mirror of https://github.com/jumpserver/jumpserver
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
179 lines
6.8 KiB
179 lines
6.8 KiB
from copy import deepcopy
|
|
|
|
from django.db.models import QuerySet
|
|
|
|
from accounts.const import AutomationTypes, SecretType
|
|
from accounts.models import Account
|
|
from assets.const import HostTypes
|
|
from common.utils import get_logger
|
|
from ..base.manager import AccountBasePlaybookManager
|
|
from ..change_secret.manager import ChangeSecretManager
|
|
|
|
logger = get_logger(__name__)
|
|
|
|
|
|
class PushAccountManager(ChangeSecretManager, AccountBasePlaybookManager):
|
|
ansible_account_prefer = ''
|
|
|
|
@classmethod
|
|
def method_type(cls):
|
|
return AutomationTypes.push_account
|
|
|
|
def create_nonlocal_accounts(self, accounts, snapshot_account_usernames, asset):
|
|
secret_type = self.secret_type
|
|
usernames = accounts.filter(secret_type=secret_type).values_list(
|
|
'username', flat=True
|
|
)
|
|
create_usernames = set(snapshot_account_usernames) - set(usernames)
|
|
create_account_objs = [
|
|
Account(
|
|
name=f'{username}-{secret_type}', username=username,
|
|
secret_type=secret_type, asset=asset,
|
|
)
|
|
for username in create_usernames
|
|
]
|
|
Account.objects.bulk_create(create_account_objs)
|
|
|
|
def get_accounts(self, privilege_account, accounts: QuerySet):
|
|
if not privilege_account:
|
|
print(f'not privilege account')
|
|
return []
|
|
snapshot_account_usernames = self.execution.snapshot['accounts']
|
|
if '*' in snapshot_account_usernames:
|
|
return accounts.exclude(username=privilege_account.username)
|
|
|
|
asset = privilege_account.asset
|
|
self.create_nonlocal_accounts(accounts, snapshot_account_usernames, asset)
|
|
accounts = asset.accounts.exclude(username=privilege_account.username).filter(
|
|
username__in=snapshot_account_usernames, secret_type=self.secret_type
|
|
)
|
|
return accounts
|
|
|
|
def host_callback(self, host, asset=None, account=None, automation=None, path_dir=None, **kwargs):
|
|
host = super(ChangeSecretManager, self).host_callback(
|
|
host, asset=asset, account=account, automation=automation,
|
|
path_dir=path_dir, **kwargs
|
|
)
|
|
if host.get('error'):
|
|
return host
|
|
|
|
accounts = asset.accounts.all()
|
|
accounts = self.get_accounts(account, accounts)
|
|
inventory_hosts = []
|
|
host['secret_type'] = self.secret_type
|
|
if asset.type == HostTypes.WINDOWS and self.secret_type == SecretType.SSH_KEY:
|
|
msg = f'Windows {asset} does not support ssh key push \n'
|
|
print(msg)
|
|
return inventory_hosts
|
|
|
|
for account in accounts:
|
|
h = deepcopy(host)
|
|
h['name'] += '(' + account.username + ')'
|
|
new_secret = self.get_secret()
|
|
|
|
self.name_recorder_mapper[h['name']] = {
|
|
'account': account, 'new_secret': new_secret,
|
|
}
|
|
|
|
private_key_path = None
|
|
if self.secret_type == SecretType.SSH_KEY:
|
|
private_key_path = self.generate_private_key_path(new_secret, path_dir)
|
|
new_secret = self.generate_public_key(new_secret)
|
|
|
|
h['kwargs'] = self.get_kwargs(account, new_secret)
|
|
h['account'] = {
|
|
'name': account.name,
|
|
'username': account.username,
|
|
'secret_type': account.secret_type,
|
|
'secret': new_secret,
|
|
'private_key_path': private_key_path
|
|
}
|
|
if asset.platform.type == 'oracle':
|
|
h['account']['mode'] = 'sysdba' if account.privileged else None
|
|
inventory_hosts.append(h)
|
|
return inventory_hosts
|
|
|
|
def on_host_success(self, host, result):
|
|
account_info = self.name_recorder_mapper.get(host)
|
|
if not account_info:
|
|
return
|
|
|
|
account = account_info['account']
|
|
new_secret = account_info['new_secret']
|
|
if not account:
|
|
return
|
|
account.secret = new_secret
|
|
account.save(update_fields=['secret'])
|
|
|
|
def on_host_error(self, host, error, result):
|
|
pass
|
|
|
|
def on_runner_failed(self, runner, e):
|
|
logger.error("Pust account error: ", e)
|
|
|
|
def run(self, *args, **kwargs):
|
|
if not self.check_secret():
|
|
return
|
|
super().run(*args, **kwargs)
|
|
|
|
# @classmethod
|
|
# def trigger_by_asset_create(cls, asset):
|
|
# automations = PushAccountAutomation.objects.filter(
|
|
# triggers__contains=TriggerChoice.on_asset_create
|
|
# )
|
|
# account_automation_map = {auto.username: auto for auto in automations}
|
|
#
|
|
# util = AssetPermissionUtil()
|
|
# permissions = util.get_permissions_for_assets([asset], with_node=True)
|
|
# account_permission_map = defaultdict(list)
|
|
# for permission in permissions:
|
|
# for account in permission.accounts:
|
|
# account_permission_map[account].append(permission)
|
|
#
|
|
# username_automation_map = {}
|
|
# for username, automation in account_automation_map.items():
|
|
# if username != '@USER':
|
|
# username_automation_map[username] = automation
|
|
# continue
|
|
#
|
|
# asset_permissions = account_permission_map.get(username)
|
|
# if not asset_permissions:
|
|
# continue
|
|
# asset_permissions = util.get_permissions([p.id for p in asset_permissions])
|
|
# usernames = asset_permissions.values_list('users__username', flat=True).distinct()
|
|
# for _username in usernames:
|
|
# username_automation_map[_username] = automation
|
|
#
|
|
# asset_usernames_exists = asset.accounts.values_list('username', flat=True)
|
|
# accounts_to_create = []
|
|
# accounts_to_push = []
|
|
# for username, automation in username_automation_map.items():
|
|
# if username in asset_usernames_exists:
|
|
# continue
|
|
#
|
|
# if automation.secret_strategy != SecretStrategy.custom:
|
|
# secret_generator = SecretGenerator(
|
|
# automation.secret_strategy, automation.secret_type,
|
|
# automation.password_rules
|
|
# )
|
|
# secret = secret_generator.get_secret()
|
|
# else:
|
|
# secret = automation.secret
|
|
#
|
|
# account = Account(
|
|
# username=username, secret=secret,
|
|
# asset=asset, secret_type=automation.secret_type,
|
|
# comment='Create by account creation {}'.format(automation.name),
|
|
# )
|
|
# accounts_to_create.append(account)
|
|
# if automation.action == 'create_and_push':
|
|
# accounts_to_push.append(account)
|
|
# else:
|
|
# accounts_to_create.append(account)
|
|
#
|
|
# logger.debug(f'Create account {account} for asset {asset}')
|
|
|
|
# @classmethod
|
|
# def trigger_by_permission_accounts_change(cls):
|
|
# pass
|