| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821 |
- package user
- import (
- "context"
- "errors"
- "fmt"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "math"
- "perms-system-server/internal/consts"
- "perms-system-server/internal/loaders"
- roleLogic "perms-system-server/internal/logic/role"
- deptModel "perms-system-server/internal/model/dept"
- memberModel "perms-system-server/internal/model/productmember"
- roleModel "perms-system-server/internal/model/role"
- userModel "perms-system-server/internal/model/user"
- userroleModel "perms-system-server/internal/model/userrole"
- "perms-system-server/internal/response"
- "perms-system-server/internal/svc"
- "perms-system-server/internal/testutil"
- "perms-system-server/internal/testutil/ctxhelper"
- "perms-system-server/internal/types"
- "sync"
- "sync/atomic"
- "testing"
- "time"
- )
- func insertTestMember(t *testing.T, svcCtx *svc.ServiceContext, productCode string, userId int64) int64 {
- t.Helper()
- now := time.Now().Unix()
- res, err := svcCtx.SysProductMemberModel.Insert(ctxhelper.SuperAdminCtx(), &memberModel.SysProductMember{
- ProductCode: productCode,
- UserId: userId,
- MemberType: "MEMBER",
- Status: 1,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- id, _ := res.LastInsertId()
- return id
- }
- func insertTestRole(t *testing.T, svcCtx *svc.ServiceContext, productCode string, status int64) int64 {
- t.Helper()
- now := time.Now().Unix()
- res, err := svcCtx.SysRoleModel.Insert(ctxhelper.SuperAdminCtx(), &roleModel.SysRole{
- ProductCode: productCode,
- Name: "role_" + testutil.UniqueId(),
- Status: status,
- PermsLevel: 1,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- id, _ := res.LastInsertId()
- return id
- }
- // TC-0184: 正常绑定
- func TestBindRoles_Success(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- r1 := insertTestRole(t, svcCtx, "test_product", 1)
- r2 := insertTestRole(t, svcCtx, "test_product", 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", r1, r2)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r1, r2},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.ElementsMatch(t, []int64{r1, r2}, roleIds)
- }
- // TC-0185: 用户不存在
- func TestBindRoles_UserNotFound(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: 999999999,
- RoleIds: []int64{1},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 404, codeErr.Code())
- assert.Equal(t, "用户不存在", codeErr.Error())
- }
- // TC-0186: 清空角色
- func TestBindRoles_EmptyRoleIds_ClearsAll(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- r1 := insertTestRole(t, svcCtx, "test_product", 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", r1)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r1},
- })
- require.NoError(t, err)
- err = logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Empty(t, roleIds)
- }
- // TC-0184: 正常重新绑定
- func TestBindRoles_Rebind(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- r1 := insertTestRole(t, svcCtx, "test_product", 1)
- r2 := insertTestRole(t, svcCtx, "test_product", 1)
- r3 := insertTestRole(t, svcCtx, "test_product", 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", r1, r2, r3)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r1, r2},
- })
- require.NoError(t, err)
- err = logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{r2, r3},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.ElementsMatch(t, []int64{r2, r3}, roleIds)
- }
- // TC-0188: 角色不属于当前产品
- func TestBindRoles_RoleBelongsToOtherProduct(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- otherRole := insertTestRole(t, svcCtx, "other_product", 1)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", otherRole)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{otherRole},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "其他产品的角色")
- }
- // TC-0189: 角色已禁用
- func TestBindRoles_RoleDisabled(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- disabledRole := insertTestRole(t, svcCtx, "test_product", 2)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", disabledRole)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{disabledRole},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "已禁用的角色")
