mirror of
https://github.com/jumpserver/jumpserver.git
synced 2026-01-15 14:47:24 +00:00
* perf: change i18n
* perf: pam
* perf: change translate
* perf: add check account
* perf: add date field
* perf: add account filter
* perf: remove some js
* perf: add account status action
* perf: update pam
* perf: 修改 discover account
* perf: update filter
* perf: update gathered account
* perf: 修改账号同步
* perf: squash migrations
* perf: update pam
* perf: change i18n
* perf: update account risk
* perf: 更新风险发现
* perf: remove css
* perf: Admin connection token
* perf: Add a switch to check connectivity after changing the password, and add a custom ssh command for push tasks
* perf: Modify account migration files
* perf: update pam
* perf: remove to check account dir
* perf: Admin connection token
* perf: update check account
* perf: 优化发送结果
* perf: update pam
* perf: update bulk update create
* perf: prepaire using thread timer for bulk_create_decorator
* perf: update bulk create decorator
* perf: 优化 playbook manager
* perf: 优化收集账号的报表
* perf: Update poetry
* perf: Update Dockerfile with new base image tag
* fix: Account migrate 0012 file
* perf: 修改备份
* perf: update pam
* fix: Expand resource_type filter to include raw type
* feat: PAM Service (#14552)
* feat: PAM Service
* perf: import package name
---------
Co-authored-by: jiangweidong <1053570670@qq.com>
* perf: Change secret dashboard (#14551)
Co-authored-by: feng <1304903146@qq.com>
* perf: update migrations
* perf: 修改支持 pam
* perf: Change secret record table dashboard
* perf: update status
* fix: Automation send report
* perf: Change secret report
* feat: windows accounts gather
* perf: update change status
* perf: Account backup
* perf: Account backup report
* perf: Account migrate
* perf: update service to application
* perf: update migrations
* perf: update logo
* feat: oracle accounts gather (#14571)
* feat: oracle accounts gather
* feat: sqlserver accounts gather
* feat: postgresql accounts gather
* feat: mysql accounts gather
---------
Co-authored-by: wangruidong <940853815@qq.com>
* feat: mongodb accounts gather
* perf: Change secret
* perf: Migrate
* perf: Merge conflicting migration files
* perf: Change secret
* perf: Automation filter org
* perf: Account push
* perf: Random secret string
* perf: Enhance SQL query and update risk handling in accounts
* perf: Ticket filter assignee_id
* perf: 修改 account remote
* perf: 修改一些 adhoc 任务
* perf: Change secret
* perf: Remove push account extra api
* perf: update status
* perf: The entire organization can view activity log
* fix: risk field check
* perf: add account details api
* perf: add demo mode
* perf: Delete gather_account
* perf: Perfect solution to account version problem
* perf: Update status action to handle multiple accounts
* perf: Add GatherAccountDetailField and update serializers
* perf: Display account history in combination with password change records
* perf: Lina translate
* fix: Update mysql_filter to handle nested user info
* perf: Admin connection token validate_permission account
* perf: copy move account
* perf: account filter risk
* perf: account risk filter
* perf: Copy move account failed message
* fix: gather account sync account to asset
* perf: Pam dashboard
* perf: Account dashboard total accounts
* perf: Pam dashboard
* perf: Change secret filter account secret_reset
* perf: 修改 risk filter
* perf: pam translate
* feat: Check for leaked duplicate passwords. (#14711)
* feat: Check for leaked duplicate passwords.
* perf: Use SQLite instead of txt as leak password database
---------
Co-authored-by: jiangweidong <1053570670@qq.com>
Co-authored-by: 老广 <ibuler@qq.com>
* perf: merge with remote
* perf: Add risk change_password_add handle
* perf: Pam dashboard
* perf: check account manager import
* perf: 重构扫描
* perf: 修改 db
* perf: Gather account manager
* perf: update change db lib
* perf: dashboard
* perf: Account gather
* perf: 修改 asset get queryset
* perf: automation report
* perf: Pam account
* perf: Pam dashboard api
* perf: risk add account
* perf: 修改 risk check
* perf: Risk account
* perf: update risk add reopen action
* perf: add pylintrc
* Revert "perf: automation report"
This reverts commit 22aee54207.
