mirror of https://github.com/jumpserver/jumpserver
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
168 lines
5.4 KiB
168 lines
5.4 KiB
# -*- coding: utf-8 -*- |
|
# |
|
import uuid |
|
from datetime import timedelta |
|
|
|
from celery import shared_task, current_task |
|
from django.conf import settings |
|
from django.db.models import Q |
|
from django.utils import timezone |
|
from django.utils.translation import gettext_lazy as _, gettext_noop |
|
|
|
from audits.const import ActivityChoices |
|
from common.const.crontab import CRONTAB_AT_AM_TEN, CRONTAB_AT_PM_TWO |
|
from common.utils import get_logger |
|
from ops.celery.decorator import after_app_ready_start, register_as_period_task |
|
from ops.celery.utils import create_or_update_celery_periodic_tasks |
|
from orgs.utils import tmp_to_root_org |
|
from users.notifications import PasswordExpirationReminderMsg |
|
from users.notifications import UserExpirationReminderMsg |
|
from .models import User |
|
|
|
logger = get_logger(__file__) |
|
|
|
|
|
@shared_task( |
|
verbose_name=_('Check password expired'), |
|
description=_( |
|
""" |
|
Check every day at 10 AM whether the passwords of users in the system are expired, |
|
and send a notification 5 days in advance |
|
""" |
|
) |
|
) |
|
def check_password_expired(): |
|
users = User.get_nature_users().filter(source=User.Source.local) |
|
for user in users: |
|
if not user.is_valid: |
|
continue |
|
if not user.password_will_expired: |
|
continue |
|
msg = "The user {} password expires in {} days" |
|
logger.info(msg.format(user, user.password_expired_remain_days)) |
|
|
|
PasswordExpirationReminderMsg(user).publish_async() |
|
|
|
|
|
@shared_task( |
|
verbose_name=_('Periodic check password expired'), |
|
description=_( |
|
""" |
|
With version iterations, new tasks may be added, or task names and execution times may |
|
be modified. Therefore, upon system startup, it is necessary to register or update the |
|
parameters of the task that checks if passwords have expired |
|
""" |
|
) |
|
) |
|
@after_app_ready_start |
|
def check_password_expired_periodic(): |
|
tasks = { |
|
'check_password_expired_periodic': { |
|
'task': check_password_expired.name, |
|
'interval': None, |
|
'crontab': CRONTAB_AT_AM_TEN, |
|
'enabled': True, |
|
} |
|
} |
|
create_or_update_celery_periodic_tasks(tasks) |
|
|
|
|
|
@shared_task( |
|
verbose_name=_('Check user expired'), |
|
description=_( |
|
""" |
|
Check every day at 10 AM whether the users in the system are expired, and send a |
|
notification 5 days in advance |
|
""" |
|
) |
|
) |
|
def check_user_expired(): |
|
date_expired_lt = timezone.now() + timezone.timedelta(days=User.DATE_EXPIRED_WARNING_DAYS) |
|
users = User.get_nature_users() \ |
|
.filter(source=User.Source.local) \ |
|
.filter(date_expired__lt=date_expired_lt) |
|
|
|
for user in users: |
|
if not user.is_valid: |
|
continue |
|
if not user.will_expired: |
|
continue |
|
msg = "The user {} will expires in {} days" |
|
logger.info(msg.format(user, user.expired_remain_days)) |
|
UserExpirationReminderMsg(user).publish_async() |
|
|
|
|
|
@shared_task( |
|
verbose_name=_('Periodic check user expired'), |
|
description=_( |
|
""" |
|
With version iterations, new tasks may be added, or task names and execution times may |
|
be modified. Therefore, upon system startup, it is necessary to register or update the |
|
parameters of the task that checks if users have expired |
|
""" |
|
) |
|
) |
|
@after_app_ready_start |
|
def check_user_expired_periodic(): |
|
tasks = { |
|
'check_user_expired_periodic': { |
|
'task': check_user_expired.name, |
|
'interval': None, |
|
'crontab': CRONTAB_AT_PM_TWO, |
|
'enabled': True, |
|
} |
|
} |
|
create_or_update_celery_periodic_tasks(tasks) |
|
|
|
|
|
@shared_task( |
|
verbose_name=_('Check unused users'), |
|
description=_( |
|
""" |
|
At 2 a.m. every day, according to the configuration in "System Settings - Security - |
|
Auth security - Auto disable threshold" users who have not logged in or whose API keys |
|
have not been used for a long time will be disabled |
|
""" |
|
) |
|
) |
|
@register_as_period_task(crontab=CRONTAB_AT_PM_TWO) |
|
@tmp_to_root_org() |
|
def check_unused_users(): |
|
uncommon_users_ttl = settings.SECURITY_UNCOMMON_USERS_TTL |
|
if not uncommon_users_ttl: |
|
return |
|
|
|
uncommon_users_ttl = int(uncommon_users_ttl) |
|
if uncommon_users_ttl <= 0 or uncommon_users_ttl >= 999: |
|
return |
|
|
|
seconds_to_subtract = uncommon_users_ttl * 24 * 60 * 60 |
|
t = timezone.now() - timedelta(seconds=seconds_to_subtract) |
|
last_login_q = Q(last_login__lte=t) | (Q(last_login__isnull=True) & Q(date_joined__lte=t)) |
|
api_key_q = Q(date_api_key_last_used__lte=t) | ( |
|
Q(date_api_key_last_used__isnull=True) & Q(date_joined__lte=t)) |
|
|
|
users = User.objects \ |
|
.filter(date_joined__lt=t) \ |
|
.filter(is_active=True) \ |
|
.filter(last_login_q) \ |
|
.filter(api_key_q) \ |
|
.exclude(username='admin') |
|
|
|
if not users: |
|
return |
|
|
|
print("Some users are not used for a long time, and they will be disabled.") |
|
resource_ids = [] |
|
for user in users: |
|
resource_ids.append(user.id) |
|
print(' - {}'.format(user.name)) |
|
|
|
users.update(is_active=False) |
|
from audits.signal_handlers import create_activities |
|
if current_task: |
|
task_id = current_task.request.id |
|
else: |
|
task_id = str(uuid.uuid4()) |
|
detail = gettext_noop('The user has not logged in recently and has been disabled.') |
|
create_activities(resource_ids, detail, task_id, action=ActivityChoices.task, org_id='')
|
|
|