From d0226747665355acecd5b4f2b5c0beb020586729 Mon Sep 17 00:00:00 2001 From: skyouc Date: 星期五, 17 一月 2025 15:37:32 +0800 Subject: [PATCH] # 23. PDA拣货单据,勾选或点击确认按钮后,完成当前单据 (已完成) 24. PDA出库成功后,界面数据重置,避免重复操作 (已修复) 25. PDA接口请求,添加一个Loading遮档 (已修复) 27. 非平库单据,在平库可做入库操作 (已修复) 28. 平库已组拖数据,组拖完成后依然可组拖 (已修复) 29. 平库入库后,订单明细没有添加(已修复) 30. 平库入库后,单据类型没有修改(已修复) 31. 没有绑定播种位,不能进行播种,前后端都需加判定(已修复) 33. 平库入库未修改入库已完成数量(已修复) 34. cacheSite缓存站点逻辑需重新梳理,入库生成波次时(已完成) 35. PDA添加发货确认,默认全选 (已修复) 36. 大屏获取任务时,是由容器到达的拖盘码确认通知 (已修复) 37. 拣货单序号不显示 问题修复 (已修复) 42. pda发货确认,添加不同颜色区分是否全部完成拣货,绿色全部拣货完成,红色完成部分拣货(已修复) 43. CTU入库完成后,订单明细没有删除,执行中数量清空(已修复) 44. 平库入库完成后,历史档明细完成数量没有更新 (已修复) 45. PDA料号不显示 (已修复) 46. 发货完成后,波次管理数据未加入历史档 (已修复) --- zy-asrs-wms/src/main/java/com/zy/asrs/wms/common/security/JwtAuthenticationFilter.java | 266 ++++++++++++++++++++++++++-------------------------- 1 files changed, 133 insertions(+), 133 deletions(-) diff --git a/zy-asrs-wms/src/main/java/com/zy/asrs/wms/common/security/JwtAuthenticationFilter.java b/zy-asrs-wms/src/main/java/com/zy/asrs/wms/common/security/JwtAuthenticationFilter.java index 555abff..fbdeede 100644 --- a/zy-asrs-wms/src/main/java/com/zy/asrs/wms/common/security/JwtAuthenticationFilter.java +++ b/zy-asrs-wms/src/main/java/com/zy/asrs/wms/common/security/JwtAuthenticationFilter.java @@ -1,133 +1,133 @@ -package com.zy.asrs.wms.common.security; - -import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper; -import com.zy.asrs.common.domain.enums.LoginSystemType; -import com.zy.asrs.framework.common.Cools; -import com.zy.asrs.wms.common.config.ConfigProperties; -import com.zy.asrs.wms.common.constant.Constants; -import com.zy.asrs.wms.system.entity.Menu; -import com.zy.asrs.wms.system.entity.Role; -import com.zy.asrs.wms.system.entity.User; -import com.zy.asrs.wms.system.entity.UserLogin; -import com.zy.asrs.wms.system.service.UserLoginService; -import com.zy.asrs.wms.system.service.UserRoleService; -import com.zy.asrs.wms.system.service.UserService; -import com.zy.asrs.wms.utils.HttpUtils; -import com.zy.asrs.wms.utils.JwtUtil; -import io.jsonwebtoken.Claims; -import io.jsonwebtoken.ExpiredJwtException; -import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; -import org.springframework.security.core.context.SecurityContextHolder; -import org.springframework.security.core.userdetails.UsernameNotFoundException; -import org.springframework.security.web.util.matcher.AntPathRequestMatcher; -import org.springframework.stereotype.Component; -import org.springframework.web.filter.OncePerRequestFilter; - -import javax.annotation.Resource; -import javax.servlet.FilterChain; -import javax.servlet.ServletException; -import javax.servlet.http.HttpServletRequest; -import javax.servlet.http.HttpServletResponse; -import java.io.IOException; -import java.util.ArrayList; -import java.util.Date; -import java.util.List; -import java.util.stream.Collectors; - -/** - * 澶勭悊鎼哄甫token鐨勮姹傝繃婊ゅ櫒 - * - */ -@Component -public class JwtAuthenticationFilter extends OncePerRequestFilter { - - public static final ArrayList<String> WHITE_LIST = new ArrayList<String>(){ - private static final long serialVersionUID = 1L; - { - add("xltys1995"); - } - }; - - @Resource - private ConfigProperties configProperties; - @Resource - private UserService userService; - @Resource - private UserLoginService userLoginService; - @Resource - private UserRoleService userRoleService; - - @Override - protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain chain) throws ServletException, IOException { - String access_token = JwtUtil.getAccessToken(request); - for (String filterPath : SecurityConfig.FILTER_PATH) { - AntPathRequestMatcher antPathMatcher = new AntPathRequestMatcher(filterPath); - if (antPathMatcher.matches(request)) { - access_token = ""; - } - } - if (!Cools.isEmpty(access_token)) { - try { - User user; - // 鐧藉悕鍗� - if (WHITE_LIST.contains(access_token)) { - user = userService.getByUsername("root", 1L); - if (user == null) { - throw new UsernameNotFoundException("Username not found"); - } - List<Menu> authorities = user.getAuthorities().stream() - .filter(m -> !Cools.isEmpty(m.getAuthority())).collect(Collectors.toList()); - UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken( - user, null, authorities); - SecurityContextHolder.getContext().setAuthentication(authentication); - } else { - // 瑙f瀽token - Claims claims = JwtUtil.parseToken(access_token, configProperties.getTokenKey()); - JwtSubject jwtSubject = JwtUtil.getJwtSubject(claims); - user = userService.getByUsername(jwtSubject.getUsername(), jwtSubject.getHostId()); - if (user == null) { - throw new UsernameNotFoundException("Username not found"); - } - boolean root = false; - List<Role> roles = userRoleService.listByUserId(user.getId()); - for (Role role : roles) { - if (role.getId() == 1) { - root = true; - break; - } - } - UserLogin userLogin = null; - if (root) { - userLogin = userLoginService.superFindByUserId(user.getId(), String.valueOf(LoginSystemType.WMS)); - } - - List<Menu> authorities = user.getAuthorities().stream() - .filter(m -> !Cools.isEmpty(m.getAuthority())).collect(Collectors.toList()); - UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken( - userLogin == null ? user : userLogin, null, authorities); - SecurityContextHolder.getContext().setAuthentication(authentication); - // token灏嗚杩囨湡绛惧彂鏂皌oken, 闃叉绐佺劧閫�鍑虹櫥褰� - long expiration = (claims.getExpiration().getTime() - new Date().getTime()) / 1000 / 60; - if (expiration < configProperties.getTokenRefreshTime()) { - String token = JwtUtil.buildToken(jwtSubject, configProperties.getTokenExpireTime(), - configProperties.getTokenKey()); - response.addHeader(Constants.TOKEN_HEADER_NAME, token); - userLoginService.saveAsync(user.getId(), token, UserLogin.TYPE_REFRESH, user.getHostId(), null, request); - } - } - } catch (ExpiredJwtException e) { - e.printStackTrace(); - HttpUtils.responseError(response, Constants.TOKEN_EXPIRED_CODE, Constants.TOKEN_EXPIRED_MSG, - e.getMessage()); - return; - } catch (Exception e) { - e.printStackTrace(); - HttpUtils.responseError(response, Constants.BAD_CREDENTIALS_CODE, Constants.BAD_CREDENTIALS_MSG, - e.toString()); - return; - } - } - chain.doFilter(request, response); - } - -} +package com.zy.asrs.wms.common.security; + +import com.baomidou.mybatisplus.core.conditions.query.LambdaQueryWrapper; +import com.zy.asrs.common.domain.enums.LoginSystemType; +import com.zy.asrs.framework.common.Cools; +import com.zy.asrs.wms.common.config.ConfigProperties; +import com.zy.asrs.wms.common.constant.Constants; +import com.zy.asrs.wms.system.entity.Menu; +import com.zy.asrs.wms.system.entity.Role; +import com.zy.asrs.wms.system.entity.User; +import com.zy.asrs.wms.system.entity.UserLogin; +import com.zy.asrs.wms.system.service.UserLoginService; +import com.zy.asrs.wms.system.service.UserRoleService; +import com.zy.asrs.wms.system.service.UserService; +import com.zy.asrs.wms.utils.HttpUtils; +import com.zy.asrs.wms.utils.JwtUtil; +import io.jsonwebtoken.Claims; +import io.jsonwebtoken.ExpiredJwtException; +import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; +import org.springframework.security.core.context.SecurityContextHolder; +import org.springframework.security.core.userdetails.UsernameNotFoundException; +import org.springframework.security.web.util.matcher.AntPathRequestMatcher; +import org.springframework.stereotype.Component; +import org.springframework.web.filter.OncePerRequestFilter; + +import javax.annotation.Resource; +import javax.servlet.FilterChain; +import javax.servlet.ServletException; +import javax.servlet.http.HttpServletRequest; +import javax.servlet.http.HttpServletResponse; +import java.io.IOException; +import java.util.ArrayList; +import java.util.Date; +import java.util.List; +import java.util.stream.Collectors; + +/** + * 澶勭悊鎼哄甫token鐨勮姹傝繃婊ゅ櫒 + * + */ +@Component +public class JwtAuthenticationFilter extends OncePerRequestFilter { + + public static final ArrayList<String> WHITE_LIST = new ArrayList<String>(){ + private static final long serialVersionUID = 1L; + { + add("xltys1995"); + } + }; + + @Resource + private ConfigProperties configProperties; + @Resource + private UserService userService; + @Resource + private UserLoginService userLoginService; + @Resource + private UserRoleService userRoleService; + + @Override + protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain chain) throws ServletException, IOException { + String access_token = JwtUtil.getAccessToken(request); + for (String filterPath : SecurityConfig.FILTER_PATH) { + AntPathRequestMatcher antPathMatcher = new AntPathRequestMatcher(filterPath); + if (antPathMatcher.matches(request)) { + access_token = ""; + } + } + if (!Cools.isEmpty(access_token)) { + try { + User user; + // 鐧藉悕鍗� + if (WHITE_LIST.contains(access_token)) { + user = userService.getByUsername("root", 1L); + if (user == null) { + throw new UsernameNotFoundException("Username not found"); + } + List<Menu> authorities = user.getAuthorities().stream() + .filter(m -> !Cools.isEmpty(m.getAuthority())).collect(Collectors.toList()); + UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken( + user, null, authorities); + SecurityContextHolder.getContext().setAuthentication(authentication); + } else { + // 瑙f瀽token + Claims claims = JwtUtil.parseToken(access_token, configProperties.getTokenKey()); + JwtSubject jwtSubject = JwtUtil.getJwtSubject(claims); + user = userService.getByUsername(jwtSubject.getUsername(), jwtSubject.getHostId()); + if (user == null) { + throw new UsernameNotFoundException("Username not found"); + } + boolean root = false; + List<Role> roles = userRoleService.listByUserId(user.getId()); + for (Role role : roles) { + if (role.getId() == 1) { + root = true; + break; + } + } + UserLogin userLogin = null; + if (root) { + userLogin = userLoginService.superFindByUserId(user.getId(), String.valueOf(LoginSystemType.WMS)); + } + + List<Menu> authorities = user.getAuthorities().stream() + .filter(m -> !Cools.isEmpty(m.getAuthority())).collect(Collectors.toList()); + UsernamePasswordAuthenticationToken authentication = new UsernamePasswordAuthenticationToken( + userLogin == null ? user : userLogin, null, authorities); + SecurityContextHolder.getContext().setAuthentication(authentication); + // token灏嗚杩囨湡绛惧彂鏂皌oken, 闃叉绐佺劧閫�鍑虹櫥褰� + long expiration = (claims.getExpiration().getTime() - new Date().getTime()) / 1000 / 60; + if (expiration < configProperties.getTokenRefreshTime()) { + String token = JwtUtil.buildToken(jwtSubject, configProperties.getTokenExpireTime(), + configProperties.getTokenKey()); + response.addHeader(Constants.TOKEN_HEADER_NAME, token); + userLoginService.saveAsync(user.getId(), token, UserLogin.TYPE_REFRESH, user.getHostId(), null, request); + } + } + } catch (ExpiredJwtException e) { + e.printStackTrace(); + HttpUtils.responseError(response, Constants.TOKEN_EXPIRED_CODE, Constants.TOKEN_EXPIRED_MSG, + e.getMessage()); + return; + } catch (Exception e) { + e.printStackTrace(); + HttpUtils.responseError(response, Constants.BAD_CREDENTIALS_CODE, Constants.BAD_CREDENTIALS_MSG, + e.toString()); + return; + } + } + chain.doFilter(request, response); + } + +} -- Gitblit v1.9.1