permserver_test.go 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946
  1. package server
  2. import (
  3. "context"
  4. "database/sql"
  5. "fmt"
  6. "testing"
  7. "time"
  8. authHelper "perms-system-server/internal/logic/auth"
  9. permModel "perms-system-server/internal/model/perm"
  10. productModel "perms-system-server/internal/model/product"
  11. memberModel "perms-system-server/internal/model/productmember"
  12. roleModel "perms-system-server/internal/model/role"
  13. rolePermModel "perms-system-server/internal/model/roleperm"
  14. userModel "perms-system-server/internal/model/user"
  15. userPermModel "perms-system-server/internal/model/userperm"
  16. userRoleModel "perms-system-server/internal/model/userrole"
  17. "perms-system-server/internal/svc"
  18. "perms-system-server/internal/testutil"
  19. "perms-system-server/pb"
  20. "github.com/golang-jwt/jwt/v4"
  21. "github.com/stretchr/testify/assert"
  22. "github.com/stretchr/testify/require"
  23. "google.golang.org/grpc/codes"
  24. "google.golang.org/grpc/status"
  25. )
  26. // ---------- SyncPermissions ----------
  27. // TC-0161: 正常同步
  28. func TestSyncPermissions_Normal(t *testing.T) {
  29. ctx := context.Background()
  30. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  31. conn := testutil.GetTestSqlConn()
  32. now := time.Now().Unix()
  33. uid := testutil.UniqueId()
  34. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  35. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "secret1",
  36. Status: 1, CreateTime: now, UpdateTime: now,
  37. })
  38. require.NoError(t, err)
  39. pId, _ := pRes.LastInsertId()
  40. t.Cleanup(func() {
  41. testutil.CleanTableByField(ctx, conn, "`sys_perm`", "productCode", uid)
  42. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  43. })
  44. srv := NewPermServer(svcCtx)
  45. resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  46. AppKey: uid,
  47. AppSecret: "secret1",
  48. Perms: []*pb.PermItem{
  49. {Code: "perm_a", Name: "Perm A", Remark: "remark_a"},
  50. {Code: "perm_b", Name: "Perm B", Remark: "remark_b"},
  51. },
  52. })
  53. require.NoError(t, err)
  54. assert.Equal(t, int64(2), resp.Added)
  55. assert.Equal(t, int64(0), resp.Updated)
  56. assert.Equal(t, int64(0), resp.Disabled)
  57. resp2, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  58. AppKey: uid,
  59. AppSecret: "secret1",
  60. Perms: []*pb.PermItem{
  61. {Code: "perm_a", Name: "Perm A Updated", Remark: "remark_a"},
  62. },
  63. })
  64. require.NoError(t, err)
  65. assert.Equal(t, int64(0), resp2.Added)
  66. assert.Equal(t, int64(1), resp2.Updated)
  67. assert.Equal(t, int64(1), resp2.Disabled)
  68. }
  69. // TC-0162: appKey无效
  70. func TestSyncPermissions_InvalidAppKey(t *testing.T) {
  71. ctx := context.Background()
  72. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  73. srv := NewPermServer(svcCtx)
  74. _, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  75. AppKey: "nonexistent_key",
  76. AppSecret: "any",
  77. Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
  78. })
  79. require.Error(t, err)
  80. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  81. assert.Equal(t, "无效的appKey", status.Convert(err).Message())
  82. }
  83. // TC-0163: appSecret错误
  84. func TestSyncPermissions_WrongAppSecret(t *testing.T) {
  85. ctx := context.Background()
  86. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  87. conn := testutil.GetTestSqlConn()
  88. now := time.Now().Unix()
  89. uid := testutil.UniqueId()
  90. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  91. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "real_secret",
  92. Status: 1, CreateTime: now, UpdateTime: now,
  93. })
  94. require.NoError(t, err)
  95. pId, _ := pRes.LastInsertId()
  96. t.Cleanup(func() {
  97. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  98. })
  99. srv := NewPermServer(svcCtx)
  100. _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  101. AppKey: uid,
  102. AppSecret: "wrong_secret",
  103. Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
  104. })
  105. require.Error(t, err)
  106. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  107. assert.Equal(t, "appSecret验证失败", status.Convert(err).Message())
  108. }
  109. // TC-0164: 产品已禁用
  110. func TestSyncPermissions_ProductDisabled(t *testing.T) {
  111. ctx := context.Background()
  112. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  113. conn := testutil.GetTestSqlConn()
  114. now := time.Now().Unix()
  115. uid := testutil.UniqueId()
  116. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  117. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "secret1",
  118. Status: 2, CreateTime: now, UpdateTime: now,
  119. })
  120. require.NoError(t, err)
