mirror of
https://github.com/jumpserver/jumpserver.git
synced 2026-01-14 12:06:23 +00:00
* [Update] 添加org * [Update] 修改url * [Update] 完成基本框架 * [Update] 修改一些逻辑 * [Update] 修改用户view * [Update] 修改资产 * [Update] 修改asset api * [Update] 修改协议小问题 * [Update] stash it * [Update] 修改约束 * [Update] 修改外键为org_id * [Update] 删掉Premiddleware * [Update] 修改Node * [Update] 修改get_current_org 为 proxy对象 current_org * [Bugfix] 解决Node.root() 死循环,移动AdminRequired到permission中 (#1571) * [Update] 修改permission (#1574) * Tmp org (#1579) * [Update] 添加org api, 升级到django 2.0 * [Update] fix some bug * [Update] 修改一些bug * [Update] 添加授权规则org (#1580) * [Update] 修复创建授权规则,显示org_name不是有效UUID的bug * [Update] 更新org之间隔离授权规则,解决QuerySet与Manager问题;修复创建用户,显示org_name不是有效UUID之bug; * Tmp org (#1583) * [Update] 修改一些内容 * [Update] 修改datatable 支持process * [Bugfix] 修复asset queryset 没有valid方法的bug * [Update] 在线/历史/命令model添加org;修复命令记录保存org失败bug (#1584) * [Update] 修复创建授权规则,显示org_name不是有效UUID的bug * [Update] 更新org之间隔离授权规则,解决QuerySet与Manager问题;修复创建用户,显示org_name不是有效UUID之bug; * [Update] 在线/历史/命令model添加org * [Bugfix] 修复命令记录,保存org不成功bug * [Update] Org功能修改 * [Bugfix] 修复merge带来的问题 * [Update] org admin显示资产详情右侧选项卡;修复资产授权添加用户,会显示其他org用户的bug (#1594) * [Bugfix] 修复资产授权添加用户,显示其他org的用户bug * [Update] org admin 显示资产详情右侧选项卡 * Tmp org (#1596) * [Update] 修改index view * [Update] 修改nav * [Update] 修改profile * [Bugfix] 修复org下普通用户打开web终端看不到已被授权的资产和节点bug * [Update] 修改get_all_assets * [Bugfix] 修复节点前面有个空目录 * [Bugfix] 修复merge引起的bug * [Update] Add init * [Update] Node get_all_assets 过滤游离资产,条件nodes_key=None -> nodes=None * [Update] 恢复原来的api地址 * [Update] 修改api * [Bugfix] 修复org下用户查看我的资产不显示已授权节点/资产的bug * [Bugfix] Fix perm name unique * [Bugfix] 修复校验失败api * [Update] Merge with org * [Merge] 修改一下bug * [Update] 暂时修改一些url * [Update] 修改url 为django 2.0 path * [Update] 优化datatable 和显示组织优化 * [Update] 升级url * [Bugfix] 修复coco启动失败(load_config_from_server)、硬件刷新,测试连接,str 没有 decode(… (#1613) * [Bugfix] 修复coco启动失败(load_config_from_server)、硬件刷新,测试连接,str 没有 decode() method的bug * [Bugfix] (task任务系统)修复资产连接性测试、硬件刷新和系统用户连接性测试失败等bug * [Bugfix] 修复一些bug * [Bugfix] 修复一些bug * [Update] 更新org下普通用户的资产详情 (#1619) * [Update] 更新org下普通用户查看资产详情,只显示数据 * [Update] 优化org下普通用户查看资产详情前端代码 * [Update] 创建/更新用户的role选项;密码强度提示信息中英文; (#1623) * [Update] 修改 超级管理员/组织管理员 在 创建/更新 用户时role的选项 问题 * [Update] 用户密码强度提示信息支持中英文 * [Update] 修改token返回 * [Update] Asset返回org name * [Update] 修改支持xpack * [Update] 修改url * [Bugfix] 修复不登录就能查看资产的bug * [Update] 用户修改 * [Bugfix] ... * [Bugfix] 修复跳转错误的问题 * [Update] xpack/orgs组织添加删除功能-js; 修复Label继承Org后bug; (#1644) * [Update] 更新xpack下orgs的翻译信息 * [Update] 更新model Label,继承OrgModelMixin; * [Update] xpack/orgs组织添加删除功能-js; 修复Label继承Org后bug; * [Bugfix] 修复小bug * [Update] 优化一些api * [Update] 优化用户资产页面 * [Update] 更新 xpack/orgs 删除功能:限制在当前org下删除当前org (#1645) * [Update] 修改版本号
332 lines
11 KiB
Python
332 lines
11 KiB
Python
# ~*~ coding: utf-8 ~*~
|
||
#
|
||
|
||
from django.shortcuts import get_object_or_404
|
||
from rest_framework.views import APIView, Response
|
||
from rest_framework.generics import ListAPIView, get_object_or_404, RetrieveUpdateAPIView
|
||
from rest_framework import viewsets
|
||
|
||
from common.utils import set_or_append_attr_bulk, get_object_or_none
|
||
from common.permissions import IsValidUser, IsOrgAdmin, IsOrgAdminOrAppUser
|
||
from orgs.mixins import RootOrgViewMixin
|
||
from .utils import AssetPermissionUtil
|
||
from .models import AssetPermission
|
||
