Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
J
jumpserver
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
ops
jumpserver
Commits
fdab6f73
Commit
fdab6f73
authored
Jul 24, 2019
by
ibuler
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[Update] 使用规范的签名
parent
841a1ce8
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
138 additions
and
2 deletions
+138
-2
api.py
apps/authentication/backends/api.py
+21
-0
__init__.py
apps/common/auth/__init__.py
+2
-0
signature.py
apps/common/auth/signature.py
+112
-0
settings.py
apps/jumpserver/settings.py
+2
-1
user.py
apps/users/api/user.py
+1
-1
No files found.
apps/authentication/backends/api.py
View file @
fdab6f73
...
@@ -11,6 +11,7 @@ from django.utils.six import text_type
...
@@ -11,6 +11,7 @@ from django.utils.six import text_type
from
django.contrib.auth
import
get_user_model
from
django.contrib.auth
import
get_user_model
from
rest_framework
import
HTTP_HEADER_ENCODING
from
rest_framework
import
HTTP_HEADER_ENCODING
from
rest_framework
import
authentication
,
exceptions
from
rest_framework
import
authentication
,
exceptions
from
common.auth
import
signature
from
rest_framework.authentication
import
CSRFCheck
from
rest_framework.authentication
import
CSRFCheck
from
common.utils
import
get_object_or_none
,
make_signature
,
http_to_unixtime
from
common.utils
import
get_object_or_none
,
make_signature
,
http_to_unixtime
...
@@ -167,3 +168,23 @@ class SessionAuthentication(authentication.SessionAuthentication):
...
@@ -167,3 +168,23 @@ class SessionAuthentication(authentication.SessionAuthentication):
# CSRF passed with authenticated user
# CSRF passed with authenticated user
return
user
,
None
return
user
,
None
class
SignatureAuthentication
(
signature
.
SignatureAuthentication
):
# The HTTP header used to pass the consumer key ID.
# A method to fetch (User instance, user_secret_string) from the
# consumer key ID, or None in case it is not found. Algorithm
# will be what the client has sent, in the case that both RSA
# and HMAC are supported at your site (and also for expansion).
model
=
get_user_model
()
def
fetch_user_data
(
self
,
key_id
,
algorithm
=
"hmac-sha256"
):
# ...
# example implementation:
try
:
key
=
AccessKey
.
objects
.
get
(
id
=
key_id
)
user
,
secret
=
key
.
user
,
str
(
key
.
secret
)
return
user
,
secret
except
AccessKey
.
DoesNotExist
:
return
None
,
None
apps/common/auth/__init__.py
0 → 100644
View file @
fdab6f73
# -*- coding: utf-8 -*-
#
apps/common/auth/signature.py
0 → 100644
View file @
fdab6f73
from
rest_framework
import
authentication
from
rest_framework
import
exceptions
from
httpsig
import
HeaderVerifier
,
utils
"""
Reusing failure exceptions serves several purposes:
1. Lack of useful information regarding the failure inhibits attackers
from learning about valid keyIDs or other forms of information leakage.
Using the same actual object for any failure makes preventing such
leakage through mistakenly-distinct error messages less likely.
2. In an API scenario, the object is created once and raised many times
rather than generated on every failure, which could lead to higher loads
or memory usage in high-volume attack scenarios.
"""
FAILED
=
exceptions
.
AuthenticationFailed
(
'Invalid signature.'
)
class
SignatureAuthentication
(
authentication
.
BaseAuthentication
):
"""
DRF authentication class for HTTP Signature support.
You must subclass this class in your own project and implement the
`fetch_user_data(self, keyId, algorithm)` method, returning a tuple of
the User object and a bytes object containing the user's secret. Note
that key_id and algorithm are DIRTY as they are supplied by the client
and so must be verified in your subclass!
You may set the following class properties in your subclass to configure
authentication for your particular use case:
:param www_authenticate_realm: Default: "api"
:param required_headers: Default: ["(request-target)", "date"]
"""
www_authenticate_realm
=
"api"
required_headers
=
[
"(request-target)"
,
"date"
]
def
fetch_user_data
(
self
,
key_id
,
algorithm
=
None
):
"""Retuns a tuple (User, secret) or (None, None)."""
raise
NotImplementedError
()
def
authenticate_header
(
self
,
request
):
"""
DRF sends this for unauthenticated responses if we're the primary
authenticator.
