| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package models
- import (
- "context"
- "crypto/sha256"
- "database/sql"
- "encoding/hex"
- "fmt"
- "time"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/utils"
- "yunion.io/x/sqlchemy"
- notifyapi "yunion.io/x/onecloud/pkg/apis/notify"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/notifyclient"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/keystone/options"
- o "yunion.io/x/onecloud/pkg/keystone/options"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/mcclient/modules/notify"
- "yunion.io/x/onecloud/pkg/util/seclib2"
- "yunion.io/x/onecloud/pkg/util/stringutils2"
- )
- // +onecloud:swagger-gen-ignore
- type SPasswordManager struct {
- db.SResourceBaseManager
- }
- var PasswordManager *SPasswordManager
- func init() {
- PasswordManager = &SPasswordManager{
- SResourceBaseManager: db.NewResourceBaseManager(
- SPassword{},
- "password",
- "password",
- "passwords",
- ),
- }
- PasswordManager.SetVirtualObject(PasswordManager)
- PasswordManager.TableSpec().AddIndex(false, "local_user_id", "created_at_int")
- }
- /*
- +----------------+--------------+------+-----+---------+----------------+
- | Field | Type | Null | Key | Default | Extra |
- +----------------+--------------+------+-----+---------+----------------+
- | id | int(11) | NO | PRI | NULL | auto_increment |
- | local_user_id | int(11) | NO | MUL | NULL | |
- | password | varchar(128) | YES | | NULL | |
- | expires_at | datetime | YES | | NULL | |
- | self_service | tinyint(1) | NO | | 0 | |
- | password_hash | varchar(255) | YES | | NULL | |
- | created_at_int | bigint(20) | NO | | 0 | |
- | expires_at_int | bigint(20) | YES | | NULL | |
- | created_at | datetime | NO | | NULL | |
- +----------------+--------------+------+-----+---------+----------------+
- */
- type SPassword struct {
- db.SResourceBase
- Id int `primary:"true" auto_increment:"true"`
- LocalUserId int `nullable:"false" index:"true"`
- Password string `width:"128" charset:"ascii" nullable:"true"`
- ExpiresAt time.Time `nullable:"true"`
- SelfService bool `nullable:"false" default:"false"`
- PasswordHash string `width:"255" charset:"ascii" nullable:"true"`
- CreatedAtInt int64 `nullable:"false" default:"0"`
- ExpiresAtInt int64 `nullable:"true"`
- }
- func shaPassword(passwd string) string {
- shaOut := sha256.Sum224([]byte(passwd))
- return hex.EncodeToString(shaOut[:])
- }
- func (manager *SPasswordManager) CreateByInsertOrUpdate() bool {
- return false
- }
- func (manager *SPasswordManager) FetchLastPassword(localUserId int) (*SPassword, error) {
- passes, err := manager.fetchByLocaluserId(localUserId)
- if err != nil {
- return nil, err
- }
- if len(passes) == 0 {
- return nil, nil
- }
- return &passes[0], nil
- }
- func (manager *SPasswordManager) getFetchByLocaluserIdQuery(localUserId int) *sqlchemy.SQuery {
- passwords := manager.Query().SubQuery()
- q := passwords.Query().Equals("local_user_id", localUserId)
- q = q.Desc(passwords.Field("created_at_int"))
- q = q.Limit(options.Options.PasswordHistoryCount() + 1)
- return q
- }
- func (manager *SPasswordManager) FetchByLocaluserIdNewestPassword(localUserId int) (*SPassword, error) {
- obj, err := db.NewModelObject(manager)
- if err != nil {
- return nil, errors.Wrap(err, "new password object")
- }
- q := manager.getFetchByLocaluserIdQuery(localUserId)
- if err := q.First(obj); err != nil {
- return nil, errors.Wrap(err, "get newest password object")
- }
- return obj.(*SPassword), nil
- }
- func (manager *SPasswordManager) fetchByLocaluserId(localUserId int) ([]SPassword, error) {
- passes := make([]SPassword, 0)
- q := manager.getFetchByLocaluserIdQuery(localUserId)
- err := db.FetchModelObjects(manager, q, &passes)
- if err != nil && err != sql.ErrNoRows {
- return nil, errors.Wrap(err, "db.FetchModelObjects")
- }
- return passes, nil
- }
