adminLoginLogic_test.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475
  1. package pub
  2. import (
  3. "context"
  4. "errors"
  5. "github.com/stretchr/testify/assert"
  6. "github.com/stretchr/testify/require"
  7. "github.com/zeromicro/go-zero/core/limit"
  8. "github.com/zeromicro/go-zero/core/stores/redis"
  9. "perms-system-server/internal/middleware"
  10. "perms-system-server/internal/response"
  11. "perms-system-server/internal/svc"
  12. "perms-system-server/internal/testutil"
  13. "perms-system-server/internal/types"
  14. "testing"
  15. "time"
  16. )
  17. func TestAdminLogin_SuperAdmin(t *testing.T) {
  18. ctx := context.Background()
  19. svcCtx := newTestSvcCtx()
  20. username := testutil.UniqueId()
  21. password := "TestPass123"
  22. _, cleanUser := insertTestUser(t, ctx, svcCtx, username, password, 1, 1)
  23. t.Cleanup(cleanUser)
  24. logic := NewAdminLoginLogic(ctx, svcCtx)
  25. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  26. Username: username,
  27. Password: password,
  28. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  29. })
  30. require.NoError(t, err)
  31. require.NotNil(t, resp)
  32. assert.NotEmpty(t, resp.AccessToken)
  33. assert.NotEmpty(t, resp.RefreshToken)
  34. assert.True(t, resp.Expires > time.Now().Unix(), "expires应为未来的unix时间戳")
  35. assert.Equal(t, username, resp.UserInfo.Username)
  36. assert.Equal(t, int64(1), resp.UserInfo.IsSuperAdmin)
  37. assert.Nil(t, resp.UserInfo.Perms)
  38. assert.Equal(t, "SUPER_ADMIN", resp.UserInfo.MemberType)
  39. }
  40. // TC-0016: 普通用户被拒绝(1修复: 仅超管可通过管理后台登录)
  41. func TestAdminLogin_NormalUserRejected(t *testing.T) {
  42. ctx := context.Background()
  43. svcCtx := newTestSvcCtx()
  44. username := testutil.UniqueId()
  45. password := "TestPass123"
  46. _, cleanUser := insertTestUser(t, ctx, svcCtx, username, password, 1, 2)
  47. t.Cleanup(cleanUser)
  48. logic := NewAdminLoginLogic(ctx, svcCtx)
  49. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  50. Username: username,
  51. Password: password,
  52. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  53. })
  54. require.Nil(t, resp)
  55. require.Error(t, err)
  56. var codeErr *response.CodeError
  57. require.True(t, errors.As(err, &codeErr))
  58. assert.Equal(t, 401, codeErr.Code())
  59. assert.Equal(t, "用户名或密码错误", codeErr.Error())
  60. }
  61. // TC-0017: managementKey无效
  62. func TestAdminLogin_InvalidManagementKey(t *testing.T) {
  63. ctx := context.Background()
  64. svcCtx := newTestSvcCtx()
  65. logic := NewAdminLoginLogic(ctx, svcCtx)
  66. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  67. Username: "anyone",
  68. Password: "pass",
  69. ManagementKey: "wrong-key",
  70. })
  71. require.Nil(t, resp)
  72. require.Error(t, err)
  73. var codeErr *response.CodeError
  74. require.True(t, errors.As(err, &codeErr))
  75. assert.Equal(t, 401, codeErr.Code())
  76. assert.Equal(t, "managementKey无效", codeErr.Error())
  77. }
  78. // TC-0018: managementKey为空
  79. func TestAdminLogin_EmptyManagementKey(t *testing.T) {
  80. ctx := context.Background()
  81. svcCtx := newTestSvcCtx()
  82. logic := NewAdminLoginLogic(ctx, svcCtx)
  83. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  84. Username: "anyone",
  85. Password: "pass",
  86. ManagementKey: "",
  87. })
  88. require.Nil(t, resp)
  89. require.Error(t, err)
  90. var codeErr *response.CodeError
