_expired = date_expired_default()
|
2022-07-11 10:09:06 +00:00
|
|
|
|
self.save()
|
|
|
|
|
|
2022-11-23 08:11:17 +00:00
|
|
|
|
@lazyproperty
|
|
|
|
|
def permed_account(self):
|
|
|
|
|
from perms.utils import PermAccountUtil
|
|
|
|
|
permed_account = PermAccountUtil().validate_permission(
|
2022-12-05 04:42:15 +00:00
|
|
|
|
self.user, self.asset, self.account
|
2022-11-23 08:11:17 +00:00
|
|
|
|
)
|
|
|
|
|
return permed_account
|
|
|
|
|
|
|
|
|
|
@lazyproperty
|
|
|
|
|
def actions(self):
|
|
|
|
|
return self.permed_account.actions
|
|
|
|
|
|
|
|
|
|
@lazyproperty
|
|
|
|
|
def expire_at(self):
|
|
|
|
|
return self.permed_account.date_expired.timestamp()
|
2022-07-11 10:09:06 +00:00
|
|
|
|
|
2022-11-23 08:11:17 +00:00
|
|
|
|
def is_valid(self):
|
2023-01-16 11:02:09 +00:00
|
|
|
|
if not self.is_active:
|
|
|
|
|
error = _('Connection token inactive')
|
|
|
|
|
raise PermissionDenied(error)
|
2022-07-11 10:09:06 +00:00
|
|
|
|
if self.is_expired:
|
|
|
|
|
error = _('Connection token expired at: {}').format(as_current_tz(self.date_expired))
|
2022-11-23 08:11:17 +00:00
|
|
|
|
raise PermissionDenied(error)
|
2022-10-28 07:01:17 +00:00
|
|
|
|
if not self.user or not self.user.is_valid:
|
|
|
|
|
error = _('No user or invalid user')
|
2022-11-23 08:11:17 +00:00
|
|
|
|
raise PermissionDenied(error)
|
2022-11-08 06:30:07 +00:00
|
|
|
|
if not self.asset or not self.asset.is_active:
|
2022-10-26 08:09:07 +00:00
|
|
|
|
is_valid = False
|
2022-10-28 07:01:17 +00:00
|
|
|
|
error = _('No asset or inactive asset')
|
2022-10-26 08:09:07 +00:00
|
|
|
|
return is_valid, error
|
2022-12-05 04:42:15 +00:00
|
|
|
|
if not self.account:
|
2022-10-28 07:01:17 +00:00
|
|
|
|
error = _('No account')
|
2022-11-23 08:11:17 +00:00
|
|
|
|
raise PermissionDenied(error)
|
2022-11-22 13:54:40 +00:00
|
|
|
|
|
2022-12-07 07:09:01 +00:00
|
|
|
|
if timezone.now() - self.date_created < timedelta(seconds=60):
|
|
|
|
|
return True, None
|
|
|
|
|
|
2022-11-23 08:11:17 +00:00
|
|
|
|
if not self.permed_account or not self.permed_account.actions:
|
2022-11-22 13:54:40 +00:00
|
|
|
|
msg = 'user `{}` not has asset `{}` permission for login `{}`'.format(
|
2022-12-05 04:42:15 +00:00
|
|
|
|
self.user, self.asset, self.account
|
2022-11-22 13:54:40 +00:00
|
|
|
|
)
|
|
|
|
|
raise PermissionDenied(msg)
|
|
|
|
|
|
2022-11-23 08:11:17 +00:00
|
|
|
|
if self.permed_account.date_expired < timezone.now():
|
2022-11-22 13:54:40 +00:00
|
|
|
|
raise PermissionDenied('Expired')
|
2022-11-23 08:11:17 +00:00
|
|
|
|
return True
|
2022-07-11 10:09:06 +00:00
|
|
|
|
|
2022-10-28 07:58:05 +00:00
|
|
|
|
@lazyproperty
|
2022-11-22 13:54:40 +00:00
|
|
|
|
def platform(self):
|
|
|
|
|
return self.asset.platform
|
|
|
|
|
|
2022-12-07 07:09:01 +00:00
|
|
|
|
@lazyproperty
|
|
|
|
|
