mirror of
https://github.com/jumpserver/jumpserver.git
synced 2026-04-08 13:23:17 +00:00
* feat: 添加 RBAC 应用模块 * feat: 添加 RBAC Model、API * feat: 添加 RBAC Model、API 2 * feat: 添加 RBAC Model、API 3 * feat: 添加 RBAC Model、API 4 * feat: RBAC * feat: RBAC * feat: RBAC * feat: RBAC * feat: RBAC * feat: RBAC 整理权限位 * feat: RBAC 整理权限位2 * feat: RBAC 整理权限位2 * feat: RBAC 整理权限位 * feat: RBAC 添加默认角色 * feat: RBAC 添加迁移文件;迁移用户角色->用户角色绑定 * feat: RBAC 添加迁移文件;迁移用户角色->用户角色绑定 * feat: RBAC 修改用户模块API * feat: RBAC 添加组织模块迁移文件 & 修改组织模块API * feat: RBAC 添加组织模块迁移文件 & 修改组织模块API * feat: RBAC 修改用户角色属性的使用 * feat: RBAC No.1 * xxx * perf: 暂存 * perf: ... * perf(rbac): 添加 perms 到 profile serializer 中 * stash * perf: 使用init * perf: 修改migrations * perf: rbac * stash * stash * pref: 修改rbac * stash it * stash: 先去修复其他bug * perf: 修改 role 添加 users * pref: 修改 RBAC Model * feat: 添加权限的 tree api * stash: 暂存一下 * stash: 暂存一下 * perf: 修改 model verbose name * feat: 添加model各种 verbose name * perf: 生成 migrations * perf: 优化权限位 * perf: 添加迁移脚本 * feat: 添加组织角色迁移 * perf: 添加迁移脚本 * stash * perf: 添加migrateion * perf: 暂存一下 * perf: 修改rbac * perf: stash it * fix: 迁移冲突 * fix: 迁移冲突 * perf: 暂存一下 * perf: 修改 rbac 逻辑 * stash: 暂存一下 * perf: 修改内置角色 * perf: 解决 root 组织的问题 * perf: stash it * perf: 优化 rbac * perf: 优化 rolebinding 处理 * perf: 完成用户离开组织的问题 * perf: 暂存一下 * perf: 修改翻译 * perf: 去掉了 IsSuperUser * perf: IsAppUser 去掉完成 * perf: 修改 connection token 的权限 * perf: 去掉导入的问题 * perf: perms define 格式,修改 app 用户 的全新啊 * perf: 修改 permission * perf: 去掉一些 org admin * perf: 去掉部分 org admin * perf: 再去掉点 org admin role * perf: 再去掉部分 org admin * perf: user 角色搜索 * perf: 去掉很多 js * perf: 添加权限位 * perf: 修改权限 * perf: 去掉一个 todo * merge: with dev * fix: 修复冲突 Co-authored-by: Bai <bugatti_it@163.com> Co-authored-by: Michael Bai <baijiangjie@gmail.com> Co-authored-by: ibuler <ibuler@qq.com>
222 lines
8.0 KiB
Python
222 lines
8.0 KiB
Python
from django.conf import settings
|
|
from django.utils.translation import ugettext_lazy as _
|
|
from rest_framework import serializers
|
|
|
|
from common.utils import validate_ssh_public_key
|
|
from ..models import User
|
|
|
|
from .user import UserSerializer
|
|
|
|
|
|
class UserOrgSerializer(serializers.Serializer):
|
|
id = serializers.CharField()
|
|
name = serializers.CharField()
|
|
is_default = serializers.BooleanField(read_only=True)
|
|
is_root = serializers.BooleanField(read_only=True)
|
|
|
|
|
|
class UserUpdatePasswordSerializer(serializers.ModelSerializer):
|
|
old_password = serializers.CharField(required=True, max_length=128, write_only=True)
|
|
new_password = serializers.CharField(required=True, max_length=128, write_only=True)
|
|
new_password_again = serializers.CharField(required=True, max_length=128, write_only=True)
|
|
|
|
class Meta:
|
|
model = User
|
|
fields = ['old_password', 'new_password', 'new_password_again']
|
|
|
|
def validate_old_password(self, value):
|
|
if not self.instance.check_password(value):
|
|
msg = _('The old password is incorrect')
|
|
raise serializers.ValidationError(msg)
|
|
return value
|
|
|
|
def validate_new_password(self, value):
|
|
from ..utils import check_password_rules
|
|
if not check_password_rules(value, is_org_admin=self.instance.is_org_admin):
|
|
