mirror of https://github.com/jumpserver/jumpserver
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
789 lines
24 KiB
789 lines
24 KiB
#!/usr/bin/env python |
|
# -*- coding: utf-8 -*- |
|
# |
|
import uuid |
|
import base64 |
|
import string |
|
import random |
|
import datetime |
|
|
|
from django.conf import settings |
|
from django.contrib.auth.models import AbstractUser |
|
from django.contrib.auth.hashers import check_password |
|
from django.core.cache import cache |
|
from django.db import models |
|
from django.utils.translation import ugettext_lazy as _ |
|
from django.utils import timezone |
|
from django.shortcuts import reverse |
|
|
|
from orgs.utils import current_org |
|
from orgs.models import OrganizationMember, Organization |
|
from common.utils import date_expired_default, get_logger, lazyproperty, random_string |
|
from common import fields |
|
from common.const import choices |
|
from common.db.models import TextChoices |
|
from ..signals import post_user_change_password |
|
|
|
__all__ = ['User', 'UserPasswordHistory'] |
|
|
|
logger = get_logger(__file__) |
|
|
|
|
|
class AuthMixin: |
|
date_password_last_updated: datetime.datetime |
|
history_passwords: models.Manager |
|
need_update_password: bool |
|
public_key: str |
|
is_local: bool |
|
|
|
@property |
|
def password_raw(self): |
|
raise AttributeError('Password raw is not a readable attribute') |
|
|
|
#: Use this attr to set user object password, example |
|
#: user = User(username='example', password_raw='password', ...) |
|
#: It's equal: |
|
#: user = User(username='example', ...) |
|
#: user.set_password('password') |
|
@password_raw.setter |
|
def password_raw(self, password_raw_): |
|
self.set_password(password_raw_) |
|
|
|
def set_password(self, raw_password): |
|
if self.can_update_password(): |
|
self.date_password_last_updated = timezone.now() |
|
post_user_change_password.send(self.__class__, user=self) |
|
super().set_password(raw_password) |
|
|
|
def set_public_key(self, public_key): |
|
if self.can_update_ssh_key(): |
|
self.public_key = public_key |
|
self.save() |
|
|
|
def can_update_password(self): |
|
return self.is_local |
|
|
|
def can_update_ssh_key(self): |
|
return self.can_use_ssh_key_login() |
|
|
|
@staticmethod |
|
def can_use_ssh_key_login(): |
|
return settings.TERMINAL_PUBLIC_KEY_AUTH |
|
|
|
def is_history_password(self, password): |
|
allow_history_password_count = settings.OLD_PASSWORD_HISTORY_LIMIT_COUNT |
|
history_passwords = self.history_passwords.all() \ |
|
.order_by('-date_created')[:int(allow_history_password_count)] |
|
|
|
for history_password in history_passwords: |
|
if check_password(password, history_password.password): |
|
return True |
|
else: |
|
return False |
|
|
|
def is_public_key_valid(self): |
|
""" |
|
Check if the user's ssh public key is valid. |
|
This function is used in base.html. |
|
""" |
|
if self.public_key: |
|
return True |
|
return False |
|
|
|
@property |
|
def public_key_obj(self): |
|
class PubKey(object): |
|
def __getattr__(self, item): |
|
return '' |
|
|
|
if self.public_key: |
|
import sshpubkeys |
|
try: |
|
return sshpubkeys.SSHKey(self.public_key) |
|
except (TabError, TypeError): |
|
pass |
|
return PubKey() |
|
|
|
def get_public_key_comment(self): |
|
