Compare commits

...

63 Commits

Author SHA1 Message Date
Gitea Actions
78a9b80010 ci: Bump version to 0.9.59 [skip ci] 2026-01-08 20:48:22 +05:00
d356d9dfb6 claude 1
Some checks failed
Deploy to Test Environment / deploy-to-test (push) Failing after 43s
2026-01-08 07:47:29 -08:00
Gitea Actions
ab63f83f50 ci: Bump version to 0.9.58 [skip ci] 2026-01-08 05:23:21 +05:00
b546a55eaf fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 32m3s
2026-01-07 16:22:48 -08:00
Gitea Actions
dfa53a93dd ci: Bump version to 0.9.57 [skip ci] 2026-01-08 04:39:12 +05:00
f30464cd0e fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 19m1s
2026-01-07 15:38:14 -08:00
Gitea Actions
2d2fa3c2c8 ci: Bump version to 0.9.56 [skip ci] 2026-01-08 00:40:29 +05:00
58cb391f4b fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 21m36s
2026-01-07 11:39:35 -08:00
Gitea Actions
0ebe2f0806 ci: Bump version to 0.9.55 [skip ci] 2026-01-07 14:43:38 +05:00
7867abc5bc fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 24m23s
2026-01-07 01:42:43 -08:00
Gitea Actions
cc4c8e2839 ci: Bump version to 0.9.54 [skip ci] 2026-01-07 10:49:08 +05:00
33ee2eeac9 switch to instantiating the pm2 worker in the testing threads
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 26m44s
2026-01-06 21:48:35 -08:00
Gitea Actions
e0b13f26fb ci: Bump version to 0.9.53 [skip ci] 2026-01-07 09:57:37 +05:00
eee7f36756 switch to instantiating the pm2 worker in the testing threads
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 30m53s
2026-01-06 20:56:39 -08:00
Gitea Actions
622c919733 ci: Bump version to 0.9.52 [skip ci] 2026-01-07 08:26:14 +05:00
c7f6b6369a fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 30m27s
2026-01-06 19:25:25 -08:00
Gitea Actions
879d956003 ci: Bump version to 0.9.51 [skip ci] 2026-01-07 07:11:22 +05:00
27eaac7ea8 fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 27m15s
2026-01-06 18:10:47 -08:00
Gitea Actions
93618c57e5 ci: Bump version to 0.9.50 [skip ci] 2026-01-07 06:41:16 +05:00
7f043ef704 fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 29m45s
2026-01-06 17:40:20 -08:00
Gitea Actions
62e35deddc ci: Bump version to 0.9.49 [skip ci] 2026-01-07 02:54:13 +05:00
59f6f43d03 fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 32m36s
2026-01-06 13:53:00 -08:00
Gitea Actions
e675c1a73c ci: Bump version to 0.9.48 [skip ci] 2026-01-07 01:35:26 +05:00
3c19084a0a fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 30m17s
2026-01-06 12:34:18 -08:00
Gitea Actions
e2049c6b9f ci: Bump version to 0.9.47 [skip ci] 2026-01-06 23:34:29 +05:00
a3839c2f0d debugging the flyer integration issue
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 33m13s
2026-01-06 10:33:51 -08:00
Gitea Actions
c1df3d7b1b ci: Bump version to 0.9.46 [skip ci] 2026-01-06 22:39:47 +05:00
94782f030d debugging the flyer integration issue
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 25m42s
2026-01-06 09:38:14 -08:00
Gitea Actions
1c25b79251 ci: Bump version to 0.9.45 [skip ci] 2026-01-06 14:34:44 +05:00
0b0fa8294d debugging the flyer integration issue
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 27m54s
2026-01-06 01:33:48 -08:00
Gitea Actions
f49f3a75fb ci: Bump version to 0.9.44 [skip ci] 2026-01-06 13:41:43 +05:00
8f14044ae6 debugging the flyer integration issue
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 26m27s
2026-01-06 00:41:03 -08:00
Gitea Actions
55e1e425f4 ci: Bump version to 0.9.43 [skip ci] 2026-01-06 12:56:47 +05:00
68b16ad2e8 fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 25m2s
2026-01-05 23:53:54 -08:00
Gitea Actions
6a28934692 ci: Bump version to 0.9.42 [skip ci] 2026-01-06 12:25:08 +05:00
78c4a5fee6 fix the dang integration tests
Some checks failed
Deploy to Test Environment / deploy-to-test (push) Has been cancelled
2026-01-05 23:20:56 -08:00
Gitea Actions
1ce5f481a8 ci: Bump version to 0.9.41 [skip ci] 2026-01-06 11:39:28 +05:00
Gitea Actions
e0120d38fd ci: Bump version to 0.9.39 [skip ci] 2026-01-06 11:39:27 +05:00
6b2079ef2c fix the dang integration tests
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 32m44s
2026-01-05 22:38:21 -08:00
Gitea Actions
0478e176d5 ci: Bump version to 0.9.38 [skip ci] 2026-01-06 10:23:22 +05:00
47f7f97cd9 fuck database contraints - seems buggy
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 32m10s
2026-01-05 21:16:08 -08:00
Gitea Actions
b0719d1e39 ci: Bump version to 0.9.37 [skip ci] 2026-01-06 10:11:19 +05:00
0039ac3752 fuck database contraints - seems buggy
Some checks failed
Deploy to Test Environment / deploy-to-test (push) Failing after 37s
2026-01-05 21:08:16 -08:00
Gitea Actions
3c8316f4f7 ci: Bump version to 0.9.36 [skip ci] 2026-01-06 09:03:20 +05:00
2564df1c64 get rid of localhost in tests - not a qualified URL - we'll see
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 33m19s
2026-01-05 20:02:44 -08:00
Gitea Actions
696c547238 ci: Bump version to 0.9.35 [skip ci] 2026-01-06 08:11:42 +05:00
38165bdb9a get rid of localhost in tests - not a qualified URL - we'll see
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 26m14s
2026-01-05 19:10:46 -08:00
Gitea Actions
6139dca072 ci: Bump version to 0.9.34 [skip ci] 2026-01-06 06:33:46 +05:00
68bfaa50e6 more baseurl work - hopefully that does it for now
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 26m5s
2026-01-05 17:33:00 -08:00
Gitea Actions
9c42621f74 ci: Bump version to 0.9.33 [skip ci] 2026-01-06 04:34:48 +05:00
1b98282202 more rate limiting
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 30m19s
2026-01-05 15:31:01 -08:00
Gitea Actions
b6731b220c ci: Bump version to 0.9.32 [skip ci] 2026-01-06 04:13:42 +05:00
3507d455e8 more rate limiting
Some checks failed
Deploy to Test Environment / deploy-to-test (push) Has been cancelled
2026-01-05 15:13:10 -08:00
Gitea Actions
92b2adf8e8 ci: Bump version to 0.9.31 [skip ci] 2026-01-06 04:07:21 +05:00
d6c7452256 more rate limiting
Some checks failed
Deploy to Test Environment / deploy-to-test (push) Failing after 41s
2026-01-05 15:06:55 -08:00
Gitea Actions
d812b681dd ci: Bump version to 0.9.30 [skip ci] 2026-01-06 03:54:42 +05:00
b4306a6092 more rate limiting
Some checks failed
Deploy to Test Environment / deploy-to-test (push) Failing after 50s
2026-01-05 14:53:49 -08:00
Gitea Actions
57fdd159d5 ci: Bump version to 0.9.29 [skip ci] 2026-01-06 01:08:45 +05:00
4a747ca042 even even more and more test fixes
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 23m46s
2026-01-05 12:08:18 -08:00
Gitea Actions
e0bf96824c ci: Bump version to 0.9.28 [skip ci] 2026-01-06 00:28:11 +05:00
e86e09703e even even more and more test fixes
Some checks failed
Deploy to Test Environment / deploy-to-test (push) Failing after 59s
2026-01-05 11:27:13 -08:00
Gitea Actions
275741c79e ci: Bump version to 0.9.27 [skip ci] 2026-01-05 15:32:08 +05:00
3a40249ddb even more and more test fixes
All checks were successful
Deploy to Test Environment / deploy-to-test (push) Successful in 22m19s
2026-01-05 02:30:28 -08:00
148 changed files with 7306 additions and 1066 deletions

View File

@@ -0,0 +1,34 @@
{
"permissions": {
"allow": [
"Bash(npm test:*)",
"Bash(podman --version:*)",
"Bash(podman ps:*)",
"Bash(podman machine start:*)",
"Bash(podman compose:*)",
"Bash(podman pull:*)",
"Bash(podman images:*)",
"Bash(podman stop:*)",
"Bash(echo:*)",
"Bash(podman rm:*)",
"Bash(podman run:*)",
"Bash(podman start:*)",
"Bash(podman exec:*)",
"Bash(cat:*)",
"Bash(PGPASSWORD=postgres psql:*)",
"Bash(npm search:*)",
"Bash(npx:*)",
"Bash(curl -s -H \"Authorization: token c72bc0f14f623fec233d3c94b3a16397fe3649ef\" https://gitea.projectium.com/api/v1/user)",
"Bash(curl:*)",
"Bash(powershell:*)",
"Bash(cmd.exe:*)",
"Bash(export NODE_ENV=test DB_HOST=localhost DB_USER=postgres DB_PASSWORD=postgres DB_NAME=flyer_crawler_dev REDIS_URL=redis://localhost:6379 FRONTEND_URL=http://localhost:5173 JWT_SECRET=test-jwt-secret:*)",
"Bash(npm run test:integration:*)",
"Bash(grep:*)",
"Bash(done)",
"Bash(podman info:*)",
"Bash(podman machine:*)",
"Bash(podman system connection:*)"
]
}
}

66
.gemini/settings.json Normal file
View File

@@ -0,0 +1,66 @@
{
"mcpServers": {
"chrome-devtools": {
"command": "npx",
"args": [
"-y",
"chrome-devtools-mcp@latest",
"--headless",
"true",
"--isolated",
"false",
"--channel",
"stable"
]
},
"markitdown": {
"command": "C:\\Users\\games3\\.local\\bin\\uvx.exe",
"args": [
"markitdown-mcp"
]
},
"gitea-torbonium": {
"command": "d:\\gitea-mcp\\gitea-mcp.exe",
"args": ["run", "-t", "stdio"],
"env": {
"GITEA_HOST": "https://gitea.torbonium.com",
"GITEA_ACCESS_TOKEN": "391c9ddbe113378bc87bb8184800ba954648fcf8"
}
},
"gitea-lan": {
"command": "d:\\gitea-mcp\\gitea-mcp.exe",
"args": ["run", "-t", "stdio"],
"env": {
"GITEA_HOST": "https://gitea.torbolan.com",
"GITEA_ACCESS_TOKEN": "REPLACE_WITH_NEW_TOKEN"
}
},
"gitea-projectium": {
"command": "d:\\gitea-mcp\\gitea-mcp.exe",
"args": ["run", "-t", "stdio"],
"env": {
"GITEA_HOST": "https://gitea.projectium.com",
"GITEA_ACCESS_TOKEN": "c72bc0f14f623fec233d3c94b3a16397fe3649ef"
}
},
"podman": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-docker"],
"env": {
"DOCKER_HOST": "npipe:////./pipe/docker_engine"
}
},
"filesystem": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-filesystem",
"D:\\gitea\\flyer-crawler.projectium.com\\flyer-crawler.projectium.com"
]
},
"fetch": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-fetch"]
}
}
}

