bindRolePermsLogic.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. package role
  2. import (
  3. "context"
  4. "time"
  5. authHelper "perms-system-server/internal/logic/auth"
  6. "perms-system-server/internal/model/roleperm"
  7. "perms-system-server/internal/response"
  8. "perms-system-server/internal/svc"
  9. "perms-system-server/internal/types"
  10. "github.com/zeromicro/go-zero/core/logx"
  11. "github.com/zeromicro/go-zero/core/stores/sqlx"
  12. )
  13. type BindRolePermsLogic struct {
  14. logx.Logger
  15. ctx context.Context
  16. svcCtx *svc.ServiceContext
  17. }
  18. func NewBindRolePermsLogic(ctx context.Context, svcCtx *svc.ServiceContext) *BindRolePermsLogic {
  19. return &BindRolePermsLogic{
  20. Logger: logx.WithContext(ctx),
  21. ctx: ctx,
  22. svcCtx: svcCtx,
  23. }
  24. }
  25. func (l *BindRolePermsLogic) BindRolePerms(req *types.BindPermsReq) error {
  26. role, err := l.svcCtx.SysRoleModel.FindOne(l.ctx, req.RoleId)
  27. if err != nil {
  28. return response.ErrNotFound("角色不存在")
  29. }
  30. if err := authHelper.RequireProductAdminFor(l.ctx, role.ProductCode); err != nil {
  31. return err
  32. }
  33. if len(req.PermIds) > 0 {
  34. seen := make(map[int64]bool, len(req.PermIds))
  35. uniqueIds := make([]int64, 0, len(req.PermIds))
  36. for _, id := range req.PermIds {
  37. if !seen[id] {
  38. seen[id] = true
  39. uniqueIds = append(uniqueIds, id)
  40. }
  41. }
  42. req.PermIds = uniqueIds
  43. }
  44. if len(req.PermIds) > 0 {
  45. perms, err := l.svcCtx.SysPermModel.FindByIds(l.ctx, req.PermIds)
  46. if err != nil {
  47. return err
  48. }
  49. if len(perms) != len(req.PermIds) {
  50. return response.ErrBadRequest("包含无效的权限ID")
  51. }
  52. for _, p := range perms {
  53. if p.ProductCode != role.ProductCode {
  54. return response.ErrBadRequest("不能绑定其他产品的权限")
  55. }
  56. }
  57. }
  58. if err := l.svcCtx.SysRolePermModel.TransactCtx(l.ctx, func(ctx context.Context, session sqlx.Session) error {
  59. if err := l.svcCtx.SysRolePermModel.DeleteByRoleIdTx(ctx, session, req.RoleId); err != nil {
  60. return err
  61. }
  62. if len(req.PermIds) == 0 {
  63. return nil
  64. }
  65. now := time.Now().Unix()
  66. data := make([]*roleperm.SysRolePerm, 0, len(req.PermIds))
  67. for _, permId := range req.PermIds {
  68. data = append(data, &roleperm.SysRolePerm{
  69. RoleId: req.RoleId,
  70. PermId: permId,
  71. CreateTime: now,
  72. UpdateTime: now,
  73. })
  74. }
  75. return l.svcCtx.SysRolePermModel.BatchInsertWithTx(ctx, session, data)
  76. }); err != nil {
  77. return err
  78. }
  79. affectedUserIds, _ := l.svcCtx.SysUserRoleModel.FindUserIdsByRoleId(l.ctx, req.RoleId)
  80. l.svcCtx.UserDetailsLoader.BatchDel(l.ctx, affectedUserIds, role.ProductCode)
  81. return nil
  82. }