changePasswordLogic_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507
  1. package auth
  2. import (
  3. "context"
  4. "database/sql"
  5. "errors"
  6. "github.com/stretchr/testify/assert"
  7. "github.com/stretchr/testify/require"
  8. "go.uber.org/mock/gomock"
  9. "golang.org/x/crypto/bcrypt"
  10. "perms-system-server/internal/consts"
  11. "perms-system-server/internal/loaders"
  12. "perms-system-server/internal/middleware"
  13. userModel "perms-system-server/internal/model/user"
  14. "perms-system-server/internal/response"
  15. "perms-system-server/internal/svc"
  16. "perms-system-server/internal/testutil"
  17. "perms-system-server/internal/testutil/mocks"
  18. "perms-system-server/internal/types"
  19. "strings"
  20. "testing"
  21. "time"
  22. )
  23. func ctxWithUserId(userId int64) context.Context {
  24. return middleware.WithUserDetails(context.Background(), &loaders.UserDetails{UserId: userId})
  25. }
  26. func insertTestUser(t *testing.T, ctx context.Context, username, password string) int64 {
  27. t.Helper()
  28. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  29. now := time.Now().Unix()
  30. res, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  31. Username: username,
  32. Password: password,
  33. Nickname: "test",
  34. Avatar: sql.NullString{},
  35. Email: username + "@test.com",
  36. Phone: "13800000000",
  37. Remark: "",
  38. DeptId: 0,
  39. IsSuperAdmin: 2,
  40. MustChangePassword: 1,
  41. Status: 1,
  42. CreateTime: now,
  43. UpdateTime: now,
  44. })
  45. require.NoError(t, err)
  46. id, _ := res.LastInsertId()
  47. return id
  48. }
  49. // TC-0054: 正常修改
  50. func TestChangePassword_Success(t *testing.T) {
  51. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  52. conn := testutil.GetTestSqlConn()
  53. ctx := context.Background()
  54. oldPwd := "Oldpass123"
  55. newPwd := "Newpass456"
  56. username := testutil.UniqueId()
  57. hashed := testutil.HashPassword(oldPwd)
  58. userId := insertTestUser(t, ctx, username, hashed)
  59. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  60. logic := NewChangePasswordLogic(ctxWithUserId(userId), svcCtx)
  61. err := logic.ChangePassword(&types.ChangePasswordReq{
  62. OldPassword: oldPwd,
  63. NewPassword: newPwd,
  64. })
  65. require.NoError(t, err)
  66. updated, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  67. require.NoError(t, err)
  68. assert.NoError(t, bcrypt.CompareHashAndPassword([]byte(updated.Password), []byte(newPwd)))
  69. }
  70. // TC-0055: mustChangePassword重置
  71. func TestChangePassword_MustChangePasswordReset(t *testing.T) {
  72. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  73. conn := testutil.GetTestSqlConn()
  74. ctx := context.Background()
  75. oldPwd := "Oldpass123"
  76. newPwd := "Newpass456"
  77. username := testutil.UniqueId()
  78. hashed := testutil.HashPassword(oldPwd)
  79. userId := insertTestUser(t, ctx, username, hashed)
  80. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  81. logic := NewChangePasswordLogic(ctxWithUserId(userId), svcCtx)
  82. err := logic.ChangePassword(&types.ChangePasswordReq{
  83. OldPassword: oldPwd,
  84. NewPassword: newPwd,
  85. })
