From ccbea7d2449cfbfaa24907547a65ff70a124f9e7 Mon Sep 17 00:00:00 2001
From: zhanzhiqin <895896009@qq.com>
Date: 星期四, 14 四月 2022 14:19:24 +0800
Subject: [PATCH] fix
---
ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java | 237 +++++++++++++++++++++++++++++++++++-----------------------
1 files changed, 143 insertions(+), 94 deletions(-)
diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
index 2d9a184..49b96c0 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
@@ -1,5 +1,6 @@
package com.sandu.ximon.admin.controller;
+import cn.hutool.core.bean.BeanUtil;
import cn.hutool.core.collection.CollectionUtil;
import cn.hutool.core.map.MapBuilder;
import cn.hutool.core.map.MapUtil;
@@ -7,58 +8,59 @@
import com.baomidou.mybatisplus.core.toolkit.Wrappers;
import com.github.pagehelper.PageHelper;
import com.sandu.common.domain.ResponseVO;
+import com.sandu.common.enums.AdminStatusStatus;
import com.sandu.common.enums.ResponseStatusEnums;
import com.sandu.common.execption.BusinessException;
+import com.sandu.common.log.Log;
import com.sandu.common.object.BaseConditionVO;
+import com.sandu.common.security.LoginUserInfo;
import com.sandu.common.security.annotation.AnonymousAccess;
import com.sandu.common.security.config.SecurityProperties;
-import com.sandu.common.security.jwt.JwtTokenProvider;
+import com.sandu.common.security.token.TokenProvider;
+import com.sandu.common.util.IpUtil;
import com.sandu.common.util.ResponseUtil;
-import com.sandu.ximon.admin.dto.AdminJwtUser;
+import com.sandu.ximon.admin.dto.AdminDto;
+import com.sandu.ximon.admin.dto.ClientDto;
import com.sandu.ximon.admin.param.AdminLoginParam;
+import com.sandu.ximon.admin.param.AdminParam;
+import com.sandu.ximon.admin.param.PwdParam;
+import com.sandu.ximon.admin.param.ReceiveParam;
import com.sandu.ximon.admin.security.SecurityUtils;
-import com.sandu.ximon.admin.service.AdminService;
-import com.sandu.ximon.admin.service.MenuService;
-import com.sandu.ximon.admin.service.RoleService;
-import com.sandu.ximon.dao.domain.Admin;
-import com.sandu.ximon.dao.domain.Menu;
-import com.sandu.ximon.dao.domain.Role;
+import com.sandu.ximon.admin.service.*;
+import com.sandu.ximon.dao.domain.*;
import com.sandu.ximon.dao.enums.AdministratorEnums;
import lombok.AllArgsConstructor;
import lombok.extern.slf4j.Slf4j;
-import org.springframework.security.access.prepost.PreAuthorize;
-import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
-import org.springframework.security.core.context.SecurityContextHolder;
-import org.springframework.security.core.userdetails.UserDetails;
+import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.crypto.password.PasswordEncoder;
+import org.springframework.validation.annotation.Validated;
import org.springframework.web.bind.annotation.*;
import java.time.LocalDateTime;
-import java.util.Collections;
-import java.util.HashMap;
-import java.util.List;
-import java.util.Map;
+import java.util.*;
import java.util.stream.Collectors;
/**
- * @author hupeng
- * @date 2018-11-23
- * 鎺堟潈銆佹牴鎹畉oken鑾峰彇鐢ㄦ埛璇︾粏淇℃伅
+ * @author chenjiantian
+ * @date 2022/1/18 16:04