View File

@@ -113,7 +113,7 @@ jobs:
REDIS_PASSWORD: ${{ secrets.REDIS_PASSWORD_TEST }}
# --- Integration test specific variables ---
FRONTEND_URL: 'http://localhost:3000'
FRONTEND_URL: 'https://example.com'
VITE_API_BASE_URL: 'http://localhost:3001/api'
GEMINI_API_KEY: ${{ secrets.VITE_GOOGLE_GENAI_API_KEY }}
@@ -389,7 +389,7 @@ jobs:
REDIS_PASSWORD: ${{ secrets.REDIS_PASSWORD_TEST }}
# Application Secrets
FRONTEND_URL: 'https://flyer-crawler-test.projectium.com'
FRONTEND_URL: 'https://example.com'
JWT_SECRET: ${{ secrets.JWT_SECRET }}
GEMINI_API_KEY: ${{ secrets.VITE_GOOGLE_GENAI_API_KEY_TEST }}
GOOGLE_MAPS_API_KEY: ${{ secrets.GOOGLE_MAPS_API_KEY }}

630
README.vscode.md Normal file
View File

@@ -0,0 +1,630 @@
# VS Code Configuration for Flyer Crawler Project
This document describes the VS Code setup for this project, including MCP (Model Context Protocol) server configurations for both Gemini Code and Claude Code.
## Overview
This project uses VS Code with AI coding assistants (Gemini Code and Claude Code) that connect to various MCP servers for enhanced capabilities like container management, repository access, and file system operations.
## MCP Server Architecture
MCP (Model Context Protocol) allows AI assistants to interact with external tools and services. Both Gemini Code and Claude Code are configured to use the same set of MCP servers.
### Configuration Files
- **Gemini Code**: `%APPDATA%\Code\User\mcp.json`
- **Claude Code**: `%USERPROFILE%\.claude\settings.json`
## Configured MCP Servers
### 1. Gitea MCP Servers
Access to multiple Gitea instances for repository management, code search, issue tracking, and CI/CD workflows.
#### Gitea Projectium (Primary)
- **Host**: `https://gitea.projectium.com`
- **Purpose**: Main production Gitea server
- **Capabilities**:
- Repository browsing and code search
- Issue and PR management
- CI/CD workflow access
- Repository cloning and management
#### Gitea Torbonium
- **Host**: `https://gitea.torbonium.com`
- **Purpose**: Development/testing Gitea instance
- **Capabilities**: Same as Gitea Projectium
#### Gitea LAN
- **Host**: `https://gitea.torbolan.com`
- **Purpose**: Local network Gitea instance
- **Status**: Disabled (requires token configuration)
**Executable Location**: `d:\gitea-mcp\gitea-mcp.exe`
**Configuration Example** (Gemini Code - mcp.json):
```json
{
"servers": {
"gitea-projectium": {
"command": "d:\\gitea-mcp\\gitea-mcp.exe",
"args": ["run", "-t", "stdio"],
"env": {
"GITEA_HOST": "https://gitea.projectium.com",
"GITEA_ACCESS_TOKEN": "your-token-here"
}
}
}
}
```
**Configuration Example** (Claude Code - settings.json):
```json
{
"mcpServers": {
"gitea-projectium": {
"command": "d:\\gitea-mcp\\gitea-mcp.exe",
"args": ["run", "-t", "stdio"],
"env": {
"GITEA_HOST": "https://gitea.projectium.com",
"GITEA_ACCESS_TOKEN": "your-token-here"
}
}
}
}
```
### 2. Podman/Docker MCP Server
Manages local containers via Podman Desktop (using Docker-compatible API).
- **Purpose**: Container lifecycle management
- **Socket**: `npipe:////./pipe/docker_engine` (Windows named pipe)
- **Capabilities**:
- List, start, stop containers
- Execute commands in containers
- View container logs
- Inspect container status and configuration
**Current Containers** (for this project):
- `flyer-crawler-postgres` - PostgreSQL 15 + PostGIS on port 5432
- `flyer-crawler-redis` - Redis on port 6379
**Configuration** (Gemini Code - mcp.json):
```json
{
"servers": {
"podman": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-docker"],
"env": {
"DOCKER_HOST": "npipe:////./pipe/docker_engine"
}
}
}
}
```
**Configuration** (Claude Code):
```json
{
"mcpServers": {
"podman": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-docker"],
"env": {
"DOCKER_HOST": "npipe:////./pipe/docker_engine"
}
}
}
}
```
### 3. Filesystem MCP Server
Direct file system access to the project directory.
- **Purpose**: Read and write files in the project
- **Scope**: `D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com`
- **Capabilities**:
- Read file contents
- Write/edit files
- List directory contents
- Search files
**Configuration** (Gemini Code - mcp.json):
```json
{
"servers": {
"filesystem": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-filesystem",
"D:\\gitea\\flyer-crawler.projectium.com\\flyer-crawler.projectium.com"
]
}
}
}
```
**Configuration** (Claude Code):
```json
{
"mcpServers": {
"filesystem": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-filesystem",
"D:\\gitea\\flyer-crawler.projectium.com\\flyer-crawler.projectium.com"
]
}
}
}
```
### 4. Fetch MCP Server
Web request capabilities for documentation lookups and API testing.
- **Purpose**: Make HTTP requests
- **Capabilities**:
- Fetch web pages and APIs
- Download documentation
- Test endpoints
**Configuration** (Gemini Code - mcp.json):
```json
{
"servers": {
"fetch": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-fetch"]
}
}
}
```
**Configuration** (Claude Code):
```json
{
"mcpServers": {
"fetch": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-fetch"]
}
}
}
```
### 5. Chrome DevTools MCP Server (Optional)
Browser automation and debugging capabilities.
- **Purpose**: Automated browser testing
- **Status**: Disabled by default
- **Capabilities**:
- Browser automation
- Screenshot capture
- DOM inspection
- Network monitoring
**Configuration** (when enabled):
```json
{
"mcpServers": {
"chrome-devtools": {
"command": "npx",
"args": [
"chrome-devtools-mcp@latest",
"--headless", "false",
"--isolated", "false",
"--channel", "stable"
]
}
}
}
```
### 6. Markitdown MCP Server (Optional)
Document conversion capabilities.
- **Purpose**: Convert various document formats to Markdown
- **Status**: Disabled by default
- **Requires**: Python with `uvx` installed
- **Capabilities**:
- Convert PDFs to Markdown
- Convert Word documents
- Convert other document formats
**Configuration** (when enabled):
```json
{
"mcpServers": {
"markitdown": {
"command": "uvx",
"args": ["markitdown-mcp==0.0.1a4"]
}
}
}
```
## Prerequisites
### For Podman MCP
1. **Podman Desktop** installed and running
2. Podman machine initialized and started:
```powershell
podman machine init
podman machine start
```
### For Gitea MCP
1. **Gitea MCP executable** at `d:\gitea-mcp\gitea-mcp.exe`
2. **Gitea Access Tokens** with appropriate permissions:
- `repo` - Full repository access
- `write:user` - User profile access
- `read:organization` - Organization access
### For Chrome DevTools MCP
1. **Chrome browser** installed (stable channel)
2. **Node.js 18+** for npx execution
### For Markitdown MCP
1. **Python 3.8+** installed
2. **uvx** (universal virtualenv executor):
```powershell
pip install uvx
```
## Testing MCP Servers
### Test Podman Connection
```powershell
podman ps
# Should list running containers
```
### Test Gitea API Access
```powershell
curl -H "Authorization: token YOUR_TOKEN" https://gitea.projectium.com/api/v1/user
# Should return your user information
```
### Test Database Container
```powershell
podman exec flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev -c "SELECT version();"
# Should return PostgreSQL version
```
## Security Notes
### Token Management
- **Never commit tokens** to version control
- Store tokens in environment variables or secure password managers
- Rotate tokens periodically
- Use minimal required permissions
### Access Tokens in Configuration Files
The configuration files (`mcp.json` and `settings.json`) contain sensitive access tokens. These files should:
- Be added to `.gitignore`
- Have restricted file permissions
- Be backed up securely
- Be updated when tokens are rotated
### Current Security Setup
- `%APPDATA%\Code\User\mcp.json` - Gitea tokens embedded
- `%USERPROFILE%\.claude\settings.json` - Gitea tokens embedded
- Both files are in user-specific directories with appropriate Windows ACLs
## Troubleshooting
### Podman MCP Not Working
1. Check Podman machine status:
```powershell
podman machine list
```
2. Ensure Podman Desktop is running
3. Verify Docker socket is accessible:
```powershell
podman ps
```
### Gitea MCP Connection Issues
1. Verify token has correct permissions
2. Check network connectivity to Gitea server:
```powershell
curl https://gitea.projectium.com/api/v1/version
```
3. Ensure `gitea-mcp.exe` is not blocked by antivirus/firewall
### VS Code Extension Issues
1. **Reload Window**: Press `Ctrl+Shift+P` → "Developer: Reload Window"
2. **Check Extension Logs**: View → Output → Select extension from dropdown
