userDetailLogic_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289
  1. package user
  2. import (
  3. "context"
  4. "database/sql"
  5. "errors"
  6. "perms-system-server/internal/consts"
  7. "perms-system-server/internal/loaders"
  8. "perms-system-server/internal/middleware"
  9. memberModel "perms-system-server/internal/model/productmember"
  10. userModel "perms-system-server/internal/model/user"
  11. "perms-system-server/internal/model/userrole"
  12. "perms-system-server/internal/response"
  13. "perms-system-server/internal/svc"
  14. "perms-system-server/internal/testutil"
  15. "perms-system-server/internal/testutil/ctxhelper"
  16. "perms-system-server/internal/types"
  17. "testing"
  18. "time"
  19. "github.com/stretchr/testify/assert"
  20. "github.com/stretchr/testify/require"
  21. )
  22. func TestUserDetail_Success(t *testing.T) {
  23. ctx := ctxhelper.SuperAdminCtx()
  24. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  25. conn := testutil.GetTestSqlConn()
  26. username := testutil.UniqueId()
  27. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  28. // 插入两条"当前产品"下的真实 sys_role 以及一条属于其它产品的 sys_role,
  29. // 用户同时绑定这三个角色。超管在 test_product 上下文下应当只看到前两个。
  30. roleInCurrent1 := insertTestRole(t, svcCtx, "test_product", 1)
  31. roleInCurrent2 := insertTestRole(t, svcCtx, "test_product", 1)
  32. roleInOther := insertTestRole(t, svcCtx, "other_product", 1)
  33. now := time.Now().Unix()
  34. var roleRecordIds []int64
  35. for _, roleId := range []int64{roleInCurrent1, roleInCurrent2, roleInOther} {
  36. res, err := svcCtx.SysUserRoleModel.Insert(ctx, &userrole.SysUserRole{
  37. UserId: userId,
  38. RoleId: roleId,
  39. CreateTime: now,
  40. UpdateTime: now,
  41. })
  42. require.NoError(t, err)
  43. id, _ := res.LastInsertId()
  44. roleRecordIds = append(roleRecordIds, id)
  45. }
  46. t.Cleanup(func() {
  47. testutil.CleanTable(ctx, conn, "`sys_user_role`", roleRecordIds...)
  48. testutil.CleanTable(ctx, conn, "`sys_role`", roleInCurrent1, roleInCurrent2, roleInOther)
  49. testutil.CleanTable(ctx, conn, "`sys_user`", userId)
  50. })
  51. logic := NewUserDetailLogic(ctx, svcCtx)
  52. resp, err := logic.UserDetail(&types.UserDetailReq{Id: userId})
  53. require.NoError(t, err)
  54. require.NotNil(t, resp)
  55. assert.Equal(t, userId, resp.Id)
  56. assert.Equal(t, username, resp.Username)
  57. // 修复后:超管在产品上下文里只看到 test_product 的角色;other_product 的角色不应返回
  58. assert.ElementsMatch(t, []int64{roleInCurrent1, roleInCurrent2}, resp.RoleIds)
  59. assert.NotContains(t, resp.RoleIds, roleInOther, "超管在具体产品上下文不应返回其它产品的 roleIds")
  60. }
  61. // TC-0182: 正常查询-含Avatar
  62. func TestUserDetail_WithAvatar(t *testing.T) {
  63. ctx := ctxhelper.SuperAdminCtx()
  64. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  65. conn := testutil.GetTestSqlConn()
  66. userId := insertTestUserFull(t, ctx, &userModel.SysUser{
  67. Username: testutil.UniqueId(),
  68. Password: testutil.HashPassword("pass"),
