UserManger.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488
  1. import os
  2. import traceback
  3. import boto3
  4. import botocore
  5. from botocore import client
  6. import simplejson as json
  7. from django.http import HttpResponse
  8. from django.utils.decorators import method_decorator
  9. from django.views.decorators.csrf import csrf_exempt
  10. from django.views.generic import TemplateView, View
  11. from Ansjer.config import BASE_DIR, ACCESS_KEY_ID, SECRET_ACCESS_KEY, REGION_NAME, AVATAR_BUCKET, CONFIG_INFO, \
  12. CONFIG_CN, CONFIG_TEST, LOGGER
  13. from Ansjer.config import SERVER_DOMAIN
  14. from Model.models import Role, Device_User, UserOauth2Model, UserExModel, CountryLanguageModel, LanguageModel, App_Info, \
  15. IcloudUseDetails
  16. from Object.ContentSecurityObject import ContentSecurity
  17. from Object.RedisObject import RedisObject
  18. from Object.ResponseObject import ResponseObject
  19. from Object.TokenObject import TokenObject
  20. from Service.CommonService import CommonService
  21. from Service.ModelService import ModelService
  22. class showUserMoreView(TemplateView):
  23. @method_decorator(csrf_exempt)
  24. def dispatch(self, *args, **kwargs):
  25. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  26. def post(self, request, *args, **kwargs):
  27. request.encoding = 'utf-8'
  28. return self.validation(request.POST)
  29. def get(self, request, *args, **kwargs):
  30. request.encoding = 'gb2312'
  31. return self.validation(request.GET)
  32. def validation(self, request_dict):
  33. response = ResponseObject()
  34. token = request_dict.get('token', None)
  35. lang = request_dict.get('lang', 'en')
  36. app_bundle_id = request_dict.get('app_bundle_id', None)
  37. tko = TokenObject(token)
  38. response.lang = tko.lang
  39. if tko.code != 0:
  40. return response.json(tko.code)
  41. user_id = tko.userID
  42. if not user_id:
  43. return response.json(104)
  44. return self.show_user_more(user_id, lang, app_bundle_id, response)
  45. @staticmethod
  46. def show_user_more(user_id, lang, app_bundle_id, response):
  47. """
  48. 获取用户完整信息
  49. @param user_id: 用户id
  50. @param lang: 语言
  51. @param app_bundle_id: app包id
  52. @param response: 响应
  53. @return: response
  54. """
  55. device_user_qs = Device_User.objects.filter(userID=user_id)
  56. if not device_user_qs.exists():
  57. return response.json(104)
  58. try:
  59. sqlDict = CommonService.qs_to_dict(device_user_qs)
  60. for k, v in enumerate(sqlDict["datas"]):
  61. sqlDict['datas'][k]['fields'].pop('password')
  62. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  63. region_status = sqlDict['datas'][k]['fields']['region_status']
  64. if userIconPath:
  65. if userIconPath.find('static/') != -1:
  66. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  67. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  68. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  69. # 判断用户是否开通云盘
  70. icloud_user_qs = IcloudUseDetails.objects.filter(user_id=user_id)
  71. v['fields']['is_cloudDrive'] = 1 if icloud_user_qs.exists() else 0
  72. # 确认地区字段
  73. sqlDict['datas'][k]['fields']['region_status'] = 1 if region_status else 0
  74. if len(v['fields']['role']):
  75. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  76. sqlDict["datas"][k]['fields']['rolename'] = roleName
  77. # 根据region_country的值返回api和region数据
  78. sqlDict["datas"][k]['fields']['api'] = ''
  79. sqlDict['datas'][k]['fields']['region'] = ''
  80. region_country = sqlDict["datas"][k]['fields']['region_country']
  81. if region_country != 0:
  82. # api数据
  83. country_qs = CountryLanguageModel.objects.filter(country_id=region_country).values(
