From 763789a6797ffe6ab09b4e2a35ed4a8d4a3b29c5 Mon Sep 17 00:00:00 2001
From: liuhaonan <konodioda2333@vip.qq.com>
Date: 星期一, 25 四月 2022 14:51:43 +0800
Subject: [PATCH] 验证码实现

---
 ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java |   65 +++++++++++++++++++++++++-------
 1 files changed, 50 insertions(+), 15 deletions(-)

diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
index fbd3bd6..d55ae98 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
@@ -1,11 +1,14 @@
 package com.sandu.ximon.admin.controller;
 
 import cn.hutool.core.bean.BeanUtil;
+import cn.hutool.core.util.StrUtil;
 import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper;
 import com.baomidou.mybatisplus.core.toolkit.Wrappers;
 import com.github.pagehelper.PageHelper;
 import com.sandu.common.domain.ResponseVO;
 import com.sandu.common.enums.ResponseStatusEnums;
+import com.sandu.common.execption.BusinessException;
+import com.sandu.common.log.Log;
 import com.sandu.common.object.BaseConditionVO;
 import com.sandu.common.security.LoginUserInfo;
 import com.sandu.common.security.annotation.AnonymousAccess;
@@ -14,10 +17,8 @@
 import com.sandu.common.util.IpUtil;
 import com.sandu.common.util.ResponseUtil;
 import com.sandu.ximon.admin.dto.ClientDto;
-import com.sandu.ximon.admin.param.AddClientPrarm;
-import com.sandu.ximon.admin.param.AdminLoginParam;
-import com.sandu.ximon.admin.param.ResetClientPasswordPrarm;
-import com.sandu.ximon.admin.param.UpdateClientPrarm;
+import com.sandu.ximon.admin.param.*;
+import com.sandu.ximon.admin.security.PermissionConfig;
 import com.sandu.ximon.admin.security.SecurityUtils;
 import com.sandu.ximon.admin.service.ClientRoleRelationService;
 import com.sandu.ximon.admin.service.ClientService;
@@ -25,12 +26,14 @@
 import com.sandu.ximon.dao.domain.Client;
 import com.sandu.ximon.dao.domain.ClientRoleRelation;
 import com.sandu.ximon.dao.enums.AdministratorEnums;
+import com.sandu.ximon.dao.enums.MenuEnum;
 import lombok.AllArgsConstructor;
 import org.springframework.security.core.GrantedAuthority;
 import org.springframework.security.crypto.password.PasswordEncoder;
 import org.springframework.validation.annotation.Validated;
 import org.springframework.web.bind.annotation.*;
 
+import javax.servlet.http.HttpServletRequest;
 import java.time.LocalDateTime;
 import java.util.*;
 import java.util.stream.Collectors;
@@ -49,6 +52,7 @@
     private final RoleService roleService;
     private final ClientRoleRelationService clientRoleRelationService;
     private final TokenProvider tokenProvider;
+    private PermissionConfig permissionConfig;
 
     @PostMapping("/add")
     public ResponseVO<Object> addClient(@RequestBody @Validated AddClientPrarm addClientPrarm) {
@@ -71,14 +75,36 @@
         }
     }
 
-    @PostMapping("/resetClientPassword")
-    public ResponseVO<Object> resetClientPassword(@RequestBody @Validated ResetClientPasswordPrarm resetClientPasswordPrarm) {
-        boolean b = clientService.resetPassword(resetClientPasswordPrarm);
-        if (b) {
+    /**
+     * 淇敼鏅�氱敤鎴风殑瀵嗙爜
+     */
+    @Log("淇敼鏅�氱敤鎴风殑瀵嗙爜")
+    @PostMapping("/updateClientPassword")
+    public ResponseVO<Object> updateClientPassword(@Validated @RequestBody UserPwsParm param) {
+        boolean result;
+
+        //瓒呯鐩存帴淇敼
+        if (SecurityUtils.getUserDetails().getAdministratorType().equals(AdministratorEnums.ADMIN.getCode())) {
+            result = clientService.updateAdminPassword(param);
+        } else {
+            //褰撳墠鐧诲綍璐﹀彿ID
+            Long userId = SecurityUtils.getUserId();
+            //瑕佷慨瑕佸瘑鐮佺殑鐢ㄦ埛鐨勪笂绾D
+            Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getId, param.getUserid()));
+            //涓哄叾涓嬪睘鎵嶈兘淇敼
+            if (client != null && userId.equals(client.getSuperiorId())) {
+                result = clientService.updateAdminPassword(param);
+            } else {
+                throw new BusinessException("闈炶秴绾х鐞嗗憳鎴栬鐢ㄦ埛涓嶆槸鎮ㄤ笅灞炵敤鎴凤紝鏃犳硶淇敼瀵嗙爜锛�");
+            }
+        }
+
+        if (result) {
             return ResponseUtil.success("淇敼鎴愬姛");
         } else {
             return ResponseUtil.fail("淇敼澶辫触");
         }
+
     }
 
     @PostMapping("/delete/{id}")
@@ -93,15 +119,21 @@
 
     @GetMapping("/list")
     public ResponseVO<Object> listLikeClient(BaseConditionVO baseConditionVO, @RequestParam(value = "keyword", required = false) String keyword) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_LIST.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
+
         PageHelper.startPage(baseConditionVO.getPageNo(), baseConditionVO.getPageSize());
         LambdaQueryWrapper<Client> wrapper = Wrappers.lambdaQuery(Client.class);
-        if (AdministratorEnums.CUSTOMER.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
-            wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId());
+        if (AdministratorEnums.NORMAL.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
+            wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId()).or(w -> w.eq(
+                    Client::getId, SecurityUtils.getUserId()
+            ));
         }
-        if (null != keyword) {
+        if (keyword != null && !keyword.isEmpty()) {
             wrapper.like(Client::getClientName, keyword)
-                    .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getMobile, keyword))
-                    .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getLinkMan, keyword));
+                    .or(w1 -> w1.like(Client::getMobile, keyword))
+                    .or(w2 -> w2.like(Client::getLinkMan, keyword));
         }
         List<Client> clientList = clientService.list(wrapper);
         List<ClientDto> clientDtoList = new ArrayList<>();
@@ -123,10 +155,14 @@
 
     @AnonymousAccess
     @PostMapping(value = "/login")
-    public ResponseVO<Object> longin(@RequestBody @Validated AdminLoginParam loginParam) {
+    public ResponseVO<Object> longin(HttpServletRequest request, @RequestBody @Validated AdminLoginParam loginParam) {
         Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getClientName, loginParam.getUsername()).last("limit 1"));
         if (client == null) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
+        }
+        String session_vcode = (String) request.getSession().getAttribute(loginParam.getKey());
+        if (!StrUtil.equalsIgnoreCase(session_vcode, loginParam.getVlue())) {
+            return ResponseUtil.error(ResponseStatusEnums.BAD_AUTHENTICATION.getCode(), ResponseStatusEnums.BAD_AUTHENTICATION.getMessage());
         }
         if (!passwordEncoder.matches(loginParam.getPassword(), client.getPassword())) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
@@ -138,7 +174,6 @@
         loginUserInfo.setUserId(client.getId());
         loginUserInfo.setAccount(client.getClientName());
         loginUserInfo.setIp(IpUtil.getRealIp());
-        loginUserInfo.setIcon(client.getIcon());
         loginUserInfo.setAdministratorType(AdministratorEnums.NORMAL.getCode());
         loginUserInfo.setPermission(grantedAuthorities.stream().map(GrantedAuthority::getAuthority).collect(Collectors.joining(",")));
 

--
Gitblit v1.9.3