From 3b8877b6d8c13e37f8c7769282a2751b0faeb499 Mon Sep 17 00:00:00 2001
From: liuhaonan <31457034@qq.com>
Date: 星期一, 16 五月 2022 18:30:54 +0800
Subject: [PATCH] 日志

---
 ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java |   99 ++++++++++++++++++++++++++++++++++++++++++++-----
 1 files changed, 89 insertions(+), 10 deletions(-)

diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
index 19fef03..4f1806b 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
@@ -1,10 +1,13 @@
 package com.sandu.ximon.admin.controller;
 
+import cn.hutool.core.bean.BeanUtil;
 import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper;
 import com.baomidou.mybatisplus.core.toolkit.Wrappers;
 import com.github.pagehelper.PageHelper;
 import com.sandu.common.domain.ResponseVO;
 import com.sandu.common.enums.ResponseStatusEnums;
+import com.sandu.common.execption.BusinessException;
+import com.sandu.common.log.Log;
 import com.sandu.common.object.BaseConditionVO;
 import com.sandu.common.security.LoginUserInfo;
 import com.sandu.common.security.annotation.AnonymousAccess;
@@ -12,24 +15,30 @@
 import com.sandu.common.security.token.TokenProvider;
 import com.sandu.common.util.IpUtil;
 import com.sandu.common.util.ResponseUtil;
+import com.sandu.ximon.admin.dto.ClientDto;
 import com.sandu.ximon.admin.param.AddClientPrarm;
 import com.sandu.ximon.admin.param.AdminLoginParam;
 import com.sandu.ximon.admin.param.UpdateClientPrarm;
+import com.sandu.ximon.admin.param.UserPwsParm;
+import com.sandu.ximon.admin.security.PermissionConfig;
 import com.sandu.ximon.admin.security.SecurityUtils;
+import com.sandu.ximon.admin.service.ClientRoleRelationService;
 import com.sandu.ximon.admin.service.ClientService;
 import com.sandu.ximon.admin.service.RoleService;
+import com.sandu.ximon.admin.utils.RedisUtils;
 import com.sandu.ximon.dao.domain.Client;
+import com.sandu.ximon.dao.domain.ClientRoleRelation;
 import com.sandu.ximon.dao.enums.AdministratorEnums;
+import com.sandu.ximon.dao.enums.MenuEnum;
 import lombok.AllArgsConstructor;
 import org.springframework.security.core.GrantedAuthority;
 import org.springframework.security.crypto.password.PasswordEncoder;
 import org.springframework.validation.annotation.Validated;
 import org.springframework.web.bind.annotation.*;
 
+import javax.servlet.http.HttpServletRequest;
 import java.time.LocalDateTime;
-import java.util.Collection;
-import java.util.HashMap;
-import java.util.Map;
+import java.util.*;
 import java.util.stream.Collectors;
 
 /**
@@ -44,10 +53,15 @@
     private final ClientService clientService;
     private final PasswordEncoder passwordEncoder;
     private final RoleService roleService;
+    private final ClientRoleRelationService clientRoleRelationService;
     private final TokenProvider tokenProvider;
+    private PermissionConfig permissionConfig;
 
     @PostMapping("/add")
     public ResponseVO<Object> addClient(@RequestBody @Validated AddClientPrarm addClientPrarm) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_ADD.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean b = clientService.addClient(addClientPrarm);
         if (b) {
             return ResponseUtil.success("娣诲姞鎴愬姛");
@@ -59,6 +73,9 @@
 
     @PostMapping("/update/{id}")
     public ResponseVO<Object> updateClient(@PathVariable Long id, @RequestBody @Validated UpdateClientPrarm updateClientPrarm) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_INFO_UPDATE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean b = clientService.updateClient(id, updateClientPrarm);
         if (b) {
             return ResponseUtil.success("鏇存柊鎴愬姛");
@@ -67,8 +84,43 @@
         }
     }
 
