| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425 |
- package server
- import (
- "context"
- "database/sql"
- "fmt"
- "testing"
- "time"
- authHelper "perms-system-server/internal/logic/auth"
- deptModel "perms-system-server/internal/model/dept"
- permModel "perms-system-server/internal/model/perm"
- productModel "perms-system-server/internal/model/product"
- memberModel "perms-system-server/internal/model/productmember"
- roleModel "perms-system-server/internal/model/role"
- rolePermModel "perms-system-server/internal/model/roleperm"
- userModel "perms-system-server/internal/model/user"
- userPermModel "perms-system-server/internal/model/userperm"
- userRoleModel "perms-system-server/internal/model/userrole"
- "perms-system-server/internal/svc"
- "perms-system-server/internal/testutil"
- "perms-system-server/pb"
- "github.com/golang-jwt/jwt/v4"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "golang.org/x/crypto/bcrypt"
- "google.golang.org/grpc/codes"
- "google.golang.org/grpc/status"
- )
- func bcryptHash(t *testing.T, plaintext string) string {
- t.Helper()
- h, err := bcrypt.GenerateFromPassword([]byte(plaintext), bcrypt.MinCost)
- require.NoError(t, err)
- return string(h)
- }
- // ---------- SyncPermissions ----------
- // TC-0230: 正常同步
- func TestSyncPermissions_Normal(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTableByField(ctx, conn, "`sys_perm`", "productCode", uid)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{
- {Code: "perm_a", Name: "Perm A", Remark: "remark_a"},
- {Code: "perm_b", Name: "Perm B", Remark: "remark_b"},
- },
- })
- require.NoError(t, err)
- assert.Equal(t, int64(2), resp.Added)
- assert.Equal(t, int64(0), resp.Updated)
- assert.Equal(t, int64(0), resp.Disabled)
- resp2, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{
- {Code: "perm_a", Name: "Perm A Updated", Remark: "remark_a"},
- },
- })
- require.NoError(t, err)
- assert.Equal(t, int64(0), resp2.Added)
- assert.Equal(t, int64(1), resp2.Updated)
- assert.Equal(t, int64(1), resp2.Disabled)
- }
- // TC-0231: appKey无效
- func TestSyncPermissions_InvalidAppKey(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: "nonexistent_key",
- AppSecret: "any",
- Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "无效的appKey", status.Convert(err).Message())
- }
- // TC-0232: appSecret错误
- func TestSyncPermissions_WrongAppSecret(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "real_secret"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "wrong_secret",
- Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "appSecret验证失败", status.Convert(err).Message())
- }
- // TC-0233: 产品已禁用
- func TestSyncPermissions_ProductDisabled(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{{Code: "c", Name: "n"}},
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "产品已被禁用", status.Convert(err).Message())
- }
- // ---------- Login ----------
- // TC-0235: 正常登录(普通用户+productCode)
- func TestLogin_Normal(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pmRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pmId, _ := pmRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", pmId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.NotEmpty(t, resp.RefreshToken)
- assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
- assert.Equal(t, uId, resp.UserId)
- assert.Equal(t, uid, resp.Username)
- // BUG-01: proto定义了nickname字段,实现应返回用户昵称
- assert.Equal(t, "nick", resp.Nickname, "BUG-01: LoginResp.Nickname 应返回用户昵称而非空字符串")
- }
- // TC-0236: 用户不存在
- func TestLogin_UserNotFound(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.Login(ctx, &pb.LoginReq{
- Username: "nonexistent_user_xyz",
- Password: "any",
- ProductCode: "any_product",
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
- }
- // TC-0237: 密码错误
- func TestLogin_WrongPassword(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("correct_pass"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "wrong_pass",
- ProductCode: "any_product",
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "用户名或密码错误", status.Convert(err).Message())
- }
- // TC-0238: 账号冻结
- func TestLogin_AccountFrozen(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- ProductCode: "any_product",
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
- }
- // TC-0239: 超管被拒绝
- func TestLogin_SuperAdminRejected(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
- Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- ProductCode: "any_product",
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "超级管理员不允许通过产品端登录,请使用管理后台", status.Convert(err).Message())
- }
- // TC-0240: 普通用户+productCode
- func TestLogin_NormalUserWithProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
- ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- roleId, _ := roleRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
- UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- urId, _ := urRes.LastInsertId()
- rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpId, _ := rpRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
- testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.Equal(t, "MEMBER", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_c1")
- assert.NotEmpty(t, resp.AccessToken)
- assert.NotEmpty(t, resp.RefreshToken)
- }
- // TC-0242: productCode为空
- func TestLogin_EmptyProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.Login(ctx, &pb.LoginReq{
- Username: "anyuser",
- Password: "anypass",
- ProductCode: "",
- })
- require.Error(t, err)
- assert.Equal(t, codes.InvalidArgument, status.Code(err))
- assert.Equal(t, "productCode不能为空", status.Convert(err).Message())
- }
- // ---------- RefreshToken ----------
- // TC-0243: 正常刷新(refreshToken原样返回,不重新生成)
- func TestRefreshToken_Normal(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "", 0)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回,不重新生成")
- assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
- }
- // TC-0244: token无效
- func TestRefreshToken_InvalidToken(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- _, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: "invalid.token.string",
- })
- require.Error(t, err)
- assert.Equal(t, codes.Unauthenticated, status.Code(err))
- assert.Equal(t, "refreshToken无效或已过期", status.Convert(err).Message())
- }
- // TC-0245: 账号冻结
- func TestRefreshToken_AccountFrozen(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, "", 0)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- _, err = srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "账号已被冻结", status.Convert(err).Message())
- }
- // TC-0246: productCode回退到claims
- func TestRefreshToken_FallbackToClaimsProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid, 0)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- ProductCode: "",
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
- }
- // TC-0247: 超管+productCode
- func TestRefreshToken_SuperAdminWithProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "sa",
- Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid, 0)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
- }
- // TC-0248: 普通用户+productCode
- func TestRefreshToken_NormalUserWithProductCode(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
- ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- roleId, _ := roleRes.LastInsertId()
- urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
- UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- urId, _ := urRes.LastInsertId()
- rpRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: pm1Id, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpId, _ := rpRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpId)
- testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- cfg := testutil.GetTestConfig()
- refreshToken, err := authHelper.GenerateRefreshToken(cfg.Auth.RefreshSecret, cfg.Auth.RefreshExpire, uId, uid, 0)
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.RefreshToken(ctx, &pb.RefreshTokenReq{
- RefreshToken: refreshToken,
- ProductCode: uid,
- })
- require.NoError(t, err)
- assert.NotEmpty(t, resp.AccessToken)
- assert.Equal(t, refreshToken, resp.RefreshToken, "refreshToken应原样返回")
- }
- // ---------- VerifyToken ----------
- // TC-0249: 有效token(VerifyToken 现在实时查询DB,需要真实数据)
- func TestVerifyToken_Valid(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- cfg := testutil.GetTestConfig()
- conn := testutil.GetTestSqlConn()
- ts := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick_verify",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: ts, UpdateTime: ts,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "prod_verify", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: ts, UpdateTime: ts,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pmRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "ADMIN", Status: 1,
- CreateTime: ts, UpdateTime: ts,
- })
- require.NoError(t, err)
- pmId, _ := pmRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "perm_a", Code: "perm_a",
- Status: 1, CreateTime: ts, UpdateTime: ts,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- pm2Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "perm_b", Code: "perm_b",
- Status: 1, CreateTime: ts, UpdateTime: ts,
- })
- require.NoError(t, err)
- pm2Id, _ := pm2Res.LastInsertId()
- t.Cleanup(func() {
- svcCtx.UserDetailsLoader.Del(ctx, uId, uid)
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id, pm2Id)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", pmId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- svcCtx.UserDetailsLoader.Del(ctx, uId, uid)
- accessToken, err := authHelper.GenerateAccessToken(
- cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
- uId, uid, uid, "ADMIN", 0,
- )
