[Update] 用户权限增加cache

pull/2485/head
ibuler 2019-03-05 19:47:14 +08:00
parent dfd26d88d4
commit 58c4a46f6e
16 changed files with 261 additions and 72 deletions

View File

@ -29,6 +29,7 @@ class Node(OrgModelMixin):
class Meta: class Meta:
verbose_name = _("Node") verbose_name = _("Node")
ordering = ['key']
def __str__(self): def __str__(self):
return self.full_value return self.full_value

View File

@ -1,5 +0,0 @@
# -*- coding: utf-8 -*-
#
from django.dispatch import Signal
on_app_ready = Signal()

View File

@ -17,7 +17,6 @@
<div class="file-manager "> <div class="file-manager ">
<div id="assetTree" class="ztree"> <div id="assetTree" class="ztree">
</div> </div>
<div class="clearfix"></div> <div class="clearfix"></div>
</div> </div>
</div> </div>
@ -62,16 +61,19 @@
{% block custom_foot_js %} {% block custom_foot_js %}
<script> <script>
var treeUrl = "{% url 'api-perms:my-nodes-assets-as-tree' %}?show_assets=0&cache_policy=1";
var zTree, asset_table, show=0; var zTree, asset_table, show=0;
var inited = false; var inited = false;
var url; var url;
function initTable() { function initTable() {
if (inited){ if (inited){
return return
} else { } else {
inited = true; inited = true;
} }
url = "{% url 'api-perms:my-assets' %}"; url = "{% url 'api-perms:my-assets' %}?cache_policy=1";
var options = { var options = {
ele: $('#user_assets_table'), ele: $('#user_assets_table'),
columnDefs: [ columnDefs: [
@ -106,7 +108,7 @@ function initTable() {
} }
function onSelected(event, treeNode) { function onSelected(event, treeNode) {
url = '{% url "api-perms:my-node-assets" node_id=DEFAULT_PK %}'; url = '{% url "api-perms:my-node-assets" node_id=DEFAULT_PK %}?cache_policy=1';
var node_id = treeNode.meta.node.id; var node_id = treeNode.meta.node.id;
url = url.replace("{{ DEFAULT_PK }}", node_id); url = url.replace("{{ DEFAULT_PK }}", node_id);
setCookie('node_selected', treeNode.id); setCookie('node_selected', treeNode.id);
@ -118,7 +120,7 @@ function initTree() {
var setting = { var setting = {
view: { view: {
dblClickExpand: false, dblClickExpand: false,
showLine: true showLine: true,
}, },
data: { data: {
simpleData: { simpleData: {
@ -131,10 +133,14 @@ function initTree() {
}; };
var zNodes = []; var zNodes = [];
$.get("{% url 'api-perms:my-nodes-assets-as-tree' %}?show_assets=0", function(data, status){ $.get(treeUrl, function(data, status){
zNodes = data; zNodes = data;
$.fn.zTree.init($("#assetTree"), setting, zNodes); $.fn.zTree.init($("#assetTree"), setting, zNodes);
zTree = $.fn.zTree.getZTreeObj("assetTree"); zTree = $.fn.zTree.getZTreeObj("assetTree");
rootNodeAddDom(zTree, function () {
treeUrl = treeUrl.replace('cache_policy=1', 'cache_policy=2');
initTree();
});
}); });
} }

View File

@ -0,0 +1,20 @@
# -*- coding: utf-8 -*-
#
from django.shortcuts import render
from django.http import JsonResponse
def handler404(request, *args, **argv):
if request.content_type.find('application/json') > -1:
response = JsonResponse({'error': 'Not found'}, status=404)
else:
response = render(request, '404.html', status=404)
return response
def handler500(request, *args, **argv):
if request.content_type.find('application/json') > -1:
response = JsonResponse({'error': 'Server internal error'}, status=500)
else:
response = render(request, '500.html', status=500)
return response

View File

@ -21,7 +21,7 @@ api_v1_patterns = [
path('audits/v1/', include('audits.urls.api_urls', namespace='api-audits')), path('audits/v1/', include('audits.urls.api_urls', namespace='api-audits')),
path('orgs/v1/', include('orgs.urls.api_urls', namespace='api-orgs')), path('orgs/v1/', include('orgs.urls.api_urls', namespace='api-orgs')),
path('settings/v1/', include('settings.urls.api_urls', namespace='api-settings')), path('settings/v1/', include('settings.urls.api_urls', namespace='api-settings')),
path('authentication/v1/', include('authentication.urls.api_urls', namespace='api-auth')), path('authentication/v1/', include('authentication.urls.api_urls', namespace='api-auth')),
])) ]))
] ]
@ -68,6 +68,9 @@ urlpatterns += static(settings.MEDIA_URL, document_root=settings.MEDIA_ROOT) \
+ static(settings.STATIC_URL, document_root=settings.STATIC_ROOT) + static(settings.STATIC_URL, document_root=settings.STATIC_ROOT)
urlpatterns += js_i18n_patterns urlpatterns += js_i18n_patterns
handler404 = 'jumpserver.error_views.handler404'
handler500 = 'jumpserver.error_views.handler500'
if settings.DEBUG: if settings.DEBUG:
urlpatterns += [ urlpatterns += [
re_path('^swagger(?P<format>\.json|\.yaml)$', re_path('^swagger(?P<format>\.json|\.yaml)$',

View File

@ -110,9 +110,9 @@ function initTree() {
onCheck: onCheck onCheck: onCheck
} }
}; };
var url = "{% url 'api-perms:my-nodes-assets-as-tree' %}"; var url = "{% url 'api-perms:my-nodes-assets-as-tree' %}?cache_policy=1";
if (systemUserId) { if (systemUserId) {
url += '?system_user=' + systemUserId url += '&system_user=' + systemUserId
} }
$.get(url, function(data, status){ $.get(url, function(data, status){

View File

@ -1,6 +1,9 @@
# -*- coding: utf-8 -*- # -*- coding: utf-8 -*-
# #
from hashlib import md5
from django.core.cache import cache
from django.conf import settings
from django.shortcuts import get_object_or_404 from django.shortcuts import get_object_or_404
from rest_framework.views import APIView, Response from rest_framework.views import APIView, Response
from rest_framework.generics import ( from rest_framework.generics import (
@ -10,6 +13,7 @@ from rest_framework.pagination import LimitOffsetPagination
from common.permissions import IsValidUser, IsOrgAdminOrAppUser from common.permissions import IsValidUser, IsOrgAdminOrAppUser
from common.tree import TreeNodeSerializer from common.tree import TreeNodeSerializer
from common.utils import get_logger
from orgs.utils import set_to_root_org from orgs.utils import set_to_root_org
from ..utils import ( from ..utils import (
AssetPermissionUtil, parse_asset_to_tree_node, parse_node_to_tree_node AssetPermissionUtil, parse_asset_to_tree_node, parse_node_to_tree_node
@ -21,6 +25,7 @@ from ..hands import (
from .. import serializers from .. import serializers
from ..mixins import AssetsFilterMixin from ..mixins import AssetsFilterMixin
logger = get_logger(__name__)
__all__ = [ __all__ = [
'UserGrantedAssetsApi', 'UserGrantedNodesApi', 'UserGrantedAssetsApi', 'UserGrantedNodesApi',
@ -32,18 +37,61 @@ __all__ = [
class UserPermissionMixin: class UserPermissionMixin:
cache_policy = '0' cache_policy = '0'
RESP_CACHE_KEY = '_PERMISSION_RESPONSE_CACHE_{}'
CACHE_TIME = settings.ASSETS_PERM_CACHE_TIME
@staticmethod @staticmethod
def change_org_if_need(request, kwargs): def change_org_if_need(request, kwargs):
if request.user.is_superuser or \ if request.user.is_authenticated and \
request.user.is_superuser or \
request.user.is_app or \ request.user.is_app or \
kwargs.get('pk') is None: kwargs.get('pk') is None:
set_to_root_org() set_to_root_org()
def dispatch(self, request, *args, **kwargs): def get_response_from_cache(self, request):
if self.cache_policy in ['1', 'using']:
path_md5 = md5(request.get_full_path().encode()).hexdigest()
obj = self.get_object()
util = AssetPermissionUtil(obj, cache_policy=self.cache_policy)
cache_id = '{}_{}'.format(path_md5, util.cache_meta.get('id'))
response = self.get_cache_response(cache_id)
return response
return None
def get(self, request, *args, **kwargs):
self.change_org_if_need(request, kwargs) self.change_org_if_need(request, kwargs)
self.cache_policy = request.GET.get('cache_policy', '0') self.cache_policy = request.GET.get('cache_policy', '0')
return super().dispatch(request, *args, **kwargs) path_md5 = md5(request.get_full_path().encode()).hexdigest()
path_cache_key = '{}_{}'.format(path_md5, '*')
if self.cache_policy in AssetPermissionUtil.CACHE_POLICY_MAP[0]:
return super().get(request, *args, **kwargs)
elif self.cache_policy in AssetPermissionUtil.CACHE_POLICY_MAP[2]:
self.expire_cache_response(path_cache_key)
obj = self.get_object()
util = AssetPermissionUtil(obj, cache_policy=self.cache_policy)
cache_id = '{}_{}'.format(path_md5, util.cache_meta.get('id'))
response = self.get_cache_response(cache_id)
if not response:
response = super().get(request, *args, **kwargs)
self.set_cache_response(cache_id, response)
return response
def get_cache_response(self, _id):
if not _id:
return None
key = self.RESP_CACHE_KEY.format(_id)
data = cache.get(key)
if not data:
return None
return Response(data)
def expire_cache_response(self, _id):
key = self.RESP_CACHE_KEY.format(_id)
cache.delete(key)
def set_cache_response(self, _id, response):
key = self.RESP_CACHE_KEY.format(_id)
cache.set(key, response.data, self.CACHE_TIME)
class UserGrantedAssetsApi(UserPermissionMixin, AssetsFilterMixin, ListAPIView): class UserGrantedAssetsApi(UserPermissionMixin, AssetsFilterMixin, ListAPIView):
@ -54,15 +102,18 @@ class UserGrantedAssetsApi(UserPermissionMixin, AssetsFilterMixin, ListAPIView):
serializer_class = AssetGrantedSerializer serializer_class = AssetGrantedSerializer
pagination_class = LimitOffsetPagination pagination_class = LimitOffsetPagination
def get_queryset(self): def get_object(self):
user_id = self.kwargs.get('pk', '') user_id = self.kwargs.get('pk', '')
queryset = []
if user_id: if user_id:
user = get_object_or_404(User, id=user_id) user = get_object_or_404(User, id=user_id)
else: else:
user = self.request.user user = self.request.user
return user
def get_queryset(self):
queryset = []
user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy) util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
assets = util.get_assets() assets = util.get_assets()
for k, v in assets.items(): for k, v in assets.items():
@ -84,12 +135,16 @@ class UserGrantedNodesApi(UserPermissionMixin, ListAPIView):
permission_classes = (IsOrgAdminOrAppUser,) permission_classes = (IsOrgAdminOrAppUser,)
serializer_class = NodeSerializer serializer_class = NodeSerializer
def get_queryset(self): def get_object(self):
user_id = self.kwargs.get('pk', '') user_id = self.kwargs.get('pk', '')
if user_id: if user_id:
user = get_object_or_404(User, id=user_id) user = get_object_or_404(User, id=user_id)
else: else:
user = self.request.user user = self.request.user
return user
def get_queryset(self):
user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy) util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
nodes = util.get_nodes_with_assets() nodes = util.get_nodes_with_assets()
return nodes.keys() return nodes.keys()
@ -107,14 +162,17 @@ class UserGrantedNodesWithAssetsApi(UserPermissionMixin, AssetsFilterMixin, List
permission_classes = (IsOrgAdminOrAppUser,) permission_classes = (IsOrgAdminOrAppUser,)
serializer_class = serializers.NodeGrantedSerializer serializer_class = serializers.NodeGrantedSerializer
def get_queryset(self): def get_object(self):
user_id = self.kwargs.get('pk', '') user_id = self.kwargs.get('pk', '')
queryset = []
if not user_id: if not user_id:
user = self.request.user user = self.request.user
else: else:
user = get_object_or_404(User, id=user_id) user = get_object_or_404(User, id=user_id)
return user
def get_queryset(self):
queryset = []
user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy) util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
nodes = util.get_nodes_with_assets() nodes = util.get_nodes_with_assets()
for node, _assets in nodes.items(): for node, _assets in nodes.items():
@ -154,17 +212,22 @@ class UserGrantedNodesWithAssetsAsTreeApi(UserPermissionMixin, ListAPIView):
self.permission_classes = (IsValidUser,) self.permission_classes = (IsValidUser,)
return super().get_permissions() return super().get_permissions()
def get_queryset(self): def get_object(self):
user_id = self.kwargs.get('pk', '') user_id = self.kwargs.get('pk', '')
queryset = []
if not user_id: if not user_id:
user = self.request.user user = self.request.user
else: else:
user = get_object_or_404(User, id=user_id) user = get_object_or_404(User, id=user_id)
return user
def get_queryset(self):
queryset = []
user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy) util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
if self.system_user_id: if self.system_user_id:
util.filter_permission_with_system_user( util.filter_permission_with_system_user(
system_user=self.system_user_id) system_user=self.system_user_id
)
nodes = util.get_nodes_with_assets() nodes = util.get_nodes_with_assets()
for node, assets in nodes.items(): for node, assets in nodes.items():
data = parse_node_to_tree_node(node) data = parse_node_to_tree_node(node)
@ -186,14 +249,18 @@ class UserGrantedNodeAssetsApi(UserPermissionMixin, AssetsFilterMixin, ListAPIVi
serializer_class = AssetGrantedSerializer serializer_class = AssetGrantedSerializer
pagination_class = LimitOffsetPagination pagination_class = LimitOffsetPagination
def get_queryset(self): def get_object(self):
user_id = self.kwargs.get('pk', '') user_id = self.kwargs.get('pk', '')
node_id = self.kwargs.get('node_id')
if user_id: if user_id:
user = get_object_or_404(User, id=user_id) user = get_object_or_404(User, id=user_id)
else: else:
user = self.request.user user = self.request.user
return user
def get_queryset(self):
user = self.get_object()
node_id = self.kwargs.get('node_id')
util = AssetPermissionUtil(user, cache_policy=self.cache_policy) util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
node = get_object_or_404(Node, id=node_id) node = get_object_or_404(Node, id=node_id)
nodes = util.get_nodes_with_assets() nodes = util.get_nodes_with_assets()
@ -217,8 +284,12 @@ class UserGrantedNodeChildrenApi(UserPermissionMixin, ListAPIView):
permission_classes = (IsValidUser,) permission_classes = (IsValidUser,)
serializer_class = serializers.AssetPermissionNodeSerializer serializer_class = serializers.AssetPermissionNodeSerializer
def get_object(self):
return self.request.user
def get_children_queryset(self): def get_children_queryset(self):
util = AssetPermissionUtil(self.request.user, cache_policy=self.cache_policy) user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
node_id = self.request.query_params.get('id') node_id = self.request.query_params.get('id')
nodes_granted = util.get_nodes_with_assets() nodes_granted = util.get_nodes_with_assets()
if not nodes_granted: if not nodes_granted:
@ -258,7 +329,8 @@ class UserGrantedNodeChildrenApi(UserPermissionMixin, ListAPIView):
return queryset return queryset
def get_search_queryset(self, keyword): def get_search_queryset(self, keyword):
util = AssetPermissionUtil(self.request.user, cache_policy=self.cache_policy) user = self.get_object()
util = AssetPermissionUtil(user, cache_policy=self.cache_policy)
nodes_granted = util.get_nodes_with_assets() nodes_granted = util.get_nodes_with_assets()
queryset = [] queryset = []
for node, assets in nodes_granted.items(): for node, assets in nodes_granted.items():
@ -294,7 +366,7 @@ class UserGrantedNodeChildrenApi(UserPermissionMixin, ListAPIView):
class ValidateUserAssetPermissionApi(UserPermissionMixin, APIView): class ValidateUserAssetPermissionApi(UserPermissionMixin, APIView):
permission_classes = (IsOrgAdminOrAppUser,) permission_classes = (IsOrgAdminOrAppUser,)
def get(self, request): def get(self, request, *args, **kwargs):
user_id = request.query_params.get('user_id', '') user_id = request.query_params.get('user_id', '')
asset_id = request.query_params.get('asset_id', '') asset_id = request.query_params.get('asset_id', '')
system_id = request.query_params.get('system_user_id', '') system_id = request.query_params.get('system_user_id', '')

View File

@ -1,15 +1,26 @@
# -*- coding: utf-8 -*- # -*- coding: utf-8 -*-
# #
from django.db.models.signals import m2m_changed from django.db.models.signals import m2m_changed, post_save, post_delete
from django.dispatch import receiver from django.dispatch import receiver
from common.utils import get_logger from common.utils import get_logger
from .utils import AssetPermissionUtil
from .models import AssetPermission from .models import AssetPermission
logger = get_logger(__file__) logger = get_logger(__file__)
@receiver(post_save)
def on_permission_update(sender, **kwargs):
AssetPermissionUtil.expire_all_cache()
@receiver(post_delete)
def on_permission_delete(sender, **kwargs):
AssetPermissionUtil.expire_all_cache()
@receiver(m2m_changed, sender=AssetPermission.nodes.through) @receiver(m2m_changed, sender=AssetPermission.nodes.through)
def on_permission_nodes_changed(sender, instance=None, **kwargs): def on_permission_nodes_changed(sender, instance=None, **kwargs):
if isinstance(instance, AssetPermission) and kwargs['action'] == 'post_add': if isinstance(instance, AssetPermission) and kwargs['action'] == 'post_add':

View File

@ -1,7 +1,9 @@
# coding: utf-8 # coding: utf-8
from __future__ import absolute_import, unicode_literals from __future__ import absolute_import, unicode_literals
import uuid
from collections import defaultdict from collections import defaultdict
from django.utils import timezone
from django.db.models import Q from django.db.models import Q
from django.core.cache import cache from django.core.cache import cache
from django.conf import settings from django.conf import settings
@ -100,14 +102,19 @@ class AssetPermissionUtil:
} }
CACHE_KEY = '_ASSET_PERM_CACHE_{}_{}' CACHE_KEY = '_ASSET_PERM_CACHE_{}_{}'
CACHE_META_KEY = '_ASSET_PERM_META_KEY_{}'
CACHE_TIME = settings.ASSETS_PERM_CACHE_TIME CACHE_TIME = settings.ASSETS_PERM_CACHE_TIME
CACHE_POLICY_MAP = (('0', 'never'), ('1', 'using'), ('2', 'refresh')) CACHE_POLICY_MAP = (('0', 'never'), ('1', 'using'), ('2', 'refresh'))
def __init__(self, obj, cache_policy='0'): def __init__(self, obj, cache_policy='0'):
self.object = obj self.object = obj
self.obj_id = str(obj.id)
self._permissions = None self._permissions = None
self._assets = None self._assets = None
self.cache_policy = cache_policy self.cache_policy = cache_policy
self.node_key = self.CACHE_KEY.format(self.obj_id, 'NODES_WITH_ASSETS')
self.asset_key = self.CACHE_KEY.format(self.obj_id, 'ASSETS')
self.system_key = self.CACHE_KEY.format(self.obj_id, 'SYSTEM_USER')
@property @property
def permissions(self): def permissions(self):
@ -163,14 +170,11 @@ class AssetPermissionUtil:
return self._assets return self._assets
def get_assets_from_cache(self): def get_assets_from_cache(self):
cache_key = self.CACHE_KEY.format(str(self.object.id), 'ASSETS') cached = cache.get(self.asset_key)
cached = cache.get(cache_key) if not cached:
if cached: self.update_cache()
return cached cached = cache.get(self.asset_key)
assets = self.get_assets_without_cache() return cached
self.expire_cache()
cache.set(cache_key, assets, self.CACHE_TIME)
return assets
def get_assets(self): def get_assets(self):
if self.cache_policy in self.CACHE_POLICY_MAP[1]: if self.cache_policy in self.CACHE_POLICY_MAP[1]:
@ -179,6 +183,7 @@ class AssetPermissionUtil:
self.expire_cache() self.expire_cache()
return self.get_assets_from_cache() return self.get_assets_from_cache()
else: else:
self.expire_cache()
return self.get_assets_without_cache() return self.get_assets_without_cache()
def get_nodes_with_assets_without_cache(self): def get_nodes_with_assets_without_cache(self):
@ -187,21 +192,18 @@ class AssetPermissionUtil:
{"node": {"assets": set("system_user")}} {"node": {"assets": set("system_user")}}
:return: :return:
""" """
assets = self.get_assets() assets = self.get_assets_without_cache()
tree = GenerateTree() tree = GenerateTree()
for asset, system_users in assets.items(): for asset, system_users in assets.items():
tree.add_asset(asset, system_users) tree.add_asset(asset, system_users)
return tree.get_nodes() return tree.get_nodes()
def get_nodes_with_assets_from_cache(self): def get_nodes_with_assets_from_cache(self):
cache_key = self.CACHE_KEY.format(str(self.object.id), 'NODES_WITH_ASSETS') cached = cache.get(self.node_key)
cached = cache.get(cache_key) if not cached:
if cached: self.update_cache()
return cached cached = cache.get(self.node_key)
nodes = self.get_nodes_with_assets_without_cache() return cached
self.expire_cache()
cache.set(cache_key, nodes, self.CACHE_TIME)
return nodes
def get_nodes_with_assets(self): def get_nodes_with_assets(self):
if self.cache_policy in self.CACHE_POLICY_MAP[1]: if self.cache_policy in self.CACHE_POLICY_MAP[1]:
@ -220,14 +222,11 @@ class AssetPermissionUtil:
return system_users return system_users
def get_system_user_from_cache(self): def get_system_user_from_cache(self):
cache_key = self.CACHE_KEY.format(str(self.object.id), 'SYSTEM_USER') cached = cache.get(self.system_key)
cached = cache.get(cache_key) if not cached:
if cached: self.update_cache()
return cached cached = cache.get(self.system_key)
self.expire_cache() return cached
system_users = self.get_system_user_without_cache()
cache.set(cache_key, system_users, self.CACHE_TIME)
return system_users
def get_system_users(self): def get_system_users(self):
if self.cache_policy in self.CACHE_POLICY_MAP[1]: if self.cache_policy in self.CACHE_POLICY_MAP[1]:
@ -238,14 +237,51 @@ class AssetPermissionUtil:
else: else:
return self.get_system_user_without_cache() return self.get_system_user_without_cache()
@property
def cache_meta(self):
key = self.CACHE_META_KEY.format(str(self.object.id))
return cache.get(key) or {}
def set_cache_meta(self):
key = self.CACHE_META_KEY.format(str(self.object.id))
meta = {
'id': str(uuid.uuid4()),
'datetime': timezone.now(),
'object': str(self.object)
}
cache.set(key, meta, self.CACHE_TIME)
def expire_cache_meta(self):
key = self.CACHE_META_KEY.format(str(self.object.id))
cache.delete(key)
def update_cache(self):
assets = self.get_assets_without_cache()
nodes = self.get_nodes_with_assets_without_cache()
system_users = self.get_system_user_without_cache()
cache.set(self.asset_key, assets, self.CACHE_TIME)
cache.set(self.node_key, nodes, self.CACHE_TIME)
cache.set(self.system_key, system_users, self.CACHE_TIME)
self.set_cache_meta()
def expire_cache(self): def expire_cache(self):
cache_key = self.CACHE_KEY.format(str(self.object.id), '*') """
cache.delete_pattern(cache_key) 因为 获取用户的节点资产系统用户等都能会缓存这里会清理所有与该对象有关的
缓存以免造成不统一的情况
:return:
"""
key = self.CACHE_KEY.format(str(self.object.id), '*')
cache.delete_pattern(key)
self.expire_cache_meta()
def expire_all_cache_meta(self):
key = self.CACHE_META_KEY.format('*')
cache.delete_pattern(key)
@classmethod @classmethod
def expire_all_cache(cls): def expire_all_cache(cls):
cache_key = cls.CACHE_KEY.format('*', '*') key = cls.CACHE_KEY.format('*', '*')
cache.delete_pattern(cache_key) cache.delete_pattern(key)
def is_obj_attr_has(obj, val, attrs=("hostname", "ip", "comment")): def is_obj_attr_has(obj, val, attrs=("hostname", "ip", "comment")):

View File

@ -105,7 +105,8 @@ class LDAPSettingForm(BaseForm):
) )
AUTH_LDAP_SEARCH_OU = forms.CharField( AUTH_LDAP_SEARCH_OU = forms.CharField(
label=_("User OU"), label=_("User OU"),
help_text=_("Use | split User OUs") help_text=_("Use | split User OUs"),
required=False,
) )
AUTH_LDAP_SEARCH_FILTER = forms.CharField( AUTH_LDAP_SEARCH_FILTER = forms.CharField(
label=_("User search filter"), label=_("User search filter"),

View File

@ -450,3 +450,7 @@ div.dataTables_wrapper div.dataTables_filter {
content:"*"; content:"*";
color:red; color:red;
} }
#tree-refresh .fa-refresh {
font: normal normal normal 14px/1 FontAwesome !important;
}

View File

@ -922,3 +922,16 @@ function initSelectedAssets2Table(){
}); });
} }
} }
function rootNodeAddDom(ztree, callback) {
var refreshIcon = "<a id='tree-refresh'><i class='fa fa-refresh'></i></a>";
var rootNode = ztree.getNodes()[0];
var $rootNodeRef = $("#" + rootNode.tId + "_a");
$rootNodeRef.after(refreshIcon);
var refreshIconRef = $('#tree-refresh');
refreshIconRef.bind('click', function () {
ztree.destroy();
callback()
})
}

10
apps/templates/404.html Normal file
View File

@ -0,0 +1,10 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Not found</title>
</head>
<body>
<h1>Not found</h1>
</body>
</html>

10
apps/templates/500.html Normal file
View File

@ -0,0 +1,10 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Server error</title>
</head>
<body>
<h1>Server error occur, contact administrator</h1>
</body>
</html>

View File

@ -286,20 +286,21 @@ class User(AbstractUser):
@property @property
def private_token(self): def private_token(self):
return self.create_private_token() from authentication.models import PrivateToken
def create_private_token(self):
from .authentication import PrivateToken
try: try:
token = PrivateToken.objects.get(user=self) token = PrivateToken.objects.get(user=self)
except PrivateToken.DoesNotExist: except PrivateToken.DoesNotExist:
token = PrivateToken.objects.create(user=self) token = self.create_private_token()
return token.key return token
def create_private_token(self):
from authentication.models import PrivateToken
token = PrivateToken.objects.create(user=self)
return token
def refresh_private_token(self): def refresh_private_token(self):
from .authentication import PrivateToken self.private_token.delete()
PrivateToken.objects.filter(user=self).delete() return self.create_private_token()
return PrivateToken.objects.create(user=self)
def create_bearer_token(self, request=None): def create_bearer_token(self, request=None):
expiration = settings.TOKEN_EXPIRATION or 3600 expiration = settings.TOKEN_EXPIRATION or 3600

View File

@ -64,6 +64,7 @@ var zTree;
var inited = false; var inited = false;
var url; var url;
var asset_table; var asset_table;
var treeUrl = "{% url 'api-perms:user-nodes-assets-as-tree' pk=object.id %}?show_assets=0&cache_policy=1";
function initTable() { function initTable() {
if (inited){ if (inited){
@ -71,7 +72,7 @@ function initTable() {
} else { } else {
inited = true; inited = true;
} }
url = "{% url 'api-perms:user-assets' pk=object.id %}"; url = "{% url 'api-perms:user-assets' pk=object.id %}?cache_policy=1";
var options = { var options = {
ele: $('#user_assets_table'), ele: $('#user_assets_table'),
columnDefs: [ columnDefs: [
@ -106,13 +107,14 @@ function initTable() {
} }
function onSelected(event, treeNode) { function onSelected(event, treeNode) {
url = '{% url "api-perms:user-node-assets" pk=object.id node_id=DEFAULT_PK %}'; url = '{% url "api-perms:user-node-assets" pk=object.id node_id=DEFAULT_PK %}?cache_policy=1';
var node_id = treeNode.meta.node.id; var node_id = treeNode.meta.node.id;
url = url.replace("{{ DEFAULT_PK }}", node_id); url = url.replace("{{ DEFAULT_PK }}", node_id);
asset_table.ajax.url(url); asset_table.ajax.url(url);
asset_table.ajax.reload(); asset_table.ajax.reload();
} }
function initTree() { function initTree() {
var setting = { var setting = {
view: { view: {
@ -129,9 +131,13 @@ function initTree() {
} }
}; };
$.get("{% url 'api-perms:user-nodes-assets-as-tree' pk=object.id %}?show_assets=0", function(data, status) { $.get(treeUrl, function(data, status) {
$.fn.zTree.init($("#assetTree"), setting, data); $.fn.zTree.init($("#assetTree"), setting, data);
zTree = $.fn.zTree.getZTreeObj("assetTree"); zTree = $.fn.zTree.getZTreeObj("assetTree");
rootNodeAddDom(zTree, function () {
treeUrl = treeUrl.replace('cache_policy=1', 'cache_policy=2');
initTree();
});
}); });
} }