From f214709cf1d896e7c9743f206b7a708f020e5322 Mon Sep 17 00:00:00 2001
From: liuhaonan <31457034@qq.com>
Date: 星期五, 21 十月 2022 17:54:03 +0800
Subject: [PATCH] changes

---
 ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java |  303 +++++++++++++++++++++++++++++++++++--------------
 1 files changed, 215 insertions(+), 88 deletions(-)

diff --git a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
index 0d1ce6e..046456f 100644
--- a/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
+++ b/ximon-admin/src/main/java/com/sandu/ximon/admin/controller/AdminController.java
@@ -3,40 +3,48 @@
 import cn.hutool.core.collection.CollectionUtil;
 import cn.hutool.core.map.MapBuilder;
 import cn.hutool.core.map.MapUtil;
-import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper;
+import cn.hutool.extra.servlet.ServletUtil;
 import com.baomidou.mybatisplus.core.toolkit.Wrappers;
-import com.github.pagehelper.PageHelper;
 import com.sandu.common.domain.ResponseVO;
 import com.sandu.common.enums.AdminStatusStatus;
 import com.sandu.common.enums.ResponseStatusEnums;
+import com.sandu.common.enums.RoleLevelStatus;
 import com.sandu.common.execption.BusinessException;
+import com.sandu.common.log.Log;
 import com.sandu.common.object.BaseConditionVO;
+import com.sandu.common.redis.RedisService;
 import com.sandu.common.security.LoginUserInfo;
-import com.sandu.common.security.annotation.AnonymousAccess;
 import com.sandu.common.security.config.SecurityProperties;
 import com.sandu.common.security.token.TokenProvider;
 import com.sandu.common.util.IpUtil;
 import com.sandu.common.util.ResponseUtil;
-import com.sandu.ximon.admin.param.AdminLoginParam;
-import com.sandu.ximon.admin.param.AdminParam;
-import com.sandu.ximon.admin.param.PwdParam;
+import com.sandu.ximon.admin.param.*;
+import com.sandu.ximon.admin.security.PermissionConfig;
 import com.sandu.ximon.admin.security.SecurityUtils;
-import com.sandu.ximon.admin.service.AdminService;
-import com.sandu.ximon.admin.service.MenuService;
-import com.sandu.ximon.admin.service.RoleService;
-import com.sandu.ximon.dao.domain.Admin;
-import com.sandu.ximon.dao.domain.Menu;
-import com.sandu.ximon.dao.domain.Role;
+import com.sandu.ximon.admin.service.*;
+import com.sandu.ximon.admin.utils.RedisUtils;
+import com.sandu.ximon.admin.utils.StoreOperationRecordsUtils;
+import com.sandu.ximon.dao.bo.MenuNode;
+import com.sandu.ximon.dao.domain.*;
 import com.sandu.ximon.dao.enums.AdministratorEnums;
+import com.sandu.ximon.dao.enums.MenuEnum;
+import eu.bitwalker.useragentutils.Browser;
+import eu.bitwalker.useragentutils.OperatingSystem;
+import eu.bitwalker.useragentutils.UserAgent;
 import lombok.AllArgsConstructor;
 import lombok.extern.slf4j.Slf4j;
+import org.springframework.beans.BeanUtils;
 import org.springframework.security.core.GrantedAuthority;
 import org.springframework.security.crypto.password.PasswordEncoder;
 import org.springframework.validation.annotation.Validated;
 import org.springframework.web.bind.annotation.*;
 
+import javax.servlet.http.HttpServletRequest;
 import java.time.LocalDateTime;
-import java.util.*;
+import java.util.Collection;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
 import java.util.stream.Collectors;
 
 /**
@@ -54,17 +62,24 @@
     private final MenuService menuService;
     private final PasswordEncoder passwordEncoder;
     private final AdminService adminService;
+    private final ClientService clientService;
     private final RoleService roleService;
     private final TokenProvider tokenProvider;
+    private final AdminRoleRelationService adminRoleRelationService;
+    private PermissionConfig permissionConfig;
+    private final RedisService redisService;
 
