UserManger.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. import datetime
  4. import os
  5. import traceback
  6. import simplejson as json
  7. from django.core import serializers
  8. from django.core.files.storage import FileSystemStorage
  9. from django.http import HttpResponse
  10. from django.utils import timezone
  11. from django.utils.decorators import method_decorator
  12. from django.views.decorators.csrf import csrf_exempt
  13. from django.views.generic import TemplateView, View
  14. from Ansjer.config import SERVER_DOMAIN
  15. from Ansjer.config import BASE_DIR
  16. from Model.models import Role, Device_User
  17. from Object.ResponseObject import ResponseObject
  18. from Object.TokenObject import TokenObject
  19. from Service.CommonService import CommonService
  20. from Service.ModelService import ModelService
  21. from Object.RedisObject import RedisObject
  22. # http://192.168.136.40:8077/account/showUserMore?token=test
  23. class showUserMoreView(TemplateView):
  24. @method_decorator(csrf_exempt)
  25. def dispatch(self, *args, **kwargs):
  26. return super(showUserMoreView, self).dispatch(*args, **kwargs)
  27. def post(self, request, *args, **kwargs):
  28. request.encoding = 'utf-8'
  29. token = request.POST.get('token', None)
  30. return self.ValidationError(token)
  31. def get(self, request, *args, **kwargs):
  32. request.encoding = 'gb2312'
  33. token = request.GET.get('token', None)
  34. return self.ValidationError(token)
  35. def ValidationError(self, token):
  36. response = ResponseObject()
  37. tko = TokenObject(token)
  38. response.lang = tko.lang
  39. if tko.code != 0:
  40. return response.json(tko.code)
  41. userID = tko.userID
  42. if not userID:
  43. return response.json(104)
  44. return self.showUserMore(userID, response)
  45. def showUserMore(self, userID, response):
  46. User = Device_User.objects.filter(userID=userID)
  47. if not User.exists():
  48. return response.json(104)
  49. sqlDict = CommonService.qs_to_dict(User)
  50. for k, v in enumerate(sqlDict["datas"]):
  51. sqlDict['datas'][k]['fields'].pop('password')
  52. userIconPath = sqlDict['datas'][k]['fields']['userIconPath']
  53. if userIconPath:
  54. if userIconPath.find('static/') != -1:
  55. userIconPath = userIconPath.replace('static/', '').replace('\\', '/')
  56. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath
  57. sqlDict['datas'][k]['fields']['userIconUrl'] = userIconUrl
  58. if len(v['fields']['role']):
  59. roleName = ModelService.getRole(rid=v['fields']['role'][0])
  60. sqlDict["datas"][k]['fields']['rolename'] = roleName
  61. return response.json(0, sqlDict)
  62. # http://192.168.136.40:8077/account/perfectUserInfo?token=test&content={"NickName":"333"}
  63. class perfectUserInfoView(TemplateView):
  64. # 完善个人信息
  65. @method_decorator(csrf_exempt)
  66. def dispatch(self, *args, **kwargs):
  67. return super(perfectUserInfoView, self).dispatch(*args, **kwargs)
  68. def post(self, request, *args, **kwargs):
  69. request.encoding = 'utf-8'
  70. userContent = request.POST.get('content', None)
  71. userIcon = request.FILES.get('userIcon', None)
  72. token = request.POST.get('token', None)
  73. return self.ValidationError(token, userContent, userIcon)
  74. def get(self, request, *args, **kwargs):
  75. request.encoding = 'gb2312'
  76. userContent = request.GET.get('content', None)
  77. userIcon = request.FILES.get('userIcon', None)
  78. token = request.GET.get('token', None)
  79. return self.ValidationError(token, userContent, userIcon)
  80. def ValidationError(self, token, userContent, userIcon):
  81. response = ResponseObject()
  82. tko = TokenObject(token)
  83. response.lang = tko.lang
  84. if tko.code != 0:
  85. return response.json(tko.code)
  86. userID = tko.userID
  87. if not userID:
  88. return response.json(309)
  89. if userIcon != None:
  90. location = 'static/User/Images/' + userID + '/'
  91. fss = FileSystemStorage(location=location)
  92. if fss.exists(userIcon.name):
  93. fss.delete(userIcon.name)
  94. filename = fss.save(userIcon.name, userIcon)
  95. # userIconUrl = fss.url(filename)
  96. userIconPath = fss.path(filename).replace('\\', '/')
  97. else:
  98. userIconPath = None
  99. if userContent != None:
  100. dataValid = json.loads(userContent)
  101. if 'userID' and 'password' and 'is_superuser' in dataValid.keys():
  102. return response.json(444)
  103. if userIconPath == None and userContent == None:
  104. return response.json(800)
  105. elif userIconPath == None and userContent != None:
  106. return self.perfectUserInfoUpdate(userID, response, userContent=userContent)
