mirror of
https://github.com/jumpserver/jumpserver.git
synced 2025-12-16 17:12:53 +00:00
Compare commits
35 Commits
revert-162
...
v4.10.1
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6235442e0f | ||
|
|
d0cb9e5432 | ||
|
|
558188da90 | ||
|
|
ad5460dab8 | ||
|
|
4d37dca0de | ||
|
|
2ca4002624 | ||
|
|
053d640e4c | ||
|
|
f3acc28ded | ||
|
|
25987545db | ||
|
|
6720ecc6e0 | ||
|
|
0b3a7bb020 | ||
|
|
56373e362b | ||
|
|
02fc045370 | ||
|
|
e4ac73896f | ||
|
|
1518f792d6 | ||
|
|
67277dd622 | ||
|
|
82e7f020ea | ||
|
|
f20b9e01ab | ||
|
|
8cf8a3701b | ||
|
|
7ba24293d1 | ||
|
|
f10114c9ed | ||
|
|
cf31cbfb07 | ||
|
|
0edad24d5d | ||
|
|
1f1c1a9157 | ||
|
|
6c9d271ae1 | ||
|
|
6ff852e225 | ||
|
|
baa75dc735 | ||
|
|
8a9f0436b8 | ||
|
|
a9620a3cbe | ||
|
|
769e7dc8a0 | ||
|
|
2a70449411 | ||
|
|
8df720f19e | ||
|
|
dabbb45f6e | ||
|
|
ce24c1c3fd | ||
|
|
3c54c82ce9 |
46
.github/workflows/build-python-image.yml
vendored
46
.github/workflows/build-python-image.yml
vendored
@@ -1,46 +0,0 @@
|
|||||||
name: Build and Push Python Base Image
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
inputs:
|
|
||||||
tag:
|
|
||||||
description: 'Tag to build'
|
|
||||||
required: true
|
|
||||||
default: '3.11-slim-bullseye-v1'
|
|
||||||
type: string
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
build-and-push:
|
|
||||||
runs-on: ubuntu-22.04
|
|
||||||
steps:
|
|
||||||
- name: Checkout repository
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
ref: ${{ github.event.pull_request.head.ref }}
|
|
||||||
|
|
||||||
- name: Set up QEMU
|
|
||||||
uses: docker/setup-qemu-action@v3
|
|
||||||
with:
|
|
||||||
image: tonistiigi/binfmt:qemu-v7.0.0-28
|
|
||||||
|
|
||||||
- name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
|
|
||||||
- name: Login to DockerHub
|
|
||||||
uses: docker/login-action@v2
|
|
||||||
with:
|
|
||||||
username: ${{ secrets.DOCKERHUB_USERNAME }}
|
|
||||||
password: ${{ secrets.DOCKERHUB_TOKEN }}
|
|
||||||
|
|
||||||
- name: Extract repository name
|
|
||||||
id: repo
|
|
||||||
run: echo "REPO=$(basename ${{ github.repository }})" >> $GITHUB_ENV
|
|
||||||
|
|
||||||
- name: Build and push multi-arch image
|
|
||||||
uses: docker/build-push-action@v6
|
|
||||||
with:
|
|
||||||
platforms: linux/amd64,linux/arm64
|
|
||||||
push: true
|
|
||||||
file: Dockerfile-python
|
|
||||||
tags: jumpserver/core-base:python-${{ inputs.tag }}
|
|
||||||
|
|
||||||
123
.github/workflows/cleanup-branches.yml
vendored
123
.github/workflows/cleanup-branches.yml
vendored
@@ -1,123 +0,0 @@
|
|||||||
name: Cleanup PR Branches
|
|
||||||
|
|
||||||
on:
|
|
||||||
schedule:
|
|
||||||
# 每天凌晨2点运行
|
|
||||||
- cron: '0 2 * * *'
|
|
||||||
workflow_dispatch:
|
|
||||||
# 允许手动触发
|
|
||||||
inputs:
|
|
||||||
dry_run:
|
|
||||||
description: 'Dry run mode (default: true)'
|
|
||||||
required: false
|
|
||||||
default: 'true'
|
|
||||||
type: boolean
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
cleanup-branches:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Checkout repository
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
fetch-depth: 0 # 获取所有分支和提交历史
|
|
||||||
|
|
||||||
- name: Setup Git
|
|
||||||
run: |
|
|
||||||
git config --global user.name "GitHub Actions"
|
|
||||||
git config --global user.email "actions@github.com"
|
|
||||||
|
|
||||||
- name: Get dry run setting
|
|
||||||
id: dry-run
|
|
||||||
run: |
|
|
||||||
if [ "${{ github.event_name }}" = "workflow_dispatch" ]; then
|
|
||||||
echo "dry_run=${{ github.event.inputs.dry_run }}" >> $GITHUB_OUTPUT
|
|
||||||
else
|
|
||||||
echo "dry_run=false" >> $GITHUB_OUTPUT
|
|
||||||
fi
|
|
||||||
|
|
||||||
- name: Cleanup branches
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
DRY_RUN: ${{ steps.dry-run.outputs.dry_run }}
|
|
||||||
run: |
|
|
||||||
echo "Starting branch cleanup..."
|
|
||||||
echo "Dry run mode: $DRY_RUN"
|
|
||||||
|
|
||||||
# 获取所有本地分支
|
|
||||||
git fetch --all --prune
|
|
||||||
|
|
||||||
# 获取以 pr 或 repr 开头的分支
|
|
||||||
branches=$(git branch -r | grep -E 'origin/(pr|repr)' | sed 's/origin\///' | grep -v 'HEAD')
|
|
||||||
|
|
||||||
echo "Found branches matching pattern:"
|
|
||||||
echo "$branches"
|
|
||||||
|
|
||||||
deleted_count=0
|
|
||||||
skipped_count=0
|
|
||||||
|
|
||||||
for branch in $branches; do
|
|
||||||
echo ""
|
|
||||||
echo "Processing branch: $branch"
|
|
||||||
|
|
||||||
# 检查分支是否有未合并的PR
|
|
||||||
pr_info=$(gh pr list --head "$branch" --state open --json number,title,state 2>/dev/null)
|
|
||||||
|
|
||||||
if [ $? -eq 0 ] && [ "$pr_info" != "[]" ]; then
|
|
||||||
echo " ⚠️ Branch has open PR(s), skipping deletion"
|
|
||||||
echo " PR info: $pr_info"
|
|
||||||
skipped_count=$((skipped_count + 1))
|
|
||||||
continue
|
|
||||||
fi
|
|
||||||
|
|
||||||
# 检查分支是否有已合并的PR(可选:如果PR已合并也可以删除)
|
|
||||||
merged_pr_info=$(gh pr list --head "$branch" --state merged --json number,title,state 2>/dev/null)
|
|
||||||
|
|
||||||
if [ $? -eq 0 ] && [ "$merged_pr_info" != "[]" ]; then
|
|
||||||
echo " ✅ Branch has merged PR(s), safe to delete"
|
|
||||||
echo " Merged PR info: $merged_pr_info"
|
|
||||||
else
|
|
||||||
echo " ℹ️ No PRs found for this branch"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# 执行删除操作
|
|
||||||
if [ "$DRY_RUN" = "true" ]; then
|
|
||||||
echo " 🔍 [DRY RUN] Would delete branch: $branch"
|
|
||||||
deleted_count=$((deleted_count + 1))
|
|
||||||
else
|
|
||||||
echo " 🗑️ Deleting branch: $branch"
|
|
||||||
|
|
||||||
# 删除远程分支
|
|
||||||
if git push origin --delete "$branch" 2>/dev/null; then
|
|
||||||
echo " ✅ Successfully deleted remote branch: $branch"
|
|
||||||
deleted_count=$((deleted_count + 1))
|
|
||||||
else
|
|
||||||
echo " ❌ Failed to delete remote branch: $branch"
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
|
|
||||||
echo ""
|
|
||||||
echo "=== Cleanup Summary ==="
|
|
||||||
echo "Branches processed: $(echo "$branches" | wc -l)"
|
|
||||||
echo "Branches deleted: $deleted_count"
|
|
||||||
echo "Branches skipped: $skipped_count"
|
|
||||||
|
|
||||||
if [ "$DRY_RUN" = "true" ]; then
|
|
||||||
echo ""
|
|
||||||
echo "🔍 This was a DRY RUN - no branches were actually deleted"
|
|
||||||
echo "To perform actual deletion, run this workflow manually with dry_run=false"
|
|
||||||
fi
|
|
||||||
|
|
||||||
- name: Create summary
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
echo "## Branch Cleanup Summary" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "**Workflow:** ${{ github.workflow }}" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "**Run ID:** ${{ github.run_id }}" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "**Dry Run:** ${{ steps.dry-run.outputs.dry_run }}" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "**Triggered by:** ${{ github.event_name }}" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "" >> $GITHUB_STEP_SUMMARY
|
|
||||||
echo "Check the logs above for detailed information about processed branches." >> $GITHUB_STEP_SUMMARY
|
|
||||||
9
.github/workflows/sync-gitee.yml
vendored
9
.github/workflows/sync-gitee.yml
vendored
@@ -1,9 +1,11 @@
|
|||||||
name: 🔀 Sync mirror to Gitee
|
name: 🔀 Sync mirror to Gitee
|
||||||
|
|
||||||
on:
|
on:
|
||||||
schedule:
|
push:
|
||||||
# 每天凌晨3点运行
|
branches:
|
||||||
- cron: '0 3 * * *'
|
- master
|
||||||
|
- dev
|
||||||
|
create:
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
mirror:
|
mirror:
|
||||||
@@ -12,6 +14,7 @@ jobs:
|
|||||||
steps:
|
steps:
|
||||||
- name: mirror
|
- name: mirror
|
||||||
continue-on-error: true
|
continue-on-error: true
|
||||||
|
if: github.event_name == 'push' || (github.event_name == 'create' && github.event.ref_type == 'tag')
|
||||||
uses: wearerequired/git-mirror-action@v1
|
uses: wearerequired/git-mirror-action@v1
|
||||||
env:
|
env:
|
||||||
SSH_PRIVATE_KEY: ${{ secrets.GITEE_SSH_PRIVATE_KEY }}
|
SSH_PRIVATE_KEY: ${{ secrets.GITEE_SSH_PRIVATE_KEY }}
|
||||||
|
|||||||
11
.prettierrc
11
.prettierrc
@@ -1,11 +0,0 @@
|
|||||||
{
|
|
||||||
"tabWidth": 4,
|
|
||||||
"useTabs": false,
|
|
||||||
"semi": true,
|
|
||||||
"singleQuote": true,
|
|
||||||
"trailingComma": "es5",
|
|
||||||
"bracketSpacing": true,
|
|
||||||
"arrowParens": "avoid",
|
|
||||||
"printWidth": 100,
|
|
||||||
"endOfLine": "lf"
|
|
||||||
}
|
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
FROM jumpserver/core-base:20251029_031929 AS stage-build
|
FROM jumpserver/core-base:20250509_094529 AS stage-build
|
||||||
|
|
||||||
ARG VERSION
|
ARG VERSION
|
||||||
|
|
||||||
@@ -19,7 +19,7 @@ RUN set -ex \
|
|||||||
&& python manage.py compilemessages
|
&& python manage.py compilemessages
|
||||||
|
|
||||||
|
|
||||||
FROM jumpserver/core-base:python-3.11-slim-bullseye-v1
|
FROM python:3.11-slim-bullseye
|
||||||
ENV LANG=en_US.UTF-8 \
|
ENV LANG=en_US.UTF-8 \
|
||||||
PATH=/opt/py3/bin:$PATH
|
PATH=/opt/py3/bin:$PATH
|
||||||
|
|
||||||
@@ -33,7 +33,6 @@ ARG TOOLS=" \
|
|||||||
default-libmysqlclient-dev \
|
default-libmysqlclient-dev \
|
||||||
openssh-client \
|
openssh-client \
|
||||||
sshpass \
|
sshpass \
|
||||||
nmap \
|
|
||||||
bubblewrap"
|
bubblewrap"
|
||||||
|
|
||||||
ARG APT_MIRROR=http://deb.debian.org
|
ARG APT_MIRROR=http://deb.debian.org
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
FROM jumpserver/core-base:python-3.11-slim-bullseye-v1
|
FROM python:3.11-slim-bullseye
|
||||||
ARG TARGETARCH
|
ARG TARGETARCH
|
||||||
COPY --from=ghcr.io/astral-sh/uv:0.6.14 /uv /uvx /usr/local/bin/
|
COPY --from=ghcr.io/astral-sh/uv:0.6.14 /uv /uvx /usr/local/bin/
|
||||||
# Install APT dependencies
|
# Install APT dependencies
|
||||||
@@ -28,7 +28,7 @@ RUN --mount=type=cache,target=/var/cache/apt,sharing=locked,id=core \
|
|||||||
&& echo "no" | dpkg-reconfigure dash
|
&& echo "no" | dpkg-reconfigure dash
|
||||||
|
|
||||||
# Install bin tools
|
# Install bin tools
|
||||||
ARG CHECK_VERSION=v1.0.5
|
ARG CHECK_VERSION=v1.0.4
|
||||||
RUN set -ex \
|
RUN set -ex \
|
||||||
&& wget https://github.com/jumpserver-dev/healthcheck/releases/download/${CHECK_VERSION}/check-${CHECK_VERSION}-linux-${TARGETARCH}.tar.gz \
|
&& wget https://github.com/jumpserver-dev/healthcheck/releases/download/${CHECK_VERSION}/check-${CHECK_VERSION}-linux-${TARGETARCH}.tar.gz \
|
||||||
&& tar -xf check-${CHECK_VERSION}-linux-${TARGETARCH}.tar.gz \
|
&& tar -xf check-${CHECK_VERSION}-linux-${TARGETARCH}.tar.gz \
|
||||||
|
|||||||
@@ -13,9 +13,7 @@ ARG TOOLS=" \
|
|||||||
nmap \
|
nmap \
|
||||||
telnet \
|
telnet \
|
||||||
vim \
|
vim \
|
||||||
postgresql-client-13 \
|
wget"
|
||||||
wget \
|
|
||||||
poppler-utils"
|
|
||||||
|
|
||||||
RUN set -ex \
|
RUN set -ex \
|
||||||
&& apt-get update \
|
&& apt-get update \
|
||||||
@@ -28,5 +26,5 @@ WORKDIR /opt/jumpserver
|
|||||||
ARG PIP_MIRROR=https://pypi.org/simple
|
ARG PIP_MIRROR=https://pypi.org/simple
|
||||||
|
|
||||||
RUN set -ex \
|
RUN set -ex \
|
||||||
&& uv pip install -i${PIP_MIRROR} --group xpack \
|
&& uv pip install -i${PIP_MIRROR} --group xpack
|
||||||
&& playwright install chromium --with-deps --only-shell
|
|
||||||
|
|||||||
@@ -1,11 +0,0 @@
|
|||||||
FROM python:3.11-slim-bullseye
|
|
||||||
ARG TARGETARCH
|
|
||||||
# Install APT dependencies
|
|
||||||
ENV DEBIAN_FRONTEND=noninteractive
|
|
||||||
RUN set -eux; \
|
|
||||||
apt-get update; \
|
|
||||||
apt-get -y --no-install-recommends upgrade; \
|
|
||||||
rm -rf /var/lib/apt/lists/*
|
|
||||||
|
|
||||||
# upgrade pip and setuptools
|
|
||||||
RUN pip install --no-cache-dir --upgrade pip setuptools wheel
|
|
||||||
12
README.md
12
README.md
@@ -2,7 +2,7 @@
|
|||||||
<a name="readme-top"></a>
|
<a name="readme-top"></a>
|
||||||
<a href="https://jumpserver.com" target="_blank"><img src="https://download.jumpserver.org/images/jumpserver-logo.svg" alt="JumpServer" width="300" /></a>
|
<a href="https://jumpserver.com" target="_blank"><img src="https://download.jumpserver.org/images/jumpserver-logo.svg" alt="JumpServer" width="300" /></a>
|
||||||
|
|
||||||
## An open-source PAM platform (Bastion Host)
|
## An open-source PAM tool (Bastion Host)
|
||||||
|
|
||||||
[![][license-shield]][license-link]
|
[![][license-shield]][license-link]
|
||||||
[![][docs-shield]][docs-link]
|
[![][docs-shield]][docs-link]
|
||||||
@@ -12,19 +12,19 @@
|
|||||||
[![][github-release-shield]][github-release-link]
|
[![][github-release-shield]][github-release-link]
|
||||||
[![][github-stars-shield]][github-stars-link]
|
[![][github-stars-shield]][github-stars-link]
|
||||||
|
|
||||||
[English](/README.md) · [中文(简体)](/readmes/README.zh-hans.md) · [中文(繁體)](/readmes/README.zh-hant.md) · [日本語](/readmes/README.ja.md) · [Português (Brasil)](/readmes/README.pt-br.md) · [Español](/readmes/README.es.md) · [Русский](/readmes/README.ru.md) · [한국어](/readmes/README.ko.md)
|
[English](/README.md) · [中文(简体)](/readmes/README.zh-hans.md) · [中文(繁體)](/readmes/README.zh-hant.md) · [日本語](/readmes/README.ja.md) · [Português (Brasil)](/readmes/README.pt-br.md) · [Español](/readmes/README.es.md) · [Русский](/readmes/README.ru.md)
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
<br/>
|
<br/>
|
||||||
|
|
||||||
## What is JumpServer?
|
## What is JumpServer?
|
||||||
|
|
||||||
JumpServer is an open-source Privileged Access Management (PAM) platform that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser.
|
JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser.
