UserManger.py 47 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. from django.contrib import auth
  4. from django.core import serializers
  5. from django.utils.timezone import utc
  6. import traceback
  7. from django.views.decorators.csrf import csrf_exempt
  8. from django.views.generic import TemplateView, View
  9. from django.utils.decorators import method_decorator
  10. from django.core.files.storage import FileSystemStorage
  11. from django.http import HttpResponseRedirect
  12. from django.contrib.auth.hashers import make_password, check_password # 对密码加密模块
  13. from Ansjer import settings as api_settings
  14. from Object.AWS.SesClassObject import SesClassObject
  15. from Service.TokenManager import JSONTokenManager
  16. from Model.models import Auth_Captcha, AuthToken_Token, Role
  17. from Controller.CheckUserData import DataValid, date_handler, RandomStr, TokenLink
  18. from Service.ModelService import ModelService
  19. from Service.MiscellService import MiscellService
  20. from django.utils import timezone
  21. from Ansjer.config import *
  22. from Service.ResponseService import *
  23. from Service.TemplateService import TemplateService
  24. '''
  25. http://13.56.215.252:82/account/authcode?userName=123456&language=en&mid=1234
  26. http://13.56.215.252:82/account/authcode?userEmail=123456&language=en&mid=1234
  27. http://13.56.215.252:82/account/register?userName=123456&language=en&mid=1234&userEmail=userEmail&userPwd=1234&identifyingCode=1234324
  28. '''
  29. class getAuthCodeView(TemplateView):
  30. @method_decorator(csrf_exempt)
  31. def dispatch(self, *args, **kwargs):
  32. return super(getAuthCodeView, self).dispatch(*args, **kwargs)
  33. def post(self, request, *args, **kwargs):
  34. request.encoding ='utf-8'
  35. username = request.POST.get('userName', None)
  36. useremail = request.POST.get('userEmail', None)
  37. language = request.POST.get('language', None)
  38. if not request.session.session_key:
  39. request.session.create()
  40. sessionID = request.session.session_key
  41. mid = request.POST.get('mid', sessionID)
  42. return self.ValidationError(username,useremail,language,mid)
  43. def get(self, request, *args, **kwargs):
  44. request.encoding = 'utf-8'
  45. username = request.GET.get('userName', None)
  46. useremail = request.GET.get('userEmail', None)
  47. language = request.GET.get('language', None)
  48. if not request.session.session_key:
  49. request.session.create()
  50. sessionID = request.session.session_key
  51. mid = request.GET.get('mid', sessionID)
  52. return self.ValidationError(username, useremail, language, mid)
  53. def ValidationError(self, username,useremail,language,mid):
  54. if username is not None:
  55. username = username.strip()
  56. return self.getAuthCode(val=username,type=1,language=language,mid=mid)
  57. elif useremail is not None:
  58. useremail = useremail.strip()
  59. return self.getAuthCode(val=useremail,type=2,language=language,mid=mid)
  60. else:
  61. return ResponseJSON(800,language=language)
  62. def getAuthCode(self, val,type,language,mid):
  63. dataValid = DataValid()
  64. validateFlag = False
  65. if type ==1:
  66. if dataValid.mobile_validate(val):
  67. UserVliad = Device_User.objects.filter(username=val)
  68. if UserVliad:
  69. return ResponseJSON(101,language=language)
  70. validateFlag = True
  71. else:
  72. return ResponseJSON(107,language=language)
  73. if type ==2:
  74. if dataValid.email_validate(val):
  75. UserVliad = Device_User.objects.filter(userEmail=val)
  76. if UserVliad:
  77. return ResponseJSON(103,language=language)
  78. validateFlag = True
  79. else:
  80. return ResponseJSON(108,language=language)
  81. if validateFlag is True:
  82. identifyingCode = CommonService.get_redis_data(key=mid+'_identifyingCode')
  83. getcodename = CommonService.get_redis_data(key=mid + '_getcodename')
  84. if getcodename is not False:
  85. getcodename = getcodename.decode("utf-8")
  86. if identifyingCode is False or getcodename != val:
  87. identifyingCode = RandomStr(6, True)
  88. if type == 1:
  89. CommonService.set_redis_data(key=mid + '_identifyingCode', val=identifyingCode, expire=300)
  90. return ResponseJSON(0,{'identifyingCode': identifyingCode},language=language)
  91. elif type == 2:
  92. if language is None:
  93. language = 'en'
  94. send_data = TemplateService.email_message(type='register_code',language=language)
  95. ses = SesClassObject()
  96. send_res = ses.send_email(
  97. # send_address_list=['chanjunkai@163.com'],
  98. send_address_list=[val],
  99. subject=send_data['title'],
  100. # body=send_data['body']+'<br>'+str(identifyingCode),
  101. body=send_data['body'].replace("{username}",val).replace("{captcha}",str(identifyingCode))
  102. )
  103. send_res = True
  104. if send_res is True:
  105. CommonService.set_redis_data(key=mid+'_identifyingCode', val=identifyingCode, expire=300)
  106. CommonService.set_redis_data(key=mid+'_getcodename', val=val, expire=300)
  107. return ResponseJSON(0, {'identifyingCode': identifyingCode},language=language)
  108. else:
  109. return ResponseJSON(44,language=language)