  91. require.True(t, errors.As(err, &codeErr))
  92. assert.Equal(t, 401, codeErr.Code())
  93. assert.Equal(t, "managementKey无效", codeErr.Error())
  94. }
  95. // TC-0019: 用户不存在
  96. func TestAdminLogin_UserNotFound(t *testing.T) {
  97. ctx := context.Background()
  98. svcCtx := newTestSvcCtx()
  99. logic := NewAdminLoginLogic(ctx, svcCtx)
  100. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  101. Username: "nonexistent_" + testutil.UniqueId(),
  102. Password: "whatever",
  103. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  104. })
  105. require.Nil(t, resp)
  106. require.Error(t, err)
  107. var codeErr *response.CodeError
  108. require.True(t, errors.As(err, &codeErr))
  109. assert.Equal(t, 401, codeErr.Code())
  110. assert.Equal(t, "用户名或密码错误", codeErr.Error())
  111. }
  112. // TC-0020: 密码错误
  113. func TestAdminLogin_WrongPassword(t *testing.T) {
  114. ctx := context.Background()
  115. svcCtx := newTestSvcCtx()
  116. username := testutil.UniqueId()
  117. _, cleanUser := insertTestUser(t, ctx, svcCtx, username, "CorrectPass", 1, 2)
  118. t.Cleanup(cleanUser)
  119. logic := NewAdminLoginLogic(ctx, svcCtx)
  120. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  121. Username: username,
  122. Password: "WrongPass",
  123. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  124. })
  125. require.Nil(t, resp)
  126. require.Error(t, err)
  127. var codeErr *response.CodeError
  128. require.True(t, errors.As(err, &codeErr))
  129. assert.Equal(t, 401, codeErr.Code())
  130. assert.Equal(t, "用户名或密码错误", codeErr.Error())
  131. }
  132. // TC-0021: 账号冻结
  133. func TestAdminLogin_AccountFrozen(t *testing.T) {
  134. ctx := context.Background()
  135. svcCtx := newTestSvcCtx()
  136. username := testutil.UniqueId()
  137. password := "TestPass123"
  138. _, cleanUser := insertTestUser(t, ctx, svcCtx, username, password, 2, 2)
  139. t.Cleanup(cleanUser)
  140. logic := NewAdminLoginLogic(ctx, svcCtx)
  141. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  142. Username: username,
  143. Password: password,
  144. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  145. })
  146. require.Nil(t, resp)
  147. require.Error(t, err)
  148. var codeErr *response.CodeError
  149. require.True(t, errors.As(err, &codeErr))
  150. assert.Equal(t, 401, codeErr.Code())
  151. assert.Equal(t, "用户名或密码错误", codeErr.Error())
  152. }
  153. // TC-0022: 不带productCode时token无权限(perms为空)
  154. func TestAdminLogin_NoPermsWithoutProductCode(t *testing.T) {
  155. ctx := context.Background()
  156. svcCtx := newTestSvcCtx()
  157. username := testutil.UniqueId()
  158. password := "TestPass123"
  159. _, cleanUser := insertTestUser(t, ctx, svcCtx, username, password, 1, 1)
  160. t.Cleanup(cleanUser)
  161. logic := NewAdminLoginLogic(ctx, svcCtx)
  162. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  163. Username: username,
  164. Password: password,
  165. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  166. })
  167. require.NoError(t, err)
  168. require.NotNil(t, resp)
  169. assert.Nil(t, resp.UserInfo.Perms, "管理后台不传productCode,不应加载权限列表")
  170. assert.Equal(t, "SUPER_ADMIN", resp.UserInfo.MemberType, "超管即使不传productCode也会被标记SUPER_ADMIN")
  171. }
  172. // TC-0025: adminLogin 用户名级别限流(修复验证)
  173. func TestAdminLogin_UsernameRateLimit(t *testing.T) {
  174. ctx := context.Background()
