UserManger.py 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. import logging
  4. import os
  5. import traceback
  6. import boto3
  7. import botocore
  8. from botocore import client
  9. import simplejson as json
  10. from django.core.files.storage import FileSystemStorage
  11. from django.http import HttpResponse
  12. from django.utils.decorators import method_decorator
  13. from django.views.decorators.csrf import csrf_exempt
  14. from django.views.generic import TemplateView, View
  15. from Ansjer.config import BASE_DIR, SERVER_TYPE, ACCESS_KEY_ID, SECRET_ACCESS_KEY, REGION_NAME, AVATAR_BUCKET
  16. from Ansjer.config import SERVER_DOMAIN
  17. from Model.models import Role, Device_User, UserOauth2Model, UserExModel
  18. from Object.RedisObject import RedisObject
  19. from Object.ResponseObject import ResponseObject
  20. from Object.TokenObject import TokenObject
  21. from Service.CommonService import CommonService
  22. from Service.ModelService import ModelService
  23. # http://192.168.136.40:8077/account/showUserMore?token=test
  24. class showUserMoreView(TemplateView):
  25. @method_decorator(csrf_exempt)
  26. def dispatch(self, *args, **kwargs):
  27. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  28. def post(self, request, *args, **kwargs):
  29. request.encoding = 'utf-8'
  30. token = request.POST.get('token', None)
  31. return self.ValidationError(token)
  32. def get(self, request, *args, **kwargs):
  33. request.encoding = 'gb2312'
  34. token = request.GET.get('token', None)
  35. return self.ValidationError(token)
  36. def ValidationError(self, token):
  37. response = ResponseObject()
  38. tko = TokenObject(token)
  39. response.lang = tko.lang
  40. if tko.code != 0:
  41. return response.json(tko.code)
  42. userID = tko.userID
  43. if not userID:
  44. return response.json(104)
  45. return self.showUserMore(userID, response)
  46. def showUserMore(self, userID, response):
  47. User = Device_User.objects.filter(userID=userID)
  48. if not User.exists():
  49. return response.json(104)
  50. sqlDict = CommonService.qs_to_dict(User)
  51. for k, v in enumerate(sqlDict["datas"]):
  52. sqlDict['datas'][k]['fields'].pop('password')
  53. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  54. if userIconPath:
  55. if userIconPath.find('static/') != -1:
  56. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  57. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  58. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  59. if len(v['fields']['role']):
  60. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  61. sqlDict["datas"][k]['fields']['rolename'] = roleName
  62. # 增加oauth2关联数据
  63. ua_qs = UserOauth2Model.objects.filter(userID_id=userID).values_list('authType',flat=True)
  64. sqlDict["oauth2"] = list(ua_qs)
  65. return response.json(0, sqlDict)
  66. # http://192.168.136.40:8077/account/perfectUserInfo?token=test&content={"NickName":"333"}
  67. class perfectUserInfoView(TemplateView):
  68. # 完善个人信息
  69. @method_decorator(csrf_exempt)
  70. def dispatch(self, *args, **kwargs):
  71. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  72. def post(self, request, *args, **kwargs):
  73. request.encoding = 'utf-8'
  74. userContent = request.POST.get('content', None)
  75. userIcon = request.FILES.get('userIcon', None)
  76. token = request.POST.get('token', None)
  77. return self.ValidationError(token, userContent, userIcon)
  78. def get(self, request, *args, **kwargs):
  79. request.encoding = 'gb2312'
  80. userContent = request.GET.get('content', None)
  81. userIcon = request.FILES.get('userIcon', None)
  82. token = request.GET.get('token', None)
  83. return self.ValidationError(token, userContent, userIcon)
  84. def ValidationError(self, token, userContent, userIcon):
  85. response = ResponseObject()
  86. tko = TokenObject(token)
  87. response.lang = tko.lang
  88. if tko.code != 0:
  89. return response.json(tko.code)
  90. userID = tko.userID
  91. if not userID:
  92. return response.json(309)
  93. userIconPath = ''
  94. if userIcon:
  95. # 上传头像到aws s3
  96. aws_s3_client = boto3.client(
  97. 's3',
  98. region_name=REGION_NAME,
  99. aws_access_key_id=ACCESS_KEY_ID,
  100. aws_secret_access_key=SECRET_ACCESS_KEY,
  101. config=botocore.client.Config(signature_version='s3v4'),
  102. )
  103. Key = userID + '/' + userIcon.name
  104. aws_s3_client.put_object(Bucket=AVATAR_BUCKET, Key=Key, Body=userIcon)
  105. userIconPath = userID + '/' + userIcon.name
  106. if userContent:
  107. dataValid = json.loads(userContent)
  108. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  109. return response.json(444)
  110. if not userIconPath and not userContent:
  111. return response.json(444)
  112. elif not userIconPath and userContent:
  113. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  114. elif userIconPath and not userContent:
  115. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  116. else:
  117. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath, userContent=userContent)
  118. def perfectUserInfoUpdate(slef, userID, response, **kwargs):
  119. """
  120. :param username:
  121. :param userContent:
  122. :param args:
  123. :param kwargs:
  124. :return:
  125. """
  126. User = Device_User.objects.filter(userID=userID)
  127. if not User.exists():
  128. return response.json(104)
  129. userIconPath = kwargs.get('userIconPath', None)
  130. userContent = kwargs.get('userContent', None)
  131. userIconUrl = ""
  132. if userIconPath:
  133. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  134. if userContent:
  135. try:
  136. UserData = json.loads(userContent)
  137. except Exception as e:
  138. return response.json(444, repr(e))
  139. try:
  140. if userIconPath and userContent:
  141. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  142. elif not userIconPath and userContent:
  143. User.update(**UserData)
  144. elif userIconPath and not userContent:
  145. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  146. except Exception as e:
  147. return response.json(117, repr(e))
  148. else:
  149. res = CommonService.qs_to_dict(User)
  150. for k, v in enumerate(res["datas"]):
  151. res['datas'][k]['fields'].pop('password')
  152. userIconPath = res['datas'][k]['fields']['userIconPath']
  153. if userIconPath and userIconUrl != '':
  154. res['datas'][k]['fields']['userIconUrl'] = userIconUrl
  155. return response.json(0, res)
  156. class getAvatarView(TemplateView):
  157. @method_decorator(csrf_exempt)
  158. def dispatch(self, *args, **kwargs):
  159. return super(getAvatarView, self).dispatch(*args, **kwargs)
  160. def post(self, request, *args, **kwargs):
  161. request.encoding = 'utf-8'
  162. filePath = kwargs.get('filePath', '')
  163. filePath.encode(encoding='utf-8', errors='strict')
  164. return self.getAvatar(filePath)
  165. def get(self, request, *args, **kwargs):
  166. request.encoding = 'utf-8'
  167. filePath = kwargs.get('filePath', '')
  168. filePath.encode(encoding='utf-8', errors='strict')
  169. return self.getAvatar(filePath)
  170. def getAvatar(self, filePath):
  171. response = ResponseObject()
  172. if not filePath:
  173. return response.json(800)
  174. if filePath == 'User/default.png' or filePath == 'User/defaultUser.png':
  175. # 使用默认头像
  176. try:
  177. aws_s3_client = boto3.client(
  178. 's3',
  179. region_name=REGION_NAME,
  180. aws_access_key_id=ACCESS_KEY_ID,
  181. aws_secret_access_key=SECRET_ACCESS_KEY,
  182. config=botocore.client.Config(signature_version='s3v4'),
  183. )
  184. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key='default/default.png')
  185. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  186. except Exception as e:
  187. print(e)
  188. return response.json(500, repr(e))
  189. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  190. if os.path.isfile(fullPath):
  191. try:
  192. imageData = open(fullPath, 'rb').read()
  193. return HttpResponse(imageData, content_type="image/jpeg")
  194. except Exception as e:
  195. return response.json(906, repr(e))
  196. else:
  197. try:
  198. aws_s3_client = boto3.client(
  199. 's3',
  200. region_name=REGION_NAME,
  201. aws_access_key_id=ACCESS_KEY_ID,
  202. aws_secret_access_key=SECRET_ACCESS_KEY,
  203. config=botocore.client.Config(signature_version='s3v4'),
  204. )
  205. get_object_response = aws_s3_client.get_object(Bucket=AVATAR_BUCKET, Key=filePath)
  206. return HttpResponse(get_object_response['Body'], content_type="image/jpeg")
  207. except Exception as e:
  208. return response.json(906, repr(e))
  209. @csrf_exempt
  210. def delUserInterface(request):
  211. response = ResponseObject()
  212. if request.method == 'POST':
  213. request_dict = request.POST
  214. elif request.method == 'GET':
  215. request_dict = request.GET
  216. else:
  217. return response.json(404)
  218. token = request_dict.get('token', None)
  219. delUserID = request_dict.get('delUserID', None)
  220. if not token or not delUserID:
  221. return response.json(444, 'token,delUserID')
  222. tko = TokenObject(token)
  223. response.lang = tko.lang
  224. if tko.code != 0:
  225. return response.json(tko.code)
  226. userID = tko.userID
  227. if not userID:
  228. return response.json(309)
  229. userValid = Device_User.objects.filter(userID=userID)
  230. if not userValid.exists():
  231. return response.json(104)
  232. own_perm = ModelService.check_perm(userID=userID, permID=10)
  233. if own_perm is not True:
  234. return response.json(404)
  235. delUser = Device_User.objects.filter(userID=delUserID)
  236. if not delUser.exists():
  237. return response.json(104)
  238. delUser.delete()
  239. return response.json(0)
  240. @csrf_exempt
  241. def showAllUserInterface(request):
  242. response = ResponseObject()
  243. if request.method == 'POST':
  244. request_dict = request.POST
  245. elif request.method == 'GET':
  246. request_dict = request.GET
