bindRolesLogic.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. package user
  2. import (
  3. "context"
  4. "time"
  5. "perms-system-server/internal/consts"
  6. authHelper "perms-system-server/internal/logic/auth"
  7. "perms-system-server/internal/middleware"
  8. "perms-system-server/internal/model/userrole"
  9. "perms-system-server/internal/response"
  10. "perms-system-server/internal/svc"
  11. "perms-system-server/internal/types"
  12. "github.com/zeromicro/go-zero/core/logx"
  13. "github.com/zeromicro/go-zero/core/stores/sqlx"
  14. )
  15. type BindRolesLogic struct {
  16. logx.Logger
  17. ctx context.Context
  18. svcCtx *svc.ServiceContext
  19. }
  20. func NewBindRolesLogic(ctx context.Context, svcCtx *svc.ServiceContext) *BindRolesLogic {
  21. return &BindRolesLogic{
  22. Logger: logx.WithContext(ctx),
  23. ctx: ctx,
  24. svcCtx: svcCtx,
  25. }
  26. }
  27. func (l *BindRolesLogic) BindRoles(req *types.BindRolesReq) error {
  28. if _, err := l.svcCtx.SysUserModel.FindOne(l.ctx, req.UserId); err != nil {
  29. return response.ErrNotFound("用户不存在")
  30. }
  31. productCode := middleware.GetProductCode(l.ctx)
  32. if err := authHelper.CheckManageAccess(l.ctx, l.svcCtx, req.UserId, productCode); err != nil {
  33. return err
  34. }
  35. if _, err := l.svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(l.ctx, productCode, req.UserId); err != nil {
  36. return response.ErrBadRequest("目标用户不是当前产品的成员")
  37. }
  38. if len(req.RoleIds) > 0 {
  39. seen := make(map[int64]bool, len(req.RoleIds))
  40. uniqueIds := make([]int64, 0, len(req.RoleIds))
  41. for _, id := range req.RoleIds {
  42. if !seen[id] {
  43. seen[id] = true
  44. uniqueIds = append(uniqueIds, id)
  45. }
  46. }
  47. req.RoleIds = uniqueIds
  48. }
  49. caller := middleware.GetUserDetails(l.ctx)
  50. if len(req.RoleIds) > 0 {
  51. roles, err := l.svcCtx.SysRoleModel.FindByIds(l.ctx, req.RoleIds)
  52. if err != nil {
  53. return err
  54. }
  55. if int64(len(roles)) != int64(len(req.RoleIds)) {
  56. return response.ErrBadRequest("包含无效的角色ID")
  57. }
  58. for _, r := range roles {
  59. if r.ProductCode != productCode {
  60. return response.ErrBadRequest("不能绑定其他产品的角色")
  61. }
  62. if r.Status != consts.StatusEnabled {
  63. return response.ErrBadRequest("不能绑定已禁用的角色")
  64. }
  65. if caller != nil && !caller.IsSuperAdmin && caller.MinPermsLevel > 0 && r.PermsLevel < caller.MinPermsLevel {
  66. return response.ErrForbidden("不能分配权限级别高于自身的角色")
  67. }
  68. }
  69. }
  70. if err := l.svcCtx.SysUserRoleModel.TransactCtx(l.ctx, func(ctx context.Context, session sqlx.Session) error {
  71. if err := l.svcCtx.SysUserRoleModel.DeleteByUserIdForProductTx(ctx, session, req.UserId, productCode); err != nil {
  72. return err
  73. }
  74. if len(req.RoleIds) == 0 {
  75. return nil
  76. }
  77. now := time.Now().Unix()
  78. data := make([]*userrole.SysUserRole, 0, len(req.RoleIds))
  79. for _, roleId := range req.RoleIds {
  80. data = append(data, &userrole.SysUserRole{
  81. UserId: req.UserId,
  82. RoleId: roleId,
  83. CreateTime: now,
  84. UpdateTime: now,
  85. })
  86. }
  87. return l.svcCtx.SysUserRoleModel.BatchInsertWithTx(ctx, session, data)
  88. }); err != nil {
  89. return err
  90. }
  91. l.svcCtx.UserDetailsLoader.Clean(l.ctx, req.UserId)
  92. return nil
  93. }