  121. pId, _ := pRes.LastInsertId()
  122. t.Cleanup(func() {
  123. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  124. })
  125. srv := NewPermServer(svcCtx)
  126. _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  127. AppKey: uid,
  128. AppSecret: "secret1",
  129. Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
  130. })
  131. require.Error(t, err)
  132. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  133. assert.Equal(t, "产品已被禁用", status.Convert(err).Message())
  134. }
  135. // ---------- Login ----------
  136. // TC-0166: 正常登录(普通用户+productCode)
  137. func TestLogin_Normal(t *testing.T) {
  138. ctx := context.Background()
  139. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  140. conn := testutil.GetTestSqlConn()
  141. now := time.Now().Unix()
  142. uid := testutil.UniqueId()
  143. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  144. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  145. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  146. Status: 1, CreateTime: now, UpdateTime: now,
  147. })
  148. require.NoError(t, err)
  149. uId, _ := uRes.LastInsertId()
  150. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  151. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  152. Status: 1, CreateTime: now, UpdateTime: now,
  153. })
  154. require.NoError(t, err)
  155. pId, _ := pRes.LastInsertId()
  156. pmRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  157. ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 1,
  158. CreateTime: now, UpdateTime: now,
  159. })
  160. require.NoError(t, err)
  161. pmId, _ := pmRes.LastInsertId()
  162. t.Cleanup(func() {
  163. testutil.CleanTable(ctx, conn, "`sys_product_member`", pmId)
  164. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  165. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  166. })
  167. srv := NewPermServer(svcCtx)
  168. resp, err := srv.Login(ctx, &pb.LoginReq{
  169. Username: uid,
  170. Password: "pass123",
  171. ProductCode: uid,
  172. })
  173. require.NoError(t, err)
  174. assert.NotEmpty(t, resp.AccessToken)
  175. assert.NotEmpty(t, resp.RefreshToken)
  176. assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
  177. assert.Equal(t, uId, resp.UserId)
  178. assert.Equal(t, uid, resp.Username)
  179. }
  180. // TC-0167: 用户不存在
  181. func TestLogin_UserNotFound(t *testing.T) {
  182. ctx := context.Background()
  183. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  184. srv := NewPermServer(svcCtx)
  185. _, err := srv.Login(ctx, &pb.LoginReq{
  186. Username: "nonexistent_user_xyz",
  187. Password: "any",
  188. ProductCode: "any_product",
  189. })
  190. require.Error(t, err)
  191. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  192. assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
  193. }
  194. // TC-0168: 密码错误
  195. func TestLogin_WrongPassword(t *testing.T) {
  196. ctx := context.Background()
  197. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  198. conn := testutil.GetTestSqlConn()
  199. now := time.Now().Unix()
  200. uid := testutil.UniqueId()
  201. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  202. Username: uid, Password: testutil.HashPassword("correct_pass"), Nickname: "nick",
  203. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  204. Status: 1, CreateTime: now, UpdateTime: now,
  205. })
  206. require.NoError(t, err)
  207. uId, _ := uRes.LastInsertId()
  208. t.Cleanup(func() {
  209. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  210. })
  211. srv := NewPermServer(svcCtx)
  212. _, err = srv.Login(ctx, &pb.LoginReq{
  213. Username: uid,
  214. Password: "wrong_pass",
  215. ProductCode: "any_product",
  216. })
  217. require.Error(t, err)
  218. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  219. assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
  220. }
  221. // TC-0169: 账号冻结
  222. func TestLogin_AccountFrozen(t *testing.T) {
  223. ctx := context.Background()
  224. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  225. conn := testutil.GetTestSqlConn()
  226. now := time.Now().Unix()
  227. uid := testutil.UniqueId()
  228. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  229. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  230. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  231. Status: 2, CreateTime: now, UpdateTime: now,
  232. })
  233. require.NoError(t, err)
  234. uId, _ := uRes.LastInsertId()
  235. t.Cleanup(func() {
  236. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  237. })
  238. srv := NewPermServer(svcCtx)
  239. _, err = srv.Login(ctx, &pb.LoginReq{
  240. Username: uid,
  241. Password: "pass123",
  242. ProductCode: "any_product",
  243. })
  244. require.Error(t, err)
  245. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  246. assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
  247. }
  248. // TC-0170: 超管被拒绝
  249. func TestLogin_SuperAdminRejected(t *testing.T) {
  250. ctx := context.Background()
  251. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  252. conn := testutil.GetTestSqlConn()
  253. now := time.Now().Unix()
  254. uid := testutil.UniqueId()
  255. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  256. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
  257. Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
  258. Status: 1, CreateTime: now, UpdateTime: now,
  259. })
  260. require.NoError(t, err)
  261. uId, _ := uRes.LastInsertId()
  262. t.Cleanup(func() {
  263. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  264. })
  265. srv := NewPermServer(svcCtx)
  266. _, err = srv.Login(ctx, &pb.LoginReq{
  267. Username: uid,
  268. Password: "pass123",
  269. ProductCode: "any_product",
  270. })
  271. require.Error(t, err)
  272. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  273. assert.Equal(t, "超级管理员不允许通过产品端登录", status.Convert(err).Message())
  274. }
  275. // TC-0171: 普通用户+productCode
  276. func TestLogin_NormalUserWithProductCode(t *testing.T) {
  277. ctx := context.Background()
  278. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  279. conn := testutil.GetTestSqlConn()
  280. now := time.Now().Unix()
  281. uid := testutil.UniqueId()
  282. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  283. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  284. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  285. Status: 1, CreateTime: now, UpdateTime: now,
  286. })
  287. require.NoError(t, err)
  288. uId, _ := uRes.LastInsertId()
  289. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  290. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  291. Status: 1, CreateTime: now, UpdateTime: now,
  292. })
  293. require.NoError(t, err)
  294. pId, _ := pRes.LastInsertId()
  295. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  296. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  297. Status: 1, CreateTime: now, UpdateTime: now,
  298. })
  299. require.NoError(t, err)
  300. mbrId, _ := mbrRes.LastInsertId()
  301. roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
  302. ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
  303. CreateTime: now, UpdateTime: now,
  304. })
  305. require.NoError(t, err)
  306. roleId, _ := roleRes.LastInsertId()
  307. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  308. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  309. Status: 1, CreateTime: now, UpdateTime: now,
  310. })
  311. require.NoError(t, err)
  312. pm1Id, _ := pm1Res.LastInsertId()
  313. urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
  314. UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
  315. })
  316. require.NoError(t, err)
  317. urId, _ := urRes.LastInsertId()
  318. rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  319. RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
  320. })
  321. require.NoError(t, err)
  322. rpId, _ := rpRes.LastInsertId()
  323. t.Cleanup(func() {
  324. testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
  325. testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
  326. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  327. testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
  328. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  329. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  330. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  331. })
  332. srv := NewPermServer(svcCtx)
  333. resp, err := srv.Login(ctx, &pb.LoginReq{
  334. Username: uid,
  335. Password: "pass123",
  336. ProductCode: uid,
  337. })
  338. require.NoError(t, err)
  339. assert.Equal(t, "MEMBER", resp.MemberType)
  340. assert.Contains(t, resp.Perms, uid+"_c1")
  341. assert.NotEmpty(t, resp.AccessToken)
  342. assert.NotEmpty(t, resp.RefreshToken)
  343. }
  344. // TC-0510: productCode为空
  345. func TestLogin_EmptyProductCode(t *testing.T) {
  346. ctx := context.Background()
  347. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  348. srv := NewPermServer(svcCtx)
  349. _, err := srv.Login(ctx, &pb.LoginReq{
  350. Username: "anyuser",
  351. Password: "anypass",
  352. ProductCode: "",
  353. })
  354. require.Error(t, err)
  355. assert.Equal(t, codes.InvalidArgument, status.Code(err))
  356. assert.Equal(t, "productCode不能为空", status.Convert(err).Message())
  357. }
  358. // ---------- RefreshToken ----------
  359. // TC-0172: 正常刷新(refreshToken原样返回,不重新生成)
  360. func TestRefreshToken_Normal(t *testing.T) {
  361. ctx := context.Background()
  362. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  363. conn := testutil.GetTestSqlConn()
