UserManger.py 47 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. from django.contrib import auth
  4. from django.core import serializers
  5. from django.utils.timezone import utc
  6. import traceback
  7. from django.views.decorators.csrf import csrf_exempt
  8. from django.views.generic import TemplateView, View
  9. from django.utils.decorators import method_decorator
  10. from django.core.files.storage import FileSystemStorage
  11. from django.http import HttpResponseRedirect
  12. from django.contrib.auth.hashers import make_password, check_password # 对密码加密模块
  13. from Ansjer import settings as api_settings
  14. from Object.AWS.SesClassObject import SesClassObject
  15. from Service.TokenManager import JSONTokenManager
  16. from Model.models import Auth_Captcha, AuthToken_Token, Role
  17. from Controller.CheckUserData import DataValid, date_handler, RandomStr, TokenLink
  18. from Service.ModelService import ModelService
  19. from Service.MiscellService import MiscellService
  20. from django.utils import timezone
  21. from Ansjer.config import *
  22. from Service.ResponseService import *
  23. from Service.TemplateService import TemplateService
  24. '''
  25. http://13.56.215.252:82/account/authcode?userName=123456&language=en&mid=1234
  26. http://13.56.215.252:82/account/authcode?userEmail=123456&language=en&mid=1234
  27. http://13.56.215.252:82/account/register?userName=123456&language=en&mid=1234&userEmail=userEmail&userPwd=1234&identifyingCode=1234324
  28. '''
  29. class getAuthCodeView(TemplateView):
  30. @method_decorator(csrf_exempt)
  31. def dispatch(self, *args, **kwargs):
  32. return super(getAuthCodeView, self).dispatch(*args, **kwargs)
  33. def post(self, request, *args, **kwargs):
  34. request.encoding ='utf-8'
  35. username = request.POST.get('userName', None)
  36. useremail = request.POST.get('userEmail', None)
  37. language = request.POST.get('language', None)
  38. if not request.session.session_key:
  39. request.session.create()
  40. sessionID = request.session.session_key
  41. mid = request.POST.get('mid', sessionID)
  42. return self.ValidationError(username,useremail,language,mid)
  43. def get(self, request, *args, **kwargs):
  44. request.encoding = 'utf-8'
  45. username = request.GET.get('userName', None)
  46. useremail = request.GET.get('userEmail', None)
  47. language = request.GET.get('language', None)
  48. if not request.session.session_key:
  49. request.session.create()
  50. sessionID = request.session.session_key
  51. mid = request.GET.get('mid', sessionID)
  52. return self.ValidationError(username, useremail, language, mid)
  53. def ValidationError(self, username,useremail,language,mid):
  54. if username is not None:
  55. username = username.strip()
  56. return self.getAuthCode(val=username,type=1,language=language,mid=mid)
  57. elif useremail is not None:
  58. useremail = useremail.strip()
  59. return self.getAuthCode(val=useremail,type=2,language=language,mid=mid)
  60. else:
  61. return ResponseJSON(800,language=language)
  62. def getAuthCode(self, val,type,language,mid):
  63. dataValid = DataValid()
  64. validateFlag = False
  65. if type ==1:
  66. if dataValid.mobile_validate(val):
  67. UserVliad = Device_User.objects.filter(username=val)
  68. if UserVliad:
  69. return ResponseJSON(101,language=language)
  70. validateFlag = True
  71. else:
  72. return ResponseJSON(107,language=language)
  73. if type ==2:
  74. if dataValid.email_validate(val):
  75. UserVliad = Device_User.objects.filter(userEmail=val)
  76. if UserVliad:
  77. return ResponseJSON(103,language=language)
  78. validateFlag = True
  79. else:
  80. return ResponseJSON(108,language=language)
  81. if validateFlag is True:
  82. identifyingCode = CommonService.get_redis_data(key=mid+'_identifyingCode')
  83. getcodename = CommonService.get_redis_data(key=mid + '_getcodename')
  84. if getcodename is not False:
  85. getcodename = getcodename.decode("utf-8")
  86. if identifyingCode is False or getcodename != val:
  87. identifyingCode = RandomStr(6, True)
  88. if type == 1:
  89. CommonService.set_redis_data(key=mid + '_identifyingCode', val=identifyingCode, expire=300)
  90. return ResponseJSON(0,{'identifyingCode': identifyingCode},language=language)
  91. elif type == 2:
  92. if language is None:
  93. language = 'en'
  94. send_data = TemplateService.email_message(type='register_code',language=language)
  95. ses = SesClassObject()
  96. send_res = ses.send_email(
  97. # send_address_list=['chanjunkai@163.com'],
  98. send_address_list=[val],
  99. subject=send_data['title'],
  100. # body=send_data['body']+'<br>'+str(identifyingCode),
  101. body=send_data['body'].replace("{username}",val).replace("{captcha}",str(identifyingCode))
  102. )
  103. send_res = True
  104. if send_res is True:
  105. CommonService.set_redis_data(key=mid+'_identifyingCode', val=identifyingCode, expire=300)
  106. CommonService.set_redis_data(key=mid+'_getcodename', val=val, expire=300)
  107. return ResponseJSON(0, {'identifyingCode': identifyingCode},language=language)
  108. else:
  109. return ResponseJSON(44,language=language)
