userDetailPIIMask_audit_test.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. package user
  2. import (
  3. "context"
  4. "database/sql"
  5. "os"
  6. "testing"
  7. "time"
  8. "perms-system-server/internal/consts"
  9. "perms-system-server/internal/loaders"
  10. "perms-system-server/internal/middleware"
  11. memberModel "perms-system-server/internal/model/productmember"
  12. userModel "perms-system-server/internal/model/user"
  13. "perms-system-server/internal/svc"
  14. "perms-system-server/internal/testutil"
  15. "perms-system-server/internal/testutil/ctxhelper"
  16. "perms-system-server/internal/types"
  17. "github.com/stretchr/testify/assert"
  18. "github.com/stretchr/testify/require"
  19. )
  20. // ---------------------------------------------------------------------------
  21. // 审计 H-1(第 8 轮仍未落地,三轮累计)—— UserDetailLogic / UserListLogic 把
  22. // Email / Phone / Remark 字段原样返回给任意同产品成员,违反 PIPL 最小必要。
  23. // 审计 L-3(同样未落地)—— CheckManageAccess 对 caller.DeptId=0 老账号直接 403,
  24. // 导致历史 MEMBER/DEVELOPER 连"看自己"以外的任何管理动作都做不了(即使目标合法)。
  25. //
  26. // 本文件用"契约测试"的方式同时完成两件事:
  27. // 1) 为正确行为写死断言(assert.Equal(masked, ...) / assert.NoError),
  28. // fix 一落地即可把 t.Skip 开关打开,立刻得到回归保护。
  29. // 2) 默认 t.Skipf 并在 skip message 里留下 `AUDIT_PENDING` 关键词,report 生成
  30. // 流程据此统计"已知失败测试",避免把未修缺陷当成"100% 通过"粉饰。
  31. //
  32. // 开关:SET AUDIT_RUN_PENDING=1 可强制跑这些测试,CI 会红并指出是哪一条未 fix。
  33. // ---------------------------------------------------------------------------
  34. const auditPendingEnv = "AUDIT_RUN_PENDING"
  35. func skipPending(t *testing.T, marker, reason string) {
  36. t.Helper()
  37. if os.Getenv(auditPendingEnv) != "" {
  38. return
  39. }
  40. t.Skipf("AUDIT_PENDING %s (Round 8 fix 未落地) —— %s", marker, reason)
  41. }
  42. func insertH1Member(t *testing.T, ctx context.Context, svcCtx *svc.ServiceContext, productCode string, u *userModel.SysUser) (int64, int64) {
  43. t.Helper()
  44. id := insertTestUserFull(t, ctx, u)
  45. now := time.Now().Unix()
  46. res, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  47. ProductCode: productCode, UserId: id, MemberType: consts.MemberTypeMember,
  48. Status: 1, CreateTime: now, UpdateTime: now,
  49. })
  50. require.NoError(t, err)
  51. mId, _ := res.LastInsertId()
  52. return id, mId
  53. }
  54. // TC-0990: H-1 对抗性 —— 同产品 MEMBER 互看,必须屏蔽 Email/Phone/Remark。
  55. func TestUserDetail_H1_MemberViewingPeer_MustMaskPII(t *testing.T) {
  56. skipPending(t, "H-1",
  57. "UserDetail 当前把 Email/Phone/Remark 原样回传同产品 MEMBER;"+
  58. "待 filterPIIForCaller + CanViewContact 落地后移除 Skip")
  59. ctx := context.Background()
  60. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  61. conn := testutil.GetTestSqlConn()
  62. productCode := "h1_" + testutil.UniqueId()
  63. target, mTarget := insertH1Member(t, ctx, svcCtx, productCode, &userModel.SysUser{
  64. Username: "t_" + testutil.UniqueId(),
  65. Password: testutil.HashPassword("pw"),
  66. Nickname: "target",
  67. Avatar: sql.NullString{},
  68. Email: "[email protected]",
  69. Phone: "13800001111",
  70. Remark: "内部岗位: 副总",
  71. DeptId: 1,
  72. IsSuperAdmin: 2,
  73. MustChangePassword: 2,
  74. Status: 1,
  75. })
  76. caller, mCaller := insertH1Member(t, ctx, svcCtx, productCode, &userModel.SysUser{
  77. Username: "c_" + testutil.UniqueId(),
  78. Password: testutil.HashPassword("pw"),
  79. Nickname: "caller",
  80. IsSuperAdmin: 2,
  81. MustChangePassword: 2,
  82. Status: 1,
  83. DeptId: 1,
  84. })
  85. t.Cleanup(func() {
