mirror of https://github.com/jumpserver/jumpserver
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1034 lines
32 KiB
1034 lines
32 KiB
#!/usr/bin/env python
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
import base64
|
|
import datetime
|
|
import uuid
|
|
from typing import Callable
|
|
|
|
import sshpubkeys
|
|
from django.conf import settings
|
|
from django.contrib.auth.hashers import check_password
|
|
from django.contrib.auth.models import AbstractUser
|
|
from django.core.cache import cache
|
|
from django.db import models
|
|
from django.shortcuts import reverse
|
|
from django.utils import timezone
|
|
from django.utils.module_loading import import_string
|
|
from django.utils.translation import gettext_lazy as _
|
|
from rest_framework.exceptions import PermissionDenied
|
|
|
|
from common.db import fields, models as jms_models
|
|
from common.utils import (
|
|
date_expired_default, get_logger, lazyproperty,
|
|
random_string, bulk_create_with_signal
|
|
)
|
|
from orgs.utils import current_org
|
|
from rbac.const import Scope
|
|
from ..signals import (
|
|
post_user_change_password, post_user_leave_org, pre_user_leave_org
|
|
)
|
|
|
|
__all__ = ['User', 'UserPasswordHistory']
|
|
|
|
logger = get_logger(__file__)
|
|
|
|
|
|
class AuthMixin:
|
|
date_password_last_updated: datetime.datetime
|
|
history_passwords: models.Manager
|
|
need_update_password: bool
|
|
public_key: str
|
|
is_local: bool
|
|
set_password: Callable
|
|
save: Callable
|
|
history_passwords: models.Manager
|
|
sect_cache_tpl = 'user_sect_{}'
|
|
id: str
|
|
|
|
@property
|
|
def password_raw(self):
|
|
raise AttributeError('Password raw is not a readable attribute')
|
|
|
|
#: Use this attr to set user object password, example
|
|
#: user = User(username='example', password_raw='password', ...)
|
|
#: It's equal:
|
|
#: user = User(username='example', ...)
|
|
#: user.set_password('password')
|
|
@password_raw.setter
|
|
def password_raw(self, password_raw_):
|
|
self.set_password(password_raw_)
|
|
|
|
def set_password(self, raw_password):
|
|
if self.can_update_password():
|
|
self.date_password_last_updated = timezone.now()
|
|
post_user_change_password.send(self.__class__, user=self)
|
|
super().set_password(raw_password)
|
|
|
|
def set_public_key(self, public_key):
|
|
if self.can_update_ssh_key():
|
|
self.public_key = public_key
|
|
self.save()
|
|
|
|
def can_update_password(self):
|
|
return self.is_local
|
|
|
|
def can_update_ssh_key(self):
|
|
return self.can_use_ssh_key_login()
|
|
|
|
@staticmethod
|
|
def can_use_ssh_key_login():
|
|
return settings.TERMINAL_PUBLIC_KEY_AUTH
|
|
|
|
def is_history_password(self, password):
|
|
allow_history_password_count = settings.OLD_PASSWORD_HISTORY_LIMIT_COUNT
|
|
history_passwords = self.history_passwords.all() \
|
|
.order_by('-date_created')[:int(allow_history_password_count)]
|
|
|
|
for history_password in history_passwords:
|
|
if check_password(password, history_password.password):
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def is_public_key_valid(self):
|
|
"""
|
|
Check if the user's ssh public key is valid.
|
|
This function is used in base.html.