return self.public_key_obj.comment |
|
|
|
def get_public_key_hash_md5(self): |
|
if not callable(self.public_key_obj.hash_md5): |
|
return '' |
|
try: |
|
return self.public_key_obj.hash_md5() |
|
except: |
|
return '' |
|
|
|
def reset_password(self, new_password): |
|
self.set_password(new_password) |
|
self.need_update_password = False |
|
self.save() |
|
|
|
@property |
|
def date_password_expired(self): |
|
interval = settings.SECURITY_PASSWORD_EXPIRATION_TIME |
|
date_expired = self.date_password_last_updated + timezone.timedelta( |
|
days=int(interval)) |
|
return date_expired |
|
|
|
@property |
|
def password_expired_remain_days(self): |
|
date_remain = self.date_password_expired - timezone.now() |
|
return date_remain.days |
|
|
|
@property |
|
def password_has_expired(self): |
|
if self.is_local and self.password_expired_remain_days < 0: |
|
return True |
|
return False |
|
|
|
@property |
|
def password_will_expired(self): |
|
if self.is_local and 0 <= self.password_expired_remain_days < 5: |
|
return True |
|
return False |
|
|
|
@staticmethod |
|
def get_public_key_body(key): |
|
for i in key.split(): |
|
if len(i) > 256: |
|
return i |
|
return key |
|
|
|
def check_public_key(self, key): |
|
if not self.public_key: |
|
return False |
|
key = self.get_public_key_body(key) |
|
key_saved = self.get_public_key_body(self.public_key) |
|
if key == key_saved: |
|
return True |
|
else: |
|
return False |
|
|
|
|
|
class RoleMixin: |
|
class ROLE(TextChoices): |
|
ADMIN = choices.ADMIN, _('System administrator') |
|
AUDITOR = choices.AUDITOR, _('System auditor') |
|
USER = choices.USER, _('User') |
|
APP = 'App', _('Application') |
|
|
|
role = ROLE.USER |
|
|
|
@property |
|
def role_display(self): |
|
return self.get_role_display() |
|
|
|
@lazyproperty |
|
def org_roles(self): |
|
from orgs.models import ROLE as ORG_ROLE |
|
|
|
if current_org.is_root(): |
|
# root 组织, 取 User 本身的角色 |
|
if self.is_superuser: |
|
roles = [ORG_ROLE.ADMIN] |
|
elif self.is_super_auditor: |
|
roles = [ORG_ROLE.AUDITOR] |
|
else: |
|
roles = [ORG_ROLE.USER] |
|
else: |
|
# 是真实组织, 取 OrganizationMember 中的角色 |
|
roles = [ |
|
getattr(ORG_ROLE, org_member.role.upper()) |
|
for org_member in self.m2m_org_members.all() |
|
if org_member.org_id == current_org.id |
|
] |
|
roles.sort() |
|
return roles |
|
|
|
@lazyproperty |
|
def org_roles_label_list(self): |
|
from orgs.models import ROLE as ORG_ROLE |
|
return [str(role.label) for role in self.org_roles if role in ORG_ROLE] |
|
|
|
@lazyproperty |
|
def org_roles_value_list(self): |
|
from orgs.models import ROLE as ORG_ROLE |
|
return [str(role.value) for role in self.org_roles if role in ORG_ROLE] |
|
|
|
@lazyproperty |
|
def org_role_display(self): |
|
return ' | '.join(self.org_roles_label_list) |
|
|
|
@lazyproperty |
|
def total_role_display(self): |
|
roles = list({self.role_display, *self.org_roles_label_list}) |
|
roles.sort() |
|
return ' | '.join(roles) |
|
|
|
def current_org_roles(self): |
|
from orgs.models import OrganizationMember, ROLE as ORG_ROLE |
|
if current_org.is_root(): |
|
if self.is_superuser: |
|
return [ORG_ROLE.ADMIN] |
|
else: |
|
return [ORG_ROLE.USER] |
|
|
|
roles = list(set(OrganizationMember.objects.filter( |
|
org_id=current_org.id, user=self |
|
