| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279 |
- package user
- import (
- "errors"
- "testing"
- "time"
- permModel "perms-system-server/internal/model/perm"
- "perms-system-server/internal/response"
- "perms-system-server/internal/svc"
- "perms-system-server/internal/testutil"
- "perms-system-server/internal/testutil/ctxhelper"
- "perms-system-server/internal/types"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- )
- func insertTestPerm(t *testing.T, svcCtx *svc.ServiceContext, productCode string) int64 {
- t.Helper()
- now := time.Now().Unix()
- res, err := svcCtx.SysPermModel.Insert(ctxhelper.SuperAdminCtx(), &permModel.SysPerm{
- ProductCode: productCode,
- Name: "perm_" + testutil.UniqueId(),
- Code: "code_" + testutil.UniqueId(),
- Status: 1,
- CreateTime: now,
- UpdateTime: now,
- })
- require.NoError(t, err)
- id, _ := res.LastInsertId()
- return id
- }
- // TC-0137: 正常ALLOW
- func TestSetUserPerms_Allow(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- p1 := insertTestPerm(t, svcCtx, "test_product")
- p2 := insertTestPerm(t, svcCtx, "test_product")
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_perm`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", p1, p2)
- })
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{
- {PermId: p1, Effect: "ALLOW"},
- {PermId: p2, Effect: "ALLOW"},
- },
- })
- require.NoError(t, err)
- perms, err := svcCtx.SysUserPermModel.FindByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Len(t, perms, 2)
- for _, p := range perms {
- assert.Equal(t, "ALLOW", p.Effect)
- }
- }
- // TC-0139: DENY权限
- func TestSetUserPerms_Deny(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- p1 := insertTestPerm(t, svcCtx, "test_product")
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_perm`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", p1)
- })
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{
- {PermId: p1, Effect: "DENY"},
- },
- })
- require.NoError(t, err)
- perms, err := svcCtx.SysUserPermModel.FindByUserId(ctx, userId)
- require.NoError(t, err)
- require.Len(t, perms, 1)
- assert.Equal(t, "DENY", perms[0].Effect)
- assert.Equal(t, p1, perms[0].PermId)
- }
- // TC-0138: 用户不存在
- func TestSetUserPerms_UserNotFound(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: 999999999,
- Perms: []types.UserPermItem{
- {PermId: 1, Effect: "ALLOW"},
- },
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 404, codeErr.Code())
- assert.Equal(t, "用户不存在", codeErr.Error())
- }
- // TC-0140: 清空权限
- func TestSetUserPerms_EmptyPerms_ClearsAll(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- p1 := insertTestPerm(t, svcCtx, "test_product")
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_user_perm`", "userId", userId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", p1)
- })
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{
- {PermId: p1, Effect: "ALLOW"},
- },
- })
- require.NoError(t, err)
- err = logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{},
- })
- require.NoError(t, err)
- perms, err := svcCtx.SysUserPermModel.FindByUserId(ctx, userId)
- require.NoError(t, err)
- assert.Empty(t, perms)
- }
- // TC-0518: 无效Effect值
- func TestSetUserPerms_InvalidEffect(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- })
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{
- {PermId: 1, Effect: "INVALID"},
- },
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "effect值无效")
- }
- // TC-0519: PermId不存在
- func TestSetUserPerms_PermNotExists(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- })
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{
- {PermId: 999999999, Effect: "ALLOW"},
- },
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "无效的权限ID")
- }
- // TC-0520: 权限不属于当前产品
- func TestSetUserPerms_PermBelongsToOtherProduct(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- mId := insertTestMember(t, svcCtx, "test_product", userId)
- otherPerm := insertTestPerm(t, svcCtx, "other_product")
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_user`", userId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", otherPerm)
- })
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{
- {PermId: otherPerm, Effect: "ALLOW"},
- },
- })
- require.Error(t, err)
- var codeErr *response.CodeError
- require.True(t, errors.As(err, &codeErr))
- assert.Equal(t, 400, codeErr.Code())
- assert.Contains(t, codeErr.Error(), "其他产品的权限")
- }
- // TC-0550: 目标用户不是当前产品成员时拒绝设置权限(L-5修复验证)
- func TestSetUserPerms_NonMemberRejected(t *testing.T) {
- ctx := ctxhelper.SuperAdminCtx()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- username := testutil.UniqueId()
- userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
- t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
- logic := NewSetUserPermsLogic(ctx, svcCtx)
- err := logic.SetUserPerms(&types.SetPermsReq{
- UserId: userId,
- Perms: []types.UserPermItem{},
- })
- require.Error(t, err)
- var codeErr2 *response.CodeError
- require.True(t, errors.As(err, &codeErr2))
- assert.Equal(t, 400, codeErr2.Code())
- assert.Contains(t, codeErr2.Error(), "不是当前产品的成员")
- }
|