|
|
"""
|
|
if self.public_key:
|
|
return True
|
|
return False
|
|
|
|
@property
|
|
def public_key_obj(self):
|
|
class PubKey(object):
|
|
def __getattr__(self, item):
|
|
return ''
|
|
|
|
if self.public_key:
|
|
try:
|
|
return sshpubkeys.SSHKey(self.public_key)
|
|
except (TabError, TypeError):
|
|
pass
|
|
return PubKey()
|
|
|
|
def get_public_key_comment(self):
|
|
return self.public_key_obj.comment
|
|
|
|
def get_public_key_hash_md5(self):
|
|
if not callable(self.public_key_obj.hash_md5):
|
|
return ''
|
|
try:
|
|
return self.public_key_obj.hash_md5()
|
|
except:
|
|
return ''
|
|
|
|
def reset_password(self, new_password):
|
|
self.set_password(new_password)
|
|
self.need_update_password = False
|
|
self.save()
|
|
|
|
@property
|
|
def date_password_expired(self):
|
|
interval = settings.SECURITY_PASSWORD_EXPIRATION_TIME
|
|
date_expired = self.date_password_last_updated + timezone.timedelta(
|
|
days=int(interval))
|
|
return date_expired
|
|
|
|
@property
|
|
def password_expired_remain_days(self):
|
|
date_remain = self.date_password_expired - timezone.now()
|
|
return date_remain.days
|
|
|
|
@property
|
|
def password_has_expired(self):
|
|
if self.is_local and self.password_expired_remain_days < 0:
|
|
return True
|
|
return False
|
|
|
|
@property
|
|
def password_will_expired(self):
|
|
if self.is_local and 0 <= self.password_expired_remain_days < 5:
|
|
return True
|
|
return False
|
|
|
|
@staticmethod
|
|
def get_public_key_md5(key):
|
|
try:
|
|
key_obj = sshpubkeys.SSHKey(key)
|
|
return key_obj.hash_md5()
|
|
except Exception as e:
|
|
return ''
|
|
|
|
def check_public_key(self, key):
|
|
if not self.public_key:
|
|
return False
|
|
key_md5 = self.get_public_key_md5(key)
|
|
if not key_md5:
|
|
return False
|
|
self_key_md5 = self.get_public_key_md5(self.public_key)
|
|
return key_md5 == self_key_md5
|
|
|
|
def cache_login_password_if_need(self, password):
|
|
from common.utils import signer
|
|
if not settings.CACHE_LOGIN_PASSWORD_ENABLED:
|
|
return
|
|
backend = getattr(self, 'backend', '')
|
|
if backend.lower().find('ldap') < 0:
|
|
return
|
|
if not password:
|
|
return
|
|
key = self.sect_cache_tpl.format(self.id)
|
|
ttl = settings.CACHE_LOGIN_PASSWORD_TTL
|
|
if not isinstance(ttl, int) or ttl <= 0:
|
|
return
|
|
secret = signer.sign(password)
|
|
cache.set(key, secret, ttl)
|
|
|
|
def get_cached_password_if_has(self):
|
|
from common.utils import signer
|
|
if not settings.CACHE_LOGIN_PASSWORD_ENABLED:
|
|
return ''
|
|
key = self.sect_cache_tpl.format(self.id)
|
|
secret = cache.get(key)
|
|
if not secret:
|
|
return ''
|
|
password = signer.unsign(secret)
|
|
return password
|
|
|
|
|
|
class RoleManager(models.Manager):
|
|
scope = None
|
|
_cache = None
|
|
|
|
def __init__(self, user, *args, **kwargs):
|
|
super().__init__(*args, **kwargs)
|
|
self.user = user
|
|
|
|
@lazyproperty
|
|
def role_binding_cls(self):
|
|
from rbac.models import SystemRoleBinding, OrgRoleBinding
|
|
if self.scope == Scope.org:
|
|
return OrgRoleBinding
|
|
else:
|
|
return SystemRoleBinding
|
|
|
|
@lazyproperty
|
|
def role_cls(self):
|
|
from rbac.models import SystemRole, OrgRole
|
|
if self.scope == Scope.org:
|
|
return OrgRole
|
|
else:
|
|
return SystemRole
|
|
|
|
@property
|
|
def display(self):
|
|
roles = sorted(list(self.all()), key=lambda r: r.scope)
|
|
roles_display = [role.display_name for role in roles]
|
|
return ', '.join(roles_display)
|
|
|
|
@property
|
|
def role_bindings(self):
|
|
queryset = self.role_binding_cls.objects.filter(user=self.user)
|
|
if self.scope:
|
|
queryset = queryset.filter(scope=self.scope)
|
|
return queryset
|
|
|
|
def _get_queryset(self):
|
|
queryset = self.role_binding_cls.get_user_roles(self.user)
|
|
if self.scope:
|
|
queryset = queryset.filter(scope=self.scope)
|
|
return queryset
|
|
|
|
