updateUserLogic_test.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624
  1. package user
  2. import (
  3. "context"
  4. "errors"
  5. "testing"
  6. "time"
  7. "perms-system-server/internal/consts"
  8. "perms-system-server/internal/loaders"
  9. deptModel "perms-system-server/internal/model/dept"
  10. userModel "perms-system-server/internal/model/user"
  11. "perms-system-server/internal/response"
  12. "perms-system-server/internal/svc"
  13. "perms-system-server/internal/testutil"
  14. "perms-system-server/internal/testutil/ctxhelper"
  15. "perms-system-server/internal/types"
  16. "github.com/stretchr/testify/assert"
  17. "github.com/stretchr/testify/require"
  18. )
  19. func insertTestDept(t *testing.T, ctx context.Context, svcCtx *svc.ServiceContext) int64 {
  20. t.Helper()
  21. now := time.Now().Unix()
  22. res, err := svcCtx.SysDeptModel.Insert(ctx, &deptModel.SysDept{
  23. Name: testutil.UniqueId(),
  24. ParentId: 0,
  25. Path: "/",
  26. Sort: 0,
  27. DeptType: "NORMAL",
  28. Status: consts.StatusEnabled,
  29. CreateTime: now,
  30. UpdateTime: now,
  31. })
  32. require.NoError(t, err)
  33. id, _ := res.LastInsertId()
  34. return id
  35. }
  36. // TC-0156: 正常更新
  37. func TestUpdateUser_Success(t *testing.T) {
  38. ctx := ctxhelper.SuperAdminCtx()
  39. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  40. conn := testutil.GetTestSqlConn()
  41. username := testutil.UniqueId()
  42. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  43. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  44. deptId := insertTestDept(t, ctx, svcCtx)
  45. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_dept`", deptId) })
  46. logic := NewUpdateUserLogic(ctx, svcCtx)
  47. err := logic.UpdateUser(&types.UpdateUserReq{
  48. Id: userId,
  49. Nickname: strPtr("新昵称"),
  50. Email: strPtr("[email protected]"),
  51. Phone: strPtr("13900139000"),
  52. Remark: strPtr("更新备注"),
  53. DeptId: int64Ptr(deptId),
  54. })
  55. require.NoError(t, err)
  56. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  57. require.NoError(t, err)
  58. assert.Equal(t, "新昵称", user.Nickname)
  59. assert.Equal(t, "[email protected]", user.Email)
  60. assert.Equal(t, "13900139000", user.Phone)
  61. assert.Equal(t, "更新备注", user.Remark)
  62. assert.Equal(t, deptId, user.DeptId)
  63. }
  64. // TC-0157: 不存在
  65. func TestUpdateUser_NotFound(t *testing.T) {
  66. ctx := ctxhelper.SuperAdminCtx()
  67. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  68. logic := NewUpdateUserLogic(ctx, svcCtx)
  69. err := logic.UpdateUser(&types.UpdateUserReq{
  70. Id: 999999999,
  71. Nickname: strPtr("ghost"),
  72. })
  73. require.Error(t, err)
  74. var codeErr *response.CodeError
  75. require.True(t, errors.As(err, &codeErr))
  76. assert.Equal(t, 404, codeErr.Code())
  77. assert.Equal(t, "用户不存在", codeErr.Error())
  78. }
  79. // TC-0158: 仅传id
  80. func TestUpdateUser_OnlyId_NothingChanges(t *testing.T) {
  81. ctx := ctxhelper.SuperAdminCtx()
  82. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  83. conn := testutil.GetTestSqlConn()
  84. username := testutil.UniqueId()
  85. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  86. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  87. // 真实使用场景: 用户打开编辑页面后再提交, 插入与更新之间存在时间间隔,
  88. // updateTime 粒度为秒级, 因此在 INSERT 之后等待 1 秒再发起 UPDATE, 避免同秒 no-op SQL 被 MySQL 视为 0 affected rows.
