UserManger.py 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. import os
  4. import traceback
  5. import simplejson as json
  6. from django.core.files.storage import FileSystemStorage
  7. from django.http import HttpResponse
  8. from django.utils.decorators import method_decorator
  9. from django.views.decorators.csrf import csrf_exempt
  10. from django.views.generic import TemplateView, View
  11. from Ansjer.config import BASE_DIR
  12. from Ansjer.config import SERVER_DOMAIN
  13. from Model.models import Role, Device_User, UserOauth2Model
  14. from Object.RedisObject import RedisObject
  15. from Object.ResponseObject import ResponseObject
  16. from Object.TokenObject import TokenObject
  17. from Service.CommonService import CommonService
  18. from Service.ModelService import ModelService
  19. # http://192.168.136.40:8077/account/showUserMore?token=test
  20. class showUserMoreView(TemplateView):
  21. @method_decorator(csrf_exempt)
  22. def dispatch(self, *args, **kwargs):
  23. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  24. def post(self, request, *args, **kwargs):
  25. request.encoding = 'utf-8'
  26. token = request.POST.get('token', None)
  27. return self.ValidationError(token)
  28. def get(self, request, *args, **kwargs):
  29. request.encoding = 'gb2312'
  30. token = request.GET.get('token', None)
  31. return self.ValidationError(token)
  32. def ValidationError(self, token):
  33. response = ResponseObject()
  34. tko = TokenObject(token)
  35. response.lang = tko.lang
  36. if tko.code != 0:
  37. return response.json(tko.code)
  38. userID = tko.userID
  39. if not userID:
  40. return response.json(104)
  41. return self.showUserMore(userID, response)
  42. def showUserMore(self, userID, response):
  43. User = Device_User.objects.filter(userID=userID)
  44. if not User.exists():
  45. return response.json(104)
  46. sqlDict = CommonService.qs_to_dict(User)
  47. for k, v in enumerate(sqlDict["datas"]):
  48. sqlDict['datas'][k]['fields'].pop('password')
  49. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  50. if userIconPath:
  51. if userIconPath.find('static/') != -1:
  52. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  53. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  54. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  55. if len(v['fields']['role']):
  56. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  57. sqlDict["datas"][k]['fields']['rolename'] = roleName
  58. # 增加oauth2关联数据
  59. ua_qs = UserOauth2Model.objects.filter(userID_id=userID).values_list('authType',flat=True)
  60. sqlDict["oauth2"] = list(ua_qs)
  61. return response.json(0, sqlDict)
  62. # http://192.168.136.40:8077/account/perfectUserInfo?token=test&content={"NickName":"333"}
  63. class perfectUserInfoView(TemplateView):
  64. # 完善个人信息
  65. @method_decorator(csrf_exempt)
  66. def dispatch(self, *args, **kwargs):
  67. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  68. def post(self, request, *args, **kwargs):
  69. request.encoding = 'utf-8'
  70. userContent = request.POST.get('content', None)
  71. userIcon = request.FILES.get('userIcon', None)
  72. token = request.POST.get('token', None)
  73. return self.ValidationError(token, userContent, userIcon)
  74. def get(self, request, *args, **kwargs):
  75. request.encoding = 'gb2312'
  76. userContent = request.GET.get('content', None)
  77. userIcon = request.FILES.get('userIcon', None)
  78. token = request.GET.get('token', None)
  79. return self.ValidationError(token, userContent, userIcon)
  80. def ValidationError(self, token, userContent, userIcon):
  81. response = ResponseObject()
  82. tko = TokenObject(token)
  83. response.lang = tko.lang
  84. if tko.code != 0:
  85. return response.json(tko.code)
  86. userID = tko.userID
  87. if not userID:
  88. return response.json(309)
  89. if userIcon != None:
  90. location = 'static/User/Images/' + userID + '/'
  91. fss = FileSystemStorage(location=location)
  92. if fss.exists(userIcon.name):
  93. fss.delete(userIcon.name)
  94. filename = fss.save(userIcon.name, userIcon)
  95. # userIconUrl = fss.url(filename)
  96. userIconPath = fss.path(filename).replace('\\', '/')
  97. else:
  98. userIconPath = None
  99. if userContent != None:
  100. dataValid = json.loads(userContent)
  101. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  102. return response.json(444)
  103. if userIconPath == None and userContent == None:
  104. return response.json(444)
  105. elif userIconPath == None and userContent != None:
  106. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  107. elif userIconPath != None and userContent == None:
  108. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  109. else:
  110. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath,
  111. userContent=userContent)
  112. def perfectUserInfoUpdate(slef, userID, response, *args,
  113. **kwargs):
  114. """
  115. :param username:
  116. :param userContent:
  117. :param args:
  118. :param kwargs:
  119. :return:
  120. """
  121. User = Device_User.objects.filter(userID=userID)
  122. if not User.exists():
  123. return response.json(104)
  124. userIconPath = kwargs.get('userIconPath', None)
  125. userContent = kwargs.get('userContent', None)
  126. if userIconPath is not None:
  127. userIconPath = userIconPath[userIconPath.find('static/'):]
  128. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath[7:]
  129. if userContent != None:
  130. try:
  131. UserData = json.loads(userContent)
  132. except Exception as e:
  133. return response.json(444, repr(e))
  134. try:
  135. if userIconPath is not None and userContent is not None:
  136. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  137. elif userIconPath is None and userContent is not None:
  138. User.update(**UserData)
  139. elif userIconPath is not None and userContent is None:
  140. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  141. except Exception as e:
  142. errorInfo = traceback.format_exc()
  143. print('修改设备信息错误: %s ' % errorInfo)
  144. return response.json(117, repr(e))
  145. else:
  146. res = CommonService.qs_to_dict(User)
  147. for k, v in enumerate(res["datas"]):
  148. res['datas'][k]['fields'].pop('password')
  149. userIconPath = res['datas'][k]['fields']['userIconPath']
  150. if userIconPath:
  151. if userIconPath.find('static/') != -1:
  152. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  153. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  154. res['datas'][k]['fields']['userIconUrl'] = userIconUrl
  155. return response.json(0, res)
  156. class getAvatarView(TemplateView):
  157. @method_decorator(csrf_exempt)
  158. def dispatch(self, *args, **kwargs):
  159. return super(getAvatarView, self).dispatch(*args, **kwargs)
  160. def post(self, request, *args, **kwargs):
  161. request.encoding = 'utf-8'
  162. filePath = kwargs.get('filePath', '')
  163. filePath.encode(encoding='utf-8', errors='strict')
  164. return self.getAvatar(filePath)
  165. def get(self, request, *args, **kwargs):
  166. request.encoding = 'gb2312'
  167. filePath = kwargs.get('filePath', '')
  168. filePath.encode(encoding='gb2312', errors='strict')
  169. return self.getAvatar(filePath)
  170. def getAvatar(self, filePath):
  171. response = ResponseObject()
  172. if filePath == '' or filePath == None:
  173. return response.json(800)
  174. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  175. defaultPath = os.path.join(BASE_DIR, "static", "User/default.png").replace('\\', '/')
  176. if os.path.isfile(fullPath):
  177. try:
  178. Imagedata = open(fullPath, 'rb').read()
  179. except Exception as e:
  180. return response.json(906, repr(e))
  181. else:
  182. return HttpResponse(Imagedata, content_type="image/jpeg")
  183. else:
  184. print('----------------')
  185. print(defaultPath)
  186. print('----------------')
  187. try:
  188. Imagedata = open(defaultPath, 'rb').read()
  189. except Exception as e:
  190. return response.json(906, repr(e))
  191. else:
  192. return HttpResponse(Imagedata, content_type="image/jpeg")
  193. # return response.json(907)
  194. @csrf_exempt
  195. def delUserInterface(request):
  196. response = ResponseObject()
  197. if request.method == 'POST':
  198. request_dict = request.POST
  199. elif request.method == 'GET':
  200. request_dict = request.GET
  201. else:
  202. return response.json(404)
  203. token = request_dict.get('token', None)
  204. delUserID = request_dict.get('delUserID', None)
  205. if not token or not delUserID:
  206. return response.json(444, 'token,delUserID')
  207. tko = TokenObject(token)
  208. response.lang = tko.lang
  209. if tko.code != 0:
  210. return response.json(tko.code)
  211. userID = tko.userID
  212. if not userID:
  213. return response.json(309)
  214. userValid = Device_User.objects.filter(userID=userID)
  215. if not userValid.exists():
  216. return response.json(104)
  217. own_perm = ModelService.check_perm(userID=userID, permID=10)
  218. if own_perm is not True:
  219. return response.json(404)
  220. delUser = Device_User.objects.filter(userID=delUserID)
  221. if not delUser.exists():
  222. return response.json(104)
  223. delUser.delete()
  224. return response.json(0)
  225. @csrf_exempt
  226. def showAllUserInterface(request):
  227. response = ResponseObject()
  228. if request.method == 'POST':
  229. request_dict = request.POST
  230. elif request.method == 'GET':
  231. request_dict = request.GET
