setUserPermsLogic_test.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240
  1. package user
  2. import (
  3. "errors"
  4. "testing"
  5. "time"
  6. permModel "perms-system-server/internal/model/perm"
  7. "perms-system-server/internal/response"
  8. "perms-system-server/internal/svc"
  9. "perms-system-server/internal/testutil"
  10. "perms-system-server/internal/testutil/ctxhelper"
  11. "perms-system-server/internal/types"
  12. "github.com/stretchr/testify/assert"
  13. "github.com/stretchr/testify/require"
  14. )
  15. func insertTestPerm(t *testing.T, svcCtx *svc.ServiceContext, productCode string) int64 {
  16. t.Helper()
  17. now := time.Now().Unix()
  18. res, err := svcCtx.SysPermModel.Insert(ctxhelper.SuperAdminCtx(), &permModel.SysPerm{
  19. ProductCode: productCode,
  20. Name: "perm_" + testutil.UniqueId(),
  21. Code: "code_" + testutil.UniqueId(),
  22. Status: 1,
  23. CreateTime: now,
  24. UpdateTime: now,
  25. })
  26. require.NoError(t, err)
  27. id, _ := res.LastInsertId()
  28. return id
  29. }
  30. // TC-0137: 正常ALLOW
  31. func TestSetUserPerms_Allow(t *testing.T) {
  32. ctx := ctxhelper.SuperAdminCtx()
  33. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  34. conn := testutil.GetTestSqlConn()
  35. username := testutil.UniqueId()
  36. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  37. p1 := insertTestPerm(t, svcCtx, "test_product")
  38. p2 := insertTestPerm(t, svcCtx, "test_product")
  39. t.Cleanup(func() {
  40. testutil.CleanTableByField(ctx, conn, "`sys_user_perm`", "userId", userId)
  41. testutil.CleanTable(ctx, conn, "`sys_user`", userId)
  42. testutil.CleanTable(ctx, conn, "`sys_perm`", p1, p2)
  43. })
  44. logic := NewSetUserPermsLogic(ctx, svcCtx)
  45. err := logic.SetUserPerms(&types.SetPermsReq{
  46. UserId: userId,
  47. Perms: []types.UserPermItem{
  48. {PermId: p1, Effect: "ALLOW"},
  49. {PermId: p2, Effect: "ALLOW"},
  50. },
  51. })
  52. require.NoError(t, err)
  53. perms, err := svcCtx.SysUserPermModel.FindByUserId(ctx, userId)
  54. require.NoError(t, err)
  55. assert.Len(t, perms, 2)
  56. for _, p := range perms {
  57. assert.Equal(t, "ALLOW", p.Effect)
  58. }
  59. }
  60. // TC-0139: DENY权限
  61. func TestSetUserPerms_Deny(t *testing.T) {
  62. ctx := ctxhelper.SuperAdminCtx()
  63. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  64. conn := testutil.GetTestSqlConn()
  65. username := testutil.UniqueId()
  66. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  67. p1 := insertTestPerm(t, svcCtx, "test_product")
  68. t.Cleanup(func() {
  69. testutil.CleanTableByField(ctx, conn, "`sys_user_perm`", "userId", userId)
  70. testutil.CleanTable(ctx, conn, "`sys_user`", userId)
  71. testutil.CleanTable(ctx, conn, "`sys_perm`", p1)
  72. })
  73. logic := NewSetUserPermsLogic(ctx, svcCtx)
  74. err := logic.SetUserPerms(&types.SetPermsReq{
  75. UserId: userId,
  76. Perms: []types.UserPermItem{
  77. {PermId: p1, Effect: "DENY"},
  78. },
  79. })
  80. require.NoError(t, err)
  81. perms, err := svcCtx.SysUserPermModel.FindByUserId(ctx, userId)
  82. require.NoError(t, err)
  83. require.Len(t, perms, 1)
  84. assert.Equal(t, "DENY", perms[0].Effect)
  85. assert.Equal(t, p1, perms[0].PermId)
  86. }
  87. // TC-0138: 用户不存在
  88. func TestSetUserPerms_UserNotFound(t *testing.T) {
  89. ctx := ctxhelper.SuperAdminCtx()
  90. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  91. logic := NewSetUserPermsLogic(ctx, svcCtx)
  92. err := logic.SetUserPerms(&types.SetPermsReq{
  93. UserId: 999999999,
  94. Perms: []types.UserPermItem{
  95. {PermId: 1, Effect: "ALLOW"},
  96. },
  97. })
  98. require.Error(t, err)
  99. var codeErr *response.CodeError
  100. require.True(t, errors.As(err, &codeErr))
  101. assert.Equal(t, 404, codeErr.Code())
  102. assert.Equal(t, "用户不存在", codeErr.Error())