  86. require.NoError(t, err)
  87. updated, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  88. require.NoError(t, err)
  89. assert.Equal(t, int64(2), updated.MustChangePassword)
  90. }
  91. // TC-0056: 原密码错误
  92. func TestChangePassword_WrongOldPassword(t *testing.T) {
  93. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  94. conn := testutil.GetTestSqlConn()
  95. ctx := context.Background()
  96. username := testutil.UniqueId()
  97. hashed := testutil.HashPassword("Realpass1")
  98. userId := insertTestUser(t, ctx, username, hashed)
  99. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  100. logic := NewChangePasswordLogic(ctxWithUserId(userId), svcCtx)
  101. err := logic.ChangePassword(&types.ChangePasswordReq{
  102. OldPassword: "Wrongpass1",
  103. NewPassword: "Newpass456",
  104. })
  105. var codeErr *response.CodeError
  106. require.True(t, errors.As(err, &codeErr))
  107. assert.Equal(t, 400, codeErr.Code())
  108. assert.Equal(t, "原密码错误", codeErr.Error())
  109. }
  110. // TC-0057: 新密码少于8字符
  111. func TestChangePassword_NewPasswordTooShort(t *testing.T) {
  112. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  113. logic := NewChangePasswordLogic(ctxWithUserId(1), svcCtx)
  114. err := logic.ChangePassword(&types.ChangePasswordReq{
  115. OldPassword: "oldpass",
  116. NewPassword: "Pas1234",
  117. })
  118. var codeErr *response.CodeError
  119. require.True(t, errors.As(err, &codeErr))
  120. assert.Equal(t, 400, codeErr.Code())
  121. assert.Equal(t, "密码长度不能少于8个字符", codeErr.Error())
  122. }
  123. // TC-0058: 新密码恰好8字符(含大小写+数字)
  124. func TestChangePassword_NewPasswordExactly8Chars(t *testing.T) {
  125. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  126. conn := testutil.GetTestSqlConn()
  127. ctx := context.Background()
  128. oldPwd := "Oldpass123"
  129. newPwd := "Abcdef1x"
  130. username := testutil.UniqueId()
  131. hashed := testutil.HashPassword(oldPwd)
  132. userId := insertTestUser(t, ctx, username, hashed)
  133. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  134. logic := NewChangePasswordLogic(ctxWithUserId(userId), svcCtx)
  135. err := logic.ChangePassword(&types.ChangePasswordReq{
  136. OldPassword: oldPwd,
  137. NewPassword: newPwd,
  138. })
  139. require.NoError(t, err)
  140. updated, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  141. require.NoError(t, err)
  142. assert.NoError(t, bcrypt.CompareHashAndPassword([]byte(updated.Password), []byte(newPwd)))
  143. }
  144. // TC-0059: 新密码空字符串
  145. func TestChangePassword_NewPasswordEmpty(t *testing.T) {
  146. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  147. logic := NewChangePasswordLogic(ctxWithUserId(1), svcCtx)
  148. err := logic.ChangePassword(&types.ChangePasswordReq{
  149. OldPassword: "oldpass",
  150. NewPassword: "",
  151. })
  152. var codeErr *response.CodeError
  153. require.True(t, errors.As(err, &codeErr))
  154. assert.Equal(t, 400, codeErr.Code())
  155. assert.Equal(t, "密码长度不能少于8个字符", codeErr.Error())
  156. }
  157. // TC-0060: 新密码超过72字符
  158. func TestChangePassword_NewPasswordTooLong(t *testing.T) {
  159. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  160. longPwd := "A" + strings.Repeat("a", 71) + "1"
