ModPasswordExcutor.cs 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. using System;
  2. using System.Collections.Generic;
  3. using System.Data.SqlClient;
  4. using System.Linq;
  5. using System.Text;
  6. using JLHHJSvr.BLL;
  7. using JLHHJSvr.Com;
  8. using JLHHJSvr.Com.Model;
  9. using JLHHJSvr.DBA.DBModle;
  10. using LJLib.DAL.SQL;
  11. using LJLib.Net.SPI.Server;
  12. using LJLib.SQLEX;
  13. using LJLib.Tools.DEncrypt;
  14. namespace JLHHJSvr.Excutor
  15. {
  16. internal sealed class ModPasswordExcutor : ExcutorBase<ModPasswordRequest, ModPasswordResponse>
  17. {
  18. protected override void ExcuteInternal(ModPasswordRequest request, object state, ModPasswordResponse rslt)
  19. {
  20. TokenData tokendata = null;
  21. if (string.IsNullOrEmpty(request.usercode))
  22. {
  23. rslt.ErrMsg = "未填写用户名";
  24. return;
  25. }
  26. if (request.oldpsw == null)
  27. {
  28. rslt.ErrMsg = "入参异常,旧密码为空";
  29. return;
  30. }
  31. if (request.newpsw == null)
  32. {
  33. //重置
  34. tokendata = BllHelper.GetToken(request.token);
  35. if (tokendata == null)
  36. {
  37. rslt.ErrMsg = "会话已经中断,请重新登录";
  38. return;
  39. }
  40. }
  41. else if (request.newpsw.Equals(""))
  42. {
  43. rslt.ErrMsg = "新密码不能为空";
  44. return;
  45. }
  46. using (var con = GlobalVar.ConnectionString.NewSqlConnection())
  47. using (var cmd = con.CreateCommand())
  48. {
  49. con.Open();
  50. var user = new st_user(){usercode = request.usercode};
  51. cmd.CommandText = "SELECT userid, psw FROM st_user WHERE usercode = @usercode";
  52. cmd.Parameters.Clear();
  53. cmd.Parameters.AddWithValue("@usercode", user.usercode);
  54. using (var reader = cmd.ExecuteReader())
  55. {
  56. if (reader.Read())
  57. {
  58. user.userid = Convert.ToInt32(reader["userid"]);
  59. user.psw = Convert.ToString(reader["psw"]);
  60. }
  61. else
  62. {
  63. rslt.ErrMsg = string.Format("没有用户名为[{0}]的用户");
  64. return;
  65. }
  66. }
  67. using (cmd.Transaction = con.BeginTransaction())
  68. {
  69. try
  70. {
  71. if (request.newpsw == null)
  72. {
  73. //重置
  74. var havePower = new Power().CheckPower(cmd, tokendata.userid, 26);
  75. if (!havePower)
  76. {
  77. rslt.ErrMsg = "您没有恢复密码的权限";
  78. return;
  79. }
  80. //重置后密码与用户名一样
  81. user.psw = DESEncrypt.Encrypt(request.usercode, "BC493812B6664BECBF44C21C3BB043C4");
  82. }
  83. else
  84. {
  85. //修改
  86. if (DESEncrypt.Encrypt(request.oldpsw, "BC493812B6664BECBF44C21C3BB043C4") != user.psw)
  87. {
  88. rslt.ErrMsg = "密码错误";
  89. return;
  90. }
  91. user.psw = DESEncrypt.Encrypt(request.newpsw, "BC493812B6664BECBF44C21C3BB043C4");
  92. }
  93. DbSqlHelper.Update(cmd, user, "psw");
  94. cmd.Transaction.Commit();
  95. }
  96. catch (Exception e)
  97. {
  98. cmd.Transaction.Rollback();
  99. rslt.ErrMsg = e.ToString();
  100. }
  101. }
  102. }
  103. }
  104. }
  105. }