logoutHandler_test.go 2.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576
  1. package auth
  2. import (
  3. "context"
  4. "database/sql"
  5. "encoding/json"
  6. "net/http"
  7. "net/http/httptest"
  8. "testing"
  9. "time"
  10. "perms-system-server/internal/loaders"
  11. "perms-system-server/internal/middleware"
  12. userModel "perms-system-server/internal/model/user"
  13. "perms-system-server/internal/response"
  14. "perms-system-server/internal/svc"
  15. "perms-system-server/internal/testutil"
  16. "github.com/stretchr/testify/assert"
  17. "github.com/stretchr/testify/require"
  18. )
  19. func init() { response.Setup() }
  20. // TC-0796: handler 薄层契约 —— LogoutHandler 在无认证上下文(userId=0) 时必须返回 401,
  21. // 而不是 200 或 5xx。这把"handler 正确透传 logic 错误"的契约冻结住, 避免未来改造时
  22. // 意外把未登录请求吞成成功/崩溃。
  23. func TestLogoutHandler_UnauthorizedWhenNoUserCtx(t *testing.T) {
  24. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  25. handler := LogoutHandler(svcCtx)
  26. req := httptest.NewRequest(http.MethodPost, "/api/auth/logout", nil)
  27. rr := httptest.NewRecorder()
  28. handler.ServeHTTP(rr, req)
  29. var body response.Body
  30. require.NoError(t, json.Unmarshal(rr.Body.Bytes(), &body))
  31. assert.False(t, body.Success)
  32. assert.Equal(t, 401, body.ErrorCode)
  33. assert.Contains(t, body.ErrorMessage, "未登录")
  34. }
  35. // TC-0797: handler 薄层契约 —— LogoutHandler 在有效认证上下文下必须 200 且无响应体(httpx.Ok);
  36. // 同时 DB 的 tokenVersion 必须被实际递增 (证明 handler 真的调用了 logic 而不是只返回 200)。
  37. func TestLogoutHandler_SuccessIncrementsTokenVersion(t *testing.T) {
  38. ctx := context.Background()
  39. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  40. conn := testutil.GetTestSqlConn()
  41. now := time.Now().Unix()
  42. res, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  43. Username: "h_lo_" + testutil.UniqueId(), Password: testutil.HashPassword("pw"),
  44. Nickname: "h_lo", Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  45. Status: 1, TokenVersion: 0, CreateTime: now, UpdateTime: now,
  46. })
  47. require.NoError(t, err)
  48. userId, _ := res.LastInsertId()
  49. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  50. handler := LogoutHandler(svcCtx)
  51. req := httptest.NewRequest(http.MethodPost, "/api/auth/logout", nil)
  52. // 模拟 JWT middleware 已经注入 userDetails 的场景
  53. req = req.WithContext(middleware.WithUserDetails(req.Context(), &loaders.UserDetails{
  54. UserId: userId, Username: "h_lo", Status: 1,
  55. }))
  56. rr := httptest.NewRecorder()
  57. handler.ServeHTTP(rr, req)
  58. assert.Equal(t, http.StatusOK, rr.Code, "成功登出必须 200")
  59. u, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  60. require.NoError(t, err)
  61. assert.Equal(t, int64(1), u.TokenVersion,
  62. "handler 必须真正触达 logic 层; tokenVersion 未递增说明 handler 伪装成功")
  63. }