33import com .auth0 .jwt .exceptions .*;
44import com .auth0 .jwt .exceptions .TokenExpiredException ;
55import com .auth0 .jwt .interfaces .Claim ;
6+ import io .github .talelin .autoconfigure .beans .MetaInfo ;
67import io .github .talelin .autoconfigure .exception .AuthenticationException ;
78import io .github .talelin .autoconfigure .exception .AuthorizationException ;
89import io .github .talelin .autoconfigure .exception .NotFoundException ;
910import io .github .talelin .autoconfigure .exception .TokenInvalidException ;
10- import io .github .talelin .core .annotation .RouteMeta ;
1111import io .github .talelin .merak .common .LocalUser ;
1212import io .github .talelin .merak .model .PermissionDO ;
1313import io .github .talelin .merak .model .UserDO ;
1818import org .apache .logging .log4j .util .Strings ;
1919import org .springframework .beans .factory .annotation .Autowired ;
2020import org .springframework .stereotype .Component ;
21- import org .springframework .web .servlet .ModelAndView ;
22-
2321
2422import javax .servlet .http .HttpServletRequest ;
2523import javax .servlet .http .HttpServletResponse ;
@@ -45,7 +43,7 @@ public class AuthorizeVerifyResolverImpl implements AuthorizeVerifyResolver {
4543 private GroupService groupService ;
4644
4745
48- public boolean handleLogin (HttpServletRequest request , HttpServletResponse response , RouteMeta meta ) {
46+ public boolean handleLogin (HttpServletRequest request , HttpServletResponse response , MetaInfo meta ) {
4947 String tokenStr = verifyHeader (request , response );
5048 Map <String , Claim > claims = null ;
5149 try {
@@ -59,22 +57,22 @@ public boolean handleLogin(HttpServletRequest request, HttpServletResponse respo
5957 }
6058
6159 @ Override
62- public boolean handleGroup (HttpServletRequest request , HttpServletResponse response , RouteMeta meta ) {
60+ public boolean handleGroup (HttpServletRequest request , HttpServletResponse response , MetaInfo meta ) {
6361 handleLogin (request , response , meta );
6462 UserDO user = LocalUser .getLocalUser ();
6563 if (verifyAdmin (user ))
6664 return true ;
6765 long userId = user .getId ();
68- String permission = meta .permission ();
69- String module = meta .module ();
66+ String permission = meta .getPermission ();
67+ String module = meta .getModule ();
7068 List <PermissionDO > permissions = userService .getUserPermissions (userId );
7169 boolean matched = permissions .stream ().anyMatch (it -> it .getModule ().equals (module ) && it .getName ().equals (permission ));
7270 if (!matched )
7371 throw new AuthenticationException ("you don't have the permission to access" , 10001 );
7472 return true ;
7573 }
7674
77- public boolean handleAdmin (HttpServletRequest request , HttpServletResponse response , RouteMeta meta ) {
75+ public boolean handleAdmin (HttpServletRequest request , HttpServletResponse response , MetaInfo meta ) {
7876 handleLogin (request , response , meta );
7977 UserDO user = LocalUser .getLocalUser ();
8078 if (!verifyAdmin (user ))
@@ -83,7 +81,7 @@ public boolean handleAdmin(HttpServletRequest request, HttpServletResponse respo
8381 }
8482
8583
86- public boolean handleRefresh (HttpServletRequest request , HttpServletResponse response , RouteMeta meta ) {
84+ public boolean handleRefresh (HttpServletRequest request , HttpServletResponse response , MetaInfo meta ) {
8785 String tokenStr = verifyHeader (request , response );
8886 Map <String , Claim > claims = null ;
8987 try {
0 commit comments