getUserPermsLogic_test.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233
  1. package user
  2. import (
  3. "errors"
  4. "testing"
  5. "time"
  6. "github.com/stretchr/testify/assert"
  7. "github.com/stretchr/testify/require"
  8. "perms-system-server/internal/consts"
  9. "perms-system-server/internal/loaders"
  10. memberModel "perms-system-server/internal/model/productmember"
  11. "perms-system-server/internal/response"
  12. "perms-system-server/internal/svc"
  13. "perms-system-server/internal/testutil"
  14. "perms-system-server/internal/testutil/ctxhelper"
  15. "perms-system-server/internal/types"
  16. )
  17. // insertTestMemberWithType 创建指定类型的产品成员,供 getUserPerms 测试使用。
  18. func insertTestMemberWithType(t *testing.T, svcCtx *svc.ServiceContext, productCode string, userId int64, memberType string) int64 {
  19. t.Helper()
  20. now := time.Now().Unix()
  21. res, err := svcCtx.SysProductMemberModel.Insert(ctxhelper.SuperAdminCtx(), &memberModel.SysProductMember{
  22. ProductCode: productCode,
  23. UserId: userId,
  24. MemberType: memberType,
  25. Status: consts.StatusEnabled,
  26. CreateTime: now,
  27. UpdateTime: now,
  28. })
  29. require.NoError(t, err)
  30. id, _ := res.LastInsertId()
  31. return id
  32. }
  33. // insertUserPerm 直接向 sys_user_perm 插入一条覆盖记录,绕过 SetUserPerms 的业务校验。
  34. func insertUserPerm(t *testing.T, svcCtx *svc.ServiceContext, userId, permId int64, effect string) {
  35. t.Helper()
  36. conn := testutil.GetTestSqlConn()
  37. now := time.Now().Unix()
  38. _, err := conn.ExecCtx(ctxhelper.SuperAdminCtx(),
  39. "INSERT INTO `sys_user_perm` (`userId`,`permId`,`effect`,`createTime`,`updateTime`) VALUES (?,?,?,?,?)",
  40. userId, permId, effect, now, now)
  41. require.NoError(t, err)
  42. }
  43. // TC-1257: 超管查任意用户权限覆盖
  44. func TestGetUserPerms_SuperAdmin(t *testing.T) {
  45. ctx := ctxhelper.SuperAdminCtx()
  46. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  47. conn := testutil.GetTestSqlConn()
  48. username := testutil.UniqueId()
  49. userId := insertTestUser(t, ctx, username, testutil.HashPassword("pass"))
  50. mId := insertTestMember(t, svcCtx, "test_product", userId)
  51. permId := insertTestPerm(t, svcCtx, "test_product")
  52. insertUserPerm(t, svcCtx, userId, permId, consts.PermEffectAllow)
  53. t.Cleanup(func() {
  54. testutil.CleanTableByField(ctx, conn, "`sys_user_perm`", "userId", userId)
  55. testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
  56. testutil.CleanTable(ctx, conn, "`sys_user`", userId)
  57. testutil.CleanTable(ctx, conn, "`sys_perm`", permId)
  58. })
  59. resp, err := NewGetUserPermsLogic(ctx, svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: userId})
  60. require.NoError(t, err)
  61. require.NotNil(t, resp)
  62. require.Len(t, resp.Perms, 1)
  63. assert.Equal(t, permId, resp.Perms[0].PermId)
  64. assert.Equal(t, consts.PermEffectAllow, resp.Perms[0].Effect)
  65. }
  66. // TC-1258: 用户查询自己的权限覆盖(包含 ALLOW 和 DENY)
  67. func TestGetUserPerms_SelfQuery(t *testing.T) {
  68. bootstrapCtx := ctxhelper.SuperAdminCtx()
  69. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  70. conn := testutil.GetTestSqlConn()
  71. username := testutil.UniqueId()
  72. userId := insertTestUser(t, bootstrapCtx, username, testutil.HashPassword("pass"))
