This commit is contained in:
Mrx
2026-02-11 15:49:10 +08:00
parent 07ad436fd5
commit ef6ca3b9da
4 changed files with 90 additions and 8 deletions

View File

@@ -4,7 +4,6 @@ import (
"context" "context"
"database/sql" "database/sql"
"fmt" "fmt"
"os"
"strconv" "strconv"
"time" "time"
"ycc-server/app/main/model" "ycc-server/app/main/model"
@@ -48,8 +47,8 @@ func (l *RegisterByInviteCodeLogic) RegisterByInviteCode(req *types.RegisterByIn
} }
l.Infof("[RegisterByInviteCode] 手机号加密完成, encryptedMobile: %s", encryptedMobile) l.Infof("[RegisterByInviteCode] 手机号加密完成, encryptedMobile: %s", encryptedMobile)
// 校验验证码(开发环境下跳过验证码校验) // 校验验证码(验证码 168888、143838 为测试用万能码,开发/生产环境均可跳过校验)
if os.Getenv("ENV") != "development" && req.Code != "143838" { if req.Code != "143838" && req.Code != "168888" {
redisKey := fmt.Sprintf("%s:%s", "agentApply", encryptedMobile) redisKey := fmt.Sprintf("%s:%s", "agentApply", encryptedMobile)
cacheCode, err := l.svcCtx.Redis.Get(redisKey) cacheCode, err := l.svcCtx.Redis.Get(redisKey)
if err != nil { if err != nil {
@@ -65,7 +64,7 @@ func (l *RegisterByInviteCodeLogic) RegisterByInviteCode(req *types.RegisterByIn
} }
l.Infof("[RegisterByInviteCode] 验证码校验通过, mobile: %s", req.Mobile) l.Infof("[RegisterByInviteCode] 验证码校验通过, mobile: %s", req.Mobile)
} else { } else {
l.Infof("[RegisterByInviteCode] 开发环境跳过验证码校验") l.Infof("[RegisterByInviteCode] 使用万能码跳过验证码校验")
} }
// 获取当前登录态(可能为空) // 获取当前登录态(可能为空)

View File

@@ -4,7 +4,6 @@ import (
"context" "context"
"database/sql" "database/sql"
"fmt" "fmt"
"os"
"time" "time"
"ycc-server/app/main/api/internal/svc" "ycc-server/app/main/api/internal/svc"
@@ -53,8 +52,8 @@ func (l *BindMobileLogic) BindMobile(req *types.BindMobileReq) (resp *types.Bind
if err != nil { if err != nil {
return nil, errors.Wrapf(xerr.NewErrCode(xerr.SERVER_COMMON_ERROR), "加密手机号失败: %v", err) return nil, errors.Wrapf(xerr.NewErrCode(xerr.SERVER_COMMON_ERROR), "加密手机号失败: %v", err)
} }
// 非开发环境下校验短信验证码从Redis读取并比对 // 校验短信验证码从Redis读取并比对;验证码 168888 为测试用万能码,开发/生产环境均可跳过校验
if os.Getenv("ENV") != "development" { if req.Code != "168888" {
redisKey := fmt.Sprintf("%s:%s", "bindMobile", encryptedMobile) redisKey := fmt.Sprintf("%s:%s", "bindMobile", encryptedMobile)
cacheCode, err := l.svcCtx.Redis.Get(redisKey) cacheCode, err := l.svcCtx.Redis.Get(redisKey)
if err != nil { if err != nil {

View File

@@ -8,7 +8,7 @@ services:
TZ: Asia/Shanghai TZ: Asia/Shanghai
# root 密码 - root password # root 密码 - root password
MYSQL_ROOT_PASSWORD: yfg87gyuYiy1 MYSQL_ROOT_PASSWORD: yfg87gyuYiy1
MYSQL_DATABASE: ycc MYSQL_DATABASE: yccq
MYSQL_USER: ycc MYSQL_USER: ycc
MYSQL_PASSWORD: 5vg67b3UNHu8 MYSQL_PASSWORD: 5vg67b3UNHu8
ports: ports:

View File

@@ -61,6 +61,90 @@ func TestAesEcbHexEncryption(t *testing.T) {
} }
} }
// 需要解密的身份证密文(可替换为其他密文进行测试)
const encryptedIDCardForTest = "z4pIrjlrpfsBtF74kvtRWnjM2UTx8Uq8HVA8dk9hSeI="
// TestDecryptIDCard 身份证解密单元测试(已知密文)
func TestDecryptIDCard(t *testing.T) {
fmt.Printf("encryptedIDC开始解密")
key, _ := hex.DecodeString("ff83609b2b24fc73196aac3d3dfb874f")
fmt.Printf("key: %s\n", key)
decrypted, err := DecryptIDCard(encryptedIDCardForTest, key)
if err != nil {
t.Fatalf("身份证解密失败: %v", err)
}
fmt.Printf("decrypted: %s\n", decrypted)
}
// TestEncryptIDCard_DecryptIDCard 身份证加密解密 round-trip 测试
func TestEncryptIDCard_DecryptIDCard(t *testing.T) {
idCard := "360733199005090032"
key, _ := hex.DecodeString("ff83609b2b24fc73196aac3d3dfb874f")
// 加密
fmt.Printf("idCard: %s\n", idCard)
encrypted, err := EncryptIDCard(idCard, key)
if err != nil {
t.Fatalf("身份证加密失败: %v", err)
}
fmt.Printf("encrypted: %s\n", encrypted)
// 解密
decrypted, err := DecryptIDCard(encrypted, key)
if err != nil {
t.Fatalf("身份证解密失败: %v", err)
}
if decrypted != idCard {
t.Errorf("解密结果不匹配,期望: %s, 实际: %s", idCard, decrypted)
}
}
// TestDecryptIDCard_EdgeCases 身份证解密边界情况
func TestDecryptIDCard_EdgeCases(t *testing.T) {
key, _ := hex.DecodeString("ff83609b2b24fc73196aac3d3dfb874f")
t.Run("空密文", func(t *testing.T) {
_, err := DecryptIDCard("", key)
if err == nil {
t.Error("空密文应返回错误")
}
})
t.Run("无效Base64", func(t *testing.T) {
_, err := DecryptIDCard("invalid-base64!!!@#$", key)
if err == nil {
t.Error("无效Base64应返回错误")
}
})
t.Run("错误密钥", func(t *testing.T) {
encrypted, err := EncryptIDCard("440101199001011234", key)
if err != nil {
t.Fatalf("加密失败: %v", err)
}
wrongKey, _ := hex.DecodeString("00000000000000000000000000000000")
_, err = DecryptIDCard(encrypted, wrongKey)
if err == nil {
t.Error("错误密钥应返回错误")
}
})
t.Run("密文长度不是块大小整数倍", func(t *testing.T) {
shortCipher := base64.StdEncoding.EncodeToString([]byte("short"))
_, err := DecryptIDCard(shortCipher, key)
if err == nil {
t.Error("密文长度异常应返回错误")
}
})
t.Run("加密空身份证应返回错误", func(t *testing.T) {
_, err := EncryptIDCard("", key)
if err == nil {
t.Error("空身份证号应返回错误")
}
})
}
func TestAesEcbKeyValidation(t *testing.T) { func TestAesEcbKeyValidation(t *testing.T) {
// 测试不同长度的密钥 // 测试不同长度的密钥
validKeys := [][]byte{ validKeys := [][]byte{