msg = _('Password does not match security rules')
|
|
raise serializers.ValidationError(msg)
|
|
if self.instance.is_history_password(value):
|
|
limit_count = settings.OLD_PASSWORD_HISTORY_LIMIT_COUNT
|
|
msg = _('The new password cannot be the last {} passwords').format(limit_count)
|
|
raise serializers.ValidationError(msg)
|
|
return value
|
|
|
|
def validate_new_password_again(self, value):
|
|
if value != self.initial_data.get('new_password', ''):
|
|
msg = _('The newly set password is inconsistent')
|
|
raise serializers.ValidationError(msg)
|
|
return value
|
|
|
|
def update(self, instance, validated_data):
|
|
new_password = self.validated_data.get('new_password')
|
|
instance.reset_password(new_password)
|
|
return instance
|
|
|
|
|
|
class UserUpdateSecretKeySerializer(serializers.ModelSerializer):
|
|
new_secret_key = serializers.CharField(required=True, max_length=128, write_only=True)
|
|
new_secret_key_again = serializers.CharField(required=True, max_length=128, write_only=True)
|
|
|
|
class Meta:
|
|
model = User
|
|
fields = ['new_secret_key', 'new_secret_key_again']
|
|
|
|
def validate_new_secret_key_again(self, value):
|
|
if value != self.initial_data.get('new_secret_key', ''):
|
|
msg = _('The newly set password is inconsistent')
|
|
raise serializers.ValidationError(msg)
|
|
return value
|
|
|
|
def update(self, instance, validated_data):
|
|
new_secret_key = self.validated_data.get('new_secret_key')
|
|
instance.secret_key = new_secret_key
|
|
instance.save()
|
|
return instance
|
|
|
|
|
|
class UserUpdatePublicKeySerializer(serializers.ModelSerializer):
|
|
public_key_comment = serializers.CharField(
|
|
source='get_public_key_comment', required=False, read_only=True, max_length=128
|
|
)
|
|
public_key_hash_md5 = serializers.CharField(
|
|
source='get_public_key_hash_md5', required=False, read_only=True, max_length=128
|
|
)
|
|
|
|
class Meta:
|
|
model = User
|
|
fields = ['public_key_comment', 'public_key_hash_md5', 'public_key']
|
|
extra_kwargs = {
|
|
'public_key': {'required': True, 'write_only': True, 'max_length': 2048}
|
|
}
|
|
|
|
@staticmethod
|
|
def validate_public_key(value):
|
|
if not validate_ssh_public_key(value):
|
|
raise serializers.ValidationError(_('Not a valid ssh public key'))
|
|
return value
|
|
|
|
def update(self, instance, validated_data):
|
|
new_public_key = self.validated_data.get('public_key')
|
|
instance.set_public_key(new_public_key)
|
|
return instance
|
|
|
|
|
|
class UserRoleSerializer(serializers.Serializer):
|
|
name = serializers.CharField(max_length=24)
|
|
display = serializers.CharField(max_length=64)
|
|
|
|
|
|
class UserProfileSerializer(UserSerializer):
|
|
MFA_LEVEL_CHOICES = (
|
|
(0, _('Disable')),
|
|
(1, _('Enable')),
|
|
)
|
|
|
|
public_key_comment = serializers.CharField(
|
|
source='get_public_key_comment', required=False, read_only=True, max_length=128
|
|
)
|
|
public_key_hash_md5 = serializers.CharField(
|
|
source='get_public_key_hash_md5', required=False, read_only=True, max_length=128
|
|
)
|
|
mfa_level = serializers.ChoiceField(choices=MFA_LEVEL_CHOICES, label=_('MFA'), required=False)
|
|
guide_url = serializers.SerializerMethodField()
|
|
