Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
J
jumpserver
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
ops
jumpserver
Commits
af2b6742
Unverified
Commit
af2b6742
authored
Aug 01, 2019
by
BaiJiangJie
Committed by
GitHub
Aug 01, 2019
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #3066 from jumpserver/dev
Dev
parents
f51c6efd
42547751
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
18 changed files
with
167 additions
and
36 deletions
+167
-36
node.py
apps/assets/models/node.py
+2
-1
base.py
apps/assets/serializers/base.py
+1
-0
system_user.py
apps/assets/serializers/system_user.py
+8
-0
forms.py
apps/authentication/forms.py
+31
-2
login.html
apps/authentication/templates/authentication/login.html
+6
-4
new_login.html
apps/authentication/templates/authentication/new_login.html
+3
-1
login.py
apps/authentication/views/login.py
+1
-0
permissions.py
apps/common/permissions.py
+4
-0
middleware.py
apps/jumpserver/middleware.py
+4
-2
django.mo
apps/locale/zh/LC_MESSAGES/django.mo
+0
-0
django.po
apps/locale/zh/LC_MESSAGES/django.po
+0
-0
command.py
apps/ops/api/command.py
+2
-1
apps.py
apps/perms/apps.py
+3
-0
_message.html
apps/templates/_message.html
+17
-1
v1.py
apps/terminal/serializers/v1.py
+1
-0
user.py
apps/users/models/user.py
+13
-1
tasks.py
apps/users/tasks.py
+27
-5
utils.py
apps/users/utils.py
+44
-18
No files found.
apps/assets/models/node.py
View file @
af2b6742
...
@@ -212,12 +212,13 @@ class AssetsAmountMixin:
...
@@ -212,12 +212,13 @@ class AssetsAmountMixin:
if
cached
is
not
None
:
if
cached
is
not
None
:
return
cached
return
cached
assets_amount
=
self
.
get_all_assets
()
.
count
()
assets_amount
=
self
.
get_all_assets
()
.
count
()
cache
.
set
(
cache_key
,
assets_amount
,
self
.
cache_time
)
return
assets_amount
return
assets_amount
@assets_amount.setter
@assets_amount.setter
def
assets_amount
(
self
,
value
):
def
assets_amount
(
self
,
value
):
self
.
_assets_amount
=
value
self
.
_assets_amount
=
value
cache_key
=
self
.
_assets_amount_cache_key
.
format
(
self
.
key
)
cache
.
set
(
cache_key
,
value
,
self
.
cache_time
)
def
expire_assets_amount
(
self
):
def
expire_assets_amount
(
self
):
ancestor_keys
=
self
.
get_ancestor_keys
(
with_self
=
True
)
ancestor_keys
=
self
.
get_ancestor_keys
(
with_self
=
True
)
...
...
apps/assets/serializers/base.py
View file @
af2b6742
...
@@ -59,6 +59,7 @@ class AuthSerializerMixin:
...
@@ -59,6 +59,7 @@ class AuthSerializerMixin:
value
=
validated_data
.
get
(
field
)
value
=
validated_data
.
get
(
field
)
if
not
value
:
if
not
value
:
validated_data
.
pop
(
field
,
None
)
validated_data
.
pop
(
field
,
None
)
# print(validated_data)
# print(validated_data)
# raise serializers.ValidationError(">>>>>>")
# raise serializers.ValidationError(">>>>>>")
...
...
apps/assets/serializers/system_user.py
View file @
af2b6742
...
@@ -3,6 +3,7 @@ from rest_framework import serializers
...
@@ -3,6 +3,7 @@ from rest_framework import serializers
from
django.utils.translation
import
ugettext_lazy
as
_
from
django.utils.translation
import
ugettext_lazy
as
_
from
common.serializers
import
AdaptedBulkListSerializer
from
common.serializers
import
AdaptedBulkListSerializer
from
common.utils
import
ssh_pubkey_gen
from
orgs.mixins
import
BulkOrgResourceModelSerializer
from
orgs.mixins
import
BulkOrgResourceModelSerializer
from
..models
import
SystemUser
from
..models
import
SystemUser
from
.base
import
AuthSerializer
,
AuthSerializerMixin
from
.base
import
AuthSerializer
,
AuthSerializerMixin
...
