| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583 |
- package user
- import (
- "errors"
- "fmt"
- "math"
- "testing"
- "time"
- "perms-system-server/internal/consts"
- "perms-system-server/internal/loaders"
- deptModel "perms-system-server/internal/model/dept"
- memberModel "perms-system-server/internal/model/productmember"
- roleModel "perms-system-server/internal/model/role"
- userModel "perms-system-server/internal/model/user"
- "perms-system-server/internal/response"
- "perms-system-server/internal/svc"
- "perms-system-server/internal/testutil"
- "perms-system-server/internal/testutil/ctxhelper"
- "perms-system-server/internal/types"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- )
- func insertTestMember(t *testing.T, svcCtx *svc.ServiceContext, productCode string, userId int64) int64 {
- t.Helper()
- now := time.Now().Unix()
- res, err := svcCtx.SysProductMemberModel.Insert(ctxhelper.SuperAdminCtx(), &memberModel.SysProductMember{
- ProductCode: productCode,
- UserId: userId,
- MemberType: "MEMBER",
- Status: 1,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- id, _ := res.LastInsertId()
- return id
- }
- func insertTestRole(t *testing.T, svcCtx *svc.ServiceContext, productCode string, status int64) int64 {
- t.Helper()
- now := time.Now().Unix()
- res, err := svcCtx.SysRoleModel.Insert(ctxhelper.SuperAdminCtx(), &roleModel.SysRole{
- ProductCode: productCode,
- Name: "role_" + testutil.UniqueId(),
- Status: status,
- PermsLevel: 1,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- id, _ := res.LastInsertId()
- return id
- }
- // TC-0184: 正常绑定
- func TestBindRoles_Success(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- r1 := insertTestRole(t, svcCtx, "test_product", 1)
- r2 := insertTestRole(t, svcCtx, "test_product", 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", r1, r2)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r1, r2},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.ElementsMatch(t, []int64{r1, r2}, roleIds)
- }
- // TC-0185: 用户不存在
- func TestBindRoles_UserNotFound(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: 999999999,
- RoleIds: []int64{1},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 404, codeErr.Code())
- assert.Equal(t, "用户不存在", codeErr.Error())
- }
- // TC-0186: 清空角色
- func TestBindRoles_EmptyRoleIds_ClearsAll(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- r1 := insertTestRole(t, svcCtx, "test_product", 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", r1)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r1},
- })
- require.NoError(t, err)
- err = logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Empty(t, roleIds)
- }
- // TC-0184: 正常重新绑定
- func TestBindRoles_Rebind(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- r1 := insertTestRole(t, svcCtx, "test_product", 1)
- r2 := insertTestRole(t, svcCtx, "test_product", 1)
- r3 := insertTestRole(t, svcCtx, "test_product", 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", r1, r2, r3)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r1, r2},
- })
- require.NoError(t, err)
- err = logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r2, r3},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.ElementsMatch(t, []int64{r2, r3}, roleIds)
- }
- // TC-0188: 角色不属于当前产品
- func TestBindRoles_RoleBelongsToOtherProduct(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- otherRole := insertTestRole(t, svcCtx, "other_product", 1)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", otherRole)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{otherRole},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "其他产品的角色")
- }
- // TC-0189: 角色已禁用
- func TestBindRoles_RoleDisabled(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- disabledRole := insertTestRole(t, svcCtx, "test_product", 2)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", disabledRole)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{disabledRole},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "已禁用的角色")
- }
- // TC-0190: 角色不存在
