Skip to content

Commit 18db6ff

Browse files
committed
[IMP] base: add expiration date on API keys
From a security point of view, API keys must have an expiration date (only administrators can create persistent keys). The expiration date of an API key is determined when it is created and cannot be changed afterwards. The maximum duration (a number of days) of an API key depends on the privileges of the user creating the key. This duration is determined according to the the groups to which the user belongs. Each group contains a maximum duration for api keys (administrator can change this). An API key whose expiration date has passed will be unusable and will be deleted during the next garbage collector. task-4143574 closes odoo#178558 Signed-off-by: Denis Ledoux (dle) <[email protected]>
1 parent 6670904 commit 18db6ff

File tree

9 files changed

+139
-24
lines changed

9 files changed

+139
-24
lines changed

addons/auth_totp/controllers/home.py

+7-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
# -*- coding: utf-8 -*-
22
import re
33

4+
from datetime import datetime, timedelta
5+
46
from odoo import http, _
57
from odoo.exceptions import AccessDenied
68
from odoo.http import request
@@ -58,7 +60,11 @@ def web_totp(self, redirect=None, **kwargs):
5860
if request.geoip.city.name:
5961
name += f" ({request.geoip.city.name}, {request.geoip.country_name})"
6062

61-
key = request.env['auth_totp.device']._generate("browser", name)
63+
key = request.env['auth_totp.device'].sudo()._generate(
64+
"browser",
65+
name,
66+
datetime.now() + timedelta(seconds=TRUSTED_DEVICE_AGE)
67+
)
6268
response.set_cookie(
6369
key=TRUSTED_DEVICE_COOKIE,
6470
value=key,

addons/auth_totp/models/auth_totp.py

+1-10
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
# -*- coding: utf-8 -*-
2-
from odoo import api, models
3-
from odoo.addons.auth_totp.controllers.home import TRUSTED_DEVICE_AGE
2+
from odoo import models
43

54
import logging
65
_logger = logging.getLogger(__name__)
@@ -21,11 +20,3 @@ def _check_credentials_for_uid(self, *, scope, key, uid):
2120
"""Return True if device key matches given `scope` for user ID `uid`"""
2221
assert uid, "uid is required"
2322
return self._check_credentials(scope=scope, key=key) == uid
24-
25-
@api.autovacuum
26-
def _gc_device(self):
27-
self._cr.execute("""
28-
DELETE FROM auth_totp_device
29-
WHERE create_date < (NOW() AT TIME ZONE 'UTC' - INTERVAL '%s SECONDS')
30-
""", [TRUSTED_DEVICE_AGE])
31-
_logger.info("GC'd %d totp devices entries", self._cr.rowcount)

addons/auth_totp_mail/models/auth_totp_device.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,12 @@ def unlink(self):
2222

2323
return super().unlink()
2424

25-
def _generate(self, scope, name):
25+
def _generate(self, scope, name, expiration_date):
2626
""" Notify users when trusted devices are added onto their account.
2727
We override this method instead of 'create' as those records are inserted directly into the
2828
database using raw SQL. """
2929

30-
res = super()._generate(scope, name)
30+
res = super()._generate(scope, name, expiration_date)
3131

3232
self.env.user._notify_security_setting_update(
3333
_("Security Update: Device Added"),

addons/auth_totp_mail/tests/test_notify_security_update_totp.py

+13-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
11
# -*- coding: utf-8 -*-
22
# Part of Odoo. See LICENSE file for full copyright and licensing details.
33

4+
from datetime import datetime, timedelta
5+
6+
from odoo.addons.auth_totp.controllers.home import TRUSTED_DEVICE_AGE
47
from odoo.addons.mail.tests.test_res_users import TestNotifySecurityUpdate
58
from odoo.tests import users
69

@@ -28,15 +31,23 @@ def test_security_update_trusted_device_added_removed(self):
2831
""" Make sure we notify the user when TOTP trusted devices are added/removed on his account. """
2932
recipients = [self.env.user.email_formatted]
3033
with self.mock_mail_gateway():
31-
self.env['auth_totp.device']._generate('trusted_device_chrome', 'Chrome on Windows')
34+
self.env['auth_totp.device'].sudo()._generate(
35+
'trusted_device_chrome',
36+
'Chrome on Windows',
37+
datetime.now() + timedelta(seconds=TRUSTED_DEVICE_AGE)
38+
)
3239