  89. time.Sleep(1100 * time.Millisecond)
  90. before, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  91. require.NoError(t, err)
  92. logic := NewUpdateUserLogic(ctx, svcCtx)
  93. err = logic.UpdateUser(&types.UpdateUserReq{Id: userId})
  94. require.NoError(t, err)
  95. after, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  96. require.NoError(t, err)
  97. assert.Equal(t, before.Nickname, after.Nickname)
  98. assert.Equal(t, before.Email, after.Email)
  99. assert.Equal(t, before.Phone, after.Phone)
  100. assert.Equal(t, before.DeptId, after.DeptId)
  101. }
  102. // TC-0159: 清空nickname
  103. func TestUpdateUser_ClearNickname(t *testing.T) {
  104. ctx := ctxhelper.SuperAdminCtx()
  105. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  106. conn := testutil.GetTestSqlConn()
  107. username := testutil.UniqueId()
  108. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  109. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  110. logic := NewUpdateUserLogic(ctx, svcCtx)
  111. err := logic.UpdateUser(&types.UpdateUserReq{
  112. Id: userId,
  113. Nickname: strPtr(""),
  114. })
  115. require.NoError(t, err)
  116. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  117. require.NoError(t, err)
  118. assert.Equal(t, "", user.Nickname)
  119. }
  120. // TC-0160: 清空email
  121. func TestUpdateUser_ClearEmail(t *testing.T) {
  122. ctx := ctxhelper.SuperAdminCtx()
  123. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  124. conn := testutil.GetTestSqlConn()
  125. username := testutil.UniqueId()
  126. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  127. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  128. logic := NewUpdateUserLogic(ctx, svcCtx)
  129. err := logic.UpdateUser(&types.UpdateUserReq{
  130. Id: userId,
  131. Email: strPtr(""),
  132. })
  133. require.NoError(t, err)
  134. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  135. require.NoError(t, err)
  136. assert.Equal(t, "", user.Email)
  137. }
  138. // TC-0162: 非法email格式
  139. func TestUpdateUser_InvalidEmail(t *testing.T) {
  140. ctx := ctxhelper.SuperAdminCtx()
  141. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  142. conn := testutil.GetTestSqlConn()
  143. username := testutil.UniqueId()
  144. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  145. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  146. logic := NewUpdateUserLogic(ctx, svcCtx)
  147. err := logic.UpdateUser(&types.UpdateUserReq{
  148. Id: userId,
  149. Email: strPtr("bad-email"),
  150. })
  151. require.Error(t, err)
  152. var codeErr *response.CodeError
  153. require.True(t, errors.As(err, &codeErr))
  154. assert.Equal(t, 400, codeErr.Code())
  155. assert.Equal(t, "邮箱格式不正确", codeErr.Error())
  156. }
  157. // TC-0166: DeptId设为0(取消部门)
  158. func TestUpdateUser_DeptIdZero_Clear(t *testing.T) {
  159. ctx := ctxhelper.SuperAdminCtx()
  160. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  161. conn := testutil.GetTestSqlConn()
  162. username := testutil.UniqueId()
  163. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  164. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  165. deptId := insertTestDept(t, ctx, svcCtx)
  166. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_dept`", deptId) })
  167. logic := NewUpdateUserLogic(ctx, svcCtx)
  168. err := logic.UpdateUser(&types.UpdateUserReq{
  169. Id: userId,
  170. DeptId: int64Ptr(deptId),
  171. })
  172. require.NoError(t, err)
  173. err = logic.UpdateUser(&types.UpdateUserReq{
  174. Id: userId,
  175. DeptId: int64Ptr(0),
  176. })
  177. require.NoError(t, err)
  178. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  179. require.NoError(t, err)
  180. assert.Equal(t, int64(0), user.DeptId)
  181. }
  182. // TC-0167: DeptId设为正值