  69. Nickname: "avatar_user",
  70. Avatar: sql.NullString{String: "https://example.com/avatar.png", Valid: true},
  71. IsSuperAdmin: 2,
  72. MustChangePassword: 2,
  73. Status: 1,
  74. })
  75. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  76. logic := NewUserDetailLogic(ctx, svcCtx)
  77. resp, err := logic.UserDetail(&types.UserDetailReq{Id: userId})
  78. require.NoError(t, err)
  79. require.NotNil(t, resp)
  80. assert.Equal(t, "https://example.com/avatar.png", resp.Avatar)
  81. }
  82. // TC-0183: 不存在
  83. func TestUserDetail_NotFound(t *testing.T) {
  84. ctx := ctxhelper.SuperAdminCtx()
  85. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  86. logic := NewUserDetailLogic(ctx, svcCtx)
  87. _, err := logic.UserDetail(&types.UserDetailReq{Id: 999999999})
  88. require.Error(t, err)
  89. var codeErr *response.CodeError
  90. require.True(t, errors.As(err, &codeErr))
  91. assert.Equal(t, 404, codeErr.Code())
  92. assert.Equal(t, "用户不存在", codeErr.Error())
  93. }
  94. func insertH1Member(t *testing.T, ctx context.Context, svcCtx *svc.ServiceContext, productCode string, u *userModel.SysUser) (int64, int64) {
  95. t.Helper()
  96. id := insertTestUserFull(t, ctx, u)
  97. now := time.Now().Unix()
  98. res, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  99. ProductCode: productCode, UserId: id, MemberType: consts.MemberTypeMember,
  100. Status: 1, CreateTime: now, UpdateTime: now,
  101. })
  102. require.NoError(t, err)
  103. mId, _ := res.LastInsertId()
  104. return id, mId
  105. }
  106. // TC-0991: 业务契约——看自己时 Email/Phone/Remark 原样返回。
  107. // 背景:PII 契约已由业务侧固定为"所有调用者(含同产品 MEMBER)原样返回联系信息",
  108. // 故不存在脱敏短路;本用例作为回归守卫,防止未来有人误加"同级脱敏"把 self-view 一起打了。
  109. func TestUserDetail_H1_ViewSelf_KeepsPII(t *testing.T) {
  110. ctx := context.Background()
  111. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  112. conn := testutil.GetTestSqlConn()
  113. productCode := "h1_self_" + testutil.UniqueId()
  114. selfId, mSelf := insertH1Member(t, ctx, svcCtx, productCode, &userModel.SysUser{
  115. Username: "self_" + testutil.UniqueId(),
  116. Password: testutil.HashPassword("pw"),
  117. Nickname: "self",
  118. Email: "[email protected]",
  119. Phone: "13900002222",
  120. Remark: "self-only note",
  121. IsSuperAdmin: 2,
  122. MustChangePassword: 2,
  123. Status: 1,
  124. DeptId: 1,
  125. })
  126. t.Cleanup(func() {
  127. testutil.CleanTable(ctx, conn, "`sys_product_member`", mSelf)
  128. testutil.CleanTable(ctx, conn, "`sys_user`", selfId)
  129. })
  130. selfCtx := middleware.WithUserDetails(context.Background(), &loaders.UserDetails{
  131. UserId: selfId, Username: "self", MemberType: consts.MemberTypeMember,
  132. Status: 1, ProductCode: productCode, DeptId: 1, DeptPath: "/1/", MinPermsLevel: 100,
  133. })
  134. resp, err := NewUserDetailLogic(selfCtx, svcCtx).UserDetail(&types.UserDetailReq{Id: selfId})
  135. require.NoError(t, err)
  136. assert.Equal(t, "[email protected]", resp.Email, "看自己必须返回 Email 原值")