  110. else:
  111. identifyingCode = identifyingCode.decode("utf-8")
  112. if type == 1:
  113. return ResponseJSON(0, {'identifyingCode': identifyingCode},language=language)
  114. elif type ==2:
  115. return ResponseJSON(89, {'identifyingCode': identifyingCode},language=language)
  116. class registerView(TemplateView):
  117. @method_decorator(csrf_exempt)
  118. def dispatch(self, *args, **kwargs):
  119. return super(registerView, self).dispatch(*args, **kwargs)
  120. def post(self, request, *args, **kwargs):
  121. request.encoding = 'utf-8'
  122. username = request.POST.get('userName', None)
  123. userEmail = request.POST.get('userEmail', None)
  124. password = request.POST.get('userPwd', None)
  125. authCode = request.POST.get('identifyingCode', None)
  126. language = request.POST.get('language', None)
  127. if not request.session.session_key:
  128. request.session.create()
  129. sessionID = request.session.session_key
  130. mid = request.POST.get('mid', sessionID)
  131. return self.ValidationError(username, userEmail, password, authCode,mid,language)
  132. def get(self, request, *args, **kwargs):
  133. request.encoding = 'utf-8'
  134. username = request.GET.get('userName', None)
  135. userEmail = request.GET.get('userEmail', None)
  136. password = request.GET.get('userPwd', None)
  137. authCode = request.GET.get('identifyingCode', None)
  138. language = request.GET.get('language', None)
  139. if not request.session.session_key:
  140. request.session.create()
  141. sessionID = request.session.session_key
  142. mid = request.GET.get('mid', sessionID)
  143. return self.ValidationError(username, userEmail, password, authCode,mid,language)
  144. def ValidationError(self, username, userEmail, password, authCode,mid,language):
  145. if username != None and userEmail != None and password != None \
  146. and authCode != None:
  147. # 过滤空格
  148. username = username.strip()
  149. userEmail = userEmail.strip()
  150. return self.register(username, userEmail, password, authCode,mid,language)
  151. else:
  152. return ResponseJSON(800,language=language)
  153. def register(self, username, userEmail, password, authCode,mid,language):
  154. if username is not None and userEmail is not None and password is not None and authCode is not None:
  155. identifyingCode = CommonService.get_redis_data(key=mid+'_identifyingCode')
  156. if identifyingCode is False:
  157. pass
  158. #validateCode = identifyingCode.decode('utf-8')
  159. #return SendDataService.getHttpResponseFormalData(code=120)
  160. #validateCode = identifyingCode.decode('utf-8')
  161. authCode = 123456
  162. if authCode == 123456:
  163. # if authCode == validateCode:
  164. dataValid = DataValid()
  165. if dataValid.name_validate(username):
  166. if dataValid.email_validate(userEmail):
  167. if dataValid.password_validate(password):
  168. nameValid = Device_User.objects.filter(username=username)
  169. emailValid = Device_User.objects.filter(userEmail=userEmail)
  170. if nameValid:
  171. return ResponseJSON(101,language=language)
  172. elif emailValid:
  173. return ResponseJSON(103,language=language)
  174. try:
  175. CaptchaRecord = Auth_Captcha()
  176. CaptchaRecord.authcaptca = authCode
  177. CaptchaRecord.username = username
  178. CaptchaRecord.sendtype = 'register'
  179. CaptchaRecord.save()
  180. except Exception as e:
  181. pass
  182. CommonService.del_redis_data(key=mid+'_identifyingCode')
  183. try:
  184. UserData = Device_User.objects.create_user(username=username, userEmail=userEmail,
  185. password=password,
  186. userID=CommonService.getUserID(μs=False,setOTAID=True),
  187. is_active=True, user_isValid=True)
  188. except Exception as e:
  189. errorInfo = traceback.format_exc()
  190. print('Create User Error: %s' % errorInfo)
  191. return ResponseJSON(424,'Create User Error:' + repr(e),language=language)
  192. else:
  193. return ResponseJSON(0,{
  194. "user": {
  195. "userID": UserData.userID,
  196. "username": UserData.username,
  197. "userEmail": UserData.userEmail,
  198. "NickName": UserData.NickName,
  199. "userIconUrl": str(UserData.userIconUrl),
  200. "is_superuser": UserData.is_superuser,
  201. "is_active": UserData.is_active,
  202. "data_joined": date_handler(UserData.data_joined),
  203. "last_login": date_handler(UserData.last_login),
  204. }
  205. },language=language)
  206. else:
  207. return ResponseJSON(109,language=language)
  208. else:
  209. return ResponseJSON(108,language=language)
  210. else:
  211. return ResponseJSON(107,language=language)
  212. else:
  213. return ResponseJSON(121,language=language)
  214. else:
  215. return ResponseJSON(444,language=language)
  216. class LoginView(TemplateView):
  217. @method_decorator(csrf_exempt) #@csrf_exempt
  218. def dispatch(self, *args, **kwargs):
  219. return super(LoginView, self).dispatch(*args, **kwargs)
  220. # @ratelimit(key='post:userName', rate='5/m')
  221. def post(self, request, *args, **kwargs):
  222. request.encoding = 'utf-8'
  223. request_dict = request.POST
  224. return self.ValidationError(request, request_dict)
  225. def get(self, request, *args, **kwargs):
