From 098dd2ed33b90a8a14ff0b04bace845ec119244c Mon Sep 17 00:00:00 2001
From: zhanzhiqin <895896009@qq.com>
Date: 星期一, 09 五月 2022 10:40:21 +0800
Subject: [PATCH] fix
---
ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java | 115 +++++++++++++++++++++++++++++++++++++++++++++++----------
1 files changed, 94 insertions(+), 21 deletions(-)
diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
index eafc782..6dab943 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
@@ -1,11 +1,14 @@
package com.sandu.ximon.admin.controller;
+import cn.hutool.core.bean.BeanUtil;
+import cn.hutool.core.util.StrUtil;
import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper;
import com.baomidou.mybatisplus.core.toolkit.Wrappers;
import com.github.pagehelper.PageHelper;
import com.sandu.common.domain.ResponseVO;
-import com.sandu.common.enums.AdminStatusStatus;
import com.sandu.common.enums.ResponseStatusEnums;
+import com.sandu.common.execption.BusinessException;
+import com.sandu.common.log.Log;
import com.sandu.common.object.BaseConditionVO;
import com.sandu.common.security.LoginUserInfo;
import com.sandu.common.security.annotation.AnonymousAccess;
@@ -13,27 +16,27 @@
import com.sandu.common.security.token.TokenProvider;
import com.sandu.common.util.IpUtil;
import com.sandu.common.util.ResponseUtil;
-import com.sandu.ximon.admin.context.CustomerInspectContextHolder;
-import com.sandu.ximon.admin.param.AddClientPrarm;
-import com.sandu.ximon.admin.param.AdminLoginParam;
-import com.sandu.ximon.admin.param.ClientPrarm;
+import com.sandu.ximon.admin.dto.ClientDto;
+import com.sandu.ximon.admin.param.*;
+import com.sandu.ximon.admin.security.PermissionConfig;
import com.sandu.ximon.admin.security.SecurityUtils;
+import com.sandu.ximon.admin.service.ClientRoleRelationService;
import com.sandu.ximon.admin.service.ClientService;
import com.sandu.ximon.admin.service.RoleService;
-import com.sandu.ximon.dao.domain.Admin;
+import com.sandu.ximon.admin.utils.RedisUtils;
import com.sandu.ximon.dao.domain.Client;
+import com.sandu.ximon.dao.domain.ClientRoleRelation;
import com.sandu.ximon.dao.enums.AdministratorEnums;
-import jodd.cli.Cli;
+import com.sandu.ximon.dao.enums.MenuEnum;
import lombok.AllArgsConstructor;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.validation.annotation.Validated;
import org.springframework.web.bind.annotation.*;
+import javax.servlet.http.HttpServletRequest;
import java.time.LocalDateTime;
-import java.util.Collection;
-import java.util.HashMap;
-import java.util.Map;
+import java.util.*;
import java.util.stream.Collectors;
/**
@@ -48,10 +51,15 @@
private final ClientService clientService;
private final PasswordEncoder passwordEncoder;
private final RoleService roleService;
+ private final ClientRoleRelationService clientRoleRelationService;
private final TokenProvider tokenProvider;
+ private PermissionConfig permissionConfig;
@PostMapping("/add")
public ResponseVO<Object> addClient(@RequestBody @Validated AddClientPrarm addClientPrarm) {
+ if (!permissionConfig.check(MenuEnum.CLIENT_ADD.getCode())) {
+ return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+ }
boolean b = clientService.addClient(addClientPrarm);
if (b) {
return ResponseUtil.success("娣诲姞鎴愬姛");
@@ -62,8 +70,11 @@
@PostMapping("/update/{id}")
- public ResponseVO<Object> updateClient(@PathVariable Long id, @RequestBody @Validated ClientPrarm clientPrarm) {
- boolean b = clientService.updateClient(id, clientPrarm);
+ public ResponseVO<Object> updateClient(@PathVariable Long id, @RequestBody @Validated UpdateClientPrarm updateClientPrarm) {
+ if (!permissionConfig.check(MenuEnum.CLIENT_INFO_UPDATE.getCode())) {
+ return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+ }
+ boolean b = clientService.updateClient(id, updateClientPrarm);
if (b) {
return ResponseUtil.success("鏇存柊鎴愬姛");
} else {
@@ -71,8 +82,43 @@
}
}
+ /**
+ * 淇敼鏅�氱敤鎴风殑瀵嗙爜
+ */
+ @Log("淇敼鏅�氱敤鎴风殑瀵嗙爜")
+ @PostMapping("/updateClientPassword")
+ public ResponseVO<Object> updateClientPassword(@Validated @RequestBody UserPwsParm param) {
+ boolean result;
+
+ //瓒呯鐩存帴淇敼
+ if (SecurityUtils.getUserDetails().getAdministratorType().equals(AdministratorEnums.ADMIN.getCode())) {
+ result = clientService.updateAdminPassword(param);
+ } else {
+ //褰撳墠鐧诲綍璐﹀彿ID