def connect_method_object(self):
|
|
|
|
|
from common.utils import get_request_os
|
|
|
|
|
from jumpserver.utils import get_current_request
|
|
|
|
|
from terminal.connect_methods import ConnectMethodUtil
|
|
|
|
|
|
|
|
|
|
request = get_current_request()
|
|
|
|
|
os = get_request_os(request) if request else 'windows'
|
|
|
|
|
method = ConnectMethodUtil.get_connect_method(
|
|
|
|
|
self.connect_method, protocol=self.protocol, os=os
|
|
|
|
|
)
|
|
|
|
|
return method
|
|
|
|
|
|
|
|
|
|
def get_remote_app_option(self):
|
|
|
|
|
cmdline = {
|
|
|
|
|
'app_name': self.connect_method,
|
|
|
|
|
'user_id': str(self.user.id),
|
|
|
|
|
'asset_id': str(self.asset.id),
|
|
|
|
|
'token_id': str(self.id)
|
|
|
|
|
}
|
|
|
|
|
cmdline_b64 = base64.b64encode(json.dumps(cmdline).encode()).decode()
|
|
|
|
|
app = '||tinker'
|
|
|
|
|
options = {
|
|
|
|
|
'remoteapplicationmode:i': '1',
|
|
|
|
|
'remoteapplicationprogram:s': app,
|
|
|
|
|
'remoteapplicationname:s': app,
|
|
|
|
|
'alternate shell:s': app,
|
|
|
|
|
'remoteapplicationcmdline:s': cmdline_b64,
|
|
|
|
|
}
|
|
|
|
|
return options
|
|
|
|
|
|
|
|
|
|
def get_applet_option(self):
|
|
|
|
|
method = self.connect_method_object
|
|
|
|
|
if not method or method.get('type') != 'applet' or method.get('disabled', False):
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
applet = Applet.objects.filter(name=method.get('value')).first()
|
|
|
|
|
if not applet:
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
host_account = applet.select_host_account()
|
|
|
|
|
if not host_account:
|
2023-02-10 11:40:35 +00:00
|
|
|
|
raise JMSException({'error': 'No host account available'})
|
2022-12-07 07:09:01 +00:00
|
|
|
|
|
|
|
|
|
host, account, lock_key, ttl = bulk_get(host_account, ('host', 'account', 'lock_key', 'ttl'))
|
|
|
|
|
gateway = host.gateway.select_gateway() if host.domain else None
|
|
|
|
|
|
|
|
|
|
data = {
|
|
|
|
|
'id': account.id,
|
|
|
|
|
'applet': applet,
|
|
|
|
|
'host': host,
|
|
|
|
|
'gateway': gateway,
|
|
|
|
|
'account': account,
|
|
|
|
|
'remote_app_option': self.get_remote_app_option()
|
|
|
|
|
}
|
|
|
|
|
token_account_relate_key = f'token_account_relate_{account.id}'
|
|
|
|
|
cache.set(token_account_relate_key, lock_key, ttl)
|
|
|
|
|
return data
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def release_applet_account(account_id):
|
|
|
|
|
token_account_relate_key = f'token_account_relate_{account_id}'
|
|
|
|
|
lock_key = cache.get(token_account_relate_key)
|
|
|
|
|
if lock_key:
|
|
|
|
|
cache.delete(lock_key)
|
|
|
|
|
cache.delete(token_account_relate_key)
|
2023-02-10 11:40:35 +00:00
|
|
|
|
return True
|
2022-12-07 07:09:01 +00:00
|
|
|
|
|
2022-11-22 13:54:40 +00:00
|
|
|
|
@lazyproperty
|
2022-12-05 04:42:15 +00:00
|
|
|
|
def account_object(self):
|