  86. testutil.CleanTable(ctx, conn, "`sys_product_member`", mTarget, mCaller)
  87. testutil.CleanTable(ctx, conn, "`sys_user`", target, caller)
  88. })
  89. callerCtx := middleware.WithUserDetails(context.Background(), &loaders.UserDetails{
  90. UserId: caller, Username: "caller", MemberType: consts.MemberTypeMember,
  91. Status: 1, ProductCode: productCode, DeptId: 1, DeptPath: "/1/", MinPermsLevel: 100,
  92. })
  93. resp, err := NewUserDetailLogic(callerCtx, svcCtx).UserDetail(&types.UserDetailReq{Id: target})
  94. require.NoError(t, err)
  95. require.NotNil(t, resp)
  96. assert.NotEqual(t, "[email protected]", resp.Email,
  97. "H-1:同级 MEMBER 互看时 Email 必须脱敏(例:t***@example.com),禁止原文暴露")
  98. assert.NotEqual(t, "13800001111", resp.Phone,
  99. "H-1:同级 MEMBER 互看时 Phone 必须脱敏(例:138****1111)")
  100. assert.Empty(t, resp.Remark,
  101. "H-1:Remark 常含内部岗位/外部联络人,MEMBER 互看时必须清空")
  102. }
  103. // TC-0991: H-1 正向——看自己时 Email/Phone/Remark 必须返回原值。
  104. func TestUserDetail_H1_ViewSelf_KeepsPII(t *testing.T) {
  105. skipPending(t, "H-1",
  106. "UserDetail 缺少 caller.UserId == target.Id 的 PII 放行短路;fix 落地后取消 Skip")
  107. ctx := context.Background()
  108. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  109. conn := testutil.GetTestSqlConn()
  110. productCode := "h1_self_" + testutil.UniqueId()
  111. selfId, mSelf := insertH1Member(t, ctx, svcCtx, productCode, &userModel.SysUser{
  112. Username: "self_" + testutil.UniqueId(),
  113. Password: testutil.HashPassword("pw"),
  114. Nickname: "self",
  115. Email: "[email protected]",
  116. Phone: "13900002222",
  117. Remark: "self-only note",
  118. IsSuperAdmin: 2,
  119. MustChangePassword: 2,
  120. Status: 1,
  121. DeptId: 1,
  122. })
  123. t.Cleanup(func() {
  124. testutil.CleanTable(ctx, conn, "`sys_product_member`", mSelf)
  125. testutil.CleanTable(ctx, conn, "`sys_user`", selfId)
  126. })
  127. selfCtx := middleware.WithUserDetails(context.Background(), &loaders.UserDetails{
  128. UserId: selfId, Username: "self", MemberType: consts.MemberTypeMember,
  129. Status: 1, ProductCode: productCode, DeptId: 1, DeptPath: "/1/", MinPermsLevel: 100,
  130. })
  131. resp, err := NewUserDetailLogic(selfCtx, svcCtx).UserDetail(&types.UserDetailReq{Id: selfId})
  132. require.NoError(t, err)
  133. assert.Equal(t, "[email protected]", resp.Email, "H-1:看自己必须返回 Email 原值")
  134. assert.Equal(t, "13900002222", resp.Phone, "H-1:看自己必须返回 Phone 原值")
  135. assert.Equal(t, "self-only note", resp.Remark, "H-1:看自己必须返回 Remark 原值")
  136. }
  137. // TC-0992: H-1 超管分支 —— SuperAdmin 看任何用户都可以看到 PII 原值(工单兜底)。
  138. // 该分支本应通过;若 fix 改错把超管也一起脱敏了这条会挂,触发回归。
  139. func TestUserDetail_H1_SuperAdmin_KeepsPII(t *testing.T) {
  140. skipPending(t, "H-1",
  141. "当前无脱敏逻辑,超管天然看到原值;fix 落地后本测试用来防回归,确保超管不被误脱敏")
  142. ctx := ctxhelper.SuperAdminCtx()
  143. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  144. conn := testutil.GetTestSqlConn()
  145. userId := insertTestUserFull(t, ctx, &userModel.SysUser{
  146. Username: "sa_view_" + testutil.UniqueId(), Password: testutil.HashPassword("pw"),
  147. Nickname: "n", Email: "[email protected]", Phone: "13700000000", Remark: "nb",
  148. IsSuperAdmin: 2, MustChangePassword: 2, Status: 1,
  149. })
  150. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  151. resp, err := NewUserDetailLogic(ctx, svcCtx).UserDetail(&types.UserDetailReq{Id: userId})
  152. require.NoError(t, err)
  153. assert.Equal(t, "[email protected]", resp.Email)
  154. assert.Equal(t, "13700000000", resp.Phone)
  155. assert.Equal(t, "nb", resp.Remark)
  156. }