def get_queryset(self):
|
|
if self._cache is not None:
|
|
return self._cache
|
|
return self._get_queryset()
|
|
|
|
def clear(self):
|
|
if not self.scope:
|
|
return
|
|
return self.role_bindings.delete()
|
|
|
|
def _clean_roles(self, roles_or_ids):
|
|
if not roles_or_ids:
|
|
return
|
|
is_model = isinstance(roles_or_ids[0], models.Model)
|
|
if not is_model:
|
|
roles = self.role_cls.objects.filter(id__in=roles_or_ids)
|
|
else:
|
|
roles = roles_or_ids
|
|
roles = list([r for r in roles if r.scope == self.scope])
|
|
return roles
|
|
|
|
def add(self, *roles):
|
|
if not roles:
|
|
return
|
|
|
|
roles = self._clean_roles(roles)
|
|
old_ids = self.role_bindings.values_list('role', flat=True)
|
|
need_adds = [r for r in roles if r.id not in old_ids]
|
|
|
|
items = []
|
|
for role in need_adds:
|
|
kwargs = {'role': role, 'user': self.user, 'scope': self.scope}
|
|
if self.scope == Scope.org:
|
|
if current_org.is_root():
|
|
continue
|
|
else:
|
|
kwargs['org_id'] = current_org.id
|
|
items.append(self.role_binding_cls(**kwargs))
|
|
|
|
try:
|
|
result = bulk_create_with_signal(self.role_binding_cls, items, ignore_conflicts=True)
|
|
self.user.expire_users_rbac_perms_cache()
|
|
return result
|
|
except Exception as e:
|
|
logger.error('\tCreate role binding error: {}'.format(e))
|
|
|
|
def set(self, roles, clear=False):
|
|
if clear:
|
|
self.clear()
|
|
self.add(*roles)
|
|
return
|
|
|
|
role_ids = set([r.id for r in roles])
|
|
old_ids = self.role_bindings.values_list('role', flat=True)
|
|
old_ids = set(old_ids)
|
|
|
|
del_ids = old_ids - role_ids
|
|
add_ids = role_ids - old_ids
|
|
self.remove(*del_ids)
|
|
self.add(*add_ids)
|
|
|
|
def remove(self, *roles):
|
|
if not roles:
|
|
return
|
|
roles = self._clean_roles(roles)
|
|
deleted = self.role_bindings.filter(role__in=roles).delete()
|
|
self.user.expire_users_rbac_perms_cache()
|
|
return deleted
|
|
|
|
def cache_set(self, roles):
|
|
query = self._get_queryset()
|
|
query._result_cache = roles
|
|
self._cache = query
|
|
|
|
@property
|
|
def builtin_role(self):
|
|
from rbac.builtin import BuiltinRole
|
|
return BuiltinRole
|
|
|
|
|
|
class OrgRoleManager(RoleManager):
|
|
def __init__(self, *args, **kwargs):
|
|
from rbac.const import Scope
|
|
self.scope = Scope.org
|
|
super().__init__(*args, **kwargs)
|
|
|
|
|
|
class SystemRoleManager(RoleManager):
|
|
def __init__(self, *args, **kwargs):
|
|
from rbac.const import Scope
|
|
self.scope = Scope.system
|
|
super().__init__(*args, **kwargs)
|
|
|
|
def remove_role_system_admin(self):
|
|
role = self.builtin_role.system_admin.get_role()
|
|
return self.remove(role)
|
|
|
|
def add_role_system_admin(self):
|
|
role = self.builtin_role.system_admin.get_role()
|
|
return self.add(role)
|
|
|
|
def add_role_system_user(self):
|
|
role = self.builtin_role.system_user.get_role()
|
|
return self.add(role)
|
|
|
|
def add_role_system_component(self):
|
|
role = self.builtin_role.system_component.get_role()
|
|
self.add(role)
|
|
|
|
|
|
class RoleMixin:
|
|
objects: models.Manager
|
|
is_authenticated: bool
|
|
is_valid: bool
|
|
id: str
|
|
_org_roles = None
|
|
_system_roles = None
|
|
PERM_CACHE_KEY = 'USER_PERMS_ROLES_{}_{}'
|
|
PERM_ORG_KEY = 'USER_PERMS_ORG_{}'
|
|
_is_superuser = None
|
|
_update_superuser = False
|
|
|
|
@lazyproperty
|
|
def roles(self):
|
|
return RoleManager(self)
|
|
|
|
@lazyproperty
|
|
def org_roles(self):
|
|
return OrgRoleManager(self)
|
|
|
|
@lazyproperty
|
|
def system_roles(self):
|
|
return SystemRoleManager(self)
|
|
|
|
@lazyproperty
|
|
def console_orgs(self):
|
|
return self.cached_orgs['console_orgs']
|
|
|
|
@lazyproperty
|
|
def audit_orgs(self):
|
|
return self.cached_orgs['audit_orgs']
|
|
|
|
@lazyproperty
|
|
def workbench_orgs(self):
|
|
return self.cached_orgs['workbench_orgs']
|
|
|
|
@lazyproperty
|
|