2023-01-16 11:02:09 +00:00
|
|
|
|
from accounts.models import Account
|
2022-10-28 07:58:05 +00:00
|
|
|
|
if not self.asset:
|
|
|
|
|
return None
|
2022-11-22 13:54:40 +00:00
|
|
|
|
|
2022-12-05 04:42:15 +00:00
|
|
|
|
account = self.asset.accounts.filter(name=self.account).first()
|
|
|
|
|
if self.account == '@INPUT' or not account:
|
2022-12-02 10:09:07 +00:00
|
|
|
|
data = {
|
2022-12-05 04:42:15 +00:00
|
|
|
|
'name': self.account,
|
2022-11-30 08:33:22 +00:00
|
|
|
|
'username': self.input_username,
|
2022-11-22 13:54:40 +00:00
|
|
|
|
'secret_type': 'password',
|
2022-11-30 08:33:22 +00:00
|
|
|
|
'secret': self.input_secret,
|
2022-12-02 10:09:07 +00:00
|
|
|
|
'su_from': None,
|
|
|
|
|
'org_id': self.asset.org_id
|
2022-11-23 08:11:17 +00:00
|
|
|
|
}
|
2022-11-22 13:54:40 +00:00
|
|
|
|
else:
|
2022-12-02 10:09:07 +00:00
|
|
|
|
data = {
|
2022-11-23 08:11:17 +00:00
|
|
|
|
'name': account.name,
|
|
|
|
|
'username': account.username,
|
|
|
|
|
'secret_type': account.secret_type,
|
2022-11-30 08:33:22 +00:00
|
|
|
|
'secret': account.secret or self.input_secret,
|
|
|
|
|
'su_from': account.su_from,
|
2023-03-15 03:30:36 +00:00
|
|
|
|
'org_id': account.org_id,
|
|
|
|
|
'privileged': account.privileged
|
2022-11-23 08:11:17 +00:00
|
|
|
|
}
|
2022-12-02 10:09:07 +00:00
|
|
|
|
return Account(**data)
|
2022-10-28 07:58:05 +00:00
|
|
|
|
|
2022-07-11 10:09:06 +00:00
|
|
|
|
@lazyproperty
|
|
|
|
|
def domain(self):
|
2023-02-16 08:51:42 +00:00
|
|
|
|
if not self.asset.platform.domain_enabled:
|
|
|
|
|
return
|
2023-04-12 03:43:06 +00:00
|
|
|
|
if self.asset.platform.name == GATEWAY_NAME:
|
|
|
|
|
return
|
|
|
|
|
domain = self.asset.domain if self.asset.domain else None
|
2022-07-11 10:09:06 +00:00
|
|
|
|
return domain
|
|
|
|
|
|
|
|
|
|
@lazyproperty
|
|
|
|
|
def gateway(self):
|
2023-04-12 03:43:06 +00:00
|
|
|
|
if not self.asset or not self.domain:
|
2022-07-11 10:09:06 +00:00
|
|
|
|
return
|
2023-02-16 08:51:42 +00:00
|
|
|
|
return self.asset.gateway
|
2022-07-11 10:09:06 +00:00
|
|
|
|
|
|
|
|
|
@lazyproperty
|
2022-12-05 05:27:51 +00:00
|
|
|
|
def command_filter_acls(self):
|
2022-12-02 09:48:44 +00:00
|
|
|
|
from acls.models import CommandFilterACL
|
2022-07-11 10:09:06 +00:00
|
|
|
|
kwargs = {
|
2022-12-03 16:04:39 +00:00
|
|
|
|
'user': self.user,
|
|
|
|
|
'asset': self.asset,
|
2022-12-06 03:03:14 +00:00
|
|
|
|
'account': self.account_object,
|
2022-07-11 10:09:06 +00:00
|
|
|
|
}
|
2022-12-05 05:27:51 +00:00
|
|
|
|
acls = CommandFilterACL.filter_queryset(**kwargs).valid()
|
|
|
|
|
return acls
|
2022-07-11 10:09:06 +00:00
|
|
|
|
|
2022-03-02 12:48:43 +00:00
|
|
|
|
|
|
|
|
|
class SuperConnectionToken(ConnectionToken):
|
|
|
|
|
class Meta:
|
|
|
|
|
proxy = True
|
|
|
|
|
verbose_name = _("Super connection token")
|