2020-09-02 22:04:12 +00:00
|
|
|
"""Outpost models"""
|
|
|
|
from dataclasses import asdict, dataclass
|
|
|
|
from datetime import datetime
|
2020-09-18 22:54:48 +00:00
|
|
|
from typing import Any, Dict, Iterable, Optional
|
2020-09-02 22:04:12 +00:00
|
|
|
from uuid import uuid4
|
|
|
|
|
|
|
|
from dacite import from_dict
|
|
|
|
from django.contrib.postgres.fields import ArrayField
|
|
|
|
from django.core.cache import cache
|
2020-09-14 15:34:07 +00:00
|
|
|
from django.db import models, transaction
|
2020-09-13 12:29:40 +00:00
|
|
|
from django.db.models.base import Model
|
2020-09-18 22:25:28 +00:00
|
|
|
from django.http import HttpRequest
|
2020-09-18 22:54:48 +00:00
|
|
|
from django.utils import version
|
2020-09-02 22:04:12 +00:00
|
|
|
from django.utils.translation import gettext_lazy as _
|
2020-09-14 15:34:07 +00:00
|
|
|
from guardian.models import UserObjectPermission
|
2020-09-02 22:04:12 +00:00
|
|
|
from guardian.shortcuts import assign_perm
|
2020-09-18 22:54:48 +00:00
|
|
|
from packaging.version import InvalidVersion, parse
|
2020-09-02 22:04:12 +00:00
|
|
|
|
2020-09-18 22:54:48 +00:00
|
|
|
from passbook import __version__
|
2020-09-02 22:04:12 +00:00
|
|
|
from passbook.core.models import Provider, Token, TokenIntents, User
|
|
|
|
from passbook.lib.config import CONFIG
|
2020-09-18 22:25:28 +00:00
|
|
|
from passbook.lib.utils.template import render_to_string
|
2020-09-02 22:04:12 +00:00
|
|
|
|
2020-09-18 22:54:48 +00:00
|
|
|
OUR_VERSION = parse(__version__)
|
|
|
|
|
2020-09-02 22:04:12 +00:00
|
|
|
|
|
|
|
@dataclass
|
|
|
|
class OutpostConfig:
|
|
|
|
"""Configuration an outpost uses to configure it self"""
|
|
|
|
|
|
|
|
passbook_host: str
|
|
|
|
passbook_host_insecure: bool = False
|
|
|
|
|
|
|
|
log_level: str = CONFIG.y("log_level")
|
|
|
|
error_reporting_enabled: bool = CONFIG.y_bool("error_reporting.enabled")
|
|
|
|
error_reporting_environment: str = CONFIG.y(
|
|
|
|
"error_reporting.environment", "customer"
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2020-09-13 12:29:40 +00:00
|
|
|
class OutpostModel(Model):
|
2020-09-02 22:04:12 +00:00
|
|
|
"""Base model for providers that need more objects than just themselves"""
|
|
|
|
|
|
|
|
def get_required_objects(self) -> Iterable[models.Model]:
|
|
|
|
"""Return a list of all required objects"""
|
|
|
|
return [self]
|
|
|
|
|
2020-09-13 12:29:40 +00:00
|
|
|
class Meta:
|
|
|
|
|
|
|
|
abstract = True
|
|
|
|
|
2020-09-02 22:04:12 +00:00
|
|
|
|
|
|
|
class OutpostType(models.TextChoices):
|
|
|
|
"""Outpost types, currently only the reverse proxy is available"""
|
|
|
|
|
|
|
|
PROXY = "proxy"
|
|
|
|
|
|
|
|
|
|
|
|
class OutpostDeploymentType(models.TextChoices):
|
|
|
|
"""Deployment types that are managed through passbook"""
|
|
|
|
|
2020-09-09 17:34:19 +00:00
|
|
|
# KUBERNETES = "kubernetes"
|
2020-09-02 22:04:12 +00:00
|
|
|
CUSTOM = "custom"
|
|
|
|
|
|
|
|
|
|
|
|
def default_outpost_config():
|
|
|
|
"""Get default outpost config"""
|
|
|
|
return asdict(OutpostConfig(passbook_host=""))
|
|
|
|
|
|
|
|
|
|
|
|
class Outpost(models.Model):
|
|
|
|
"""Outpost instance which manages a service user and token"""
|
|
|
|
|
|
|
|
uuid = models.UUIDField(default=uuid4, editable=False, primary_key=True)
|
|
|
|
name = models.TextField()
|
|
|
|
|
|
|
|
type = models.TextField(choices=OutpostType.choices, default=OutpostType.PROXY)
|
|
|
|
deployment_type = models.TextField(
|
|
|
|
choices=OutpostDeploymentType.choices,
|
|
|
|
default=OutpostDeploymentType.CUSTOM,
|
|
|
|
help_text=_(
|
|
|
|
"Select between passbook-managed deployment types or a custom deployment."