- func TestBindRoles_RoleNotExists(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{999999999},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "无效的角色ID")
- }
- func insertTestRoleWithLevel(t *testing.T, svcCtx *svc.ServiceContext, productCode string, status int64, permsLevel int64) int64 {
- t.Helper()
- now := time.Now().Unix()
- res, err := svcCtx.SysRoleModel.Insert(ctxhelper.SuperAdminCtx(), &roleModel.SysRole{
- ProductCode: productCode,
- Name: "role_" + testutil.UniqueId(),
- Status: status,
- PermsLevel: permsLevel,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- id, _ := res.LastInsertId()
- return id
- }
- // setupDeptForCaller 插入一个 dept,同时构造 caller(使用该 dept)与 target(同 dept 下)的环境
- // 返回 deptId、deptPath(caller 使用)、cleanup function
- func setupDeptForCaller(t *testing.T, svcCtx *svc.ServiceContext) (int64, string, func()) {
- t.Helper()
- now := time.Now().Unix()
- superCtx := ctxhelper.SuperAdminCtx()
- res, err := svcCtx.SysDeptModel.Insert(superCtx, &deptModel.SysDept{
- Name: "dept_" + testutil.UniqueId(),
- ParentId: 0,
- Path: "/",
- DeptType: consts.DeptTypeNormal,
- Status: consts.StatusEnabled,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- deptId, _ := res.LastInsertId()
- // 先占位再用真实 deptId 构造 path:"/{deptId}/"
- path := fmt.Sprintf("/%d/", deptId)
- _, err = svcCtx.SysDeptModel.Insert(superCtx, &deptModel.SysDept{}) // noop — keep linter happy
- _ = err
- // 更新 path
- dept, _ := svcCtx.SysDeptModel.FindOne(superCtx, deptId)
- dept.Path = path
- dept.UpdateTime = time.Now().Unix()
- require.NoError(t, svcCtx.SysDeptModel.Update(superCtx, dept))
- conn := testutil.GetTestSqlConn()
- cleanup := func() {
- testutil.CleanTable(superCtx, conn, "`sys_dept`", deptId)
- }
- return deptId, path, cleanup
- }
- // TC-0208: MEMBER 调用者不能分配权限级别高于自身的角色 (audit H-1 修复后 permsLevel 仅对 MEMBER 生效)
- func TestBindRoles_PermsLevelEscalation_Rejected(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- deptId, deptPath, cleanupDept := setupDeptForCaller(t, svcCtx)
- t.Cleanup(cleanupDept)
- productCode := "test_product"
- // 目标用户:放进 dept 下,MEMBER 产品成员
- username := testutil.UniqueId()
- targetUserId := insertTestUserFull(t, superCtx, &userModel.SysUser{
- Username: username, Password: testutil.HashPassword("pass"),
- Nickname: "tgt", DeptId: deptId,
- IsSuperAdmin: 2, MustChangePassword: 2, Status: 1,
- })
- mId := insertTestMember(t, svcCtx, productCode, targetUserId)
- highLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- // M-3 修复后 GuardRoleLevelAssignable 走 DB 强一致读取 caller 的 MinPermsLevel,
- // 因此需要在 DB 里为调用者落地真实的 user + role + user_role 关系链(permsLevel=50)。
- callerUserId, callerCleanup := seedCallerWithRoleLevel(t, svcCtx, productCode, 50)
- t.Cleanup(callerCleanup)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", targetUserId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", targetUserId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", highLevelRole)
- })
- // MEMBER 调用者与 target 同 dept,DB 中 MinPermsLevel=50,目标角色 permsLevel=1 → 越级
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: callerUserId,
- Username: "member_caller",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeMember,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: deptId,
- DeptPath: deptPath,
- MinPermsLevel: 50,
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: targetUserId,
- RoleIds: []int64{highLevelRole},
- })
- require.Error(t, err)
- var ce *response.CodeError
- require.True(t, errors.As(err, &ce))
- assert.Equal(t, 403, ce.Code())
- assert.Contains(t, ce.Error(), "不能分配权限级别高于自身的角色")
- }
- // TC-0711: ADMIN 调用者(MinPermsLevel=math.MaxInt64)不受 permsLevel 校验约束 (audit H-1 回归)
- // 修复前:ADMIN 通过 member_type 获得权限,MinPermsLevel 保持 math.MaxInt64,
- // r.PermsLevel < math.MaxInt64 必然成立 → ADMIN 无法绑定任何角色。
- // 修复后:代码显式豁免 ADMIN/DEVELOPER 的 permsLevel 校验。
- func TestBindRoles_AdminBypassesPermsLevelCheck(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUser(t, superCtx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, productCode, userId)
- lowLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", userId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", lowLevelRole)