).values_list('role', flat=True))) |
|
|
|
return roles |
|
|
|
@property |
|
def is_superuser(self): |
|
if self.role == self.ROLE.ADMIN: |
|
return True |
|
else: |
|
return False |
|
|
|
@is_superuser.setter |
|
def is_superuser(self, value): |
|
if value is True: |
|
self.role = self.ROLE.ADMIN |
|
else: |
|
self.role = self.ROLE.USER |
|
|
|
@property |
|
def is_super_auditor(self): |
|
return self.role == self.ROLE.AUDITOR |
|
|
|
@property |
|
def is_common_user(self): |
|
if self.is_org_admin: |
|
return False |
|
if self.is_org_auditor: |
|
return False |
|
if self.is_app: |
|
return False |
|
return True |
|
|
|
@property |
|
def is_app(self): |
|
return self.role == self.ROLE.APP |
|
|
|
@lazyproperty |
|
def user_all_orgs(self): |
|
from orgs.models import Organization |
|
return Organization.get_user_all_orgs(self) |
|
|
|
@lazyproperty |
|
def user_orgs(self): |
|
from orgs.models import Organization |
|
return Organization.get_user_user_orgs(self) |
|
|
|
@lazyproperty |
|
def admin_orgs(self): |
|
from orgs.models import Organization |
|
return Organization.get_user_admin_orgs(self) |
|
|
|
@lazyproperty |
|
def audit_orgs(self): |
|
from orgs.models import Organization |
|
return Organization.get_user_audit_orgs(self) |
|
|
|
@lazyproperty |
|
def admin_or_audit_orgs(self): |
|
from orgs.models import Organization |
|
return Organization.get_user_admin_or_audit_orgs(self) |
|
|
|
@lazyproperty |
|
def is_org_admin(self): |
|
from orgs.models import ROLE as ORG_ROLE |
|
if self.is_superuser or self.m2m_org_members.filter(role=ORG_ROLE.ADMIN).exists(): |
|
return True |
|
else: |
|
return False |
|
|
|
@lazyproperty |
|
def is_org_auditor(self): |
|
from orgs.models import ROLE as ORG_ROLE |
|
if self.is_super_auditor or self.m2m_org_members.filter(role=ORG_ROLE.AUDITOR).exists(): |
|
return True |
|
else: |
|
return False |
|
|
|
@lazyproperty |
|
def can_admin_current_org(self): |
|
return current_org.can_admin_by(self) |
|
|
|
@lazyproperty |
|
def can_audit_current_org(self): |
|
return current_org.can_audit_by(self) |
|
|
|
@lazyproperty |
|
def can_user_current_org(self): |
|
return current_org.can_use_by(self) |
|
|
|
@lazyproperty |
|
def can_admin_or_audit_current_org(self): |
|
return self.can_admin_current_org or self.can_audit_current_org |
|
|
|
@property |
|
def is_staff(self): |
|
if self.is_authenticated and self.is_valid: |
|
return True |
|
else: |
|
return False |
|
|
|
@is_staff.setter |
|
def is_staff(self, value): |
|
pass |
|
|
|
@classmethod |
|
def create_app_user(cls, name, comment): |
|
app = cls.objects.create( |
|
username=name, name=name, email='{}@local.domain'.format(name), |
|
is_active=False, role=cls.ROLE.APP, comment=comment, |
|
is_first_login=False, created_by='System' |
|
) |
|
access_key = app.create_access_key() |
|
return app, access_key |
|
|
|
def remove(self): |
|
if current_org.is_root(): |
|
return |
|
org = Organization.get_instance(current_org.id) |
|
OrganizationMember.objects.remove_users(org, [self]) |
|
|
|
@classmethod |
|
def get_super_admins(cls): |
|
return cls.objects.filter(role=cls.ROLE.ADMIN) |
|
|
|
@classmethod |
|
def get_org_admins(cls, org=None): |
|
from orgs.models import Organization |
|
if not isinstance(org, Organization): |
|
org = current_org |
