Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
J
jumpserver
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
ops
jumpserver
Commits
a654bbef
Commit
a654bbef
authored
Aug 07, 2019
by
ibuler
Browse files
Options
Browse Files
Download
Plain Diff
[Update] Merge
parents
62c1b488
c3a206b2
Expand all
Show whitespace changes
Inline
Side-by-side
Showing
17 changed files
with
158 additions
and
30 deletions
+158
-30
node.py
apps/assets/models/node.py
+2
-1
base.py
apps/assets/serializers/base.py
+1
-0
system_user.py
apps/assets/serializers/system_user.py
+11
-1
forms.py
apps/authentication/forms.py
+31
-2
login.html
apps/authentication/templates/authentication/login.html
+2
-0
new_login.html
apps/authentication/templates/authentication/new_login.html
+3
-1
login.py
apps/authentication/views/login.py
+1
-0
permissions.py
apps/common/permissions.py
+4
-0
django.mo
apps/locale/zh/LC_MESSAGES/django.mo
+0
-0
django.po
apps/locale/zh/LC_MESSAGES/django.po
+0
-0
command.py
apps/ops/api/command.py
+2
-1
elfinder.zh_CN.js
apps/static/plugins/elfinder/i18n/elfinder.zh_CN.js
+1
-1
_message.html
apps/templates/_message.html
+16
-0
v1.py
apps/terminal/serializers/v1.py
+1
-0
user.py
apps/users/models/user.py
+12
-0
tasks.py
apps/users/tasks.py
+27
-5
utils.py
apps/users/utils.py
+44
-18
No files found.
apps/assets/models/node.py
View file @
a654bbef
...
@@ -212,12 +212,13 @@ class AssetsAmountMixin:
...
@@ -212,12 +212,13 @@ class AssetsAmountMixin:
if
cached
is
not
None
:
if
cached
is
not
None
:
return
cached
return
cached
assets_amount
=
self
.
get_all_assets
()
.
count
()
assets_amount
=
self
.
get_all_assets
()
.
count
()
cache
.
set
(
cache_key
,
assets_amount
,
self
.
cache_time
)
return
assets_amount
return
assets_amount
@assets_amount.setter
@assets_amount.setter
def
assets_amount
(
self
,
value
):
def
assets_amount
(
self
,
value
):
self
.
_assets_amount
=
value
self
.
_assets_amount
=
value
cache_key
=
self
.
_assets_amount_cache_key
.
format
(
self
.
key
)
cache
.
set
(
cache_key
,
value
,
self
.
cache_time
)
def
expire_assets_amount
(
self
):
def
expire_assets_amount
(
self
):
ancestor_keys
=
self
.
get_ancestor_keys
(
with_self
=
True
)
ancestor_keys
=
self
.
get_ancestor_keys
(
with_self
=
True
)
...
...
apps/assets/serializers/base.py
View file @
a654bbef
...
@@ -59,6 +59,7 @@ class AuthSerializerMixin:
...
@@ -59,6 +59,7 @@ class AuthSerializerMixin:
value
=
validated_data
.
get
(
field
)
value
=
validated_data
.
get
(
field
)
if
not
value
:
if
not
value
:
validated_data
.
pop
(
field
,
None
)
validated_data
.
pop
(
field
,
None
)
# print(validated_data)
# print(validated_data)
# raise serializers.ValidationError(">>>>>>")
# raise serializers.ValidationError(">>>>>>")
...
...
apps/assets/serializers/system_user.py
View file @
a654bbef
...
@@ -3,6 +3,7 @@ from rest_framework import serializers
...
@@ -3,6 +3,7 @@ from rest_framework import serializers
from
django.utils.translation
import
ugettext_lazy
as
_
from
django.utils.translation
import
ugettext_lazy
as
_
from
common.serializers
import
AdaptedBulkListSerializer
from
common.serializers
import
AdaptedBulkListSerializer
from
common.utils
import
ssh_pubkey_gen
from
orgs.mixins
import
BulkOrgResourceModelSerializer
from
orgs.mixins
import
BulkOrgResourceModelSerializer
from
..models
import
SystemUser
from
..models
import
SystemUser
from
.base
import
AuthSerializer
,
AuthSerializerMixin
from
.base
import
AuthSerializer
,
AuthSerializerMixin
...