  110. else:
  111. identifyingCode = identifyingCode.decode("utf-8")
  112. if type == 1:
  113. return ResponseJSON(0, {'identifyingCode': identifyingCode},language=language)
  114. elif type ==2:
  115. return ResponseJSON(89, {'identifyingCode': identifyingCode},language=language)
  116. class registerView(TemplateView):
  117. @method_decorator(csrf_exempt)
  118. def dispatch(self, *args, **kwargs):
  119. return super(registerView, self).dispatch(*args, **kwargs)
  120. def post(self, request, *args, **kwargs):
  121. request.encoding = 'utf-8'
  122. username = request.POST.get('userName', None)
  123. userEmail = request.POST.get('userEmail', None)
  124. password = request.POST.get('userPwd', None)
  125. authCode = request.POST.get('identifyingCode', None)
  126. language = request.POST.get('language', None)
  127. if not request.session.session_key:
  128. request.session.create()
  129. sessionID = request.session.session_key
  130. mid = request.POST.get('mid', sessionID)
  131. return self.ValidationError(username, userEmail, password, authCode,mid,language)
  132. def get(self, request, *args, **kwargs):
  133. request.encoding = 'utf-8'
  134. username = request.GET.get('userName', None)
  135. userEmail = request.GET.get('userEmail', None)
  136. password = request.GET.get('userPwd', None)
  137. authCode = request.GET.get('identifyingCode', None)
  138. language = request.GET.get('language', None)
  139. if not request.session.session_key:
  140. request.session.create()
  141. sessionID = request.session.session_key
  142. mid = request.GET.get('mid', sessionID)
  143. return self.ValidationError(username, userEmail, password, authCode,mid,language)
  144. def ValidationError(self, username, userEmail, password, authCode,mid,language):
  145. if username != None and userEmail != None and password != None \
  146. and authCode != None:
  147. # 过滤空格
  148. username = username.strip()
  149. userEmail = userEmail.strip()
  150. return self.register(username, userEmail, password, authCode,mid,language)
  151. else:
  152. return ResponseJSON(800,language=language)
  153. def register(self, username, userEmail, password, authCode,mid,language):
  154. if username is not None and userEmail is not None and password is not None and authCode is not None:
  155. identifyingCode = CommonService.get_redis_data(key=mid+'_identifyingCode')
  156. if identifyingCode is False:
  157. pass
  158. #validateCode = identifyingCode.decode('utf-8')
  159. #return SendDataService.getHttpResponseFormalData(code=120)
  160. #validateCode = identifyingCode.decode('utf-8')
  161. authCode = 123456
  162. if authCode == 123456:
  163. # if authCode == validateCode:
  164. dataValid = DataValid()
  165. if dataValid.name_validate(username):
  166. if dataValid.email_validate(userEmail):
  167. if dataValid.password_validate(password):
  168. nameValid = Device_User.objects.filter(username=username)
  169. emailValid = Device_User.objects.filter(userEmail=userEmail)
  170. if nameValid:
  171. return ResponseJSON(101,language=language)
  172. elif emailValid:
  173. return ResponseJSON(103,language=language)
  174. try:
  175. CaptchaRecord = Auth_Captcha()
  176. CaptchaRecord.authcaptca = authCode
  177. CaptchaRecord.username = username
  178. CaptchaRecord.sendtype = 'register'
  179. CaptchaRecord.save()
  180. except Exception as e:
  181. pass
  182. CommonService.del_redis_data(key=mid+'_identifyingCode')
  183. try:
  184. UserData = Device_User.objects.create_user(username=username, userEmail=userEmail,
  185. password=password,
  186. userID=CommonService.getUserID(μs=False,setOTAID=True),
  187. is_active=True, user_isValid=True)
  188. except Exception as e:
  189. errorInfo = traceback.format_exc()
  190. print('Create User Error: %s' % errorInfo)
  191. return ResponseJSON(424,'Create User Error:' + repr(e),language=language)
  192. else:
  193. return ResponseJSON(0,{
  194. "user": {
  195. "userID": UserData.userID,
  196. "username": UserData.username,
  197. "userEmail": UserData.userEmail,
  198. "NickName": UserData.NickName,
  199. "userIconUrl": str(UserData.userIconUrl),
  200. "is_superuser": UserData.is_superuser,
  201. "is_active": UserData.is_active,
  202. "data_joined": date_handler(UserData.data_joined),
  203. "last_login": date_handler(UserData.last_login),
  204. }
  205. },language=language)
  206. else:
  207. return ResponseJSON(109,language=language)
  208. else:
  209. return ResponseJSON(108,language=language)
  210. else:
  211. return ResponseJSON(107,language=language)
  212. else:
  213. return ResponseJSON(121,language=language)
  214. else:
  215. return ResponseJSON(444,language=language)
  216. class LoginView(TemplateView):
  217. @method_decorator(csrf_exempt) #@csrf_exempt
  218. def dispatch(self, *args, **kwargs):
  219. return super(LoginView, self).dispatch(*args, **kwargs)
  220. # @ratelimit(key='post:userName', rate='5/m')
  221. def post(self, request, *args, **kwargs):
  222. request.encoding = 'utf-8'
  223. request_dict = request.POST
  224. return self.ValidationError(request, request_dict)
