UserManger.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. import os
  4. import traceback
  5. import simplejson as json
  6. from django.core.files.storage import FileSystemStorage
  7. from django.http import HttpResponse
  8. from django.utils.decorators import method_decorator
  9. from django.views.decorators.csrf import csrf_exempt
  10. from django.views.generic import TemplateView, View
  11. from Ansjer.config import BASE_DIR
  12. from Ansjer.config import SERVER_DOMAIN
  13. from Model.models import Role, Device_User
  14. from Object.RedisObject import RedisObject
  15. from Object.ResponseObject import ResponseObject
  16. from Object.TokenObject import TokenObject
  17. from Service.CommonService import CommonService
  18. from Service.ModelService import ModelService
  19. # http://192.168.136.40:8077/account/showUserMore?token=test
  20. class showUserMoreView(TemplateView):
  21. @method_decorator(csrf_exempt)
  22. def dispatch(self, *args, **kwargs):
  23. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  24. def post(self, request, *args, **kwargs):
  25. request.encoding = 'utf-8'
  26. token = request.POST.get('token', None)
  27. return self.ValidationError(token)
  28. def get(self, request, *args, **kwargs):
  29. request.encoding = 'gb2312'
  30. token = request.GET.get('token', None)
  31. return self.ValidationError(token)
  32. def ValidationError(self, token):
  33. response = ResponseObject()
  34. tko = TokenObject(token)
  35. response.lang = tko.lang
  36. if tko.code != 0:
  37. return response.json(tko.code)
  38. userID = tko.userID
  39. if not userID:
  40. return response.json(104)
  41. return self.showUserMore(userID, response)
  42. def showUserMore(self, userID, response):
  43. User = Device_User.objects.filter(userID=userID)
  44. if not User.exists():
  45. return response.json(104)
  46. sqlDict = CommonService.qs_to_dict(User)
  47. for k, v in enumerate(sqlDict["datas"]):
  48. sqlDict['datas'][k]['fields'].pop('password')
  49. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  50. if userIconPath:
  51. if userIconPath.find('static/') != -1:
  52. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  53. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  54. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  55. if len(v['fields']['role']):
  56. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  57. sqlDict["datas"][k]['fields']['rolename'] = roleName
  58. return response.json(0, sqlDict)
  59. # http://192.168.136.40:8077/account/perfectUserInfo?token=test&content={"NickName":"333"}
  60. class perfectUserInfoView(TemplateView):
  61. # 完善个人信息
  62. @method_decorator(csrf_exempt)
  63. def dispatch(self, *args, **kwargs):
  64. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  65. def post(self, request, *args, **kwargs):
  66. request.encoding = 'utf-8'
  67. userContent = request.POST.get('content', None)
  68. userIcon = request.FILES.get('userIcon', None)
  69. token = request.POST.get('token', None)
  70. return self.ValidationError(token, userContent, userIcon)
  71. def get(self, request, *args, **kwargs):
  72. request.encoding = 'gb2312'
  73. userContent = request.GET.get('content', None)
  74. userIcon = request.FILES.get('userIcon', None)
  75. token = request.GET.get('token', None)
  76. return self.ValidationError(token, userContent, userIcon)
  77. def ValidationError(self, token, userContent, userIcon):
  78. response = ResponseObject()
  79. tko = TokenObject(token)
  80. response.lang = tko.lang
  81. if tko.code != 0:
  82. return response.json(tko.code)
  83. userID = tko.userID
  84. if not userID:
  85. return response.json(309)
  86. if userIcon != None:
  87. location = 'static/User/Images/' + userID + '/'
  88. fss = FileSystemStorage(location=location)
  89. if fss.exists(userIcon.name):
  90. fss.delete(userIcon.name)
  91. filename = fss.save(userIcon.name, userIcon)
  92. # userIconUrl = fss.url(filename)
  93. userIconPath = fss.path(filename).replace('\\', '/')
  94. else:
  95. userIconPath = None
  96. if userContent != None:
  97. dataValid = json.loads(userContent)
  98. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  99. return response.json(444)
  100. if userIconPath == None and userContent == None:
  101. return response.json(444)
  102. elif userIconPath == None and userContent != None:
  103. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  104. elif userIconPath != None and userContent == None:
  105. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  106. else:
  107. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath,
  108. userContent=userContent)
