|
|
|
# ~*~ coding: utf-8 ~*~
|
|
|
|
#
|
|
|
|
|
|
|
|
import base64
|
|
|
|
|
|
|
|
from django.shortcuts import get_object_or_404
|
|
|
|
from django.core.cache import cache
|
|
|
|
from django.conf import settings
|
|
|
|
from rest_framework import generics, status
|
|
|
|
from rest_framework.response import Response
|
|
|
|
from rest_framework.views import APIView
|
|
|
|
from rest_framework_bulk import ListBulkCreateUpdateDestroyAPIView
|
|
|
|
from rest_framework import authentication
|
|
|
|
|
|
|
|
from common.mixins import BulkDeleteApiMixin
|
|
|
|
from common.utils import get_logger
|
|
|
|
from .utils import check_user_valid, token_gen
|
|
|
|
from .models import User, UserGroup
|
|
|
|
from .serializers import UserDetailSerializer, UserAndGroupSerializer, \
|
|
|
|
GroupDetailSerializer, UserPKUpdateSerializer, UserBulkUpdateSerializer, GroupBulkUpdateSerializer
|
|
|
|
from .backends import IsSuperUser, IsTerminalUser, IsValidUser, IsSuperUserOrTerminalUser
|
|
|
|
|
|
|
|
|
|
|
|
logger = get_logger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class UserDetailApi(generics.RetrieveUpdateDestroyAPIView):
|
|
|
|
queryset = User.objects.all()
|
|
|
|
serializer_class = UserDetailSerializer
|
|
|
|
permission_classes = (IsSuperUser,)
|
|
|
|
|
|
|
|
|
|
|
|
class UserAndGroupEditApi(generics.RetrieveUpdateAPIView):
|
|
|
|
queryset = User.objects.all()
|
|
|
|
serializer_class = UserAndGroupSerializer
|
|
|
|
permission_classes = (IsSuperUser,)
|
|
|
|
|
|
|
|
|
|
|
|
class UserResetPasswordApi(generics.UpdateAPIView):
|
|
|
|
queryset = User.objects.all()
|
|
|
|
serializer_class = UserDetailSerializer
|
|
|
|
|
|
|
|
def perform_update(self, serializer):
|
|
|
|
# Note: we are not updating the user object here.
|
|
|
|
# We just do the reset-password staff.
|
|
|
|
user = self.get_object()
|
|
|
|
import uuid
|
|
|
|
user.password_raw = str(uuid.uuid4())
|
|
|
|
user.save()
|
|
|
|
from .utils import send_reset_password_mail
|
|
|
|
send_reset_password_mail(user)
|
|
|
|
|
|
|
|
|
|
|
|
class UserResetPKApi(generics.UpdateAPIView):
|
|
|
|
queryset = User.objects.all()
|
|
|
|
serializer_class = UserDetailSerializer
|
|
|
|
|
|
|
|
def perform_update(self, serializer):
|
|
|
|
user = self.get_object()
|
|
|
|
user.is_public_key_valid = False
|
|
|
|
user.save()
|
|
|
|
from .utils import send_reset_ssh_key_mail
|
|
|
|
send_reset_ssh_key_mail(user)
|
|
|
|
|
|
|
|
|
|
|
|
class UserUpdatePKApi(generics.UpdateAPIView):
|
|
|
|
queryset = User.objects.all()
|
|
|
|
serializer_class = UserPKUpdateSerializer
|
|
|
|
|
|
|
|
def perform_update(self, serializer):
|
|
|
|
user = self.get_object()
|
|
|
|
user.private_key = serializer.validated_data['_public_key']
|
|
|
|
user.save()
|
|
|
|
|
|
|
|
|
|
|
|
class GroupDetailApi(generics.RetrieveUpdateDestroyAPIView):
|
|
|
|
queryset = UserGroup.objects.all()
|
|
|
|
serializer_class = GroupDetailSerializer
|
|
|
|
|
|
|
|
def perform_update(self, serializer):
|
|
|
|
users = serializer.validated_data.get('users')
|
|
|
|
if users:
|
|
|
|
group = self.get_object()
|
|
|
|
# Note: use `list` method to force hitting the db.
|
|
|
|
group_users = list(group.users.all())
|
|
|
|
serializer.save()
|
|
|
|
group.users.set(users + group_users)
|
|
|
|
group.save()
|
|
|
|
return
|
|
|
|
serializer.save()
|
|
|
|
|
|
|
|
|
|
|
|
class UserListUpdateApi(BulkDeleteApiMixin, ListBulkCreateUpdateDestroyAPIView):
|
|
|
|
queryset = User.objects.all()
|
|
|
|
serializer_class = UserBulkUpdateSerializer
|
|
|
|
permission_classes = (IsSuperUserOrTerminalUser,)
|
|
|
|
|
|
|
|
# def get(self, request, *args, **kwargs):
|
|
|
|
# return super(UserListUpdateApi, self).get(request, *args, **kwargs)
|
|
|
|
|
|
|
|
|
|
|
|
class GroupListUpdateApi(BulkDeleteApiMixin, ListBulkCreateUpdateDestroyAPIView):
|
|
|
|
queryset = UserGroup.objects.all()
|
|
|
|
serializer_class = GroupBulkUpdateSerializer
|
|
|
|
|
|
|
|
|
|
|
|
class DeleteUserFromGroupApi(generics.DestroyAPIView):
|
|
|
|
queryset = UserGroup.objects.all()
|
|
|
|
serializer_class = GroupDetailSerializer
|
|
|
|
|
|
|
|
def destroy(self, request, *args, **kwargs):
|
|
|
|
group = self.get_object()
|
|
|
|
self.perform_destroy(group, **kwargs)
|
|
|
|
return Response(status=status.HTTP_204_NO_CONTENT)
|
|
|
|
|
|
|
|
def perform_destroy(self, instance, **kwargs):
|
|
|
|
user_id = kwargs.get('uid')
|
|
|
|
user = get_object_or_404(User, id=user_id)
|
|
|
|
instance.users.remove(user)
|
|
|
|
|
|
|
|
|
|
|
|
class UserTokenApi(APIView):
|
|
|
|
permission_classes = ()
|
|
|
|
expiration = settings.CONFIG.TOKEN_EXPIRATION or 3600
|
|
|
|
|
|
|
|
def post(self, request, *args, **kwargs):
|
|
|
|
username = request.data.get('username', '')
|
|
|
|
password = request.data.get('password', '')
|
|
|
|
public_key = request.data.get('public_key', '')
|
|
|
|
remote_addr = request.META.get('REMOTE_ADDR', '')
|
|
|
|
|
|
|
|
remote_addr = base64.b64encode(remote_addr).replace('=', '')
|
|
|
|
user = check_user_valid(username=username, password=password, public_key=public_key)
|
|
|
|
if user:
|
|
|
|
token = cache.get('%s_%s' % (user.id, remote_addr))
|
|
|
|
if not token:
|
|
|
|
token = token_gen(user)
|
|
|
|
|
|
|
|
cache.set(token, user.id, self.expiration)
|
|
|
|
cache.set('%s_%s' % (user.id, remote_addr), token, self.expiration)
|
|
|
|
return Response({'token': token, 'id': user.id, 'username': user.username, 'name': user.name})
|
|
|
|
else:
|
|
|
|
return Response({'msg': 'Invalid password or public key or user is not active or expired'}, status=401)
|