3340
self.assertMailMailWEmails(recipients, 'outgoing', fields_values={
3441
'subject': 'Security Update: Device Added',
3542
})
3643

3744
# generating a key outside of the 'auth_totp.device' model should however not notify
3845
with self.mock_mail_gateway():
39-
self.env['res.users.apikeys']._generate('new_api_key', 'New Key')
46+
self.env['res.users.apikeys']._generate(
47+
'new_api_key',
48+
'New Key',
49+
datetime.now() + timedelta(days=1)
50+
)
4051
self.assertNotSentEmail(recipients)
4152

4253
# now remove the key using the user's relationship

addons/mail_plugin/controllers/authenticate.py

+5-1
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,11 @@ def auth_access_token(self, auth_code='', **kw):
7373
return {"error": "Invalid code"}
7474
request.update_env(user=auth_message['uid'])
7575
scope = 'odoo.plugin.' + auth_message.get('scope', '')
76-
api_key = request.env['res.users.apikeys']._generate(scope, auth_message['name'])
76+
api_key = request.env['res.users.apikeys']._generate(
77+
scope,
78+
auth_message['name'],
79+
datetime.datetime.now() + datetime.timedelta(days=1)
80+
)
7781
return {'access_token': api_key}
7882

7983
def _get_auth_code_data(self, auth_code):

addons/portal/tests/test_portal.py

+7-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
from datetime import datetime, timedelta
2+
13
from odoo import Command
24
from odoo.http import Request
35
from odoo.tests.common import HttpCase, tagged
@@ -15,7 +17,11 @@ def test_deactivate_portal_user(self):
1517
'password': login,
1618
'groups_id': [Command.set([self.env.ref('base.group_portal').id])],
1719
})
18-
self.env['res.users.apikeys'].with_user(portal_user)._generate(None, 'Portal API Key')
20+
self.env['res.users.apikeys'].with_user(portal_user)._generate(
21+
None,
22+
'Portal API Key',
23+
datetime.now() + timedelta(days=1)
24+
)
1925
self.assertTrue(portal_user.api_key_ids)
2026

2127
# Request the deactivation of the portal account as portal through the route meant for this purpose

odoo/addons/base/models/res_users.py

+93-7
Original file line numberDiff line numberDiff line change
@@ -191,9 +191,12 @@ class Groups(models.Model):
191191
color = fields.Integer(string='Color Index')
192192
full_name = fields.Char(compute='_compute_full_name', string='Group Name', search='_search_full_name')
193193
share = fields.Boolean(string='Share Group', help="Group created to set access rights for sharing data with some users.")
194+
api_key_duration = fields.Float(string='API Keys maximum duration days',
195+
help="Determines the maximum duration of an api key created by a user belonging to this group.")
194196

195197
_sql_constraints = [
196-
('name_uniq', 'unique (category_id, name)', 'The name of the group must be unique within an application!')
198+
('name_uniq', 'unique (category_id, name)', 'The name of the group must be unique within an application!'),
199+
('check_api_key_duration', 'CHECK(api_key_duration >= 0)', 'The api key duration cannot be a negative value.'),
197200
]
198201

199202
@api.constrains('users')
@@ -2288,6 +2291,7 @@ class APIKeys(models.Model):
22882291
user_id = fields.Many2one('res.users', index=True, required=True, readonly=True, ondelete="cascade")
22892292
scope = fields.Char("Scope", readonly=True)
22902293
create_date = fields.Datetime("Creation Date", readonly=True)
2294+
expiration_date = fields.Datetime("Expiration Date", readonly=True)
22912295