3. **Verify JSON Syntax**: Ensure both config files have valid JSON
### MCP Server Not Loading
1. Check config file syntax with JSON validator
2. Verify executable paths are correct (use forward slashes or escaped backslashes)
3. Ensure required dependencies are installed (Node.js, Python, etc.)
4. Check VS Code developer console for errors: Help → Toggle Developer Tools
## Adding New MCP Servers
To add a new MCP server to both Gemini Code and Claude Code:
1. **Install the MCP server** (if it's an npm package):
```powershell
npm install -g @modelcontextprotocol/server-YOUR-SERVER
```
2. **Add to Gemini Code** (`mcp.json`):
```json
{
"servers": {
"your-server-name": {
"type": "stdio",
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-YOUR-SERVER"],
"env": {}
}
}
}
```
3. **Add to Claude Code** (`settings.json`):
```json
{
"mcpServers": {
"your-server-name": {
"command": "npx",
"args": ["-y", "@modelcontextprotocol/server-YOUR-SERVER"],
"env": {}
}
}
}
```
4. **Reload VS Code**
## Current Project Integration
### ADR Implementation Status
- **ADR-0002**: Transaction Management ✅ Enforced
- **ADR-0003**: Input Validation ✅ Enforced with URL validation
### Database Setup
- PostgreSQL 15 + PostGIS running in container
- 63 tables created
- URL constraints active:
- `flyers_image_url_check` enforces `^https?://.*`
- `flyers_icon_url_check` enforces `^https?://.*`
### Development Workflow
1. Start containers: `podman start flyer-crawler-postgres flyer-crawler-redis`
2. Use MCP servers to manage development environment
3. AI assistants can:
- Manage containers via Podman MCP
- Access repository via Gitea MCP
- Edit files via Filesystem MCP
- Fetch documentation via Fetch MCP
## Resources
- [Model Context Protocol Documentation](https://modelcontextprotocol.io/)
- [Gitea API Documentation](https://docs.gitea.com/api/1.22/)
- [Podman Desktop](https://podman-desktop.io/)
- [Claude Code Documentation](https://docs.anthropic.com/claude-code)
## Maintenance
### Regular Tasks
- **Monthly**: Rotate Gitea access tokens
- **Weekly**: Update MCP server packages:
```powershell
npm update -g @modelcontextprotocol/server-*
```
- **As Needed**: Update Gitea MCP executable when new version is released
### Backup Configuration
Recommended to backup these files regularly:
- `%APPDATA%\Code\User\mcp.json`
- `%USERPROFILE%\.claude\settings.json`
## Gitea Workflows and CI/CD
This project uses Gitea Actions for continuous integration and deployment. The workflows are located in `.gitea/workflows/`.
### Available Workflows
#### Automated Workflows
**deploy-to-test.yml** - Automated deployment to test environment
- **Trigger**: Automatically on every push to `main` branch
- **Runner**: `projectium.com` (self-hosted)
- **Process**:
1. Version bump (patch) with `[skip ci]` tag
2. TypeScript type-check and linting
3. Run unit tests + integration tests + E2E tests
4. Generate merged coverage report
5. Build React frontend for test environment
6. Deploy to `flyer-crawler-test.projectium.com`
7. Restart PM2 processes for test environment
8. Update database schema hash
- **Coverage Report**: https://flyer-crawler-test.projectium.com/coverage
- **Environment Variables**: Uses test database and Redis credentials
#### Manual Workflows
**deploy-to-prod.yml** - Manual deployment to production
- **Trigger**: Manual via workflow_dispatch
- **Confirmation Required**: Must type "deploy-to-prod"
- **Process**:
1. Version bump (minor) for production release
2. Check database schema hash (fails if mismatch)
3. Build React frontend for production
4. Deploy to `flyer-crawler.projectium.com`
5. Restart PM2 processes (with version check)
6. Update production database schema hash
- **Optional**: Force PM2 reload even if version matches
**manual-db-backup.yml** - Database backup workflow
- Creates timestamped backup of production database
- Stored in `/var/backups/postgres/`
**manual-db-restore.yml** - Database restore workflow
- Restores production database from backup file
- Requires confirmation and backup filename
**manual-db-reset-test.yml** - Reset test database
- Drops and recreates test database schema
- Used for testing schema migrations
**manual-db-reset-prod.yml** - Reset production database
- **DANGER**: Drops and recreates production database
- Requires multiple confirmations
**manual-deploy-major.yml** - Major version deployment
- Similar to deploy-to-prod but bumps major version
- For breaking changes or major releases
### Accessing Workflows via Gitea MCP
With the Gitea MCP server configured, AI assistants can:
- View workflow files
- Monitor workflow runs
- Check deployment status
- Review CI/CD logs
- Trigger manual workflows (via API)
**Example MCP Operations**:
```bash
# Via Gitea MCP, you can:
# - List recent workflow runs
# - View workflow logs
# - Check deployment status
# - Review test results
# - Monitor coverage reports
```
### Key Environment Variables for CI/CD
The workflows use these Gitea repository secrets:
**Database**:
- `DB_HOST` - PostgreSQL host
- `DB_USER` - Database user
- `DB_PASSWORD` - Database password
- `DB_DATABASE_PROD` - Production database name
- `DB_DATABASE_TEST` - Test database name
**Redis**:
- `REDIS_PASSWORD_PROD` - Production Redis password
- `REDIS_PASSWORD_TEST` - Test Redis password
**API Keys**:
- `VITE_GOOGLE_GENAI_API_KEY` - Production Gemini API key
- `VITE_GOOGLE_GENAI_API_KEY_TEST` - Test Gemini API key
- `GOOGLE_MAPS_API_KEY` - Google Maps Geocoding API key
**Authentication**:
- `JWT_SECRET` - JWT signing secret
### Schema Migration Process
The workflows use a schema hash comparison system:
1. **Hash Calculation**: SHA-256 hash of `sql/master_schema_rollup.sql`
2. **Storage**: Hashes stored in `public.schema_info` table
3. **Comparison**: On each deployment, current hash vs deployed hash
4. **Protection**: Deployment fails if schemas don't match
**Manual Migration Steps** (when schema changes):
1. Update `sql/master_schema_rollup.sql`
2. Run manual migration workflow or:
```bash
psql -U <user> -d <database> -f sql/master_schema_rollup.sql
```
3. Deploy will update hash automatically
### PM2 Process Management
The workflows manage three PM2 processes per environment:
**Production** (`ecosystem.config.cjs --env production`):
- `flyer-crawler-api` - Express API server
- `flyer-crawler-worker` - Background job worker
- `flyer-crawler-analytics-worker` - Analytics processor
**Test** (`ecosystem.config.cjs --env test`):
- `flyer-crawler-api-test` - Test Express API server
- `flyer-crawler-worker-test` - Test background worker
- `flyer-crawler-analytics-worker-test` - Test analytics worker
**Process Cleanup**:
- Workflows automatically delete errored/stopped processes
- Version comparison prevents unnecessary reloads
- Force reload option available for production
### Monitoring Deployment via MCP
Using Gitea MCP, you can monitor deployments in real-time:
1. **Check Workflow Status**:
- View running workflows
- See step-by-step progress
- Read deployment logs
2. **PM2 Process Monitoring**:
- Workflows output PM2 status after deployment
- View process IDs, memory usage, uptime
- Check recent logs (last 20 lines)
3. **Coverage Reports**:
- Automatically published to test environment
- HTML reports with detailed breakdown
- Merged coverage from unit + integration + E2E + server
### Development Workflow Integration
**Local Development** → **Push to main** → **Auto-deploy to test** → **Manual deploy to prod**
1. Develop locally with Podman containers
2. Commit and push to `main` branch
3. Gitea Actions automatically:
- Runs all tests
- Generates coverage
- Deploys to test environment
4. Review test deployment at https://flyer-crawler-test.projectium.com
5. Manually trigger production deployment when ready
### Using MCP for Deployment Tasks
With the configured MCP servers, you can:
**Via Gitea MCP**:
- Trigger manual workflows
- View deployment history
- Monitor test results
- Access workflow logs
**Via Podman MCP**:
- Inspect container logs (for local testing)
- Manage local database containers
- Test migrations locally
**Via Filesystem MCP**:
- Review workflow files
- Edit deployment scripts
- Update ecosystem config
## Version History
- **2026-01-07**: Initial MCP configuration for Gemini Code and Claude Code
- Added Gitea MCP servers (projectium, torbonium, lan)
- Added Podman MCP server
- Added Filesystem, Fetch MCP servers
- Configured Chrome DevTools and Markitdown (disabled by default)
- Documented Gitea workflows and CI/CD pipeline