- }
- // TC-0190: 角色不存在
- func TestBindRoles_RoleNotExists(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{999999999},
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "无效的角色ID")
- }
- func insertTestRoleWithLevel(t *testing.T, svcCtx *svc.ServiceContext, productCode string, status int64, permsLevel int64) int64 {
- t.Helper()
- now := time.Now().Unix()
- res, err := svcCtx.SysRoleModel.Insert(ctxhelper.SuperAdminCtx(), &roleModel.SysRole{
- ProductCode: productCode,
- Name: "role_" + testutil.UniqueId(),
- Status: status,
- PermsLevel: permsLevel,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- id, _ := res.LastInsertId()
- return id
- }
- // setupDeptForCaller 插入一个 dept,同时构造 caller(使用该 dept)与 target(同 dept 下)的环境
- // 返回 deptId、deptPath(caller 使用)、cleanup function
- func setupDeptForCaller(t *testing.T, svcCtx *svc.ServiceContext) (int64, string, func()) {
- t.Helper()
- now := time.Now().Unix()
- superCtx := ctxhelper.SuperAdminCtx()
- res, err := svcCtx.SysDeptModel.Insert(superCtx, &deptModel.SysDept{
- Name: "dept_" + testutil.UniqueId(),
- ParentId: 0,
- Path: "/",
- DeptType: consts.DeptTypeNormal,
- Status: consts.StatusEnabled,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- deptId, _ := res.LastInsertId()
- // 先占位再用真实 deptId 构造 path:"/{deptId}/"
- path := fmt.Sprintf("/%d/", deptId)
- _, err = svcCtx.SysDeptModel.Insert(superCtx, &deptModel.SysDept{}) // noop — keep linter happy
- _ = err
- // 更新 path
- dept, _ := svcCtx.SysDeptModel.FindOne(superCtx, deptId)
- dept.Path = path
- dept.UpdateTime = time.Now().Unix()
- require.NoError(t, svcCtx.SysDeptModel.Update(superCtx, dept))
- conn := testutil.GetTestSqlConn()
- cleanup := func() {
- testutil.CleanTable(superCtx, conn, "`sys_dept`", deptId)
- }
- return deptId, path, cleanup
- }
- // TC-0208: MEMBER 调用者不能分配权限级别高于自身的角色 (audit 修复后 permsLevel 仅对 MEMBER 生效)
- func TestBindRoles_PermsLevelEscalation_Rejected(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- deptId, deptPath, cleanupDept := setupDeptForCaller(t, svcCtx)
- t.Cleanup(cleanupDept)
- productCode := "test_product"
- // 目标用户:放进 dept 下,MEMBER 产品成员
- username := testutil.UniqueId()
- targetUserId := insertTestUserFull(t, superCtx, &userModel.SysUser{
- Username: username, Password: testutil.HashPassword("pass"),
- Nickname: "tgt", DeptId: deptId,
- IsSuperAdmin: 2, MustChangePassword: 2, Status: 1,
- })
- mId := insertTestMember(t, svcCtx, productCode, targetUserId)
- highLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- // 修复后 GuardRoleLevelAssignable 走 DB 强一致读取 caller 的 MinPermsLevel,
- // 因此需要在 DB 里为调用者落地真实的 user + role + user_role 关系链(permsLevel=50)。
- callerUserId, callerCleanup := seedCallerWithRoleLevel(t, svcCtx, productCode, 50)
- t.Cleanup(callerCleanup)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", targetUserId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", targetUserId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", highLevelRole)
- })
- // MEMBER 调用者与 target 同 dept,DB 中 MinPermsLevel=50,目标角色 permsLevel=1 → 越级
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: callerUserId,
- Username: "member_caller",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeMember,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: deptId,
- DeptPath: deptPath,
- MinPermsLevel: 50,
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: targetUserId,
- RoleIds: []int64{highLevelRole},
- })
- require.Error(t, err)
- var ce *response.CodeError
- require.True(t, errors.As(err, &ce))
- assert.Equal(t, 403, ce.Code())
- assert.Contains(t, ce.Error(), "不能分配权限级别高于自身的角色")
- }
- // TC-0711: ADMIN 调用者(MinPermsLevel=math.MaxInt64)不受 permsLevel 校验约束 (audit 回归)
- // 修复前:ADMIN 通过 member_type 获得权限,MinPermsLevel 保持 math.MaxInt64,
- //
- // r.PermsLevel < math.MaxInt64 必然成立 → ADMIN 无法绑定任何角色。
- //
- // 修复后:代码显式豁免 ADMIN/DEVELOPER 的 permsLevel 校验。