  161. logic := NewChangePasswordLogic(ctxWithUserId(1), svcCtx)
  162. err := logic.ChangePassword(&types.ChangePasswordReq{
  163. OldPassword: "oldpass",
  164. NewPassword: longPwd,
  165. })
  166. var codeErr *response.CodeError
  167. require.True(t, errors.As(err, &codeErr))
  168. assert.Equal(t, 400, codeErr.Code())
  169. assert.Equal(t, "密码长度不能超过72个字符", codeErr.Error())
  170. }
  171. // TC-0061: 新密码恰好72字符
  172. func TestChangePassword_NewPasswordExactly72Chars(t *testing.T) {
  173. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  174. conn := testutil.GetTestSqlConn()
  175. ctx := context.Background()
  176. oldPwd := "Oldpass123"
  177. newPwd := "B" + strings.Repeat("b", 70) + "1"
  178. username := testutil.UniqueId()
  179. hashed := testutil.HashPassword(oldPwd)
  180. userId := insertTestUser(t, ctx, username, hashed)
  181. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  182. logic := NewChangePasswordLogic(ctxWithUserId(userId), svcCtx)
  183. err := logic.ChangePassword(&types.ChangePasswordReq{
  184. OldPassword: oldPwd,
  185. NewPassword: newPwd,
  186. })
  187. require.NoError(t, err)
  188. updated, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  189. require.NoError(t, err)
  190. assert.NoError(t, bcrypt.CompareHashAndPassword([]byte(updated.Password), []byte(newPwd)))
  191. }
  192. // TC-0062: 新旧密码相同
  193. func TestChangePassword_SameOldAndNew(t *testing.T) {
  194. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  195. conn := testutil.GetTestSqlConn()
  196. ctx := context.Background()
  197. pwd := "Samepass123"
  198. username := testutil.UniqueId()
  199. hashed := testutil.HashPassword(pwd)
  200. userId := insertTestUser(t, ctx, username, hashed)
  201. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  202. logic := NewChangePasswordLogic(ctxWithUserId(userId), svcCtx)
  203. err := logic.ChangePassword(&types.ChangePasswordReq{
  204. OldPassword: pwd,
  205. NewPassword: pwd,
  206. })
  207. var codeErr *response.CodeError
  208. require.True(t, errors.As(err, &codeErr))
  209. assert.Equal(t, 400, codeErr.Code())
  210. assert.Equal(t, "新密码不能与原密码相同", codeErr.Error())
  211. }
  212. // TC-1179: "新旧密码相同"校验必须排在 bcrypt.CompareHashAndPassword 之前。
  213. //
  214. // 用例设计:DB 里存的 Password 哈希对应 "RealOldpass123",但请求传入
  215. // OldPassword == NewPassword == "Samepass123"(与 DB 存的原密码不匹配)。
  216. // - 若校验顺序正确(L-R17-4):先断 `OldPassword == NewPassword`,直接 400 "新密码不能
  217. // 与原密码相同",UpdatePassword 不应被触达(mock EXPECT 未声明即 Times(0) 判违约)。
  218. // - 若顺序被误回滚为"先 bcrypt 后等值判断":bcrypt 会先失败并 400 "原密码错误",
  219. // 文案不同,用例会失败。
  220. //
  221. // 该用例同时保证"同密码短路"这条 timing 分支在 mock 层面可回归观测,不依赖真实 DB 写入。
  222. func TestChangePassword_SameOldAndNew_ChecksBeforeBcrypt(t *testing.T) {
  223. ctrl := gomock.NewController(t)
  224. t.Cleanup(ctrl.Finish)
  225. const userId = int64(1750)
  226. // DB 里的哈希基于 "RealOldpass123"——与 req.OldPassword 不一致。
  227. realOld := "RealOldpass123"
  228. hashed, err := bcrypt.GenerateFromPassword([]byte(realOld), bcrypt.DefaultCost)
  229. require.NoError(t, err)
  230. mockUser := mocks.NewMockSysUserModel(ctrl)
  231. mockUser.EXPECT().FindOne(gomock.Any(), userId).
