add: 提交部分表设计

update: 1.所有model嵌入gorm公用model 2.所有model嵌入BaseModel
This commit is contained in:
2025-12-15 11:32:33 +08:00
parent 4455b39e42
commit ad946af5ee
21 changed files with 1109 additions and 321 deletions

View File

@@ -91,8 +91,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(account)
@@ -101,8 +99,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
RoleName: "单角色测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -122,8 +118,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(account)
@@ -135,8 +129,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
RoleName: "多角色测试_" + string(rune('A'+i)),
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(roles[i])
roleIDs[i] = roles[i].ID
@@ -156,8 +148,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(account)
@@ -166,8 +156,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
RoleName: "获取角色列表测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -189,8 +177,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(account)
@@ -199,8 +185,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
RoleName: "移除角色测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -226,8 +210,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(account)
@@ -236,8 +218,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
RoleName: "重复分配测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -260,8 +240,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
RoleName: "账号不存在测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -276,8 +254,6 @@ func TestAccountRoleAssociation_AssignRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(account)
@@ -341,8 +317,6 @@ func TestAccountRoleAssociation_SoftDelete(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(account)
@@ -350,8 +324,6 @@ func TestAccountRoleAssociation_SoftDelete(t *testing.T) {
RoleName: "恢复角色测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)

View File

@@ -178,8 +178,6 @@ func TestAccountAPI_Create(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypeRoot,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, rootAccount)
@@ -220,8 +218,6 @@ func TestAccountAPI_Create(t *testing.T) {
UserType: constants.UserTypePlatform,
ParentID: &rootAccount.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, existingAccount)
@@ -290,8 +286,6 @@ func TestAccountAPI_Get(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, testAccount)
@@ -350,8 +344,6 @@ func TestAccountAPI_Update(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, testAccount)
@@ -397,8 +389,6 @@ func TestAccountAPI_Delete(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, testAccount)
@@ -436,8 +426,6 @@ func TestAccountAPI_List(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, account)
}
@@ -482,8 +470,6 @@ func TestAccountAPI_AssignRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, testAccount)
@@ -492,8 +478,6 @@ func TestAccountAPI_AssignRoles(t *testing.T) {
RoleName: "测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -537,8 +521,6 @@ func TestAccountAPI_GetRoles(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, testAccount)
@@ -547,8 +529,6 @@ func TestAccountAPI_GetRoles(t *testing.T) {
RoleName: "获取角色测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -594,8 +574,6 @@ func TestAccountAPI_RemoveRole(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
createTestAccount(t, env.db, testAccount)
@@ -604,8 +582,6 @@ func TestAccountAPI_RemoveRole(t *testing.T) {
RoleName: "移除角色测试",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)

View File

@@ -210,8 +210,6 @@ func TestAPIRegression_RouteModularization(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(account)
@@ -234,8 +232,6 @@ func TestAPIRegression_RouteModularization(t *testing.T) {
RoleName: "回归测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(role)
@@ -259,8 +255,6 @@ func TestAPIRegression_RouteModularization(t *testing.T) {
PermCode: "regression:test:perm",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(perm)
@@ -328,8 +322,6 @@ func TestAPIRegression_Pagination(t *testing.T) {
Password: "hashedpassword",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(account)
}

