bindRolesLogic.go 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. package user
  2. import (
  3. "context"
  4. "time"
  5. "perms-system-server/internal/consts"
  6. authHelper "perms-system-server/internal/logic/auth"
  7. "perms-system-server/internal/middleware"
  8. "perms-system-server/internal/model/userrole"
  9. "perms-system-server/internal/response"
  10. "perms-system-server/internal/svc"
  11. "perms-system-server/internal/types"
  12. "github.com/zeromicro/go-zero/core/logx"
  13. "github.com/zeromicro/go-zero/core/stores/sqlx"
  14. )
  15. type BindRolesLogic struct {
  16. logx.Logger
  17. ctx context.Context
  18. svcCtx *svc.ServiceContext
  19. }
  20. func NewBindRolesLogic(ctx context.Context, svcCtx *svc.ServiceContext) *BindRolesLogic {
  21. return &BindRolesLogic{
  22. Logger: logx.WithContext(ctx),
  23. ctx: ctx,
  24. svcCtx: svcCtx,
  25. }
  26. }
  27. // BindRoles 绑定用户角色。对指定用户在当前产品下做角色全量覆盖(diff 后批量新增/删除),支持权限级别校验防止越权分配。
  28. func (l *BindRolesLogic) BindRoles(req *types.BindRolesReq) error {
  29. caller := middleware.GetUserDetails(l.ctx)
  30. if caller == nil {
  31. return response.ErrUnauthorized("未登录")
  32. }
  33. targetUser, err := l.svcCtx.SysUserModel.FindOne(l.ctx, req.UserId)
  34. if err != nil {
  35. return response.ErrNotFound("用户不存在")
  36. }
  37. productCode := middleware.GetProductCode(l.ctx)
  38. if err := authHelper.CheckManageAccess(l.ctx, l.svcCtx, req.UserId, productCode, authHelper.WithPrefetchedTarget(targetUser)); err != nil {
  39. return err
  40. }
  41. member, err := l.svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(l.ctx, productCode, req.UserId)
  42. if err != nil {
  43. return response.ErrBadRequest("目标用户不是当前产品的成员")
  44. }
  45. if member.Status != consts.StatusEnabled {
  46. return response.ErrBadRequest("目标用户的成员资格已被禁用")
  47. }
  48. roleIds := req.RoleIds
  49. if len(roleIds) > 0 {
  50. seen := make(map[int64]bool, len(roleIds))
  51. uniqueIds := make([]int64, 0, len(roleIds))
  52. for _, id := range roleIds {
  53. if !seen[id] {
  54. seen[id] = true
  55. uniqueIds = append(uniqueIds, id)
  56. }
  57. }
  58. roleIds = uniqueIds
  59. }
  60. if len(roleIds) > 0 {
  61. roles, err := l.svcCtx.SysRoleModel.FindByIds(l.ctx, roleIds)
  62. if err != nil {
  63. return err
  64. }
  65. if int64(len(roles)) != int64(len(roleIds)) {
  66. return response.ErrBadRequest("包含无效的角色ID")
  67. }
  68. // 审计 M-R10-3:caller 在一次请求内不变,loadFreshMinPermsLevel 的结果也不变;改由
  69. // LoadCallerAssignableLevel 打一次 DB 取 snapshot,循环内对每个角色走 CheckRoleLevelAgainst
  70. // 做常数时间比较,把"批量绑 N 个 role → N 次 DB" 降到 1 次,同时缩小 caller 降权期间
  71. // 的 TOCTOU 窗口(原实现每次循环都重新读,反而给"超管在 loop 中途降级 caller"N 个窗口)。
  72. assignable, err := authHelper.LoadCallerAssignableLevel(l.ctx, l.svcCtx, caller)
  73. if err != nil {
  74. return err
  75. }
  76. for _, r := range roles {
  77. if r.ProductCode != productCode {
  78. return response.ErrBadRequest("不能绑定其他产品的角色")
  79. }
  80. if r.Status != consts.StatusEnabled {
  81. return response.ErrBadRequest("不能绑定已禁用的角色")
  82. }
  83. if err := authHelper.CheckRoleLevelAgainst(assignable, r.PermsLevel); err != nil {
  84. return err
  85. }
  86. }
  87. }
  88. newSet := make(map[int64]bool, len(roleIds))
  89. for _, id := range roleIds {
  90. newSet[id] = true
  91. }
  92. // 审计 M-R10-2:把"existing 读 + diff + delete/insert"整段收敛进事务,事务第一步以
  93. // FindOneForUpdateTx(member.Id) 锁住 sys_product_member 行,相当于把同一 (userId,
  94. // productCode) 下的并发 BindRoles 串行化;"A 完整覆盖 → B 基于 A 的最终态覆盖" 是唯一
  95. // 可能的交错,消除 RMW 第三态。member 行 lock 也保证了进入事务期间 member 不会被并发
  96. // RemoveMember 清零(那条路径本身也持该行 FOR UPDATE)。
  97. if err := l.svcCtx.SysUserRoleModel.TransactCtx(l.ctx, func(ctx context.Context, session sqlx.Session) error {
  98. if _, err := l.svcCtx.SysProductMemberModel.FindOneForUpdateTx(ctx, session, member.Id); err != nil {
  99. return err
  100. }
  101. existingRoleIds, err := l.svcCtx.SysUserRoleModel.FindRoleIdsByUserIdForProductTx(ctx, session, req.UserId, productCode)
  102. if err != nil {
  103. return err
  104. }
  105. existingSet := make(map[int64]bool, len(existingRoleIds))
  106. for _, id := range existingRoleIds {
  107. existingSet[id] = true
  108. }
  109. var toAdd []int64
  110. for _, id := range roleIds {
  111. if !existingSet[id] {
  112. toAdd = append(toAdd, id)
  113. }
  114. }
  115. var toRemove []int64
  116. for _, id := range existingRoleIds {
  117. if !newSet[id] {
  118. toRemove = append(toRemove, id)
  119. }
  120. }
  121. if len(toAdd) == 0 && len(toRemove) == 0 {
  122. return nil
  123. }
  124. if err := l.svcCtx.SysUserRoleModel.DeleteByUserIdAndRoleIdsTx(ctx, session, req.UserId, toRemove); err != nil {
  125. return err
  126. }
  127. if len(toAdd) > 0 {
  128. now := time.Now().Unix()
  129. data := make([]*userrole.SysUserRole, 0, len(toAdd))
  130. for _, roleId := range toAdd {
  131. data = append(data, &userrole.SysUserRole{
  132. UserId: req.UserId,
  133. RoleId: roleId,
  134. CreateTime: now,
  135. UpdateTime: now,
  136. })
  137. }
  138. return l.svcCtx.SysUserRoleModel.BatchInsertWithTx(ctx, session, data)
  139. }
  140. return nil
  141. }); err != nil {
  142. return err
  143. }
  144. l.svcCtx.UserDetailsLoader.Clean(l.ctx, req.UserId)
  145. return nil
  146. }