  232. Return(&userModel.SysUser{
  233. Id: userId,
  234. Username: "l_r17_4_subject",
  235. Password: string(hashed),
  236. Status: consts.StatusEnabled,
  237. UpdateTime: 4242,
  238. }, nil)
  239. // 关键护栏:UpdatePassword 绝不应被调用——若 EXPECT 未声明的方法被调用,gomock 会 FAIL。
  240. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{User: mockUser})
  241. svcCtx.TokenOpLimiter = nil
  242. ctx := middleware.WithUserDetails(t.Context(), &loaders.UserDetails{UserId: userId})
  243. wrongOldButEqualNew := "Samepass123"
  244. err = NewChangePasswordLogic(ctx, svcCtx).ChangePassword(&types.ChangePasswordReq{
  245. OldPassword: wrongOldButEqualNew,
  246. NewPassword: wrongOldButEqualNew,
  247. })
  248. require.Error(t, err)
  249. var ce *response.CodeError
  250. require.True(t, errors.As(err, &ce))
  251. assert.Equal(t, 400, ce.Code(),
  252. "L-R17-4:OldPassword==NewPassword 必须在 bcrypt 之前被拦截")
  253. assert.Equal(t, "新密码不能与原密码相同", ce.Error(),
  254. "文案必须是'新密码不能与原密码相同',若是'原密码错误'说明顺序被误回滚")
  255. }
  256. // TC-0063: 用户不存在
  257. func TestChangePassword_UserNotFound(t *testing.T) {
  258. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  259. logic := NewChangePasswordLogic(ctxWithUserId(99999999), svcCtx)
  260. err := logic.ChangePassword(&types.ChangePasswordReq{
  261. OldPassword: "Oldpass123",
  262. NewPassword: "Newpass456",
  263. })
  264. var codeErr *response.CodeError
  265. require.True(t, errors.As(err, &codeErr))
  266. assert.Equal(t, 404, codeErr.Code())
  267. assert.Equal(t, "用户不存在", codeErr.Error())
  268. }
  269. func TestChangePassword_UpdateConflict_Maps409(t *testing.T) {
  270. ctrl := gomock.NewController(t)
  271. t.Cleanup(ctrl.Finish)
  272. const userId = int64(777)
  273. oldPwd := "Oldpass123"
  274. newPwd := "Newpass456"
  275. hashed, err := bcrypt.GenerateFromPassword([]byte(oldPwd), bcrypt.DefaultCost)
  276. require.NoError(t, err)
  277. mockUser := mocks.NewMockSysUserModel(ctrl)
  278. mockUser.EXPECT().FindOne(gomock.Any(), userId).
  279. Return(&userModel.SysUser{
  280. Id: userId,
  281. Username: "m_r10_4_subject",
  282. Password: string(hashed),
  283. Status: consts.StatusEnabled,
  284. UpdateTime: 1000,
  285. }, nil)
  286. // 关键:强制底层返回 ErrUpdateConflict。
  287. // 签名增加 username 与 expectedUpdateTime 两个透传参数。
  288. mockUser.EXPECT().
  289. UpdatePassword(gomock.Any(), userId, "m_r10_4_subject", gomock.Any(), int64(consts.MustChangePasswordNo), int64(1000)).
  290. Return(userModel.ErrUpdateConflict)
  291. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{User: mockUser})
  292. ctx := middleware.WithUserDetails(t.Context(), &loaders.UserDetails{UserId: userId})
  293. logic := NewChangePasswordLogic(ctx, svcCtx)
  294. err = logic.ChangePassword(&types.ChangePasswordReq{
  295. OldPassword: oldPwd,
  296. NewPassword: newPwd,
  297. })
  298. var codeErr *response.CodeError
  299. require.True(t, errors.As(err, &codeErr), "必须是 *response.CodeError,否则会被 rest 兜成 500")
  300. assert.Equal(t, 409, codeErr.Code(), "ErrUpdateConflict 必须映射为 409 Conflict")
  301. assert.Contains(t, codeErr.Error(), "密码已被其他会话修改", "文案与业务契约对齐")
  302. }
  303. // TC-1016: 非 ErrUpdateConflict 的原生错误仍应透传(500 由 rest 兜底),
  304. // 防止修复把所有底层错误都误吞为 409。
  305. func TestChangePassword_GenericUpdateError_StillPropagates(t *testing.T) {
  306. ctrl := gomock.NewController(t)
  307. t.Cleanup(ctrl.Finish)
  308. const userId = int64(778)
  309. oldPwd := "Oldpass123"
  310. newPwd := "Newpass456"
  311. hashed, err := bcrypt.GenerateFromPassword([]byte(oldPwd), bcrypt.DefaultCost)
  312. require.NoError(t, err)
  313. mockUser := mocks.NewMockSysUserModel(ctrl)
  314. mockUser.EXPECT().FindOne(gomock.Any(), userId).