303
READMEv2.md Normal file
View File

@@ -0,0 +1,303 @@
# Flyer Crawler - Development Environment Setup
Quick start guide for getting the development environment running with Podman containers.
## Prerequisites
- **Windows with WSL 2**: Install WSL 2 by running `wsl --install` in an administrator PowerShell
- **Podman Desktop**: Download and install [Podman Desktop for Windows](https://podman-desktop.io/)
- **Node.js 20+**: Required for running the application
## Quick Start - Container Environment
### 1. Initialize Podman
```powershell
# Start Podman machine (do this once after installing Podman Desktop)
podman machine init
podman machine start
```
### 2. Start Required Services
Start PostgreSQL (with PostGIS) and Redis containers:
```powershell
# Navigate to project directory
cd D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com
# Start PostgreSQL with PostGIS
podman run -d \
--name flyer-crawler-postgres \
-e POSTGRES_USER=postgres \
-e POSTGRES_PASSWORD=postgres \
-e POSTGRES_DB=flyer_crawler_dev \
-p 5432:5432 \
docker.io/postgis/postgis:15-3.3
# Start Redis
podman run -d \
--name flyer-crawler-redis \
-e REDIS_PASSWORD="" \
-p 6379:6379 \
docker.io/library/redis:alpine
```
### 3. Wait for PostgreSQL to Initialize
```powershell
# Wait a few seconds, then check if PostgreSQL is ready
podman exec flyer-crawler-postgres pg_isready -U postgres
# Should output: /var/run/postgresql:5432 - accepting connections
```
### 4. Install Required PostgreSQL Extensions
```powershell
podman exec flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev -c "CREATE EXTENSION IF NOT EXISTS postgis; CREATE EXTENSION IF NOT EXISTS pg_trgm; CREATE EXTENSION IF NOT EXISTS \"uuid-ossp\";"
```
### 5. Apply Database Schema
```powershell
# Apply the complete schema with URL constraints enabled
podman exec -i flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev < sql/master_schema_rollup.sql
```
### 6. Verify URL Constraints Are Enabled
```powershell
podman exec flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev -c "\d public.flyers" | grep -E "(image_url|icon_url|Check)"
```
You should see:
```
image_url | text | | not null |
icon_url | text | | not null |
Check constraints:
"flyers_icon_url_check" CHECK (icon_url ~* '^https?://.*'::text)
"flyers_image_url_check" CHECK (image_url ~* '^https?://.*'::text)
```
### 7. Set Environment Variables and Start Application
```powershell
# Set required environment variables
$env:NODE_ENV="development"
$env:DB_HOST="localhost"
$env:DB_USER="postgres"
$env:DB_PASSWORD="postgres"
$env:DB_NAME="flyer_crawler_dev"
$env:REDIS_URL="redis://localhost:6379"
$env:PORT="3001"
$env:FRONTEND_URL="http://localhost:5173"
# Install dependencies (first time only)
npm install
# Start the development server (runs both backend and frontend)
npm run dev
```
The application will be available at:
- **Frontend**: http://localhost:5173
- **Backend API**: http://localhost:3001
## Managing Containers
### View Running Containers
```powershell
podman ps
```
### Stop Containers
```powershell
podman stop flyer-crawler-postgres flyer-crawler-redis
```
### Start Containers (After They've Been Created)
```powershell
podman start flyer-crawler-postgres flyer-crawler-redis
```
### Remove Containers (Clean Slate)
```powershell
podman stop flyer-crawler-postgres flyer-crawler-redis
podman rm flyer-crawler-postgres flyer-crawler-redis
```
### View Container Logs
```powershell
podman logs flyer-crawler-postgres
podman logs flyer-crawler-redis
```
## Database Management
### Connect to PostgreSQL
```powershell
podman exec -it flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev
```
### Reset Database Schema
```powershell
# Drop all tables
podman exec -i flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev < sql/drop_tables.sql
# Reapply schema
podman exec -i flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev < sql/master_schema_rollup.sql
```
### Seed Development Data
```powershell
npm run db:reset:dev
```
## Running Tests
### Unit Tests
```powershell
npm run test:unit
```
### Integration Tests
**IMPORTANT**: Integration tests require the PostgreSQL and Redis containers to be running.
```powershell
# Make sure containers are running
podman ps
# Run integration tests
npm run test:integration
```
## Troubleshooting
### Podman Machine Issues
If you get "unable to connect to Podman socket" errors:
```powershell
podman machine start
```
### PostgreSQL Connection Refused
Make sure PostgreSQL is ready:
```powershell
podman exec flyer-crawler-postgres pg_isready -U postgres
```
### Port Already in Use
If ports 5432 or 6379 are already in use, you can either:
1. Stop the conflicting service
2. Change the port mapping when creating containers (e.g., `-p 5433:5432`)
### URL Validation Errors
The database now enforces URL constraints. All `image_url` and `icon_url` fields must:
- Start with `http://` or `https://`
- Match the regex pattern: `^https?://.*`
Make sure the `FRONTEND_URL` environment variable is set correctly to avoid URL validation errors.
## ADR Implementation Status
This development environment implements:
- **ADR-0002**: Transaction Management ✅
- All database operations use the `withTransaction` pattern
- Automatic rollback on errors
- No connection pool leaks
- **ADR-0003**: Input Validation ✅
- Zod schemas for URL validation
- Database constraints enabled
- Validation at API boundaries
## Development Workflow
1. **Start Containers** (once per development session)
```powershell
podman start flyer-crawler-postgres flyer-crawler-redis
```
2. **Start Application**
```powershell
npm run dev
```
3. **Make Changes** to code (auto-reloads via `tsx watch`)
4. **Run Tests** before committing
```powershell
npm run test:unit
npm run test:integration
```
5. **Stop Application** (Ctrl+C)
6. **Stop Containers** (optional, or leave running)
```powershell
podman stop flyer-crawler-postgres flyer-crawler-redis
```
## PM2 Worker Setup (Production-like)
To test with PM2 workers locally:
```powershell
# Install PM2 globally (once)
npm install -g pm2
# Start the worker
pm2 start npm --name "flyer-crawler-worker" -- run worker:prod
# View logs
pm2 logs flyer-crawler-worker
# Stop worker
pm2 stop flyer-crawler-worker
pm2 delete flyer-crawler-worker
```
## Next Steps
After getting the environment running:
1. Review [docs/adr/](docs/adr/) for architectural decisions
2. Check [sql/master_schema_rollup.sql](sql/master_schema_rollup.sql) for database schema
3. Explore [src/routes/](src/routes/) for API endpoints
4. Review [src/types.ts](src/types.ts) for TypeScript type definitions
## Common Environment Variables
Create these environment variables for development:
```powershell
# Database
$env:DB_HOST="localhost"
$env:DB_USER="postgres"
$env:DB_PASSWORD="postgres"
$env:DB_NAME="flyer_crawler_dev"
$env:DB_PORT="5432"
# Redis
$env:REDIS_URL="redis://localhost:6379"
# Application
$env:NODE_ENV="development"
$env:PORT="3001"
$env:FRONTEND_URL="http://localhost:5173"
# Authentication (generate your own secrets)
$env:JWT_SECRET="your-dev-jwt-secret-change-this"
$env:SESSION_SECRET="your-dev-session-secret-change-this"
# AI Services (get your own API keys)
$env:VITE_GOOGLE_GENAI_API_KEY="your-google-genai-api-key"
$env:GOOGLE_MAPS_API_KEY="your-google-maps-api-key"
```
## Resources
- [Podman Desktop Documentation](https://podman-desktop.io/docs)
- [PostGIS Documentation](https://postgis.net/documentation/)
- [Original README.md](README.md) for production setup

View File

@@ -2,7 +2,9 @@
**Date**: 2025-12-12
**Status**: Proposed
**Status**: Accepted
**Implemented**: 2026-01-07
## Context

View File

@@ -2,7 +2,9 @@
**Date**: 2025-12-12
**Status**: Proposed
**Status**: Accepted
**Implemented**: 2026-01-07
## Context

View File

@@ -2,7 +2,9 @@
**Date**: 2025-12-12
**Status**: Proposed
**Status**: Accepted
**Implemented**: 2026-01-07
## Context

View File

@@ -1,8 +1,9 @@
# ADR-005: Frontend State Management and Server Cache Strategy
**Date**: 2025-12-12
**Implementation Date**: 2026-01-08
**Status**: Proposed
**Status**: Accepted and Implemented (Phases 1 & 2 complete)
## Context
@@ -16,3 +17,58 @@ We will adopt a dedicated library for managing server state, such as **TanStack
**Positive**: Leads to a more performant, predictable, and simpler frontend codebase. Standardizes how the client-side communicates with the server and handles loading/error states. Improves user experience through intelligent caching.
**Negative**: Introduces a new frontend dependency. Requires a learning curve for developers unfamiliar with the library. Requires refactoring of existing data-fetching logic.
## Implementation Status
### Phase 1: Infrastructure & Core Queries (✅ Complete - 2026-01-08)
**Files Created:**
- [src/config/queryClient.ts](../../src/config/queryClient.ts) - Global QueryClient configuration
- [src/hooks/queries/useFlyersQuery.ts](../../src/hooks/queries/useFlyersQuery.ts) - Flyers data query
- [src/hooks/queries/useWatchedItemsQuery.ts](../../src/hooks/queries/useWatchedItemsQuery.ts) - Watched items query
- [src/hooks/queries/useShoppingListsQuery.ts](../../src/hooks/queries/useShoppingListsQuery.ts) - Shopping lists query
**Files Modified:**
- [src/providers/AppProviders.tsx](../../src/providers/AppProviders.tsx) - Added QueryClientProvider wrapper
- [src/providers/FlyersProvider.tsx](../../src/providers/FlyersProvider.tsx) - Refactored to use TanStack Query
- [src/providers/UserDataProvider.tsx](../../src/providers/UserDataProvider.tsx) - Refactored to use TanStack Query
- [src/services/apiClient.ts](../../src/services/apiClient.ts) - Added pagination params to fetchFlyers
**Benefits Achieved:**
- ✅ Removed ~150 lines of custom state management code
- ✅ Automatic caching of server data
- ✅ Background refetching for stale data
- ✅ React Query Devtools available in development
- ✅ Automatic data invalidation on user logout
- ✅ Better error handling and loading states
### Phase 2: Remaining Queries (✅ Complete - 2026-01-08)
**Files Created:**
- [src/hooks/queries/useMasterItemsQuery.ts](../../src/hooks/queries/useMasterItemsQuery.ts) - Master grocery items query
- [src/hooks/queries/useFlyerItemsQuery.ts](../../src/hooks/queries/useFlyerItemsQuery.ts) - Flyer items query
**Files Modified:**
- [src/providers/MasterItemsProvider.tsx](../../src/providers/MasterItemsProvider.tsx) - Refactored to use TanStack Query
- [src/hooks/useFlyerItems.ts](../../src/hooks/useFlyerItems.ts) - Refactored to use TanStack Query
**Benefits Achieved:**
- ✅ Removed additional ~50 lines of custom state management code
- ✅ Per-flyer item caching (items cached separately for each flyer)
- ✅ Longer cache times for infrequently changing data (master items)
- ✅ Automatic query disabling when dependencies are not met
### Phase 3: Mutations (⏳ Pending)
- Add/remove watched items
- Shopping list CRUD operations
- Optimistic updates
- Cache invalidation strategies
### Phase 4: Cleanup (⏳ Pending)
- Remove deprecated custom hooks
- Remove stub implementations
- Update all dependent components
## Implementation Guide
See [plans/adr-0005-implementation-plan.md](../../plans/adr-0005-implementation-plan.md) for detailed implementation steps.

View File

@@ -0,0 +1,41 @@
# ADR-027: Standardized Naming Convention for AI and Database Types
**Date**: 2026-01-05
**Status**: Accepted
## Context
The application codebase primarily follows the standard TypeScript convention of `camelCase` for variable and property names. However, the PostgreSQL database uses `snake_case` for column names. Additionally, the AI prompts are designed to extract data that maps directly to these database columns.
Attempting to enforce `camelCase` strictly across the entire stack created friction and ambiguity, particularly in the background processing pipeline where data moves from the AI model directly to the database. Developers were unsure whether to transform keys immediately upon receipt (adding overhead) or keep them as-is.
## Decision
We will adopt a hybrid naming convention strategy to explicitly distinguish between internal application state and external/persisted data formats.
1. **Database and AI Types (`snake_case`)**:
Interfaces, Type definitions, and Zod schemas that represent raw database rows or direct AI responses **MUST** use `snake_case`.
- *Examples*: `AiFlyerDataSchema`, `ExtractedFlyerItemSchema`, `FlyerInsert`.
- *Reasoning*: This avoids unnecessary mapping layers when inserting data into the database or parsing AI output. It serves as a visual cue that the data is "raw", "external", or destined for persistence.
2. **Internal Application Logic (`camelCase`)**:
Variables, function arguments, and processed data structures used within the application logic (Service layer, UI components, utility functions) **MUST** use `camelCase`.
- *Reasoning*: This adheres to standard JavaScript/TypeScript practices and maintains consistency with the rest of the ecosystem (React, etc.).
3. **Boundary Handling**:
- For background jobs that primarily move data from AI to DB, preserving `snake_case` is preferred to minimize transformation logic.
- For API responses sent to the frontend, data should generally be transformed to `camelCase` unless it is a direct dump of a database entity for a specific administrative view.
## Consequences
### Positive
- **Visual Distinction**: It is immediately obvious whether a variable holds raw data (`price_in_cents`) or processed application state (`priceInCents`).
- **Efficiency**: Reduces boilerplate code for mapping keys (e.g., `price_in_cents: data.priceInCents`) when performing bulk inserts or updates.
- **Simplicity**: AI prompts can request JSON keys that match the database schema 1:1, reducing the risk of mapping errors.
### Negative
- **Context Switching**: Developers must be mindful of the casing context.
- **Linter Configuration**: May require specific overrides or `// eslint-disable-next-line` comments if the linter is configured to strictly enforce `camelCase` everywhere.