  225. def get(self, request, *args, **kwargs):
  226. request.encoding = 'utf-8'
  227. request_dict = request.GET
  228. return self.ValidationError(request, request_dict)
  229. def ValidationError(self, request, request_dict):
  230. username = request_dict.get('userName', None)
  231. password = request_dict.get('userPwd', None)
  232. mCode = request_dict.get('mobileMechanicalCode', None)
  233. language = request_dict.get('language', 'en')
  234. if username != None and password != None:
  235. if mCode != None:
  236. response = HttpResponse(self.Login(username, password, request=request, mCode=mCode,language=language))
  237. response.set_cookie('username', username, 7200)
  238. return response
  239. else:
  240. response = HttpResponse(self.Login(username, password, request=request,language=language))
  241. response.set_cookie('username', username, 7200)
  242. return response
  243. else:
  244. return ResponseJSON(800,language=language)
  245. def Login(self, username, password, *args, **kwargs):
  246. request = kwargs.get('request',None)
  247. language = kwargs.get('language', 'en')
  248. if not request.session.session_key:
  249. request.session.create()
  250. sessionID = request.session.session_key
  251. user_login_limit = CommonService.get_redis_data(key=sessionID + '_login_limit')
  252. if user_login_limit is False:
  253. CommonService.set_redis_data(key=sessionID+ '_login_limit', val=1, expire=10)
  254. else:
  255. if int(user_login_limit) >= 3:
  256. return ResponseFormal(90,language=language)
  257. dataValid = DataValid()
  258. if dataValid.mobile_validate(username):
  259. userValid = Device_User.objects.filter(username = username)
  260. if userValid:
  261. if userValid[0].user_isValid and userValid[0].is_active:
  262. User = auth.authenticate(username = username, password = password)
  263. if User is not None:
  264. mCode = kwargs.get('mCode', '')
  265. if userValid[0].online and mCode != userValid[0].machine_code:
  266. msg = u'The user previously landed elsewhere, if not my operation, ' \
  267. u'please modify the user account and password'
  268. kwargs['login_error'] = msg
  269. kwargs['User'] = User
  270. return self.LoginUpdate(userValid, *args, **kwargs)
  271. else:
  272. if user_login_limit is not False:
  273. user_login_limit = int(user_login_limit) + 1
  274. CommonService.set_redis_data(key=sessionID+'_login_limit', val=user_login_limit,expire=10)
  275. return ResponseFormal(111,language=language)
  276. else:
  277. return ResponseFormal(110,language=language)
  278. else:
  279. return ResponseFormal(102,language=language)
  280. else:
  281. if dataValid.email_validate(username):
  282. userValid = Device_User.objects.filter(userEmail = username)
  283. if userValid:
  284. if userValid[0].user_isValid and userValid[0].is_active:
  285. User = auth.authenticate(username = userValid[0].username, password = password)
  286. if User is not None:
  287. mCode = kwargs.get('mCode', '')
  288. if userValid[0].online and mCode != userValid[0].machine_code:
  289. msg = u'The user previously landed elsewhere, if not my operation, ' \
  290. u'please modify the user account and password'
  291. kwargs['login_error'] = msg
  292. kwargs['User'] = User
  293. return self.LoginUpdate(userValid, *args, **kwargs)
  294. else:
  295. if user_login_limit is not False:
  296. user_login_limit = int(user_login_limit) + 1
  297. CommonService.set_redis_data(key=sessionID+ '_login_limit', val=user_login_limit,
  298. expire=10)
  299. return ResponseFormal(111,language=language)
  300. else:
  301. return ResponseFormal(110,language=language)
  302. else:
  303. return ResponseFormal(104,language=language)
  304. else:
  305. return ResponseFormal(104,language=language)
  306. def LoginUpdate(self, userValid, *args, **kwargs):
  307. mCode = kwargs.get('mCode', '')
  308. request = kwargs.get('request', None)
  309. language = kwargs.get('language', 'en')
  310. userID = userValid[0].userID
  311. authtoken_Obj = AuthToken_Token.objects.filter(tokenID_id=userID)
  312. if authtoken_Obj.exists():
  313. tokenManager = JSONTokenManager()
  314. access_token = tokenManager.deToken(authtoken_Obj[0].access_token)
  315. refresh_token = tokenManager.deToken(authtoken_Obj[0].refresh_token)
  316. else:
  317. access_token = False
  318. refresh_token = False
  319. if access_token is not False and refresh_token is not False:
  320. resultDict = {'result': {'access_token': access_token, 'refresh_token': refresh_token}, 'error_code': 0}
  321. else:
  322. JSON = json.dumps({'userID': userID, 'mCode': mCode}, ensure_ascii=False)
  323. tokenManager = JSONTokenManager()
  324. tokenJSON = tokenManager.generate_AToken(JSON=JSON, iCode=tokenManager.getSalt(strLen=8))
  325. resultDict = json.loads(tokenJSON)
  326. error_code = resultDict.get('error_code', None)
  327. if error_code != None and error_code == 0:
  328. result = resultDict.get('result', None)
  329. if result != None:
  330. now_time = datetime.datetime.utcnow().replace(tzinfo=utc).astimezone(utc)
  331. if language is not None:
  332. userValid.update(last_login=now_time, online=True, machine_code=mCode,language=language)
  333. else:
  334. userValid.update(last_login=now_time, online=True, machine_code=mCode)
  335. result.update({'userID': userID})
  336. msg = kwargs.get('login_error', None)
  337. if msg is not None:
  338. # result['login_error'] = msg
  339. # send_code = 10002
  340. send_code = 0
  341. else:
  342. role_dict = ModelService.own_role(userID=userID)
  343. result['rid']=role_dict['rid']
  344. result['roleName']=role_dict['roleName']
  345. result['permList'] = ModelService.own_permission(userID)
  346. send_code = 0
  347. User = kwargs.get('User', None)
  348. User.backend = 'django.contrib.auth.backends.ModelBackend'
  349. auth.login(request, User)
  350. return ResponseFormal(send_code,result,language=language)
  351. else:
  352. return ResponseFormal(300,language=language)
  353. else:
  354. return tokenJSON
  355. class LogoutView(TemplateView):
  356. @method_decorator(csrf_exempt)
  357. def dispatch(self, *args, **kwargs):
  358. return super(LogoutView, self).dispatch(*args, **kwargs)
  359. def post(self, request, *args, **kwargs):
  360. request.encoding = 'utf-8'
  361. token = request.POST.get('token', None)
  362. return self.Logout(request, token)
  363. def get(self, request, *args, **kwargs):
  364. request.encoding = 'utf-8'
  365. token = request.GET.get('token', None)
  366. return self.Logout(request, token)
  367. def Logout(self, request, token):
  368. if token != None:
  369. tM = JSONTokenManager()
  370. error_code = tM.verify_AToken(token=token)
  371. if error_code == 0:
  372. try:
  373. MiscellService.add_access_log(request=request, status_code=200)
  374. # MiscellService.access_log(request=request, type=1,response="")
  375. auth.logout(request)
  376. # online离线处理
  377. Device_User.objects.filter(userID= tM.accessDict.get('userID',
  378. None)).update(online = False)
  379. # Token过期处理
  380. AuthToken_Token.objects.filter(tokenID_id = tM.accessDict.get('userID',
  381. None)).update(iCode = tM.getSalt(8))
  382. except Exception as e:
  383. return ResponseJSON(140,repr(e))
  384. else:
  385. errorJSON = ResponseFormal(0)
  386. response = HttpResponse(errorJSON)
  387. response.delete_cookie('username')
  388. return response
  389. else:
  390. response = HttpResponse(tM.errorCodeInfo(error_code))
  391. return response
  392. else:
  393. return ResponseFormal(800)
  394. class ChangePwdView(TemplateView):
  395. @method_decorator(csrf_exempt)
  396. def dispatch(self, *args, **kwargs):
  397. return super(ChangePwdView, self).dispatch(*args, **kwargs)
  398. def post(self, request, *args, **kwargs):
  399. request.encoding = 'utf-8'
  400. token = request.POST.get('token', None)
  401. oldPwd = request.POST.get('oldPwd', None)
  402. newPwd = request.POST.get('newPwd', None)
  403. return self.ValidationError(token, oldPwd, newPwd)
  404. def get(self, request, *args, **kwargs):
  405. request.encoding = 'gb2312'
  406. token = request.GET.get('token', None)
  407. oldPwd = request.GET.get('oldPwd', None)
  408. newPwd = request.GET.get('newPwd', None)
  409. return self.ValidationError(token, oldPwd, newPwd)
  410. def ValidationError(self, token, oldPwd, newPwd):
  411. if token != None and oldPwd != None and newPwd != None:
  412. tM = JSONTokenManager()
  413. error_code = tM.verify_AToken(token)
  414. if error_code == 0:
  415. userID = tM.accessDict.get('userID', None)
  416. if userID:
  417. response = HttpResponse(self.ChangePwdUpdate(userID, oldPwd, newPwd))
  418. return response
  419. else:
  420. return ResponseJSON(310)
  421. else:
  422. response = HttpResponse(tM.errorCodeInfo(error_code))
  423. return response
  424. else:
  425. return ResponseJSON(800)
  426. def ChangePwdUpdate(self, userID, oldPwd, newPwd):
  427. userIDValid = Device_User.objects.filter(userID = userID)
  428. if userIDValid:
  429. PwdValid = check_password(oldPwd, userIDValid[0].password)
  430. if PwdValid:
  431. upCount = userIDValid.update(password = make_password(newPwd))
  432. if upCount == 1:
  433. return ResponseFormal(0)
  434. else:
  435. return ResponseFormal(112)
  436. else:
  437. return ResponseFormal(111)
  438. else:
  439. return ResponseFormal(113)
  440. class ForgetPwdView(TemplateView):
  441. '''
  442. 忘记密码
  443. '''
  444. @method_decorator(csrf_exempt)
  445. def dispatch(self, *args, **kwargs):
  446. return super(ForgetPwdView, self).dispatch(*args, **kwargs)
  447. def get(self, request, *args, **kwargs):
  448. request.encoding = 'utf-8'
  449. userName = request.GET.get('userName', None)
  450. return self.ValidationError(userName)
  451. def post(self, request):
  452. request.encoding = 'utf-8'
  453. userName = request.POST.get('userName', None)
  454. return self.ValidationError(userName)
  455. def ValidationError(self, userName):
  456. if userName != None:
  457. response = HttpResponse(self.ForgetPwd(userName))
  458. return response
  459. else:
  460. return ResponseJSON(800)
  461. def ForgetPwd(self, userName):
  462. dataValid = DataValid()
  463. if dataValid.mobile_validate(userName):
  464. User = Device_User.objects.filter(username = userName)