  183. func TestUpdateUser_DeptIdSet(t *testing.T) {
  184. ctx := ctxhelper.SuperAdminCtx()
  185. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  186. conn := testutil.GetTestSqlConn()
  187. username := testutil.UniqueId()
  188. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  189. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  190. deptId := insertTestDept(t, ctx, svcCtx)
  191. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_dept`", deptId) })
  192. logic := NewUpdateUserLogic(ctx, svcCtx)
  193. err := logic.UpdateUser(&types.UpdateUserReq{
  194. Id: userId,
  195. DeptId: int64Ptr(deptId),
  196. })
  197. require.NoError(t, err)
  198. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  199. require.NoError(t, err)
  200. assert.Equal(t, deptId, user.DeptId)
  201. }
  202. // TC-0168: DeptId不传(nil)
  203. func TestUpdateUser_NilDeptId_Unchanged(t *testing.T) {
  204. ctx := ctxhelper.SuperAdminCtx()
  205. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  206. conn := testutil.GetTestSqlConn()
  207. username := testutil.UniqueId()
  208. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  209. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  210. deptId := insertTestDept(t, ctx, svcCtx)
  211. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_dept`", deptId) })
  212. logic := NewUpdateUserLogic(ctx, svcCtx)
  213. err := logic.UpdateUser(&types.UpdateUserReq{
  214. Id: userId,
  215. DeptId: int64Ptr(deptId),
  216. })
  217. require.NoError(t, err)
  218. err = logic.UpdateUser(&types.UpdateUserReq{
  219. Id: userId,
  220. Nickname: strPtr("changed"),
  221. })
  222. require.NoError(t, err)
  223. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  224. require.NoError(t, err)
  225. assert.Equal(t, deptId, user.DeptId)
  226. assert.Equal(t, "changed", user.Nickname)
  227. }
  228. // TC-0161: 清空remark
  229. func TestUpdateUser_ClearRemark(t *testing.T) {
  230. ctx := ctxhelper.SuperAdminCtx()
  231. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  232. conn := testutil.GetTestSqlConn()
  233. username := testutil.UniqueId()
  234. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  235. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  236. logic := NewUpdateUserLogic(ctx, svcCtx)
  237. err := logic.UpdateUser(&types.UpdateUserReq{
  238. Id: userId,
  239. Remark: strPtr("some remark"),
  240. })
  241. require.NoError(t, err)
  242. err = logic.UpdateUser(&types.UpdateUserReq{
  243. Id: userId,
  244. Remark: strPtr(""),
  245. })
  246. require.NoError(t, err)
  247. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  248. require.NoError(t, err)
  249. assert.Equal(t, "", user.Remark)
  250. }
  251. // TC-0164: 合法phone
  252. func TestUpdateUser_ValidInternationalPhone(t *testing.T) {
  253. ctx := ctxhelper.SuperAdminCtx()
  254. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  255. conn := testutil.GetTestSqlConn()
  256. username := testutil.UniqueId()
  257. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  258. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  259. logic := NewUpdateUserLogic(ctx, svcCtx)
  260. err := logic.UpdateUser(&types.UpdateUserReq{
  261. Id: userId,
  262. Phone: strPtr("+8613800138000"),
  263. })
  264. require.NoError(t, err)
  265. user, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  266. require.NoError(t, err)
  267. assert.Equal(t, "+8613800138000", user.Phone)
  268. }
  269. // TC-0163: 非法phone格式
  270. func TestUpdateUser_InvalidPhone(t *testing.T) {
  271. ctx := ctxhelper.SuperAdminCtx()
  272. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  273. conn := testutil.GetTestSqlConn()
  274. username := testutil.UniqueId()
