bindRolesLogic.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147
  1. package user
  2. import (
  3. "context"
  4. "math"
  5. "time"
  6. "perms-system-server/internal/consts"
  7. authHelper "perms-system-server/internal/logic/auth"
  8. "perms-system-server/internal/middleware"
  9. "perms-system-server/internal/model/userrole"
  10. "perms-system-server/internal/response"
  11. "perms-system-server/internal/svc"
  12. "perms-system-server/internal/types"
  13. "github.com/zeromicro/go-zero/core/logx"
  14. "github.com/zeromicro/go-zero/core/stores/sqlx"
  15. )
  16. type BindRolesLogic struct {
  17. logx.Logger
  18. ctx context.Context
  19. svcCtx *svc.ServiceContext
  20. }
  21. func NewBindRolesLogic(ctx context.Context, svcCtx *svc.ServiceContext) *BindRolesLogic {
  22. return &BindRolesLogic{
  23. Logger: logx.WithContext(ctx),
  24. ctx: ctx,
  25. svcCtx: svcCtx,
  26. }
  27. }
  28. func (l *BindRolesLogic) BindRoles(req *types.BindRolesReq) error {
  29. if _, err := l.svcCtx.SysUserModel.FindOne(l.ctx, req.UserId); err != nil {
  30. return response.ErrNotFound("用户不存在")
  31. }
  32. productCode := middleware.GetProductCode(l.ctx)
  33. if err := authHelper.CheckManageAccess(l.ctx, l.svcCtx, req.UserId, productCode); err != nil {
  34. return err
  35. }
  36. member, err := l.svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(l.ctx, productCode, req.UserId)
  37. if err != nil {
  38. return response.ErrBadRequest("目标用户不是当前产品的成员")
  39. }
  40. if member.Status != consts.StatusEnabled {
  41. return response.ErrBadRequest("目标用户的成员资格已被禁用")
  42. }
  43. if len(req.RoleIds) > 0 {
  44. seen := make(map[int64]bool, len(req.RoleIds))
  45. uniqueIds := make([]int64, 0, len(req.RoleIds))
  46. for _, id := range req.RoleIds {
  47. if !seen[id] {
  48. seen[id] = true
  49. uniqueIds = append(uniqueIds, id)
  50. }
  51. }
  52. req.RoleIds = uniqueIds
  53. }
  54. caller := middleware.GetUserDetails(l.ctx)
  55. if len(req.RoleIds) > 0 {
  56. roles, err := l.svcCtx.SysRoleModel.FindByIds(l.ctx, req.RoleIds)
  57. if err != nil {
  58. return err
  59. }
  60. if int64(len(roles)) != int64(len(req.RoleIds)) {
  61. return response.ErrBadRequest("包含无效的角色ID")
  62. }
  63. for _, r := range roles {
  64. if r.ProductCode != productCode {
  65. return response.ErrBadRequest("不能绑定其他产品的角色")
  66. }
  67. if r.Status != consts.StatusEnabled {
  68. return response.ErrBadRequest("不能绑定已禁用的角色")
  69. }
  70. if caller != nil && !caller.IsSuperAdmin &&
  71. caller.MemberType != consts.MemberTypeAdmin &&
  72. caller.MemberType != consts.MemberTypeDeveloper {
  73. if caller.MinPermsLevel == math.MaxInt64 || r.PermsLevel < caller.MinPermsLevel {
  74. return response.ErrForbidden("不能分配权限级别高于自身的角色")
  75. }
  76. }
  77. }
  78. }
  79. existingRoleIds, err := l.svcCtx.SysUserRoleModel.FindRoleIdsByUserIdForProduct(l.ctx, req.UserId, productCode)
  80. if err != nil {
  81. return err
  82. }
  83. existingSet := make(map[int64]bool, len(existingRoleIds))
  84. for _, id := range existingRoleIds {
  85. existingSet[id] = true
  86. }
  87. newSet := make(map[int64]bool, len(req.RoleIds))
  88. for _, id := range req.RoleIds {
  89. newSet[id] = true
  90. }
  91. var toAdd []int64
  92. for _, id := range req.RoleIds {
  93. if !existingSet[id] {
  94. toAdd = append(toAdd, id)
  95. }
  96. }
  97. var toRemove []int64
  98. for _, id := range existingRoleIds {
  99. if !newSet[id] {
  100. toRemove = append(toRemove, id)
  101. }
  102. }
  103. if len(toAdd) == 0 && len(toRemove) == 0 {
  104. l.svcCtx.UserDetailsLoader.Clean(l.ctx, req.UserId)
  105. return nil
  106. }
  107. if err := l.svcCtx.SysUserRoleModel.TransactCtx(l.ctx, func(ctx context.Context, session sqlx.Session) error {
  108. if err := l.svcCtx.SysUserRoleModel.DeleteByUserIdAndRoleIdsTx(ctx, session, req.UserId, toRemove); err != nil {
  109. return err
  110. }
  111. if len(toAdd) > 0 {
  112. now := time.Now().Unix()
  113. data := make([]*userrole.SysUserRole, 0, len(toAdd))
  114. for _, roleId := range toAdd {
  115. data = append(data, &userrole.SysUserRole{
  116. UserId: req.UserId,
  117. RoleId: roleId,
  118. CreateTime: now,
  119. UpdateTime: now,
  120. })
  121. }
  122. return l.svcCtx.SysUserRoleModel.BatchInsertWithTx(ctx, session, data)
  123. }
  124. return nil
  125. }); err != nil {
  126. return err
  127. }
  128. l.svcCtx.UserDetailsLoader.Clean(l.ctx, req.UserId)
  129. return nil
  130. }