UserManger.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. import os
  4. import traceback
  5. import simplejson as json
  6. from django.core.files.storage import FileSystemStorage
  7. from django.http import HttpResponse
  8. from django.utils.decorators import method_decorator
  9. from django.views.decorators.csrf import csrf_exempt
  10. from django.views.generic import TemplateView, View
  11. from Ansjer.config import BASE_DIR
  12. from Ansjer.config import SERVER_DOMAIN
  13. from Model.models import Role, Device_User, UserOauth2Model, UserExModel
  14. from Object.RedisObject import RedisObject
  15. from Object.ResponseObject import ResponseObject
  16. from Object.TokenObject import TokenObject
  17. from Service.CommonService import CommonService
  18. from Service.ModelService import ModelService
  19. # http://192.168.136.40:8077/account/showUserMore?token=test
  20. class showUserMoreView(TemplateView):
  21. @method_decorator(csrf_exempt)
  22. def dispatch(self, *args, **kwargs):
  23. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  24. def post(self, request, *args, **kwargs):
  25. request.encoding = 'utf-8'
  26. token = request.POST.get('token', None)
  27. return self.ValidationError(token)
  28. def get(self, request, *args, **kwargs):
  29. request.encoding = 'gb2312'
  30. token = request.GET.get('token', None)
  31. return self.ValidationError(token)
  32. def ValidationError(self, token):
  33. response = ResponseObject()
  34. tko = TokenObject(token)
  35. response.lang = tko.lang
  36. if tko.code != 0:
  37. return response.json(tko.code)
  38. userID = tko.userID
  39. if not userID:
  40. return response.json(104)
  41. return self.showUserMore(userID, response)
  42. def showUserMore(self, userID, response):
  43. User = Device_User.objects.filter(userID=userID)
  44. if not User.exists():
  45. return response.json(104)
  46. sqlDict = CommonService.qs_to_dict(User)
  47. for k, v in enumerate(sqlDict["datas"]):
  48. sqlDict['datas'][k]['fields'].pop('password')
  49. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  50. if userIconPath:
  51. if userIconPath.find('static/') != -1:
  52. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  53. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  54. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  55. if len(v['fields']['role']):
  56. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  57. sqlDict["datas"][k]['fields']['rolename'] = roleName
  58. # 增加oauth2关联数据
  59. ua_qs = UserOauth2Model.objects.filter(userID_id=userID).values_list('authType',flat=True)
  60. sqlDict["oauth2"] = list(ua_qs)
  61. return response.json(0, sqlDict)
  62. # http://192.168.136.40:8077/account/perfectUserInfo?token=test&content={"NickName":"333"}
  63. class perfectUserInfoView(TemplateView):
  64. # 完善个人信息
  65. @method_decorator(csrf_exempt)
  66. def dispatch(self, *args, **kwargs):
  67. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  68. def post(self, request, *args, **kwargs):
  69. request.encoding = 'utf-8'
  70. userContent = request.POST.get('content', None)
  71. userIcon = request.FILES.get('userIcon', None)
  72. token = request.POST.get('token', None)
  73. return self.ValidationError(token, userContent, userIcon)
  74. def get(self, request, *args, **kwargs):
  75. request.encoding = 'gb2312'
  76. userContent = request.GET.get('content', None)
  77. userIcon = request.FILES.get('userIcon', None)
  78. token = request.GET.get('token', None)
  79. return self.ValidationError(token, userContent, userIcon)
  80. def ValidationError(self, token, userContent, userIcon):
  81. response = ResponseObject()
  82. tko = TokenObject(token)
  83. response.lang = tko.lang
  84. if tko.code != 0:
  85. return response.json(tko.code)
  86. userID = tko.userID
  87. if not userID:
  88. return response.json(309)
  89. if userIcon != None:
  90. location = 'static/User/Images/' + userID + '/'
  91. fss = FileSystemStorage(location=location)
  92. if fss.exists(userIcon.name):
  93. fss.delete(userIcon.name)
  94. filename = fss.save(userIcon.name, userIcon)
  95. # userIconUrl = fss.url(filename)
  96. userIconPath = fss.path(filename).replace('\\', '/')
  97. else:
  98. userIconPath = None
  99. if userContent != None:
  100. dataValid = json.loads(userContent)
  101. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  102. return response.json(444)
  103. if userIconPath == None and userContent == None:
  104. return response.json(444)
  105. elif userIconPath == None and userContent != None:
  106. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  107. elif userIconPath != None and userContent == None:
  108. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  109. else:
  110. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath,
