mirror of https://github.com/jumpserver/jumpserver
356 lines
14 KiB
Python
356 lines
14 KiB
Python
from rest_framework import serializers
|
||
from django.utils.translation import ugettext_lazy as _
|
||
from django.db.models import Count
|
||
|
||
from common.mixins.serializers import BulkSerializerMixin
|
||
from common.utils import ssh_pubkey_gen
|
||
from common.drf.fields import EncryptedField
|
||
from common.drf.serializers import SecretReadableMixin
|
||
from common.validators import alphanumeric_re, alphanumeric_cn_re, alphanumeric_win_re
|
||
from orgs.mixins.serializers import BulkOrgResourceModelSerializer
|
||
from ..models import SystemUser, Asset
|
||
from .utils import validate_password_for_ansible
|
||
from .base import AuthSerializerMixin
|
||
|
||
__all__ = [
|
||
'SystemUserSerializer', 'MiniSystemUserSerializer',
|
||
'SystemUserSimpleSerializer', 'SystemUserAssetRelationSerializer',
|
||
'SystemUserNodeRelationSerializer', 'SystemUserTaskSerializer',
|
||
'SystemUserUserRelationSerializer', 'SystemUserWithAuthInfoSerializer',
|
||
'SystemUserTempAuthSerializer', 'RelationMixin',
|
||
]
|
||
|
||
|
||
class SystemUserSerializer(AuthSerializerMixin, BulkOrgResourceModelSerializer):
|
||
"""
|
||
系统用户
|
||
"""
|
||
password = EncryptedField(
|
||
label=_('Password'), required=False, allow_blank=True, allow_null=True, max_length=1024,
|
||
trim_whitespace=False, validators=[validate_password_for_ansible],
|
||
write_only=True
|
||
)
|
||
auto_generate_key = serializers.BooleanField(initial=True, required=False, write_only=True)
|
||
type_display = serializers.ReadOnlyField(source='get_type_display', label=_('Type display'))
|
||
ssh_key_fingerprint = serializers.ReadOnlyField(label=_('SSH key fingerprint'))
|
||
token = EncryptedField(
|
||
label=_('Token'), required=False, write_only=True, style={'base_template': 'textarea.html'}
|
||
)
|
||
applications_amount = serializers.IntegerField(
|
||
source='apps_amount', read_only=True, label=_('Apps amount')
|
||
)
|
||
|
||
class Meta:
|
||
model = SystemUser
|
||
fields_mini = ['id', 'name', 'username']
|
||
fields_write_only = ['password', 'public_key', 'private_key', 'passphrase']
|
||
fields_small = fields_mini + fields_write_only + [
|
||
'token', 'ssh_key_fingerprint',
|
||
'type', 'type_display', 'protocol', 'is_asset_protocol',
|
||
'login_mode', 'login_mode_display', 'priority',
|
||
'sudo', 'shell', 'sftp_root', 'home', 'system_groups', 'ad_domain',
|
||
'username_same_with_user', 'auto_push', 'auto_generate_key',
|
||
'su_enabled', 'su_from',
|
||
'date_created', 'date_updated', 'comment', 'created_by',
|
||
]
|
||
fields_m2m = ['cmd_filters', 'assets_amount', 'applications_amount', 'nodes']
|
||
fields = fields_small + fields_m2m
|
||
extra_kwargs = {
|
||
'cmd_filters': {"required": False, 'label': _('Command filter')},
|
||
'public_key': {"write_only": True},
|
||
'private_key': {"write_only": True},
|
||
'nodes_amount': {'label': _('Nodes amount')},
|
||
'assets_amount': {'label': _('Assets amount')},
|
||
'login_mode_display': {'label': _('Login mode display')},
|
||
'created_by': {'read_only': True},
|
||
'ad_domain': {'required': False, 'allow_blank': True, 'label': _('Ad domain')},
|
||
'is_asset_protocol': {'label': _('Is asset protocol')},
|
||
'su_from': {'help_text': _('Only ssh and automatic login system users are supported')}
|
||
}
|
||
|
||
def validate_auto_push(self, value):
|
||
