access.go 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. package auth
  2. import (
  3. "context"
  4. "math"
  5. "strings"
  6. "perms-system-server/internal/consts"
  7. "perms-system-server/internal/loaders"
  8. "perms-system-server/internal/middleware"
  9. "perms-system-server/internal/response"
  10. "perms-system-server/internal/svc"
  11. )
  12. func memberTypePriority(memberType string) int {
  13. switch memberType {
  14. case consts.MemberTypeSuperAdmin:
  15. return 0
  16. case consts.MemberTypeAdmin:
  17. return 1
  18. case consts.MemberTypeDeveloper:
  19. return 2
  20. case consts.MemberTypeMember:
  21. return 3
  22. default:
  23. return math.MaxInt32
  24. }
  25. }
  26. // CheckManageAccess 检查当前操作者是否有权管理目标用户。
  27. // 规则:
  28. // 1. SUPER_ADMIN 完全豁免
  29. // 2. 操作自己豁免
  30. // 3. 部门检查:目标用户须在操作者本部门或下级子部门(ADMIN 豁免)
  31. // 4. 权限级别检查:操作者的级别必须严格高于目标用户
  32. // - 先比 memberType 优先级(SUPER_ADMIN > ADMIN > DEVELOPER > MEMBER)
  33. // - 同 memberType 时比 permsLevel(数值越小权限越高)
  34. func CheckManageAccess(ctx context.Context, svcCtx *svc.ServiceContext, targetUserId int64, productCode string) error {
  35. caller := middleware.GetUserDetails(ctx)
  36. if caller == nil {
  37. return response.ErrUnauthorized("未登录")
  38. }
  39. if caller.IsSuperAdmin {
  40. return nil
  41. }
  42. if caller.UserId == targetUserId {
  43. return nil
  44. }
  45. if err := checkDeptHierarchy(ctx, svcCtx, caller, targetUserId); err != nil {
  46. return err
  47. }
  48. return checkPermLevel(ctx, svcCtx, caller, targetUserId, productCode)
  49. }
  50. // CheckMemberTypeAssignment 检查操作者是否有权分配指定的 memberType。
  51. func CheckMemberTypeAssignment(ctx context.Context, assignedType string) error {
  52. caller := middleware.GetUserDetails(ctx)
  53. if caller == nil {
  54. return response.ErrUnauthorized("未登录")
  55. }
  56. if caller.IsSuperAdmin {
  57. return nil
  58. }
  59. if memberTypePriority(caller.MemberType) >= memberTypePriority(assignedType) {
  60. return response.ErrForbidden("无权分配该成员类型,不能分配与自己同级或更高级别的类型")
  61. }
  62. return nil
  63. }
  64. // RequireSuperAdmin 要求当前操作者必须是超级管理员。
  65. func RequireSuperAdmin(ctx context.Context) error {
  66. caller := middleware.GetUserDetails(ctx)
  67. if caller == nil {
  68. return response.ErrUnauthorized("未登录")
  69. }
  70. if !caller.IsSuperAdmin {
  71. return response.ErrForbidden("仅超级管理员可执行此操作")
  72. }
  73. return nil
  74. }
  75. // RequireProductAdmin 要求当前操作者是超级管理员或当前产品的管理员(ADMIN)。
  76. func RequireProductAdmin(ctx context.Context) error {
  77. caller := middleware.GetUserDetails(ctx)
  78. if caller == nil {
  79. return response.ErrUnauthorized("未登录")
  80. }
  81. if caller.IsSuperAdmin {
  82. return nil
  83. }
  84. if caller.MemberType == consts.MemberTypeAdmin {
  85. return nil
  86. }
  87. return response.ErrForbidden("仅超级管理员或产品管理员可执行此操作")
  88. }
  89. // RequireProductAdminFor 要求当前操作者是超级管理员或指定产品的管理员。
  90. func RequireProductAdminFor(ctx context.Context, targetProductCode string) error {
  91. caller := middleware.GetUserDetails(ctx)
  92. if caller == nil {
  93. return response.ErrUnauthorized("未登录")
  94. }
  95. if caller.IsSuperAdmin {
  96. return nil
  97. }
  98. if caller.MemberType == consts.MemberTypeAdmin && caller.ProductCode == targetProductCode {
  99. return nil
  100. }
  101. return response.ErrForbidden("仅超级管理员或该产品的管理员可执行此操作")
  102. }
  103. func checkDeptHierarchy(ctx context.Context, svcCtx *svc.ServiceContext, caller *loaders.UserDetails, targetUserId int64) error {
  104. if caller.MemberType == consts.MemberTypeAdmin {
  105. return nil
  106. }
  107. if caller.DeptId == 0 {
  108. return response.ErrForbidden("您未归属任何部门,无权管理其他用户")
  109. }
  110. if caller.DeptPath == "" {
  111. return response.ErrForbidden("您的部门信息异常,无法执行此操作")
  112. }
  113. target, err := svcCtx.SysUserModel.FindOne(ctx, targetUserId)
  114. if err != nil {
  115. return response.ErrNotFound("目标用户不存在")
  116. }
  117. if target.DeptId == 0 {
  118. return response.ErrForbidden("目标用户未归属部门,仅超管或产品管理员可管理")
  119. }
  120. targetDept, err := svcCtx.SysDeptModel.FindOne(ctx, target.DeptId)
  121. if err != nil {
  122. return response.ErrForbidden("无权操作")
  123. }
  124. if !strings.HasPrefix(targetDept.Path, caller.DeptPath) {
  125. return response.ErrForbidden("无权管理其他部门的用户")
  126. }
  127. return nil
  128. }
  129. func checkPermLevel(ctx context.Context, svcCtx *svc.ServiceContext, caller *loaders.UserDetails, targetUserId int64, productCode string) error {
  130. if productCode == "" {
  131. return response.ErrBadRequest("缺少产品上下文,无法进行权限级别判定")
  132. }
  133. targetMemberType := ""
  134. targetMember, err := svcCtx.SysProductMemberModel.FindOneByProductCodeUserId(ctx, productCode, targetUserId)
  135. if err == nil {
  136. targetMemberType = targetMember.MemberType
  137. }
  138. callerPri := memberTypePriority(caller.MemberType)
  139. targetPri := memberTypePriority(targetMemberType)
  140. if callerPri > targetPri {
  141. return response.ErrForbidden("无权管理权限级别高于您的用户")
  142. }
  143. if callerPri < targetPri {
  144. return nil
  145. }
  146. // memberType 相同,比较 permsLevel
  147. targetLevel, err := svcCtx.SysRoleModel.FindMinPermsLevelByUserIdAndProductCode(ctx, targetUserId, productCode)
  148. if err != nil {
  149. targetLevel = math.MaxInt64
  150. }
  151. if caller.MinPermsLevel >= targetLevel {
  152. return response.ErrForbidden("无权管理权限级别高于或等于您的用户")
  153. }
  154. return nil
  155. }