mirror of https://github.com/jumpserver/jumpserver
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
258 lines
6.5 KiB
258 lines
6.5 KiB
# -*- coding: utf-8 -*-
|
|
#
|
|
|
|
from __future__ import unicode_literals
|
|
from six import string_types
|
|
import os
|
|
from itertools import chain
|
|
import string
|
|
import logging
|
|
import datetime
|
|
import paramiko
|
|
|
|
import paramiko
|
|
import sshpubkeys
|
|
from itsdangerous import TimedJSONWebSignatureSerializer, JSONWebSignatureSerializer, \
|
|
BadSignature, SignatureExpired
|
|
from django.shortcuts import reverse as dj_reverse
|
|
from django.conf import settings
|
|
from django.core import signing
|
|
from django.utils import timezone
|
|
|
|
try:
|
|
import cStringIO as StringIO
|
|
except ImportError:
|
|
import StringIO
|
|
|
|
SECRET_KEY = settings.SECRET_KEY
|
|
|
|
|
|
def reverse(view_name, urlconf=None, args=None, kwargs=None, current_app=None, external=False):
|
|
url = dj_reverse(view_name, urlconf=urlconf, args=args, kwargs=kwargs, current_app=current_app)
|
|
|
|
if external:
|
|
url = settings.SITE_URL.strip('/') + url
|
|
return url
|
|
|
|
|
|
def get_object_or_none(model, **kwargs):
|
|
try:
|
|
obj = model.objects.get(**kwargs)
|
|
except model.DoesNotExist:
|
|
obj = None
|
|
return obj
|
|
|
|
|
|
class Signer(object):
|
|
def __init__(self, secret_key=SECRET_KEY):
|
|
self.secret_key = secret_key
|
|
|
|
def sign(self, value):
|
|
s = JSONWebSignatureSerializer(self.secret_key)
|
|
return s.dumps(value)
|
|
|
|
def unsign(self, value):
|
|
s = JSONWebSignatureSerializer(self.secret_key)
|
|
try:
|
|
return s.loads(value)
|
|
except BadSignature:
|
|
return None
|
|
|
|
def sign_t(self, value, expires_in=3600):
|
|
s = TimedJSONWebSignatureSerializer(self.secret_key, expires_in=expires_in)
|
|
return s.dumps(value)
|
|
|
|
def unsign_t(self, value):
|
|
s = TimedJSONWebSignatureSerializer(self.secret_key)
|
|
try:
|
|
return s.loads(value)
|
|
except (BadSignature, SignatureExpired):
|
|
return None
|
|
|
|
|
|
def date_expired_default():
|
|
try:
|
|
years = int(settings.CONFIG.DEFAULT_EXPIRED_YEARS)
|
|
except TypeError:
|
|
years = 70
|
|
return timezone.now() + timezone.timedelta(days=365*years)
|
|
|
|
|
|
def combine_seq(s1, s2, callback=None):
|
|
for s in (s1, s2):
|
|
if not hasattr(s, '__iter__'):
|
|
return []
|
|
|
|
seq = chain(s1, s2)
|
|
if callback:
|
|
seq = map(callback, seq)
|
|
return seq
|
|
|
|
|
|
def search_object_attr(obj, value='', attr_list=None, ignore_case=False):
|
|
"""It's provide a method to search a object attribute equal some value
|
|
|
|
If object some attribute equal :param: value, return True else return False
|
|
|
|
class A():
|
|
name = 'admin'
|
|
age = 7
|
|
|
|
:param obj: A object
|
|
:param value: A string match object attribute
|
|
:param attr_list: Only match attribute in attr_list
|
|
:param ignore_case: Ignore case
|
|
:return: Boolean
|
|
"""
|
|
if value == '':
|
|
return True
|
|
|
|
try:
|
|
object_attr = obj.__dict__
|
|
except AttributeError:
|
|
return False
|
|
|
|
if attr_list is not None:
|
|
new_object_attr = {}
|
|
for attr in attr_list:
|
|
new_object_attr[attr] = object_attr.pop(attr)
|
|
object_attr = new_object_attr
|
|
|
|
if ignore_case:
|
|
if not isinstance(value, string_types):
|
|
return False
|
|
|
|
if value.lower() in map(string.lower, map(str, object_attr.values())):
|
|
return True
|
|
else:
|
|
if value in object_attr.values():
|
|
return True
|
|
return False
|
|
|
|
|
|
def get_logger(name=None):
|
|
return logging.getLogger('jumpserver.%s' % name)
|
|
|
|
|
|
def int_seq(seq):
|
|
try:
|
|
return map(int, seq)
|
|
except ValueError:
|
|
return seq
|
|
|
|
|
|
def timesince(dt, since='', default="just now"):
|
|
"""
|
|
Returns string representing "time since" e.g.
