def create_users(): predef_users = [ { "name": "Admin (superuser)", "username": "******", "service": "admin", "email": "*****@*****.**", "profile": "admin", "passwd": "admin" } ] for user in predef_users: # check if the user already exists # if the user exist, chances are this scrip has been run before print("Querying database for user {}".format(user)) another_user = db.session.query(User.id) \ .filter_by(username=user['username']) \ .one_or_none() if another_user: print("This is not the first container run. Skipping") exit(0) print("Database access returned.") # mark the user as automatically created user['created_by'] = 0 # hash the password user['salt'] = str(binascii.hexlify(os.urandom(8)), 'ascii') user['hash'] = crypt(user['passwd'], user['salt'], 1000).split('$').pop() del user['passwd'] print("Creating a new instance of this user.") new_user = User(**user) print("New instance created.") # configure kong shared secret kong_data = kong.configure_kong(new_user.username) if kong_data is None: print('failed to configure verification subsystem') exit(-1) new_user.secret = kong_data['secret'] new_user.key = kong_data['key'] new_user.kongId = kong_data['kongid'] db.session.add(new_user) db.session.commit()
def create_user(): try: requester = auth.get_jwt_payload(request.headers.get('Authorization')) auth_data = load_json_from_request(request) # Create user new_user = crud.create_user(db.session, auth_data, requester) # If no problems occur to create user (no exceptions), configure kong kong_data = kong.configure_kong(new_user.username) if kong_data is None: return format_response( 500, 'failed to configure verification subsystem') new_user.secret = kong_data['secret'] new_user.key = kong_data['key'] new_user.kongId = kong_data['kongid'] db.session.add(new_user) db.session.commit() group_success = [] group_failed = [] if 'profile' in auth_data.keys(): group_success, group_failed = rship. \ add_user_many_groups(db.session, new_user.id, auth_data['profile'], requester) db.session.commit() if conf.emailHost != 'NOEMAIL': pwdc.create_password_set_request(db.session, new_user) db.session.commit() if crud.count_tenant_users(db.session, new_user.service) == 1: log().info("will emit tenant lifecycle event {} - CREATE".format( new_user.service)) send_notification({"type": 'CREATE', 'tenant': new_user.service}) return make_response( json.dumps( { "user": new_user.safeDict(), "groups": group_success, "could not add": group_failed, "message": "user created" }, default=json_serial), 200) except HTTPRequestError as err: return format_response(err.errorCode, err.message)
def password_reset(): try: link = request.args.get('link') reset_data = load_json_from_request(request) updating_user = pwdc.reset_password(db.session, link, reset_data) # password updated. Should reconfigure kong and Invalidate # all previous logins kong_data = kong.configure_kong(updating_user.username) if kong_data is None: return format_response( 500, 'failed to configure verification subsystem') kong.revoke_kong_secret(updating_user.username, updating_user.kongId) updating_user.secret = kong_data['secret'] updating_user.key = kong_data['key'] updating_user.kongid = kong_data['kongid'] db.session.add(updating_user) db.session.commit() except HTTPRequestError as err: return format_response(err.errorCode, err.message) else: return format_response(200)
def update_user(user): try: requester = auth.get_jwt_payload(request.headers.get('Authorization')) auth_data = load_json_from_request(request) updated_user, old_service = crud.update_user(db.session, user, auth_data, requester) # Create a new kong secret and delete the old one kong_data = kong.configure_kong(updated_user.username) if kong_data is None: return format_response( 500, 'failed to configure verification subsystem') kong.revoke_kong_secret(updated_user.username, updated_user.kongId) updated_user.secret = kong_data['secret'] updated_user.key = kong_data['key'] updated_user.kongid = kong_data['kongid'] db.session.add(updated_user) db.session.commit() if crud.count_tenant_users(db.session, old_service) == 0: log().info("will emit tenant lifecycle event {} - DELETE".format( old_service)) send_notification({"type": 'DELETE', 'tenant': old_service}) if crud.count_tenant_users(db.session, updated_user.service) == 1: log().info("will emit tenant lifecycle event {} - CREATE".format( updated_user.service)) send_notification({ "type": 'CREATE', 'tenant': updated_user.service }) return format_response(200) except HTTPRequestError as err: return format_response(err.errorCode, err.message)