  364. now := time.Now().Unix()
  365. uid := testutil.UniqueId()
  366. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  367. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  368. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  369. Status: 1, CreateTime: now, UpdateTime: now,
  370. })
  371. require.NoError(t, err)
  372. uId, _ := uRes.LastInsertId()
  373. t.Cleanup(func() {
  374. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  375. })
  376. cfg := testutil.GetTestConfig()
  377. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "")
  378. require.NoError(t, err)
  379. srv := NewPermServer(svcCtx)
  380. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  381. RefreshToken: refreshToken,
  382. })
  383. require.NoError(t, err)
  384. assert.NotEmpty(t, resp.AccessToken)
  385. assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回,不重新生成")
  386. assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
  387. }
  388. // TC-0173: token无效
  389. func TestRefreshToken_InvalidToken(t *testing.T) {
  390. ctx := context.Background()
  391. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  392. srv := NewPermServer(svcCtx)
  393. _, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  394. RefreshToken: "invalid.token.string",
  395. })
  396. require.Error(t, err)
  397. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  398. assert.Equal(t, "refreshToken无效或已过期", status.Convert(err).Message())
  399. }
  400. // TC-0174: 账号冻结
  401. func TestRefreshToken_AccountFrozen(t *testing.T) {
  402. ctx := context.Background()
  403. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  404. conn := testutil.GetTestSqlConn()
  405. now := time.Now().Unix()
  406. uid := testutil.UniqueId()
  407. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  408. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  409. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  410. Status: 2, CreateTime: now, UpdateTime: now,
  411. })
  412. require.NoError(t, err)
  413. uId, _ := uRes.LastInsertId()
  414. t.Cleanup(func() {
  415. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  416. })
  417. cfg := testutil.GetTestConfig()
  418. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "")
  419. require.NoError(t, err)
  420. srv := NewPermServer(svcCtx)
  421. _, err = srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  422. RefreshToken: refreshToken,
  423. })
  424. require.Error(t, err)
  425. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  426. assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
  427. }
  428. // TC-0175: productCode回退到claims
  429. func TestRefreshToken_FallbackToClaimsProductCode(t *testing.T) {
  430. ctx := context.Background()
  431. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  432. conn := testutil.GetTestSqlConn()
  433. now := time.Now().Unix()
  434. uid := testutil.UniqueId()
  435. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  436. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  437. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  438. Status: 1, CreateTime: now, UpdateTime: now,
  439. })
  440. require.NoError(t, err)
  441. uId, _ := uRes.LastInsertId()
  442. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  443. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  444. Status: 1, CreateTime: now, UpdateTime: now,
  445. })
  446. require.NoError(t, err)
  447. pId, _ := pRes.LastInsertId()
  448. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  449. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  450. Status: 1, CreateTime: now, UpdateTime: now,
  451. })
  452. require.NoError(t, err)
  453. mbrId, _ := mbrRes.LastInsertId()
  454. t.Cleanup(func() {
  455. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  456. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  457. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  458. })
  459. cfg := testutil.GetTestConfig()
  460. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid)
  461. require.NoError(t, err)
  462. srv := NewPermServer(svcCtx)
  463. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  464. RefreshToken: refreshToken,
  465. ProductCode: "",
  466. })
  467. require.NoError(t, err)
  468. assert.NotEmpty(t, resp.AccessToken)
  469. assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
  470. }
  471. // TC-0176: 超管+productCode
  472. func TestRefreshToken_SuperAdminWithProductCode(t *testing.T) {
  473. ctx := context.Background()
  474. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  475. conn := testutil.GetTestSqlConn()
  476. now := time.Now().Unix()
  477. uid := testutil.UniqueId()
  478. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  479. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
