Phase1 后端核心:
- 新增 fsgx_v1.sql 迁移脚本(is_queue_goods/frozen_points/available_points/no_assess)
- SystemConfigServices 返佣设置扩展(周期人数/分档比例/范围/时机)
- StoreOrderCreateServices 周期循环佣金计算
- StoreOrderTakeServices 佣金发放后同步冻结积分
- StoreProductServices/StoreProduct 保存 is_queue_goods
Phase2 后端接口:
- GET /api/hjf/brokerage/progress 佣金周期进度
- GET /api/hjf/assets/overview 资产总览
- HjfPointsServices 每日 frozen_points 0.4‰ 释放定时任务
- PUT /adminapi/hjf/member/{uid}/no_assess 不考核接口
- GET /adminapi/hjf/points/release_log 积分日志接口
Phase3 前端清理:
- hjfCustom.js 路由精简(仅保留 points/log)
- hjfQueue.js/hjfMember.js API 清理/重定向至 CRMEB 原生接口
- pages.json 公排→推荐佣金/佣金记录/佣金规则
Phase4-5 前端改造:
- queue/status.vue 推荐佣金进度页整体重写
- 商品详情/订单确认/支付结果页文案与逻辑改造
- 个人中心/资产页/引导页/规则页文案改造
- HjfQueueProgress/HjfRefundNotice/HjfAssetCard 组件改造
- 推广中心嵌入佣金进度摘要
- hjfMockData.js 全量更新(公排字段→佣金字段)
Phase6 Admin 增强:
- 用户列表新增 frozen_points/available_points 列及不考核操作按钮
- hjfPoints.js USE_MOCK=false 对接真实积分日志接口
Phase7 配置文档:
- docs/fsgx-phase7-config-checklist.md 后台配置与全链路验收清单
Made-with: Cursor
214 lines
6.9 KiB
PHP
214 lines
6.9 KiB
PHP
<?php
|
|
|
|
use Mockery as m;
|
|
use Overtrue\Socialite\Providers\Base;
|
|
use Overtrue\Socialite\User;
|
|
use PHPUnit\Framework\TestCase;
|
|
|
|
class OAuthTest extends TestCase
|
|
{
|
|
public function tearDown(): void
|
|
{
|
|
m::close();
|
|
}
|
|
|
|
public function test_it_can_get_auth_url_without_redirect()
|
|
{
|
|
$config = [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
|
|
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=info&response_type=code', $provider->redirect());
|
|
}
|
|
|
|
public function test_it_can_get_auth_url_with_redirect()
|
|
{
|
|
// 手动配置
|
|
$config = [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
|
|
$this->assertSame('http://auth.url?client_id=fake_client_id&redirect_uri=fake_redirect&scope=info&response_type=code', $provider->redirect('fake_redirect'));
|
|
|
|
// 用配置属性配置
|
|
$config += ['redirect_url' => 'fake_redirect'];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
|
|
$this->assertSame('http://auth.url?client_id=fake_client_id&redirect_uri=fake_redirect&scope=info&response_type=code', $provider->redirect('fake_redirect'));
|
|
}
|
|
|
|
public function test_it_can_get_auth_url_with_scopes()
|
|
{
|
|
$config = [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
$url = $provider->scopes(['test_info', 'test_email'])->redirect();
|
|
|
|
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=test_info%2Ctest_email&response_type=code', $url);
|
|
|
|
// 切换scope分割符
|
|
$url = $provider->scopes(['test_info', 'test_email'])->withScopeSeparator(' ')->redirect();
|
|
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=test_info%20test_email&response_type=code', $url);
|
|
}
|
|
|
|
public function test_it_can_get_auth_url_with_state()
|
|
{
|
|
$config = [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
$url = $provider->withState(123456)->redirect();
|
|
|
|
$this->assertSame('http://auth.url?client_id=fake_client_id&scope=info&response_type=code&state=123456', $url);
|
|
}
|
|
|
|
public function test_it_can_get_token()
|
|
{
|
|
$config = [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
$response = m::mock(\Psr\Http\Message\ResponseInterface::class);
|
|
|
|
$response->shouldReceive('getBody')->andReturn($response);
|
|
$response->shouldReceive('__toString')->andReturn(\json_encode([
|
|
'access_token' => 'fake_access_token',
|