  175. svcCtx := newTestSvcCtx()
  176. require.NotNil(t, svcCtx.UsernameLoginLimit, "UsernameLoginLimit 应被配置")
  177. username := "rl_" + testutil.UniqueId()
  178. logic := NewAdminLoginLogic(ctx, svcCtx)
  179. var last error
  180. for i := 0; i < 11; i++ {
  181. _, last = logic.AdminLogin(&types.AdminLoginReq{
  182. Username: username,
  183. Password: "wrong_pass",
  184. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  185. })
  186. require.Error(t, last)
  187. }
  188. var ce *response.CodeError
  189. require.True(t, errors.As(last, &ce))
  190. assert.Equal(t, 429, ce.Code(), "第11次应被用户名级限流")
  191. }
  192. // TC-0024: SQL注入username
  193. func TestAdminLogin_SQLInjection(t *testing.T) {
  194. ctx := context.Background()
  195. svcCtx := newTestSvcCtx()
  196. logic := NewAdminLoginLogic(ctx, svcCtx)
  197. resp, err := logic.AdminLogin(&types.AdminLoginReq{
  198. Username: "' OR 1=1 --",
  199. Password: "anything",
  200. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  201. })
  202. require.Nil(t, resp)
  203. require.Error(t, err)
  204. var codeErr *response.CodeError
  205. require.True(t, errors.As(err, &codeErr))
  206. assert.Equal(t, 401, codeErr.Code())
  207. assert.Equal(t, "用户名或密码错误", codeErr.Error())
  208. }
  209. func newAdminLimitSvcCtx(t *testing.T, quota int) *svc.ServiceContext {
  210. t.Helper()
  211. cfg := testutil.GetTestConfig()
  212. rds := redis.MustNewRedis(cfg.CacheRedis.Nodes[0].RedisConf)
  213. svcCtx := newTestSvcCtx()
  214. svcCtx.UsernameLoginLimit = limit.NewPeriodLimit(300, quota, rds,
  215. cfg.CacheRedis.KeyPrefix+":rl:adminlogin:ut:"+testutil.UniqueId())
  216. return svcCtx
  217. }
  218. // TC-0834: 同 IP + 同 username 超过 quota 必须 429,文案为新版本。
  219. func TestAdminLogin_H1_SameIPSameUsername_OverQuota429(t *testing.T) {
  220. svcCtx := newAdminLimitSvcCtx(t, 1)
  221. username := "h1_user_" + testutil.UniqueId()
  222. ctx := middleware.WithClientIP(context.Background(), "1.2.3.4")
  223. req := &types.AdminLoginReq{
  224. Username: username,
  225. Password: "bad",
  226. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  227. }
  228. _, err := NewAdminLoginLogic(ctx, svcCtx).AdminLogin(req)
  229. require.Error(t, err)
  230. var ce *response.CodeError
  231. require.True(t, errors.As(err, &ce))
  232. assert.Equal(t, 401, ce.Code(), "首次调用应被限流放行并进入业务层,得到 401")
  233. _, err = NewAdminLoginLogic(ctx, svcCtx).AdminLogin(req)
  234. require.Error(t, err)
  235. require.True(t, errors.As(err, &ce))
  236. assert.Equal(t, 429, ce.Code(), "同 IP+同 username 第二次必须 429")
  237. assert.Equal(t, "登录尝试过于频繁,请5分钟后再试", ce.Error())
  238. }
  239. // TC-0835: 同 username 换远端 IP 不得继承配额。
  240. func TestAdminLogin_H1_DifferentIPSameUsername_IndependentBucket(t *testing.T) {
  241. svcCtx := newAdminLimitSvcCtx(t, 1)
  242. username := "h1_iso_" + testutil.UniqueId()
  243. req := &types.AdminLoginReq{
  244. Username: username,
  245. Password: "bad",
  246. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  247. }
  248. ctxA := middleware.WithClientIP(context.Background(), "10.0.0.1")
  249. _, err := NewAdminLoginLogic(ctxA, svcCtx).AdminLogin(req)
  250. require.Error(t, err)
  251. var ce *response.CodeError
  252. require.True(t, errors.As(err, &ce))
  253. assert.Equal(t, 401, ce.Code())
  254. _, err = NewAdminLoginLogic(ctxA, svcCtx).AdminLogin(req)
  255. require.Error(t, err)
