checkAddMemberAccess_audit_test.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. package auth
  2. import (
  3. "context"
  4. "errors"
  5. "testing"
  6. "perms-system-server/internal/consts"
  7. "perms-system-server/internal/loaders"
  8. "perms-system-server/internal/middleware"
  9. deptModel "perms-system-server/internal/model/dept"
  10. userModel "perms-system-server/internal/model/user"
  11. "perms-system-server/internal/response"
  12. "perms-system-server/internal/testutil/mocks"
  13. "github.com/stretchr/testify/assert"
  14. "github.com/stretchr/testify/require"
  15. "go.uber.org/mock/gomock"
  16. )
  17. // ---------------------------------------------------------------------------
  18. // 覆盖目标:审计 H-3 修复 —— CheckAddMemberAccess 专门为 AddMember 前置流程设计,
  19. // 用以堵住"产品 ADMIN 从部门树外把人强拉进自己产品"的漏洞。
  20. // 对比 CheckManageAccess:
  21. // 1) 不做 memberType / permsLevel 比对;
  22. // 2) 对产品 ADMIN 不走 checkDeptHierarchy 的 bypass,强制做部门链校验;
  23. // 3) SuperAdmin 仍完全豁免;
  24. // 4) target 为空 / 未归属部门等情况 fail-close。
  25. // ---------------------------------------------------------------------------
  26. func callerProductAdmin(deptId int64, deptPath string) *loaders.UserDetails {
  27. return &loaders.UserDetails{
  28. UserId: 2,
  29. Username: "pa",
  30. IsSuperAdmin: false,
  31. MemberType: consts.MemberTypeAdmin,
  32. Status: consts.StatusEnabled,
  33. ProductCode: "pc_h3",
  34. DeptId: deptId,
  35. DeptPath: deptPath,
  36. }
  37. }
  38. func callerMember(deptId int64, deptPath string) *loaders.UserDetails {
  39. return &loaders.UserDetails{
  40. UserId: 3,
  41. Username: "mbr",
  42. IsSuperAdmin: false,
  43. MemberType: consts.MemberTypeMember,
  44. Status: consts.StatusEnabled,
  45. ProductCode: "pc_h3",
  46. DeptId: deptId,
  47. DeptPath: deptPath,
  48. }
  49. }
  50. // TC-0940: H-3 —— 产品 ADMIN 将部门树**外**的 target 拉进产品时必须 403,
  51. // 不得因其 MemberType=ADMIN 享受 checkDeptHierarchy 的 bypass。
  52. func TestCheckAddMemberAccess_ProductAdmin_CrossDept_Rejected(t *testing.T) {
  53. ctrl := gomock.NewController(t)
  54. t.Cleanup(ctrl.Finish)
  55. // target 所在部门 path = /200/201/,与 caller 部门 path=/100/ 不在同一子树
  56. deptMock := mocks.NewMockSysDeptModel(ctrl)
  57. deptMock.EXPECT().FindOne(gomock.Any(), int64(201)).
  58. Return(&deptModel.SysDept{Id: 201, Path: "/200/201/"}, nil).Times(1)
  59. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  60. ctx := middleware.WithUserDetails(context.Background(), callerProductAdmin(100, "/100/"))
  61. target := &userModel.SysUser{Id: 42, DeptId: 201}
  62. err := CheckAddMemberAccess(ctx, svcCtx, target)
  63. require.Error(t, err, "H-3:产品 ADMIN 不能把部门树外的人拉进自己产品")
  64. var ce *response.CodeError
  65. require.True(t, errors.As(err, &ce))
  66. assert.Equal(t, 403, ce.Code())
  67. assert.Contains(t, ce.Error(), "其他部门")
  68. }
  69. // TC-0941: H-3 —— 产品 ADMIN 将部门树**内**的 target 拉进产品允许通过。
  70. func TestCheckAddMemberAccess_ProductAdmin_SameSubtree_Allowed(t *testing.T) {
  71. ctrl := gomock.NewController(t)
  72. t.Cleanup(ctrl.Finish)
  73. deptMock := mocks.NewMockSysDeptModel(ctrl)
  74. deptMock.EXPECT().FindOne(gomock.Any(), int64(101)).