  84. 'country__region__api', 'country__region__zosi_api', 'country__region__loocam_api')
  85. sqlDict["datas"][k]['fields']['api'] = country_qs[0]['country__region__api']
  86. if region_country == 1: # 中国返回美洲域名
  87. sqlDict["datas"][k]['fields']['api'] = 'https://www.dvema.com/'
  88. # 根据app_bundle_id返回对应域名
  89. if app_bundle_id:
  90. # 查询app名
  91. app_inf_qs = App_Info.objects.filter(appBundleId=app_bundle_id).values('appName')
  92. if app_inf_qs.exists():
  93. app_name = app_inf_qs[0]['appName']
  94. if 'Zosi' in app_name:
  95. sqlDict['datas'][k]['fields']['api'] = country_qs[0]['country__region__zosi_api']
  96. if region_country == 1:
  97. sqlDict['datas'][k]['fields']['api'] = 'https://api.zositech2.com/'
  98. elif 'Loocam' in app_name:
  99. sqlDict['datas'][k]['fields']['api'] = country_qs[0]['country__region__loocam_api']
  100. if region_country == 1:
  101. sqlDict['datas'][k]['fields']['api'] = 'https://api.loocam2.com/'
  102. # region数据
  103. region_country = sqlDict['datas'][k]['fields']['region_country']
  104. language_qs = LanguageModel.objects.filter(lang=lang).values('id')
  105. region_qs = CountryLanguageModel.objects.filter(country_id=region_country,
  106. language_id=language_qs[0]['id']). \
  107. values('country_name')
  108. sqlDict['datas'][k]['fields']['region'] = region_qs[0]['country_name'] if region_qs.exists() else ''
  109. # 增加oauth2关联数据
  110. ua_qs = UserOauth2Model.objects.filter(userID_id=user_id).values_list('authType', flat=True)
  111. sqlDict['oauth2'] = list(ua_qs)
  112. return response.json(0, sqlDict)
  113. except Exception as e:
  114. return response.json(500, 'error_line:{}, error_msg:{}'.format(e.__traceback__.tb_lineno, repr(e)))
  115. class perfectUserInfoView(TemplateView):
  116. # 完善个人信息
  117. @method_decorator(csrf_exempt)
  118. def dispatch(self, *args, **kwargs):
  119. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  120. def post(self, request, *args, **kwargs):
  121. request.encoding = 'utf-8'
  122. userContent = request.POST.get('content', None)
  123. userIcon = request.FILES.get('userIcon', None)
  124. token = request.POST.get('token', None)
  125. return self.ValidationError(token, userContent, userIcon)
  126. def get(self, request, *args, **kwargs):
  127. request.encoding = 'gb2312'
  128. userContent = request.GET.get('content', None)
  129. userIcon = request.FILES.get('userIcon', None)
  130. token = request.GET.get('token', None)
  131. return self.ValidationError(token, userContent, userIcon)
  132. def ValidationError(self, token, userContent, userIcon):
  133. response = ResponseObject()
  134. tko = TokenObject(token)
  135. response.lang = tko.lang
  136. if tko.code != 0:
  137. return response.json(tko.code)
  138. userID = tko.userID
  139. if not userID:
  140. return response.json(309)
  141. userIconPath = ''
  142. if userIcon:
  143. # 上传头像到aws s3
  144. aws_s3_client = boto3.client(
  145. 's3',
  146. region_name=REGION_NAME,
  147. aws_access_key_id=ACCESS_KEY_ID,
  148. aws_secret_access_key=SECRET_ACCESS_KEY,
  149. config=botocore.client.Config(signature_version='s3v4'),
  150. )
  151. Key = userID + '/' + userIcon.name
  152. aws_s3_client.put_object(Bucket=AVATAR_BUCKET, Key=Key, Body=userIcon)
  153. userIconPath = userID + '/' + userIcon.name
  154. # 测试/国内服,验证头像是否合规
  155. if CONFIG_INFO == CONFIG_CN or CONFIG_INFO == CONFIG_TEST:
  156. params = {'Bucket': AVATAR_BUCKET, 'Key': Key}
  157. image_url = aws_s3_client.generate_presigned_url('get_object', Params=params)
  158. service = 'profilePhotoCheck'
  159. LOGGER.info('头像链接:{}'.format(image_url))
  160. service_dict = {'imageUrl': image_url}
  161. service_parameters = json.dumps(service_dict)
