@@ -191,9 +191,12 @@ class Groups(models.Model):
191
191
color = fields .Integer (string = 'Color Index' )
192
192
full_name = fields .Char (compute = '_compute_full_name' , string = 'Group Name' , search = '_search_full_name' )
193
193
share = fields .Boolean (string = 'Share Group' , help = "Group created to set access rights for sharing data with some users." )
194
+ api_key_duration = fields .Float (string = 'API Keys maximum duration days' ,
195
+ help = "Determines the maximum duration of an api key created by a user belonging to this group." )
194
196
195
197
_sql_constraints = [
196
- ('name_uniq' , 'unique (category_id, name)' , 'The name of the group must be unique within an application!' )
198
+ ('name_uniq' , 'unique (category_id, name)' , 'The name of the group must be unique within an application!' ),
199
+ ('check_api_key_duration' , 'CHECK(api_key_duration >= 0)' , 'The api key duration cannot be a negative value.' ),
197
200
]
198
201
199
202
@api .constrains ('users' )
@@ -2288,6 +2291,7 @@ class APIKeys(models.Model):
2288
2291
user_id = fields .Many2one ('res.users' , index = True , required = True , readonly = True , ondelete = "cascade" )
2289
2292
scope = fields .Char ("Scope" , readonly = True )
2290
2293
create_date = fields .Datetime ("Creation Date" , readonly = True )
2294
+ expiration_date = fields .Datetime ("Expiration Date" , readonly = True )
2291
2295
2292
2296
def init (self ):
2293
2297
table = SQL .identifier (self ._table )
@@ -2297,6 +2301,7 @@ def init(self):
2297
2301
name varchar not null,
2298
2302
user_id integer not null REFERENCES res_users(id) ON DELETE CASCADE,
2299
2303
scope varchar,
2304
+ expiration_date timestamp without time zone,
2300
2305
index varchar(%(index_size)s) not null CHECK (char_length(index) = %(index_size)s),
2301
2306
key varchar not null,
2302
2307
create_date timestamp without time zone DEFAULT (now() at time zone 'utc')
@@ -2336,48 +2341,129 @@ def _check_credentials(self, *, scope, key):
2336
2341
self .env .cr .execute ('''
2337
2342
SELECT user_id, key
2338
2343
FROM {} INNER JOIN res_users u ON (u.id = user_id)
2339
- WHERE u.active and index = %s AND (scope IS NULL OR scope = %s)
2344
+ WHERE
2345
+ u.active and index = %s
2346
+ AND (scope IS NULL OR scope = %s)
2347
+ AND (
2348
+ expiration_date IS NULL OR
2349
+ expiration_date >= now() at time zone 'utc'
2350
+ )
2340
2351
''' .format (self ._table ),
2341
2352
[index , scope ])
2342
2353
for user_id , current_key in self .env .cr .fetchall ():
2343
2354
if KEY_CRYPT_CONTEXT .verify (key , current_key ):
2344
2355
return user_id
2345
2356
2346
- def _generate (self , scope , name ):
2357
+ def _check_expiration_date (self , date ):
2358
+ # To be in a sudoed environment or to be an administrator
2359
+ # to create a persistent key (no expiration date) or
2360
+ # to exceed the maximum duration determined by the user's privileges.
2361
+ if self .env .is_system ():
2362
+ return
2363
+ if not date :
2364
+ raise UserError (_ ("The API key must have an expiration date" ))
2365
+ max_duration = max (group .api_key_duration for group in self .env .user .groups_id ) or 1.0
2366
+ if date > datetime .datetime .now () + datetime .timedelta (days = max_duration ):
2367
+ raise UserError (_ ("You cannot exceed %(duration)s days." , duration = max_duration ))
2368
+
2369
+ def _generate (self , scope , name , expiration_date ):
2347
2370
"""Generates an api key.
2348
2371
:param str scope: the scope of the key. If None, the key will give access to any rpc.
2349
2372
:param str name: the name of the key, mainly intended to be displayed in the UI.
2373
+ :param date expiration_date: the expiration date of the key.
2350
2374
:return: str: the key.
2351
2375
2376
+ Note:
2377
+ This method must be called in sudo to use a duration
2378
+ greater than that allowed by the user's privileges.
2379
+ For a persistent key (infinite duration), no value for expiration date.