- })
- // 关键:模拟 loader 真实产出——ADMIN 没有自定义角色,MinPermsLevel=math.MaxInt64
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: 999997,
- Username: "admin_caller",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeAdmin,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: 1,
- DeptPath: "/1/",
- MinPermsLevel: math.MaxInt64, // 默认 sentinel
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{lowLevelRole},
- })
- require.NoError(t, err, "ADMIN 调用者应当能绑定任意级别的角色 (audit H-1)")
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Contains(t, roleIds, lowLevelRole)
- }
- // TC-0712: DEVELOPER 调用者同样不受 permsLevel 校验约束 (audit H-1 回归)
- func TestBindRoles_DeveloperBypassesPermsLevelCheck(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- deptId, deptPath, cleanupDept := setupDeptForCaller(t, svcCtx)
- t.Cleanup(cleanupDept)
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUserFull(t, superCtx, &userModel.SysUser{
- Username: username, Password: testutil.HashPassword("pass"),
- Nickname: "tgt_dev", DeptId: deptId,
- IsSuperAdmin: 2, MustChangePassword: 2, Status: 1,
- })
- mId := insertTestMember(t, svcCtx, productCode, userId)
- lowLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", userId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", lowLevelRole)
- })
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: 999996,
- Username: "developer_caller",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeDeveloper,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: deptId,
- DeptPath: deptPath,
- MinPermsLevel: math.MaxInt64,
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{lowLevelRole},
- })
- require.NoError(t, err, "DEVELOPER 调用者应当能绑定任意级别的角色 (audit H-1)")
- }
- // TC-0713: MinPermsLevel == math.MaxInt64 的 MEMBER 调用者也必须被豁免
- // (sentinel 判定路径:既不是 ADMIN/DEVELOPER,也没有角色,此时 r.PermsLevel<MaxInt64 的逐字面比较
- // 曾经误伤此类 MEMBER;修复后代码用 MinPermsLevel==MaxInt64 做短路)
- func TestBindRoles_MemberWithSentinelMinLevel_NotBlocked(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUser(t, superCtx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, productCode, userId)
- role := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 100)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", userId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", role)
- })
- // MEMBER 调用者没有绑定任何启用角色,MinPermsLevel=MaxInt64(sentinel)
- // 正式语义:"我自己无级别" → 不应触发越级校验(否则所有无角色 MEMBER 都永远无法分配角色)
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: 999995,
- Username: "member_no_role",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeMember,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: 1,
- DeptPath: "/1/",
- MinPermsLevel: math.MaxInt64,
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- // 注意:业务层早期就会用 `RequireProductAdminFor` 拦住非 ADMIN/SUPER 的调用;此处是为了单独验证
- // bindRoles 内部的 permsLevel 分支。实际发生于 ADMIN 通过上层校验但 MemberType 上下文异常时的防御。
- // 这里只断言:"sentinel 路径不应报 403 '不能分配权限级别高于自身的角色'"。
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{role},
- })
- // 调用者非 ADMIN,且是 MEMBER,上游会拦 403 "仅ADMIN/超管可绑定角色";
- // 此处我们只校验"即使走到 permsLevel 分支,sentinel MinPermsLevel 不应命中"
- if err != nil {
- var ce *response.CodeError
- require.True(t, errors.As(err, &ce))
- assert.NotContains(t, ce.Error(), "不能分配权限级别高于自身的角色",
- "sentinel MinPermsLevel=math.MaxInt64 不应触发越级错误 (audit H-1)")
- }
- }
- // TC-0209: 超管可以分配任意权限级别的角色
- func TestBindRoles_SuperAdminCanAssignAnyLevel(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, productCode, userId)
- highLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", highLevelRole)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{highLevelRole},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Contains(t, roleIds, highLevelRole)
- }
- // TC-0191: 目标用户不是当前产品成员时拒绝绑定角色(L-4修复验证)
- func TestBindRoles_NonMemberRejected(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{},
- })
- require.Error(t, err)
- var codeErr2 *response.CodeError
- require.True(t, errors.As(err, &codeErr2))
- assert.Equal(t, 400, codeErr2.Code())
- assert.Contains(t, codeErr2.Error(), "不是当前产品的成员")
- }
|