  247. else:
  248. return response.json(404)
  249. token = request_dict.get('token', None)
  250. type = request_dict.get('type', None)
  251. tko = TokenObject(token)
  252. response.lang = tko.lang
  253. if tko.code != 0:
  254. return response.json(tko.code)
  255. userID = tko.userID
  256. if not userID:
  257. return response.json(104)
  258. if type == 'PC':
  259. line = int(request.POST.get('line', None))
  260. page = int(request.POST.get('page', None))
  261. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  262. if not userValid:
  263. return response.json(104)
  264. # 管理员查询
  265. own_permission = ModelService.check_perm(userID=userID, permID=30)
  266. if own_permission is not True:
  267. return response.json(404)
  268. device_user_queryset = Device_User.objects.all()
  269. device_user_count = device_user_queryset.count()
  270. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  271. sqlDict = CommonService.qs_to_dict(device_user_res)
  272. redisObj = RedisObject(db=3)
  273. for k, v in enumerate(sqlDict["datas"]):
  274. if len(v['fields']['role']) > 0:
  275. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  276. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  277. if redisObj.get_data(key=v['pk']):
  278. sqlDict["datas"][k]['fields']['online'] = True
  279. else:
  280. sqlDict["datas"][k]['fields']['online'] = False
  281. ue = UserExModel.objects.filter(userID=sqlDict["datas"][k]['pk'])
  282. if ue.exists():
  283. sqlDict["datas"][k]['fields']['appBundleId'] = ue[0].appBundleId
  284. else:
  285. sqlDict["datas"][k]['fields']['appBundleId'] = ''
  286. sqlDict['count'] = device_user_count
  287. return response.json(0, sqlDict)
  288. else:
  289. own_permission = ModelService.check_perm(userID=userID, permID=30)
  290. if own_permission is not True:
  291. return response.json(404)
  292. qs = Device_User.objects.all().order_by('-data_joined')
  293. res = CommonService.qs_to_dict(qs)
  294. return response.json(0, res)
  295. class setUserValidView(View):
  296. @method_decorator(csrf_exempt)
  297. def dispatch(self, *args, **kwargs):
  298. return super(setUserValidView, self).dispatch(*args, **kwargs)
  299. def post(self, request, *args, **kwargs):
  300. request.encoding = 'utf-8'
  301. request_dict = request.POST
  302. return self.setUserValid(request_dict)
  303. def get(self, request, *args, **kwargs):
  304. request.encoding = 'utf-8'
  305. request_dict = request.GET
  306. return self.setUserValid(request_dict)
  307. def setUserValid(self, request_dict):
  308. token = request_dict.get('token', None)
  309. eUserID = request_dict.get('userID', None)
  310. isValid = request_dict.get('isValid', None)
  311. rid = request_dict.get('rid', None)
  312. response = ResponseObject()
  313. tko = TokenObject(token)
  314. response.lang = tko.lang
  315. if tko.code != 0:
  316. return response.json(tko.code)
  317. superID = tko.userID
  318. own_perm = ModelService.check_perm(userID=superID, permID=50)
  319. if own_perm is True or superID != None and superID != eUserID:
  320. if rid == None:
  321. return self.UserValidUpdate(superID, eUserID, isValid, response)
  322. else:
  323. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  324. else:
  325. return response.json(444, 'superID or userID')
  326. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  327. super = Device_User.objects.filter(userID=superID)
  328. eUser = Device_User.objects.filter(userID=eUserID)
  329. if not super.exists() or not eUser.exists():
  330. return response.json(104)
  331. own_permission = ModelService.check_perm(userID=superID, permID=50)
  332. if own_permission is True:
  333. try:
  334. eUser.update(user_isValid=isValid)
  335. device_user_query_set = Device_User.objects.get(userID=eUserID)
  336. if device_user_query_set.role.all():
  337. device_user_query_set.role.set([rid])
  338. else:
  339. role_user_query_set = Role.objects.get(rid=rid)
  340. device_user_query_set.role.add(role_user_query_set)
  341. except Exception as e:
  342. errorInfo = traceback.format_exc()
  343. print('更新数据库错误:%s' % errorInfo)
  344. return response.json(177, repr(e))
  345. else:
  346. return response.json(0)
  347. else:
  348. return response.json(404)
  349. def UserValidUpdate(self, superID, eUserID, isValid, response):
  350. super = Device_User.objects.filter(userID=superID)
  351. eUser = Device_User.objects.filter(userID=eUserID)
  352. if not super.exists():
  353. return response.json(104)
  354. if not eUser.exists():
  355. return response.json(104)
  356. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  357. return response.json(404)
  358. try:
  359. eUser.update(user_isValid=isValid)
  360. except Exception as e:
  361. errorInfo = traceback.format_exc()
  362. print('更新数据库错误: %s' % errorInfo)
  363. return response.json(177, repr(e))
  364. return response.json(0)
  365. @csrf_exempt
  366. def success(request):
  367. return HttpResponse(status=200)