+    /**
+     * 淇敼鏅�氱敤鎴风殑瀵嗙爜
+     */
+    @Log("淇敼鏅�氱敤鎴风殑瀵嗙爜")
+    @PostMapping("/updateClientPassword")
+    public ResponseVO<Object> updateClientPassword(@Validated @RequestBody UserPwsParm param) {
+        boolean result;
+
+        //瓒呯鐩存帴淇敼
+        if (SecurityUtils.getUserDetails().getAdministratorType().equals(AdministratorEnums.ADMIN.getCode())) {
+            result = clientService.updateAdminPassword(param);
+        } else {
+            //褰撳墠鐧诲綍璐﹀彿ID
+            Long userId = SecurityUtils.getUserId();
+            //瑕佷慨瑕佸瘑鐮佺殑鐢ㄦ埛鐨勪笂绾D
+            Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getId, param.getUserid()));
+            //涓哄叾涓嬪睘鎵嶈兘淇敼
+            if (client != null && userId.equals(client.getSuperiorId())) {
+                result = clientService.updateAdminPassword(param);
+            } else {
+                throw new BusinessException("闈炶秴绾х鐞嗗憳鎴栬鐢ㄦ埛涓嶆槸鎮ㄤ笅灞炵敤鎴凤紝鏃犳硶淇敼瀵嗙爜锛�");
+            }
+        }
+
+        if (result) {
+            return ResponseUtil.success("淇敼鎴愬姛");
+        } else {
+            return ResponseUtil.fail("淇敼澶辫触");
+        }
+
+    }
+
     @PostMapping("/delete/{id}")
     public ResponseVO<Object> deleteClient(@PathVariable Long id) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_DELETE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean b = clientService.deleteClient(id);
         if (b) {
             return ResponseUtil.success("鍒犻櫎鎴愬姛");
@@ -79,26 +131,53 @@
 
     @GetMapping("/list")
     public ResponseVO<Object> listLikeClient(BaseConditionVO baseConditionVO, @RequestParam(value = "keyword", required = false) String keyword) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_LIST.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
+
         PageHelper.startPage(baseConditionVO.getPageNo(), baseConditionVO.getPageSize());
         LambdaQueryWrapper<Client> wrapper = Wrappers.lambdaQuery(Client.class);
-        if (AdministratorEnums.CUSTOMER.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
-            wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId());
+        if (AdministratorEnums.NORMAL.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
+            wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId()).or(w -> w.eq(
+                    Client::getId, SecurityUtils.getUserId()
+            ));
         }
-        if (null != keyword) {
+        if (keyword != null && !keyword.isEmpty()) {
             wrapper.like(Client::getClientName, keyword)
-                    .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getMobile, keyword))
-                    .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getLinkMan, keyword));
+                    .or(w1 -> w1.like(Client::getMobile, keyword))
+                    .or(w2 -> w2.like(Client::getLinkMan, keyword));
         }
-        return ResponseUtil.successPage(clientService.list(wrapper));
+        List<Client> clientList = clientService.list(wrapper);
+        List<ClientDto> clientDtoList = new ArrayList<>();
+
+        for (Client demo : clientList) {
+            ClientDto clientDto = new ClientDto();
+            BeanUtil.copyProperties(demo, clientDto);
+            ClientRoleRelation one = clientRoleRelationService.getOne(Wrappers.lambdaQuery(ClientRoleRelation.class)
+                    .eq(ClientRoleRelation::getClientId, demo.getId()));
+
+            if (one != null) {
+                clientDto.setRoleId(one.getRoleId());
+            }
+            clientDtoList.add(clientDto);
+
+        }
+        return ResponseUtil.successPage(clientDtoList);
     }
 
     @AnonymousAccess
     @PostMapping(value = "/login")
-    public ResponseVO<Object> longin(@RequestBody @Validated AdminLoginParam loginParam) {
+    public ResponseVO<Object> longin(HttpServletRequest request, @RequestBody @Validated AdminLoginParam loginParam) {
         Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getClientName, loginParam.getUsername()).last("limit 1"));
         if (client == null) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
         }
+        String s = RedisUtils.getBean().get(loginParam.getKey());
+        System.out.println(s+"===========================");
+        if (!loginParam.getVlue().equals(s)) {
+            return ResponseUtil.error(ResponseStatusEnums.BAD_AUTHENTICATION.getCode(), ResponseStatusEnums.BAD_AUTHENTICATION.getMessage());
+        }
+        RedisUtils.getBean().delete(loginParam.getKey());
         if (!passwordEncoder.matches(loginParam.getPassword(), client.getPassword())) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
         }

--
Gitblit v1.9.3