|
||||||
|
|
||||||
|
|
||||||
<picture>
|
<picture>
|
||||||
<source media="(prefers-color-scheme: light)" srcset="https://www.jumpserver.com/images/jumpserver-arch-light.png">
|
<source media="(prefers-color-scheme: light)" srcset="https://github.com/user-attachments/assets/dd612f3d-c958-4f84-b164-f31b75454d7f">
|
||||||
<source media="(prefers-color-scheme: dark)" srcset="https://www.jumpserver.com/images/jumpserver-arch-dark.png">
|
<source media="(prefers-color-scheme: dark)" srcset="https://github.com/user-attachments/assets/28676212-2bc4-4a9f-ae10-3be9320647e3">
|
||||||
<img src="https://github.com/user-attachments/assets/dd612f3d-c958-4f84-b164-f31b75454d7f" alt="Theme-based Image">
|
<img src="https://github.com/user-attachments/assets/dd612f3d-c958-4f84-b164-f31b75454d7f" alt="Theme-based Image">
|
||||||
</picture>
|
</picture>
|
||||||
|
|
||||||
@@ -85,8 +85,6 @@ JumpServer consists of multiple key components, which collectively form the func
|
|||||||
| [Nec](https://github.com/jumpserver/nec) | <img alt="Nec" src="https://img.shields.io/badge/release-private-red" /> | JumpServer EE VNC Proxy Connector |
|
| [Nec](https://github.com/jumpserver/nec) | <img alt="Nec" src="https://img.shields.io/badge/release-private-red" /> | JumpServer EE VNC Proxy Connector |
|
||||||
| [Facelive](https://github.com/jumpserver/facelive) | <img alt="Facelive" src="https://img.shields.io/badge/release-private-red" /> | JumpServer EE Facial Recognition |
|
| [Facelive](https://github.com/jumpserver/facelive) | <img alt="Facelive" src="https://img.shields.io/badge/release-private-red" /> | JumpServer EE Facial Recognition |
|
||||||
|
|
||||||
## Third-party projects
|
|
||||||
- [jumpserver-grafana-dashboard](https://github.com/acerrah/jumpserver-grafana-dashboard) JumpServer with grafana dashboard
|
|
||||||
|
|
||||||
## Contributing
|
## Contributing
|
||||||
|
|
||||||
|
|||||||
@@ -11,7 +11,6 @@ from accounts.const import ChangeSecretRecordStatusChoice
|
|||||||
from accounts.filters import AccountFilterSet, NodeFilterBackend
|
from accounts.filters import AccountFilterSet, NodeFilterBackend
|
||||||
from accounts.mixins import AccountRecordViewLogMixin
|
from accounts.mixins import AccountRecordViewLogMixin
|
||||||
from accounts.models import Account, ChangeSecretRecord
|
from accounts.models import Account, ChangeSecretRecord
|
||||||
from assets.const.gpt import create_or_update_chatx_resources
|
|
||||||
from assets.models import Asset, Node
|
from assets.models import Asset, Node
|
||||||
from authentication.permissions import UserConfirmation, ConfirmType
|
from authentication.permissions import UserConfirmation, ConfirmType
|
||||||
from common.api.mixin import ExtraFilterFieldsMixin
|
from common.api.mixin import ExtraFilterFieldsMixin
|
||||||
@@ -19,7 +18,6 @@ from common.drf.filters import AttrRulesFilterBackend
|
|||||||
from common.permissions import IsValidUser
|
from common.permissions import IsValidUser
|
||||||
from common.utils import lazyproperty, get_logger
|
from common.utils import lazyproperty, get_logger
|
||||||
from orgs.mixins.api import OrgBulkModelViewSet
|
from orgs.mixins.api import OrgBulkModelViewSet
|
||||||
from orgs.utils import tmp_to_root_org
|
|
||||||
from rbac.permissions import RBACPermission
|
from rbac.permissions import RBACPermission
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
logger = get_logger(__file__)
|
||||||
@@ -43,9 +41,8 @@ class AccountViewSet(OrgBulkModelViewSet):
|
|||||||
'partial_update': ['accounts.change_account'],
|
'partial_update': ['accounts.change_account'],
|
||||||
'su_from_accounts': 'accounts.view_account',
|
'su_from_accounts': 'accounts.view_account',
|
||||||
'clear_secret': 'accounts.change_account',
|
'clear_secret': 'accounts.change_account',
|
||||||
'move_to_assets': 'accounts.delete_account',
|
'move_to_assets': 'accounts.create_account',
|
||||||
'copy_to_assets': 'accounts.add_account',
|
'copy_to_assets': 'accounts.create_account',
|
||||||
'chat': 'accounts.view_account',
|
|
||||||
}
|
}
|
||||||
export_as_zip = True
|
export_as_zip = True
|
||||||
|
|
||||||
@@ -81,25 +78,18 @@ class AccountViewSet(OrgBulkModelViewSet):
|
|||||||
permission_classes=[IsValidUser]
|
permission_classes=[IsValidUser]
|
||||||
)
|
)
|
||||||
def username_suggestions(self, request, *args, **kwargs):
|
def username_suggestions(self, request, *args, **kwargs):
|
||||||
raw_asset_ids = request.data.get('assets', [])
|
asset_ids = request.data.get('assets', [])
|
||||||
node_ids = request.data.get('nodes', [])
|
node_ids = request.data.get('nodes', [])
|
||||||
username = request.data.get('username', '')
|
username = request.data.get('username', '')
|
||||||
|
|
||||||
asset_ids = set(raw_asset_ids)
|
accounts = Account.objects.all()
|
||||||
|
|
||||||
if node_ids:
|
if node_ids:
|
||||||
nodes = Node.objects.filter(id__in=node_ids)
|
nodes = Node.objects.filter(id__in=node_ids)
|
||||||
node_asset_qs = Node.get_nodes_all_assets(*nodes).values_list('id', flat=True)
|
node_asset_ids = Node.get_nodes_all_assets(*nodes).values_list('id', flat=True)
|
||||||
asset_ids |= {str(u) for u in node_asset_qs}
|
asset_ids.extend(node_asset_ids)
|
||||||
|
|
||||||
if asset_ids:
|
if asset_ids:
|
||||||
through = Asset.directory_services.through
|
accounts = accounts.filter(asset_id__in=list(set(asset_ids)))
|
||||||
ds_qs = through.objects.filter(asset_id__in=asset_ids) \
|
|
||||||
.values_list('directoryservice_id', flat=True)
|
|
||||||
asset_ids |= {str(u) for u in ds_qs}
|
|
||||||
accounts = Account.objects.filter(asset_id__in=list(asset_ids))
|
|
||||||
else:
|
|
||||||
accounts = Account.objects.all()
|
|
||||||
|
|
||||||
if username:
|
if username:
|
||||||
accounts = accounts.filter(username__icontains=username)
|
accounts = accounts.filter(username__icontains=username)
|
||||||
@@ -155,13 +145,6 @@ class AccountViewSet(OrgBulkModelViewSet):
|
|||||||
def copy_to_assets(self, request, *args, **kwargs):
|
def copy_to_assets(self, request, *args, **kwargs):
|
||||||
return self._copy_or_move_to_assets(request, move=False)
|
return self._copy_or_move_to_assets(request, move=False)
|
||||||
|
|
||||||
@action(methods=['get'], detail=False, url_path='chat')
|
|
||||||
def chat(self, request, *args, **kwargs):
|
|
||||||
with tmp_to_root_org():
|
|
||||||
__, account = create_or_update_chatx_resources()
|
|
||||||
serializer = self.get_serializer(account)
|
|
||||||
return Response(serializer.data)
|
|
||||||
|
|
||||||
|
|
||||||
class AccountSecretsViewSet(AccountRecordViewLogMixin, AccountViewSet):
|
class AccountSecretsViewSet(AccountRecordViewLogMixin, AccountViewSet):
|
||||||
"""
|
"""
|
||||||
@@ -200,7 +183,6 @@ class AccountHistoriesSecretAPI(ExtraFilterFieldsMixin, AccountRecordViewLogMixi
|
|||||||
rbac_perms = {
|
rbac_perms = {
|
||||||
'GET': 'accounts.view_accountsecret',
|
'GET': 'accounts.view_accountsecret',
|
||||||
}
|
}
|
||||||
queryset = Account.history.model.objects.none()
|
|
||||||
|
|
||||||
@lazyproperty
|
@lazyproperty
|
||||||
def account(self) -> Account:
|
def account(self) -> Account:
|
||||||
|
|||||||
@@ -25,8 +25,7 @@ class IntegrationApplicationViewSet(OrgBulkModelViewSet):
|
|||||||
}
|
}
|
||||||
rbac_perms = {
|
rbac_perms = {
|
||||||
'get_once_secret': 'accounts.change_integrationapplication',
|
'get_once_secret': 'accounts.change_integrationapplication',
|
||||||
'get_account_secret': 'accounts.view_integrationapplication',
|
'get_account_secret': 'accounts.view_integrationapplication'
|
||||||
'get_sdks_info': 'accounts.view_integrationapplication'
|
|
||||||
}
|
}
|
||||||
|
|
||||||
def read_file(self, path):
|
def read_file(self, path):
|
||||||
@@ -37,6 +36,7 @@ class IntegrationApplicationViewSet(OrgBulkModelViewSet):
|
|||||||
|
|
||||||
@action(
|
@action(
|
||||||
['GET'], detail=False, url_path='sdks',
|
['GET'], detail=False, url_path='sdks',
|
||||||
|
permission_classes=[IsValidUser]
|
||||||
)
|
)
|
||||||
def get_sdks_info(self, request, *args, **kwargs):
|
def get_sdks_info(self, request, *args, **kwargs):
|
||||||
code_suffix_mapper = {
|
code_suffix_mapper = {
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ __all__ = ['PamDashboardApi']
|
|||||||
class PamDashboardApi(APIView):
|
class PamDashboardApi(APIView):
|
||||||
http_method_names = ['get']
|
http_method_names = ['get']
|
||||||
rbac_perms = {
|
rbac_perms = {
|
||||||
'GET': 'rbac.view_pam',
|
'GET': 'accounts.view_account',
|
||||||
}
|
}
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
|
|||||||
@@ -43,7 +43,6 @@ class AccountTemplateViewSet(OrgBulkModelViewSet):
|
|||||||
search_fields = ('username', 'name')
|
search_fields = ('username', 'name')
|
||||||
serializer_classes = {
|
serializer_classes = {
|
||||||
'default': serializers.AccountTemplateSerializer,
|
'default': serializers.AccountTemplateSerializer,
|
||||||
'retrieve': serializers.AccountDetailTemplateSerializer,
|
|
||||||
}
|
}
|
||||||
rbac_perms = {
|
rbac_perms = {
|
||||||
'su_from_account_templates': 'accounts.view_accounttemplate',
|
'su_from_account_templates': 'accounts.view_accounttemplate',
|
||||||
|
|||||||
@@ -12,8 +12,6 @@ class VirtualAccountViewSet(OrgBulkModelViewSet):
|
|||||||
filterset_fields = ('alias',)
|
filterset_fields = ('alias',)
|
||||||
|
|
||||||
def get_queryset(self):
|
def get_queryset(self):
|
||||||
if getattr(self, "swagger_fake_view", False):
|
|
||||||
return VirtualAccount.objects.none()
|
|
||||||
return VirtualAccount.get_or_init_queryset()
|
return VirtualAccount.get_or_init_queryset()
|
||||||
|
|
||||||
def get_object(self, ):
|
def get_object(self, ):
|
||||||
|
|||||||
@@ -41,7 +41,6 @@ class AutomationAssetsListApi(generics.ListAPIView):
|
|||||||
|
|
||||||
class AutomationRemoveAssetApi(generics.UpdateAPIView):
|
class AutomationRemoveAssetApi(generics.UpdateAPIView):
|
||||||
model = BaseAutomation
|
model = BaseAutomation
|
||||||
queryset = BaseAutomation.objects.all()
|
|
||||||
serializer_class = serializers.UpdateAssetSerializer
|
serializer_class = serializers.UpdateAssetSerializer
|
||||||
http_method_names = ['patch']
|
http_method_names = ['patch']
|
||||||
|
|
||||||
@@ -60,7 +59,6 @@ class AutomationRemoveAssetApi(generics.UpdateAPIView):
|
|||||||
|
|
||||||
class AutomationAddAssetApi(generics.UpdateAPIView):
|
class AutomationAddAssetApi(generics.UpdateAPIView):
|
||||||
model = BaseAutomation
|
model = BaseAutomation
|
||||||
queryset = BaseAutomation.objects.all()
|
|
||||||
serializer_class = serializers.UpdateAssetSerializer
|
serializer_class = serializers.UpdateAssetSerializer
|
||||||
http_method_names = ['patch']
|
http_method_names = ['patch']
|
||||||
|
|
||||||
|
|||||||
@@ -6,13 +6,10 @@ from rest_framework.decorators import action
|
|||||||
from rest_framework.response import Response
|
from rest_framework.response import Response
|
||||||
|
|
||||||
from accounts import serializers
|
from accounts import serializers
|
||||||
from accounts.const import (
|
from accounts.const import AutomationTypes, ChangeSecretRecordStatusChoice
|
||||||
AutomationTypes, ChangeSecretRecordStatusChoice
|
from accounts.filters import ChangeSecretRecordFilterSet
|
||||||
)
|
from accounts.models import ChangeSecretAutomation, ChangeSecretRecord
|
||||||
from accounts.filters import ChangeSecretRecordFilterSet, ChangeSecretStatusFilterSet
|
|
||||||
from accounts.models import ChangeSecretAutomation, ChangeSecretRecord, Account
|
|
||||||
from accounts.tasks import execute_automation_record_task
|
from accounts.tasks import execute_automation_record_task
|
||||||
from accounts.utils import account_secret_task_status
|
|
||||||
from authentication.permissions import UserConfirmation, ConfirmType
|
from authentication.permissions import UserConfirmation, ConfirmType
|
||||||
from common.permissions import IsValidLicense
|
from common.permissions import IsValidLicense
|
||||||
from orgs.mixins.api import OrgBulkModelViewSet, OrgGenericViewSet
|
from orgs.mixins.api import OrgBulkModelViewSet, OrgGenericViewSet
|
||||||
@@ -26,7 +23,7 @@ __all__ = [
|
|||||||
'ChangeSecretAutomationViewSet', 'ChangeSecretRecordViewSet',
|
'ChangeSecretAutomationViewSet', 'ChangeSecretRecordViewSet',
|
||||||
'ChangSecretExecutionViewSet', 'ChangSecretAssetsListApi',
|
'ChangSecretExecutionViewSet', 'ChangSecretAssetsListApi',
|
||||||
'ChangSecretRemoveAssetApi', 'ChangSecretAddAssetApi',
|
'ChangSecretRemoveAssetApi', 'ChangSecretAddAssetApi',
|
||||||
'ChangSecretNodeAddRemoveApi', 'ChangeSecretStatusViewSet'
|
'ChangSecretNodeAddRemoveApi'
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
@@ -97,13 +94,12 @@ class ChangeSecretRecordViewSet(mixins.ListModelMixin, OrgGenericViewSet):
|
|||||||
def execute(self, request, *args, **kwargs):
|
def execute(self, request, *args, **kwargs):
|
||||||
record_ids = request.data.get('record_ids')
|
record_ids = request.data.get('record_ids')
|
||||||
records = self.get_queryset().filter(id__in=record_ids)
|
records = self.get_queryset().filter(id__in=record_ids)
|
||||||
if not records.exists():
|
execution_count = records.values_list('execution_id', flat=True).distinct().count()
|
||||||
|
if execution_count != 1:
|
||||||
return Response(
|
return Response(
|
||||||
{'detail': 'No valid records found'},
|
{'detail': 'Only one execution is allowed to execute'},
|
||||||
status=status.HTTP_400_BAD_REQUEST
|
status=status.HTTP_400_BAD_REQUEST
|
||||||
)
|
)
|
||||||
|
|
||||||
record_ids = [str(_id) for _id in records.values_list('id', flat=True)]
|
|
||||||
task = execute_automation_record_task.delay(record_ids, self.tp)
|
task = execute_automation_record_task.delay(record_ids, self.tp)
|
||||||
return Response({'task': task.id}, status=status.HTTP_200_OK)
|
return Response({'task': task.id}, status=status.HTTP_200_OK)
|
||||||
|
|
||||||
@@ -154,27 +150,7 @@ class ChangSecretAddAssetApi(AutomationAddAssetApi):
|
|||||||
model = ChangeSecretAutomation
|
model = ChangeSecretAutomation
|
||||||
serializer_class = serializers.ChangeSecretUpdateAssetSerializer
|
serializer_class = serializers.ChangeSecretUpdateAssetSerializer
|
||||||
|
|
||||||
|
|
||||||
class ChangSecretNodeAddRemoveApi(AutomationNodeAddRemoveApi):
|
class ChangSecretNodeAddRemoveApi(AutomationNodeAddRemoveApi):
|
||||||
model = ChangeSecretAutomation
|
model = ChangeSecretAutomation
|
||||||
serializer_class = serializers.ChangeSecretUpdateNodeSerializer
|
serializer_class = serializers.ChangeSecretUpdateNodeSerializer
|
||||||
|
|
||||||
class ChangeSecretStatusViewSet(OrgBulkModelViewSet):
|
|
||||||
perm_model = ChangeSecretAutomation
|
|
||||||
filterset_class = ChangeSecretStatusFilterSet
|
|
||||||
serializer_class = serializers.ChangeSecretAccountSerializer
|
|
||||||
search_fields = ('username',)
|
|
||||||
|
|
||||||
permission_classes = [RBACPermission, IsValidLicense]
|
|
||||||
http_method_names = ["get", "delete", "options"]
|
|
||||||
|
|
||||||
def get_queryset(self):
|
|
||||||
account_ids = list(account_secret_task_status.account_ids)
|
|
||||||
return Account.objects.filter(id__in=account_ids).select_related('asset')
|
|
||||||
|
|
||||||
def bulk_destroy(self, request, *args, **kwargs):
|
|
||||||
account_ids = request.data.get('account_ids')
|
|
||||||
if isinstance(account_ids, str):
|
|
||||||
account_ids = [account_ids]
|
|
||||||
for _id in account_ids:
|
|
||||||
account_secret_task_status.clear(_id)
|
|
||||||
return Response(status=status.HTTP_200_OK)
|
|
||||||
|
|||||||
@@ -62,8 +62,7 @@ class ChangeSecretDashboardApi(APIView):
|
|||||||
status_counts = defaultdict(lambda: defaultdict(int))
|
status_counts = defaultdict(lambda: defaultdict(int))
|
||||||
|
|
||||||
for date_finished, status in results:
|
for date_finished, status in results:
|
||||||
dt_local = timezone.localtime(date_finished)
|
date_str = str(date_finished.date())
|
||||||
date_str = str(dt_local.date())
|
|
||||||
if status == ChangeSecretRecordStatusChoice.failed:
|
if status == ChangeSecretRecordStatusChoice.failed:
|
||||||
status_counts[date_str]['failed'] += 1
|
status_counts[date_str]['failed'] += 1
|
||||||
elif status == ChangeSecretRecordStatusChoice.success:
|
elif status == ChangeSecretRecordStatusChoice.success:
|
||||||
@@ -91,10 +90,10 @@ class ChangeSecretDashboardApi(APIView):
|
|||||||
|
|
||||||
def get_change_secret_asset_queryset(self):
|
def get_change_secret_asset_queryset(self):
|
||||||
qs = self.change_secrets_queryset
|
qs = self.change_secrets_queryset
|
||||||
node_ids = qs.values_list('nodes', flat=True).distinct()
|
node_ids = qs.filter(nodes__isnull=False).values_list('nodes', flat=True).distinct()
|
||||||
nodes = Node.objects.filter(id__in=node_ids).only('id', 'key')
|
nodes = Node.objects.filter(id__in=node_ids)
|
||||||
node_asset_ids = Node.get_nodes_all_assets(*nodes).values_list('id', flat=True)
|
node_asset_ids = Node.get_nodes_all_assets(*nodes).values_list('id', flat=True)
|
||||||
direct_asset_ids = qs.values_list('assets', flat=True).distinct()
|
direct_asset_ids = qs.filter(assets__isnull=False).values_list('assets', flat=True).distinct()
|
||||||
asset_ids = set(list(direct_asset_ids) + list(node_asset_ids))
|
asset_ids = set(list(direct_asset_ids) + list(node_asset_ids))
|
||||||
return Asset.objects.filter(id__in=asset_ids)
|
return Asset.objects.filter(id__in=asset_ids)
|
||||||
|
|
||||||
|
|||||||
@@ -45,10 +45,10 @@ class CheckAccountAutomationViewSet(OrgBulkModelViewSet):
|
|||||||
class CheckAccountExecutionViewSet(AutomationExecutionViewSet):
|
class CheckAccountExecutionViewSet(AutomationExecutionViewSet):
|
||||||
rbac_perms = (
|
rbac_perms = (
|
||||||
("list", "accounts.view_checkaccountexecution"),
|
("list", "accounts.view_checkaccountexecution"),
|
||||||
("retrieve", "accounts.view_checkaccountexecution"),
|
("retrieve", "accounts.view_checkaccountsexecution"),
|
||||||
("create", "accounts.add_checkaccountexecution"),
|
("create", "accounts.add_checkaccountexecution"),
|
||||||
("adhoc", "accounts.add_checkaccountexecution"),
|
("adhoc", "accounts.add_checkaccountexecution"),
|
||||||
("report", "accounts.view_checkaccountexecution"),
|
("report", "accounts.view_checkaccountsexecution"),
|
||||||
)
|
)
|
||||||
ordering = ("-date_created",)
|
ordering = ("-date_created",)
|
||||||
tp = AutomationTypes.check_account
|
tp = AutomationTypes.check_account
|
||||||
@@ -150,9 +150,6 @@ class CheckAccountEngineViewSet(JMSModelViewSet):
|
|||||||
http_method_names = ['get', 'options']
|
http_method_names = ['get', 'options']
|
||||||
|
|
||||||
def get_queryset(self):
|
def get_queryset(self):
|
||||||
if getattr(self, "swagger_fake_view", False):
|
|
||||||
return CheckAccountEngine.objects.none()
|
|
||||||
|
|
||||||
return CheckAccountEngine.get_default_engines()
|
return CheckAccountEngine.get_default_engines()
|
||||||
|
|
||||||
def filter_queryset(self, queryset: list):
|
def filter_queryset(self, queryset: list):
|
||||||
|
|||||||
@@ -63,10 +63,12 @@ class PushAccountRemoveAssetApi(AutomationRemoveAssetApi):
|
|||||||
model = PushAccountAutomation
|
model = PushAccountAutomation
|
||||||
serializer_class = serializers.PushAccountUpdateAssetSerializer
|
serializer_class = serializers.PushAccountUpdateAssetSerializer
|
||||||
|
|
||||||
|
|
||||||
class PushAccountAddAssetApi(AutomationAddAssetApi):
|
class PushAccountAddAssetApi(AutomationAddAssetApi):
|
||||||
model = PushAccountAutomation
|
model = PushAccountAutomation
|
||||||
serializer_class = serializers.PushAccountUpdateAssetSerializer
|
serializer_class = serializers.PushAccountUpdateAssetSerializer
|
||||||
|
|
||||||
|
|
||||||
class PushAccountNodeAddRemoveApi(AutomationNodeAddRemoveApi):
|
class PushAccountNodeAddRemoveApi(AutomationNodeAddRemoveApi):
|
||||||
model = PushAccountAutomation
|
model = PushAccountAutomation
|
||||||
serializer_class = serializers.PushAccountUpdateNodeSerializer
|
serializer_class = serializers.PushAccountUpdateNodeSerializer
|
||||||
@@ -235,8 +235,8 @@ class AccountBackupHandler:
|
|||||||
except Exception as e:
|
except Exception as e:
|
||||||
error = str(e)
|
error = str(e)
|
||||||
print(f'\033[31m>>> {error}\033[0m')
|
print(f'\033[31m>>> {error}\033[0m')
|
||||||
self.manager.status = Status.error
|
self.execution.status = Status.error
|
||||||
self.manager.summary['error'] = error
|
self.execution.summary['error'] = error
|
||||||
|
|
||||||
def backup_by_obj_storage(self):
|
def backup_by_obj_storage(self):
|
||||||
object_id = self.execution.snapshot.get('id')
|
object_id = self.execution.snapshot.get('id')
|
||||||
|
|||||||
@@ -5,10 +5,9 @@ from django.utils import timezone
|
|||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
from accounts.automations.methods import platform_automation_methods
|
from accounts.automations.methods import platform_automation_methods
|
||||||
from accounts.const import SSHKeyStrategy, SecretStrategy, SecretType, ChangeSecretRecordStatusChoice, \
|
from accounts.const import SSHKeyStrategy, SecretStrategy, SecretType, ChangeSecretRecordStatusChoice
|
||||||
ChangeSecretAccountStatus
|
|
||||||
from accounts.models import BaseAccountQuerySet
|
from accounts.models import BaseAccountQuerySet
|
||||||
from accounts.utils import SecretGenerator, account_secret_task_status
|
from accounts.utils import SecretGenerator
|
||||||
from assets.automations.base.manager import BasePlaybookManager
|
from assets.automations.base.manager import BasePlaybookManager
|
||||||
from assets.const import HostTypes
|
from assets.const import HostTypes
|
||||||
from common.db.utils import safe_atomic_db_connection
|
from common.db.utils import safe_atomic_db_connection
|
||||||
@@ -37,7 +36,7 @@ class BaseChangeSecretPushManager(AccountBasePlaybookManager):
|
|||||||
)
|
)
|
||||||
self.account_ids = self.execution.snapshot['accounts']
|
self.account_ids = self.execution.snapshot['accounts']
|
||||||
self.record_map = self.execution.snapshot.get('record_map', {}) # 这个是某个失败的记录重试
|
self.record_map = self.execution.snapshot.get('record_map', {}) # 这个是某个失败的记录重试
|
||||||
self.name_record_mapper = {} # 做个映射,方便后面处理
|
self.name_recorder_mapper = {} # 做个映射,方便后面处理
|
||||||
|
|
||||||
def gen_account_inventory(self, account, asset, h, path_dir):
|
def gen_account_inventory(self, account, asset, h, path_dir):
|
||||||
raise NotImplementedError
|
raise NotImplementedError
|
||||||
@@ -113,25 +112,10 @@ class BaseChangeSecretPushManager(AccountBasePlaybookManager):
|
|||||||
if host.get('error'):
|
if host.get('error'):
|
||||||
return host
|
return host
|
||||||
|
|
||||||
inventory_hosts = []
|
host['check_conn_after_change'] = self.execution.snapshot.get('check_conn_after_change', True)
|
||||||
if asset.type == HostTypes.WINDOWS:
|
|
||||||
if self.secret_type == SecretType.SSH_KEY:
|
|
||||||
host['error'] = _("Windows does not support SSH key authentication")
|
|
||||||
return host
|
|
||||||
new_secret = self.get_secret(account)
|
|
||||||
if '>' in new_secret or '^' in new_secret:
|
|
||||||
host['error'] = _("Windows password cannot contain special characters like > ^")
|
|
||||||
return host
|
|
||||||
|
|
||||||
host['ssh_params'] = {}
|
host['ssh_params'] = {}
|
||||||
|
|
||||||
accounts = self.get_accounts(account)
|
accounts = self.get_accounts(account)
|
||||||
existing_ids = set(map(str, accounts.values_list('id', flat=True)))
|
|
||||||
missing_ids = set(map(str, self.account_ids)) - existing_ids
|
|
||||||
|
|
||||||
for account_id in missing_ids:
|
|
||||||
self.clear_account_queue_status(account_id)
|
|
||||||
|
|
||||||
error_msg = _("No pending accounts found")
|
error_msg = _("No pending accounts found")
|
||||||
if not accounts:
|
if not accounts:
|
||||||
print(f'{asset}: {error_msg}')
|
print(f'{asset}: {error_msg}')
|
||||||
@@ -140,53 +124,39 @@ class BaseChangeSecretPushManager(AccountBasePlaybookManager):
|
|||||||
if asset.type == HostTypes.WINDOWS:
|
if asset.type == HostTypes.WINDOWS:
|
||||||
accounts = accounts.filter(secret_type=SecretType.PASSWORD)
|
accounts = accounts.filter(secret_type=SecretType.PASSWORD)
|
||||||
|
|
||||||
|
inventory_hosts = []
|
||||||
|
if asset.type == HostTypes.WINDOWS and self.secret_type == SecretType.SSH_KEY:
|
||||||
|
print(f'Windows {asset} does not support ssh key push')
|
||||||
|
return inventory_hosts
|
||||||
|
|
||||||
for account in accounts:
|
for account in accounts:
|
||||||
h = deepcopy(host)
|
h = deepcopy(host)
|
||||||
h['name'] += '(' + account.username + ')' # To distinguish different accounts
|
h['name'] += '(' + account.username + ')' # To distinguish different accounts
|
||||||
|
|
||||||
account_status = account_secret_task_status.get_status(account.id)
|
|
||||||
if account_status == ChangeSecretAccountStatus.PROCESSING:
|
|
||||||
h['error'] = f'Account is already being processed, skipping: {account}'
|
|
||||||
inventory_hosts.append(h)
|
|
||||||
continue
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
h, record = self.gen_account_inventory(account, asset, h, path_dir)
|
h = self.gen_account_inventory(account, asset, h, path_dir)
|
||||||
h['check_conn_after_change'] = record.execution.snapshot.get('check_conn_after_change', True)
|
|
||||||
account_secret_task_status.set_status(
|
|
||||||
account.id,
|
|
||||||
ChangeSecretAccountStatus.PROCESSING,
|
|
||||||
metadata={'execution_id': self.execution.id}
|
|
||||||
)
|
|
||||||
except Exception as e:
|
except Exception as e:
|
||||||
h['error'] = str(e)
|
h['error'] = str(e)
|
||||||
self.clear_account_queue_status(account.id)
|
|
||||||
|
|
||||||
inventory_hosts.append(h)
|
inventory_hosts.append(h)
|
||||||
|
|
||||||
return inventory_hosts
|
return inventory_hosts
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def save_record(record):
|
def save_record(recorder):
|
||||||
record.save(update_fields=['error', 'status', 'date_finished'])
|
recorder.save(update_fields=['error', 'status', 'date_finished'])
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def clear_account_queue_status(account_id):
|
|
||||||
account_secret_task_status.clear(account_id)
|
|
||||||
|
|
||||||
def on_host_success(self, host, result):
|
def on_host_success(self, host, result):
|
||||||
record = self.name_record_mapper.get(host)
|
recorder = self.name_recorder_mapper.get(host)
|
||||||
if not record:
|
if not recorder:
|
||||||
return
|
return
|
||||||
record.status = ChangeSecretRecordStatusChoice.success.value
|
recorder.status = ChangeSecretRecordStatusChoice.success.value
|
||||||
record.date_finished = timezone.now()
|
recorder.date_finished = timezone.now()
|
||||||
|
|
||||||
account = record.account
|
account = recorder.account
|
||||||
if not account:
|
if not account:
|
||||||
print("Account not found, deleted ?")
|
print("Account not found, deleted ?")