def joined_orgs(self):
|
|
from rbac.models import RoleBinding
|
|
return RoleBinding.get_user_joined_orgs(self)
|
|
|
|
@lazyproperty
|
|
def cached_orgs(self):
|
|
from rbac.models import RoleBinding
|
|
key = self.PERM_ORG_KEY.format(self.id)
|
|
data = cache.get(key)
|
|
if data:
|
|
return data
|
|
console_orgs = RoleBinding.get_user_has_the_perm_orgs('rbac.view_console', self)
|
|
audit_orgs = RoleBinding.get_user_has_the_perm_orgs('rbac.view_audit', self)
|
|
workbench_orgs = RoleBinding.get_user_has_the_perm_orgs('rbac.view_workbench', self)
|
|
|
|
if settings.LIMIT_SUPER_PRIV:
|
|
audit_orgs = list(set(audit_orgs) - set(console_orgs))
|
|
|
|
data = {
|
|
'console_orgs': console_orgs,
|
|
'audit_orgs': audit_orgs,
|
|
'workbench_orgs': workbench_orgs,
|
|
}
|
|
cache.set(key, data, 60 * 60)
|
|
return data
|
|
|
|
@lazyproperty
|
|
def cached_role_and_perms(self):
|
|
key = self.PERM_CACHE_KEY.format(self.id, current_org.id)
|
|
data = cache.get(key)
|
|
if data:
|
|
return data
|
|
|
|
data = {
|
|
'org_roles': self.org_roles.all(),
|
|
'system_roles': self.system_roles.all(),
|
|
'perms': self.get_all_permissions(),
|
|
}
|
|
cache.set(key, data, 60 * 60)
|
|
return data
|
|
|
|
def expire_rbac_perms_cache(self):
|
|
key = self.PERM_CACHE_KEY.format(self.id, '*')
|
|
cache.delete_pattern(key)
|
|
key = self.PERM_ORG_KEY.format(self.id)
|
|
cache.delete(key)
|
|
|
|
@classmethod
|
|
def expire_users_rbac_perms_cache(cls):
|
|
key = cls.PERM_CACHE_KEY.format('*', '*')
|
|
cache.delete_pattern(key)
|
|
key = cls.PERM_ORG_KEY.format('*')
|
|
cache.delete_pattern(key)
|
|
|
|
@lazyproperty
|
|
def perms(self):
|
|
return self.cached_role_and_perms['perms']
|
|
|
|
@property
|
|
def is_superuser(self):
|
|
"""
|
|
由于这里用了 cache ,所以不能改成 self.system_roles.filter().exists() 会查询的
|
|
"""
|
|
if self._is_superuser is not None:
|
|
return self._is_superuser
|
|
|
|
from rbac.builtin import BuiltinRole
|
|
ids = [str(r.id) for r in self.system_roles.all()]
|
|
yes = BuiltinRole.system_admin.id in ids
|
|
self._is_superuser = yes
|
|
return yes
|
|
|
|
@is_superuser.setter
|
|
def is_superuser(self, value):
|
|
self._is_superuser = value
|
|
self._update_superuser = True
|
|
if value:
|
|
self.system_roles.add_role_system_admin()
|
|
else:
|
|
self.system_roles.remove_role_system_admin()
|
|
|
|
@lazyproperty
|
|
def is_org_admin(self):
|
|
from rbac.builtin import BuiltinRole
|
|
if self.is_superuser:
|
|
return True
|
|
ids = [str(r.id) for r in self.org_roles.all()]
|
|
yes = BuiltinRole.org_admin.id in ids
|
|
return yes
|
|
|
|
@property
|
|
def is_staff(self):
|
|
return self.is_authenticated and self.is_valid
|
|
|
|
@is_staff.setter
|
|
def is_staff(self, value):
|
|
pass
|
|
|
|
service_account_email_suffix = '@local.domain'
|
|
|
|
@classmethod
|
|
def create_service_account(cls, name, email, comment):
|
|
app = cls.objects.create(
|
|
username=name, name=name, email=email,
|
|
comment=comment, is_first_login=False,
|
|
created_by='System', is_service_account=True,
|
|
)
|
|
access_key = app.create_access_key()
|
|
return app, access_key
|
|
|
|
def remove(self):
|
|
if current_org.is_root():
|
|
return
|
|
kwargs = dict(sender=self.__class__, user=self, org=current_org)
|
|
pre_user_leave_org.send(**kwargs)
|
|
self.org_roles.clear()
|
|
post_user_leave_org.send(**kwargs)
|
|
|
|
@classmethod
|
|
def get_super_admins(cls):
|
|
from rbac.models import Role, RoleBinding
|
|
system_admin = Role.BuiltinRole.system_admin.get_role()
|
|
return RoleBinding.get_role_users(system_admin)
|
|
|
|
@classmethod
|
|
def get_org_admins(cls):
|
|
from rbac.models import Role, RoleBinding
|
|
org_admin = Role.BuiltinRole.org_admin.get_role()
|
|
return RoleBinding.get_role_users(org_admin)
|
|
|
|
@classmethod
|
|
def get_super_and_org_admins(cls):
|
|
super_admins = cls.get_super_admins()
|
|
org_admins = cls.get_org_admins()
|
|
admins = org_admins | super_admins
|
|
return admins.distinct()
|
|
|
|
@staticmethod
|
|
def filter_not_service_account(queryset):
|
|
return queryset.filter(is_service_account=False)
|
|
|
|
@classmethod
|
|
def get_nature_users(cls):
|
|
queryset = cls.objects.all()
|
|
return cls.filter_not_service_account(queryset)
|
|
|
|
@classmethod
|
|
def get_org_users(cls, org=None):
|
|
queryset = cls.objects.all()
|
|
if org is None:
|
|
org = current_org
|
|
if not org.is_root():
|
|
queryset = org.get_members()
|
|
queryset = cls.filter_not_service_account(queryset)
|
|
return queryset
|
|
|
|
def get_all_permissions(self):
|
|
from rbac.models import RoleBinding
|
|
perms = RoleBinding.get_user_perms(self)
|
|
|
|
if settings.LIMIT_SUPER_PRIV and 'view_console' in perms:
|
|
perms = [p for p in perms if p != "view_audit"]
|
|
return perms
|
|
|
|
|
|
class TokenMixin:
|
|
CACHE_KEY_USER_RESET_PASSWORD_PREFIX = "_KEY_USER_RESET_PASSWORD_{}"
|
|
email = ''
|
|
id = None
|
|
|
|
@property
|
|
def private_token(self):
|
|
return self.create_private_token()
|
|
|
|
def create_private_token(self):
|
|
from authentication.models import PrivateToken
|
|
token, created = PrivateToken.objects.get_or_create(user=self)
|
|
return token
|
|
|
|
def delete_private_token(self):
|
|
from authentication.models import PrivateToken
|
|
PrivateToken.objects.filter(user=self).delete()
|
|
|
|
def refresh_private_token(self):
|
|
self.delete_private_token()
|
|
return self.create_private_token()
|
|
|
|
def create_bearer_token(self, request=None):
|
|
expiration = settings.TOKEN_EXPIRATION or 3600
|
|
if request:
|
|
remote_addr = request.META.get('REMOTE_ADDR', '')
|
|
else:
|
|
remote_addr = '0.0.0.0'
|
|
if not isinstance(remote_addr, bytes):
|
|
remote_addr = remote_addr.encode("utf-8")
|
|
remote_addr = base64.b16encode(remote_addr) # .replace(b'=', '')
|
|
cache_key = '%s_%s' % (self.id, remote_addr)
|
|
token = cache.get(cache_key)
|
|
if not token:
|
|
token = random_string(36)
|
|
cache.set(token, self.id, expiration)
|
|
cache.set('%s_%s' % (self.id, remote_addr), token, expiration)
|
|
date_expired = timezone.now() + timezone.timedelta(seconds=expiration)
|
|
return token, date_expired
|
|
|
|
def refresh_bearer_token(self, token):
|
|
pass
|
|
|
|
def create_access_key(self):
|
|
access_key = self.access_keys.create()
|
|
return access_key
|
|
|
|
@property
|
|
def access_key(self):
|
|
return self.access_keys.first()
|
|
|
|
def generate_reset_token(self):
|
|
token = random_string(50)
|
|
key = self.CACHE_KEY_USER_RESET_PASSWORD_PREFIX.format(token)
|
|
cache.set(key, {'id': self.id, 'email': self.email}, 3600)
|
|
return token
|
|
|
|
@classmethod
|
|
def validate_reset_password_token(cls, token):
|
|
if not token:
|
|
return None
|
|
key = cls.CACHE_KEY_USER_RESET_PASSWORD_PREFIX.format(token)
|
|
value = cache.get(key)
|
|
if not value:
|
|
return None
|
|
try:
|
|
user_id = value.get('id', '')
|
|
email = value.get('email', '')
|
|
user = cls.objects.get(id=user_id, email=email)
|
|
return user
|
|
except (AttributeError, cls.DoesNotExist) as e:
|
|
logger.error(e, exc_info=True)
|
|
return None
|
|
|
|
@classmethod
|
|
def expired_reset_password_token(cls, token):
|
|
key = cls.CACHE_KEY_USER_RESET_PASSWORD_PREFIX.format(token)
|
|
cache.delete(key)
|
|
|
|
|
|
class MFAMixin:
|
|
mfa_level = 0
|
|
otp_secret_key = ''
|
|
MFA_LEVEL_CHOICES = (
|
|
(0, _('Disable')),
|
|
(1, _('Enable')),
|
|
(2, _("Force enable")),
|
|
)
|
|
is_org_admin: bool
|
|
username: str
|
|
phone: str
|
|
|
|
@property
|
|
def mfa_enabled(self):
|
|
if self.mfa_force_enabled:
|
|
return True
|
|
return self.mfa_level > 0
|
|
|
|
@property
|
|
def mfa_force_enabled(self):
|
|
force_level = settings.SECURITY_MFA_AUTH
|
|
if force_level in [True, 1]:
|
|
return True
|
|
# 2 管理员强制开启
|
|
if force_level == 2 and self.is_org_admin:
|
|
return True
|
|
return self.mfa_level == 2
|
|
|
|
def enable_mfa(self):
|
|
if not self.mfa_level == 2:
|
|
self.mfa_level = 1
|
|
|
|
def force_enable_mfa(self):
|
|
self.mfa_level = 2
|
|
|
|
def disable_mfa(self):
|
|
self.mfa_level = 0
|
|
|
|
def no_active_mfa(self):
|
|
return len(self.active_mfa_backends) == 0
|
|
|
|
@lazyproperty
|
|
def active_mfa_backends(self):
|
|
backends = self.get_user_mfa_backends(self)
|
|
active_backends = [b for b in backends if b.is_active()]
|
|
return active_backends
|
|
|
|
@property
|
|
def active_mfa_backends_mapper(self):
|
|
return {b.name: b for b in self.active_mfa_backends}
|
|
|
|
@staticmethod
|
|
def get_user_mfa_backends(user):
|
|
backends = []
|
|
for cls in settings.MFA_BACKENDS:
|
|
cls = import_string(cls)
|
|
if cls.global_enabled():
|
|
backends.append(cls(user))
|
|
return backends
|
|
|
|
def get_active_mfa_backend_by_type(self, mfa_type):
|
|
backend = self.get_mfa_backend_by_type(mfa_type)
|
|
if not backend or not backend.is_active():
|
|
return None
|
|
return backend
|
|
|
|
def get_mfa_backend_by_type(self, mfa_type):
|
|
mfa_mapper = {b.name: b for b in self.get_user_mfa_backends(self)}
|
|
backend = mfa_mapper.get(mfa_type)
|
|
if not backend:
|
|
return None
|
|
return backend
|
|
|
|
|
|
class JSONFilterMixin:
|
|
"""
|
|
users = JSONManyToManyField('users.User', blank=True, null=True)
|
|
"""
|
|
|
|
@staticmethod
|
|
def get_json_filter_attr_q(name, value, match):
|
|
from rbac.models import RoleBinding
|
|
from orgs.utils import current_org
|
|
|
|
if name == 'system_roles':
|
|
user_id = RoleBinding.objects \
|
|
.filter(role__in=value, scope='system') \
|
|
.values_list('user_id', flat=True)
|
|
return models.Q(id__in=user_id)
|
|
elif name == 'org_roles':
|
|
kwargs = dict(role__in=value, scope='org')
|
|
if not current_org.is_root():
|
|
kwargs['org_id'] = current_org.id
|
|
|
|
user_id = RoleBinding.objects.filter(**kwargs) \
|
|
.values_list('user_id', flat=True)
|
|
return models.Q(id__in=user_id)
|
|
return None
|
|
|
|
|
|
class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, JSONFilterMixin, AbstractUser):
|
|
class Source(models.TextChoices):
|
|
local = 'local', _('Local')
|
|
ldap = 'ldap', 'LDAP/AD'
|
|
openid = 'openid', 'OpenID'
|
|
radius = 'radius', 'Radius'
|
|
cas = 'cas', 'CAS'
|
|
saml2 = 'saml2', 'SAML2'
|
|
oauth2 = 'oauth2', 'OAuth2'
|
|
wecom = 'wecom', _('WeCom')
|
|
dingtalk = 'dingtalk', _('DingTalk')
|
|
feishu = 'feishu', _('FeiShu')
|
|
custom = 'custom', 'Custom'
|
|
|
|
SOURCE_BACKEND_MAPPING = {
|
|
Source.local: [
|
|
settings.AUTH_BACKEND_MODEL,
|
|
settings.AUTH_BACKEND_PUBKEY,
|
|
],
|
|
Source.ldap: [
|
|
settings.AUTH_BACKEND_LDAP
|
|
],
|
|
Source.openid: [
|
|
settings.AUTH_BACKEND_OIDC_PASSWORD,
|
|
settings.AUTH_BACKEND_OIDC_CODE
|
|
],
|
|
Source.radius: [
|
|
settings.AUTH_BACKEND_RADIUS
|
|
],
|
|
Source.cas: [
|
|
settings.AUTH_BACKEND_CAS
|
|
],
|
|
Source.saml2: [
|
|
settings.AUTH_BACKEND_SAML2
|
|
],
|
|
Source.oauth2: [
|
|
settings.AUTH_BACKEND_OAUTH2
|
|
],
|
|
Source.wecom: [
|
|
settings.AUTH_BACKEND_WECOM
|
|
],
|
|
Source.feishu: [
|
|
settings.AUTH_BACKEND_FEISHU
|
|
],
|
|
Source.dingtalk: [
|
|
settings.AUTH_BACKEND_DINGTALK
|
|
],
|
|
Source.custom: [
|
|
settings.AUTH_BACKEND_CUSTOM
|
|
]
|
|
}
|
|
|
|
id = models.UUIDField(default=uuid.uuid4, primary_key=True)
|
|
username = models.CharField(
|
|
max_length=128, unique=True, verbose_name=_('Username')
|
|
)
|
|
name = models.CharField(max_length=128, verbose_name=_('Name'))
|
|
email = models.EmailField(
|
|
max_length=128, unique=True, verbose_name=_('Email')
|
|
)
|
|
groups = models.ManyToManyField(
|
|
'users.UserGroup', related_name='users',
|
|
blank=True, verbose_name=_('User group')
|
|
)
|
|
