You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1036 lines
36 KiB
1036 lines
36 KiB
/* |
|
* Licensed to the Apache Software Foundation (ASF) under one or more |
|
* contributor license agreements. See the NOTICE file distributed with |
|
* this work for additional information regarding copyright ownership. |
|
* The ASF licenses this file to You under the Apache License, Version 2.0 |
|
* (the "License"); you may not use this file except in compliance with |
|
* the License. You may obtain a copy of the License at |
|
* |
|
* http://www.apache.org/licenses/LICENSE-2.0 |
|
* |
|
* Unless required by applicable law or agreed to in writing, software |
|
* distributed under the License is distributed on an "AS IS" BASIS, |
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|
* See the License for the specific language governing permissions and |
|
* limitations under the License. |
|
*/ |
|
package org.apache.dolphinscheduler.api.service; |
|
|
|
import com.baomidou.mybatisplus.core.metadata.IPage; |
|
import com.baomidou.mybatisplus.extension.plugins.pagination.Page; |
|
import org.apache.dolphinscheduler.api.dto.resources.ResourceComponent; |
|
import org.apache.dolphinscheduler.api.dto.resources.visitor.ResourceTreeVisitor; |
|
import org.apache.dolphinscheduler.api.enums.Status; |
|
import org.apache.dolphinscheduler.api.exceptions.ServiceException; |
|
import org.apache.dolphinscheduler.api.utils.CheckUtils; |
|
import org.apache.dolphinscheduler.api.utils.PageInfo; |
|
import org.apache.dolphinscheduler.api.utils.Result; |
|
import org.apache.dolphinscheduler.common.Constants; |
|
import org.apache.dolphinscheduler.common.enums.Flag; |
|
import org.apache.dolphinscheduler.common.enums.ResourceType; |
|
import org.apache.dolphinscheduler.common.enums.UserType; |
|
import org.apache.dolphinscheduler.common.utils.*; |
|
import org.apache.dolphinscheduler.dao.entity.*; |
|
import org.apache.dolphinscheduler.dao.mapper.*; |
|
import org.apache.dolphinscheduler.dao.utils.ResourceProcessDefinitionUtils; |
|
import org.slf4j.Logger; |
|
import org.slf4j.LoggerFactory; |
|
import org.springframework.beans.factory.annotation.Autowired; |
|
import org.springframework.stereotype.Service; |
|
import org.springframework.transaction.annotation.Transactional; |
|
|
|
import java.io.IOException; |
|
import java.text.MessageFormat; |
|
import java.util.*; |
|
import java.util.stream.Collectors; |
|
|
|
/** |
|
* user service |
|
*/ |
|
@Service |
|
public class UsersService extends BaseService { |
|
|
|
private static final Logger logger = LoggerFactory.getLogger(UsersService.class); |
|
|
|
@Autowired |
|
private UserMapper userMapper; |
|
|
|
@Autowired |
|
private TenantMapper tenantMapper; |
|
|
|
@Autowired |
|
private ProjectUserMapper projectUserMapper; |
|
|
|
@Autowired |
|
private ResourceUserMapper resourcesUserMapper; |
|
|
|
@Autowired |
|
private ResourceMapper resourceMapper; |
|
|
|
@Autowired |
|
private DataSourceUserMapper datasourceUserMapper; |
|
|
|
@Autowired |
|
private UDFUserMapper udfUserMapper; |
|
|
|
@Autowired |
|
private AlertGroupMapper alertGroupMapper; |
|
|
|
@Autowired |
|
private ProcessDefinitionMapper processDefinitionMapper; |
|
|
|
|
|
/** |
|
* create user, only system admin have permission |
|
* |
|
* @param loginUser login user |
|
* @param userName user name |
|
* @param userPassword user password |
|
* @param email email |
|
* @param tenantId tenant id |
|
* @param phone phone |
|
* @param queue queue |
|
* @return create result code |
|
* @throws Exception exception |
|
*/ |
|
@Transactional(rollbackFor = Exception.class) |
|
public Map<String, Object> createUser(User loginUser, |
|
String userName, |
|
String userPassword, |
|
String email, |
|
int tenantId, |
|
String phone, |
|
String queue, |
|
int state) throws Exception { |
|
|
|
Map<String, Object> result = new HashMap<>(); |
|
|
|
//check all user params |
|
