UserManger.py 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485
  1. import os
  2. import traceback
  3. import boto3
  4. import botocore
  5. from botocore import client
  6. import simplejson as json
  7. from django.http import HttpResponse
  8. from django.utils.decorators import method_decorator
  9. from django.views.decorators.csrf import csrf_exempt
  10. from django.views.generic import TemplateView, View
  11. from Ansjer.config import BASE_DIR, ACCESS_KEY_ID, SECRET_ACCESS_KEY, REGION_NAME, AVATAR_BUCKET
  12. from Ansjer.config import SERVER_DOMAIN
  13. from Model.models import Role, Device_User, UserOauth2Model, UserExModel, CountryLanguageModel, LanguageModel, App_Info, \
  14. IcloudUseDetails
  15. from Object.ContentSecurityObject import ContentSecurity
  16. from Object.RedisObject import RedisObject
  17. from Object.ResponseObject import ResponseObject
  18. from Object.TokenObject import TokenObject
  19. from Service.CommonService import CommonService
  20. from Service.ModelService import ModelService
  21. class showUserMoreView(TemplateView):
  22. @method_decorator(csrf_exempt)
  23. def dispatch(self, *args, **kwargs):
  24. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  25. def post(self, request, *args, **kwargs):
  26. request.encoding = 'utf-8'
  27. return self.validation(request.POST)
  28. def get(self, request, *args, **kwargs):
  29. request.encoding = 'gb2312'
  30. return self.validation(request.GET)
  31. def validation(self, request_dict):
  32. response = ResponseObject()
  33. token = request_dict.get('token', None)
  34. lang = request_dict.get('lang', 'en')
  35. app_bundle_id = request_dict.get('app_bundle_id', None)
  36. tko = TokenObject(token)
  37. response.lang = tko.lang
  38. if tko.code != 0:
  39. return response.json(tko.code)
  40. user_id = tko.userID
  41. if not user_id:
  42. return response.json(104)
  43. return self.show_user_more(user_id, lang, app_bundle_id, response)
  44. @staticmethod
  45. def show_user_more(user_id, lang, app_bundle_id, response):
  46. """
  47. 获取用户完整信息
  48. @param user_id: 用户id
  49. @param lang: 语言
  50. @param app_bundle_id: app包id
  51. @param response: 响应
  52. @return: response
  53. """
  54. device_user_qs = Device_User.objects.filter(userID=user_id)
  55. if not device_user_qs.exists():
  56. return response.json(104)
  57. try:
  58. sqlDict = CommonService.qs_to_dict(device_user_qs)
  59. for k, v in enumerate(sqlDict["datas"]):
  60. sqlDict['datas'][k]['fields'].pop('password')
  61. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  62. region_status = sqlDict['datas'][k]['fields']['region_status']
  63. if userIconPath:
  64. if userIconPath.find('static/') != -1:
  65. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  66. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  67. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  68. # 判断用户是否开通云盘
  69. icloud_user_qs = IcloudUseDetails.objects.filter(user_id=user_id)
  70. v['fields']['is_cloudDrive'] = 1 if icloud_user_qs.exists() else 0
  71. # 确认地区字段
  72. sqlDict['datas'][k]['fields']['region_status'] = 1 if region_status else 0
  73. if len(v['fields']['role']):
  74. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  75. sqlDict["datas"][k]['fields']['rolename'] = roleName
  76. # 根据region_country的值返回api和region数据
  77. sqlDict["datas"][k]['fields']['api'] = ''
  78. sqlDict['datas'][k]['fields']['region'] = ''
  79. region_country = sqlDict["datas"][k]['fields']['region_country']
  80. if region_country != 0:
  81. # api数据
  82. country_qs = CountryLanguageModel.objects.filter(country_id=region_country).values(
  83. 'country__region__api', 'country__region__zosi_api', 'country__region__loocam_api')
  84. sqlDict["datas"][k]['fields']['api'] = country_qs[0]['country__region__api']
  85. if region_country == 1: # 中国返回美洲域名
  86. sqlDict["datas"][k]['fields']['api'] = 'https://www.dvema.com/'
  87. # 根据app_bundle_id返回对应域名
  88. if app_bundle_id:
  89. # 查询app名
  90. app_inf_qs = App_Info.objects.filter(appBundleId=app_bundle_id).values('appName')
  91. if app_inf_qs.exists():
  92. app_name = app_inf_qs[0]['appName']
  93. if 'Zosi' in app_name:
  94. sqlDict['datas'][k]['fields']['api'] = country_qs[0]['country__region__zosi_api']
  95. if region_country == 1:
  96. sqlDict['datas'][k]['fields']['api'] = 'https://api.zositech2.com/'
  97. elif 'Loocam' in app_name:
  98. sqlDict['datas'][k]['fields']['api'] = country_qs[0]['country__region__loocam_api']
  99. if region_country == 1:
  100. sqlDict['datas'][k]['fields']['api'] = 'https://api.loocam2.com/'
