Files
huangjingfen/pro_v3.5.1_副本/vendor/overtrue/socialite/tests/OAuthTest.php
apple 434aa8c69d feat(fsgx): 完成全部24项开发任务 Phase1-7
Phase1 后端核心:
- 新增 fsgx_v1.sql 迁移脚本(is_queue_goods/frozen_points/available_points/no_assess)
- SystemConfigServices 返佣设置扩展(周期人数/分档比例/范围/时机)
- StoreOrderCreateServices 周期循环佣金计算
- StoreOrderTakeServices 佣金发放后同步冻结积分
- StoreProductServices/StoreProduct 保存 is_queue_goods

Phase2 后端接口:
- GET /api/hjf/brokerage/progress 佣金周期进度
- GET /api/hjf/assets/overview 资产总览
- HjfPointsServices 每日 frozen_points 0.4‰ 释放定时任务
- PUT /adminapi/hjf/member/{uid}/no_assess 不考核接口
- GET /adminapi/hjf/points/release_log 积分日志接口

Phase3 前端清理:
- hjfCustom.js 路由精简(仅保留 points/log)
- hjfQueue.js/hjfMember.js API 清理/重定向至 CRMEB 原生接口
- pages.json 公排→推荐佣金/佣金记录/佣金规则

Phase4-5 前端改造:
- queue/status.vue 推荐佣金进度页整体重写
- 商品详情/订单确认/支付结果页文案与逻辑改造
- 个人中心/资产页/引导页/规则页文案改造
- HjfQueueProgress/HjfRefundNotice/HjfAssetCard 组件改造
- 推广中心嵌入佣金进度摘要
- hjfMockData.js 全量更新(公排字段→佣金字段)

Phase6 Admin 增强:
- 用户列表新增 frozen_points/available_points 列及不考核操作按钮
- hjfPoints.js USE_MOCK=false 对接真实积分日志接口

Phase7 配置文档:
- docs/fsgx-phase7-config-checklist.md 后台配置与全链路验收清单

Made-with: Cursor
2026-03-23 22:32:19 +08:00

214 lines
6.9 KiB
PHP

<?php
use Mockery as m;
use Overtrue\Socialite\Providers\Base;
use Overtrue\Socialite\User;
use PHPUnit\Framework\TestCase;
class OAuthTest extends TestCase
{
public function tearDown(): void
{
m::close();
}
public function test_it_can_get_auth_url_without_redirect()
{
$config = [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
];
$provider = new OAuthTestProviderStub($config);
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=info&response_type=code', $provider->redirect());
}
public function test_it_can_get_auth_url_with_redirect()
{
// 手动配置
$config = [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
];
$provider = new OAuthTestProviderStub($config);
$this->assertSame('http://auth.url?client_id=fake_client_id&redirect_uri=fake_redirect&scope=info&response_type=code', $provider->redirect('fake_redirect'));
// 用配置属性配置
$config += ['redirect_url' => 'fake_redirect'];
$provider = new OAuthTestProviderStub($config);
$this->assertSame('http://auth.url?client_id=fake_client_id&redirect_uri=fake_redirect&scope=info&response_type=code', $provider->redirect('fake_redirect'));
}
public function test_it_can_get_auth_url_with_scopes()
{
$config = [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
];
$provider = new OAuthTestProviderStub($config);
$url = $provider->scopes(['test_info', 'test_email'])->redirect();
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=test_info%2Ctest_email&response_type=code', $url);
// 切换scope分割符
$url = $provider->scopes(['test_info', 'test_email'])->withScopeSeparator(' ')->redirect();
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=test_info%20test_email&response_type=code', $url);
}
public function test_it_can_get_auth_url_with_state()
{
$config = [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
];
$provider = new OAuthTestProviderStub($config);
$url = $provider->withState(123456)->redirect();
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=info&response_type=code&state=123456', $url);
}
public function test_it_can_get_token()
{
$config = [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
];
$provider = new OAuthTestProviderStub($config);
$response = m::mock(\Psr\Http\Message\ResponseInterface::class);
$response->shouldReceive('getBody')->andReturn($response);
$response->shouldReceive('__toString')->andReturn(\json_encode([
'access_token' => 'fake_access_token',
'refresh_token' => 'fake_refresh_token',
'expires_in' => 123456,
]));
$provider->getHttpClient()->shouldReceive('post')->with('http://token.url', [
'form_params' => [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
'code' => 'fake_code',
'redirect_uri' => null,
],
'headers' => [
'Accept' => 'application/json',
],
])->andReturn($response);
$this->assertSame([
'access_token' => 'fake_access_token',
'refresh_token' => 'fake_refresh_token',
'expires_in' => 123456,
], $provider->tokenFromCode('fake_code'));
}
public function test_it_can_get_user_by_token()
{
$config = [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
];
$provider = new OAuthTestProviderStub($config);
$user = $provider->userFromToken('fake_access_token');
$this->assertSame('foo', $user->getId());
$this->assertSame(['id' => 'foo'], $user->getRaw());
$this->assertSame('fake_access_token', $user->getAccessToken());
}
public function test_it_can_get_user_by_code()
{
$config = [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
];
$provider = new OAuthTestProviderStub($config);
$response = m::mock(\Psr\Http\Message\ResponseInterface::class);
$response->shouldReceive('getBody')->andReturn($response);
$response->shouldReceive('__toString')->andReturn(\json_encode([
'access_token' => 'fake_access_token',
'refresh_token' => 'fake_refresh_token',
'expires_in' => 123456,
]));
$provider->getHttpClient()->shouldReceive('post')->with('http://token.url', [
'form_params' => [
'client_id' => 'fake_client_id',
'client_secret' => 'fake_client_secret',
'code' => 'fake_code',
'redirect_uri' => null,
],
'headers' => [
'Accept' => 'application/json',
],
])->andReturn($response);
$this->assertSame([
'access_token' => 'fake_access_token',
'refresh_token' => 'fake_refresh_token',
'expires_in' => 123456,
], $provider->tokenFromCode('fake_code'));
$user = $provider->userFromCode('fake_code');
$tokenResponse = [
'access_token' => 'fake_access_token',
'refresh_token' => 'fake_refresh_token',
'expires_in' => 123456,
];
$this->assertSame('foo', $user->getId());
$this->assertSame($tokenResponse, $user->getTokenResponse());
$this->assertSame('fake_access_token', $user->getAccessToken());
$this->assertSame('fake_refresh_token', $user->getRefreshToken());
}
}
class OAuthTestProviderStub extends Base
{
public $http;
protected array $scopes = ['info'];
protected int $encodingType = PHP_QUERY_RFC3986;
protected function getAuthUrl(): string
{
$url = 'http://auth.url';
return $this->buildAuthUrlFromBase($url);
}
protected function getTokenUrl(): string
{
return 'http://token.url';
}
protected function getUserByToken(string $token): array
{
return ['id' => 'foo'];
}
protected function mapUserToObject(array $user): User
{
return new User(['id' => $user['id']]);
}
/**
* Get a fresh instance of the Guzzle HTTP client.
*
* @return \GuzzleHttp\Client
*/
public function getHttpClient(): GuzzleHttp\Client
{
if ($this->http) {
return $this->http;
}
return $this->http = m::mock(\GuzzleHttp\Client::class);
}
}