Skip to content
项目
群组
代码片段
帮助
正在加载...
帮助
提交反馈
为 GitLab 提交贡献
登录
切换导航
P
pica-cloud-permission
项目
项目
详情
动态
版本
周期分析
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
统计图
成员
成员
收起侧边栏
Close sidebar
动态
分支图
统计图
提交
打开侧边栏
com.pica.cloud.permission
pica-cloud-permission
提交
151a1d66
提交
151a1d66
编写于
9月 09, 2019
作者:
dong.an
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
权限中台
上级
fe56512d
变更
9
隐藏空白字符变更
内嵌
并排
正在显示
9 个修改的文件
包含
59 行增加
和
51 行删除
+59
-51
PermissionServiceClient.java
...permission/permission/client/PermissionServiceClient.java
+35
-0
pom.xml
server/pom.xml
+0
-46
PermissionController.java
...on/permission/server/controller/PermissionController.java
+3
-2
UserRoleMapper.java
...d/permission/permission/server/mapper/UserRoleMapper.java
+2
-0
PermissionServiceImpl.java
...permission/server/service/impl/PermissionServiceImpl.java
+1
-1
RoleServiceImpl.java
...ssion/permission/server/service/impl/RoleServiceImpl.java
+2
-0
UserRoleServiceImpl.java
...n/permission/server/service/impl/UserRoleServiceImpl.java
+7
-0
RoleValidation.java
...rmission/permission/server/validation/RoleValidation.java
+2
-2
UserRoleMapper.xml
server/src/main/resources/mybatis/UserRoleMapper.xml
+7
-0
未找到文件。
client/src/main/java/com/pica/cloud/permission/permission/client/PermissionServiceClient.java
0 → 100644
浏览文件 @
151a1d66
package
com
.
pica
.
cloud
.
permission
.
permission
.
client
;
import
com.pica.cloud.foundation.entity.PicaResponse
;
import
com.pica.cloud.permission.permission.common.dto.AuthDto
;
import
com.pica.cloud.permission.permission.common.dto.AuthResultDto
;
import
com.pica.cloud.permission.permission.common.dto.GrantDto
;
import
com.pica.cloud.permission.permission.common.dto.UserRoleDto
;
import
org.springframework.cloud.netflix.feign.FeignClient
;
import
org.springframework.web.bind.annotation.PostMapping
;
import
org.springframework.web.bind.annotation.PutMapping
;
import
org.springframework.web.bind.annotation.RequestBody
;
/**
* @author andong
* @create 2019/9/9
*/
@FeignClient
(
name
=
"13501-pica-cloud-permission"
)
public
interface
PermissionServiceClient
{
//授权
@PostMapping
(
"/permission/permission/user-role"
)
PicaResponse
grant
(
@RequestBody
UserRoleDto
userRoleDto
);
//业务场景授权
@PostMapping
(
"/permission/permission/grant"
)
PicaResponse
grant
(
@RequestBody
GrantDto
grantDto
);
//取消权限
@PutMapping
(
"/permission/permission/user-role"
)
PicaResponse
revoke
(
@RequestBody
UserRoleDto
userRoleDto
);
//鉴权
@PostMapping
(
"/permission/permission/auth"
)
PicaResponse
<
AuthResultDto
>
auth
(
@RequestBody
AuthDto
authDto
);
}
server/pom.xml
浏览文件 @
151a1d66
...
...
@@ -117,35 +117,6 @@
</dependencies>
</dependencyManagement>
<repositories>
<repository>
<id>
nexus
</id>
<url>
http://192.168.110.42:8082/repository/maven-public/
</url>
<releases>
<enabled>
true
</enabled>
<updatePolicy>
never
</updatePolicy>
</releases>
<snapshots>
<enabled>
true
</enabled>
<updatePolicy>
always
</updatePolicy>
</snapshots>
</repository>
</repositories>
<pluginRepositories>
<pluginRepository>
<id>
nexus
</id>
<url>
http://192.168.110.42:8082/repository/maven-public/
</url>
<releases>
<enabled>
true
</enabled>
<updatePolicy>
never
</updatePolicy>
</releases>
<snapshots>
<enabled>
true
</enabled>
<updatePolicy>
always
</updatePolicy>
</snapshots>
</pluginRepository>
</pluginRepositories>
<build>
<finalName>
pica-cloud-permission-server
</finalName>
...