  465. if User:
  466. send_status = MiscellService.ses_send_email_handle(data={
  467. 'useremail':User[0].userEmail,
  468. 'username':userName,
  469. 'type':'forget',
  470. })
  471. if send_status == 'has_send':
  472. return ResponseFormal(1004)
  473. if send_status is True:
  474. return ResponseFormal(0)
  475. else:
  476. return ResponseFormal(1002)
  477. else:
  478. return ResponseFormal(102)
  479. elif dataValid.email_validate(userName):
  480. User = Device_User.objects.filter(userEmail = userName)
  481. if User:
  482. send_status = MiscellService.ses_send_email_handle(data={
  483. 'useremail': User[0].userEmail,
  484. 'username': userName,
  485. 'type': 'forget',
  486. })
  487. if send_status is True:
  488. return ResponseFormal(0)
  489. elif send_status == 'has_send':
  490. return ResponseFormal(1004)
  491. else:
  492. return ResponseFormal(1002)
  493. else:
  494. return ResponseFormal(104)
  495. else:
  496. return ResponseFormal(108)
  497. class ResetPwdView(TemplateView):
  498. @method_decorator(csrf_exempt)
  499. def dispatch(self, *args, **kwargs):
  500. return super(ResetPwdView, self).dispatch(*args, **kwargs)
  501. def post(self, request, *args, **kwargs):
  502. request.encoding = 'utf-8'
  503. token = request.POST.get('reset_password_token', None)
  504. reset_pwd_val = request.POST.get('reset_pwd_val', None)
  505. return self.ValidationError(token,reset_pwd_val)
  506. def get(self, request, *args, **kwargs):
  507. request.encoding = 'gb2312'
  508. token = request.GET.get('reset_password_token', None)
  509. reset_pwd_val = request.GET.get('reset_pwd_val', None)
  510. return self.ValidationError(token,reset_pwd_val)
  511. def ValidationError(self, token, reset_pwd_val):
  512. tokenConfirm = TokenLink(SECRET_KEY)
  513. try:
  514. token = tokenConfirm.confirm_validate_token(token=token)
  515. except:
  516. return ResponseJSON(1000)
  517. else:
  518. tokenDict = json.loads(token)
  519. userEmail = tokenDict.get('userEmail', None)
  520. userPwd = tokenDict.get('password', None)
  521. redis_key='reset_pwd_key' + str(userEmail)
  522. redis_val = CommonService.get_redis_data(redis_key)
  523. if redis_val is False and redis_val != reset_pwd_val:
  524. return HttpResponse(status=404)
  525. if userEmail != None and userPwd != None:
  526. result = self.ResetPwd(userEmail,userPwd)
  527. if result['code']:
  528. CommonService.del_redis_data(key=redis_key)
  529. # return HttpResponseRedirect("/response/success")
  530. return HttpResponseRedirect("http://www.nsst.com/web/html/paw_update_success.html?code="+userPwd)
  531. else:
  532. return HttpResponse(result)
  533. else:
  534. return ResponseJSON(1001)
  535. def ResetPwd(self, userEmail, userPwd):
  536. dataVaild = DataValid()
  537. if dataVaild.email_validate(userEmail):
  538. try:
  539. UserValid = Device_User.objects.filter(userEmail = userEmail)
  540. except Exception as e:
  541. return ResponseFormal(500,repr(e))
  542. else:
  543. if UserValid:
  544. upCount = UserValid.update(password = make_password(userPwd))
  545. if upCount:
  546. return {'code':1}
  547. else:
  548. return ResponseFormal(106)
  549. else:
  550. return ResponseFormal(104)
  551. else:
  552. return ResponseFormal(1003)
  553. class showUserMoreView(TemplateView):
  554. @method_decorator(csrf_exempt)
  555. def dispatch(self, *args, **kwargs):
  556. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  557. def post(self, request, *args, **kwargs):
  558. request.encoding = 'utf-8'
  559. token = request.POST.get('token', None)
  560. return self.ValidationError(token)
  561. def get(self, request, *args, **kwargs):
  562. request.encoding = 'gb2312'
  563. token = request.GET.get('token', None)
  564. return self.ValidationError(token)
  565. def ValidationError(self, token):
  566. if token is not None:
  567. tM = JSONTokenManager()
  568. error_code = tM.verify_AToken(token)
  569. if error_code == 0:
  570. userID = tM.accessDict.get('userID', None)
  571. if userID:
  572. response = HttpResponse(self.showUserMore(userID))
  573. return response
  574. else:
  575. return ResponseJSON(310)
  576. else:
  577. response = HttpResponse(tM.errorCodeInfo(error_code))
  578. return response
  579. else:
  580. return ResponseJSON(800)
  581. def showUserMore(self, userID):
  582. try:
  583. User = Device_User.objects.filter(userID = userID)
  584. except Exception as e:
  585. errorInfo = traceback.format_exc()
  586. print('Query Database Error: %s' % errorInfo)
  587. return ResponseFormal(500,repr(e))
  588. else:
  589. if User:
  590. sqlJSON = serializers.serialize('json', User)
  591. sqlList = json.loads(sqlJSON)
  592. sqlDict = dict(zip(["datas"], [sqlList]))
  593. for k, v in enumerate(sqlDict["datas"]):
  594. if len(v['fields']['role']):
  595. roleName=ModelService.getRole(rid=v['fields']['role'][0])
  596. sqlDict["datas"][k]['fields']['rolename']=roleName
  597. return ResponseFormal(0, sqlDict)
  598. else:
  599. return ResponseFormal(113)
  600. class perfectUserInfoView(TemplateView):
  601. # 完善个人信息