  107. elif userIconPath != None and userContent == None:
  108. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath)
  109. else:
  110. return self.perfectUserInfoUpdate(userID, response, userIconPath=userIconPath,
  111. userContent=userContent)
  112. def perfectUserInfoUpdate(slef, userID, response, *args,
  113. **kwargs):
  114. """
  115. :param username:
  116. :param userContent:
  117. :param args:
  118. :param kwargs:
  119. :return:
  120. """
  121. User = Device_User.objects.filter(userID=userID)
  122. if not User.exists():
  123. return response.json(104)
  124. userIconPath = kwargs.get('userIconPath', None)
  125. userContent = kwargs.get('userContent', None)
  126. if userIconPath is not None:
  127. userIconPath = userIconPath[userIconPath.find('static/'):]
  128. userIconUrl = SERVER_DOMAIN + 'account/getAvatar/' + userIconPath[7:]
  129. if userContent != None:
  130. try:
  131. UserData = json.loads(userContent)
  132. except Exception as e:
  133. return response.json(444, repr(e))
  134. try:
  135. if userIconPath is not None and userContent is not None:
  136. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl, **UserData)
  137. elif userIconPath is None and userContent is not None:
  138. User.update(**UserData)
  139. elif userIconPath is not None and userContent is None:
  140. User.update(userIconPath=userIconPath, userIconUrl=userIconUrl)
  141. except Exception as e:
  142. errorInfo = traceback.format_exc()
  143. print('修改设备信息错误: %s ' % errorInfo)
  144. return response.json(117, repr(e))
  145. else:
  146. res = CommonService.qs_to_dict(User)
  147. return response.json(0, res)
  148. class getAvatarView(TemplateView):
  149. @method_decorator(csrf_exempt)
  150. def dispatch(self, *args, **kwargs):
  151. return super(getAvatarView, self).dispatch(*args, **kwargs)
  152. def post(self, request, *args, **kwargs):
  153. request.encoding = 'utf-8'
  154. filePath = kwargs.get('filePath', '')
  155. filePath.encode(encoding='utf-8', errors='strict')
  156. return self.getAvatar(filePath)
  157. def get(self, request, *args, **kwargs):
  158. request.encoding = 'gb2312'
  159. filePath = kwargs.get('filePath', '')
  160. filePath.encode(encoding='gb2312', errors='strict')
  161. return self.getAvatar(filePath)
  162. def getAvatar(self, filePath):
  163. response = ResponseObject()
  164. if filePath == '' or filePath == None:
  165. return response.json(800)
  166. fullPath = os.path.join(BASE_DIR, "static", filePath).replace('\\', '/')
  167. if os.path.isfile(fullPath):
  168. try:
  169. Imagedata = open(fullPath, 'rb').read()
  170. return HttpResponse(Imagedata, content_type="image/jpeg")
  171. except Exception as e:
  172. return response.json(906, repr(e))
  173. else:
  174. return response.json(907)
  175. @csrf_exempt
  176. def delUserInterface(request):
  177. if request.method == 'POST':
  178. request_dict = request.POST
  179. elif request.method == 'GET':
  180. request_dict = request.GET
  181. token = request_dict.get('token', None)
  182. delUserID = request_dict.get('delUserID', None)
  183. response = ResponseObject()
  184. if not token or not delUserID:
  185. return response.json(444, 'token,delUserID')
  186. tko = TokenObject(token)
  187. response.lang = tko.lang
  188. if tko.code != 0:
  189. return response.json(tko.code)
  190. userID = tko.userID
  191. if not userID:
  192. return response.json(309)
  193. userValid = Device_User.objects.filter(userID=userID)
  194. if not userValid.exists():
  195. return response.json(104)
  196. own_perm = ModelService.check_perm(userID=userID, permID=10)
  197. if own_perm is not True:
  198. return response.json(404)
  199. delUser = Device_User.objects.filter(userID=delUserID)
  200. if not delUser.exists():
  201. return response.json(104)
  202. delUser.delete()
  203. return response.json(0)
  204. @csrf_exempt
  205. def showAllUserInterface(request):
  206. if request.method == 'POST':
  207. request_dict = request.POST
  208. elif request.method == 'GET':
  209. request_dict = request.GET
  210. token = request_dict.get('token', None)
  211. type = request_dict.get('type', None)
  212. response = ResponseObject()
  213. tko = TokenObject(token)
  214. response.lang = tko.lang
  215. if tko.code != 0:
  216. return response.json(tko.code)
  217. userID = tko.userID
  218. if not userID:
  219. return response.json(104)
  220. if type == 'PC':
  221. line = int(request.POST.get('line', None))
  222. page = int(request.POST.get('page', None))
  223. userValid = Device_User.objects.filter(userID=userID).order_by('-data_joined')