  109. def perfectUserInfoUpdate(slef, userID, response, *args,
  110. **kwargs):
  111. """
  112. :param username:
  113. :param userContent:
  114. :param args:
  115. :param kwargs:
  116. :return:
  117. """
  118. User = Device_User.objects.filter(userID=userID)
  119. if not User.exists():
  120. return response.json(104)
  121. userIconPath = kwargs.get('userIconPath', None)
  122. userContent = kwargs.get('userContent', None)
  123. if userIconPath is not None:
  124. userIconPath = userIconPath[userIconPath.find('static/'):]
  125. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath[7:]
  126. if userContent != None:
  127. try:
  128. UserData = json.loads(userContent)
  129. except Exception as e:
  130. return response.json(444, repr(e))
  131. try:
  132. if userIconPath is not None and userContent is not None:
  133. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  134. elif userIconPath is None and userContent is not None:
  135. User.update(**UserData)
  136. elif userIconPath is not None and userContent is None:
  137. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  138. except Exception as e:
  139. errorInfo = traceback.format_exc()
  140. print('修改设备信息错误: %s ' % errorInfo)
  141. return response.json(117, repr(e))
  142. else:
  143. res = CommonService.qs_to_dict(User)
  144. for k, v in enumerate(res["datas"]):
  145. res['datas'][k]['fields'].pop('password')
  146. userIconPath = res['datas'][k]['fields']['userIconPath']
  147. if userIconPath:
  148. if userIconPath.find('static/') != -1:
  149. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  150. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  151. res['datas'][k]['fields']['userIconUrl'] = userIconUrl
  152. return response.json(0, res)
  153. class getAvatarView(TemplateView):
  154. @method_decorator(csrf_exempt)
  155. def dispatch(self, *args, **kwargs):
  156. return super(getAvatarView, self).dispatch(*args, **kwargs)
  157. def post(self, request, *args, **kwargs):
  158. request.encoding = 'utf-8'
  159. filePath = kwargs.get('filePath', '')
  160. filePath.encode(encoding='utf-8', errors='strict')
  161. return self.getAvatar(filePath)
  162. def get(self, request, *args, **kwargs):
  163. request.encoding = 'gb2312'
  164. filePath = kwargs.get('filePath', '')
  165. filePath.encode(encoding='gb2312', errors='strict')
  166. return self.getAvatar(filePath)
  167. def getAvatar(self, filePath):
  168. response = ResponseObject()
  169. if filePath == '' or filePath == None:
  170. return response.json(800)
  171. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  172. defaultPath = os.path.join(BASE_DIR, "static", "User/default.png").replace('\\', '/')
  173. if os.path.isfile(fullPath):
  174. try:
  175. Imagedata = open(fullPath, 'rb').read()
  176. except Exception as e:
  177. return response.json(906, repr(e))
  178. else:
  179. return HttpResponse(Imagedata, content_type="image/jpeg")
  180. else:
  181. print('----------------')
  182. print(defaultPath)
  183. print('----------------')
  184. try:
  185. Imagedata = open(defaultPath, 'rb').read()
  186. except Exception as e:
  187. return response.json(906, repr(e))
  188. else:
  189. return HttpResponse(Imagedata, content_type="image/jpeg")
  190. # return response.json(907)
  191. @csrf_exempt
  192. def delUserInterface(request):
  193. response = ResponseObject()
  194. if request.method == 'POST':
  195. request_dict = request.POST
  196. elif request.method == 'GET':
  197. request_dict = request.GET
  198. else:
  199. return response.json(404)
  200. token = request_dict.get('token', None)
  201. delUserID = request_dict.get('delUserID', None)
  202. if not token or not delUserID:
  203. return response.json(444, 'token,delUserID')
  204. tko = TokenObject(token)
  205. response.lang = tko.lang
  206. if tko.code != 0:
  207. return response.json(tko.code)
  208. userID = tko.userID
  209. if not userID:
  210. return response.json(309)
  211. userValid = Device_User.objects.filter(userID=userID)
  212. if not userValid.exists():
  213. return response.json(104)
  214. own_perm = ModelService.check_perm(userID=userID, permID=10)
  215. if own_perm is not True:
  216. return response.json(404)
  217. delUser = Device_User.objects.filter(userID=delUserID)
  218. if not delUser.exists():
  219. return response.json(104)
  220. delUser.delete()
  221. return response.json(0)
  222. @csrf_exempt
  223. def showAllUserInterface(request):
  224. response = ResponseObject()
  225. if request.method == 'POST':
  226. request_dict = request.POST
  227. elif request.method == 'GET':
  228. request_dict = request.GET
  229. else:
  230. return response.json(404)
