permserver_test.go 77 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088
  1. package server
  2. import (
  3. "context"
  4. "database/sql"
  5. "fmt"
  6. "github.com/golang-jwt/jwt/v4"
  7. "github.com/stretchr/testify/assert"
  8. "github.com/stretchr/testify/require"
  9. "github.com/zeromicro/go-zero/core/limit"
  10. "github.com/zeromicro/go-zero/core/stores/redis"
  11. "github.com/zeromicro/go-zero/core/stores/sqlx"
  12. "go.uber.org/mock/gomock"
  13. "golang.org/x/crypto/bcrypt"
  14. "google.golang.org/grpc/codes"
  15. "google.golang.org/grpc/peer"
  16. "google.golang.org/grpc/status"
  17. "net"
  18. authHelper "perms-system-server/internal/logic/auth"
  19. pubLogic "perms-system-server/internal/logic/pub"
  20. deptModel "perms-system-server/internal/model/dept"
  21. permModel "perms-system-server/internal/model/perm"
  22. productModel "perms-system-server/internal/model/product"
  23. memberModel "perms-system-server/internal/model/productmember"
  24. roleModel "perms-system-server/internal/model/role"
  25. rolePermModel "perms-system-server/internal/model/roleperm"
  26. userModel "perms-system-server/internal/model/user"
  27. userPermModel "perms-system-server/internal/model/userperm"
  28. userRoleModel "perms-system-server/internal/model/userrole"
  29. "perms-system-server/internal/svc"
  30. "perms-system-server/internal/testutil"
  31. "perms-system-server/internal/testutil/mocks"
  32. "perms-system-server/internal/types"
  33. "perms-system-server/pb"
  34. "testing"
  35. "time"
  36. )
  37. func bcryptHash(t *testing.T, plaintext string) string {
  38. t.Helper()
  39. h, err := bcrypt.GenerateFromPassword([]byte(plaintext), bcrypt.MinCost)
  40. require.NoError(t, err)
  41. return string(h)
  42. }
  43. // ---------- SyncPermissions ----------
  44. // TC-0230: 正常同步
  45. func TestSyncPermissions_Normal(t *testing.T) {
  46. ctx := context.Background()
  47. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  48. conn := testutil.GetTestSqlConn()
  49. now := time.Now().Unix()
  50. uid := testutil.UniqueId()
  51. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  52. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
  53. Status: 1, CreateTime: now, UpdateTime: now,
  54. })
  55. require.NoError(t, err)
  56. pId, _ := pRes.LastInsertId()
  57. t.Cleanup(func() {
  58. testutil.CleanTableByField(ctx, conn, "`sys_perm`", "productCode", uid)
  59. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  60. })
  61. srv := NewPermServer(svcCtx)
  62. resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  63. AppKey: uid,
  64. AppSecret: "secret1",
  65. Perms: []*pb.PermItem{
  66. {Code: "perm_a", Name: "Perm A", Remark: "remark_a"},
  67. {Code: "perm_b", Name: "Perm B", Remark: "remark_b"},
  68. },
  69. })
  70. require.NoError(t, err)
  71. assert.Equal(t, int64(2), resp.Added)
  72. assert.Equal(t, int64(0), resp.Updated)
  73. assert.Equal(t, int64(0), resp.Disabled)
  74. resp2, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  75. AppKey: uid,
  76. AppSecret: "secret1",
  77. Perms: []*pb.PermItem{
  78. {Code: "perm_a", Name: "Perm A Updated", Remark: "remark_a"},
  79. },
  80. })
  81. require.NoError(t, err)
  82. assert.Equal(t, int64(0), resp2.Added)
  83. assert.Equal(t, int64(1), resp2.Updated)
  84. assert.Equal(t, int64(1), resp2.Disabled)
  85. }
  86. // TC-0231: appKey无效
  87. func TestSyncPermissions_InvalidAppKey(t *testing.T) {
  88. ctx := context.Background()
  89. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  90. srv := NewPermServer(svcCtx)
  91. _, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  92. AppKey: "nonexistent_key",
  93. AppSecret: "any",
  94. Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
  95. })
  96. require.Error(t, err)
  97. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  98. assert.Equal(t, "无效的appKey", status.Convert(err).Message())
  99. }
  100. // TC-0232: appSecret错误
  101. func TestSyncPermissions_WrongAppSecret(t *testing.T) {
  102. ctx := context.Background()
  103. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  104. conn := testutil.GetTestSqlConn()
  105. now := time.Now().Unix()
  106. uid := testutil.UniqueId()
  107. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  108. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "real_secret"),
  109. Status: 1, CreateTime: now, UpdateTime: now,
  110. })
  111. require.NoError(t, err)
  112. pId, _ := pRes.LastInsertId()
  113. t.Cleanup(func() {
  114. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  115. })
  116. srv := NewPermServer(svcCtx)
  117. _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  118. AppKey: uid,
  119. AppSecret: "wrong_secret",
  120. Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
  121. })
  122. require.Error(t, err)
  123. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  124. assert.Equal(t, "appSecret验证失败", status.Convert(err).Message())
  125. }
  126. // TC-0233: 产品已禁用
  127. func TestSyncPermissions_ProductDisabled(t *testing.T) {
  128. ctx := context.Background()
  129. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  130. conn := testutil.GetTestSqlConn()
  131. now := time.Now().Unix()
  132. uid := testutil.UniqueId()
  133. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  134. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
  135. Status: 2, CreateTime: now, UpdateTime: now,
  136. })
  137. require.NoError(t, err)
  138. pId, _ := pRes.LastInsertId()
  139. t.Cleanup(func() {
  140. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  141. })
  142. srv := NewPermServer(svcCtx)
  143. _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  144. AppKey: uid,
  145. AppSecret: "secret1",
  146. Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
  147. })
  148. require.Error(t, err)
  149. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  150. assert.Equal(t, "产品已被禁用", status.Convert(err).Message())
  151. }
  152. // ---------- Login ----------
  153. // TC-0235: 正常登录(普通用户+productCode)
  154. func TestLogin_Normal(t *testing.T) {
  155. ctx := context.Background()
  156. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  157. conn := testutil.GetTestSqlConn()
  158. now := time.Now().Unix()
  159. uid := testutil.UniqueId()
  160. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  161. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  162. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  163. Status: 1, CreateTime: now, UpdateTime: now,
  164. })
  165. require.NoError(t, err)
  166. uId, _ := uRes.LastInsertId()
  167. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  168. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  169. Status: 1, CreateTime: now, UpdateTime: now,
  170. })
  171. require.NoError(t, err)
  172. pId, _ := pRes.LastInsertId()
  173. pmRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  174. ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 1,
  175. CreateTime: now, UpdateTime: now,
  176. })
  177. require.NoError(t, err)
  178. pmId, _ := pmRes.LastInsertId()
  179. t.Cleanup(func() {
  180. testutil.CleanTable(ctx, conn, "`sys_product_member`", pmId)
  181. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  182. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  183. })
  184. srv := NewPermServer(svcCtx)
  185. resp, err := srv.Login(ctx, &pb.LoginReq{
  186. Username: uid,
  187. Password: "pass123",
  188. ProductCode: uid,
  189. })
  190. require.NoError(t, err)
  191. assert.NotEmpty(t, resp.AccessToken)
  192. assert.NotEmpty(t, resp.RefreshToken)
  193. assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
  194. assert.Equal(t, uId, resp.UserId)
  195. assert.Equal(t, uid, resp.Username)
  196. // BUG-01: proto定义了nickname字段,实现应返回用户昵称
  197. assert.Equal(t, "nick", resp.Nickname, "BUG-01: LoginResp.Nickname 应返回用户昵称而非空字符串")
  198. }
  199. // TC-0236: 用户不存在
  200. func TestLogin_UserNotFound(t *testing.T) {
  201. ctx := context.Background()
  202. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  203. srv := NewPermServer(svcCtx)
  204. _, err := srv.Login(ctx, &pb.LoginReq{
  205. Username: "nonexistent_user_xyz",
  206. Password: "any",
  207. ProductCode: "any_product",
  208. })
  209. require.Error(t, err)
  210. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  211. assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
  212. }
  213. // TC-0237: 密码错误
  214. func TestLogin_WrongPassword(t *testing.T) {
  215. ctx := context.Background()
  216. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  217. conn := testutil.GetTestSqlConn()
  218. now := time.Now().Unix()
  219. uid := testutil.UniqueId()
  220. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  221. Username: uid, Password: testutil.HashPassword("correct_pass"), Nickname: "nick",
  222. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  223. Status: 1, CreateTime: now, UpdateTime: now,
  224. })
  225. require.NoError(t, err)
  226. uId, _ := uRes.LastInsertId()
  227. t.Cleanup(func() {
  228. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  229. })
  230. srv := NewPermServer(svcCtx)
  231. _, err = srv.Login(ctx, &pb.LoginReq{
  232. Username: uid,
  233. Password: "wrong_pass",
  234. ProductCode: "any_product",
  235. })
  236. require.Error(t, err)
  237. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  238. assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
  239. }
  240. // TC-0238: 账号冻结
  241. func TestLogin_AccountFrozen(t *testing.T) {
  242. ctx := context.Background()
  243. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  244. conn := testutil.GetTestSqlConn()
  245. now := time.Now().Unix()
  246. uid := testutil.UniqueId()
  247. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  248. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  249. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  250. Status: 2, CreateTime: now, UpdateTime: now,
  251. })
  252. require.NoError(t, err)
  253. uId, _ := uRes.LastInsertId()
  254. t.Cleanup(func() {
  255. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  256. })
  257. srv := NewPermServer(svcCtx)
  258. _, err = srv.Login(ctx, &pb.LoginReq{
  259. Username: uid,
  260. Password: "pass123",
  261. ProductCode: "any_product",
  262. })
  263. require.Error(t, err)
  264. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  265. assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
  266. }
  267. // TC-0239: 超管被拒绝
  268. func TestLogin_SuperAdminRejected(t *testing.T) {
  269. ctx := context.Background()
  270. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  271. conn := testutil.GetTestSqlConn()
  272. now := time.Now().Unix()
  273. uid := testutil.UniqueId()
  274. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  275. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
  276. Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
  277. Status: 1, CreateTime: now, UpdateTime: now,
  278. })
  279. require.NoError(t, err)