|
org_admins = org.admins |
|
return org_admins |
|
|
|
@classmethod |
|
def get_super_and_org_admins(cls, org=None): |
|
super_admins = cls.get_super_admins() |
|
org_admins = cls.get_org_admins(org=org) |
|
admins = org_admins | super_admins |
|
return admins.distinct() |
|
|
|
|
|
class TokenMixin: |
|
CACHE_KEY_USER_RESET_PASSWORD_PREFIX = "_KEY_USER_RESET_PASSWORD_{}" |
|
email = '' |
|
id = None |
|
|
|
@property |
|
def private_token(self): |
|
return self.create_private_token() |
|
|
|
def create_private_token(self): |
|
from authentication.models import PrivateToken |
|
token, created = PrivateToken.objects.get_or_create(user=self) |
|
return token |
|
|
|
def delete_private_token(self): |
|
from authentication.models import PrivateToken |
|
PrivateToken.objects.filter(user=self).delete() |
|
|
|
def refresh_private_token(self): |
|
self.delete_private_token() |
|
return self.create_private_token() |
|
|
|
def create_bearer_token(self, request=None): |
|
expiration = settings.TOKEN_EXPIRATION or 3600 |
|
if request: |
|
remote_addr = request.META.get('REMOTE_ADDR', '') |
|
else: |
|
remote_addr = '0.0.0.0' |
|
if not isinstance(remote_addr, bytes): |
|
remote_addr = remote_addr.encode("utf-8") |
|
remote_addr = base64.b16encode(remote_addr) # .replace(b'=', '') |
|
cache_key = '%s_%s' % (self.id, remote_addr) |
|
token = cache.get(cache_key) |
|
if not token: |
|
token = random_string(36) |
|
cache.set(token, self.id, expiration) |
|
cache.set('%s_%s' % (self.id, remote_addr), token, expiration) |
|
date_expired = timezone.now() + timezone.timedelta(seconds=expiration) |
|
return token, date_expired |
|
|
|
def refresh_bearer_token(self, token): |
|
pass |
|
|
|
def create_access_key(self): |
|
access_key = self.access_keys.create() |
|
return access_key |
|
|
|
@property |
|
def access_key(self): |
|
return self.access_keys.first() |
|
|
|
def generate_reset_token(self): |
|
letter = string.ascii_letters + string.digits |
|
token = ''.join([random.choice(letter) for _ in range(50)]) |
|
self.set_cache(token) |
|
return token |
|
|
|
@classmethod |
|
def validate_reset_password_token(cls, token): |
|
if not token: |
|
return None |
|
key = cls.CACHE_KEY_USER_RESET_PASSWORD_PREFIX.format(token) |
|
value = cache.get(key) |
|
if not value: |
|
return None |
|
try: |
|
user_id = value.get('id', '') |
|
email = value.get('email', '') |
|
user = cls.objects.get(id=user_id, email=email) |
|
return user |
|
except (AttributeError, cls.DoesNotExist) as e: |
|
logger.error(e, exc_info=True) |
|
return None |
|
|
|
def set_cache(self, token): |
|
key = self.CACHE_KEY_USER_RESET_PASSWORD_PREFIX.format(token) |
|
cache.set(key, {'id': self.id, 'email': self.email}, 3600) |
|
|
|
@classmethod |
|
def expired_reset_password_token(cls, token): |
|
key = cls.CACHE_KEY_USER_RESET_PASSWORD_PREFIX.format(token) |
|
cache.delete(key) |
|
|
|
|
|
class MFAMixin: |
|
mfa_level = 0 |
|
otp_secret_key = '' |
|
MFA_LEVEL_CHOICES = ( |
|
(0, _('Disable')), |
|
(1, _('Enable')), |
|
(2, _("Force enable")), |
|
) |
|
is_org_admin: bool |
|
username: str |
|
|
|
@property |
|
def mfa_enabled(self): |
|
if self.mfa_force_enabled: |
|
return True |
|
return self.mfa_level > 0 |
|
|
|
@property |
|
def mfa_force_enabled(self): |
|
