Auction handling: - Capture itemEndDate from eBay Browse API and ending_date from ZenMarket (Yahoo JP); plumb through results.ends_at column. Permissive ZenMarket parser (multiple layouts, JST when offset missing). - Per-row "Ends" countdown column + "Ending soon" banner on results pages, live-ticked by flair.js with urgent/critical tinting under 1h/5m. - Backfill ends_at for known auctions when their URL reappears in a poll (dedup hit no longer drops the new end time). - Hide ended auctions from result listings by default via ResultsQuery.ExcludeEnded; rows stay in the DB. Visual flair: - Glassy backdrop-blur v-cards with gradient-mask borders and hover-lift. - htmx swap fade-in via transient .v-just-swapped class. - Count-up animation on dashboard stats. All animations gated behind prefers-reduced-motion. eBay condition + region filters (auctions-style scoping): - items.condition and items.region columns; threaded through item form, CreateItem/UpdateItem, scheduler eBay plan input, and previewKey so cache invalidates when these change. - ebay.SearchParams gains conditionIds and itemLocationCountry filters. Run Now reload + countdown engine: - Run Now now sets HX-Refresh: true (non-htmx fallback: 303 redirect) so the entire results view — best price, chart, badge, last polled — reflects the new poll, instead of swapping just one partial. Pre-launch hardening (P1 set): - auth.EqualizeLoginTiming on no-such-user branch. - (*App).serverError centralizes 500s; replaces err.Error() leaks across results/settings/items/users/dashboard handlers. - main.go server: ReadTimeout 30s / WriteTimeout 60s / IdleTimeout 120s alongside the existing ReadHeaderTimeout. - noListFS wrapper blocks static directory listings. - Credential fields in settings no longer render value=; blank submission preserves the saved value, with per-field "Saved in settings / Set in config.toml / Not set" status indicator. Misc: - -debug flag wires slog to LevelDebug; raw ZenMarket items logged for format diagnosis. - /healthz public endpoint for reverse-proxy probes. - deploy/veola.service systemd unit template (hardening flags, single ReadWritePaths=/var/lib/veola). - handlers_test.go covers /healthz, setup-gate redirect, auth gate, and /login render with httptest + in-memory sqlite. - best_price_currency on items; templates pick the right symbol per row. - .gitignore now excludes *.log / veola-debug.log. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
116 lines
3.1 KiB
Go
116 lines
3.1 KiB
Go
package handlers
|
|
|
|
import (
|
|
"context"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"path/filepath"
|
|
"strings"
|
|
"testing"
|
|
|
|
"veola/internal/apify"
|
|
"veola/internal/auth"
|
|
"veola/internal/config"
|
|
"veola/internal/crypto"
|
|
"veola/internal/db"
|
|
"veola/internal/models"
|
|
"veola/internal/ntfy"
|
|
"veola/internal/scheduler"
|
|
)
|
|
|
|
// newTestApp builds an App backed by a fresh sqlite db in t.TempDir(). The
|
|
// scheduler, apify, and ntfy clients are wired but unused by the routes we
|
|
// hit here. The returned http.Handler is App.Routes().
|
|
func newTestApp(t *testing.T) (*App, http.Handler) {
|
|
t.Helper()
|
|
dbPath := filepath.Join(t.TempDir(), "test.db")
|
|
sqlDB, err := db.Open(dbPath)
|
|
if err != nil {
|
|
t.Fatalf("db.Open: %v", err)
|
|
}
|
|
t.Cleanup(func() { sqlDB.Close() })
|
|
|
|
key, err := crypto.DeriveKey([]byte("test-encryption-key-32-bytes-min-aaaaaa"))
|
|
if err != nil {
|
|
t.Fatalf("DeriveKey: %v", err)
|
|
}
|
|
store := db.NewStore(sqlDB, key)
|
|
|
|
am, err := auth.NewManager(sqlDB, store, strings.Repeat("a", 32), false)
|
|
if err != nil {
|
|
t.Fatalf("auth.NewManager: %v", err)
|
|
}
|
|
|
|
cfg := &config.Config{}
|
|
ap := apify.New("")
|
|
nt := ntfy.New("")
|
|
sc := scheduler.New(cfg, store, ap, nt)
|
|
|
|
app := New(cfg, store, am, ap, nt, sc)
|
|
return app, app.Routes()
|
|
}
|
|
|
|
func TestHealthz(t *testing.T) {
|
|
_, h := newTestApp(t)
|
|
req := httptest.NewRequest(http.MethodGet, "/healthz", nil)
|
|
rec := httptest.NewRecorder()
|
|
h.ServeHTTP(rec, req)
|
|
if rec.Code != http.StatusOK {
|
|
t.Fatalf("status = %d, want 200", rec.Code)
|
|
}
|
|
if got := rec.Body.String(); got != "ok" {
|
|
t.Fatalf("body = %q, want %q", got, "ok")
|
|
}
|
|
}
|
|
|
|
func TestSetupGateRedirectsWhenNoUsers(t *testing.T) {
|
|
_, h := newTestApp(t)
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
rec := httptest.NewRecorder()
|
|
h.ServeHTTP(rec, req)
|
|
if rec.Code != http.StatusSeeOther {
|
|
t.Fatalf("status = %d, want 303", rec.Code)
|
|
}
|
|
if loc := rec.Header().Get("Location"); loc != "/setup" {
|
|
t.Fatalf("Location = %q, want /setup", loc)
|
|
}
|
|
}
|
|
|
|
func TestRequireAuthRedirectsToLogin(t *testing.T) {
|
|
app, h := newTestApp(t)
|
|
hash, err := auth.HashPassword("a-long-enough-password")
|
|
if err != nil {
|
|
t.Fatalf("HashPassword: %v", err)
|
|
}
|
|
if _, err := app.Store.CreateUser(context.Background(), "admin", hash, models.RoleAdmin); err != nil {
|
|
t.Fatalf("CreateUser: %v", err)
|
|
}
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
rec := httptest.NewRecorder()
|
|
h.ServeHTTP(rec, req)
|
|
if rec.Code != http.StatusSeeOther {
|
|
t.Fatalf("status = %d, want 303", rec.Code)
|
|
}
|
|
if loc := rec.Header().Get("Location"); loc != "/login" {
|
|
t.Fatalf("Location = %q, want /login", loc)
|
|
}
|
|
}
|
|
|
|
func TestLoginPageRenders(t *testing.T) {
|
|
app, h := newTestApp(t)
|
|
hash, _ := auth.HashPassword("a-long-enough-password")
|
|
if _, err := app.Store.CreateUser(context.Background(), "admin", hash, models.RoleAdmin); err != nil {
|
|
t.Fatalf("CreateUser: %v", err)
|
|
}
|
|
req := httptest.NewRequest(http.MethodGet, "/login", nil)
|
|
rec := httptest.NewRecorder()
|
|
h.ServeHTTP(rec, req)
|
|
if rec.Code != http.StatusOK {
|
|
t.Fatalf("status = %d, want 200", rec.Code)
|
|
}
|
|
if !strings.Contains(rec.Body.String(), "<form") {
|
|
t.Fatalf("body missing <form>")
|
|
}
|
|
}
|