* perf: check account engine
* perf: Perf: Optimism Gather Report Style
* Perf: Remove unuser actions
* Perf: Perf push account
* perf: perf gather account
* perf: Automation report
* perf: Push account recorder
* perf: Push account record
* perf: Pam dashboard
* perf: perf
* perf: update intergration
* perf: integrations application detail add account tab page
* feat: Custom change password supports configuration of interactive items
* perf: Go and Python demo code
* perf: Custom secret change
* perf: add user filter
* perf: translate
* perf: Add demo code docs
* perf: update some i18n
* perf: update some i18n
* perf: Add Java, Node, Go, and cURL demo code
* perf: Translate
* perf: Change secret translate
* perf: Translate
* perf: update some i18n
* perf: translate
* perf: Ansible playbook
* perf: update some choice
* perf: update some choice
* perf: update account serializer remote unused code
* perf: conflict
* perf: update import
---------
Co-authored-by: ibuler <ibuler@qq.com>
Co-authored-by: feng <1304903146@qq.com>
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Co-authored-by: wangruidong <940853815@qq.com>
Co-authored-by: jiangweidong <1053570670@qq.com>
Co-authored-by: feng626 <57284900+feng626@users.noreply.github.com>
Co-authored-by: zhaojisen <1301338853@qq.com>
345 lines
12 KiB
Python
345 lines
12 KiB
Python
# -*- coding: utf-8 -*-
|
|
#
|
|
from importlib import import_module
|
|
|
|
from django.conf import settings
|
|
from django.db.models import F, Value, CharField, Q
|
|
from django.db.models.functions import Cast
|
|
from django.http import HttpResponse, FileResponse
|
|
from django.utils.encoding import escape_uri_path
|
|
from django_celery_beat.models import PeriodicTask
|
|
from rest_framework import generics
|
|
from rest_framework import status
|
|
from rest_framework import viewsets
|
|
from rest_framework.decorators import action
|
|
from rest_framework.permissions import IsAuthenticated
|
|
from rest_framework.response import Response
|
|
|
|
from common.api import CommonApiMixin
|
|
from common.const.http import GET, POST
|
|
from common.drf.filters import DatetimeRangeFilterBackend
|
|
from common.permissions import IsServiceAccount
|
|
from common.plugins.es import QuerySet as ESQuerySet
|
|
from common.sessions.cache import user_session_manager
|
|
from common.storage.ftp_file import FTPFileStorageHandler
|
|
from common.utils import is_uuid, get_logger, lazyproperty
|
|
from ops.const import Types
|
|
from ops.models import Job
|
|
from ops.serializers.job import JobSerializer
|
|
from orgs.mixins.api import OrgReadonlyModelViewSet, OrgModelViewSet
|
|
from orgs.models import Organization
|
|
from orgs.utils import current_org, tmp_to_root_org
|
|
from rbac.permissions import RBACPermission
|
|
from terminal.models import default_storage
|
|
from users.models import User
|
|
from .backends import TYPE_ENGINE_MAPPING
|
|
from .const import ActivityChoices
|
|
from .filters import UserSessionFilterSet, OperateLogFilterSet
|
|
from .models import (
|
|
FTPLog, UserLoginLog, OperateLog, PasswordChangeLog,
|
|
ActivityLog, JobLog, UserSession, IntegrationApplicationLog
|
|
)
|
|
from .serializers import (
|
|
FTPLogSerializer, UserLoginLogSerializer, JobLogSerializer,
|
|
OperateLogSerializer, OperateLogActionDetailSerializer,
|
|
PasswordChangeLogSerializer, ActivityUnionLogSerializer,
|
|