String msg = this.checkUserParams(userName, userPassword, email, phone); |
|
|
|
if (!StringUtils.isEmpty(msg)) { |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR,msg); |
|
return result; |
|
} |
|
if (!isAdmin(loginUser)) { |
|
putMsg(result, Status.USER_NO_OPERATION_PERM); |
|
return result; |
|
} |
|
|
|
if (!checkTenantExists(tenantId)) { |
|
putMsg(result, Status.TENANT_NOT_EXIST); |
|
return result; |
|
} |
|
|
|
User user = createUser(userName, userPassword, email, tenantId, phone, queue, state); |
|
|
|
Tenant tenant = tenantMapper.queryById(tenantId); |
|
// resource upload startup |
|
if (PropertyUtils.getResUploadStartupState()){ |
|
// if tenant not exists |
|
if (!HadoopUtils.getInstance().exists(HadoopUtils.getHdfsTenantDir(tenant.getTenantCode()))){ |
|
createTenantDirIfNotExists(tenant.getTenantCode()); |
|
} |
|
String userPath = HadoopUtils.getHdfsUserDir(tenant.getTenantCode(),user.getId()); |
|
HadoopUtils.getInstance().mkdir(userPath); |
|
} |
|
|
|
putMsg(result, Status.SUCCESS); |
|
return result; |
|
|
|
} |
|
|
|
@Transactional(rollbackFor = RuntimeException.class) |
|
public User createUser(String userName, |
|
String userPassword, |
|
String email, |
|
int tenantId, |
|
String phone, |
|
String queue, |
|
int state) { |
|
User user = new User(); |
|
Date now = new Date(); |
|
|
|
user.setUserName(userName); |
|
user.setUserPassword(EncryptionUtils.getMd5(userPassword)); |
|
user.setEmail(email); |
|
user.setTenantId(tenantId); |
|
user.setPhone(phone); |
|
user.setState(state); |
|
// create general users, administrator users are currently built-in |
|
user.setUserType(UserType.GENERAL_USER); |
|
user.setCreateTime(now); |
|
user.setUpdateTime(now); |
|
if (StringUtils.isEmpty(queue)){ |
|
queue = ""; |
|
} |
|
user.setQueue(queue); |
|
|
|
// save user |
|
userMapper.insert(user); |
|
return user; |
|
} |
|
|
|
/** |
|
* query user by id |
|
* @param id id |
|
* @return user info |
|
*/ |
|
public User queryUser(int id) { |
|
return userMapper.selectById(id); |
|
} |
|
|
|
/** |
|
* query user |
|
* @param name name |
|
* @return user info |
|
*/ |
|
public User queryUser(String name) { |
|
return userMapper.queryByUserNameAccurately(name); |
|
} |
|
|
|
/** |
|
* query user |
|
* |
|
* @param name name |
|
* @param password password |
|
* @return user info |
|
*/ |
|
public User queryUser(String name, String password) { |
|
String md5 = EncryptionUtils.getMd5(password); |
|
return userMapper.queryUserByNamePassword(name, md5); |
|
} |
|
|
|
/** |
|
* get user id by user name |
|
* @param name user name |
|
* @return if name empty 0, user not exists -1, user exist user id |
|
*/ |
|
public int getUserIdByName(String name) { |
|
//executor name query |
|
int executorId = 0; |
|
if (StringUtils.isNotEmpty(name)) { |
|
User executor = queryUser(name); |
|
if (null != executor) { |
|
executorId = executor.getId(); |
|
} else { |
|
executorId = -1; |
|
} |
|
} |
|
|
|
return executorId; |
|
} |
|
|
|
/** |
|
* query user list |
|
* |
|
* @param loginUser login user |
|
* @param pageNo page number |
|
* @param searchVal search avlue |
|
* @param pageSize page size |
|
* @return user list page |
|
*/ |
|
public Map<String, Object> queryUserList(User loginUser, String searchVal, Integer pageNo, Integer pageSize) { |
|
Map<String, Object> result = new HashMap<>(); |
|
|
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
|
|
Page<User> page = new Page(pageNo, pageSize); |
|
|
|
IPage<User> scheduleList = userMapper.queryUserPaging(page, searchVal); |
|
|
|
PageInfo<User> pageInfo = new PageInfo<>(pageNo, pageSize); |
|
pageInfo.setTotalCount((int)scheduleList.getTotal()); |
|
pageInfo.setLists(scheduleList.getRecords()); |
|
result.put(Constants.DATA_LIST, pageInfo); |
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
/** |
|
* updateProcessInstance user |
|
* |
|
* @param userId user id |
|
* @param userName user name |
|