  275. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  276. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  277. logic := NewUpdateUserLogic(ctx, svcCtx)
  278. err := logic.UpdateUser(&types.UpdateUserReq{
  279. Id: userId,
  280. Phone: strPtr("12345"),
  281. })
  282. require.Error(t, err)
  283. var codeErr *response.CodeError
  284. require.True(t, errors.As(err, &codeErr))
  285. assert.Equal(t, 400, codeErr.Code())
  286. assert.Equal(t, "手机号格式不正确", codeErr.Error())
  287. }
  288. // TC-0165: 不传email(nil)
  289. func TestUpdateUser_NilEmail_Unchanged(t *testing.T) {
  290. ctx := ctxhelper.SuperAdminCtx()
  291. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  292. conn := testutil.GetTestSqlConn()
  293. username := testutil.UniqueId()
  294. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  295. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  296. before, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  297. require.NoError(t, err)
  298. originalEmail := before.Email
  299. logic := NewUpdateUserLogic(ctx, svcCtx)
  300. err = logic.UpdateUser(&types.UpdateUserReq{
  301. Id: userId,
  302. Nickname: strPtr("changed-nick"),
  303. })
  304. require.NoError(t, err)
  305. after, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  306. require.NoError(t, err)
  307. assert.Equal(t, originalEmail, after.Email)
  308. assert.Equal(t, "changed-nick", after.Nickname)
  309. }
  310. // TC-0542: MEMBER用户尝试修改其他用户被CheckManageAccess拒绝
  311. func TestUpdateUser_MemberCannotManageOtherUser(t *testing.T) {
  312. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  313. conn := testutil.GetTestSqlConn()
  314. superCtx := ctxhelper.SuperAdminCtx()
  315. targetName := testutil.UniqueId()
  316. targetId := insertTestUser(t, superCtx, targetName, testutil.HashPassword("pass"))
  317. t.Cleanup(func() { testutil.CleanTable(superCtx, conn, "`sys_user`", targetId) })
  318. ctx := ctxhelper.MemberCtx("test_product")
  319. logic := NewUpdateUserLogic(ctx, svcCtx)
  320. err := logic.UpdateUser(&types.UpdateUserReq{Id: targetId, Nickname: strPtr("hacked")})
  321. require.Error(t, err)
  322. var ce *response.CodeError
  323. require.True(t, errors.As(err, &ce))
  324. assert.Equal(t, 403, ce.Code())
  325. }
  326. // TC-0170: 产品管理员可以修改其管理范围内的用户信息
  327. func TestUpdateUser_ProductAdminCanManageUser(t *testing.T) {
  328. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  329. conn := testutil.GetTestSqlConn()
  330. superCtx := ctxhelper.SuperAdminCtx()
  331. deptId := insertTestDept(t, superCtx, svcCtx)
  332. t.Cleanup(func() { testutil.CleanTable(superCtx, conn, "`sys_dept`", deptId) })
  333. targetName := testutil.UniqueId()
  334. targetId := insertTestUser(t, superCtx, targetName, testutil.HashPassword("pass"))
  335. t.Cleanup(func() { testutil.CleanTable(superCtx, conn, "`sys_user`", targetId) })
  336. productCode := "test_product"
  337. mId := insertTestMember(t, svcCtx, productCode, targetId)
  338. t.Cleanup(func() { testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId) })
  339. ctx := ctxhelper.AdminCtx(productCode)
  340. logic := NewUpdateUserLogic(ctx, svcCtx)
  341. err := logic.UpdateUser(&types.UpdateUserReq{Id: targetId, Nickname: strPtr("new-nick")})
  342. require.NoError(t, err)
  343. user, err := svcCtx.SysUserModel.FindOne(superCtx, targetId)
  344. require.NoError(t, err)
  345. assert.Equal(t, "new-nick", user.Nickname)
  346. }
  347. // TC-0171: UpdateUser 昵称超过64字符被拒绝
  348. func TestUpdateUser_NicknameTooLong(t *testing.T) {
  349. ctx := ctxhelper.SuperAdminCtx()
  350. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  351. conn := testutil.GetTestSqlConn()
  352. username := testutil.UniqueId()
  353. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  354. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  355. longNick := string(make([]byte, 65))
