mirror of
https://github.com/jumpserver/jumpserver.git
synced 2025-05-05 14:46:20 +00:00
* perf: change i18n
* perf: pam
* perf: change translate
* perf: add check account
* perf: add date field
* perf: add account filter
* perf: remove some js
* perf: add account status action
* perf: update pam
* perf: 修改 discover account
* perf: update filter
* perf: update gathered account
* perf: 修改账号同步
* perf: squash migrations
* perf: update pam
* perf: change i18n
* perf: update account risk
* perf: 更新风险发现
* perf: remove css
* perf: Admin connection token
* perf: Add a switch to check connectivity after changing the password, and add a custom ssh command for push tasks
* perf: Modify account migration files
* perf: update pam
* perf: remove to check account dir
* perf: Admin connection token
* perf: update check account
* perf: 优化发送结果
* perf: update pam
* perf: update bulk update create
* perf: prepaire using thread timer for bulk_create_decorator
* perf: update bulk create decorator
* perf: 优化 playbook manager
* perf: 优化收集账号的报表
* perf: Update poetry
* perf: Update Dockerfile with new base image tag
* fix: Account migrate 0012 file
* perf: 修改备份
* perf: update pam
* fix: Expand resource_type filter to include raw type
* feat: PAM Service (#14552)
* feat: PAM Service
* perf: import package name
---------
Co-authored-by: jiangweidong <1053570670@qq.com>
* perf: Change secret dashboard (#14551)
Co-authored-by: feng <1304903146@qq.com>
* perf: update migrations
* perf: 修改支持 pam
* perf: Change secret record table dashboard
* perf: update status
* fix: Automation send report
* perf: Change secret report
* feat: windows accounts gather
* perf: update change status
* perf: Account backup
* perf: Account backup report
* perf: Account migrate
* perf: update service to application
* perf: update migrations
* perf: update logo
* feat: oracle accounts gather (#14571)
* feat: oracle accounts gather
* feat: sqlserver accounts gather
* feat: postgresql accounts gather
* feat: mysql accounts gather
---------
Co-authored-by: wangruidong <940853815@qq.com>
* feat: mongodb accounts gather
* perf: Change secret
* perf: Migrate
* perf: Merge conflicting migration files
* perf: Change secret
* perf: Automation filter org
* perf: Account push
* perf: Random secret string
* perf: Enhance SQL query and update risk handling in accounts
* perf: Ticket filter assignee_id
* perf: 修改 account remote
* perf: 修改一些 adhoc 任务
* perf: Change secret
* perf: Remove push account extra api
* perf: update status
* perf: The entire organization can view activity log
* fix: risk field check
* perf: add account details api
* perf: add demo mode
* perf: Delete gather_account
* perf: Perfect solution to account version problem
* perf: Update status action to handle multiple accounts
* perf: Add GatherAccountDetailField and update serializers
* perf: Display account history in combination with password change records
* perf: Lina translate
* fix: Update mysql_filter to handle nested user info
* perf: Admin connection token validate_permission account
* perf: copy move account
* perf: account filter risk
* perf: account risk filter
* perf: Copy move account failed message
* fix: gather account sync account to asset
* perf: Pam dashboard
* perf: Account dashboard total accounts
* perf: Pam dashboard
* perf: Change secret filter account secret_reset
* perf: 修改 risk filter
* perf: pam translate
* feat: Check for leaked duplicate passwords. (#14711)
* feat: Check for leaked duplicate passwords.
* perf: Use SQLite instead of txt as leak password database
---------
Co-authored-by: jiangweidong <1053570670@qq.com>
Co-authored-by: 老广 <ibuler@qq.com>
* perf: merge with remote
* perf: Add risk change_password_add handle
* perf: Pam dashboard
* perf: check account manager import
* perf: 重构扫描
* perf: 修改 db
* perf: Gather account manager
* perf: update change db lib
* perf: dashboard
* perf: Account gather
* perf: 修改 asset get queryset
* perf: automation report
* perf: Pam account
* perf: Pam dashboard api
* perf: risk add account
* perf: 修改 risk check
* perf: Risk account
* perf: update risk add reopen action
* perf: add pylintrc
* Revert "perf: automation report"
This reverts commit 22aee54207
.
* perf: check account engine
* perf: Perf: Optimism Gather Report Style
* Perf: Remove unuser actions
* Perf: Perf push account
* perf: perf gather account
* perf: Automation report
* perf: Push account recorder
* perf: Push account record
* perf: Pam dashboard
* perf: perf
* perf: update intergration
* perf: integrations application detail add account tab page
* feat: Custom change password supports configuration of interactive items
* perf: Go and Python demo code
* perf: Custom secret change
* perf: add user filter
* perf: translate
* perf: Add demo code docs
* perf: update some i18n
* perf: update some i18n
* perf: Add Java, Node, Go, and cURL demo code
* perf: Translate
* perf: Change secret translate
* perf: Translate
* perf: update some i18n
* perf: translate
* perf: Ansible playbook
* perf: update some choice
* perf: update some choice
* perf: update account serializer remote unused code
* perf: conflict
* perf: update import
---------
Co-authored-by: ibuler <ibuler@qq.com>
Co-authored-by: feng <1304903146@qq.com>
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Co-authored-by: wangruidong <940853815@qq.com>
Co-authored-by: jiangweidong <1053570670@qq.com>
Co-authored-by: feng626 <57284900+feng626@users.noreply.github.com>
Co-authored-by: zhaojisen <1301338853@qq.com>
128 lines
4.4 KiB
Python
128 lines
4.4 KiB
Python
from rest_framework import authentication
|
|
from rest_framework import exceptions
|
|
|
|
from httpsig import HeaderVerifier, utils
|
|
|
|
"""
|
|
Reusing failure exceptions serves several purposes:
|
|
|
|
1. Lack of useful information regarding the failure inhibits attackers
|
|
from learning about valid keyIDs or other forms of information leakage.
