feat(admin): 콘텐츠 관리자 로그인 API 추가

This commit is contained in:
2026-05-07 14:14:48 +09:00
parent 870afb03da
commit 487c10d4d0
11 changed files with 262 additions and 2 deletions

View File

@@ -0,0 +1,22 @@
# 콘텐츠 관리자 권한 및 관리자 로그인 API 추가
## 작업 항목
- [x] `MemberRole`에 콘텐츠 관리자 권한을 추가한다.
- [x] 관리자 로그인 API 테스트를 먼저 추가하고 RED를 확인한다.
- [x] 관리자와 콘텐츠 관리자만 로그인 가능한 관리자 전용 로그인 API를 구현한다.
- [x] 응답을 `token`, `role`만 포함하도록 구현한다.
- [x] focused test, 관련 테스트, 스타일 검사를 실행하고 결과를 기록한다.
## 설계
- 새 권한은 기존 `MemberRole` enum에 `CONTENT_MANAGER`로 추가한다.
- 새 API는 관리자 도메인의 `/admin/member/login`으로 추가하고 인증 없이 호출 가능하도록 보안 설정에 permitAll을 추가한다.
- 서비스는 기존 이메일/비밀번호 인증 흐름과 JWT 생성 방식을 재사용하되, `ADMIN`, `CONTENT_MANAGER` 외 역할은 `common.error.bad_credentials` 예외로 거부한다.
- 응답 DTO는 관리자 로그인 전용으로 분리해 `token`, `role`만 노출한다.
## 검증 기록
- 2026-05-07: RED 확인: `./gradlew test --tests 'kr.co.vividnext.sodalive.admin.member.AdminMemberLoginServiceTest' --tests 'kr.co.vividnext.sodalive.admin.member.AdminMemberLoginControllerTest'` 실행 시 `AdminMemberLoginService`, `AdminMemberLoginController`, `AdminMemberLoginResponse`, `CONTENT_MANAGER`, `findByEmail` 미구현으로 `compileTestKotlin`이 실패함을 확인했다.
- 2026-05-07: GREEN 확인: 동일 focused test가 `BUILD SUCCESSFUL`로 통과해 관리자/콘텐츠 관리자 로그인 허용 및 일반 사용자 거부를 확인했다.
- 2026-05-07: API 응답 확인: `./gradlew test --tests 'kr.co.vividnext.sodalive.admin.member.AdminMemberLoginControllerTest.shouldReturnTokenAndRoleJson'``BUILD SUCCESSFUL`로 통과해 `POST /admin/member/login` JSON 응답의 `data.token`, `data.role`을 확인했다.
- 2026-05-07: 회귀 확인: `./gradlew test --tests 'kr.co.vividnext.sodalive.admin.member.*'``BUILD SUCCESSFUL`로 통과했다.
- 2026-05-07: 스타일 확인: `./gradlew ktlintCheck``BUILD SUCCESSFUL`로 통과했다.
- 2026-05-07: Kotlin LSP는 현재 환경에 `.kt` 서버가 설정되어 있지 않아 `lsp_diagnostics` 실행이 불가했다. 대신 Gradle 컴파일 포함 focused/관련 test와 ktlint로 검증했다.

View File

@@ -0,0 +1,15 @@
package kr.co.vividnext.sodalive.admin.member
import kr.co.vividnext.sodalive.common.ApiResponse
import kr.co.vividnext.sodalive.member.login.LoginRequest
import org.springframework.web.bind.annotation.PostMapping
import org.springframework.web.bind.annotation.RequestBody
import org.springframework.web.bind.annotation.RequestMapping
import org.springframework.web.bind.annotation.RestController
@RestController
@RequestMapping("/admin/member")
class AdminMemberLoginController(private val service: AdminMemberLoginService) {
@PostMapping("/login")
fun login(@RequestBody request: LoginRequest) = ApiResponse.ok(service.login(request))
}

View File

@@ -0,0 +1,8 @@
package kr.co.vividnext.sodalive.admin.member
import kr.co.vividnext.sodalive.member.MemberRole
data class AdminMemberLoginResponse(
val token: String,
val role: MemberRole
)