  356. for i := range longNick {
  357. longNick = longNick[:i] + "a" + longNick[i+1:]
  358. }
  359. logic := NewUpdateUserLogic(ctx, svcCtx)
  360. err := logic.UpdateUser(&types.UpdateUserReq{Id: userId, Nickname: &longNick})
  361. require.Error(t, err)
  362. var ce *response.CodeError
  363. require.True(t, errors.As(err, &ce))
  364. assert.Equal(t, 400, ce.Code())
  365. assert.Contains(t, ce.Error(), "昵称长度不能超过64个字符")
  366. }
  367. // TC-0172: UpdateUser 部门不存在被拒绝
  368. func TestUpdateUser_DeptNotExists(t *testing.T) {
  369. ctx := ctxhelper.SuperAdminCtx()
  370. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  371. conn := testutil.GetTestSqlConn()
  372. username := testutil.UniqueId()
  373. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  374. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  375. logic := NewUpdateUserLogic(ctx, svcCtx)
  376. err := logic.UpdateUser(&types.UpdateUserReq{Id: userId, DeptId: int64Ptr(999999999)})
  377. require.Error(t, err)
  378. var ce *response.CodeError
  379. require.True(t, errors.As(err, &ce))
  380. assert.Equal(t, 400, ce.Code())
  381. assert.Contains(t, ce.Error(), "部门不存在")
  382. }
  383. // TC-0543: updateUser自己修改DeptId被拒绝
  384. func TestUpdateUser_SelfEditDeptIdRejected(t *testing.T) {
  385. ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
  386. UserId: 100,
  387. Username: "self_user",
  388. Status: consts.StatusEnabled,
  389. })
  390. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  391. logic := NewUpdateUserLogic(ctx, svcCtx)
  392. err := logic.UpdateUser(&types.UpdateUserReq{Id: 100, DeptId: int64Ptr(5)})
  393. require.Error(t, err)
  394. var ce *response.CodeError
  395. require.True(t, errors.As(err, &ce))
  396. assert.Equal(t, 403, ce.Code())
  397. assert.Equal(t, "不允许修改自己的部门和状态", ce.Error())
  398. }
  399. // TC-0544: updateUser自己修改Status被拒绝
  400. func TestUpdateUser_SelfEditStatusRejected(t *testing.T) {
  401. ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
  402. UserId: 100,
  403. Username: "self_user",
  404. Status: consts.StatusEnabled,
  405. })
  406. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  407. logic := NewUpdateUserLogic(ctx, svcCtx)
  408. err := logic.UpdateUser(&types.UpdateUserReq{Id: 100, Status: 2})
  409. require.Error(t, err)
  410. var ce *response.CodeError
  411. require.True(t, errors.As(err, &ce))
  412. assert.Equal(t, 403, ce.Code())
  413. assert.Equal(t, "不允许修改自己的部门和状态", ce.Error())
  414. }
  415. // TC-0545: updateUser未登录被拒绝
  416. func TestUpdateUser_NotLoggedInRejected(t *testing.T) {
  417. ctx := context.Background()
  418. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  419. logic := NewUpdateUserLogic(ctx, svcCtx)
  420. err := logic.UpdateUser(&types.UpdateUserReq{Id: 1, Nickname: strPtr("hacked")})
  421. require.Error(t, err)
  422. var ce *response.CodeError
  423. require.True(t, errors.As(err, &ce))
  424. assert.Equal(t, 401, ce.Code())
  425. assert.Equal(t, "未登录", ce.Error())
  426. }
  427. // TC-0169: 超管A通过updateUser修改超管B的状态被拒绝(H-2修复验证)
  428. func TestUpdateUser_SuperAdminCannotFreezeOtherSuperAdmin(t *testing.T) {
  429. ctx := ctxhelper.SuperAdminCtx()
  430. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  431. conn := testutil.GetTestSqlConn()
  432. now := time.Now().Unix()
  433. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  434. Username: testutil.UniqueId(),
  435. Password: testutil.HashPassword("pass"),
  436. Nickname: "super_b",
  437. IsSuperAdmin: consts.IsSuperAdminYes,
  438. MustChangePassword: 2,
  439. Status: consts.StatusEnabled,
  440. CreateTime: now,
  441. UpdateTime: now,
  442. })
  443. require.NoError(t, err)
  444. superBId, _ := uRes.LastInsertId()
