logoutRateLimit_audit_test.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. package auth
  2. import (
  3. "context"
  4. "database/sql"
  5. "errors"
  6. "testing"
  7. "time"
  8. "perms-system-server/internal/loaders"
  9. "perms-system-server/internal/middleware"
  10. userModel "perms-system-server/internal/model/user"
  11. "perms-system-server/internal/response"
  12. "perms-system-server/internal/svc"
  13. "perms-system-server/internal/testutil"
  14. "github.com/stretchr/testify/assert"
  15. "github.com/stretchr/testify/require"
  16. "github.com/zeromicro/go-zero/core/limit"
  17. "github.com/zeromicro/go-zero/core/stores/redis"
  18. )
  19. // TC-0739: L-C 修复回归 —— Logout 必须受 TokenOpLimiter 保护;
  20. // 用 quota=2 的定制 limiter,同一用户超过配额后第 3 次必须返回 429,
  21. // 且该超限请求**不能**递增 tokenVersion(避免撞库者反复自增搅乱 Cache)。
  22. func TestLogout_TokenOpLimiter_BlocksThirdCall(t *testing.T) {
  23. ctx := context.Background()
  24. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  25. conn := testutil.GetTestSqlConn()
  26. now := time.Now().Unix()
  27. username := "lg_rl_" + testutil.UniqueId()
  28. res, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  29. Username: username, Password: testutil.HashPassword("pw"), Nickname: "lg_rl",
  30. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  31. Status: 1, TokenVersion: 0, CreateTime: now, UpdateTime: now,
  32. })
  33. require.NoError(t, err)
  34. userId, _ := res.LastInsertId()
  35. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", userId) })
  36. cfg := testutil.GetTestConfig()
  37. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  38. // 独立 prefix 保证与全局 limiter 桶互不干扰,也避免用例互相污染
  39. svcCtx.TokenOpLimiter = limit.NewPeriodLimit(60, 2, rds, cfg.CacheRedis.KeyPrefix+":rl:logout:ut:"+testutil.UniqueId())
  40. lctx := middleware.WithUserDetails(context.Background(), &loaders.UserDetails{
  41. UserId: userId, Username: username, Status: 1,
  42. })
  43. require.NoError(t, NewLogoutLogic(lctx, svcCtx).Logout(), "第 1 次 logout 应放行")
  44. require.NoError(t, NewLogoutLogic(lctx, svcCtx).Logout(), "第 2 次 logout 仍在配额内应放行")
  45. err = NewLogoutLogic(lctx, svcCtx).Logout()
  46. require.Error(t, err, "第 3 次必须被 TokenOpLimiter 拦截")
  47. var ce *response.CodeError
  48. require.True(t, errors.As(err, &ce))
  49. assert.Equal(t, 429, ce.Code())
  50. assert.Contains(t, ce.Error(), "过于频繁")
  51. u, err := svcCtx.SysUserModel.FindOne(ctx, userId)
  52. require.NoError(t, err)
  53. assert.Equal(t, int64(2), u.TokenVersion,
  54. "被限流的 logout 请求绝不能再触发 IncrementTokenVersion(否则攻击者可反复刷新缓存)")
  55. }
  56. // TC-0740: L-C 修复 —— 限流 key 必须按 userId 隔离,A 用户打满不得影响 B 用户。
  57. func TestLogout_TokenOpLimiter_PerUserIsolated(t *testing.T) {
  58. ctx := context.Background()
  59. svcCtx := svc.NewServiceContext(testutil.GetTestConfig())
  60. conn := testutil.GetTestSqlConn()
  61. now := time.Now().Unix()
  62. mkUser := func(tag string) int64 {
  63. res, err := svcCtx.SysUserModel.Insert(ctx, &userModel.SysUser{
  64. Username: "lg_iso_" + tag + "_" + testutil.UniqueId(),
  65. Password: testutil.HashPassword("pw"), Nickname: "lg_iso",
  66. Avatar: sql.NullString{}, IsSuperAdmin: 2, MustChangePassword: 2,
  67. Status: 1, TokenVersion: 0, CreateTime: now, UpdateTime: now,
  68. })
  69. require.NoError(t, err)
  70. id, _ := res.LastInsertId()
  71. return id
  72. }
  73. aId := mkUser("a")
  74. bId := mkUser("b")
  75. t.Cleanup(func() { testutil.CleanTable(ctx, conn, "`sys_user`", aId, bId) })
  76. cfg := testutil.GetTestConfig()
  77. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  78. svcCtx.TokenOpLimiter = limit.NewPeriodLimit(60, 1, rds, cfg.CacheRedis.KeyPrefix+":rl:logout:iso:"+testutil.UniqueId())
  79. lctxA := middleware.WithUserDetails(context.Background(), &loaders.UserDetails{UserId: aId, Status: 1})
  80. lctxB := middleware.WithUserDetails(context.Background(), &loaders.UserDetails{UserId: bId, Status: 1})
  81. require.NoError(t, NewLogoutLogic(lctxA, svcCtx).Logout())
  82. // A 打满后再打一次
  83. err := NewLogoutLogic(lctxA, svcCtx).Logout()
  84. require.Error(t, err)
  85. var ce *response.CodeError
  86. require.True(t, errors.As(err, &ce))
  87. assert.Equal(t, 429, ce.Code())
  88. require.NoError(t, NewLogoutLogic(lctxB, svcCtx).Logout(),
  89. "B 用户应当仍有独立配额,不被 A 用户的限流影响")
  90. }