+ * 绠$悊鍛樻帶鍒剁被
*/
@Slf4j
@RestController
@AllArgsConstructor
-@RequestMapping("v1/admin")
+@RequestMapping("/v1/admin")
public class AdminController {
private final SecurityProperties properties;
private final MenuService menuService;
private final PasswordEncoder passwordEncoder;
private final AdminService adminService;
+ private final ClientService clientService;
private final RoleService roleService;
- private final JwtTokenProvider tokenProvider;
+ private final TokenProvider tokenProvider;
+ private final AdminRoleRelationService adminRoleRelationService;
-
+ @Log("鍚庡彴鐢ㄦ埛鐧诲綍")
@AnonymousAccess
@PostMapping(value = "/login")
public ResponseVO<Object> login(@RequestBody AdminLoginParam loginParam) {
@@ -69,17 +71,23 @@
if (!passwordEncoder.matches(loginParam.getPassword(), admin.getPassword())) {
return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
}
- UserDetails userJwtUser = new AdminJwtUser(admin, roleService.mapToGrantedAuthorities(admin.getId()));
- if(!userJwtUser.isEnabled()){
+ if (AdminStatusStatus.DISABLE.getCode().equals(admin.getStatus())) {
return ResponseUtil.error(ResponseStatusEnums.DISABLE_ACCOUNT.getCode(), ResponseStatusEnums.DISABLE_ACCOUNT.getMessage());
}
- UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken(userJwtUser, AdministratorEnums.ADMIN.getCode(), userJwtUser.getAuthorities());
- SecurityContextHolder.getContext().setAuthentication(authentication);
+ Collection<GrantedAuthority> grantedAuthorities = roleService.mapToGrantedAuthorities(admin.getId(), true);
+
+ LoginUserInfo loginUserInfo = new LoginUserInfo();
+ loginUserInfo.setUserId(admin.getId());
+ loginUserInfo.setName(admin.getNickName());
+ loginUserInfo.setAccount(admin.getUsername());
+ loginUserInfo.setStatus(admin.getStatus());
+ loginUserInfo.setIp(IpUtil.getRealIp());
+ loginUserInfo.setAdministratorType(AdministratorEnums.ADMIN.getCode());
+ loginUserInfo.setPermission(grantedAuthorities.stream().map(GrantedAuthority::getAuthority).collect(Collectors.joining(",")));
// 鐢熸垚浠ょ墝
- String token = tokenProvider.createToken(authentication);
- final AdminJwtUser jwtUser = (AdminJwtUser) authentication.getPrincipal();
+ String token = tokenProvider.createToken(loginUserInfo);
// 鏇存柊鏈�鍚庣櫥褰曟椂闂�
Admin update = new Admin();
@@ -90,30 +98,41 @@
// 杩斿洖 token 涓� 鐢ㄦ埛淇℃伅
Map<String, Object> authInfo = new HashMap<String, Object>(2) {{
put("token", properties.getTokenStartWith() + token);
- put("user", jwtUser);
+ put("user", admin);
}};
-// if (singleLogin) {
-// //韪㈡帀涔嬪墠宸茬粡鐧诲綍鐨則oken
-// onlineUserService.checkLoginOnUser(authUser.getUsername(), token);
-// }
return ResponseUtil.success(authInfo);
}
+ // @Log("鍚庡彴鐢ㄦ埛淇℃伅")
@GetMapping(value = "/info")
public ResponseVO<Object> getUserInfo() {
- Integer administratorIdentity = SecurityUtils.getAdministratorIdentity();
Long userId = SecurityUtils.getUserId();
- Admin admin = adminService.getById(userId);
- List<Role> roles = roleService.listByAdminId(admin.getId());
+ List<Role> roles;
+ MapBuilder<Object, Object> builder;
+ if (AdministratorEnums.ADMIN.getCode().equals(SecurityUtils.getAdministratorIdentity())