  480. Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
  481. Status: 1, CreateTime: now, UpdateTime: now,
  482. })
  483. require.NoError(t, err)
  484. uId, _ := uRes.LastInsertId()
  485. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  486. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  487. Status: 1, CreateTime: now, UpdateTime: now,
  488. })
  489. require.NoError(t, err)
  490. pId, _ := pRes.LastInsertId()
  491. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  492. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  493. Status: 1, CreateTime: now, UpdateTime: now,
  494. })
  495. require.NoError(t, err)
  496. pm1Id, _ := pm1Res.LastInsertId()
  497. t.Cleanup(func() {
  498. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  499. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  500. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  501. })
  502. cfg := testutil.GetTestConfig()
  503. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid)
  504. require.NoError(t, err)
  505. srv := NewPermServer(svcCtx)
  506. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  507. RefreshToken: refreshToken,
  508. ProductCode: uid,
  509. })
  510. require.NoError(t, err)
  511. assert.NotEmpty(t, resp.AccessToken)
  512. assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
  513. }
  514. // TC-0177: 普通用户+productCode
  515. func TestRefreshToken_NormalUserWithProductCode(t *testing.T) {
  516. ctx := context.Background()
  517. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  518. conn := testutil.GetTestSqlConn()
  519. now := time.Now().Unix()
  520. uid := testutil.UniqueId()
  521. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  522. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  523. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  524. Status: 1, CreateTime: now, UpdateTime: now,
  525. })
  526. require.NoError(t, err)
  527. uId, _ := uRes.LastInsertId()
  528. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  529. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  530. Status: 1, CreateTime: now, UpdateTime: now,
  531. })
  532. require.NoError(t, err)
  533. pId, _ := pRes.LastInsertId()
  534. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  535. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  536. Status: 1, CreateTime: now, UpdateTime: now,
  537. })
  538. require.NoError(t, err)
  539. mbrId, _ := mbrRes.LastInsertId()
  540. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  541. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  542. Status: 1, CreateTime: now, UpdateTime: now,
  543. })
  544. require.NoError(t, err)
  545. pm1Id, _ := pm1Res.LastInsertId()
  546. roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
  547. ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
  548. CreateTime: now, UpdateTime: now,
  549. })
  550. require.NoError(t, err)
  551. roleId, _ := roleRes.LastInsertId()
  552. urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
  553. UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
  554. })
  555. require.NoError(t, err)
  556. urId, _ := urRes.LastInsertId()
  557. rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  558. RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
  559. })
  560. require.NoError(t, err)
  561. rpId, _ := rpRes.LastInsertId()
  562. t.Cleanup(func() {
  563. testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
  564. testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
  565. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  566. testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
  567. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  568. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  569. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  570. })
  571. cfg := testutil.GetTestConfig()
  572. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid)
  573. require.NoError(t, err)
  574. srv := NewPermServer(svcCtx)
  575. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  576. RefreshToken: refreshToken,
  577. ProductCode: uid,
  578. })
  579. require.NoError(t, err)
  580. assert.NotEmpty(t, resp.AccessToken)
  581. assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
  582. }
  583. // ---------- VerifyToken ----------
  584. // TC-0178: 有效token
  585. func TestVerifyToken_Valid(t *testing.T) {
  586. ctx := context.Background()
  587. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  588. cfg := testutil.GetTestConfig()
  589. accessToken, err := authHelper.GenerateAccessToken(
  590. cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
  591. 100, "testuser", "prod1", "ADMIN", []string{"perm_a", "perm_b"},
  592. )