  137. assert.Equal(t, "13900002222", resp.Phone, "看自己必须返回 Phone 原值")
  138. assert.Equal(t, "self-only note", resp.Remark, "看自己必须返回 Remark 原值")
  139. }
  140. // TC-0992: 超管分支 —— SuperAdmin 看任何用户必须拿到 Email/Phone/Remark 原值。
  141. // 若未来有人加脱敏逻辑却漏写 IsSuperAdmin 豁免,本用例立刻炸。
  142. func TestUserDetail_H1_SuperAdmin_KeepsPII(t *testing.T) {
  143. ctx := ctxhelper.SuperAdminCtx()
  144. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  145. conn := testutil.GetTestSqlConn()
  146. userId := insertTestUserFull(t, ctx, &userModel.SysUser{
  147. Username: "sa_view_" + testutil.UniqueId(), Password: testutil.HashPassword("pw"),
  148. Nickname: "n", Email: "[email protected]", Phone: "13700000000", Remark: "nb",
  149. IsSuperAdmin: 2, MustChangePassword: 2, Status: 1,
  150. })
  151. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  152. resp, err := NewUserDetailLogic(ctx, svcCtx).UserDetail(&types.UserDetailReq{Id: userId})
  153. require.NoError(t, err)
  154. assert.Equal(t, "[email protected]", resp.Email)
  155. assert.Equal(t, "13700000000", resp.Phone)
  156. assert.Equal(t, "nb", resp.Remark)
  157. }
  158. // seedPIITarget 插入一个"有完整 PII 的 target 用户"并挂到指定产品下,返回 userId / mId 供清理。
  159. // 统一 helper 以便 TC-1164~1166 共用;PII 字段值用固定常量,保证断言直接对比字符串即可。
  160. const (
  161. piiEmail = "[email protected]"
  162. piiPhone = "13911118888"
  163. piiRemark = "target remark only admin can see"
  164. )
  165. func seedPIITarget(t *testing.T, svcCtx *svc.ServiceContext, productCode string) (int64, int64) {
  166. t.Helper()
  167. bootstrap := ctxhelper.SuperAdminCtx()
  168. targetId := insertTestUserFull(t, bootstrap, &userModel.SysUser{
  169. Username: "pii_target_" + testutil.UniqueId(), Password: testutil.HashPassword("pw"),
  170. Nickname: "t", Email: piiEmail, Phone: piiPhone, Remark: piiRemark,
  171. IsSuperAdmin: 2, MustChangePassword: 2, Status: 1, DeptId: 1,
  172. })
  173. now := time.Now().Unix()
  174. mRes, err := svcCtx.SysProductMemberModel.Insert(bootstrap, &memberModel.SysProductMember{
  175. ProductCode: productCode, UserId: targetId, MemberType: consts.MemberTypeMember,
  176. Status: 1, CreateTime: now, UpdateTime: now,
  177. })
  178. require.NoError(t, err)
  179. mId, _ := mRes.LastInsertId()
  180. return targetId, mId
  181. }
  182. // TC-1164: 产品 ADMIN 看同产品他人 —— PII 完整返回。
  183. // ADMIN 是产品层授权面,负责人员/角色维护,必须能看到联系方式去做"找到此人"。
  184. func TestUserDetail_M_R16_1_ProductAdmin_KeepsPII(t *testing.T) {
  185. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  186. conn := testutil.GetTestSqlConn()
  187. bootstrap := ctxhelper.SuperAdminCtx()
  188. productCode := "m_r16_admin_" + testutil.UniqueId()
  189. targetId, mId := seedPIITarget(t, svcCtx, productCode)
  190. t.Cleanup(func() {
  191. testutil.CleanTable(bootstrap, conn, "`sys_product_member`", mId)
  192. testutil.CleanTable(bootstrap, conn, "`sys_user`", targetId)
  193. })
  194. resp, err := NewUserDetailLogic(ctxhelper.AdminCtx(productCode), svcCtx).
