access.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. package auth
  2. import (
  3. "context"
  4. "math"
  5. "strings"
  6. "perms-system-server/internal/consts"
  7. "perms-system-server/internal/loaders"
  8. "perms-system-server/internal/middleware"
  9. "perms-system-server/internal/response"
  10. "perms-system-server/internal/svc"
  11. )
  12. func memberTypePriority(memberType string) int {
  13. switch memberType {
  14. case consts.MemberTypeSuperAdmin:
  15. return 0
  16. case consts.MemberTypeAdmin:
  17. return 1
  18. case consts.MemberTypeDeveloper:
  19. return 2
  20. case consts.MemberTypeMember:
  21. return 3
  22. default:
  23. return math.MaxInt32
  24. }
  25. }
  26. // CheckManageAccess 检查当前操作者是否有权管理目标用户。
  27. // 规则:
  28. // 1. SUPER_ADMIN 完全豁免
  29. // 2. 操作自己豁免
  30. // 3. 部门检查:目标用户须在操作者本部门或下级子部门(ADMIN 豁免)
  31. // 4. 权限级别检查:操作者的级别必须严格高于目标用户
  32. // - 先比 memberType 优先级(SUPER_ADMIN > ADMIN > DEVELOPER > MEMBER)
  33. // - 同 memberType 时比 permsLevel(数值越小权限越高)
  34. func CheckManageAccess(ctx context.Context, svcCtx *svc.ServiceContext, targetUserId int64, productCode string) error {
  35. caller := middleware.GetUserDetails(ctx)
  36. if caller == nil {
  37. return response.ErrUnauthorized("未登录")
  38. }
  39. if caller.IsSuperAdmin {
  40. return nil
  41. }
  42. if caller.UserId == targetUserId {
  43. return nil
  44. }
  45. if err := checkDeptHierarchy(ctx, svcCtx, caller, targetUserId); err != nil {
  46. return err
  47. }
  48. return checkPermLevel(ctx, svcCtx, caller, targetUserId, productCode)
  49. }
  50. // CheckMemberTypeAssignment 检查操作者是否有权分配指定的 memberType。
  51. func CheckMemberTypeAssignment(ctx context.Context, assignedType string) error {
  52. caller := middleware.GetUserDetails(ctx)
  53. if caller == nil {
  54. return response.ErrUnauthorized("未登录")
  55. }
  56. if caller.IsSuperAdmin {
  57. return nil
  58. }
  59. if memberTypePriority(caller.MemberType) >= memberTypePriority(assignedType) {
  60. return response.ErrForbidden("无权分配该成员类型,不能分配与自己同级或更高级别的类型")
  61. }
  62. return nil
  63. }
  64. // RequireSuperAdmin 要求当前操作者必须是超级管理员。
  65. func RequireSuperAdmin(ctx context.Context) error {
  66. caller := middleware.GetUserDetails(ctx)
  67. if caller == nil {
  68. return response.ErrUnauthorized("未登录")
  69. }
  70. if !caller.IsSuperAdmin {
  71. return response.ErrForbidden("仅超级管理员可执行此操作")
  72. }
  73. return nil
  74. }
  75. // RequireProductAdmin 要求当前操作者是超级管理员或当前产品的管理员(ADMIN)。
  76. func RequireProductAdmin(ctx context.Context) error {
  77. caller := middleware.GetUserDetails(ctx)
  78. if caller == nil {
  79. return response.ErrUnauthorized("未登录")
  80. }
  81. if caller.IsSuperAdmin {
  82. return nil
  83. }
  84. if caller.MemberType == consts.MemberTypeAdmin {
  85. return nil
  86. }
  87. return response.ErrForbidden("仅超级管理员或产品管理员可执行此操作")
  88. }
  89. func checkDeptHierarchy(ctx context.Context, svcCtx *svc.ServiceContext, caller *loaders.UserDetails, targetUserId int64) error {
  90. if caller.MemberType == consts.MemberTypeAdmin {
  91. return nil
  92. }
  93. if caller.DeptId == 0 {
  94. return response.ErrForbidden("您未归属任何部门,无权管理其他用户")
  95. }
  96. target, err := svcCtx.SysUserModel.FindOne(ctx, targetUserId)
  97. if err != nil {
  98. return response.ErrNotFound("目标用户不存在")
  99. }
  100. if target.DeptId == 0 {
  101. return response.ErrForbidden("目标用户未归属部门,仅超管或产品管理员可管理")
  102. }
  103. targetDept, err := svcCtx.SysDeptModel.FindOne(ctx, target.DeptId)
  104. if err != nil {
  105. return response.ErrForbidden("无权操作")
  106. }
  107. if !strings.HasPrefix(targetDept.Path, caller.DeptPath) {
  108. return response.ErrForbidden("无权管理其他部门的用户")
  109. }
  110. return nil
  111. }
  112. func checkPermLevel(ctx context.Context, svcCtx *svc.ServiceContext, caller *loaders.UserDetails, targetUserId int64, productCode string) error {
  113. if productCode == "" {
  114. return response.ErrBadRequest("缺少产品上下文,无法进行权限级别判定")
  115. }
  116. targetMemberType := ""
  117. targetMember, err := svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(ctx, productCode, targetUserId)
  118. if err == nil {
  119. targetMemberType = targetMember.MemberType
  120. }
  121. callerPri := memberTypePriority(caller.MemberType)
  122. targetPri := memberTypePriority(targetMemberType)
  123. if callerPri > targetPri {
  124. return response.ErrForbidden("无权管理权限级别高于您的用户")
  125. }
  126. if callerPri < targetPri {
  127. return nil
  128. }
  129. // memberType 相同,比较 permsLevel
  130. targetLevel, err := svcCtx.SysRoleModel.FindMinPermsLevelByUserIdAndProductCode(ctx, targetUserId, productCode)
  131. if err != nil {
  132. targetLevel = math.MaxInt64
  133. }
  134. if caller.MinPermsLevel >= targetLevel {
  135. return response.ErrForbidden("无权管理权限级别高于或等于您的用户")
  136. }
  137. return nil
  138. }