  73. mId := insertTestMember(t, svcCtx, "test_product", userId)
  74. permId1 := insertTestPerm(t, svcCtx, "test_product")
  75. permId2 := insertTestPerm(t, svcCtx, "test_product")
  76. insertUserPerm(t, svcCtx, userId, permId1, consts.PermEffectAllow)
  77. insertUserPerm(t, svcCtx, userId, permId2, consts.PermEffectDeny)
  78. t.Cleanup(func() {
  79. testutil.CleanTableByField(bootstrapCtx, conn, "`sys_user_perm`", "userId", userId)
  80. testutil.CleanTable(bootstrapCtx, conn, "`sys_product_member`", mId)
  81. testutil.CleanTable(bootstrapCtx, conn, "`sys_user`", userId)
  82. testutil.CleanTable(bootstrapCtx, conn, "`sys_perm`", permId1, permId2)
  83. })
  84. // caller == target(isSelf 分支,跳过 RequireProductAdminFor + CheckManageAccess)
  85. selfCtx := ctxhelper.CustomCtx(&loaders.UserDetails{
  86. UserId: userId,
  87. Username: username,
  88. MemberType: consts.MemberTypeMember,
  89. ProductCode: "test_product",
  90. Status: consts.StatusEnabled,
  91. })
  92. resp, err := NewGetUserPermsLogic(selfCtx, svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: userId})
  93. require.NoError(t, err)
  94. require.NotNil(t, resp)
  95. assert.Len(t, resp.Perms, 2, "应返回 ALLOW 和 DENY 两条记录")
  96. }
  97. // TC-1259: 产品 ADMIN 查同产品 MEMBER 的权限覆盖
  98. func TestGetUserPerms_AdminQueriesMember(t *testing.T) {
  99. bootstrapCtx := ctxhelper.SuperAdminCtx()
  100. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  101. conn := testutil.GetTestSqlConn()
  102. username := testutil.UniqueId()
  103. userId := insertTestUser(t, bootstrapCtx, username, testutil.HashPassword("pass"))
  104. mId := insertTestMember(t, svcCtx, "test_product", userId) // MEMBER 类型
  105. permId := insertTestPerm(t, svcCtx, "test_product")
  106. insertUserPerm(t, svcCtx, userId, permId, consts.PermEffectAllow)
  107. t.Cleanup(func() {
  108. testutil.CleanTableByField(bootstrapCtx, conn, "`sys_user_perm`", "userId", userId)
  109. testutil.CleanTable(bootstrapCtx, conn, "`sys_product_member`", mId)
  110. testutil.CleanTable(bootstrapCtx, conn, "`sys_user`", userId)
  111. testutil.CleanTable(bootstrapCtx, conn, "`sys_perm`", permId)
  112. })
  113. adminCtx := ctxhelper.AdminCtx("test_product")
  114. resp, err := NewGetUserPermsLogic(adminCtx, svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: userId})
  115. require.NoError(t, err)
  116. require.NotNil(t, resp)
  117. assert.Len(t, resp.Perms, 1)
  118. assert.Equal(t, permId, resp.Perms[0].PermId)
  119. }
  120. // TC-1260: 产品 ADMIN 查同级 ADMIN 被拒绝(permsLevel 等级相同时 CheckManageAccess 拒绝)
  121. func TestGetUserPerms_AdminQueriesSameLevelAdmin_Forbidden(t *testing.T) {
  122. bootstrapCtx := ctxhelper.SuperAdminCtx()
  123. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  124. conn := testutil.GetTestSqlConn()
  125. // 目标:ADMIN 类型成员
  126. targetUsername := testutil.UniqueId()
  127. targetUserId := insertTestUser(t, bootstrapCtx, targetUsername, testutil.HashPassword("pass"))
  128. mId := insertTestMemberWithType(t, svcCtx, "test_product", targetUserId, consts.MemberTypeAdmin)
  129. t.Cleanup(func() {
  130. testutil.CleanTable(bootstrapCtx, conn, "`sys_product_member`", mId)
  131. testutil.CleanTable(bootstrapCtx, conn, "`sys_user`", targetUserId)
  132. })
  133. // AdminCtx UserId=2,无任何角色 → callerNoRole=true → CheckManageAccess 拒绝(等级不低于目标)