4
package-lock.json generated
View File

@@ -1,12 +1,12 @@
{
"name": "flyer-crawler",
"version": "0.9.26",
"version": "0.9.59",
"lockfileVersion": 3,
"requires": true,
"packages": {
"": {
"name": "flyer-crawler",
"version": "0.9.26",
"version": "0.9.59",
"dependencies": {
"@bull-board/api": "^6.14.2",
"@bull-board/express": "^6.14.2",

View File

@@ -1,7 +1,7 @@
{
"name": "flyer-crawler",
"private": true,
"version": "0.9.26",
"version": "0.9.59",
"type": "module",
"scripts": {
"dev": "concurrently \"npm:start:dev\" \"vite\"",

View File

@@ -0,0 +1,426 @@
# ADR-0005 Implementation Plan: Frontend State Management with TanStack Query
**Date**: 2026-01-08
**Status**: Ready for Implementation
**Related ADR**: [ADR-0005: Frontend State Management and Server Cache Strategy](../docs/adr/0005-frontend-state-management-and-server-cache-strategy.md)
## Current State Analysis
### What We Have
1.**TanStack Query v5.90.12 already installed** in package.json
2.**Not being used** - Custom hooks reimplementing its functionality
3.**Custom `useInfiniteQuery` hook** ([src/hooks/useInfiniteQuery.ts](../src/hooks/useInfiniteQuery.ts)) using `useState`/`useEffect`
4.**Custom `useApiOnMount` hook** (inferred from UserDataProvider)
5.**Multiple Context Providers** doing manual data fetching
### Current Data Fetching Patterns
#### Pattern 1: Custom useInfiniteQuery Hook
**Location**: [src/hooks/useInfiniteQuery.ts](../src/hooks/useInfiniteQuery.ts)
**Used By**: [src/providers/FlyersProvider.tsx](../src/providers/FlyersProvider.tsx)
**Problems**:
- Reimplements pagination logic that TanStack Query provides
- Manual loading state management
- Manual error handling
- No automatic caching
- No background refetching
- No request deduplication
#### Pattern 2: useApiOnMount Hook
**Location**: Unknown (needs investigation)
**Used By**: [src/providers/UserDataProvider.tsx](../src/providers/UserDataProvider.tsx)
**Problems**:
- Fetches data on mount only
- Manual loading/error state management
- No caching between unmount/remount
- Redundant state synchronization logic
## Implementation Strategy
### Phase 1: Setup TanStack Query Infrastructure (Day 1)
#### 1.1 Create QueryClient Configuration
**File**: `src/config/queryClient.ts`
```typescript
import { QueryClient } from '@tanstack/react-query';
export const queryClient = new QueryClient({
defaultOptions: {
queries: {
staleTime: 1000 * 60 * 5, // 5 minutes
gcTime: 1000 * 60 * 30, // 30 minutes (formerly cacheTime)
retry: 1,
refetchOnWindowFocus: false,
refetchOnMount: true,
},
mutations: {
retry: 0,
},
},
});
```
#### 1.2 Wrap App with QueryClientProvider
**File**: `src/providers/AppProviders.tsx`
Add TanStack Query provider at the top level:
```typescript
import { QueryClientProvider } from '@tanstack/react-query';
import { ReactQueryDevtools } from '@tanstack/react-query-devtools';
import { queryClient } from '../config/queryClient';
export const AppProviders = ({ children }) => {
return (
<QueryClientProvider client={queryClient}>
{/* Existing providers */}
{children}
{/* Add devtools in development */}
{import.meta.env.DEV && <ReactQueryDevtools initialIsOpen={false} />}
</QueryClientProvider>
);
};
```
### Phase 2: Replace Custom Hooks with TanStack Query (Days 2-5)
#### 2.1 Replace useInfiniteQuery Hook
**Current**: [src/hooks/useInfiniteQuery.ts](../src/hooks/useInfiniteQuery.ts)
**Action**: Create wrapper around TanStack's `useInfiniteQuery`
**New File**: `src/hooks/queries/useInfiniteFlyersQuery.ts`
```typescript
import { useInfiniteQuery } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
export const useInfiniteFlyersQuery = () => {
return useInfiniteQuery({
queryKey: ['flyers'],
queryFn: async ({ pageParam }) => {
const response = await apiClient.fetchFlyers(pageParam);
if (!response.ok) {
const error = await response.json();
throw new Error(error.message || 'Failed to fetch flyers');
}
return response.json();
},
initialPageParam: 0,
getNextPageParam: (lastPage) => lastPage.nextCursor ?? undefined,
});
};
```
#### 2.2 Replace FlyersProvider
**Current**: [src/providers/FlyersProvider.tsx](../src/providers/FlyersProvider.tsx)
**Action**: Simplify to use TanStack Query hook
```typescript
import React, { ReactNode, useMemo } from 'react';
import { FlyersContext } from '../contexts/FlyersContext';
import { useInfiniteFlyersQuery } from '../hooks/queries/useInfiniteFlyersQuery';
export const FlyersProvider: React.FC<{ children: ReactNode }> = ({ children }) => {
const {
data,
isLoading,
error,
fetchNextPage,
hasNextPage,
isRefetching,
refetch,
} = useInfiniteFlyersQuery();
const flyers = useMemo(
() => data?.pages.flatMap((page) => page.items) ?? [],
[data]
);
const value = useMemo(
() => ({
flyers,
isLoadingFlyers: isLoading,
flyersError: error,
fetchNextFlyersPage: fetchNextPage,
hasNextFlyersPage: !!hasNextPage,
isRefetchingFlyers: isRefetching,
refetchFlyers: refetch,
}),
[flyers, isLoading, error, fetchNextPage, hasNextPage, isRefetching, refetch]
);
return <FlyersContext.Provider value={value}>{children}</FlyersContext.Provider>;
};
```
**Benefits**:
- ~100 lines of code removed
- Automatic caching
- Background refetching
- Request deduplication
- Optimistic updates support
#### 2.3 Replace UserDataProvider
**Current**: [src/providers/UserDataProvider.tsx](../src/providers/UserDataProvider.tsx)
**Action**: Use TanStack Query's `useQuery` for watched items and shopping lists
**New Files**:
- `src/hooks/queries/useWatchedItemsQuery.ts`
- `src/hooks/queries/useShoppingListsQuery.ts`
```typescript
// src/hooks/queries/useWatchedItemsQuery.ts
import { useQuery } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
export const useWatchedItemsQuery = (enabled: boolean) => {
return useQuery({
queryKey: ['watched-items'],
queryFn: async () => {
const response = await apiClient.fetchWatchedItems();
if (!response.ok) throw new Error('Failed to fetch watched items');
return response.json();
},
enabled,
});
};
// src/hooks/queries/useShoppingListsQuery.ts
import { useQuery } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
export const useShoppingListsQuery = (enabled: boolean) => {
return useQuery({
queryKey: ['shopping-lists'],
queryFn: async () => {
const response = await apiClient.fetchShoppingLists();
if (!response.ok) throw new Error('Failed to fetch shopping lists');
return response.json();
},
enabled,
});
};
```
**Updated Provider**:
```typescript
import React, { ReactNode, useMemo } from 'react';
import { UserDataContext } from '../contexts/UserDataContext';
import { useAuth } from '../hooks/useAuth';
import { useWatchedItemsQuery } from '../hooks/queries/useWatchedItemsQuery';
import { useShoppingListsQuery } from '../hooks/queries/useShoppingListsQuery';
export const UserDataProvider: React.FC<{ children: ReactNode }> = ({ children }) => {
const { userProfile } = useAuth();
const isEnabled = !!userProfile;
const { data: watchedItems = [], isLoading: isLoadingWatched, error: watchedError } =
useWatchedItemsQuery(isEnabled);
const { data: shoppingLists = [], isLoading: isLoadingLists, error: listsError } =
useShoppingListsQuery(isEnabled);
const value = useMemo(
() => ({
watchedItems,
shoppingLists,
isLoading: isEnabled && (isLoadingWatched || isLoadingLists),
error: watchedError?.message || listsError?.message || null,
}),
[watchedItems, shoppingLists, isEnabled, isLoadingWatched, isLoadingLists, watchedError, listsError]
);
return <UserDataContext.Provider value={value}>{children}</UserDataContext.Provider>;
};
```
**Benefits**:
- ~40 lines of code removed
- No manual state synchronization
- Automatic cache invalidation on user logout
- Background refetching
### Phase 3: Add Mutations for Data Modifications (Days 6-8)
#### 3.1 Create Mutation Hooks
**Example**: `src/hooks/mutations/useAddWatchedItemMutation.ts`
```typescript
import { useMutation, useQueryClient } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
import { notifySuccess, notifyError } from '../../services/notificationService';
export const useAddWatchedItemMutation = () => {
const queryClient = useQueryClient();
return useMutation({
mutationFn: apiClient.addWatchedItem,
onSuccess: () => {
// Invalidate and refetch watched items
queryClient.invalidateQueries({ queryKey: ['watched-items'] });
notifySuccess('Item added to watched list');
},
onError: (error: Error) => {
notifyError(error.message || 'Failed to add item');
},
});
};
```
#### 3.2 Implement Optimistic Updates
**Example**: Optimistic shopping list update
```typescript
export const useUpdateShoppingListMutation = () => {
const queryClient = useQueryClient();
return useMutation({
mutationFn: apiClient.updateShoppingList,
onMutate: async (newList) => {
// Cancel outgoing refetches
await queryClient.cancelQueries({ queryKey: ['shopping-lists'] });
// Snapshot previous value
const previousLists = queryClient.getQueryData(['shopping-lists']);
// Optimistically update
queryClient.setQueryData(['shopping-lists'], (old) =>
old.map((list) => (list.id === newList.id ? newList : list))
);
return { previousLists };
},
onError: (err, newList, context) => {
// Rollback on error
queryClient.setQueryData(['shopping-lists'], context.previousLists);
notifyError('Failed to update shopping list');
},
onSettled: () => {
// Always refetch after error or success
queryClient.invalidateQueries({ queryKey: ['shopping-lists'] });
},
});
};
```
### Phase 4: Remove Old Custom Hooks (Day 9)
#### Files to Remove:
-`src/hooks/useInfiniteQuery.ts` (if not used elsewhere)
-`src/hooks/useApiOnMount.ts` (needs investigation)
#### Files to Update:
- Update any remaining usages in other components
### Phase 5: Testing & Documentation (Day 10)
#### 5.1 Update Tests
- Update provider tests to work with QueryClient
- Add tests for new query hooks
- Add tests for mutation hooks
#### 5.2 Update Documentation
- Mark ADR-0005 as **Accepted** and **Implemented**
- Add usage examples to documentation
- Update developer onboarding guide
## Migration Checklist
### Prerequisites
- [x] TanStack Query installed
- [ ] QueryClient configuration created
- [ ] App wrapped with QueryClientProvider
### Queries
- [ ] Flyers infinite query migrated
- [ ] Watched items query migrated
- [ ] Shopping lists query migrated
- [ ] Master items query migrated (if applicable)
- [ ] Active deals query migrated (if applicable)
### Mutations
- [ ] Add watched item mutation
- [ ] Remove watched item mutation
- [ ] Update shopping list mutation
- [ ] Add shopping list item mutation
- [ ] Remove shopping list item mutation
### Cleanup
- [ ] Remove custom useInfiniteQuery hook
- [ ] Remove custom useApiOnMount hook
- [ ] Update all tests
- [ ] Remove redundant state management code
### Documentation
- [ ] Update ADR-0005 status to "Accepted"
- [ ] Add usage guidelines to README
- [ ] Document query key conventions
- [ ] Document cache invalidation patterns
## Benefits Summary
### Code Reduction
- **Estimated**: ~300-500 lines of custom hook code removed
- **Result**: Simpler, more maintainable codebase
### Performance Improvements
- ✅ Automatic request deduplication
- ✅ Background data synchronization
- ✅ Smart cache invalidation
- ✅ Optimistic updates
- ✅ Automatic retry logic
### Developer Experience
- ✅ React Query Devtools for debugging
- ✅ Type-safe query hooks
- ✅ Standardized patterns across the app
- ✅ Less boilerplate code
### User Experience
- ✅ Faster perceived performance (cached data)
- ✅ Better offline experience
- ✅ Smoother UI interactions (optimistic updates)
- ✅ Automatic background updates
## Risk Assessment
### Low Risk
- TanStack Query is industry-standard
- Already installed in project
- Incremental migration possible
### Mitigation Strategies
1. **Test thoroughly** - Maintain existing test coverage
2. **Migrate incrementally** - One provider at a time
3. **Monitor performance** - Use React Query Devtools
4. **Rollback plan** - Keep old code until migration complete
## Timeline Estimate
**Total**: 10 working days (2 weeks)
- Day 1: Setup infrastructure
- Days 2-5: Migrate queries
- Days 6-8: Add mutations
- Day 9: Cleanup
- Day 10: Testing & documentation
## Next Steps
1. Review this plan with team
2. Get approval to proceed
3. Create implementation tickets
4. Begin Phase 1: Setup
## References
- [TanStack Query Documentation](https://tanstack.com/query/latest)
- [React Query Best Practices](https://tkdodo.eu/blog/practical-react-query)
- [ADR-0005 Original Document](../docs/adr/0005-frontend-state-management-and-server-cache-strategy.md)

View File

@@ -0,0 +1,182 @@
# ADR-0005 Phase 2 Implementation Summary
**Date**: 2026-01-08
**Status**: ✅ Complete
## Overview
Successfully completed Phase 2 of ADR-0005 enforcement by migrating all remaining query-based data fetching to TanStack Query.
## Files Created
### Query Hooks
1. **[src/hooks/queries/useMasterItemsQuery.ts](../src/hooks/queries/useMasterItemsQuery.ts)**
- Fetches all master grocery items
- 10-minute stale time (data changes infrequently)
- 30-minute garbage collection time
2. **[src/hooks/queries/useFlyerItemsQuery.ts](../src/hooks/queries/useFlyerItemsQuery.ts)**
- Fetches items for a specific flyer
- Per-flyer caching (separate cache for each flyer_id)
- Automatically disabled when no flyer ID provided
- 5-minute stale time
## Files Modified
### Providers
1. **[src/providers/MasterItemsProvider.tsx](../src/providers/MasterItemsProvider.tsx)**
- **Before**: 32 lines using `useApiOnMount` with manual state management
- **After**: 31 lines using `useMasterItemsQuery` (cleaner, no manual callbacks)
- Removed: `useEffect`, `useCallback`, `logger` imports
- Removed: Debug logging for mount/unmount
- Added: Automatic caching and background refetching
### Custom Hooks
2. **[src/hooks/useFlyerItems.ts](../src/hooks/useFlyerItems.ts)**
- **Before**: 29 lines with custom wrapper and `useApiOnMount`
- **After**: 32 lines using `useFlyerItemsQuery` (more readable)
- Removed: Complex wrapper function for type satisfaction
- Removed: Manual `enabled` flag handling
- Added: Automatic per-flyer caching
## Code Reduction Summary
### Phase 1 + Phase 2 Combined
- **Total custom state management code removed**: ~200 lines
- **New query hooks created**: 5 files (~200 lines of standardized code)
- **Providers simplified**: 4 files
- **Net result**: Cleaner, more maintainable codebase with better functionality
## Technical Improvements
### 1. Intelligent Caching Strategy
```typescript
// Master items (rarely change) - 10 min stale time
useMasterItemsQuery() // staleTime: 10 minutes
// Flyers (moderate changes) - 2 min stale time
useFlyersQuery() // staleTime: 2 minutes
// User data (frequent changes) - 1 min stale time
useWatchedItemsQuery() // staleTime: 1 minute
useShoppingListsQuery() // staleTime: 1 minute
// Flyer items (static) - 5 min stale time
useFlyerItemsQuery() // staleTime: 5 minutes
```
### 2. Per-Resource Caching
Each flyer's items are cached separately:
```typescript
// Flyer 1 items cached with key: ['flyer-items', 1]
useFlyerItemsQuery(1)
// Flyer 2 items cached with key: ['flyer-items', 2]
useFlyerItemsQuery(2)
// Both caches persist independently
```
### 3. Automatic Query Disabling
```typescript
// Query automatically disabled when flyerId is undefined
const { data } = useFlyerItemsQuery(selectedFlyer?.flyer_id);
// No manual enabled flag needed!
```
## Benefits Achieved
### Performance
-**Reduced API calls** - Data cached between component unmounts
-**Background refetching** - Stale data updates in background
-**Request deduplication** - Multiple components can use same query
-**Optimized cache times** - Different strategies for different data types
### Code Quality
-**Removed ~50 more lines** of custom state management
-**Eliminated useApiOnMount** from all providers
-**Standardized patterns** - All queries follow same structure
-**Better type safety** - TypeScript types flow through queries
### Developer Experience
-**React Query Devtools** - Inspect all queries and cache
-**Easier debugging** - Clear query states and transitions
-**Less boilerplate** - No manual loading/error state management
-**Automatic retries** - Failed queries retry automatically
### User Experience
-**Faster perceived performance** - Cached data shows instantly
-**Fresh data** - Background refetching keeps data current
-**Better offline handling** - Cached data available offline
-**Smoother interactions** - No loading flicker on re-renders
## Remaining Work
### Phase 3: Mutations (Next)
- [ ] Create mutation hooks for data modifications
- [ ] Add/remove watched items with optimistic updates
- [ ] Shopping list CRUD operations
- [ ] Proper cache invalidation strategies
### Phase 4: Cleanup (Final)
- [ ] Remove `useApiOnMount` hook entirely
- [ ] Remove `useApi` hook if no longer used
- [ ] Remove stub implementations in providers
- [ ] Update all dependent tests
## Testing Recommendations
Before merging, test the following:
1. **Flyer List**
- Flyers load on page load
- Flyers cached on navigation away/back
- Background refetch after stale time
2. **Flyer Items**
- Items load when flyer selected
- Each flyer's items cached separately
- Switching between flyers uses cache
3. **Master Items**
- Items available across app
- Long cache time (10 min)
- Shared across all components
4. **User Data**
- Watched items/shopping lists load on login
- Data cleared on logout
- Fresh data on login (not stale from previous user)
5. **React Query Devtools**
- Open devtools in development
- Verify query states and cache
- Check background refetching behavior
## Migration Notes
### Breaking Changes
None! All providers maintain the same interface.
### Deprecation Warnings
The following will log warnings if used:
- `setWatchedItems()` in UserDataProvider
- `setShoppingLists()` in UserDataProvider
These will be removed in Phase 4 after mutations are implemented.
## Documentation Updates
- [x] Updated [ADR-0005](../docs/adr/0005-frontend-state-management-and-server-cache-strategy.md)
- [x] Created [Phase 2 Summary](./adr-0005-phase-2-summary.md)
- [ ] Update component documentation (if needed)
- [ ] Update developer onboarding guide (Phase 4)
## Conclusion
Phase 2 successfully migrated all remaining query-based data fetching to TanStack Query. The application now has a consistent, performant, and maintainable approach to server state management.
**Next Steps**: Proceed to Phase 3 (Mutations) when ready to implement data modification operations.