+ || AdministratorEnums.CUSTOMER.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
+ Admin admin = adminService.getById(userId);
+ roles = roleService.listByAdminId(admin.getId());
+ builder = MapUtil.builder().put("admin", admin);
+
+ } else {
+ Client client = clientService.getById(userId);
+ roles = roleService.listByClientId(client.getId());
+ builder = MapUtil.builder().put("admin", client);
+
+ }
+ if (CollectionUtil.isEmpty(roles)) {
+ return ResponseUtil.fail("鐢ㄦ埛娌℃湁瑙掕壊锛屾棤娉曡幏鍙栨暟鎹�");
+ }
List<Menu> menus = menuService.listByRoleIds(roles.stream().map(Role::getId).collect(Collectors.toList()));
- MapBuilder<Object, Object> builder = MapUtil.builder().put("info", admin);
- if(CollectionUtil.isNotEmpty(menus)){
- List<Menu> collect = menus.stream().filter(menu -> menu.getType() == 0).collect(Collectors.toList());
+ if (CollectionUtil.isNotEmpty(menus)) {
+ List<Menu> collect = menus.stream().filter(menu -> menu.getType() == 0 || menu.getType() == 1).collect(Collectors.toList());
builder.put("menus", collect);
}
return ResponseUtil.success(builder.build());
}
+ @Log("鍚庡彴鐢ㄦ埛鍒楄〃")
@GetMapping(value = "/list")
public ResponseVO<Object> listAdmin(BaseConditionVO baseConditionVO, @RequestParam(value = "keyword", required = false) String keyword) {
PageHelper.startPage(baseConditionVO.getPageNo(), baseConditionVO.getPageSize());
@@ -125,36 +144,63 @@
});
}
List<Admin> list = adminService.list(wrapper);
- return ResponseUtil.successPage(list);
+
+ List<AdminDto> adminDtoList = new ArrayList<>();
+ for (Admin demo : list) {
+ AdminDto adminDto = new AdminDto();
+ BeanUtil.copyProperties(demo, adminDto);
+ AdminRoleRelation one = adminRoleRelationService.getOne(Wrappers.lambdaQuery(AdminRoleRelation.class)
+ .eq(AdminRoleRelation::getAdminId, demo.getId()));
+
+ if (one != null) {
+ adminDto.setRoleId(one.getRoleId());
+ }
+ adminDtoList.add(adminDto);
+
+ }
+ return ResponseUtil.successPage(adminDtoList);
}
-// @PreAuthorize("@el.check('admin:add')")
-// @PostMapping("/register")
-// public ResponseVO<Object> register(@Validated @RequestBody AdminParam adminParam) {
-// Admin admin = adminService.register(adminParam);
-// return ResponseUtil.success(admin);
-// }
+ @Log("鍚庡彴鐢ㄦ埛娉ㄥ唽")
+ @PostMapping("/register")
+ public ResponseVO<Object> register(@Validated @RequestBody AdminParam param) {
+ boolean result = adminService.register(param);
+ if (result) {
+ return ResponseUtil.success("娉ㄥ唽鐢ㄦ埛鎴愬姛");
+ } else {
+ return ResponseUtil.fail("娉ㄥ唽鐢ㄦ埛澶辫触");
+ }
+ }
-// /**
-// * 淇敼绠$悊鍛樹俊鎭�
-// *
-// * @param resources
-// * @return
-// */
-// @PutMapping("/{id}")
// @PreAuthorize("@el.check('admin:edit')")
-// public ResponseVO<Object> update(@RequestBody AdminParam resources, @PathVariable Long id) {
-// checkLevel(id);
-// adminService.updateAdmin(id, resources);
-// return ResponseUtil.success(null);
-// }
-//
-// @PutMapping("/updatePassword")
-// public ResponseVO<Object> updatePassword(@Validated @RequestBody PwdParam param) {
-// Long userId = SecurityUtils.getUserId();
-// adminService.updatePassword(userId, param);