  231. token = request_dict.get('token', None)
  232. type = request_dict.get('type', None)
  233. tko = TokenObject(token)
  234. response.lang = tko.lang
  235. if tko.code != 0:
  236. return response.json(tko.code)
  237. userID = tko.userID
  238. if not userID:
  239. return response.json(104)
  240. if type == 'PC':
  241. line = int(request.POST.get('line', None))
  242. page = int(request.POST.get('page', None))
  243. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  244. if not userValid:
  245. return response.json(104)
  246. # 管理员查询
  247. own_permission = ModelService.check_perm(userID=userID, permID=30)
  248. if own_permission is not True:
  249. return response.json(404)
  250. device_user_queryset = Device_User.objects.all()
  251. device_user_count = device_user_queryset.count()
  252. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  253. sqlDict = CommonService.qs_to_dict(device_user_res)
  254. redisObj = RedisObject(db=3)
  255. for k, v in enumerate(sqlDict["datas"]):
  256. if len(v['fields']['role']) > 0:
  257. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  258. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  259. if redisObj.get_data(key=v['pk']):
  260. sqlDict["datas"][k]['fields']['online'] = True
  261. else:
  262. sqlDict["datas"][k]['fields']['online'] = False
  263. sqlDict['count'] = device_user_count
  264. return response.json(0, sqlDict)
  265. else:
  266. own_permission = ModelService.check_perm(userID=userID, permID=30)
  267. if own_permission is not True:
  268. return response.json(404)
  269. qs = Device_User.objects.all().order_by('-data_joined')
  270. res = CommonService.qs_to_dict(qs)
  271. return response.json(0, res)
  272. class setUserValidView(View):
  273. @method_decorator(csrf_exempt)
  274. def dispatch(self, *args, **kwargs):
  275. return super(setUserValidView, self).dispatch(*args, **kwargs)
  276. def post(self, request, *args, **kwargs):
  277. request.encoding = 'utf-8'
  278. request_dict = request.POST
  279. return self.setUserValid(request_dict)
  280. def get(self, request, *args, **kwargs):
  281. request.encoding = 'utf-8'
  282. request_dict = request.GET
  283. return self.setUserValid(request_dict)
  284. def setUserValid(self, request_dict):
  285. token = request_dict.get('token', None)
  286. eUserID = request_dict.get('userID', None)
  287. isValid = request_dict.get('isValid', None)
  288. rid = request_dict.get('rid', None)
  289. response = ResponseObject()
  290. tko = TokenObject(token)
  291. response.lang = tko.lang
  292. if tko.code != 0:
  293. return response.json(tko.code)
  294. superID = tko.userID
  295. own_perm = ModelService.check_perm(userID=superID, permID=50)
  296. if own_perm is True or superID != None and superID != eUserID:
  297. if rid == None:
  298. return self.UserValidUpdate(superID, eUserID, isValid, response)
  299. else:
  300. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  301. else:
  302. return response.json(444, 'superID or userID')
  303. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  304. super = Device_User.objects.filter(userID=superID)
  305. eUser = Device_User.objects.filter(userID=eUserID)
  306. if not super.exists() or not eUser.exists():
  307. return response.json(104)
  308. own_permission = ModelService.check_perm(userID=superID, permID=50)
  309. if own_permission is True:
  310. try:
  311. eUser.update(user_isValid=isValid)
  312. device_user_query_set = Device_User.objects.get(userID=eUserID)
  313. if device_user_query_set.role.all():
  314. device_user_query_set.role.set([rid])
  315. else:
  316. role_user_query_set = Role.objects.get(rid=rid)
  317. device_user_query_set.role.add(role_user_query_set)
  318. except Exception as e:
  319. errorInfo = traceback.format_exc()
  320. print('更新数据库错误:%s' % errorInfo)
  321. return response.json(177, repr(e))
  322. else:
  323. return response.json(0)
  324. else:
  325. return response.json(404)
  326. def UserValidUpdate(self, superID, eUserID, isValid, response):
  327. super = Device_User.objects.filter(userID=superID)
  328. eUser = Device_User.objects.filter(userID=eUserID)
  329. if not super.exists():
  330. return response.json(104)
  331. if not eUser.exists():
  332. return response.json(104)
  333. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  334. return response.json(404)
  335. try:
  336. eUser.update(user_isValid=isValid)
  337. except Exception as e:
  338. errorInfo = traceback.format_exc()
  339. print('更新数据库错误: %s' % errorInfo)
  340. return response.json(177, repr(e))
  341. return response.json(0)
  342. @csrf_exempt
  343. def success(request):
  344. return HttpResponse(status=200)