def create_user(db_session, user: User, requester): """ Create a new user. :param db_session: The postgres db session to be used :param user: User The user to be created. This is a simple dictionary with all 'fillable' field listed in Models.User class. :param requester: Who is creating this user. This is a dictionary with two keys: "userid" and "username" :return: The result of creating this user. :raises HTTPRequestError: If username is already in use :raises HTTPRequestError: If e-mail is already in use :raises HTTPRequestError: If any problem occurs while configuring Kong """ # Drop invalid fields user = {k: user[k] for k in user if k in User.fillable} LOGGER.debug("Checking user data...") check_user(user) LOGGER.debug("... user data is OK.") if not user.get('profile', ""): raise HTTPRequestError(400, "Missing profile") if len(user['profile']) > UserLimits.profile: raise HTTPRequestError(400, "Profile name too long") # Sanity checks # Check whether username and e-mail are unique. LOGGER.debug("Checking whether user already exist...") if db_session.query( User.id).filter_by(username=user['username']).one_or_none(): LOGGER.warning("User already exists.") raise HTTPRequestError(400, f"Username {user['username']} is in use.") LOGGER.debug("... user doesn't exist.") LOGGER.debug("Checking whether user e-mail is already being used...") if db_session.query(User.id).filter_by(email=user['email']).one_or_none(): LOGGER.warning("User e-mail is already being used.") raise HTTPRequestError(400, f"E-mail {user['email']} is in use.") LOGGER.debug("... user e-mail is not being used.") if conf.emailHost == 'NOEMAIL': user['salt'], user['hash'] = password.create_pwd( conf.temporaryPassword) # Last field to be filled automatically, before parsing user['created_by'] = requester['userid'] # User structure is finished. LOGGER.debug("Creating user instance...") new_user = User(**user) LOGGER.debug("... user instance was created.") LOGGER.debug( f"User data is: {user['username']} created by {requester['username']}") # If no problems occur to create user (no exceptions), configure kong LOGGER.debug("Configuring Kong...") kong_data = kongUtils.configure_kong(new_user.username) if kong_data is None: LOGGER.warning("Could not configure Kong.") raise HTTPRequestError(500, 'failed to configure verification subsystem') LOGGER.debug("... Kong was successfully configured.") new_user.secret = kong_data['secret'] new_user.key = kong_data['key'] new_user.kongId = kong_data['kongid'] # Add the new user to the database LOGGER.debug("Adding new user to database session...") db_session.add(new_user) LOGGER.debug("... new user was added to database session.") LOGGER.debug("Committing database changes...") db_session.commit() LOGGER.debug("... database changes were committed.") # Configuring groups and user profiles group_success = [] group_failed = [] LOGGER.debug("Configuring user profile...") if 'profile' in user.keys(): group_success, group_failed = rship. \ add_user_many_groups(db_session, new_user.id, user['profile'], requester) db_session.commit() LOGGER.debug("... user profile was configured.") LOGGER.debug("Configuring user password...") if conf.emailHost != 'NOEMAIL': try: pwdc.create_password_set_request(db_session, new_user) db_session.commit() except Exception as e: LOGGER.warning(e) LOGGER.debug("... user password was configured.") LOGGER.debug("Sending tenant creation message to other components...") if count_tenant_users(db_session, new_user.service) == 1: LOGGER.info( f"Will emit tenant lifecycle event {new_user.service} - CREATE") Publisher.send_notification({ "type": 'CREATE', 'tenant': new_user.service }) LOGGER.debug("... tenant creation message was sent.") ret = { "user": new_user.safe_dict(), "groups": group_success, "could not add": group_failed, "message": "user created" } return ret