  232. else:
  233. return response.json(404)
  234. token = request_dict.get('token', None)
  235. type = request_dict.get('type', None)
  236. tko = TokenObject(token)
  237. response.lang = tko.lang
  238. if tko.code != 0:
  239. return response.json(tko.code)
  240. userID = tko.userID
  241. if not userID:
  242. return response.json(104)
  243. if type == 'PC':
  244. line = int(request.POST.get('line', None))
  245. page = int(request.POST.get('page', None))
  246. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  247. if not userValid:
  248. return response.json(104)
  249. # 管理员查询
  250. own_permission = ModelService.check_perm(userID=userID, permID=30)
  251. if own_permission is not True:
  252. return response.json(404)
  253. device_user_queryset = Device_User.objects.all()
  254. device_user_count = device_user_queryset.count()
  255. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  256. sqlDict = CommonService.qs_to_dict(device_user_res)
  257. redisObj = RedisObject(db=3)
  258. for k, v in enumerate(sqlDict["datas"]):
  259. if len(v['fields']['role']) > 0:
  260. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  261. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  262. if redisObj.get_data(key=v['pk']):
  263. sqlDict["datas"][k]['fields']['online'] = True
  264. else:
  265. sqlDict["datas"][k]['fields']['online'] = False
  266. sqlDict['count'] = device_user_count
  267. return response.json(0, sqlDict)
  268. else:
  269. own_permission = ModelService.check_perm(userID=userID, permID=30)
  270. if own_permission is not True:
  271. return response.json(404)
  272. qs = Device_User.objects.all().order_by('-data_joined')
  273. res = CommonService.qs_to_dict(qs)
  274. return response.json(0, res)
  275. class setUserValidView(View):
  276. @method_decorator(csrf_exempt)
  277. def dispatch(self, *args, **kwargs):
  278. return super(setUserValidView, self).dispatch(*args, **kwargs)
  279. def post(self, request, *args, **kwargs):
  280. request.encoding = 'utf-8'
  281. request_dict = request.POST
  282. return self.setUserValid(request_dict)
  283. def get(self, request, *args, **kwargs):
  284. request.encoding = 'utf-8'
  285. request_dict = request.GET
  286. return self.setUserValid(request_dict)
  287. def setUserValid(self, request_dict):
  288. token = request_dict.get('token', None)
  289. eUserID = request_dict.get('userID', None)
  290. isValid = request_dict.get('isValid', None)
  291. rid = request_dict.get('rid', None)
  292. response = ResponseObject()
  293. tko = TokenObject(token)
  294. response.lang = tko.lang
  295. if tko.code != 0:
  296. return response.json(tko.code)
  297. superID = tko.userID
  298. own_perm = ModelService.check_perm(userID=superID, permID=50)
  299. if own_perm is True or superID != None and superID != eUserID:
  300. if rid == None:
  301. return self.UserValidUpdate(superID, eUserID, isValid, response)
  302. else:
  303. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  304. else:
  305. return response.json(444, 'superID or userID')
  306. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  307. super = Device_User.objects.filter(userID=superID)
  308. eUser = Device_User.objects.filter(userID=eUserID)
  309. if not super.exists() or not eUser.exists():
  310. return response.json(104)
  311. own_permission = ModelService.check_perm(userID=superID, permID=50)
  312. if own_permission is True:
  313. try:
  314. eUser.update(user_isValid=isValid)
  315. device_user_query_set = Device_User.objects.get(userID=eUserID)
  316. if device_user_query_set.role.all():
  317. device_user_query_set.role.set([rid])
  318. else:
  319. role_user_query_set = Role.objects.get(rid=rid)
  320. device_user_query_set.role.add(role_user_query_set)
  321. except Exception as e:
  322. errorInfo = traceback.format_exc()
  323. print('更新数据库错误:%s' % errorInfo)
  324. return response.json(177, repr(e))
  325. else:
  326. return response.json(0)
  327. else:
  328. return response.json(404)
  329. def UserValidUpdate(self, superID, eUserID, isValid, response):
  330. super = Device_User.objects.filter(userID=superID)
  331. eUser = Device_User.objects.filter(userID=eUserID)
  332. if not super.exists():
  333. return response.json(104)
  334. if not eUser.exists():
  335. return response.json(104)
  336. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  337. return response.json(404)
  338. try:
  339. eUser.update(user_isValid=isValid)
  340. except Exception as e:
  341. errorInfo = traceback.format_exc()
  342. print('更新数据库错误: %s' % errorInfo)
  343. return response.json(177, repr(e))
  344. return response.json(0)
  345. @csrf_exempt
  346. def success(request):
  347. return HttpResponse(status=200)