- func TestBindRoles_AdminBypassesPermsLevelCheck(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUser(t, superCtx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, productCode, userId)
- lowLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", userId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", lowLevelRole)
- })
- // 关键:模拟 loader 真实产出——ADMIN 没有自定义角色,MinPermsLevel=math.MaxInt64
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: 999997,
- Username: "admin_caller",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeAdmin,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: 1,
- DeptPath: "/1/",
- MinPermsLevel: math.MaxInt64, // 默认 sentinel
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{lowLevelRole},
- })
- require.NoError(t, err, "ADMIN 调用者应当能绑定任意级别的角色")
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Contains(t, roleIds, lowLevelRole)
- }
- // TC-0712: DEVELOPER 调用者同样不受 permsLevel 校验约束 (audit 回归)
- func TestBindRoles_DeveloperBypassesPermsLevelCheck(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- deptId, deptPath, cleanupDept := setupDeptForCaller(t, svcCtx)
- t.Cleanup(cleanupDept)
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUserFull(t, superCtx, &userModel.SysUser{
- Username: username, Password: testutil.HashPassword("pass"),
- Nickname: "tgt_dev", DeptId: deptId,
- IsSuperAdmin: 2, MustChangePassword: 2, Status: 1,
- })
- mId := insertTestMember(t, svcCtx, productCode, userId)
- lowLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", userId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", lowLevelRole)
- })
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: 999996,
- Username: "developer_caller",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeDeveloper,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: deptId,
- DeptPath: deptPath,
- MinPermsLevel: math.MaxInt64,
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{lowLevelRole},
- })
- require.NoError(t, err, "DEVELOPER 调用者应当能绑定任意级别的角色")
- }
- // TC-0713: MinPermsLevel == math.MaxInt64 的 MEMBER 调用者也必须被豁免
- // (sentinel 判定路径:既不是 ADMIN/DEVELOPER,也没有角色,此时 r.PermsLevel<MaxInt64 的逐字面比较
- //
- // 曾经误伤此类 MEMBER;修复后代码用 MinPermsLevel==MaxInt64 做短路)
- func TestBindRoles_MemberWithSentinelMinLevel_NotBlocked(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUser(t, superCtx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, productCode, userId)
- role := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 100)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", userId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", role)
- })
- // MEMBER 调用者没有绑定任何启用角色,MinPermsLevel=MaxInt64(sentinel)
- // 正式语义:"我自己无级别" → 不应触发越级校验(否则所有无角色 MEMBER 都永远无法分配角色)
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: 999995,
- Username: "member_no_role",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeMember,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: 1,
- DeptPath: "/1/",
- MinPermsLevel: math.MaxInt64,
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- // 注意:业务层早期就会用 `RequireProductAdminFor` 拦住非 ADMIN/SUPER 的调用;此处是为了单独验证
- // bindRoles 内部的 permsLevel 分支。实际发生于 ADMIN 通过上层校验但 MemberType 上下文异常时的防御。
- // 这里只断言:"sentinel 路径不应报 403 '不能分配权限级别高于自身的角色'"。
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{role},
- })
- // 调用者非 ADMIN,且是 MEMBER,上游会拦 403 "仅ADMIN/超管可绑定角色";
- // 此处我们只校验"即使走到 permsLevel 分支,sentinel MinPermsLevel 不应命中"
- if err != nil {
- var ce *response.CodeError
- require.True(t, errors.As(err, &ce))
- assert.NotContains(t, ce.Error(), "不能分配权限级别高于自身的角色",
- "sentinel MinPermsLevel=math.MaxInt64 不应触发越级错误")
- }
- }
- // TC-0209: 超管可以分配任意权限级别的角色
- func TestBindRoles_SuperAdminCanAssignAnyLevel(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- productCode := "test_product"
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, productCode, userId)
- highLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, 1, 1)
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_role`", highLevelRole)
- })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{highLevelRole},
- })
- require.NoError(t, err)