from .hands import AssetGrantedSerializer, User, UserGroup, Asset, Node, \
|
||
NodeGrantedSerializer, SystemUser, NodeSerializer
|
||
from . import serializers
|
||
|
||
|
||
class AssetPermissionViewSet(viewsets.ModelViewSet):
|
||
"""
|
||
资产授权列表的增删改查api
|
||
"""
|
||
queryset = AssetPermission.objects.all()
|
||
serializer_class = serializers.AssetPermissionCreateUpdateSerializer
|
||
permission_classes = (IsOrgAdmin,)
|
||
|
||
def get_serializer_class(self):
|
||
if self.action in ("list", 'retrieve'):
|
||
return serializers.AssetPermissionListSerializer
|
||
return self.serializer_class
|
||
|
||
def get_queryset(self):
|
||
queryset = super().get_queryset()
|
||
asset_id = self.request.query_params.get('asset')
|
||
node_id = self.request.query_params.get('node')
|
||
inherit_nodes = set()
|
||
if not asset_id and not node_id:
|
||
return queryset
|
||
|
||
permissions = set()
|
||
if asset_id:
|
||
asset = get_object_or_404(Asset, pk=asset_id)
|
||
permissions = set(queryset.filter(assets=asset))
|
||
for node in asset.nodes.all():
|
||
inherit_nodes.update(set(node.get_ancestor(with_self=True)))
|
||
elif node_id:
|
||
node = get_object_or_404(Node, pk=node_id)
|
||
permissions = set(queryset.filter(nodes=node))
|
||
inherit_nodes = node.get_ancestor()
|
||
|
||
for n in inherit_nodes:
|
||
_permissions = queryset.filter(nodes=n)
|
||
set_or_append_attr_bulk(_permissions, "inherit", n.value)
|
||
permissions.update(_permissions)
|
||
return permissions
|
||
|
||
|
||
class UserGrantedAssetsApi(RootOrgViewMixin, ListAPIView):
|
||
"""
|
||
用户授权的所有资产
|
||
"""
|
||
permission_classes = (IsOrgAdminOrAppUser,)
|
||
serializer_class = AssetGrantedSerializer
|
||
|
||
def get_queryset(self):
|
||
user_id = self.kwargs.get('pk', '')
|
||
queryset = []
|
||
|
||
if user_id:
|
||
user = get_object_or_404(User, id=user_id)
|
||
else:
|
||
user = self.request.user
|
||
|
||
util = AssetPermissionUtil(user)
|
||
for k, v in util.get_assets().items():
|
||
system_users_granted = [s for s in v if s.protocol == k.protocol]
|
||
k.system_users_granted = system_users_granted
|
||
queryset.append(k)
|
||
return queryset
|
||
|
||
def get_permissions(self):
|
||
if self.kwargs.get('pk') is None:
|
||
self.permission_classes = (IsValidUser,)
|
||
return super().get_permissions()
|
||
|
||
|
||
class UserGrantedNodesApi(RootOrgViewMixin, ListAPIView):
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = NodeSerializer
|
||
|
||
def get_queryset(self):
|
||
user_id = self.kwargs.get('pk', '')
|
||
if user_id:
|
||
user = get_object_or_404(User, id=user_id)
|
||
else:
|
||
user = self.request.user
|
||
util = AssetPermissionUtil(user)
|
||
nodes = util.get_nodes_with_assets()
|
||
return nodes.keys()
|
||
|
||
def get_permissions(self):
|
||
if self.kwargs.get('pk') is None:
|
||
self.permission_classes = (IsValidUser,)
|
||
return super().get_permissions()
|
||
|
||
|
||
class UserGrantedNodesWithAssetsApi(RootOrgViewMixin, ListAPIView):
|
||
permission_classes = (IsOrgAdminOrAppUser,)
|
||
serializer_class = NodeGrantedSerializer
|
||
|
||
def get_queryset(self):
|
||
user_id = self.kwargs.get('pk', '')
|
||
queryset = []
|
||
if not user_id:
|
||
user = self.request.user
|
||
else:
|
||
user = get_object_or_404(User, id=user_id)
|
||
|
||
util = AssetPermissionUtil(user)
|
||
nodes = util.get_nodes_with_assets()
|
||
for node, _assets in nodes.items():
|
||
assets = _assets.keys()