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
- require.NoError(t, err)
- assert.True(t, resp.Valid)
- assert.Equal(t, uId, resp.UserId)
- assert.Equal(t, uid, resp.Username)
- assert.Equal(t, "ADMIN", resp.MemberType)
- assert.ElementsMatch(t, []string{"perm_a", "perm_b"}, resp.Perms)
- // BUG-02: proto定义了productCode字段,实现应返回产品编码
- assert.Equal(t, uid, resp.ProductCode, "BUG-02: VerifyTokenResp.ProductCode 应返回产品编码而非空字符串")
- }
- // TC-0250: 无效token
- func TestVerifyToken_Invalid(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: "invalid.token.here"})
- require.NoError(t, err)
- assert.False(t, resp.Valid)
- }
- // TC-0251: 缺少userId
- func TestVerifyToken_MissingUserId(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- cfg := testutil.GetTestConfig()
- // Generate a token without userId by using raw JWT
- token := createTokenWithoutUserId(cfg.Auth.AccessSecret)
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: token})
- require.NoError(t, err)
- assert.False(t, resp.Valid)
- }
- // ---------- GetUserPerms ----------
- // TC-0255: 用户不存在
- func TestGetUserPerms_UserNotFound(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_product`", pId) })
- srv := NewPermServer(svcCtx)
- _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: 999999999,
- ProductCode: uid,
- AppKey: uid,
- AppSecret: "secret1",
- })
- require.Error(t, err)
- assert.Equal(t, codes.NotFound, status.Code(err))
- assert.Equal(t, "用户不存在", status.Convert(err).Message())
- }
- // TC-0256: 超管
- func TestGetUserPerms_SuperAdmin(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "sa",
- Avatar: sql.NullString{}, IsSuperAdmin: 1, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pm1Res, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p1", Code: uid + "_c1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pm1Id, _ := pm1Res.LastInsertId()
- mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "ADMIN",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mId, _ := mRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", pm1Id)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId,
- ProductCode: uid,
- AppKey: uid,
- AppSecret: "secret1",
- })
- require.NoError(t, err)
- assert.Equal(t, "SUPER_ADMIN", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_c1")
- }
- // TC-0234: 验证disabled计数
- func TestSyncPermissions_VerifyDisabledCount(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid, AppSecret: bcryptHash(t, "secret1"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- var permIds []int64
- for i := 0; i < 5; i++ {
- pmRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p", Code: fmt.Sprintf("%s_c%d", uid, i),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pmId, _ := pmRes.LastInsertId()
- permIds = append(permIds, pmId)
- }
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", permIds...)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.SyncPermissions(ctx, &pb.SyncPermissionsReq{
- AppKey: uid,
- AppSecret: "secret1",
- Perms: []*pb.PermItem{
- {Code: fmt.Sprintf("%s_c0", uid), Name: "p"},
- {Code: fmt.Sprintf("%s_c1", uid), Name: "p"},
- },
- })
- require.NoError(t, err)
- assert.Equal(t, int64(3), resp.Disabled)
- }
- // TC-0257: MEMBER-DENY覆盖
- func TestGetUserPerms_MemberDENYOverride(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "test_prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "secret1"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- roleRes, err := svcCtx.SysRoleModel.Insert(ctx, &roleModel.SysRole{
- ProductCode: uid, Name: uid + "_role", Status: 1, PermsLevel: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- roleId, _ := roleRes.LastInsertId()
- permARes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "permA", Code: uid + "_pA",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- permAId, _ := permARes.LastInsertId()
- permBRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "permB", Code: uid + "_pB",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- permBId, _ := permBRes.LastInsertId()
- urRes, err := svcCtx.SysUserRoleModel.Insert(ctx, &userRoleModel.SysUserRole{
- UserId: uId, RoleId: roleId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- urId, _ := urRes.LastInsertId()
- rpARes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: permAId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpAId, _ := rpARes.LastInsertId()
- rpBRes, err := svcCtx.SysRolePermModel.Insert(ctx, &rolePermModel.SysRolePerm{
- RoleId: roleId, PermId: permBId, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- rpBId, _ := rpBRes.LastInsertId()
- upRes, err := svcCtx.SysUserPermModel.Insert(ctx, &userPermModel.SysUserPerm{
- UserId: uId, PermId: permAId, Effect: "DENY",
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- upId, _ := upRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_user_perm`", upId)