View File

@@ -0,0 +1,466 @@
# MCP Server Access Summary
**Date**: 2026-01-08
**Environment**: Windows 10, VSCode with Claude Code integration
**Configuration Files**:
- [`mcp.json`](c:/Users/games3/AppData/Roaming/Code/User/mcp.json:1)
- [`mcp-servers.json`](c:/Users/games3/AppData/Roaming/Code/User/globalStorage/mcp-servers.json:1)
---
## Executive Summary
You have **8 MCP servers** configured in your environment. These servers extend Claude's capabilities by providing specialized tools for browser automation, file conversion, Git hosting integration, container management, filesystem access, and HTTP requests.
**Key Findings**:
- ✅ 7 servers are properly configured and ready to test
- ⚠️ 1 server requires token update (gitea-lan)
- 📋 Testing guide and automated script provided
- 🔒 Security considerations documented
---
## MCP Server Inventory
### 1. Chrome DevTools MCP Server
**Status**: ✅ Configured
**Type**: Browser Automation
**Command**: `npx -y chrome-devtools-mcp@latest`
**Capabilities**:
- Launch and control Chrome browser
- Navigate to URLs
- Click elements and interact with DOM
- Capture screenshots
- Monitor network traffic
- Execute JavaScript in browser context
**Use Cases**:
- Web scraping
- Automated testing
- UI verification
- Taking screenshots of web pages
- Debugging frontend issues
**Configuration Details**:
- Headless mode: Enabled
- Isolated: False (shares browser state)
- Channel: Stable
---
### 2. Markitdown MCP Server
**Status**: ✅ Configured
**Type**: File Conversion
**Command**: `C:\Users\games3\.local\bin\uvx.exe markitdown-mcp`
**Capabilities**:
- Convert PDF files to markdown
- Convert DOCX files to markdown
- Convert HTML to markdown
- OCR image files to extract text
- Convert PowerPoint presentations
**Use Cases**:
- Document processing
- Content extraction from various formats
- Making documents AI-readable
- Converting legacy documents to markdown
**Notes**:
- Requires Python and `uvx` to be installed
- Uses Microsoft's Markitdown library
---
### 3. Gitea Torbonium
**Status**: ✅ Configured
**Type**: Git Hosting Integration
**Host**: https://gitea.torbonium.com
**Command**: `d:\gitea-mcp\gitea-mcp.exe run -t stdio`
**Capabilities**:
- List and manage repositories
- Create and update issues
- Manage pull requests
- Read and write repository files
- Create and manage branches
- View commit history
- Manage repository settings
**Use Cases**:
- Automated issue creation
- Repository management
- Code review automation
- Documentation updates
- Release management
**Configuration**:
- Token: Configured (ending in ...fcf8)
- Access: Full API access based on token permissions
---
### 4. Gitea LAN (Torbolan)
**Status**: ⚠️ Requires Configuration
**Type**: Git Hosting Integration
**Host**: https://gitea.torbolan.com
**Command**: `d:\gitea-mcp\gitea-mcp.exe run -t stdio`
**Issue**: Access token is set to `REPLACE_WITH_NEW_TOKEN`
**Action Required**:
1. Log into https://gitea.torbolan.com
2. Navigate to Settings → Applications
3. Generate a new access token
4. Update the token in both [`mcp.json`](c:/Users/games3/AppData/Roaming/Code/User/mcp.json:35) and [`mcp-servers.json`](c:/Users/games3/AppData/Roaming/Code/User/globalStorage/mcp-servers.json:35)
**Capabilities**: Same as Gitea Torbonium (once configured)
---
### 5. Gitea Projectium
**Status**: ✅ Configured
**Type**: Git Hosting Integration
**Host**: https://gitea.projectium.com
**Command**: `d:\gitea-mcp\gitea-mcp.exe run -t stdio`
**Capabilities**: Same as Gitea Torbonium
**Configuration**:
- Token: Configured (ending in ...9ef)
- This appears to be the Gitea instance for your current project
**Note**: This is the Gitea instance hosting the current flyer-crawler project.
---
### 6. Podman/Docker MCP Server
**Status**: ✅ Configured
**Type**: Container Management
**Command**: `npx -y @modelcontextprotocol/server-docker`
**Capabilities**:
- List running containers
- Start and stop containers
- View container logs
- Execute commands inside containers
- Manage Docker images
- Inspect container details
- Create and manage networks
**Use Cases**:
- Container orchestration
- Development environment management
- Log analysis
- Container debugging
- Image management
**Configuration**:
- Docker Host: `npipe:////./pipe/docker_engine`
- Requires: Docker Desktop or Podman running on Windows
**Prerequisites**:
- Docker Desktop must be running
- Named pipe access configured
---
### 7. Filesystem MCP Server
**Status**: ✅ Configured
**Type**: File System Access
**Path**: `D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com`
**Command**: `npx -y @modelcontextprotocol/server-filesystem`
**Capabilities**:
- List directory contents recursively
- Read file contents
- Write and modify files
- Search for files
- Get file metadata (size, dates, permissions)
- Create and delete files/directories
**Use Cases**:
- Project file management
- Bulk file operations
- Code generation and modifications
- File content analysis
- Project structure exploration
**Security Note**:
This server has full read/write access to your project directory. It operates within the specified directory only.
**Scope**:
- Limited to: `D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com`
- Cannot access files outside this directory
---
### 8. Fetch MCP Server
**Status**: ✅ Configured
**Type**: HTTP Client
**Command**: `npx -y @modelcontextprotocol/server-fetch`
**Capabilities**:
- Send HTTP GET requests
- Send HTTP POST requests
- Send PUT, DELETE, PATCH requests
- Set custom headers
- Handle JSON and text responses
- Follow redirects
- Handle authentication
**Use Cases**:
- API testing
- Web scraping
- Data fetching from external services
- Webhook testing
- Integration with external APIs
**Examples**:
- Fetch data from REST APIs
- Download web content
- Test API endpoints
- Retrieve JSON data
- Monitor web services
---
## Current Status: MCP Server Tool Availability
**Important Note**: While these MCP servers are configured in your environment, they are **not currently exposed as callable tools** in this Claude Code session.
### What This Means:
MCP servers typically work by:
1. Running as separate processes
2. Exposing tools and resources via the Model Context Protocol
3. Being connected to the AI assistant by the client application (VSCode)
### Current Situation:
In the current session, Claude Code has access to:
- ✅ Built-in file operations (read, write, search, list)
- ✅ Browser actions
- ✅ Mode switching
- ✅ Task management tools
But does **NOT** have direct access to:
- ❌ MCP server-specific tools (e.g., Gitea API operations)
- ❌ Chrome DevTools controls
- ❌ Markitdown conversion functions
- ❌ Docker container management
- ❌ Specialized fetch operations
### Why This Happens:
MCP servers need to be:
1. Actively connected by the client (VSCode)
2. Running in the background
3. Properly registered with the AI assistant
The configuration files show they are set up, but the connection may not be active in this particular session.
---
## Testing Your MCP Servers
Three approaches to verify your MCP servers are working:
### Approach 1: Run the Automated Test Script
Execute the provided PowerShell script to test all servers:
```powershell
cd plans
.\test-mcp-servers.ps1
```
This will:
- Test each server's basic functionality
- Check API connectivity for Gitea servers
- Verify Docker daemon access
- Test filesystem accessibility
- Output a detailed results report
### Approach 2: Use MCP Inspector
Install and use the official MCP testing tool:
```powershell
# Install
npm install -g @modelcontextprotocol/inspector
# Test individual servers
mcp-inspector npx -y @modelcontextprotocol/server-fetch
mcp-inspector npx -y @modelcontextprotocol/server-filesystem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
```
The inspector provides a web UI to:
- View available tools
- Test tool invocations
- See real-time logs
- Debug server issues
### Approach 3: Manual Testing
Follow the comprehensive guide in [`mcp-server-testing-guide.md`](plans/mcp-server-testing-guide.md:1) for step-by-step manual testing instructions.
---
## Recommendations
### 1. Immediate Actions
- [ ] **Fix Gitea LAN token**: Generate and configure a valid access token for gitea.torbolan.com
- [ ] **Run test script**: Execute `test-mcp-servers.ps1` to verify all servers
- [ ] **Review test results**: Check which servers are functional
- [ ] **Document failures**: Note any servers that fail testing
### 2. Security Improvements
- [ ] **Rotate Gitea tokens**: Consider rotating access tokens if they're old
- [ ] **Review token permissions**: Ensure tokens have minimal required permissions
- [ ] **Audit filesystem scope**: Verify filesystem server only has access to intended directories
- [ ] **Secure token storage**: Consider using environment variables or secret management
- [ ] **Enable audit logging**: Track MCP server operations for security monitoring
### 3. Configuration Optimization
- [ ] **Consolidate configs**: Both `mcp.json` and `mcp-servers.json` have identical content - determine which is canonical
- [ ] **Add error handling**: Configure timeout and retry settings for network-dependent servers
- [ ] **Document usage patterns**: Create examples of common operations for each server
- [ ] **Set up monitoring**: Track MCP server health and availability
### 4. Integration and Usage
- [ ] **Verify VSCode integration**: Ensure MCP servers are actually connected in active sessions
- [ ] **Test tool availability**: Confirm which MCP tools are exposed to Claude Code
- [ ] **Create usage examples**: Document real-world usage scenarios
- [ ] **Set up aliases**: Create shortcuts for commonly-used MCP operations
---
## MCP Server Use Case Matrix
| Server | Code Analysis | Testing | Deployment | Documentation | API Integration |
|--------|--------------|---------|------------|---------------|-----------------|
| Chrome DevTools | ✓ (UI testing) | ✓✓✓ | - | ✓ (screenshots) | ✓ |
| Markitdown | - | - | - | ✓✓✓ | - |
| Gitea (all 3) | ✓✓✓ | ✓ | ✓✓✓ | ✓✓ | ✓✓✓ |
| Docker | ✓ | ✓✓✓ | ✓✓✓ | - | ✓ |
| Filesystem | ✓✓✓ | ✓✓ | ✓ | ✓✓ | ✓ |
| Fetch | ✓ | ✓✓ | ✓ | - | ✓✓✓ |
Legend: ✓✓✓ = Primary use case, ✓✓ = Strong use case, ✓ = Applicable, - = Not applicable
---
## Potential Workflows
### Workflow 1: Automated Documentation Updates
1. **Fetch server**: Get latest API documentation from external service
2. **Markitdown**: Convert to markdown format
3. **Filesystem server**: Write to project documentation folder
4. **Gitea server**: Create commit and push changes
### Workflow 2: Container-Based Testing
1. **Docker server**: Start test containers
2. **Fetch server**: Send test API requests
3. **Docker server**: Collect container logs
4. **Filesystem server**: Write test results
5. **Gitea server**: Update test status in issues
### Workflow 3: Web UI Testing
1. **Chrome DevTools**: Launch browser and navigate to app
2. **Chrome DevTools**: Interact with UI elements
3. **Chrome DevTools**: Capture screenshots
4. **Filesystem server**: Save test artifacts
5. **Gitea server**: Update test documentation
### Workflow 4: Repository Management
1. **Gitea server**: List all repositories
2. **Gitea server**: Check for outdated dependencies
3. **Gitea server**: Create issues for updates needed
4. **Gitea server**: Generate summary report
---
## Next Steps
### Phase 1: Verification (Immediate)
1. Run the test script: [`test-mcp-servers.ps1`](plans/test-mcp-servers.ps1:1)
2. Review results and identify issues
3. Fix Gitea LAN token configuration
4. Re-test all servers
### Phase 2: Documentation (Short-term)
1. Document successful test results
2. Create usage examples for each server
3. Set up troubleshooting guides
4. Document common error scenarios
### Phase 3: Integration (Medium-term)
1. Verify MCP server connectivity in Claude Code sessions
2. Test tool availability and functionality
3. Create workflow templates
4. Integrate into development processes
### Phase 4: Optimization (Long-term)
1. Monitor MCP server performance
2. Optimize configurations
3. Add additional MCP servers as needed
4. Implement automated health checks
---
## Additional Resources
- **MCP Protocol Specification**: https://modelcontextprotocol.io
- **Testing Guide**: [`mcp-server-testing-guide.md`](plans/mcp-server-testing-guide.md:1)
- **Test Script**: [`test-mcp-servers.ps1`](plans/test-mcp-servers.ps1:1)
- **Configuration Files**:
- [`mcp.json`](c:/Users/games3/AppData/Roaming/Code/User/mcp.json:1)
- [`mcp-servers.json`](c:/Users/games3/AppData/Roaming/Code/User/globalStorage/mcp-servers.json:1)
---
## Questions to Consider
1. **Are MCP servers currently connected in active Claude Code sessions?**
- If not, what's required to enable the connection?
2. **Which MCP servers are most critical for your workflow?**
- Prioritize testing and configuration of high-value servers
3. **Are there additional MCP servers you need?**
- Consider: Database MCP, Slack MCP, Jira MCP, etc.
4. **How should MCP server logs be managed?**
- Consider centralized logging and monitoring
5. **What are the backup plans if an MCP server fails?**
- Document fallback procedures
---
## Conclusion
You have a comprehensive MCP server setup that provides powerful capabilities for:
- **Browser automation** (Chrome DevTools)
- **Document conversion** (Markitdown)
- **Git hosting integration** (3 Gitea instances)
- **Container management** (Docker)
- **File system operations** (Filesystem)
- **HTTP requests** (Fetch)
**Immediate Action Required**:
- Fix the Gitea LAN token configuration
- Run the test script to verify all servers are operational
- Review test results and address any failures
**Current Limitation**:
- MCP server tools are not exposed in the current Claude Code session
- May require VSCode or client-side configuration to enable
The provided testing guide and automation script will help you verify that all servers are properly configured and functional.