|
||||||
return
|
return
|
||||||
|
|
||||||
account.secret = getattr(record, 'new_secret', account.secret)
|
account.secret = getattr(recorder, 'new_secret', account.secret)
|
||||||
account.date_updated = timezone.now()
|
account.date_updated = timezone.now()
|
||||||
account.date_change_secret = timezone.now()
|
account.date_change_secret = timezone.now()
|
||||||
account.change_secret_status = ChangeSecretRecordStatusChoice.success
|
account.change_secret_status = ChangeSecretRecordStatusChoice.success
|
||||||
@@ -202,17 +172,16 @@ class BaseChangeSecretPushManager(AccountBasePlaybookManager):
|
|||||||
|
|
||||||
with safe_atomic_db_connection():
|
with safe_atomic_db_connection():
|
||||||
account.save(update_fields=['secret', 'date_updated', 'date_change_secret', 'change_secret_status'])
|
account.save(update_fields=['secret', 'date_updated', 'date_change_secret', 'change_secret_status'])
|
||||||
self.save_record(record)
|
self.save_record(recorder)
|
||||||
self.clear_account_queue_status(account.id)
|
|
||||||
|
|
||||||
def on_host_error(self, host, error, result):
|
def on_host_error(self, host, error, result):
|
||||||
record = self.name_record_mapper.get(host)
|
recorder = self.name_recorder_mapper.get(host)
|
||||||
if not record:
|
if not recorder:
|
||||||
return
|
return
|
||||||
record.status = ChangeSecretRecordStatusChoice.failed.value
|
recorder.status = ChangeSecretRecordStatusChoice.failed.value
|
||||||
record.date_finished = timezone.now()
|
recorder.date_finished = timezone.now()
|
||||||
record.error = error
|
recorder.error = error
|
||||||
account = record.account
|
account = recorder.account
|
||||||
if not account:
|
if not account:
|
||||||
print("Account not found, deleted ?")
|
print("Account not found, deleted ?")
|
||||||
return
|
return
|
||||||
@@ -223,13 +192,12 @@ class BaseChangeSecretPushManager(AccountBasePlaybookManager):
|
|||||||
self.summary['fail_accounts'] += 1
|
self.summary['fail_accounts'] += 1
|
||||||
self.result['fail_accounts'].append(
|
self.result['fail_accounts'].append(
|
||||||
{
|
{
|
||||||
"asset": str(record.asset),
|
"asset": str(recorder.asset),
|
||||||
"username": record.account.username,
|
"username": recorder.account.username,
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
super().on_host_error(host, error, result)
|
super().on_host_error(host, error, result)
|
||||||
|
|
||||||
with safe_atomic_db_connection():
|
with safe_atomic_db_connection():
|
||||||
account.save(update_fields=['change_secret_status', 'date_change_secret', 'date_updated'])
|
account.save(update_fields=['change_secret_status', 'date_change_secret', 'date_updated'])
|
||||||
self.save_record(record)
|
self.save_record(recorder)
|
||||||
self.clear_account_queue_status(account.id)
|
|
||||||
|
|||||||
@@ -54,5 +54,3 @@
|
|||||||
connection_options:
|
connection_options:
|
||||||
- tlsAllowInvalidHostnames: "{{ jms_asset.spec_info.allow_invalid_cert}}"
|
- tlsAllowInvalidHostnames: "{{ jms_asset.spec_info.allow_invalid_cert}}"
|
||||||
when: check_conn_after_change
|
when: check_conn_after_change
|
||||||
register: result
|
|
||||||
failed_when: not result.is_available
|
|
||||||
@@ -39,8 +39,7 @@
|
|||||||
name: "{{ account.username }}"
|
name: "{{ account.username }}"
|
||||||
password: "{{ account.secret }}"
|
password: "{{ account.secret }}"
|
||||||
host: "%"
|
host: "%"
|
||||||
priv: "{{ omit if db_name == '' else db_name + '.*:ALL' }}"
|
priv: "{{ account.username + '.*:USAGE' if db_name == '' else db_name + '.*:ALL' }}"
|
||||||
append_privs: "{{ db_name != '' | bool }}"
|
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
when: db_info is succeeded
|
when: db_info is succeeded
|
||||||
|
|
||||||
|
|||||||
@@ -56,5 +56,3 @@
|
|||||||
ssl_key: "{{ ssl_key if check_ssl and ssl_key | length > 0 else omit }}"
|
ssl_key: "{{ ssl_key if check_ssl and ssl_key | length > 0 else omit }}"
|
||||||
ssl_mode: "{{ jms_asset.spec_info.pg_ssl_mode }}"
|
ssl_mode: "{{ jms_asset.spec_info.pg_ssl_mode }}"
|
||||||
when: check_conn_after_change
|
when: check_conn_after_change
|
||||||
register: result
|
|
||||||
failed_when: not result.is_available
|
|
||||||
|
|||||||
@@ -5,14 +5,12 @@
|
|||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Test SQLServer connection
|
- name: Test SQLServer connection
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: |
|
script: |
|
||||||
SELECT @@version
|
SELECT @@version
|
||||||
register: db_info
|
register: db_info
|
||||||
@@ -25,53 +23,45 @@
|
|||||||
var: info
|
var: info
|
||||||
|
|
||||||
- name: Check whether SQLServer User exist
|
- name: Check whether SQLServer User exist
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: "SELECT 1 from sys.sql_logins WHERE name='{{ account.username }}';"
|
script: "SELECT 1 from sys.sql_logins WHERE name='{{ account.username }}';"
|
||||||
when: db_info is succeeded
|
when: db_info is succeeded
|
||||||
register: user_exist
|
register: user_exist
|
||||||
|
|
||||||
- name: Change SQLServer password
|
- name: Change SQLServer password
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: "ALTER LOGIN {{ account.username }} WITH PASSWORD = '{{ account.secret }}', DEFAULT_DATABASE = {{ jms_asset.spec_info.db_name }}; select @@version"
|
script: "ALTER LOGIN {{ account.username }} WITH PASSWORD = '{{ account.secret }}', DEFAULT_DATABASE = {{ jms_asset.spec_info.db_name }}; select @@version"
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
when: user_exist.query_results[0] | length != 0
|
when: user_exist.query_results[0] | length != 0
|
||||||
|
|
||||||
- name: Add SQLServer user
|
- name: Add SQLServer user
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: "CREATE LOGIN {{ account.username }} WITH PASSWORD = '{{ account.secret }}', DEFAULT_DATABASE = {{ jms_asset.spec_info.db_name }}; CREATE USER {{ account.username }} FOR LOGIN {{ account.username }}; select @@version"
|
script: "CREATE LOGIN {{ account.username }} WITH PASSWORD = '{{ account.secret }}', DEFAULT_DATABASE = {{ jms_asset.spec_info.db_name }}; CREATE USER {{ account.username }} FOR LOGIN {{ account.username }}; select @@version"
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
when: user_exist.query_results[0] | length == 0
|
when: user_exist.query_results[0] | length == 0
|
||||||
|
|
||||||
- name: Verify password
|
- name: Verify password
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ account.username }}"
|
login_user: "{{ account.username }}"
|
||||||
login_password: "{{ account.secret }}"
|
login_password: "{{ account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: |
|
script: |
|
||||||
SELECT @@version
|
SELECT @@version
|
||||||
when: check_conn_after_change
|
when: check_conn_after_change
|
||||||
|
|||||||
@@ -18,7 +18,6 @@
|
|||||||
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
||||||
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
||||||
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
||||||
group: "{{ params.group if params.group | length > 0 else omit }}"
|
|
||||||
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
||||||
append: "{{ true if params.groups | length > 0 else false }}"
|
append: "{{ true if params.groups | length > 0 else false }}"
|
||||||
expires: -1
|
expires: -1
|
||||||
|
|||||||
@@ -28,12 +28,6 @@ params:
|
|||||||
default: ''
|
default: ''
|
||||||
help_text: "{{ 'Params home help text' | trans }}"
|
help_text: "{{ 'Params home help text' | trans }}"
|
||||||
|
|
||||||
- name: group
|
|
||||||
type: str
|
|
||||||
label: "{{ 'Params group label' | trans }}"
|
|
||||||
default: ''
|
|
||||||
help_text: "{{ 'Params group help text' | trans }}"
|
|
||||||
|
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: "{{ 'Params groups label' | trans }}"
|
||||||
@@ -67,11 +61,6 @@ i18n:
|
|||||||
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
||||||
en: 'Default home directory /home/{account username}'
|
en: 'Default home directory /home/{account username}'
|
||||||
|
|
||||||
Params group help text:
|
|
||||||
zh: '请输入用户组(名字或数字),只能输入一个(需填写已存在的用户组)'
|
|
||||||
ja: 'ユーザー グループ (名前または番号) を入力してください。入力できるのは 1 つだけです (既存のユーザー グループを入力する必要があります)'
|
|
||||||
en: 'Please enter a user group (name or number), only one can be entered (must fill in an existing user group)'
|
|
||||||
|
|
||||||
Params groups help text:
|
Params groups help text:
|
||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
@@ -97,11 +86,6 @@ i18n:
|
|||||||
ja: 'グループ'
|
ja: 'グループ'
|
||||||
en: 'Groups'
|
en: 'Groups'
|
||||||
|
|
||||||
Params group label:
|
|
||||||
zh: '主组'
|
|
||||||
ja: '主组'
|
|
||||||
en: 'Main group'
|
|
||||||
|
|
||||||
Params uid label:
|
Params uid label:
|
||||||
zh: '用户ID'
|
zh: '用户ID'
|
||||||
ja: 'ユーザーID'
|
ja: 'ユーザーID'
|
||||||
|
|||||||
@@ -18,7 +18,6 @@
|
|||||||
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
||||||
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
||||||
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
||||||
group: "{{ params.group if params.group | length > 0 else omit }}"
|
|
||||||
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
||||||
append: "{{ true if params.groups | length > 0 else false }}"
|
append: "{{ true if params.groups | length > 0 else false }}"
|
||||||
expires: -1
|
expires: -1
|
||||||
|
|||||||
@@ -30,12 +30,6 @@ params:
|
|||||||
default: ''
|
default: ''
|
||||||
help_text: "{{ 'Params home help text' | trans }}"
|
help_text: "{{ 'Params home help text' | trans }}"
|
||||||
|
|
||||||
- name: group
|
|
||||||
type: str
|
|
||||||
label: "{{ 'Params group label' | trans }}"
|
|
||||||
default: ''
|
|
||||||
help_text: "{{ 'Params group help text' | trans }}"
|
|
||||||
|
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: "{{ 'Params groups label' | trans }}"
|
||||||
@@ -69,11 +63,6 @@ i18n:
|
|||||||
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
||||||
en: 'Default home directory /home/{account username}'
|
en: 'Default home directory /home/{account username}'
|
||||||
|
|
||||||
Params group help text:
|
|
||||||
zh: '请输入用户组(名字或数字),只能输入一个(需填写已存在的用户组)'
|
|
||||||
ja: 'ユーザー グループ (名前または番号) を入力してください。入力できるのは 1 つだけです (既存のユーザー グループを入力する必要があります)'
|
|
||||||
en: 'Please enter a user group (name or number), only one can be entered (must fill in an existing user group)'
|
|
||||||
|
|
||||||
Params groups help text:
|
Params groups help text:
|
||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
@@ -99,11 +88,6 @@ i18n:
|
|||||||
ja: 'グループ'
|
ja: 'グループ'
|
||||||
en: 'Groups'
|
en: 'Groups'
|
||||||
|
|
||||||
Params group label:
|
|
||||||
zh: '主组'
|
|
||||||
ja: '主组'
|
|
||||||
en: 'Main group'
|
|
||||||
|
|
||||||
Params uid label:
|
Params uid label:
|
||||||
zh: '用户ID'
|
zh: '用户ID'
|
||||||
ja: 'ユーザーID'
|
ja: 'ユーザーID'
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ type:
|
|||||||
params:
|
params:
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: '用户组'
|
||||||
default: 'Users,Remote Desktop Users'
|
default: 'Users,Remote Desktop Users'
|
||||||
help_text: "{{ 'Params groups help text' | trans }}"
|
help_text: "{{ 'Params groups help text' | trans }}"
|
||||||
|
|
||||||
@@ -24,7 +24,3 @@ i18n:
|
|||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
||||||
|
|
||||||
Params groups label:
|
|
||||||
zh: '用户组'
|
|
||||||
ja: 'グループ'
|
|
||||||
en: 'Groups'
|
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ type:
|
|||||||
params:
|
params:
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: '用户组'
|
||||||
default: 'Users,Remote Desktop Users'
|
default: 'Users,Remote Desktop Users'
|
||||||
help_text: "{{ 'Params groups help text' | trans }}"
|
help_text: "{{ 'Params groups help text' | trans }}"
|
||||||
|
|
||||||
@@ -25,8 +25,3 @@ i18n:
|
|||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
||||||
|
|
||||||
Params groups label:
|
|
||||||
zh: '用户组'
|
|
||||||
ja: 'グループ'
|
|
||||||
en: 'Groups'
|
|
||||||
|
|
||||||
|
|||||||
@@ -9,24 +9,19 @@ priority: 49
|
|||||||
params:
|
params:
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: '用户组'
|
||||||
default: 'Users,Remote Desktop Users'
|
default: 'Users,Remote Desktop Users'
|
||||||
help_text: "{{ 'Params groups help text' | trans }}"
|
help_text: "{{ 'Params groups help text' | trans }}"
|
||||||
|
|
||||||
|
|
||||||
i18n:
|
i18n:
|
||||||
Windows account change secret rdp verify:
|
Windows account change secret rdp verify:
|
||||||
zh: '使用 Ansible 模块 win_user 执行 Windows 账号改密(最后使用 Python 模块 pyfreerdp 验证账号的可连接性)'
|
zh: '使用 Ansible 模块 win_user 执行 Windows 账号改密 RDP 协议测试最后的可连接性'
|
||||||
ja: 'Ansible モジュール win_user を使用して Windows アカウントのパスワードを変更します (最後に Python モジュール pyfreerdp を使用してアカウントの接続を確認します)'
|
ja: 'Ansibleモジュールwin_userはWindowsアカウントの改密RDPプロトコルテストの最後の接続性を実行する'
|
||||||
en: 'Use the Ansible module win_user to change the Windows account password (finally use the Python module pyfreerdp to verify the account connectivity)'
|
en: 'Using the Ansible module win_user performs Windows account encryption RDP protocol testing for final connectivity'
|
||||||
|
|
||||||
Params groups help text:
|
Params groups help text:
|
||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
||||||
|
|
||||||
Params groups label:
|
|
||||||
zh: '用户组'
|
|
||||||
ja: 'グループ'
|
|
||||||
en: 'Groups'
|
|
||||||
|
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ from accounts.const import (
|
|||||||
AutomationTypes, SecretStrategy, ChangeSecretRecordStatusChoice
|
AutomationTypes, SecretStrategy, ChangeSecretRecordStatusChoice
|
||||||
)
|
)
|
||||||
from accounts.models import ChangeSecretRecord
|
from accounts.models import ChangeSecretRecord
|
||||||
from accounts.notifications import ChangeSecretExecutionTaskMsg
|
from accounts.notifications import ChangeSecretExecutionTaskMsg, ChangeSecretReportMsg
|
||||||
from accounts.serializers import ChangeSecretRecordBackUpSerializer
|
from accounts.serializers import ChangeSecretRecordBackUpSerializer
|
||||||
from common.utils import get_logger
|
from common.utils import get_logger
|
||||||
from common.utils.file import encrypt_and_compress_zip_file
|
from common.utils.file import encrypt_and_compress_zip_file
|
||||||
@@ -30,28 +30,28 @@ class ChangeSecretManager(BaseChangeSecretPushManager):
|
|||||||
record = self.get_or_create_record(asset, account, h['name'])
|
record = self.get_or_create_record(asset, account, h['name'])
|
||||||
new_secret, private_key_path = self.handle_ssh_secret(account.secret_type, record.new_secret, path_dir)
|
new_secret, private_key_path = self.handle_ssh_secret(account.secret_type, record.new_secret, path_dir)
|
||||||
h = self.gen_inventory(h, account, new_secret, private_key_path, asset)
|
h = self.gen_inventory(h, account, new_secret, private_key_path, asset)
|
||||||
return h, record
|
return h
|
||||||
|
|
||||||
def get_or_create_record(self, asset, account, name):
|
def get_or_create_record(self, asset, account, name):
|
||||||
asset_account_id = f'{asset.id}-{account.id}'
|
asset_account_id = f'{asset.id}-{account.id}'
|
||||||
|
|
||||||
if asset_account_id in self.record_map:
|
if asset_account_id in self.record_map:
|
||||||
record_id = self.record_map[asset_account_id]
|
record_id = self.record_map[asset_account_id]
|
||||||
record = ChangeSecretRecord.objects.filter(id=record_id).first()
|
recorder = ChangeSecretRecord.objects.filter(id=record_id).first()
|
||||||
else:
|
else:
|
||||||
new_secret = self.get_secret(account)
|
new_secret = self.get_secret(account)
|
||||||
record = self.create_record(asset, account, new_secret)
|
recorder = self.create_record(asset, account, new_secret)
|
||||||
|
|
||||||
self.name_record_mapper[name] = record
|
self.name_recorder_mapper[name] = recorder
|
||||||
return record
|
return recorder
|
||||||
|
|
||||||
def create_record(self, asset, account, new_secret):
|
def create_record(self, asset, account, new_secret):
|
||||||
record = ChangeSecretRecord(
|
recorder = ChangeSecretRecord(
|
||||||
asset=asset, account=account, execution=self.execution,
|
asset=asset, account=account, execution=self.execution,
|
||||||
old_secret=account.secret, new_secret=new_secret,
|
old_secret=account.secret, new_secret=new_secret,
|
||||||
comment=f'{account.username}@{asset.address}'
|
comment=f'{account.username}@{asset.address}'
|
||||||
)
|
)
|
||||||
return record
|
return recorder
|
||||||
|
|
||||||
def check_secret(self):
|
def check_secret(self):
|
||||||
if self.secret_strategy == SecretStrategy.custom \
|
if self.secret_strategy == SecretStrategy.custom \
|
||||||
@@ -61,10 +61,10 @@ class ChangeSecretManager(BaseChangeSecretPushManager):
|
|||||||
return True
|
return True
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_summary(records):
|
def get_summary(recorders):
|
||||||
total, succeed, failed = 0, 0, 0
|
total, succeed, failed = 0, 0, 0
|
||||||
for record in records:
|
for recorder in recorders:
|
||||||
if record.status == ChangeSecretRecordStatusChoice.success.value:
|
if recorder.status == ChangeSecretRecordStatusChoice.success.value:
|
||||||
succeed += 1
|
succeed += 1
|
||||||
else:
|
else:
|
||||||
failed += 1
|
failed += 1
|
||||||
@@ -73,8 +73,8 @@ class ChangeSecretManager(BaseChangeSecretPushManager):
|
|||||||
return summary
|
return summary
|
||||||
|
|
||||||
def print_summary(self):
|
def print_summary(self):
|
||||||
records = list(self.name_record_mapper.values())
|
recorders = list(self.name_recorder_mapper.values())
|
||||||
summary = self.get_summary(records)
|
summary = self.get_summary(recorders)
|
||||||
print('\n\n' + '-' * 80)
|
print('\n\n' + '-' * 80)
|
||||||
plan_execution_end = _('Plan execution end')
|
plan_execution_end = _('Plan execution end')
|
||||||
print('{} {}\n'.format(plan_execution_end, local_now_filename()))
|
print('{} {}\n'.format(plan_execution_end, local_now_filename()))
|
||||||
@@ -86,7 +86,7 @@ class ChangeSecretManager(BaseChangeSecretPushManager):
|
|||||||
if self.secret_type and not self.check_secret():
|
if self.secret_type and not self.check_secret():
|
||||||
return
|
return
|
||||||
|
|
||||||
records = list(self.name_record_mapper.values())
|
recorders = list(self.name_recorder_mapper.values())
|
||||||
if self.record_map:
|
if self.record_map:
|
||||||
return
|
return
|
||||||
|
|
||||||
@@ -94,17 +94,21 @@ class ChangeSecretManager(BaseChangeSecretPushManager):
|
|||||||
if not recipients:
|
if not recipients:
|
||||||
return
|
return
|
||||||
|
|
||||||
if not records:
|
context = self.get_report_context()
|
||||||
|
for user in recipients:
|
||||||
|
ChangeSecretReportMsg(user, context).publish()
|
||||||
|
|
||||||
|
if not recorders:
|
||||||
return
|
return
|
||||||
|
|
||||||
summary = self.get_summary(records)
|
summary = self.get_summary(recorders)
|
||||||
self.send_record_mail(recipients, records, summary)
|
self.send_recorder_mail(recipients, recorders, summary)
|
||||||
|
|
||||||
def send_record_mail(self, recipients, records, summary):
|
def send_recorder_mail(self, recipients, recorders, summary):
|
||||||
name = self.execution.snapshot['name']
|
name = self.execution.snapshot['name']
|
||||||
path = os.path.join(os.path.dirname(settings.BASE_DIR), 'tmp')
|
path = os.path.join(os.path.dirname(settings.BASE_DIR), 'tmp')
|
||||||
filename = os.path.join(path, f'{name}-{local_now_filename()}-{time.time()}.xlsx')
|
filename = os.path.join(path, f'{name}-{local_now_filename()}-{time.time()}.xlsx')
|
||||||
if not self.create_file(records, filename):
|
if not self.create_file(recorders, filename):
|
||||||
return
|
return
|
||||||
|
|
||||||
for user in recipients:
|
for user in recipients:
|
||||||
@@ -117,9 +121,9 @@ class ChangeSecretManager(BaseChangeSecretPushManager):
|
|||||||
os.remove(filename)
|
os.remove(filename)
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def create_file(records, filename):
|
def create_file(recorders, filename):
|
||||||
serializer_cls = ChangeSecretRecordBackUpSerializer
|
serializer_cls = ChangeSecretRecordBackUpSerializer
|
||||||
serializer = serializer_cls(records, many=True)
|
serializer = serializer_cls(recorders, many=True)
|
||||||
|
|
||||||
header = [str(v.label) for v in serializer.child.fields.values()]
|
header = [str(v.label) for v in serializer.child.fields.values()]
|
||||||
rows = [[str(i) for i in row.values()] for row in serializer.data]
|
rows = [[str(i) for i in row.values()] for row in serializer.data]
|
||||||
|
|||||||
@@ -15,13 +15,11 @@ from common.decorators import bulk_create_decorator, bulk_update_decorator
|
|||||||
from settings.models import LeakPasswords
|
from settings.models import LeakPasswords
|
||||||
|
|
||||||
|
|
||||||
# 已设置手动 finish
|
|
||||||
@bulk_create_decorator(AccountRisk)
|
@bulk_create_decorator(AccountRisk)
|
||||||
def create_risk(data):
|
def create_risk(data):
|
||||||
return AccountRisk(**data)
|
return AccountRisk(**data)
|
||||||
|
|
||||||
|
|
||||||
# 已设置手动 finish
|
|
||||||
@bulk_update_decorator(AccountRisk, update_fields=["details", "status"])
|
@bulk_update_decorator(AccountRisk, update_fields=["details", "status"])
|
||||||
def update_risk(risk):
|
def update_risk(risk):
|
||||||
return risk
|
return risk
|
||||||
@@ -219,9 +217,6 @@ class CheckAccountManager(BaseManager):
|
|||||||
"details": [{"datetime": now, 'type': 'init'}],
|
"details": [{"datetime": now, 'type': 'init'}],
|
||||||
})
|
})
|
||||||
|
|
||||||
create_risk.finish()
|
|
||||||
update_risk.finish()
|
|
||||||
|
|
||||||
def pre_run(self):
|
def pre_run(self):
|
||||||
super().pre_run()
|
super().pre_run()
|
||||||
self.assets = self.execution.get_all_assets()
|
self.assets = self.execution.get_all_assets()