@@ -86,6 +87,13 @@ class SystemUserSerializer(AuthSerializerMixin, BulkOrgResourceModelSerializer):
...
@@ -86,6 +87,13 @@ class SystemUserSerializer(AuthSerializerMixin, BulkOrgResourceModelSerializer):
private_key
,
public_key
=
SystemUser
.
gen_key
(
username
)
private_key
,
public_key
=
SystemUser
.
gen_key
(
username
)
attrs
[
"private_key"
]
=
private_key
attrs
[
"private_key"
]
=
private_key
attrs
[
"public_key"
]
=
public_key
attrs
[
"public_key"
]
=
public_key
# 如果设置了private key,没有设置public key则生成
elif
attrs
.
get
(
"private_key"
,
None
):
private_key
=
attrs
[
"private_key"
]
password
=
attrs
.
get
(
"password"
)
public_key
=
ssh_pubkey_gen
(
private_key
,
password
=
password
,
username
=
username
)
attrs
[
"public_key"
]
=
public_key
attrs
.
pop
(
"auto_generate_key"
,
None
)
attrs
.
pop
(
"auto_generate_key"
,
None
)
return
attrs
return
attrs
...
...
apps/authentication/forms.py
View file @
af2b6742
...
@@ -5,6 +5,8 @@ from django import forms
...
@@ -5,6 +5,8 @@ from django import forms
from
django.contrib.auth.forms
import
AuthenticationForm
from
django.contrib.auth.forms
import
AuthenticationForm
from
django.utils.translation
import
gettext_lazy
as
_
from
django.utils.translation
import
gettext_lazy
as
_
from
captcha.fields
import
CaptchaField
from
captcha.fields
import
CaptchaField
from
django.conf
import
settings
from
users.utils
import
get_login_failed_count
class
UserLoginForm
(
AuthenticationForm
):
class
UserLoginForm
(
AuthenticationForm
):
...
@@ -16,10 +18,18 @@ class UserLoginForm(AuthenticationForm):
...
@@ -16,10 +18,18 @@ class UserLoginForm(AuthenticationForm):
error_messages
=
{
error_messages
=
{
'invalid_login'
:
_
(
'invalid_login'
:
_
(
"
Please enter a correct username and password. Note that both
"
"
The username or password you entered is incorrect,
"
"
fields may be case-sensitive
."
"
please enter it again
."
),
),
'inactive'
:
_
(
"This account is inactive."
),
'inactive'
:
_
(
"This account is inactive."
),
'limit_login'
:
_
(
"You can also try {times_try} times "
"(The account will be temporarily locked for {block_time} minutes)"
),
'block_login'
:
_
(
"The account has been locked "
"(please contact admin to unlock it or try again after {} minutes)"
)
}
}
def
confirm_login_allowed
(
self
,
user
):
def
confirm_login_allowed
(
self
,
user
):
...
@@ -28,6 +38,25 @@ class UserLoginForm(AuthenticationForm):
...
@@ -28,6 +38,25 @@ class UserLoginForm(AuthenticationForm):
self
.
error_messages
[
'inactive'
],
self
.
error_messages
[
'inactive'
],
code
=
'inactive'
,)
code
=
'inactive'
,)
def
get_limit_login_error_message
(
self
,
username
,
ip
):
times_up
=
settings
.
SECURITY_LOGIN_LIMIT_COUNT
times_failed
=
get_login_failed_count
(
username
,
ip
)
times_try
=
int
(
times_up
)
-
int
(
times_failed
)
block_time
=
settings
.
SECURITY_LOGIN_LIMIT_TIME
if
times_try
<=
0
:
error_message
=
self
.
error_messages
[
'block_login'
]
error_message
=
error_message
.
format
(
block_time
)
else
:
error_message
=
self
.
error_messages
[
'limit_login'
]
error_message
=
error_message
.
format
(
times_try
=
times_try
,
block_time
=
block_time
,
)
return
error_message
def
add_limit_login_error
(
self
,
username
,
ip
):
error
=
self
.
get_limit_login_error_message
(
username
,
ip
)
self
.
add_error
(
'password'
,
error
)
class
UserLoginCaptchaForm
(
UserLoginForm
):
class
UserLoginCaptchaForm
(
UserLoginForm
):
captcha
=
CaptchaField
()
captcha
=
CaptchaField
()
...
...
apps/authentication/templates/authentication/login.html
View file @
af2b6742
...