  256. require.True(t, errors.As(err, &ce))
  257. assert.Equal(t, 429, ce.Code(), "IP-A 配额已满")
  258. ctxB := middleware.WithClientIP(context.Background(), "10.0.0.2")
  259. _, err = NewAdminLoginLogic(ctxB, svcCtx).AdminLogin(req)
  260. require.Error(t, err)
  261. require.True(t, errors.As(err, &ce))
  262. assert.Equal(t, 401, ce.Code(),
  263. "换远端 IP 必须命中独立限流桶,不能被同 username 的旧计数拖连")
  264. }
  265. // TC-0836: ctx 里无 clientIP —— 退化为 "unknown" 共享桶,仍能限流,不得绕过。
  266. func TestAdminLogin_H1_MissingClientIP_FallbackBucket(t *testing.T) {
  267. svcCtx := newAdminLimitSvcCtx(t, 1)
  268. username := "h1_unk_" + testutil.UniqueId()
  269. req := &types.AdminLoginReq{
  270. Username: username,
  271. Password: "bad",
  272. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  273. }
  274. ctx := context.Background()
  275. _, err := NewAdminLoginLogic(ctx, svcCtx).AdminLogin(req)
  276. require.Error(t, err)
  277. var ce *response.CodeError
  278. require.True(t, errors.As(err, &ce))
  279. assert.Equal(t, 401, ce.Code())
  280. _, err = NewAdminLoginLogic(ctx, svcCtx).AdminLogin(req)
  281. require.Error(t, err)
  282. require.True(t, errors.As(err, &ce))
  283. assert.Equal(t, 429, ce.Code(),
  284. "无 clientIP 时应该退化到 'unknown' 桶继续限流,严禁直接绕过")
  285. }
  286. // TC-0837: managementKey 错误路径不消耗 username quota(Take 顺序冻结)。
  287. func TestAdminLogin_H1_BadManagementKey_DoesNotConsumeQuota(t *testing.T) {
  288. svcCtx := newAdminLimitSvcCtx(t, 1)
  289. username := "h1_mk_" + testutil.UniqueId()
  290. ctx := middleware.WithClientIP(context.Background(), "172.16.0.9")
  291. _, err := NewAdminLoginLogic(ctx, svcCtx).AdminLogin(&types.AdminLoginReq{
  292. Username: username,
  293. Password: "whatever",
  294. ManagementKey: "WRONG-KEY",
  295. })
  296. require.Error(t, err)
  297. var ce *response.CodeError
  298. require.True(t, errors.As(err, &ce))
  299. assert.Equal(t, 401, ce.Code())
  300. assert.Equal(t, "managementKey无效", ce.Error())
  301. _, err = NewAdminLoginLogic(ctx, svcCtx).AdminLogin(&types.AdminLoginReq{
  302. Username: username,
  303. Password: "whatever",
  304. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  305. })
  306. require.Error(t, err)
  307. require.True(t, errors.As(err, &ce))
  308. assert.Equal(t, 401, ce.Code(),
  309. "managementKey 错误应在 Take 之前 return,不应消耗 per-IP+user 配额")
  310. }
  311. func TestAdminLogin_LN3_NonSuperAdminWrongPassword_IndistinguishableFromAbsent(t *testing.T) {
  312. ctx := context.Background()
  313. svcCtx := newTestSvcCtx()
  314. svcCtx.UsernameLoginLimit = nil
  315. username := "ln3_nonsa_" + testutil.UniqueId()
  316. // status=1(启用),isSuperAdmin=2(普通用户)
  317. _, clean := insertTestUser(t, ctx, svcCtx, username, "RightPass123", 1, 2)
  318. t.Cleanup(clean)
  319. logic := NewAdminLoginLogic(ctx, svcCtx)
  320. // (B) 用户存在但非超管 —— 走 新增的 dummy bcrypt 分支
  321. _, errExisting := logic.AdminLogin(&types.AdminLoginReq{
  322. Username: username,
  323. Password: "WrongPass",
  324. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  325. })
  326. require.Error(t, errExisting)
  327. var ceB *response.CodeError
  328. require.True(t, errors.As(errExisting, &ceB))
  329. // (A) 用户不存在 —— 原有 dummy bcrypt 分支
  330. _, errAbsent := logic.AdminLogin(&types.AdminLoginReq{
  331. Username: "ln3_absent_" + testutil.UniqueId(),
  332. Password: "WhateverPass",