  101. # region数据
  102. region_country = sqlDict['datas'][k]['fields']['region_country']
  103. language_qs = LanguageModel.objects.filter(lang=lang).values('id')
  104. region_qs = CountryLanguageModel.objects.filter(country_id=region_country,
  105. language_id=language_qs[0]['id']). \
  106. values('country_name')
  107. sqlDict['datas'][k]['fields']['region'] = region_qs[0]['country_name'] if region_qs.exists() else ''
  108. # 增加oauth2关联数据
  109. ua_qs = UserOauth2Model.objects.filter(userID_id=user_id).values_list('authType', flat=True)
  110. sqlDict['oauth2'] = list(ua_qs)
  111. return response.json(0, sqlDict)
  112. except Exception as e:
  113. return response.json(500, 'error_line:{}, error_msg:{}'.format(e.__traceback__.tb_lineno, repr(e)))
  114. class perfectUserInfoView(TemplateView):
  115. # 完善个人信息
  116. @method_decorator(csrf_exempt)
  117. def dispatch(self, *args, **kwargs):
  118. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  119. def post(self, request, *args, **kwargs):
  120. request.encoding = 'utf-8'
  121. userContent = request.POST.get('content', None)
  122. userIcon = request.FILES.get('userIcon', None)
  123. token = request.POST.get('token', None)
  124. return self.ValidationError(token, userContent, userIcon)
  125. def get(self, request, *args, **kwargs):
  126. request.encoding = 'gb2312'
  127. userContent = request.GET.get('content', None)
  128. userIcon = request.FILES.get('userIcon', None)
  129. token = request.GET.get('token', None)
  130. return self.ValidationError(token, userContent, userIcon)
  131. def ValidationError(self, token, userContent, userIcon):
  132. response = ResponseObject()
  133. tko = TokenObject(token)
  134. response.lang = tko.lang
  135. if tko.code != 0:
  136. return response.json(tko.code)
  137. userID = tko.userID
  138. if not userID:
  139. return response.json(309)
  140. userIconPath = ''
  141. if userIcon:
  142. # 上传头像到aws s3
  143. aws_s3_client = boto3.client(
  144. 's3',
  145. region_name=REGION_NAME,
  146. aws_access_key_id=ACCESS_KEY_ID,
  147. aws_secret_access_key=SECRET_ACCESS_KEY,
  148. config=botocore.client.Config(signature_version='s3v4'),
  149. )
  150. Key = userID + '/' + userIcon.name
  151. # 验证头像是否合规
  152. params = {'Bucket': AVATAR_BUCKET, 'Key': Key}
  153. image_url = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key=Key)
  154. service = 'profilePhotoCheck'
  155. service_dict = {'imageUrl': image_url}
  156. service_parameters = json.dumps(service_dict)
  157. legal = ContentSecurity().image_review(service, service_parameters)
  158. if not legal:
  159. return response.json(108)
  160. aws_s3_client.put_object(Bucket=AVATAR_BUCKET, Key=Key, Body=userIcon)
  161. userIconPath = userID + '/' + userIcon.name
  162. if userContent:
  163. dataValid = json.loads(userContent)
  164. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  165. return response.json(444)
  166. if not userIconPath and not userContent:
  167. return response.json(444)
  168. elif not userIconPath and userContent:
  169. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  170. elif userIconPath and not userContent:
  171. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  172. else:
  173. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath, userContent=userContent)
  174. def perfectUserInfoUpdate(slef, userID, response, **kwargs):
  175. """
  176. :param username:
  177. :param userContent:
  178. :param args:
  179. :param kwargs:
  180. :return:
  181. """
  182. User = Device_User.objects.filter(userID=userID)
  183. if not User.exists():
  184. return response.json(104)
  185. userIconPath = kwargs.get('userIconPath', None)
  186. userContent = kwargs.get('userContent', None)
  187. userIconUrl = ""
  188. if userIconPath:
  189. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  190. if userContent:
  191. try:
  192. UserData = json.loads(userContent)
  193. except Exception as e:
  194. return response.json(444, repr(e))
  195. # 验证昵称是否合规
  196. nickname = UserData.get('NickName')
  197. if nickname:
  198. service = 'nickname_detection'
  199. service_dict = {'content': nickname}
  200. service_parameters = json.dumps(service_dict)
  201. legal = ContentSecurity().text_review(service, service_parameters)
  202. if not legal:
  203. return response.json(108)
  204. try:
  205. if userIconPath and userContent:
  206. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  207. elif not userIconPath and userContent:
  208. User.update(**UserData)
  209. elif userIconPath and not userContent:
  210. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  211. except Exception as e:
  212. return response.json(117, repr(e))
  213. else:
  214. res = CommonService.qs_to_dict(User)
  215. for k, v in enumerate(res["datas"]):
  216. res['datas'][k]['fields'].pop('password')
  217. userIconPath = res['datas'][k]['fields']['userIconPath']
  218. region_status = res['datas'][k]['fields']['region_status']
  219. if region_status is True:
  220. res['datas'][k]['fields']['region_status'] = 1
  221. else:
  222. res['datas'][k]['fields']['region_status'] = 0
  223. if userIconPath and userIconUrl != '':
  224. res['datas'][k]['fields']['userIconUrl'] = userIconUrl
  225. return response.json(0, res)
  226. class getAvatarView(TemplateView):
  227. @method_decorator(csrf_exempt)
  228. def dispatch(self, *args, **kwargs):
  229. return super(getAvatarView, self).dispatch(*args, **kwargs)
  230. def post(self, request, *args, **kwargs):
  231. request.encoding = 'utf-8'
  232. filePath = kwargs.get('filePath', '')
  233. filePath.encode(encoding='utf-8', errors='strict')
  234. return self.getAvatar(filePath)
  235. def get(self, request, *args, **kwargs):
  236. request.encoding = 'utf-8'
  237. filePath = kwargs.get('filePath', '')
  238. filePath.encode(encoding='utf-8', errors='strict')
  239. return self.getAvatar(filePath)
  240. def getAvatar(self, filePath):
  241. response = ResponseObject()
  242. if not filePath:
  243. return response.json(800)
  244. if filePath == 'User/default.png' or filePath == 'User/defaultUser.png':
  245. # 使用默认头像
  246. try:
  247. aws_s3_client = boto3.client(
  248. 's3',
  249. region_name=REGION_NAME,
  250. aws_access_key_id=ACCESS_KEY_ID,
  251. aws_secret_access_key=SECRET_ACCESS_KEY,
  252. config=botocore.client.Config(signature_version='s3v4'),
  253. )
  254. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key='default/default.png')
  255. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  256. except Exception as e:
  257. print(e)
  258. return response.json(500, 'error_line:{}, error_msg:{}'.format(e.__traceback__.tb_lineno, repr(e)))
  259. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  260. if os.path.isfile(fullPath):
  261. try:
  262. imageData = open(fullPath, 'rb').read()
  263. return HttpResponse(imageData, content_type="image/jpeg")
  264. except Exception as e:
  265. return response.json(906, repr(e))
  266. else:
  267. try:
  268. aws_s3_client = boto3.client(
  269. 's3',
  270. region_name=REGION_NAME,
  271. aws_access_key_id=ACCESS_KEY_ID,
  272. aws_secret_access_key=SECRET_ACCESS_KEY,
  273. config=botocore.client.Config(signature_version='s3v4'),
  274. )
  275. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key=filePath)
  276. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  277. except Exception as e:
  278. return response.json(906, repr(e))
  279. @csrf_exempt
  280. def delUserInterface(request):
  281. response = ResponseObject()
  282. if request.method == 'POST':
  283. request_dict = request.POST
  284. elif request.method == 'GET':
  285. request_dict = request.GET
  286. else:
  287. return response.json(404)
  288. token = request_dict.get('token', None)
  289. delUserID = request_dict.get('delUserID', None)
  290. if not token or not delUserID:
  291. return response.json(444, 'token,delUserID')
  292. tko = TokenObject(token)
  293. response.lang = tko.lang
  294. if tko.code != 0:
  295. return response.json(tko.code)
  296. userID = tko.userID
  297. if not userID:
  298. return response.json(309)
  299. userValid = Device_User.objects.filter(userID=userID)
  300. if not userValid.exists():
  301. return response.json(104)
  302. own_perm = ModelService.check_perm(userID=userID, permID=10)
  303. if own_perm is not True:
  304. return response.json(404)
  305. delUser = Device_User.objects.filter(userID=delUserID)
  306. if not delUser.exists():
  307. return response.json(104)
  308. delUser.delete()
  309. return response.json(0)
  310. @csrf_exempt
  311. def showAllUserInterface(request):
  312. response = ResponseObject()
  313. if request.method == 'POST':
  314. request_dict = request.POST
  315. elif request.method == 'GET':
  316. request_dict = request.GET
  317. else:
  318. return response.json(404)
  319. token = request_dict.get('token', None)
  320. type = request_dict.get('type', None)
  321. tko = TokenObject(token)
  322. response.lang = tko.lang
  323. if tko.code != 0:
  324. return response.json(tko.code)
  325. userID = tko.userID
  326. if not userID:
  327. return response.json(104)
  328. if type == 'PC':
