mirror of
https://github.com/ansible/awx.git
synced 2026-01-19 13:41:28 -03:30
344 lines
11 KiB
Python
344 lines
11 KiB
Python
# Copyright (c) 2015 Ansible, Inc.
|
|
# All Rights Reserved.
|
|
|
|
# Python
|
|
import datetime
|
|
import hashlib
|
|
import hmac
|
|
import uuid
|
|
|
|
# Django
|
|
from django.conf import settings
|
|
from django.db import models
|
|
from django.core.urlresolvers import reverse
|
|
from django.contrib.auth.models import User
|
|
from django.utils.timezone import now as tz_now
|
|
from django.utils.translation import ugettext_lazy as _
|
|
|
|
# AWX
|
|
from awx.main.fields import AutoOneToOneField, ImplicitRoleField
|
|
from awx.main.models.base import * # noqa
|
|
from awx.main.models.rbac import (
|
|
ROLE_SINGLETON_SYSTEM_ADMINISTRATOR,
|
|
ROLE_SINGLETON_SYSTEM_AUDITOR,
|
|
)
|
|
from awx.main.models.mixins import ResourceMixin
|
|
from awx.main.conf import tower_settings
|
|
|
|
__all__ = ['Organization', 'Team', 'Permission', 'Profile', 'AuthToken']
|
|
|
|
|
|
class Organization(CommonModel, NotificationFieldsModel, ResourceMixin):
|
|
'''
|
|
An organization is the basic unit of multi-tenancy divisions
|
|
'''
|
|
|
|
class Meta:
|
|
app_label = 'main'
|
|
ordering = ('name',)
|
|
|
|
deprecated_users = models.ManyToManyField(
|
|
'auth.User',
|
|
blank=True,
|
|
related_name='deprecated_organizations',
|
|
)
|
|
deprecated_admins = models.ManyToManyField(
|
|
'auth.User',
|
|
blank=True,
|
|
related_name='deprecated_admin_of_organizations',
|
|
)
|
|
deprecated_projects = models.ManyToManyField(
|
|
'Project',
|
|
blank=True,
|
|
related_name='deprecated_organizations',
|
|
)
|
|
admin_role = ImplicitRoleField(
|
|
role_name='Organization Administrator',
|
|
role_description='May manage all aspects of this organization',
|
|
parent_role='singleton:' + ROLE_SINGLETON_SYSTEM_ADMINISTRATOR,
|
|
)
|
|
auditor_role = ImplicitRoleField(
|
|
role_name='Organization Auditor',
|
|
role_description='May read all settings associated with this organization',
|
|
parent_role='singleton:' + ROLE_SINGLETON_SYSTEM_AUDITOR,
|
|
)
|
|
member_role = ImplicitRoleField(
|
|
role_name='Organization Member',
|
|
role_description='A member of this organization',
|
|
parent_role='admin_role',
|
|
)
|
|
read_role = ImplicitRoleField(
|
|
role_name='Organization Read Access',
|
|
role_description='Read an organization',
|
|
parent_role='member_role',
|
|
)
|
|
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('api:organization_detail', args=(self.pk,))
|
|
|
|
def __unicode__(self):
|
|
return self.name
|
|
|
|
|
|
|
|
class Team(CommonModelNameNotUnique, ResourceMixin):
|
|
'''
|
|
A team is a group of users that work on common projects.
|
|
'''
|
|
|
|
class Meta:
|
|
app_label = 'main'
|
|
unique_together = [('organization', 'name')]
|
|
ordering = ('organization__name', 'name')
|
|
|
|
deprecated_users = models.ManyToManyField(
|
|
'auth.User',
|
|
blank=True,
|
|
related_name='deprecated_teams',
|
|
)
|
|
organization = models.ForeignKey(
|
|
'Organization',
|
|
blank=False,
|
|
null=True,
|
|
on_delete=models.SET_NULL,
|
|
related_name='teams',
|
|
)
|
|
deprecated_projects = models.ManyToManyField(
|
|
'Project',
|
|
blank=True,
|
|
related_name='deprecated_teams',
|
|
)
|
|
admin_role = ImplicitRoleField(
|
|
role_name='Team Administrator',
|
|
role_description='May manage this team',
|
|
parent_role='organization.admin_role',
|
|
)
|
|
auditor_role = ImplicitRoleField(
|
|
role_name='Team Auditor',
|
|
role_description='May read all settings associated with this team',
|
|
parent_role='organization.auditor_role',
|
|
)
|
|
member_role = ImplicitRoleField(
|
|
role_name='Team Member',
|
|
role_description='A member of this team',
|
|
parent_role='admin_role',
|
|
)
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('api:team_detail', args=(self.pk,))
|
|
|
|
|
|
class Permission(CommonModelNameNotUnique):
|
|
'''
|
|
A permission allows a user, project, or team to be able to use an inventory source.