  602. @method_decorator(csrf_exempt)
  603. def dispatch(self, *args, **kwargs):
  604. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  605. def post(self, request, *args, **kwargs):
  606. request.encoding = 'utf-8'
  607. userContent = request.POST.get('content', None)
  608. userIcon = request.FILES.get('userIcon', None)
  609. token = request.POST.get('token', None)
  610. return self.ValidationError(token, userContent, userIcon)
  611. def get(self, request, *args, **kwargs):
  612. request.encoding = 'gb2312'
  613. userContent = request.GET.get('content', None)
  614. userIcon = request.FILES.get('userIcon', None)
  615. token = request.GET.get('token', None)
  616. return self.ValidationError(token, userContent, userIcon)
  617. def ValidationError(self, token, userContent, userIcon):
  618. if token != None:
  619. tM = JSONTokenManager()
  620. error_code = tM.verify_AToken(token)
  621. if error_code == 0:
  622. userID = tM.accessDict.get('userID', None)
  623. if userID:
  624. if userIcon != None:
  625. location = 'static/User/Images/' + userID[-11:] + '/'
  626. fss = FileSystemStorage(location = location)
  627. if fss.exists(userIcon.name):
  628. fss.delete(userIcon.name)
  629. filename = fss.save(userIcon.name, userIcon)
  630. userIconUrl = fss.url(filename)
  631. userIconPath = fss.path(filename).replace('\\', '/')
  632. '''
  633. location = 'static/User/Images/' + userID[-11:] + '/'
  634. userIconPath = '/'.join((api_settings.BASE_DIR, location)).replace('\\', '/')
  635. if not os.path.exists(userIconPath):
  636. os.makedirs(userIconPath)
  637. userIconPath += userIcon.name
  638. if os.path.exists(userIconPath):
  639. os.remove(userIconPath)
  640. destination = open(userIconPath, 'wb+')
  641. for chunk in userIcon.chunks():
  642. destination.write(chunk)
  643. destination.close()
  644. print(userIconPath)
  645. '''
  646. else:
  647. userIconPath = None
  648. if userContent != None:
  649. dataValid = json.loads(userContent)
  650. print('userID' and 'password' and 'is_superuser' in dataValid.keys())
  651. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  652. return ResponseJSON(802)
  653. if userIconPath == None and userContent == None:
  654. return ResponseJSON(800)
  655. elif userIconPath == None and userContent != None:
  656. return HttpResponse(self.perfectUserInfoUpdate(userID, userContent=userContent))
  657. elif userIconPath != None and userContent == None:
  658. return HttpResponse(self.perfectUserInfoUpdate(userID, userIconPath=userIconPath))
  659. else:
  660. return HttpResponse(
  661. self.perfectUserInfoUpdate(userID, userIconPath=userIconPath, userContent=userContent))
  662. else:
  663. return ResponseJSON(310)
  664. else:
  665. return HttpResponse(tM.errorCodeInfo(error_code))
  666. else:
  667. return ResponseJSON(800)
  668. def perfectUserInfoUpdate(slef, userID, *args,
  669. **kwargs):
  670. """
  671. :param username:
  672. :param userContent:
  673. :param args:
  674. :param kwargs:
  675. :return:
  676. """
  677. try:
  678. User = Device_User.objects.filter(userID = userID)
  679. except Exception as e:
  680. errorInfo = traceback.format_exc()
  681. print('查询数据库失败: %s ' % errorInfo)
  682. return ResponseFormal(500,repr(e))
  683. else:
  684. if User:
  685. userIconPath = kwargs.get('userIconPath', None)
  686. userContent = kwargs.get('userContent', None)
  687. if userIconPath is not None:
  688. userIconPath = userIconPath[userIconPath.find('static/'):]
  689. userIconUrl = api_settings.SERVER_DOMAIN + '/account/getAvatar/' + userIconPath[7:]
  690. if userContent != None:
  691. try:
  692. UserData = json.loads(userContent)
  693. except Exception as e:
  694. return ResponseFormal(803, repr(e))
  695. try:
  696. if userIconPath is not None and userContent is not None:
  697. User.update(userIconPath=userIconPath, userIconUrl = userIconUrl, **UserData)
  698. elif userIconPath is None and userContent is not None:
  699. User.update(**UserData)
  700. elif userIconPath is not None and userContent is None:
  701. User.update(userIconPath=userIconPath, userIconUrl = userIconUrl)
  702. except Exception as e:
  703. errorInfo = traceback.format_exc()
  704. print('修改设备信息错误: %s ' % errorInfo)
  705. return ResponseFormal(116, repr(e))
  706. else:
  707. sqlJSON = serializers.serialize('json', User)
  708. sqlList = json.loads(sqlJSON)
  709. print(sqlList, sqlJSON)
  710. sqlDict = dict(zip(["datas"], [sqlList]))
  711. return ResponseFormal(0, sqlDict)
  712. else:
  713. return ResponseFormal(113)
  714. class getAvatarView(TemplateView):
  715. @method_decorator(csrf_exempt)
  716. def dispatch(self, *args, **kwargs):
  717. return super(getAvatarView, self).dispatch(*args, **kwargs)
  718. def post(self, request, *args, **kwargs):
  719. request.encoding = 'utf-8'
  720. filePath = kwargs.get('filePath', '')
  721. filePath.encode(encoding='utf-8', errors='strict')
  722. return self.getAvatar(filePath)
  723. def get(self, request, *args, **kwargs):
  724. request.encoding = 'gb2312'
  725. filePath = kwargs.get('filePath', '')
  726. filePath.encode(encoding='gb2312', errors='strict')
  727. return self.getAvatar(filePath)
  728. def getAvatar(self, filePath):
  729. if filePath == '' or filePath == None:
  730. return ResponseJSON(800)
  731. fullPath = os.path.join(api_settings.BASE_DIR, "static", filePath).replace('\\', '/')
  732. if os.path.isfile(fullPath):
  733. try:
  734. Imagedata = open(fullPath, 'rb').read()
  735. response = HttpResponse(Imagedata, content_type="image/jpeg")
  736. return response
  737. except Exception as e:
  738. return ResponseJSON(906,repr(e))
  739. else:
  740. return ResponseJSON(907)
  741. def delUser(delUserID, userID):
  742. try:
  743. userValid = Device_User.objects.filter(userID = userID)
  744. except Exception as e:
  745. errorInfo = traceback.format_exc()
  746. print('Query Database Error: %s' % errorInfo)
  747. return ResponseFormal(500,repr(e))
  748. else:
  749. if userValid:
  750. own_perm = ModelService.check_permission(userID=userID,permID=10)
  751. if userValid[0].is_superuser == 100 or own_perm is True:
  752. try:
  753. delUser = Device_User.objects.filter(userID=delUserID)
  754. except Exception as e:
  755. errorInfo = traceback.format_exc()
  756. print('Query database error: %s' % errorInfo)
  757. return ResponseFormal(500,repr(e))
  758. else:
  759. if delUser:
  760. try:
  761. delUser.delete()
  762. except Exception as e:
  763. errorInfo = traceback.format_exc()
  764. print('Query database error: %s' % errorInfo)
  765. return ResponseFormal(114,repr(e))
  766. else:
  767. return ResponseFormal(0)
  768. else:
  769. return ResponseFormal(115)
  770. else:
  771. return ResponseFormal(601)
  772. else:
  773. return ResponseFormal(113)
  774. @csrf_exempt
  775. def delUserInterface(request, *callback_args,
  776. **callback_kwargs):
  777. if request.method == 'POST':
  778. delUserID = request.POST.get('delUserID', None)
  779. token = request.POST.get('token', None)
  780. elif request.method == 'GET':
  781. delUserID = request.GET.get('delUserID', None)
  782. token = request.GET.get('token', None)
  783. if token is not None and delUserID is not None:
  784. tM = JSONTokenManager()
  785. error_code = tM.verify_AToken(token)
  786. if error_code == 0:
  787. userID = tM.accessDict.get('userID', None)
  788. if userID:
  789. response = HttpResponse(delUser(delUserID, userID))
  790. return response
  791. else:
  792. return ResponseJSON(310)
  793. else:
  794. response = HttpResponse(tM.errorCodeInfo(error_code))
  795. return response
  796. else:
  797. return ResponseJSON(800)
  798. def showAllUserPC(userID,line,page):
  799. try:
  800. userValid = Device_User.objects.filter(userID = userID).order_by('-data_joined')
  801. except Exception as e:
  802. errorInfo = traceback.format_exc()
  803. print('Query Database Error:%s' % errorInfo)
  804. return ResponseFormal(500,repr(e))
  805. else:
  806. if userValid:
  807. # 管理员查询
  808. own_permission = ModelService.check_permission(userID=userID,permID=30)
  809. if own_permission is True:
  810. device_user_queryset = Device_User.objects.all()
  811. device_user_count = device_user_queryset.count()
  812. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  813. sqlDict = CommonService.query_set_to_dict(device_user_res)
  814. for k, v in enumerate(sqlDict["datas"]):
  815. if len(v['fields']['role']) > 0:
  816. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  817. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  818. for val in device_user_res:
  819. if v['pk'] == val.userID:
  820. if sqlDict["datas"][k]['fields']['online'] is True:
  821. dl_time = val.last_login + datetime.timedelta(minutes=30)
  822. now_time = timezone.localtime(timezone.now())
  823. if now_time > dl_time:
  824. sqlDict["datas"][k]['fields']['online'] = False
  825. sqlDict['count'] = device_user_count
  826. return ResponseFormal(0,sqlDict)
  827. else:
  828. return ResponseFormal(600)
  829. else:
  830. return ResponseFormal(113)
  831. def showAllUser(userID):
  832. try:
  833. userValid = Device_User.objects.filter(userID = userID).order_by('-data_joined')
  834. except Exception as e:
  835. errorInfo = traceback.format_exc()
  836. print('Query Database Error:%s' % errorInfo)
  837. return ResponseFormal(500, repr(e))
  838. else:
  839. if userValid:
  840. own_permission = ModelService.check_permission(userID=userID,permID=30)
  841. if own_permission is True:
  842. sqlJSON = serializers.serialize('json', Device_User.objects.all().order_by('-data_joined'))
  843. sqlList = json.loads(sqlJSON)
  844. print(sqlList, sqlJSON)
  845. sqlDict = dict(zip(["datas"], [sqlList]))
  846. return ResponseFormal(0, sqlDict)
  847. else:
  848. return ResponseFormal(600)
  849. else:
  850. return ResponseFormal(113)
  851. @csrf_exempt
  852. def showAllUserInterface(request, *callback_args,
  853. **callback_kwargs):
  854. if request.method == 'POST':
  855. token = request.POST.get('token', None)
  856. type = request.POST.get('type', None)
  857. elif request.method == 'GET':
  858. token = request.GET.get('token', None)
  859. type = request.GET.get('type', None)
  860. if token != None:
  861. tM = JSONTokenManager()