  75. Return(&deptModel.SysDept{Id: 101, Path: "/100/101/"}, nil).Times(1)
  76. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  77. ctx := middleware.WithUserDetails(context.Background(), callerProductAdmin(100, "/100/"))
  78. target := &userModel.SysUser{Id: 42, DeptId: 101}
  79. err := CheckAddMemberAccess(ctx, svcCtx, target)
  80. require.NoError(t, err, "H-3:target 在 caller 部门子树内应允许添加")
  81. }
  82. // TC-0942: H-3 —— SuperAdmin 完全豁免,不触发 SysDeptModel.FindOne。
  83. func TestCheckAddMemberAccess_SuperAdmin_BypassNoDBCall(t *testing.T) {
  84. ctrl := gomock.NewController(t)
  85. t.Cleanup(ctrl.Finish)
  86. deptMock := mocks.NewMockSysDeptModel(ctrl)
  87. deptMock.EXPECT().FindOne(gomock.Any(), gomock.Any()).Times(0)
  88. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  89. su := &loaders.UserDetails{
  90. UserId: 1, Username: "su", IsSuperAdmin: true,
  91. MemberType: consts.MemberTypeSuperAdmin, Status: consts.StatusEnabled,
  92. }
  93. ctx := middleware.WithUserDetails(context.Background(), su)
  94. target := &userModel.SysUser{Id: 42, DeptId: 999} // 任意部门
  95. err := CheckAddMemberAccess(ctx, svcCtx, target)
  96. require.NoError(t, err)
  97. }
  98. // TC-0943: H-3 —— caller 自加自 (target.Id == caller.UserId) 豁免部门校验,
  99. // 避免阻塞"ADMIN 把自己添加进新产品"这类合法运维路径。
  100. func TestCheckAddMemberAccess_SelfAdd_Allowed(t *testing.T) {
  101. ctrl := gomock.NewController(t)
  102. t.Cleanup(ctrl.Finish)
  103. deptMock := mocks.NewMockSysDeptModel(ctrl)
  104. deptMock.EXPECT().FindOne(gomock.Any(), gomock.Any()).Times(0)
  105. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  106. caller := callerProductAdmin(100, "/100/")
  107. ctx := middleware.WithUserDetails(context.Background(), caller)
  108. target := &userModel.SysUser{Id: caller.UserId, DeptId: 999}
  109. err := CheckAddMemberAccess(ctx, svcCtx, target)
  110. require.NoError(t, err)
  111. }
  112. // TC-0944: H-3 —— caller 自身 DeptId=0(幽灵账号)时必须 403,
  113. // 不得让"无部门归属但拥有 product ADMIN"的账号绕过整个部门链校验。
  114. func TestCheckAddMemberAccess_CallerWithoutDept_Rejected(t *testing.T) {
  115. ctrl := gomock.NewController(t)
  116. t.Cleanup(ctrl.Finish)
  117. deptMock := mocks.NewMockSysDeptModel(ctrl)
  118. deptMock.EXPECT().FindOne(gomock.Any(), gomock.Any()).Times(0)
  119. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  120. caller := callerProductAdmin(0, "")
  121. ctx := middleware.WithUserDetails(context.Background(), caller)
  122. target := &userModel.SysUser{Id: 42, DeptId: 101}
  123. err := CheckAddMemberAccess(ctx, svcCtx, target)
  124. require.Error(t, err)
  125. var ce *response.CodeError
  126. require.True(t, errors.As(err, &ce))
  127. assert.Equal(t, 403, ce.Code())
  128. assert.Contains(t, ce.Error(), "未归属任何部门")
  129. }
  130. // TC-0945: H-3 —— target 未归属部门时必须 403(仅超管可破例),
  131. // 避免"空 deptId 的 user 被部门前缀匹配逻辑误判"通过。
  132. func TestCheckAddMemberAccess_TargetWithoutDept_Rejected(t *testing.T) {
  133. ctrl := gomock.NewController(t)
  134. t.Cleanup(ctrl.Finish)
  135. deptMock := mocks.NewMockSysDeptModel(ctrl)
  136. deptMock.EXPECT().FindOne(gomock.Any(), gomock.Any()).Times(0)
  137. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  138. caller := callerProductAdmin(100, "/100/")
  139. ctx := middleware.WithUserDetails(context.Background(), caller)
  140. target := &userModel.SysUser{Id: 42, DeptId: 0}
  141. err := CheckAddMemberAccess(ctx, svcCtx, target)
  142. require.Error(t, err)