  111. userContent=userContent)
  112. def perfectUserInfoUpdate(slef, userID, response, *args,
  113. **kwargs):
  114. """
  115. :param username:
  116. :param userContent:
  117. :param args:
  118. :param kwargs:
  119. :return:
  120. """
  121. User = Device_User.objects.filter(userID=userID)
  122. if not User.exists():
  123. return response.json(104)
  124. userIconPath = kwargs.get('userIconPath', None)
  125. userContent = kwargs.get('userContent', None)
  126. if userIconPath is not None:
  127. userIconPath = userIconPath[userIconPath.find('static/'):]
  128. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath[7:]
  129. if userContent != None:
  130. try:
  131. UserData = json.loads(userContent)
  132. except Exception as e:
  133. return response.json(444, repr(e))
  134. try:
  135. if userIconPath is not None and userContent is not None:
  136. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  137. elif userIconPath is None and userContent is not None:
  138. User.update(**UserData)
  139. elif userIconPath is not None and userContent is None:
  140. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  141. except Exception as e:
  142. errorInfo = traceback.format_exc()
  143. print('修改设备信息错误: %s ' % errorInfo)
  144. return response.json(117, repr(e))
  145. else:
  146. res = CommonService.qs_to_dict(User)
  147. for k, v in enumerate(res["datas"]):
  148. res['datas'][k]['fields'].pop('password')
  149. userIconPath = res['datas'][k]['fields']['userIconPath']
  150. if userIconPath:
  151. if userIconPath.find('static/') != -1:
  152. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  153. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  154. res['datas'][k]['fields']['userIconUrl'] = userIconUrl
  155. return response.json(0, res)
  156. class getAvatarView(TemplateView):
  157. @method_decorator(csrf_exempt)
  158. def dispatch(self, *args, **kwargs):
  159. return super(getAvatarView, self).dispatch(*args, **kwargs)
  160. def post(self, request, *args, **kwargs):
  161. request.encoding = 'utf-8'
  162. filePath = kwargs.get('filePath', '')
  163. filePath.encode(encoding='utf-8', errors='strict')
  164. return self.getAvatar(filePath)
  165. def get(self, request, *args, **kwargs):
  166. request.encoding = 'gb2312'
  167. filePath = kwargs.get('filePath', '')
  168. filePath.encode(encoding='gb2312', errors='strict')
  169. return self.getAvatar(filePath)
  170. def getAvatar(self, filePath):
  171. response = ResponseObject()
  172. if filePath == '' or filePath == None:
  173. return response.json(800)
  174. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  175. defaultPath = os.path.join(BASE_DIR, "static", "User/default.png").replace('\\', '/')
  176. if os.path.isfile(fullPath):
  177. try:
  178. Imagedata = open(fullPath, 'rb').read()
  179. except Exception as e:
  180. return response.json(906, repr(e))
  181. else:
  182. return HttpResponse(Imagedata, content_type="image/jpeg")
  183. else:
  184. print('----------------')
  185. print(defaultPath)
  186. print('----------------')
  187. try:
  188. Imagedata = open(defaultPath, 'rb').read()
  189. except Exception as e:
  190. return response.json(906, repr(e))
  191. else:
  192. return HttpResponse(Imagedata, content_type="image/jpeg")
  193. # return response.json(907)
  194. @csrf_exempt
  195. def delUserInterface(request):
  196. response = ResponseObject()
  197. if request.method == 'POST':
  198. request_dict = request.POST
  199. elif request.method == 'GET':
  200. request_dict = request.GET
  201. else:
  202. return response.json(404)
  203. token = request_dict.get('token', None)
  204. delUserID = request_dict.get('delUserID', None)
  205. if not token or not delUserID:
  206. return response.json(444, 'token,delUserID')
  207. tko = TokenObject(token)
  208. response.lang = tko.lang
  209. if tko.code != 0:
  210. return response.json(tko.code)
  211. userID = tko.userID
  212. if not userID:
  213. return response.json(309)
  214. userValid = Device_User.objects.filter(userID=userID)
  215. if not userValid.exists():
  216. return response.json(104)
  217. own_perm = ModelService.check_perm(userID=userID, permID=10)
  218. if own_perm is not True:
  219. return response.json(404)
  220. delUser = Device_User.objects.filter(userID=delUserID)
  221. if not delUser.exists():
  222. return response.json(104)
  223. delUser.delete()
  224. return response.json(0)
  225. @csrf_exempt
  226. def showAllUserInterface(request):
  227. response = ResponseObject()
  228. if request.method == 'POST':
  229. request_dict = request.POST
  230. elif request.method == 'GET':
  231. request_dict = request.GET
  232. else:
  233. return response.json(404)
  234. token = request_dict.get('token', None)
  235. type = request_dict.get('type', None)