  333. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  334. })
  335. require.Error(t, errAbsent)
  336. var ceA *response.CodeError
  337. require.True(t, errors.As(errAbsent, &ceA))
  338. assert.Equal(t, ceA.Code(), ceB.Code(),
  339. "'非超管 + 错误密码' 与 '用户不存在' 必须返回相同 code")
  340. assert.Equal(t, ceA.Error(), ceB.Error(),
  341. "'非超管 + 错误密码' 与 '用户不存在' 必须返回相同 body")
  342. assert.Equal(t, "用户名或密码错误", ceB.Error())
  343. }
  344. // TC-1009: 非超管账号 + 任意密码(包括正确密码)都必须 401,且仍触发一次 bcrypt,
  345. // 保证即使攻击者命中密码,也不得通过 response 推断该账号是"存在的普通用户"。
  346. func TestAdminLogin_LN3_NonSuperAdminCorrectPassword_Still401(t *testing.T) {
  347. ctx := context.Background()
  348. svcCtx := newTestSvcCtx()
  349. svcCtx.UsernameLoginLimit = nil
  350. username := "ln3_cp_" + testutil.UniqueId()
  351. password := "KnownPass123"
  352. _, clean := insertTestUser(t, ctx, svcCtx, username, password, 1, 2)
  353. t.Cleanup(clean)
  354. _, err := NewAdminLoginLogic(ctx, svcCtx).AdminLogin(&types.AdminLoginReq{
  355. Username: username,
  356. Password: password,
  357. ManagementKey: svcCtx.Config.Auth.ManagementKey,
  358. })
  359. require.Error(t, err)
  360. var ce *response.CodeError
  361. require.True(t, errors.As(err, &ce))
  362. assert.Equal(t, 401, ce.Code(),
  363. "非超管走 AdminLogin 一律 401,即使密码正确也不得披露账号存在性")
  364. assert.Equal(t, "用户名或密码错误", ce.Error())
  365. }
  366. // TC-1010: 时序等齐 —— "非超管 + 错密码" 必须与 "用户不存在" 同阶(两者都走一次 dummyBcryptHash)。
  367. //
  368. // 注意:测试环境里通过 testutil.HashPassword 生成真实用户的 bcrypt 哈希时使用了 MinCost(cost=4)
  369. // 以提速;而生产代码里的 dummyBcryptHash 固定用 DefaultCost(cost=10)。因此"超管 + 错密码"走
  370. // 真 bcrypt(cost=4) 会显著快于两条 dummy 分支,这里无法把 SA+wrong 的耗时纳入对比。
  371. // 本 TC 只对比两条 dummy 分支——它们共用同一份 dummyBcryptHash,理应严格齐平(2× 以内)。
  372. // 若非超管分支被回退到"不走 dummy bcrypt",dNonSa 会突然下降一个数量级,ratio 会突破 5× 触发 FAIL。
  373. func TestAdminLogin_LN3_DummyBcryptBranches_TimingEqualized(t *testing.T) {
  374. if testing.Short() {
  375. t.Skip("timing-sensitive test skipped under -short")
  376. }
  377. ctx := context.Background()
  378. svcCtx := newTestSvcCtx()
  379. svcCtx.UsernameLoginLimit = nil
  380. normalUser := "ln3_t_nm_" + testutil.UniqueId()
  381. _, cleanNm := insertTestUser(t, ctx, svcCtx, normalUser, "RealNormalPass123", 1, 2)
  382. t.Cleanup(cleanNm)
  383. logic := NewAdminLoginLogic(ctx, svcCtx)
  384. mk := svcCtx.Config.Auth.ManagementKey
  385. measure := func(username, password string) time.Duration {
  386. _, _ = logic.AdminLogin(&types.AdminLoginReq{Username: username, Password: password, ManagementKey: mk})
  387. const N = 3
  388. var total time.Duration
  389. for i := 0; i < N; i++ {
  390. start := time.Now()
  391. _, _ = logic.AdminLogin(&types.AdminLoginReq{Username: username, Password: password, ManagementKey: mk})
  392. total += time.Since(start)
  393. }
  394. return total / N
  395. }
  396. dAbsent := measure("ln3_absent_"+testutil.UniqueId(), "xx")
  397. dNonSa := measure(normalUser, "WrongPass")
  398. t.Logf("dummy bcrypt timing: absent=%v nonSa=%v", dAbsent, dNonSa)
  399. ratio := func(a, b time.Duration) float64 {
  400. if b <= 0 {
  401. return 0
  402. }
  403. if a > b {
  404. return float64(a) / float64(b)
  405. }
  406. return float64(b) / float64(a)
  407. }
  408. const tol = 3.0 // CI 抖动容忍
  409. assert.Less(t, ratio(dNonSa, dAbsent), tol,
  410. "'非超管 + 错密码' 必须与 '用户不存在' 耗时同阶;若 >3× 说明 L-N3 被回退(非超管分支没走 dummy bcrypt)")
  411. }