  329. line = int(request.POST.get('line', None))
  330. page = int(request.POST.get('page', None))
  331. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  332. if not userValid:
  333. return response.json(104)
  334. # 管理员查询
  335. own_permission = ModelService.check_perm(userID=userID, permID=30)
  336. if own_permission is not True:
  337. return response.json(404)
  338. device_user_queryset = Device_User.objects.all()
  339. device_user_count = device_user_queryset.count()
  340. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  341. sqlDict = CommonService.qs_to_dict(device_user_res)
  342. redisObj = RedisObject(db=3)
  343. for k, v in enumerate(sqlDict["datas"]):
  344. if len(v['fields']['role']) > 0:
  345. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  346. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  347. if redisObj.get_data(key=v['pk']):
  348. sqlDict["datas"][k]['fields']['online'] = True
  349. else:
  350. sqlDict["datas"][k]['fields']['online'] = False
  351. ue = UserExModel.objects.filter(userID=sqlDict["datas"][k]['pk'])
  352. if ue.exists():
  353. sqlDict["datas"][k]['fields']['appBundleId'] = ue[0].appBundleId
  354. else:
  355. sqlDict["datas"][k]['fields']['appBundleId'] = ''
  356. sqlDict['count'] = device_user_count
  357. return response.json(0, sqlDict)
  358. else:
  359. own_permission = ModelService.check_perm(userID=userID, permID=30)
  360. if own_permission is not True:
  361. return response.json(404)
  362. qs = Device_User.objects.all().order_by('-data_joined')
  363. res = CommonService.qs_to_dict(qs)
  364. return response.json(0, res)
  365. class setUserValidView(View):
  366. @method_decorator(csrf_exempt)
  367. def dispatch(self, *args, **kwargs):
  368. return super(setUserValidView, self).dispatch(*args, **kwargs)
  369. def post(self, request, *args, **kwargs):
  370. request.encoding = 'utf-8'
  371. request_dict = request.POST
  372. return self.setUserValid(request_dict)
  373. def get(self, request, *args, **kwargs):
  374. request.encoding = 'utf-8'
  375. request_dict = request.GET
  376. return self.setUserValid(request_dict)
  377. def setUserValid(self, request_dict):
  378. token = request_dict.get('token', None)
  379. eUserID = request_dict.get('userID', None)
  380. isValid = request_dict.get('isValid', None)
  381. rid = request_dict.get('rid', None)
  382. response = ResponseObject()
  383. tko = TokenObject(token)
  384. response.lang = tko.lang
  385. if tko.code != 0:
  386. return response.json(tko.code)
  387. superID = tko.userID
  388. own_perm = ModelService.check_perm(userID=superID, permID=50)
  389. if own_perm is True or superID != None and superID != eUserID:
  390. if rid == None:
  391. return self.UserValidUpdate(superID, eUserID, isValid, response)
  392. else:
  393. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  394. else:
  395. return response.json(444, 'superID or userID')
  396. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  397. super = Device_User.objects.filter(userID=superID)
  398. eUser = Device_User.objects.filter(userID=eUserID)
  399. if not super.exists() or not eUser.exists():
  400. return response.json(104)
  401. own_permission = ModelService.check_perm(userID=superID, permID=50)
  402. if own_permission is True:
  403. try:
  404. eUser.update(user_isValid=isValid)
  405. device_user_query_set = Device_User.objects.get(userID=eUserID)
  406. if device_user_query_set.role.all():
  407. device_user_query_set.role.set([rid])
  408. else:
  409. role_user_query_set = Role.objects.get(rid=rid)
  410. device_user_query_set.role.add(role_user_query_set)
  411. except Exception as e:
  412. errorInfo = traceback.format_exc()
  413. print('更新数据库错误:%s' % errorInfo)
  414. return response.json(177, repr(e))
  415. else:
  416. return response.json(0)
  417. else:
  418. return response.json(404)
  419. def UserValidUpdate(self, superID, eUserID, isValid, response):
  420. super = Device_User.objects.filter(userID=superID)
  421. eUser = Device_User.objects.filter(userID=eUserID)
  422. if not super.exists():
  423. return response.json(104)
  424. if not eUser.exists():
  425. return response.json(104)
  426. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  427. return response.json(404)
  428. try:
  429. eUser.update(user_isValid=isValid)
  430. except Exception as e:
  431. errorInfo = traceback.format_exc()
  432. print('更新数据库错误: %s' % errorInfo)
  433. return response.json(177, repr(e))
  434. return response.json(0)
  435. @csrf_exempt
  436. def success(request):
  437. return HttpResponse(status=200)