@@ -71,7 +72,9 @@ class SystemUserSerializer(AuthSerializerMixin, BulkOrgResourceModelSerializer):
...
@@ -71,7 +72,9 @@ class SystemUserSerializer(AuthSerializerMixin, BulkOrgResourceModelSerializer):
super
()
.
validate_password
(
password
)
super
()
.
validate_password
(
password
)
auto_gen_key
=
self
.
initial_data
.
get
(
"auto_generate_key"
,
False
)
auto_gen_key
=
self
.
initial_data
.
get
(
"auto_generate_key"
,
False
)
private_key
=
self
.
initial_data
.
get
(
"private_key"
)
private_key
=
self
.
initial_data
.
get
(
"private_key"
)
if
not
self
.
instance
and
not
auto_gen_key
and
not
password
and
not
private_key
:
login_mode
=
self
.
initial_data
.
get
(
"login_mode"
)
if
not
self
.
instance
and
not
auto_gen_key
and
not
password
and
\
not
private_key
and
login_mode
==
SystemUser
.
LOGIN_AUTO
:
raise
serializers
.
ValidationError
(
_
(
"Password or private key required"
))
raise
serializers
.
ValidationError
(
_
(
"Password or private key required"
))
return
password
return
password
...
@@ -86,6 +89,13 @@ class SystemUserSerializer(AuthSerializerMixin, BulkOrgResourceModelSerializer):
...
@@ -86,6 +89,13 @@ class SystemUserSerializer(AuthSerializerMixin, BulkOrgResourceModelSerializer):
private_key
,
public_key
=
SystemUser
.
gen_key
(
username
)
private_key
,
public_key
=
SystemUser
.
gen_key
(
username
)
attrs
[
"private_key"
]
=
private_key
attrs
[
"private_key"
]
=
private_key
attrs
[
"public_key"
]
=
public_key
attrs
[
"public_key"
]
=
public_key
# 如果设置了private key,没有设置public key则生成
elif
attrs
.
get
(
"private_key"
,
None
):
private_key
=
attrs
[
"private_key"
]
password
=
attrs
.
get
(
"password"
)
public_key
=
ssh_pubkey_gen
(
private_key
,
password
=
password
,
username
=
username
)
attrs
[
"public_key"
]
=
public_key
attrs
.
pop
(
"auto_generate_key"
,
None
)
attrs
.
pop
(
"auto_generate_key"
,
None
)
return
attrs
return
attrs
...
...
apps/authentication/forms.py
View file @
a654bbef
...
@@ -5,6 +5,8 @@ from django import forms
...
@@ -5,6 +5,8 @@ from django import forms
from
django.contrib.auth.forms
import
AuthenticationForm
from
django.contrib.auth.forms
import
AuthenticationForm
from
django.utils.translation
import
gettext_lazy
as
_
from
django.utils.translation
import
gettext_lazy
as
_
from
captcha.fields
import
CaptchaField
from
captcha.fields
import
CaptchaField
from
django.conf
import
settings
from
users.utils
import
get_login_failed_count
class
UserLoginForm
(
AuthenticationForm
):
class
UserLoginForm
(
AuthenticationForm
):
...
@@ -16,10 +18,18 @@ class UserLoginForm(AuthenticationForm):
...
@@ -16,10 +18,18 @@ class UserLoginForm(AuthenticationForm):
error_messages
=
{
error_messages
=
{
'invalid_login'
:
_
(
'invalid_login'
:
_
(
"
Please enter a correct username and password. Note that both
"
"
The username or password you entered is incorrect,
"
"
fields may be case-sensitive
."
"
please enter it again
."
),
),
'inactive'
:
_
(
"This account is inactive."
),
'inactive'
:
_
(
"This account is inactive."
),
'limit_login'
:
_
(
"You can also try {times_try} times "
"(The account will be temporarily locked for {block_time} minutes)"
),
'block_login'
:
_
(
"The account has been locked "
"(please contact admin to unlock it or try again after {} minutes)"
)
}
}
def
confirm_login_allowed
(
self
,
user
):
def
confirm_login_allowed
(
self
,
user
):
...
@@ -28,6 +38,25 @@ class UserLoginForm(AuthenticationForm):
...