  280. uId, _ := uRes.LastInsertId()
  281. t.Cleanup(func() {
  282. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  283. })
  284. srv := NewPermServer(svcCtx)
  285. _, err = srv.Login(ctx, &pb.LoginReq{
  286. Username: uid,
  287. Password: "pass123",
  288. ProductCode: "any_product",
  289. })
  290. require.Error(t, err)
  291. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  292. assert.Equal(t, "超级管理员不允许通过产品端登录,请使用管理后台", status.Convert(err).Message())
  293. }
  294. // TC-0240: 普通用户+productCode
  295. func TestLogin_NormalUserWithProductCode(t *testing.T) {
  296. ctx := context.Background()
  297. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  298. conn := testutil.GetTestSqlConn()
  299. now := time.Now().Unix()
  300. uid := testutil.UniqueId()
  301. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  302. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  303. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  304. Status: 1, CreateTime: now, UpdateTime: now,
  305. })
  306. require.NoError(t, err)
  307. uId, _ := uRes.LastInsertId()
  308. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  309. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  310. Status: 1, CreateTime: now, UpdateTime: now,
  311. })
  312. require.NoError(t, err)
  313. pId, _ := pRes.LastInsertId()
  314. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  315. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  316. Status: 1, CreateTime: now, UpdateTime: now,
  317. })
  318. require.NoError(t, err)
  319. mbrId, _ := mbrRes.LastInsertId()
  320. roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
  321. ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
  322. CreateTime: now, UpdateTime: now,
  323. })
  324. require.NoError(t, err)
  325. roleId, _ := roleRes.LastInsertId()
  326. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  327. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  328. Status: 1, CreateTime: now, UpdateTime: now,
  329. })
  330. require.NoError(t, err)
  331. pm1Id, _ := pm1Res.LastInsertId()
  332. urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
  333. UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
  334. })
  335. require.NoError(t, err)
  336. urId, _ := urRes.LastInsertId()
  337. rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  338. RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
  339. })
  340. require.NoError(t, err)
  341. rpId, _ := rpRes.LastInsertId()
  342. t.Cleanup(func() {
  343. testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
  344. testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
  345. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  346. testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
  347. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  348. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  349. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  350. })
  351. srv := NewPermServer(svcCtx)
  352. resp, err := srv.Login(ctx, &pb.LoginReq{
  353. Username: uid,
  354. Password: "pass123",
  355. ProductCode: uid,
  356. })
  357. require.NoError(t, err)
  358. assert.Equal(t, "MEMBER", resp.MemberType)
  359. assert.Contains(t, resp.Perms, uid+"_c1")
  360. assert.NotEmpty(t, resp.AccessToken)
  361. assert.NotEmpty(t, resp.RefreshToken)
  362. }
  363. // TC-0242: productCode为空
  364. func TestLogin_EmptyProductCode(t *testing.T) {
  365. ctx := context.Background()
  366. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  367. srv := NewPermServer(svcCtx)
  368. _, err := srv.Login(ctx, &pb.LoginReq{
  369. Username: "anyuser",
  370. Password: "anypass",
  371. ProductCode: "",
  372. })
  373. require.Error(t, err)
  374. assert.Equal(t, codes.InvalidArgument, status.Code(err))
  375. assert.Equal(t, "productCode不能为空", status.Convert(err).Message())
  376. }
  377. // ---------- RefreshToken ----------
  378. // TC-0243: 正常刷新(refreshToken原样返回,不重新生成)
  379. func TestRefreshToken_Normal(t *testing.T) {
  380. ctx := context.Background()
  381. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  382. conn := testutil.GetTestSqlConn()
  383. now := time.Now().Unix()
  384. uid := testutil.UniqueId()
  385. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  386. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  387. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  388. Status: 1, CreateTime: now, UpdateTime: now,
  389. })
  390. require.NoError(t, err)
  391. uId, _ := uRes.LastInsertId()
  392. t.Cleanup(func() {
  393. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  394. })
  395. cfg := testutil.GetTestConfig()
  396. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "", 0)
  397. require.NoError(t, err)
  398. srv := NewPermServer(svcCtx)
  399. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  400. RefreshToken: refreshToken,
  401. })
  402. require.NoError(t, err)
  403. assert.NotEmpty(t, resp.AccessToken)
  404. assert.NotEqual(t, refreshToken, resp.RefreshToken, "refreshToken必须发生轮转")
  405. newClaims, perr := authHelper.ParseRefreshToken(resp.RefreshToken, cfg.Auth.RefreshSecret)
  406. require.NoError(t, perr)
  407. assert.Equal(t, int64(1), newClaims.TokenVersion, "新 refreshToken 必须携带递增后的 tokenVersion")
  408. assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
  409. }
  410. // TC-0244: token无效
  411. func TestRefreshToken_InvalidToken(t *testing.T) {
  412. ctx := context.Background()
  413. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  414. srv := NewPermServer(svcCtx)
  415. _, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  416. RefreshToken: "invalid.token.string",
  417. })
  418. require.Error(t, err)
  419. assert.Equal(t, codes.Unauthenticated, status.Code(err))
  420. assert.Equal(t, "refreshToken无效或已过期", status.Convert(err).Message())
  421. }
  422. // TC-0245: 账号冻结
  423. func TestRefreshToken_AccountFrozen(t *testing.T) {
  424. ctx := context.Background()
  425. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  426. conn := testutil.GetTestSqlConn()
  427. now := time.Now().Unix()
  428. uid := testutil.UniqueId()
  429. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  430. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  431. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  432. Status: 2, CreateTime: now, UpdateTime: now,
  433. })
  434. require.NoError(t, err)
  435. uId, _ := uRes.LastInsertId()
  436. t.Cleanup(func() {
  437. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  438. })
  439. cfg := testutil.GetTestConfig()
  440. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "", 0)
  441. require.NoError(t, err)
  442. srv := NewPermServer(svcCtx)
  443. _, err = srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  444. RefreshToken: refreshToken,
  445. })
  446. require.Error(t, err)
  447. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  448. assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
  449. }
  450. // TC-0246: productCode回退到claims
  451. func TestRefreshToken_FallbackToClaimsProductCode(t *testing.T) {
  452. ctx := context.Background()
  453. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  454. conn := testutil.GetTestSqlConn()
  455. now := time.Now().Unix()
  456. uid := testutil.UniqueId()
  457. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  458. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  459. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  460. Status: 1, CreateTime: now, UpdateTime: now,
  461. })
  462. require.NoError(t, err)
  463. uId, _ := uRes.LastInsertId()
  464. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  465. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  466. Status: 1, CreateTime: now, UpdateTime: now,
  467. })
  468. require.NoError(t, err)
  469. pId, _ := pRes.LastInsertId()
  470. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  471. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  472. Status: 1, CreateTime: now, UpdateTime: now,
  473. })
  474. require.NoError(t, err)
  475. mbrId, _ := mbrRes.LastInsertId()
  476. t.Cleanup(func() {
  477. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  478. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  479. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  480. })
  481. cfg := testutil.GetTestConfig()
  482. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid, 0)
  483. require.NoError(t, err)
  484. srv := NewPermServer(svcCtx)
  485. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  486. RefreshToken: refreshToken,
  487. ProductCode: "",
  488. })
  489. require.NoError(t, err)
  490. assert.NotEmpty(t, resp.AccessToken)
  491. assert.NotEqual(t, refreshToken, resp.RefreshToken, "refreshToken必须发生轮转")
  492. newClaims, perr := authHelper.ParseRefreshToken(resp.RefreshToken, cfg.Auth.RefreshSecret)
  493. require.NoError(t, perr)
  494. assert.Equal(t, int64(1), newClaims.TokenVersion, "新 refreshToken 必须携带递增后的 tokenVersion")
  495. assert.Equal(t, uid, newClaims.ProductCode, "fallback 分支:应使用 claims.ProductCode")
  496. }
  497. // TC-0247: 超管+productCode
  498. func TestRefreshToken_SuperAdminWithProductCode(t *testing.T) {
  499. ctx := context.Background()
  500. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  501. conn := testutil.GetTestSqlConn()
  502. now := time.Now().Unix()
  503. uid := testutil.UniqueId()
  504. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  505. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
  506. Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
  507. Status: 1, CreateTime: now, UpdateTime: now,
  508. })
  509. require.NoError(t, err)
  510. uId, _ := uRes.LastInsertId()
  511. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  512. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  513. Status: 1, CreateTime: now, UpdateTime: now,
  514. })
  515. require.NoError(t, err)
  516. pId, _ := pRes.LastInsertId()
  517. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  518. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  519. Status: 1, CreateTime: now, UpdateTime: now,
  520. })
  521. require.NoError(t, err)
  522. pm1Id, _ := pm1Res.LastInsertId()
  523. t.Cleanup(func() {
  524. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  525. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  526. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  527. })
  528. cfg := testutil.GetTestConfig()
  529. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid, 0)
  530. require.NoError(t, err)
  531. srv := NewPermServer(svcCtx)
  532. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  533. RefreshToken: refreshToken,
  534. ProductCode: uid,
  535. })
  536. require.NoError(t, err)
  537. assert.NotEmpty(t, resp.AccessToken)
  538. assert.NotEqual(t, refreshToken, resp.RefreshToken, "refreshToken必须发生轮转")
  539. newClaims, perr := authHelper.ParseRefreshToken(resp.RefreshToken, cfg.Auth.RefreshSecret)
  540. require.NoError(t, perr)