...
@@ -161,23 +132,6 @@
</execution>
</executions>
</plugin>
<plugin>
<groupId>
org.mybatis.generator
</groupId>
<artifactId>
mybatis-generator-maven-plugin
</artifactId>
<version>
1.3.5
</version>
<dependencies>
<dependency>
<groupId>
org.mybatis.generator
</groupId>
<artifactId>
mybatis-generator-core
</artifactId>
<version>
1.3.2
</version>
</dependency>
</dependencies>
<configuration>
<verbose>
true
</verbose>
<overwrite>
true
</overwrite>
<configurationFile>
src/main/resources/mybatis-generator.xml
</configurationFile>
</configuration>
</plugin>
</plugins>
</build>
</project>
server/src/main/java/com/pica/cloud/permission/permission/server/controller/PermissionController.java
浏览文件 @
151a1d66
...
...
@@ -32,10 +32,11 @@ public class PermissionController {
@PostMapping
(
"/grant"
)
public
PicaResponse
grant
(
@RequestBody
GrantDto
grantDto
)
{
PermissionValidation
.
grantValidate
(
grantDto
);
return
null
;
permissionService
.
grant
(
grantDto
);
return
PicaResponse
.
toResponse
();
}
@ApiOperation
(
"
授
权"
)
@ApiOperation
(
"
鉴
权"
)
@PostMapping
(
"/auth"
)
public
PicaResponse
<
AuthResultDto
>
auth
(
@RequestBody
AuthDto
authDto
)
{
PermissionValidation
.
authValidate
(
authDto
);
...
...
server/src/main/java/com/pica/cloud/permission/permission/server/mapper/UserRoleMapper.java
浏览文件 @
151a1d66
...
...
@@ -9,6 +9,8 @@ import java.util.List;
@Mapper
public
interface
UserRoleMapper
{
UserRole
selectByPrimaryKey
(
int
id
);
int
insertSelective
(
UserRole
userRole
);
List
<
UserRoleDto
>
getByUserId
(
@Param
(
"userId"
)
int
userId
,
@Param
(
"productType"
)
int
productType
);
...
...
server/src/main/java/com/pica/cloud/permission/permission/server/service/impl/PermissionServiceImpl.java
浏览文件 @
151a1d66
...
...
@@ -81,7 +81,7 @@ public class PermissionServiceImpl implements PermissionService {
String
[]
datas
=
urlData
.
split
(
Constants
.
DATA_SPLIT
);
if
(
authDto
.
getUrl
().
equals
(
datas
[
0
]))
{
access
=
true
;
list
.
add
(
new
DataPrivilegeDto
(
datas
[
0
],
datas
[
2
]));
list
.
add
(
new
DataPrivilegeDto
(
datas
[
1
],
datas
[
2
]));
}
}
}
...
...
server/src/main/java/com/pica/cloud/permission/permission/server/service/impl/RoleServiceImpl.java
浏览文件 @
151a1d66
...
...
@@ -52,6 +52,8 @@ public class RoleServiceImpl implements RoleService {
@Override
@Transactional
public
void
updateRole
(
Role
role
)
{
role
.
setProductType
(
null
);
//不支持修改产品线类型
role
.
setCode
(
null
);
//不支持修改角色编码
role
.
setModifiedTime
(
new
Date
());
roleMapper
.
updateByPrimaryKeySelective
(
role
);
}
...
...
server/src/main/java/com/pica/cloud/permission/permission/server/service/impl/UserRoleServiceImpl.java
浏览文件 @
151a1d66
...
...
