syncPermsService.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. package pub
  2. import (
  3. "context"
  4. "errors"
  5. "time"
  6. "perms-system-server/internal/consts"
  7. permModel "perms-system-server/internal/model/perm"
  8. "perms-system-server/internal/svc"
  9. "perms-system-server/internal/util"
  10. "github.com/zeromicro/go-zero/core/logx"
  11. "github.com/zeromicro/go-zero/core/stores/sqlx"
  12. "golang.org/x/crypto/bcrypt"
  13. )
  14. type SyncPermsResult struct {
  15. Added int64
  16. Updated int64
  17. Disabled int64
  18. }
  19. type SyncPermItem struct {
  20. Code string
  21. Name string
  22. Remark string
  23. }
  24. type SyncPermsError struct {
  25. Code int
  26. Message string
  27. }
  28. func (e *SyncPermsError) Error() string {
  29. return e.Message
  30. }
  31. func ExecuteSyncPerms(ctx context.Context, svcCtx *svc.ServiceContext, appKey, appSecret string, perms []SyncPermItem) (*SyncPermsResult, error) {
  32. product, err := svcCtx.SysProductModel.FindOneByAppKey(ctx, appKey)
  33. if err != nil {
  34. return nil, &SyncPermsError{Code: 401, Message: "无效的appKey"}
  35. }
  36. if err := bcrypt.CompareHashAndPassword([]byte(product.AppSecret), []byte(appSecret)); err != nil {
  37. return nil, &SyncPermsError{Code: 401, Message: "appSecret验证失败"}
  38. }
  39. if product.Status != consts.StatusEnabled {
  40. return nil, &SyncPermsError{Code: 403, Message: "产品已被禁用"}
  41. }
  42. if len(perms) == 0 {
  43. return nil, &SyncPermsError{Code: 400, Message: "权限列表不能为空"}
  44. }
  45. // 去重请求列表,避免同一笔同步里 codes 互相冲突。
  46. codes := make([]string, 0, len(perms))
  47. seen := make(map[string]bool, len(perms))
  48. dedupPerms := make([]SyncPermItem, 0, len(perms))
  49. for _, item := range perms {
  50. if seen[item.Code] {
  51. continue
  52. }
  53. seen[item.Code] = true
  54. codes = append(codes, item.Code)
  55. dedupPerms = append(dedupPerms, item)
  56. }
  57. now := time.Now().Unix()
  58. var added, updated, disabled int64
  59. // 同 tx 内先 SELECT ... FOR UPDATE 锁 sys_product 行,再在 tx 内读取 existing 并写入:
  60. // 把同一 product 的并发同步串行化,避免两次同步都认为 code X 不存在并并发 INSERT 撞
  61. // sys_perm UNIQUE(productCode, code) 拿 1062(见审计 H-3)。
  62. err = svcCtx.SysPermModel.TransactCtx(ctx, func(txCtx context.Context, session sqlx.Session) error {
  63. if _, err := svcCtx.SysProductModel.LockByCodeTx(txCtx, session, product.Code); err != nil {
  64. if errors.Is(err, sqlx.ErrNotFound) {
  65. return &SyncPermsError{Code: 404, Message: "产品不存在"}
  66. }
  67. return err
  68. }
  69. existingMap, err := svcCtx.SysPermModel.FindMapByProductCodeWithTx(txCtx, session, product.Code)
  70. if err != nil {
  71. return err
  72. }
  73. var toInsert []*permModel.SysPerm
  74. var toUpdate []*permModel.SysPerm
  75. for _, item := range dedupPerms {
  76. existing, ok := existingMap[item.Code]
  77. if !ok {
  78. toInsert = append(toInsert, &permModel.SysPerm{
  79. ProductCode: product.Code,
  80. Name: item.Name,
  81. Code: item.Code,
  82. Remark: item.Remark,
  83. Status: consts.StatusEnabled,
  84. CreateTime: now,
  85. UpdateTime: now,
  86. })
  87. added++
  88. continue
  89. }
  90. if existing.Name != item.Name || existing.Remark != item.Remark || existing.Status != consts.StatusEnabled {
  91. existing.Name = item.Name
  92. existing.Remark = item.Remark
  93. existing.Status = consts.StatusEnabled
  94. existing.UpdateTime = now
  95. toUpdate = append(toUpdate, existing)
  96. updated++
  97. }
  98. }
  99. if len(toInsert) > 0 {
  100. if insertErr := svcCtx.SysPermModel.BatchInsertWithTx(txCtx, session, toInsert); insertErr != nil {
  101. return insertErr
  102. }
  103. }
  104. if len(toUpdate) > 0 {
  105. if updateErr := svcCtx.SysPermModel.BatchUpdateWithTx(txCtx, session, toUpdate); updateErr != nil {
  106. return updateErr
  107. }
  108. }
  109. var disableErr error
  110. disabled, disableErr = svcCtx.SysPermModel.DisableNotInCodesWithTx(txCtx, session, product.Code, codes, now)
  111. return disableErr
  112. })
  113. if err != nil {
  114. var se *SyncPermsError
  115. if errors.As(err, &se) {
  116. return nil, se
  117. }
  118. // 第 6 轮测试报告 §9.5#3:H-3 已经通过 LockByCodeTx 把同一产品的同步串行化,理论上
  119. // sys_perm (productCode, code) UNIQUE 在事务内不可能再拿到 1062。若真的命中,说明:
  120. // (a) LockByCodeTx 没有生效(例如引擎/隔离级别被改);
  121. // (b) 有绕过本函数直接写 sys_perm 的代码路径被引入;
  122. // 任何一种都代表 H-3 的锁序契约失效,需要立即告警补回 409 重试契约。因此在这里落一条
  123. // 带 audit=mysql_error_1062 + table=sys_perm 的 ERROR 级日志,日志采集侧即可据此建
  124. // 指标与告警规则;对外仍然回通用 500 避免给客户端透传 DB 细节。
  125. if util.IsDuplicateEntryErr(err) {
  126. logx.WithContext(ctx).Errorw("sync perms hit 1062 under LockByCodeTx — H-3 contract regressed",
  127. logx.Field("audit", "mysql_error_1062"),
  128. logx.Field("table", "sys_perm"),
  129. logx.Field("productCode", product.Code),
  130. logx.Field("err", err.Error()),
  131. )
  132. }
  133. return nil, &SyncPermsError{Code: 500, Message: "同步权限事务失败"}
  134. }
  135. if added > 0 || updated > 0 || disabled > 0 {
  136. svcCtx.UserDetailsLoader.CleanByProduct(ctx, product.Code)
  137. }
  138. return &SyncPermsResult{
  139. Added: added,
  140. Updated: updated,
  141. Disabled: disabled,
  142. }, nil
  143. }