  541. assert.Equal(t, int64(1), newClaims.TokenVersion, "新 refreshToken 必须携带递增后的 tokenVersion")
  542. }
  543. // TC-0248: 普通用户+productCode
  544. func TestRefreshToken_NormalUserWithProductCode(t *testing.T) {
  545. ctx := context.Background()
  546. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  547. conn := testutil.GetTestSqlConn()
  548. now := time.Now().Unix()
  549. uid := testutil.UniqueId()
  550. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  551. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  552. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  553. Status: 1, CreateTime: now, UpdateTime: now,
  554. })
  555. require.NoError(t, err)
  556. uId, _ := uRes.LastInsertId()
  557. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  558. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
  559. Status: 1, CreateTime: now, UpdateTime: now,
  560. })
  561. require.NoError(t, err)
  562. pId, _ := pRes.LastInsertId()
  563. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  564. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  565. Status: 1, CreateTime: now, UpdateTime: now,
  566. })
  567. require.NoError(t, err)
  568. mbrId, _ := mbrRes.LastInsertId()
  569. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  570. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  571. Status: 1, CreateTime: now, UpdateTime: now,
  572. })
  573. require.NoError(t, err)
  574. pm1Id, _ := pm1Res.LastInsertId()
  575. roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
  576. ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
  577. CreateTime: now, UpdateTime: now,
  578. })
  579. require.NoError(t, err)
  580. roleId, _ := roleRes.LastInsertId()
  581. urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
  582. UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
  583. })
  584. require.NoError(t, err)
  585. urId, _ := urRes.LastInsertId()
  586. rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  587. RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
  588. })
  589. require.NoError(t, err)
  590. rpId, _ := rpRes.LastInsertId()
  591. t.Cleanup(func() {
  592. testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
  593. testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
  594. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  595. testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
  596. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  597. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  598. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  599. })
  600. cfg := testutil.GetTestConfig()
  601. refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid, 0)
  602. require.NoError(t, err)
  603. srv := NewPermServer(svcCtx)
  604. resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
  605. RefreshToken: refreshToken,
  606. ProductCode: uid,
  607. })
  608. require.NoError(t, err)
  609. assert.NotEmpty(t, resp.AccessToken)
  610. assert.NotEqual(t, refreshToken, resp.RefreshToken, "refreshToken必须发生轮转")
  611. newClaims, perr := authHelper.ParseRefreshToken(resp.RefreshToken, cfg.Auth.RefreshSecret)
  612. require.NoError(t, perr)
  613. assert.Equal(t, int64(1), newClaims.TokenVersion, "新 refreshToken 必须携带递增后的 tokenVersion")
  614. }
  615. // ---------- VerifyToken ----------
  616. // TC-0249: 有效token(VerifyToken 现在实时查询DB,需要真实数据)
  617. func TestVerifyToken_Valid(t *testing.T) {
  618. ctx := context.Background()
  619. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  620. cfg := testutil.GetTestConfig()
  621. conn := testutil.GetTestSqlConn()
  622. ts := time.Now().Unix()
  623. uid := testutil.UniqueId()
  624. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  625. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick_verify",
  626. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  627. Status: 1, CreateTime: ts, UpdateTime: ts,
  628. })
  629. require.NoError(t, err)
  630. uId, _ := uRes.LastInsertId()
  631. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  632. Code: uid, Name: "prod_verify", AppKey: uid + "_k", AppSecret: "s1",
  633. Status: 1, CreateTime: ts, UpdateTime: ts,
  634. })
  635. require.NoError(t, err)
  636. pId, _ := pRes.LastInsertId()
  637. pmRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  638. ProductCode: uid, UserId: uId, MemberType: "ADMIN", Status: 1,
  639. CreateTime: ts, UpdateTime: ts,
  640. })
  641. require.NoError(t, err)
  642. pmId, _ := pmRes.LastInsertId()
  643. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  644. ProductCode: uid, Name: "perm_a", Code: "perm_a",
  645. Status: 1, CreateTime: ts, UpdateTime: ts,
  646. })
  647. require.NoError(t, err)
  648. pm1Id, _ := pm1Res.LastInsertId()
  649. pm2Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  650. ProductCode: uid, Name: "perm_b", Code: "perm_b",
  651. Status: 1, CreateTime: ts, UpdateTime: ts,
  652. })
  653. require.NoError(t, err)
  654. pm2Id, _ := pm2Res.LastInsertId()
  655. t.Cleanup(func() {
  656. svcCtx.UserDetailsLoader.Del(ctx, uId, uid)
  657. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id, pm2Id)
  658. testutil.CleanTable(ctx, conn, "`sys_product_member`", pmId)
  659. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  660. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  661. })
  662. svcCtx.UserDetailsLoader.Del(ctx, uId, uid)
  663. accessToken, err := authHelper.GenerateAccessToken(
  664. cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
  665. uId, uid, uid, "ADMIN", 0,
  666. )
  667. require.NoError(t, err)
  668. srv := NewPermServer(svcCtx)
  669. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
  670. require.NoError(t, err)
  671. assert.True(t, resp.Valid)
  672. assert.Equal(t, uId, resp.UserId)
  673. assert.Equal(t, uid, resp.Username)
  674. assert.Equal(t, "ADMIN", resp.MemberType)
  675. assert.ElementsMatch(t, []string{"perm_a", "perm_b"}, resp.Perms)
  676. // BUG-02: proto定义了productCode字段,实现应返回产品编码
  677. assert.Equal(t, uid, resp.ProductCode, "BUG-02: VerifyTokenResp.ProductCode 应返回产品编码而非空字符串")
  678. }
  679. // TC-0250: 无效token
  680. func TestVerifyToken_Invalid(t *testing.T) {
  681. ctx := context.Background()
  682. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  683. srv := NewPermServer(svcCtx)
  684. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: "invalid.token.here"})
  685. require.NoError(t, err)
  686. assert.False(t, resp.Valid)
  687. }
  688. // TC-0251: 缺少userId
  689. func TestVerifyToken_MissingUserId(t *testing.T) {
  690. ctx := context.Background()
  691. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  692. cfg := testutil.GetTestConfig()
  693. // Generate a token without userId by using raw JWT
  694. token := createTokenWithoutUserId(cfg.Auth.AccessSecret)
  695. srv := NewPermServer(svcCtx)
  696. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: token})
  697. require.NoError(t, err)
  698. assert.False(t, resp.Valid)
  699. }
  700. // ---------- GetUserPerms ----------
  701. // TC-0255: 用户不存在
  702. func TestGetUserPerms_UserNotFound(t *testing.T) {
  703. ctx := context.Background()
  704. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  705. conn := testutil.GetTestSqlConn()
  706. now := time.Now().Unix()
  707. uid := testutil.UniqueId()
  708. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  709. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
  710. Status: 1, CreateTime: now, UpdateTime: now,
  711. })
  712. require.NoError(t, err)
  713. pId, _ := pRes.LastInsertId()
  714. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_product`", pId) })
  715. srv := NewPermServer(svcCtx)
  716. _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  717. UserId: 999999999,
  718. ProductCode: uid,
  719. AppKey: uid,
  720. AppSecret: "secret1",
  721. })
  722. require.Error(t, err)
  723. assert.Equal(t, codes.NotFound, status.Code(err))
  724. // userId 不存在与非成员合并为同一响应,消除跨产品枚举 oracle
  725. assert.Equal(t, "用户不是该产品的有效成员", status.Convert(err).Message())
  726. }
  727. // TC-0256: 超管
  728. func TestGetUserPerms_SuperAdmin(t *testing.T) {
  729. ctx := context.Background()
  730. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  731. conn := testutil.GetTestSqlConn()
  732. now := time.Now().Unix()
  733. uid := testutil.UniqueId()
  734. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  735. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "sa",
  736. Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
  737. Status: 1, CreateTime: now, UpdateTime: now,
  738. })
  739. require.NoError(t, err)
  740. uId, _ := uRes.LastInsertId()
  741. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  742. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
  743. Status: 1, CreateTime: now, UpdateTime: now,
  744. })
  745. require.NoError(t, err)
  746. pId, _ := pRes.LastInsertId()
  747. pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  748. ProductCode: uid, Name: "p1", Code: uid + "_c1",
  749. Status: 1, CreateTime: now, UpdateTime: now,
  750. })
  751. require.NoError(t, err)
  752. pm1Id, _ := pm1Res.LastInsertId()
  753. mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  754. ProductCode: uid, UserId: uId, MemberType: "ADMIN",
  755. Status: 1, CreateTime: now, UpdateTime: now,
  756. })
  757. require.NoError(t, err)
  758. mId, _ := mRes.LastInsertId()
  759. t.Cleanup(func() {
  760. testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
  761. testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
  762. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  763. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  764. })
  765. srv := NewPermServer(svcCtx)
  766. resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  767. UserId: uId,
  768. ProductCode: uid,
  769. AppKey: uid,
  770. AppSecret: "secret1",
  771. })
  772. require.NoError(t, err)
  773. assert.Equal(t, "SUPER_ADMIN", resp.MemberType)
  774. assert.Contains(t, resp.Perms, uid+"_c1")
  775. }
  776. // TC-0234: 验证disabled计数
  777. func TestSyncPermissions_VerifyDisabledCount(t *testing.T) {
  778. ctx := context.Background()
  779. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  780. conn := testutil.GetTestSqlConn()
  781. now := time.Now().Unix()
  782. uid := testutil.UniqueId()
  783. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  784. Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
  785. Status: 1, CreateTime: now, UpdateTime: now,
  786. })
  787. require.NoError(t, err)
  788. pId, _ := pRes.LastInsertId()
  789. var permIds []int64
  790. for i := 0; i < 5; i++ {
  791. pmRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  792. ProductCode: uid, Name: "p", Code: fmt.Sprintf("%s_c%d", uid, i),
  793. Status: 1, CreateTime: now, UpdateTime: now,
  794. })
  795. require.NoError(t, err)
  796. pmId, _ := pmRes.LastInsertId()
  797. permIds = append(permIds, pmId)
  798. }
  799. t.Cleanup(func() {
  800. testutil.CleanTable(ctx, conn, "`sys_perm`", permIds...)
