File size: 16,748 Bytes
a21c316
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
//! IP Security Integration Tests
//! IP 安全功能的集成测试
//! 
//! 这些测试需要启动完整的代理服务器来验证端到端的功能

#[cfg(test)]
mod integration_tests {
    use crate::modules::security_db::{
        self, init_db, add_to_blacklist, remove_from_blacklist,
        add_to_whitelist, remove_from_whitelist, get_blacklist, get_whitelist,
    };
    use std::time::Duration;

    /// 辅助函数:清理测试环境
    fn cleanup_test_data() {
        if let Ok(entries) = get_blacklist() {
            for entry in entries {
                let _ = remove_from_blacklist(&entry.id);
            }
        }
        if let Ok(entries) = get_whitelist() {
            for entry in entries {
                let _ = remove_from_whitelist(&entry.id);
            }
        }
    }

    // ============================================================================
    // 集成测试场景 1:黑名单阻止请求
    // ============================================================================
    
    /// 测试场景:当 IP 在黑名单中时,请求应该被拒绝
    /// 
    /// 预期行为:
    /// 1. 添加 IP 到黑名单
    /// 2. 该 IP 发起的请求返回 403 Forbidden
    /// 3. 响应体包含封禁原因
    #[test]
    fn test_scenario_blacklist_blocks_request() {
        let _ = init_db();
        cleanup_test_data();

        // 添加测试 IP 到黑名单
        let entry = add_to_blacklist(
            "192.168.100.100",
            Some("Integration test - malicious activity"),
            None,
            "integration_test",
        );
        assert!(entry.is_ok(), "Should add IP to blacklist");

        // 验证黑名单条目存在
        let blacklist = get_blacklist().unwrap();
        let found = blacklist.iter().any(|e| e.ip_pattern == "192.168.100.100");
        assert!(found, "IP should be in blacklist");

        // 实际的 HTTP 请求测试需要启动服务器
        // 这里验证数据层正确性
        let is_blocked = security_db::is_ip_in_blacklist("192.168.100.100").unwrap();
        assert!(is_blocked, "IP should be blocked");

        cleanup_test_data();
    }

    // ============================================================================
    // 集成测试场景 2:白名单优先模式
    // ============================================================================
    
    /// 测试场景:白名单优先模式下,白名单 IP 跳过黑名单检查
    /// 
    /// 预期行为:
    /// 1. IP 同时存在于黑名单和白名单
    /// 2. 启用 whitelist_priority 模式
    /// 3. 请求应该被允许(白名单优先)
    #[test]
    fn test_scenario_whitelist_priority() {
        let _ = init_db();
        cleanup_test_data();

        // 添加 IP 到黑名单
        let _ = add_to_blacklist(
            "10.0.0.50",
            Some("Should be overridden by whitelist"),
            None,
            "test",
        );

        // 添加相同 IP 到白名单
        let _ = add_to_whitelist(
            "10.0.0.50",
            Some("Trusted - override blacklist"),
        );

        // 验证两个列表都包含该 IP
        assert!(security_db::is_ip_in_blacklist("10.0.0.50").unwrap());
        assert!(security_db::is_ip_in_whitelist("10.0.0.50").unwrap());

        // 在实际中间件中,whitelist_priority=true 时,会先检查白名单
        // 如果在白名单中,则跳过黑名单检查
        // 这里只验证数据正确性,中间件逻辑由 ip_filter.rs 保证

        cleanup_test_data();
    }

    // ============================================================================
    // 集成测试场景 3:临时封禁与过期
    // ============================================================================
    
    /// 测试场景:临时封禁在过期后自动解除
    /// 
    /// 预期行为:
    /// 1. 添加临时封禁(已过期)
    /// 2. 查询时自动清理过期条目
    /// 3. 请求应该被允许
    #[test]
    fn test_scenario_temporary_ban_expiration() {
        let _ = init_db();
        cleanup_test_data();

        // 获取当前时间戳
        let now = std::time::SystemTime::now()
            .duration_since(std::time::UNIX_EPOCH)
            .unwrap()
            .as_secs() as i64;

        // 添加已过期的临时封禁
        let _ = add_to_blacklist(
            "expired.ban.test",
            Some("Temporary ban - should be expired"),
            Some(now - 60), // 1分钟前过期
            "test",
        );

        // 查询时应该触发过期清理
        let is_blocked = security_db::is_ip_in_blacklist("expired.ban.test").unwrap();
        assert!(!is_blocked, "Expired ban should not block");

        cleanup_test_data();
    }

    // ============================================================================
    // 集成测试场景 4:CIDR 范围封禁
    // ============================================================================
    
    /// 测试场景:CIDR 范围封禁覆盖整个子网
    /// 
    /// 预期行为:
    /// 1. 封禁 192.168.1.0/24
    /// 2. 192.168.1.x 的所有请求被拒绝
    /// 3. 192.168.2.x 的请求正常通过
    #[test]
    fn test_scenario_cidr_subnet_blocking() {
        let _ = init_db();
        cleanup_test_data();

        // 封禁整个子网
        let _ = add_to_blacklist(
            "192.168.1.0/24",
            Some("Entire subnet blocked"),
            None,
            "test",
        );

