| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928 |
- package server
- import (
- "context"
- "database/sql"
- "fmt"
- "testing"
- "time"
- authHelper "perms-system-server/internal/logic/auth"
- permModel "perms-system-server/internal/model/perm"
- productModel "perms-system-server/internal/model/product"
- memberModel "perms-system-server/internal/model/productmember"
- roleModel "perms-system-server/internal/model/role"
- rolePermModel "perms-system-server/internal/model/roleperm"
- userModel "perms-system-server/internal/model/user"
- userPermModel "perms-system-server/internal/model/userperm"
- userRoleModel "perms-system-server/internal/model/userrole"
- "perms-system-server/internal/svc"
- "perms-system-server/internal/testutil"
- "perms-system-server/pb"
- "github.com/golang-jwt/jwt/v4"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "google.golang.org/grpc/codes"
- "google.golang.org/grpc/status"
- )
- // ---------- SyncPermissions ----------
- // TC-0161: 正常同步
- func TestSyncPermissions_Normal(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "secret1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_perm`", "productCode", uid)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{
- {Code: "perm_a", Name: "Perm A", Remark: "remark_a"},
- {Code: "perm_b", Name: "Perm B", Remark: "remark_b"},
- },
- })
- require.NoError(t, err)
- assert.Equal(t, int64(2), resp.Added)
- assert.Equal(t, int64(0), resp.Updated)
- assert.Equal(t, int64(0), resp.Disabled)
- resp2, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{
- {Code: "perm_a", Name: "Perm A Updated", Remark: "remark_a"},
- },
- })
- require.NoError(t, err)
- assert.Equal(t, int64(0), resp2.Added)
- assert.Equal(t, int64(1), resp2.Updated)
- assert.Equal(t, int64(1), resp2.Disabled)
- }
- // TC-0162: appKey无效
- func TestSyncPermissions_InvalidAppKey(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: "nonexistent_key",
- AppSecret: "any",
- Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "无效的appKey", status.Convert(err).Message())
- }
- // TC-0163: appSecret错误
- func TestSyncPermissions_WrongAppSecret(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "real_secret",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "wrong_secret",
- Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "appSecret验证失败", status.Convert(err).Message())
- }
- // TC-0164: 产品已禁用
- func TestSyncPermissions_ProductDisabled(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "secret1",
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "产品已被禁用", status.Convert(err).Message())
- }
- // ---------- Login ----------
- // TC-0166: 正常登录(无productCode)
- func TestLogin_Normal(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.NotEmpty(t, resp.RefreshToken)
- assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
- assert.Equal(t, uId, resp.UserId)
- assert.Equal(t, uid, resp.Username)
- }
- // TC-0167: 用户不存在
- func TestLogin_UserNotFound(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.Login(ctx, &pb.LoginReq{
- Username: "nonexistent_user_xyz",
- Password: "any",
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
- }
- // TC-0168: 密码错误
- func TestLogin_WrongPassword(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("correct_pass"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "wrong_pass",
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
- }
- // TC-0169: 账号冻结
- func TestLogin_AccountFrozen(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
- }
- // TC-0170: 超管+productCode
- func TestLogin_SuperAdminWithProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
- Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.Equal(t, "SUPER_ADMIN", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_c1")
- assert.NotEmpty(t, resp.AccessToken)
- assert.NotEmpty(t, resp.RefreshToken)
- }
- // TC-0171: 普通用户+productCode
- func TestLogin_NormalUserWithProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
- ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- roleId, _ := roleRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
- UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- urId, _ := urRes.LastInsertId()
- rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpId, _ := rpRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
- testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.Equal(t, "MEMBER", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_c1")
- assert.NotEmpty(t, resp.AccessToken)
- assert.NotEmpty(t, resp.RefreshToken)
- }
- // ---------- RefreshToken ----------
- // TC-0172: 正常刷新(refreshToken原样返回,不重新生成)
- func TestRefreshToken_Normal(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "")
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回,不重新生成")
- assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
- }
- // TC-0173: token无效
- func TestRefreshToken_InvalidToken(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: "invalid.token.string",
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "refreshToken无效或已过期", status.Convert(err).Message())
- }
- // TC-0174: 账号冻结
- func TestRefreshToken_AccountFrozen(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "")
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- _, err = srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
- }
- // TC-0175: productCode回退到claims
- func TestRefreshToken_FallbackToClaimsProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- ProductCode: "",
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
- }
- // TC-0176: 超管+productCode