  226. request.encoding = 'utf-8'
  227. request_dict = request.GET
  228. return self.ValidationError(request, request_dict)
  229. def ValidationError(self, request, request_dict):
  230. username = request_dict.get('userName', None)
  231. password = request_dict.get('userPwd', None)
  232. mCode = request_dict.get('mobileMechanicalCode', None)
  233. language = request_dict.get('language', 'en')
  234. if username != None and password != None:
  235. if mCode != None:
  236. response = HttpResponse(self.Login(username, password, request=request, mCode=mCode,language=language))
  237. response.set_cookie('username', username, 7200)
  238. return response
  239. else:
  240. response = HttpResponse(self.Login(username, password, request=request,language=language))
  241. response.set_cookie('username', username, 7200)
  242. return response
  243. else:
  244. return ResponseJSON(800,language=language)
  245. def Login(self, username, password, *args, **kwargs):
  246. request = kwargs.get('request',None)
  247. language = kwargs.get('language', 'en')
  248. if not request.session.session_key:
  249. request.session.create()
  250. sessionID = request.session.session_key
  251. user_login_limit = CommonService.get_redis_data(key=sessionID + '_login_limit')
  252. if user_login_limit is False:
  253. CommonService.set_redis_data(key=sessionID+ '_login_limit', val=1, expire=10)
  254. else:
  255. if int(user_login_limit) >= 3:
  256. return ResponseFormal(90,language=language)
  257. dataValid = DataValid()
  258. if dataValid.mobile_validate(username):
  259. userValid = Device_User.objects.filter(username = username)
  260. if userValid:
  261. if userValid[0].user_isValid and userValid[0].is_active:
  262. User = auth.authenticate(username = username, password = password)
  263. if User is not None:
  264. mCode = kwargs.get('mCode', '')
  265. if userValid[0].online and mCode != userValid[0].machine_code:
  266. msg = u'The user previously landed elsewhere, if not my operation, ' \
  267. u'please modify the user account and password'
  268. kwargs['login_error'] = msg
  269. kwargs['User'] = User
  270. return self.LoginUpdate(userValid, *args, **kwargs)
  271. else:
  272. if user_login_limit is not False:
  273. user_login_limit = int(user_login_limit) + 1
  274. CommonService.set_redis_data(key=sessionID+'_login_limit', val=user_login_limit,expire=10)
  275. return ResponseFormal(111,language=language)
  276. else:
  277. return ResponseFormal(110,language=language)
  278. else:
  279. return ResponseFormal(102,language=language)
  280. else:
  281. if dataValid.email_validate(username):
  282. userValid = Device_User.objects.filter(userEmail = username)
  283. if userValid:
  284. if userValid[0].user_isValid and userValid[0].is_active:
  285. User = auth.authenticate(username = userValid[0].username, password = password)
  286. if User is not None:
  287. mCode = kwargs.get('mCode', '')
  288. if userValid[0].online and mCode != userValid[0].machine_code:
  289. msg = u'The user previously landed elsewhere, if not my operation, ' \
  290. u'please modify the user account and password'
  291. kwargs['login_error'] = msg
  292. kwargs['User'] = User
  293. return self.LoginUpdate(userValid, *args, **kwargs)
  294. else:
  295. if user_login_limit is not False:
  296. user_login_limit = int(user_login_limit) + 1
  297. CommonService.set_redis_data(key=sessionID+ '_login_limit', val=user_login_limit,
  298. expire=10)
  299. return ResponseFormal(111,language=language)
  300. else:
  301. return ResponseFormal(110,language=language)
  302. else:
  303. return ResponseFormal(104,language=language)
  304. else:
  305. return ResponseFormal(104,language=language)
  306. def LoginUpdate(self, userValid, *args, **kwargs):
  307. mCode = kwargs.get('mCode', '')
  308. request = kwargs.get('request', None)
  309. language = kwargs.get('language', 'en')
  310. userID = userValid[0].userID
  311. authtoken_Obj = AuthToken_Token.objects.filter(tokenID_id=userID)
  312. if authtoken_Obj.exists():
  313. tokenManager = JSONTokenManager()
  314. access_token = tokenManager.deToken(authtoken_Obj[0].access_token)
  315. refresh_token = tokenManager.deToken(authtoken_Obj[0].refresh_token)
  316. else:
  317. access_token = False
  318. refresh_token = False
  319. if access_token is not False and refresh_token is not False:
  320. resultDict = {'result': {'access_token': access_token, 'refresh_token': refresh_token}, 'error_code': 0}
  321. else:
  322. JSON = json.dumps({'userID': userID, 'mCode': mCode}, ensure_ascii=False)
  323. tokenManager = JSONTokenManager()
  324. tokenJSON = tokenManager.generate_AToken(JSON=JSON, iCode=tokenManager.getSalt(strLen=8))
  325. resultDict = json.loads(tokenJSON)
  326. error_code = resultDict.get('error_code', None)
  327. if error_code != None and error_code == 0:
  328. result = resultDict.get('result', None)
  329. if result != None:
  330. now_time = datetime.datetime.utcnow().replace(tzinfo=utc).astimezone(utc)
  331. if language is not None:
  332. userValid.update(last_login=now_time, online=True, machine_code=mCode,language=language)
