UserController.java
6.94 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
package com.bsth.controller.sys;
import com.bsth.common.Constants;
import com.bsth.common.ResponseCode;
import com.bsth.controller.BaseController;
import com.bsth.controller.sys.dto.CompanyData;
import com.bsth.controller.sys.util.RSAUtils;
import com.bsth.entity.sys.CompanyAuthority;
import com.bsth.entity.sys.SysUser;
import com.bsth.security.util.SecurityUtils;
import com.bsth.service.sys.CompanyAuthorityService;
import com.bsth.service.sys.SysUserService;
import com.google.common.collect.ArrayListMultimap;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.security.authentication.BadCredentialsException;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.web.authentication.session.SessionAuthenticationException;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestMethod;
import org.springframework.web.bind.annotation.RequestParam;
import org.springframework.web.bind.annotation.RestController;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpSession;
import java.util.*;
@RestController
@RequestMapping("user")
public class UserController extends BaseController<SysUser, Integer> {
Logger logger = LoggerFactory.getLogger(this.getClass());
@Autowired
SysUserService sysUserService;
@Autowired
CompanyAuthorityService companyAuthorityService;
@RequestMapping(value = "/login/jCryptionKey")
public Map<String, Object> jCryptionKey(HttpServletRequest request){
//公匙返回页面
Map<String, Object> rs = new HashMap<>();
rs.put("publickey", RSAUtils.generateBase64PublicKey());
return rs;
}
//需要验证码的账号
//public static Map<String, Integer> captchaMap = new HashMap<>();
@RequestMapping(value = "/login", method = RequestMethod.POST)
public Map<String, Object> login(HttpServletRequest request, @RequestParam String userName,
@RequestParam String password, String captcha) {
Map<String, Object> rs = new HashMap<>();
rs.put("status", ResponseCode.ERROR);
try {
HttpSession session = request.getSession();
rs.put("captcha", session.getAttribute("captcha"));
//解密RSA
try {
userName = RSAUtils.decryptBase64(userName);
password = RSAUtils.decryptBase64(password);
} catch (RuntimeException e) {
logger.error("", e);
return put(rs, "msg", "decrypt RSA fail!可能页面已过期,尝试刷新页面");
}
SysUser user = sysUserService.findByUserName(userName);
if (null == user)
return put(rs, "msg", "不存在的用户");
if (!user.isEnabled())
return put(rs, "msg", "该用户已被锁定,请联系管理员");
// 校验密码
boolean matchStatus = new BCryptPasswordEncoder(4).matches(password, user.getPassword());
if (!matchStatus) {
rs.put("msg", "密码有误");
return rs;
}
// 登录
SecurityUtils.login(user, request);
//session里写入用户名,webSocket连接时标识身份用
session.setAttribute(Constants.SESSION_USERNAME, user.getUserName());
//获取公司权限数据
List<CompanyAuthority> cmyAuths=companyAuthorityService.findByUser(user);
session.setAttribute(Constants.COMPANY_AUTHORITYS, cmyAuths);
rs.put("status", ResponseCode.SUCCESS);
} catch (Exception e) {
logger.error("", e);
rs.put("msg", "服务器出现异常,请联系管理员");
}
return rs;
}
/**
* 返回当前用户的公司权限数据,用于构建页面级联下拉框
* @return
*/
@RequestMapping("companyData")
public List<CompanyData> companyData(HttpServletRequest request){
List<CompanyData> rs = new ArrayList<>();
CompanyData companyData;
ArrayListMultimap<String, CompanyAuthority> map = ArrayListMultimap.create();
List<CompanyAuthority> cmyAuths = (List<CompanyAuthority>) request.getSession().getAttribute(Constants.COMPANY_AUTHORITYS);
for(CompanyAuthority cAuth : cmyAuths){
map.put(cAuth.getCompanyCode()+"_"+cAuth.getCompanyName(), cAuth);
}
Set<String> keys = map.keySet();
String[] temps;
for(String k : keys){
temps = k.split("_");
companyData = new CompanyData();
companyData.setCompanyCode(temps[0]);
companyData.setCompanyName(temps[1]);
companyData.setChildren(new ArrayList<CompanyData.ChildrenCompany>());
cmyAuths = map.get(k);
for(CompanyAuthority c : cmyAuths){
companyData.getChildren().add(new CompanyData.ChildrenCompany(c.getSubCompanyCode(), c.getSubCompanyName()));
}
rs.add(companyData);
}
return rs;
}
public Map<String, Object> put(Map<String, Object> rs, String key, Object val){
rs.put(key, val);
return rs;
}
/**
*
* @Title: loginFailure @Description: TODO(查询登录失败的详细信息) @param @param
* request @return String 返回类型 @throws
*/
@RequestMapping("/loginFailure")
public String loginFailure(HttpServletRequest request) {
String msg = "";
HttpSession session = request.getSession();
Object obj = session.getAttribute("SPRING_SECURITY_LAST_EXCEPTION");
if (obj instanceof BadCredentialsException)
msg = "登录失败,用户名或密码错误.";
else if (obj instanceof SessionAuthenticationException)
msg = "登录失败,当前策略不允许重复登录.";
session.removeAttribute("SPRING_SECURITY_LAST_EXCEPTION");
return msg;
}
@RequestMapping("/currentUser")
public SysUser currentUser() {
return SecurityUtils.getCurrentUser();
}
/**
* @Title changeEnabled
* @Description: TODO(改变用户状态)
* @param id
* 用户ID
* @param enabled
* 状态
* @return
*/
@RequestMapping("/changeEnabled")
public int changeEnabled(@RequestParam int id, @RequestParam int enabled) {
return sysUserService.changeEnabled(id, enabled);
}
/**
* @Title changePWD
* @Description: TODO(修改密码)
* @param oldPWD
* 原始密码
* @param newPWD
* 新密码
* @param cnewPWD
* 确认新密码
* @return
*/
@RequestMapping(value = "/changePWD", method = RequestMethod.POST)
public String changePWD(@RequestParam String oldPWD, @RequestParam String newPWD, @RequestParam String cnewPWD) {
SysUser sysUser = SecurityUtils.getCurrentUser();
String msg = "";
if (new BCryptPasswordEncoder(4).matches(oldPWD, sysUser.getPassword())) {
if (oldPWD.equals(newPWD)) {
msg = "新密码不能跟原始密码一样!";
} else {
if (newPWD.equals(cnewPWD)) {
sysUserService.changePWD(sysUser.getId(), newPWD);
msg = "修改成功!";
} else {
msg = "新密码两次输入不一致!";
}
}
} else {
msg = "原始密码错误!";
}
return msg;
}
@RequestMapping(value = "/register" ,method = RequestMethod.POST)
public Map<String, Object> register(SysUser u){
return sysUserService.register(u);
}
@RequestMapping(value = "/all_distinct")
public List<SysUser> findAll_distinct(){
return sysUserService.findAll_distinct();
}
}