@@ -58,6 +58,7 @@
...
@@ -58,6 +58,7 @@
{% else %}
{% else %}
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
{% endif %}
{% endif %}
<p
class=
"red-fonts"
>
{{ form.errors.password.as_text }}
</p>
{% endif %}
{% endif %}
<div
class=
"form-group"
>
<div
class=
"form-group"
>
...
@@ -78,10 +79,11 @@
...
@@ -78,10 +79,11 @@
{% endif %}
{% endif %}
<div
class=
"text-muted text-center"
>
<div
class=
"text-muted text-center"
>
<div>
<div>
<a
href=
"{% url 'users:forgot-password' %}"
>
<a
href=
"{% url 'users:forgot-password' %}"
>
<small>
{% trans 'Forgot password' %}?
</small>
<small>
{% trans 'Forgot password' %}?
</small>
</a>
</a>
</div>
</div>
</div>
{% if AUTH_OPENID %}
{% if AUTH_OPENID %}
...
...
apps/authentication/templates/authentication/new_login.html
View file @
af2b6742
...
@@ -72,9 +72,10 @@
...
@@ -72,9 +72,10 @@
<div
class=
"contact-form col-md-10"
style=
"margin-top: 10px;height: 35px"
>
<div
class=
"contact-form col-md-10"
style=
"margin-top: 10px;height: 35px"
>
<form
id=
"contact-form"
action=
""
method=
"post"
role=
"form"
novalidate=
"novalidate"
>
<form
id=
"contact-form"
action=
""
method=
"post"
role=
"form"
novalidate=
"novalidate"
>
{% csrf_token %}
{% csrf_token %}
<div
style=
"height:
45
px;color: red;line-height: 17px;"
>
<div
style=
"height:
70
px;color: red;line-height: 17px;"
>
{% if block_login %}
{% if block_login %}
<p
class=
"red-fonts"
>
{% trans 'Log in frequently and try again later' %}
</p>
<p
class=
"red-fonts"
>
{% trans 'Log in frequently and try again later' %}
</p>
<p
class=
"red-fonts"
>
{{ form.errors.password.as_text }}
</p>
{% elif password_expired %}
{% elif password_expired %}
<p
class=
"red-fonts"
>
{% trans 'The user password has expired' %}
</p>
<p
class=
"red-fonts"
>
{% trans 'The user password has expired' %}
</p>
{% elif form.errors %}
{% elif form.errors %}
...
@@ -83,6 +84,7 @@
...
@@ -83,6 +84,7 @@
{% else %}
{% else %}
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
<p
class=
"red-fonts"
>
{{ form.non_field_errors.as_text }}
</p>
{% endif %}
{% endif %}
<p
class=
"red-fonts"
>
{{ form.errors.password.as_text }}
</p>
{% endif %}
{% endif %}
</div>
</div>
...
...
apps/authentication/views/login.py
View file @
af2b6742
...
@@ -100,6 +100,7 @@ class UserLoginView(FormView):
...
@@ -100,6 +100,7 @@ class UserLoginView(FormView):
# limit user login failed count
# limit user login failed count
ip
=
get_request_ip
(
self
.
request
)
ip
=
get_request_ip
(
self
.
request
)
increase_login_failed_count
(
username
,
ip
)
increase_login_failed_count
(
username
,
ip
)
form
.
add_limit_login_error
(
username
,
ip
)
# show captcha
# show captcha
cache
.
set
(
self
.
key_prefix_captcha
.
format
(
ip
),
1
,
3600
)
cache
.
set
(
self
.
key_prefix_captcha
.
format
(
ip
),
1
,
3600
)
self
.
send_auth_signal
(
success
=
False
,
username
=
username
,
reason
=
reason
)
self
.
send_auth_signal
(
success
=
False
,
username
=
username
,
reason
=
reason
)
...
...
apps/common/permissions.py
View file @
af2b6742
...
@@ -49,6 +49,8 @@ class IsOrgAdmin(IsValidUser):
...
@@ -49,6 +49,8 @@ class IsOrgAdmin(IsValidUser):
"""Allows access only to superuser"""
"""Allows access only to superuser"""
def
has_permission
(
self
,
request
,
view
):
def
has_permission
(
self
,
request
,
view
):
if
not
current_org
:
return
False
return
super
(
IsOrgAdmin
,
self
)
.
has_permission
(
request
,
view
)
\
return
super
(
IsOrgAdmin
,
self
)
.
has_permission
(
request
,
view
)
\
and
current_org
.
can_admin_by
(
request
.
user
)
and
current_org
.
can_admin_by
(
request
.
user
)
...
@@ -57,6 +59,8 @@ class IsOrgAdminOrAppUser(IsValidUser):
...
@@ -57,6 +59,8 @@ class IsOrgAdminOrAppUser(IsValidUser):
"""Allows access between superuser and app user"""
"""Allows access between superuser and app user"""
def
has_permission
(
self
,
request
,
view
):
def
has_permission
(
self
,
request
,
view
):
if
not
current_org
:
return
False
return
super
(
IsOrgAdminOrAppUser
,
self
)
.
has_permission
(
request
,
view
)
\
return
super
(
IsOrgAdminOrAppUser
,
self
)
.
has_permission
(
request
,
view
)
\
and
(
current_org
.
can_admin_by
(
request
.
user
)
or
request
.
user
.
is_app
)
and
(
current_org
.
can_admin_by
(
request
.
user
)
or
request
.
user
.
is_app
)
...
...
apps/jumpserver/middleware.py
View file @
af2b6742
...
@@ -5,6 +5,7 @@ import re
...
@@ -5,6 +5,7 @@ import re
import
pytz
import
pytz
from
django.utils
import
timezone
from
django.utils
import
timezone
from
django.shortcuts
import
HttpResponse
from
django.shortcuts
import
HttpResponse
from
django.conf
import
settings
from
.utils
import
set_current_request
from
.utils
import
set_current_request
...
@@ -56,6 +57,7 @@ class RequestMiddleware:
...
@@ -56,6 +57,7 @@ class RequestMiddleware:
def
__call__
(
self
,
request
):
def
__call__
(
self
,
request
):
set_current_request
(
request
)
set_current_request
(
request
)
response
=
self
.
get_response
(
request
)
response
=
self
.
get_response
(
request
)
age
=
request
.
session
.
get_expiry_age
()
if
not
settings
.
SESSION_EXPIRE_AT_BROWSER_CLOSE
:
request
.
session
.
set_expiry
(
age
)
age
=
request
.
session
.
get_expiry_age
()
request
.
session
.
set_expiry
(
age
)
return
response
return
response
apps/locale/zh/LC_MESSAGES/django.mo
View file @
af2b6742
No preview for this file type
apps/locale/zh/LC_MESSAGES/django.po
View file @
af2b6742
This diff is collapsed.
Click to expand it.
apps/ops/api/command.py
View file @
af2b6742
...
@@ -4,13 +4,14 @@ from rest_framework import viewsets
...
@@ -4,13 +4,14 @@ from rest_framework import viewsets
from
django.db
import
transaction
from
django.db
import
transaction
from
django.conf
import
settings
from
django.conf
import
settings
from
orgs.mixins
import
RootOrgViewMixin
from
common.permissions
import
IsValidUser
from
common.permissions
import
IsValidUser
from
..models
import
CommandExecution
from
..models
import
CommandExecution
from
..serializers
import
CommandExecutionSerializer
from
..serializers
import
CommandExecutionSerializer
from
..tasks
import
run_command_execution
from
..tasks
import
run_command_execution
class
CommandExecutionViewSet
(
viewsets
.
ModelViewSet
):
class
CommandExecutionViewSet
(
RootOrgViewMixin
,
viewsets
.
ModelViewSet
):
serializer_class
=
CommandExecutionSerializer
serializer_class
=
CommandExecutionSerializer
permission_classes
=
(
IsValidUser
,)
permission_classes
=
(
IsValidUser
,)
...
...
apps/perms/apps.py
View file @
af2b6742
from
__future__
import
unicode_literals
from
__future__
import
unicode_literals
from
django.conf
import
settings
from
django.apps
import
AppConfig
from
django.apps
import
AppConfig
...
@@ -8,4 +9,6 @@ class PermsConfig(AppConfig):
...
@@ -8,4 +9,6 @@ class PermsConfig(AppConfig):
def
ready
(
self
):
def
ready
(
self
):
from
.
import
signals_handler
from
.
import
signals_handler
if
not
settings
.
XPACK_ENABLED
:
settings
.