  801. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  802. })
  803. srv := NewPermServer(svcCtx)
  804. resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  805. AppKey: uid,
  806. AppSecret: "secret1",
  807. Perms: []*pb.PermItem{
  808. {Code: fmt.Sprintf("%s_c0", uid), Name: "p"},
  809. {Code: fmt.Sprintf("%s_c1", uid), Name: "p"},
  810. },
  811. })
  812. require.NoError(t, err)
  813. assert.Equal(t, int64(3), resp.Disabled)
  814. }
  815. // TC-0257: MEMBER-DENY覆盖
  816. func TestGetUserPerms_MemberDENYOverride(t *testing.T) {
  817. ctx := context.Background()
  818. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  819. conn := testutil.GetTestSqlConn()
  820. now := time.Now().Unix()
  821. uid := testutil.UniqueId()
  822. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  823. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "nick",
  824. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  825. Status: 1, CreateTime: now, UpdateTime: now,
  826. })
  827. require.NoError(t, err)
  828. uId, _ := uRes.LastInsertId()
  829. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  830. Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "secret1"),
  831. Status: 1, CreateTime: now, UpdateTime: now,
  832. })
  833. require.NoError(t, err)
  834. pId, _ := pRes.LastInsertId()
  835. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  836. ProductCode: uid, UserId: uId, MemberType: "MEMBER",
  837. Status: 1, CreateTime: now, UpdateTime: now,
  838. })
  839. require.NoError(t, err)
  840. mbrId, _ := mbrRes.LastInsertId()
  841. roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
  842. ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
  843. CreateTime: now, UpdateTime: now,
  844. })
  845. require.NoError(t, err)
  846. roleId, _ := roleRes.LastInsertId()
  847. permARes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  848. ProductCode: uid, Name: "permA", Code: uid + "_pA",
  849. Status: 1, CreateTime: now, UpdateTime: now,
  850. })
  851. require.NoError(t, err)
  852. permAId, _ := permARes.LastInsertId()
  853. permBRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  854. ProductCode: uid, Name: "permB", Code: uid + "_pB",
  855. Status: 1, CreateTime: now, UpdateTime: now,
  856. })
  857. require.NoError(t, err)
  858. permBId, _ := permBRes.LastInsertId()
  859. urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
  860. UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
  861. })
  862. require.NoError(t, err)
  863. urId, _ := urRes.LastInsertId()
  864. rpARes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  865. RoleId: roleId, PermId: permAId, CreateTime: now, UpdateTime: now,
  866. })
  867. require.NoError(t, err)
  868. rpAId, _ := rpARes.LastInsertId()
  869. rpBRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
  870. RoleId: roleId, PermId: permBId, CreateTime: now, UpdateTime: now,
  871. })
  872. require.NoError(t, err)
  873. rpBId, _ := rpBRes.LastInsertId()
  874. upRes, err := svcCtx.SysUserPermModel.Insert(ctx, &userPermModel.SysUserPerm{
  875. UserId: uId, PermId: permAId, Effect: "DENY",
  876. CreateTime: now, UpdateTime: now,
  877. })
  878. require.NoError(t, err)
  879. upId, _ := upRes.LastInsertId()
  880. t.Cleanup(func() {
  881. testutil.CleanTable(ctx, conn, "`sys_user_perm`", upId)
  882. testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpAId, rpBId)
  883. testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
  884. testutil.CleanTable(ctx, conn, "`sys_perm`", permAId, permBId)
  885. testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
  886. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  887. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  888. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  889. })
  890. srv := NewPermServer(svcCtx)
  891. resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  892. UserId: uId,
  893. ProductCode: uid,
  894. AppKey: uid + "_k",
  895. AppSecret: "secret1",
  896. })
  897. require.NoError(t, err)
  898. assert.Equal(t, "MEMBER", resp.MemberType)
  899. assert.Contains(t, resp.Perms, uid+"_pB")
  900. assert.NotContains(t, resp.Perms, uid+"_pA")
  901. }
  902. // TC-0252: gRPC VerifyToken 用户已冻结返回valid=false(修复验证)
  903. func TestVerifyToken_FrozenUserReturnsInvalid(t *testing.T) {
  904. ctx := context.Background()
  905. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  906. conn := testutil.GetTestSqlConn()
  907. now := time.Now().Unix()
  908. uid := testutil.UniqueId()
  909. cfg := testutil.GetTestConfig()
  910. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  911. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "frozen",
  912. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  913. Status: 2, CreateTime: now, UpdateTime: now,
  914. })
  915. require.NoError(t, err)
  916. uId, _ := uRes.LastInsertId()
  917. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", uId) })
  918. accessToken, err := authHelper.GenerateAccessToken(
  919. cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
  920. uId, uid, "", "MEMBER", 0,
  921. )
  922. require.NoError(t, err)
  923. srv := NewPermServer(svcCtx)
  924. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
  925. require.NoError(t, err)
  926. assert.False(t, resp.Valid, "frozen user token should be invalid")
  927. }
  928. // TC-0253: gRPC VerifyToken 非产品成员返回valid=false(修复验证)
  929. func TestVerifyToken_NonMemberReturnsInvalid(t *testing.T) {
  930. ctx := context.Background()
  931. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  932. conn := testutil.GetTestSqlConn()
  933. now := time.Now().Unix()
  934. uid := testutil.UniqueId()
  935. pc := testutil.UniqueId()
  936. cfg := testutil.GetTestConfig()
  937. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  938. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "user",
  939. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  940. Status: 1, CreateTime: now, UpdateTime: now,
  941. })
  942. require.NoError(t, err)
  943. uId, _ := uRes.LastInsertId()
  944. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  945. Code: pc, Name: "prod", AppKey: testutil.UniqueId(), AppSecret: "s",
  946. Status: 1, CreateTime: now, UpdateTime: now,
  947. })
  948. require.NoError(t, err)
  949. pId, _ := pRes.LastInsertId()
  950. t.Cleanup(func() {
  951. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  952. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  953. })
  954. accessToken, err := authHelper.GenerateAccessToken(
  955. cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
  956. uId, uid, pc, "MEMBER", 0,
  957. )
  958. require.NoError(t, err)
  959. srv := NewPermServer(svcCtx)
  960. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
  961. require.NoError(t, err)
  962. assert.False(t, resp.Valid, "non-member user with productCode should be invalid")
  963. }
  964. // TC-0254: gRPC VerifyToken 返回实时权限和成员类型(修复验证)
  965. func TestVerifyToken_ReturnsRealtimeData(t *testing.T) {
  966. ctx := context.Background()
  967. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  968. conn := testutil.GetTestSqlConn()
  969. now := time.Now().Unix()
  970. uid := testutil.UniqueId()
  971. cfg := testutil.GetTestConfig()
  972. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  973. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "user",
  974. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  975. Status: 1, CreateTime: now, UpdateTime: now,
  976. })
  977. require.NoError(t, err)
  978. uId, _ := uRes.LastInsertId()
  979. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  980. Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: "s",
  981. Status: 1, CreateTime: now, UpdateTime: now,
  982. })
  983. require.NoError(t, err)
  984. pId, _ := pRes.LastInsertId()
  985. mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  986. ProductCode: uid, UserId: uId, MemberType: "ADMIN",
  987. Status: 1, CreateTime: now, UpdateTime: now,
  988. })
  989. require.NoError(t, err)
  990. mbrId, _ := mbrRes.LastInsertId()
  991. permRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  992. ProductCode: uid, Name: "realtime_perm", Code: uid + "_rt",
  993. Status: 1, CreateTime: now, UpdateTime: now,
  994. })
  995. require.NoError(t, err)
  996. permId, _ := permRes.LastInsertId()
  997. t.Cleanup(func() {
  998. testutil.CleanTable(ctx, conn, "`sys_perm`", permId)
  999. testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
  1000. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  1001. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  1002. })
  1003. accessToken, err := authHelper.GenerateAccessToken(
  1004. cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
  1005. uId, uid, uid, "MEMBER", 0,
  1006. )
  1007. require.NoError(t, err)
  1008. svcCtx.UserDetailsLoader.Clean(ctx, uId)
  1009. srv := NewPermServer(svcCtx)
  1010. resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
  1011. require.NoError(t, err)
  1012. assert.True(t, resp.Valid)
  1013. assert.Equal(t, "ADMIN", resp.MemberType, "should return realtime memberType, not token's")
  1014. assert.Contains(t, resp.Perms, uid+"_rt", "should return realtime perms")
  1015. }
  1016. // TC-0241: gRPC Login 产品成员被禁用时拒绝(修复验证)
  1017. func TestLogin_DisabledMemberRejected(t *testing.T) {
  1018. ctx := context.Background()
  1019. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1020. conn := testutil.GetTestSqlConn()
  1021. now := time.Now().Unix()
  1022. uid := testutil.UniqueId()
  1023. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  1024. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
  1025. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  1026. Status: 1, CreateTime: now, UpdateTime: now,
  1027. })
  1028. require.NoError(t, err)
  1029. uId, _ := uRes.LastInsertId()
  1030. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  1031. Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: "s1",
  1032. Status: 1, CreateTime: now, UpdateTime: now,
  1033. })
  1034. require.NoError(t, err)
  1035. pId, _ := pRes.LastInsertId()
  1036. pmRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  1037. ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 2,
  1038. CreateTime: now, UpdateTime: now,
  1039. })
  1040. require.NoError(t, err)
  1041. pmId, _ := pmRes.LastInsertId()
  1042. t.Cleanup(func() {
  1043. testutil.CleanTable(ctx, conn, "`sys_product_member`", pmId)
  1044. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  1045. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  1046. })
  1047. srv := NewPermServer(svcCtx)
  1048. _, err = srv.Login(ctx, &pb.LoginReq{
  1049. Username: uid,
  1050. Password: "pass123",
  1051. ProductCode: uid,
  1052. })
  1053. require.Error(t, err)
  1054. assert.Equal(t, codes.PermissionDenied, status.Code(err))
  1055. // loginService 删除了多余的 FindOneByProductCodeUserId,改由 UD.MemberType==""
  1056. // 做统一判定,非成员/禁用成员合并为同一文案
  1057. assert.Equal(t, "您不是该产品的有效成员", status.Convert(err).Message())
  1058. }
  1059. // helper: create a JWT with no userId claim
  1060. func createTokenWithoutUserId(secret string) string {
  1061. claims := jwt.MapClaims{
  1062. "username": "test",
  1063. "exp": time.Now().Add(time.Hour).Unix(),
  1064. }
  1065. token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
  1066. s, _ := token.SignedString([]byte(secret))
  1067. return s
  1068. }
  1069. // =============================================================================
  1070. // audit 修复回归测试:gRPC GetUserPerms 必须对齐 VerifyToken 的状态校验
  1071. // 修复前:GetUserPerms 仅校验"用户存在";冻结用户/被踢出产品的用户仍会被返回全量权限。
  1072. // 修复后:增加 StatusEnabled 判定 + (非超管下)MemberType 非空判定。
  1073. // =============================================================================
  1074. // TC-0700: GetUserPerms 对冻结用户 (Status=Disabled) 必须返回 PermissionDenied
  1075. func TestGetUserPerms_FrozenUser_PermissionDenied(t *testing.T) {
  1076. ctx := context.Background()
  1077. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1078. conn := testutil.GetTestSqlConn()
  1079. now := time.Now().Unix()
  1080. uid := testutil.UniqueId()
  1081. // 用户 Status=2 (Disabled)
  1082. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  1083. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "frozen",
  1084. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  1085. Status: 2, CreateTime: now, UpdateTime: now,
  1086. })
  1087. require.NoError(t, err)
  1088. uId, _ := uRes.LastInsertId()
  1089. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  1090. Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
  1091. Status: 1, CreateTime: now, UpdateTime: now,
  1092. })
  1093. require.NoError(t, err)
  1094. pId, _ := pRes.LastInsertId()
  1095. // 插入该产品下启用成员,保证 MemberType != "",排除冻结用户与非成员两个判定路径的干扰
  1096. mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  1097. ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 1,
  1098. CreateTime: now, UpdateTime: now,
  1099. })
  1100. require.NoError(t, err)
  1101. mId, _ := mRes.LastInsertId()
  1102. t.Cleanup(func() {
  1103. testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
  1104. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  1105. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  1106. })
  1107. // 清理缓存确保 loader 从 DB 取最新的 Status=2
  1108. svcCtx.UserDetailsLoader.Clean(ctx, uId)
  1109. srv := NewPermServer(svcCtx)
  1110. _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  1111. UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
  1112. })
  1113. require.Error(t, err, "冻结用户的 GetUserPerms 必须返回错误,不能再返回全量权限")
  1114. assert.Equal(t, codes.PermissionDenied, status.Code(err),
  1115. "冻结用户应返回 PermissionDenied 以阻断跨系统一致性漏洞")
  1116. assert.Contains(t, status.Convert(err).Message(), "冻结")
  1117. }
  1118. // TC-0701: GetUserPerms 对已被移出产品的启用用户(非超管 + MemberType 空)必须返回 PermissionDenied
  1119. func TestGetUserPerms_NonMember_PermissionDenied(t *testing.T) {
  1120. ctx := context.Background()
  1121. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1122. conn := testutil.GetTestSqlConn()
  1123. now := time.Now().Unix()
  1124. uid := testutil.UniqueId()
  1125. // 用户启用但不是目标产品的成员
  1126. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  1127. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "non_member",
  1128. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  1129. Status: 1, CreateTime: now, UpdateTime: now,
  1130. })
  1131. require.NoError(t, err)
  1132. uId, _ := uRes.LastInsertId()
  1133. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  1134. Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
  1135. Status: 1, CreateTime: now, UpdateTime: now,
  1136. })
  1137. require.NoError(t, err)
  1138. pId, _ := pRes.LastInsertId()
  1139. t.Cleanup(func() {
  1140. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  1141. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  1142. })
  1143. svcCtx.UserDetailsLoader.Clean(ctx, uId)
  1144. srv := NewPermServer(svcCtx)
  1145. _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  1146. UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
  1147. })
  1148. require.Error(t, err)
  1149. // 与"userId 不存在"合并为 NotFound,关闭跨产品枚举 oracle
  1150. assert.Equal(t, codes.NotFound, status.Code(err),
  1151. "用户不是产品成员时应返回 NotFound,与 Username 为空的分支同码")
  1152. assert.Contains(t, status.Convert(err).Message(), "成员")
  1153. }
  1154. // TC-0702: GetUserPerms 对"产品成员被禁用的 DEV 部门用户"必须返回 PermissionDenied
  1155. // 组合 的交叉场景:禁用成员 → MemberType 清空 → 即便 DeptType=DEV 也不应获得权限
  1156. func TestGetUserPerms_DisabledMemberInDevDept_PermissionDenied(t *testing.T) {
  1157. ctx := context.Background()
  1158. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1159. conn := testutil.GetTestSqlConn()
  1160. now := time.Now().Unix()
  1161. uid := testutil.UniqueId()
  1162. // 插入 DEV 部门
  1163. deptRes, err := svcCtx.SysDeptModel.Insert(ctx, &deptModel.SysDept{
  1164. Name: "dev_" + uid, ParentId: 0, Path: "/",
  1165. DeptType: "DEV", Status: 1, CreateTime: now, UpdateTime: now,
  1166. })
  1167. require.NoError(t, err)
  1168. deptId, _ := deptRes.LastInsertId()
  1169. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  1170. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "dev_user",
  1171. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2, DeptId: deptId,
  1172. Status: 1, CreateTime: now, UpdateTime: now,
  1173. })
  1174. require.NoError(t, err)
  1175. uId, _ := uRes.LastInsertId()
  1176. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  1177. Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
  1178. Status: 1, CreateTime: now, UpdateTime: now,
  1179. })
  1180. require.NoError(t, err)
  1181. pId, _ := pRes.LastInsertId()
  1182. // 被管理员禁用的产品成员 (Status=2)
  1183. mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  1184. ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 2,
  1185. CreateTime: now, UpdateTime: now,
  1186. })
  1187. require.NoError(t, err)
  1188. mId, _ := mRes.LastInsertId()
  1189. // 放几条启用权限,验证"本来能拿到"
  1190. permRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  1191. ProductCode: uid, Name: "all", Code: uid + "_all",
  1192. Status: 1, CreateTime: now, UpdateTime: now,
  1193. })
  1194. require.NoError(t, err)
  1195. permId, _ := permRes.LastInsertId()
  1196. t.Cleanup(func() {
  1197. testutil.CleanTable(ctx, conn, "`sys_perm`", permId)
  1198. testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
  1199. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  1200. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  1201. testutil.CleanTable(ctx, conn, "`sys_dept`", deptId)
  1202. })
  1203. svcCtx.UserDetailsLoader.Clean(ctx, uId)
  1204. srv := NewPermServer(svcCtx)
  1205. _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  1206. UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
  1207. })
  1208. require.Error(t, err,
  1209. "产品成员被禁用的 DEV 部门用户不应再被 loadPerms 授予全量权限,"+
  1210. "GetUserPerms 也不应继续返回授权状态")
  1211. // 非成员合并到 NotFound(禁用成员在 loadMembership 里会把 MemberType 清空)
  1212. assert.Equal(t, codes.NotFound, status.Code(err))
  1213. }
  1214. // TC-0703: GetUserPerms 对"启用的产品成员"返回成功( 回归基准)
  1215. // 验证修复后的正常路径未被误伤
  1216. func TestGetUserPerms_EnabledMember_Succeeds(t *testing.T) {
  1217. ctx := context.Background()
  1218. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1219. conn := testutil.GetTestSqlConn()
  1220. now := time.Now().Unix()
  1221. uid := testutil.UniqueId()
  1222. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  1223. Username: uid, Password: testutil.HashPassword("pass"), Nickname: "ok",
  1224. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  1225. Status: 1, CreateTime: now, UpdateTime: now,
  1226. })
  1227. require.NoError(t, err)
  1228. uId, _ := uRes.LastInsertId()
  1229. pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
  1230. Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
  1231. Status: 1, CreateTime: now, UpdateTime: now,
  1232. })
  1233. require.NoError(t, err)
  1234. pId, _ := pRes.LastInsertId()
  1235. mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
  1236. ProductCode: uid, UserId: uId, MemberType: "ADMIN", Status: 1,
  1237. CreateTime: now, UpdateTime: now,
  1238. })
  1239. require.NoError(t, err)
  1240. mId, _ := mRes.LastInsertId()
  1241. permRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
  1242. ProductCode: uid, Name: "p", Code: uid + "_c",
  1243. Status: 1, CreateTime: now, UpdateTime: now,
  1244. })
  1245. require.NoError(t, err)
  1246. permId, _ := permRes.LastInsertId()
  1247. t.Cleanup(func() {
  1248. testutil.CleanTable(ctx, conn, "`sys_perm`", permId)
  1249. testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
  1250. testutil.CleanTable(ctx, conn, "`sys_product`", pId)
  1251. testutil.CleanTable(ctx, conn, "`sys_user`", uId)
  1252. })
  1253. srv := NewPermServer(svcCtx)
  1254. resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
  1255. UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
  1256. })
  1257. require.NoError(t, err)
  1258. assert.Equal(t, "ADMIN", resp.MemberType)
  1259. assert.Contains(t, resp.Perms, uid+"_c")
  1260. }
  1261. func FuzzVerifyToken_NeverPanicsAlwaysInvalid(f *testing.F) {
  1262. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1263. srv := NewPermServer(svcCtx)
  1264. seeds := []string{
  1265. "",
  1266. " ",
  1267. ".",
  1268. "..",
  1269. "not.a.jwt",
  1270. "a.b.c",
  1271. "eyJhbGciOiJub25lIn0.eyJ1c2VySWQiOjF9.", // alg=none 试探
  1272. "Bearer xxx",
  1273. "null",
  1274. "\x00\x01\x02",
  1275. "🔥token💥",
  1276. string(make([]byte, 4096)), // 长令牌
  1277. "eyJhbGciOiJIUzI1NiJ9.eyJleHAiOjF9.sig", // 伪造 HS256
  1278. }
  1279. for _, s := range seeds {
  1280. f.Add(s)
  1281. }
  1282. f.Fuzz(func(t *testing.T, raw string) {
  1283. defer func() {
  1284. if r := recover(); r != nil {
  1285. t.Fatalf("VerifyToken panicked on input=%q: %v", raw, r)
  1286. }
  1287. }()
  1288. resp, err := srv.VerifyToken(context.Background(), &pb.VerifyTokenReq{AccessToken: raw})
  1289. if err != nil {
  1290. t.Fatalf("VerifyToken must never return an error for malformed input, got err=%v (input=%q)", err, raw)
  1291. }
  1292. if resp == nil {
  1293. t.Fatalf("VerifyToken must return non-nil response (input=%q)", raw)
  1294. }
  1295. if resp.Valid {
  1296. t.Fatalf("malformed/invalid token must never be reported valid; input=%q", raw)
  1297. }
  1298. })
  1299. }
  1300. // TC-0795: gRPC GetUserPerms 契约层 fuzz —— 任意 (appKey, appSecret, productCode, userId) 组合下:
  1301. // (1) 必须返回 status.Error(非 200); 不允许 panic / nil error + 有权限返回
  1302. // (2) 错误码必须落在固定集合内: Unauthenticated / PermissionDenied / InvalidArgument / NotFound / Internal
  1303. //
  1304. // 否则契约漂移, 产品侧"权限网关"无法稳定处理
  1305. //
  1306. // 此用例不需要预置任何数据, 专打输入校验/认证失败的快速拒绝路径。
  1307. func FuzzGetUserPerms_ErrorTaxonomyStable(f *testing.F) {
  1308. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1309. srv := NewPermServer(svcCtx)
  1310. seeds := [][4]string{
  1311. {"", "", "", ""},
  1312. {"nonexistent_appkey_" + testutil.UniqueId(), "x", "p", "1"},
  1313. {"appkey", "wrong_secret", "code", "0"},
  1314. {"🔑", "🔒", "😈", "-1"},
  1315. {"'; DROP TABLE sys_product; --", "s", "p", "1"},
  1316. {string(make([]byte, 512)), "s", "p", "1"},
  1317. }
  1318. for _, s := range seeds {
  1319. f.Add(s[0], s[1], s[2], s[3])
  1320. }
  1321. allowed := map[codes.Code]bool{
  1322. codes.Unauthenticated: true,
  1323. codes.PermissionDenied: true,
  1324. codes.InvalidArgument: true,
  1325. codes.NotFound: true,
  1326. codes.Internal: true,
  1327. }
  1328. f.Fuzz(func(t *testing.T, appKey, appSecret, productCode, userIdStr string) {
  1329. defer func() {
  1330. if r := recover(); r != nil {
  1331. t.Fatalf("GetUserPerms panicked on input=(%q,%q,%q,%q): %v", appKey, appSecret, productCode, userIdStr, r)
  1332. }
  1333. }()
  1334. var uid int64
  1335. for _, c := range userIdStr {
  1336. if c >= '0' && c <= '9' {
  1337. uid = uid*10 + int64(c-'0')
  1338. if uid > 1e15 {
  1339. break
  1340. }
  1341. }
  1342. }
  1343. _, err := srv.GetUserPerms(context.Background(), &pb.GetUserPermsReq{
  1344. AppKey: appKey, AppSecret: appSecret, ProductCode: productCode, UserId: uid,
  1345. })
  1346. if err == nil {
  1347. t.Fatalf("malformed/unauthenticated input must produce an error; appKey=%q", appKey)
  1348. }
  1349. st, ok := status.FromError(err)
  1350. if !ok {
  1351. t.Fatalf("error must be a grpc status.Error, got %T (%v)", err, err)
  1352. }
  1353. if !allowed[st.Code()] {
  1354. t.Fatalf("error code %s is outside the agreed contract taxonomy; must be one of Unauthenticated/PermissionDenied/InvalidArgument/NotFound/Internal. msg=%q",
  1355. st.Code(), st.Message())
  1356. }
  1357. })
  1358. }
  1359. // 覆盖目标:gRPC RefreshToken / VerifyToken /
  1360. // SyncPermissions / GetUserPerms 的 IP × AppKey 双维度限流,以及 extractClientIP 剥端口契约。
  1361. func withPeerIP(ctx context.Context, hostPort string) context.Context {
  1362. addr, err := net.ResolveTCPAddr("tcp", hostPort)
  1363. if err != nil {
  1364. panic(err)
  1365. }
  1366. return peer.NewContext(ctx, &peer.Peer{Addr: addr})
  1367. }
  1368. // TC-0828: GrpcRefreshLimiter 在配额用尽后对同 IP 新请求返回 ResourceExhausted。
  1369. func TestGrpcRefreshToken_RateLimit_OverIP(t *testing.T) {
  1370. ctx := context.Background()
  1371. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1372. cfg := testutil.GetTestConfig()
  1373. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  1374. // quota=1 的定制 limiter,让第 2 次必然 429/ResourceExhausted。
  1375. svcCtx.GrpcRefreshLimiter = limit.NewPeriodLimit(
  1376. 60, 1, rds, cfg.CacheRedis.KeyPrefix+":rl:grpc:refresh:ut:"+testutil.UniqueId())
  1377. svcCtx.TokenOpLimiter = nil
  1378. srv := NewPermServer(svcCtx)
  1379. // 第 1 次:故意用个无效 token,让 limiter 放行、业务层兜底返回 Unauthenticated。
  1380. // 这里只关心 limiter 是否"吃掉 1 个配额"。
  1381. ctx1 := withPeerIP(ctx, "10.1.2.3:11111")
  1382. _, err1 := srv.RefreshToken(ctx1, &pb.RefreshTokenReq{RefreshToken: "invalid"})
  1383. require.Error(t, err1)
  1384. st1, _ := status.FromError(err1)
  1385. assert.Equal(t, codes.Unauthenticated, st1.Code(),
  1386. "首次放行,业务层应返回 Unauthenticated(token 无效),不应是 ResourceExhausted")
  1387. // 第 2 次:同 IP 但端口不同(模拟新 TCP 连接),必须被同一限流桶拦住。
  1388. ctx2 := withPeerIP(ctx, "10.1.2.3:22222")
  1389. _, err2 := srv.RefreshToken(ctx2, &pb.RefreshTokenReq{RefreshToken: "anything"})
  1390. require.Error(t, err2)
  1391. st2, _ := status.FromError(err2)
  1392. assert.Equal(t, codes.ResourceExhausted, st2.Code(),
  1393. "同 IP 第 2 次刷新必须 429;端口变化不得绕过限流(extractClientIP 剥端口)")
  1394. assert.Contains(t, st2.Message(), "过于频繁")
  1395. }
  1396. // TC-0829: GrpcVerifyLimiter 在配额用尽后对同 IP 新请求返回 ResourceExhausted。
  1397. // VerifyToken 契约是"非法 token 返回 Valid=false 而不是 error",因此限流是唯一能让接口返回 gRPC error 的路径。
  1398. func TestGrpcVerifyToken_RateLimit_OverIP(t *testing.T) {
  1399. ctx := context.Background()
  1400. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1401. cfg := testutil.GetTestConfig()
  1402. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  1403. svcCtx.GrpcVerifyLimiter = limit.NewPeriodLimit(
  1404. 60, 1, rds, cfg.CacheRedis.KeyPrefix+":rl:grpc:verify:ut:"+testutil.UniqueId())
  1405. srv := NewPermServer(svcCtx)
  1406. ctx1 := withPeerIP(ctx, "10.9.8.7:30001")
  1407. resp1, err1 := srv.VerifyToken(ctx1, &pb.VerifyTokenReq{AccessToken: "invalid"})
  1408. require.NoError(t, err1, "首次放行:VerifyToken 对非法 token 只返回 Valid=false,不 error")
  1409. require.NotNil(t, resp1)
  1410. assert.False(t, resp1.Valid)
  1411. // 同 IP 不同端口 → 必须被限流拦住。
  1412. ctx2 := withPeerIP(ctx, "10.9.8.7:30002")
  1413. _, err2 := srv.VerifyToken(ctx2, &pb.VerifyTokenReq{AccessToken: "whatever"})
  1414. require.Error(t, err2)
  1415. st2, _ := status.FromError(err2)
  1416. assert.Equal(t, codes.ResourceExhausted, st2.Code(),
  1417. "gRPC VerifyToken 必须受 IP 级限流保护,防止下游被当 token oracle 爆破")
  1418. }
  1419. // TC-0830: extractClientIP 对 "host:port" 必须剥成 host;
  1420. // 缺失 peer 时返回 error,由上层决定降级到 unknown 桶。
  1421. func TestExtractClientIP_StripsPort(t *testing.T) {
  1422. addr, err := net.ResolveTCPAddr("tcp", "192.168.0.1:54321")
  1423. require.NoError(t, err)
  1424. ctx := peer.NewContext(context.Background(), &peer.Peer{Addr: addr})
  1425. ip, err := extractClientIP(ctx)
  1426. require.NoError(t, err)
  1427. assert.Equal(t, "192.168.0.1", ip,
  1428. "gRPC peer.Addr 必须剥成纯 host;保留端口会导致限流形同虚设")
  1429. // 无 peer 的 context
  1430. _, err2 := extractClientIP(context.Background())
  1431. assert.Error(t, err2, "无 peer 时必须返回 error,让上层选择 fail-close 或降级到 unknown 桶")
  1432. }
  1433. // TC-0831: gRPC RefreshToken 成功一次后,旧 refreshToken 立刻失效;
  1434. // 换用同 IP 重放旧 token 必须返回 Unauthenticated("登录状态已失效"),
  1435. // 而不是因端口变化绕过限流或因 CAS 失败被伪装成 500。
  1436. func TestGrpcRefreshToken_CASInvalidatesOldToken(t *testing.T) {
  1437. ctx := context.Background()
  1438. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1439. conn := testutil.GetTestSqlConn()
  1440. cfg := testutil.GetTestConfig()
  1441. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  1442. // 放开限流以聚焦 CAS 正确性(quota 大)。
  1443. svcCtx.GrpcRefreshLimiter = limit.NewPeriodLimit(
  1444. 60, 100, rds, cfg.CacheRedis.KeyPrefix+":rl:grpc:refresh:cas:"+testutil.UniqueId())
  1445. svcCtx.TokenOpLimiter = nil
  1446. now := time.Now().Unix()
  1447. uid := testutil.UniqueId()
  1448. uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  1449. Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "n",
  1450. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  1451. Status: 1, CreateTime: now, UpdateTime: now,
  1452. })
  1453. require.NoError(t, err)
  1454. userId, _ := uRes.LastInsertId()
  1455. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  1456. rt, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, userId, "", 0)
  1457. require.NoError(t, err)
  1458. srv := NewPermServer(svcCtx)
  1459. // 第一次成功刷新。
  1460. ctx1 := withPeerIP(ctx, "172.16.0.1:11001")
  1461. resp, err := srv.RefreshToken(ctx1, &pb.RefreshTokenReq{RefreshToken: rt})