+ Long userId = SecurityUtils.getUserId();
+ //瑕佷慨瑕佸瘑鐮佺殑鐢ㄦ埛鐨勪笂绾D
+ Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getId, param.getUserid()));
+ //涓哄叾涓嬪睘鎵嶈兘淇敼
+ if (client != null && userId.equals(client.getSuperiorId())) {
+ result = clientService.updateAdminPassword(param);
+ } else {
+ throw new BusinessException("闈炶秴绾х鐞嗗憳鎴栬鐢ㄦ埛涓嶆槸鎮ㄤ笅灞炵敤鎴凤紝鏃犳硶淇敼瀵嗙爜锛�");
+ }
+ }
+
+ if (result) {
+ return ResponseUtil.success("淇敼鎴愬姛");
+ } else {
+ return ResponseUtil.fail("淇敼澶辫触");
+ }
+
+ }
+
@PostMapping("/delete/{id}")
public ResponseVO<Object> deleteClient(@PathVariable Long id) {
+ if (!permissionConfig.check(MenuEnum.CLIENT_DELETE.getCode())) {
+ return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+ }
boolean b = clientService.deleteClient(id);
if (b) {
return ResponseUtil.success("鍒犻櫎鎴愬姛");
@@ -83,37 +129,64 @@
@GetMapping("/list")
public ResponseVO<Object> listLikeClient(BaseConditionVO baseConditionVO, @RequestParam(value = "keyword", required = false) String keyword) {
+ if (!permissionConfig.check(MenuEnum.CLIENT_LIST.getCode())) {
+ return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+ }
+
PageHelper.startPage(baseConditionVO.getPageNo(), baseConditionVO.getPageSize());
LambdaQueryWrapper<Client> wrapper = Wrappers.lambdaQuery(Client.class);
- if (AdministratorEnums.CUSTOMER.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
- wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId());
+ if (AdministratorEnums.NORMAL.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
+ wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId()).or(w -> w.eq(
+ Client::getId, SecurityUtils.getUserId()
+ ));
}
- if (null != keyword) {
+ if (keyword != null && !keyword.isEmpty()) {
wrapper.like(Client::getClientName, keyword)
- .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getMobile, keyword))
- .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getLinkMan, keyword));
+ .or(w1 -> w1.like(Client::getMobile, keyword))
+ .or(w2 -> w2.like(Client::getLinkMan, keyword));
}
- return ResponseUtil.successPage(clientService.list(wrapper));
+ List<Client> clientList = clientService.list(wrapper);
+ List<ClientDto> clientDtoList = new ArrayList<>();
+
+ for (Client demo : clientList) {
+ ClientDto clientDto = new ClientDto();
+ BeanUtil.copyProperties(demo, clientDto);
+ ClientRoleRelation one = clientRoleRelationService.getOne(Wrappers.lambdaQuery(ClientRoleRelation.class)
+ .eq(ClientRoleRelation::getClientId, demo.getId()));
+
+ if (one != null) {
+ clientDto.setRoleId(one.getRoleId());
+ }
+ clientDtoList.add(clientDto);
+
+ }
+ return ResponseUtil.successPage(clientDtoList);
}
@AnonymousAccess
@PostMapping(value = "/login")
- public ResponseVO<Object> longin(@RequestBody @Validated AdminLoginParam loginParam) {
+ public ResponseVO<Object> longin(HttpServletRequest request, @RequestBody @Validated AdminLoginParam loginParam) {
Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getClientName, loginParam.getUsername()).last("limit 1"));
if (client == null) {
return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
}
+ String s = RedisUtils.getBean().get(loginParam.getKey());
+ System.out.println(s+"===========================");
+ if (!loginParam.getVlue().equals(s)) {
+ return ResponseUtil.error(ResponseStatusEnums.BAD_AUTHENTICATION.getCode(), ResponseStatusEnums.BAD_AUTHENTICATION.getMessage());
+ }
+ RedisUtils.getBean().delete(loginParam.getKey());
if (!passwordEncoder.matches(loginParam.getPassword(), client.getPassword())) {
return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
}
- Collection<GrantedAuthority> grantedAuthorities = roleService.mapToGrantedAuthorities(client.getId());
+ Collection<GrantedAuthority> grantedAuthorities = roleService.mapToGrantedAuthorities(client.getId(), false);
LoginUserInfo loginUserInfo = new LoginUserInfo();
loginUserInfo.setUserId(client.getId());
loginUserInfo.setAccount(client.getClientName());
loginUserInfo.setIp(IpUtil.getRealIp());
- loginUserInfo.setAdministratorType(AdministratorEnums.CUSTOMER.getCode());
+ loginUserInfo.setAdministratorType(AdministratorEnums.NORMAL.getCode());
loginUserInfo.setPermission(grantedAuthorities.stream().map(GrantedAuthority::getAuthority).collect(Collectors.joining(",")));
// 鐢熸垚浠ょ墝
--
Gitblit v1.9.3