- func validatePasswordComplexity(password string) error {
- if options.Options.PasswordMinimalLength > 0 && len(password) < o.Options.PasswordMinimalLength {
- return errors.Wrap(httperrors.ErrWeakPassword, "too simple password")
- }
- if options.Options.PasswordCharComplexity > 0 {
- complexity := options.Options.PasswordCharComplexity
- if complexity > 4 {
- complexity = 4
- }
- if stringutils2.GetCharTypeCount(password) < complexity {
- return errors.Wrap(httperrors.ErrWeakPassword, "too simple password")
- }
- }
- return nil
- }
- func (manager *SPasswordManager) validatePassword(localUserId int, password string, skipHistoryCheck bool) error {
- err := validatePasswordComplexity(password)
- if err != nil {
- return errors.Wrap(err, "validatePasswordComplexity")
- }
- if !skipHistoryCheck && options.Options.PasswordUniqueHistoryCheck > 0 {
- shaPass := shaPassword(password)
- histPasses, err := manager.fetchByLocaluserId(localUserId)
- if err != nil {
- return errors.Wrap(err, "manager.fetchByLocaluserId")
- }
- for i := 0; i < len(histPasses) && i < options.Options.PasswordUniqueHistoryCheck; i += 1 {
- if histPasses[i].Password == shaPass {
- return errors.Error("repeated password")
- }
- }
- }
- return nil
- }
- func (manager *SPasswordManager) savePassword(localUserId int, password string, isSystemAccount bool) error {
- hash, err := seclib2.BcryptPassword(password)
- if err != nil {
- return errors.Wrap(err, "seclib2.BcryptPassword")
- }
- rec := &SPassword{
- LocalUserId: localUserId,
- PasswordHash: hash,
- Password: shaPassword(password),
- }
- rec.SetModelManager(PasswordManager, rec)
- now := time.Now()
- rec.CreatedAtInt = now.UnixNano() / 1000
- if options.Options.PasswordExpirationSeconds > 0 && !isSystemAccount {
- rec.ExpiresAt = now.Add(time.Second * time.Duration(options.Options.PasswordExpirationSeconds))
- rec.ExpiresAtInt = rec.ExpiresAt.UnixNano() / 1000
- }
- err = manager.TableSpec().Insert(context.TODO(), rec)
- if err != nil {
- return errors.Wrap(err, "Insert")
- }
- return nil
- }
- func (manager *SPasswordManager) delete(localUserId int) error {
- recs, err := manager.fetchByLocaluserId(localUserId)
- if err != nil {
- return errors.Wrap(err, "manager.fetchByLocaluserId")
- }
- for i := range recs {
- _, err = db.Update(&recs[i], func() error {
- return recs[i].MarkDelete()
- })
- if err != nil {
- return errors.Wrap(err, "recs[i].MarkDelete")
- }
- }
- return nil
- }
- func (passwd *SPassword) IsExpired() bool {
- if !passwd.ExpiresAt.IsZero() && passwd.ExpiresAt.Before(time.Now()) {
- return true
- }
- return false
- }
- // 定时任务判断用户是否需要密码过期通知
- func CheckAllUserPasswordIsExpired(ctx context.Context, userCred mcclient.TokenCredential, startRun bool) {
- pwds := []SPassword{}
- pwdQ := PasswordManager.Query()
- pwdQ = pwdQ.Desc("created_at")
- err := db.FetchModelObjects(PasswordManager, pwdQ, &pwds)
- if err != nil {
- log.Errorln("fetch Password error:", err)
- return
- }
- hasCheckedPwd := make(map[int]struct{})
- for _, pwd := range pwds {
- if _, isExist := hasCheckedPwd[pwd.LocalUserId]; isExist {
- continue
- }
- if pwd.ExpiresAt.IsZero() {
- continue
- }
- hasCheckedPwd[pwd.LocalUserId] = struct{}{}
- err = pwd.NeedSendNotify(ctx, userCred)
- if err != nil {
- log.Errorln(errors.Wrap(err, "pwd.NeedSendNotify"))
- }
- }
- }
- func (pwd *SPassword) NeedSendNotify(ctx context.Context, userCred mcclient.TokenCredential) error {
- expireTime := time.Date(pwd.ExpiresAt.Year(), pwd.ExpiresAt.Month(), pwd.ExpiresAt.Day(), 0, 0, 0, 0, time.Local)
- nowTime := time.Date(time.Now().Year(), time.Now().Month(), time.Now().Day(), 0, 0, 0, 0, time.Local)
- sub := expireTime.Sub(nowTime)
- subDay := int(sub.Hours() / 24)
- s := GetDefaultClientSession(ctx, userCred, options.Options.Region)
- resp, err := notify.NotifyTopic.List(s, jsonutils.Marshal(map[string]interface{}{