ASSETS_PERM_CACHE_ENABLE
=
False
return
super
()
.
ready
()
return
super
()
.
ready
()
apps/templates/_message.html
View file @
af2b6742
{% load i18n %}
{% load i18n %}
{% block user_expired_message %}
{% if request.user.is_expired %}
<div
class=
"alert alert-danger help-message alert-dismissable"
>
{% blocktrans %}
Your account has expired, please contact the administrator.
{% endblocktrans %}
<button
aria-hidden=
"true"
data-dismiss=
"alert"
class=
"close"
type=
"button"
style=
"outline: none;"
>
×
</button>
</div>
{% elif request.user.will_expired %}
<div
class=
"alert alert-danger help-message alert-dismissable"
>
{% trans 'Your account will at' %} {{ request.user.date_expired }} {% trans 'expired. ' %}
<button
aria-hidden=
"true"
data-dismiss=
"alert"
class=
"close"
type=
"button"
style=
"outline: none;"
>
×
</button>
</div>
{% endif %}
{% endblock %}
{% block password_expired_message %}
{% block password_expired_message %}
{% url 'users:user-password-update' as user_password_update_url %}
{% url 'users:user-password-update' as user_password_update_url %}
{% if request.user.password_has_expired
%}
{% if request.user.password_has_expired %}
<div
class=
"alert alert-danger help-message alert-dismissable"
>
<div
class=
"alert alert-danger help-message alert-dismissable"
>
{% blocktrans %}
{% blocktrans %}
Your password has expired, please click
<a
href=
"{{ user_password_update_url }}"
>
this link
</a>
update password.
Your password has expired, please click
<a
href=
"{{ user_password_update_url }}"
>
this link
</a>
update password.
...
...
apps/terminal/serializers/v1.py
View file @
af2b6742
...
@@ -27,6 +27,7 @@ class TerminalSerializer(serializers.ModelSerializer):
...
@@ -27,6 +27,7 @@ class TerminalSerializer(serializers.ModelSerializer):
class
SessionSerializer
(
BulkOrgResourceModelSerializer
):
class
SessionSerializer
(
BulkOrgResourceModelSerializer
):
command_amount
=
serializers
.
IntegerField
(
read_only
=
True
)
command_amount
=
serializers
.
IntegerField
(
read_only
=
True
)
org_id
=
serializers
.
CharField
(
allow_blank
=
True
)
class
Meta
:
class
Meta
:
model
=
Session
model
=
Session
...
...
apps/users/models/user.py
View file @
af2b6742
...
@@ -402,6 +402,18 @@ class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, AbstractUser):
...
@@ -402,6 +402,18 @@ class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, AbstractUser):
else
:
else
:
return
False
return
False
@property
def
expired_remain_days
(
self
):
date_remain
=
self
.
date_expired
-
timezone
.
now
()
return
date_remain
.
days
@property
def
will_expired
(
self
):
if
0
<=
self
.
expired_remain_days
<
5
:
return
True
else
:
return
False
@property
@property
def
is_valid
(
self
):
def
is_valid
(
self
):
if
self
.
is_active
and
not
self
.
is_expired
:
if
self
.
is_active
and
not
self
.
is_expired
:
...
@@ -411,7 +423,7 @@ class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, AbstractUser):
...
@@ -411,7 +423,7 @@ class User(AuthMixin, TokenMixin, RoleMixin, MFAMixin, AbstractUser):
@property
@property
def
is_local
(
self
):
def
is_local
(
self
):
return
self
.
source
==
self
.
SOURCE_LOCAL
return
self
.
source
==
self
.
SOURCE_LOCAL
def
save
(
self
,
*
args
,
**
kwargs
):
def
save
(
self
,
*
args
,
**
kwargs
):
if
not
self
.
name
:
if
not
self
.
name
:
self
.
name
=
self
.
username
self
.
name
=
self
.
username
...
