access.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163
  1. package auth
  2. import (
  3. "context"
  4. "math"
  5. "strings"
  6. "perms-system-server/internal/consts"
  7. "perms-system-server/internal/loaders"
  8. "perms-system-server/internal/middleware"
  9. "perms-system-server/internal/response"
  10. "perms-system-server/internal/svc"
  11. )
  12. func memberTypePriority(memberType string) int {
  13. switch memberType {
  14. case consts.MemberTypeSuperAdmin:
  15. return 0
  16. case consts.MemberTypeAdmin:
  17. return 1
  18. case consts.MemberTypeDeveloper:
  19. return 2
  20. case consts.MemberTypeMember:
  21. return 3
  22. default:
  23. return math.MaxInt32
  24. }
  25. }
  26. // CheckManageAccess 检查当前操作者是否有权管理目标用户。
  27. // 规则:
  28. // 1. SUPER_ADMIN 完全豁免
  29. // 2. 操作自己豁免
  30. // 3. 部门检查:目标用户须在操作者本部门或下级子部门(ADMIN 豁免)
  31. // 4. 权限级别检查:操作者的级别必须严格高于目标用户
  32. // - 先比 memberType 优先级(SUPER_ADMIN > ADMIN > DEVELOPER > MEMBER)
  33. // - 同 memberType 时比 permsLevel(数值越小权限越高)
  34. func CheckManageAccess(ctx context.Context, svcCtx *svc.ServiceContext, targetUserId int64, productCode string) error {
  35. caller := middleware.GetUserDetails(ctx)
  36. if caller == nil {
  37. return response.ErrUnauthorized("未登录")
  38. }
  39. if caller.IsSuperAdmin {
  40. return nil
  41. }
  42. if caller.UserId == targetUserId {
  43. return nil
  44. }
  45. if err := checkDeptHierarchy(ctx, svcCtx, caller, targetUserId); err != nil {
  46. return err
  47. }
  48. return checkPermLevel(ctx, svcCtx, caller, targetUserId, productCode)
  49. }
  50. // CheckMemberTypeAssignment 检查操作者是否有权分配指定的 memberType。
  51. func CheckMemberTypeAssignment(ctx context.Context, assignedType string) error {
  52. caller := middleware.GetUserDetails(ctx)
  53. if caller == nil {
  54. return response.ErrUnauthorized("未登录")
  55. }
  56. if caller.IsSuperAdmin {
  57. return nil
  58. }
  59. if memberTypePriority(caller.MemberType) >= memberTypePriority(assignedType) {
  60. return response.ErrForbidden("无权分配该成员类型,不能分配与自己同级或更高级别的类型")
  61. }
  62. return nil
  63. }
  64. // RequireSuperAdmin 要求当前操作者必须是超级管理员。
  65. func RequireSuperAdmin(ctx context.Context) error {
  66. caller := middleware.GetUserDetails(ctx)
  67. if caller == nil {
  68. return response.ErrUnauthorized("未登录")
  69. }
  70. if !caller.IsSuperAdmin {
  71. return response.ErrForbidden("仅超级管理员可执行此操作")
  72. }
  73. return nil
  74. }
  75. // RequireProductAdminFor 要求当前操作者是超级管理员或指定产品的管理员。
  76. func RequireProductAdminFor(ctx context.Context, targetProductCode string) error {
  77. caller := middleware.GetUserDetails(ctx)
  78. if caller == nil {
  79. return response.ErrUnauthorized("未登录")
  80. }
  81. if caller.IsSuperAdmin {
  82. return nil
  83. }
  84. if caller.MemberType == consts.MemberTypeAdmin && caller.ProductCode == targetProductCode {
  85. return nil
  86. }
  87. return response.ErrForbidden("仅超级管理员或该产品的管理员可执行此操作")
  88. }
  89. func checkDeptHierarchy(ctx context.Context, svcCtx *svc.ServiceContext, caller *loaders.UserDetails, targetUserId int64) error {
  90. if caller.MemberType == consts.MemberTypeAdmin {
  91. return nil
  92. }
  93. if caller.DeptId == 0 {
  94. return response.ErrForbidden("您未归属任何部门,无权管理其他用户")
  95. }
  96. if caller.DeptPath == "" {
  97. return response.ErrForbidden("您的部门信息异常,无法执行此操作")
  98. }
  99. target, err := svcCtx.SysUserModel.FindOne(ctx, targetUserId)
  100. if err != nil {
  101. return response.ErrNotFound("目标用户不存在")
  102. }
  103. if target.DeptId == 0 {
  104. return response.ErrForbidden("目标用户未归属部门,仅超管或产品管理员可管理")
  105. }
  106. targetDept, err := svcCtx.SysDeptModel.FindOne(ctx, target.DeptId)
  107. if err != nil {
  108. return response.ErrForbidden("无权操作")
  109. }
  110. if !strings.HasPrefix(targetDept.Path, caller.DeptPath) {
  111. return response.ErrForbidden("无权管理其他部门的用户")
  112. }
  113. return nil
  114. }
  115. func checkPermLevel(ctx context.Context, svcCtx *svc.ServiceContext, caller *loaders.UserDetails, targetUserId int64, productCode string) error {
  116. if productCode == "" {
  117. return response.ErrBadRequest("缺少产品上下文,无法进行权限级别判定")
  118. }
  119. targetMember, err := svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(ctx, productCode, targetUserId)
  120. if err != nil {
  121. return response.ErrForbidden("目标用户不是当前产品的成员,无法执行管理操作")
  122. }
  123. targetMemberType := targetMember.MemberType
  124. callerPri := memberTypePriority(caller.MemberType)
  125. targetPri := memberTypePriority(targetMemberType)
  126. if callerPri > targetPri {
  127. return response.ErrForbidden("无权管理权限级别高于您的用户")
  128. }
  129. if callerPri < targetPri {
  130. return nil
  131. }
  132. // memberType 相同,比较 permsLevel
  133. targetLevel, err := svcCtx.SysRoleModel.FindMinPermsLevelByUserIdAndProductCode(ctx, targetUserId, productCode)
  134. if err != nil {
  135. targetLevel = math.MaxInt64
  136. }
  137. if caller.MinPermsLevel >= targetLevel {
  138. return response.ErrForbidden("无权管理权限级别高于或等于您的用户")
  139. }
  140. return nil
  141. }