- testutil.CleanTable(ctx, conn, "`sys_role_perm`", rpAId, rpBId)
- testutil.CleanTable(ctx, conn, "`sys_user_role`", urId)
- testutil.CleanTable(ctx, conn, "`sys_perm`", permAId, permBId)
- testutil.CleanTable(ctx, conn, "`sys_role`", roleId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId,
- ProductCode: uid,
- AppKey: uid + "_k",
- AppSecret: "secret1",
- })
- require.NoError(t, err)
- assert.Equal(t, "MEMBER", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_pB")
- assert.NotContains(t, resp.Perms, uid+"_pA")
- }
- // TC-0252: gRPC VerifyToken 用户已冻结返回valid=false(H-4修复验证)
- func TestVerifyToken_FrozenUserReturnsInvalid(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- cfg := testutil.GetTestConfig()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "frozen",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", uId) })
- accessToken, err := authHelper.GenerateAccessToken(
- cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
- uId, uid, "", "MEMBER", 0,
- )
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
- require.NoError(t, err)
- assert.False(t, resp.Valid, "frozen user token should be invalid")
- }
- // TC-0253: gRPC VerifyToken 非产品成员返回valid=false(H-4修复验证)
- func TestVerifyToken_NonMemberReturnsInvalid(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- pc := testutil.UniqueId()
- cfg := testutil.GetTestConfig()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "user",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: pc, Name: "prod", AppKey: testutil.UniqueId(), AppSecret: "s",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- accessToken, err := authHelper.GenerateAccessToken(
- cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
- uId, uid, pc, "MEMBER", 0,
- )
- require.NoError(t, err)
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
- require.NoError(t, err)
- assert.False(t, resp.Valid, "non-member user with productCode should be invalid")
- }
- // TC-0254: gRPC VerifyToken 返回实时权限和成员类型(H-4修复验证)
- func TestVerifyToken_ReturnsRealtimeData(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- cfg := testutil.GetTestConfig()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "user",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: "s",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mbrRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "ADMIN",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mbrId, _ := mbrRes.LastInsertId()
- permRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "realtime_perm", Code: uid + "_rt",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- permId, _ := permRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", permId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mbrId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- accessToken, err := authHelper.GenerateAccessToken(
- cfg.Auth.AccessSecret, cfg.Auth.AccessExpire,
- uId, uid, uid, "MEMBER", 0,
- )
- require.NoError(t, err)
- svcCtx.UserDetailsLoader.Clean(ctx, uId)
- srv := NewPermServer(svcCtx)
- resp, err := srv.VerifyToken(ctx, &pb.VerifyTokenReq{AccessToken: accessToken})
- require.NoError(t, err)
- assert.True(t, resp.Valid)
- assert.Equal(t, "ADMIN", resp.MemberType, "should return realtime memberType, not token's")
- assert.Contains(t, resp.Perms, uid+"_rt", "should return realtime perms")
- }
- // TC-0241: gRPC Login 产品成员被禁用时拒绝(H-3修复验证)
- func TestLogin_DisabledMemberRejected(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass123"), Nickname: "nick",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: "s1",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- pmRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 2,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pmId, _ := pmRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", pmId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- _, err = srv.Login(ctx, &pb.LoginReq{
- Username: uid,
- Password: "pass123",
- ProductCode: uid,
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- assert.Equal(t, "您在该产品下的成员资格已被禁用", status.Convert(err).Message())
- }
- // helper: create a JWT with no userId claim
- func createTokenWithoutUserId(secret string) string {
- claims := jwt.MapClaims{
- "username": "test",
- "exp": time.Now().Add(time.Hour).Unix(),
- }
- token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)
- s, _ := token.SignedString([]byte(secret))
- return s
- }
- // =============================================================================
- // audit H-2 修复回归测试:gRPC GetUserPerms 必须对齐 VerifyToken 的状态校验
- // 修复前:GetUserPerms 仅校验"用户存在";冻结用户/被踢出产品的用户仍会被返回全量权限。
- // 修复后:增加 StatusEnabled 判定 + (非超管下)MemberType 非空判定。
- // =============================================================================
- // TC-0700: GetUserPerms 对冻结用户 (Status=Disabled) 必须返回 PermissionDenied