* @param userPassword user password |
|
* @param email email |
|
* @param tenantId tennat id |
|
* @param phone phone |
|
* @param queue queue |
|
* @return update result code |
|
* @throws Exception exception |
|
*/ |
|
public Map<String, Object> updateUser(int userId, |
|
String userName, |
|
String userPassword, |
|
String email, |
|
int tenantId, |
|
String phone, |
|
String queue, |
|
int state) throws Exception { |
|
Map<String, Object> result = new HashMap<>(); |
|
result.put(Constants.STATUS, false); |
|
|
|
User user = userMapper.selectById(userId); |
|
|
|
if (user == null) { |
|
putMsg(result, Status.USER_NOT_EXIST, userId); |
|
return result; |
|
} |
|
|
|
if (StringUtils.isNotEmpty(userName)) { |
|
|
|
if (!CheckUtils.checkUserName(userName)){ |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR,userName); |
|
return result; |
|
} |
|
|
|
User tempUser = userMapper.queryByUserNameAccurately(userName); |
|
if (tempUser != null && tempUser.getId() != userId) { |
|
putMsg(result, Status.USER_NAME_EXIST); |
|
return result; |
|
} |
|
user.setUserName(userName); |
|
} |
|
|
|
if (StringUtils.isNotEmpty(userPassword)) { |
|
if (!CheckUtils.checkPassword(userPassword)){ |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR,userPassword); |
|
return result; |
|
} |
|
user.setUserPassword(EncryptionUtils.getMd5(userPassword)); |
|
} |
|
|
|
if (StringUtils.isNotEmpty(email)) { |
|
if (!CheckUtils.checkEmail(email)){ |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR,email); |
|
return result; |
|
} |
|
user.setEmail(email); |
|
} |
|
|
|
if (StringUtils.isNotEmpty(phone) && !CheckUtils.checkPhone(phone)) { |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR,phone); |
|
return result; |
|
} |
|
user.setPhone(phone); |
|
user.setQueue(queue); |
|
user.setState(state); |
|
Date now = new Date(); |
|
user.setUpdateTime(now); |
|
|
|
//if user switches the tenant, the user's resources need to be copied to the new tenant |
|
if (user.getTenantId() != tenantId) { |
|
Tenant oldTenant = tenantMapper.queryById(user.getTenantId()); |
|
//query tenant |
|
Tenant newTenant = tenantMapper.queryById(tenantId); |
|
if (newTenant != null) { |
|
// if hdfs startup |
|
if (PropertyUtils.getResUploadStartupState() && oldTenant != null){ |
|
String newTenantCode = newTenant.getTenantCode(); |
|
String oldResourcePath = HadoopUtils.getHdfsResDir(oldTenant.getTenantCode()); |
|
String oldUdfsPath = HadoopUtils.getHdfsUdfDir(oldTenant.getTenantCode()); |
|
|
|
// if old tenant dir exists |
|
if (HadoopUtils.getInstance().exists(oldResourcePath)){ |
|
String newResourcePath = HadoopUtils.getHdfsResDir(newTenantCode); |
|
String newUdfsPath = HadoopUtils.getHdfsUdfDir(newTenantCode); |
|
|
|
//file resources list |
|
List<Resource> fileResourcesList = resourceMapper.queryResourceList( |
|
null, userId, ResourceType.FILE.ordinal()); |
|
if (CollectionUtils.isNotEmpty(fileResourcesList)) { |
|
ResourceTreeVisitor resourceTreeVisitor = new ResourceTreeVisitor(fileResourcesList); |
|
ResourceComponent resourceComponent = resourceTreeVisitor.visit(); |
|
copyResourceFiles(resourceComponent, oldResourcePath, newResourcePath); |
|
} |
|
|
|
//udf resources |
|
List<Resource> udfResourceList = resourceMapper.queryResourceList( |
|
null, userId, ResourceType.UDF.ordinal()); |
|
if (CollectionUtils.isNotEmpty(udfResourceList)) { |
|
ResourceTreeVisitor resourceTreeVisitor = new ResourceTreeVisitor(udfResourceList); |
|
ResourceComponent resourceComponent = resourceTreeVisitor.visit(); |
|
copyResourceFiles(resourceComponent, oldUdfsPath, newUdfsPath); |
|
} |
|
|
|
//Delete the user from the old tenant directory |
|
String oldUserPath = HadoopUtils.getHdfsUserDir(oldTenant.getTenantCode(),userId); |
|
HadoopUtils.getInstance().delete(oldUserPath, true); |
|
}else { |
|
// if old tenant dir not exists , create |
|
createTenantDirIfNotExists(oldTenant.getTenantCode()); |
|
} |
|
|
|