  1462. require.NoError(t, err)
  1463. require.NotEmpty(t, resp.RefreshToken)
  1464. // 用同一个旧 rt 重放,应当 Unauthenticated;
  1465. // 注意:旧 token 里 tokenVersion=0,DB 已被 CAS 推到 1,所以 "claims.TokenVersion != ud.TokenVersion" 这一步就会拦住。
  1466. // 端口换掉以确保不是限流在帮我们挡。
  1467. ctx2 := withPeerIP(ctx, "172.16.0.1:11002")
  1468. _, err = srv.RefreshToken(ctx2, &pb.RefreshTokenReq{RefreshToken: rt})
  1469. require.Error(t, err, "旧 refreshToken 成功刷新一次后必须失效")
  1470. st, _ := status.FromError(err)
  1471. assert.Equal(t, codes.Unauthenticated, st.Code(),
  1472. "旧 token 重放必须返回 Unauthenticated,不能是 Internal/ResourceExhausted")
  1473. assert.Contains(t, st.Message(), "登录状态已失效")
  1474. }
  1475. // TC-1052: SyncPermissions 按 AppKey 维度限流
  1476. func TestGrpcSyncPermissions_AppKeyRateLimit(t *testing.T) {
  1477. ctx := context.Background()
  1478. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1479. cfg := testutil.GetTestConfig()
  1480. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  1481. svcCtx.GrpcSyncLimiter = limit.NewPeriodLimit(
  1482. 60, 1, rds, cfg.CacheRedis.KeyPrefix+":rl:grpc:sync:ut:"+testutil.UniqueId())
  1483. srv := NewPermServer(svcCtx)
  1484. // 同一 appKey 的第 1 次:limiter 放行,业务层因 appKey 非法走 Unauthenticated。
  1485. appKey := "unknown_" + testutil.UniqueId()
  1486. _, err1 := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  1487. AppKey: appKey, AppSecret: "anything",
  1488. Perms: []*pb.PermItem{{Code: "p.a", Name: "A"}},
  1489. })
  1490. require.Error(t, err1)
  1491. st1, _ := status.FromError(err1)
  1492. assert.Equal(t, codes.Unauthenticated, st1.Code(),
  1493. "首次 limiter 放行,业务应因 appKey 不存在 Unauthenticated,非 ResourceExhausted")
  1494. // 同一 appKey 的第 2 次:必是 ResourceExhausted。
  1495. _, err2 := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  1496. AppKey: appKey, AppSecret: "whatever",
  1497. Perms: []*pb.PermItem{{Code: "p.b", Name: "B"}},
  1498. })
  1499. require.Error(t, err2)
  1500. st2, _ := status.FromError(err2)
  1501. assert.Equal(t, codes.ResourceExhausted, st2.Code(),
  1502. "同 appKey 达到配额必须 ResourceExhausted;严禁恶意方反复重放触发 bcrypt / X 锁")
  1503. assert.Contains(t, st2.Message(), "过于频繁")
  1504. // 另一 appKey 放行:证明 limiter 按 appKey 隔离,不是全局计数器。
  1505. otherKey := "unknown_other_" + testutil.UniqueId()
  1506. _, err3 := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  1507. AppKey: otherKey, AppSecret: "whatever",
  1508. Perms: []*pb.PermItem{{Code: "p.c", Name: "C"}},
  1509. })
  1510. require.Error(t, err3)
  1511. st3, _ := status.FromError(err3)
  1512. assert.Equal(t, codes.Unauthenticated, st3.Code(),
  1513. "limiter 桶键形如 'grpc:sync:<appKey>',不同 appKey 互不串扰")
  1514. }
  1515. // TC-1053: SyncPermissions 空 AppKey 不消耗 limiter 配额
  1516. // 代码里 `if req.AppKey != "" { Take(...) }` 的两层防护:
  1517. // 1. 恶意方用空串连续打,不会把 limiter key space 膨胀为一个永不过期的"空串大桶";
  1518. // 2. 业务层统一由 FindOneByAppKey("") 命中 ErrNotFound 返回 Unauthenticated。
  1519. //
  1520. // 契约:空 AppKey 连打 3 次后,quota=1 的 limiter 仍然是**全新**状态;任意新 appKey 的第一次
  1521. // 请求必须走业务层(Unauthenticated),绝不允许被 ResourceExhausted 截断。
  1522. func TestGrpcSyncPermissions_EmptyAppKeyDoesNotConsumeQuota(t *testing.T) {
  1523. ctx := context.Background()
  1524. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1525. cfg := testutil.GetTestConfig()
  1526. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  1527. svcCtx.GrpcSyncLimiter = limit.NewPeriodLimit(
  1528. 60, 1, rds, cfg.CacheRedis.KeyPrefix+":rl:grpc:sync:empty:"+testutil.UniqueId())
  1529. srv := NewPermServer(svcCtx)
  1530. for i := 0; i < 3; i++ {
  1531. _, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  1532. AppKey: "", AppSecret: "x",
  1533. Perms: []*pb.PermItem{{Code: "p", Name: "n"}},
  1534. })
  1535. require.Error(t, err)
  1536. st, _ := status.FromError(err)
  1537. assert.Equal(t, codes.Unauthenticated, st.Code(),
  1538. "空 AppKey 走 FindOneByAppKey('') → Unauthenticated;此路径不得触达 limiter")
  1539. }
  1540. // 真实新 AppKey 的第 1 次请求必须得到业务层的 Unauthenticated,
  1541. // 而不是因"空串占用配额"退化出的 ResourceExhausted。
  1542. realKey := "sync_empty_probe_" + testutil.UniqueId()
  1543. _, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
  1544. AppKey: realKey, AppSecret: "x",
  1545. Perms: []*pb.PermItem{{Code: "p", Name: "n"}},
  1546. })
  1547. require.Error(t, err)
  1548. st, _ := status.FromError(err)
  1549. assert.Equal(t, codes.Unauthenticated, st.Code(),
  1550. "空 AppKey 不消耗 limiter 配额;若这里返回 ResourceExhausted 则说明"+
  1551. "空串也被计数,`req.AppKey != \"\"` 前置分支缺失或被回退")
  1552. }
  1553. // TC-1054: GetUserPerms 的 appKey 维度限流
  1554. func TestGrpcGetUserPerms_AppKeyRateLimit(t *testing.T) {
  1555. ctx := context.Background()
  1556. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1557. cfg := testutil.GetTestConfig()
  1558. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  1559. svcCtx.GrpcGetUserPermsLimiter = limit.NewPeriodLimit(
  1560. 60, 1, rds, cfg.CacheRedis.KeyPrefix+":rl:grpc:perms:ut:"+testutil.UniqueId())
  1561. srv := NewPermServer(svcCtx)
  1562. appKey := "perms_ak_" + testutil.UniqueId()
  1563. ctx1 := withPeerIP(ctx, "172.31.0.10:40001")
  1564. _, err1 := srv.GetUserPerms(ctx1, &pb.GetUserPermsReq{
  1565. AppKey: appKey, AppSecret: "x", ProductCode: "test_product", UserId: 1,
  1566. })
  1567. require.Error(t, err1)
  1568. st1, _ := status.FromError(err1)
  1569. assert.Equal(t, codes.Unauthenticated, st1.Code(),
  1570. "首次放行,业务层应因 appKey 不存在 Unauthenticated")
  1571. // 同 appKey 第二次:appKey 桶即告罄。
  1572. ctx2 := withPeerIP(ctx, "172.31.0.11:40002") // 换 IP,证明拦的是 appKey 桶而不是 IP 桶
  1573. _, err2 := srv.GetUserPerms(ctx2, &pb.GetUserPermsReq{
  1574. AppKey: appKey, AppSecret: "x", ProductCode: "test_product", UserId: 2,
  1575. })
  1576. require.Error(t, err2)
  1577. st2, _ := status.FromError(err2)
  1578. assert.Equal(t, codes.ResourceExhausted, st2.Code(),
  1579. "同 appKey 达到 appKey 维度配额,必须 ResourceExhausted")
  1580. }
  1581. // TC-1055: GetUserPerms 的 IP 维度限流
  1582. // 双维度叠加意味着:若 appKey 维度没爆但 IP 维度爆了,同样必须拒绝。
  1583. // 这里用两个不同 appKey(消耗两份 appKey 配额,各占 1 个)但共用同一源 IP,
  1584. // 第 2 次因为 IP 桶也只剩 1 个配额而必定 ResourceExhausted。
  1585. func TestGrpcGetUserPerms_IPRateLimit_OrthogonalToAppKey(t *testing.T) {
  1586. ctx := context.Background()
  1587. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1588. cfg := testutil.GetTestConfig()
  1589. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  1590. // quota=1:一次调用会消耗 appKey 桶 + IP 桶 各 1 个;
  1591. // 第 2 次用"新 appKey"但"同 IP",appKey 桶还够,IP 桶已见底 → IP 桶拒绝。
  1592. svcCtx.GrpcGetUserPermsLimiter = limit.NewPeriodLimit(
  1593. 60, 1, rds, cfg.CacheRedis.KeyPrefix+":rl:grpc:perms:ip:"+testutil.UniqueId())
  1594. srv := NewPermServer(svcCtx)
  1595. appKeyA := "perms_ak_a_" + testutil.UniqueId()
  1596. appKeyB := "perms_ak_b_" + testutil.UniqueId()
  1597. ctxSameIP1 := withPeerIP(ctx, "198.51.100.7:50001")
  1598. ctxSameIP2 := withPeerIP(ctx, "198.51.100.7:50002") // 同 IP 不同端口
  1599. _, err1 := srv.GetUserPerms(ctxSameIP1, &pb.GetUserPermsReq{
  1600. AppKey: appKeyA, AppSecret: "x", ProductCode: "test_product", UserId: 1,
  1601. })
  1602. require.Error(t, err1)
  1603. st1, _ := status.FromError(err1)
  1604. assert.Equal(t, codes.Unauthenticated, st1.Code(),
  1605. "首次放行(appKey 桶 + IP 桶各耗 1 个)")
  1606. // 第 2 次:appKey 不同(appKey 桶还有配额),但同 IP 的 IP 桶已耗尽。
  1607. _, err2 := srv.GetUserPerms(ctxSameIP2, &pb.GetUserPermsReq{
  1608. AppKey: appKeyB, AppSecret: "x", ProductCode: "test_product", UserId: 2,
  1609. })
  1610. require.Error(t, err2)
  1611. st2, _ := status.FromError(err2)
  1612. assert.Equal(t, codes.ResourceExhausted, st2.Code(),
  1613. "appKey 桶有余但 IP 桶已爆,必须 ResourceExhausted;双维度是'谁先爆谁拒'")
  1614. }
  1615. // 覆盖目标:HTTP RefreshToken 与 gRPC RefreshToken 共用
  1616. // authHelper.RotateRefreshToken,**签发出的新 refreshToken 必须可以互换使用**。
  1617. // 这是"helper 共享"最锋利的回归面:一旦某一侧背后悄悄改回自己的版本推进/签名流程,
  1618. // 两边发出的 token 会在 tokenVersion / claims 结构上漂移,下一次交叉刷新会立刻 401。
  1619. // insertPermServerTestUser:server 包本地的 user 插入 helper。
  1620. func insertPermServerTestUser(t *testing.T, ctx context.Context, svcCtx *svc.ServiceContext,
  1621. username, password string, status, isSuperAdmin int64) (int64, func()) {
  1622. t.Helper()
  1623. conn := testutil.GetTestSqlConn()
  1624. now := time.Now().Unix()
  1625. res, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  1626. Username: username,
  1627. Password: testutil.HashPassword(password),
  1628. Nickname: username,
  1629. Avatar: sql.NullString{},
  1630. Email: username + "@ut.local",
  1631. Phone: "13800000000",
  1632. IsSuperAdmin: isSuperAdmin,
  1633. MustChangePassword: 2,
  1634. Status: status,
  1635. CreateTime: now,
  1636. UpdateTime: now,
  1637. })
  1638. require.NoError(t, err)
  1639. id, err := res.LastInsertId()
  1640. require.NoError(t, err)
  1641. return id, func() { testutil.CleanTable(ctx, conn, "`sys_user`", id) }
  1642. }
  1643. // TC-1070: HTTP 签出的 refreshToken 必须能被 gRPC RefreshToken 无缝续签。
  1644. func TestRefreshToken_HTTPIssuedTokenAcceptedByGrpc(t *testing.T) {
  1645. ctx := context.Background()
  1646. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1647. svcCtx.TokenOpLimiter = nil
  1648. svcCtx.GrpcRefreshLimiter = nil
  1649. username := "r11_5_interop_h2g_" + testutil.UniqueId()
  1650. userId, cleanup := insertPermServerTestUser(t, ctx, svcCtx, username, "SomePass123", 1, 2)
  1651. t.Cleanup(cleanup)
  1652. rtV0, err := authHelper.GenerateRefreshToken(
  1653. svcCtx.Config.Auth.RefreshSecret, svcCtx.Config.Auth.RefreshExpire,
  1654. userId, "", 0,
  1655. )
  1656. require.NoError(t, err)
  1657. httpResp, err := pubLogic.NewRefreshTokenLogic(ctx, svcCtx).