@@ -28,6 +38,25 @@ class UserLoginForm(AuthenticationForm):
self
.
error_messages
[
'inactive'
],
self
.
error_messages
[
'inactive'
],
code
=
'inactive'
,)
code
=
'inactive'
,)
def
get_limit_login_error_message
(
self
,
username
,
ip
):
times_up
=
settings
.
SECURITY_LOGIN_LIMIT_COUNT
times_failed
=
get_login_failed_count
(
username
,
ip
)
times_try
=
int
(
times_up
)
-
int
(
times_failed
)
block_time
=
settings
.
SECURITY_LOGIN_LIMIT_TIME
if
times_try
<=
0
:
error_message
=
self
.
error_messages
[
'block_login'
]
error_message
=
error_message
.
format
(
block_time
)
else
:
error_message
=
self
.
error_messages
[
'limit_login'
]
error_message
=
error_message
.
format
(
times_try
=
times_try
,
block_time
=
block_time
,
)
return
error_message
def
add_limit_login_error
(
self
,
username
,
ip
):
error
=
self
.
get_limit_login_error_message
(
username
,
ip
)
self
.
add_error
(
'password'
,
error
)
class
UserLoginCaptchaForm
(
UserLoginForm
):
class
UserLoginCaptchaForm
(
UserLoginForm
):
captcha
=
CaptchaField
()
captcha
=
CaptchaField
()
...
...
apps/authentication/templates/authentication/login.html
View file @
a654bbef
...
@@ -58,6 +58,7 @@
...
@@ -58,6 +58,7 @@
{% else %}
{% else %}
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
{% endif %}
{% endif %}
<p
class=
"red-fonts"
>
{{ form.errors.password.as_text }}
</p>
{% endif %}
{% endif %}
<div
class=
"form-group"
>
<div
class=
"form-group"
>
...
@@ -83,6 +84,7 @@
...
@@ -83,6 +84,7 @@
<small>
{% trans 'Forgot password' %}?
</small>
<small>
{% trans 'Forgot password' %}?
</small>
</a>
</a>
</div>
</div>
</div>
{% if AUTH_OPENID %}
{% if AUTH_OPENID %}
<div
class=
"hr-line-dashed"
></div>
<div
class=
"hr-line-dashed"
></div>
...
...
apps/authentication/templates/authentication/new_login.html
View file @
a654bbef
...
@@ -72,9 +72,10 @@
...
@@ -72,9 +72,10 @@
<div
class=
"contact-form col-md-10"
style=
"margin-top: 10px;height: 35px"
>
<div
class=
"contact-form col-md-10"
style=
"margin-top: 10px;height: 35px"
>
<form
id=
"contact-form"
action=
""
method=
"post"
role=
"form"
novalidate=
"novalidate"
>
<form
id=
"contact-form"
action=
""
method=
"post"
role=
"form"
novalidate=
"novalidate"
>
{% csrf_token %}
{% csrf_token %}
<div
style=
"height:
45
px;color: red;line-height: 17px;"
>
<div
style=
"height:
70
px;color: red;line-height: 17px;"
>
{% if block_login %}
{% if block_login %}
<p
class=
"red-fonts"
>
{% trans 'Log in frequently and try again later' %}
</p>
<p
class=
"red-fonts"
>
{% trans 'Log in frequently and try again later' %}
</p>
<p
class=
"red-fonts"
>
{{ form.errors.password.as_text }}
</p>
{% elif password_expired %}
{% elif password_expired %}
<p
class=
"red-fonts"
>
{% trans 'The user password has expired' %}
</p>
<p
class=
"red-fonts"
>
{% trans 'The user password has expired' %}
</p>
{% elif form.errors %}
{% elif form.errors %}
...
@@ -83,6 +84,7 @@
...
@@ -83,6 +84,7 @@
{% else %}
{% else %}
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
{% endif %}
{% endif %}
<p
class=
"red-fonts"
>
{{ form.errors.password.as_text }}
</p>
{% endif %}
{% endif %}
</div>
</div>
...
...
apps/authentication/views/login.py
View file @
a654bbef
...
@@ -101,6 +101,7 @@ class UserLoginView(FormView):
...