        // 验证子网内的 IP 被阻止
        for last_octet in [1, 50, 100, 200, 254] {
            let ip = format!("192.168.1.{}", last_octet);
            let is_blocked = security_db::is_ip_in_blacklist(&ip).unwrap();
            assert!(is_blocked, "IP {} should be blocked by CIDR", ip);
        }

        // 验证子网外的 IP 不被阻止
        for last_octet in [1, 50, 100] {
            let ip = format!("192.168.2.{}", last_octet);
            let is_blocked = security_db::is_ip_in_blacklist(&ip).unwrap();
            assert!(!is_blocked, "IP {} should NOT be blocked", ip);
        }

        cleanup_test_data();
    }

    // ============================================================================
    // 集成测试场景 5:封禁消息详情
    // ============================================================================
    
    /// 测试场景:封禁响应包含详细信息
    /// 
    /// 预期行为:
    /// 1. 添加带原因的封禁
    /// 2. 请求被拒绝时,响应包含:
    ///    - 封禁原因
    ///    - 是否为临时/永久封禁
    ///    - 剩余封禁时间(如果是临时)
    #[test]
    fn test_scenario_ban_message_details() {
        let _ = init_db();
        cleanup_test_data();

        let now = std::time::SystemTime::now()
            .duration_since(std::time::UNIX_EPOCH)
            .unwrap()
            .as_secs() as i64;

        // 添加临时封禁(2小时后过期)
        let _ = add_to_blacklist(
            "temp.ban.message",
            Some("Rate limit exceeded"),
            Some(now + 7200), // 2小时后
            "rate_limiter",
        );

        // 获取封禁详情
        let entry = security_db::get_blacklist_entry_for_ip("temp.ban.message")
            .unwrap()
            .unwrap();

        assert_eq!(entry.reason.as_deref(), Some("Rate limit exceeded"));
        assert!(entry.expires_at.is_some());
        
        let remaining = entry.expires_at.unwrap() - now;
        assert!(remaining > 0 && remaining <= 7200, "Should have ~2h remaining");

        cleanup_test_data();
    }

    // ============================================================================
    // 集成测试场景 6:访问日志记录
    // ============================================================================
    
    /// 测试场景:被阻止的请求记录到日志
    /// 
    /// 预期行为:
    /// 1. 黑名单 IP 发起请求
    /// 2. 请求被拒绝
    /// 3. 访问日志记录:IP、时间、状态(403)、封禁原因
    #[test]
    fn test_scenario_blocked_request_logging() {
        let _ = init_db();
        cleanup_test_data();

        // 模拟保存被阻止的访问日志
        let log = security_db::IpAccessLog {
            id: uuid::Uuid::new_v4().to_string(),
            client_ip: "blocked.request.test".to_string(),
            timestamp: std::time::SystemTime::now()
                .duration_since(std::time::UNIX_EPOCH)
                .unwrap()
                .as_secs() as i64,
            method: Some("POST".to_string()),
            path: Some("/v1/messages".to_string()),
            user_agent: Some("TestClient/1.0".to_string()),
            status: Some(403),
            duration: Some(0),
            api_key_hash: None,
            blocked: true,
            block_reason: Some("IP in blacklist".to_string()),
            username: None,
        };

        let save_result = security_db::save_ip_access_log(&log);
        assert!(save_result.is_ok());

        // 验证日志可以检索
        let logs = security_db::get_ip_access_logs(10, 0, None, true).unwrap();
        let found = logs.iter().any(|l| l.client_ip == "blocked.request.test");
        assert!(found, "Blocked request should be logged");

        let _ = security_db::clear_ip_access_logs();
    }

    // ============================================================================
    // 集成测试场景 7:不影响正常请求性能
    // ============================================================================
    
    /// 测试场景:安全检查不显著影响正常请求性能
    /// 
    /// 预期行为:
    /// 1. 黑名单/白名单检查时间 < 5ms
    /// 2. 与没有安全检查的基线相比,延迟增加 < 10ms
    #[test]
    fn test_scenario_performance_impact() {
        let _ = init_db();
        cleanup_test_data();

        // 添加一些黑名单条目
        for i in 0..50 {
            let _ = add_to_blacklist(&format!("perf.test.{}", i), None, None, "test");
        }

        // 添加一些 CIDR 规则
        for i in 0..10 {
            let _ = add_to_blacklist(&format!("172.{}.0.0/16", i), None, None, "test");
        }

        // 测试查找性能
        let start = std::time::Instant::now();
        let iterations = 100;

        for _ in 0..iterations {
            // 模拟正常请求的安全检查
            let _ = security_db::is_ip_in_whitelist("10.0.0.1");
            let _ = security_db::is_ip_in_blacklist("10.0.0.1");
        }

        let duration = start.elapsed();
        let avg_per_check = duration / (iterations * 2);

        println!("Average security check time: {:?}", avg_per_check);
        
        // 断言:平均每次检查应该在 5ms 以内
        assert!(
            avg_per_check < Duration::from_millis(5),
            "Security check should be fast"
        );

        cleanup_test_data();
    }

    // ============================================================================
    // 集成测试场景 8:数据持久化
    // ============================================================================
    
    /// 测试场景:黑名单/白名单数据持久化
    /// 
    /// 预期行为:
    /// 1. 添加数据后重新初始化数据库连接
    /// 2. 数据仍然存在
    #[test]
    fn test_scenario_data_persistence() {
        let _ = init_db();
        cleanup_test_data();

        // 添加数据
        let _ = add_to_blacklist("persist.test.ip", Some("Persistence test"), None, "test");
        let _ = add_to_whitelist("persist.white.ip", Some("Persistence test"));

        // 重新初始化(实际上只是验证数据仍然可读)
        let _ = init_db();

        // 验证数据仍然存在
        assert!(security_db::is_ip_in_blacklist("persist.test.ip").unwrap());
        assert!(security_db::is_ip_in_whitelist("persist.white.ip").unwrap());

        cleanup_test_data();
    }
}

// ============================================================================
// 压力测试
// ============================================================================

#[cfg(test)]
mod stress_tests {
    use crate::modules::security_db::{
        init_db, add_to_blacklist, remove_from_blacklist,
        is_ip_in_blacklist, get_blacklist, save_ip_access_log,
        IpAccessLog, clear_ip_access_logs,
    };
    use std::thread;
    use std::time::{Duration, Instant};

    /// 辅助函数:清理测试环境
    fn cleanup_test_data() {
        if let Ok(entries) = get_blacklist() {
            for entry in entries {
                let _ = remove_from_blacklist(&entry.id);
            }
        }
        let _ = clear_ip_access_logs();
    }

    /// 压力测试:大量黑名单条目
    #[test]
    fn stress_test_large_blacklist() {
        let _ = init_db();
        cleanup_test_data();

        let count = 500;

        // 批量添加
        let start = Instant::now();
        for i in 0..count {
            let _ = add_to_blacklist(&format!("stress.{}.{}.{}.{}", i/256, (i/16)%16, i%16, i), None, None, "stress");
        }
        let add_duration = start.elapsed();
        println!("Added {} entries in {:?}", count, add_duration);

        // 随机查找测试
        let start = Instant::now();
        for i in 0..100 {
            let _ = is_ip_in_blacklist(&format!("stress.{}.{}.{}.{}", i/256, (i/16)%16, i%16, i));
        }
        let lookup_duration = start.elapsed();
        println!("100 lookups in large blacklist took {:?}", lookup_duration);

        // 验证性能合理
        assert!(
            lookup_duration < Duration::from_secs(1),
            "Lookups should be reasonably fast even with large blacklist"
        );

        cleanup_test_data();
    }

    /// 压力测试:大量访问日志
    #[test]
    fn stress_test_access_logging() {
        let _ = init_db();
        let _ = clear_ip_access_logs();

        let count = 1000;
        let now = std::time::SystemTime::now()
            .duration_since(std::time::UNIX_EPOCH)
            .unwrap()
            .as_secs() as i64;

        // 批量写入日志
        let start = Instant::now();
        for i in 0..count {
            let log = IpAccessLog {
                id: uuid::Uuid::new_v4().to_string(),
                client_ip: format!("log.stress.{}", i % 100),
                timestamp: now,
                method: Some("POST".to_string()),
                path: Some("/v1/messages".to_string()),
                user_agent: Some("StressTest/1.0".to_string()),
                status: Some(200),
                duration: Some(100),
                api_key_hash: Some("hash".to_string()),
                blocked: false,
                block_reason: None,
                username: None,
            };
            let _ = save_ip_access_log(&log);
        }
        let write_duration = start.elapsed();
        println!("Wrote {} access logs in {:?}", count, write_duration);

        // 验证写入性能合理
        assert!(
            write_duration < Duration::from_secs(10),
            "Access log writing should be reasonably fast"
        );

        let _ = clear_ip_access_logs();
    }

    /// 压力测试:并发操作
    #[test]
    fn stress_test_concurrent_operations() {
        let _ = init_db();
        cleanup_test_data();

        let thread_count = 5;
        let ops_per_thread = 20;

        let handles: Vec<_> = (0..thread_count)
            .map(|t| {
                thread::spawn(move || {
                    for i in 0..ops_per_thread {
                        // 每个线程添加-查询-删除
                        let ip = format!("concurrent.{}.{}", t, i);
                        if let Ok(entry) = add_to_blacklist(&ip, None, None, "concurrent") {
                            let _ = is_ip_in_blacklist(&ip);
                            let _ = remove_from_blacklist(&entry.id);
                        }
                    }
                })
            })
            .collect();

        // 等待所有线程完成
        for handle in handles {
            handle.join().expect("Thread should not panic");
        }

        // 验证没有遗留数据
        let remaining = get_blacklist().unwrap();
        let concurrent_remaining: Vec<_> = remaining
            .iter()
            .filter(|e| e.ip_pattern.starts_with("concurrent."))
            .collect();
        
        assert!(
            concurrent_remaining.is_empty(),
            "All concurrent test data should be cleaned up"
        );

        cleanup_test_data();
    }
}