UserManger.py 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493
  1. import os
  2. import traceback
  3. import boto3
  4. import botocore
  5. from botocore import client
  6. import simplejson as json
  7. from django.http import HttpResponse
  8. from django.utils.decorators import method_decorator
  9. from django.views.decorators.csrf import csrf_exempt
  10. from django.views.generic import TemplateView, View
  11. from Ansjer.cn_config.config_test import REGION_NAME2
  12. from Ansjer.config import BASE_DIR, ACCESS_KEY_ID, SECRET_ACCESS_KEY, REGION_NAME, AVATAR_BUCKET, CONFIG_INFO, \
  13. CONFIG_CN, CONFIG_TEST, LOGGER
  14. from Ansjer.config import SERVER_DOMAIN
  15. from Model.models import Role, Device_User, UserOauth2Model, UserExModel, CountryLanguageModel, LanguageModel, App_Info
  16. from Object.ContentSecurityObject import ContentSecurity
  17. from Object.RedisObject import RedisObject
  18. from Object.ResponseObject import ResponseObject
  19. from Object.TokenObject import TokenObject
  20. from Service.CommonService import CommonService
  21. from Service.ModelService import ModelService
  22. class showUserMoreView(TemplateView):
  23. @method_decorator(csrf_exempt)
  24. def dispatch(self, *args, **kwargs):
  25. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  26. def post(self, request, *args, **kwargs):
  27. request.encoding = 'utf-8'
  28. return self.validation(request.POST)
  29. def get(self, request, *args, **kwargs):
  30. request.encoding = 'gb2312'
  31. return self.validation(request.GET)
  32. def validation(self, request_dict):
  33. response = ResponseObject()
  34. token = request_dict.get('token', None)
  35. lang = request_dict.get('lang', 'en')
  36. app_bundle_id = request_dict.get('app_bundle_id', None)
  37. tko = TokenObject(token)
  38. response.lang = tko.lang
  39. if tko.code != 0:
  40. return response.json(tko.code)
  41. user_id = tko.userID
  42. if not user_id:
  43. return response.json(104)
  44. return self.show_user_more(user_id, lang, app_bundle_id, response)
  45. @staticmethod
  46. def show_user_more(user_id, lang, app_bundle_id, response):
  47. """
  48. 获取用户完整信息
  49. @param user_id: 用户id
  50. @param lang: 语言
  51. @param app_bundle_id: app包id
  52. @param response: 响应
  53. @return: response
  54. """
  55. device_user_qs = Device_User.objects.filter(userID=user_id)
  56. if not device_user_qs.exists():
  57. return response.json(104)
  58. try:
  59. sqlDict = CommonService.qs_to_dict(device_user_qs)
  60. for k, v in enumerate(sqlDict["datas"]):
  61. sqlDict['datas'][k]['fields'].pop('password')
  62. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  63. region_status = sqlDict['datas'][k]['fields']['region_status']
  64. if userIconPath:
  65. if userIconPath.find('static/') != -1:
  66. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  67. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  68. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  69. # 确认地区字段
  70. sqlDict['datas'][k]['fields']['region_status'] = 1 if region_status else 0
  71. if len(v['fields']['role']):
  72. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  73. sqlDict["datas"][k]['fields']['rolename'] = roleName
  74. # 根据region_country的值返回api和region数据
  75. sqlDict["datas"][k]['fields']['api'] = ''
  76. sqlDict['datas'][k]['fields']['region'] = ''
  77. region_country = sqlDict["datas"][k]['fields']['region_country']
  78. if region_country != 0:
  79. # api数据
  80. country_qs = CountryLanguageModel.objects.filter(country_id=region_country).values(
  81. 'country__region__api', 'country__region__zosi_api', 'country__region__loocam_api')
  82. sqlDict["datas"][k]['fields']['api'] = country_qs[0]['country__region__api']
  83. if region_country == 1: # 中国返回美洲域名
  84. sqlDict["datas"][k]['fields']['api'] = 'https://www.dvema.com/'
  85. # 根据app_bundle_id返回对应域名
  86. if app_bundle_id:
  87. # 查询app名
  88. app_inf_qs = App_Info.objects.filter(appBundleId=app_bundle_id).values('appName')
  89. if app_inf_qs.exists():
  90. app_name = app_inf_qs[0]['appName']
  91. if 'Zosi' in app_name:
  92. sqlDict['datas'][k]['fields']['api'] = country_qs[0]['country__region__zosi_api']
  93. if region_country == 1:
  94. sqlDict['datas'][k]['fields']['api'] = 'https://api.zositech2.com/'
  95. elif 'Loocam' in app_name:
  96. sqlDict['datas'][k]['fields']['api'] = country_qs[0]['country__region__loocam_api']
  97. if region_country == 1:
  98. sqlDict['datas'][k]['fields']['api'] = 'https://api.loocam2.com/'
  99. # region数据
  100. region_country = sqlDict['datas'][k]['fields']['region_country']
  101. language_qs = LanguageModel.objects.filter(lang=lang).values('id')
  102. # 语言不存在返回英语
  103. if not language_qs.exists():
  104. language_qs = LanguageModel.objects.filter(lang='en').values('id')
  105. region_qs = CountryLanguageModel.objects.filter(country_id=region_country,
  106. language_id=language_qs[0]['id']).\
  107. values('country_name')
  108. sqlDict['datas'][k]['fields']['region'] = region_qs[0]['country_name'] if region_qs.exists() else ''
  109. # 增加oauth2关联数据
  110. ua_qs = UserOauth2Model.objects.filter(userID_id=user_id).values_list('authType', flat=True)
  111. sqlDict['oauth2'] = list(ua_qs)
  112. return response.json(0, sqlDict)
  113. except Exception as e:
  114. return response.json(500, 'error_line:{}, error_msg:{}'.format(e.__traceback__.tb_lineno, repr(e)))
  115. class perfectUserInfoView(TemplateView):
  116. # 完善个人信息
  117. @method_decorator(csrf_exempt)
  118. def dispatch(self, *args, **kwargs):
  119. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  120. def post(self, request, *args, **kwargs):
  121. request.encoding = 'utf-8'
  122. userContent = request.POST.get('content', None)
  123. userIcon = request.FILES.get('userIcon', None)
  124. token = request.POST.get('token', None)
  125. return self.ValidationError(token, userContent, userIcon)
  126. def get(self, request, *args, **kwargs):
  127. request.encoding = 'gb2312'
  128. userContent = request.GET.get('content', None)
  129. userIcon = request.FILES.get('userIcon', None)
  130. token = request.GET.get('token', None)
  131. return self.ValidationError(token, userContent, userIcon)
  132. def ValidationError(self, token, userContent, userIcon):
  133. response = ResponseObject()
  134. tko = TokenObject(token)
  135. response.lang = tko.lang
  136. if tko.code != 0:
  137. return response.json(tko.code)
  138. userID = tko.userID
  139. if not userID:
  140. return response.json(309)
  141. userIconPath = ''
  142. if userIcon:
  143. # 上传头像到aws s3
  144. aws_s3_client = boto3.client(
  145. 's3',
  146. region_name=REGION_NAME,
  147. aws_access_key_id=ACCESS_KEY_ID,
  148. aws_secret_access_key=SECRET_ACCESS_KEY,
  149. config=botocore.client.Config(signature_version='s3v4'),
  150. )
  151. Key = userID + '/' + userIcon.name
  152. aws_s3_client.put_object(Bucket=AVATAR_BUCKET, Key=Key, Body=userIcon)
  153. userIconPath = userID + '/' + userIcon.name
  154. # 测试/国内服,验证头像是否合规
  155. if CONFIG_INFO == CONFIG_CN or CONFIG_INFO == CONFIG_TEST:
  156. # 测试服头像地区为us-west-1
  157. if CONFIG_INFO == CONFIG_TEST:
  158. aws_s3_client = boto3.client(
  159. 's3',
  160. region_name=REGION_NAME2,
  161. aws_access_key_id=ACCESS_KEY_ID,
  162. aws_secret_access_key=SECRET_ACCESS_KEY,
  163. config=botocore.client.Config(signature_version='s3v4'),
  164. )
  165. params = {'Bucket': AVATAR_BUCKET, 'Key': Key}
  166. image_url = aws_s3_client.generate_presigned_url('get_object', Params=params)
  167. service = 'profilePhotoCheck'
  168. LOGGER.info('头像链接:{}'.format(image_url))
  169. service_dict = {'imageUrl': image_url}
  170. service_parameters = json.dumps(service_dict)
  171. legal = ContentSecurity().image_review(service, service_parameters)
  172. if not legal:
  173. return response.json(106)
  174. if userContent:
  175. dataValid = json.loads(userContent)
  176. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  177. return response.json(444)
  178. if not userIconPath and not userContent:
  179. return response.json(444)
  180. elif not userIconPath and userContent:
  181. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  182. elif userIconPath and not userContent:
  183. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  184. else:
  185. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath, userContent=userContent)
  186. def perfectUserInfoUpdate(slef, userID, response, **kwargs):
  187. """
  188. :param username:
  189. :param userContent:
  190. :param args:
  191. :param kwargs:
  192. :return:
  193. """
  194. User = Device_User.objects.filter(userID=userID)
  195. if not User.exists():
  196. return response.json(104)
  197. userIconPath = kwargs.get('userIconPath', None)
  198. userContent = kwargs.get('userContent', None)
  199. userIconUrl = ""
  200. if userIconPath:
  201. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  202. if userContent:
  203. try:
  204. UserData = json.loads(userContent)
  205. except Exception as e:
  206. return response.json(444, repr(e))
  207. # 测试/国内服,验证昵称是否合规
  208. if CONFIG_INFO == CONFIG_CN or CONFIG_INFO == CONFIG_TEST:
  209. nickname = UserData.get('NickName')
  210. if nickname:
  211. service = 'nickname_detection'
  212. service_dict = {'content': nickname}
  213. service_parameters = json.dumps(service_dict)
  214. legal = ContentSecurity().text_review(service, service_parameters)
  215. if not legal:
  216. return response.json(108)
  217. try:
  218. if userIconPath and userContent:
  219. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  220. elif not userIconPath and userContent:
  221. User.update(**UserData)
  222. elif userIconPath and not userContent:
  223. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  224. except Exception as e:
  225. return response.json(117, repr(e))
  226. else:
  227. res = CommonService.qs_to_dict(User)
  228. for k, v in enumerate(res["datas"]):
  229. res['datas'][k]['fields'].pop('password')
  230. userIconPath = res['datas'][k]['fields']['userIconPath']
  231. if userIconPath and userIconUrl != '':
  232. res['datas'][k]['fields']['userIconUrl'] = userIconUrl
  233. return response.json(0, res)
  234. class getAvatarView(TemplateView):
  235. @method_decorator(csrf_exempt)
  236. def dispatch(self, *args, **kwargs):
  237. return super(getAvatarView, self).dispatch(*args, **kwargs)
  238. def post(self, request, *args, **kwargs):
  239. request.encoding = 'utf-8'
  240. filePath = kwargs.get('filePath', '')
  241. filePath.encode(encoding='utf-8', errors='strict')
  242. return self.getAvatar(filePath)
  243. def get(self, request, *args, **kwargs):
  244. request.encoding = 'utf-8'
  245. filePath = kwargs.get('filePath', '')
  246. filePath.encode(encoding='utf-8', errors='strict')
  247. return self.getAvatar(filePath)
  248. def getAvatar(self, filePath):
  249. response = ResponseObject()
  250. if not filePath:
  251. return response.json(800)
  252. if filePath == 'User/default.png' or filePath == 'User/defaultUser.png':
  253. # 使用默认头像
  254. try:
  255. aws_s3_client = boto3.client(
  256. 's3',
  257. region_name=REGION_NAME,
  258. aws_access_key_id=ACCESS_KEY_ID,
  259. aws_secret_access_key=SECRET_ACCESS_KEY,
  260. config=botocore.client.Config(signature_version='s3v4'),
  261. )
  262. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key='default/default.png')
  263. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  264. except Exception as e:
  265. print(e)
  266. return response.json(500, 'error_line:{}, error_msg:{}'.format(e.__traceback__.tb_lineno, repr(e)))
  267. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  268. if os.path.isfile(fullPath):
  269. try:
  270. imageData = open(fullPath, 'rb').read()
  271. return HttpResponse(imageData, content_type="image/jpeg")
  272. except Exception as e:
  273. return response.json(906, repr(e))
  274. else:
  275. try:
  276. aws_s3_client = boto3.client(
  277. 's3',
  278. region_name=REGION_NAME,
  279. aws_access_key_id=ACCESS_KEY_ID,
  280. aws_secret_access_key=SECRET_ACCESS_KEY,
  281. config=botocore.client.Config(signature_version='s3v4'),
  282. )
  283. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key=filePath)
  284. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  285. except Exception as e:
  286. return response.json(906, repr(e))
  287. @csrf_exempt
  288. def delUserInterface(request):
  289. response = ResponseObject()
  290. if request.method == 'POST':
  291. request_dict = request.POST
  292. elif request.method == 'GET':
  293. request_dict = request.GET
  294. else:
  295. return response.json(404)
  296. token = request_dict.get('token', None)
  297. delUserID = request_dict.get('delUserID', None)
  298. if not token or not delUserID:
  299. return response.json(444, 'token,delUserID')
  300. tko = TokenObject(token)
  301. response.lang = tko.lang
  302. if tko.code != 0:
  303. return response.json(tko.code)
  304. userID = tko.userID
  305. if not userID:
  306. return response.json(309)
  307. userValid = Device_User.objects.filter(userID=userID)
  308. if not userValid.exists():
  309. return response.json(104)
  310. own_perm = ModelService.check_perm(userID=userID, permID=10)
  311. if own_perm is not True:
  312. return response.json(404)
  313. delUser = Device_User.objects.filter(userID=delUserID)
  314. if not delUser.exists():
  315. return response.json(104)
  316. delUser.delete()
  317. return response.json(0)
  318. @csrf_exempt
  319. def showAllUserInterface(request):
  320. response = ResponseObject()
  321. if request.method == 'POST':
  322. request_dict = request.POST
  323. elif request.method == 'GET':
  324. request_dict = request.GET
  325. else:
  326. return response.json(404)
  327. token = request_dict.get('token', None)
  328. type = request_dict.get('type', None)
  329. tko = TokenObject(token)
  330. response.lang = tko.lang
  331. if tko.code != 0:
  332. return response.json(tko.code)
  333. userID = tko.userID
  334. if not userID:
  335. return response.json(104)
  336. if type == 'PC':
  337. line = int(request.POST.get('line', None))
  338. page = int(request.POST.get('page', None))
  339. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  340. if not userValid:
  341. return response.json(104)
  342. # 管理员查询
  343. own_permission = ModelService.check_perm(userID=userID, permID=30)
  344. if own_permission is not True:
  345. return response.json(404)
  346. device_user_queryset = Device_User.objects.all()
  347. device_user_count = device_user_queryset.count()
  348. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  349. sqlDict = CommonService.qs_to_dict(device_user_res)
  350. redisObj = RedisObject(db=3)
  351. for k, v in enumerate(sqlDict["datas"]):
  352. if len(v['fields']['role']) > 0:
  353. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  354. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  355. if redisObj.get_data(key=v['pk']):
  356. sqlDict["datas"][k]['fields']['online'] = True
  357. else:
  358. sqlDict["datas"][k]['fields']['online'] = False
  359. ue = UserExModel.objects.filter(userID=sqlDict["datas"][k]['pk'])
  360. if ue.exists():
  361. sqlDict["datas"][k]['fields']['appBundleId'] = ue[0].appBundleId
  362. else:
  363. sqlDict["datas"][k]['fields']['appBundleId'] = ''
  364. sqlDict['count'] = device_user_count
  365. return response.json(0, sqlDict)
  366. else:
  367. own_permission = ModelService.check_perm(userID=userID, permID=30)
  368. if own_permission is not True:
  369. return response.json(404)
  370. qs = Device_User.objects.all().order_by('-data_joined')
  371. res = CommonService.qs_to_dict(qs)
  372. return response.json(0, res)
  373. class setUserValidView(View):
  374. @method_decorator(csrf_exempt)
  375. def dispatch(self, *args, **kwargs):
  376. return super(setUserValidView, self).dispatch(*args, **kwargs)
  377. def post(self, request, *args, **kwargs):
  378. request.encoding = 'utf-8'
  379. request_dict = request.POST
  380. return self.setUserValid(request_dict)
  381. def get(self, request, *args, **kwargs):
  382. request.encoding = 'utf-8'
  383. request_dict = request.GET
  384. return self.setUserValid(request_dict)
  385. def setUserValid(self, request_dict):
  386. token = request_dict.get('token', None)
  387. eUserID = request_dict.get('userID', None)
  388. isValid = request_dict.get('isValid', None)
  389. rid = request_dict.get('rid', None)
  390. response = ResponseObject()
  391. tko = TokenObject(token)
  392. response.lang = tko.lang
  393. if tko.code != 0:
  394. return response.json(tko.code)
  395. superID = tko.userID
  396. own_perm = ModelService.check_perm(userID=superID, permID=50)
  397. if own_perm is True or superID != None and superID != eUserID:
  398. if rid == None:
  399. return self.UserValidUpdate(superID, eUserID, isValid, response)
  400. else:
  401. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  402. else:
  403. return response.json(444, 'superID or userID')
  404. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  405. super = Device_User.objects.filter(userID=superID)
  406. eUser = Device_User.objects.filter(userID=eUserID)
  407. if not super.exists() or not eUser.exists():
  408. return response.json(104)
  409. own_permission = ModelService.check_perm(userID=superID, permID=50)
  410. if own_permission is True:
  411. try:
  412. eUser.update(user_isValid=isValid)
  413. device_user_query_set = Device_User.objects.get(userID=eUserID)
  414. if device_user_query_set.role.all():
  415. device_user_query_set.role.set([rid])
  416. else:
  417. role_user_query_set = Role.objects.get(rid=rid)
  418. device_user_query_set.role.add(role_user_query_set)
  419. except Exception as e:
  420. errorInfo = traceback.format_exc()
  421. print('更新数据库错误:%s' % errorInfo)
  422. return response.json(177, repr(e))
  423. else:
  424. return response.json(0)
  425. else:
  426. return response.json(404)
  427. def UserValidUpdate(self, superID, eUserID, isValid, response):
  428. super = Device_User.objects.filter(userID=superID)
  429. eUser = Device_User.objects.filter(userID=eUserID)
  430. if not super.exists():
  431. return response.json(104)
  432. if not eUser.exists():
  433. return response.json(104)
  434. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  435. return response.json(404)
  436. try:
  437. eUser.update(user_isValid=isValid)
  438. except Exception as e:
  439. errorInfo = traceback.format_exc()
  440. print('更新数据库错误: %s' % errorInfo)
  441. return response.json(177, repr(e))
  442. return response.json(0)
  443. @csrf_exempt
  444. def success(request):
  445. return HttpResponse(status=200)