...
apps/users/tasks.py
View file @
af2b6742
# -*- coding: utf-8 -*-
# -*- coding: utf-8 -*-
#
#
import
datetime
from
django.utils
import
timezone
from
django.conf
import
settings
from
celery
import
shared_task
from
celery
import
shared_task
from
ops.celery.utils
import
create_or_update_celery_periodic_tasks
from
ops.celery.utils
import
create_or_update_celery_periodic_tasks
from
ops.celery.decorator
import
after_app_ready_start
,
register_as_period_task
from
ops.celery.decorator
import
after_app_ready_start
from
common.utils
import
get_logger
from
common.utils
import
get_logger
from
.models
import
User
from
.models
import
User
from
.utils
import
send_password_expiration_reminder_mail
from
.utils
import
(
send_password_expiration_reminder_mail
,
send_user_expiration_reminder_mail
)
logger
=
get_logger
(
__file__
)
logger
=
get_logger
(
__file__
)
...
@@ -43,4 +42,27 @@ def check_password_expired_periodic():
...
@@ -43,4 +42,27 @@ def check_password_expired_periodic():
create_or_update_celery_periodic_tasks
(
tasks
)
create_or_update_celery_periodic_tasks
(
tasks
)
@shared_task
def
check_user_expired
():
users
=
User
.
objects
.
exclude
(
role
=
User
.
ROLE_APP
)
for
user
in
users
:
if
not
user
.
is_valid
:
continue
if
not
user
.
will_expired
:
continue
send_user_expiration_reminder_mail
(
user
)
@shared_task
@after_app_ready_start
def
check_user_expired_periodic
():
tasks
=
{
'check_user_expired_periodic'
:
{
'task'
:
check_user_expired
.
name
,
'interval'
:
None
,
'crontab'
:
'0 14 * * *'
,
'enabled'
:
True
,
}
}
create_or_update_celery_periodic_tasks
(
tasks
)
apps/users/utils.py
View file @
af2b6742
...
@@ -89,20 +89,20 @@ def send_reset_password_mail(user):
...
@@ -89,20 +89,20 @@ def send_reset_password_mail(user):
recipient_list
=
[
user
.
email
]
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
message
=
_
(
"""
Hello
%(name)
s:
Hello
%(name)
s:
<
/
br>
<br>
Please click the link below to reset your password, if not your request, concern your account security
Please click the link below to reset your password, if not your request, concern your account security
<
/
br>
<br>
<a href="
%(rest_password_url)
s?token=
%(rest_password_token)
s">Click here reset password</a>
<a href="
%(rest_password_url)
s?token=
%(rest_password_token)
s">Click here reset password</a>
<
/
br>
<br>
This link is valid for 1 hour. After it expires, <a href="
%(forget_password_url)
s?email=
%(email)
s">request new one</a>
This link is valid for 1 hour. After it expires, <a href="
%(forget_password_url)
s?email=
%(email)
s">request new one</a>
<
/
br>
<br>
---
---
<
/
br>
<br>
<a href="
%(login_url)
s">Login direct</a>
<a href="
%(login_url)
s">Login direct</a>
<
/
br>
<br>
"""
)
%
{
"""
)
%
{
'name'
:
user
.
name
,
'name'
:
user
.
name
,
'rest_password_url'
:
reverse
(
'users:reset-password'
,
external
=
True
),
'rest_password_url'
:
reverse
(
'users:reset-password'
,
external
=
True
),
...
@@ -122,24 +122,24 @@ def send_password_expiration_reminder_mail(user):
...
@@ -122,24 +122,24 @@ def send_password_expiration_reminder_mail(user):
recipient_list
=
[
user
.
email
]
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
message
=
_
(
"""
Hello
%(name)
s:
Hello
%(name)
s:
<
/
br>
<br>
Your password will expire in
%(date_password_expired)
s,
Your password will expire in
%(date_password_expired)
s,
<
/
br>
<br>
For your account security, please click on the link below to update your password in time
For your account security, please click on the link below to update your password in time
<
/
br>
<br>
<a href="
%(update_password_url)
s">Click here update password</a>
<a href="
%(update_password_url)
s">Click here update password</a>
<
/
br>
<br>
If your password has expired, please click
If your password has expired, please click
<a href="
%(forget_password_url)
s?email=
%(email)
s">Password expired</a>
<a href="
%(forget_password_url)
s?email=
%(email)
s">Password expired</a>
to apply for a password reset email.
to apply for a password reset email.
<
/
br>
<br>
---
---
<
/
br>
<br>
<a href="
%(login_url)
s">Login direct</a>
<a href="
%(login_url)
s">Login direct</a>
<
/
br>
<br>
"""
)
%
{
"""
)
%
{
'name'
:
user
.
name
,
'name'
:
user
.
name
,
'date_password_expired'
:
datetime
.
fromtimestamp
(
datetime
.
timestamp
(
'date_password_expired'
:
datetime
.
fromtimestamp
(
datetime
.
timestamp
(
...