role = models.CharField(
|
|
default='User', max_length=10,
|
|
blank=True, verbose_name=_('Role')
|
|
)
|
|
is_service_account = models.BooleanField(default=False, verbose_name=_("Is service account"))
|
|
avatar = models.ImageField(
|
|
upload_to="avatar", null=True, verbose_name=_('Avatar')
|
|
)
|
|
wechat = fields.EncryptCharField(
|
|
max_length=128, blank=True, verbose_name=_('Wechat')
|
|
)
|
|
phone = fields.EncryptCharField(
|
|
max_length=128, blank=True, null=True, verbose_name=_('Phone')
|
|
)
|
|
mfa_level = models.SmallIntegerField(
|
|
default=0, choices=MFAMixin.MFA_LEVEL_CHOICES, verbose_name=_('MFA')
|
|
)
|
|
otp_secret_key = fields.EncryptCharField(
|
|
max_length=128, blank=True, null=True, verbose_name=_('OTP secret key')
|
|
)
|
|
# Todo: Auto generate key, let user download
|
|
private_key = fields.EncryptTextField(
|
|
blank=True, null=True, verbose_name=_('Private key')
|
|
)
|
|
public_key = fields.EncryptTextField(
|
|
blank=True, null=True, verbose_name=_('Public key')
|
|
)
|
|
comment = models.TextField(
|
|
blank=True, null=True, verbose_name=_('Comment')
|
|
)
|
|
is_first_login = models.BooleanField(default=True, verbose_name=_('Is first login'))
|
|
date_expired = models.DateTimeField(
|
|
default=date_expired_default, blank=True, null=True,
|
|
db_index=True, verbose_name=_('Date expired')
|
|
)
|
|
created_by = models.CharField(max_length=30, default='', blank=True, verbose_name=_('Created by'))
|
|
updated_by = models.CharField(max_length=30, default='', blank=True, verbose_name=_('Updated by'))
|
|
source = models.CharField(max_length=30, default=Source.local, choices=Source.choices, verbose_name=_('Source'))
|
|
date_password_last_updated = models.DateTimeField(
|
|
auto_now_add=True, blank=True, null=True,
|
|
verbose_name=_('Date password last updated')
|
|
)
|
|
need_update_password = models.BooleanField(
|
|
default=False, verbose_name=_('Need update password')
|
|
)
|
|
date_api_key_last_used = models.DateTimeField(null=True, blank=True, verbose_name=_('Date api key used'))
|
|
date_updated = models.DateTimeField(auto_now=True, verbose_name=_('Date updated'))
|
|
wecom_id = models.CharField(null=True, default=None, max_length=128, verbose_name=_('WeCom'))
|
|
dingtalk_id = models.CharField(null=True, default=None, max_length=128, verbose_name=_('DingTalk'))
|
|
feishu_id = models.CharField(null=True, default=None, max_length=128, verbose_name=_('FeiShu'))
|
|
|
|
DATE_EXPIRED_WARNING_DAYS = 5
|
|
|
|
def __str__(self):
|
|
return '{0.name}({0.username})'.format(self)
|
|
|
|
@property
|
|
def secret_key(self):
|
|
instance = self.preferences.filter(name='secret_key').first()
|
|
if not instance:
|
|
return
|
|
return instance.decrypt_value
|
|
|
|
@property
|
|
def receive_backends(self):
|
|
return self.user_msg_subscription.receive_backends
|
|
|
|
@property
|
|
def is_otp_secret_key_bound(self):
|
|
return bool(self.otp_secret_key)
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('users:user-detail', args=(self.id,))
|
|
|
|
@property
|
|
def source_display(self):
|
|
return self.get_source_display()
|
|
|
|
@property
|
|
def is_expired(self):
|
|
if self.date_expired and self.date_expired < timezone.now():
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
@property
|
|
def expired_remain_days(self):
|
|
date_remain = self.date_expired - timezone.now()
|
|
return date_remain.days
|
|
|
|
@property
|
|
def will_expired(self):
|
|
if 0 <= self.expired_remain_days <= self.DATE_EXPIRED_WARNING_DAYS:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
@property
|
|
def is_valid(self):
|
|
if self.is_active and not self.is_expired:
|
|
return True
|
|
return False
|
|
|
|
@property
|
|
def is_local(self):
|
|
return self.source == self.Source.local.value
|
|
|
|
def is_password_authenticate(self):
|
|
cas = self.Source.cas
|