  162. legal = ContentSecurity().image_review(service, service_parameters)
  163. if not legal:
  164. return response.json(106)
  165. if userContent:
  166. dataValid = json.loads(userContent)
  167. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  168. return response.json(444)
  169. if not userIconPath and not userContent:
  170. return response.json(444)
  171. elif not userIconPath and userContent:
  172. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  173. elif userIconPath and not userContent:
  174. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  175. else:
  176. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath, userContent=userContent)
  177. def perfectUserInfoUpdate(slef, userID, response, **kwargs):
  178. """
  179. :param username:
  180. :param userContent:
  181. :param args:
  182. :param kwargs:
  183. :return:
  184. """
  185. User = Device_User.objects.filter(userID=userID)
  186. if not User.exists():
  187. return response.json(104)
  188. userIconPath = kwargs.get('userIconPath', None)
  189. userContent = kwargs.get('userContent', None)
  190. userIconUrl = ""
  191. if userIconPath:
  192. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  193. if userContent:
  194. try:
  195. UserData = json.loads(userContent)
  196. except Exception as e:
  197. return response.json(444, repr(e))
  198. # 测试/国内服,验证昵称是否合规
  199. if CONFIG_INFO == CONFIG_CN or CONFIG_INFO == CONFIG_TEST:
  200. nickname = UserData.get('NickName')
  201. if nickname:
  202. service = 'nickname_detection'
  203. service_dict = {'content': nickname}
  204. service_parameters = json.dumps(service_dict)
  205. legal = ContentSecurity().text_review(service, service_parameters)
  206. if not legal:
  207. return response.json(108)
  208. try:
  209. if userIconPath and userContent:
  210. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  211. elif not userIconPath and userContent:
  212. User.update(**UserData)
  213. elif userIconPath and not userContent:
  214. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  215. except Exception as e:
  216. return response.json(117, repr(e))
  217. else:
  218. res = CommonService.qs_to_dict(User)
  219. for k, v in enumerate(res["datas"]):
  220. res['datas'][k]['fields'].pop('password')
  221. userIconPath = res['datas'][k]['fields']['userIconPath']
  222. region_status = res['datas'][k]['fields']['region_status']
  223. if region_status is True:
  224. res['datas'][k]['fields']['region_status'] = 1
  225. else:
  226. res['datas'][k]['fields']['region_status'] = 0
  227. if userIconPath and userIconUrl != '':
  228. res['datas'][k]['fields']['userIconUrl'] = userIconUrl
  229. return response.json(0, res)
  230. class getAvatarView(TemplateView):
  231. @method_decorator(csrf_exempt)
  232. def dispatch(self, *args, **kwargs):
  233. return super(getAvatarView, self).dispatch(*args, **kwargs)
  234. def post(self, request, *args, **kwargs):
  235. request.encoding = 'utf-8'
  236. filePath = kwargs.get('filePath', '')
  237. filePath.encode(encoding='utf-8', errors='strict')
  238. return self.getAvatar(filePath)
  239. def get(self, request, *args, **kwargs):
  240. request.encoding = 'utf-8'
  241. filePath = kwargs.get('filePath', '')
  242. filePath.encode(encoding='utf-8', errors='strict')
  243. return self.getAvatar(filePath)
  244. def getAvatar(self, filePath):
  245. response = ResponseObject()
  246. if not filePath:
  247. return response.json(800)
  248. if filePath == 'User/default.png' or filePath == 'User/defaultUser.png':
  249. # 使用默认头像
  250. try:
  251. aws_s3_client = boto3.client(
  252. 's3',
  253. region_name=REGION_NAME,
  254. aws_access_key_id=ACCESS_KEY_ID,
  255. aws_secret_access_key=SECRET_ACCESS_KEY,
