mirror of https://github.com/jumpserver/jumpserver
				
				
				
			
		
			
				
	
	
		
			185 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			185 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			Python
		
	
	
| # -*- coding: utf-8 -*-
 | |
| #
 | |
| import time
 | |
| 
 | |
| from rest_framework import permissions
 | |
| from django.contrib.auth.mixins import UserPassesTestMixin
 | |
| from django.conf import settings
 | |
| 
 | |
| from orgs.utils import current_org
 | |
| 
 | |
| 
 | |
| class IsValidUser(permissions.IsAuthenticated, permissions.BasePermission):
 | |
|     """Allows access to valid user, is active and not expired"""
 | |
| 
 | |
|     def has_permission(self, request, view):
 | |
|         return super(IsValidUser, self).has_permission(request, view) \
 | |
|             and request.user.is_valid
 | |
| 
 | |
| 
 | |
| class IsAppUser(IsValidUser):
 | |
|     """Allows access only to app user """
 | |
| 
 | |
|     def has_permission(self, request, view):
 | |
|         return super(IsAppUser, self).has_permission(request, view) \
 | |
|             and request.user.is_app
 | |
| 
 | |
| 
 | |
| class IsSuperUser(IsValidUser):
 | |
|     def has_permission(self, request, view):
 | |
|         return super(IsSuperUser, self).has_permission(request, view) \
 | |
|                and request.user.is_superuser
 | |
| 
 | |
| 
 | |
| class IsSuperUserOrAppUser(IsSuperUser):
 | |
|     def has_permission(self, request, view):
 | |
|         return super(IsSuperUserOrAppUser, self).has_permission(request, view) \
 | |
|             or request.user.is_app
 | |
| 
 | |
| 
 | |
| class IsSuperAuditor(IsValidUser):
 | |
|     def has_permission(self, request, view):
 | |
|         return super(IsSuperAuditor, self).has_permission(request, view) \
 | |
|                and request.user.is_super_auditor
 | |
| 
 | |
| 
 | |
| class IsOrgAuditor(IsValidUser):
 | |
|     def has_permission(self, request, view):
 | |
|         if not current_org:
 | |
|             return False
 | |
|         return super(IsOrgAuditor, self).has_permission(request, view) \
 | |
|                and current_org.can_audit_by(request.user)
 | |
| 
 | |
| 
 | |
| class IsOrgAdmin(IsValidUser):
 | |
|     """Allows access only to superuser"""
 | |
| 
 | |
|     def has_permission(self, request, view):
 | |
|         if not current_org:
 | |
|             return False
 | |
|         return super(IsOrgAdmin, self).has_permission(request, view) \
 | |
|             and current_org.can_admin_by(request.user)
 | |
| 
 | |
| 
 | |
| class IsOrgAdminOrAppUser(IsValidUser):
 | |
|     """Allows access between superuser and app user"""
 | |
| 
 | |
|     def has_permission(self, request, view):
 | |
|         if not current_org:
 | |
|             return False
 | |
|         return super(IsOrgAdminOrAppUser, self).has_permission(request, view) \
 | |
|             and (current_org.can_admin_by(request.user) or request.user.is_app)
 | |
| 
 | |
| 
 | |
| class IsOrgAdminOrAppUserOrUserReadonly(IsOrgAdminOrAppUser):
 | |
|     def has_permission(self, request, view):
 | |
|         if IsValidUser.has_permission(self, request, view) \
 | |
|                 and request.method in permissions.SAFE_METHODS:
 | |
|             return True
 | |
|         else:
 | |
|             return IsOrgAdminOrAppUser.has_permission(self, request, view)
 | |
| 
 | |
| 
 | |
| class IsCurrentUserOrReadOnly(permissions.BasePermission):
 | |
|     def has_object_permission(self, request, view, obj):
 | |
|         if request.method in permissions.SAFE_METHODS:
 | |
|             return True
 | |
|         return obj == request.user
 | |
| 
 | |
| 
 | |
| class WithBootstrapToken(permissions.BasePermission):
 | |
|     def has_permission(self, request, view):
 | |
|         authorization = request.META.get('HTTP_AUTHORIZATION', '')
 | |
|         if not authorization:
 | |
|             return False
 | |
|         request_bootstrap_token = authorization.split()[-1]
 | |
|         return settings.BOOTSTRAP_TOKEN == request_bootstrap_token
 | |
| 
 | |
| 
 | |
| class PermissionsMixin(UserPassesTestMixin):
 | |
|     permission_classes = []
 | |
| 
 | |
|     def get_permissions(self):
 | |
|         return self.permission_classes
 | |
| 
 | |
|     def test_func(self):
 | |
|         permission_classes = self.get_permissions()
 | |
|         for permission_class in permission_classes:
 | |
|             if not permission_class().has_permission(self.request, self):
 | |
|                 return False
 | |
|         return True
 | |
| 
 | |
| 
 | |
| class UserCanUpdatePassword:
 | |
|     def has_permission(self, request, view):
 | |
|         return request.user.can_update_password()
 | |
| 
 | |
| 
 | |
| class UserCanUpdateSSHKey:
 | |
|     def has_permission(self, request, view):
 | |
|         return request.user.can_update_ssh_key()
 | |
| 
 | |
| 
 | |
| class NeedMFAVerify(permissions.BasePermission):
 | |
|     def has_permission(self, request, view):
 | |
|         mfa_verify_time = request.session.get('MFA_VERIFY_TIME', 0)
 | |
|         if time.time() - mfa_verify_time < settings.SECURITY_MFA_VERIFY_TTL:
 | |
|             return True
 | |
|         return False
 | |
| 
 | |
| 
 | |
| class CanUpdateDeleteUser(permissions.BasePermission):
 | |
| 
 | |
|     @staticmethod
 | |
|     def has_delete_object_permission(request, view, obj):
 | |
|         if request.user.is_anonymous:
 | |
|             return False
 | |
|         if not request.user.can_admin_current_org:
 | |
|             return False
 | |
|         # 超级管理员 / 组织管理员
 | |
|         if str(request.user.id) == str(obj.id):
 | |
|             return False
 | |
|         # 超级管理员
 | |
|         if request.user.is_superuser:
 | |
|             if obj.is_superuser and obj.username in ['admin']:
 | |
|                 return False
 | |
|             return True
 | |
|         # 组织管理员
 | |
|         if obj.is_superuser:
 | |
|             return False
 | |
|         if obj.is_super_auditor:
 | |
|             return False
 | |
|         if obj.can_admin_current_org:
 | |
|             return False
 | |
|         return True
 | |
| 
 | |
|     @staticmethod
 | |
|     def has_update_object_permission(request, view, obj):
 | |
|         if request.user.is_anonymous:
 | |
|             return False
 | |
|         if not request.user.can_admin_current_org:
 | |
|             return False
 | |
|         # 超级管理员 / 组织管理员
 | |
|         if str(request.user.id) == str(obj.id):
 | |
|             return True
 | |
|         # 超级管理员
 | |
|         if request.user.is_superuser:
 | |
|             return True
 | |
|         # 组织管理员
 | |
|         if obj.is_superuser:
 | |
|             return False
 | |
|         if obj.is_super_auditor:
 | |
|             return False
 | |
|         return True
 | |
| 
 | |
|     def has_object_permission(self, request, view, obj):
 | |
|         if request.user.is_anonymous:
 | |
|             return False
 | |
|         if not request.user.can_admin_current_org:
 | |
|             return False
 | |
|         if request.method in ['DELETE']:
 | |
|             return self.has_delete_object_permission(request, view, obj)
 | |
|         if request.method in ['PUT', 'PATCH']:
 | |
|             return self.has_update_object_permission(request, view, obj)
 | |
|         return True
 |