-// return ResponseUtil.success(null);
-// }
+
+ /**
+ * 淇敼绠$悊鍛樹俊鎭�
+ */
+ @Log("鍚庡彴鐢ㄦ埛淇敼淇℃伅")
+ @PostMapping("/update/{adminId}")
+ public ResponseVO<Object> updateAdmin(@RequestBody AdminParam param, @PathVariable Long adminId) {
+ boolean result = adminService.updateAdmin(adminId, param);
+ if (result) {
+ return ResponseUtil.success("淇敼鎴愬姛");
+ } else {
+ return ResponseUtil.fail("淇敼澶辫触");
+ }
+ }
+
+ /**
+ * 淇敼鎴戠殑瀵嗙爜
+ */
+ @Log("鍚庡彴鐢ㄦ埛淇敼瀵嗙爜")
+ @PutMapping("/updateMyPassword")
+ public ResponseVO<Object> updateMyPassword(@Validated @RequestBody PwdParam param) {
+ boolean result = adminService.updateMyPassword(param);
+ if (result) {
+ return ResponseUtil.success("淇敼鎴愬姛");
+ } else {
+ return ResponseUtil.fail("淇敼澶辫触");
+ }
+ }
// @PutMapping("/updateStatus/{id}")
// public ResponseVO<Object> updateStatus(@PathVariable Long id, @RequestParam(value = "status") Integer status) {
@@ -166,13 +212,38 @@
// return ResponseUtil.success(null);
// }
-// @DeleteMapping("/{id}")
-// @PreAuthorize("@el.check('admin:del')")
-// public ResponseVO<Object> delete(@PathVariable Long id) {
-// checkLevel(id);
-// adminService.deleteAdmin(id);
-// return ResponseUtil.success(null);
-// }
+ @Log("鍚庡彴鐢ㄦ埛鍒犻櫎")
+ @PostMapping("/del/{adminId}")
+ public ResponseVO<Object> deleteAdmin(@PathVariable Long adminId) {
+ boolean result = adminService.deleteAdmin(adminId);
+ if (result) {
+ return ResponseUtil.success("淇敼鎴愬姛");
+ } else {
+ return ResponseUtil.fail("淇敼澶辫触");
+ }
+ }
+
+ @Log("鐢ㄦ埛淇敼澶村儚")
+ @PostMapping("/updateIcon")
+ public ResponseVO<Object> updateIcon(@RequestBody ReceiveParam receiveParam) {
+ if (receiveParam.getIconUrl().trim() == null) {
+ throw new BusinessException("澶村儚URL涓嶈兘涓虹┖锛�");
+ }
+ boolean result;
+ //鏅�氱敤鎴蜂慨鏀瑰ご鍍�
+ if (SecurityUtils.getAdministratorIdentity().equals(AdministratorEnums.NORMAL.getCode())) {
+ result = clientService.updateIcon(SecurityUtils.getUserId(), receiveParam.getIconUrl());
+ } else {
+ //瓒呯骇绠$悊鍛樸�佺鐞嗗憳淇敼澶村儚
+ result = adminService.updateIcon(SecurityUtils.getUserId(), receiveParam.getIconUrl());
+ }
+
+ if (result) {
+ return ResponseUtil.success("淇敼鎴愬姛");
+ } else {
+ return ResponseUtil.fail("淇敼澶辫触");
+ }
+ }
// /**
// * 缁欑鐞嗗憳鍒嗛厤瑙掕壊
@@ -188,28 +259,6 @@
// return ResponseUtil.success("");
// }
- /**
- * 濡傛灉褰撳墠鐢ㄦ埛鐨勮鑹茬骇鍒綆浜庡垱寤虹敤鎴风殑瑙掕壊绾у埆锛屽垯鎶涘嚭鏉冮檺涓嶈冻鐨勯敊璇�
- *
- * @param updateId 琚搷浣滀汉鐨刬d
- */
- private void checkLevel(Long updateId) {
- Admin admin = adminService.findByUserName(SecurityUtils.getUsername());
- // 鑾峰彇鎿嶄綔鑰呮渶澶ф潈闄�
- Integer currentLevel = Collections.min(roleService.listByAdminId(admin.getId()).stream().map(Role::getLevel).collect(Collectors.toList()));
- // 鑾峰彇琚紪杈戜汉鐨勬渶澶ф潈闄�
- List<Integer> optList = roleService.listByAdminId(updateId).stream().map(Role::getLevel).collect(Collectors.toList());
- // 娌℃潈闄� 闅忎究鎿嶄綔
- if (CollectionUtil.isEmpty(optList)) {
- return;
- }
- Integer optLevel = Collections.min(optList);
- if (optLevel != null) {
- if (currentLevel > optLevel) {
- throw new BusinessException("鏉冮檺涓嶈冻锛屼綘鐨勮鑹茬骇鍒細" + currentLevel + "锛屼綆浜庢搷浣滅殑瑙掕壊绾у埆锛�" + optLevel);
- }
- }
- }
// /**
// * 缂栬緫鎴戠殑淇℃伅
--
Gitblit v1.9.3