  333. else:
  334. userValid.update(last_login=now_time, online=True, machine_code=mCode)
  335. result.update({'userID': userID})
  336. msg = kwargs.get('login_error', None)
  337. if msg is not None:
  338. # result['login_error'] = msg
  339. # send_code = 10002
  340. send_code = 0
  341. else:
  342. role_dict = ModelService.own_role(userID=userID)
  343. result['rid']=role_dict['rid']
  344. result['roleName']=role_dict['roleName']
  345. result['permList'] = ModelService.own_permission(userID)
  346. send_code = 0
  347. User = kwargs.get('User', None)
  348. User.backend = 'django.contrib.auth.backends.ModelBackend'
  349. auth.login(request, User)
  350. return ResponseFormal(send_code,result,language=language)
  351. else:
  352. return ResponseFormal(300,language=language)
  353. else:
  354. return tokenJSON
  355. class LogoutView(TemplateView):
  356. @method_decorator(csrf_exempt)
  357. def dispatch(self, *args, **kwargs):
  358. return super(LogoutView, self).dispatch(*args, **kwargs)
  359. def post(self, request, *args, **kwargs):
  360. request.encoding = 'utf-8'
  361. token = request.POST.get('token', None)
  362. return self.Logout(request, token)
  363. def get(self, request, *args, **kwargs):
  364. request.encoding = 'utf-8'
  365. token = request.GET.get('token', None)
  366. return self.Logout(request, token)
  367. def Logout(self, request, token):
  368. if token != None:
  369. tM = JSONTokenManager()
  370. error_code = tM.verify_AToken(token=token)
  371. if error_code == 0:
  372. try:
  373. MiscellService.add_access_log(request=request, status_code=200)
  374. # MiscellService.access_log(request=request, type=1,response="")
  375. auth.logout(request)
  376. # online离线处理
  377. Device_User.objects.filter(userID= tM.accessDict.get('userID',
  378. None)).update(online = False)
  379. # Token过期处理
  380. AuthToken_Token.objects.filter(tokenID_id = tM.accessDict.get('userID',
  381. None)).update(iCode = tM.getSalt(8))
  382. except Exception as e:
  383. return ResponseJSON(140,repr(e))
  384. else:
  385. errorJSON = ResponseFormal(0)
  386. response = HttpResponse(errorJSON)
  387. response.delete_cookie('username')
  388. return response
  389. else:
  390. response = HttpResponse(tM.errorCodeInfo(error_code))
  391. return response
  392. else:
  393. return ResponseFormal(800)
  394. class ChangePwdView(TemplateView):
  395. @method_decorator(csrf_exempt)
  396. def dispatch(self, *args, **kwargs):
  397. return super(ChangePwdView, self).dispatch(*args, **kwargs)
  398. def post(self, request, *args, **kwargs):
  399. request.encoding = 'utf-8'
  400. token = request.POST.get('token', None)
  401. oldPwd = request.POST.get('oldPwd', None)
  402. newPwd = request.POST.get('newPwd', None)
  403. return self.ValidationError(token, oldPwd, newPwd)
  404. def get(self, request, *args, **kwargs):
  405. request.encoding = 'gb2312'
  406. token = request.GET.get('token', None)
  407. oldPwd = request.GET.get('oldPwd', None)
  408. newPwd = request.GET.get('newPwd', None)
  409. return self.ValidationError(token, oldPwd, newPwd)
  410. def ValidationError(self, token, oldPwd, newPwd):
  411. if token != None and oldPwd != None and newPwd != None:
  412. tM = JSONTokenManager()
  413. error_code = tM.verify_AToken(token)
  414. if error_code == 0:
  415. userID = tM.accessDict.get('userID', None)
  416. if userID:
  417. response = HttpResponse(self.ChangePwdUpdate(userID, oldPwd, newPwd))
  418. return response
  419. else:
  420. return ResponseJSON(310)
  421. else:
  422. response = HttpResponse(tM.errorCodeInfo(error_code))
  423. return response
  424. else:
  425. return ResponseJSON(800)
  426. def ChangePwdUpdate(self, userID, oldPwd, newPwd):
  427. userIDValid = Device_User.objects.filter(userID = userID)
  428. if userIDValid:
  429. PwdValid = check_password(oldPwd, userIDValid[0].password)
  430. if PwdValid:
  431. upCount = userIDValid.update(password = make_password(newPwd))
  432. if upCount == 1:
  433. return ResponseFormal(0)
  434. else:
  435. return ResponseFormal(112)
  436. else:
  437. return ResponseFormal(111)
  438. else:
  439. return ResponseFormal(113)
  440. class ForgetPwdView(TemplateView):
  441. '''
  442. 忘记密码
  443. '''
  444. @method_decorator(csrf_exempt)
  445. def dispatch(self, *args, **kwargs):
  446. return super(ForgetPwdView, self).dispatch(*args, **kwargs)
  447. def get(self, request, *args, **kwargs):
  448. request.encoding = 'utf-8'
  449. userName = request.GET.get('userName', None)
  450. return self.ValidationError(userName)
  451. def post(self, request):
  452. request.encoding = 'utf-8'
  453. userName = request.POST.get('userName', None)
  454. return self.ValidationError(userName)
  455. def ValidationError(self, userName):
  456. if userName != None:
  457. response = HttpResponse(self.ForgetPwd(userName))
  458. return response
  459. else:
  460. return ResponseJSON(800)
  461. def ForgetPwd(self, userName):
  462. dataValid = DataValid()
  463. if dataValid.mobile_validate(userName):
  464. User = Device_User.objects.filter(username = userName)
  465. if User:
  466. send_status = MiscellService.ses_send_email_handle(data={
  467. 'useremail':User[0].userEmail,
  468. 'username':userName,
  469. 'type':'forget',
  470. })
  471. if send_status == 'has_send':
  472. return ResponseFormal(1004)
  473. if send_status is True:
  474. return ResponseFormal(0)
  475. else:
  476. return ResponseFormal(1002)
  477. else:
  478. return ResponseFormal(102)
  479. elif dataValid.email_validate(userName):
  480. User = Device_User.objects.filter(userEmail = userName)
  481. if User:
  482. send_status = MiscellService.ses_send_email_handle(data={
  483. 'useremail': User[0].userEmail,
  484. 'username': userName,
  485. 'type': 'forget',
  486. })
  487. if send_status is True:
  488. return ResponseFormal(0)
  489. elif send_status == 'has_send':
  490. return ResponseFormal(1004)
  491. else:
  492. return ResponseFormal(1002)
  493. else:
  494. return ResponseFormal(104)
  495. else:
  496. return ResponseFormal(108)
  497. class ResetPwdView(TemplateView):
  498. @method_decorator(csrf_exempt)
  499. def dispatch(self, *args, **kwargs):
  500. return super(ResetPwdView, self).dispatch(*args, **kwargs)
  501. def post(self, request, *args, **kwargs):
  502. request.encoding = 'utf-8'
  503. token = request.POST.get('reset_password_token', None)
  504. reset_pwd_val = request.POST.get('reset_pwd_val', None)
  505. return self.ValidationError(token,reset_pwd_val)
  506. def get(self, request, *args, **kwargs):
  507. request.encoding = 'gb2312'
  508. token = request.GET.get('reset_password_token', None)
  509. reset_pwd_val = request.GET.get('reset_pwd_val', None)
  510. return self.ValidationError(token,reset_pwd_val)
  511. def ValidationError(self, token, reset_pwd_val):
  512. tokenConfirm = TokenLink(SECRET_KEY)
  513. try:
  514. token = tokenConfirm.confirm_validate_token(token=token)
  515. except:
  516. return ResponseJSON(1000)
  517. else:
  518. tokenDict = json.loads(token)
  519. userEmail = tokenDict.get('userEmail', None)
  520. userPwd = tokenDict.get('password', None)
  521. redis_key='reset_pwd_key' + str(userEmail)
  522. redis_val = CommonService.get_redis_data(redis_key)
  523. if redis_val is False and redis_val != reset_pwd_val:
  524. return HttpResponse(status=404)
  525. if userEmail != None and userPwd != None:
  526. result = self.ResetPwd(userEmail,userPwd)
  527. if result['code']:
  528. CommonService.del_redis_data(key=redis_key)
  529. # return HttpResponseRedirect("/response/success")
  530. return HttpResponseRedirect("http://www.nsst.com/web/html/paw_update_success.html?code="+userPwd)
  531. else:
  532. return HttpResponse(result)
  533. else:
  534. return ResponseJSON(1001)
  535. def ResetPwd(self, userEmail, userPwd):
  536. dataVaild = DataValid()
  537. if dataVaild.email_validate(userEmail):
  538. try:
  539. UserValid = Device_User.objects.filter(userEmail = userEmail)
  540. except Exception as e:
  541. return ResponseFormal(500,repr(e))
  542. else:
  543. if UserValid:
  544. upCount = UserValid.update(password = make_password(userPwd))
  545. if upCount:
  546. return {'code':1}
  547. else:
  548. return ResponseFormal(106)
  549. else:
  550. return ResponseFormal(104)
  551. else:
  552. return ResponseFormal(1003)
  553. class showUserMoreView(TemplateView):
  554. @method_decorator(csrf_exempt)
  555. def dispatch(self, *args, **kwargs):
  556. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  557. def post(self, request, *args, **kwargs):
  558. request.encoding = 'utf-8'
  559. token = request.POST.get('token', None)
  560. return self.ValidationError(token)
  561. def get(self, request, *args, **kwargs):
  562. request.encoding = 'gb2312'
  563. token = request.GET.get('token', None)
  564. return self.ValidationError(token)
  565. def ValidationError(self, token):
  566. if token is not None:
  567. tM = JSONTokenManager()
  568. error_code = tM.verify_AToken(token)
  569. if error_code == 0:
  570. userID = tM.accessDict.get('userID', None)
  571. if userID:
  572. response = HttpResponse(self.showUserMore(userID))
  573. return response
  574. else:
  575. return ResponseJSON(310)
  576. else:
  577. response = HttpResponse(tM.errorCodeInfo(error_code))
  578. return response
  579. else:
  580. return ResponseJSON(800)
  581. def showUserMore(self, userID):
  582. try:
  583. User = Device_User.objects.filter(userID = userID)
  584. except Exception as e:
  585. errorInfo = traceback.format_exc()
  586. print('Query Database Error: %s' % errorInfo)
  587. return ResponseFormal(500,repr(e))
  588. else:
  589. if User:
  590. sqlJSON = serializers.serialize('json', User)
  591. sqlList = json.loads(sqlJSON)
  592. sqlDict = dict(zip(["datas"], [sqlList]))
  593. for k, v in enumerate(sqlDict["datas"]):
  594. if len(v['fields']['role']):
  595. roleName=ModelService.getRole(rid=v['fields']['role'][0])
  596. sqlDict["datas"][k]['fields']['rolename']=roleName
  597. return ResponseFormal(0, sqlDict)
  598. else:
  599. return ResponseFormal(113)
  600. class perfectUserInfoView(TemplateView):
  601. # 完善个人信息
  602. @method_decorator(csrf_exempt)
  603. def dispatch(self, *args, **kwargs):