  103. }
  104. // TC-0140: 清空权限
  105. func TestSetUserPerms_EmptyPerms_ClearsAll(t *testing.T) {
  106. ctx := ctxhelper.SuperAdminCtx()
  107. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  108. conn := testutil.GetTestSqlConn()
  109. username := testutil.UniqueId()
  110. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  111. p1 := insertTestPerm(t, svcCtx, "test_product")
  112. t.Cleanup(func() {
  113. testutil.CleanTableByField(ctx, conn, "`sys_user_perm`", "userId", userId)
  114. testutil.CleanTable(ctx, conn, "`sys_user`", userId)
  115. testutil.CleanTable(ctx, conn, "`sys_perm`", p1)
  116. })
  117. logic := NewSetUserPermsLogic(ctx, svcCtx)
  118. err := logic.SetUserPerms(&types.SetPermsReq{
  119. UserId: userId,
  120. Perms: []types.UserPermItem{
  121. {PermId: p1, Effect: "ALLOW"},
  122. },
  123. })
  124. require.NoError(t, err)
  125. err = logic.SetUserPerms(&types.SetPermsReq{
  126. UserId: userId,
  127. Perms: []types.UserPermItem{},
  128. })
  129. require.NoError(t, err)
  130. perms, err := svcCtx.SysUserPermModel.FindByUserId(ctx, userId)
  131. require.NoError(t, err)
  132. assert.Empty(t, perms)
  133. }
  134. // TC-0518: 无效Effect值
  135. func TestSetUserPerms_InvalidEffect(t *testing.T) {
  136. ctx := ctxhelper.SuperAdminCtx()
  137. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  138. conn := testutil.GetTestSqlConn()
  139. username := testutil.UniqueId()
  140. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  141. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  142. logic := NewSetUserPermsLogic(ctx, svcCtx)
  143. err := logic.SetUserPerms(&types.SetPermsReq{
  144. UserId: userId,
  145. Perms: []types.UserPermItem{
  146. {PermId: 1, Effect: "INVALID"},
  147. },
  148. })
  149. require.Error(t, err)
  150. var codeErr *response.CodeError
  151. require.True(t, errors.As(err, &codeErr))
  152. assert.Equal(t, 400, codeErr.Code())
  153. assert.Contains(t, codeErr.Error(), "effect值无效")
  154. }
  155. // TC-0519: PermId不存在
  156. func TestSetUserPerms_PermNotExists(t *testing.T) {
  157. ctx := ctxhelper.SuperAdminCtx()
  158. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  159. conn := testutil.GetTestSqlConn()
  160. username := testutil.UniqueId()
  161. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  162. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  163. logic := NewSetUserPermsLogic(ctx, svcCtx)
  164. err := logic.SetUserPerms(&types.SetPermsReq{
  165. UserId: userId,
  166. Perms: []types.UserPermItem{
  167. {PermId: 999999999, Effect: "ALLOW"},
  168. },
  169. })
  170. require.Error(t, err)
  171. var codeErr *response.CodeError
  172. require.True(t, errors.As(err, &codeErr))
  173. assert.Equal(t, 400, codeErr.Code())
  174. assert.Contains(t, codeErr.Error(), "无效的权限ID")
  175. }
  176. // TC-0520: 权限不属于当前产品
  177. func TestSetUserPerms_PermBelongsToOtherProduct(t *testing.T) {
  178. ctx := ctxhelper.SuperAdminCtx()
  179. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  180. conn := testutil.GetTestSqlConn()
  181. username := testutil.UniqueId()
  182. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  183. otherPerm := insertTestPerm(t, svcCtx, "other_product")
  184. t.Cleanup(func() {
  185. testutil.CleanTable(ctx, conn, "`sys_user`", userId)
  186. testutil.CleanTable(ctx, conn, "`sys_perm`", otherPerm)
  187. })
  188. logic := NewSetUserPermsLogic(ctx, svcCtx)
  189. err := logic.SetUserPerms(&types.SetPermsReq{
  190. UserId: userId,
  191. Perms: []types.UserPermItem{
  192. {PermId: otherPerm, Effect: "ALLOW"},
  193. },
  194. })
  195. require.Error(t, err)
  196. var codeErr *response.CodeError
  197. require.True(t, errors.As(err, &codeErr))
  198. assert.Equal(t, 400, codeErr.Code())
  199. assert.Contains(t, codeErr.Error(), "其他产品的权限")
  200. }