  445. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", superBId) })
  446. logic := NewUpdateUserLogic(ctx, svcCtx)
  447. err = logic.UpdateUser(&types.UpdateUserReq{
  448. Id: superBId,
  449. Status: consts.StatusDisabled,
  450. })
  451. require.Error(t, err)
  452. var ce *response.CodeError
  453. require.True(t, errors.As(err, &ce))
  454. assert.Equal(t, 403, ce.Code())
  455. // 最新重构:Status 校验统一走 authHelper.ValidateStatusChange,文案为"不能修改超级管理员的状态"
  456. assert.Equal(t, "不能修改超级管理员的状态", ce.Error())
  457. user, err := svcCtx.SysUserModel.FindOne(ctx, superBId)
  458. require.NoError(t, err)
  459. assert.Equal(t, int64(consts.StatusEnabled), user.Status, "超管B的状态不应被修改")
  460. }
  461. // TC-0173: updateUser 修改状态时会递增 tokenVersion(H-1修复验证)
  462. func TestUpdateUser_StatusChange_IncrementsTokenVersion(t *testing.T) {
  463. ctx := ctxhelper.SuperAdminCtx()
  464. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  465. conn := testutil.GetTestSqlConn()
  466. username := testutil.UniqueId()
  467. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  468. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  469. before, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  470. require.NoError(t, err)
  471. origTv := before.TokenVersion
  472. logic := NewUpdateUserLogic(ctx, svcCtx)
  473. err = logic.UpdateUser(&types.UpdateUserReq{Id: userId, Status: consts.StatusDisabled})
  474. require.NoError(t, err)
  475. after, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  476. require.NoError(t, err)
  477. assert.Equal(t, int64(consts.StatusDisabled), after.Status)
  478. assert.Equal(t, origTv+1, after.TokenVersion, "状态变化应递增 tokenVersion")
  479. }
  480. // TC-0174: updateUser 只改 profile 不会递增 tokenVersion
  481. func TestUpdateUser_ProfileOnly_NoTokenVersionChange(t *testing.T) {
  482. ctx := ctxhelper.SuperAdminCtx()
  483. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  484. conn := testutil.GetTestSqlConn()
  485. username := testutil.UniqueId()
  486. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  487. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  488. before, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  489. require.NoError(t, err)
  490. logic := NewUpdateUserLogic(ctx, svcCtx)
  491. err = logic.UpdateUser(&types.UpdateUserReq{
  492. Id: userId,
  493. Nickname: strPtr("新名字"),
  494. Email: strPtr("[email protected]"),
  495. })
  496. require.NoError(t, err)
  497. after, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  498. require.NoError(t, err)
  499. assert.Equal(t, "新名字", after.Nickname)
  500. assert.Equal(t, before.TokenVersion, after.TokenVersion, "不改状态时 tokenVersion 不应变化")
  501. }
  502. // TC-0175: updateUser 乐观锁冲突 -> 409
  503. // 乐观锁依赖秒级 updateTime, 需在两次更新之间保证 >= 1 秒的间隔, 否则 MySQL 看到的新/旧 updateTime 相同无法生效.
  504. func TestUpdateUser_OptimisticLockConflict_Returns409(t *testing.T) {
  505. ctx := ctxhelper.SuperAdminCtx()
  506. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  507. conn := testutil.GetTestSqlConn()
  508. username := testutil.UniqueId()
  509. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  510. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  511. orig, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  512. require.NoError(t, err)
  513. time.Sleep(1100 * time.Millisecond)
  514. logic := NewUpdateUserLogic(ctx, svcCtx)
  515. err = logic.UpdateUser(&types.UpdateUserReq{Id: userId, Nickname: strPtr("first")})
  516. require.NoError(t, err)
  517. err = svcCtx.SysUserModel.UpdateProfile(ctx, userId, orig.Username, "second",
  518. orig.Email, orig.Phone, orig.Remark, orig.DeptId, orig.Status, false, orig.UpdateTime)
  519. require.ErrorIs(t, err, userModel.ErrUpdateConflict, "基于旧 updateTime 的更新应失败")
  520. }