- roleIds, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Contains(t, roleIds, highLevelRole)
- }
- // TC-0191: 目标用户不是当前产品成员时拒绝绑定角色(修复验证)
- func TestBindRoles_NonMemberRejected(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
- logic := NewBindRolesLogic(ctx, svcCtx)
- err := logic.BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{},
- })
- require.Error(t, err)
- var codeErr2 *response.CodeError
- require.True(t, errors.As(err, &codeErr2))
- assert.Equal(t, 400, codeErr2.Code())
- assert.Contains(t, codeErr2.Error(), "不是当前产品的成员")
- }
- func setupBindRolesOrphanFixture(t *testing.T, svcCtx *svc.ServiceContext, productCode string) (
- userId, memberId, roleId int64, cleanup func(),
- ) {
- t.Helper()
- superCtx := ctxhelper.SuperAdminCtx()
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId = insertTestUser(t, superCtx, username, testutil.HashPassword("pass"))
- memberId = insertTestMember(t, svcCtx, productCode, userId)
- now := time.Now().Unix()
- res, err := svcCtx.SysRoleModel.Insert(superCtx, &roleModel.SysRole{
- ProductCode: productCode,
- Name: "r12_1_" + testutil.UniqueId(),
- Status: consts.StatusEnabled,
- PermsLevel: 10,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- roleId, _ = res.LastInsertId()
- cleanup = func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", userId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", memberId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", userId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", roleId)
- }
- return
- }
- // TC-1078: BindRoles 和 DeleteRole 并发:终态无孤儿
- // 用真实 MySQL + go-zero 事务跑多轮并发,断言每一轮都能落在以下两个合法终态之一:
- //
- // A) BindRoles 胜出 + DeleteRole 胜出(先后串行):
- // - 最常见:BindRoles 先提交,sys_user_role 出现新行;DeleteRole 随后提交,
- // 级联 DELETE 把新行一并带走;sys_role[R] 消失、sys_user_role 无 R 行 → 无孤儿。
- // B) DeleteRole 先提交 + BindRoles 收 400:
- // - sys_role[R] 消失;BindRoles 事务内 LockRolesForShareTx 读不到 → ErrNotFound → 400;
- // - sys_user_role 无 R 行 → 无孤儿。
- //
- // 不允许任何一轮出现:sys_role[R] 不在 + sys_user_role 仍有 (userId, R) —— 这就是 orphan。
- func TestBindRoles_Vs_DeleteRole_NoOrphanRows(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- productCode := "test_product"
- const rounds = 6
- for round := 0; round < rounds; round++ {
- userId, memberId, roleId, cleanup := setupBindRolesOrphanFixture(t, svcCtx, productCode)
- _ = memberId
- var (
- wg sync.WaitGroup
- bindErr atomic.Value
- delErr atomic.Value
- bindOK atomic.Bool
- deleteOK atomic.Bool
- )
- start := make(chan struct{})
- wg.Add(2)
- go func() {
- defer wg.Done()
- <-start
- err := NewBindRolesLogic(superCtx, svcCtx).BindRoles(&types.BindRolesReq{
- UserId: userId,
- RoleIds: []int64{roleId},
- })
- if err == nil {
- bindOK.Store(true)
- } else {
- bindErr.Store(err)
- }
- }()
- go func() {
- defer wg.Done()
- <-start
- err := roleLogic.NewDeleteRoleLogic(superCtx, svcCtx).DeleteRole(&types.DeleteRoleReq{
- Id: roleId,
- })
- if err == nil {
- deleteOK.Store(true)
- } else {
- delErr.Store(err)
- }
- }()
- close(start)
- wg.Wait()
- // 终态:绕过 go-zero cache 直接查 DB,避免 cache 把 DeleteRole 的真实删除遮住造成假阳。
- var roleCount, urCount int64
- require.NoError(t, conn.QueryRowCtx(context.Background(), &roleCount,
- "SELECT COUNT(*) FROM `sys_role` WHERE `id` = ?", roleId))
- require.NoError(t, conn.QueryRowCtx(context.Background(), &urCount,
- "SELECT COUNT(*) FROM `sys_user_role` WHERE `userId` = ? AND `roleId` = ?", userId, roleId))
- // 最严 orphan 判定:sys_role 不在 且 sys_user_role 仍在 → 孤儿
- if roleCount == 0 && urCount > 0 {
- t.Fatalf(
- "(轮次 %d):产生 orphan —— sys_role[%d] 已被 DeleteRole 删除,"+
- "但 sys_user_role 仍有 (userId=%d, roleId=%d) 行。bindOK=%v delOK=%v "+
- "bindErr=%v delErr=%v", round, roleId, userId, roleId, bindOK.Load(),
- deleteOK.Load(), bindErr.Load(), delErr.Load(),
- )
- }
- // 其它合法终态一并回归:至少一端做了有效操作(不能都失败)
- if !bindOK.Load() && !deleteOK.Load() {
- t.Logf("轮次 %d: bindErr=%v delErr=%v", round, bindErr.Load(), delErr.Load())
- t.Fatalf("轮次 %d:两端都失败,不是预期的并发交错(至少 DeleteRole 应成功,"+
- "因为它持有 FindOne 之后所有行的独占链路)", round)
- }