  195. UserDetail(&types.UserDetailReq{Id: targetId})
  196. require.NoError(t, err)
  197. assert.Equal(t, piiEmail, resp.Email, "ADMIN 必须看到 Email 原值")
  198. assert.Equal(t, piiPhone, resp.Phone, "ADMIN 必须看到 Phone 原值")
  199. assert.Equal(t, piiRemark, resp.Remark, "ADMIN 必须看到 Remark 原值")
  200. }
  201. // TC-1165: 产品 DEVELOPER 看同产品他人 —— PII 完整返回。
  202. // DEVELOPER 是全权分支,授权读取元数据里就包含"看到成员详情";不应随 M-R16-1 一起被脱敏误伤。
  203. func TestUserDetail_M_R16_1_ProductDeveloper_KeepsPII(t *testing.T) {
  204. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  205. conn := testutil.GetTestSqlConn()
  206. bootstrap := ctxhelper.SuperAdminCtx()
  207. productCode := "m_r16_dev_" + testutil.UniqueId()
  208. targetId, mId := seedPIITarget(t, svcCtx, productCode)
  209. t.Cleanup(func() {
  210. testutil.CleanTable(bootstrap, conn, "`sys_product_member`", mId)
  211. testutil.CleanTable(bootstrap, conn, "`sys_user`", targetId)
  212. })
  213. resp, err := NewUserDetailLogic(ctxhelper.DeveloperCtx(productCode), svcCtx).
  214. UserDetail(&types.UserDetailReq{Id: targetId})
  215. require.NoError(t, err)
  216. assert.Equal(t, piiEmail, resp.Email)
  217. assert.Equal(t, piiPhone, resp.Phone)
  218. assert.Equal(t, piiRemark, resp.Remark)
  219. }
  220. // TC-1166: 产品 MEMBER 看同产品他人 —— PII 必须被置空(不能再返回 email/phone/remark)。
  221. // 这是 M-R16-1 的核心契约:普通成员拿到的 UserItem 里仅保留 Username/Nickname/DeptId/Status
  222. // 这类"组织结构可见"的字段,拒绝把全员通讯录外泄给普通成员。
  223. func TestUserDetail_M_R16_1_ProductMember_MasksPII(t *testing.T) {
  224. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  225. conn := testutil.GetTestSqlConn()
  226. bootstrap := ctxhelper.SuperAdminCtx()
  227. productCode := "m_r16_mb_" + testutil.UniqueId()
  228. targetId, mId := seedPIITarget(t, svcCtx, productCode)
  229. // caller 本身也要挂到这个产品下,否则 FindOneByProductCodeUserId(caller.ProductCode, target.Id)
  230. // 会直接 403——那就测不到脱敏逻辑。ctxhelper.MemberCtx 里 UserId=4 与 target 不同,才能触发
  231. // "caller 看他人"的分支。
  232. callerCtx := ctxhelper.MemberCtx(productCode)
  233. callerId := int64(4)
  234. now := time.Now().Unix()
  235. callerMRes, err := svcCtx.SysProductMemberModel.Insert(bootstrap, &memberModel.SysProductMember{
  236. ProductCode: productCode, UserId: callerId, MemberType: consts.MemberTypeMember,
  237. Status: 1, CreateTime: now, UpdateTime: now,
  238. })
  239. require.NoError(t, err)
  240. callerMId, _ := callerMRes.LastInsertId()
  241. t.Cleanup(func() {
  242. testutil.CleanTable(bootstrap, conn, "`sys_product_member`", mId, callerMId)
  243. testutil.CleanTable(bootstrap, conn, "`sys_user`", targetId)
  244. })
  245. resp, err := NewUserDetailLogic(callerCtx, svcCtx).
  246. UserDetail(&types.UserDetailReq{Id: targetId})
  247. require.NoError(t, err, "脱敏不应该变成 403 —— 同产品可读的组织信息依然返回,只是 PII 字段置空")
  248. assert.Empty(t, resp.Email, "MEMBER 看他人:Email 必须为空字符串")
  249. assert.Empty(t, resp.Phone, "MEMBER 看他人:Phone 必须为空字符串")
  250. assert.Empty(t, resp.Remark, "MEMBER 看他人:Remark 必须为空字符串")
  251. // 未脱敏的字段必须原样回填,否则是多脱一刀(误伤 UI)。
  252. assert.Equal(t, targetId, resp.Id)
  253. assert.NotEmpty(t, resp.Username, "Username 不应被脱敏")
  254. }