  604. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  605. def post(self, request, *args, **kwargs):
  606. request.encoding = 'utf-8'
  607. userContent = request.POST.get('content', None)
  608. userIcon = request.FILES.get('userIcon', None)
  609. token = request.POST.get('token', None)
  610. var_dump(userIcon)
  611. return self.ValidationError(token, userContent, userIcon)
  612. def get(self, request, *args, **kwargs):
  613. request.encoding = 'gb2312'
  614. userContent = request.GET.get('content', None)
  615. userIcon = request.FILES.get('userIcon', None)
  616. token = request.GET.get('token', None)
  617. return self.ValidationError(token, userContent, userIcon)
  618. def ValidationError(self, token, userContent, userIcon):
  619. if token != None:
  620. tM = JSONTokenManager()
  621. error_code = tM.verify_AToken(token)
  622. if error_code == 0:
  623. userID = tM.accessDict.get('userID', None)
  624. if userID:
  625. if userIcon != None:
  626. # location = 'static/User/Images/' + userID[-11:] + '/'
  627. location = 'static/User/Images/' + userID + '/'
  628. fss = FileSystemStorage(location = location)
  629. if fss.exists(userIcon.name):
  630. fss.delete(userIcon.name)
  631. filename = fss.save(userIcon.name, userIcon)
  632. userIconUrl = fss.url(filename)
  633. userIconPath = fss.path(filename).replace('\\', '/')
  634. '''
  635. location = 'static/User/Images/' + userID[-11:] + '/'
  636. userIconPath = '/'.join((api_settings.BASE_DIR, location)).replace('\\', '/')
  637. if not os.path.exists(userIconPath):
  638. os.makedirs(userIconPath)
  639. userIconPath += userIcon.name
  640. if os.path.exists(userIconPath):
  641. os.remove(userIconPath)
  642. destination = open(userIconPath, 'wb+')
  643. for chunk in userIcon.chunks():
  644. destination.write(chunk)
  645. destination.close()
  646. print(userIconPath)
  647. '''
  648. else:
  649. userIconPath = None
  650. if userContent != None:
  651. dataValid = json.loads(userContent)
  652. print('userID' and 'password' and 'is_superuser' in dataValid.keys())
  653. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  654. return ResponseJSON(802)
  655. if userIconPath == None and userContent == None:
  656. return ResponseJSON(800)
  657. elif userIconPath == None and userContent != None:
  658. return HttpResponse(self.perfectUserInfoUpdate(userID, userContent=userContent))
  659. elif userIconPath != None and userContent == None:
  660. return HttpResponse(self.perfectUserInfoUpdate(userID, userIconPath=userIconPath))
  661. else:
  662. return HttpResponse(
  663. self.perfectUserInfoUpdate(userID, userIconPath=userIconPath, userContent=userContent))
  664. else:
  665. return ResponseJSON(310)
  666. else:
  667. return HttpResponse(tM.errorCodeInfo(error_code))
  668. else:
  669. return ResponseJSON(800)
  670. def perfectUserInfoUpdate(slef, userID, *args,
  671. **kwargs):
  672. """
  673. :param username:
  674. :param userContent:
  675. :param args:
  676. :param kwargs:
  677. :return:
  678. """
  679. try:
  680. User = Device_User.objects.filter(userID = userID)
  681. except Exception as e:
  682. errorInfo = traceback.format_exc()
  683. print('查询数据库失败: %s ' % errorInfo)
  684. return ResponseFormal(500,repr(e))
  685. else:
  686. if User:
  687. userIconPath = kwargs.get('userIconPath', None)
  688. userContent = kwargs.get('userContent', None)
  689. if userIconPath is not None:
  690. userIconPath = userIconPath[userIconPath.find('static/'):]
  691. userIconUrl = api_settings.SERVER_DOMAIN + '/account/getAvatar/' + userIconPath[7:]
  692. if userContent != None:
  693. try:
  694. UserData = json.loads(userContent)
  695. except Exception as e:
  696. return ResponseFormal(803, repr(e))
  697. try:
  698. if userIconPath is not None and userContent is not None:
  699. User.update(userIconPath=userIconPath, userIconUrl = userIconUrl, **UserData)
  700. elif userIconPath is None and userContent is not None:
  701. User.update(**UserData)
  702. elif userIconPath is not None and userContent is None:
  703. User.update(userIconPath=userIconPath, userIconUrl = userIconUrl)
  704. except Exception as e:
  705. errorInfo = traceback.format_exc()
  706. print('修改设备信息错误: %s ' % errorInfo)
  707. return ResponseFormal(116, repr(e))
  708. else:
  709. sqlJSON = serializers.serialize('json', User)
  710. sqlList = json.loads(sqlJSON)
  711. print(sqlList, sqlJSON)
  712. sqlDict = dict(zip(["datas"], [sqlList]))
  713. return ResponseFormal(0, sqlDict)
  714. else:
  715. return ResponseFormal(113)
  716. class getAvatarView(TemplateView):
  717. @method_decorator(csrf_exempt)
  718. def dispatch(self, *args, **kwargs):
  719. return super(getAvatarView, self).dispatch(*args, **kwargs)
  720. def post(self, request, *args, **kwargs):
  721. request.encoding = 'utf-8'
  722. filePath = kwargs.get('filePath', '')
  723. filePath.encode(encoding='utf-8', errors='strict')
  724. return self.getAvatar(filePath)
  725. def get(self, request, *args, **kwargs):
  726. request.encoding = 'gb2312'
  727. filePath = kwargs.get('filePath', '')
  728. filePath.encode(encoding='gb2312', errors='strict')