if (HadoopUtils.getInstance().exists(HadoopUtils.getHdfsTenantDir(newTenant.getTenantCode()))){ |
|
//create user in the new tenant directory |
|
String newUserPath = HadoopUtils.getHdfsUserDir(newTenant.getTenantCode(),user.getId()); |
|
HadoopUtils.getInstance().mkdir(newUserPath); |
|
}else { |
|
// if new tenant dir not exists , create |
|
createTenantDirIfNotExists(newTenant.getTenantCode()); |
|
} |
|
|
|
} |
|
} |
|
user.setTenantId(tenantId); |
|
} |
|
|
|
// updateProcessInstance user |
|
userMapper.updateById(user); |
|
putMsg(result, Status.SUCCESS); |
|
return result; |
|
} |
|
|
|
/** |
|
* delete user |
|
* |
|
* @param loginUser login user |
|
* @param id user id |
|
* @return delete result code |
|
* @throws Exception exception when operate hdfs |
|
*/ |
|
public Map<String, Object> deleteUserById(User loginUser, int id) throws Exception { |
|
Map<String, Object> result = new HashMap<>(); |
|
//only admin can operate |
|
if (!isAdmin(loginUser)) { |
|
putMsg(result, Status.USER_NO_OPERATION_PERM, id); |
|
return result; |
|
} |
|
//check exist |
|
User tempUser = userMapper.selectById(id); |
|
if (tempUser == null) { |
|
putMsg(result, Status.USER_NOT_EXIST, id); |
|
return result; |
|
} |
|
// delete user |
|
User user = userMapper.queryTenantCodeByUserId(id); |
|
|
|
if (user != null) { |
|
if (PropertyUtils.getResUploadStartupState()) { |
|
String userPath = HadoopUtils.getHdfsUserDir(user.getTenantCode(),id); |
|
if (HadoopUtils.getInstance().exists(userPath)) { |
|
HadoopUtils.getInstance().delete(userPath, true); |
|
} |
|
} |
|
} |
|
|
|
userMapper.deleteById(id); |
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
/** |
|
* grant project |
|
* |
|
* @param loginUser login user |
|
* @param userId user id |
|
* @param projectIds project id array |
|
* @return grant result code |
|
*/ |
|
@Transactional(rollbackFor = RuntimeException.class) |
|
public Map<String, Object> grantProject(User loginUser, int userId, String projectIds) { |
|
Map<String, Object> result = new HashMap<>(); |
|
result.put(Constants.STATUS, false); |
|
|
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
|
|
//check exist |
|
User tempUser = userMapper.selectById(userId); |
|
if (tempUser == null) { |
|
putMsg(result, Status.USER_NOT_EXIST, userId); |
|
return result; |
|
} |
|
//if the selected projectIds are empty, delete all items associated with the user |
|
projectUserMapper.deleteProjectRelation(0, userId); |
|
|
|
if (check(result, StringUtils.isEmpty(projectIds), Status.SUCCESS)) { |
|
return result; |
|
} |
|
|
|
String[] projectIdArr = projectIds.split(","); |
|
|
|
for (String projectId : projectIdArr) { |
|
Date now = new Date(); |
|
ProjectUser projectUser = new ProjectUser(); |
|
projectUser.setUserId(userId); |
|
projectUser.setProjectId(Integer.parseInt(projectId)); |
|
projectUser.setPerm(7); |
|
projectUser.setCreateTime(now); |
|
projectUser.setUpdateTime(now); |
|
projectUserMapper.insert(projectUser); |
|
} |
|
|
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
|
|
/** |
|
* grant resource |
|
* |
|
* @param loginUser login user |
|
* @param userId user id |
|
* @param resourceIds resource id array |
|
* @return grant result code |
|
*/ |
|
@Transactional(rollbackFor = RuntimeException.class) |
|
public Map<String, Object> grantResources(User loginUser, int userId, String resourceIds) { |
|
Map<String, Object> result = new HashMap<>(); |
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
User user = userMapper.selectById(userId); |
|
if(user == null){ |
|
putMsg(result, Status.USER_NOT_EXIST, userId); |
|
return result; |
|
} |
|
|
|
Set<Integer> needAuthorizeResIds = new HashSet(); |
|
if (StringUtils.isNotBlank(resourceIds)) { |
|
String[] resourceFullIdArr = resourceIds.split(","); |
|
// need authorize resource id set |
|
for (String resourceFullId : resourceFullIdArr) { |
|
String[] resourceIdArr = resourceFullId.split("-"); |
|
for (int i=0;i<=resourceIdArr.length-1;i++) { |
|
int resourceIdValue = Integer.parseInt(resourceIdArr[i]); |
|
needAuthorizeResIds.add(resourceIdValue); |
|
} |
|
} |
|
} |
|
|
|
|
|
//get the authorized resource id list by user id |
|
List<Resource> oldAuthorizedRes = resourceMapper.queryAuthorizedResourceList(userId); |
|
//if resource type is UDF,need check whether it is bound by UDF functon |
|
Set<Integer> oldAuthorizedResIds = oldAuthorizedRes.stream().map(t -> t.getId()).collect(Collectors.toSet()); |
|
|
|
//get the unauthorized resource id list |
|
oldAuthorizedResIds.removeAll(needAuthorizeResIds); |
|
|
|
if (CollectionUtils.isNotEmpty(oldAuthorizedResIds)) { |
|
|
|
// get all resource id of process definitions those is released |
|
List<Map<String, Object>> list = processDefinitionMapper.listResourcesByUser(userId); |
|
Map<Integer, Set<Integer>> resourceProcessMap = ResourceProcessDefinitionUtils.getResourceProcessDefinitionMap(list); |
|
Set<Integer> resourceIdSet = resourceProcessMap.keySet(); |
|
|
|
resourceIdSet.retainAll(oldAuthorizedResIds); |
|
if (CollectionUtils.isNotEmpty(resourceIdSet)) { |
|
logger.error("can't be deleted,because it is used of process definition"); |
|
for (Integer resId : resourceIdSet) { |
|
logger.error("resource id:{} is used of process definition {}",resId,resourceProcessMap.get(resId)); |
|
} |
|
putMsg(result, Status.RESOURCE_IS_USED); |
|
return result; |
|
} |
|
|
|
} |
|
|
|
resourcesUserMapper.deleteResourceUser(userId, 0); |
|
|
|
if (check(result, StringUtils.isEmpty(resourceIds), Status.SUCCESS)) { |
|
return result; |
|
} |
|
|
|
for (int resourceIdValue : needAuthorizeResIds) { |
|
Resource resource = resourceMapper.selectById(resourceIdValue); |
|
if (resource == null) { |
|
putMsg(result, Status.RESOURCE_NOT_EXIST); |
|
return result; |
|
} |
|
|
|
Date now = new Date(); |
|
ResourcesUser resourcesUser = new ResourcesUser(); |
|
resourcesUser.setUserId(userId); |
|
resourcesUser.setResourcesId(resourceIdValue); |
|
if (resource.isDirectory()) { |
|
resourcesUser.setPerm(Constants.AUTHORIZE_READABLE_PERM); |
|
}else{ |
|
resourcesUser.setPerm(Constants.AUTHORIZE_WRITABLE_PERM); |
|
} |
|
|
|
resourcesUser.setCreateTime(now); |
|
resourcesUser.setUpdateTime(now); |
|
resourcesUserMapper.insert(resourcesUser); |
|
|
|
} |
|
|
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
|
|
/** |
|
* grant udf function |
|
* |
|
* @param loginUser login user |
|
* @param userId user id |
|
* @param udfIds udf id array |
|
* @return grant result code |
|
*/ |
|
@Transactional(rollbackFor = RuntimeException.class) |
|
public Map<String, Object> grantUDFFunction(User loginUser, int userId, String udfIds) { |
|
Map<String, Object> result = new HashMap<>(); |
|
|
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
User user = userMapper.selectById(userId); |
|
if(user == null){ |
|
putMsg(result, Status.USER_NOT_EXIST, userId); |
|
return result; |
|
} |
|
|
|
udfUserMapper.deleteByUserId(userId); |
|
|
|
if (check(result, StringUtils.isEmpty(udfIds), Status.SUCCESS)) { |
|
return result; |
|
} |
|
|
|
String[] resourcesIdArr = udfIds.split(","); |
|
|
|
for (String udfId : resourcesIdArr) { |
|
Date now = new Date(); |
|
UDFUser udfUser = new UDFUser(); |
|
udfUser.setUserId(userId); |
|
udfUser.setUdfId(Integer.parseInt(udfId)); |
|
udfUser.setPerm(7); |
|
udfUser.setCreateTime(now); |
|
udfUser.setUpdateTime(now); |
|
udfUserMapper.insert(udfUser); |
|
} |
|
|
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
|
|
/** |
|
* grant datasource |
|
* |
|
* @param loginUser login user |
|
* @param userId user id |
|
* @param datasourceIds data source id array |
|
* @return grant result code |
|
*/ |
|
@Transactional(rollbackFor = RuntimeException.class) |
|
public Map<String, Object> grantDataSource(User loginUser, int userId, String datasourceIds) { |
|
Map<String, Object> result = new HashMap<>(); |
|
result.put(Constants.STATUS, false); |
|
|
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
User user = userMapper.selectById(userId); |
|
if(user == null){ |
|
putMsg(result, Status.USER_NOT_EXIST, userId); |
|
return result; |
|
} |
|
|
|
datasourceUserMapper.deleteByUserId(userId); |
|
|
|
if (check(result, StringUtils.isEmpty(datasourceIds), Status.SUCCESS)) { |
|
return result; |
|
} |
|
|
|
String[] datasourceIdArr = datasourceIds.split(","); |
|
|
|
for (String datasourceId : datasourceIdArr) { |
|
Date now = new Date(); |
|
|
|
DatasourceUser datasourceUser = new DatasourceUser(); |
|
datasourceUser.setUserId(userId); |
|
datasourceUser.setDatasourceId(Integer.parseInt(datasourceId)); |
|
datasourceUser.setPerm(7); |
|
datasourceUser.setCreateTime(now); |
|
datasourceUser.setUpdateTime(now); |
|
datasourceUserMapper.insert(datasourceUser); |
|
} |
|
|
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
/** |
|
* query user info |
|
* |
|
* @param loginUser login user |
|
* @return user info |
|
*/ |
|
public Map<String, Object> getUserInfo(User loginUser) { |
|
|
|
Map<String, Object> result = new HashMap<>(); |
|
|
|
User user = null; |
|
if (loginUser.getUserType() == UserType.ADMIN_USER) { |
|
user = loginUser; |
|
} else { |
|
user = userMapper.queryDetailsById(loginUser.getId()); |
|
|
|
List<AlertGroup> alertGroups = alertGroupMapper.queryByUserId(loginUser.getId()); |
|
|
|
StringBuilder sb = new StringBuilder(); |
|
|
|
if (alertGroups != null && alertGroups.size() > 0) { |
|
for (int i = 0; i < alertGroups.size() - 1; i++) { |
|
sb.append(alertGroups.get(i).getGroupName() + ","); |
|
} |
|
sb.append(alertGroups.get(alertGroups.size() - 1)); |
|
user.setAlertGroup(sb.toString()); |
|
} |
|
} |
|
|
|
result.put(Constants.DATA_LIST, user); |
|
|
|
putMsg(result, Status.SUCCESS); |
|
return result; |
|
} |
|
|
|
/** |
|
* query user list |
|
* |
|
* @param loginUser login user |
|
* @return user list |
|
*/ |
|
public Map<String, Object> queryAllGeneralUsers(User loginUser) { |
|
Map<String, Object> result = new HashMap<>(); |
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
|
|
List<User> userList = userMapper.queryAllGeneralUser(); |
|
result.put(Constants.DATA_LIST, userList); |
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
|
|
/** |
|
* query user list |
|
* |
|
* @param loginUser login user |
|
* @return user list |
|
*/ |
|
public Map<String, Object> queryUserList(User loginUser) { |
|
Map<String, Object> result = new HashMap<>(); |
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
|
|
List<User> userList = userMapper.selectList(null ); |
|
result.put(Constants.DATA_LIST, userList); |
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
/** |
|
* verify user name exists |
|
* |
|
* @param userName user name |
|
* @return true if user name not exists, otherwise return false |
|
*/ |
|
public Result verifyUserName(String userName) { |
|
|
|
Result result = new Result(); |
|
User user = userMapper.queryByUserNameAccurately(userName); |
|
if (user != null) { |
|
logger.error("user {} has exist, can't create again.", userName); |
|
|
|
putMsg(result, Status.USER_NAME_EXIST); |
|
} else { |
|
putMsg(result, Status.SUCCESS); |
|
} |
|
|
|
return result; |
|
} |
|
|
|
|
|
/** |
|
* unauthorized user |
|
* |
|
* @param loginUser login user |
|
* @param alertgroupId alert group id |
|
* @return unauthorize result code |
|
*/ |
|
public Map<String, Object> unauthorizedUser(User loginUser, Integer alertgroupId) { |
|
|
|
Map<String, Object> result = new HashMap<>(); |
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
|
|
List<User> userList = userMapper.selectList(null ); |
|
List<User> resultUsers = new ArrayList<>(); |
|
Set<User> userSet = null; |
|
if (userList != null && userList.size() > 0) { |
|
userSet = new HashSet<>(userList); |
|
|
|
List<User> authedUserList = userMapper.queryUserListByAlertGroupId(alertgroupId); |
|
|
|
Set<User> authedUserSet = null; |
|
if (authedUserList != null && authedUserList.size() > 0) { |
|
authedUserSet = new HashSet<>(authedUserList); |
|
userSet.removeAll(authedUserSet); |
|
} |
|
resultUsers = new ArrayList<>(userSet); |
|
} |
|
result.put(Constants.DATA_LIST, resultUsers); |
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
|
|
/** |
|
* authorized user |
|
* |
|
* @param loginUser login user |
|
* @param alertgroupId alert group id |
|
* @return authorized result code |
|
*/ |
|
public Map<String, Object> authorizedUser(User loginUser, Integer alertgroupId) { |
|
Map<String, Object> result = new HashMap<>(); |
|
//only admin can operate |
|
if (check(result, !isAdmin(loginUser), Status.USER_NO_OPERATION_PERM)) { |
|
return result; |
|
} |
|
List<User> userList = userMapper.queryUserListByAlertGroupId(alertgroupId); |
|
result.put(Constants.DATA_LIST, userList); |
|
putMsg(result, Status.SUCCESS); |
|
|
|
return result; |
|
} |
|
|
|
/** |
|
* check |
|
* |
|
* @param result result |
|
* @param bool bool |
|
* @param userNoOperationPerm status |
|
* @return check result |
|
*/ |
|
private boolean check(Map<String, Object> result, boolean bool, Status userNoOperationPerm) { |
|
//only admin can operate |
|
if (bool) { |
|
result.put(Constants.STATUS, userNoOperationPerm); |
|
result.put(Constants.MSG, userNoOperationPerm.getMsg()); |
|
return true; |
|
} |
|
return false; |
|
} |
|
|
|
/** |
|
* @param tenantId tenant id |
|
* @return true if tenant exists, otherwise return false |
|
*/ |
|
private boolean checkTenantExists(int tenantId) { |
|
return tenantMapper.queryById(tenantId) != null ? true : false; |
|
} |
|
|
|
/** |
|
* |
|
* @param userName |
|
* @param password |
|
* @param email |
|
* @param phone |
|
* @return if check failed return the field, otherwise return null |
|
*/ |
|
private String checkUserParams(String userName, String password, String email, String phone) { |
|
|
|
String msg = null; |
|
if (!CheckUtils.checkUserName(userName)) { |
|
|
|
msg = userName; |
|
} else if (!CheckUtils.checkPassword(password)) { |
|
|
|
msg = password; |
|
} else if (!CheckUtils.checkEmail(email)) { |
|
|
|
msg = email; |
|
} else if (!CheckUtils.checkPhone(phone)) { |
|
|
|
msg = phone; |
|
} |
|
|
|
return msg; |
|
} |
|
|
|
/** |
|
* copy resource files |
|
* @param resourceComponent resource component |
|
* @param srcBasePath src base path |
|
* @param dstBasePath dst base path |
|
* @throws IOException io exception |
|
*/ |
|
private void copyResourceFiles(ResourceComponent resourceComponent, String srcBasePath, String dstBasePath) throws IOException { |
|
List<ResourceComponent> components = resourceComponent.getChildren(); |
|
|
|
if (CollectionUtils.isNotEmpty(components)) { |
|
for (ResourceComponent component:components) { |
|
// verify whether exist |
|
if (!HadoopUtils.getInstance().exists(String.format("%s/%s",srcBasePath,component.getFullName()))){ |
|
logger.error("resource file: {} not exist,copy error",component.getFullName()); |
|
throw new ServiceException(Status.RESOURCE_NOT_EXIST); |
|
} |
|
|
|
if (!component.isDirctory()) { |
|
// copy it to dst |
|
HadoopUtils.getInstance().copy(String.format("%s/%s",srcBasePath,component.getFullName()),String.format("%s/%s",dstBasePath,component.getFullName()),false,true); |
|
continue; |
|
} |
|
|
|
if(CollectionUtils.isEmpty(component.getChildren())) { |
|
// if not exist,need create it |
|
if (!HadoopUtils.getInstance().exists(String.format("%s/%s",dstBasePath,component.getFullName()))) { |
|
HadoopUtils.getInstance().mkdir(String.format("%s/%s",dstBasePath,component.getFullName())); |
|
} |
|
}else{ |
|
copyResourceFiles(component,srcBasePath,dstBasePath); |
|
} |
|
} |
|
} |
|
} |
|
|
|
/** |
|
* register user, default state is 0, default tenant_id is 1, no phone, no queue |
|
* |
|
* @param userName user name |
|
* @param userPassword user password |
|
* @param repeatPassword repeat password |
|
* @param email email |
|
* @return register result code |
|
* @throws Exception exception |
|
*/ |
|
@Transactional(rollbackFor = RuntimeException.class) |
|
public Map<String, Object> registerUser(String userName, String userPassword, String repeatPassword, String email) { |
|
Map<String, Object> result = new HashMap<>(); |
|
|
|
//check user params |
|
String msg = this.checkUserParams(userName, userPassword, email, ""); |
|
|
|
if (!StringUtils.isEmpty(msg)) { |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR,msg); |
|
return result; |
|
} |
|
|
|
if (!userPassword.equals(repeatPassword)) { |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR, "two passwords are not same"); |
|
return result; |
|
} |
|
User user = createUser(userName, userPassword, email, 1, "", "", Flag.NO.ordinal()); |
|
putMsg(result, Status.SUCCESS); |
|
result.put(Constants.DATA_LIST, user); |
|
return result; |
|
} |
|
|
|
/** |
|
* activate user, only system admin have permission, change user state code 0 to 1 |
|
* |
|
* @param loginUser login user |
|
* @param userName user name |
|
* @return create result code |
|
*/ |
|
public Map<String, Object> activateUser(User loginUser, String userName) { |
|
Map<String, Object> result = new HashMap<>(); |
|
result.put(Constants.STATUS, false); |
|
|
|
if (!isAdmin(loginUser)) { |
|
putMsg(result, Status.USER_NO_OPERATION_PERM); |
|
return result; |
|
} |
|
|
|
if (!CheckUtils.checkUserName(userName)){ |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR, userName); |
|
return result; |
|
} |
|
|
|
User user = userMapper.queryByUserNameAccurately(userName); |
|
|
|
if (user == null) { |
|
putMsg(result, Status.USER_NOT_EXIST, userName); |
|
return result; |
|
} |
|
|
|
if (user.getState() != Flag.NO.ordinal()) { |
|
putMsg(result, Status.REQUEST_PARAMS_NOT_VALID_ERROR, userName); |
|
return result; |
|
} |
|
|
|
user.setState(Flag.YES.ordinal()); |
|
Date now = new Date(); |
|
user.setUpdateTime(now); |
|
userMapper.updateById(user); |
|
User responseUser = userMapper.queryByUserNameAccurately(userName); |
|
putMsg(result, Status.SUCCESS); |
|
result.put(Constants.DATA_LIST, responseUser); |
|
return result; |
|
} |
|
|
|
/** |
|
* activate user, only system admin have permission, change users state code 0 to 1 |
|
* |
|
* @param loginUser login user |
|
* @param userNames user name |
|
* @return create result code |
|
*/ |
|
public Map<String, Object> batchActivateUser(User loginUser, List<String> userNames) { |
|
Map<String, Object> result = new HashMap<>(); |
|
|
|
if (!isAdmin(loginUser)) { |
|
putMsg(result, Status.USER_NO_OPERATION_PERM); |
|
return result; |
|
} |
|
|
|
int totalSuccess = 0; |
|
List<String> successUserNames = new ArrayList<>(); |
|
Map<String, Object> successRes = new HashMap<>(); |
|
int totalFailed = 0; |
|
List<Map<String, String>> failedInfo = new ArrayList<>(); |
|
Map<String, Object> failedRes = new HashMap<>(); |
|
for (String userName : userNames) { |
|
Map<String, Object> tmpResult = activateUser(loginUser, userName); |
|
if (tmpResult.get(Constants.STATUS) != Status.SUCCESS) { |
|
totalFailed++; |
|
Map<String, String> failedBody = new HashMap<>(); |
|
failedBody.put("userName", userName); |
|
Status status = (Status) tmpResult.get(Constants.STATUS); |
|
String errorMessage = MessageFormat.format(status.getMsg(), userName); |
|
failedBody.put("msg", errorMessage); |
|
failedInfo.add(failedBody); |
|
} else { |
|
totalSuccess++; |
|
successUserNames.add(userName); |
|
} |
|
} |
|
successRes.put("sum", totalSuccess); |
|
successRes.put("userName", successUserNames); |
|
failedRes.put("sum", totalFailed); |
|
failedRes.put("info", failedInfo); |
|
Map<String, Object> res = new HashMap<>(); |
|
res.put("success", successRes); |
|
res.put("failed", failedRes); |
|
putMsg(result, Status.SUCCESS); |
|
result.put(Constants.DATA_LIST, res); |
|
return result; |
|
} |
|
}
|
|
|