FileSerializer, UserSessionSerializer, JobsAuditSerializer,
|
|
ServiceAccessLogSerializer
|
|
)
|
|
from .utils import construct_userlogin_usernames
|
|
|
|
logger = get_logger(__name__)
|
|
|
|
|
|
class JobLogAuditViewSet(OrgReadonlyModelViewSet):
|
|
model = JobLog
|
|
extra_filter_backends = [DatetimeRangeFilterBackend]
|
|
date_range_filter_fields = [
|
|
('date_start', ('date_from', 'date_to'))
|
|
]
|
|
search_fields = ['creator__name', 'material']
|
|
filterset_fields = ['creator__name', 'material']
|
|
serializer_class = JobLogSerializer
|
|
ordering = ['-date_start']
|
|
|
|
|
|
class JobsAuditViewSet(OrgModelViewSet):
|
|
model = Job
|
|
search_fields = ['creator__name']
|
|
filterset_fields = ['creator__name']
|
|
serializer_class = JobsAuditSerializer
|
|
ordering = ['-is_periodic', '-date_updated']
|
|
http_method_names = ['get', 'options', 'patch']
|
|
|
|
def get_queryset(self):
|
|
queryset = super().get_queryset()
|
|
queryset = queryset.exclude(type=Types.upload_file).filter(instant=False)
|
|
return queryset
|
|
|
|
def perform_update(self, serializer):
|
|
job = self.get_object()
|
|
is_periodic = serializer.validated_data.get('is_periodic')
|
|
if job.is_periodic != is_periodic:
|
|
job.is_periodic = is_periodic
|
|
job.save()
|
|
name, task, args, kwargs = job.get_register_task()
|
|
task_obj = PeriodicTask.objects.filter(name=name).first()
|
|
if task_obj:
|
|
is_periodic = job.is_periodic
|
|
if task_obj.enabled != is_periodic:
|
|
task_obj.enabled = is_periodic
|
|
task_obj.save()
|
|
return super().perform_update(serializer)
|
|
|
|
|
|
class FTPLogViewSet(OrgModelViewSet):
|
|
model = FTPLog
|
|
serializer_class = FTPLogSerializer
|
|
extra_filter_backends = [DatetimeRangeFilterBackend]
|
|
date_range_filter_fields = [
|
|
('date_start', ('date_from', 'date_to'))
|
|
]
|
|
filterset_fields = ['user', 'asset', 'account', 'filename', 'session']
|
|
search_fields = filterset_fields
|
|
ordering = ['-date_start']
|
|
http_method_names = ['post', 'get', 'head', 'options', 'patch']
|
|
rbac_perms = {
|
|
'download': 'audits.view_ftplog',
|
|
}
|
|
|
|
def get_storage(self):
|
|
return FTPFileStorageHandler(self.get_object())
|
|
|
|
@action(
|
|
methods=[GET], detail=True, permission_classes=[RBACPermission, ],
|
|
url_path='file/download'
|
|
)
|
|
def download(self, request, *args, **kwargs):
|
|
ftp_log = self.get_object()
|
|
ftp_storage = self.get_storage()
|
|
local_path, url = ftp_storage.get_file_path_url()
|
|
if local_path is None:
|
|
# url => error message
|
|
return HttpResponse(url)
|
|
|
|
file = open(default_storage.path(local_path), 'rb')
|
|
response = FileResponse(file)
|
|
response['Content-Type'] = 'application/octet-stream'
|
|
filename = escape_uri_path(ftp_log.filename)
|
|
response["Content-Disposition"] = "attachment; filename*=UTF-8''{}".format(filename)
|
|
return response
|
|
|
|
@action(methods=[POST], detail=True, permission_classes=[IsServiceAccount, ], serializer_class=FileSerializer)
|
|
def upload(self, request, *args, **kwargs):
|
|
ftp_log = self.get_object()
|
|
serializer = self.get_serializer(data=request.data)
|
|
if serializer.is_valid():
|
|
file = serializer.validated_data['file']
|
|
name, err = ftp_log.save_file_to_storage(file)
|
|
if not name:
|
|
msg = "Failed save file `{}`: {}".format(ftp_log.id, err)
|
|
logger.error(msg)
|
|
return Response({'msg': str(err)}, status=400)
|
|