|
||||||
@@ -240,11 +235,6 @@ class CheckAccountManager(BaseManager):
|
|||||||
|
|
||||||
print("Check: {} => {}".format(account, msg))
|
print("Check: {} => {}".format(account, msg))
|
||||||
if not error:
|
if not error:
|
||||||
AccountRisk.objects.filter(
|
|
||||||
asset=account.asset,
|
|
||||||
username=account.username,
|
|
||||||
risk=handler.risk
|
|
||||||
).delete()
|
|
||||||
continue
|
continue
|
||||||
self.add_risk(handler.risk, account)
|
self.add_risk(handler.risk, account)
|
||||||
self.commit_risks(_assets)
|
self.commit_risks(_assets)
|
||||||
@@ -274,7 +264,7 @@ class CheckAccountManager(BaseManager):
|
|||||||
handler.clean()
|
handler.clean()
|
||||||
|
|
||||||
def get_report_subject(self):
|
def get_report_subject(self):
|
||||||
return _("Check account report of {}").format(self.execution.id)
|
return "Check account report of %s" % self.execution.id
|
||||||
|
|
||||||
def get_report_template(self):
|
def get_report_template(self):
|
||||||
return "accounts/check_account_report.html"
|
return "accounts/check_account_report.html"
|
||||||
|
|||||||
@@ -5,14 +5,12 @@
|
|||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Test SQLServer connection
|
- name: Test SQLServer connection
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: |
|
script: |
|
||||||
SELECT
|
SELECT
|
||||||
l.name,
|
l.name,
|
||||||
|
|||||||
@@ -30,16 +30,6 @@ common_risk_items = [
|
|||||||
diff_items = risk_items + common_risk_items
|
diff_items = risk_items + common_risk_items
|
||||||
|
|
||||||
|
|
||||||
@bulk_create_decorator(AccountRisk)
|
|
||||||
def _create_risk(data):
|
|
||||||
return AccountRisk(**data)
|
|
||||||
|
|
||||||
|
|
||||||
@bulk_update_decorator(AccountRisk, update_fields=["details"])
|
|
||||||
def _update_risk(account):
|
|
||||||
return account
|
|
||||||
|
|
||||||
|
|
||||||
def format_datetime(value):
|
def format_datetime(value):
|
||||||
if isinstance(value, timezone.datetime):
|
if isinstance(value, timezone.datetime):
|
||||||
return value.strftime("%Y-%m-%d %H:%M:%S")
|
return value.strftime("%Y-%m-%d %H:%M:%S")
|
||||||
@@ -151,17 +141,25 @@ class AnalyseAccountRisk:
|
|||||||
found = assets_risks.get(key)
|
found = assets_risks.get(key)
|
||||||
|
|
||||||
if not found:
|
if not found:
|
||||||
_create_risk(dict(**d, details=[detail]))
|
self._create_risk(dict(**d, details=[detail]))
|
||||||
continue
|
continue
|
||||||
|
|
||||||
found.details.append(detail)
|
found.details.append(detail)
|
||||||
_update_risk(found)
|
self._update_risk(found)
|
||||||
|
|
||||||
|
@bulk_create_decorator(AccountRisk)
|
||||||
|
def _create_risk(self, data):
|
||||||
|
return AccountRisk(**data)
|
||||||
|
|
||||||
|
@bulk_update_decorator(AccountRisk, update_fields=["details"])
|
||||||
|
def _update_risk(self, account):
|
||||||
|
return account
|
||||||
|
|
||||||
def lost_accounts(self, asset, lost_users):
|
def lost_accounts(self, asset, lost_users):
|
||||||
if not self.check_risk:
|
if not self.check_risk:
|
||||||
return
|
return
|
||||||
for user in lost_users:
|
for user in lost_users:
|
||||||
_create_risk(
|
self._create_risk(
|
||||||
dict(
|
dict(
|
||||||
asset_id=str(asset.id),
|
asset_id=str(asset.id),
|
||||||
username=user,
|
username=user,
|
||||||
@@ -178,7 +176,7 @@ class AnalyseAccountRisk:
|
|||||||
self._analyse_item_changed(ga, d)
|
self._analyse_item_changed(ga, d)
|
||||||
if not sys_found:
|
if not sys_found:
|
||||||
basic = {"asset": asset, "username": d["username"], 'gathered_account': ga}
|
basic = {"asset": asset, "username": d["username"], 'gathered_account': ga}
|
||||||
_create_risk(
|
self._create_risk(
|
||||||
dict(
|
dict(
|
||||||
**basic,
|
**basic,
|
||||||
risk=RiskChoice.new_found,
|
risk=RiskChoice.new_found,
|
||||||
@@ -390,7 +388,6 @@ class GatherAccountsManager(AccountBasePlaybookManager):
|
|||||||
self.update_gathered_account(ori_account, d)
|
self.update_gathered_account(ori_account, d)
|
||||||
ori_found = username in ori_users
|
ori_found = username in ori_users
|
||||||
need_analyser_gather_account.append((asset, ga, d, ori_found))
|
need_analyser_gather_account.append((asset, ga, d, ori_found))
|
||||||
# 这里顺序不能调整,risk 外键关联了 gathered_account 主键 id,所以在创建 risk 需要保证 gathered_account 已经创建完成
|
|
||||||
self.create_gathered_account.finish()
|
self.create_gathered_account.finish()
|
||||||
self.update_gathered_account.finish()
|
self.update_gathered_account.finish()
|
||||||
for analysis_data in need_analyser_gather_account:
|
for analysis_data in need_analyser_gather_account:
|
||||||
@@ -406,9 +403,6 @@ class GatherAccountsManager(AccountBasePlaybookManager):
|
|||||||
present=True
|
present=True
|
||||||
)
|
)
|
||||||
# 因为有 bulk create, bulk update, 所以这里需要 sleep 一下,等待数据同步
|
# 因为有 bulk create, bulk update, 所以这里需要 sleep 一下,等待数据同步
|
||||||
_update_risk.finish()
|
|
||||||
_create_risk.finish()
|
|
||||||
|
|
||||||
time.sleep(0.5)
|
time.sleep(0.5)
|
||||||
|
|
||||||
def get_report_template(self):
|
def get_report_template(self):
|
||||||
|
|||||||
@@ -20,11 +20,10 @@
|
|||||||
become_private_key_path: "{{ jms_custom_become_private_key_path | default(None) }}"
|
become_private_key_path: "{{ jms_custom_become_private_key_path | default(None) }}"
|
||||||
old_ssh_version: "{{ jms_asset.old_ssh_version | default(False) }}"
|
old_ssh_version: "{{ jms_asset.old_ssh_version | default(False) }}"
|
||||||
gateway_args: "{{ jms_asset.ansible_ssh_common_args | default(None) }}"
|
gateway_args: "{{ jms_asset.ansible_ssh_common_args | default(None) }}"
|
||||||
recv_timeout: "{{ params.recv_timeout | default(30) }}"
|
|
||||||
register: ping_info
|
register: ping_info
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
|
|
||||||
- name: Push asset password (paramiko)
|
- name: Change asset password (paramiko)
|
||||||
custom_command:
|
custom_command:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
@@ -40,10 +39,7 @@
|
|||||||
name: "{{ account.username }}"
|
name: "{{ account.username }}"
|
||||||
password: "{{ account.secret }}"
|
password: "{{ account.secret }}"
|
||||||
commands: "{{ params.commands }}"
|
commands: "{{ params.commands }}"
|
||||||
answers: "{{ params.answers }}"
|
first_conn_delay_time: "{{ first_conn_delay_time | default(0.5) }}"
|
||||||
recv_timeout: "{{ params.recv_timeout | default(30) }}"
|
|
||||||
delay_time: "{{ params.delay_time | default(2) }}"
|
|
||||||
prompt: "{{ params.prompt | default('.*') }}"
|
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
when: ping_info is succeeded and check_conn_after_change
|
when: ping_info is succeeded and check_conn_after_change
|
||||||
register: change_info
|
register: change_info
|
||||||
@@ -62,6 +58,5 @@
|
|||||||
become_private_key_path: "{{ account.become.ansible_ssh_private_key_file | default(None) }}"
|
become_private_key_path: "{{ account.become.ansible_ssh_private_key_file | default(None) }}"
|
||||||
old_ssh_version: "{{ jms_asset.old_ssh_version | default(False) }}"
|
old_ssh_version: "{{ jms_asset.old_ssh_version | default(False) }}"
|
||||||
gateway_args: "{{ jms_asset.ansible_ssh_common_args | default(None) }}"
|
gateway_args: "{{ jms_asset.ansible_ssh_common_args | default(None) }}"
|
||||||
recv_timeout: "{{ params.recv_timeout | default(30) }}"
|
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
when: check_conn_after_change
|
when: check_conn_after_change
|
||||||
@@ -10,30 +10,10 @@ protocol: ssh
|
|||||||
priority: 50
|
priority: 50
|
||||||
params:
|
params:
|
||||||
- name: commands
|
- name: commands
|
||||||
type: text
|
type: list
|
||||||
label: "{{ 'Params commands label' | trans }}"
|
label: "{{ 'Params commands label' | trans }}"
|
||||||
default: ''
|
default: [ '' ]
|
||||||
help_text: "{{ 'Params commands help text' | trans }}"
|
help_text: "{{ 'Params commands help text' | trans }}"
|
||||||
- name: recv_timeout
|
|
||||||
type: int
|
|
||||||
label: "{{ 'Params recv_timeout label' | trans }}"
|
|
||||||
default: 30
|
|
||||||
help_text: "{{ 'Params recv_timeout help text' | trans }}"
|
|
||||||
- name: delay_time
|
|
||||||
type: int
|
|
||||||
label: "{{ 'Params delay_time label' | trans }}"
|
|
||||||
default: 2
|
|
||||||
help_text: "{{ 'Params delay_time help text' | trans }}"
|
|
||||||
- name: prompt
|
|
||||||
type: str
|
|
||||||
label: "{{ 'Params prompt label' | trans }}"
|
|
||||||
default: '.*'
|
|
||||||
help_text: "{{ 'Params prompt help text' | trans }}"
|
|
||||||
- name: answers
|
|
||||||
type: text
|
|
||||||
label: "{{ 'Params answer label' | trans }}"
|
|
||||||
default: '.*'
|
|
||||||
help_text: "{{ 'Params answer help text' | trans }}"
|
|
||||||
|
|
||||||
i18n:
|
i18n:
|
||||||
SSH account push:
|
SSH account push:
|
||||||
@@ -42,91 +22,11 @@ i18n:
|
|||||||
en: 'Custom push using SSH command line'
|
en: 'Custom push using SSH command line'
|
||||||
|
|
||||||
Params commands help text:
|
Params commands help text:
|
||||||
zh: |
|
zh: '自定义命令中如需包含账号的 账号、密码、SSH 连接的用户密码 字段,<br />请使用 {username}、{password}、{login_password}格式,执行任务时会进行替换 。<br />比如针对 Cisco 主机进行改密,一般需要配置五条命令:<br />1. enable<br />2. {login_password}<br />3. configure terminal<br />4. username {username} privilege 0 password {password} <br />5. end'
|
||||||
请将命令中的指定位置改成特殊符号 <br />
|
ja: 'カスタム コマンドに SSH 接続用のアカウント番号、パスワード、ユーザー パスワード フィールドを含める必要がある場合は、<br />{ユーザー名}、{パスワード}、{login_password& を使用してください。 # 125; 形式。タスクの実行時に置き換えられます。 <br />たとえば、Cisco ホストのパスワードを変更するには、通常、次の 5 つのコマンドを設定する必要があります:<br />1.enable<br />2.{login_password}<br />3 .ターミナルの設定<br / >4. ユーザー名 {ユーザー名} 権限 0 パスワード {パスワード} <br />5. 終了'
|
||||||
1. 推送账号 -> {username} <br />
|
en: 'If the custom command needs to include the account number, password, and user password field for SSH connection,<br />Please use {username}, {password}, {login_password&# 125; format, which will be replaced when executing the task. <br />For example, to change the password of a Cisco host, you generally need to configure five commands:<br />1. enable<br />2. {login_password}<br />3. configure terminal<br / >4. username {username} privilege 0 password {password} <br />5. end'
|
||||||
2. 推送密码 -> {password} <br />
|
|
||||||
3. 登录用户密码 -> {login_password} <br />
|
|
||||||
<strong>多条命令使用换行分割,</strong>执行任务时系统会根据特殊符号替换真实数据。<br />
|
|
||||||
比如针对 Cisco 主机进行推送,一般需要配置五条命令:<br />
|
|
||||||
enable <br />
|
|
||||||
{login_password} <br />
|
|
||||||
configure terminal <br />
|
|
||||||
username {username} privilege 0 password {password} <br />
|
|
||||||
end <br />
|
|
||||||
ja: |
|
|
||||||
コマンド内の指定された位置を特殊記号に変更してください。<br />
|
|
||||||
新しいパスワード(アカウント押す) -> {username} <br />
|
|
||||||
新しいパスワード(パスワード押す) -> {password} <br />
|
|
||||||
ログインユーザーパスワード -> {login_password} <br />
|
|
||||||
<strong>複数のコマンドは改行で区切り、</strong>タスクを実行するときにシステムは特殊記号を使用して実際のデータを置き換えます。<br />
|
|
||||||
例えば、Cisco機器のパスワードを変更する場合、一般的には5つのコマンドを設定する必要があります:<br />
|
|
||||||
enable <br />
|
|
||||||
{login_password} <br />
|
|
||||||
configure terminal <br />
|
|
||||||
username {username} privilege 0 password {password} <br />
|
|
||||||
end <br />
|
|
||||||
en: |
|
|
||||||
Please change the specified positions in the command to special symbols. <br />
|
|
||||||
Change password account -> {username} <br />
|
|
||||||
Change password -> {password} <br />
|
|
||||||
Login user password -> {login_password} <br />
|
|
||||||
<strong>Multiple commands are separated by new lines,</strong> and when executing tasks, <br />
|
|
||||||
the system will replace the special symbols with real data. <br />
|
|
||||||
For example, to push the password for a Cisco device, you generally need to configure five commands: <br />
|
|
||||||
enable <br />
|
|
||||||
{login_password} <br />
|
|
||||||
configure terminal <br />
|
|
||||||
username {username} privilege 0 password {password} <br />
|
|
||||||
end <br />
|
|
||||||
|
|
||||||
Params commands label:
|
Params commands label:
|
||||||
zh: '自定义命令'
|
zh: '自定义命令'
|
||||||
ja: 'カスタムコマンド'
|
ja: 'カスタムコマンド'
|
||||||
en: 'Custom command'
|
en: 'Custom command'
|
||||||
|
|
||||||
Params recv_timeout label:
|
|
||||||
zh: '超时时间'
|
|
||||||
ja: 'タイムアウト'
|
|
||||||
en: 'Timeout'
|
|
||||||
|
|
||||||
Params recv_timeout help text:
|
|
||||||
zh: '等待命令结果返回的超时时间(秒)'
|
|
||||||
ja: 'コマンドの結果を待つタイムアウト時間(秒)'
|
|
||||||
en: 'The timeout for waiting for the command result to return (Seconds)'
|
|
||||||
|
|
||||||
Params delay_time label:
|
|
||||||
zh: '延迟发送时间'
|
|
||||||
ja: '遅延送信時間'
|
|
||||||
en: 'Delayed send time'
|
|
||||||
|
|
||||||
Params delay_time help text:
|
|
||||||
zh: '每条命令延迟发送的时间间隔(秒)'
|
|
||||||
ja: '各コマンド送信の遅延間隔(秒)'
|
|
||||||
en: 'Time interval for each command delay in sending (Seconds)'
|
|
||||||
|
|
||||||
Params prompt label:
|
|
||||||
zh: '提示符'
|
|
||||||
ja: 'ヒント'
|
|
||||||
en: 'Prompt'
|
|
||||||
|
|
||||||
Params prompt help text:
|
|
||||||
zh: '终端连接后显示的提示符信息(正则表达式)'
|
|
||||||
ja: 'ターミナル接続後に表示されるプロンプト情報(正規表現)'
|
|
||||||
en: 'Prompt information displayed after terminal connection (Regular expression)'
|
|
||||||
|
|
||||||
Params answer label:
|
|
||||||
zh: '命令结果'
|
|
||||||
ja: 'コマンド結果'
|
|
||||||
en: 'Command result'
|
|
||||||
|
|
||||||
Params answer help text:
|
|
||||||
zh: |
|
|
||||||
根据结果匹配度决定是否执行下一条命令,输入框的内容和上方 “自定义命令” 内容按行一一对应(正则表达式)
|
|
||||||
ja: |
|
|
||||||
結果の一致度に基づいて次のコマンドを実行するかどうかを決定します。
|
|
||||||
入力欄の内容は、上の「カスタムコマンド」の内容と行ごとに対応しています(せいきひょうげん)
|
|
||||||
en: |
|
|
||||||
Decide whether to execute the next command based on the result match.
|
|
||||||
The input content corresponds line by line with the content
|
|
||||||
of the `Custom command` above. (Regular expression)
|
|
||||||
|
|||||||
@@ -54,5 +54,3 @@
|
|||||||
connection_options:
|
connection_options:
|
||||||
- tlsAllowInvalidHostnames: "{{ jms_asset.spec_info.allow_invalid_cert}}"
|
- tlsAllowInvalidHostnames: "{{ jms_asset.spec_info.allow_invalid_cert}}"
|
||||||
when: check_conn_after_change
|
when: check_conn_after_change
|
||||||
register: result
|
|
||||||
failed_when: not result.is_available
|
|
||||||
|
|||||||
@@ -39,8 +39,7 @@
|
|||||||
name: "{{ account.username }}"
|
name: "{{ account.username }}"
|
||||||
password: "{{ account.secret }}"
|
password: "{{ account.secret }}"
|
||||||
host: "%"
|
host: "%"
|
||||||
priv: "{{ omit if db_name == '' else db_name + '.*:ALL' }}"
|
priv: "{{ account.username + '.*:USAGE' if db_name == '' else db_name + '.*:ALL' }}"
|
||||||
append_privs: "{{ db_name != '' | bool }}"
|
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
when: db_info is succeeded
|
when: db_info is succeeded
|
||||||
|
|
||||||
|
|||||||
@@ -5,14 +5,12 @@
|
|||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Test SQLServer connection
|
- name: Test SQLServer connection
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: |
|
script: |
|
||||||
SELECT @@version
|
SELECT @@version
|
||||||
register: db_info
|
register: db_info
|
||||||
@@ -25,55 +23,47 @@
|
|||||||
var: info
|
var: info
|
||||||
|
|
||||||
- name: Check whether SQLServer User exist
|
- name: Check whether SQLServer User exist
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: "SELECT 1 from sys.sql_logins WHERE name='{{ account.username }}';"
|
script: "SELECT 1 from sys.sql_logins WHERE name='{{ account.username }}';"
|
||||||
when: db_info is succeeded
|
when: db_info is succeeded
|
||||||
register: user_exist
|
register: user_exist
|
||||||
|
|
||||||
- name: Change SQLServer password
|
- name: Change SQLServer password
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: "ALTER LOGIN {{ account.username }} WITH PASSWORD = '{{ account.secret }}', DEFAULT_DATABASE = {{ jms_asset.spec_info.db_name }}; select @@version"
|
script: "ALTER LOGIN {{ account.username }} WITH PASSWORD = '{{ account.secret }}', DEFAULT_DATABASE = {{ jms_asset.spec_info.db_name }}; select @@version"
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
when: user_exist.query_results[0] | length != 0
|
when: user_exist.query_results[0] | length != 0
|
||||||
register: change_info
|
register: change_info
|
||||||
|
|
||||||
- name: Add SQLServer user
|
- name: Add SQLServer user
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: "CREATE LOGIN [{{ account.username }}] WITH PASSWORD = '{{ account.secret }}'; CREATE USER [{{ account.username }}] FOR LOGIN [{{ account.username }}]; select @@version"
|
script: "CREATE LOGIN [{{ account.username }}] WITH PASSWORD = '{{ account.secret }}'; CREATE USER [{{ account.username }}] FOR LOGIN [{{ account.username }}]; select @@version"
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
when: user_exist.query_results[0] | length == 0
|
when: user_exist.query_results[0] | length == 0
|
||||||
register: change_info
|
register: change_info
|
||||||
|
|
||||||
- name: Verify password
|
- name: Verify password
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ account.username }}"
|
login_user: "{{ account.username }}"
|
||||||
login_password: "{{ account.secret }}"
|
login_password: "{{ account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: |
|
script: |
|
||||||
SELECT @@version
|
SELECT @@version
|
||||||
when: check_conn_after_change
|
when: check_conn_after_change
|
||||||
|
|||||||
@@ -18,7 +18,6 @@
|
|||||||
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
||||||
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
||||||
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
||||||
group: "{{ params.group if params.group | length > 0 else omit }}"
|
|
||||||
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
||||||
append: "{{ true if params.groups | length > 0 else false }}"
|
append: "{{ true if params.groups | length > 0 else false }}"
|
||||||
expires: -1
|
expires: -1
|
||||||
|
|||||||
@@ -28,12 +28,6 @@ params:
|
|||||||
default: ''
|
default: ''
|
||||||
help_text: "{{ 'Params home help text' | trans }}"
|
help_text: "{{ 'Params home help text' | trans }}"
|
||||||
|
|
||||||
- name: group
|
|
||||||
type: str
|
|
||||||
label: "{{ 'Params group label' | trans }}"
|
|
||||||
default: ''
|
|
||||||
help_text: "{{ 'Params group help text' | trans }}"
|
|
||||||
|
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: "{{ 'Params groups label' | trans }}"
|
||||||
@@ -67,11 +61,6 @@ i18n:
|
|||||||
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
||||||
en: 'Default home directory /home/{account username}'
|
en: 'Default home directory /home/{account username}'
|
||||||
|
|
||||||
Params group help text:
|
|
||||||
zh: '请输入用户组(名字或数字),只能输入一个(需填写已存在的用户组)'
|
|
||||||
ja: 'ユーザー グループ (名前または番号) を入力してください。入力できるのは 1 つだけです (既存のユーザー グループを入力する必要があります)'
|
|
||||||
en: 'Please enter a user group (name or number), only one can be entered (must fill in an existing user group)'
|
|
||||||
|
|
||||||
Params groups help text:
|
Params groups help text:
|
||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
@@ -97,11 +86,6 @@ i18n:
|
|||||||
ja: 'グループ'
|
ja: 'グループ'
|
||||||
en: 'Groups'
|
en: 'Groups'
|
||||||
|
|
||||||
Params group label:
|
|
||||||
zh: '主组'
|
|
||||||
ja: '主组'
|
|
||||||
en: 'Main group'
|
|
||||||
|
|
||||||
Params uid label:
|
Params uid label:
|
||||||
zh: '用户ID'
|
zh: '用户ID'
|
||||||
ja: 'ユーザーID'
|
ja: 'ユーザーID'
|
||||||
|
|||||||
@@ -18,7 +18,6 @@
|
|||||||
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
uid: "{{ params.uid | int if params.uid | length > 0 else omit }}"
|
||||||
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
shell: "{{ params.shell if params.shell | length > 0 else omit }}"
|
||||||
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
home: "{{ params.home if params.home | length > 0 else '/home/' + account.username }}"
|
||||||
group: "{{ params.group if params.group | length > 0 else omit }}"
|
|
||||||
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
groups: "{{ params.groups if params.groups | length > 0 else omit }}"
|
||||||
append: "{{ true if params.groups | length > 0 else false }}"
|
append: "{{ true if params.groups | length > 0 else false }}"
|
||||||
expires: -1
|
expires: -1
|
||||||
|
|||||||
@@ -30,12 +30,6 @@ params:
|
|||||||
default: ''
|
default: ''
|
||||||
help_text: "{{ 'Params home help text' | trans }}"
|
help_text: "{{ 'Params home help text' | trans }}"
|
||||||
|
|
||||||
- name: group
|
|
||||||
type: str
|
|
||||||
label: "{{ 'Params group label' | trans }}"
|
|
||||||
default: ''
|
|
||||||
help_text: "{{ 'Params group help text' | trans }}"
|
|
||||||
|
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: "{{ 'Params groups label' | trans }}"
|
||||||
@@ -69,11 +63,6 @@ i18n:
|
|||||||
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
ja: 'デフォルトのホームディレクトリ /home/{アカウントユーザ名}'
|
||||||
en: 'Default home directory /home/{account username}'
|
en: 'Default home directory /home/{account username}'
|
||||||
|
|
||||||
Params group help text:
|
|
||||||
zh: '请输入用户组(名字或数字),只能输入一个(需填写已存在的用户组)'
|
|
||||||
ja: 'ユーザー グループ (名前または番号) を入力してください。入力できるのは 1 つだけです (既存のユーザー グループを入力する必要があります)'
|
|
||||||
en: 'Please enter a user group (name or number), only one can be entered (must fill in an existing user group)'
|
|
||||||
|
|
||||||
Params groups help text:
|
Params groups help text:
|
||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
@@ -95,14 +84,9 @@ i18n:
|
|||||||
en: 'Home'
|
en: 'Home'
|
||||||
|
|
||||||
Params groups label:
|
Params groups label:
|
||||||
zh: '附加组'
|
zh: '用户组'
|
||||||
ja: '追加グループ'
|
ja: 'グループ'
|
||||||
en: 'Additional Group'
|
en: 'Groups'
|
||||||
|
|
||||||
Params group label:
|
|
||||||
zh: '主组'
|
|
||||||
ja: '主组'
|
|
||||||
en: 'Main group'
|
|
||||||
|
|
||||||
Params uid label:
|
Params uid label:
|
||||||
zh: '用户ID'
|
zh: '用户ID'
