From 781564409e34d9881e3f27ebc110161e4232f5ed Mon Sep 17 00:00:00 2001
From: liuhaonan <31457034@qq.com>
Date: 星期三, 11 五月 2022 17:32:15 +0800
Subject: [PATCH] 客户新增优化

---
 ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java |  172 +++++++++++++++++++++++++++++++++++++++++++++++++--------
 1 files changed, 148 insertions(+), 24 deletions(-)

diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
index 94aa0d8..ae372e9 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
@@ -1,20 +1,45 @@
 package com.sandu.ximon.admin.controller;
 
+import cn.hutool.core.bean.BeanUtil;
 import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper;
 import com.baomidou.mybatisplus.core.toolkit.Wrappers;
 import com.github.pagehelper.PageHelper;
 import com.sandu.common.domain.ResponseVO;
+import com.sandu.common.enums.ResponseStatusEnums;
+import com.sandu.common.execption.BusinessException;
+import com.sandu.common.log.Log;
 import com.sandu.common.object.BaseConditionVO;
+import com.sandu.common.security.LoginUserInfo;
+import com.sandu.common.security.annotation.AnonymousAccess;
+import com.sandu.common.security.config.SecurityProperties;
+import com.sandu.common.security.token.TokenProvider;
+import com.sandu.common.util.IpUtil;
 import com.sandu.common.util.ResponseUtil;
-import com.sandu.ximon.admin.context.CustomerInspectContextHolder;
-import com.sandu.ximon.admin.param.ClientPrarm;
+import com.sandu.ximon.admin.dto.ClientDto;
+import com.sandu.ximon.admin.param.AddClientPrarm;
+import com.sandu.ximon.admin.param.AdminLoginParam;
+import com.sandu.ximon.admin.param.UpdateClientPrarm;
+import com.sandu.ximon.admin.param.UserPwsParm;
+import com.sandu.ximon.admin.security.PermissionConfig;
 import com.sandu.ximon.admin.security.SecurityUtils;
+import com.sandu.ximon.admin.service.ClientRoleRelationService;
 import com.sandu.ximon.admin.service.ClientService;
+import com.sandu.ximon.admin.service.RoleService;
+import com.sandu.ximon.admin.utils.RedisUtils;
 import com.sandu.ximon.dao.domain.Client;
+import com.sandu.ximon.dao.domain.ClientRoleRelation;
 import com.sandu.ximon.dao.enums.AdministratorEnums;
+import com.sandu.ximon.dao.enums.MenuEnum;
 import lombok.AllArgsConstructor;
+import org.springframework.security.core.GrantedAuthority;
+import org.springframework.security.crypto.password.PasswordEncoder;
 import org.springframework.validation.annotation.Validated;
 import org.springframework.web.bind.annotation.*;
+
+import javax.servlet.http.HttpServletRequest;
+import java.time.LocalDateTime;
+import java.util.*;
+import java.util.stream.Collectors;
 
 /**
  * 瀹㈡埛妯″潡
@@ -24,11 +49,20 @@
 @RequestMapping("v1/client")
 public class ClientController {
 
+    private final SecurityProperties properties;
     private final ClientService clientService;
+    private final PasswordEncoder passwordEncoder;
+    private final RoleService roleService;
+    private final ClientRoleRelationService clientRoleRelationService;
+    private final TokenProvider tokenProvider;
+    private PermissionConfig permissionConfig;
 
     @PostMapping("/add")
-    public ResponseVO<Object> addClient(@RequestBody @Validated ClientPrarm clientPrarm) {
-        boolean b = clientService.addClient(clientPrarm);
+    public ResponseVO<Object> addClient(@RequestBody @Validated AddClientPrarm addClientPrarm) {
+//        if (!permissionConfig.check(MenuEnum.CLIENT_ADD.getCode())) {
+//            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+//        }
+        boolean b = clientService.addClient(addClientPrarm);
         if (b) {
             return ResponseUtil.success("娣诲姞鎴愬姛");
         } else {
@@ -38,8 +72,11 @@
 
 
     @PostMapping("/update/{id}")
-    public ResponseVO<Object> updateClient(@PathVariable Long id, @RequestBody @Validated ClientPrarm clientPrarm) {
-        boolean b = clientService.updateClient(id, clientPrarm);
+    public ResponseVO<Object> updateClient(@PathVariable Long id, @RequestBody @Validated UpdateClientPrarm updateClientPrarm) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_INFO_UPDATE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
+        boolean b = clientService.updateClient(id, updateClientPrarm);
         if (b) {
             return ResponseUtil.success("鏇存柊鎴愬姛");
         } else {
@@ -47,8 +84,43 @@
         }
     }
 
+    /**
+     * 淇敼鏅�氱敤鎴风殑瀵嗙爜
+     */
+    @Log("淇敼鏅�氱敤鎴风殑瀵嗙爜")
+    @PostMapping("/updateClientPassword")
+    public ResponseVO<Object> updateClientPassword(@Validated @RequestBody UserPwsParm param) {
+        boolean result;
+
+        //瓒呯鐩存帴淇敼
+        if (SecurityUtils.getUserDetails().getAdministratorType().equals(AdministratorEnums.ADMIN.getCode())) {
+            result = clientService.updateAdminPassword(param);
+        } else {
+            //褰撳墠鐧诲綍璐﹀彿ID
+            Long userId = SecurityUtils.getUserId();
+            //瑕佷慨瑕佸瘑鐮佺殑鐢ㄦ埛鐨勪笂绾D
+            Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getId, param.getUserid()));
+            //涓哄叾涓嬪睘鎵嶈兘淇敼
+            if (client != null && userId.equals(client.getSuperiorId())) {
+                result = clientService.updateAdminPassword(param);
+            } else {
+                throw new BusinessException("闈炶秴绾х鐞嗗憳鎴栬鐢ㄦ埛涓嶆槸鎮ㄤ笅灞炵敤鎴凤紝鏃犳硶淇敼瀵嗙爜锛�");
+            }
+        }
+
+        if (result) {
+            return ResponseUtil.success("淇敼鎴愬姛");
+        } else {
+            return ResponseUtil.fail("淇敼澶辫触");
+        }
+
+    }
+
     @PostMapping("/delete/{id}")
     public ResponseVO<Object> deleteClient(@PathVariable Long id) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_DELETE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean b = clientService.deleteClient(id);
         if (b) {
             return ResponseUtil.success("鍒犻櫎鎴愬姛");
@@ -57,30 +129,82 @@
         }
     }
 