@@ -101,6 +101,7 @@ class UserLoginView(FormView):
# limit user login failed count
# limit user login failed count
ip
=
get_request_ip
(
self
.
request
)
ip
=
get_request_ip
(
self
.
request
)
increase_login_failed_count
(
username
,
ip
)
increase_login_failed_count
(
username
,
ip
)
form
.
add_limit_login_error
(
username
,
ip
)
# show captcha
# show captcha
cache
.
set
(
self
.
key_prefix_captcha
.
format
(
ip
),
1
,
3600
)
cache
.
set
(
self
.
key_prefix_captcha
.
format
(
ip
),
1
,
3600
)
self
.
send_auth_signal
(
success
=
False
,
username
=
username
,
reason
=
reason
)
self
.
send_auth_signal
(
success
=
False
,
username
=
username
,
reason
=
reason
)
...
...
apps/common/permissions.py
View file @
a654bbef
...
@@ -49,6 +49,8 @@ class IsOrgAdmin(IsValidUser):
...
@@ -49,6 +49,8 @@ class IsOrgAdmin(IsValidUser):
"""Allows access only to superuser"""
"""Allows access only to superuser"""
def
has_permission
(
self
,
request
,
view
):
def
has_permission
(
self
,
request
,
view
):
if
not
current_org
:
return
False
return
super
(
IsOrgAdmin
,
self
)
.
has_permission
(
request
,
view
)
\
return
super
(
IsOrgAdmin
,
self
)
.
has_permission
(
request
,
view
)
\
and
current_org
.
can_admin_by
(
request
.
user
)
and
current_org
.
can_admin_by
(
request
.
user
)
...
@@ -57,6 +59,8 @@ class IsOrgAdminOrAppUser(IsValidUser):
...
@@ -57,6 +59,8 @@ class IsOrgAdminOrAppUser(IsValidUser):
"""Allows access between superuser and app user"""
"""Allows access between superuser and app user"""
def
has_permission
(
self
,
request
,
view
):
def
has_permission
(
self
,
request
,
view
):
if
not
current_org
:
return
False
return
super
(
IsOrgAdminOrAppUser
,
self
)
.
has_permission
(
request
,
view
)
\
return
super
(
IsOrgAdminOrAppUser
,
self
)
.
has_permission
(
request
,
view
)
\
and
(
current_org
.
can_admin_by
(
request
.
user
)
or
request
.
user
.
is_app
)
and
(
current_org
.
can_admin_by
(
request
.
user
)
or
request
.
user
.
is_app
)
...
...
apps/locale/zh/LC_MESSAGES/django.mo
View file @
a654bbef
No preview for this file type
apps/locale/zh/LC_MESSAGES/django.po
View file @
a654bbef
This diff is collapsed.
Click to expand it.
apps/ops/api/command.py
View file @
a654bbef
...
@@ -4,13 +4,14 @@ from rest_framework import viewsets
...
@@ -4,13 +4,14 @@ from rest_framework import viewsets
from
django.db
import
transaction
from
django.db
import
transaction
from
django.conf
import
settings
from
django.conf
import
settings
from
orgs.mixins
import
RootOrgViewMixin
from
common.permissions
import
IsValidUser
from
common.permissions
import
IsValidUser
from
..models
import
CommandExecution
from
..models
import
CommandExecution
from
..serializers
import
CommandExecutionSerializer
from
..serializers
import
CommandExecutionSerializer
from
..tasks
import
run_command_execution
from
..tasks
import
run_command_execution
class
CommandExecutionViewSet
(
viewsets
.
ModelViewSet
):
class
CommandExecutionViewSet
(
RootOrgViewMixin
,
viewsets
.
ModelViewSet
):
serializer_class
=
CommandExecutionSerializer
serializer_class
=
CommandExecutionSerializer
permission_classes
=
(
IsValidUser
,)
permission_classes
=
(
IsValidUser
,)
...
...
apps/static/plugins/elfinder/i18n/elfinder.zh_CN.js
View file @
a654bbef
...
@@ -422,7 +422,7 @@
...