-
-    @AnonymousAccess
-    @PostMapping(value = "/login")
-    public ResponseVO<Object> login(@RequestBody AdminLoginParam loginParam) {
+    public ResponseVO<Object> login(HttpServletRequest request, AdminLoginParam loginParam) {
         Admin admin = adminService.getOne(Wrappers.lambdaQuery(Admin.class).eq(Admin::getUsername, loginParam.getUsername()).last("limit 1"));
         if (admin == null) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
         }
+        String s = RedisUtils.getBean().get(loginParam.getKey());
+        if (!loginParam.getVlue().equals(s)) {
+            log.error(loginParam.getVlue() + "楠岃瘉鐮�");
+            return ResponseUtil.error(ResponseStatusEnums.BAD_AUTHENTICATION.getCode(), ResponseStatusEnums.BAD_AUTHENTICATION.getMessage());
+        }
+        RedisUtils.getBean().delete(loginParam.getKey());
         if (!passwordEncoder.matches(loginParam.getPassword(), admin.getPassword())) {
             return ResponseUtil.error(ResponseStatusEnums.BAD_CREDENTIALS.getCode(), ResponseStatusEnums.BAD_CREDENTIALS.getMessage());
         }
@@ -72,7 +87,7 @@
             return ResponseUtil.error(ResponseStatusEnums.DISABLE_ACCOUNT.getCode(), ResponseStatusEnums.DISABLE_ACCOUNT.getMessage());
         }
 
-        Collection<GrantedAuthority> grantedAuthorities = roleService.mapToGrantedAuthorities(admin.getId());
+        Collection<GrantedAuthority> grantedAuthorities = roleService.mapToGrantedAuthorities(admin.getId(), true);
 
         LoginUserInfo loginUserInfo = new LoginUserInfo();
         loginUserInfo.setUserId(admin.getId());
@@ -80,7 +95,16 @@
         loginUserInfo.setAccount(admin.getUsername());
         loginUserInfo.setStatus(admin.getStatus());
         loginUserInfo.setIp(IpUtil.getRealIp());
-        loginUserInfo.setAdministratorType(AdministratorEnums.ADMIN.getCode());
+
+        //纭畾鐢ㄦ埛瑙掕壊鏉冮檺
+        AdminRoleRelation adminRoleRelation = adminRoleRelationService.getOne(Wrappers.lambdaQuery(AdminRoleRelation.class).eq(AdminRoleRelation::getAdminId, loginUserInfo.getUserId()));
+        Role role = roleService.getOne(Wrappers.lambdaQuery(Role.class).eq(Role::getId, adminRoleRelation.getRoleId()));
+        if (role != null && role.getLevel().equals(RoleLevelStatus.SUPER.getCode())) {
+            loginUserInfo.setAdministratorType(AdministratorEnums.ADMIN.getCode());
+        } else {
+            loginUserInfo.setAdministratorType(AdministratorEnums.CUSTOMER.getCode());
+        }
+
         loginUserInfo.setPermission(grantedAuthorities.stream().map(GrantedAuthority::getAuthority).collect(Collectors.joining(",")));
 
         // 鐢熸垚浠ょ墝
@@ -95,44 +119,109 @@
         // 杩斿洖 token 涓� 鐢ㄦ埛淇℃伅
         Map<String, Object> authInfo = new HashMap<String, Object>(2) {{
             put("token", properties.getTokenStartWith() + token);
-            put("user", admin);
+            put("admin", admin);
+            put("client", null);
         }};
+
+
+        /**
+         * 鐧诲綍淇℃伅鏃ュ織璁板綍寮�濮�
+         */
+        UserAgent userAgent = UserAgent.parseUserAgentString(request.getHeader("User-Agent"));
+        Browser browser = userAgent.getBrowser();
+        OperatingSystem os = userAgent.getOperatingSystem();
+        String content = "鐢ㄦ埛ID锛�" + admin.getId()
+                + "锛岀敤鎴峰悕锛�" + admin.getUsername()
+                + "锛岀敤鎴风被鍨嬶細绠$悊鍛�"
+                + "锛岀櫥褰旾P鍦板潃锛�" + ServletUtil.getClientIP(request)
+                + "锛屾搷浣滅郴缁燂細" + os
+                + "锛屾祻瑙堝櫒锛�" + browser;
+        StoreOperationRecordsUtils.storeOperationLoginData(admin.getId(), admin.getUsername(), "绠$悊鍛樼櫥褰�", content);
+        /**
+         * 鐧诲綍淇℃伅鏃ュ織璁板綍缁撴潫
+         */
         return ResponseUtil.success(authInfo);
     }
 