|
|
|
|
NOTE: This class is deprecated, permissions and access is to be handled by
|
|
our new RBAC system. This class should be able to be safely removed after a 3.0.0
|
|
migration. - anoek 2016-01-28
|
|
'''
|
|
|
|
class Meta:
|
|
app_label = 'main'
|
|
|
|
# permissions are granted to either a user or a team:
|
|
user = models.ForeignKey('auth.User', null=True, on_delete=models.SET_NULL, blank=True, related_name='permissions')
|
|
team = models.ForeignKey('Team', null=True, on_delete=models.SET_NULL, blank=True, related_name='permissions')
|
|
|
|
# to be used against a project or inventory (or a project and inventory in conjunction):
|
|
project = models.ForeignKey(
|
|
'Project',
|
|
blank=True,
|
|
null=True,
|
|
on_delete=models.SET_NULL,
|
|
related_name='permissions',
|
|
)
|
|
inventory = models.ForeignKey('Inventory', null=True, on_delete=models.SET_NULL, related_name='permissions')
|
|
|
|
# permission system explanation:
|
|
#
|
|
# for example, user A on inventory X has write permissions (PERM_INVENTORY_WRITE)
|
|
# team C on inventory X has read permissions (PERM_INVENTORY_READ)
|
|
# user A can create job templates (PERM_JOBTEMPLATE_CREATE)
|
|
# team C on inventory X and project Y has launch permissions (PERM_INVENTORY_DEPLOY)
|
|
# team C on inventory X and project Z has dry run permissions (PERM_INVENTORY_CHECK)
|
|
#
|
|
# basically for launching, permissions can be awarded to the whole inventory source or just the inventory source
|
|
# in context of a given project.
|
|
#
|
|
# the project parameter is not used when dealing with READ, WRITE, or ADMIN permissions.
|
|
|
|
permission_type = models.CharField(max_length=64, choices=PERMISSION_TYPE_CHOICES)
|
|
run_ad_hoc_commands = models.BooleanField(default=False,
|
|
help_text=_('Execute Commands on the Inventory'))
|
|
|
|
def __unicode__(self):
|
|
return unicode("Permission(name=%s,ON(user=%s,team=%s),FOR(project=%s,inventory=%s,type=%s%s))" % (
|
|
self.name,
|
|
self.user,
|
|
self.team,
|
|
self.project,
|
|
self.inventory,
|
|
self.permission_type,
|
|
'+adhoc' if self.run_ad_hoc_commands else '',
|
|
))
|
|
|
|
def get_absolute_url(self):
|
|
return reverse('api:permission_detail', args=(self.pk,))
|
|
|
|
|
|
class Profile(CreatedModifiedModel):
|
|
'''
|
|
Profile model related to User object. Currently stores LDAP DN for users
|
|
loaded from LDAP.
|
|
'''
|
|
|
|
class Meta:
|
|
app_label = 'main'
|
|
|
|
user = AutoOneToOneField(
|
|
'auth.User',
|
|
related_name='profile',
|
|
editable=False,
|
|
)
|
|
ldap_dn = models.CharField(
|
|
max_length=1024,
|
|
default='',
|
|
)
|
|
|
|
"""
|
|
Since expiration and session expiration is event driven a token could be
|
|
invalidated for both reasons. Further, we only support a single reason for a
|
|
session token being invalid. For this case, mark the token as expired.
|
|
|
|
Note: Again, because the value of reason is event based. The reason may not be
|
|
set (i.e. may equal '') even though a session is expired or a limit is reached.
|
|
"""
|
|
class AuthToken(BaseModel):
|
|
'''
|
|
Custom authentication tokens per user with expiration and request-specific
|
|
data.