force_level = settings.SECURITY_MFA_AUTH |
|
if force_level in [True, 1]: |
|
return True |
|
# 2 管理员强制开启 |
|
if force_level == 2 and self.is_org_admin: |
|
return True |
|
return self.mfa_level == 2 |
|
|
|
def enable_mfa(self): |
|
if not self.mfa_level == 2: |
|
self.mfa_level = 1 |
|
|
|
def force_enable_mfa(self): |
|
self.mfa_level = 2 |
|
|
|
def disable_mfa(self): |
|
self.mfa_level = 0 |
|
|
|
def no_active_mfa(self): |
|
return len(self.active_mfa_backends) == 0 |
|
|
|
@lazyproperty |
|
def active_mfa_backends(self): |
|
backends = self.get_user_mfa_backends(self) |
|
active_backends = [b for b in backends if b.is_active()] |
|
return active_backends |
|
|
|
@property |
|
def active_mfa_backends_mapper(self): |
|
return {b.name: b for b in self.active_mfa_backends} |
|
|
|
@staticmethod |
|
def get_user_mfa_backends(user): |
|
from authentication.mfa import MFA_BACKENDS |
|
backends = [cls(user) for cls in MFA_BACKENDS if cls.global_enabled()] |
|
return backends |
|
|
|
def get_active_mfa_backend_by_type(self, mfa_type): |
|
backend = self.get_mfa_backend_by_type(mfa_type) |
|
if not backend or not backend.is_active(): |
|
return None |
|
return backend |
|
|
|
def get_mfa_backend_by_type(self, mfa_type): |
|
mfa_mapper = {b.name: b for b in self.get_user_mfa_backends(self)} |
|
backend = mfa_mapper.get(mfa_type) |
|
if not backend: |
|
return None |
|
return backend |
|
|
|
|
|
class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, AbstractUser): |
|
class Source(TextChoices): |
|
local = 'local', _('Local') |
|
ldap = 'ldap', 'LDAP/AD' |
|
openid = 'openid', 'OpenID' |
|
radius = 'radius', 'Radius' |
|
cas = 'cas', 'CAS' |
|
saml2 = 'saml2', 'SAML2' |
|
|
|
SOURCE_BACKEND_MAPPING = { |
|
Source.local: [ |
|
settings.AUTH_BACKEND_MODEL, settings.AUTH_BACKEND_PUBKEY, |
|
settings.AUTH_BACKEND_WECOM, settings.AUTH_BACKEND_DINGTALK, |
|
], |
|
Source.ldap: [settings.AUTH_BACKEND_LDAP], |
|
Source.openid: [settings.AUTH_BACKEND_OIDC_PASSWORD, settings.AUTH_BACKEND_OIDC_CODE], |
|
Source.radius: [settings.AUTH_BACKEND_RADIUS], |
|
Source.cas: [settings.AUTH_BACKEND_CAS], |
|
Source.saml2: [settings.AUTH_BACKEND_SAML2], |
|
} |
|
|
|
id = models.UUIDField(default=uuid.uuid4, primary_key=True) |
|
username = models.CharField( |
|
max_length=128, unique=True, verbose_name=_('Username') |
|
) |
|
name = models.CharField(max_length=128, verbose_name=_('Name')) |
|
email = models.EmailField( |
|
max_length=128, unique=True, verbose_name=_('Email') |
|
) |
|
groups = models.ManyToManyField( |
|
'users.UserGroup', related_name='users', |
|
blank=True, verbose_name=_('User group') |
|
) |
|
role = models.CharField( |
|
choices=RoleMixin.ROLE.choices, default='User', max_length=10, |
|
blank=True, verbose_name=_('Role') |
|
) |
|
avatar = models.ImageField( |
|
upload_to="avatar", null=True, verbose_name=_('Avatar') |
|
) |
|
wechat = models.CharField( |
|
max_length=128, blank=True, verbose_name=_('Wechat') |
|
) |
|
phone = models.CharField( |
|
max_length=20, blank=True, null=True, verbose_name=_('Phone') |
|
) |
|
mfa_level = models.SmallIntegerField( |
|
default=0, choices=MFAMixin.MFA_LEVEL_CHOICES, verbose_name=_('MFA') |
|
) |
|
otp_secret_key = fields.EncryptCharField(max_length=128, blank=True, null=True) |
|
# Todo: Auto generate key, let user download |
|
private_key = fields.EncryptTextField( |
|
blank=True, null=True, verbose_name=_('Private key') |
|
) |
|
public_key = fields.EncryptTextField( |
|
blank=True, null=True, verbose_name=_('Public key') |
|
) |
|
secret_key = fields.EncryptCharField( |
|
max_length=256, blank=True, null=True, verbose_name=_('Secret key') |
|
) |
|
comment = models.TextField( |
|
blank=True, null=True, verbose_name=_('Comment') |
|
) |
|
is_first_login = models.BooleanField(default=True) |
|
date_expired = models.DateTimeField( |
|
default=date_expired_default, blank=True, null=True, |
|
db_index=True, verbose_name=_('Date expired') |
|
) |
|
created_by = models.CharField( |
|
max_length=30, default='', blank=True, verbose_name=_('Created by') |
|
) |
|
source = models.CharField( |
|
max_length=30, default=Source.local, |
|
choices=Source.choices, |
|
verbose_name=_('Source') |
|
) |
|
date_password_last_updated = models.DateTimeField( |
|
auto_now_add=True, blank=True, null=True, |
|
verbose_name=_('Date password last updated') |
|
) |
|
need_update_password = models.BooleanField( |
|
default=False, verbose_name=_('Need update password') |
|
) |
|
wecom_id = models.CharField(null=True, default=None, unique=True, max_length=128, verbose_name=_('WeCom')) |
|
dingtalk_id = models.CharField(null=True, default=None, unique=True, max_length=128, verbose_name=_('DingTalk')) |
|
feishu_id = models.CharField(null=True, default=None, unique=True, max_length=128, verbose_name=_('FeiShu')) |
|
|
|
def __str__(self): |
|
return '{0.name}({0.username})'.format(self) |
|
|
|
@classmethod |
|
def get_group_ids_by_user_id(cls, user_id): |
|
group_ids = cls.groups.through.objects.filter(user_id=user_id).distinct().values_list('usergroup_id', flat=True) |
|
group_ids = list(group_ids) |
|
return group_ids |
|
|
|
@property |
|
def receive_backends(self): |
|
return self.user_msg_subscription.receive_backends |
|
|
|
@property |
|
def is_wecom_bound(self): |
|
return bool(self.wecom_id) |
|
|
|
@property |
|
def is_dingtalk_bound(self): |
|
return bool(self.dingtalk_id) |
|
|
|
@property |
|
def is_feishu_bound(self): |
|
return bool(self.feishu_id) |
|
|
|
@property |
|
def is_otp_secret_key_bound(self): |
|
return bool(self.otp_secret_key) |
|
|
|
def get_absolute_url(self): |
|
return reverse('users:user-detail', args=(self.id,)) |
|
|
|
@property |
|
def groups_display(self): |
|
return ' '.join([group.name for group in self.groups.all()]) |
|
|
|
@property |
|
def source_display(self): |
|
return self.get_source_display() |
|
|
|
@property |
|
def is_expired(self): |
|
if self.date_expired and self.date_expired < timezone.now(): |
|
return True |
|
else: |
|
return False |
|
|
|
@property |
|
def expired_remain_days(self): |
|
date_remain = self.date_expired - timezone.now() |
|
return date_remain.days |
|
|
|
@property |
|
def will_expired(self): |
|
if 0 <= self.expired_remain_days < 5: |
|
return True |
|
else: |
|
return False |
|
|
|
@property |
|
def is_valid(self): |
|
if self.is_active and not self.is_expired: |
|
return True |
|
return False |
|
|
|
@property |
|
def is_local(self): |
|
return self.source == self.Source.local.value |
|
|
|
def set_unprovide_attr_if_need(self): |
|
if not self.name: |
|
self.name = self.username |
|
if not self.email or '@' not in self.email: |
|
email = '{}@{}'.format(self.username, settings.EMAIL_SUFFIX) |
|
if '@' in self.username: |
|
email = self.username |
|
self.email = email |
|
|
|
def save(self, *args, **kwargs): |
|
self.set_unprovide_attr_if_need() |
|
if self.username == 'admin': |
|
self.role = 'Admin' |
|
self.is_active = True |
|
super().save(*args, **kwargs) |
|
|
|
def is_member_of(self, user_group): |
|
if user_group in self.groups.all(): |
|
return True |
|
return False |
|
|
|
def set_avatar(self, f): |
|
self.avatar.save(self.username, f) |
|
|
|
@classmethod |
|
def get_avatar_url(cls, username): |
|
user_default = settings.STATIC_URL + "img/avatar/user.png" |
|
return user_default |
|
|
|
def avatar_url(self): |
|
admin_default = settings.STATIC_URL + "img/avatar/admin.png" |
|
user_default = settings.STATIC_URL + "img/avatar/user.png" |
|
if self.avatar: |
|
return self.avatar.url |
|
if self.is_superuser: |
|
return admin_default |
|
else: |
|
return user_default |
|
|
|
def unblock_login(self): |
|
from users.utils import LoginBlockUtil, MFABlockUtils |
|
LoginBlockUtil.unblock_user(self.username) |
|
MFABlockUtils.unblock_user(self.username) |
|
|
|
@property |
|
def login_blocked(self): |
|
from users.utils import LoginBlockUtil, MFABlockUtils |
|
if LoginBlockUtil.is_user_block(self.username): |
|
return True |
|
if MFABlockUtils.is_user_block(self.username): |
|
return True |
|
|
|
return False |
|
|
|
def delete(self, using=None, keep_parents=False): |
|
if self.pk == 1 or self.username == 'admin': |
|
return |
|
return super(User, self).delete() |
|
|
|
@classmethod |
|
def get_user_allowed_auth_backends(cls, username): |
|
if not settings.ONLY_ALLOW_AUTH_FROM_SOURCE or not username: |
|
# return settings.AUTHENTICATION_BACKENDS |
|
return None |
|
user = cls.objects.filter(username=username).first() |
|
if not user: |
|
return None |
|
return user.get_allowed_auth_backends() |
|
|
|
def get_allowed_auth_backends(self): |
|
if not settings.ONLY_ALLOW_AUTH_FROM_SOURCE: |
|
return None |
|
return self.SOURCE_BACKEND_MAPPING.get(self.source, []) |
|
|
|
class Meta: |
|
ordering = ['username'] |
|
verbose_name = _("User") |
|
|
|
#: Use this method initial user |
|
@classmethod |
|
def initial(cls): |
|
from .group import UserGroup |
|
user = cls(username='admin', |
|
email='admin@jumpserver.org', |
|
name=_('Administrator'), |
|
password_raw='admin', |
|
role='Admin', |
|
comment=_('Administrator is the super user of system'), |
|
created_by=_('System')) |
|
user.save() |
|
user.groups.add(UserGroup.initial()) |
|
|
|
def can_send_created_mail(self): |
|
if self.email and self.source == self.Source.local.value: |
|
return True |
|
return False |
|
|
|
|
|
class UserPasswordHistory(models.Model): |
|
id = models.UUIDField(default=uuid.uuid4, primary_key=True) |
|
password = models.CharField(max_length=128) |
|
user = models.ForeignKey("users.User", related_name='history_passwords', |
|
on_delete=models.CASCADE, verbose_name=_('User')) |
|
date_created = models.DateTimeField(auto_now_add=True, verbose_name=_("Date created")) |
|
|
|
def __str__(self): |
|
return f'{self.user} set at {self.date_created}' |
|
|
|
def __repr__(self): |
|
return self.__str__()
|
|
|