View File

@@ -155,8 +155,6 @@ func TestPermissionAPI_Create(t *testing.T) {
PermCode: "existing:perm",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(existingPerm)
@@ -187,8 +185,6 @@ func TestPermissionAPI_Create(t *testing.T) {
PermCode: "system:manage",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(parentPerm)
@@ -235,8 +231,6 @@ func TestPermissionAPI_Get(t *testing.T) {
PermCode: "get:test:perm",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testPerm)
@@ -283,8 +277,6 @@ func TestPermissionAPI_Update(t *testing.T) {
PermCode: "update:test:perm",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testPerm)
@@ -329,8 +321,6 @@ func TestPermissionAPI_Delete(t *testing.T) {
PermCode: "delete:test:perm",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testPerm)
@@ -367,8 +357,6 @@ func TestPermissionAPI_List(t *testing.T) {
PermCode: fmt.Sprintf("list:test:perm:%d", i),
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(perm)
}
@@ -413,8 +401,6 @@ func TestPermissionAPI_GetTree(t *testing.T) {
PermCode: "system",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(rootPerm)
@@ -425,8 +411,6 @@ func TestPermissionAPI_GetTree(t *testing.T) {
PermType: constants.PermissionTypeMenu,
ParentID: &rootPerm.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(childPerm)
@@ -437,8 +421,6 @@ func TestPermissionAPI_GetTree(t *testing.T) {
PermType: constants.PermissionTypeButton,
ParentID: &childPerm.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(grandchildPerm)

View File

@@ -72,8 +72,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
RoleName: "单权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -83,8 +81,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
PermCode: "single:perm:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
@@ -102,8 +98,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
RoleName: "多权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -115,8 +109,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
PermCode: "multi:perm:test:" + string(rune('a'+i)),
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
permIDs[i] = perm.ID
@@ -134,8 +126,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
RoleName: "获取权限列表测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -145,8 +135,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
PermCode: "get:perm:list:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
@@ -166,8 +154,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
RoleName: "移除权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -177,8 +163,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
PermCode: "remove:perm:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
@@ -202,8 +186,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
RoleName: "重复权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -213,8 +195,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
PermCode: "duplicate:perm:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
@@ -238,8 +218,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
PermCode: "role:not:exist:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
@@ -252,8 +230,6 @@ func TestRolePermissionAssociation_AssignPermissions(t *testing.T) {
RoleName: "权限不存在测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -302,8 +278,6 @@ func TestRolePermissionAssociation_SoftDelete(t *testing.T) {
RoleName: "恢复权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -312,8 +286,6 @@ func TestRolePermissionAssociation_SoftDelete(t *testing.T) {
PermCode: "restore:perm:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
@@ -342,8 +314,6 @@ func TestRolePermissionAssociation_SoftDelete(t *testing.T) {
RoleName: "批量权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -355,8 +325,6 @@ func TestRolePermissionAssociation_SoftDelete(t *testing.T) {
PermCode: "batch:perm:test:" + string(rune('a'+i)),
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
permIDs[i] = perm.ID
@@ -417,8 +385,6 @@ func TestRolePermissionAssociation_Cascade(t *testing.T) {
RoleName: "级联测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(role)
@@ -427,18 +393,14 @@ func TestRolePermissionAssociation_Cascade(t *testing.T) {
PermCode: "cascade:test:perm",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
db.Create(perm)
// 创建关联
rp := &model.RolePermission{
RoleID: role.ID,
PermID: perm.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
RoleID: role.ID,
PermID: perm.ID,
Status: constants.StatusEnabled,
}
db.Create(rp)

View File

@@ -226,8 +226,6 @@ func TestRoleAPI_Get(t *testing.T) {
RoleName: "获取测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -273,8 +271,6 @@ func TestRoleAPI_Update(t *testing.T) {
RoleName: "更新测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -318,8 +314,6 @@ func TestRoleAPI_Delete(t *testing.T) {
RoleName: "删除测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -355,8 +349,6 @@ func TestRoleAPI_List(t *testing.T) {
RoleName: fmt.Sprintf("列表测试角色_%d", i),
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(role)
}
@@ -392,8 +384,6 @@ func TestRoleAPI_AssignPermissions(t *testing.T) {
RoleName: "权限分配测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -403,8 +393,6 @@ func TestRoleAPI_AssignPermissions(t *testing.T) {
PermCode: "test:permission",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testPerm)
@@ -446,8 +434,6 @@ func TestRoleAPI_GetPermissions(t *testing.T) {
RoleName: "获取权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -457,17 +443,13 @@ func TestRoleAPI_GetPermissions(t *testing.T) {
PermCode: "get:permission:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testPerm)
rolePerm := &model.RolePermission{
RoleID: testRole.ID,
PermID: testPerm.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
RoleID: testRole.ID,
PermID: testPerm.ID,
Status: constants.StatusEnabled,
}
env.db.Create(rolePerm)
@@ -502,8 +484,6 @@ func TestRoleAPI_RemovePermission(t *testing.T) {
RoleName: "移除权限测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testRole)
@@ -513,17 +493,13 @@ func TestRoleAPI_RemovePermission(t *testing.T) {
PermCode: "remove:permission:test",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
env.db.Create(testPerm)
rolePerm := &model.RolePermission{
RoleID: testRole.ID,
PermID: testPerm.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
RoleID: testRole.ID,
PermID: testPerm.ID,
Status: constants.StatusEnabled,
}
env.db.Create(rolePerm)