View File

@@ -0,0 +1,39 @@
package kr.co.vividnext.sodalive.admin.member
import kr.co.vividnext.sodalive.common.SodaException
import kr.co.vividnext.sodalive.jwt.TokenProvider
import kr.co.vividnext.sodalive.member.MemberAdapter
import kr.co.vividnext.sodalive.member.MemberRole
import kr.co.vividnext.sodalive.member.login.LoginRequest
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken
import org.springframework.security.crypto.password.PasswordEncoder
import org.springframework.stereotype.Service
@Service
class AdminMemberLoginService(
private val repository: AdminMemberRepository,
private val passwordEncoder: PasswordEncoder,
private val tokenProvider: TokenProvider
) {
fun login(request: LoginRequest): AdminMemberLoginResponse {
val member = repository.findByEmail(request.email)
?: throw SodaException(messageKey = "common.error.bad_credentials")
if (member.role != MemberRole.ADMIN && member.role != MemberRole.CONTENT_MANAGER) {
throw SodaException(messageKey = "common.error.bad_credentials")
}
if (!member.isActive || !passwordEncoder.matches(request.password, member.password)) {
throw SodaException(messageKey = "common.error.bad_credentials")
}
val authentication = UsernamePasswordAuthenticationToken(
MemberAdapter(member),
null,
MemberAdapter(member).authorities
)
val token = tokenProvider.createToken(authentication = authentication, memberId = member.id!!)
return AdminMemberLoginResponse(token = token, role = member.role)
}
}

View File

@@ -6,7 +6,9 @@ import kr.co.vividnext.sodalive.member.MemberRole
import kr.co.vividnext.sodalive.member.QMember.member
import org.springframework.data.jpa.repository.JpaRepository
interface AdminMemberRepository : JpaRepository<Member, Long>, AdminMemberQueryRepository
interface AdminMemberRepository : JpaRepository<Member, Long>, AdminMemberQueryRepository {
fun findByEmail(email: String?): Member?
}
interface AdminMemberQueryRepository {
fun getMemberTotalCount(role: MemberRole? = null): Int

View File

@@ -101,6 +101,10 @@ class AdminMemberService(
MemberRole.CREATOR -> messageSource.getMessage("admin.member.role.creator", langContext.lang).orEmpty()
MemberRole.AGENT -> messageSource.getMessage("admin.member.role.agent", langContext.lang).orEmpty()
MemberRole.BOT -> messageSource.getMessage("admin.member.role.bot", langContext.lang).orEmpty()
MemberRole.CONTENT_MANAGER ->
messageSource
.getMessage("admin.member.role.content_manager", langContext.lang)
.orEmpty()
}
val loginType = when (it.provider) {

View File

@@ -74,6 +74,7 @@ class SecurityConfig(
.antMatchers("/member/login/kakao").permitAll()
.antMatchers("/member/login/apple").permitAll()
.antMatchers("/member/login/line").permitAll()
.antMatchers("/admin/member/login").permitAll()
.antMatchers("/creator-admin/member/login").permitAll()
.antMatchers("/member/forgot-password").permitAll()
.antMatchers("/stplat/terms_of_service").permitAll()

View File

@@ -1044,6 +1044,11 @@ class SodaMessageSource {
Lang.KO to "",
Lang.EN to "Bot",
Lang.JA to "ボット"
),
"admin.member.role.content_manager" to mapOf(
Lang.KO to "콘텐츠 관리자",
Lang.EN to "Content Manager",
Lang.JA to "コンテンツ管理者"
)
)

View File

@@ -177,7 +177,7 @@ enum class Gender {
}
enum class MemberRole {
ADMIN, BOT, USER, CREATOR, AGENT
ADMIN, BOT, USER, CREATOR, AGENT, CONTENT_MANAGER
}
enum class MemberProvider {

View File

@@ -0,0 +1,66 @@
package kr.co.vividnext.sodalive.admin.member
import kr.co.vividnext.sodalive.member.MemberRole
import kr.co.vividnext.sodalive.member.login.LoginRequest
import org.junit.jupiter.api.Assertions.assertEquals
import org.junit.jupiter.api.Assertions.assertTrue
import org.junit.jupiter.api.BeforeEach
import org.junit.jupiter.api.DisplayName
import org.junit.jupiter.api.Test
import org.mockito.Mockito
import org.springframework.http.MediaType
import org.springframework.test.web.servlet.MockMvc
import org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post
import org.springframework.test.web.servlet.result.MockMvcResultMatchers.jsonPath
import org.springframework.test.web.servlet.result.MockMvcResultMatchers.status
import org.springframework.test.web.servlet.setup.MockMvcBuilders
class AdminMemberLoginControllerTest {
private lateinit var service: AdminMemberLoginService
private lateinit var controller: AdminMemberLoginController
private lateinit var mockMvc: MockMvc
@BeforeEach
fun setup() {
service = mock()
controller = AdminMemberLoginController(service = service)
mockMvc = MockMvcBuilders.standaloneSetup(controller).build()
}
@Test
@DisplayName("POST /admin/member/login은 token과 role을 응답한다")
fun shouldReturnTokenAndRole() {
val request = LoginRequest(email = "admin@test.com", password = "password")
val loginResponse = AdminMemberLoginResponse(token = "admin-token", role = MemberRole.ADMIN)
Mockito.`when`(service.login(request)).thenReturn(loginResponse)
val response = controller.login(request)
assertTrue(response.success)
assertEquals("admin-token", response.data?.token)
assertEquals(MemberRole.ADMIN, response.data?.role)
}
@Test
@DisplayName("POST /admin/member/login은 JSON으로 token과 role을 응답한다")
fun shouldReturnTokenAndRoleJson() {
val request = LoginRequest(email = "content@test.com", password = "password")
Mockito.`when`(service.login(request)).thenReturn(
AdminMemberLoginResponse(token = "content-token", role = MemberRole.CONTENT_MANAGER)
)
mockMvc.perform(
post("/admin/member/login")
.contentType(MediaType.APPLICATION_JSON)
.content("""{"email":"content@test.com","password":"password"}""")
)
.andExpect(status().isOk)
.andExpect(jsonPath("$.success").value(true))
.andExpect(jsonPath("$.data.token").value("content-token"))
.andExpect(jsonPath("$.data.role").value("CONTENT_MANAGER"))
}
private inline fun <reified T> mock(): T {
return Mockito.mock(T::class.java)
}
}