- // 如果 BindRoles 报错必须是 400 "已被删除或已禁用的角色ID"(由 LockRolesForShareTx 触发)
- if raw := bindErr.Load(); raw != nil {
- var ce *response.CodeError
- if errors.As(raw.(error), &ce) {
- assert.Equal(t, 400, ce.Code(),
- "BindRoles 在 DeleteRole 先成功时必须 400,不得泄漏为 500")
- assert.Contains(t, ce.Error(), "已被删除或已禁用的角色ID",
- "信号必须准确,方便上游重试 / 清理入参")
- }
- }
- cleanup()
- }
- }
- func seedCallerWithRoleLevel(t *testing.T, svcCtx *svc.ServiceContext, productCode string, callerLevel int64) (int64, func()) {
- t.Helper()
- superCtx := ctxhelper.SuperAdminCtx()
- conn := testutil.GetTestSqlConn()
- callerUserId := insertTestUserFull(t, superCtx, &userModel.SysUser{
- Username: "caller_" + testutil.UniqueId(), Password: testutil.HashPassword("pass"),
- Nickname: "caller_seed", DeptId: 0,
- IsSuperAdmin: consts.IsSuperAdminNo, MustChangePassword: 2, Status: consts.StatusEnabled,
- })
- mId := insertTestMember(t, svcCtx, productCode, callerUserId)
- roleId := insertTestRoleWithLevel(t, svcCtx, productCode, consts.StatusEnabled, callerLevel)
- now := time.Now().Unix()
- _, err := svcCtx.SysUserRoleModel.Insert(superCtx, &userroleModel.SysUserRole{
- UserId: callerUserId,
- RoleId: roleId,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- cleanup := func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", callerUserId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", callerUserId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", roleId)
- }
- return callerUserId, cleanup
- }
- // ---------------------------------------------------------------------------
- // 覆盖目标:"不能分配与自己同级(或更高)的角色"。
- // 修复前代码仅拦 `>` 严格高于,允许 MEMBER 调用者把同级角色分配给别人,继而下一次 BindRoles 时
- // 由于同级权限集相同,可用后续 upgrade 路径放大;修复后变为 `<=`(含同级)拦截。
- // 本文件作为"同级也必须 403"的契约锚点。
- // ---------------------------------------------------------------------------
- // TC-0813: MEMBER 调用者不能分配与自己同 permsLevel 的角色。
- func TestBindRoles_EqualPermsLevel_Rejected(t *testing.T) {
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- superCtx := ctxhelper.SuperAdminCtx()
- deptId, deptPath, cleanupDept := setupDeptForCaller(t, svcCtx)
- t.Cleanup(cleanupDept)
- productCode := "test_product"
- username := testutil.UniqueId()
- targetUserId := insertTestUserFull(t, superCtx, &userModel.SysUser{
- Username: username, Password: testutil.HashPassword("pass"),
- Nickname: "tgt_eq", DeptId: deptId,
- IsSuperAdmin: consts.IsSuperAdminNo, MustChangePassword: 2, Status: consts.StatusEnabled,
- })
- mId := insertTestMember(t, svcCtx, productCode, targetUserId)
- const callerLevel int64 = 50
- sameLevelRole := insertTestRoleWithLevel(t, svcCtx, productCode, consts.StatusEnabled, callerLevel)
- // 修复后 GuardRoleLevelAssignable 走 DB 强一致读取 caller 的 MinPermsLevel,
- // 因此需要在 DB 里为调用者落地真实的 user + role + user_role 关系链。
- callerUserId, callerCleanup := seedCallerWithRoleLevel(t, svcCtx, productCode, callerLevel)
- t.Cleanup(callerCleanup)
- t.Cleanup(func() {
- testutil.CleanTableByField(superCtx, conn, "`sys_user_role`", "userId", targetUserId)
- testutil.CleanTable(superCtx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(superCtx, conn, "`sys_user`", targetUserId)
- testutil.CleanTable(superCtx, conn, "`sys_role`", sameLevelRole)
- })
- ctx := ctxhelper.CustomCtx(&loaders.UserDetails{
- UserId: callerUserId,
- Username: "member_eq_level",
- IsSuperAdmin: false,
- MemberType: consts.MemberTypeMember,
- Status: consts.StatusEnabled,
- ProductCode: productCode,
- DeptId: deptId,
- DeptPath: deptPath,
- MinPermsLevel: callerLevel,
- })
- err := NewBindRolesLogic(ctx, svcCtx).BindRoles(&types.BindRolesReq{
- UserId: targetUserId,
- RoleIds: []int64{sameLevelRole},
- })
- require.Error(t, err, "同级角色分配必须被拒绝(含同级)")
- var ce *response.CodeError
- require.True(t, errors.As(err, &ce))
- assert.Equal(t, 403, ce.Code())
- assert.Contains(t, ce.Error(), "不能分配权限级别高于自身的角色",
- "错误消息应当明确点出'含同级'的拦截语义")
- // 同时验证 DB 未产生任何 user-role 关系。
- rids, err := svcCtx.SysUserRoleModel.FindRoleIdsByUserIdForProduct(ctx, targetUserId, productCode)
- require.NoError(t, err)
- assert.Empty(t, rids, "被拒绝的 BindRoles 不得落地任何行")
- }
|