login_mode = self.get_initial_value("login_mode")
|
||
protocol = self.get_initial_value("protocol")
|
||
|
||
if login_mode == SystemUser.LOGIN_MANUAL:
|
||
value = False
|
||
elif protocol not in SystemUser.SUPPORT_PUSH_PROTOCOLS:
|
||
value = False
|
||
return value
|
||
|
||
def validate_auto_generate_key(self, value):
|
||
login_mode = self.get_initial_value("login_mode")
|
||
protocol = self.get_initial_value("protocol")
|
||
|
||
if self.context["request"].method.lower() != "post":
|
||
value = False
|
||
elif self.instance:
|
||
value = False
|
||
elif login_mode == SystemUser.LOGIN_MANUAL:
|
||
value = False
|
||
elif protocol not in SystemUser.SUPPORT_PUSH_PROTOCOLS:
|
||
value = False
|
||
return value
|
||
|
||
def validate_username_same_with_user(self, username_same_with_user):
|
||
if not username_same_with_user:
|
||
return username_same_with_user
|
||
protocol = self.get_initial_value("protocol", "ssh")
|
||
queryset = SystemUser.objects.filter(
|
||
protocol=protocol,
|
||
username_same_with_user=True
|
||
)
|
||
if self.instance:
|
||
queryset = queryset.exclude(id=self.instance.id)
|
||
exists = queryset.exists()
|
||
if not exists:
|
||
return username_same_with_user
|
||
error = _("Username same with user with protocol {} only allow 1").format(protocol)
|
||
raise serializers.ValidationError(error)
|
||
|
||
def validate_username(self, username):
|
||
protocol = self.get_initial_value("protocol")
|
||
if username:
|
||
if protocol == SystemUser.Protocol.telnet:
|
||
regx = alphanumeric_cn_re
|
||
elif protocol == SystemUser.Protocol.rdp:
|
||
regx = alphanumeric_win_re
|
||
else:
|
||
regx = alphanumeric_re
|
||
if not regx.match(username):
|
||
raise serializers.ValidationError(_('Special char not allowed'))
|
||
return username
|
||
|
||
username_same_with_user = self.get_initial_value("username_same_with_user")
|
||
if username_same_with_user:
|
||
return ''
|
||
|
||
login_mode = self.get_initial_value("login_mode")
|
||
if login_mode == SystemUser.LOGIN_AUTO and protocol != SystemUser.Protocol.vnc \
|
||
and protocol != SystemUser.Protocol.redis:
|
||
msg = _('* Automatic login mode must fill in the username.')
|
||
raise serializers.ValidationError(msg)
|
||
return username
|
||
|
||
def validate_home(self, home):
|
||
username_same_with_user = self.get_initial_value("username_same_with_user")
|
||
if username_same_with_user:
|
||
return ''
|
||
return home
|
||
|
||
@staticmethod
|
||
def validate_sftp_root(value):
|
||
if value in ['home', 'tmp']:
|
||
return value
|
||
if not value.startswith('/'):
|
||
error = _("Path should starts with /")
|
||
raise serializers.ValidationError(error)
|
||
return value
|
||
|
||
def validate_password(self, password):
|
||
super().validate_password(password)
|
||
auto_gen_key = self.get_initial_value('auto_generate_key', False)
|
||
private_key = self.get_initial_value('private_key')
|
||
login_mode = self.get_initial_value('login_mode')
|
||
|
||
if not self.instance and not auto_gen_key and not password and \
|
||
not private_key and login_mode == SystemUser.LOGIN_AUTO:
|
||
raise serializers.ValidationError(_("Password or private key required"))
|
||
return password
|
||
|
||
def validate_su_from(self, su_from: SystemUser):
|
||
# self: su enabled
|
||
su_enabled = self.get_initial_value('su_enabled', default=False)
|
||
if not su_enabled:
|
||
return
|
||
if not su_from:
|
||
error = _('This field is required.')