View File

@@ -0,0 +1,98 @@
package kr.co.vividnext.sodalive.admin.member
import kr.co.vividnext.sodalive.common.SodaException
import kr.co.vividnext.sodalive.jwt.TokenProvider
import kr.co.vividnext.sodalive.member.Member
import kr.co.vividnext.sodalive.member.MemberRepository
import kr.co.vividnext.sodalive.member.MemberRole
import kr.co.vividnext.sodalive.member.login.LoginRequest
import kr.co.vividnext.sodalive.member.token.MemberTokenRepository
import org.junit.jupiter.api.Assertions.assertEquals
import org.junit.jupiter.api.Assertions.assertThrows
import org.junit.jupiter.api.Assertions.assertTrue
import org.junit.jupiter.api.BeforeEach
import org.junit.jupiter.api.DisplayName
import org.junit.jupiter.api.Test
import org.mockito.Mockito
import org.springframework.security.crypto.password.PasswordEncoder
class AdminMemberLoginServiceTest {
private lateinit var repository: AdminMemberRepository
private lateinit var passwordEncoder: PasswordEncoder
private lateinit var tokenRepository: MemberTokenRepository
private lateinit var service: AdminMemberLoginService
@BeforeEach
fun setup() {
repository = mock()
passwordEncoder = mock()
tokenRepository = mock()
val tokenProvider = TokenProvider(
secret = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==",
tokenValidityInSeconds = 3600,
repository = mock<MemberRepository>(),
tokenRepository = tokenRepository
)
tokenProvider.afterPropertiesSet()
service = AdminMemberLoginService(
repository = repository,
passwordEncoder = passwordEncoder,
tokenProvider = tokenProvider
)
}
@Test
@DisplayName("관리자는 관리자 로그인 API로 token과 role을 받는다")
fun shouldLoginAdmin() {
val member = createMember(id = 1L, role = MemberRole.ADMIN)
Mockito.`when`(repository.findByEmail("admin@test.com")).thenReturn(member)
Mockito.`when`(passwordEncoder.matches("password", "encoded-password")).thenReturn(true)
val response = service.login(LoginRequest(email = "admin@test.com", password = "password"))
assertTrue(response.token.isNotBlank())
assertEquals(MemberRole.ADMIN, response.role)
}
@Test
@DisplayName("콘텐츠 관리자는 관리자 로그인 API로 token과 role을 받는다")
fun shouldLoginContentManager() {
val member = createMember(id = 2L, role = MemberRole.CONTENT_MANAGER)
Mockito.`when`(repository.findByEmail("content@test.com")).thenReturn(member)
Mockito.`when`(passwordEncoder.matches("password", "encoded-password")).thenReturn(true)
val response = service.login(LoginRequest(email = "content@test.com", password = "password"))
assertTrue(response.token.isNotBlank())
assertEquals(MemberRole.CONTENT_MANAGER, response.role)
}
@Test
@DisplayName("일반 사용자는 관리자 로그인 API를 사용할 수 없다")
fun shouldRejectUser() {
val member = createMember(id = 3L, role = MemberRole.USER)
Mockito.`when`(repository.findByEmail("user@test.com")).thenReturn(member)
val exception = assertThrows(SodaException::class.java) {
service.login(LoginRequest(email = "user@test.com", password = "password"))
}
assertEquals("common.error.bad_credentials", exception.messageKey)
Mockito.verifyNoInteractions(tokenRepository)
}
private fun createMember(id: Long, role: MemberRole): Member {
val member = Member(
email = "member$id@test.com",
password = "encoded-password",
nickname = "member$id",
role = role
)
member.id = id
return member
}
private inline fun <reified T> mock(): T {
return Mockito.mock(T::class.java)
}
}