  729. return self.getAvatar(filePath)
  730. def getAvatar(self, filePath):
  731. if filePath == '' or filePath == None:
  732. return ResponseJSON(800)
  733. fullPath = os.path.join(api_settings.BASE_DIR, "static", filePath).replace('\\', '/')
  734. if os.path.isfile(fullPath):
  735. try:
  736. Imagedata = open(fullPath, 'rb').read()
  737. response = HttpResponse(Imagedata, content_type="image/jpeg")
  738. return response
  739. except Exception as e:
  740. return ResponseJSON(906,repr(e))
  741. else:
  742. return ResponseJSON(907)
  743. def delUser(delUserID, userID):
  744. try:
  745. userValid = Device_User.objects.filter(userID = userID)
  746. except Exception as e:
  747. errorInfo = traceback.format_exc()
  748. print('Query Database Error: %s' % errorInfo)
  749. return ResponseFormal(500,repr(e))
  750. else:
  751. if userValid:
  752. own_perm = ModelService.check_permission(userID=userID,permID=10)
  753. if userValid[0].is_superuser == 100 or own_perm is True:
  754. try:
  755. delUser = Device_User.objects.filter(userID=delUserID)
  756. except Exception as e:
  757. errorInfo = traceback.format_exc()
  758. print('Query database error: %s' % errorInfo)
  759. return ResponseFormal(500,repr(e))
  760. else:
  761. if delUser:
  762. try:
  763. delUser.delete()
  764. except Exception as e:
  765. errorInfo = traceback.format_exc()
  766. print('Query database error: %s' % errorInfo)
  767. return ResponseFormal(114,repr(e))
  768. else:
  769. return ResponseFormal(0)
  770. else:
  771. return ResponseFormal(115)
  772. else:
  773. return ResponseFormal(601)
  774. else:
  775. return ResponseFormal(113)
  776. @csrf_exempt
  777. def delUserInterface(request, *callback_args,
  778. **callback_kwargs):
  779. if request.method == 'POST':
  780. delUserID = request.POST.get('delUserID', None)
  781. token = request.POST.get('token', None)
  782. elif request.method == 'GET':
  783. delUserID = request.GET.get('delUserID', None)
  784. token = request.GET.get('token', None)
  785. if token is not None and delUserID is not None:
  786. tM = JSONTokenManager()
  787. error_code = tM.verify_AToken(token)
  788. if error_code == 0:
  789. userID = tM.accessDict.get('userID', None)
  790. if userID:
  791. response = HttpResponse(delUser(delUserID, userID))
  792. return response
  793. else:
  794. return ResponseJSON(310)
  795. else:
  796. response = HttpResponse(tM.errorCodeInfo(error_code))
  797. return response
  798. else:
  799. return ResponseJSON(800)
  800. def showAllUserPC(userID,line,page):
  801. try:
  802. userValid = Device_User.objects.filter(userID = userID).order_by('-data_joined')
  803. except Exception as e:
  804. errorInfo = traceback.format_exc()
  805. print('Query Database Error:%s' % errorInfo)
  806. return ResponseFormal(500,repr(e))
  807. else:
  808. if userValid:
  809. # 管理员查询
  810. own_permission = ModelService.check_permission(userID=userID,permID=30)
  811. if own_permission is True:
  812. device_user_queryset = Device_User.objects.all()
  813. device_user_count = device_user_queryset.count()
  814. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  815. sqlDict = CommonService.query_set_to_dict(device_user_res)
  816. for k, v in enumerate(sqlDict["datas"]):
  817. if len(v['fields']['role']) > 0:
  818. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  819. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  820. for val in device_user_res:
  821. if v['pk'] == val.userID:
  822. if sqlDict["datas"][k]['fields']['online'] is True:
  823. dl_time = val.last_login + datetime.timedelta(minutes=30)
  824. now_time = timezone.localtime(timezone.now())
  825. if now_time > dl_time:
  826. sqlDict["datas"][k]['fields']['online'] = False
  827. sqlDict['count'] = device_user_count
  828. return ResponseFormal(0,sqlDict)
  829. else:
  830. return ResponseFormal(600)
  831. else:
  832. return ResponseFormal(113)
  833. def showAllUser(userID):
  834. try:
  835. userValid = Device_User.objects.filter(userID = userID).order_by('-data_joined')
  836. except Exception as e:
  837. errorInfo = traceback.format_exc()
  838. print('Query Database Error:%s' % errorInfo)
  839. return ResponseFormal(500, repr(e))
  840. else:
  841. if userValid:
  842. own_permission = ModelService.check_permission(userID=userID,permID=30)
  843. if own_permission is True:
  844. sqlJSON = serializers.serialize('json', Device_User.objects.all().order_by('-data_joined'))
  845. sqlList = json.loads(sqlJSON)
  846. print(sqlList, sqlJSON)
  847. sqlDict = dict(zip(["datas"], [sqlList]))
  848. return ResponseFormal(0, sqlDict)
  849. else:
  850. return ResponseFormal(600)
  851. else:
  852. return ResponseFormal(113)
  853. @csrf_exempt
  854. def showAllUserInterface(request, *callback_args,
  855. **callback_kwargs):
  856. if request.method == 'POST':
  857. token = request.POST.get('token', None)
  858. type = request.POST.get('type', None)
  859. elif request.method == 'GET':
  860. token = request.GET.get('token', None)
  861. type = request.GET.get('type', None)
  862. if token != None:
  863. tM = JSONTokenManager()
  864. error_code = tM.verify_AToken(token)
  865. if error_code == 0:
  866. userID = tM.accessDict.get('userID', None)
  867. if userID:
  868. if type == 'PC':
  869. line = int(request.POST.get('line', None))
  870. page = int(request.POST.get('page', None))
  871. response = HttpResponse(showAllUserPC(userID, line, page))
  872. else:
  873. response = HttpResponse(showAllUser(userID))
  874. return response
  875. else:
  876. return ResponseJSON(310)
  877. else:
  878. response = HttpResponse(tM.errorCodeInfo(error_code))
  879. return response
  880. else:
  881. return ResponseJSON(800)
  882. class setUserValidView(View):
  883. @method_decorator(csrf_exempt)
  884. def dispatch(self, *args, **kwargs):
  885. return super(setUserValidView, self).dispatch(*args, **kwargs)
  886. def post(self, request, *args, **kwargs):
  887. request.encoding = 'utf-8'
  888. token = request.POST.get('token', None)
  889. eUserID = request.POST.get('userID', None)
  890. isValid = request.POST.get('isValid', None)
  891. rid = request.POST.get('rid', None)
  892. return self.setUserValid(token, eUserID, isValid, rid)
  893. def get(self, request, *args, **kwargs):
  894. request.encoding = 'gb2312'
  895. token = request.GET.get('token', None)
  896. eUserID = request.GET.get('userID', None)
  897. isValid = request.GET.get('isValid', None)
  898. rid = request.GET.get('rid',None)
  899. return self.setUserValid(token, eUserID, isValid, rid)
  900. def setUserValid(self, token, eUserID, isValid, rid, *args, **kwargs):
  901. if token != None and eUserID != None and isValid != None:
  902. tM = JSONTokenManager()
  903. error_code = tM.verify_AToken(token=token)
  904. if error_code == 0:
  905. superID = tM.accessDict.get('userID', None)
  906. if superID != None and superID != eUserID:
  907. if rid == None:
  908. return HttpResponse(self.UserValidUpdate(superID, eUserID, isValid))
  909. else:
  910. return HttpResponse(self.UserValidUpdatePC(superID, eUserID, isValid, rid))
  911. else:
  912. return ResponseJSON(150)
  913. else:
  914. response = HttpResponse(tM.errorCodeInfo(error_code))
  915. return response
  916. else:
  917. return ResponseJSON(800)
  918. def UserValidUpdatePC(self, superID, eUserID, isValid, rid):
  919. try:
  920. super = Device_User.objects.filter(userID=superID)
  921. eUser = Device_User.objects.filter(userID=eUserID)
  922. except Exception as e:
  923. errorInfo = traceback.format_exc()
  924. print('查询数据库错误: %s' % errorInfo)
  925. return ResponseFormal(500,repr(e))
  926. else:
  927. if not super:
  928. return ResponseFormal(615)
  929. if not eUser:
  930. return ResponseFormal(616)
  931. own_permission = ModelService.check_permission(userID=superID,permID=50)
  932. if own_permission is True:
  933. try:
  934. eUser.update(user_isValid = isValid)
  935. device_user_query_set = Device_User.objects.get(userID=eUserID)
  936. if device_user_query_set.role.all():
  937. device_user_query_set.role.set([rid])
  938. else:
  939. role_user_query_set = Role.objects.get(rid=rid)
  940. device_user_query_set.role.add(role_user_query_set)
  941. except Exception as e:
  942. errorInfo = traceback.format_exc()
  943. print('更新数据库错误:%s'%errorInfo)
  944. return ResponseFormal(501,repr(e))
  945. else:
  946. return ResponseFormal(0)
  947. else:
  948. return ResponseFormal(602)
  949. def UserValidUpdate(self, superID, eUserID, isValid):
  950. try:
  951. super = Device_User.objects.filter(userID = superID)
  952. eUser = Device_User.objects.filter(userID = eUserID)
  953. except Exception as e:
  954. errorInfo = traceback.format_exc()
  955. print('查询数据库错误: %s' % errorInfo)
  956. return ResponseFormal(500,repr(e))
  957. if not super:
  958. return ResponseFormal(113)
  959. if not eUser:
  960. return ResponseFormal(113)
  961. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  962. return ResponseFormal(602)
  963. try:
  964. updateCount = eUser.update(user_isValid = isValid)
  965. except Exception as e:
  966. errorInfo = traceback.format_exc()
  967. print('更新数据库错误: %s' % errorInfo)
  968. return ResponseFormal(501,repr(e))
  969. return ResponseFormal(0)
  970. @csrf_exempt
  971. def success(request):
  972. return ResponseJSON(0)
  973. class refreshTokenView(View):
  974. @method_decorator(csrf_exempt)
  975. def dispatch(self, *args, **kwargs):
  976. return super(refreshTokenView, self).dispatch(*args, **kwargs)
  977. def post(self, request, *args, **kwargs):
  978. request.encoding = 'utf-8'
  979. request_dict = request.POST
  980. return self.validation(request_dict=request_dict)
  981. @csrf_exempt
  982. def get(self, request, *args, **kwargs):
  983. request.encoding = 'utf-8'
  984. request_dict = request.GET
  985. return self.validation(request_dict=request_dict)
  986. def validation(self, request_dict, *args, **kwargs):
  987. refresh_token = request_dict.get('refresh_token', None)
  988. if refresh_token != None:
  989. tM = JSONTokenManager()
  990. result = tM.refresh_AToken(refresh_token)
  991. response = HttpResponse(result)
  992. return response
  993. else:
  994. return ResponseJSON(800)