You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
jumpserver/apps/users/tasks.py

159 lines
5.3 KiB

# -*- coding: utf-8 -*-
#
import uuid
from datetime import timedelta
from celery import shared_task, current_task
from django.conf import settings
from django.db.models import Q
from django.utils import timezone
from django.utils.translation import gettext_lazy as _, gettext_noop
from audits.const import ActivityChoices
from common.const.crontab import CRONTAB_AT_AM_TEN, CRONTAB_AT_PM_TWO
from common.utils import get_logger
from ops.celery.decorator import after_app_ready_start, register_as_period_task
from ops.celery.utils import create_or_update_celery_periodic_tasks
from orgs.utils import tmp_to_root_org
from users.notifications import PasswordExpirationReminderMsg
from users.notifications import UserExpirationReminderMsg
from .models import User
logger = get_logger(__file__)
@shared_task(
verbose_name=_('Check password expired'),
description=_(
"""Check every day at 10 AM whether the passwords of users in the system are expired,
and send a notification 5 days in advance"""
)
)
def check_password_expired():
users = User.get_nature_users().filter(source=User.Source.local)
for user in users:
if not user.is_valid:
continue
if not user.password_will_expired:
continue
msg = "The user {} password expires in {} days"
logger.info(msg.format(user, user.password_expired_remain_days))
PasswordExpirationReminderMsg(user).publish_async()
@shared_task(
verbose_name=_('Periodic check password expired'),
description=_(
"""With version iterations, new tasks may be added, or task names and execution times may
be modified. Therefore, upon system startup, it is necessary to register or update the
parameters of the task that checks if passwords have expired"""
)
)
@after_app_ready_start
def check_password_expired_periodic():
tasks = {
'check_password_expired_periodic': {
'task': check_password_expired.name,
'interval': None,
'crontab': CRONTAB_AT_AM_TEN,
'enabled': True,
}
}
create_or_update_celery_periodic_tasks(tasks)
@shared_task(
verbose_name=_('Check user expired'),
description=_(
"""Check every day at 2 p.m whether the users in the system are expired, and send a
notification 5 days in advance"""
)
)
def check_user_expired():
date_expired_lt = timezone.now() + timezone.timedelta(days=User.DATE_EXPIRED_WARNING_DAYS)
users = User.get_nature_users() \
.filter(source=User.Source.local) \
.filter(date_expired__lt=date_expired_lt)
for user in users:
if not user.is_valid:
continue
if not user.will_expired:
continue
msg = "The user {} will expires in {} days"
logger.info(msg.format(user, user.expired_remain_days))
UserExpirationReminderMsg(user).publish_async()
@shared_task(
verbose_name=_('Periodic check user expired'),
description=_(
"""With version iterations, new tasks may be added, or task names and execution times may
be modified. Therefore, upon system startup, it is necessary to register or update the
parameters of the task that checks if users have expired"""
)
)
@after_app_ready_start
def check_user_expired_periodic():
tasks = {
'check_user_expired_periodic': {
'task': check_user_expired.name,
'interval': None,
'crontab': CRONTAB_AT_PM_TWO,
'enabled': True,
}
}
create_or_update_celery_periodic_tasks(tasks)
@shared_task(
verbose_name=_('Check unused users'),
description=_(
"""At 2 p.m. every day, according to the configuration in "System Settings - Security -
Auth security - Auto disable threshold" users who have not logged in or whose API keys
have not been used for a long time will be disabled"""
)
)
@register_as_period_task(crontab=CRONTAB_AT_PM_TWO)
@tmp_to_root_org()
def check_unused_users():
uncommon_users_ttl = settings.SECURITY_UNCOMMON_USERS_TTL
if not uncommon_users_ttl:
return
uncommon_users_ttl = int(uncommon_users_ttl)
if uncommon_users_ttl <= 0 or uncommon_users_ttl >= 999:
return
seconds_to_subtract = uncommon_users_ttl * 24 * 60 * 60
t = timezone.now() - timedelta(seconds=seconds_to_subtract)
last_login_q = Q(last_login__lte=t) | (Q(last_login__isnull=True) & Q(date_joined__lte=t))
api_key_q = Q(date_api_key_last_used__lte=t) | (
Q(date_api_key_last_used__isnull=True) & Q(date_joined__lte=t))
users = User.objects \
.filter(date_joined__lt=t) \
.filter(is_active=True) \
.filter(last_login_q) \
.filter(api_key_q) \
.exclude(username='admin')
if not users:
return
print("Some users are not used for a long time, and they will be disabled.")
resource_ids = []
for user in users:
resource_ids.append(user.id)
print(' - {}'.format(user.name))
users.update(is_active=False)
from audits.signal_handlers import create_activities
if current_task:
task_id = current_task.request.id
else:
task_id = str(uuid.uuid4())
detail = gettext_noop('The user has not logged in recently and has been disabled.')
create_activities(resource_ids, detail, task_id, action=ActivityChoices.task, org_id='')