|
|
|
|
),
|
|
|
|
)
|
|
|
|
_config = models.JSONField(default=default_outpost_config)
|
|
|
|
|
|
|
|
providers = models.ManyToManyField(Provider)
|
|
|
|
|
|
|
|
channels = ArrayField(models.TextField(), default=list)
|
|
|
|
|
|
|
|
@property
|
|
|
|
def config(self) -> OutpostConfig:
|
|
|
|
"""Load config as OutpostConfig object"""
|
2020-09-13 20:19:26 +00:00
|
|
|
return from_dict(OutpostConfig, self._config)
|
2020-09-02 22:04:12 +00:00
|
|
|
|
|
|
|
@config.setter
|
|
|
|
def config(self, value):
|
|
|
|
"""Dump config into json"""
|
2020-09-13 20:19:26 +00:00
|
|
|
self._config = asdict(value)
|
2020-09-02 22:04:12 +00:00
|
|
|
|
2020-09-18 22:54:48 +00:00
|
|
|
def state_cache_prefix(self, suffix: str) -> str:
|
|
|
|
"""Key by which the outposts status is saved"""
|
|
|
|
return f"outpost_{self.uuid.hex}_state_{suffix}"
|
2020-09-02 22:04:12 +00:00
|
|
|
|
|
|
|
@property
|
2020-09-18 22:54:48 +00:00
|
|
|
def deployment_health(self) -> Optional[datetime]:
|
2020-09-02 22:04:12 +00:00
|
|
|
"""Get outpost's health status"""
|
2020-09-18 22:54:48 +00:00
|
|
|
key = self.state_cache_prefix("health")
|
2020-09-02 22:04:12 +00:00
|
|
|
value = cache.get(key, None)
|
|
|
|
if value:
|
|
|
|
return datetime.fromtimestamp(value)
|
|
|
|
return None
|
|
|
|
|
2020-09-18 22:54:48 +00:00
|
|
|
@property
|
|
|
|
def deployment_version(self) -> Dict[str, Any]:
|
|
|
|
"""Get deployed outposts version, and if the version is behind ours.
|
|
|
|
Returns a dict with keys version and outdated."""
|
|
|
|
key = self.state_cache_prefix("version")
|
|
|
|
value = cache.get(key, None)
|
|
|
|
if not value:
|
2020-09-19 17:03:54 +00:00
|
|
|
return {"version": "", "outdated": False, "should": OUR_VERSION}
|
2020-09-18 22:54:48 +00:00
|
|
|
try:
|
|
|
|
outpost_version = parse(value)
|
2020-09-19 17:03:54 +00:00
|
|
|
return {"version": value, "outdated": outpost_version < OUR_VERSION, "should": OUR_VERSION}
|
2020-09-18 22:54:48 +00:00
|
|
|
except InvalidVersion:
|
2020-09-19 17:03:54 +00:00
|
|
|
return {"version": version, "outdated": False, "should": OUR_VERSION}
|
2020-09-18 22:54:48 +00:00
|
|
|
|
2020-09-14 13:41:02 +00:00
|
|
|
@property
|
|
|
|
def user(self) -> User:
|
|
|
|
"""Get/create user with access to all required objects"""
|
|
|
|
users = User.objects.filter(username=f"pb-outpost-{self.uuid.hex}")
|
|
|
|
if not users.exists():
|
|
|
|
user: User = User.objects.create(username=f"pb-outpost-{self.uuid.hex}")
|
|
|
|
user.set_unusable_password()
|
|
|
|
user.save()
|
|
|
|
else:
|
|
|
|
user = users.first()
|
2020-09-14 15:34:07 +00:00
|
|
|
# To ensure the user only has the correct permissions, we delete all of them and re-add
|
|
|
|
# the ones the user needs
|
|
|
|
with transaction.atomic():
|
|
|
|
UserObjectPermission.objects.filter(user=user).delete()
|
|
|
|
for model in self.get_required_objects():
|
|
|
|
code_name = f"{model._meta.app_label}.view_{model._meta.model_name}"
|
|
|
|
assign_perm(code_name, user, model)
|
2020-09-02 22:04:12 +00:00
|
|
|
return user
|
|
|
|
|
|
|
|
@property
|
|
|
|
def token(self) -> Token:
|
|
|
|
"""Get/create token for auto-generated user"""
|
|
|
|
token = Token.filter_not_expired(user=self.user, intent=TokenIntents.INTENT_API)
|
|
|
|
if token.exists():
|
|
|
|
return token.first()
|
|
|
|
return Token.objects.create(
|
|
|
|
user=self.user,
|
|
|
|
intent=TokenIntents.INTENT_API,
|
|
|
|
description=f"Autogenerated by passbook for Outpost {self.name}",
|
|
|
|
expiring=False,
|
|
|
|
)
|
|
|
|
|
|
|
|
def get_required_objects(self) -> Iterable[models.Model]:
|
|
|
|
"""Get an iterator of all objects the user needs read access to"""
|
|
|
|
objects = [self]
|
|
|
|
for provider in (
|
|
|
|
Provider.objects.filter(outpost=self).select_related().select_subclasses()
|
|
|
|
):
|
|
|
|
if isinstance(provider, OutpostModel):
|
|
|
|
objects.extend(provider.get_required_objects())
|
|
|
|
else:
|
|
|
|
objects.append(provider)
|
|
|
|
return objects
|
|
|
|
|
2020-09-18 22:25:28 +00:00
|
|
|
def html_deployment_view(self, request: HttpRequest) -> Optional[str]:
|
|
|
|
"""return template and context modal to view token and other config info"""
|
|
|
|
return render_to_string(
|
|
|
|
"outposts/deployment_modal.html",
|
|
|
|
{"outpost": self, "full_url": request.build_absolute_uri("/")},
|
|
|
|
)
|
|
|
|
|
2020-09-02 22:04:12 +00:00
|
|
|
def __str__(self) -> str:
|
|
|
|
return f"Outpost {self.name}"
|