|
'refresh_token' => 'fake_refresh_token',
|
|
'expires_in' => 123456,
|
|
]));
|
|
|
|
$provider->getHttpClient()->shouldReceive('post')->with('http://token.url', [
|
|
'form_params' => [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
'code' => 'fake_code',
|
|
'redirect_uri' => null,
|
|
],
|
|
'headers' => [
|
|
'Accept' => 'application/json',
|
|
],
|
|
])->andReturn($response);
|
|
|
|
$this->assertSame([
|
|
'access_token' => 'fake_access_token',
|
|
'refresh_token' => 'fake_refresh_token',
|
|
'expires_in' => 123456,
|
|
], $provider->tokenFromCode('fake_code'));
|
|
}
|
|
|
|
public function test_it_can_get_user_by_token()
|
|
{
|
|
$config = [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
|
|
$user = $provider->userFromToken('fake_access_token');
|
|
|
|
$this->assertSame('foo', $user->getId());
|
|
$this->assertSame(['id' => 'foo'], $user->getRaw());
|
|
$this->assertSame('fake_access_token', $user->getAccessToken());
|
|
}
|
|
|
|
public function test_it_can_get_user_by_code()
|
|
{
|
|
$config = [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
];
|
|
$provider = new OAuthTestProviderStub($config);
|
|
|
|
$response = m::mock(\Psr\Http\Message\ResponseInterface::class);
|
|
$response->shouldReceive('getBody')->andReturn($response);
|
|
$response->shouldReceive('__toString')->andReturn(\json_encode([
|
|
'access_token' => 'fake_access_token',
|
|
'refresh_token' => 'fake_refresh_token',
|
|
'expires_in' => 123456,
|
|
]));
|
|
|
|
$provider->getHttpClient()->shouldReceive('post')->with('http://token.url', [
|
|
'form_params' => [
|
|
'client_id' => 'fake_client_id',
|
|
'client_secret' => 'fake_client_secret',
|
|
'code' => 'fake_code',
|
|
'redirect_uri' => null,
|
|
],
|
|
'headers' => [
|
|
'Accept' => 'application/json',
|
|
],
|
|
])->andReturn($response);
|
|
|
|
$this->assertSame([
|
|
'access_token' => 'fake_access_token',
|
|
'refresh_token' => 'fake_refresh_token',
|
|
'expires_in' => 123456,
|
|
], $provider->tokenFromCode('fake_code'));
|
|
|
|
$user = $provider->userFromCode('fake_code');
|
|
$tokenResponse = [
|
|
'access_token' => 'fake_access_token',
|
|
'refresh_token' => 'fake_refresh_token',
|
|
'expires_in' => 123456,
|
|
];
|
|
|
|
$this->assertSame('foo', $user->getId());
|
|
$this->assertSame($tokenResponse, $user->getTokenResponse());
|
|
$this->assertSame('fake_access_token', $user->getAccessToken());
|
|
$this->assertSame('fake_refresh_token', $user->getRefreshToken());
|
|
}
|
|
}
|
|
|
|
class OAuthTestProviderStub extends Base
|
|
{
|
|
public $http;
|
|
|
|
protected array $scopes = ['info'];
|
|
|
|
protected int $encodingType = PHP_QUERY_RFC3986;
|
|
|
|
protected function getAuthUrl(): string
|
|
{
|
|
$url = 'http://auth.url';
|
|
|
|
return $this->buildAuthUrlFromBase($url);
|
|
}
|
|
|
|
protected function getTokenUrl(): string
|
|
{
|
|
return 'http://token.url';
|
|
}
|
|
|
|
protected function getUserByToken(string $token): array
|
|
{
|
|
return ['id' => 'foo'];
|
|
}
|
|
|
|
protected function mapUserToObject(array $user): User
|
|
{
|
|
return new User(['id' => $user['id']]);
|
|
}
|
|
|
|
/**
|
|
* Get a fresh instance of the Guzzle HTTP client.
|
|
*
|
|
* @return \GuzzleHttp\Client
|
|
*/
|
|
public function getHttpClient(): GuzzleHttp\Client
|
|
{
|
|
if ($this->http) {
|
|
return $this->http;
|
|
}
|
|
|
|
return $this->http = m::mock(\GuzzleHttp\Client::class);
|
|
}
|
|
}
|