  593. require.NoError(t, err)
  594. srv := NewPermServer(svcCtx)
  595. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
  596. require.NoError(t, err)
  597. assert.True(t, resp.Valid)
  598. assert.Equal(t, int64(100), resp.UserId)
  599. assert.Equal(t, "testuser", resp.Username)
  600. assert.Equal(t, "ADMIN", resp.MemberType)
  601. assert.ElementsMatch(t, []string{"perm_a", "perm_b"}, resp.Perms)
  602. }
  603. // TC-0179: 无效token
  604. func TestVerifyToken_Invalid(t *testing.T) {
  605. ctx := context.Background()
  606. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  607. srv := NewPermServer(svcCtx)
  608. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: "invalid.token.here"})
  609. require.NoError(t, err)
  610. assert.False(t, resp.Valid)
  611. }
  612. // TC-0180: 缺少userId
  613. func TestVerifyToken_MissingUserId(t *testing.T) {
  614. ctx := context.Background()
  615. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  616. cfg := testutil.GetTestConfig()
  617. // Generate a token without userId by using raw JWT
  618. token := createTokenWithoutUserId(cfg.Auth.AccessSecret)
  619. srv := NewPermServer(svcCtx)
  620. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: token})
  621. require.NoError(t, err)
  622. assert.False(t, resp.Valid)
  623. }
  624. // ---------- GetUserPerms ----------
  625. // TC-0181: 用户不存在
  626. func TestGetUserPerms_UserNotFound(t *testing.T) {
  627. ctx := context.Background()
  628. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  629. srv := NewPermServer(svcCtx)
  630. _, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  631. UserId: 999999999,
  632. ProductCode: "any_product",
  633. })
  634. require.Error(t, err)
  635. assert.Equal(t, codes.NotFound, status.Code(err))
  636. assert.Equal(t, "用户不存在", status.Convert(err).Message())
  637. }
  638. // TC-0182: 超管
  639. func TestGetUserPerms_SuperAdmin(t *testing.T) {
  640. ctx := context.Background()
  641. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  642. conn := testutil.GetTestSqlConn()
  643. now := time.Now().Unix()
  644. uid := testutil.UniqueId()
  645. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  646. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "sa",
  647. Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
  648. Status: 1, CreateTime: now, UpdateTime: now,
  649. })
  650. require.NoError(t, err)
  651. uId, _ := uRes.LastInsertId()
  652. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  653. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "s1",
  654. Status: 1, CreateTime: now, UpdateTime: now,
  655. })
  656. require.NoError(t, err)
  657. pId, _ := pRes.LastInsertId()
  658. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  659. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  660. Status: 1, CreateTime: now, UpdateTime: now,
  661. })
  662. require.NoError(t, err)
  663. pm1Id, _ := pm1Res.LastInsertId()
  664. mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  665. ProductCode: uid, UserId: uId, MemberType: "ADMIN",
  666. Status: 1, CreateTime: now, UpdateTime: now,
  667. })
  668. require.NoError(t, err)
  669. mId, _ := mRes.LastInsertId()
  670. t.Cleanup(func() {
  671. testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
  672. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  673. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  674. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  675. })
  676. srv := NewPermServer(svcCtx)
  677. resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  678. UserId: uId,
  679. ProductCode: uid,
  680. })
  681. require.NoError(t, err)
  682. assert.Equal(t, "SUPER_ADMIN", resp.MemberType)
  683. assert.Contains(t, resp.Perms, uid+"_c1")
  684. }
  685. // TC-0165: 验证disabled计数
  686. func TestSyncPermissions_VerifyDisabledCount(t *testing.T) {
  687. ctx := context.Background()
  688. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  689. conn := testutil.GetTestSqlConn()
  690. now := time.Now().Unix()
  691. uid := testutil.UniqueId()
  692. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  693. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "secret1",
  694. Status: 1, CreateTime: now, UpdateTime: now,
  695. })
  696. require.NoError(t, err)
  697. pId, _ := pRes.LastInsertId()
  698. var permIds []int64
  699. for i := 0; i < 5; i++ {
  700. pmRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  701. ProductCode: uid, Name: "p", Code: fmt.Sprintf("%s_c%d", uid, i),
  702. Status: 1, CreateTime: now, UpdateTime: now,
  703. })
  704. require.NoError(t, err)
  705. pmId, _ := pmRes.LastInsertId()
  706. permIds = append(permIds, pmId)
  707. }
  708. t.Cleanup(func() {
  709. testutil.CleanTable(ctx, conn, "`sys_perm`", permIds...)