def create_user(db_session, user: User, requester): """ Create a new user. :param db_session: The postgres db session to be used :param user: User The user to be created. This is a simple dictionary with all 'fillable' field listed in Models.User class. :param requester: Who is creating this user. This is a dictionary with two keys: "userid" and "username" :return: The result of creating this user. :raises HTTPRequestError: If username is already in use :raises HTTPRequestError: If e-mail is already in use :raises HTTPRequestError: If any problem occurs while configuring Kong """ # Drop invalid fields user = {k: user[k] for k in user if k in User.fillable} check_user(user) # Sanity checks # Check whether username and e-mail are unique. if db_session.query( User.id).filter_by(username=user['username']).one_or_none(): raise HTTPRequestError(400, f"Username {user['username']} is in use.") if db_session.query(User.id).filter_by(email=user['email']).one_or_none(): raise HTTPRequestError(400, f"E-mail {user['email']} is in use.") if conf.emailHost == 'NOEMAIL': user['salt'], user['hash'] = password.create_pwd( conf.temporaryPassword) # Last field to be filled automatically, before parsing user['created_by'] = requester['userid'] # User structure is finished. new_user = User(**user) log().info(f"User {user['username']} created by {requester['username']}") log().info(new_user) # If no problems occur to create user (no exceptions), configure kong kong_data = kongUtils.configure_kong(new_user.username) if kong_data is None: raise HTTPRequestError(500, 'failed to configure verification subsystem') new_user.secret = kong_data['secret'] new_user.key = kong_data['key'] new_user.kongId = kong_data['kongid'] # Add the new user to the database db_session.add(new_user) db_session.commit() # Configuring groups and user profiles group_success = [] group_failed = [] if 'profile' in user.keys(): group_success, group_failed = rship. \ add_user_many_groups(db_session, new_user.id, user['profile'], requester) db_session.commit() if conf.emailHost != 'NOEMAIL': pwdc.create_password_set_request(db_session, new_user) db_session.commit() if count_tenant_users(db_session, new_user.service) == 1: log().info( f"Will emit tenant lifecycle event {new_user.service} - CREATE") send_notification({"type": 'CREATE', 'tenant': new_user.service}) ret = { "user": new_user.safe_dict(), "groups": group_success, "could not add": group_failed, "message": "user created" } return ret
def update_user(db_session, user: str, updated_info, requester) -> (dict, str): """ Updates all the information about a particular user. :param db_session: The postgres session to be used. :param user: The user ID to be updated. :param updated_info: The new data. :param requester: Who is requiring this update. :return: The old information (a dictionary containing the old information about the user and the old service. :raises HTTPRequestError: If the username is different from the original (this field cannot be updated). """ # Drop invalid fields updated_info = { k: updated_info[k] for k in updated_info if k in User.fillable } user = User.get_by_name_or_id(user) old_user = user.safe_dict() old_service = user.service if 'username' in updated_info.keys() \ and updated_info['username'] != user.username: raise HTTPRequestError(400, "usernames can't be updated") # check_user function needs username. updated_info['username'] = user.username check_user(updated_info) # Verify if the email is in use by another user if 'email' in updated_info.keys() and updated_info['email'] != user.email: if db_session.query(User).filter_by( email=updated_info['email']).one_or_none(): raise HTTPRequestError(400, "email already in use") log().info(f"user {user.username} updated by {requester['username']}") log().info({'oldUser': user.safe_dict(), 'newUser': updated_info}) # Update all new data. if 'name' in updated_info.keys(): user.name = updated_info['name'] if 'service' in updated_info.keys(): user.service = updated_info['service'] if 'email' in updated_info.keys(): user.email = updated_info['email'] # Create a new kong secret and delete the old one kong_data = kongUtils.configure_kong(user.username) if kong_data is None: raise HTTPRequestError(500, 'failed to configure verification subsystem') kongUtils.revoke_kong_secret(user.username, user.kongId) user.secret = kong_data['secret'] user.key = kong_data['key'] user.kongId = kong_data['kongid'] db_session.add(user) db_session.commit() # Publish messages related to service creation/deletion if count_tenant_users(db_session, old_service) == 0: log().info(f"will emit tenant lifecycle event {old_service} - DELETE") send_notification({"type": 'DELETE', 'tenant': old_service}) if count_tenant_users(db_session, user.service) == 1: log().info(f"will emit tenant lifecycle event {user.service} - CREATE") send_notification({"type": 'CREATE', 'tenant': user.service}) return old_user, old_service