|
|
'''
|
|
|
|
REASON_CHOICES = [
|
|
('', _('Token not invalidated')),
|
|
('timeout_reached', _('Token is expired')),
|
|
('limit_reached', _('Maximum per-user sessions reached')),
|
|
# invalid_token is not a used data-base value, but is returned by the
|
|
# api when a token is not found
|
|
('invalid_token', _('Invalid token')),
|
|
]
|
|
|
|
class Meta:
|
|
app_label = 'main'
|
|
|
|
key = models.CharField(max_length=40, primary_key=True)
|
|
user = models.ForeignKey('auth.User', related_name='auth_tokens',
|
|
on_delete=models.CASCADE)
|
|
created = models.DateTimeField(auto_now_add=True)
|
|
modified = models.DateTimeField(auto_now=True)
|
|
expires = models.DateTimeField(default=tz_now)
|
|
request_hash = models.CharField(max_length=40, blank=True, default='')
|
|
reason = models.CharField(
|
|
max_length=1024,
|
|
blank=True,
|
|
default='',
|
|
help_text=_('Reason the auth token was invalidated.')
|
|
)
|
|
|
|
@staticmethod
|
|
def reason_long(reason):
|
|
for x in AuthToken.REASON_CHOICES:
|
|
if x[0] == reason:
|
|
return unicode(x[1])
|
|
return None
|
|
|
|
@classmethod
|
|
def get_request_hash(cls, request):
|
|
h = hashlib.sha1()
|
|
h.update(settings.SECRET_KEY)
|
|
for header in settings.REMOTE_HOST_HEADERS:
|
|
value = request.META.get(header, '').split(',')[0].strip()
|
|
if value:
|
|
h.update(value)
|
|
break
|
|
h.update(request.META.get('HTTP_USER_AGENT', ''))
|
|
return h.hexdigest()
|
|
|
|
def save(self, *args, **kwargs):
|
|
if not self.pk:
|
|
self.refresh(save=False)
|
|
if not self.key:
|
|
self.key = self.generate_key()
|
|
return super(AuthToken, self).save(*args, **kwargs)
|
|
|
|
def refresh(self, now=None, save=True):
|
|
if not now:
|
|
now = tz_now()
|
|
if not self.pk or not self.is_expired(now=now):
|
|
self.expires = now + datetime.timedelta(seconds=tower_settings.AUTH_TOKEN_EXPIRATION)
|
|
if save:
|
|
self.save()
|
|
|
|
def invalidate(self, reason='timeout_reached', save=True):
|
|
if not AuthToken.reason_long(reason):
|
|
raise ValueError('Invalid reason specified')
|
|
self.reason = reason
|
|
if save:
|
|
self.save()
|
|
return reason
|
|
|
|
@staticmethod
|
|
def get_tokens_over_limit(user, now=None):
|
|
if now is None:
|
|
now = tz_now()
|
|
invalid_tokens = AuthToken.objects.none()
|
|
if tower_settings.AUTH_TOKEN_PER_USER != -1:
|
|
invalid_tokens = AuthToken.objects.filter(
|
|
user=user,
|
|
expires__gt=now,
|
|
reason='',
|
|
).order_by('-created')[tower_settings.AUTH_TOKEN_PER_USER:]
|
|
return invalid_tokens
|
|
|
|
def generate_key(self):
|
|
unique = uuid.uuid4()
|
|
return hmac.new(unique.bytes, digestmod=hashlib.sha1).hexdigest()
|
|
|
|
def is_expired(self, now=None):
|
|
if not now:
|
|
now = tz_now()
|
|
return bool(self.expires < now)
|
|
|
|
@property
|
|
def invalidated(self):
|
|
return bool(self.reason != '')
|
|
|
|
"""
|
|
Token is valid if it's in the set of unexpired tokens.
|
|
The unexpired token set is:
|
|
* tokens not expired
|
|
* limited to number of tokens per-user
|
|
* sorted by created on date
|
|
"""
|
|
def in_valid_tokens(self, now=None):
|
|
if not now:
|
|
now = tz_now()
|
|
valid_n_tokens_qs = self.user.auth_tokens.filter(
|
|
expires__gt=now,
|
|
reason='',
|
|
).order_by('-created')[0:tower_settings.AUTH_TOKEN_PER_USER]
|
|
valid_n_tokens = valid_n_tokens_qs.values_list('key', flat=True)
|
|
|
|
return bool(self.key in valid_n_tokens)
|
|
|
|
def __unicode__(self):
|
|
return self.key
|
|
|
|
|
|
# Add get_absolute_url method to User model if not present.
|
|
if not hasattr(User, 'get_absolute_url'):
|
|
def user_get_absolute_url(user):
|
|
return reverse('api:user_detail', args=(user.pk,))
|
|
User.add_to_class('get_absolute_url', user_get_absolute_url)
|