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ type:
|
|||||||
params:
|
params:
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: '用户组'
|
||||||
default: 'Users,Remote Desktop Users'
|
default: 'Users,Remote Desktop Users'
|
||||||
help_text: "{{ 'Params groups help text' | trans }}"
|
help_text: "{{ 'Params groups help text' | trans }}"
|
||||||
|
|
||||||
@@ -22,8 +22,3 @@ i18n:
|
|||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
||||||
|
|
||||||
Params groups label:
|
|
||||||
zh: '用户组'
|
|
||||||
ja: 'グループ'
|
|
||||||
en: 'Groups'
|
|
||||||
@@ -9,7 +9,7 @@ type:
|
|||||||
params:
|
params:
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: '用户组'
|
||||||
default: 'Users,Remote Desktop Users'
|
default: 'Users,Remote Desktop Users'
|
||||||
help_text: "{{ 'Params groups help text' | trans }}"
|
help_text: "{{ 'Params groups help text' | trans }}"
|
||||||
|
|
||||||
@@ -23,8 +23,3 @@ i18n:
|
|||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
||||||
|
|
||||||
Params groups label:
|
|
||||||
zh: '用户组'
|
|
||||||
ja: 'グループ'
|
|
||||||
en: 'Groups'
|
|
||||||
|
|||||||
@@ -9,7 +9,7 @@ priority: 49
|
|||||||
params:
|
params:
|
||||||
- name: groups
|
- name: groups
|
||||||
type: str
|
type: str
|
||||||
label: "{{ 'Params groups label' | trans }}"
|
label: '用户组'
|
||||||
default: 'Users,Remote Desktop Users'
|
default: 'Users,Remote Desktop Users'
|
||||||
help_text: "{{ 'Params groups help text' | trans }}"
|
help_text: "{{ 'Params groups help text' | trans }}"
|
||||||
|
|
||||||
@@ -23,8 +23,3 @@ i18n:
|
|||||||
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
zh: '请输入用户组,多个用户组使用逗号分隔(需填写已存在的用户组)'
|
||||||
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
ja: 'グループを入力してください。複数のグループはコンマで区切ってください(既存のグループを入力してください)'
|
||||||
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
en: 'Please enter the group. Multiple groups are separated by commas (please enter the existing group)'
|
||||||
|
|
||||||
Params groups label:
|
|
||||||
zh: '用户组'
|
|
||||||
ja: 'グループ'
|
|
||||||
en: 'Groups'
|
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ logger = get_logger(__name__)
|
|||||||
class PushAccountManager(BaseChangeSecretPushManager):
|
class PushAccountManager(BaseChangeSecretPushManager):
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def require_update_version(account, record):
|
def require_update_version(account, recorder):
|
||||||
account.skip_history_when_saving = True
|
account.skip_history_when_saving = True
|
||||||
return False
|
return False
|
||||||
|
|
||||||
@@ -31,29 +31,29 @@ class PushAccountManager(BaseChangeSecretPushManager):
|
|||||||
secret_type = account.secret_type
|
secret_type = account.secret_type
|
||||||
if not secret:
|
if not secret:
|
||||||
raise ValueError(_('Secret cannot be empty'))
|
raise ValueError(_('Secret cannot be empty'))
|
||||||
record = self.get_or_create_record(asset, account, h['name'])
|
self.get_or_create_record(asset, account, h['name'])
|
||||||
new_secret, private_key_path = self.handle_ssh_secret(secret_type, secret, path_dir)
|
new_secret, private_key_path = self.handle_ssh_secret(secret_type, secret, path_dir)
|
||||||
h = self.gen_inventory(h, account, new_secret, private_key_path, asset)
|
h = self.gen_inventory(h, account, new_secret, private_key_path, asset)
|
||||||
return h, record
|
return h
|
||||||
|
|
||||||
def get_or_create_record(self, asset, account, name):
|
def get_or_create_record(self, asset, account, name):
|
||||||
asset_account_id = f'{asset.id}-{account.id}'
|
asset_account_id = f'{asset.id}-{account.id}'
|
||||||
|
|
||||||
if asset_account_id in self.record_map:
|
if asset_account_id in self.record_map:
|
||||||
record_id = self.record_map[asset_account_id]
|
record_id = self.record_map[asset_account_id]
|
||||||
record = PushSecretRecord.objects.filter(id=record_id).first()
|
recorder = PushSecretRecord.objects.filter(id=record_id).first()
|
||||||
else:
|
else:
|
||||||
record = self.create_record(asset, account)
|
recorder = self.create_record(asset, account)
|
||||||
|
|
||||||
self.name_record_mapper[name] = record
|
self.name_recorder_mapper[name] = recorder
|
||||||
return record
|
return recorder
|
||||||
|
|
||||||
def create_record(self, asset, account):
|
def create_record(self, asset, account):
|
||||||
record = PushSecretRecord(
|
recorder = PushSecretRecord(
|
||||||
asset=asset, account=account, execution=self.execution,
|
asset=asset, account=account, execution=self.execution,
|
||||||
comment=f'{account.username}@{asset.address}'
|
comment=f'{account.username}@{asset.address}'
|
||||||
)
|
)
|
||||||
return record
|
return recorder
|
||||||
|
|
||||||
def print_summary(self):
|
def print_summary(self):
|
||||||
print('\n\n' + '-' * 80)
|
print('\n\n' + '-' * 80)
|
||||||
|
|||||||
@@ -5,13 +5,11 @@
|
|||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: "Remove account"
|
- name: "Remove account"
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ jms_account.username }}"
|
login_user: "{{ jms_account.username }}"
|
||||||
login_password: "{{ jms_account.secret }}"
|
login_password: "{{ jms_account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: "{{ jms_asset.spec_info.db_name }}"
|
name: "{{ jms_asset.spec_info.db_name }}"
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: "DROP LOGIN {{ account.username }}; select @@version"
|
script: "DROP LOGIN {{ account.username }}; select @@version"
|
||||||
|
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
vars:
|
vars:
|
||||||
ansible_shell_type: sh
|
ansible_shell_type: sh
|
||||||
ansible_connection: local
|
ansible_connection: local
|
||||||
ansible_python_interpreter: "{{ local_python_interpreter }}"
|
ansible_python_interpreter: /opt/py3/bin/python
|
||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Verify account (pyfreerdp)
|
- name: Verify account (pyfreerdp)
|
||||||
|
|||||||
@@ -16,5 +16,3 @@
|
|||||||
ssl_certfile: "{{ jms_asset.secret_info.client_key | default('') }}"
|
ssl_certfile: "{{ jms_asset.secret_info.client_key | default('') }}"
|
||||||
connection_options:
|
connection_options:
|
||||||
- tlsAllowInvalidHostnames: "{{ jms_asset.spec_info.allow_invalid_cert }}"
|
- tlsAllowInvalidHostnames: "{{ jms_asset.spec_info.allow_invalid_cert }}"
|
||||||
register: result
|
|
||||||
failed_when: not result.is_available
|
|
||||||
|
|||||||
@@ -5,13 +5,11 @@
|
|||||||
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Verify account
|
- name: Verify account
|
||||||
mssql_script:
|
community.general.mssql_script:
|
||||||
login_user: "{{ account.username }}"
|
login_user: "{{ account.username }}"
|
||||||
login_password: "{{ account.secret }}"
|
login_password: "{{ account.secret }}"
|
||||||
login_host: "{{ jms_asset.address }}"
|
login_host: "{{ jms_asset.address }}"
|
||||||
login_port: "{{ jms_asset.port }}"
|
login_port: "{{ jms_asset.port }}"
|
||||||
name: '{{ jms_asset.spec_info.db_name }}'
|
name: '{{ jms_asset.spec_info.db_name }}'
|
||||||
encryption: "{{ jms_asset.encryption | default(None) }}"
|
|
||||||
tds_version: "{{ jms_asset.tds_version | default(None) }}"
|
|
||||||
script: |
|
script: |
|
||||||
SELECT @@version
|
SELECT @@version
|
||||||
|
|||||||
@@ -8,7 +8,6 @@
|
|||||||
ansible_user: "{{ account.username }}"
|
ansible_user: "{{ account.username }}"
|
||||||
ansible_password: "{{ account.secret }}"
|
ansible_password: "{{ account.secret }}"
|
||||||
ansible_ssh_private_key_file: "{{ account.private_key_path }}"
|
ansible_ssh_private_key_file: "{{ account.private_key_path }}"
|
||||||
ansible_timeout: 30
|
|
||||||
when: not account.become.ansible_become
|
when: not account.become.ansible_become
|
||||||
|
|
||||||
- name: Verify account connectivity(Switch)
|
- name: Verify account connectivity(Switch)
|
||||||
@@ -21,5 +20,4 @@
|
|||||||
ansible_become_method: "{{ account.become.ansible_become_method }}"
|
ansible_become_method: "{{ account.become.ansible_become_method }}"
|
||||||
ansible_become_user: "{{ account.become.ansible_become_user }}"
|
ansible_become_user: "{{ account.become.ansible_become_user }}"
|
||||||
ansible_become_password: "{{ account.become.ansible_become_password }}"
|
ansible_become_password: "{{ account.become.ansible_become_password }}"
|
||||||
ansible_timeout: 30
|
|
||||||
when: account.become.ansible_become
|
when: account.become.ansible_become
|
||||||
|
|||||||
@@ -9,4 +9,3 @@
|
|||||||
vars:
|
vars:
|
||||||
ansible_user: "{{ account.full_username }}"
|
ansible_user: "{{ account.full_username }}"
|
||||||
ansible_password: "{{ account.secret }}"
|
ansible_password: "{{ account.secret }}"
|
||||||
ansible_timeout: 30
|
|
||||||
|
|||||||
@@ -1,5 +1,8 @@
|
|||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
#
|
#
|
||||||
|
from azure.core.exceptions import ResourceNotFoundError, ClientAuthenticationError
|
||||||
|
from azure.identity import ClientSecretCredential
|
||||||
|
from azure.keyvault.secrets import SecretClient
|
||||||
|
|
||||||
from common.utils import get_logger
|
from common.utils import get_logger
|
||||||
|
|
||||||
@@ -11,9 +14,6 @@ __all__ = ['AZUREVaultClient']
|
|||||||
class AZUREVaultClient(object):
|
class AZUREVaultClient(object):
|
||||||
|
|
||||||
def __init__(self, vault_url, tenant_id, client_id, client_secret):
|
def __init__(self, vault_url, tenant_id, client_id, client_secret):
|
||||||
from azure.identity import ClientSecretCredential
|
|
||||||
from azure.keyvault.secrets import SecretClient
|
|
||||||
|
|
||||||
authentication_endpoint = 'https://login.microsoftonline.com/' \
|
authentication_endpoint = 'https://login.microsoftonline.com/' \
|
||||||
if ('azure.net' in vault_url) else 'https://login.chinacloudapi.cn/'
|
if ('azure.net' in vault_url) else 'https://login.chinacloudapi.cn/'
|
||||||
|
|
||||||
@@ -23,8 +23,6 @@ class AZUREVaultClient(object):
|
|||||||
self.client = SecretClient(vault_url=vault_url, credential=credentials)
|
self.client = SecretClient(vault_url=vault_url, credential=credentials)
|
||||||
|
|
||||||
def is_active(self):
|
def is_active(self):
|
||||||
from azure.core.exceptions import ResourceNotFoundError, ClientAuthenticationError
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
self.client.set_secret('jumpserver', '666')
|
self.client.set_secret('jumpserver', '666')
|
||||||
except (ResourceNotFoundError, ClientAuthenticationError) as e:
|
except (ResourceNotFoundError, ClientAuthenticationError) as e:
|
||||||
@@ -34,8 +32,6 @@ class AZUREVaultClient(object):
|
|||||||
return True, ''
|
return True, ''
|
||||||
|
|
||||||
def get(self, name, version=None):
|
def get(self, name, version=None):
|
||||||
from azure.core.exceptions import ResourceNotFoundError, ClientAuthenticationError
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
secret = self.client.get_secret(name, version)
|
secret = self.client.get_secret(name, version)
|
||||||
return secret.value
|
return secret.value
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ __all__ = [
|
|||||||
'AutomationTypes', 'SecretStrategy', 'SSHKeyStrategy', 'Connectivity',
|
'AutomationTypes', 'SecretStrategy', 'SSHKeyStrategy', 'Connectivity',
|
||||||
'DEFAULT_PASSWORD_LENGTH', 'DEFAULT_PASSWORD_RULES', 'TriggerChoice',
|
'DEFAULT_PASSWORD_LENGTH', 'DEFAULT_PASSWORD_RULES', 'TriggerChoice',
|
||||||
'PushAccountActionChoice', 'AccountBackupType', 'ChangeSecretRecordStatusChoice',
|
'PushAccountActionChoice', 'AccountBackupType', 'ChangeSecretRecordStatusChoice',
|
||||||
'GatherAccountDetailField', 'ChangeSecretAccountStatus'
|
'GatherAccountDetailField'
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
@@ -117,12 +117,6 @@ class ChangeSecretRecordStatusChoice(models.TextChoices):
|
|||||||
pending = 'pending', _('Pending')
|
pending = 'pending', _('Pending')
|
||||||
|
|
||||||
|
|
||||||
class ChangeSecretAccountStatus(models.TextChoices):
|
|
||||||
QUEUED = 'queued', _('Queued')
|
|
||||||
READY = 'ready', _('Ready')
|
|
||||||
PROCESSING = 'processing', _('Processing')
|
|
||||||
|
|
||||||
|
|
||||||
class GatherAccountDetailField(models.TextChoices):
|
class GatherAccountDetailField(models.TextChoices):
|
||||||
can_login = 'can_login', _('Can login')
|
can_login = 'can_login', _('Can login')
|
||||||
superuser = 'superuser', _('Superuser')
|
superuser = 'superuser', _('Superuser')
|
||||||
|
|||||||
@@ -17,7 +17,6 @@ from common.utils.timezone import local_zero_hour, local_now
|
|||||||
from .const.automation import ChangeSecretRecordStatusChoice
|
from .const.automation import ChangeSecretRecordStatusChoice
|
||||||
from .models import Account, GatheredAccount, ChangeSecretRecord, PushSecretRecord, IntegrationApplication, \
|
from .models import Account, GatheredAccount, ChangeSecretRecord, PushSecretRecord, IntegrationApplication, \
|
||||||
AutomationExecution
|
AutomationExecution
|
||||||
from .utils import account_secret_task_status
|
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
logger = get_logger(__file__)
|
||||||
|
|
||||||
@@ -234,7 +233,7 @@ class AutomationExecutionFilterSet(DaysExecutionFilterMixin, BaseFilterSet):
|
|||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
model = AutomationExecution
|
model = AutomationExecution
|
||||||
fields = ["days", 'trigger', 'automation__name']
|
fields = ["days", 'trigger', 'automation_id', 'automation__name']
|
||||||
|
|
||||||
|
|
||||||
class PushAccountRecordFilterSet(SecretRecordMixin, UUIDFilterMixin, BaseFilterSet):
|
class PushAccountRecordFilterSet(SecretRecordMixin, UUIDFilterMixin, BaseFilterSet):
|
||||||
@@ -243,25 +242,3 @@ class PushAccountRecordFilterSet(SecretRecordMixin, UUIDFilterMixin, BaseFilterS
|
|||||||
class Meta:
|
class Meta:
|
||||||
model = PushSecretRecord
|
model = PushSecretRecord
|
||||||
fields = ["id", "status", "asset_id", "execution_id"]
|
fields = ["id", "status", "asset_id", "execution_id"]
|
||||||
|
|
||||||
|
|
||||||
class ChangeSecretStatusFilterSet(BaseFilterSet):
|
|
||||||
asset_name = drf_filters.CharFilter(
|
|
||||||
field_name="asset__name", lookup_expr="icontains"
|
|
||||||
)
|
|
||||||
status = drf_filters.CharFilter(method='filter_dynamic')
|
|
||||||
execution_id = drf_filters.CharFilter(method='filter_dynamic')
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
model = Account
|
|
||||||
fields = ["username"]
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def filter_dynamic(queryset, name, value):
|
|
||||||
_ids = list(queryset.values_list('id', flat=True))
|
|
||||||
data_map = {
|
|
||||||
_id: account_secret_task_status.get(str(_id)).get(name)
|
|
||||||
for _id in _ids
|
|
||||||
}
|
|
||||||
matched = [_id for _id, v in data_map.items() if v == value]
|
|
||||||
return queryset.filter(id__in=matched)
|
|
||||||
|
|||||||
@@ -46,16 +46,11 @@ class Migration(migrations.Migration):
|
|||||||
],
|
],
|
||||||
options={
|
options={
|
||||||
'verbose_name': 'Account',
|
'verbose_name': 'Account',
|
||||||
'permissions': [
|
'permissions': [('view_accountsecret', 'Can view asset account secret'),
|
||||||
('view_accountsecret', 'Can view asset account secret'),
|
|
||||||
('view_historyaccount', 'Can view asset history account'),
|
('view_historyaccount', 'Can view asset history account'),
|
||||||
('view_historyaccountsecret', 'Can view asset history account secret'),
|
('view_historyaccountsecret', 'Can view asset history account secret'),
|
||||||
('verify_account', 'Can verify account'),
|
('verify_account', 'Can verify account'), ('push_account', 'Can push account'),
|
||||||
('push_account', 'Can push account'),
|
('remove_account', 'Can remove account')],
|
||||||
('remove_account', 'Can remove account'),
|
|
||||||
('view_accountsession', 'Can view session'),
|
|
||||||
('view_accountactivity', 'Can view activity')
|
|
||||||
],
|
|
||||||
},
|
},
|
||||||
),
|
),
|
||||||
migrations.CreateModel(
|
migrations.CreateModel(
|
||||||
|
|||||||
@@ -335,7 +335,6 @@ class Migration(migrations.Migration):
|
|||||||
],
|
],
|
||||||
options={
|
options={
|
||||||
"abstract": False,
|
"abstract": False,
|
||||||
"verbose_name": "Check engine",
|
|
||||||
},
|
},
|
||||||
),
|
),
|
||||||
migrations.CreateModel(
|
migrations.CreateModel(
|
||||||
|
|||||||
@@ -116,8 +116,6 @@ class Account(AbsConnectivity, LabeledMixin, BaseAccount, JSONFilterMixin):
|
|||||||
('verify_account', _('Can verify account')),
|
('verify_account', _('Can verify account')),
|
||||||
('push_account', _('Can push account')),
|
('push_account', _('Can push account')),
|
||||||
('remove_account', _('Can remove account')),
|
('remove_account', _('Can remove account')),
|
||||||
('view_accountsession', _('Can view session')),
|
|
||||||
('view_accountactivity', _('Can view activity')),
|
|
||||||
]
|
]
|
||||||
|
|
||||||
def __str__(self):
|
def __str__(self):
|
||||||
@@ -132,7 +130,7 @@ class Account(AbsConnectivity, LabeledMixin, BaseAccount, JSONFilterMixin):
|
|||||||
return self.asset.platform
|
return self.asset.platform
|
||||||
|
|
||||||
@lazyproperty
|
@lazyproperty
|
||||||
def alias(self) -> str:
|
def alias(self):
|
||||||
"""
|
"""
|
||||||
别称,因为有虚拟账号,@INPUT @MANUAL @USER, 否则为 id
|
别称,因为有虚拟账号,@INPUT @MANUAL @USER, 否则为 id
|
||||||
"""
|
"""
|
||||||
@@ -140,13 +138,13 @@ class Account(AbsConnectivity, LabeledMixin, BaseAccount, JSONFilterMixin):
|
|||||||
return self.username
|
return self.username
|
||||||
return str(self.id)
|
return str(self.id)
|
||||||
|
|
||||||
def is_virtual(self) -> bool:
|
def is_virtual(self):
|
||||||
"""
|
"""
|
||||||
不要用 username 去判断,因为可能是构造的 account 对象,设置了同名账号的用户名,
|
不要用 username 去判断,因为可能是构造的 account 对象,设置了同名账号的用户名,
|
||||||
"""
|
"""
|
||||||
return self.alias.startswith('@')
|
return self.alias.startswith('@')
|
||||||
|
|
||||||
def is_ds_account(self) -> bool:
|
def is_ds_account(self):
|
||||||
if self.is_virtual():
|
if self.is_virtual():
|
||||||
return ''
|
return ''
|
||||||
if not self.asset.is_directory_service:
|
if not self.asset.is_directory_service:
|
||||||
@@ -160,7 +158,7 @@ class Account(AbsConnectivity, LabeledMixin, BaseAccount, JSONFilterMixin):
|
|||||||
return self.asset.ds
|
return self.asset.ds
|
||||||
|
|
||||||
@lazyproperty
|
@lazyproperty
|
||||||
def ds_domain(self) -> str:
|
def ds_domain(self):
|
||||||
"""这个不能去掉,perm_account 会动态设置这个值,以更改 full_username"""
|
"""这个不能去掉,perm_account 会动态设置这个值,以更改 full_username"""
|
||||||
if self.is_virtual():
|
if self.is_virtual():
|
||||||
return ''
|
return ''
|
||||||
@@ -172,17 +170,17 @@ class Account(AbsConnectivity, LabeledMixin, BaseAccount, JSONFilterMixin):
|
|||||||
return '@' in self.username or '\\' in self.username
|
return '@' in self.username or '\\' in self.username
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def full_username(self) -> str:
|
def full_username(self):
|
||||||
if not self.username_has_domain() and self.ds_domain:
|
if not self.username_has_domain() and self.ds_domain:
|
||||||
return '{}@{}'.format(self.username, self.ds_domain)
|
return '{}@{}'.format(self.username, self.ds_domain)
|
||||||
return self.username
|
return self.username
|
||||||
|
|
||||||
@lazyproperty
|
@lazyproperty
|
||||||
def has_secret(self) -> bool:
|
def has_secret(self):
|
||||||
return bool(self.secret)
|
return bool(self.secret)
|
||||||
|
|
||||||
@lazyproperty
|
@lazyproperty
|
||||||
def versions(self) -> int:
|
def versions(self):
|
||||||
return self.history.count()
|
return self.history.count()
|
||||||
|
|
||||||
def get_su_from_accounts(self):
|
def get_su_from_accounts(self):
|
||||||
|
|||||||
@@ -33,7 +33,7 @@ class IntegrationApplication(JMSOrgBaseModel):
|
|||||||
return qs.filter(*query)
|
return qs.filter(*query)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def accounts_amount(self) -> int:
|
def accounts_amount(self):
|
||||||
return self.get_accounts().count()
|
return self.get_accounts().count()
|
||||||
|
|
||||||
@property
|
@property
|
||||||
|
|||||||
@@ -68,10 +68,8 @@ class AccountRisk(JMSOrgBaseModel):
|
|||||||
related_name='risks', null=True
|
related_name='risks', null=True
|
||||||
)
|
)
|
||||||
risk = models.CharField(max_length=128, verbose_name=_('Risk'), choices=RiskChoice.choices)
|
risk = models.CharField(max_length=128, verbose_name=_('Risk'), choices=RiskChoice.choices)
|
||||||
status = models.CharField(
|
status = models.CharField(max_length=32, choices=ConfirmOrIgnore.choices, default=ConfirmOrIgnore.pending,
|
||||||
max_length=32, choices=ConfirmOrIgnore.choices, default=ConfirmOrIgnore.pending,
|
blank=True, verbose_name=_('Status'))
|
||||||
blank=True, verbose_name=_('Status')
|
|
||||||
)
|
|
||||||
details = models.JSONField(default=list, verbose_name=_('Detail'))
|
details = models.JSONField(default=list, verbose_name=_('Detail'))
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
@@ -121,9 +119,6 @@ class CheckAccountEngine(JMSBaseModel):
|
|||||||
def __str__(self):
|
def __str__(self):
|
||||||
return self.name
|
return self.name
|
||||||
|
|
||||||
class Meta:
|
|
||||||
verbose_name = _('Check engine')
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_default_engines():
|
def get_default_engines():
|
||||||
data = [
|
data = [
|
||||||
@@ -133,7 +128,7 @@ class CheckAccountEngine(JMSBaseModel):
|
|||||||
"name": _("Check the discovered accounts"),
|
"name": _("Check the discovered accounts"),
|
||||||
"comment": _(
|
"comment": _(
|
||||||
"Perform checks and analyses based on automatically discovered account results, "
|
"Perform checks and analyses based on automatically discovered account results, "
|
||||||
"including user groups, public keys, sudoers, and other information."