|
|
3 days, 5 hours.
|
|
"""
|
|
|
|
if since is '':
|
|
since = datetime.datetime.utcnow()
|
|
|
|
if since is None:
|
|
return default
|
|
|
|
diff = since - dt
|
|
|
|
periods = (
|
|
(diff.days / 365, "year", "years"),
|
|
(diff.days / 30, "month", "months"),
|
|
(diff.days / 7, "week", "weeks"),
|
|
(diff.days, "day", "days"),
|
|
(diff.seconds / 3600, "hour", "hours"),
|
|
(diff.seconds / 60, "minute", "minutes"),
|
|
(diff.seconds, "second", "seconds"),
|
|
)
|
|
|
|
for period, singular, plural in periods:
|
|
if period:
|
|
return "%d %s" % (period, singular if period == 1 else plural)
|
|
return default
|
|
|
|
|
|
def ssh_key_string_to_obj(text):
|
|
key_f = StringIO.StringIO(text)
|
|
key = None
|
|
try:
|
|
key = paramiko.RSAKey.from_private_key(key_f)
|
|
except paramiko.SSHException:
|
|
pass
|
|
|
|
try:
|
|
key = paramiko.DSSKey.from_private_key(key_f)
|
|
except paramiko.SSHException:
|
|
pass
|
|
return key
|
|
|
|
|
|
def ssh_pubkey_gen(private_key=None, username='jumpserver', hostname='localhost'):
|
|
if isinstance(private_key, string_types):
|
|
private_key = ssh_key_string_to_obj(private_key)
|
|
|
|
if not isinstance(private_key, (paramiko.RSAKey, paramiko.DSSKey)):
|
|
raise IOError('Invalid private key')
|
|
|
|
public_key = "%(key_type)s %(key_content)s %(username)s@%(hostname)s" % {
|
|
'key_type': private_key.get_name(),
|
|
'key_content': private_key.get_base64(),
|
|
'username': username,
|
|
'hostname': hostname,
|
|
}
|
|
return public_key
|
|
|
|
|
|
def ssh_key_gen(length=2048, type='rsa', password=None, username='jumpserver', hostname=None):
|
|
"""Generate user ssh private and public key
|
|
|
|
Use paramiko RSAKey generate it.
|
|
:return private key str and public key str
|
|
"""
|
|
|
|
if hostname is None:
|
|
hostname = os.uname()[1]
|
|
|
|
f = StringIO.StringIO()
|
|
|
|
try:
|
|
if type == 'rsa':
|
|
private_key_obj = paramiko.RSAKey.generate(length)
|
|
elif type == 'dsa':
|
|
private_key_obj = paramiko.DSSKey.generate(length)
|
|
else:
|
|
raise IOError('SSH private key must be `rsa` or `dsa`')
|
|
private_key_obj.write_private_key(f, password=password)
|
|
private_key = f.getvalue()
|
|
public_key = ssh_pubkey_gen(private_key_obj, username=username, hostname=hostname)
|
|
return private_key, public_key
|
|
except IOError:
|
|
raise IOError('These is error when generate ssh key.')
|
|
|
|
|
|
def validate_ssh_private_key(text):
|
|
key = ssh_key_string_to_obj(text)
|
|
if key is None:
|
|
return False
|
|
else:
|
|
return True
|
|
|
|
|
|
def validate_ssh_public_key(text):
|
|
ssh = sshpubkeys.SSHKey(text)
|
|
try:
|
|
ssh.parse()
|
|
except sshpubkeys.InvalidKeyException:
|
|
return False
|
|
except NotImplementedError as e:
|
|
return False
|
|
return True
|
|
|
|
|
|
def setattr_bulk(seq, key, value):
|
|
def set_attr(obj):
|
|
setattr(obj, key, value)
|
|
return obj
|
|
return map(set_attr, seq)
|
|
|
|
|
|
signer = Signer() |