receive_backends = serializers.ListField(child=serializers.CharField(), read_only=True)
|
|
orgs = UserOrgSerializer(many=True, read_only=True, source='all_orgs')
|
|
perms = serializers.ListField(label=_("Perms"), read_only=True)
|
|
|
|
class Meta(UserSerializer.Meta):
|
|
read_only_fields = [
|
|
'date_joined', 'last_login', 'created_by', 'source',
|
|
'receive_backends', 'orgs', 'perms',
|
|
]
|
|
fields = UserSerializer.Meta.fields + [
|
|
'public_key_comment', 'public_key_hash_md5', 'guide_url',
|
|
] + read_only_fields
|
|
|
|
extra_kwargs = dict(UserSerializer.Meta.extra_kwargs)
|
|
extra_kwargs.update({
|
|
'name': {'read_only': True, 'max_length': 128},
|
|
'username': {'read_only': True, 'max_length': 128},
|
|
'email': {'read_only': True},
|
|
'is_first_login': {'label': _('Is first login'), 'read_only': False},
|
|
'source': {'read_only': True},
|
|
'is_valid': {'read_only': True},
|
|
'is_active': {'read_only': True},
|
|
'groups': {'read_only': True},
|
|
'password_strategy': {'read_only': True},
|
|
'date_expired': {'read_only': True},
|
|
'date_joined': {'read_only': True},
|
|
'last_login': {'read_only': True},
|
|
'system_roles': {'read_only': True},
|
|
'org_roles': {'read_only': True},
|
|
})
|
|
|
|
if 'password' in fields:
|
|
fields.remove('password')
|
|
extra_kwargs.pop('password', None)
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
super().__init__(*args, **kwargs)
|
|
system_roles_field = self.fields.get('system_roles')
|
|
org_roles_field = self.fields.get('org_roles')
|
|
system_roles_field.read_only = True
|
|
org_roles_field.read_only = True
|
|
|
|
@staticmethod
|
|
def get_guide_url(obj):
|
|
return settings.USER_GUIDE_URL
|
|
|
|
def validate_mfa_level(self, mfa_level):
|
|
if self.instance and self.instance.mfa_force_enabled:
|
|
return 2
|
|
return mfa_level
|
|
|
|
def validate_public_key(self, public_key):
|
|
if self.instance and self.instance.can_update_ssh_key():
|
|
if not validate_ssh_public_key(public_key):
|
|
raise serializers.ValidationError(_('Not a valid ssh public key'))
|
|
return public_key
|
|
return None
|
|
|
|
def validate_password(self, password):
|
|
from rbac.models import Role
|
|
from ..utils import check_password_rules
|
|
if not self.instance:
|
|
return password
|
|
|
|
is_org_admin = self.instance.org_roles.filter(
|
|
name=Role.BuiltinRole.org_admin.name
|
|
).exsits()
|
|
if not check_password_rules(password, is_org_admin=is_org_admin):
|
|
msg = _('Password does not match security rules')
|
|
raise serializers.ValidationError(msg)
|
|
return password
|
|
|
|
|
|
class UserPKUpdateSerializer(serializers.ModelSerializer):
|
|
class Meta:
|
|
model = User
|
|
fields = ['id', 'public_key']
|
|
|
|
@staticmethod
|
|
def validate_public_key(value):
|
|
if not validate_ssh_public_key(value):
|
|
raise serializers.ValidationError(_('Not a valid ssh public key'))
|
|
return value
|
|
|
|
|
|
class ChangeUserPasswordSerializer(serializers.ModelSerializer):
|
|
class Meta:
|
|
model = User
|
|
fields = ['password']
|
|
|
|
|
|
class ResetOTPSerializer(serializers.Serializer):
|
|
msg = serializers.CharField(read_only=True)
|
|
|
|
def create(self, validated_data):
|
|
pass
|
|
|
|
def update(self, instance, validated_data):
|
|
pass
|