Auction handling: - Capture itemEndDate from eBay Browse API and ending_date from ZenMarket (Yahoo JP); plumb through results.ends_at column. Permissive ZenMarket parser (multiple layouts, JST when offset missing). - Per-row "Ends" countdown column + "Ending soon" banner on results pages, live-ticked by flair.js with urgent/critical tinting under 1h/5m. - Backfill ends_at for known auctions when their URL reappears in a poll (dedup hit no longer drops the new end time). - Hide ended auctions from result listings by default via ResultsQuery.ExcludeEnded; rows stay in the DB. Visual flair: - Glassy backdrop-blur v-cards with gradient-mask borders and hover-lift. - htmx swap fade-in via transient .v-just-swapped class. - Count-up animation on dashboard stats. All animations gated behind prefers-reduced-motion. eBay condition + region filters (auctions-style scoping): - items.condition and items.region columns; threaded through item form, CreateItem/UpdateItem, scheduler eBay plan input, and previewKey so cache invalidates when these change. - ebay.SearchParams gains conditionIds and itemLocationCountry filters. Run Now reload + countdown engine: - Run Now now sets HX-Refresh: true (non-htmx fallback: 303 redirect) so the entire results view — best price, chart, badge, last polled — reflects the new poll, instead of swapping just one partial. Pre-launch hardening (P1 set): - auth.EqualizeLoginTiming on no-such-user branch. - (*App).serverError centralizes 500s; replaces err.Error() leaks across results/settings/items/users/dashboard handlers. - main.go server: ReadTimeout 30s / WriteTimeout 60s / IdleTimeout 120s alongside the existing ReadHeaderTimeout. - noListFS wrapper blocks static directory listings. - Credential fields in settings no longer render value=; blank submission preserves the saved value, with per-field "Saved in settings / Set in config.toml / Not set" status indicator. Misc: - -debug flag wires slog to LevelDebug; raw ZenMarket items logged for format diagnosis. - /healthz public endpoint for reverse-proxy probes. - deploy/veola.service systemd unit template (hardening flags, single ReadWritePaths=/var/lib/veola). - handlers_test.go covers /healthz, setup-gate redirect, auth gate, and /login render with httptest + in-memory sqlite. - best_price_currency on items; templates pick the right symbol per row. - .gitignore now excludes *.log / veola-debug.log. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
119 lines
3.1 KiB
Go
119 lines
3.1 KiB
Go
package handlers
|
|
|
|
import (
|
|
"net/http"
|
|
"strings"
|
|
|
|
"veola/internal/auth"
|
|
"veola/internal/models"
|
|
"veola/templates"
|
|
)
|
|
|
|
func (a *App) GetLogin(w http.ResponseWriter, r *http.Request) {
|
|
if auth.CurrentUserFromRequest(r) != nil {
|
|
http.Redirect(w, r, "/", http.StatusSeeOther)
|
|
return
|
|
}
|
|
render(w, r, templates.Login(templates.LoginData{
|
|
Page: a.page(r, "Sign in", ""),
|
|
}))
|
|
}
|
|
|
|
func (a *App) PostLogin(w http.ResponseWriter, r *http.Request) {
|
|
if err := r.ParseForm(); err != nil {
|
|
http.Error(w, "bad form", http.StatusBadRequest)
|
|
return
|
|
}
|
|
username := strings.TrimSpace(r.PostFormValue("username"))
|
|
password := r.PostFormValue("password")
|
|
u, err := a.Store.GetUserByUsername(r.Context(), username)
|
|
if err != nil || u == nil {
|
|
// Run a bcrypt comparison anyway so a missing username takes the
|
|
// same time as a wrong password (no user-enumeration oracle).
|
|
auth.EqualizeLoginTiming()
|
|
}
|
|
if err != nil || u == nil || !auth.CheckPassword(u.PasswordHash, password) {
|
|
render(w, r, templates.Login(templates.LoginData{
|
|
Page: a.page(r, "Sign in", ""),
|
|
Error: "Invalid username or password",
|
|
Username: username,
|
|
}))
|
|
return
|
|
}
|
|
if err := a.Auth.LogIn(r.Context(), u.ID); err != nil {
|
|
http.Error(w, "session error", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
http.Redirect(w, r, "/", http.StatusSeeOther)
|
|
}
|
|
|
|
func (a *App) PostLogout(w http.ResponseWriter, r *http.Request) {
|
|
_ = a.Auth.LogOut(r.Context())
|
|
http.Redirect(w, r, "/login", http.StatusSeeOther)
|
|
}
|
|
|
|
func (a *App) GetSetup(w http.ResponseWriter, r *http.Request) {
|
|
n, err := a.Store.UserCount(r.Context())
|
|
if err != nil {
|
|
http.Error(w, "db error", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
if n > 0 {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
render(w, r, templates.Setup(templates.SetupData{
|
|
Page: a.page(r, "Setup", ""),
|
|
}))
|
|
}
|
|
|
|
func (a *App) PostSetup(w http.ResponseWriter, r *http.Request) {
|
|
n, err := a.Store.UserCount(r.Context())
|
|
if err != nil {
|
|
http.Error(w, "db error", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
if n > 0 {
|
|
http.NotFound(w, r)
|
|
return
|
|
}
|
|
if err := r.ParseForm(); err != nil {
|
|
http.Error(w, "bad form", http.StatusBadRequest)
|
|
return
|
|
}
|
|
username := strings.TrimSpace(r.PostFormValue("username"))
|
|
password := r.PostFormValue("password")
|
|
confirm := r.PostFormValue("password_confirm")
|
|
errMsg := ""
|
|
switch {
|
|
case username == "":
|
|
errMsg = "Username is required"
|
|
case len(password) < auth.MinPasswordLen:
|
|
errMsg = "Password must be at least 12 characters"
|
|
case password != confirm:
|
|
errMsg = "Passwords do not match"
|
|
}
|
|
if errMsg != "" {
|
|
render(w, r, templates.Setup(templates.SetupData{
|
|
Page: a.page(r, "Setup", ""),
|
|
Error: errMsg,
|
|
Username: username,
|
|
}))
|
|
return
|
|
}
|
|
hash, err := auth.HashPassword(password)
|
|
if err != nil {
|
|
http.Error(w, "hash error", http.StatusInternalServerError)
|
|
return
|
|
}
|
|
if _, err := a.Store.CreateUser(r.Context(), username, hash, models.RoleAdmin); err != nil {
|
|
render(w, r, templates.Setup(templates.SetupData{
|
|
Page: a.page(r, "Setup", ""),
|
|
Error: "Could not create user: " + err.Error(),
|
|
Username: username,
|
|
}))
|
|
return
|
|
}
|
|
http.Redirect(w, r, "/login", http.StatusSeeOther)
|
|
}
|