+    //    @Log("鍚庡彴鐢ㄦ埛淇℃伅")
     @GetMapping(value = "/info")
     public ResponseVO<Object> getUserInfo() {
+        System.out.println(SecurityUtils.getUserDetails().getAdministratorType() + "         ---------");
         Long userId = SecurityUtils.getUserId();
-        Admin admin = adminService.getById(userId);
-        List<Role> roles = roleService.listByAdminId(admin.getId());
+        List<Role> roles;
+        MapBuilder<Object, Object> builder;
+        if (AdministratorEnums.ADMIN.getCode().equals(SecurityUtils.getAdministratorIdentity())
+                || AdministratorEnums.CUSTOMER.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
+            Admin admin = adminService.getById(userId);
+            roles = roleService.listByAdminId(admin.getId());
+            builder = MapUtil.builder().put("admin", admin);
+
+        } else {
+            Client client = clientService.getById(userId);
+            roles = roleService.listByClientId(client.getId());
+            //涓轰簡淇濇寔杩斿洖鏁版嵁鏍煎紡涓�鑷�
+            Admin admin = new Admin();
+            admin.setId(client.getId());
+            admin.setIcon(client.getIcon());
+            admin.setNickName(client.getLinkMan());
+            admin.setMobile(client.getMobile());
+            admin.setLoginTime(client.getLoginTime());
+            admin.setCreateTime(client.getCreateTime());
+            builder = MapUtil.builder().put("admin", admin);
+
+        }
         if (CollectionUtil.isEmpty(roles)) {
             return ResponseUtil.fail("鐢ㄦ埛娌℃湁瑙掕壊锛屾棤娉曡幏鍙栨暟鎹�");
         }
         List<Menu> menus = menuService.listByRoleIds(roles.stream().map(Role::getId).collect(Collectors.toList()));
-        MapBuilder<Object, Object> builder = MapUtil.builder().put("admin", admin);
         if (CollectionUtil.isNotEmpty(menus)) {
             List<Menu> collect = menus.stream().filter(menu -> menu.getType() == 0 || menu.getType() == 1).collect(Collectors.toList());
-            builder.put("menus", collect);
+
+            List<MenuNode> menuNodeList = collect.stream()
+                    .filter(menu -> menu.getPid().equals(0L))
+                    .map(menu -> covertMenuNode(menu, collect)).collect(Collectors.toList());
+            builder.put("menus", menuNodeList);
         }
         return ResponseUtil.success(builder.build());
     }
 
-    @GetMapping(value = "/list")
-    public ResponseVO<Object> listAdmin(BaseConditionVO baseConditionVO, @RequestParam(value = "keyword", required = false) String keyword) {
-        PageHelper.startPage(baseConditionVO.getPageNo(), baseConditionVO.getPageSize());
-        LambdaQueryWrapper<Admin> wrapper = Wrappers.lambdaQuery(Admin.class);
-        if (keyword != null) {
-            wrapper.like(Admin::getNickName, keyword)
-                    .or(adminLambdaQueryWrapper -> {
-                        adminLambdaQueryWrapper.like(Admin::getUsername, keyword);
-                    });
-        }
-        List<Admin> list = adminService.list(wrapper);
-        return ResponseUtil.successPage(list);
+    @GetMapping(value = "/logout")
+    public ResponseVO<Object> LogOut() {
+        String content = "鐢ㄦ埛鍚嶏細" + SecurityUtils.getUsername();
+        StoreOperationRecordsUtils.storeOperationData(null, null, "鐢ㄧ鐞嗗憳閫�鍑虹櫥褰�", content);
+        String key = String.format("%d_%d", SecurityUtils.getUserDetails().getUserId(), SecurityUtils.getUserDetails().getAdministratorType());
+        redisService.set(key, null);
+        return ResponseUtil.success("閫�鍑虹櫥褰曟垚鍔�");
     }
 