  315. Return(&userModel.SysUser{
  316. Id: userId,
  317. Username: "m_r10_4_subject2",
  318. Password: string(hashed),
  319. Status: consts.StatusEnabled,
  320. UpdateTime: 2000,
  321. }, nil)
  322. genericErr := errors.New("driver: bad connection")
  323. mockUser.EXPECT().
  324. UpdatePassword(gomock.Any(), userId, "m_r10_4_subject2", gomock.Any(), int64(consts.MustChangePasswordNo), int64(2000)).
  325. Return(genericErr)
  326. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{User: mockUser})
  327. ctx := middleware.WithUserDetails(t.Context(), &loaders.UserDetails{UserId: userId})
  328. logic := NewChangePasswordLogic(ctx, svcCtx)
  329. err = logic.ChangePassword(&types.ChangePasswordReq{
  330. OldPassword: oldPwd,
  331. NewPassword: newPwd,
  332. })
  333. require.Error(t, err)
  334. assert.ErrorIs(t, err, genericErr, "只把 ErrUpdateConflict 映射 409,其余错误原样透传(由 rest 兜 500)")
  335. var codeErr *response.CodeError
  336. assert.False(t, errors.As(err, &codeErr), "非冲突错误不得伪装成 CodeError")
  337. }
  338. func insertToctouUser(t *testing.T, ctx context.Context, svcCtx *svc.ServiceContext,
  339. username, plainPwd string) (int64, func()) {
  340. t.Helper()
  341. now := time.Now().Unix()
  342. hashed, err := bcrypt.GenerateFromPassword([]byte(plainPwd), bcrypt.DefaultCost)
  343. require.NoError(t, err)
  344. res, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  345. Username: username,
  346. Password: string(hashed),
  347. Nickname: "toctou",
  348. Avatar: sql.NullString{},
  349. Email: username + "@test.com",
  350. Phone: "13800000000",
  351. Remark: "",
  352. DeptId: 0,
  353. IsSuperAdmin: 2,
  354. MustChangePassword: 2,
  355. Status: 1,
  356. CreateTime: now,
  357. UpdateTime: now,
  358. })
  359. require.NoError(t, err)
  360. id, _ := res.LastInsertId()
  361. cleanup := func() {
  362. testutil.CleanTable(ctx, testutil.GetTestSqlConn(), "`sys_user`", id)
  363. }
  364. return id, cleanup
  365. }
  366. // TC-1042: E2E —— 400 vs 409 分支隔离:旧密码失配必须 400,绝不能误落 409
  367. func TestChangePassword_E2E_SecondCallWithOldPwd_Maps400(t *testing.T) {
  368. ctx := context.Background()
  369. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  370. svcCtx.TokenOpLimiter = nil
  371. oldPwd := "Oldpass123"
  372. username := "toctou_seq_" + testutil.UniqueId()
  373. userId, cleanup := insertToctouUser(t, ctx, svcCtx, username, oldPwd)
  374. t.Cleanup(cleanup)
  375. lctx := middleware.WithUserDetails(context.Background(),
  376. &loaders.UserDetails{UserId: userId, Username: username, Status: 1})
  377. require.NoError(t,
  378. NewChangePasswordLogic(lctx, svcCtx).ChangePassword(&types.ChangePasswordReq{
  379. OldPassword: oldPwd, NewPassword: "NewpassX_11",
  380. }),
  381. "首改必须成功")