  143. var ce *response.CodeError
  144. require.True(t, errors.As(err, &ce))
  145. assert.Equal(t, 403, ce.Code())
  146. assert.Contains(t, ce.Error(), "未归属部门")
  147. }
  148. // TC-0946: H-3 —— 未登录 / 缺少 UserDetails 上下文时返回 401,
  149. // 而不是 silently 放行或 panic。
  150. func TestCheckAddMemberAccess_NoCallerCtx_Unauthorized(t *testing.T) {
  151. ctrl := gomock.NewController(t)
  152. t.Cleanup(ctrl.Finish)
  153. deptMock := mocks.NewMockSysDeptModel(ctrl)
  154. deptMock.EXPECT().FindOne(gomock.Any(), gomock.Any()).Times(0)
  155. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  156. target := &userModel.SysUser{Id: 42, DeptId: 101}
  157. err := CheckAddMemberAccess(context.Background(), svcCtx, target)
  158. require.Error(t, err)
  159. var ce *response.CodeError
  160. require.True(t, errors.As(err, &ce))
  161. assert.Equal(t, 401, ce.Code())
  162. }
  163. // TC-0947: H-3 —— SysDeptModel.FindOne 报错时必须 fail-close 返回 403(无法校验),
  164. // 不得静默放行。消息避免暴露底层 DB 细节。
  165. func TestCheckAddMemberAccess_DeptFindOneError_FailClose(t *testing.T) {
  166. ctrl := gomock.NewController(t)
  167. t.Cleanup(ctrl.Finish)
  168. deptMock := mocks.NewMockSysDeptModel(ctrl)
  169. deptMock.EXPECT().FindOne(gomock.Any(), int64(777)).
  170. Return(nil, errors.New("db: connection refused")).Times(1)
  171. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  172. caller := callerProductAdmin(100, "/100/")
  173. ctx := middleware.WithUserDetails(context.Background(), caller)
  174. target := &userModel.SysUser{Id: 42, DeptId: 777}
  175. err := CheckAddMemberAccess(ctx, svcCtx, target)
  176. require.Error(t, err)
  177. var ce *response.CodeError
  178. require.True(t, errors.As(err, &ce))
  179. assert.Equal(t, 403, ce.Code())
  180. assert.NotContains(t, ce.Error(), "db:",
  181. "错误消息不得泄漏底层 DB 细节")
  182. }
  183. // TC-0948: H-3 —— 非 ADMIN 的普通 MEMBER 作 caller 时同样走 CheckAddMemberAccess 的部门链判定
  184. // (虽然 AddMember 的 RequireProductAdminFor 会更早拒绝,但防御深度仍需保证此函数独立正确)。
  185. func TestCheckAddMemberAccess_Member_CrossDept_Rejected(t *testing.T) {
  186. ctrl := gomock.NewController(t)
  187. t.Cleanup(ctrl.Finish)
  188. deptMock := mocks.NewMockSysDeptModel(ctrl)
  189. deptMock.EXPECT().FindOne(gomock.Any(), int64(201)).
  190. Return(&deptModel.SysDept{Id: 201, Path: "/200/201/"}, nil).Times(1)
  191. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  192. caller := callerMember(100, "/100/")
  193. ctx := middleware.WithUserDetails(context.Background(), caller)
  194. target := &userModel.SysUser{Id: 42, DeptId: 201}
  195. err := CheckAddMemberAccess(ctx, svcCtx, target)
  196. require.Error(t, err)
  197. var ce *response.CodeError
  198. require.True(t, errors.As(err, &ce))
  199. assert.Equal(t, 403, ce.Code())
  200. }
  201. // TC-0949: H-3 —— target 为 nil 时必须 400,而不是 panic。
  202. func TestCheckAddMemberAccess_NilTarget_BadRequest(t *testing.T) {
  203. ctrl := gomock.NewController(t)
  204. t.Cleanup(ctrl.Finish)
  205. deptMock := mocks.NewMockSysDeptModel(ctrl)
  206. deptMock.EXPECT().FindOne(gomock.Any(), gomock.Any()).Times(0)
  207. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Dept: deptMock})
  208. caller := callerProductAdmin(100, "/100/")
  209. ctx := middleware.WithUserDetails(context.Background(), caller)
  210. err := CheckAddMemberAccess(ctx, svcCtx, nil)
  211. require.Error(t, err)
  212. var ce *response.CodeError
  213. require.True(t, errors.As(err, &ce))
  214. assert.Equal(t, 400, ce.Code())
  215. }