+    private MenuNode covertMenuNode(Menu menu, List<Menu> menuList) {
+        MenuNode node = new MenuNode();
+        BeanUtils.copyProperties(menu, node);
+        List<MenuNode> children = menuList.stream()
+                .filter(subMenu -> subMenu.getPid().equals(menu.getId()))
+                .map(subMenu -> covertMenuNode(subMenu, menuList)).collect(Collectors.toList());
+        node.setChildren(children);
+        return node;
+    }
+
+    @Log("鍚庡彴鐢ㄦ埛鍒楄〃")
+    @GetMapping(value = "/list")
+    public ResponseVO<Object> listAdmin(BaseConditionVO baseConditionVO,
+                                        @RequestParam(value = "keyword", required = false) String keyword,
+                                        @RequestParam(value = "order", required = false) Integer order,
+                                        @RequestParam(value = "seq", required = false) Integer seq) {
+        if (!permissionConfig.check(MenuEnum.ADMIN_LIST.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
+        return ResponseUtil.successPage(adminService.listAdmin(baseConditionVO, keyword, order, seq));
+    }
+
+    @Log("鍚庡彴鐢ㄦ埛娉ㄥ唽")
     @PostMapping("/register")
     public ResponseVO<Object> register(@Validated @RequestBody AdminParam param) {
+        if (!permissionConfig.check(MenuEnum.ADMIN_ADD.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean result = adminService.register(param);
         if (result) {
             return ResponseUtil.success("娉ㄥ唽鐢ㄦ埛鎴愬姛");
@@ -141,13 +230,16 @@
         }
     }
 
-//    @PreAuthorize("@el.check('admin:edit')")
+
     /**
      * 淇敼绠$悊鍛樹俊鎭�
-     *
      */
+    @Log("鍚庡彴鐢ㄦ埛淇敼淇℃伅")
     @PostMapping("/update/{adminId}")
     public ResponseVO<Object> updateAdmin(@RequestBody AdminParam param, @PathVariable Long adminId) {
+        if (!permissionConfig.check(MenuEnum.ADMIN_INFO_UPDATE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
         boolean result = adminService.updateAdmin(adminId, param);
         if (result) {
             return ResponseUtil.success("淇敼鎴愬姛");
@@ -158,12 +250,17 @@
 
     /**
      * 淇敼鎴戠殑瀵嗙爜
-     * @param param
-     * @return
      */
-    @PutMapping("/updateMyPassword")
+    @Log("淇敼褰撳墠鐢ㄦ埛瀵嗙爜")
+    @PostMapping("/updateMyPassword")
     public ResponseVO<Object> updateMyPassword(@Validated @RequestBody PwdParam param) {
-        boolean result = adminService.updateMyPassword(param);
+        boolean result;
+        if (SecurityUtils.getClientId() == null) {
+            result = adminService.updateMyPassword(param);
+        } else {
+            result = clientService.resetPassword(param);
+        }
+
         if (result) {
             return ResponseUtil.success("淇敼鎴愬姛");
         } else {
@@ -171,55 +268,85 @@
         }
     }
 
-//    @PutMapping("/updateStatus/{id}")
-//    public ResponseVO<Object> updateStatus(@PathVariable Long id, @RequestParam(value = "status") Integer status) {
-//        checkLevel(id);
-//        Admin update = new Admin();
-//        update.setId(id);
-//        update.setStatus(status);
-//        adminService.updateById(update);
-//        return ResponseUtil.success(null);
-//    }
+    /**
+     * 淇敼绠$悊鍛樼殑瀵嗙爜
+     */
+    @Log("淇敼绠$悊鍛樼殑瀵嗙爜")
+    @PostMapping("/updateAdminPassword")
+    public ResponseVO<Object> updateAdminPassword(@Validated @RequestBody UserPwsParm param) {
+        if (!SecurityUtils.getUserDetails().getAdministratorType().equals(AdministratorEnums.ADMIN.getCode())) {
+            throw new BusinessException("闈炶秴绾х鐞嗗憳鏃犳硶淇敼瀵嗙爜锛�");
+        }
 
-//    @DeleteMapping("/{id}")
-//    @PreAuthorize("@el.check('admin:del')")
-//    public ResponseVO<Object> delete(@PathVariable Long id) {
-//        checkLevel(id);
-//        adminService.deleteAdmin(id);
-//        return ResponseUtil.success(null);
-//    }
+        boolean result = adminService.updateAdminPassword(param);
 