@@ -422,7 +422,7 @@
'minsLeft'
:
'剩余 $1 分钟'
,
// from v2.1.17 added 13.11.2016
'minsLeft'
:
'剩余 $1 分钟'
,
// from v2.1.17 added 13.11.2016
'openAsEncoding'
:
'使用所选编码重新打开'
,
// from v2.1.19 added 2.12.2016
'openAsEncoding'
:
'使用所选编码重新打开'
,
// from v2.1.19 added 2.12.2016
'saveAsEncoding'
:
'使用所选编码保存'
,
// from v2.1.19 added 2.12.2016
'saveAsEncoding'
:
'使用所选编码保存'
,
// from v2.1.19 added 2.12.2016
'selectFolder'
:
'选择目录
(暂不支持)
'
,
// from v2.1.20 added 13.12.2016
'selectFolder'
:
'选择目录'
,
// from v2.1.20 added 13.12.2016
'firstLetterSearch'
:
'首字母搜索'
,
// from v2.1.23 added 24.3.2017
'firstLetterSearch'
:
'首字母搜索'
,
// from v2.1.23 added 24.3.2017
'presets'
:
'预置'
,
// from v2.1.25 added 26.5.2017
'presets'
:
'预置'
,
// from v2.1.25 added 26.5.2017
'tooManyToTrash'
:
'项目太多,不能移动到回收站.'
,
// from v2.1.25 added 9.6.2017
'tooManyToTrash'
:
'项目太多,不能移动到回收站.'
,
// from v2.1.25 added 9.6.2017
...
...
apps/templates/_message.html
View file @
a654bbef
{% load i18n %}
{% load i18n %}
{% block user_expired_message %}
{% if request.user.is_expired %}
<div
class=
"alert alert-danger help-message alert-dismissable"
>
{% blocktrans %}
Your account has expired, please contact the administrator.
{% endblocktrans %}
<button
aria-hidden=
"true"
data-dismiss=
"alert"
class=
"close"
type=
"button"
style=
"outline: none;"
>
×
</button>
</div>
{% elif request.user.will_expired %}
<div
class=
"alert alert-danger help-message alert-dismissable"
>
{% trans 'Your account will at' %} {{ request.user.date_expired }} {% trans 'expired. ' %}
<button
aria-hidden=
"true"
data-dismiss=
"alert"
class=
"close"
type=
"button"
style=
"outline: none;"
>
×
</button>
</div>
{% endif %}
{% endblock %}
{% block password_expired_message %}
{% block password_expired_message %}
{% url 'users:user-password-update' as user_password_update_url %}
{% url 'users:user-password-update' as user_password_update_url %}
{% if request.user.password_has_expired %}
{% if request.user.password_has_expired %}
...
...
apps/terminal/serializers/v1.py
View file @
a654bbef
...
@@ -27,6 +27,7 @@ class TerminalSerializer(serializers.ModelSerializer):
...
@@ -27,6 +27,7 @@ class TerminalSerializer(serializers.ModelSerializer):
class
SessionSerializer
(
BulkOrgResourceModelSerializer
):
class
SessionSerializer
(
BulkOrgResourceModelSerializer
):
command_amount
=
serializers
.
IntegerField
(
read_only
=
True
)
command_amount
=
serializers
.
IntegerField
(
read_only
=
True
)
org_id
=
serializers
.
CharField
(
allow_blank
=
True
)
class
Meta
:
class
Meta
:
model
=
Session
model
=
Session
...
...
apps/users/models/user.py
View file @
a654bbef
...
@@ -403,6 +403,18 @@ class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, AbstractUser):
...
@@ -403,6 +403,18 @@ class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, AbstractUser):
else
:
else
:
return
False
return
False
@property
def
expired_remain_days
(
self
):
date_remain
=
self
.
date_expired
-
timezone
.
now
()
return
date_remain
.
days
@property
def
will_expired
(
self
):
if
0
<=
self
.
expired_remain_days
<
5
:
return
True
else
:
return
False
@property
@property
def
is_valid
(
self
):
def
is_valid
(
self
):
if
self
.
is_active
and
not
self
.
is_expired
:
if
self
.
is_active
and
not
self
.
is_expired
:
...