"""
h
=
" "
.
join
(
self
.
required_headers
)
return
'Signature realm="
%
s",headers="
%
s"'
%
(
self
.
www_authenticate_realm
,
h
)
def
authenticate
(
self
,
request
):
"""
Perform the actual authentication.
Note that the exception raised is always the same. This is so that we
don't leak information about in/valid keyIds and other such useful
things.
"""
auth_header
=
authentication
.
get_authorization_header
(
request
)
if
not
auth_header
or
len
(
auth_header
)
==
0
:
return
None
method
,
fields
=
utils
.
parse_authorization_header
(
auth_header
)
# Ignore foreign Authorization headers.
if
method
.
lower
()
!=
'signature'
:
return
None
# Verify basic header structure.
if
len
(
fields
)
==
0
:
raise
FAILED
# Ensure all required fields were included.
if
len
({
"keyid"
,
"algorithm"
,
"signature"
}
-
set
(
fields
.
keys
()))
>
0
:
raise
FAILED
# Fetch the secret associated with the keyid
user
,
secret
=
self
.
fetch_user_data
(
fields
[
"keyid"
],
algorithm
=
fields
[
"algorithm"
]
)
if
not
(
user
and
secret
):
raise
FAILED
# Gather all request headers and translate them as stated in the Django docs:
# https://docs.djangoproject.com/en/1.6/ref/request-response/#django.http.HttpRequest.META
headers
=
{}
for
key
in
request
.
META
.
keys
():
if
key
.
startswith
(
"HTTP_"
)
or
\
key
in
(
"CONTENT_TYPE"
,
"CONTENT_LENGTH"
):
header
=
key
[
5
:]
.
lower
()
.
replace
(
'_'
,
'-'
)
headers
[
header
]
=
request
.
META
[
key
]
# Verify headers
hs
=
HeaderVerifier
(
headers
,
secret
,
required_headers
=
self
.
required_headers
,
method
=
request
.
method
.
lower
(),
path
=
request
.
get_full_path
()
)
# All of that just to get to this.
if
not
hs
.
verify
():
raise
FAILED
return
user
,
fields
[
"keyid"
]
apps/jumpserver/settings.py
View file @
fdab6f73
...
@@ -384,10 +384,11 @@ REST_FRAMEWORK = {
...
@@ -384,10 +384,11 @@ REST_FRAMEWORK = {
'rest_framework.parsers.FileUploadParser'
,
'rest_framework.parsers.FileUploadParser'
,
),
),
'DEFAULT_AUTHENTICATION_CLASSES'
:
(
'DEFAULT_AUTHENTICATION_CLASSES'
:
(
'rest_framework.authentication.BasicAuthentication'
,
#
'rest_framework.authentication.BasicAuthentication',
'authentication.backends.api.AccessKeyAuthentication'
,
'authentication.backends.api.AccessKeyAuthentication'
,
'authentication.backends.api.AccessTokenAuthentication'
,
'authentication.backends.api.AccessTokenAuthentication'
,
'authentication.backends.api.PrivateTokenAuthentication'
,
'authentication.backends.api.PrivateTokenAuthentication'
,
'authentication.backends.api.SignatureAuthentication'
,
'authentication.backends.api.SessionAuthentication'
,
'authentication.backends.api.SessionAuthentication'
,
),
),
'DEFAULT_FILTER_BACKENDS'
:
(
'DEFAULT_FILTER_BACKENDS'
:
(
...
...
apps/users/api/user.py
View file @
fdab6f73
...
@@ -60,7 +60,7 @@ class UserViewSet(IDInCacheFilterMixin, BulkModelViewSet):
...
@@ -60,7 +60,7 @@ class UserViewSet(IDInCacheFilterMixin, BulkModelViewSet):
return
queryset
return
queryset
def
get_permissions
(
self
):
def
get_permissions
(
self
):
if
self
.
action
==
"retrieve"
:
if
self
.
action
in
[
"retrieve"
,
"list"
]
:
self
.
permission_classes
=
(
IsOrgAdminOrAppUser
,)
self
.
permission_classes
=
(
IsOrgAdminOrAppUser
,)
return
super
()
.
get_permissions
()
return
super
()
.
get_permissions
()
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment