mirror of https://github.com/jumpserver/jumpserver
171 lines
5.5 KiB
Python
171 lines
5.5 KiB
Python
#!/usr/bin/env python
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
|
|
import logging
|
|
|
|
from django.db import models
|
|
from django.utils.translation import ugettext_lazy as _
|
|
from django.core.validators import MinValueValidator, MaxValueValidator
|
|
|
|
from common.utils import get_signer
|
|
from .base import AssetUser
|
|
|
|
|
|
__all__ = ['AdminUser', 'SystemUser']
|
|
logger = logging.getLogger(__name__)
|
|
signer = get_signer()
|
|
|
|
|
|
class AdminUser(AssetUser):
|
|
"""
|
|
A privileged user that ansible can use it to push system user and so on
|
|
"""
|
|
BECOME_METHOD_CHOICES = (
|
|
('sudo', 'sudo'),
|
|
('su', 'su'),
|
|
)
|
|
become = models.BooleanField(default=True)
|
|
become_method = models.CharField(choices=BECOME_METHOD_CHOICES, default='sudo', max_length=4)
|
|
become_user = models.CharField(default='root', max_length=64)
|
|
_become_pass = models.CharField(default='', max_length=128)
|
|
CONNECTIVITY_CACHE_KEY = '_ADMIN_USER_CONNECTIVE_{}'
|
|
_prefer = "admin_user"
|
|
|
|
def __str__(self):
|
|
return self.name
|
|
|
|
@property
|
|
def become_pass(self):
|
|
password = signer.unsign(self._become_pass)
|
|
if password:
|
|
return password
|
|
else:
|
|
return ""
|
|
|
|
@become_pass.setter
|
|
def become_pass(self, password):
|
|
self._become_pass = signer.sign(password)
|
|
|
|
@property
|
|
def become_info(self):
|
|
if self.become:
|
|
info = {
|
|
"method": self.become_method,
|
|
"user": self.become_user,
|
|
"pass": self.become_pass,
|
|
}
|
|
else:
|
|
info = None
|
|
return info
|
|
|
|
class Meta:
|
|
ordering = ['name']
|
|
unique_together = [('name', 'org_id')]
|
|
verbose_name = _("Admin user")
|
|
|
|
@classmethod
|
|
def generate_fake(cls, count=10):
|
|
from random import seed
|
|
import forgery_py
|
|
from django.db import IntegrityError
|
|
|
|
seed()
|
|
for i in range(count):
|
|
obj = cls(name=forgery_py.name.full_name(),
|
|
username=forgery_py.internet.user_name(),
|
|
password=forgery_py.lorem_ipsum.word(),
|
|
comment=forgery_py.lorem_ipsum.sentence(),
|
|
created_by='Fake')
|
|
try:
|
|
obj.save()
|
|
logger.debug('Generate fake asset group: %s' % obj.name)
|
|
except IntegrityError:
|
|
print('Error continue')
|
|
continue
|
|
|
|
|
|
class SystemUser(AssetUser):
|
|
PROTOCOL_SSH = 'ssh'
|
|
PROTOCOL_RDP = 'rdp'
|
|
PROTOCOL_TELNET = 'telnet'
|
|
PROTOCOL_VNC = 'vnc'
|
|
PROTOCOL_CHOICES = (
|
|
(PROTOCOL_SSH, 'ssh'),
|
|
(PROTOCOL_RDP, 'rdp'),
|
|
(PROTOCOL_TELNET, 'telnet (beta)'),
|
|
(PROTOCOL_VNC, 'vnc'),
|
|
)
|
|
|
|
LOGIN_AUTO = 'auto'
|
|
LOGIN_MANUAL = 'manual'
|
|
LOGIN_MODE_CHOICES = (
|
|
(LOGIN_AUTO, _('Automatic login')),
|
|
(LOGIN_MANUAL, _('Manually login'))
|
|
)
|
|
|
|
nodes = models.ManyToManyField('assets.Node', blank=True, verbose_name=_("Nodes"))
|
|
assets = models.ManyToManyField('assets.Asset', blank=True, verbose_name=_("Assets"))
|
|
priority = models.IntegerField(default=20, verbose_name=_("Priority"), validators=[MinValueValidator(1), MaxValueValidator(100)])
|
|
protocol = models.CharField(max_length=16, choices=PROTOCOL_CHOICES, default='ssh', verbose_name=_('Protocol'))
|
|
auto_push = models.BooleanField(default=True, verbose_name=_('Auto push'))
|
|
sudo = models.TextField(default='/bin/whoami', verbose_name=_('Sudo'))
|
|
shell = models.CharField(max_length=64, default='/bin/bash', verbose_name=_('Shell'))
|
|
login_mode = models.CharField(choices=LOGIN_MODE_CHOICES, default=LOGIN_AUTO, max_length=10, verbose_name=_('Login mode'))
|
|
cmd_filters = models.ManyToManyField('CommandFilter', related_name='system_users', verbose_name=_("Command filter"), blank=True)
|
|
|
|
def __str__(self):
|
|
return '{0.name}({0.username})'.format(self)
|
|
|
|
@property
|
|
def login_mode_display(self):
|
|
return self.get_login_mode_display()
|
|
|
|
def is_need_push(self):
|
|
if self.auto_push and self.protocol in [self.PROTOCOL_SSH, self.PROTOCOL_RDP]:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
@property
|
|
def cmd_filter_rules(self):
|
|
from .cmd_filter import CommandFilterRule
|
|
rules = CommandFilterRule.objects.filter(
|
|
filter__in=self.cmd_filters.all()
|
|
).distinct()
|
|
return rules
|
|
|
|
def is_command_can_run(self, command):
|
|
for rule in self.cmd_filter_rules:
|
|
action, matched_cmd = rule.match(command)
|
|
if action == rule.ACTION_ALLOW:
|
|
return True, None
|
|
elif action == rule.ACTION_DENY:
|
|
return False, matched_cmd
|
|
return True, None
|
|
|
|
class Meta:
|
|
ordering = ['name']
|
|
unique_together = [('name', 'org_id')]
|
|
verbose_name = _("System user")
|
|
|
|
@classmethod
|
|
def generate_fake(cls, count=10):
|
|
from random import seed
|
|
import forgery_py
|
|
from django.db import IntegrityError
|
|
|
|
seed()
|
|
for i in range(count):
|
|
obj = cls(name=forgery_py.name.full_name(),
|
|
username=forgery_py.internet.user_name(),
|
|
password=forgery_py.lorem_ipsum.word(),
|
|
comment=forgery_py.lorem_ipsum.sentence(),
|
|
created_by='Fake')
|
|
try:
|
|
obj.save()
|
|
logger.debug('Generate fake asset group: %s' % obj.name)
|
|
except IntegrityError:
|
|
print('Error continue')
|
|
continue
|