22922296
def init(self):
22932297
table = SQL.identifier(self._table)
@@ -2297,6 +2301,7 @@ def init(self):
22972301
name varchar not null,
22982302
user_id integer not null REFERENCES res_users(id) ON DELETE CASCADE,
22992303
scope varchar,
2304+
expiration_date timestamp without time zone,
23002305
index varchar(%(index_size)s) not null CHECK (char_length(index) = %(index_size)s),
23012306
key varchar not null,
23022307
create_date timestamp without time zone DEFAULT (now() at time zone 'utc')
@@ -2336,48 +2341,129 @@ def _check_credentials(self, *, scope, key):
23362341
self.env.cr.execute('''
23372342
SELECT user_id, key
23382343
FROM {} INNER JOIN res_users u ON (u.id = user_id)
2339-
WHERE u.active and index = %s AND (scope IS NULL OR scope = %s)
2344+
WHERE
2345+
u.active and index = %s
2346+
AND (scope IS NULL OR scope = %s)
2347+
AND (
2348+
expiration_date IS NULL OR
2349+
expiration_date >= now() at time zone 'utc'
2350+
)
23402351
'''.format(self._table),
23412352
[index, scope])
23422353
for user_id, current_key in self.env.cr.fetchall():
23432354
if KEY_CRYPT_CONTEXT.verify(key, current_key):
23442355
return user_id
23452356

2346-
def _generate(self, scope, name):
2357+
def _check_expiration_date(self, date):
2358+
# To be in a sudoed environment or to be an administrator
2359+
# to create a persistent key (no expiration date) or
2360+
# to exceed the maximum duration determined by the user's privileges.
2361+
if self.env.is_system():
2362+
return
2363+
if not date:
2364+
raise UserError(_("The API key must have an expiration date"))
2365+
max_duration = max(group.api_key_duration for group in self.env.user.groups_id) or 1.0
2366+
if date > datetime.datetime.now() + datetime.timedelta(days=max_duration):
2367+
raise UserError(_("You cannot exceed %(duration)s days.", duration=max_duration))
2368+
2369+
def _generate(self, scope, name, expiration_date):
23472370
"""Generates an api key.
23482371
:param str scope: the scope of the key. If None, the key will give access to any rpc.
23492372
:param str name: the name of the key, mainly intended to be displayed in the UI.
2373+
:param date expiration_date: the expiration date of the key.
23502374
:return: str: the key.
23512375
2376+
Note:
2377+
This method must be called in sudo to use a duration
2378+
greater than that allowed by the user's privileges.
2379+
For a persistent key (infinite duration), no value for expiration date.
23522380
"""
2381+
self._check_expiration_date(expiration_date)
23532382
# no need to clear the LRU when *adding* a key, only when removing
23542383
k = binascii.hexlify(os.urandom(API_KEY_SIZE)).decode()
23552384
self.env.cr.execute("""
2356-
INSERT INTO {table} (name, user_id, scope, key, index)
2357-
VALUES (%s, %s, %s, %s, %s)
2385+
INSERT INTO {table} (name, user_id, scope, expiration_date, key, index)
2386+
VALUES (%s, %s, %s, %s, %s, %s)
23582387
RETURNING id
23592388
""".format(table=self._table),
2360-
[name, self.env.user.id, scope, KEY_CRYPT_CONTEXT.hash(k), k[:INDEX_SIZE]])
2389+
[name, self.env.user.id, scope, expiration_date or None, KEY_CRYPT_CONTEXT.hash(k), k[:INDEX_SIZE]])
23612390

23622391
ip = request.httprequest.environ['REMOTE_ADDR'] if request else 'n/a'
23632392
_logger.info("%s generated: scope: <%s> for '%s' (#%s) from %s",
23642393
self._description, scope, self.env.user.login, self.env.uid, ip)
23652394

23662395
return k
23672396

2397+
@api.autovacuum
2398+
def _gc_user_apikeys(self):
2399+
self.env.cr.execute(SQL("""
2400+
DELETE FROM %s
2401+
WHERE
2402+
expiration_date IS NOT NULL AND
2403+
expiration_date < now() at time zone 'utc'
2404+
""", SQL.identifier(self._table)))
2405+
_logger.info("GC %r delete %d entries", self._name, self.env.cr.rowcount)
2406+
23682407
class APIKeyDescription(models.TransientModel):
23692408
_name = 'res.users.apikeys.description'
23702409
_description = 'API Key Description'
23712410