- "filter": fmt.Sprintf("name.equals('%s')", notifyapi.DefaultPasswordExpire),
- "scope": "system",
- }))
- if err != nil {
- return errors.Wrap(err, "list topics")
- }
- topics := []notifyapi.TopicDetails{}
- err = jsonutils.Update(&topics, resp.Data)
- if err != nil {
- return errors.Wrap(err, "update topic")
- }
- if len(topics) != 1 {
- return errors.Wrapf(errors.ErrNotSupported, "len topics :%d", len(topics))
- }
- if utils.IsInArray(subDay, topics[0].AdvanceDays) {
- localUser, err := LocalUserManager.fetchLocalUser("", "", pwd.LocalUserId)
- if err != nil {
- return errors.Wrap(err, "fetchLocalUser error:")
- }
- pwd.EventNotify(ctx, userCred, notifyapi.ActionPasswordExpireSoon, localUser.Name, subDay)
- }
- return nil
- }
- // 密码即将失效消息通知
- func (pwd *SPassword) EventNotify(ctx context.Context, userCred mcclient.TokenCredential, action notifyapi.SAction, userName string, advanceDays int) {
- resourceType := notifyapi.TOPIC_RESOURCE_USER
- detailsDecro := func(ctx context.Context, details *jsonutils.JSONDict) {
- details.Set("account", jsonutils.NewString(userName))
- details.Set("advance_days", jsonutils.NewInt(int64(advanceDays)))
- }
- pwd.Password = ""
- notifyclient.EventNotify(ctx, userCred, notifyclient.SEventNotifyParam{
- Obj: pwd,
- ObjDetailsDecorator: detailsDecro,
- ResourceType: resourceType,
- Action: action,
- AdvanceDays: advanceDays,
- })
- }
- func (manager *SPasswordManager) InitializeData() error {
- return nil
- }
- func (manager *SPasswordManager) cleanPasswords() error {
- userIds, err := manager.findUserIdsNeedCleanPassword()
- if err != nil {
- return errors.Wrap(err, "manager.findUserIdsNeedCleanPassword")
- }
- for _, userId := range userIds {
- err := manager.cleanPassword(userId)
- if err != nil {
- return errors.Wrap(err, "manager.cleanPassword")
- }
- }
- return nil
- }
- func (manager *SPasswordManager) findUserIdsNeedCleanPassword() ([]int, error) {
- q := manager.Query()
- q = q.AppendField(q.Field("local_user_id"))
- q = q.AppendField(sqlchemy.COUNT("count"))
- q = q.GroupBy(q.Field("local_user_id"))
- rows, err := q.Rows()
- if err != nil {
- return nil, errors.Wrap(err, "rows")
- }
- defer rows.Close()
- userIds := []int{}
- for rows.Next() {
- var localUserId int
- var count int
- err := rows.Scan(&localUserId, &count)
- if err != nil {
- return userIds, errors.Wrap(err, "rows.Scan")
- }
- if count > options.Options.PasswordHistoryCount()+1 {
- // need to clean passwords of this user
- userIds = append(userIds, localUserId)
- }
- }
- return userIds, nil
- }
- func (manager *SPasswordManager) findMinPasswordId(localUserId int) (int, error) {
- subQ := manager.Query().Equals("local_user_id", localUserId).Desc("created_at_int").Limit(options.Options.PasswordHistoryCount() + 1).SubQuery()
- q := subQ.Query().AppendField(sqlchemy.MIN("min_id", subQ.Field("id"))).GroupBy(subQ.Field("id"))
- rows, err := q.Rows()
- if err != nil {
- return -1, errors.Wrap(err, "rows")
- }
- defer rows.Close()
- minId := -1
- for rows.Next() {
- var id int
- err := rows.Scan(&id)
- if err != nil {
- return -1, errors.Wrap(err, "rows.Scan")
- }
- minId = id
- break
- }
- return minId, nil
- }
- func (manager *SPasswordManager) cleanPassword(localUserId int) error {
- minId, err := manager.findMinPasswordId(localUserId)
- if err != nil {
- return errors.Wrap(err, "manager.findMinPasswordId")
- }
- _, err = manager.TableSpec().GetTableSpec().Database().Exec(fmt.Sprintf("DELETE FROM %s WHERE local_user_id = ? AND id < ?", manager.TableSpec().Name()), localUserId, minId)
- if err != nil {
- return errors.Wrap(err, "batch delete passwords")
- }
- return err
- }
- func (manager *SPasswordManager) CleanPasswordsJob(ctx context.Context, userCred mcclient.TokenCredential, startRun bool) {
- err := manager.cleanPasswords()
- if err != nil {
- log.Errorln(errors.Wrap(err, "manager.cleanPasswords"))
- }
- }
|