|
saml2 = self.Source.saml2
|
|
oauth2 = self.Source.oauth2
|
|
return self.source not in [cas, saml2, oauth2]
|
|
|
|
def set_required_attr_if_need(self):
|
|
if not self.name:
|
|
self.name = self.username
|
|
if not self.email or '@' not in self.email:
|
|
email = '{}@{}'.format(self.username, settings.EMAIL_SUFFIX)
|
|
if '@' in self.username:
|
|
email = self.username
|
|
self.email = email
|
|
|
|
def save(self, *args, **kwargs):
|
|
self.set_required_attr_if_need()
|
|
if self.username == 'admin':
|
|
self.role = 'Admin'
|
|
self.is_active = True
|
|
return super().save(*args, **kwargs)
|
|
|
|
def is_member_of(self, user_group):
|
|
if user_group in self.groups.all():
|
|
return True
|
|
return False
|
|
|
|
def set_avatar(self, f):
|
|
self.avatar.save(self.username, f)
|
|
|
|
@classmethod
|
|
def get_avatar_url(cls, username):
|
|
user_default = settings.STATIC_URL + "img/avatar/user.png"
|
|
return user_default
|
|
|
|
def avatar_url(self):
|
|
admin_default = settings.STATIC_URL + "img/avatar/admin.png"
|
|
user_default = settings.STATIC_URL + "img/avatar/user.png"
|
|
if self.avatar:
|
|
return self.avatar.url
|
|
if self.is_superuser:
|
|
return admin_default
|
|
else:
|
|
return user_default
|
|
|
|
def unblock_login(self):
|
|
from users.utils import LoginBlockUtil, MFABlockUtils
|
|
LoginBlockUtil.unblock_user(self.username)
|
|
MFABlockUtils.unblock_user(self.username)
|
|
|
|
@property
|
|
def login_blocked(self):
|
|
from users.utils import LoginBlockUtil, MFABlockUtils
|
|
if LoginBlockUtil.is_user_block(self.username):
|
|
return True
|
|
if MFABlockUtils.is_user_block(self.username):
|
|
return True
|
|
return False
|
|
|
|
def delete(self, using=None, keep_parents=False):
|
|
if self.pk == 1 or self.username == 'admin':
|
|
raise PermissionDenied(_('Can not delete admin user'))
|
|
return super(User, self).delete(using=using, keep_parents=keep_parents)
|
|
|
|
@classmethod
|
|
def get_user_allowed_auth_backend_paths(cls, username):
|
|
if not settings.ONLY_ALLOW_AUTH_FROM_SOURCE or not username:
|
|
return None
|
|
user = cls.objects.filter(username=username).first()
|
|
if not user:
|
|
return None
|
|
return user.get_allowed_auth_backend_paths()
|
|
|
|
def get_allowed_auth_backend_paths(self):
|
|
if not settings.ONLY_ALLOW_AUTH_FROM_SOURCE:
|
|
return None
|
|
return self.SOURCE_BACKEND_MAPPING.get(self.source, [])
|
|
|
|
class Meta:
|
|
ordering = ['username']
|
|
verbose_name = _("User")
|
|
unique_together = (
|
|
('dingtalk_id',),
|
|
('wecom_id',),
|
|
('feishu_id',),
|
|
)
|
|
permissions = [
|
|
('invite_user', _('Can invite user')),
|
|
('remove_user', _('Can remove user')),
|
|
('match_user', _('Can match user')),
|
|
]
|
|
|
|
#: Use this method initial user
|
|
@classmethod
|
|
def initial(cls):
|
|
from .group import UserGroup
|
|
user = cls(username='admin',
|
|
email='admin@jumpserver.org',
|
|
name=_('Administrator'),
|
|
password_raw='admin',
|
|
role='Admin',
|
|
comment=_('Administrator is the super user of system'),
|
|
created_by=_('System'))
|
|
user.save()
|
|
user.groups.add(UserGroup.initial())
|
|
|
|
def can_send_created_mail(self):
|
|
if self.email and self.source == self.Source.local.value:
|
|
return True
|
|
return False
|
|
|
|
|
|
class UserPasswordHistory(models.Model):
|
|
id = models.UUIDField(default=uuid.uuid4, primary_key=True)
|
|
password = models.CharField(max_length=128)
|
|
user = models.ForeignKey("users.User", related_name='history_passwords',
|
|
on_delete=jms_models.CASCADE_SIGNAL_SKIP, verbose_name=_('User'))
|
|
date_created = models.DateTimeField(auto_now_add=True, verbose_name=_("Date created"))
|
|
|
|
def __str__(self):
|
|
return f'{self.user} set at {self.date_created}'
|
|
|
|
def __repr__(self):
|
|
return self.__str__()
|
|
|
|
class Meta:
|
|
verbose_name = _("User password history")
|