-//    /**
-//     * 缁欑鐞嗗憳鍒嗛厤瑙掕壊
-//     *
-//     * @return
-//     */
-//    @PostMapping("/updateAdminRole")
-//    @PreAuthorize("@el.check('admin:edit')")
-//    public ResponseVO<Object> updateAdminRole(@RequestParam("adminId") Long adminId,
-//                                              @RequestParam("roleIds") List<Long> roleIds) {
-//        checkLevel(adminId);
-//        adminsRolesService.updateAdminRole(adminId, roleIds);
-//        return ResponseUtil.success("");
-//    }
+        if (result) {
+            return ResponseUtil.success("淇敼鎴愬姛");
+        } else {
+            return ResponseUtil.fail("淇敼澶辫触");
+        }
+    }
+
+    @GetMapping("/del/{adminId}")
+    public ResponseVO<Object> deleteAdmin(@PathVariable Long adminId) {
+        if (!permissionConfig.check(MenuEnum.ADMIN_DELETE.getCode())) {
+            return ResponseUtil.fail("缂哄皯瀵瑰簲鐢ㄦ埛鏉冮檺");
+        }
+        boolean result = adminService.deleteAdmin(adminId);
+        if (result) {
+            return ResponseUtil.success("鍒犻櫎绠$悊鍛樻垚鍔燂紒");
+        } else {
+            return ResponseUtil.fail("鍒犻櫎绠$悊鍛樺け璐ワ紒");
+        }
+    }
+
+    @Log("鐢ㄦ埛淇敼澶村儚")
+    @PostMapping("/updateIcon")
+    public ResponseVO<Object> updateIcon(@RequestBody ReceiveParam receiveParam) {
+        if (receiveParam.getIconUrl().trim() == null) {
+            throw new BusinessException("澶村儚URL涓嶈兘涓虹┖锛�");
+        }
+        boolean result;
+        //鏅�氱敤鎴蜂慨鏀瑰ご鍍�
+        if (SecurityUtils.getAdministratorIdentity().equals(AdministratorEnums.NORMAL.getCode())) {
+            result = clientService.updateIcon(SecurityUtils.getUserId(), receiveParam.getIconUrl());
+        } else {
+            //瓒呯骇绠$悊鍛樸�佺鐞嗗憳淇敼澶村儚
+            result = adminService.updateIcon(SecurityUtils.getUserId(), receiveParam.getIconUrl());
+        }
+
+        if (result) {
+            return ResponseUtil.success("淇敼鎴愬姛");
+        } else {
+            return ResponseUtil.fail("淇敼澶辫触");
+        }
+    }
 
 
-//    /**
-//     * 缂栬緫鎴戠殑淇℃伅
-//     *
-//     * @param resources
-//     * @return
-//     */
-//    @PutMapping("/editUserInfo")
-//    public ResponseVO<Object> editUserInfo(@RequestBody AdminParam resources) {
-//        Long userId = SecurityUtils.getUserId();
-//        Admin admin = new Admin();
-//        admin.setId(userId);
-//        admin.setMobile(resources.getMobile());
-//        admin.setEmail(resources.getEmail());
-//        admin.setNickName(resources.getNickName());
-//        adminService.updateById(admin);
-//        return ResponseUtil.success(null);
-//    }
+    /**
+     * 鑾峰彇鐢ㄦ埛鏉冮檺
+     *
+     * @return
+     */
+    @GetMapping("/getUserPermissionList")
+    public ResponseVO<Object> getUserPermissionList() {
+        List<MenuNode> userPermissionList;
+        if (SecurityUtils.getClientId() == null) {
+            userPermissionList = adminService.getUserPermissionList();
+        } else {
+            userPermissionList = clientService.getUserPermissionList();
+        }
 
+        return ResponseUtil.success(userPermissionList);
+    }
+
+
+    @GetMapping("/creatUserKey")
+    public ResponseVO<Object> creatUserKey(@RequestParam(required = false, value = "userId") Long userId,
+                                           @RequestParam(required = false, value = "requstType") Integer requstType) {
+        if (!AdministratorEnums.ADMIN.getCode().equals(SecurityUtils.getAdministratorIdentity())) {
+            throw new BusinessException("闈炶秴绾х鐞嗗憳鏃犳硶鎿嶄綔锛�");
+        }
+        return ResponseUtil.success(adminService.creatUserKey(userId, requstType));
+    }
 }

--
Gitblit v1.9.3