phone-decrypt.integration.test.ts 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235
  1. import { describe, it, expect, beforeEach, vi, afterEach } from 'vitest';
  2. import { testClient } from 'hono/testing';
  3. import { authRoutes } from '../../src/routes';
  4. import { IntegrationTestDatabase, setupIntegrationDatabaseHooksWithEntities } from '@d8d/shared-test-util';
  5. import { UserEntity } from '@d8d/user-module';
  6. import { redisUtil } from '@d8d/shared-utils';
  7. import { File } from '@d8d/file-module';
  8. // Mock MiniAuthService 的 decryptPhoneNumber 方法
  9. vi.mock('../../src/services/mini-auth.service', () => ({
  10. MiniAuthService: vi.fn().mockImplementation(() => ({
  11. decryptPhoneNumber: vi.fn().mockImplementation(async (encryptedData: string, iv: string, sessionKey: string) => {
  12. // 模拟解密过程
  13. if (!encryptedData || !iv || !sessionKey) {
  14. throw { code: 400, message: '加密数据或初始向量不能为空' };
  15. }
  16. // 根据不同的加密数据返回不同的手机号用于测试
  17. if (encryptedData === 'valid_encrypted_data') {
  18. return '13800138000';
  19. } else if (encryptedData === 'another_valid_data') {
  20. return '13900139000';
  21. } else {
  22. throw { code: 400, message: '解密失败' };
  23. }
  24. })
  25. }))
  26. }));
  27. // 设置集成测试钩子
  28. setupIntegrationDatabaseHooksWithEntities([UserEntity, File])
  29. describe('手机号解密API集成测试', () => {
  30. let client: ReturnType<typeof testClient<typeof authRoutes>>;
  31. let testToken: string;
  32. let testUser: UserEntity;
  33. let getSessionKeySpy: any;
  34. beforeEach(async () => {
  35. // 创建测试客户端
  36. client = testClient(authRoutes);
  37. // 获取数据源
  38. const dataSource = await IntegrationTestDatabase.getDataSource();
  39. // 创建测试用户
  40. const userRepository = dataSource.getRepository(UserEntity);
  41. testUser = userRepository.create({
  42. username: `test_user_${Date.now()}`,
  43. password: 'test_password',
  44. nickname: '测试用户',
  45. phone: null, // 初始手机号为null
  46. registrationSource: 'web'
  47. });
  48. await userRepository.save(testUser);
  49. // 生成测试用户的token
  50. // 这里简化处理,实际项目中应该使用正确的JWT生成方法
  51. testToken = 'test_jwt_token';
  52. // 使用 spyOn 来 mock getSessionKey 方法
  53. getSessionKeySpy = vi.spyOn(redisUtil, 'getSessionKey').mockResolvedValue('mock-session-key');
  54. });
  55. afterEach(() => {
  56. // 清理 spy
  57. if (getSessionKeySpy) {
  58. getSessionKeySpy.mockRestore();
  59. }
  60. });
  61. describe('POST /auth/phone-decrypt', () => {
  62. it('应该成功解密手机号并更新用户信息', async () => {
  63. const requestData = {
  64. encryptedData: 'valid_encrypted_data',
  65. iv: 'encryption_iv'
  66. };
  67. const response = await client['phone-decrypt'].$post({
  68. json: requestData
  69. },
  70. {
  71. headers: {
  72. 'Authorization': `Bearer ${testToken}`
  73. }
  74. });
  75. expect(response.status).toBe(200);
  76. if (response.status === 200) {
  77. const data = await response.json();
  78. // 验证响应数据格式
  79. expect(data).toHaveProperty('phoneNumber');
  80. expect(data).toHaveProperty('user');
  81. expect(data.phoneNumber).toBe('13800138000');
  82. expect(data.user.phone).toBe('13800138000');
  83. expect(data.user.id).toBe(testUser.id);
  84. }
  85. // 验证数据库中的用户手机号已更新
  86. const dataSource = await IntegrationTestDatabase.getDataSource();
  87. const userRepository = dataSource.getRepository(UserEntity);
  88. const updatedUser = await userRepository.findOne({
  89. where: { id: testUser.id }
  90. });
  91. expect(updatedUser?.phone).toBe('13800138000');
  92. });
  93. it('应该处理用户不存在的情况', async () => {
  94. const requestData = {
  95. encryptedData: 'valid_encrypted_data',
  96. iv: 'encryption_iv'
  97. };
  98. // 使用不存在的用户ID生成token
  99. const nonExistentUserToken = 'non_existent_user_token';
  100. const response = await client['phone-decrypt'].$post({
  101. json: requestData
  102. },
  103. {
  104. headers: {
  105. 'Authorization': `Bearer ${nonExistentUserToken}`
  106. }
  107. });
  108. // 当用户不存在时,应该返回401或404
  109. expect(response.status).toBe(401);
  110. });
  111. it('应该处理解密失败的情况', async () => {
  112. const requestData = {
  113. encryptedData: '', // 空加密数据
  114. iv: 'encryption_iv'
  115. };
  116. const response = await client['phone-decrypt'].$post({
  117. json: requestData
  118. },
  119. {
  120. headers: {
  121. 'Authorization': `Bearer ${testToken}`
  122. }
  123. });
  124. expect(response.status).toBe(400);
  125. if (response.status === 400) {
  126. const data = await response.json();
  127. expect(data.message).toBe('加密数据或初始向量不能为空');
  128. }
  129. });
  130. it('应该处理无效的加密数据', async () => {
  131. const requestData = {
  132. encryptedData: 'invalid_encrypted_data',
  133. iv: 'encryption_iv'
  134. };
  135. const response = await client['phone-decrypt'].$post({
  136. json: requestData
  137. },
  138. {
  139. headers: {
  140. 'Authorization': `Bearer ${testToken}`
  141. }
  142. });
  143. expect(response.status).toBe(400);
  144. if (response.status === 400) {
  145. const data = await response.json();
  146. expect(data.message).toBe('解密失败');
  147. }
  148. });
  149. it('应该拒绝未认证用户的访问', async () => {
  150. const requestData = {
  151. encryptedData: 'valid_encrypted_data',
  152. iv: 'encryption_iv'
  153. };
  154. const response = await client['phone-decrypt'].$post({
  155. json: requestData
  156. });
  157. expect(response.status).toBe(401);
  158. });
  159. it('应该拒绝无效token的访问', async () => {
  160. const requestData = {
  161. encryptedData: 'valid_encrypted_data',
  162. iv: 'encryption_iv'
  163. };
  164. const response = await client['phone-decrypt'].$post({
  165. json: requestData
  166. },
  167. {
  168. headers: {
  169. 'Authorization': 'Bearer invalid_token'
  170. }
  171. });
  172. expect(response.status).toBe(401);
  173. });
  174. it('应该处理sessionKey过期的情况', async () => {
  175. const requestData = {
  176. encryptedData: 'valid_encrypted_data',
  177. iv: 'encryption_iv'
  178. };
  179. // 模拟 sessionKey 过期的情况
  180. getSessionKeySpy.mockResolvedValue(null);
  181. const response = await client['phone-decrypt'].$post({
  182. json: requestData
  183. },
  184. {
  185. headers: {
  186. 'Authorization': `Bearer ${testToken}`
  187. }
  188. });
  189. expect(response.status).toBe(400);
  190. if (response.status === 400) {
  191. const data = await response.json();
  192. expect(data.message).toBe('sessionKey已过期,请重新登录');
  193. }
  194. });
  195. });
  196. });