From 9f21969b69703a35bde9d659be19f3e39795010d Mon Sep 17 00:00:00 2001
From: zhanzhiqin <895896009@qq.com>
Date: 星期四, 12 五月 2022 11:58:01 +0800
Subject: [PATCH] fix

---
 ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java |   24 ++++++++++++++++++++++--
 1 files changed, 22 insertions(+), 2 deletions(-)

diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
index 5b89dda..4f1806b 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/ClientController.java
@@ -16,12 +16,16 @@
 import com.sandu.common.util.IpUtil;
 import com.sandu.common.util.ResponseUtil;
 import com.sandu.ximon.admin.dto.ClientDto;
-import com.sandu.ximon.admin.param.*;
+import com.sandu.ximon.admin.param.AddClientPrarm;
+import com.sandu.ximon.admin.param.AdminLoginParam;
+import com.sandu.ximon.admin.param.UpdateClientPrarm;
+import com.sandu.ximon.admin.param.UserPwsParm;
 import com.sandu.ximon.admin.security.PermissionConfig;
 import com.sandu.ximon.admin.security.SecurityUtils;
 import com.sandu.ximon.admin.service.ClientRoleRelationService;
 import com.sandu.ximon.admin.service.ClientService;
 import com.sandu.ximon.admin.service.RoleService;
+import com.sandu.ximon.admin.utils.RedisUtils;
 import com.sandu.ximon.dao.domain.Client;
 import com.sandu.ximon.dao.domain.ClientRoleRelation;
 import com.sandu.ximon.dao.enums.AdministratorEnums;
@@ -32,6 +36,7 @@
 import org.springframework.validation.annotation.Validated;
 import org.springframework.web.bind.annotation.*;
 
+import javax.servlet.http.HttpServletRequest;
 import java.time.LocalDateTime;
 import java.util.*;
 import java.util.stream.Collectors;
@@ -54,6 +59,9 @@
 
     @PostMapping("/add")
     public ResponseVO<Object> addClient(@RequestBody @Validated AddClientPrarm addClientPrarm) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_ADD.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean b = clientService.addClient(addClientPrarm);
         if (b) {
             return ResponseUtil.success("娣诲姞鎴愬姛");
@@ -65,6 +73,9 @@
 
     @PostMapping("/update/{id}")
     public ResponseVO<Object> updateClient(@PathVariable Long id, @RequestBody @Validated UpdateClientPrarm updateClientPrarm) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_INFO_UPDATE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean b = clientService.updateClient(id, updateClientPrarm);
         if (b) {
             return ResponseUtil.success("鏇存柊鎴愬姛");
@@ -107,6 +118,9 @@
 
     @PostMapping("/delete/{id}")
     public ResponseVO<Object> deleteClient(@PathVariable Long id) {
+        if (!permissionConfig.check(MenuEnum.CLIENT_DELETE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean b = clientService.deleteClient(id);
         if (b) {
             return ResponseUtil.success("鍒犻櫎鎴愬姛");
@@ -153,11 +167,17 @@
 
     @AnonymousAccess
     @PostMapping(value = "/login")
-    public ResponseVO<Object> longin(@RequestBody @Validated AdminLoginParam loginParam) {
+    public ResponseVO<Object> longin(HttpServletRequest request, @RequestBody @Validated AdminLoginParam loginParam) {
         Client client = clientService.getOne(Wrappers.lambdaQuery(Client.class).eq(Client::getClientName, loginParam.getUsername()).last("limit 1"));
         if (client == null) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
         }
+        String s = RedisUtils.getBean().get(loginParam.getKey());
+        System.out.println(s+"===========================");
+        if (!loginParam.getVlue().equals(s)) {
+            return ResponseUtil.error(ResponseStatusEnums.BAD_AUTHENTICATION.getCode(), ResponseStatusEnums.BAD_AUTHENTICATION.getMessage());
+        }
+        RedisUtils.getBean().delete(loginParam.getKey());
         if (!passwordEncoder.matches(loginParam.getPassword(), client.getPassword())) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
         }

--
Gitblit v1.9.3