View File

@@ -28,8 +28,6 @@ func TestAccountModel_Create(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypeRoot,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
@@ -47,8 +45,6 @@ func TestAccountModel_Create(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, parent)
require.NoError(t, err)
@@ -61,8 +57,6 @@ func TestAccountModel_Create(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &parent.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err = store.Create(ctx, child)
require.NoError(t, err)
@@ -79,8 +73,6 @@ func TestAccountModel_Create(t *testing.T) {
UserType: constants.UserTypePlatform,
ShopID: &shopID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
@@ -105,8 +97,6 @@ func TestAccountModel_GetByID(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
require.NoError(t, err)
@@ -140,8 +130,6 @@ func TestAccountModel_GetByUsername(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
require.NoError(t, err)
@@ -173,8 +161,6 @@ func TestAccountModel_GetByPhone(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
require.NoError(t, err)
@@ -206,8 +192,6 @@ func TestAccountModel_Update(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
require.NoError(t, err)
@@ -242,8 +226,6 @@ func TestAccountModel_List(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
require.NoError(t, err)
@@ -283,8 +265,6 @@ func TestAccountModel_UniqueConstraints(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
require.NoError(t, err)
@@ -296,8 +276,6 @@ func TestAccountModel_UniqueConstraints(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, duplicate)
assert.Error(t, err)
@@ -310,8 +288,6 @@ func TestAccountModel_UniqueConstraints(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, duplicate)
assert.Error(t, err)

View File

@@ -29,8 +29,6 @@ func TestAccountSoftDelete(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, account)
require.NoError(t, err)
@@ -61,8 +59,6 @@ func TestAccountSoftDelete(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := store.Create(ctx, newAccount)
require.NoError(t, err)
@@ -84,8 +80,6 @@ func TestRoleSoftDelete(t *testing.T) {
RoleDesc: "测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := roleStore.Create(ctx, role)
require.NoError(t, err)
@@ -123,8 +117,6 @@ func TestPermissionSoftDelete(t *testing.T) {
PermCode: "test:permission",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := permissionStore.Create(ctx, permission)
require.NoError(t, err)
@@ -145,8 +137,6 @@ func TestPermissionSoftDelete(t *testing.T) {
PermCode: "test:permission", // 重用已删除权限的 perm_code
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := permissionStore.Create(ctx, newPermission)
require.NoError(t, err)
@@ -171,8 +161,6 @@ func TestAccountRoleSoftDelete(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := accountStore.Create(ctx, account)
require.NoError(t, err)
@@ -183,8 +171,6 @@ func TestAccountRoleSoftDelete(t *testing.T) {
RoleDesc: "测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err = roleStore.Create(ctx, role)
require.NoError(t, err)
@@ -244,8 +230,6 @@ func TestRolePermissionSoftDelete(t *testing.T) {
RoleDesc: "测试角色",
RoleType: constants.RoleTypeSuper,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err := roleStore.Create(ctx, role)
require.NoError(t, err)
@@ -256,19 +240,15 @@ func TestRolePermissionSoftDelete(t *testing.T) {
PermCode: "rp:permission",
PermType: constants.PermissionTypeMenu,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
err = permissionStore.Create(ctx, permission)
require.NoError(t, err)
// 创建关联
rolePermission := &model.RolePermission{
RoleID: role.ID,
PermID: permission.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
RoleID: role.ID,
PermID: permission.ID,
Status: constants.StatusEnabled,
}
err = rolePermissionStore.Create(ctx, rolePermission)
require.NoError(t, err)
@@ -285,11 +265,9 @@ func TestRolePermissionSoftDelete(t *testing.T) {
t.Run("软删除后可以重新关联", func(t *testing.T) {
newRolePermission := &model.RolePermission{
RoleID: role.ID,
PermID: permission.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
RoleID: role.ID,
PermID: permission.ID,
Status: constants.StatusEnabled,
}
err := rolePermissionStore.Create(ctx, newRolePermission)
require.NoError(t, err)