url = default_storage.url(name)
|
|
return Response({'url': url}, status=201)
|
|
else:
|
|
msg = 'Upload data invalid: {}'.format(serializer.errors)
|
|
logger.error(msg)
|
|
return Response({'msg': serializer.errors}, status=401)
|
|
|
|
|
|
class UserLoginCommonMixin:
|
|
model = UserLoginLog
|
|
serializer_class = UserLoginLogSerializer
|
|
extra_filter_backends = [DatetimeRangeFilterBackend]
|
|
date_range_filter_fields = [
|
|
('datetime', ('date_from', 'date_to'))
|
|
]
|
|
filterset_fields = ['id', 'username', 'ip', 'city', 'type', 'status', 'mfa']
|
|
search_fields = ['id', 'username', 'ip', 'city']
|
|
|
|
|
|
class UserLoginLogViewSet(UserLoginCommonMixin, OrgReadonlyModelViewSet):
|
|
@staticmethod
|
|
def get_org_member_usernames():
|
|
user_queryset = current_org.get_members()
|
|
users = construct_userlogin_usernames(user_queryset)
|
|
return users
|
|
|
|
def get_queryset(self):
|
|
queryset = super().get_queryset()
|
|
if current_org.is_root():
|
|
return queryset
|
|
users = self.get_org_member_usernames()
|
|
queryset = queryset.filter(username__in=users)
|
|
return queryset
|
|
|
|
|
|
class MyLoginLogViewSet(UserLoginCommonMixin, OrgReadonlyModelViewSet):
|
|
permission_classes = [IsAuthenticated]
|
|
|
|
def get_queryset(self):
|
|
qs = super().get_queryset()
|
|
username = self.request.user.username
|
|
q = Q(username=username) | Q(username__icontains=f'({username})')
|
|
qs = qs.filter(q)
|
|
return qs
|
|
|
|
|
|
class ResourceActivityAPIView(generics.ListAPIView):
|
|
serializer_class = ActivityUnionLogSerializer
|
|
ordering_fields = ['datetime']
|
|
rbac_perms = {
|
|
'GET': 'audits.view_activitylog',
|
|
}
|
|
|
|
@staticmethod
|
|
def get_operate_log_qs(fields, limit, org_q, resource_id=None):
|
|
q, user = Q(resource_id=resource_id), None
|
|
if is_uuid(resource_id):
|
|
user = User.objects.filter(id=resource_id).first()
|
|
if user is not None:
|
|
q |= Q(user=str(user))
|
|
queryset = OperateLog.objects.filter(q, org_q).annotate(
|
|
r_type=Value(ActivityChoices.operate_log, CharField()),
|
|
r_detail_id=Cast(F('id'), CharField()), r_detail=Value(None, CharField()),
|
|
r_user=F('user'), r_action=F('action'),
|
|
).values(*fields)[:limit]
|
|
return queryset
|
|
|
|
@staticmethod
|
|
def get_activity_log_qs(fields, limit, org_q, **filters):
|
|
queryset = ActivityLog.objects.filter(org_q, **filters).annotate(
|
|
r_type=F('type'), r_detail_id=F('detail_id'),
|
|
r_detail=F('detail'), r_user=Value(None, CharField()),
|
|
r_action=Value(None, CharField()),
|
|
).values(*fields)[:limit]
|
|
return queryset
|
|
|
|
def get_queryset(self):
|
|
limit = 30
|
|
resource_id = self.request.query_params.get('resource_id')
|
|
fields = (
|
|
'id', 'datetime', 'r_detail', 'r_detail_id',
|
|
'r_user', 'r_action', 'r_type'
|
|
)
|
|
|
|
org_q = Q()
|
|
if not current_org.is_root():
|
|
org_q = Q(org_id=Organization.SYSTEM_ID) | Q(org_id=current_org.id)
|
|
if resource_id:
|
|
org_q |= Q(org_id='') | Q(org_id=Organization.ROOT_ID)
|
|
|
|
with tmp_to_root_org():
|
|
qs1 = self.get_operate_log_qs(fields, limit, org_q, resource_id=resource_id)
|
|
qs2 = self.get_activity_log_qs(fields, limit, org_q, resource_id=resource_id)
|
|
queryset = qs2.union(qs1)
|
|
return queryset.order_by('-datetime')[:limit]
|
|
|
|
|
|
class OperateLogViewSet(OrgReadonlyModelViewSet):
|
|
model = OperateLog
|
|
serializer_class = OperateLogSerializer
|
|