|
||
raise serializers.ValidationError(error)
|
||
# self: protocol ssh
|
||
protocol = self.get_initial_value('protocol', default=SystemUser.Protocol.ssh.value)
|
||
if protocol not in [SystemUser.Protocol.ssh.value]:
|
||
error = _('Only ssh protocol system users are allowed')
|
||
raise serializers.ValidationError(error)
|
||
# su_from: protocol same
|
||
if su_from.protocol != protocol:
|
||
error = _('The protocol must be consistent with the current user: {}').format(protocol)
|
||
raise serializers.ValidationError(error)
|
||
# su_from: login model auto
|
||
if su_from.login_mode != su_from.LOGIN_AUTO:
|
||
error = _('Only system users with automatic login are allowed')
|
||
raise serializers.ValidationError(error)
|
||
return su_from
|
||
|
||
def _validate_admin_user(self, attrs):
|
||
if self.instance:
|
||
tp = self.instance.type
|
||
else:
|
||
tp = attrs.get('type')
|
||
if tp != SystemUser.Type.admin:
|
||
return attrs
|
||
attrs['protocol'] = SystemUser.Protocol.ssh
|
||
attrs['login_mode'] = SystemUser.LOGIN_AUTO
|
||
attrs['username_same_with_user'] = False
|
||
attrs['auto_push'] = False
|
||
return attrs
|
||
|
||
def _validate_gen_key(self, attrs):
|
||
username = attrs.get('username', 'manual')
|
||
auto_gen_key = attrs.pop('auto_generate_key', False)
|
||
protocol = attrs.get('protocol')
|
||
|
||
if protocol not in SystemUser.SUPPORT_PUSH_PROTOCOLS:
|
||
return attrs
|
||
|
||
# 自动生成
|
||
if auto_gen_key and not self.instance:
|
||
password = SystemUser.gen_password()
|
||
attrs['password'] = password
|
||
if protocol == SystemUser.Protocol.ssh:
|
||
private_key, public_key = SystemUser.gen_key(username)
|
||
attrs['private_key'] = private_key
|
||
attrs['public_key'] = public_key
|
||
# 如果设置了private key,没有设置public key则生成
|
||
elif attrs.get('private_key'):
|
||
private_key = attrs['private_key']
|
||
password = attrs.get('password')
|
||
public_key = ssh_pubkey_gen(private_key, password=password, username=username)
|
||
attrs['public_key'] = public_key
|
||
return attrs
|
||
|
||
def _validate_login_mode(self, attrs):
|
||
if 'login_mode' in attrs:
|
||
login_mode = attrs['login_mode']
|
||
else:
|
||
login_mode = self.instance.login_mode if self.instance else SystemUser.LOGIN_AUTO
|
||
|
||
if login_mode == SystemUser.LOGIN_MANUAL:
|
||
attrs['password'] = ''
|
||
attrs['private_key'] = ''
|
||
attrs['public_key'] = ''
|
||
|
||
return attrs
|
||
|
||
def validate(self, attrs):
|
||
attrs = self._validate_admin_user(attrs)
|
||
attrs = self._validate_gen_key(attrs)
|
||
attrs = self._validate_login_mode(attrs)
|
||
return attrs
|
||
|
||
@classmethod
|
||
def setup_eager_loading(cls, queryset):
|
||
""" Perform necessary eager loading of data. """
|
||
queryset = queryset \
|
||
.annotate(assets_amount=Count("assets")) \
|
||
.prefetch_related('nodes', 'cmd_filters')
|
||
return queryset
|
||
|
||
|
||
class MiniSystemUserSerializer(serializers.ModelSerializer):
|
||
class Meta:
|
||
model = SystemUser
|
||
fields = SystemUserSerializer.Meta.fields_mini
|
||
|
||
|
||
class SystemUserWithAuthInfoSerializer(SecretReadableMixin, SystemUserSerializer):
|
||
class Meta(SystemUserSerializer.Meta):
|
||
fields_mini = ['id', 'name', 'username']
|
||
fields_write_only = ['password', 'public_key', 'private_key']
|
||
fields_small = fields_mini + fields_write_only + [
|
||
'protocol', 'login_mode', 'login_mode_display', 'priority',
|
||
'sudo', 'shell', 'ad_domain', 'sftp_root', 'token',
|
||
"username_same_with_user", 'auto_push', 'auto_generate_key',
|
||
'comment',
|
||
]
|
||
fields = fields_small
|
||
extra_kwargs = {
|
||
'nodes_amount': {'label': _('Node')},
|
||
'assets_amount': {'label': _('Asset')},
|
||
'login_mode_display': {'label': _('Login mode display')},
|
||
'created_by': {'read_only': True},
|
||
'password': {'write_only': False},
|
||
'private_key': {'write_only': False},
|
||
'token': {'write_only': False}
|
||
}
|
||
|
||
|
||
class SystemUserSimpleSerializer(serializers.ModelSerializer):
|
||
"""
|
||
系统用户最基本信息的数据结构
|
||
"""
|
||
|
||
class Meta:
|
||
model = SystemUser
|
||
fields = ('id', 'name', 'username')
|
||
|
||
|
||
class RelationMixin(BulkSerializerMixin, serializers.Serializer):
|
||
systemuser_display = serializers.ReadOnlyField(label=_("System user name"))
|
||
org_name = serializers.ReadOnlyField(label=_("Org name"))
|
||
|
||
def get_field_names(self, declared_fields, info):
|
||
fields = super().get_field_names(declared_fields, info)
|
||
fields.extend(['systemuser', "systemuser_display", "org_name"])
|
||
return fields
|
||
|
||
|
||
class SystemUserAssetRelationSerializer(RelationMixin, serializers.ModelSerializer):
|
||
asset_display = serializers.ReadOnlyField(label=_('Asset hostname'))
|
||
|
||
class Meta:
|
||
model = SystemUser.assets.through
|
||
fields = [
|
||
"id", "asset", "asset_display", 'systemuser', 'systemuser_display',
|
||
"connectivity", 'date_verified', 'org_id'
|
||
]
|
||
use_model_bulk_create = True
|
||
model_bulk_create_kwargs = {
|
||
'ignore_conflicts': True
|
||
}
|
||
|
||
|
||
class SystemUserNodeRelationSerializer(RelationMixin, serializers.ModelSerializer):
|
||
node_display = serializers.SerializerMethodField()
|
||
|
||
class Meta:
|
||
model = SystemUser.nodes.through
|
||
fields = [
|
||
'id', 'node', "node_display",
|
||
]
|
||
|
||
def get_node_display(self, obj):
|
||
return obj.node.full_value
|
||
|
||
|
||
class SystemUserUserRelationSerializer(RelationMixin, serializers.ModelSerializer):
|
||
user_display = serializers.ReadOnlyField()
|
||
|
||
class Meta:
|
||
model = SystemUser.users.through
|
||
fields = [
|
||
'id', "user", "user_display",
|
||
]
|
||
|
||
|
||
class SystemUserTaskSerializer(serializers.Serializer):
|
||
ACTION_CHOICES = (
|
||
("test", "test"),
|
||
("push", "push"),
|
||
)
|
||
action = serializers.ChoiceField(choices=ACTION_CHOICES, write_only=True)
|
||
asset = serializers.PrimaryKeyRelatedField(
|
||
queryset=Asset.objects, allow_null=True, required=False, write_only=True
|
||
)
|
||
assets = serializers.PrimaryKeyRelatedField(
|
||
queryset=Asset.objects, allow_null=True, required=False, write_only=True,
|
||
many=True
|
||
)
|
||
task = serializers.CharField(read_only=True)
|
||
|
||
|
||
class SystemUserTempAuthSerializer(SystemUserSerializer):
|
||
instance_id = serializers.CharField()
|
||
|
||
class Meta(SystemUserSerializer.Meta):
|
||
fields = ['instance_id', 'username', 'password']
|