|
"including user groups, public keys, sudoers, and other information"
|
||||||
)
|
)
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@@ -149,13 +144,13 @@ class CheckAccountEngine(JMSBaseModel):
|
|||||||
"id": "00000000-0000-0000-0000-000000000003",
|
"id": "00000000-0000-0000-0000-000000000003",
|
||||||
"slug": "check_account_repeat",
|
"slug": "check_account_repeat",
|
||||||
"name": _("Check if the account and password are repeated"),
|
"name": _("Check if the account and password are repeated"),
|
||||||
"comment": _("Check if the account is the same as other accounts.")
|
"comment": _("Check if the account is the same as other accounts")
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": "00000000-0000-0000-0000-000000000004",
|
"id": "00000000-0000-0000-0000-000000000004",
|
||||||
"slug": "check_account_leak",
|
"slug": "check_account_leak",
|
||||||
"name": _("Check whether the account password is a common password"),
|
"name": _("Check whether the account password is a common password"),
|
||||||
"comment": _("Check whether the account password is a commonly leaked password.")
|
"comment": _("Check whether the account password is a commonly leaked password")
|
||||||
},
|
},
|
||||||
]
|
]
|
||||||
return data
|
return data
|
||||||
|
|||||||
@@ -75,11 +75,11 @@ class BaseAccount(VaultModelMixin, JMSOrgBaseModel):
|
|||||||
return bool(self.secret)
|
return bool(self.secret)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def has_username(self) -> bool:
|
def has_username(self):
|
||||||
return bool(self.username)
|
return bool(self.username)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def spec_info(self) -> dict:
|
def spec_info(self):
|
||||||
data = {}
|
data = {}
|
||||||
if self.secret_type != SecretType.SSH_KEY:
|
if self.secret_type != SecretType.SSH_KEY:
|
||||||
return data
|
return data
|
||||||
@@ -87,13 +87,13 @@ class BaseAccount(VaultModelMixin, JMSOrgBaseModel):
|
|||||||
return data
|
return data
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def password(self) -> str:
|
def password(self):
|
||||||
if self.secret_type == SecretType.PASSWORD:
|
if self.secret_type == SecretType.PASSWORD:
|
||||||
return self.secret
|
return self.secret
|
||||||
return None
|
return None
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def private_key(self) -> str:
|
def private_key(self):
|
||||||
if self.secret_type == SecretType.SSH_KEY:
|
if self.secret_type == SecretType.SSH_KEY:
|
||||||
return self.secret
|
return self.secret
|
||||||
return None
|
return None
|
||||||
@@ -110,7 +110,7 @@ class BaseAccount(VaultModelMixin, JMSOrgBaseModel):
|
|||||||
return None
|
return None
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def ssh_key_fingerprint(self) -> str:
|
def ssh_key_fingerprint(self):
|
||||||
if self.public_key:
|
if self.public_key:
|
||||||
public_key = self.public_key
|
public_key = self.public_key
|
||||||
elif self.private_key:
|
elif self.private_key:
|
||||||
|
|||||||
@@ -56,7 +56,7 @@ class VaultModelMixin(models.Model):
|
|||||||
__secret = None
|
__secret = None
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def secret(self) -> str:
|
def secret(self):
|
||||||
if self.__secret:
|
if self.__secret:
|
||||||
return self.__secret
|
return self.__secret
|
||||||
from accounts.backends import vault_client
|
from accounts.backends import vault_client
|
||||||
|
|||||||
@@ -18,11 +18,11 @@ class VirtualAccount(JMSOrgBaseModel):
|
|||||||
verbose_name = _('Virtual account')
|
verbose_name = _('Virtual account')
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def name(self) -> str:
|
def name(self):
|
||||||
return self.get_alias_display()
|
return self.get_alias_display()
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def username(self) -> str:
|
def username(self):
|
||||||
usernames_map = {
|
usernames_map = {
|
||||||
AliasAccount.INPUT: _("Manual input"),
|
AliasAccount.INPUT: _("Manual input"),
|
||||||
AliasAccount.USER: _("Same with user"),
|
AliasAccount.USER: _("Same with user"),
|
||||||
@@ -32,7 +32,7 @@ class VirtualAccount(JMSOrgBaseModel):
|
|||||||
return usernames_map.get(self.alias, '')
|
return usernames_map.get(self.alias, '')
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def comment(self) -> str:
|
def comment(self):
|
||||||
comments_map = {
|
comments_map = {
|
||||||
AliasAccount.INPUT: _('Non-asset account, Input username/password on connect'),
|
AliasAccount.INPUT: _('Non-asset account, Input username/password on connect'),
|
||||||
AliasAccount.USER: _('The account username name same with user on connect'),
|
AliasAccount.USER: _('The account username name same with user on connect'),
|
||||||
|
|||||||
@@ -6,7 +6,6 @@ from common.tasks import send_mail_attachment_async, upload_backup_to_obj_storag
|
|||||||
from notifications.notifications import UserMessage
|
from notifications.notifications import UserMessage
|
||||||
from terminal.models.component.storage import ReplayStorage
|
from terminal.models.component.storage import ReplayStorage
|
||||||
from users.models import User
|
from users.models import User
|
||||||
from users.utils import activate_user_language
|
|
||||||
|
|
||||||
|
|
||||||
class AccountBackupExecutionTaskMsg:
|
class AccountBackupExecutionTaskMsg:
|
||||||
@@ -29,7 +28,6 @@ class AccountBackupExecutionTaskMsg:
|
|||||||
).format(name)
|
).format(name)
|
||||||
|
|
||||||
def publish(self, attachment_list=None):
|
def publish(self, attachment_list=None):
|
||||||
with activate_user_language(self.user):
|
|
||||||
send_mail_attachment_async(
|
send_mail_attachment_async(
|
||||||
self.subject, self.message, [self.user.email], attachment_list
|
self.subject, self.message, [self.user.email], attachment_list
|
||||||
)
|
)
|
||||||
@@ -76,7 +74,6 @@ class ChangeSecretExecutionTaskMsg:
|
|||||||
return self.summary + '\n' + default_message
|
return self.summary + '\n' + default_message
|
||||||
|
|
||||||
def publish(self, attachments=None):
|
def publish(self, attachments=None):
|
||||||
with activate_user_language(self.user):
|
|
||||||
send_mail_attachment_async(
|
send_mail_attachment_async(
|
||||||
self.subject, self.message, [self.user.email], attachments
|
self.subject, self.message, [self.user.email], attachments
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -23,7 +23,7 @@ TYPE_CHOICES = [
|
|||||||
("delete_both", _("Delete remote")),
|
("delete_both", _("Delete remote")),
|
||||||
("add_account", _("Add account")),
|
("add_account", _("Add account")),
|
||||||
("change_password_add", _("Change password and Add")),
|
("change_password_add", _("Change password and Add")),
|
||||||
("change_password", _("Change secret")),
|
("change_password", _("Change password")),
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -246,15 +246,12 @@ class AccountSerializer(AccountCreateUpdateSerializerMixin, BaseAccountSerialize
|
|||||||
'source', 'source_id', 'secret_reset',
|
'source', 'source_id', 'secret_reset',
|
||||||
] + AccountCreateUpdateSerializerMixin.Meta.fields + automation_fields
|
] + AccountCreateUpdateSerializerMixin.Meta.fields + automation_fields
|
||||||
read_only_fields = BaseAccountSerializer.Meta.read_only_fields + automation_fields
|
read_only_fields = BaseAccountSerializer.Meta.read_only_fields + automation_fields
|
||||||
fields = [f for f in fields if f not in ['spec_info']]
|
|
||||||
extra_kwargs = {
|
extra_kwargs = {
|
||||||
**BaseAccountSerializer.Meta.extra_kwargs,
|
**BaseAccountSerializer.Meta.extra_kwargs,
|
||||||
'name': {'required': False},
|
'name': {'required': False},
|
||||||
'source_id': {'required': False, 'allow_null': True},
|
'source_id': {'required': False, 'allow_null': True},
|
||||||
}
|
}
|
||||||
fields_unimport_template = ['params']
|
fields_unimport_template = ['params']
|
||||||
# 手动判断唯一性校验
|
|
||||||
validators = []
|
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def setup_eager_loading(cls, queryset):
|
def setup_eager_loading(cls, queryset):
|
||||||
@@ -265,28 +262,13 @@ class AccountSerializer(AccountCreateUpdateSerializerMixin, BaseAccountSerialize
|
|||||||
)
|
)
|
||||||
return queryset
|
return queryset
|
||||||
|
|
||||||
def validate(self, attrs):
|
|
||||||
instance = getattr(self, "instance", None)
|
|
||||||
if instance:
|
|
||||||
return super().validate(attrs)
|
|
||||||
|
|
||||||
field_errors = {}
|
|
||||||
for _fields in Account._meta.unique_together:
|
|
||||||
lookup = {field: attrs.get(field) for field in _fields}
|
|
||||||
if Account.objects.filter(**lookup).exists():
|
|
||||||
verbose_names = ', '.join([str(Account._meta.get_field(f).verbose_name) for f in _fields])
|
|
||||||
msg_template = _('Account already exists. Field(s): {fields} must be unique.')
|
|
||||||
field_errors[_fields[0]] = msg_template.format(fields=verbose_names)
|
|
||||||
raise serializers.ValidationError(field_errors)
|
|
||||||
return attrs
|
|
||||||
|
|
||||||
|
|
||||||
class AccountDetailSerializer(AccountSerializer):
|
class AccountDetailSerializer(AccountSerializer):
|
||||||
has_secret = serializers.BooleanField(label=_("Has secret"), read_only=True)
|
has_secret = serializers.BooleanField(label=_("Has secret"), read_only=True)
|
||||||
|
|
||||||
class Meta(AccountSerializer.Meta):
|
class Meta(AccountSerializer.Meta):
|
||||||
model = Account
|
model = Account
|
||||||
fields = AccountSerializer.Meta.fields + ['has_secret', 'spec_info']
|
fields = AccountSerializer.Meta.fields + ['has_secret']
|
||||||
read_only_fields = AccountSerializer.Meta.read_only_fields + ['has_secret']
|
read_only_fields = AccountSerializer.Meta.read_only_fields + ['has_secret']
|
||||||
|
|
||||||
|
|
||||||
@@ -309,10 +291,10 @@ class AssetAccountBulkSerializer(
|
|||||||
class Meta:
|
class Meta:
|
||||||
model = Account
|
model = Account
|
||||||
fields = [
|
fields = [
|
||||||
'name', 'username', 'secret', 'secret_type', 'secret_reset',
|
'name', 'username', 'secret', 'secret_type', 'passphrase',
|
||||||
'passphrase', 'privileged', 'is_active', 'comment', 'template',
|
'privileged', 'is_active', 'comment', 'template',
|
||||||
'on_invalid', 'push_now', 'params', 'assets', 'su_from_username',
|
'on_invalid', 'push_now', 'params', 'assets',
|
||||||
'source', 'source_id',
|
'su_from_username', 'source', 'source_id',
|
||||||
]
|
]
|
||||||
extra_kwargs = {
|
extra_kwargs = {
|
||||||
'name': {'required': False},
|
'name': {'required': False},
|
||||||
@@ -473,8 +455,6 @@ class AssetAccountBulkSerializer(
|
|||||||
|
|
||||||
|
|
||||||
class AccountSecretSerializer(SecretReadableMixin, AccountSerializer):
|
class AccountSecretSerializer(SecretReadableMixin, AccountSerializer):
|
||||||
spec_info = serializers.DictField(label=_('Spec info'), read_only=True)
|
|
||||||
|
|
||||||
class Meta(AccountSerializer.Meta):
|
class Meta(AccountSerializer.Meta):
|
||||||
fields = AccountSerializer.Meta.fields + ['spec_info']
|
fields = AccountSerializer.Meta.fields + ['spec_info']
|
||||||
extra_kwargs = {
|
extra_kwargs = {
|
||||||
@@ -489,7 +469,6 @@ class AccountSecretSerializer(SecretReadableMixin, AccountSerializer):
|
|||||||
|
|
||||||
class AccountHistorySerializer(serializers.ModelSerializer):
|
class AccountHistorySerializer(serializers.ModelSerializer):
|
||||||
secret_type = LabeledChoiceField(choices=SecretType.choices, label=_('Secret type'))
|
secret_type = LabeledChoiceField(choices=SecretType.choices, label=_('Secret type'))
|
||||||
secret = serializers.CharField(label=_('Secret'), read_only=True)
|
|
||||||
id = serializers.IntegerField(label=_('ID'), source='history_id', read_only=True)
|
id = serializers.IntegerField(label=_('ID'), source='history_id', read_only=True)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|||||||
@@ -70,14 +70,12 @@ class AuthValidateMixin(serializers.Serializer):
|
|||||||
class BaseAccountSerializer(
|
class BaseAccountSerializer(
|
||||||
AuthValidateMixin, ResourceLabelsMixin, BulkOrgResourceModelSerializer
|
AuthValidateMixin, ResourceLabelsMixin, BulkOrgResourceModelSerializer
|
||||||
):
|
):
|
||||||
spec_info = serializers.DictField(label=_('Spec info'), read_only=True)
|
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
model = BaseAccount
|
model = BaseAccount
|
||||||
fields_mini = ["id", "name", "username"]
|
fields_mini = ["id", "name", "username"]
|
||||||
fields_small = fields_mini + [
|
fields_small = fields_mini + [
|
||||||
"secret_type", "secret", "passphrase",
|
"secret_type", "secret", "passphrase",
|
||||||
"privileged", "is_active",
|
"privileged", "is_active", "spec_info",
|
||||||
]
|
]
|
||||||
fields_other = ["created_by", "date_created", "date_updated", "comment"]
|
fields_other = ["created_by", "date_created", "date_updated", "comment"]
|
||||||
fields = fields_small + fields_other + ["labels"]
|
fields = fields_small + fields_other + ["labels"]
|
||||||
|
|||||||
@@ -57,15 +57,11 @@ class AccountTemplateSerializer(BaseAccountSerializer):
|
|||||||
fields_unimport_template = ['push_params']
|
fields_unimport_template = ['push_params']
|
||||||
|
|
||||||
|
|
||||||
class AccountDetailTemplateSerializer(AccountTemplateSerializer):
|
class AccountTemplateSecretSerializer(SecretReadableMixin, AccountTemplateSerializer):
|
||||||
class Meta(AccountTemplateSerializer.Meta):
|
class Meta(AccountTemplateSerializer.Meta):
|
||||||
fields = AccountTemplateSerializer.Meta.fields + ['spec_info']
|
fields = AccountTemplateSerializer.Meta.fields + ['spec_info']
|
||||||
|
|
||||||
|
|
||||||
class AccountTemplateSecretSerializer(SecretReadableMixin, AccountDetailTemplateSerializer):
|
|
||||||
class Meta(AccountDetailTemplateSerializer.Meta):
|
|
||||||
fields = AccountDetailTemplateSerializer.Meta.fields
|
|
||||||
extra_kwargs = {
|
extra_kwargs = {
|
||||||
**AccountDetailTemplateSerializer.Meta.extra_kwargs,
|
**AccountTemplateSerializer.Meta.extra_kwargs,
|
||||||
'secret': {'write_only': False},
|
'secret': {'write_only': False},
|
||||||
|
'spec_info': {'label': _('Spec info')},
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,9 +1,8 @@
|
|||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*-
|
||||||
#
|
#
|
||||||
from django.conf import settings
|
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
from accounts.const import AutomationTypes, AccountBackupType
|
from accounts.const import AutomationTypes
|
||||||
from accounts.models import BackupAccountAutomation
|
from accounts.models import BackupAccountAutomation
|
||||||
from common.serializers.fields import EncryptedField
|
from common.serializers.fields import EncryptedField
|
||||||
from common.utils import get_logger
|
from common.utils import get_logger
|
||||||
@@ -42,17 +41,6 @@ class BackupAccountSerializer(BaseAutomationSerializer):
|
|||||||
'types': {'label': _('Asset type')}
|
'types': {'label': _('Asset type')}
|
||||||
}
|
}
|
||||||
|
|
||||||
def __init__(self, *args, **kwargs):
|
|
||||||
super().__init__(*args, **kwargs)
|
|
||||||
self.set_backup_type_choices()
|
|
||||||
|
|
||||||
def set_backup_type_choices(self):
|
|
||||||
field_backup_type = self.fields.get("backup_type")
|
|
||||||
if not field_backup_type:
|
|
||||||
return
|
|
||||||
if not settings.XPACK_LICENSE_IS_VALID:
|
|
||||||
field_backup_type._choices.pop(AccountBackupType.object_storage, None)
|
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def model_type(self):
|
def model_type(self):
|
||||||
return AutomationTypes.backup_account
|
return AutomationTypes.backup_account
|
||||||
|
|||||||
@@ -16,7 +16,6 @@ from assets.models import Asset
|
|||||||
from common.serializers.fields import LabeledChoiceField, ObjectRelatedField
|
from common.serializers.fields import LabeledChoiceField, ObjectRelatedField
|
||||||
from common.utils import get_logger
|
from common.utils import get_logger
|
||||||
from .base import BaseAutomationSerializer
|
from .base import BaseAutomationSerializer
|
||||||
from ...utils import account_secret_task_status
|
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
logger = get_logger(__file__)
|
||||||
|
|
||||||
@@ -27,7 +26,6 @@ __all__ = [
|
|||||||
'ChangeSecretRecordBackUpSerializer',
|
'ChangeSecretRecordBackUpSerializer',
|
||||||
'ChangeSecretUpdateAssetSerializer',
|
'ChangeSecretUpdateAssetSerializer',
|
||||||
'ChangeSecretUpdateNodeSerializer',
|
'ChangeSecretUpdateNodeSerializer',
|
||||||
'ChangeSecretAccountSerializer'
|
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
@@ -130,7 +128,7 @@ class ChangeSecretRecordSerializer(serializers.ModelSerializer):
|
|||||||
read_only_fields = fields
|
read_only_fields = fields
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_is_success(obj) -> bool:
|
def get_is_success(obj):
|
||||||
return obj.status == ChangeSecretRecordStatusChoice.success
|
return obj.status == ChangeSecretRecordStatusChoice.success
|
||||||
|
|
||||||
|
|
||||||
@@ -157,7 +155,7 @@ class ChangeSecretRecordBackUpSerializer(serializers.ModelSerializer):
|
|||||||
read_only_fields = fields
|
read_only_fields = fields
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_asset(instance) -> str:
|
def get_asset(instance):
|
||||||
return str(instance.asset)
|
return str(instance.asset)
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
@@ -165,7 +163,7 @@ class ChangeSecretRecordBackUpSerializer(serializers.ModelSerializer):
|
|||||||
return str(instance.account)
|
return str(instance.account)
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_is_success(obj) -> str:
|
def get_is_success(obj):
|
||||||
if obj.status == ChangeSecretRecordStatusChoice.success.value:
|
if obj.status == ChangeSecretRecordStatusChoice.success.value:
|
||||||
return _("Success")
|
return _("Success")
|
||||||
return _("Failed")
|
return _("Failed")
|
||||||
@@ -181,24 +179,3 @@ class ChangeSecretUpdateNodeSerializer(serializers.ModelSerializer):
|
|||||||
class Meta:
|
class Meta:
|
||||||
model = ChangeSecretAutomation
|
model = ChangeSecretAutomation
|
||||||
fields = ['id', 'nodes']
|
fields = ['id', 'nodes']
|
||||||
|
|
||||||
|
|
||||||
class ChangeSecretAccountSerializer(serializers.ModelSerializer):
|
|
||||||
asset = ObjectRelatedField(
|
|
||||||
queryset=Asset.objects.all(), required=False, label=_("Asset")
|
|
||||||
)
|
|
||||||
ttl = serializers.SerializerMethodField(label=_('TTL'))
|
|
||||||
meta = serializers.SerializerMethodField(label=_('Meta'))
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
model = Account
|
|
||||||
fields = ['id', 'username', 'asset', 'meta', 'ttl']
|
|
||||||
read_only_fields = fields
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def get_meta(obj) -> dict:
|
|
||||||
return account_secret_task_status.get(str(obj.id))
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def get_ttl(obj) -> int:
|
|
||||||
return account_secret_task_status.get_ttl(str(obj.id))
|
|
||||||
|
|||||||
@@ -69,7 +69,7 @@ class AssetRiskSerializer(serializers.Serializer):
|
|||||||
risk_summary = serializers.SerializerMethodField()
|
risk_summary = serializers.SerializerMethodField()
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_risk_summary(obj) -> dict:
|
def get_risk_summary(obj):
|
||||||
summary = {}
|
summary = {}
|
||||||
for risk in RiskChoice.choices:
|
for risk in RiskChoice.choices:
|
||||||
summary[f"{risk[0]}_count"] = obj.get(f"{risk[0]}_count", 0)
|
summary[f"{risk[0]}_count"] = obj.get(f"{risk[0]}_count", 0)
|
||||||
|
|||||||
@@ -28,7 +28,7 @@ class DiscoverAccountAutomationSerializer(BaseAutomationSerializer):
|
|||||||
+ read_only_fields)
|
+ read_only_fields)
|
||||||
extra_kwargs = {
|
extra_kwargs = {
|
||||||
'check_risk': {
|
'check_risk': {
|
||||||
'help_text': _('Whether to check the risk of the discovered accounts.'),
|
'help_text': _('Whether to check the risk of the gathered accounts.'),
|
||||||
},
|
},
|
||||||
**BaseAutomationSerializer.Meta.extra_kwargs
|
**BaseAutomationSerializer.Meta.extra_kwargs
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,5 +1,4 @@
|
|||||||
import datetime
|
import datetime
|
||||||
from collections import defaultdict
|
|
||||||
|
|
||||||
from celery import shared_task
|
from celery import shared_task
|
||||||
from django.db.models import Q
|
from django.db.models import Q
|
||||||
@@ -73,42 +72,23 @@ def execute_automation_record_task(record_ids, tp):
|
|||||||
task_name = gettext_noop('Execute automation record')
|
task_name = gettext_noop('Execute automation record')
|
||||||
|
|
||||||
with tmp_to_root_org():
|
with tmp_to_root_org():
|
||||||
records = ChangeSecretRecord.objects.filter(id__in=record_ids).order_by('-date_updated')
|
records = ChangeSecretRecord.objects.filter(id__in=record_ids)
|
||||||
|
|
||||||
if not records:
|
if not records:
|
||||||
logger.error(f'No automation record found: {record_ids}')
|
logger.error('No automation record found: {}'.format(record_ids))
|
||||||
return
|
return
|
||||||
|
|
||||||
seen_accounts = set()
|
record = records[0]
|
||||||
unique_records = []
|
record_map = {f'{record.asset_id}-{record.account_id}': str(record.id) for record in records}
|
||||||
for rec in records:
|
|
||||||
acct = str(rec.account_id)
|
|
||||||
if acct not in seen_accounts:
|
|
||||||
seen_accounts.add(acct)
|
|
||||||
unique_records.append(rec)
|
|
||||||
|
|
||||||
exec_groups = defaultdict(list)
|
|
||||||
for rec in unique_records:
|
|
||||||
exec_groups[rec.execution_id].append(rec)
|
|
||||||
|
|
||||||
for __, group in exec_groups.items():
|
|
||||||
latest_rec = group[0]
|
|
||||||