View File

@@ -30,8 +30,6 @@ func TestGetSubordinateIDs_CacheHit(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -42,8 +40,6 @@ func TestGetSubordinateIDs_CacheHit(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountB).Error)
@@ -85,8 +81,6 @@ func TestGetSubordinateIDs_CacheExpiry(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -132,8 +126,6 @@ func TestClearSubordinatesCache(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -172,8 +164,6 @@ func TestClearSubordinatesCacheForParents(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -184,8 +174,6 @@ func TestClearSubordinatesCacheForParents(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountB).Error)
@@ -196,8 +184,6 @@ func TestClearSubordinatesCacheForParents(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountB.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountC).Error)
@@ -249,8 +235,6 @@ func TestCacheInvalidationOnCreate(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -272,8 +256,6 @@ func TestCacheInvalidationOnCreate(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountB).Error)

View File

@@ -28,8 +28,6 @@ func TestGetSubordinateIDs_SingleLevel(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -40,8 +38,6 @@ func TestGetSubordinateIDs_SingleLevel(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountB).Error)
@@ -52,8 +48,6 @@ func TestGetSubordinateIDs_SingleLevel(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountC).Error)
@@ -81,8 +75,6 @@ func TestGetSubordinateIDs_MultiLevel(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -93,8 +85,6 @@ func TestGetSubordinateIDs_MultiLevel(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountB).Error)
@@ -105,8 +95,6 @@ func TestGetSubordinateIDs_MultiLevel(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountB.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountC).Error)
@@ -117,8 +105,6 @@ func TestGetSubordinateIDs_MultiLevel(t *testing.T) {
UserType: constants.UserTypeEnterprise,
ParentID: &accountC.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountD).Error)
@@ -129,8 +115,6 @@ func TestGetSubordinateIDs_MultiLevel(t *testing.T) {
UserType: constants.UserTypeEnterprise,
ParentID: &accountD.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountE).Error)
@@ -166,8 +150,6 @@ func TestGetSubordinateIDs_WithSoftDeleted(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypePlatform,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -178,8 +160,6 @@ func TestGetSubordinateIDs_WithSoftDeleted(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountB).Error)
@@ -190,8 +170,6 @@ func TestGetSubordinateIDs_WithSoftDeleted(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &accountB.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountC).Error)
@@ -226,8 +204,6 @@ func TestGetSubordinateIDs_Performance(t *testing.T) {
Password: "hashed_password",
UserType: constants.UserTypeRoot,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(accountA).Error)
@@ -241,8 +217,6 @@ func TestGetSubordinateIDs_Performance(t *testing.T) {
UserType: constants.UserTypePlatform,
ParentID: &accountA.ID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(acc).Error)
level2IDs = append(level2IDs, acc.ID)
@@ -259,8 +233,6 @@ func TestGetSubordinateIDs_Performance(t *testing.T) {
UserType: constants.UserTypeAgent,
ParentID: &parentID,
Status: constants.StatusEnabled,
Creator: 1,
Updater: 1,
}
require.NoError(t, db.Create(acc).Error)
level3IDs = append(level3IDs, acc.ID)