  224. if not userValid:
  225. return response.json(104)
  226. # 管理员查询
  227. own_permission = ModelService.check_perm(userID=userID, permID=30)
  228. if own_permission is not True:
  229. return response.json(404)
  230. device_user_queryset = Device_User.objects.all()
  231. device_user_count = device_user_queryset.count()
  232. device_user_res = device_user_queryset.order_by('-data_joined')[(page - 1) * line:page * line]
  233. sqlDict = CommonService.qs_to_dict(device_user_res)
  234. redisObj = RedisObject(db=3)
  235. for k, v in enumerate(sqlDict["datas"]):
  236. if len(v['fields']['role']) > 0:
  237. role_query_set = Role.objects.get(rid=v['fields']['role'][0])
  238. sqlDict["datas"][k]['fields']['role'].append(role_query_set.roleName)
  239. # for val in device_user_res:
  240. # if v['pk'] == val.userID:
  241. # if redisObj.get_data(key=v['pk']):
  242. # sqlDict["datas"][k]['fields']['online'] = True
  243. # else:
  244. # sqlDict["datas"][k]['fields']['online'] = False
  245. if redisObj.get_data(key=v['pk']):
  246. sqlDict["datas"][k]['fields']['online'] = True
  247. else:
  248. sqlDict["datas"][k]['fields']['online'] = False
  249. sqlDict['count'] = device_user_count
  250. return response.json(0, sqlDict)
  251. else:
  252. own_permission = ModelService.check_perm(userID=userID, permID=30)
  253. if own_permission is not True:
  254. return response.json(404)
  255. qs = Device_User.objects.all().order_by('-data_joined')
  256. res = CommonService.qs_to_dict(qs)
  257. return response.json(0, res)
  258. class setUserValidView(View):
  259. @method_decorator(csrf_exempt)
  260. def dispatch(self, *args, **kwargs):
  261. return super(setUserValidView, self).dispatch(*args, **kwargs)
  262. def post(self, request, *args, **kwargs):
  263. request.encoding = 'utf-8'
  264. request_dict = request.POST
  265. return self.setUserValid(request_dict)
  266. def get(self, request, *args, **kwargs):
  267. request.encoding = 'utf-8'
  268. request_dict = request.GET
  269. return self.setUserValid(request_dict)
  270. def setUserValid(self, request_dict):
  271. token = request_dict.get('token', None)
  272. eUserID = request_dict.get('userID', None)
  273. isValid = request_dict.get('isValid', None)
  274. rid = request_dict.get('rid', None)
  275. response = ResponseObject()
  276. tko = TokenObject(token)
  277. response.lang = tko.lang
  278. if tko.code != 0:
  279. return response.json(tko.code)
  280. superID = tko.userID
  281. own_perm = ModelService.check_perm(userID=superID, permID=50)
  282. if own_perm is True or superID != None and superID != eUserID:
  283. if rid == None:
  284. return self.UserValidUpdate(superID, eUserID, isValid, response)
  285. else:
  286. return self.UserValidUpdatePC(superID, eUserID, isValid, rid, response)
  287. else:
  288. return response.json(444, 'superID or userID')
  289. def UserValidUpdatePC(self, superID, eUserID, isValid, rid, response):
  290. super = Device_User.objects.filter(userID=superID)
  291. eUser = Device_User.objects.filter(userID=eUserID)
  292. if not super.exists() or not eUser.exists():
  293. return response.json(104)
  294. own_permission = ModelService.check_perm(userID=superID, permID=50)
  295. if own_permission is True:
  296. try:
  297. eUser.update(user_isValid=isValid)
  298. device_user_query_set = Device_User.objects.get(userID=eUserID)
  299. if device_user_query_set.role.all():
  300. device_user_query_set.role.set([rid])
  301. else:
  302. role_user_query_set = Role.objects.get(rid=rid)
  303. device_user_query_set.role.add(role_user_query_set)
  304. except Exception as e:
  305. errorInfo = traceback.format_exc()
  306. print('更新数据库错误:%s' % errorInfo)
  307. return response.json(177, repr(e))
  308. else:
  309. return response.json(0)
  310. else:
  311. return response.json(404)
  312. def UserValidUpdate(self, superID, eUserID, isValid, response):
  313. super = Device_User.objects.filter(userID=superID)
  314. eUser = Device_User.objects.filter(userID=eUserID)
  315. if not super.exists():
  316. return response.json(104)
  317. if not eUser.exists():
  318. return response.json(104)
  319. if super[0].is_superuser != 100 or super[0].is_superuser == eUser[0].is_superuser:
  320. return response.json(404)
  321. try:
  322. eUser.update(user_isValid=isValid)
  323. except Exception as e:
  324. errorInfo = traceback.format_exc()
  325. print('更新数据库错误: %s' % errorInfo)
  326. return response.json(177, repr(e))
  327. return response.json(0)
  328. @csrf_exempt
  329. def success(request):
  330. return HttpResponse(status=200)