  382. err := NewChangePasswordLogic(lctx, svcCtx).ChangePassword(&types.ChangePasswordReq{
  383. OldPassword: oldPwd, NewPassword: "NewpassY_22",
  384. })
  385. require.Error(t, err)
  386. var ce *response.CodeError
  387. require.True(t, errors.As(err, &ce))
  388. assert.Equal(t, 400, ce.Code(),
  389. "旧密码已失配应 400'原密码错误';不得因 ErrUpdateConflict 映射被误回 409")
  390. assert.Contains(t, ce.Error(), "原密码错误")
  391. // DB 终态:Password 是首改成功的 NewpassX_11,tokenVersion 恰好 1(而不是 2)。
  392. got, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  393. require.NoError(t, err)
  394. assert.NoError(t, bcrypt.CompareHashAndPassword([]byte(got.Password), []byte("NewpassX_11")))
  395. assert.Equal(t, int64(1), got.TokenVersion,
  396. "首改成功递增 1;第二次因 400 未进入 UpdatePassword,tokenVersion 必须仍是 1")
  397. }
  398. // TC-1043: UpdatePassword 签名护栏(mock 驱动):
  399. // 签名一旦回退(例如 username 再次被内部 FindOne 取而非外层透传),整个链路会编译失败;
  400. // 但契约层面的"必须透传外层 snapshot 的 UpdateTime"更细致:Logic 必须把 FindOne 返回的
  401. // snapshot.UpdateTime 原样交给 UpdatePassword,不得自己算 time.Now() 或重新 FindOne。
  402. // 这里用 mock 钉死该契约:FindOne 返回 UpdateTime=4242,UpdatePassword 必须收到 4242。
  403. func TestChangePassword_ForwardsSnapshotUpdateTime(t *testing.T) {
  404. // 注:此契约已由既有 TestChangePassword_UpdateConflict_Maps409(UpdateTime=1000)覆盖,
  405. // 这里再以另一组数值(4242)做"反证哨兵",若 DEV 不小心硬编码常量/写死 time.Now,
  406. // 两组数值会同时失败,快速定位。
  407. t.Run("expected=4242", func(t *testing.T) { runSnapshotForwardCase(t, 4242) })
  408. t.Run("expected=9876543210", func(t *testing.T) { runSnapshotForwardCase(t, 9876543210) })
  409. }
  410. func runSnapshotForwardCase(t *testing.T, expectedUpdateTime int64) {
  411. ctrl := gomock.NewController(t)
  412. t.Cleanup(ctrl.Finish)
  413. const userId = int64(17)
  414. oldPwd := "Oldpass123"
  415. newPwd := "Newpass456"
  416. hashed, err := bcrypt.GenerateFromPassword([]byte(oldPwd), bcrypt.DefaultCost)
  417. require.NoError(t, err)
  418. mockUser := mocks.NewMockSysUserModel(ctrl)
  419. mockUser.EXPECT().FindOne(gomock.Any(), userId).
  420. Return(&userModel.SysUser{
  421. Id: userId,
  422. Username: "snap_subject",
  423. Password: string(hashed),
  424. Status: 1,
  425. UpdateTime: expectedUpdateTime,
  426. }, nil)
  427. // 合同:UpdatePassword 的第 6 个参数必须与 FindOne 返回的 UpdateTime 字面相等。
  428. mockUser.EXPECT().
  429. UpdatePassword(gomock.Any(), userId, "snap_subject", gomock.Any(),
  430. int64(consts.MustChangePasswordNo), expectedUpdateTime).
  431. Return(nil)
  432. svcCtx := mocks.NewMockServiceContext(mocks.MockModels{User: mockUser})
  433. ctx := middleware.WithUserDetails(t.Context(), &loaders.UserDetails{UserId: userId})
  434. require.NoError(t, NewChangePasswordLogic(ctx, svcCtx).ChangePassword(
  435. &types.ChangePasswordReq{OldPassword: oldPwd, NewPassword: newPwd}))
  436. }