  134. adminCtx := ctxhelper.AdminCtx("test_product")
  135. _, err := NewGetUserPermsLogic(adminCtx, svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: targetUserId})
  136. require.Error(t, err)
  137. var ce *response.CodeError
  138. require.True(t, errors.As(err, &ce))
  139. assert.Equal(t, 403, ce.Code())
  140. }
  141. // TC-1261: 普通 MEMBER 查他人被拒绝(RequireProductAdminFor 前置拦截)
  142. func TestGetUserPerms_MemberQueriesOther_Forbidden(t *testing.T) {
  143. bootstrapCtx := ctxhelper.SuperAdminCtx()
  144. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  145. conn := testutil.GetTestSqlConn()
  146. otherUsername := testutil.UniqueId()
  147. otherUserId := insertTestUser(t, bootstrapCtx, otherUsername, testutil.HashPassword("pass"))
  148. mId := insertTestMember(t, svcCtx, "test_product", otherUserId)
  149. t.Cleanup(func() {
  150. testutil.CleanTable(bootstrapCtx, conn, "`sys_product_member`", mId)
  151. testutil.CleanTable(bootstrapCtx, conn, "`sys_user`", otherUserId)
  152. })
  153. memberCtx := ctxhelper.MemberCtx("test_product")
  154. _, err := NewGetUserPermsLogic(memberCtx, svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: otherUserId})
  155. require.Error(t, err)
  156. var ce *response.CodeError
  157. require.True(t, errors.As(err, &ce))
  158. assert.Equal(t, 403, ce.Code())
  159. assert.Contains(t, ce.Error(), "仅超级管理员或该产品的管理员可执行此操作")
  160. }
  161. // TC-1262: 非 ADMIN 查不存在的 userId 必须 403(RequireProductAdminFor 先于实体读取,消除枚举 oracle)
  162. func TestGetUserPerms_NonAdmin_NonExistentUser_Returns403(t *testing.T) {
  163. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  164. memberCtx := ctxhelper.MemberCtx("test_product")
  165. _, err := NewGetUserPermsLogic(memberCtx, svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: 999999999})
  166. require.Error(t, err)
  167. var ce *response.CodeError
  168. require.True(t, errors.As(err, &ce))
  169. assert.Equal(t, 403, ce.Code(), "必须是 403 而非 404,防止枚举 userId 存在性")
  170. }
  171. // TC-1263: ADMIN 查不是当前产品成员的用户被拒绝
  172. func TestGetUserPerms_AdminQueriesNonMember_Forbidden(t *testing.T) {
  173. bootstrapCtx := ctxhelper.SuperAdminCtx()
  174. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  175. conn := testutil.GetTestSqlConn()
  176. // 创建用户,但不加入 test_product
  177. username := testutil.UniqueId()
  178. userId := insertTestUser(t, bootstrapCtx, username, testutil.HashPassword("pass"))
  179. t.Cleanup(func() {
  180. testutil.CleanTable(bootstrapCtx, conn, "`sys_user`", userId)
  181. })
  182. adminCtx := ctxhelper.AdminCtx("test_product")
  183. _, err := NewGetUserPermsLogic(adminCtx, svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: userId})
  184. require.Error(t, err)
  185. var ce *response.CodeError
  186. require.True(t, errors.As(err, &ce))
  187. assert.Equal(t, 403, ce.Code())
  188. }
  189. // TC-1264: nil UserDetails(模拟无 JWT)返回 401
  190. func TestGetUserPerms_NoAuth_Returns401(t *testing.T) {
  191. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  192. _, err := NewGetUserPermsLogic(ctxhelper.CustomCtx(nil), svcCtx).GetUserPerms(&types.GetUserPermsReq{UserId: 1})
  193. require.Error(t, err)
  194. var ce *response.CodeError
  195. require.True(t, errors.As(err, &ce))
  196. assert.Equal(t, 401, ce.Code())
  197. }