- func TestRefreshToken_SuperAdminWithProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
- Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
- }
- // TC-0177: 普通用户+productCode
- func TestRefreshToken_NormalUserWithProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
- ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- roleId, _ := roleRes.LastInsertId()
- urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
- UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- urId, _ := urRes.LastInsertId()
- rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpId, _ := rpRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
- testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
- }
- // ---------- VerifyToken ----------
- // TC-0178: 有效token
- func TestVerifyToken_Valid(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- cfg := testutil.GetTestConfig()
- accessToken, err := authHelper.GenerateAccessToken(
- cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
- 100, "testuser", "prod1", "ADMIN", []string{"perm_a", "perm_b"},
- )
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
- require.NoError(t, err)
- assert.True(t, resp.Valid)
- assert.Equal(t, int64(100), resp.UserId)
- assert.Equal(t, "testuser", resp.Username)
- assert.Equal(t, "ADMIN", resp.MemberType)
- assert.ElementsMatch(t, []string{"perm_a", "perm_b"}, resp.Perms)
- }
- // TC-0179: 无效token
- func TestVerifyToken_Invalid(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: "invalid.token.here"})
- require.NoError(t, err)
- assert.False(t, resp.Valid)
- }
- // TC-0180: 缺少userId
- func TestVerifyToken_MissingUserId(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- cfg := testutil.GetTestConfig()
- // Generate a token without userId by using raw JWT
- token := createTokenWithoutUserId(cfg.Auth.AccessSecret)
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: token})
- require.NoError(t, err)
- assert.False(t, resp.Valid)
- }
- // ---------- GetUserPerms ----------
- // TC-0181: 用户不存在
- func TestGetUserPerms_UserNotFound(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: 999999999,
- ProductCode: "any_product",
- })
- require.Error(t, err)
- assert.Equal(t, codes.NotFound, status.Code(err))
- assert.Equal(t, "用户不存在", status.Convert(err).Message())
- }
- // TC-0182: 超管
- func TestGetUserPerms_SuperAdmin(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "sa",
- Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "ADMIN",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mId, _ := mRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId,
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.Equal(t, "SUPER_ADMIN", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_c1")
- }
- // TC-0165: 验证disabled计数
- func TestSyncPermissions_VerifyDisabledCount(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: "secret1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- var permIds []int64
- for i := 0; i < 5; i++ {
- pmRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p", Code: fmt.Sprintf("%s_c%d", uid, i),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pmId, _ := pmRes.LastInsertId()
- permIds = append(permIds, pmId)
- }
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", permIds...)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{
- {Code: fmt.Sprintf("%s_c0", uid), Name: "p"},
- {Code: fmt.Sprintf("%s_c1", uid), Name: "p"},
- },
- })
- require.NoError(t, err)
- assert.Equal(t, int64(3), resp.Disabled)
- }
- // TC-0183: MEMBER-DENY覆盖
- func TestGetUserPerms_MemberDENYOverride(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
- ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- roleId, _ := roleRes.LastInsertId()
- permARes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "permA", Code: uid + "_pA",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- permAId, _ := permARes.LastInsertId()
- permBRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "permB", Code: uid + "_pB",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- permBId, _ := permBRes.LastInsertId()
- urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
- UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- urId, _ := urRes.LastInsertId()
- rpARes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: permAId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpAId, _ := rpARes.LastInsertId()
- rpBRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: permBId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpBId, _ := rpBRes.LastInsertId()
- upRes, err := svcCtx.SysUserPermModel.Insert(ctx, &userPermModel.SysUserPerm{
- UserId: uId, PermId: permAId, Effect: "DENY",
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- upId, _ := upRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user_perm`", upId)
- testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpAId, rpBId)
- testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", permAId, permBId)
- testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId,
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.Equal(t, "MEMBER", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_pB")
- assert.NotContains(t, resp.Perms, uid+"_pA")
- }
- // helper: create a JWT with no userId claim
- func createTokenWithoutUserId(secret string) string {
- claims := jwt.MapClaims{
- "username": "test",
- "exp": time.Now().Add(time.Hour).Unix(),
- }
- token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
- s, _ := token.SignedString([]byte(secret))
- return s
- }
|