  256. config=botocore.client.Config(signature_version='s3v4'),
  257. )
  258. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key='default/default.png')
  259. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  260. except Exception as e:
  261. print(e)
  262. return response.json(500, 'error_line:{}, error_msg:{}'.format(e.__traceback__.tb_lineno, repr(e)))
  263. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  264. if os.path.isfile(fullPath):
  265. try:
  266. imageData = open(fullPath, 'rb').read()
  267. return HttpResponse(imageData, content_type="image/jpeg")
  268. except Exception as e:
  269. return response.json(906, repr(e))
  270. else:
  271. try:
  272. aws_s3_client = boto3.client(
  273. 's3',
  274. region_name=REGION_NAME,
  275. aws_access_key_id=ACCESS_KEY_ID,
  276. aws_secret_access_key=SECRET_ACCESS_KEY,
  277. config=botocore.client.Config(signature_version='s3v4'),
  278. )
  279. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key=filePath)
  280. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  281. except Exception as e:
  282. return response.json(906, repr(e))
  283. @csrf_exempt
  284. def delUserInterface(request):
  285. response = ResponseObject()
  286. if request.method == 'POST':
  287. request_dict = request.POST
  288. elif request.method == 'GET':
  289. request_dict = request.GET
  290. else:
  291. return response.json(404)
  292. token = request_dict.get('token', None)
  293. delUserID = request_dict.get('delUserID', None)
  294. if not token or not delUserID:
  295. return response.json(444, 'token,delUserID')
  296. tko = TokenObject(token)
  297. response.lang = tko.lang
  298. if tko.code != 0:
  299. return response.json(tko.code)
  300. userID = tko.userID
  301. if not userID:
  302. return response.json(309)
  303. userValid = Device_User.objects.filter(userID=userID)
  304. if not userValid.exists():
  305. return response.json(104)
  306. own_perm = ModelService.check_perm(userID=userID, permID=10)
  307. if own_perm is not True:
  308. return response.json(404)
  309. delUser = Device_User.objects.filter(userID=delUserID)
  310. if not delUser.exists():
  311. return response.json(104)
  312. delUser.delete()
  313. return response.json(0)
  314. @csrf_exempt
  315. def showAllUserInterface(request):
  316. response = ResponseObject()
  317. if request.method == 'POST':
  318. request_dict = request.POST
  319. elif request.method == 'GET':
  320. request_dict = request.GET
  321. else:
  322. return response.json(404)
  323. token = request_dict.get('token', None)
  324. type = request_dict.get('type', None)
  325. tko = TokenObject(token)
  326. response.lang = tko.lang
  327. if tko.code != 0:
  328. return response.json(tko.code)
  329. userID = tko.userID
  330. if not userID:
  331. return response.json(104)
  332. if type == 'PC':
  333. line = int(request.POST.get('line', None))
  334. page = int(request.POST.get('page', None))
  335. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  336. if not userValid:
  337. return response.json(104)
  338. # 管理员查询
  339. own_permission = ModelService.check_perm(userID=userID, permID=30)
  340. if own_permission is not True:
  341. return response.json(404)
  342. device_user_queryset = Device_User.objects.all()
  343. device_user_count = device_user_queryset.count()
  344. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  345. sqlDict = CommonService.qs_to_dict(device_user_res)
  346. redisObj = RedisObject(db=3)
  347. for k, v in enumerate(sqlDict["datas"]):
  348. if len(v['fields']['role']) > 0:
  349. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  350. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  351. if redisObj.get_data(key=v['pk']):