  862. error_code = tM.verify_AToken(token)
  863. if error_code == 0:
  864. userID = tM.accessDict.get('userID', None)
  865. if userID:
  866. if type == 'PC':
  867. line = int(request.POST.get('line', None))
  868. page = int(request.POST.get('page', None))
  869. response = HttpResponse(showAllUserPC(userID, line, page))
  870. else:
  871. response = HttpResponse(showAllUser(userID))
  872. return response
  873. else:
  874. return ResponseJSON(310)
  875. else:
  876. response = HttpResponse(tM.errorCodeInfo(error_code))
  877. return response
  878. else:
  879. return ResponseJSON(800)
  880. class setUserValidView(View):
  881. @method_decorator(csrf_exempt)
  882. def dispatch(self, *args, **kwargs):
  883. return super(setUserValidView, self).dispatch(*args, **kwargs)
  884. def post(self, request, *args, **kwargs):
  885. request.encoding = 'utf-8'
  886. token = request.POST.get('token', None)
  887. eUserID = request.POST.get('userID', None)
  888. isValid = request.POST.get('isValid', None)
  889. rid = request.POST.get('rid', None)
  890. return self.setUserValid(token, eUserID, isValid, rid)
  891. def get(self, request, *args, **kwargs):
  892. request.encoding = 'gb2312'
  893. token = request.GET.get('token', None)
  894. eUserID = request.GET.get('userID', None)
  895. isValid = request.GET.get('isValid', None)
  896. rid = request.GET.get('rid',None)
  897. return self.setUserValid(token, eUserID, isValid, rid)
  898. def setUserValid(self, token, eUserID, isValid, rid, *args, **kwargs):
  899. if token != None and eUserID != None and isValid != None:
  900. tM = JSONTokenManager()
  901. error_code = tM.verify_AToken(token=token)
  902. if error_code == 0:
  903. superID = tM.accessDict.get('userID', None)
  904. if superID != None and superID != eUserID:
  905. if rid == None:
  906. return HttpResponse(self.UserValidUpdate(superID, eUserID, isValid))
  907. else:
  908. return HttpResponse(self.UserValidUpdatePC(superID, eUserID, isValid, rid))
  909. else:
  910. return ResponseJSON(150)
  911. else:
  912. response = HttpResponse(tM.errorCodeInfo(error_code))
  913. return response
  914. else:
  915. return ResponseJSON(800)
  916. def UserValidUpdatePC(self, superID, eUserID, isValid, rid):
  917. try:
  918. super = Device_User.objects.filter(userID=superID)
  919. eUser = Device_User.objects.filter(userID=eUserID)
  920. except Exception as e:
  921. errorInfo = traceback.format_exc()
  922. print('查询数据库错误: %s' % errorInfo)
  923. return ResponseFormal(500,repr(e))
  924. else:
  925. if not super:
  926. return ResponseFormal(615)
  927. if not eUser:
  928. return ResponseFormal(616)
  929. own_permission = ModelService.check_permission(userID=superID,permID=50)
  930. if own_permission is True:
  931. try:
  932. eUser.update(user_isValid = isValid)
  933. device_user_query_set = Device_User.objects.get(userID=eUserID)
  934. if device_user_query_set.role.all():
  935. device_user_query_set.role.set([rid])
  936. else:
  937. role_user_query_set = Role.objects.get(rid=rid)
  938. device_user_query_set.role.add(role_user_query_set)
  939. except Exception as e:
  940. errorInfo = traceback.format_exc()
  941. print('更新数据库错误:%s'%errorInfo)
  942. return ResponseFormal(501,repr(e))
  943. else:
  944. return ResponseFormal(0)
  945. else:
  946. return ResponseFormal(602)
  947. def UserValidUpdate(self, superID, eUserID, isValid):
  948. try:
  949. super = Device_User.objects.filter(userID = superID)
  950. eUser = Device_User.objects.filter(userID = eUserID)
  951. except Exception as e:
  952. errorInfo = traceback.format_exc()
  953. print('查询数据库错误: %s' % errorInfo)
  954. return ResponseFormal(500,repr(e))
  955. if not super:
  956. return ResponseFormal(113)
  957. if not eUser:
  958. return ResponseFormal(113)
  959. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  960. return ResponseFormal(602)
  961. try:
  962. updateCount = eUser.update(user_isValid = isValid)
  963. except Exception as e:
  964. errorInfo = traceback.format_exc()
  965. print('更新数据库错误: %s' % errorInfo)
  966. return ResponseFormal(501,repr(e))
  967. return ResponseFormal(0)
  968. @csrf_exempt
  969. def success(request):
  970. return ResponseJSON(0)
  971. class refreshTokenView(View):
  972. @method_decorator(csrf_exempt)
  973. def dispatch(self, *args, **kwargs):
  974. return super(refreshTokenView, self).dispatch(*args, **kwargs)
  975. def post(self, request, *args, **kwargs):
  976. request.encoding = 'utf-8'
  977. request_dict = request.POST
  978. return self.validation(request_dict=request_dict)
  979. @csrf_exempt
  980. def get(self, request, *args, **kwargs):
  981. request.encoding = 'utf-8'
  982. request_dict = request.GET
  983. return self.validation(request_dict=request_dict)
  984. def validation(self, request_dict, *args, **kwargs):
  985. refresh_token = request_dict.get('refresh_token', None)
  986. if refresh_token != None:
  987. tM = JSONTokenManager()
  988. result = tM.refresh_AToken(refresh_token)
  989. response = HttpResponse(result)
  990. return response
  991. else:
  992. return ResponseJSON(800)