From a2f23bc97d133bcf7b950cd269eda577be4c0cac Mon Sep 17 00:00:00 2001
From: chenjiantian <214228265@qq.com>
Date: 星期一, 17 一月 2022 17:57:44 +0800
Subject: [PATCH] token优化

---
 ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java |   36 ++++++++++++++++++------------------
 1 files changed, 18 insertions(+), 18 deletions(-)

diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
index ecd6c94..d076174 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
@@ -10,9 +10,11 @@
 import com.sandu.common.enums.ResponseStatusEnums;
 import com.sandu.common.execption.BusinessException;
 import com.sandu.common.object.BaseConditionVO;
+import com.sandu.common.security.LoginUserInfo;
 import com.sandu.common.security.annotation.AnonymousAccess;
 import com.sandu.common.security.config.SecurityProperties;
-import com.sandu.common.security.jwt.JwtTokenProvider;
+import com.sandu.common.security.token.TokenProvider;
+import com.sandu.common.util.IpUtil;
 import com.sandu.common.util.ResponseUtil;
 import com.sandu.ximon.admin.dto.AdminJwtUser;
 import com.sandu.ximon.admin.param.AdminLoginParam;
@@ -26,9 +28,6 @@
 import com.sandu.ximon.dao.enums.AdministratorEnums;
 import lombok.AllArgsConstructor;
 import lombok.extern.slf4j.Slf4j;
-import org.springframework.security.access.prepost.PreAuthorize;
-import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
-import org.springframework.security.core.context.SecurityContextHolder;
 import org.springframework.security.core.userdetails.UserDetails;
 import org.springframework.security.crypto.password.PasswordEncoder;
 import org.springframework.web.bind.annotation.*;
@@ -56,7 +55,7 @@
     private final PasswordEncoder passwordEncoder;
     private final AdminService adminService;
     private final RoleService roleService;
-    private final JwtTokenProvider tokenProvider;
+    private final TokenProvider tokenProvider;
 
 
     @AnonymousAccess
@@ -70,16 +69,22 @@
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
         }
         UserDetails userJwtUser = new AdminJwtUser(admin, roleService.mapToGrantedAuthorities(admin.getId()));
-        if(!userJwtUser.isEnabled()){
+        if (!userJwtUser.isEnabled()) {
             return ResponseUtil.error(ResponseStatusEnums.DISABLE_ACCOUNT.getCode(), ResponseStatusEnums.DISABLE_ACCOUNT.getMessage());
         }
-        UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(userJwtUser, AdministratorEnums.ADMIN.getCode(), userJwtUser.getAuthorities());
 
-        SecurityContextHolder.getContext().setAuthentication(authentication);
+        LoginUserInfo loginUserInfo = new LoginUserInfo();
+        loginUserInfo.setUserId(admin.getId());
+        loginUserInfo.setName(admin.getNickName());
+        loginUserInfo.setAccount(admin.getUsername());
+        loginUserInfo.setStatus(admin.getStatus());
+        loginUserInfo.setIp(IpUtil.getRealIp());
+        loginUserInfo.setAdministratorType(AdministratorEnums.ADMIN.getCode());
+        loginUserInfo.setPermission("tenant");
+
 
         // 鐢熸垚浠ょ墝
-        String token = tokenProvider.createToken(authentication);
-        final AdminJwtUser jwtUser = (AdminJwtUser) authentication.getPrincipal();
+        String token = tokenProvider.createToken(loginUserInfo);
 
         // 鏇存柊鏈�鍚庣櫥褰曟椂闂�
         Admin update = new Admin();
@@ -90,25 +95,20 @@
         // 杩斿洖 token 涓� 鐢ㄦ埛淇℃伅
         Map<String, Object> authInfo = new HashMap<String, Object>(2) {{
             put("token", properties.getTokenStartWith() + token);
-            put("user", jwtUser);
+            put("user", admin);
         }};
-//        if (singleLogin) {
-//            //韪㈡帀涔嬪墠宸茬粡鐧诲綍鐨則oken
-//            onlineUserService.checkLoginOnUser(authUser.getUsername(), token);
-//        }
         return ResponseUtil.success(authInfo);
     }
 
     @GetMapping(value = "/info")
     public ResponseVO<Object> getUserInfo() {
-        Integer administratorIdentity = SecurityUtils.getAdministratorIdentity();
         Long userId = SecurityUtils.getUserId();
         Admin admin = adminService.getById(userId);
         List<Role> roles = roleService.listByAdminId(admin.getId());
         List<Menu> menus = menuService.listByRoleIds(roles.stream().map(Role::getId).collect(Collectors.toList()));
         MapBuilder<Object, Object> builder = MapUtil.builder().put("info", admin);
-        if(CollectionUtil.isNotEmpty(menus)){
-        List<Menu> collect = menus.stream().filter(menu -> menu.getType() == 0).collect(Collectors.toList());
+        if (CollectionUtil.isNotEmpty(menus)) {
+            List<Menu> collect = menus.stream().filter(menu -> menu.getType() == 0).collect(Collectors.toList());
             builder.put("menus", collect);
         }
         return ResponseUtil.success(builder.build());

--
Gitblit v1.9.3