...
apps/users/tasks.py
View file @
a654bbef
# -*- coding: utf-8 -*-
# -*- coding: utf-8 -*-
#
#
import
datetime
from
django.utils
import
timezone
from
django.conf
import
settings
from
celery
import
shared_task
from
celery
import
shared_task
from
ops.celery.utils
import
create_or_update_celery_periodic_tasks
from
ops.celery.utils
import
create_or_update_celery_periodic_tasks
from
ops.celery.decorator
import
after_app_ready_start
,
register_as_period_task
from
ops.celery.decorator
import
after_app_ready_start
from
common.utils
import
get_logger
from
common.utils
import
get_logger
from
.models
import
User
from
.models
import
User
from
.utils
import
send_password_expiration_reminder_mail
from
.utils
import
(
send_password_expiration_reminder_mail
,
send_user_expiration_reminder_mail
)
logger
=
get_logger
(
__file__
)
logger
=
get_logger
(
__file__
)
...
@@ -43,4 +42,27 @@ def check_password_expired_periodic():
...
@@ -43,4 +42,27 @@ def check_password_expired_periodic():
create_or_update_celery_periodic_tasks
(
tasks
)
create_or_update_celery_periodic_tasks
(
tasks
)
@shared_task
def
check_user_expired
():
users
=
User
.
objects
.
exclude
(
role
=
User
.
ROLE_APP
)
for
user
in
users
:
if
not
user
.
is_valid
:
continue
if
not
user
.
will_expired
:
continue
send_user_expiration_reminder_mail
(
user
)
@shared_task
@after_app_ready_start
def
check_user_expired_periodic
():
tasks
=
{
'check_user_expired_periodic'
:
{
'task'
:
check_user_expired
.
name
,
'interval'
:
None
,
'crontab'
:
'0 14 * * *'
,
'enabled'
:
True
,
}
}
create_or_update_celery_periodic_tasks
(
tasks
)
apps/users/utils.py
View file @
a654bbef
...
@@ -85,20 +85,20 @@ def send_reset_password_mail(user):
...
@@ -85,20 +85,20 @@ def send_reset_password_mail(user):
recipient_list
=
[
user
.
email
]
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
message
=
_
(
"""
Hello
%(name)
s:
Hello
%(name)
s:
<
/
br>
<br>
Please click the link below to reset your password, if not your request, concern your account security
Please click the link below to reset your password, if not your request, concern your account security
<
/
br>
<br>
<a href="
%(rest_password_url)
s?token=
%(rest_password_token)
s">Click here reset password</a>
<a href="
%(rest_password_url)
s?token=
%(rest_password_token)
s">Click here reset password</a>
<
/
br>
<br>
This link is valid for 1 hour. After it expires, <a href="
%(forget_password_url)
s?email=
%(email)
s">request new one</a>
This link is valid for 1 hour. After it expires, <a href="
%(forget_password_url)
s?email=
%(email)
s">request new one</a>
<
/
br>
<br>
---
---
<
/
br>
<br>
<a href="
%(login_url)
s">Login direct</a>
<a href="
%(login_url)
s">Login direct</a>
<
/
br>
<br>
"""
)
%
{
"""
)
%
{
'name'
:
user
.
name
,
'name'
:
user
.
name
,
'rest_password_url'
:
reverse
(
'users:reset-password'
,
external
=
True
),
'rest_password_url'
:
reverse
(
'users:reset-password'
,
external
=
True
),
...
@@ -118,24 +118,24 @@ def send_password_expiration_reminder_mail(user):
...
@@ -118,24 +118,24 @@ def send_password_expiration_reminder_mail(user):
recipient_list
=
[
user
.
email
]
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
message
=
_
(
"""
Hello
%(name)
s:
Hello
%(name)
s:
<
/
br>
<br>
Your password will expire in
%(date_password_expired)
s,
Your password will expire in
%(date_password_expired)
s,
<
/
br>
<br>
For your account security, please click on the link below to update your password in time
For your account security, please click on the link below to update your password in time
<
/
br>
<br>
<a href="
%(update_password_url)
s">Click here update password</a>
<a href="
%(update_password_url)
s">Click here update password</a>
<
/
br>
<br>
If your password has expired, please click
If your password has expired, please click
<a href="
%(forget_password_url)
s?email=
%(email)
s">Password expired</a>
<a href="
%(forget_password_url)
s?email=
%(email)
s">Password expired</a>
to apply for a password reset email.
to apply for a password reset email.
<
/
br>
<br>
---
---
<
/
br>
<br>
<a href="
%(login_url)
s">Login direct</a>
<a href="
%(login_url)
s">Login direct</a>
<
/
br>
<br>
"""
)
%
{
"""
)
%
{
'name'
:
user
.
name
,
'name'
:
user
.
name
,
'date_password_expired'
:
datetime
.
fromtimestamp
(
datetime
.
timestamp
(
'date_password_expired'
:
datetime
.
fromtimestamp
(
datetime
.
timestamp
(
...