snapshot = getattr(latest_rec.execution, 'snapshot', {}) or {}
|
|
||||||
|
|
||||||
record_map = {f"{r.asset_id}-{r.account_id}": str(r.id) for r in group}
|
|
||||||
assets = [str(r.asset_id) for r in group]
|
|
||||||
accounts = [str(r.account_id) for r in group]
|
|
||||||
|
|
||||||
task_snapshot = {
|
task_snapshot = {
|
||||||
'params': {},
|
'params': {},
|
||||||
'record_map': record_map,
|
'record_map': record_map,
|
||||||
'secret': latest_rec.new_secret,
|
'secret': record.new_secret,
|
||||||
'secret_type': snapshot.get('secret_type'),
|
'secret_type': record.execution.snapshot.get('secret_type'),
|
||||||
'assets': assets,
|
'assets': [str(instance.asset_id) for instance in records],
|
||||||
'accounts': accounts,
|
'accounts': [str(instance.account_id) for instance in records],
|
||||||
}
|
}
|
||||||
|
with tmp_to_org(record.execution.org_id):
|
||||||
with tmp_to_org(latest_rec.execution.org_id):
|
|
||||||
quickstart_automation_by_snapshot(task_name, tp, task_snapshot)
|
quickstart_automation_by_snapshot(task_name, tp, task_snapshot)
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,107 +1,37 @@
|
|||||||
from collections import defaultdict
|
|
||||||
|
|
||||||
from celery import shared_task
|
from celery import shared_task
|
||||||
from django.utils.translation import gettext_noop, gettext_lazy as _
|
from django.utils.translation import gettext_noop, gettext_lazy as _
|
||||||
|
|
||||||
from accounts.const import AutomationTypes, ChangeSecretAccountStatus
|
from accounts.const import AutomationTypes
|
||||||
from accounts.tasks.common import quickstart_automation_by_snapshot
|
from accounts.tasks.common import quickstart_automation_by_snapshot
|
||||||
from accounts.utils import account_secret_task_status
|
|
||||||
from common.utils import get_logger
|
from common.utils import get_logger
|
||||||
from orgs.utils import tmp_to_org
|
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
logger = get_logger(__file__)
|
||||||
__all__ = [
|
__all__ = [
|
||||||
'push_accounts_to_assets_task', 'change_secret_accounts_to_assets_task'
|
'push_accounts_to_assets_task',
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
def _process_accounts(account_ids, automation_model, default_name, automation_type, snapshot=None):
|
|
||||||
from accounts.models import Account
|
|
||||||
accounts = Account.objects.filter(id__in=account_ids)
|
|
||||||
if not accounts:
|
|
||||||
logger.warning(
|
|
||||||
"No accounts found for automation task %s with ids %s",
|
|
||||||
automation_type, account_ids
|
|
||||||
)
|
|
||||||
return
|
|
||||||
|
|
||||||
task_name = automation_model.generate_unique_name(gettext_noop(default_name))
|
|
||||||
snapshot = snapshot or {}
|
|
||||||
snapshot.update({
|
|
||||||
'accounts': [str(a.id) for a in accounts],
|
|
||||||
'assets': [str(a.asset_id) for a in accounts],
|
|
||||||
})
|
|
||||||
|
|
||||||
quickstart_automation_by_snapshot(task_name, automation_type, snapshot)
|
|
||||||
|
|
||||||
|
|
||||||
@shared_task(
|
@shared_task(
|
||||||
queue="ansible",
|
queue="ansible",
|
||||||
verbose_name=_('Push accounts to assets'),
|
verbose_name=_('Push accounts to assets'),
|
||||||
activity_callback=lambda self, account_ids, *args, **kwargs: (account_ids, None),
|
activity_callback=lambda self, account_ids, *args, **kwargs: (account_ids, None),
|
||||||
description=_(
|
description=_(
|
||||||
"Whenever an account is created or modified and needs pushing to assets, run this task"
|
"When creating or modifying an account requires account push, this task is executed"
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
def push_accounts_to_assets_task(account_ids, params=None):
|
def push_accounts_to_assets_task(account_ids, params=None):
|
||||||
from accounts.models import PushAccountAutomation
|
from accounts.models import PushAccountAutomation
|
||||||
snapshot = {
|
from accounts.models import Account
|
||||||
'params': params or {},
|
|
||||||
}
|
|
||||||
_process_accounts(
|
|
||||||
account_ids,
|
|
||||||
PushAccountAutomation,
|
|
||||||
_("Push accounts to assets"),
|
|
||||||
AutomationTypes.push_account,
|
|
||||||
snapshot=snapshot
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@shared_task(
|
|
||||||
queue="ansible",
|
|
||||||
verbose_name=_('Change secret accounts to assets'),
|
|
||||||
activity_callback=lambda self, account_ids, *args, **kwargs: (account_ids, None),
|
|
||||||
description=_(
|
|
||||||
"When a secret on an account changes and needs pushing to assets, run this task"
|
|
||||||
)
|
|
||||||
)
|
|
||||||
def change_secret_accounts_to_assets_task(account_ids, params=None, snapshot=None, trigger='manual'):
|
|
||||||
from accounts.models import ChangeSecretAutomation, Account
|
|
||||||
|
|
||||||
manager = account_secret_task_status
|
|
||||||
|
|
||||||
if trigger == 'delay':
|
|
||||||
for _id in manager.account_ids:
|
|
||||||
status = manager.get_status(_id)
|
|
||||||
# Check if the account is in QUEUED status
|
|
||||||
if status == ChangeSecretAccountStatus.QUEUED:
|
|
||||||
account_ids.append(_id)
|
|
||||||
manager.set_status(_id, ChangeSecretAccountStatus.READY)
|
|
||||||
|
|
||||||
if not account_ids:
|
|
||||||
return
|
|
||||||
|
|
||||||
accounts = Account.objects.filter(id__in=account_ids)
|
accounts = Account.objects.filter(id__in=account_ids)
|
||||||
if not accounts:
|
task_name = gettext_noop("Push accounts to assets")
|
||||||
logger.warning(
|
task_name = PushAccountAutomation.generate_unique_name(task_name)
|
||||||
"No accounts found for change secret automation task with ids %s",
|
|
||||||
account_ids
|
|
||||||
)
|
|
||||||
return
|
|
||||||
|
|
||||||
grouped_ids = defaultdict(lambda: defaultdict(list))
|
task_snapshot = {
|
||||||
for account in accounts:
|
'accounts': [str(account.id) for account in accounts],
|
||||||
grouped_ids[account.org_id][account.secret_type].append(str(account.id))
|
'assets': [str(account.asset_id) for account in accounts],
|
||||||
|
'params': params or {},
|
||||||
|
}
|
||||||
|
|
||||||
snapshot = snapshot or {}
|
tp = AutomationTypes.push_account
|
||||||
for org_id, secret_map in grouped_ids.items():
|
quickstart_automation_by_snapshot(task_name, tp, task_snapshot)
|
||||||
with tmp_to_org(org_id):
|
|
||||||
for secret_type, ids in secret_map.items():
|
|
||||||
snapshot['secret_type'] = secret_type
|
|
||||||
_process_accounts(
|
|
||||||
ids,
|
|
||||||
ChangeSecretAutomation,
|
|
||||||
_("Change secret accounts to assets"),
|
|
||||||
AutomationTypes.change_secret,
|
|
||||||
snapshot=snapshot
|
|
||||||
)
|
|
||||||
|
|||||||
@@ -0,0 +1,36 @@
|
|||||||
|
{% load i18n %}
|
||||||
|
|
||||||
|
<h3>{% trans 'Task name' %}: {{ name }}</h3>
|
||||||
|
<h3>{% trans 'Task execution id' %}: {{ execution_id }}</h3>
|
||||||
|
<p>{% trans 'Respectful' %} {{ recipient }}</p>
|
||||||
|
<p>{% trans 'Hello! The following is the failure of changing the password of your assets or pushing the account. Please check and handle it in time.' %}</p>
|
||||||
|
<table style="width: 100%; border-collapse: collapse; max-width: 100%; text-align: left; margin-top: 20px;">
|
||||||
|
<caption></caption>
|
||||||
|
<thead>
|
||||||
|
<tr style="background-color: #f2f2f2;">
|
||||||
|
<th style="border: 1px solid #ddd; padding: 10px;">{% trans 'Asset' %}</th>
|
||||||
|
<th style="border: 1px solid #ddd; padding: 10px;">{% trans 'Account' %}</th>
|
||||||
|
<th style="border: 1px solid #ddd; padding: 10px;">{% trans 'Error' %}</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
{% for asset_name, account_username, error in asset_account_errors %}
|
||||||
|
<tr>
|
||||||
|
<td style="border: 1px solid #ddd; padding: 10px;">{{ asset_name }}</td>
|
||||||
|
<td style="border: 1px solid #ddd; padding: 10px;">{{ account_username }}</td>
|
||||||
|
<td style="border: 1px solid #ddd; padding: 10px;">
|
||||||
|
<div style="
|
||||||
|
max-width: 90%;
|
||||||
|
white-space: nowrap;
|
||||||
|
overflow: hidden;
|
||||||
|
text-overflow: ellipsis;
|
||||||
|
display: block;"
|
||||||
|
title="{{ error }}"
|
||||||
|
>
|
||||||
|
{{ error }}
|
||||||
|
</div>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
{% endfor %}
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
@@ -17,7 +17,6 @@ router.register(r'account-template-secrets', api.AccountTemplateSecretsViewSet,
|
|||||||
router.register(r'account-backup-plans', api.BackupAccountViewSet, 'account-backup')
|
router.register(r'account-backup-plans', api.BackupAccountViewSet, 'account-backup')
|
||||||
router.register(r'account-backup-plan-executions', api.BackupAccountExecutionViewSet, 'account-backup-execution')
|
router.register(r'account-backup-plan-executions', api.BackupAccountExecutionViewSet, 'account-backup-execution')
|
||||||
router.register(r'change-secret-automations', api.ChangeSecretAutomationViewSet, 'change-secret-automation')
|
router.register(r'change-secret-automations', api.ChangeSecretAutomationViewSet, 'change-secret-automation')
|
||||||
router.register(r'change-secret-status', api.ChangeSecretStatusViewSet, 'change-secret-status')
|
|
||||||
router.register(r'change-secret-executions', api.ChangSecretExecutionViewSet, 'change-secret-execution')
|
router.register(r'change-secret-executions', api.ChangSecretExecutionViewSet, 'change-secret-execution')
|
||||||
router.register(r'change-secret-records', api.ChangeSecretRecordViewSet, 'change-secret-record')
|
router.register(r'change-secret-records', api.ChangeSecretRecordViewSet, 'change-secret-record')
|
||||||
router.register(r'gather-account-automations', api.DiscoverAccountsAutomationViewSet, 'gather-account-automation')
|
router.register(r'gather-account-automations', api.DiscoverAccountsAutomationViewSet, 'gather-account-automation')
|
||||||
|
|||||||
@@ -1,11 +1,10 @@
|
|||||||
import copy
|
import copy
|
||||||
|
|
||||||
from django.conf import settings
|
|
||||||
from django.core.cache import cache
|
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
from rest_framework import serializers
|
from rest_framework import serializers
|
||||||
|
|
||||||
from accounts.const import SecretType, DEFAULT_PASSWORD_RULES
|
from accounts.const import SecretType, DEFAULT_PASSWORD_RULES
|
||||||
|
|
||||||
from common.utils import ssh_key_gen, random_string
|
from common.utils import ssh_key_gen, random_string
|
||||||
from common.utils import validate_ssh_private_key, parse_ssh_private_key_str
|
from common.utils import validate_ssh_private_key, parse_ssh_private_key_str
|
||||||
|
|
||||||
@@ -62,80 +61,3 @@ def validate_ssh_key(ssh_key, passphrase=None):
|
|||||||
if not valid:
|
if not valid:
|
||||||
raise serializers.ValidationError(_("private key invalid or passphrase error"))
|
raise serializers.ValidationError(_("private key invalid or passphrase error"))
|
||||||
return parse_ssh_private_key_str(ssh_key, passphrase)
|
return parse_ssh_private_key_str(ssh_key, passphrase)
|
||||||
|
|
||||||
|
|
||||||
class AccountSecretTaskStatus:
|
|
||||||
|
|
||||||
def __init__(
|
|
||||||
self,
|
|
||||||
prefix='queue:change_secret:',
|
|
||||||
debounce_key='debounce:change_secret:task',
|
|
||||||
debounce_timeout=10,
|
|
||||||
queue_status_timeout=60,
|
|
||||||
default_timeout=3600,
|
|
||||||
delayed_task_countdown=20,
|
|
||||||
):
|
|
||||||
self.prefix = prefix
|
|
||||||
self.debounce_key = debounce_key
|
|
||||||
self.debounce_timeout = debounce_timeout
|
|
||||||
self.queue_status_timeout = queue_status_timeout
|
|
||||||
self.default_timeout = default_timeout
|
|
||||||
self.delayed_task_countdown = delayed_task_countdown
|
|
||||||
self.enabled = getattr(settings, 'CHANGE_SECRET_AFTER_SESSION_END', False)
|
|
||||||
|
|
||||||
def _key(self, identifier):
|
|
||||||
return f"{self.prefix}{identifier}"
|
|
||||||
|
|
||||||
@property
|
|
||||||
def account_ids(self):
|
|
||||||
for key in cache.iter_keys(f"{self.prefix}*"):
|
|
||||||
yield key.split(':')[-1]
|
|
||||||
|
|
||||||
def is_debounced(self):
|
|
||||||
return cache.add(self.debounce_key, True, self.debounce_timeout)
|
|
||||||
|
|
||||||
def get_queue_key(self, identifier):
|
|
||||||
return self._key(identifier)
|
|
||||||
|
|
||||||
def set_status(
|
|
||||||
self,
|
|
||||||
identifier,
|
|
||||||
status,
|
|
||||||
timeout=None,
|
|
||||||
metadata=None,
|
|
||||||
use_add=False
|
|
||||||
):
|
|
||||||
if not self.enabled:
|
|
||||||
return
|
|
||||||
|
|
||||||
key = self._key(identifier)
|
|
||||||
data = {"status": status}
|
|
||||||
if metadata:
|
|
||||||
data.update(metadata)
|
|
||||||
|
|
||||||
if use_add:
|
|
||||||
return cache.add(key, data, timeout or self.queue_status_timeout)
|
|
||||||
|
|
||||||
cache.set(key, data, timeout or self.default_timeout)
|
|
||||||
|
|
||||||
def get(self, identifier):
|
|
||||||
return cache.get(self._key(identifier), {})
|
|
||||||
|
|
||||||
def get_status(self, identifier):
|
|
||||||
if not self.enabled:
|
|
||||||
return
|
|
||||||
|
|
||||||
record = cache.get(self._key(identifier), {})
|
|
||||||
return record.get("status")
|
|
||||||
|
|
||||||
def get_ttl(self, identifier):
|
|
||||||
return cache.ttl(self._key(identifier))
|
|
||||||
|
|
||||||
def clear(self, identifier):
|
|
||||||
if not self.enabled:
|
|
||||||
return
|
|
||||||
|
|
||||||
cache.delete(self._key(identifier))
|
|
||||||
|
|
||||||
|
|
||||||
account_secret_task_status = AccountSecretTaskStatus()
|
|
||||||
|
|||||||
@@ -3,4 +3,3 @@ from .connect_method import *
|
|||||||
from .login_acl import *
|
from .login_acl import *
|
||||||
from .login_asset_acl import *
|
from .login_asset_acl import *
|
||||||
from .login_asset_check import *
|
from .login_asset_check import *
|
||||||
from .data_masking import *
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
from orgs.mixins.api import OrgBulkModelViewSet
|
|
||||||
|
|
||||||
from .common import ACLUserFilterMixin
|
|
||||||
from ..models import DataMaskingRule
|
|
||||||
from .. import serializers
|
|
||||||
|
|
||||||
__all__ = ['DataMaskingRuleViewSet']
|
|
||||||
|
|
||||||
|
|
||||||
class DataMaskingRuleFilter(ACLUserFilterMixin):
|
|
||||||
class Meta:
|
|
||||||
model = DataMaskingRule
|
|
||||||
fields = ('name',)
|
|
||||||
|
|
||||||
|
|
||||||
class DataMaskingRuleViewSet(OrgBulkModelViewSet):
|
|
||||||
model = DataMaskingRule
|
|
||||||
filterset_class = DataMaskingRuleFilter
|
|
||||||
search_fields = ('name',)
|
|
||||||
serializer_class = serializers.DataMaskingRuleSerializer
|
|
||||||
@@ -8,7 +8,7 @@ __all__ = ['LoginAssetACLViewSet']
|
|||||||
class LoginAssetACLFilter(ACLUserAssetFilterMixin):
|
class LoginAssetACLFilter(ACLUserAssetFilterMixin):
|
||||||
class Meta:
|
class Meta:
|
||||||
model = models.LoginAssetACL
|
model = models.LoginAssetACL
|
||||||
fields = ['name', 'action']
|
fields = ['name', ]
|
||||||
|
|
||||||
|
|
||||||
class LoginAssetACLViewSet(OrgBulkModelViewSet):
|
class LoginAssetACLViewSet(OrgBulkModelViewSet):
|
||||||
|
|||||||
@@ -9,6 +9,5 @@ class ActionChoices(models.TextChoices):
|
|||||||
warning = 'warning', _('Warn')
|
warning = 'warning', _('Warn')
|
||||||
notice = 'notice', _('Notify')
|
notice = 'notice', _('Notify')
|
||||||
notify_and_warn = 'notify_and_warn', _('Prompt and warn')
|
notify_and_warn = 'notify_and_warn', _('Prompt and warn')
|
||||||
face_verify = 'face_verify', _('Face verify')
|
face_verify = 'face_verify', _('Face Verify')
|
||||||
face_online = 'face_online', _('Face online')
|
face_online = 'face_online', _('Face Online')
|
||||||
change_secret = 'change_secret', _('Secret rotation')
|
|
||||||
|
|||||||
@@ -1,45 +0,0 @@
|
|||||||
# Generated by Django 4.1.13 on 2025-10-07 16:16
|
|
||||||
|
|
||||||
import common.db.fields
|
|
||||||
from django.conf import settings
|
|
||||||
import django.core.validators
|
|
||||||
from django.db import migrations, models
|
|
||||||
import uuid
|
|
||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
|
||||||
|
|
||||||
dependencies = [
|
|
||||||
migrations.swappable_dependency(settings.AUTH_USER_MODEL),
|
|
||||||
('acls', '0002_auto_20210926_1047'),
|
|
||||||
]
|
|
||||||
|
|
||||||
operations = [
|
|
||||||
migrations.CreateModel(
|
|
||||||
name='DataMaskingRule',
|
|
||||||
fields=[
|
|
||||||
('created_by', models.CharField(blank=True, max_length=128, null=True, verbose_name='Created by')),
|
|
||||||
('updated_by', models.CharField(blank=True, max_length=128, null=True, verbose_name='Updated by')),
|
|
||||||
('date_created', models.DateTimeField(auto_now_add=True, null=True, verbose_name='Date created')),
|
|
||||||
('date_updated', models.DateTimeField(auto_now=True, verbose_name='Date updated')),
|
|
||||||
('comment', models.TextField(blank=True, default='', verbose_name='Comment')),
|
|
||||||
('id', models.UUIDField(default=uuid.uuid4, primary_key=True, serialize=False)),
|
|
||||||
('org_id', models.CharField(blank=True, db_index=True, default='', max_length=36, verbose_name='Organization')),
|
|
||||||
('priority', models.IntegerField(default=50, help_text='1-100, the lower the value will be match first', validators=[django.core.validators.MinValueValidator(1), django.core.validators.MaxValueValidator(100)], verbose_name='Priority')),
|
|
||||||
('action', models.CharField(default='reject', max_length=64, verbose_name='Action')),
|
|
||||||
('is_active', models.BooleanField(default=True, verbose_name='Active')),
|
|
||||||
('users', common.db.fields.JSONManyToManyField(default=dict, to='users.User', verbose_name='Users')),
|
|
||||||
('assets', common.db.fields.JSONManyToManyField(default=dict, to='assets.Asset', verbose_name='Assets')),
|
|
||||||
('accounts', models.JSONField(default=list, verbose_name='Accounts')),
|
|
||||||
('name', models.CharField(max_length=128, verbose_name='Name')),
|
|
||||||
('fields_pattern', models.CharField(default='password', max_length=128, verbose_name='Fields pattern')),
|
|
||||||
('masking_method', models.CharField(choices=[('fixed_char', 'Fixed Character Replacement'), ('hide_middle', 'Hide Middle Characters'), ('keep_prefix', 'Keep Prefix Only'), ('keep_suffix', 'Keep Suffix Only')], default='fixed_char', max_length=32, verbose_name='Masking Method')),
|
|
||||||
('mask_pattern', models.CharField(blank=True, default='######', max_length=128, null=True, verbose_name='Mask Pattern')),
|
|
||||||
('reviewers', models.ManyToManyField(blank=True, to=settings.AUTH_USER_MODEL, verbose_name='Reviewers')),
|
|
||||||
],
|
|
||||||
options={
|
|
||||||
'verbose_name': 'Data Masking Rule',
|
|
||||||
'unique_together': {('org_id', 'name')},
|
|
||||||
},
|
|
||||||
),
|
|
||||||
]
|
|
||||||
@@ -2,4 +2,3 @@ from .command_acl import *
|
|||||||
from .connect_method import *
|
from .connect_method import *
|
||||||
from .login_acl import *
|
from .login_acl import *
|
||||||
from .login_asset_acl import *
|
from .login_asset_acl import *
|
||||||
from .data_masking import *
|
|
||||||
@@ -5,7 +5,7 @@ from django.utils.translation import gettext_lazy as _
|
|||||||
from common.db.fields import JSONManyToManyField
|
from common.db.fields import JSONManyToManyField
|
||||||
from common.db.models import JMSBaseModel
|
from common.db.models import JMSBaseModel
|
||||||
from common.utils import contains_ip
|
from common.utils import contains_ip
|
||||||
from common.utils.timezone import contains_time_period
|
from common.utils.time_period import contains_time_period
|
||||||
from orgs.mixins.models import OrgModelMixin, OrgManager
|
from orgs.mixins.models import OrgModelMixin, OrgManager
|
||||||
from ..const import ActionChoices
|
from ..const import ActionChoices
|
||||||
|
|
||||||
|
|||||||
@@ -34,16 +34,16 @@ class CommandGroup(JMSOrgBaseModel):
|
|||||||
|
|
||||||
@lazyproperty
|
@lazyproperty
|
||||||
def pattern(self):
|
def pattern(self):
|
||||||
content = self.content.replace('\r\n', '\n')
|
|
||||||
if self.type == 'command':
|
if self.type == 'command':
|
||||||
s = self.construct_command_regex(content)
|
s = self.construct_command_regex(self.content)
|
||||||
else:
|
else:
|
||||||
s = r'{0}'.format(r'{}'.format('|'.join(content.split('\n'))))
|
s = r'{0}'.format(self.content)
|
||||||
return s
|
return s
|
||||||
|
|
||||||
@classmethod
|
@classmethod
|
||||||
def construct_command_regex(cls, content):
|
def construct_command_regex(cls, content):
|
||||||
regex = []
|
regex = []
|
||||||
|
content = content.replace('\r\n', '\n')
|
||||||
for _cmd in content.split('\n'):
|
for _cmd in content.split('\n'):
|
||||||
cmd = re.sub(r'\s+', ' ', _cmd)
|
cmd = re.sub(r'\s+', ' ', _cmd)
|
||||||
cmd = re.escape(cmd)
|
cmd = re.escape(cmd)
|
||||||
|
|||||||
@@ -1,42 +0,0 @@
|
|||||||
from django.db import models
|
|
||||||
|
|
||||||
from acls.models import UserAssetAccountBaseACL
|
|
||||||
from common.utils import get_logger
|
|
||||||
from django.utils.translation import gettext_lazy as _
|
|
||||||
|
|
||||||
logger = get_logger(__file__)
|
|
||||||
|
|
||||||
__all__ = ['MaskingMethod', 'DataMaskingRule']
|
|
||||||
|
|
||||||
|
|
||||||
class MaskingMethod(models.TextChoices):
|
|
||||||
fixed_char = "fixed_char", _("Fixed Character Replacement") # 固定字符替换
|
|
||||||
hide_middle = "hide_middle", _("Hide Middle Characters") # 隐藏中间几位
|
|
||||||
keep_prefix = "keep_prefix", _("Keep Prefix Only") # 只保留前缀
|
|
||||||
keep_suffix = "keep_suffix", _("Keep Suffix Only") # 只保留后缀
|
|
||||||
|
|
||||||
|
|
||||||
class DataMaskingRule(UserAssetAccountBaseACL):
|
|
||||||
name = models.CharField(max_length=128, verbose_name=_("Name"))
|
|
||||||