2352
2380
"""
2381
+ self ._check_expiration_date (expiration_date )
2353
2382
# no need to clear the LRU when *adding* a key, only when removing
2354
2383
k = binascii .hexlify (os .urandom (API_KEY_SIZE )).decode ()
2355
2384
self .env .cr .execute ("""
2356
- INSERT INTO {table} (name, user_id, scope, key, index)
2357
- VALUES (%s, %s, %s, %s, %s)
2385
+ INSERT INTO {table} (name, user_id, scope, expiration_date, key, index)
2386
+ VALUES (%s, %s, %s, %s, %s, %s )
2358
2387
RETURNING id
2359
2388
""" .format (table = self ._table ),
2360
- [name , self .env .user .id , scope , KEY_CRYPT_CONTEXT .hash (k ), k [:INDEX_SIZE ]])
2389
+ [name , self .env .user .id , scope , expiration_date or None , KEY_CRYPT_CONTEXT .hash (k ), k [:INDEX_SIZE ]])
2361
2390
2362
2391
ip = request .httprequest .environ ['REMOTE_ADDR' ] if request else 'n/a'
2363
2392
_logger .info ("%s generated: scope: <%s> for '%s' (#%s) from %s" ,
2364
2393
self ._description , scope , self .env .user .login , self .env .uid , ip )
2365
2394
2366
2395
return k
2367
2396
2397
+ @api .autovacuum
2398
+ def _gc_user_apikeys (self ):
2399
+ self .env .cr .execute (SQL ("""
2400
+ DELETE FROM %s
2401
+ WHERE
2402
+ expiration_date IS NOT NULL AND
2403
+ expiration_date < now() at time zone 'utc'
2404
+ """ , SQL .identifier (self ._table )))
2405
+ _logger .info ("GC %r delete %d entries" , self ._name , self .env .cr .rowcount )
2406
+
2368
2407
class APIKeyDescription (models .TransientModel ):
2369
2408
_name = 'res.users.apikeys.description'
2370
2409
_description = 'API Key Description'
2371
2410
2411
+ def _selection_duration (self ):
2412
+ # duration value is a string representing the number of days.
2413
+ durations = [
2414
+ ('1' , '1 Day' ),
2415
+ ('7' , '1 Week' ),
2416
+ ('30' , '1 Month' ),
2417
+ ('90' , '3 Months' ),
2418
+ ('180' , '6 Months' ),
2419
+ ('365' , '1 Year' ),
2420
+ ]
2421
+ persistent_duration = ('0' , 'Persistent Key' ) # Magic value to detect an infinite duration
2422
+ custom_duration = ('-1' , 'Custom Date' ) # Will force the user to enter a date manually
2423
+ if self .env .is_system ():
2424
+ return durations + [persistent_duration , custom_duration ]
2425
+ max_duration = max (group .api_key_duration for group in self .env .user .groups_id ) or 1.0
2426
+ return list (filter (
2427
+ lambda duration : int (duration [0 ]) <= max_duration , durations
2428
+ )) + [custom_duration ]
2429
+
2372
2430
name = fields .Char ("Description" , required = True )
2431
+ duration = fields .Selection (
2432
+ selection = '_selection_duration' , string = 'Duration' , required = True ,
2433
+ default = lambda self : self ._selection_duration ()[0 ][0 ]
2434
+ )
2435
+ expiration_date = fields .Datetime ('Expiration Date' , compute = '_compute_expiration_date' , store = True , readonly = False )
2436
+
2437
+ @api .depends ('duration' )
2438
+ def _compute_expiration_date (self ):
2439
+ for record in self :
2440
+ duration = int (record .duration )
2441
+ if duration >= 0 :
2442
+ record .expiration_date = (
2443
+ fields .Date .today () + datetime .timedelta (days = duration )
2444
+ if int (record .duration )
2445
+ else None
2446
+ )
2447
+
2448
+ @api .onchange ('expiration_date' )
2449
+ def _onchange_expiration_date (self ):
2450
+ try :
2451
+ self .env ['res.users.apikeys' ]._check_expiration_date (self .expiration_date )
2452
+ except UserError as error :
2453
+ warning = {
2454
+ 'type' : 'notification' ,
2455
+ 'title' : _ ('The API key duration is not correct.' ),
2456
+ 'message' : error .args [0 ]
2457
+ }
2458
+ return {'warning' : warning }
2373
2459
2374
2460
@check_identity
2375
2461
def make_key (self ):
2376
2462
# only create keys for users who can delete their keys
2377
2463
self .check_access_make_key ()
2378
2464
2379
2465
description = self .sudo ()
2380
- k = self .env ['res.users.apikeys' ]._generate (None , self . sudo (). name )
2466
+ k = self .env ['res.users.apikeys' ]._generate (None , description . name , self . expiration_date )
2381
2467
description .unlink ()
2382
2468
2383
2469
return {
0 commit comments