mirror of https://github.com/jumpserver/jumpserver
				
				
				
			
		
			
				
	
	
		
			84 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			84 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Python
		
	
	
# -*- coding: utf-8 -*-
 | 
						|
#
 | 
						|
import time
 | 
						|
 | 
						|
from django.conf import settings
 | 
						|
from rest_framework import permissions
 | 
						|
 | 
						|
from authentication.const import ConfirmType
 | 
						|
from common.exceptions import UserConfirmRequired
 | 
						|
from orgs.utils import tmp_to_root_org
 | 
						|
from authentication.models import ConnectionToken
 | 
						|
from common.utils import get_object_or_none
 | 
						|
 | 
						|
 | 
						|
class IsValidUser(permissions.IsAuthenticated, permissions.BasePermission):
 | 
						|
    """Allows access to valid user, is active and not expired"""
 | 
						|
 | 
						|
    def has_permission(self, request, view):
 | 
						|
        return super(IsValidUser, self).has_permission(request, view) \
 | 
						|
               and request.user.is_valid
 | 
						|
 | 
						|
 | 
						|
class IsValidUserOrConnectionToken(IsValidUser):
 | 
						|
 | 
						|
    def has_permission(self, request, view):
 | 
						|
        return super(IsValidUserOrConnectionToken, self).has_permission(request, view) \
 | 
						|
               or self.is_valid_connection_token(request)
 | 
						|
 | 
						|
    @staticmethod
 | 
						|
    def is_valid_connection_token(request):
 | 
						|
        token_id = request.query_params.get('token')
 | 
						|
        if not token_id:
 | 
						|
            return False
 | 
						|
        with tmp_to_root_org():
 | 
						|
            token = get_object_or_none(ConnectionToken, id=token_id)
 | 
						|
        return token and token.is_valid
 | 
						|
 | 
						|
 | 
						|
class OnlySuperUser(IsValidUser):
 | 
						|
    def has_permission(self, request, view):
 | 
						|
        return super().has_permission(request, view) \
 | 
						|
               and request.user.is_superuser
 | 
						|
 | 
						|
 | 
						|
class WithBootstrapToken(permissions.BasePermission):
 | 
						|
    def has_permission(self, request, view):
 | 
						|
        authorization = request.META.get('HTTP_AUTHORIZATION', '')
 | 
						|
        if not authorization:
 | 
						|
            return False
 | 
						|
        request_bootstrap_token = authorization.split()[-1]
 | 
						|
        return settings.BOOTSTRAP_TOKEN == request_bootstrap_token
 | 
						|
 | 
						|
 | 
						|
class UserConfirmation(permissions.BasePermission):
 | 
						|
    ttl = 60 * 5
 | 
						|
    min_level = 1
 | 
						|
    confirm_type = ConfirmType.ReLogin
 | 
						|
 | 
						|
    def has_permission(self, request, view):
 | 
						|
        if not settings.SECURITY_VIEW_AUTH_NEED_MFA:
 | 
						|
            return True
 | 
						|
 | 
						|
        confirm_level = request.session.get('CONFIRM_LEVEL')
 | 
						|
        confirm_time = request.session.get('CONFIRM_TIME')
 | 
						|
        ttl = self.get_ttl()
 | 
						|
        if not confirm_level or not confirm_time or \
 | 
						|
                confirm_level < self.min_level or \
 | 
						|
                confirm_time < time.time() - ttl:
 | 
						|
            raise UserConfirmRequired(code=self.confirm_type)
 | 
						|
        return True
 | 
						|
 | 
						|
    def get_ttl(self):
 | 
						|
        if self.confirm_type == ConfirmType.MFA:
 | 
						|
            ttl = settings.SECURITY_MFA_VERIFY_TTL
 | 
						|
        else:
 | 
						|
            ttl = self.ttl
 | 
						|
        return ttl
 | 
						|
 | 
						|
    @classmethod
 | 
						|
    def require(cls, confirm_type=ConfirmType.ReLogin, ttl=60 * 5):
 | 
						|
        min_level = ConfirmType.values.index(confirm_type) + 1
 | 
						|
        name = 'UserConfirmationLevel{}TTL{}'.format(min_level, ttl)
 | 
						|
        return type(name, (cls,), {'min_level': min_level, 'ttl': ttl, 'confirm_type': confirm_type})
 |