2411+
def _selection_duration(self):
2412+
# duration value is a string representing the number of days.
2413+
durations = [
2414+
('1', '1 Day'),
2415+
('7', '1 Week'),
2416+
('30', '1 Month'),
2417+
('90', '3 Months'),
2418+
('180', '6 Months'),
2419+
('365', '1 Year'),
2420+
]
2421+
persistent_duration = ('0', 'Persistent Key') # Magic value to detect an infinite duration
2422+
custom_duration = ('-1', 'Custom Date') # Will force the user to enter a date manually
2423+
if self.env.is_system():
2424+
return durations + [persistent_duration, custom_duration]
2425+
max_duration = max(group.api_key_duration for group in self.env.user.groups_id) or 1.0
2426+
return list(filter(
2427+
lambda duration: int(duration[0]) <= max_duration, durations
2428+
)) + [custom_duration]
2429+
23722430
name = fields.Char("Description", required=True)
2431+
duration = fields.Selection(
2432+
selection='_selection_duration', string='Duration', required=True,
2433+
default=lambda self: self._selection_duration()[0][0]
2434+
)
2435+
expiration_date = fields.Datetime('Expiration Date', compute='_compute_expiration_date', store=True, readonly=False)
2436+
2437+
@api.depends('duration')
2438+
def _compute_expiration_date(self):
2439+
for record in self:
2440+
duration = int(record.duration)
2441+
if duration >= 0:
2442+
record.expiration_date = (
2443+
fields.Date.today() + datetime.timedelta(days=duration)
2444+
if int(record.duration)
2445+
else None
2446+
)
2447+
2448+
@api.onchange('expiration_date')
2449+
def _onchange_expiration_date(self):
2450+
try:
2451+
self.env['res.users.apikeys']._check_expiration_date(self.expiration_date)
2452+
except UserError as error:
2453+
warning = {
2454+
'type': 'notification',
2455+
'title': _('The API key duration is not correct.'),
2456+
'message': error.args[0]
2457+
}
2458+
return {'warning': warning}
23732459

23742460
@check_identity
23752461
def make_key(self):
23762462
# only create keys for users who can delete their keys
23772463
self.check_access_make_key()
23782464

23792465
description = self.sudo()
2380-
k = self.env['res.users.apikeys']._generate(None, self.sudo().name)
2466+
k = self.env['res.users.apikeys']._generate(None, description.name, self.expiration_date)
23812467
description.unlink()
23822468

23832469
return {

odoo/addons/base/security/base_groups.xml

+1
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@
2424

2525
<record model="res.groups" id="group_user">
2626
<field name="name">Internal User</field>
27+
<field name="api_key_duration">90.0</field>
2728
</record>
2829

2930
<record id="default_user" model="res.users">

odoo/addons/base/views/res_users_views.xml

+10
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@
7575
<field name="category_id"/>
7676
<field name="name"/>
7777
<field name="share"/>
78+
<field name="api_key_duration" groups="base.group_no_one"/>
7879
</group>
7980
<notebook>
8081
<page string="Users" name="users">
@@ -371,6 +372,14 @@
371372
and complete, <strong>it will be the only way to
372373
identify the key once created</strong>.
373374
</p>
375+
<h3 class="fw-bold">
376+
Give a duration for the key's validity
377+
</h3>
378+
<field name="duration"/>
379+
<field name="expiration_date" invisible="duration != '-1'"/>
380+
<p>
381+
The key will be deleted once this period has elapsed.
382+
</p>
374383
<footer>
375384
<button name="make_key" type="object" string="Generate key" class="btn-primary" data-hotkey="q"/>
376385
<button special="cancel" data-hotkey="x" string="Cancel" class="btn-secondary"/>
@@ -471,6 +480,7 @@
471480
<field name="name"/>
472481
<field name="scope"/>
473482
<field name="create_date"/>
483+
<field name="expiration_date"/>
474484
<button type="object" name="remove"
475485
string="Delete API key." icon="fa-trash"/>
476486
</list>

0 commit comments

Comments
 (0)