@@ -8,6 +8,7 @@ import com.pica.cloud.permission.permission.server.entity.Role;
import
com.pica.cloud.permission.permission.server.entity.UserRole
;
import
com.pica.cloud.permission.permission.server.mapper.RoleMapper
;
import
com.pica.cloud.permission.permission.server.mapper.UserRoleMapper
;
import
com.pica.cloud.permission.permission.server.service.PermissionCacheService
;
import
com.pica.cloud.permission.permission.server.service.UserRoleService
;
import
org.springframework.beans.BeanUtils
;
import
org.springframework.beans.factory.annotation.Autowired
;
...
...
@@ -23,6 +24,8 @@ import java.util.List;
@Service
public
class
UserRoleServiceImpl
implements
UserRoleService
{
@Autowired
private
PermissionCacheService
permissionCacheService
;
@Autowired
private
UserRoleMapper
userRoleMapper
;
@Autowired
...
...
@@ -51,6 +54,7 @@ public class UserRoleServiceImpl implements UserRoleService {
userRole
.
setCreatedTime
(
new
Date
());
userRole
.
setModifiedTime
(
userRole
.
getCreatedTime
());
userRoleMapper
.
insertSelective
(
userRole
);
permissionCacheService
.
addUserRole
(
userRole
);
//更新缓存信息
}
@Override
...
...
@@ -61,12 +65,14 @@ public class UserRoleServiceImpl implements UserRoleService {
@Override
@Transactional
public
void
deleteById
(
int
id
,
int
modifiedId
)
{
UserRole
origin
=
userRoleMapper
.
selectByPrimaryKey
(
id
);
UserRole
userRole
=
new
UserRole
();
userRole
.
setId
(
id
);
userRole
.
setDeleteFlag
(
Constants
.
DELETE_FLAG_INVALID
);
userRole
.
setModifiedId
(
modifiedId
);
userRole
.
setModifiedTime
(
new
Date
());
userRoleMapper
.
updateByPrimaryKeySelective
(
userRole
);
permissionCacheService
.
deleteUserRole
(
origin
);
//更新缓存信息
}
@Override
...
...
@@ -82,5 +88,6 @@ public class UserRoleServiceImpl implements UserRoleService {
userRole
.
setRoleId
(
role
.
getId
());
}
userRoleMapper
.
deleteUserRole
(
userRole
);
permissionCacheService
.
deleteUserRole
(
userRole
);
//更新缓存信息
}
}
server/src/main/java/com/pica/cloud/permission/permission/server/validation/RoleValidation.java
浏览文件 @
151a1d66
...
...
@@ -33,8 +33,8 @@ public class RoleValidation {
if
(
role
.
getModifiedId
()
==
null
)
{
throw
new
PicaException
(
PicaResultCode
.
PARAM_IS_BLANK
.
code
(),
"操作人ID为空"
);
}
if
(
role
.
getProductType
()
==
null
&&
StringUtils
.
isBlank
(
role
.
getCode
())
&&
StringUtils
.
isBlank
(
role
.
getName
()))
{
throw
new
PicaException
(
PicaResultCode
.
PARAM_IS_BLANK
.
code
(),
"
缺少必要参数
"
);
if
(
StringUtils
.
isBlank
(
role
.
getName
()))
{
throw
new
PicaException
(
PicaResultCode
.
PARAM_IS_BLANK
.
code
(),
"
角色名称为空
"
);
}
}
}
server/src/main/resources/mybatis/UserRoleMapper.xml
浏览文件 @
151a1d66
...
...
@@ -19,6 +19,13 @@
modified_time
</sql>
<select
id=
"selectByPrimaryKey"
parameterType=
"java.lang.Integer"
resultMap=
"BaseResultMap"
>
select
<include
refid=
"Base_Column_List"
/>
from perm_user_role
where id = #{id,jdbcType=INTEGER} and delete_flag = 1
</select>
<select
id=
"getByUserId"
resultType=
"com.pica.cloud.permission.permission.common.dto.UserRoleDto"
>
select ur.id, ur.product_type as productType, ur.user_id as userId, ur.role_id as roleId,
r.code as roleCode, r.name as roleName
...
...
写
预览
Markdown
格式
0%
请重试
or
附加一个文件
附加文件
取消
您添加了
0
人
到此讨论。请谨慎行事。
先完成此消息的编辑!
取消
想要评论请
注册
或
登录