jumpserver/apps/terminal/api/session/task.py

108 lines
3.9 KiB
Python
Raw Normal View History

# -*- coding: utf-8 -*-
#
import logging
2023-02-20 05:36:50 +00:00
from rest_framework import status
from rest_framework.decorators import action
from rest_framework.permissions import IsAuthenticated
2023-02-20 05:36:50 +00:00
from rest_framework.views import APIView, Response
2023-02-20 05:36:50 +00:00
from common.api import JMSBulkModelViewSet
from common.const.http import POST
from common.utils import get_object_or_none
from orgs.utils import tmp_to_root_org
2022-10-25 04:57:34 +00:00
from terminal import serializers
from terminal.const import TaskNameType
2023-02-20 05:36:50 +00:00
from terminal.models import Session, Task
2022-10-25 04:57:34 +00:00
from terminal.utils import is_session_approver
__all__ = ['TaskViewSet', 'KillSessionAPI', 'KillSessionForTicketAPI', ]
logger = logging.getLogger(__file__)
2023-02-20 05:36:50 +00:00
class TaskViewSet(JMSBulkModelViewSet):
queryset = Task.objects.all()
serializer_class = serializers.TaskSerializer
filterset_fields = ('is_finished',)
serializer_classes = {
'create_toggle_task': serializers.LockTaskSessionSerializer,
'handle_ticket_task': serializers.LockTaskSessionSerializer,
'default': serializers.TaskSerializer
}
rbac_perms = {
"create_toggle_task": "terminal.terminate_session",
}
@action(methods=[POST], detail=False, url_path='toggle-lock-session')
def create_toggle_task(self, request, *args, **kwargs):
serializer = self.get_serializer(data=request.data)
serializer.is_valid(raise_exception=True)
session_id = serializer.validated_data['session_id']
task_name = serializer.validated_data['task_name']
session_ids = [session_id, ]
validated_session = create_sessions_tasks(session_ids, request.user, task_name=task_name)
return Response({"ok": validated_session})
@action(methods=[POST], detail=False, permission_classes=[IsAuthenticated, ],
url_path='toggle-lock-session-for-ticket', )
def handle_ticket_task(self, request, *args, **kwargs):
serializer = self.get_serializer(data=request.data)
serializer.is_valid(raise_exception=True)
session_id = serializer.validated_data['session_id']
task_name = serializer.validated_data['task_name']
session_ids = [session_id, ]
user_id = request.user.id
for session_id in session_ids:
if not is_session_approver(session_id, user_id):
return Response({}, status=status.HTTP_403_FORBIDDEN)
with tmp_to_root_org():
validated_session = create_sessions_tasks(session_ids, request.user, task_name=task_name)
return Response({"ok": validated_session})
def create_sessions_tasks(session_ids, user, task_name=TaskNameType.kill_session):
validated_session = []
for session_id in session_ids:
session = get_object_or_none(Session, id=session_id)
if session and not session.is_finished:
validated_session.append(session_id)
Task.objects.create(
name=task_name, args=session.id, terminal=session.terminal,
kwargs={
'terminated_by': str(user),
'created_by': str(user)
}
)
return validated_session
class KillSessionAPI(APIView):
fix: fix rbac to dev (#7636) * feat: 添加 RBAC 应用模块 * feat: 添加 RBAC Model、API * feat: 添加 RBAC Model、API 2 * feat: 添加 RBAC Model、API 3 * feat: 添加 RBAC Model、API 4 * feat: RBAC * feat: RBAC * feat: RBAC * feat: RBAC * feat: RBAC * feat: RBAC 整理权限位 * feat: RBAC 整理权限位2 * feat: RBAC 整理权限位2 * feat: RBAC 整理权限位 * feat: RBAC 添加默认角色 * feat: RBAC 添加迁移文件;迁移用户角色->用户角色绑定 * feat: RBAC 添加迁移文件;迁移用户角色->用户角色绑定 * feat: RBAC 修改用户模块API * feat: RBAC 添加组织模块迁移文件 & 修改组织模块API * feat: RBAC 添加组织模块迁移文件 & 修改组织模块API * feat: RBAC 修改用户角色属性的使用 * feat: RBAC No.1 * xxx * perf: 暂存 * perf: ... * perf(rbac): 添加 perms 到 profile serializer 中 * stash * perf: 使用init * perf: 修改migrations * perf: rbac * stash * stash * pref: 修改rbac * stash it * stash: 先去修复其他bug * perf: 修改 role 添加 users * pref: 修改 RBAC Model * feat: 添加权限的 tree api * stash: 暂存一下 * stash: 暂存一下 * perf: 修改 model verbose name * feat: 添加model各种 verbose name * perf: 生成 migrations * perf: 优化权限位 * perf: 添加迁移脚本 * feat: 添加组织角色迁移 * perf: 添加迁移脚本 * stash * perf: 添加migrateion * perf: 暂存一下 * perf: 修改rbac * perf: stash it * fix: 迁移冲突 * fix: 迁移冲突 * perf: 暂存一下 * perf: 修改 rbac 逻辑 * stash: 暂存一下 * perf: 修改内置角色 * perf: 解决 root 组织的问题 * perf: stash it * perf: 优化 rbac * perf: 优化 rolebinding 处理 * perf: 完成用户离开组织的问题 * perf: 暂存一下 * perf: 修改翻译 * perf: 去掉了 IsSuperUser * perf: IsAppUser 去掉完成 * perf: 修改 connection token 的权限 * perf: 去掉导入的问题 * perf: perms define 格式,修改 app 用户 的全新啊 * perf: 修改 permission * perf: 去掉一些 org admin * perf: 去掉部分 org admin * perf: 再去掉点 org admin role * perf: 再去掉部分 org admin * perf: user 角色搜索 * perf: 去掉很多 js * perf: 添加权限位 * perf: 修改权限 * perf: 去掉一个 todo * merge: with dev * fix: 修复冲突 Co-authored-by: Bai <bugatti_it@163.com> Co-authored-by: Michael Bai <baijiangjie@gmail.com> Co-authored-by: ibuler <ibuler@qq.com>
2022-02-17 12:13:31 +00:00
model = Task
rbac_perms = {
'POST': 'terminal.terminate_session'
}
2022-02-23 09:09:09 +00:00
def post(self, request, *args, **kwargs):
session_ids = request.data
validated_session = create_sessions_tasks(session_ids, request.user)
2022-02-23 09:09:09 +00:00
return Response({"ok": validated_session})
class KillSessionForTicketAPI(APIView):
2023-02-20 05:36:50 +00:00
permission_classes = (IsAuthenticated,)
def post(self, request, *args, **kwargs):
session_ids = request.data
user_id = request.user.id
for session_id in session_ids:
if not is_session_approver(session_id, user_id):
return Response({}, status=status.HTTP_403_FORBIDDEN)
with tmp_to_root_org():
validated_session = create_sessions_tasks(session_ids, request.user)
return Response({"ok": validated_session})