|
||
for k, v in _assets.items():
|
||
system_users_granted = [s for s in v if s.protocol == k.protocol]
|
||
k.system_users_granted = system_users_granted
|
||
node.assets_granted = assets
|
||
queryset.append(node)
|
||
return queryset
|
||
|
||
def get_permissions(self):
|
||
if self.kwargs.get('pk') is None:
|
||
self.permission_classes = (IsValidUser,)
|
||
return super().get_permissions()
|
||
|
||
|
||
class UserGrantedNodeAssetsApi(RootOrgViewMixin, ListAPIView):
|
||
permission_classes = (IsOrgAdminOrAppUser,)
|
||
serializer_class = AssetGrantedSerializer
|
||
|
||
def get_queryset(self):
|
||
user_id = self.kwargs.get('pk', '')
|
||
node_id = self.kwargs.get('node_id')
|
||
|
||
if user_id:
|
||
user = get_object_or_404(User, id=user_id)
|
||
else:
|
||
user = self.request.user
|
||
util = AssetPermissionUtil(user)
|
||
node = get_object_or_404(Node, id=node_id)
|
||
nodes = util.get_nodes_with_assets()
|
||
assets = nodes.get(node, [])
|
||
for asset, system_users in assets.items():
|
||
asset.system_users_granted = system_users
|
||
return assets
|
||
|
||
def get_permissions(self):
|
||
if self.kwargs.get('pk') is None:
|
||
self.permission_classes = (IsValidUser,)
|
||
return super().get_permissions()
|
||
|
||
|
||
class UserGroupGrantedAssetsApi(ListAPIView):
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = AssetGrantedSerializer
|
||
|
||
def get_queryset(self):
|
||
user_group_id = self.kwargs.get('pk', '')
|
||
queryset = []
|
||
|
||
if not user_group_id:
|
||
return queryset
|
||
|
||
user_group = get_object_or_404(UserGroup, id=user_group_id)
|
||
util = AssetPermissionUtil(user_group)
|
||
assets = util.get_assets()
|
||
for k, v in assets.items():
|
||
k.system_users_granted = v
|
||
queryset.append(k)
|
||
return queryset
|
||
|
||
|
||
class UserGroupGrantedNodesApi(ListAPIView):
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = NodeSerializer
|
||
|
||
def get_queryset(self):
|
||
group_id = self.kwargs.get('pk', '')
|
||
queryset = []
|
||
|
||
if group_id:
|
||
group = get_object_or_404(UserGroup, id=group_id)
|
||
util = AssetPermissionUtil(group)
|
||
nodes = util.get_nodes_with_assets()
|
||
return nodes.keys()
|
||
return queryset
|
||
|
||
|
||
class UserGroupGrantedNodesWithAssetsApi(ListAPIView):
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = NodeGrantedSerializer
|
||
|
||
def get_queryset(self):
|
||
user_group_id = self.kwargs.get('pk', '')
|
||
queryset = []
|
||
|
||
if not user_group_id:
|
||
return queryset
|
||
|
||
user_group = get_object_or_404(UserGroup, id=user_group_id)
|
||
util = AssetPermissionUtil(user_group)
|
||
nodes = util.get_nodes_with_assets()
|
||
for node, _assets in nodes.items():
|
||
assets = _assets.keys()
|
||
for asset, system_users in _assets.items():
|
||
asset.system_users_granted = system_users
|
||
node.assets_granted = assets
|
||
queryset.append(node)
|
||
return queryset
|
||
|
||
|
||
class UserGroupGrantedNodeAssetsApi(ListAPIView):
|
||
permission_classes = (IsOrgAdminOrAppUser,)
|
||
serializer_class = AssetGrantedSerializer
|
||
|
||
def get_queryset(self):
|
||
user_group_id = self.kwargs.get('pk', '')
|
||
node_id = self.kwargs.get('node_id')
|
||
|
||
user_group = get_object_or_404(UserGroup, id=user_group_id)
|
||
node = get_object_or_404(Node, id=node_id)
|
||
util = AssetPermissionUtil(user_group)
|
||
nodes = util.get_nodes_with_assets()
|
||
assets = nodes.get(node, [])
|
||
for asset, system_users in assets.items():
|
||
asset.system_users_granted = system_users
|
||
return assets
|
||
|
||
|
||
class ValidateUserAssetPermissionView(RootOrgViewMixin, APIView):
|
||
permission_classes = (IsOrgAdminOrAppUser,)
|
||
|
||
@staticmethod
|
||
def get(request):
|
||
user_id = request.query_params.get('user_id', '')
|
||
asset_id = request.query_params.get('asset_id', '')
|
||
system_id = request.query_params.get('system_user_id', '')
|
||
|
||
user = get_object_or_404(User, id=user_id)
|
||
asset = get_object_or_404(Asset, id=asset_id)
|
||
system_user = get_object_or_404(SystemUser, id=system_id)
|
||
|
||
util = AssetPermissionUtil(user)
|
||
assets_granted = util.get_assets()
|
||
if system_user in assets_granted.get(asset, []):
|
||
return Response({'msg': True}, status=200)
|
||
else:
|
||
return Response({'msg': False}, status=403)
|
||
|
||
|
||
class AssetPermissionRemoveUserApi(RetrieveUpdateAPIView):
|
||
"""
|
||
将用户从授权中移除,Detail页面会调用
|
||
"""
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = serializers.AssetPermissionUpdateUserSerializer
|
||
queryset = AssetPermission.objects.all()
|
||
|
||
def update(self, request, *args, **kwargs):
|
||
perm = self.get_object()
|
||
serializer = self.serializer_class(data=request.data)
|
||
if serializer.is_valid():
|
||
users = serializer.validated_data.get('users')
|
||
if users:
|
||
perm.users.remove(*tuple(users))
|
||
return Response({"msg": "ok"})
|
||
else:
|
||
return Response({"error": serializer.errors})
|
||
|
||
|
||
class AssetPermissionAddUserApi(RetrieveUpdateAPIView):
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = serializers.AssetPermissionUpdateUserSerializer
|
||
queryset = AssetPermission.objects.all()
|
||
|
||
def update(self, request, *args, **kwargs):
|
||
perm = self.get_object()
|
||
serializer = self.serializer_class(data=request.data)
|
||
if serializer.is_valid():
|
||
users = serializer.validated_data.get('users')
|
||
if users:
|
||
perm.users.add(*tuple(users))
|
||
return Response({"msg": "ok"})
|
||
else:
|
||
return Response({"error": serializer.errors})
|
||
|
||
|
||
class AssetPermissionRemoveAssetApi(RetrieveUpdateAPIView):
|
||
"""
|
||
将用户从授权中移除,Detail页面会调用
|
||
"""
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = serializers.AssetPermissionUpdateAssetSerializer
|
||
queryset = AssetPermission.objects.all()
|
||
|
||
def update(self, request, *args, **kwargs):
|
||
perm = self.get_object()
|
||
serializer = self.serializer_class(data=request.data)
|
||
if serializer.is_valid():
|
||
assets = serializer.validated_data.get('assets')
|
||
if assets:
|
||
perm.assets.remove(*tuple(assets))
|
||
return Response({"msg": "ok"})
|
||
else:
|
||
return Response({"error": serializer.errors})
|
||
|
||
|
||
class AssetPermissionAddAssetApi(RetrieveUpdateAPIView):
|
||
permission_classes = (IsOrgAdmin,)
|
||
serializer_class = serializers.AssetPermissionUpdateAssetSerializer
|
||
queryset = AssetPermission.objects.all()
|
||
|
||
def update(self, request, *args, **kwargs):
|
||
perm = self.get_object()
|
||
serializer = self.serializer_class(data=request.data)
|
||
if serializer.is_valid():
|
||
assets = serializer.validated_data.get('assets')
|
||
if assets:
|
||
perm.assets.add(*tuple(assets))
|
||
return Response({"msg": "ok"})
|
||
else:
|
||
return Response({"error": serializer.errors})
|