@@ -155,18 +155,39 @@ def send_password_expiration_reminder_mail(user):
...
@@ -155,18 +155,39 @@ def send_password_expiration_reminder_mail(user):
send_mail_async
.
delay
(
subject
,
message
,
recipient_list
,
html_message
=
message
)
send_mail_async
.
delay
(
subject
,
message
,
recipient_list
,
html_message
=
message
)
def
send_user_expiration_reminder_mail
(
user
):
subject
=
_
(
'Expiration notice'
)
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
Hello
%(name)
s:
<br>
Your account will expire in
%(date_expired)
s,
<br>
In order not to affect your normal work, please contact the administrator for confirmation.
<br>
"""
)
%
{
'name'
:
user
.
name
,
'date_expired'
:
datetime
.
fromtimestamp
(
datetime
.
timestamp
(
user
.
date_expired
))
.
strftime
(
'
%
Y-
%
m-
%
d
%
H:
%
M'
),
}
if
settings
.
DEBUG
:
logger
.
debug
(
message
)
send_mail_async
.
delay
(
subject
,
message
,
recipient_list
,
html_message
=
message
)
def
send_reset_ssh_key_mail
(
user
):
def
send_reset_ssh_key_mail
(
user
):
subject
=
_
(
'SSH Key Reset'
)
subject
=
_
(
'SSH Key Reset'
)
recipient_list
=
[
user
.
email
]
recipient_list
=
[
user
.
email
]
message
=
_
(
"""
message
=
_
(
"""
Hello
%(name)
s:
Hello
%(name)
s:
<
/
br>
<br>
Your ssh public key has been reset by site administrator.
Your ssh public key has been reset by site administrator.
Please login and reset your ssh public key.
Please login and reset your ssh public key.
<
/
br>
<br>
<a href="
%(login_url)
s">Login direct</a>
<a href="
%(login_url)
s">Login direct</a>
<
/
br>
<br>
"""
)
%
{
"""
)
%
{
'name'
:
user
.
name
,
'name'
:
user
.
name
,
'login_url'
:
reverse
(
'authentication:login'
,
external
=
True
),
'login_url'
:
reverse
(
'authentication:login'
,
external
=
True
),
...
@@ -299,6 +320,12 @@ def increase_login_failed_count(username, ip):
...
@@ -299,6 +320,12 @@ def increase_login_failed_count(username, ip):
cache
.
set
(
key_limit
,
count
,
int
(
limit_time
)
*
60
)
cache
.
set
(
key_limit
,
count
,
int
(
limit_time
)
*
60
)
def
get_login_failed_count
(
username
,
ip
):
key_limit
=
key_prefix_limit
.
format
(
username
,
ip
)
count
=
cache
.
get
(
key_limit
,
0
)
return
count
def
clean_failed_count
(
username
,
ip
):
def
clean_failed_count
(
username
,
ip
):
key_limit
=
key_prefix_limit
.
format
(
username
,
ip
)
key_limit
=
key_prefix_limit
.
format
(
username
,
ip
)
key_block
=
key_prefix_block
.
format
(
username
)
key_block
=
key_prefix_block
.
format
(
username
)
...
@@ -307,9 +334,8 @@ def clean_failed_count(username, ip):
...
@@ -307,9 +334,8 @@ def clean_failed_count(username, ip):
def
is_block_login
(
username
,
ip
):
def
is_block_login
(
username
,
ip
):
key_limit
=
key_prefix_limit
.
forma
t
(
username
,
ip
)
count
=
get_login_failed_coun
t
(
username
,
ip
)
key_block
=
key_prefix_block
.
format
(
username
)
key_block
=
key_prefix_block
.
format
(
username
)
count
=
cache
.
get
(
key_limit
,
0
)
limit_count
=
settings
.
SECURITY_LOGIN_LIMIT_COUNT
limit_count
=
settings
.
SECURITY_LOGIN_LIMIT_COUNT
limit_time
=
settings
.
SECURITY_LOGIN_LIMIT_TIME
limit_time
=
settings
.
SECURITY_LOGIN_LIMIT_TIME
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment