# ~*~ coding: utf-8 ~*~ # import base64 from django.shortcuts import get_object_or_404 from django.core.cache import cache from django.conf import settings from rest_framework import generics, status from rest_framework.response import Response from rest_framework.views import APIView from rest_framework_bulk import ListBulkCreateUpdateDestroyAPIView from rest_framework import authentication from common.mixins import BulkDeleteApiMixin from common.utils import get_logger from .utils import check_user_valid, token_gen from .models import User, UserGroup from .serializers import UserDetailSerializer, UserAndGroupSerializer, \ GroupDetailSerializer, UserPKUpdateSerializer, UserBulkUpdateSerializer, GroupBulkUpdateSerializer from .backends import IsSuperUser, IsTerminalUser, IsValidUser, IsSuperUserOrTerminalUser logger = get_logger(__name__) class UserDetailApi(generics.RetrieveUpdateDestroyAPIView): queryset = User.objects.all() serializer_class = UserDetailSerializer permission_classes = (IsSuperUser,) class UserAndGroupEditApi(generics.RetrieveUpdateAPIView): queryset = User.objects.all() serializer_class = UserAndGroupSerializer permission_classes = (IsSuperUser,) class UserResetPasswordApi(generics.UpdateAPIView): queryset = User.objects.all() serializer_class = UserDetailSerializer def perform_update(self, serializer): # Note: we are not updating the user object here. # We just do the reset-password staff. user = self.get_object() import uuid user.password_raw = str(uuid.uuid4()) user.save() from .utils import send_reset_password_mail send_reset_password_mail(user) class UserResetPKApi(generics.UpdateAPIView): queryset = User.objects.all() serializer_class = UserDetailSerializer def perform_update(self, serializer): user = self.get_object() user.is_public_key_valid = False user.save() from .utils import send_reset_ssh_key_mail send_reset_ssh_key_mail(user) class UserUpdatePKApi(generics.UpdateAPIView): queryset = User.objects.all() serializer_class = UserPKUpdateSerializer def perform_update(self, serializer): user = self.get_object() user.private_key = serializer.validated_data['_public_key'] user.save() class GroupDetailApi(generics.RetrieveUpdateDestroyAPIView): queryset = UserGroup.objects.all() serializer_class = GroupDetailSerializer def perform_update(self, serializer): users = serializer.validated_data.get('users') if users: group = self.get_object() # Note: use `list` method to force hitting the db. group_users = list(group.users.all()) serializer.save() group.users.set(users + group_users) group.save() return serializer.save() class UserListUpdateApi(BulkDeleteApiMixin, ListBulkCreateUpdateDestroyAPIView): queryset = User.objects.all() serializer_class = UserBulkUpdateSerializer permission_classes = (IsSuperUserOrTerminalUser,) # def get(self, request, *args, **kwargs): # return super(UserListUpdateApi, self).get(request, *args, **kwargs) class GroupListUpdateApi(BulkDeleteApiMixin, ListBulkCreateUpdateDestroyAPIView): queryset = UserGroup.objects.all() serializer_class = GroupBulkUpdateSerializer class DeleteUserFromGroupApi(generics.DestroyAPIView): queryset = UserGroup.objects.all() serializer_class = GroupDetailSerializer def destroy(self, request, *args, **kwargs): group = self.get_object() self.perform_destroy(group, **kwargs) return Response(status=status.HTTP_204_NO_CONTENT) def perform_destroy(self, instance, **kwargs): user_id = kwargs.get('uid') user = get_object_or_404(User, id=user_id) instance.users.remove(user) class UserTokenApi(APIView): permission_classes = () expiration = settings.CONFIG.TOKEN_EXPIRATION or 3600 def post(self, request, *args, **kwargs): username = request.data.get('username', '') password = request.data.get('password', '') public_key = request.data.get('public_key', '') remote_addr = request.META.get('REMOTE_ADDR', '') remote_addr = base64.b64encode(remote_addr).replace('=', '') user = check_user_valid(username=username, password=password, public_key=public_key) if user: token = cache.get('%s_%s' % (user.id, remote_addr)) if not token: token = token_gen(user) cache.set(token, user.id, self.expiration) cache.set('%s_%s' % (user.id, remote_addr), token, self.expiration) return Response({'token': token, 'id': user.id, 'username': user.username, 'name': user.name}) else: return Response({'msg': 'Invalid password or public key or user is not active or expired'})