|
|
Using the same actual object for any failure makes preventing such
|
|
leakage through mistakenly-distinct error messages less likely.
|
|
|
|
2. In an API scenario, the object is created once and raised many times
|
|
rather than generated on every failure, which could lead to higher loads
|
|
or memory usage in high-volume attack scenarios.
|
|
|
|
"""
|
|
FAILED = exceptions.AuthenticationFailed('Invalid signature.')
|
|
IP_NOT_ALLOW = exceptions.AuthenticationFailed('Ip is not in access ip list.')
|
|
|
|
|
|
class SignatureAuthentication(authentication.BaseAuthentication):
|
|
"""
|
|
DRF authentication class for HTTP Signature support.
|
|
|
|
You must subclass this class in your own project and implement the
|
|
`fetch_user_data(self, keyId, algorithm)` method, returning a tuple of
|
|
the User object and a bytes object containing the user's secret. Note
|
|
that key_id and algorithm are DIRTY as they are supplied by the client
|
|
and so must be verified in your subclass!
|
|
|
|
You may set the following class properties in your subclass to configure
|
|
authentication for your particular use case:
|
|
|
|
:param www_authenticate_realm: Default: "api"
|
|
:param required_headers: Default: ["(request-target)", "date"]
|
|
"""
|
|
source = ''
|
|
www_authenticate_realm = "api"
|
|
required_headers = ["(request-target)", "date"]
|
|
|
|
def fetch_user_data(self, key_id, algorithm=None):
|
|
"""Returns a tuple (User, secret) or (None, None)."""
|
|
raise NotImplementedError()
|
|
|
|
def is_ip_allow(self, key_id, request):
|
|
raise NotImplementedError()
|
|
|
|
def after_authenticate_update_date(self, user):
|
|
pass
|
|
|
|
def authenticate_header(self, request):
|
|
"""
|
|
DRF sends this for unauthenticated responses if we're the primary
|
|
authenticator.
|
|
"""
|
|
h = " ".join(self.required_headers)
|
|
return 'Signature realm="%s",headers="%s"' % (
|
|
self.www_authenticate_realm, h)
|
|
|
|
def authenticate(self, request):
|
|
"""
|
|
Perform the actual authentication.
|
|
|
|
Note that the exception raised is always the same. This is so that we
|
|
don't leak information about in/valid keyIds and other such useful
|
|
things.
|
|
"""
|
|
auth_header = authentication.get_authorization_header(request)
|
|
if not auth_header or len(auth_header) == 0:
|
|
return None
|
|
|
|
method, fields = utils.parse_authorization_header(auth_header)
|
|
|
|
# Ignore foreign Authorization headers.
|
|
if method.lower() != 'signature':
|
|
return None
|
|
|
|
if self.source and request.META.get('HTTP_X_SOURCE') != self.source:
|
|
return None
|
|
|
|
# Verify basic header structure.
|
|
if len(fields) == 0:
|
|
raise FAILED
|
|
|
|
# Ensure all required fields were included.
|
|
if len({"keyid", "algorithm", "signature"} - set(fields.keys())) > 0:
|
|
raise FAILED
|
|
|
|
key_id = fields["keyid"]
|
|
# Fetch the secret associated with the keyid
|
|
user, secret = self.fetch_user_data(
|
|
key_id,
|
|
algorithm=fields["algorithm"]
|
|
)
|
|
|
|
if not (user and secret):
|
|
raise FAILED
|
|
|
|
if not self.is_ip_allow(key_id, request):
|
|
raise IP_NOT_ALLOW
|
|
|
|
# Gather all request headers and translate them as stated in the Django docs:
|
|
# https://docs.djangoproject.com/en/1.6/ref/request-response/#django.http.HttpRequest.META
|
|
headers = {}
|
|
for key in request.META.keys():
|
|
if key.startswith("HTTP_") or \
|
|
key in ("CONTENT_TYPE", "CONTENT_LENGTH"):
|
|
header = key[5:].lower().replace('_', '-')
|
|
headers[header] = request.META[key]
|
|
|
|
# Verify headers
|
|
hs = HeaderVerifier(
|
|
headers,
|
|
secret,
|
|
required_headers=self.required_headers,
|
|
method=request.method.lower(),
|
|
path=request.get_full_path()
|
|
)
|
|
|
|
# All of that just to get to this.
|
|
if not hs.verify():
|
|
raise FAILED
|
|
|
|
self.after_authenticate_update_date(user)
|
|
return user, fields["keyid"]
|