logoutHandler_test.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
  1. package auth
  2. import (
  3. "context"
  4. "database/sql"
  5. "encoding/json"
  6. "net/http"
  7. "net/http/httptest"
  8. "testing"
  9. "time"
  10. "perms-system-server/internal/loaders"
  11. "perms-system-server/internal/middleware"
  12. userModel "perms-system-server/internal/model/user"
  13. "perms-system-server/internal/response"
  14. "perms-system-server/internal/svc"
  15. "perms-system-server/internal/testutil"
  16. "github.com/stretchr/testify/assert"
  17. "github.com/stretchr/testify/require"
  18. )
  19. func init() { response.Setup() }
  20. // TC-0796: handler 薄层契约 —— LogoutHandler 在无认证上下文(userId=0) 时必须返回 401,
  21. // 而不是 200 或 5xx。这把"handler 正确透传 logic 错误"的契约冻结住, 避免未来改造时
  22. // 意外把未登录请求吞成成功/崩溃。
  23. func TestLogoutHandler_UnauthorizedWhenNoUserCtx(t *testing.T) {
  24. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  25. handler := LogoutHandler(svcCtx)
  26. req := httptest.NewRequest(http.MethodPost, "/api/auth/logout", nil)
  27. rr := httptest.NewRecorder()
  28. handler.ServeHTTP(rr, req)
  29. var body response.Body
  30. require.NoError(t, json.Unmarshal(rr.Body.Bytes(), &body))
  31. assert.Equal(t, 401, body.Code)
  32. assert.Contains(t, body.Msg, "未登录")
  33. }
  34. // TC-0797: handler 薄层契约 —— LogoutHandler 在有效认证上下文下必须 200 且无响应体(httpx.Ok);
  35. // 同时 DB 的 tokenVersion 必须被实际递增 (证明 handler 真的调用了 logic 而不是只返回 200)。
  36. func TestLogoutHandler_SuccessIncrementsTokenVersion(t *testing.T) {
  37. ctx := context.Background()
  38. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  39. conn := testutil.GetTestSqlConn()
  40. now := time.Now().Unix()
  41. res, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  42. Username: "h_lo_" + testutil.UniqueId(), Password: testutil.HashPassword("pw"),
  43. Nickname: "h_lo", Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  44. Status: 1, TokenVersion: 0, CreateTime: now, UpdateTime: now,
  45. })
  46. require.NoError(t, err)
  47. userId, _ := res.LastInsertId()
  48. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  49. handler := LogoutHandler(svcCtx)
  50. req := httptest.NewRequest(http.MethodPost, "/api/auth/logout", nil)
  51. // 模拟 JWT middleware 已经注入 userDetails 的场景
  52. req = req.WithContext(middleware.WithUserDetails(req.Context(), &loaders.UserDetails{
  53. UserId: userId, Username: "h_lo", Status: 1,
  54. }))
  55. rr := httptest.NewRecorder()
  56. handler.ServeHTTP(rr, req)
  57. assert.Equal(t, http.StatusOK, rr.Code, "成功登出必须 200")
  58. u, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  59. require.NoError(t, err)
  60. assert.Equal(t, int64(1), u.TokenVersion,
  61. "handler 必须真正触达 logic 层; tokenVersion 未递增说明 handler 伪装成功")
  62. }