  236. tko = TokenObject(token)
  237. response.lang = tko.lang
  238. if tko.code != 0:
  239. return response.json(tko.code)
  240. userID = tko.userID
  241. if not userID:
  242. return response.json(104)
  243. if type == 'PC':
  244. line = int(request.POST.get('line', None))
  245. page = int(request.POST.get('page', None))
  246. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  247. if not userValid:
  248. return response.json(104)
  249. # 管理员查询
  250. own_permission = ModelService.check_perm(userID=userID, permID=30)
  251. if own_permission is not True:
  252. return response.json(404)
  253. device_user_queryset = Device_User.objects.all()
  254. device_user_count = device_user_queryset.count()
  255. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  256. sqlDict = CommonService.qs_to_dict(device_user_res)
  257. redisObj = RedisObject(db=3)
  258. for k, v in enumerate(sqlDict["datas"]):
  259. if len(v['fields']['role']) > 0:
  260. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  261. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  262. if redisObj.get_data(key=v['pk']):
  263. sqlDict["datas"][k]['fields']['online'] = True
  264. else:
  265. sqlDict["datas"][k]['fields']['online'] = False
  266. ue = UserExModel.objects.filter(userID=sqlDict["datas"][k]['pk'])
  267. if ue.exists():
  268. sqlDict["datas"][k]['fields']['appBundleId'] = ue[0].appBundleId
  269. else:
  270. sqlDict["datas"][k]['fields']['appBundleId'] = ''
  271. sqlDict['count'] = device_user_count
  272. return response.json(0, sqlDict)
  273. else:
  274. own_permission = ModelService.check_perm(userID=userID, permID=30)
  275. if own_permission is not True:
  276. return response.json(404)
  277. qs = Device_User.objects.all().order_by('-data_joined')
  278. res = CommonService.qs_to_dict(qs)
  279. return response.json(0, res)
  280. class setUserValidView(View):
  281. @method_decorator(csrf_exempt)
  282. def dispatch(self, *args, **kwargs):
  283. return super(setUserValidView, self).dispatch(*args, **kwargs)
  284. def post(self, request, *args, **kwargs):
  285. request.encoding = 'utf-8'
  286. request_dict = request.POST
  287. return self.setUserValid(request_dict)
  288. def get(self, request, *args, **kwargs):
  289. request.encoding = 'utf-8'
  290. request_dict = request.GET
  291. return self.setUserValid(request_dict)
  292. def setUserValid(self, request_dict):
  293. token = request_dict.get('token', None)
  294. eUserID = request_dict.get('userID', None)
  295. isValid = request_dict.get('isValid', None)
  296. rid = request_dict.get('rid', None)
  297. response = ResponseObject()
  298. tko = TokenObject(token)
  299. response.lang = tko.lang
  300. if tko.code != 0:
  301. return response.json(tko.code)
  302. superID = tko.userID
  303. own_perm = ModelService.check_perm(userID=superID, permID=50)
  304. if own_perm is True or superID != None and superID != eUserID:
  305. if rid == None:
  306. return self.UserValidUpdate(superID, eUserID, isValid, response)
  307. else:
  308. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  309. else:
  310. return response.json(444, 'superID or userID')
  311. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  312. super = Device_User.objects.filter(userID=superID)
  313. eUser = Device_User.objects.filter(userID=eUserID)
  314. if not super.exists() or not eUser.exists():
  315. return response.json(104)
  316. own_permission = ModelService.check_perm(userID=superID, permID=50)
  317. if own_permission is True:
  318. try:
  319. eUser.update(user_isValid=isValid)
  320. device_user_query_set = Device_User.objects.get(userID=eUserID)
  321. if device_user_query_set.role.all():
  322. device_user_query_set.role.set([rid])
  323. else:
  324. role_user_query_set = Role.objects.get(rid=rid)
  325. device_user_query_set.role.add(role_user_query_set)
  326. except Exception as e:
  327. errorInfo = traceback.format_exc()
  328. print('更新数据库错误:%s' % errorInfo)
  329. return response.json(177, repr(e))
  330. else:
  331. return response.json(0)
  332. else:
  333. return response.json(404)
  334. def UserValidUpdate(self, superID, eUserID, isValid, response):
  335. super = Device_User.objects.filter(userID=superID)
  336. eUser = Device_User.objects.filter(userID=eUserID)
  337. if not super.exists():
  338. return response.json(104)
  339. if not eUser.exists():
  340. return response.json(104)
  341. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  342. return response.json(404)
  343. try:
  344. eUser.update(user_isValid=isValid)
  345. except Exception as e:
  346. errorInfo = traceback.format_exc()
  347. print('更新数据库错误: %s' % errorInfo)
  348. return response.json(177, repr(e))
  349. return response.json(0)
  350. @csrf_exempt
  351. def success(request):
  352. return HttpResponse(status=200)