fields_pattern = models.CharField(max_length=128, default='password', verbose_name=_("Fields pattern"))
|
|
||||||
|
|
||||||
masking_method = models.CharField(
|
|
||||||
max_length=32,
|
|
||||||
choices=MaskingMethod.choices,
|
|
||||||
default=MaskingMethod.fixed_char,
|
|
||||||
verbose_name=_("Masking Method"),
|
|
||||||
)
|
|
||||||
mask_pattern = models.CharField(
|
|
||||||
max_length=128,
|
|
||||||
verbose_name=_("Mask Pattern"),
|
|
||||||
default="######",
|
|
||||||
blank=True,
|
|
||||||
null=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
def __str__(self):
|
|
||||||
return self.name
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
unique_together = [('org_id', 'name')]
|
|
||||||
verbose_name = _("Data Masking Rule")
|
|
||||||
@@ -1,52 +1,30 @@
|
|||||||
from django.utils import timezone
|
from django.template.loader import render_to_string
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
from accounts.models import Account
|
from accounts.models import Account
|
||||||
from acls.models import LoginACL, LoginAssetACL
|
|
||||||
from assets.models import Asset
|
from assets.models import Asset
|
||||||
from audits.models import UserLoginLog
|
from audits.models import UserLoginLog
|
||||||
from common.views.template import custom_render_to_string
|
|
||||||
from notifications.notifications import UserMessage
|
from notifications.notifications import UserMessage
|
||||||
from users.models import User
|
from users.models import User
|
||||||
|
|
||||||
|
|
||||||
class UserLoginReminderMsg(UserMessage):
|
class UserLoginReminderMsg(UserMessage):
|
||||||
subject = _('User login reminder')
|
subject = _('User login reminder')
|
||||||
template_name = 'acls/user_login_reminder.html'
|
|
||||||
contexts = [
|
|
||||||
{"name": "city", "label": _('Login city'), "default": "Shanghai"},
|
|
||||||
{"name": "username", "label": _('User'), "default": "john"},
|
|
||||||
{"name": "ip", "label": "IP", "default": "192.168.1.1"},
|
|
||||||
{"name": "recipient_name", "label": _("Recipient name"), "default": "John"},
|
|
||||||
{"name": "recipient_username", "label": _("Recipient username"), "default": "john"},
|
|
||||||
{"name": "user_agent", "label": _('User agent'), "default": "Mozilla/5.0"},
|
|
||||||
{"name": "acl_name", "label": _('ACL name'), "default": "login acl"},
|
|
||||||
{"name": "login_from", "label": _('Login from'), "default": "web"},
|
|
||||||
{"name": "time", "label": _('Login time'), "default": "2025-01-01 12:00:00"},
|
|
||||||
]
|
|
||||||
|
|
||||||
def __init__(self, user, user_log: UserLoginLog, acl: LoginACL):
|
def __init__(self, user, user_log: UserLoginLog):
|
||||||
self.user_log = user_log
|
self.user_log = user_log
|
||||||
self.acl_name = str(acl)
|
|
||||||
self.login_from = user_log.get_type_display()
|
|
||||||
now = timezone.localtime(user_log.datetime)
|
|
||||||
self.time = now.strftime('%Y-%m-%d %H:%M:%S')
|
|
||||||
super().__init__(user)
|
super().__init__(user)
|
||||||
|
|
||||||
def get_html_msg(self) -> dict:
|
def get_html_msg(self) -> dict:
|
||||||
user_log = self.user_log
|
user_log = self.user_log
|
||||||
context = {
|
context = {
|
||||||
'ip': user_log.ip,
|
'ip': user_log.ip,
|
||||||
'time': self.time,
|
|
||||||
'city': user_log.city,
|
'city': user_log.city,
|
||||||
'acl_name': self.acl_name,
|
|
||||||
'login_from': self.login_from,
|
|
||||||
'username': user_log.username,
|
'username': user_log.username,
|
||||||
'recipient_name': self.user.name,
|
'recipient': self.user,
|
||||||
'recipient_username': self.user.username,
|
|
||||||
'user_agent': user_log.user_agent,
|
'user_agent': user_log.user_agent,
|
||||||
}
|
}
|
||||||
message = custom_render_to_string(self.template_name, context)
|
message = render_to_string('acls/user_login_reminder.html', context)
|
||||||
|
|
||||||
return {
|
return {
|
||||||
'subject': str(self.subject),
|
'subject': str(self.subject),
|
||||||
@@ -62,55 +40,24 @@ class UserLoginReminderMsg(UserMessage):
|
|||||||
|
|
||||||
class AssetLoginReminderMsg(UserMessage):
|
class AssetLoginReminderMsg(UserMessage):
|
||||||
subject = _('User login alert for asset')
|
subject = _('User login alert for asset')
|
||||||
template_name = 'acls/asset_login_reminder.html'
|
|
||||||
contexts = [
|
|
||||||
{"name": "city", "label": _('Login city'), "default": "Shanghai"},
|
|
||||||
{"name": "username", "label": _('User'), "default": "john"},
|
|
||||||
{"name": "name", "label": _('Name'), "default": "John"},
|
|
||||||
{"name": "asset", "label": _('Asset'), "default": "dev server"},
|
|
||||||
{"name": "recipient_name", "label": _('Recipient name'), "default": "John"},
|
|
||||||
{"name": "recipient_username", "label": _('Recipient username'), "default": "john"},
|
|
||||||
{"name": "account", "label": _('Account Input username'), "default": "root"},
|
|
||||||
{"name": "account_name", "label": _('Account name'), "default": "root"},
|
|
||||||
{"name": "acl_name", "label": _('ACL name'), "default": "login acl"},
|
|
||||||
{"name": "ip", "label": "IP", "default": "192.168.1.1"},
|
|
||||||
{"name": "login_from", "label": _('Login from'), "default": "web"},
|
|
||||||
{"name": "time", "label": _('Login time'), "default": "2025-01-01 12:00:00"}
|
|
||||||
]
|
|
||||||
|
|
||||||
def __init__(
|
def __init__(self, user, asset: Asset, login_user: User, account: Account, input_username):
|
||||||
self, user, asset: Asset, login_user: User,
|
|
||||||
account: Account, acl: LoginAssetACL,
|
|
||||||
ip, input_username, login_from
|
|
||||||
):
|
|
||||||
self.ip = ip
|
|
||||||
self.asset = asset
|
self.asset = asset
|
||||||
self.login_user = login_user
|
self.login_user = login_user
|
||||||
self.account = account
|
self.account = account
|
||||||
self.acl_name = str(acl)
|
|
||||||
self.login_from = login_from
|
|
||||||
self.login_user = login_user
|
|
||||||
self.input_username = input_username
|
self.input_username = input_username
|
||||||
|
|
||||||
now = timezone.localtime(timezone.now())
|
|
||||||
self.time = now.strftime('%Y-%m-%d %H:%M:%S')
|
|
||||||
super().__init__(user)
|
super().__init__(user)
|
||||||
|
|
||||||
def get_html_msg(self) -> dict:
|
def get_html_msg(self) -> dict:
|
||||||
context = {
|
context = {
|
||||||
'ip': self.ip,
|
'recipient': self.user,
|
||||||
'time': self.time,
|
|
||||||
'login_from': self.login_from,
|
|
||||||
'recipient_name': self.user.name,
|
|
||||||
'recipient_username': self.user.username,
|
|
||||||
'username': self.login_user.username,
|
'username': self.login_user.username,
|
||||||
'name': self.login_user.name,
|
'name': self.login_user.name,
|
||||||
'asset': str(self.asset),
|
'asset': str(self.asset),
|
||||||
'account': self.input_username,
|
'account': self.input_username,
|
||||||
'account_name': self.account.name,
|
'account_name': self.account.name,
|
||||||
'acl_name': self.acl_name,
|
|
||||||
}
|
}
|
||||||
message = custom_render_to_string(self.template_name, context)
|
message = render_to_string('acls/asset_login_reminder.html', context)
|
||||||
|
|
||||||
return {
|
return {
|
||||||
'subject': str(self.subject),
|
'subject': str(self.subject),
|
||||||
|
|||||||
@@ -3,4 +3,3 @@ from .connect_method import *
|
|||||||
from .login_acl import *
|
from .login_acl import *
|
||||||
from .login_asset_acl import *
|
from .login_asset_acl import *
|
||||||
from .login_asset_check import *
|
from .login_asset_check import *
|
||||||
from .data_masking import *
|
|
||||||
@@ -79,8 +79,6 @@ class ActionAclSerializer(serializers.Serializer):
|
|||||||
field_action._choices.pop(ActionChoices.face_online, None)
|
field_action._choices.pop(ActionChoices.face_online, None)
|
||||||
for choice in self.Meta.action_choices_exclude:
|
for choice in self.Meta.action_choices_exclude:
|
||||||
field_action._choices.pop(choice, None)
|
field_action._choices.pop(choice, None)
|
||||||
if not settings.XPACK_LICENSE_IS_VALID or not settings.CHANGE_SECRET_AFTER_SESSION_END:
|
|
||||||
field_action._choices.pop(ActionChoices.change_secret, None)
|
|
||||||
|
|
||||||
|
|
||||||
class BaseACLSerializer(ActionAclSerializer, serializers.Serializer):
|
class BaseACLSerializer(ActionAclSerializer, serializers.Serializer):
|
||||||
@@ -90,7 +88,7 @@ class BaseACLSerializer(ActionAclSerializer, serializers.Serializer):
|
|||||||
fields_small = fields_mini + [
|
fields_small = fields_mini + [
|
||||||
"is_active", "priority", "action",
|
"is_active", "priority", "action",
|
||||||
"date_created", "date_updated",
|
"date_created", "date_updated",
|
||||||
"comment", "created_by"
|
"comment", "created_by", "org_id",
|
||||||
]
|
]
|
||||||
fields_m2m = ["reviewers", ]
|
fields_m2m = ["reviewers", ]
|
||||||
fields = fields_small + fields_m2m
|
fields = fields_small + fields_m2m
|
||||||
@@ -100,20 +98,6 @@ class BaseACLSerializer(ActionAclSerializer, serializers.Serializer):
|
|||||||
'reviewers': {'label': _('Recipients')},
|
'reviewers': {'label': _('Recipients')},
|
||||||
}
|
}
|
||||||
|
|
||||||
class BaseUserACLSerializer(BaseACLSerializer):
|
|
||||||
users = JSONManyToManyField(label=_('User'))
|
|
||||||
|
|
||||||
class Meta(BaseACLSerializer.Meta):
|
|
||||||
fields = BaseACLSerializer.Meta.fields + ['users']
|
|
||||||
|
|
||||||
|
|
||||||
class BaseUserAssetAccountACLSerializer(BaseUserACLSerializer):
|
|
||||||
assets = JSONManyToManyField(label=_('Asset'))
|
|
||||||
accounts = serializers.ListField(label=_('Account'))
|
|
||||||
|
|
||||||
class Meta(BaseUserACLSerializer.Meta):
|
|
||||||
fields = BaseUserACLSerializer.Meta.fields + ['assets', 'accounts', 'org_id']
|
|
||||||
|
|
||||||
def validate_reviewers(self, reviewers):
|
def validate_reviewers(self, reviewers):
|
||||||
action = self.initial_data.get('action')
|
action = self.initial_data.get('action')
|
||||||
if not action and self.instance:
|
if not action and self.instance:
|
||||||
@@ -133,3 +117,18 @@ class BaseUserAssetAccountACLSerializer(BaseUserACLSerializer):
|
|||||||
)
|
)
|
||||||
raise serializers.ValidationError(error)
|
raise serializers.ValidationError(error)
|
||||||
return valid_reviewers
|
return valid_reviewers
|
||||||
|
|
||||||
|
|
||||||
|
class BaseUserACLSerializer(BaseACLSerializer):
|
||||||
|
users = JSONManyToManyField(label=_('User'))
|
||||||
|
|
||||||
|
class Meta(BaseACLSerializer.Meta):
|
||||||
|
fields = BaseACLSerializer.Meta.fields + ['users']
|
||||||
|
|
||||||
|
|
||||||
|
class BaseUserAssetAccountACLSerializer(BaseUserACLSerializer):
|
||||||
|
assets = JSONManyToManyField(label=_('Asset'))
|
||||||
|
accounts = serializers.ListField(label=_('Account'))
|
||||||
|
|
||||||
|
class Meta(BaseUserACLSerializer.Meta):
|
||||||
|
fields = BaseUserACLSerializer.Meta.fields + ['assets', 'accounts']
|
||||||
|
|||||||
@@ -33,10 +33,7 @@ class CommandFilterACLSerializer(BaseSerializer, BulkOrgResourceModelSerializer)
|
|||||||
model = CommandFilterACL
|
model = CommandFilterACL
|
||||||
fields = BaseSerializer.Meta.fields + ['command_groups']
|
fields = BaseSerializer.Meta.fields + ['command_groups']
|
||||||
action_choices_exclude = [
|
action_choices_exclude = [
|
||||||
ActionChoices.notice,
|
ActionChoices.notice, ActionChoices.face_verify, ActionChoices.face_online
|
||||||
ActionChoices.face_verify,
|
|
||||||
ActionChoices.face_online,
|
|
||||||
ActionChoices.change_secret
|
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
from common.serializers.mixin import CommonBulkModelSerializer
|
from orgs.mixins.serializers import BulkOrgResourceModelSerializer
|
||||||
from .base import BaseUserAssetAccountACLSerializer as BaseSerializer
|
from .base import BaseUserAssetAccountACLSerializer as BaseSerializer
|
||||||
from ..const import ActionChoices
|
from ..const import ActionChoices
|
||||||
from ..models import ConnectMethodACL
|
from ..models import ConnectMethodACL
|
||||||
@@ -6,17 +6,14 @@ from ..models import ConnectMethodACL
|
|||||||
__all__ = ["ConnectMethodACLSerializer"]
|
__all__ = ["ConnectMethodACLSerializer"]
|
||||||
|
|
||||||
|
|
||||||
class ConnectMethodACLSerializer(BaseSerializer, CommonBulkModelSerializer):
|
class ConnectMethodACLSerializer(BaseSerializer, BulkOrgResourceModelSerializer):
|
||||||
class Meta(BaseSerializer.Meta):
|
class Meta(BaseSerializer.Meta):
|
||||||
model = ConnectMethodACL
|
model = ConnectMethodACL
|
||||||
fields = [
|
fields = [
|
||||||
i for i in BaseSerializer.Meta.fields + ['connect_methods']
|
i for i in BaseSerializer.Meta.fields + ['connect_methods']
|
||||||
if i not in ['assets', 'accounts', 'org_id']
|
if i not in ['assets', 'accounts']
|
||||||
]
|
]
|
||||||
action_choices_exclude = BaseSerializer.Meta.action_choices_exclude + [
|
action_choices_exclude = BaseSerializer.Meta.action_choices_exclude + [
|
||||||
ActionChoices.review,
|
ActionChoices.review, ActionChoices.accept, ActionChoices.notice,
|
||||||
ActionChoices.notice,
|
ActionChoices.face_verify, ActionChoices.face_online
|
||||||
ActionChoices.face_verify,
|
|
||||||
ActionChoices.face_online,
|
|
||||||
ActionChoices.change_secret
|
|
||||||
]
|
]
|
||||||
|
|||||||
@@ -1,19 +0,0 @@
|
|||||||
from django.utils.translation import gettext_lazy as _
|
|
||||||
|
|
||||||
from acls.models import MaskingMethod, DataMaskingRule
|
|
||||||
from common.serializers.fields import LabeledChoiceField
|
|
||||||
from common.serializers.mixin import CommonBulkModelSerializer
|
|
||||||
from orgs.mixins.serializers import BulkOrgResourceModelSerializer
|
|
||||||
from .base import BaseUserAssetAccountACLSerializer as BaseSerializer
|
|
||||||
|
|
||||||
__all__ = ['DataMaskingRuleSerializer']
|
|
||||||
|
|
||||||
|
|
||||||
class DataMaskingRuleSerializer(BaseSerializer, BulkOrgResourceModelSerializer):
|
|
||||||
masking_method = LabeledChoiceField(
|
|
||||||
choices=MaskingMethod.choices, default=MaskingMethod.fixed_char, label=_('Masking Method')
|
|
||||||
)
|
|
||||||
|
|
||||||
class Meta(BaseSerializer.Meta):
|
|
||||||
model = DataMaskingRule
|
|
||||||
fields = BaseSerializer.Meta.fields + ['fields_pattern', 'masking_method', 'mask_pattern']
|
|
||||||
@@ -1,7 +1,7 @@
|
|||||||
from django.utils.translation import gettext as _
|
from django.utils.translation import gettext as _
|
||||||
|
|
||||||
from common.serializers import CommonBulkModelSerializer
|
|
||||||
from common.serializers import MethodSerializer
|
from common.serializers import MethodSerializer
|
||||||
|
from orgs.mixins.serializers import BulkOrgResourceModelSerializer
|
||||||
from .base import BaseUserACLSerializer
|
from .base import BaseUserACLSerializer
|
||||||
from .rules import RuleSerializer
|
from .rules import RuleSerializer
|
||||||
from ..const import ActionChoices
|
from ..const import ActionChoices
|
||||||
@@ -12,18 +12,17 @@ __all__ = ["LoginACLSerializer"]
|
|||||||
common_help_text = _("With * indicating a match all. ")
|
common_help_text = _("With * indicating a match all. ")
|
||||||
|
|
||||||
|
|
||||||
class LoginACLSerializer(BaseUserACLSerializer, CommonBulkModelSerializer):
|
class LoginACLSerializer(BaseUserACLSerializer, BulkOrgResourceModelSerializer):
|
||||||
rules = MethodSerializer(label=_('Rule'))
|
rules = MethodSerializer(label=_('Rule'))
|
||||||
|
|
||||||
class Meta(BaseUserACLSerializer.Meta):
|
class Meta(BaseUserACLSerializer.Meta):
|
||||||
model = LoginACL
|
model = LoginACL
|
||||||
fields = list((set(BaseUserACLSerializer.Meta.fields) | {'rules'}))
|
fields = BaseUserACLSerializer.Meta.fields + ['rules', ]
|
||||||
action_choices_exclude = [
|
action_choices_exclude = [
|
||||||
ActionChoices.warning,
|
ActionChoices.warning,
|
||||||
ActionChoices.notify_and_warn,
|
ActionChoices.notify_and_warn,
|
||||||
ActionChoices.face_online,
|
ActionChoices.face_online,
|
||||||
ActionChoices.face_verify,
|
ActionChoices.face_verify
|
||||||
ActionChoices.change_secret
|
|
||||||
]
|
]
|
||||||
|
|
||||||
def get_rules_serializer(self):
|
def get_rules_serializer(self):
|
||||||
|
|||||||
@@ -1,7 +1,5 @@
|
|||||||
# coding: utf-8
|
# coding: utf-8
|
||||||
#
|
#
|
||||||
from urllib.parse import urlparse
|
|
||||||
|
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
from rest_framework import serializers
|
from rest_framework import serializers
|
||||||
|
|
||||||
@@ -10,7 +8,7 @@ from common.utils.ip import is_ip_address, is_ip_network, is_ip_segment
|
|||||||
|
|
||||||
logger = get_logger(__file__)
|
logger = get_logger(__file__)
|
||||||
|
|
||||||
__all__ = ['RuleSerializer', 'ip_group_child_validator', 'ip_group_help_text', 'address_validator']
|
__all__ = ['RuleSerializer', 'ip_group_child_validator', 'ip_group_help_text']
|
||||||
|
|
||||||
|
|
||||||
def ip_group_child_validator(ip_group_child):
|
def ip_group_child_validator(ip_group_child):
|
||||||
@@ -23,19 +21,6 @@ def ip_group_child_validator(ip_group_child):
|
|||||||
raise serializers.ValidationError(error)
|
raise serializers.ValidationError(error)
|
||||||
|
|
||||||
|
|
||||||
def address_validator(value):
|
|
||||||
parsed = urlparse(value)
|
|
||||||
is_basic_url = parsed.scheme in ('http', 'https') and parsed.netloc
|
|
||||||
is_valid = value == '*' \
|
|
||||||
or is_ip_address(value) \
|
|
||||||
or is_ip_network(value) \
|
|
||||||
or is_ip_segment(value) \
|
|
||||||
or is_basic_url
|
|
||||||
if not is_valid:
|
|
||||||
error = _('address invalid: `{}`').format(value)
|
|
||||||
raise serializers.ValidationError(error)
|
|
||||||
|
|
||||||
|
|
||||||
ip_group_help_text = _(
|
ip_group_help_text = _(
|
||||||
'With * indicating a match all. '
|
'With * indicating a match all. '
|
||||||
'Such as: '
|
'Such as: '
|
||||||
|
|||||||
@@ -1,17 +1,13 @@
|
|||||||
{% load i18n %}
|
{% load i18n %}
|
||||||
|
|
||||||
<h3>{% trans 'Dear' %}: {{ recipient_name }}[{{ recipient_username }}]</h3>
|
<h3>{% trans 'Dear' %}: {{ recipient.name }}[{{ recipient.username }}]</h3>
|
||||||
<hr>
|
<hr>
|
||||||
<p>{% trans 'We would like to inform you that a user has recently logged into the following asset:' %}<p>
|
<p>{% trans 'We would like to inform you that a user has recently logged into the following asset:' %}<p>
|
||||||
<p><strong>{% trans 'Asset details' %}:</strong></p>
|
<p><strong>{% trans 'Asset details' %}:</strong></p>
|
||||||
<ul>
|
<ul>
|
||||||
<li><strong>{% trans 'User' %}:</strong> [{{ name }}({{ username }})]</li>
|
<li><strong>{% trans 'User' %}:</strong> [{{ name }}({{ username }})]</li>
|
||||||
<li><strong>IP:</strong> [{{ ip }}]</li>
|
|
||||||
<li><strong>{% trans 'Assets' %}:</strong> [{{ asset }}]</li>
|
<li><strong>{% trans 'Assets' %}:</strong> [{{ asset }}]</li>
|
||||||
<li><strong>{% trans 'Account' %}:</strong> [{{ account_name }}({{ account }})]</li>
|
<li><strong>{% trans 'Account' %}:</strong> [{{ account_name }}({{ account }})]</li>
|
||||||
<li><strong>{% trans 'Login asset acl' %}:</strong> [{{ acl_name }}]</li>
|
|
||||||
<li><strong>{% trans 'Login from' %}:</strong> [{{ login_from }}]</li>
|
|
||||||
<li><strong>{% trans 'Time' %}:</strong> [{{ time }}]</li>
|
|
||||||
</ul>
|
</ul>
|
||||||
<hr>
|
<hr>
|
||||||
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{% load i18n %}
|
{% load i18n %}
|
||||||
|
|
||||||
<h3>{% trans 'Dear' %}: {{ recipient_name }}[{{ recipient_username }}]</h3>
|
<h3>{% trans 'Dear' %}: {{ recipient.name }}[{{ recipient.username }}]</h3>
|
||||||
<hr>
|
<hr>
|
||||||
<p>{% trans 'We would like to inform you that a user has recently logged:' %}<p>
|
<p>{% trans 'We would like to inform you that a user has recently logged:' %}<p>
|
||||||
<p><strong>{% trans 'User details' %}:</strong></p>
|
<p><strong>{% trans 'User details' %}:</strong></p>
|
||||||
@@ -8,10 +8,7 @@
|
|||||||
<li><strong>{% trans 'User' %}:</strong> [{{ username }}]</li>
|
<li><strong>{% trans 'User' %}:</strong> [{{ username }}]</li>
|
||||||
<li><strong>IP:</strong> [{{ ip }}]</li>
|
<li><strong>IP:</strong> [{{ ip }}]</li>
|
||||||
<li><strong>{% trans 'Login city' %}:</strong> [{{ city }}]</li>
|
<li><strong>{% trans 'Login city' %}:</strong> [{{ city }}]</li>
|
||||||
<li><strong>{% trans 'Login from' %}:</strong> [{{ login_from }}]</li>
|
|
||||||
<li><strong>{% trans 'User agent' %}:</strong> [{{ user_agent }}]</li>
|
<li><strong>{% trans 'User agent' %}:</strong> [{{ user_agent }}]</li>
|
||||||
<li><strong>{% trans 'Login acl' %}:</strong> [{{ acl_name }}]</li>
|
|
||||||
<li><strong>{% trans 'Time' %}:</strong> [{{ time }}]</li>
|
|
||||||
</ul>
|
</ul>
|
||||||
<hr>
|
<hr>
|
||||||
|
|
||||||
|
|||||||
@@ -11,7 +11,6 @@ router.register(r'login-asset-acls', api.LoginAssetACLViewSet, 'login-asset-acl'
|
|||||||
router.register(r'command-filter-acls', api.CommandFilterACLViewSet, 'command-filter-acl')
|
router.register(r'command-filter-acls', api.CommandFilterACLViewSet, 'command-filter-acl')
|
||||||
router.register(r'command-groups', api.CommandGroupViewSet, 'command-group')
|
router.register(r'command-groups', api.CommandGroupViewSet, 'command-group')
|
||||||
router.register(r'connect-method-acls', api.ConnectMethodACLViewSet, 'connect-method-acl')
|
router.register(r'connect-method-acls', api.ConnectMethodACLViewSet, 'connect-method-acl')
|
||||||
router.register(r'data-masking-rules', api.DataMaskingRuleViewSet, 'data-masking-rule')
|
|
||||||
|
|
||||||
urlpatterns = [
|
urlpatterns = [
|
||||||
path('login-asset/check/', api.LoginAssetCheckAPI.as_view(), name='login-asset-check'),
|
path('login-asset/check/', api.LoginAssetCheckAPI.as_view(), name='login-asset-check'),
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user