@@ -151,18 +151,39 @@ def send_password_expiration_reminder_mail(user):
...
@@ -151,18 +151,39 @@ def send_password_expiration_reminder_mail(user):
send_mail_async
.
delay
(
subject
,
message
,
recipient_list
,
html_message
=
message
)
send_mail_async
.
delay
(
subject
,
message
,
recipient_list
,
html_message
=
message
)
def
send_user_expiration_reminder_mail
(
user
):
subject
=
_
(
'Expiration notice'
)
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
Hello
%(name)
s:
<br>
Your account will expire in
%(date_expired)
s,
<br>
In order not to affect your normal work, please contact the administrator for confirmation.
<br>
"""
)
%
{
'name'
:
user
.
name
,
'date_expired'
:
datetime
.
fromtimestamp
(
datetime
.
timestamp
(
user
.
date_expired
))
.
strftime
(
'
%
Y-
%
m-
%
d
%
H:
%
M'
),
}
if
settings
.
DEBUG
:
logger
.
debug
(
message
)
send_mail_async
.
delay
(
subject
,
message
,
recipient_list
,
html_message
=
message
)
def
send_reset_ssh_key_mail
(
user
):
def
send_reset_ssh_key_mail
(
user
):
subject
=
_
(
'SSH Key Reset'
)
subject
=
_
(
'SSH Key Reset'
)
recipient_list
=
[
user
.
email
]
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
message
=
_
(
"""
Hello
%(name)
s:
Hello
%(name)
s:
<
/
br>
<br>
Your ssh public key has been reset by site administrator.
Your ssh public key has been reset by site administrator.
Please login and reset your ssh public key.
Please login and reset your ssh public key.
<
/
br>
<br>
<a href="
%(login_url)
s">Login direct</a>
<a href="
%(login_url)
s">Login direct</a>
<
/
br>
<br>
"""
)
%
{
"""
)
%
{
'name'
:
user
.
name
,
'name'
:
user
.
name
,
'login_url'
:
reverse
(
'authentication:login'
,
external
=
True
),
'login_url'
:
reverse
(
'authentication:login'
,
external
=
True
),
...
@@ -264,6 +285,12 @@ def increase_login_failed_count(username, ip):
...
@@ -264,6 +285,12 @@ def increase_login_failed_count(username, ip):
cache
.
set
(
key_limit
,
count
,
int
(
limit_time
)
*
60
)
cache
.
set
(
key_limit
,
count
,
int
(
limit_time
)
*
60
)
def
get_login_failed_count
(
username
,
ip
):
key_limit
=
key_prefix_limit
.
format
(
username
,
ip
)
count
=
cache
.
get
(
key_limit
,
0
)
return
count
def
clean_failed_count
(
username
,
ip
):
def
clean_failed_count
(
username
,
ip
):
key_limit
=
key_prefix_limit
.
format
(
username
,
ip
)
key_limit
=
key_prefix_limit
.
format
(
username
,
ip
)
key_block
=
key_prefix_block
.
format
(
username
)
key_block
=
key_prefix_block
.
format
(
username
)
...
@@ -272,9 +299,8 @@ def clean_failed_count(username, ip):
...
@@ -272,9 +299,8 @@ def clean_failed_count(username, ip):
def
is_block_login
(
username
,
ip
):
def
is_block_login
(
username
,
ip
):
key_limit
=
key_prefix_limit
.
forma
t
(
username
,
ip
)
count
=
get_login_failed_coun
t
(
username
,
ip
)
key_block
=
key_prefix_block
.
format
(
username
)
key_block
=
key_prefix_block
.
format
(
username
)
count
=
cache
.
get
(
key_limit
,
0
)
limit_count
=
settings
.
SECURITY_LOGIN_LIMIT_COUNT
limit_count
=
settings
.
SECURITY_LOGIN_LIMIT_COUNT
limit_time
=
settings
.
SECURITY_LOGIN_LIMIT_TIME
limit_time
=
settings
.
SECURITY_LOGIN_LIMIT_TIME
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment