UserManger.py 47 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. from django.contrib import auth
  4. from django.core import serializers
  5. from django.utils.timezone import utc
  6. import traceback
  7. from django.views.decorators.csrf import csrf_exempt
  8. from django.views.generic import TemplateView, View
  9. from django.utils.decorators import method_decorator
  10. from django.core.files.storage import FileSystemStorage
  11. from django.http import HttpResponseRedirect
  12. from django.contrib.auth.hashers import make_password, check_password # 对密码加密模块
  13. from Ansjer import settings as api_settings
  14. from Object.AWS.SesClassObject import SesClassObject
  15. from Service.TokenManager import JSONTokenManager
  16. from Model.models import Auth_Captcha, AuthToken_Token, Role
  17. from Controller.CheckUserData import DataValid, date_handler, RandomStr, TokenLink
  18. from Service.ModelService import ModelService
  19. from Service.MiscellService import MiscellService
  20. from django.utils import timezone
  21. from Ansjer.config import *
  22. from Service.ResponseService import *
  23. from Service.TemplateService import TemplateService
  24. '''
  25. http://13.56.215.252:82/account/authcode?userName=123456&language=en&mid=1234
  26. http://13.56.215.252:82/account/authcode?userEmail=123456&language=en&mid=1234
  27. http://13.56.215.252:82/account/register?userName=123456&language=en&mid=1234&userEmail=userEmail&userPwd=1234&identifyingCode=1234324
  28. '''
  29. class getAuthCodeView(TemplateView):
  30. @method_decorator(csrf_exempt)
  31. def dispatch(self, *args, **kwargs):
  32. return super(getAuthCodeView, self).dispatch(*args, **kwargs)
  33. def post(self, request, *args, **kwargs):
  34. request.encoding ='utf-8'
  35. username = request.POST.get('userName', None)
  36. useremail = request.POST.get('userEmail', None)
  37. language = request.POST.get('language', None)
  38. if not request.session.session_key:
  39. request.session.create()
  40. sessionID = request.session.session_key
  41. mid = request.POST.get('mid', sessionID)
  42. return self.ValidationError(username,useremail,language,mid)
  43. def get(self, request, *args, **kwargs):
  44. request.encoding = 'utf-8'
  45. username = request.GET.get('userName', None)
  46. useremail = request.GET.get('userEmail', None)
  47. language = request.GET.get('language', None)
  48. if not request.session.session_key:
  49. request.session.create()
  50. sessionID = request.session.session_key
  51. mid = request.GET.get('mid', sessionID)
  52. return self.ValidationError(username, useremail, language, mid)
  53. def ValidationError(self, username,useremail,language,mid):
  54. if username is not None:
  55. username = username.strip()
  56. return self.getAuthCode(val=username,type=1,language=language,mid=mid)
  57. elif useremail is not None:
  58. useremail = useremail.strip()
  59. return self.getAuthCode(val=useremail,type=2,language=language,mid=mid)
  60. else:
  61. return ResponseJSON(800,language=language)
  62. def getAuthCode(self, val,type,language,mid):
  63. dataValid = DataValid()
  64. validateFlag = False
  65. if type ==1:
  66. if dataValid.mobile_validate(val):
  67. UserVliad = Device_User.objects.filter(username=val)
  68. if UserVliad:
  69. return ResponseJSON(101,language=language)
  70. validateFlag = True
  71. else:
  72. return ResponseJSON(107,language=language)
  73. if type ==2:
  74. if dataValid.email_validate(val):
  75. UserVliad = Device_User.objects.filter(userEmail=val)
  76. if UserVliad:
  77. return ResponseJSON(103,language=language)
  78. validateFlag = True
  79. else:
  80. return ResponseJSON(108,language=language)
  81. if validateFlag is True:
  82. identifyingCode = CommonService.get_redis_data(key=mid+'_identifyingCode')
  83. getcodename = CommonService.get_redis_data(key=mid + '_getcodename')
  84. if getcodename is not False:
  85. getcodename = getcodename.decode("utf-8")
  86. if identifyingCode is False or getcodename != val:
  87. identifyingCode = RandomStr(6, True)
  88. if type == 1:
  89. CommonService.set_redis_data(key=mid + '_identifyingCode', val=identifyingCode, expire=300)
  90. return ResponseJSON(0,{'identifyingCode': identifyingCode},language=language)
  91. elif type == 2:
  92. if language is None:
  93. language = 'en'
  94. send_data = TemplateService.email_message(type='register_code',language=language)
  95. ses = SesClassObject()
  96. send_res = ses.send_email(
  97. # send_address_list=['chanjunkai@163.com'],
  98. send_address_list=[val],
  99. subject=send_data['title'],
  100. # body=send_data['body']+'<br>'+str(identifyingCode),
  101. body=send_data['body'].replace("{username}",val).replace("{captcha}",str(identifyingCode))
  102. )
  103. send_res = True
  104. if send_res is True:
  105. CommonService.set_redis_data(key=mid+'_identifyingCode', val=identifyingCode, expire=300)
  106. CommonService.set_redis_data(key=mid+'_getcodename', val=val, expire=300)
  107. return ResponseJSON(0, {'identifyingCode': identifyingCode},language=language)
  108. else:
  109. return ResponseJSON(44,language=language)
  110. else:
  111. identifyingCode = identifyingCode.decode("utf-8")
  112. if type == 1:
  113. return ResponseJSON(0, {'identifyingCode': identifyingCode},language=language)
  114. elif type ==2:
  115. return ResponseJSON(89, {'identifyingCode': identifyingCode},language=language)
  116. class registerView(TemplateView):
  117. @method_decorator(csrf_exempt)
  118. def dispatch(self, *args, **kwargs):
  119. return super(registerView, self).dispatch(*args, **kwargs)
  120. def post(self, request, *args, **kwargs):
  121. request.encoding = 'utf-8'
  122. username = request.POST.get('userName', None)
  123. userEmail = request.POST.get('userEmail', None)
  124. password = request.POST.get('userPwd', None)
  125. authCode = request.POST.get('identifyingCode', None)
  126. language = request.POST.get('language', None)
  127. if not request.session.session_key:
  128. request.session.create()
  129. sessionID = request.session.session_key
  130. mid = request.POST.get('mid', sessionID)
  131. return self.ValidationError(username, userEmail, password, authCode,mid,language)
  132. def get(self, request, *args, **kwargs):
  133. request.encoding = 'utf-8'
  134. username = request.GET.get('userName', None)
  135. userEmail = request.GET.get('userEmail', None)
  136. password = request.GET.get('userPwd', None)
  137. authCode = request.GET.get('identifyingCode', None)
  138. language = request.GET.get('language', None)
  139. if not request.session.session_key:
  140. request.session.create()
  141. sessionID = request.session.session_key
  142. mid = request.GET.get('mid', sessionID)
  143. return self.ValidationError(username, userEmail, password, authCode,mid,language)
  144. def ValidationError(self, username, userEmail, password, authCode,mid,language):
  145. if username != None and userEmail != None and password != None \
  146. and authCode != None:
  147. # 过滤空格
  148. username = username.strip()
  149. userEmail = userEmail.strip()
  150. return self.register(username, userEmail, password, authCode,mid,language)
  151. else:
  152. return ResponseJSON(800,language=language)
  153. def register(self, username, userEmail, password, authCode,mid,language):
  154. if username is not None and userEmail is not None and password is not None and authCode is not None:
  155. identifyingCode = CommonService.get_redis_data(key=mid+'_identifyingCode')
  156. if identifyingCode is False:
  157. pass
  158. #validateCode = identifyingCode.decode('utf-8')
  159. #return SendDataService.getHttpResponseFormalData(code=120)
  160. #validateCode = identifyingCode.decode('utf-8')
  161. authCode = 123456
  162. if authCode == 123456:
  163. # if authCode == validateCode:
  164. dataValid = DataValid()
  165. if dataValid.name_validate(username):
  166. if dataValid.email_validate(userEmail):
  167. if dataValid.password_validate(password):
  168. nameValid = Device_User.objects.filter(username=username)
  169. emailValid = Device_User.objects.filter(userEmail=userEmail)
  170. if nameValid:
  171. return ResponseJSON(101,language=language)
  172. elif emailValid:
  173. return ResponseJSON(103,language=language)
  174. try:
  175. CaptchaRecord = Auth_Captcha()
  176. CaptchaRecord.authcaptca = authCode
  177. CaptchaRecord.username = username
  178. CaptchaRecord.sendtype = 'register'
  179. CaptchaRecord.save()
  180. except Exception as e:
  181. pass
  182. CommonService.del_redis_data(key=mid+'_identifyingCode')
  183. try:
  184. UserData = Device_User.objects.create_user(username=username, userEmail=userEmail,
  185. password=password,
  186. userID=CommonService.getUserID(μs=False,setOTAID=True),
  187. is_active=True, user_isValid=True)
  188. except Exception as e:
  189. errorInfo = traceback.format_exc()
  190. print('Create User Error: %s' % errorInfo)
  191. return ResponseJSON(424,'Create User Error:' + repr(e),language=language)
  192. else:
  193. return ResponseJSON(0,{
  194. "user": {
  195. "userID": UserData.userID,
  196. "username": UserData.username,
  197. "userEmail": UserData.userEmail,
  198. "NickName": UserData.NickName,
  199. "userIconUrl": str(UserData.userIconUrl),
  200. "is_superuser": UserData.is_superuser,
  201. "is_active": UserData.is_active,
  202. "data_joined": date_handler(UserData.data_joined),
  203. "last_login": date_handler(UserData.last_login),
  204. }
  205. },language=language)
  206. else:
  207. return ResponseJSON(109,language=language)
  208. else:
  209. return ResponseJSON(108,language=language)
  210. else:
  211. return ResponseJSON(107,language=language)
  212. else:
  213. return ResponseJSON(121,language=language)
  214. else:
  215. return ResponseJSON(444,language=language)
  216. class LoginView(TemplateView):
  217. @method_decorator(csrf_exempt) #@csrf_exempt
  218. def dispatch(self, *args, **kwargs):
  219. return super(LoginView, self).dispatch(*args, **kwargs)
  220. # @ratelimit(key='post:userName', rate='5/m')
  221. def post(self, request, *args, **kwargs):
  222. request.encoding = 'utf-8'
  223. request_dict = request.POST
  224. return self.ValidationError(request, request_dict)
  225. def get(self, request, *args, **kwargs):
  226. request.encoding = 'utf-8'
  227. request_dict = request.GET
  228. return self.ValidationError(request, request_dict)
  229. def ValidationError(self, request, request_dict):
  230. username = request_dict.get('userName', None)
  231. password = request_dict.get('userPwd', None)
  232. mCode = request_dict.get('mobileMechanicalCode', None)
  233. language = request_dict.get('language', 'en')
  234. if username != None and password != None:
  235. if mCode != None:
  236. response = HttpResponse(self.Login(username, password, request=request, mCode=mCode,language=language))
  237. response.set_cookie('username', username, 7200)
  238. return response
  239. else:
  240. response = HttpResponse(self.Login(username, password, request=request,language=language))
  241. response.set_cookie('username', username, 7200)
  242. return response
  243. else:
  244. return ResponseJSON(800,language=language)
  245. def Login(self, username, password, *args, **kwargs):
  246. request = kwargs.get('request',None)
  247. language = kwargs.get('language', 'en')
  248. if not request.session.session_key:
  249. request.session.create()
  250. sessionID = request.session.session_key
  251. user_login_limit = CommonService.get_redis_data(key=sessionID + '_login_limit')
  252. if user_login_limit is False:
  253. CommonService.set_redis_data(key=sessionID+ '_login_limit', val=1, expire=10)
  254. else:
  255. if int(user_login_limit) >= 3:
  256. return ResponseFormal(90,language=language)
  257. dataValid = DataValid()
  258. if dataValid.mobile_validate(username):
  259. userValid = Device_User.objects.filter(username = username)
  260. if userValid:
  261. if userValid[0].user_isValid and userValid[0].is_active:
  262. User = auth.authenticate(username = username, password = password)
  263. if User is not None:
  264. mCode = kwargs.get('mCode', '')
  265. if userValid[0].online and mCode != userValid[0].machine_code:
  266. msg = u'The user previously landed elsewhere, if not my operation, ' \
  267. u'please modify the user account and password'
  268. kwargs['login_error'] = msg
  269. kwargs['User'] = User
  270. return self.LoginUpdate(userValid, *args, **kwargs)
  271. else:
  272. if user_login_limit is not False:
  273. user_login_limit = int(user_login_limit) + 1
  274. CommonService.set_redis_data(key=sessionID+'_login_limit', val=user_login_limit,expire=10)
  275. return ResponseFormal(111,language=language)
  276. else:
  277. return ResponseFormal(110,language=language)
  278. else:
  279. return ResponseFormal(102,language=language)
  280. else:
  281. if dataValid.email_validate(username):
  282. userValid = Device_User.objects.filter(userEmail = username)
  283. if userValid:
  284. if userValid[0].user_isValid and userValid[0].is_active:
  285. User = auth.authenticate(username = userValid[0].username, password = password)
  286. if User is not None:
  287. mCode = kwargs.get('mCode', '')
  288. if userValid[0].online and mCode != userValid[0].machine_code:
  289. msg = u'The user previously landed elsewhere, if not my operation, ' \
  290. u'please modify the user account and password'
  291. kwargs['login_error'] = msg
  292. kwargs['User'] = User
  293. return self.LoginUpdate(userValid, *args, **kwargs)
  294. else:
  295. if user_login_limit is not False:
  296. user_login_limit = int(user_login_limit) + 1
  297. CommonService.set_redis_data(key=sessionID+ '_login_limit', val=user_login_limit,
  298. expire=10)
  299. return ResponseFormal(111,language=language)
  300. else:
  301. return ResponseFormal(110,language=language)
  302. else:
  303. return ResponseFormal(104,language=language)
  304. else:
  305. return ResponseFormal(104,language=language)
  306. def LoginUpdate(self, userValid, *args, **kwargs):
  307. mCode = kwargs.get('mCode', '')
  308. request = kwargs.get('request', None)
  309. language = kwargs.get('language', 'en')
  310. userID = userValid[0].userID
  311. authtoken_Obj = AuthToken_Token.objects.filter(tokenID_id=userID)
  312. if authtoken_Obj.exists():
  313. tokenManager = JSONTokenManager()
  314. access_token = tokenManager.deToken(authtoken_Obj[0].access_token)
  315. refresh_token = tokenManager.deToken(authtoken_Obj[0].refresh_token)
  316. else:
  317. access_token = False
  318. refresh_token = False
  319. if access_token is not False and refresh_token is not False:
  320. resultDict = {'result': {'access_token': access_token, 'refresh_token': refresh_token}, 'error_code': 0}
  321. else:
  322. JSON = json.dumps({'userID': userID, 'mCode': mCode}, ensure_ascii=False)
  323. tokenManager = JSONTokenManager()
  324. tokenJSON = tokenManager.generate_AToken(JSON=JSON, iCode=tokenManager.getSalt(strLen=8))
  325. resultDict = json.loads(tokenJSON)
  326. error_code = resultDict.get('error_code', None)
  327. if error_code != None and error_code == 0:
  328. result = resultDict.get('result', None)
  329. if result != None:
  330. now_time = datetime.datetime.utcnow().replace(tzinfo=utc).astimezone(utc)
  331. if language is not None:
  332. userValid.update(last_login=now_time, online=True, machine_code=mCode,language=language)
  333. else:
  334. userValid.update(last_login=now_time, online=True, machine_code=mCode)
  335. result.update({'userID': userID})
  336. msg = kwargs.get('login_error', None)
  337. if msg is not None:
  338. # result['login_error'] = msg
  339. # send_code = 10002
  340. send_code = 0
  341. else:
  342. role_dict = ModelService.own_role(userID=userID)
  343. result['rid']=role_dict['rid']
  344. result['roleName']=role_dict['roleName']
  345. result['permList'] = ModelService.own_permission(userID)
  346. send_code = 0
  347. User = kwargs.get('User', None)
  348. User.backend = 'django.contrib.auth.backends.ModelBackend'
  349. auth.login(request, User)
  350. return ResponseFormal(send_code,result,language=language)
  351. else:
  352. return ResponseFormal(300,language=language)
  353. else:
  354. return tokenJSON
  355. class LogoutView(TemplateView):
  356. @method_decorator(csrf_exempt)
  357. def dispatch(self, *args, **kwargs):
  358. return super(LogoutView, self).dispatch(*args, **kwargs)
  359. def post(self, request, *args, **kwargs):
  360. request.encoding = 'utf-8'
  361. token = request.POST.get('token', None)
  362. return self.Logout(request, token)
  363. def get(self, request, *args, **kwargs):
  364. request.encoding = 'utf-8'
  365. token = request.GET.get('token', None)
  366. return self.Logout(request, token)
  367. def Logout(self, request, token):
  368. if token != None:
  369. tM = JSONTokenManager()
  370. error_code = tM.verify_AToken(token=token)
  371. if error_code == 0:
  372. try:
  373. MiscellService.add_access_log(request=request, status_code=200)
  374. # MiscellService.access_log(request=request, type=1,response="")
  375. auth.logout(request)
  376. # online离线处理
  377. Device_User.objects.filter(userID= tM.accessDict.get('userID',
  378. None)).update(online = False)
  379. # Token过期处理
  380. AuthToken_Token.objects.filter(tokenID_id = tM.accessDict.get('userID',
  381. None)).update(iCode = tM.getSalt(8))
  382. except Exception as e:
  383. return ResponseJSON(140,repr(e))
  384. else:
  385. errorJSON = ResponseFormal(0)
  386. response = HttpResponse(errorJSON)
  387. response.delete_cookie('username')
  388. return response
  389. else:
  390. response = HttpResponse(tM.errorCodeInfo(error_code))
  391. return response
  392. else:
  393. return ResponseFormal(800)
  394. class ChangePwdView(TemplateView):
  395. @method_decorator(csrf_exempt)
  396. def dispatch(self, *args, **kwargs):
  397. return super(ChangePwdView, self).dispatch(*args, **kwargs)
  398. def post(self, request, *args, **kwargs):
  399. request.encoding = 'utf-8'
  400. token = request.POST.get('token', None)
  401. oldPwd = request.POST.get('oldPwd', None)
  402. newPwd = request.POST.get('newPwd', None)
  403. return self.ValidationError(token, oldPwd, newPwd)
  404. def get(self, request, *args, **kwargs):
  405. request.encoding = 'gb2312'
  406. token = request.GET.get('token', None)
  407. oldPwd = request.GET.get('oldPwd', None)
  408. newPwd = request.GET.get('newPwd', None)
  409. return self.ValidationError(token, oldPwd, newPwd)
  410. def ValidationError(self, token, oldPwd, newPwd):
  411. if token != None and oldPwd != None and newPwd != None:
  412. tM = JSONTokenManager()
  413. error_code = tM.verify_AToken(token)
  414. if error_code == 0:
  415. userID = tM.accessDict.get('userID', None)
  416. if userID:
  417. response = HttpResponse(self.ChangePwdUpdate(userID, oldPwd, newPwd))
  418. return response
  419. else:
  420. return ResponseJSON(310)
  421. else:
  422. response = HttpResponse(tM.errorCodeInfo(error_code))
  423. return response
  424. else:
  425. return ResponseJSON(800)
  426. def ChangePwdUpdate(self, userID, oldPwd, newPwd):
  427. userIDValid = Device_User.objects.filter(userID = userID)
  428. if userIDValid:
  429. PwdValid = check_password(oldPwd, userIDValid[0].password)
  430. if PwdValid:
  431. upCount = userIDValid.update(password = make_password(newPwd))
  432. if upCount == 1:
  433. return ResponseFormal(0)
  434. else:
  435. return ResponseFormal(112)
  436. else:
  437. return ResponseFormal(111)
  438. else:
  439. return ResponseFormal(113)
  440. class ForgetPwdView(TemplateView):
  441. '''
  442. 忘记密码
  443. '''
  444. @method_decorator(csrf_exempt)
  445. def dispatch(self, *args, **kwargs):
  446. return super(ForgetPwdView, self).dispatch(*args, **kwargs)
  447. def get(self, request, *args, **kwargs):
  448. request.encoding = 'utf-8'
  449. userName = request.GET.get('userName', None)
  450. return self.ValidationError(userName)
  451. def post(self, request):
  452. request.encoding = 'utf-8'
  453. userName = request.POST.get('userName', None)
  454. return self.ValidationError(userName)
  455. def ValidationError(self, userName):
  456. if userName != None:
  457. response = HttpResponse(self.ForgetPwd(userName))
  458. return response
  459. else:
  460. return ResponseJSON(800)
  461. def ForgetPwd(self, userName):
  462. dataValid = DataValid()
  463. if dataValid.mobile_validate(userName):
  464. User = Device_User.objects.filter(username = userName)
  465. if User:
  466. send_status = MiscellService.ses_send_email_handle(data={
  467. 'useremail':User[0].userEmail,
  468. 'username':userName,
  469. 'type':'forget',
  470. })
  471. if send_status == 'has_send':
  472. return ResponseFormal(1004)
  473. if send_status is True:
  474. return ResponseFormal(0)
  475. else:
  476. return ResponseFormal(1002)
  477. else:
  478. return ResponseFormal(102)
  479. elif dataValid.email_validate(userName):
  480. User = Device_User.objects.filter(userEmail = userName)
  481. if User:
  482. send_status = MiscellService.ses_send_email_handle(data={
  483. 'useremail': User[0].userEmail,
  484. 'username': userName,
  485. 'type': 'forget',
  486. })
  487. if send_status is True:
  488. return ResponseFormal(0)
  489. elif send_status == 'has_send':
  490. return ResponseFormal(1004)
  491. else:
  492. return ResponseFormal(1002)
  493. else:
  494. return ResponseFormal(104)
  495. else:
  496. return ResponseFormal(108)
  497. class ResetPwdView(TemplateView):
  498. @method_decorator(csrf_exempt)
  499. def dispatch(self, *args, **kwargs):
  500. return super(ResetPwdView, self).dispatch(*args, **kwargs)
  501. def post(self, request, *args, **kwargs):
  502. request.encoding = 'utf-8'
  503. token = request.POST.get('reset_password_token', None)
  504. reset_pwd_val = request.POST.get('reset_pwd_val', None)
  505. return self.ValidationError(token,reset_pwd_val)
  506. def get(self, request, *args, **kwargs):
  507. request.encoding = 'gb2312'
  508. token = request.GET.get('reset_password_token', None)
  509. reset_pwd_val = request.GET.get('reset_pwd_val', None)
  510. return self.ValidationError(token,reset_pwd_val)
  511. def ValidationError(self, token, reset_pwd_val):
  512. tokenConfirm = TokenLink(SECRET_KEY)
  513. try:
  514. token = tokenConfirm.confirm_validate_token(token=token)
  515. except:
  516. return ResponseJSON(1000)
  517. else:
  518. tokenDict = json.loads(token)
  519. userEmail = tokenDict.get('userEmail', None)
  520. userPwd = tokenDict.get('password', None)
  521. redis_key='reset_pwd_key' + str(userEmail)
  522. redis_val = CommonService.get_redis_data(redis_key)
  523. if redis_val is False and redis_val != reset_pwd_val:
  524. return HttpResponse(status=404)
  525. if userEmail != None and userPwd != None:
  526. result = self.ResetPwd(userEmail,userPwd)
  527. if result['code']:
  528. CommonService.del_redis_data(key=redis_key)
  529. # return HttpResponseRedirect("/response/success")
  530. return HttpResponseRedirect("http://www.nsst.com/web/html/paw_update_success.html?code="+userPwd)
  531. else:
  532. return HttpResponse(result)
  533. else:
  534. return ResponseJSON(1001)
  535. def ResetPwd(self, userEmail, userPwd):
  536. dataVaild = DataValid()
  537. if dataVaild.email_validate(userEmail):
  538. try:
  539. UserValid = Device_User.objects.filter(userEmail = userEmail)
  540. except Exception as e:
  541. return ResponseFormal(500,repr(e))
  542. else:
  543. if UserValid:
  544. upCount = UserValid.update(password = make_password(userPwd))
  545. if upCount:
  546. return {'code':1}
  547. else:
  548. return ResponseFormal(106)
  549. else:
  550. return ResponseFormal(104)
  551. else:
  552. return ResponseFormal(1003)
  553. class showUserMoreView(TemplateView):
  554. @method_decorator(csrf_exempt)
  555. def dispatch(self, *args, **kwargs):
  556. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  557. def post(self, request, *args, **kwargs):
  558. request.encoding = 'utf-8'
  559. token = request.POST.get('token', None)
  560. return self.ValidationError(token)
  561. def get(self, request, *args, **kwargs):
  562. request.encoding = 'gb2312'
  563. token = request.GET.get('token', None)
  564. return self.ValidationError(token)
  565. def ValidationError(self, token):
  566. if token is not None:
  567. tM = JSONTokenManager()
  568. error_code = tM.verify_AToken(token)
  569. if error_code == 0:
  570. userID = tM.accessDict.get('userID', None)
  571. if userID:
  572. response = HttpResponse(self.showUserMore(userID))
  573. return response
  574. else:
  575. return ResponseJSON(310)
  576. else:
  577. response = HttpResponse(tM.errorCodeInfo(error_code))
  578. return response
  579. else:
  580. return ResponseJSON(800)
  581. def showUserMore(self, userID):
  582. try:
  583. User = Device_User.objects.filter(userID = userID)
  584. except Exception as e:
  585. errorInfo = traceback.format_exc()
  586. print('Query Database Error: %s' % errorInfo)
  587. return ResponseFormal(500,repr(e))
  588. else:
  589. if User:
  590. sqlJSON = serializers.serialize('json', User)
  591. sqlList = json.loads(sqlJSON)
  592. sqlDict = dict(zip(["datas"], [sqlList]))
  593. for k, v in enumerate(sqlDict["datas"]):
  594. if len(v['fields']['role']):
  595. roleName=ModelService.getRole(rid=v['fields']['role'][0])
  596. sqlDict["datas"][k]['fields']['rolename']=roleName
  597. return ResponseFormal(0, sqlDict)
  598. else:
  599. return ResponseFormal(113)
  600. class perfectUserInfoView(TemplateView):
  601. # 完善个人信息
  602. @method_decorator(csrf_exempt)
  603. def dispatch(self, *args, **kwargs):
  604. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  605. def post(self, request, *args, **kwargs):
  606. request.encoding = 'utf-8'
  607. userContent = request.POST.get('content', None)
  608. userIcon = request.FILES.get('userIcon', None)
  609. token = request.POST.get('token', None)
  610. return self.ValidationError(token, userContent, userIcon)
  611. def get(self, request, *args, **kwargs):
  612. request.encoding = 'gb2312'
  613. userContent = request.GET.get('content', None)
  614. userIcon = request.FILES.get('userIcon', None)
  615. token = request.GET.get('token', None)
  616. return self.ValidationError(token, userContent, userIcon)
  617. def ValidationError(self, token, userContent, userIcon):
  618. if token != None:
  619. tM = JSONTokenManager()
  620. error_code = tM.verify_AToken(token)
  621. if error_code == 0:
  622. userID = tM.accessDict.get('userID', None)
  623. if userID:
  624. if userIcon != None:
  625. # location = 'static/User/Images/' + userID[-11:] + '/'
  626. location = 'static/User/Images/' + userID + '/'
  627. fss = FileSystemStorage(location = location)
  628. if fss.exists(userIcon.name):
  629. fss.delete(userIcon.name)
  630. filename = fss.save(userIcon.name, userIcon)
  631. userIconUrl = fss.url(filename)
  632. userIconPath = fss.path(filename).replace('\\', '/')
  633. '''
  634. location = 'static/User/Images/' + userID[-11:] + '/'
  635. userIconPath = '/'.join((api_settings.BASE_DIR, location)).replace('\\', '/')
  636. if not os.path.exists(userIconPath):
  637. os.makedirs(userIconPath)
  638. userIconPath += userIcon.name
  639. if os.path.exists(userIconPath):
  640. os.remove(userIconPath)
  641. destination = open(userIconPath, 'wb+')
  642. for chunk in userIcon.chunks():
  643. destination.write(chunk)
  644. destination.close()
  645. print(userIconPath)
  646. '''
  647. else:
  648. userIconPath = None
  649. if userContent != None:
  650. dataValid = json.loads(userContent)
  651. print('userID' and 'password' and 'is_superuser' in dataValid.keys())
  652. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  653. return ResponseJSON(802)
  654. if userIconPath == None and userContent == None:
  655. return ResponseJSON(800)
  656. elif userIconPath == None and userContent != None:
  657. return HttpResponse(self.perfectUserInfoUpdate(userID, userContent=userContent))
  658. elif userIconPath != None and userContent == None:
  659. return HttpResponse(self.perfectUserInfoUpdate(userID, userIconPath=userIconPath))
  660. else:
  661. return HttpResponse(
  662. self.perfectUserInfoUpdate(userID, userIconPath=userIconPath, userContent=userContent))
  663. else:
  664. return ResponseJSON(310)
  665. else:
  666. return HttpResponse(tM.errorCodeInfo(error_code))
  667. else:
  668. return ResponseJSON(800)
  669. def perfectUserInfoUpdate(slef, userID, *args,
  670. **kwargs):
  671. """
  672. :param username:
  673. :param userContent:
  674. :param args:
  675. :param kwargs:
  676. :return:
  677. """
  678. try:
  679. User = Device_User.objects.filter(userID = userID)
  680. except Exception as e:
  681. errorInfo = traceback.format_exc()
  682. print('查询数据库失败: %s ' % errorInfo)
  683. return ResponseFormal(500,repr(e))
  684. else:
  685. if User:
  686. userIconPath = kwargs.get('userIconPath', None)
  687. userContent = kwargs.get('userContent', None)
  688. if userIconPath is not None:
  689. userIconPath = userIconPath[userIconPath.find('static/'):]
  690. userIconUrl = api_settings.SERVER_DOMAIN + '/account/getAvatar/' + userIconPath[7:]
  691. if userContent != None:
  692. try:
  693. UserData = json.loads(userContent)
  694. except Exception as e:
  695. return ResponseFormal(803, repr(e))
  696. try:
  697. if userIconPath is not None and userContent is not None:
  698. User.update(userIconPath=userIconPath, userIconUrl = userIconUrl, **UserData)
  699. elif userIconPath is None and userContent is not None:
  700. User.update(**UserData)
  701. elif userIconPath is not None and userContent is None:
  702. User.update(userIconPath=userIconPath, userIconUrl = userIconUrl)
  703. except Exception as e:
  704. errorInfo = traceback.format_exc()
  705. print('修改设备信息错误: %s ' % errorInfo)
  706. return ResponseFormal(116, repr(e))
  707. else:
  708. sqlJSON = serializers.serialize('json', User)
  709. sqlList = json.loads(sqlJSON)
  710. print(sqlList, sqlJSON)
  711. sqlDict = dict(zip(["datas"], [sqlList]))
  712. return ResponseFormal(0, sqlDict)
  713. else:
  714. return ResponseFormal(113)
  715. class getAvatarView(TemplateView):
  716. @method_decorator(csrf_exempt)
  717. def dispatch(self, *args, **kwargs):
  718. return super(getAvatarView, self).dispatch(*args, **kwargs)
  719. def post(self, request, *args, **kwargs):
  720. request.encoding = 'utf-8'
  721. filePath = kwargs.get('filePath', '')
  722. filePath.encode(encoding='utf-8', errors='strict')
  723. return self.getAvatar(filePath)
  724. def get(self, request, *args, **kwargs):
  725. request.encoding = 'gb2312'
  726. filePath = kwargs.get('filePath', '')
  727. filePath.encode(encoding='gb2312', errors='strict')
  728. return self.getAvatar(filePath)
  729. def getAvatar(self, filePath):
  730. if filePath == '' or filePath == None:
  731. return ResponseJSON(800)
  732. fullPath = os.path.join(api_settings.BASE_DIR, "static", filePath).replace('\\', '/')
  733. if os.path.isfile(fullPath):
  734. try:
  735. Imagedata = open(fullPath, 'rb').read()
  736. response = HttpResponse(Imagedata, content_type="image/jpeg")
  737. return response
  738. except Exception as e:
  739. return ResponseJSON(906,repr(e))
  740. else:
  741. return ResponseJSON(907)
  742. def delUser(delUserID, userID):
  743. try:
  744. userValid = Device_User.objects.filter(userID = userID)
  745. except Exception as e:
  746. errorInfo = traceback.format_exc()
  747. print('Query Database Error: %s' % errorInfo)
  748. return ResponseFormal(500,repr(e))
  749. else:
  750. if userValid:
  751. own_perm = ModelService.check_permission(userID=userID,permID=10)
  752. if userValid[0].is_superuser == 100 or own_perm is True:
  753. try:
  754. delUser = Device_User.objects.filter(userID=delUserID)
  755. except Exception as e:
  756. errorInfo = traceback.format_exc()
  757. print('Query database error: %s' % errorInfo)
  758. return ResponseFormal(500,repr(e))
  759. else:
  760. if delUser:
  761. try:
  762. delUser.delete()
  763. except Exception as e:
  764. errorInfo = traceback.format_exc()
  765. print('Query database error: %s' % errorInfo)
  766. return ResponseFormal(114,repr(e))
  767. else:
  768. return ResponseFormal(0)
  769. else:
  770. return ResponseFormal(115)
  771. else:
  772. return ResponseFormal(601)
  773. else:
  774. return ResponseFormal(113)
  775. @csrf_exempt
  776. def delUserInterface(request, *callback_args,
  777. **callback_kwargs):
  778. if request.method == 'POST':
  779. delUserID = request.POST.get('delUserID', None)
  780. token = request.POST.get('token', None)
  781. elif request.method == 'GET':
  782. delUserID = request.GET.get('delUserID', None)
  783. token = request.GET.get('token', None)
  784. if token is not None and delUserID is not None:
  785. tM = JSONTokenManager()
  786. error_code = tM.verify_AToken(token)
  787. if error_code == 0:
  788. userID = tM.accessDict.get('userID', None)
  789. if userID:
  790. response = HttpResponse(delUser(delUserID, userID))
  791. return response
  792. else:
  793. return ResponseJSON(310)
  794. else:
  795. response = HttpResponse(tM.errorCodeInfo(error_code))
  796. return response
  797. else:
  798. return ResponseJSON(800)
  799. def showAllUserPC(userID,line,page):
  800. try:
  801. userValid = Device_User.objects.filter(userID = userID).order_by('-data_joined')
  802. except Exception as e:
  803. errorInfo = traceback.format_exc()
  804. print('Query Database Error:%s' % errorInfo)
  805. return ResponseFormal(500,repr(e))
  806. else:
  807. if userValid:
  808. # 管理员查询
  809. own_permission = ModelService.check_permission(userID=userID,permID=30)
  810. if own_permission is True:
  811. device_user_queryset = Device_User.objects.all()
  812. device_user_count = device_user_queryset.count()
  813. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  814. sqlDict = CommonService.query_set_to_dict(device_user_res)
  815. for k, v in enumerate(sqlDict["datas"]):
  816. if len(v['fields']['role']) > 0:
  817. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  818. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  819. for val in device_user_res:
  820. if v['pk'] == val.userID:
  821. if sqlDict["datas"][k]['fields']['online'] is True:
  822. dl_time = val.last_login + datetime.timedelta(minutes=30)
  823. now_time = timezone.localtime(timezone.now())
  824. if now_time > dl_time:
  825. sqlDict["datas"][k]['fields']['online'] = False
  826. sqlDict['count'] = device_user_count
  827. return ResponseFormal(0,sqlDict)
  828. else:
  829. return ResponseFormal(600)
  830. else:
  831. return ResponseFormal(113)
  832. def showAllUser(userID):
  833. try:
  834. userValid = Device_User.objects.filter(userID = userID).order_by('-data_joined')
  835. except Exception as e:
  836. errorInfo = traceback.format_exc()
  837. print('Query Database Error:%s' % errorInfo)
  838. return ResponseFormal(500, repr(e))
  839. else:
  840. if userValid:
  841. own_permission = ModelService.check_permission(userID=userID,permID=30)
  842. if own_permission is True:
  843. sqlJSON = serializers.serialize('json', Device_User.objects.all().order_by('-data_joined'))
  844. sqlList = json.loads(sqlJSON)
  845. print(sqlList, sqlJSON)
  846. sqlDict = dict(zip(["datas"], [sqlList]))
  847. return ResponseFormal(0, sqlDict)
  848. else:
  849. return ResponseFormal(600)
  850. else:
  851. return ResponseFormal(113)
  852. @csrf_exempt
  853. def showAllUserInterface(request, *callback_args,
  854. **callback_kwargs):
  855. if request.method == 'POST':
  856. token = request.POST.get('token', None)
  857. type = request.POST.get('type', None)
  858. elif request.method == 'GET':
  859. token = request.GET.get('token', None)
  860. type = request.GET.get('type', None)
  861. if token != None:
  862. tM = JSONTokenManager()
  863. error_code = tM.verify_AToken(token)
  864. if error_code == 0:
  865. userID = tM.accessDict.get('userID', None)
  866. if userID:
  867. if type == 'PC':
  868. line = int(request.POST.get('line', None))
  869. page = int(request.POST.get('page', None))
  870. response = HttpResponse(showAllUserPC(userID, line, page))
  871. else:
  872. response = HttpResponse(showAllUser(userID))
  873. return response
  874. else:
  875. return ResponseJSON(310)
  876. else:
  877. response = HttpResponse(tM.errorCodeInfo(error_code))
  878. return response
  879. else:
  880. return ResponseJSON(800)
  881. class setUserValidView(View):
  882. @method_decorator(csrf_exempt)
  883. def dispatch(self, *args, **kwargs):
  884. return super(setUserValidView, self).dispatch(*args, **kwargs)
  885. def post(self, request, *args, **kwargs):
  886. request.encoding = 'utf-8'
  887. token = request.POST.get('token', None)
  888. eUserID = request.POST.get('userID', None)
  889. isValid = request.POST.get('isValid', None)
  890. rid = request.POST.get('rid', None)
  891. return self.setUserValid(token, eUserID, isValid, rid)
  892. def get(self, request, *args, **kwargs):
  893. request.encoding = 'gb2312'
  894. token = request.GET.get('token', None)
  895. eUserID = request.GET.get('userID', None)
  896. isValid = request.GET.get('isValid', None)
  897. rid = request.GET.get('rid',None)
  898. return self.setUserValid(token, eUserID, isValid, rid)
  899. def setUserValid(self, token, eUserID, isValid, rid, *args, **kwargs):
  900. if token != None and eUserID != None and isValid != None:
  901. tM = JSONTokenManager()
  902. error_code = tM.verify_AToken(token=token)
  903. if error_code == 0:
  904. superID = tM.accessDict.get('userID', None)
  905. if superID != None and superID != eUserID:
  906. if rid == None:
  907. return HttpResponse(self.UserValidUpdate(superID, eUserID, isValid))
  908. else:
  909. return HttpResponse(self.UserValidUpdatePC(superID, eUserID, isValid, rid))
  910. else:
  911. return ResponseJSON(150)
  912. else:
  913. response = HttpResponse(tM.errorCodeInfo(error_code))
  914. return response
  915. else:
  916. return ResponseJSON(800)
  917. def UserValidUpdatePC(self, superID, eUserID, isValid, rid):
  918. try:
  919. super = Device_User.objects.filter(userID=superID)
  920. eUser = Device_User.objects.filter(userID=eUserID)
  921. except Exception as e:
  922. errorInfo = traceback.format_exc()
  923. print('查询数据库错误: %s' % errorInfo)
  924. return ResponseFormal(500,repr(e))
  925. else:
  926. if not super:
  927. return ResponseFormal(615)
  928. if not eUser:
  929. return ResponseFormal(616)
  930. own_permission = ModelService.check_permission(userID=superID,permID=50)
  931. if own_permission is True:
  932. try:
  933. eUser.update(user_isValid = isValid)
  934. device_user_query_set = Device_User.objects.get(userID=eUserID)
  935. if device_user_query_set.role.all():
  936. device_user_query_set.role.set([rid])
  937. else:
  938. role_user_query_set = Role.objects.get(rid=rid)
  939. device_user_query_set.role.add(role_user_query_set)
  940. except Exception as e:
  941. errorInfo = traceback.format_exc()
  942. print('更新数据库错误:%s'%errorInfo)
  943. return ResponseFormal(501,repr(e))
  944. else:
  945. return ResponseFormal(0)
  946. else:
  947. return ResponseFormal(602)
  948. def UserValidUpdate(self, superID, eUserID, isValid):
  949. try:
  950. super = Device_User.objects.filter(userID = superID)
  951. eUser = Device_User.objects.filter(userID = eUserID)
  952. except Exception as e:
  953. errorInfo = traceback.format_exc()
  954. print('查询数据库错误: %s' % errorInfo)
  955. return ResponseFormal(500,repr(e))
  956. if not super:
  957. return ResponseFormal(113)
  958. if not eUser:
  959. return ResponseFormal(113)
  960. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  961. return ResponseFormal(602)
  962. try:
  963. updateCount = eUser.update(user_isValid = isValid)
  964. except Exception as e:
  965. errorInfo = traceback.format_exc()
  966. print('更新数据库错误: %s' % errorInfo)
  967. return ResponseFormal(501,repr(e))
  968. return ResponseFormal(0)
  969. @csrf_exempt
  970. def success(request):
  971. return ResponseJSON(0)
  972. class refreshTokenView(View):
  973. @method_decorator(csrf_exempt)
  974. def dispatch(self, *args, **kwargs):
  975. return super(refreshTokenView, self).dispatch(*args, **kwargs)
  976. def post(self, request, *args, **kwargs):
  977. request.encoding = 'utf-8'
  978. request_dict = request.POST
  979. return self.validation(request_dict=request_dict)
  980. @csrf_exempt
  981. def get(self, request, *args, **kwargs):
  982. request.encoding = 'utf-8'
  983. request_dict = request.GET
  984. return self.validation(request_dict=request_dict)
  985. def validation(self, request_dict, *args, **kwargs):
  986. refresh_token = request_dict.get('refresh_token', None)
  987. if refresh_token != None:
  988. tM = JSONTokenManager()
  989. result = tM.refresh_AToken(refresh_token)
  990. response = HttpResponse(result)
  991. return response
  992. else:
  993. return ResponseJSON(800)