extra_filter_backends = [DatetimeRangeFilterBackend]
|
|
date_range_filter_fields = [
|
|
('datetime', ('date_from', 'date_to'))
|
|
]
|
|
filterset_class = OperateLogFilterSet
|
|
search_fields = ['resource', 'user']
|
|
ordering = ['-datetime']
|
|
|
|
@lazyproperty
|
|
def is_action_detail(self):
|
|
return self.detail and self.request.query_params.get('type') == 'action_detail'
|
|
|
|
def get_serializer_class(self):
|
|
if self.is_action_detail:
|
|
return OperateLogActionDetailSerializer
|
|
return super().get_serializer_class()
|
|
|
|
def get_queryset(self):
|
|
qs = OperateLog.objects.all()
|
|
if self.is_action_detail:
|
|
with tmp_to_root_org():
|
|
qs |= OperateLog.objects.filter(org_id=Organization.SYSTEM_ID)
|
|
es_config = settings.OPERATE_LOG_ELASTICSEARCH_CONFIG
|
|
if es_config:
|
|
engine_mod = import_module(TYPE_ENGINE_MAPPING['es'])
|
|
store = engine_mod.OperateLogStore(es_config)
|
|
if store.ping(timeout=2):
|
|
qs = ESQuerySet(store)
|
|
qs.model = OperateLog
|
|
return qs
|
|
|
|
|
|
class PasswordChangeLogViewSet(OrgReadonlyModelViewSet):
|
|
model = PasswordChangeLog
|
|
serializer_class = PasswordChangeLogSerializer
|
|
extra_filter_backends = [DatetimeRangeFilterBackend]
|
|
date_range_filter_fields = [
|
|
('datetime', ('date_from', 'date_to'))
|
|
]
|
|
filterset_fields = ['user', 'change_by', 'remote_addr']
|
|
search_fields = filterset_fields
|
|
ordering = ['-datetime']
|
|
|
|
def get_queryset(self):
|
|
queryset = super().get_queryset()
|
|
if not current_org.is_root():
|
|
users = current_org.get_members()
|
|
queryset = queryset.filter(
|
|
user__in=[str(user) for user in users]
|
|
)
|
|
return queryset
|
|
|
|
|
|
class UserSessionViewSet(CommonApiMixin, viewsets.ModelViewSet):
|
|
http_method_names = ('get', 'post', 'head', 'options', 'trace')
|
|
serializer_class = UserSessionSerializer
|
|
filterset_class = UserSessionFilterSet
|
|
search_fields = ['id', 'ip', 'city']
|
|
rbac_perms = {
|
|
'offline': ['audits.offline_usersession']
|
|
}
|
|
|
|
@property
|
|
def org_user_ids(self):
|
|
user_ids = current_org.get_members().values_list('id', flat=True)
|
|
return user_ids
|
|
|
|
def get_queryset(self):
|
|
keys = user_session_manager.get_keys()
|
|
queryset = UserSession.objects.filter(key__in=keys)
|
|
if current_org.is_root():
|
|
return queryset
|
|
user_ids = self.org_user_ids
|
|
queryset = queryset.filter(user_id__in=user_ids)
|
|
return queryset
|
|
|
|
@action(['POST'], detail=False, url_path='offline')
|
|
def offline(self, request, *args, **kwargs):
|
|
ids = request.data.get('ids', [])
|
|
queryset = self.get_queryset()
|
|
session_key = request.session.session_key
|
|
queryset = queryset.exclude(key=session_key).filter(id__in=ids)
|
|
if not queryset.exists():
|
|
return Response(status=status.HTTP_200_OK)
|
|
|
|
keys = queryset.values_list('key', flat=True)
|
|
for key in keys:
|
|
user_session_manager.remove(key)
|
|
queryset.delete()
|
|
return Response(status=status.HTTP_200_OK)
|
|
|
|
|
|
class ServiceAccessLogViewSet(OrgReadonlyModelViewSet):
|
|
model = IntegrationApplicationLog
|
|
serializer_class = ServiceAccessLogSerializer
|
|
extra_filter_backends = [DatetimeRangeFilterBackend]
|
|
date_range_filter_fields = [
|
|
('datetime', ('date_from', 'date_to'))
|
|
]
|
|
filterset_fields = ['account', 'remote_addr', 'service_id']
|
|
search_fields = filterset_fields
|
|
ordering = ['-datetime']
|