-
-  /*  @GetMapping("/list")
-    public ResponseVO<Object> listClient(BaseConditionVO baseConditionVO) {
-        PageHelper.startPage(baseConditionVO.getPageNo(), baseConditionVO.getPageSize());
-        if(AdministratorEnums.CUSTOMER.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
-            return ResponseUtil.success(clientService.clientList(SecurityUtils.getUserId(),baseConditionVO));
-            //   }else if("0".equals(SecurityUtils.getAdministratorIdentity())){
-        }else {
-            return ResponseUtil.successPage(clientService.list());
-        }
-    }*/
-
     @GetMapping("/list")
     public ResponseVO<Object> listLikeClient(BaseConditionVO baseConditionVO, @RequestParam(value = "keyword", required = false) String keyword) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_LIST.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
+
         PageHelper.startPage(baseConditionVO.getPageNo(), baseConditionVO.getPageSize());
         LambdaQueryWrapper<Client> wrapper = Wrappers.lambdaQuery(Client.class);
-        if (AdministratorEnums.CUSTOMER.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
-            wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId());
+        if (AdministratorEnums.NORMAL.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
+            wrapper.eq(Client::getSuperiorId, SecurityUtils.getUserId()).or(w -> w.eq(
+                    Client::getId, SecurityUtils.getUserId()
+            ));
         }
-        if (null != keyword) {
+        if (keyword != null && !keyword.isEmpty()) {
             wrapper.like(Client::getClientName, keyword)
-                    .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getMobile, keyword))
-                    .or(clientLambdaQueryWrapper -> clientLambdaQueryWrapper.like(Client::getLinkMan, keyword));
+                    .or(w1 -> w1.like(Client::getMobile, keyword))
+                    .or(w2 -> w2.like(Client::getLinkMan, keyword));
         }
-        return ResponseUtil.successPage(clientService.list(wrapper));
+        List<Client> clientList = clientService.list(wrapper);
+        List<ClientDto> clientDtoList = new ArrayList<>();
+
+        for (Client demo : clientList) {
+            ClientDto clientDto = new ClientDto();
+            BeanUtil.copyProperties(demo, clientDto);
+            ClientRoleRelation one = clientRoleRelationService.getOne(Wrappers.lambdaQuery(ClientRoleRelation.class)
+                    .eq(ClientRoleRelation::getClientId, demo.getId()));
+
+            if (one != null) {
+                clientDto.setRoleId(one.getRoleId());
+            }
+            clientDtoList.add(clientDto);
+
+        }
+        return ResponseUtil.successPage(clientDtoList);
+    }
+
+    @AnonymousAccess
+    @PostMapping(value = "/login")
+    public ResponseVO<Object> longin(HttpServletRequest request, @RequestBody @Validated AdminLoginParam loginParam) {
+        Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getClientName, loginParam.getUsername()).last("limit 1"));
+        if (client == null) {
+            return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
+        }
+        String s = RedisUtils.getBean().get(loginParam.getKey());
+        System.out.println(s+"===========================");
+        if (!loginParam.getVlue().equals(s)) {
+            return ResponseUtil.error(ResponseStatusEnums.BAD_AUTHENTICATION.getCode(), ResponseStatusEnums.BAD_AUTHENTICATION.getMessage());
+        }
+        RedisUtils.getBean().delete(loginParam.getKey());
+        if (!passwordEncoder.matches(loginParam.getPassword(), client.getPassword())) {
+            return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
+        }
+
+        Collection<GrantedAuthority> grantedAuthorities = roleService.mapToGrantedAuthorities(client.getId(), false);
+
+        LoginUserInfo loginUserInfo = new LoginUserInfo();
+        loginUserInfo.setUserId(client.getId());
+        loginUserInfo.setAccount(client.getClientName());
+        loginUserInfo.setIp(IpUtil.getRealIp());
+        loginUserInfo.setAdministratorType(AdministratorEnums.NORMAL.getCode());
+        loginUserInfo.setPermission(grantedAuthorities.stream().map(GrantedAuthority::getAuthority).collect(Collectors.joining(",")));
+
+        // 鐢熸垚浠ょ墝
+        String token = tokenProvider.createToken(loginUserInfo);
+
+        // 鏇存柊鏈�鍚庣櫥褰曟椂闂�
+        Client update = new Client();
+        update.setId(client.getId());
+        update.setLoginTime(LocalDateTime.now());
+        clientService.updateById(update);
+
+        // 杩斿洖 token 涓� 鐢ㄦ埛淇℃伅
+        Map<String, Object> authInfo = new HashMap<String, Object>(2) {{
+            put("token", properties.getTokenStartWith() + token);
+            put("user", client);
+        }};
+        return ResponseUtil.success(authInfo);
     }
 }

--
Gitblit v1.9.3