  352. sqlDict["datas"][k]['fields']['online'] = True
  353. else:
  354. sqlDict["datas"][k]['fields']['online'] = False
  355. ue = UserExModel.objects.filter(userID=sqlDict["datas"][k]['pk'])
  356. if ue.exists():
  357. sqlDict["datas"][k]['fields']['appBundleId'] = ue[0].appBundleId
  358. else:
  359. sqlDict["datas"][k]['fields']['appBundleId'] = ''
  360. sqlDict['count'] = device_user_count
  361. return response.json(0, sqlDict)
  362. else:
  363. own_permission = ModelService.check_perm(userID=userID, permID=30)
  364. if own_permission is not True:
  365. return response.json(404)
  366. qs = Device_User.objects.all().order_by('-data_joined')
  367. res = CommonService.qs_to_dict(qs)
  368. return response.json(0, res)
  369. class setUserValidView(View):
  370. @method_decorator(csrf_exempt)
  371. def dispatch(self, *args, **kwargs):
  372. return super(setUserValidView, self).dispatch(*args, **kwargs)
  373. def post(self, request, *args, **kwargs):
  374. request.encoding = 'utf-8'
  375. request_dict = request.POST
  376. return self.setUserValid(request_dict)
  377. def get(self, request, *args, **kwargs):
  378. request.encoding = 'utf-8'
  379. request_dict = request.GET
  380. return self.setUserValid(request_dict)
  381. def setUserValid(self, request_dict):
  382. token = request_dict.get('token', None)
  383. eUserID = request_dict.get('userID', None)
  384. isValid = request_dict.get('isValid', None)
  385. rid = request_dict.get('rid', None)
  386. response = ResponseObject()
  387. tko = TokenObject(token)
  388. response.lang = tko.lang
  389. if tko.code != 0:
  390. return response.json(tko.code)
  391. superID = tko.userID
  392. own_perm = ModelService.check_perm(userID=superID, permID=50)
  393. if own_perm is True or superID != None and superID != eUserID:
  394. if rid == None:
  395. return self.UserValidUpdate(superID, eUserID, isValid, response)
  396. else:
  397. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  398. else:
  399. return response.json(444, 'superID or userID')
  400. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  401. super = Device_User.objects.filter(userID=superID)
  402. eUser = Device_User.objects.filter(userID=eUserID)
  403. if not super.exists() or not eUser.exists():
  404. return response.json(104)
  405. own_permission = ModelService.check_perm(userID=superID, permID=50)
  406. if own_permission is True:
  407. try:
  408. eUser.update(user_isValid=isValid)
  409. device_user_query_set = Device_User.objects.get(userID=eUserID)
  410. if device_user_query_set.role.all():
  411. device_user_query_set.role.set([rid])
  412. else:
  413. role_user_query_set = Role.objects.get(rid=rid)
  414. device_user_query_set.role.add(role_user_query_set)
  415. except Exception as e:
  416. errorInfo = traceback.format_exc()
  417. print('更新数据库错误:%s' % errorInfo)
  418. return response.json(177, repr(e))
  419. else:
  420. return response.json(0)
  421. else:
  422. return response.json(404)
  423. def UserValidUpdate(self, superID, eUserID, isValid, response):
  424. super = Device_User.objects.filter(userID=superID)
  425. eUser = Device_User.objects.filter(userID=eUserID)
  426. if not super.exists():
  427. return response.json(104)
  428. if not eUser.exists():
  429. return response.json(104)
  430. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  431. return response.json(404)
  432. try:
  433. eUser.update(user_isValid=isValid)
  434. except Exception as e:
  435. errorInfo = traceback.format_exc()
  436. print('更新数据库错误: %s' % errorInfo)
  437. return response.json(177, repr(e))
  438. return response.json(0)
  439. @csrf_exempt
  440. def success(request):
  441. return HttpResponse(status=200)