  710. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  711. })
  712. srv := NewPermServer(svcCtx)
  713. resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  714. AppKey: uid,
  715. AppSecret: "secret1",
  716. Perms: []*pb.PermItem{
  717. {Code: fmt.Sprintf("%s_c0", uid), Name: "p"},
  718. {Code: fmt.Sprintf("%s_c1", uid), Name: "p"},
  719. },
  720. })
  721. require.NoError(t, err)
  722. assert.Equal(t, int64(3), resp.Disabled)
  723. }
  724. // TC-0183: MEMBER-DENY覆盖
  725. func TestGetUserPerms_MemberDENYOverride(t *testing.T) {
  726. ctx := context.Background()
  727. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  728. conn := testutil.GetTestSqlConn()
  729. now := time.Now().Unix()
  730. uid := testutil.UniqueId()
  731. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  732. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "nick",
  733. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  734. Status: 1, CreateTime: now, UpdateTime: now,
  735. })
  736. require.NoError(t, err)
  737. uId, _ := uRes.LastInsertId()
  738. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  739. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  740. Status: 1, CreateTime: now, UpdateTime: now,
  741. })
  742. require.NoError(t, err)
  743. pId, _ := pRes.LastInsertId()
  744. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  745. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  746. Status: 1, CreateTime: now, UpdateTime: now,
  747. })
  748. require.NoError(t, err)
  749. mbrId, _ := mbrRes.LastInsertId()
  750. roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
  751. ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
  752. CreateTime: now, UpdateTime: now,
  753. })
  754. require.NoError(t, err)
  755. roleId, _ := roleRes.LastInsertId()
  756. permARes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  757. ProductCode: uid, Name: "permA", Code: uid + "_pA",
  758. Status: 1, CreateTime: now, UpdateTime: now,
  759. })
  760. require.NoError(t, err)
  761. permAId, _ := permARes.LastInsertId()
  762. permBRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  763. ProductCode: uid, Name: "permB", Code: uid + "_pB",
  764. Status: 1, CreateTime: now, UpdateTime: now,
  765. })
  766. require.NoError(t, err)
  767. permBId, _ := permBRes.LastInsertId()
  768. urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
  769. UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
  770. })
  771. require.NoError(t, err)
  772. urId, _ := urRes.LastInsertId()
  773. rpARes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  774. RoleId: roleId, PermId: permAId, CreateTime: now, UpdateTime: now,
  775. })
  776. require.NoError(t, err)
  777. rpAId, _ := rpARes.LastInsertId()
  778. rpBRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  779. RoleId: roleId, PermId: permBId, CreateTime: now, UpdateTime: now,
  780. })
  781. require.NoError(t, err)
  782. rpBId, _ := rpBRes.LastInsertId()
  783. upRes, err := svcCtx.SysUserPermModel.Insert(ctx, &userPermModel.SysUserPerm{
  784. UserId: uId, PermId: permAId, Effect: "DENY",
  785. CreateTime: now, UpdateTime: now,
  786. })
  787. require.NoError(t, err)
  788. upId, _ := upRes.LastInsertId()
  789. t.Cleanup(func() {
  790. testutil.CleanTable(ctx, conn, "`sys_user_perm`", upId)
  791. testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpAId, rpBId)
  792. testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
  793. testutil.CleanTable(ctx, conn, "`sys_perm`", permAId, permBId)
  794. testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
  795. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  796. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  797. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  798. })
  799. srv := NewPermServer(svcCtx)
  800. resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  801. UserId: uId,
  802. ProductCode: uid,
  803. })
  804. require.NoError(t, err)
  805. assert.Equal(t, "MEMBER", resp.MemberType)
  806. assert.Contains(t, resp.Perms, uid+"_pB")
  807. assert.NotContains(t, resp.Perms, uid+"_pA")
  808. }
  809. // helper: create a JWT with no userId claim
  810. func createTokenWithoutUserId(secret string) string {
  811. claims := jwt.MapClaims{
  812. "username": "test",
  813. "exp": time.Now().Add(time.Hour).Unix(),
  814. }
  815. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  816. s, _ := token.SignedString([]byte(secret))
  817. return s
  818. }