  1658. RefreshToken(&types.RefreshTokenReq{Authorization: "Bearer " + rtV0})
  1659. require.NoError(t, err, "HTTP 首刷应成功,DB tokenVersion 0 → 1")
  1660. require.NotNil(t, httpResp)
  1661. require.NotEmpty(t, httpResp.RefreshToken)
  1662. u, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  1663. require.NoError(t, err)
  1664. assert.Equal(t, int64(1), u.TokenVersion)
  1665. // HTTP 新发的 refreshToken (claims.TokenVersion=1) 直接喂给 gRPC。
  1666. svcCtx.UserDetailsLoader.Clean(ctx, userId)
  1667. grpcResp, err := NewPermServer(svcCtx).RefreshToken(
  1668. ctx, &pb.RefreshTokenReq{RefreshToken: httpResp.RefreshToken})
  1669. require.NoError(t, err,
  1670. "契约:HTTP 发的 refreshToken 必须被 gRPC 无缝接收;"+
  1671. "若 gRPC 走自己的版本比对/签名链,这里会 Unauthenticated")
  1672. assert.NotEmpty(t, grpcResp.RefreshToken)
  1673. assert.NotEmpty(t, grpcResp.AccessToken)
  1674. u2, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  1675. require.NoError(t, err)
  1676. assert.Equal(t, int64(2), u2.TokenVersion,
  1677. "gRPC 续签后 DB tokenVersion 必须 +1;两条路径共用同一 CAS 语义")
  1678. }
  1679. // TC-1071: gRPC 签出的 refreshToken 必须能被 HTTP RefreshToken 无缝续签。
  1680. // 镜像 TC-1070 的反方向,两侧都 pin 死才能防"helper 只有一侧真在调"的回退。
  1681. func TestRefreshToken_GrpcIssuedTokenAcceptedByHttp(t *testing.T) {
  1682. ctx := context.Background()
  1683. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1684. svcCtx.TokenOpLimiter = nil
  1685. svcCtx.GrpcRefreshLimiter = nil
  1686. username := "r11_5_interop_g2h_" + testutil.UniqueId()
  1687. userId, cleanup := insertPermServerTestUser(t, ctx, svcCtx, username, "SomePass123", 1, 2)
  1688. t.Cleanup(cleanup)
  1689. rtV0, err := authHelper.GenerateRefreshToken(
  1690. svcCtx.Config.Auth.RefreshSecret, svcCtx.Config.Auth.RefreshExpire,
  1691. userId, "", 0,
  1692. )
  1693. require.NoError(t, err)
  1694. grpcResp, err := NewPermServer(svcCtx).RefreshToken(
  1695. ctx, &pb.RefreshTokenReq{RefreshToken: rtV0})
  1696. require.NoError(t, err, "gRPC 首刷应成功,DB tokenVersion 0 → 1")
  1697. require.NotEmpty(t, grpcResp.RefreshToken)
  1698. u, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  1699. require.NoError(t, err)
  1700. assert.Equal(t, int64(1), u.TokenVersion)
  1701. svcCtx.UserDetailsLoader.Clean(ctx, userId)
  1702. httpResp, err := pubLogic.NewRefreshTokenLogic(ctx, svcCtx).
  1703. RefreshToken(&types.RefreshTokenReq{Authorization: "Bearer " + grpcResp.RefreshToken})
  1704. require.NoError(t, err, "gRPC 发的 refreshToken 必须被 HTTP 无缝接收")
  1705. require.NotNil(t, httpResp)
  1706. u2, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  1707. require.NoError(t, err)
  1708. assert.Equal(t, int64(2), u2.TokenVersion,
  1709. "HTTP 续签后 DB tokenVersion 必须 +1")
  1710. }
  1711. // TC-1072: gRPC RefreshToken 对 ErrTokenVersionMismatch 的映射契约未回归
  1712. // 这里不再测"两次并发 CAS 只有一个赢"(已由 TestRefreshToken_ConcurrentSameToken_SingleWinner
  1713. // 与 TestGrpcRefreshToken_ReplayOldToken 覆盖),而是显式钉死:一旦 helper 返回
  1714. // ErrTokenVersionMismatch,gRPC 侧必须走 codes.Unauthenticated 而不是 Internal。
  1715. func TestGrpcRefreshToken_ReplayedTokenMapsUnauthenticated(t *testing.T) {
  1716. ctx := context.Background()
  1717. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  1718. svcCtx.TokenOpLimiter = nil
  1719. svcCtx.GrpcRefreshLimiter = nil
  1720. username := "r11_5_replay_" + testutil.UniqueId()
  1721. userId, cleanup := insertPermServerTestUser(t, ctx, svcCtx, username, "SomePass123", 1, 2)
  1722. t.Cleanup(cleanup)
  1723. rtV0, err := authHelper.GenerateRefreshToken(
  1724. svcCtx.Config.Auth.RefreshSecret, svcCtx.Config.Auth.RefreshExpire,
  1725. userId, "", 0,
  1726. )
  1727. require.NoError(t, err)
  1728. // 首次:成功,tokenVersion 0 → 1
  1729. _, err = NewPermServer(svcCtx).RefreshToken(ctx, &pb.RefreshTokenReq{RefreshToken: rtV0})
  1730. require.NoError(t, err)
  1731. // 第二次重放同一个旧 rtV0:claims.TokenVersion=0 但 DB=1。
  1732. // Logic 上游 `claims.TokenVersion != ud.TokenVersion` 会先拦住并走 Unauthenticated,
  1733. // 但本 TC 要确认的是:**即使未来有人把上游校验逻辑拿掉**,helper 的 CAS 依然兜底,且 gRPC
  1734. // 侧仍映射到 codes.Unauthenticated(而非 Internal)。
  1735. svcCtx.UserDetailsLoader.Clean(ctx, userId)
  1736. _, err = NewPermServer(svcCtx).RefreshToken(ctx, &pb.RefreshTokenReq{RefreshToken: rtV0})
  1737. require.Error(t, err)
  1738. st, _ := status.FromError(err)
  1739. assert.Equal(t, codes.Unauthenticated, st.Code(),
  1740. "gRPC 侧 ErrTokenVersionMismatch 必须 codes.Unauthenticated;"+
  1741. "若漂移到 Internal,接入方会当成系统故障告警而非会话失效")
  1742. assert.Contains(t, st.Message(), "失效")
  1743. }
  1744. // PermServer.SyncPermissions gRPC 侧必须把 SyncPermsError{Code:404}
  1745. // 映射为 codes.NotFound;此前落到 default 分支时会被统一为 codes.Internal,使接入方 SDK
  1746. // 把"产品不存在"当作系统故障触发重试/告警。
  1747. // TC-0981: gRPC 404 → codes.NotFound(配合 permserver.go:81 的 case 404 分支)。
  1748. func TestSyncPermissions_gRPC_LockByCodeTxNotFound_MapsToCodesNotFound(t *testing.T) {
  1749. ctrl := gomock.NewController(t)
  1750. defer ctrl.Finish()
  1751. hashedSecret, err := bcrypt.GenerateFromPassword([]byte("m2_secret_grpc"), bcrypt.MinCost)
  1752. require.NoError(t, err)
  1753. mockProduct := mocks.NewMockSysProductModel(ctrl)
  1754. mockProduct.EXPECT().FindOneByAppKey(gomock.Any(), "m2_grpc_key").
  1755. Return(&productModel.SysProduct{
  1756. Id: 1, Code: "m2_grpc_prod", AppKey: "m2_grpc_key",
  1757. AppSecret: string(hashedSecret), Status: 1,
  1758. }, nil)
  1759. // LockByCodeTx 命中 sqlx.ErrNotFound → service 内部构造 SyncPermsError{Code:404}。
  1760. mockProduct.EXPECT().LockByCodeTx(gomock.Any(), gomock.Any(), "m2_grpc_prod").
  1761. Return((*productModel.SysProduct)(nil), sqlx.ErrNotFound)
  1762. mockPerm := mocks.NewMockSysPermModel(ctrl)
  1763. mockPerm.EXPECT().TransactCtx(gomock.Any(), gomock.Any()).
  1764. DoAndReturn(func(ctx context.Context, fn func(context.Context, sqlx.Session) error) error {
  1765. return fn(ctx, nil)
  1766. })
  1767. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Product: mockProduct, Perm: mockPerm})
  1768. srv := NewPermServer(svcCtx)
  1769. _, err = srv.SyncPermissions(context.Background(), &pb.SyncPermissionsReq{
  1770. AppKey: "m2_grpc_key", AppSecret: "m2_secret_grpc",
  1771. Perms: []*pb.PermItem{{Code: "p1", Name: "P1"}},
  1772. })
  1773. require.Error(t, err, "tx 内产品消失必须返回 gRPC 错误")
  1774. st, ok := status.FromError(err)
  1775. require.True(t, ok, "必须是 gRPC status.Error,不得为裸 error")
  1776. assert.Equal(t, codes.NotFound, st.Code(),
  1777. "SyncPermsError{Code:404} 必须映射为 codes.NotFound;若仍为 codes.Internal,"+
  1778. "说明 permserver.go 的 switch 缺少 case 404,接入方 SDK 会把业务未命中当作系统故障重试")
  1779. assert.Equal(t, "产品不存在", st.Message(), "保留原始语义文案")
  1780. }
  1781. // TC-0982: 未映射的 SyncPermsError.Code(例如 500)必须继续落到 codes.Internal。
  1782. // 防御未来有人错误"兜底"把所有 SyncPermsError 全部变 NotFound。
  1783. func TestSyncPermissions_gRPC_UnmappedCode_StaysInternal(t *testing.T) {
  1784. ctrl := gomock.NewController(t)
  1785. defer ctrl.Finish()
  1786. hashedSecret, err := bcrypt.GenerateFromPassword([]byte("m2_secret_grpc"), bcrypt.MinCost)
  1787. require.NoError(t, err)
  1788. mockProduct := mocks.NewMockSysProductModel(ctrl)
  1789. mockProduct.EXPECT().FindOneByAppKey(gomock.Any(), "m2_grpc_key2").
  1790. Return(&productModel.SysProduct{
  1791. Id: 1, Code: "m2_grpc_prod2", AppKey: "m2_grpc_key2",
  1792. AppSecret: string(hashedSecret), Status: 1,
  1793. }, nil)
  1794. // LockByCodeTx 拿到的行必须 Status=1 才能继续进入 diff 逻辑;
  1795. // 否则会在事务内直接返回 SyncPermsError{Code:403},无法命中"未映射 code"这条路径。
  1796. mockProduct.EXPECT().LockByCodeTx(gomock.Any(), gomock.Any(), "m2_grpc_prod2").
  1797. Return(&productModel.SysProduct{Id: 1, Code: "m2_grpc_prod2", Status: 1}, nil)
  1798. mockPerm := mocks.NewMockSysPermModel(ctrl)
  1799. mockPerm.EXPECT().FindMapByProductCodeWithTx(gomock.Any(), gomock.Any(), "m2_grpc_prod2").
  1800. Return(nil, &pubLogic.SyncPermsError{Code: 500, Message: "any low-level"})
  1801. mockPerm.EXPECT().TransactCtx(gomock.Any(), gomock.Any()).
  1802. DoAndReturn(func(ctx context.Context, fn func(context.Context, sqlx.Session) error) error {
  1803. return fn(ctx, nil)
  1804. })
  1805. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{Product: mockProduct, Perm: mockPerm})
  1806. srv := NewPermServer(svcCtx)
  1807. _, err = srv.SyncPermissions(context.Background(), &pb.SyncPermissionsReq{
  1808. AppKey: "m2_grpc_key2", AppSecret: "m2_secret_grpc",
  1809. Perms: []*pb.PermItem{{Code: "p1", Name: "P1"}},
  1810. })
  1811. require.Error(t, err)
  1812. st, ok := status.FromError(err)
  1813. require.True(t, ok)
  1814. assert.Equal(t, codes.Internal, st.Code(),
  1815. "未识别的 SyncPermsError.Code 必须仍落到 codes.Internal,不得被"+
  1816. "一刀切映射成 codes.NotFound 掩盖真正的系统故障")
  1817. }