- func TestGetUserPerms_FrozenUser_PermissionDenied(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- // 用户 Status=2 (Disabled)
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "frozen",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 2, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- // 插入该产品下启用成员,保证 MemberType != "",排除冻结用户与非成员两个判定路径的干扰
- mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mId, _ := mRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- // 清理缓存确保 loader 从 DB 取最新的 Status=2
- svcCtx.UserDetailsLoader.Clean(ctx, uId)
- srv := NewPermServer(svcCtx)
- _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
- })
- require.Error(t, err, "冻结用户的 GetUserPerms 必须返回错误,不能再返回全量权限")
- assert.Equal(t, codes.PermissionDenied, status.Code(err),
- "audit H-2: 冻结用户应返回 PermissionDenied 以阻断跨系统一致性漏洞")
- assert.Contains(t, status.Convert(err).Message(), "冻结")
- }
- // TC-0701: GetUserPerms 对已被移出产品的启用用户(非超管 + MemberType 空)必须返回 PermissionDenied
- func TestGetUserPerms_NonMember_PermissionDenied(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- // 用户启用但不是目标产品的成员
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "non_member",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- svcCtx.UserDetailsLoader.Clean(ctx, uId)
- srv := NewPermServer(svcCtx)
- _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
- })
- require.Error(t, err)
- assert.Equal(t, codes.PermissionDenied, status.Code(err),
- "audit H-2: 用户不是产品成员时应返回 PermissionDenied")
- assert.Contains(t, status.Convert(err).Message(), "成员")
- }
- // TC-0702: GetUserPerms 对"产品成员被禁用的 DEV 部门用户"必须返回 PermissionDenied
- // 组合 H-2 + H-3 的交叉场景:禁用成员 → MemberType 清空 → 即便 DeptType=DEV 也不应获得权限
- func TestGetUserPerms_DisabledMemberInDevDept_PermissionDenied(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- // 插入 DEV 部门
- deptRes, err := svcCtx.SysDeptModel.Insert(ctx, &deptModel.SysDept{
- Name: "dev_" + uid, ParentId: 0, Path: "/",
- DeptType: "DEV", Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- deptId, _ := deptRes.LastInsertId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "dev_user",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2, DeptId: deptId,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- // 被管理员禁用的产品成员 (Status=2)
- mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "MEMBER", Status: 2,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mId, _ := mRes.LastInsertId()
- // 放几条启用权限,验证"本来能拿到"
- permRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "all", Code: uid + "_all",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- permId, _ := permRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", permId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- testutil.CleanTable(ctx, conn, "`sys_dept`", deptId)
- })
- svcCtx.UserDetailsLoader.Clean(ctx, uId)
- srv := NewPermServer(svcCtx)
- _, err = srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
- })
- require.Error(t, err,
- "audit H-3: 产品成员被禁用的 DEV 部门用户不应再被 loadPerms 授予全量权限,"+
- "GetUserPerms 也不应返回 PermissionDenied 以外的结果")
- assert.Equal(t, codes.PermissionDenied, status.Code(err))
- }
- // TC-0703: GetUserPerms 对"启用的产品成员"返回成功(H-2 回归基准)
- // 验证修复后的正常路径未被误伤
- func TestGetUserPerms_EnabledMember_Succeeds(t *testing.T) {
- ctx := context.Background()
- svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
- conn := testutil.GetTestSqlConn()
- now := time.Now().Unix()
- uid := testutil.UniqueId()
- uRes, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
- Username: uid, Password: testutil.HashPassword("pass"), Nickname: "ok",
- Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- uId, _ := uRes.LastInsertId()
- pRes, err := svcCtx.SysProductModel.Insert(ctx, &productModel.SysProduct{
- Code: uid, Name: "prod", AppKey: uid + "_k", AppSecret: bcryptHash(t, "s"),
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- pId, _ := pRes.LastInsertId()
- mRes, err := svcCtx.SysProductMemberModel.Insert(ctx, &memberModel.SysProductMember{
- ProductCode: uid, UserId: uId, MemberType: "ADMIN", Status: 1,
- CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- mId, _ := mRes.LastInsertId()
- permRes, err := svcCtx.SysPermModel.Insert(ctx, &permModel.SysPerm{
- ProductCode: uid, Name: "p", Code: uid + "_c",
- Status: 1, CreateTime: now, UpdateTime: now,
- })
- require.NoError(t, err)
- permId, _ := permRes.LastInsertId()
- t.Cleanup(func() {
- testutil.CleanTable(ctx, conn, "`sys_perm`", permId)
- testutil.CleanTable(ctx, conn, "`sys_product_member`", mId)
- testutil.CleanTable(ctx, conn, "`sys_product`", pId)
- testutil.CleanTable(ctx, conn, "`sys_user`", uId)
- })
- srv := NewPermServer(svcCtx)
- resp, err := srv.GetUserPerms(ctx, &pb.GetUserPermsReq{
- UserId: uId, ProductCode: uid, AppKey: uid + "_k", AppSecret: "s",
- })
- require.NoError(t, err)
- assert.Equal(t, "ADMIN", resp.MemberType)
- assert.Contains(t, resp.Perms, uid+"_c")
- }
|