View File

@@ -0,0 +1,489 @@
# MCP Server Testing Guide
This guide provides step-by-step instructions for manually testing each of the configured MCP servers.
## Overview
MCP (Model Context Protocol) servers are standalone processes that expose tools and resources to AI assistants. Each server runs independently and communicates via stdio.
## Testing Prerequisites
1. **MCP Inspector Tool** - Install the official MCP testing tool:
```bash
npm install -g @modelcontextprotocol/inspector
```
```powershell
npm install -g @modelcontextprotocol/inspector
```
2. **Alternative: Manual stdio testing** - Use the MCP CLI for direct interaction
---
## 1. Chrome DevTools MCP Server
**Purpose**: Browser automation and Chrome DevTools integration
### Test Command:
```bash
npx -y chrome-devtools-mcp@latest --headless true --isolated false --channel stable
```
```powershell
npx -y chrome-devtools-mcp@latest --headless true --isolated false --channel stable
```
### Expected Capabilities:
- Browser launch and control
- DOM inspection
- Network monitoring
- JavaScript execution in browser context
### Manual Test Steps:
1. Run the command above
2. The server should start and output MCP protocol messages
3. Use MCP Inspector to connect:
```bash
mcp-inspector npx -y chrome-devtools-mcp@latest --headless true --isolated false --channel stable
```
```powershell
mcp-inspector npx -y chrome-devtools-mcp@latest --headless true --isolated false --channel stable
```
### Success Indicators:
- Server starts without errors
- Lists available tools (e.g., `navigate`, `click`, `screenshot`)
- Can execute browser actions
---
## 2. Markitdown MCP Server
**Purpose**: Convert various file formats to markdown
### Test Command:
```bash
C:\Users\games3\.local\bin\uvx.exe markitdown-mcp
```
```powershell
C:\Users\games3\.local\bin\uvx.exe markitdown-mcp
```
### Expected Capabilities:
- Convert PDF to markdown
- Convert DOCX to markdown
- Convert HTML to markdown
- Convert images (OCR) to markdown
### Manual Test Steps:
1. Ensure `uvx` is installed (Python tool)
2. Run the command above
3. Test with MCP Inspector:
```bash
mcp-inspector C:\Users\games3\.local\bin\uvx.exe markitdown-mcp
```
```powershell
mcp-inspector C:\Users\games3\.local\bin\uvx.exe markitdown-mcp
```
### Success Indicators:
- Server initializes successfully
- Lists conversion tools
- Can convert a test file
### Troubleshooting:
- If `uvx` is not found, install it:
```bash
pip install uvx
```
```powershell
pip install uvx
```
- Verify Python is in PATH
---
## 3. Gitea MCP Servers
You have three Gitea server configurations. All use the same executable but connect to different instances.
### A. Gitea Torbonium
**Host**: https://gitea.torbonium.com
#### Test Command:
```powershell
$env:GITEA_HOST="https://gitea.torbonium.com"
$env:GITEA_ACCESS_TOKEN="391c9ddbe113378bc87bb8184800ba954648fcf8"
d:\gitea-mcp\gitea-mcp.exe run -t stdio
```
#### Expected Capabilities:
- List repositories
- Create/update issues
- Manage pull requests
- Read/write repository files
- Manage branches
#### Manual Test Steps:
1. Set environment variables
2. Run gitea-mcp.exe
3. Use MCP Inspector or test direct API access:
```bash
curl -H "Authorization: token 391c9ddbe113378bc87bb8184800ba954648fcf8" https://gitea.torbonium.com/api/v1/user/repos
```
```powershell
Invoke-RestMethod -Uri "https://gitea.torbonium.com/api/v1/user/repos" -Headers @{Authorization="token 391c9ddbe113378bc87bb8184800ba954648fcf8"}
```
### B. Gitea LAN (Torbolan)
**Host**: https://gitea.torbolan.com
**Status**: ⚠️ Token needs replacement
#### Test Command:
```powershell
$env:GITEA_HOST="https://gitea.torbolan.com"
$env:GITEA_ACCESS_TOKEN="REPLACE_WITH_NEW_TOKEN" # ⚠️ UPDATE THIS
d:\gitea-mcp\gitea-mcp.exe run -t stdio
```
#### Before Testing:
1. Generate a new access token:
- Log into https://gitea.torbolan.com
- Go to Settings → Applications → Generate New Token
- Copy the token and update the configuration
### C. Gitea Projectium
**Host**: https://gitea.projectium.com
#### Test Command:
```powershell
$env:GITEA_HOST="https://gitea.projectium.com"
$env:GITEA_ACCESS_TOKEN="c72bc0f14f623fec233d3c94b3a16397fe3649ef"
d:\gitea-mcp\gitea-mcp.exe run -t stdio
```
### Success Indicators for All Gitea Servers:
- Server connects to Gitea instance
- Lists available repositories
- Can read repository metadata
- Authentication succeeds
### Troubleshooting:
- **401 Unauthorized**: Token is invalid or expired
- **Connection refused**: Check if Gitea instance is accessible
- **SSL errors**: Verify HTTPS certificate validity
---
## 4. Podman/Docker MCP Server
**Purpose**: Container management and Docker operations
### Test Command:
```powershell
$env:DOCKER_HOST="npipe:////./pipe/docker_engine"
npx -y @modelcontextprotocol/server-docker
```
### Expected Capabilities:
- List containers
- Start/stop containers
- View container logs
- Execute commands in containers
- Manage images
### Manual Test Steps:
1. Ensure Docker Desktop or Podman is running
2. Verify named pipe exists: `npipe:////./pipe/docker_engine`
3. Run the server command
4. Test with MCP Inspector:
```bash
mcp-inspector npx -y @modelcontextprotocol/server-docker
```
```powershell
mcp-inspector npx -y @modelcontextprotocol/server-docker
```
### Verify Docker Access Directly:
```powershell
docker ps
docker images
```
### Success Indicators:
- Server connects to Docker daemon
- Can list containers and images
- Can execute container operations
### Troubleshooting:
- **Cannot connect to Docker daemon**: Ensure Docker Desktop is running
- **Named pipe error**: Check DOCKER_HOST configuration
- **Permission denied**: Run as administrator
---
## 5. Filesystem MCP Server
**Purpose**: Access and manipulate files in specified directory
### Test Command:
```bash
npx -y @modelcontextprotocol/server-filesystem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
```
```powershell
npx -y @modelcontextprotocol/server-filesystem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
```
### Expected Capabilities:
- List directory contents
- Read files
- Write files
- Search files
- Get file metadata
### Manual Test Steps:
1. Run the command above
2. Use MCP Inspector:
```bash
mcp-inspector npx -y @modelcontextprotocol/server-filesystem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
```
```powershell
mcp-inspector npx -y @modelcontextprotocol/server-filesystem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
```
3. Test listing directory contents
### Verify Directory Access:
```powershell
Test-Path "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
Get-ChildItem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com" | Select-Object -First 5
```
### Success Indicators:
- Server starts successfully
- Can list directory contents
- Can read file contents
- Write operations work (if permissions allow)
### Security Note:
This server has access to your entire project directory. Ensure it's only used in trusted contexts.
---
## 6. Fetch MCP Server
**Purpose**: Make HTTP requests to external APIs and websites
### Test Command:
```bash
npx -y @modelcontextprotocol/server-fetch
```
```powershell
npx -y @modelcontextprotocol/server-fetch
```
### Expected Capabilities:
- HTTP GET requests
- HTTP POST requests
- Handle JSON/text responses
- Custom headers
- Follow redirects
### Manual Test Steps:
1. Run the server command
2. Use MCP Inspector:
```bash
mcp-inspector npx -y @modelcontextprotocol/server-fetch
```
```powershell
mcp-inspector npx -y @modelcontextprotocol/server-fetch
```
3. Test fetching a URL through the inspector
### Test Fetch Capability Directly:
```bash
curl https://api.github.com/users/github
```
```powershell
# Test if curl/web requests work
curl https://api.github.com/users/github
# Or use Invoke-RestMethod
Invoke-RestMethod -Uri "https://api.github.com/users/github"
```
### Success Indicators:
- Server initializes
- Can fetch URLs
- Returns proper HTTP responses
- Handles errors gracefully
---
## Comprehensive Testing Script
Here's a PowerShell script to test all servers:
```powershell
# test-mcp-servers.ps1
Write-Host "=== MCP Server Testing Suite ===" -ForegroundColor Cyan
# Test 1: Chrome DevTools
Write-Host "`n[1/8] Testing Chrome DevTools..." -ForegroundColor Yellow
$chromeProc = Start-Process -FilePath "npx" -ArgumentList "-y","chrome-devtools-mcp@latest","--headless","true" -PassThru -NoNewWindow
Start-Sleep -Seconds 3
if (!$chromeProc.HasExited) {
Write-Host "✓ Chrome DevTools server started" -ForegroundColor Green
$chromeProc.Kill()
} else {
Write-Host "✗ Chrome DevTools failed" -ForegroundColor Red
}
# Test 2: Markitdown
Write-Host "`n[2/8] Testing Markitdown..." -ForegroundColor Yellow
if (Test-Path "C:\Users\games3\.local\bin\uvx.exe") {
Write-Host "✓ Markitdown executable found" -ForegroundColor Green
} else {
Write-Host "✗ Markitdown executable not found" -ForegroundColor Red
}
# Test 3-5: Gitea Servers
Write-Host "`n[3/8] Testing Gitea Torbonium..." -ForegroundColor Yellow
try {
$response = Invoke-RestMethod -Uri "https://gitea.torbonium.com/api/v1/user" -Headers @{Authorization="token 391c9ddbe113378bc87bb8184800ba954648fcf8"}
Write-Host "✓ Gitea Torbonium authenticated as: $($response.login)" -ForegroundColor Green
} catch {
Write-Host "✗ Gitea Torbonium failed: $($_.Exception.Message)" -ForegroundColor Red
}
Write-Host "`n[4/8] Testing Gitea LAN..." -ForegroundColor Yellow
Write-Host "⚠ Token needs replacement" -ForegroundColor Yellow
Write-Host "`n[5/8] Testing Gitea Projectium..." -ForegroundColor Yellow
try {
$response = Invoke-RestMethod -Uri "https://gitea.projectium.com/api/v1/user" -Headers @{Authorization="token c72bc0f14f623fec233d3c94b3a16397fe3649ef"}
Write-Host "✓ Gitea Projectium authenticated as: $($response.login)" -ForegroundColor Green
} catch {
Write-Host "✗ Gitea Projectium failed: $($_.Exception.Message)" -ForegroundColor Red
}
# Test 6: Podman/Docker
Write-Host "`n[6/8] Testing Docker..." -ForegroundColor Yellow
try {
docker ps > $null 2>&1
if ($LASTEXITCODE -eq 0) {
Write-Host "✓ Docker daemon accessible" -ForegroundColor Green
} else {
Write-Host "✗ Docker daemon not accessible" -ForegroundColor Red
}
} catch {
Write-Host "✗ Docker not available" -ForegroundColor Red
}
# Test 7: Filesystem
Write-Host "`n[7/8] Testing Filesystem..." -ForegroundColor Yellow
if (Test-Path "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com") {
Write-Host "✓ Project directory accessible" -ForegroundColor Green
} else {
Write-Host "✗ Project directory not found" -ForegroundColor Red
}
# Test 8: Fetch
Write-Host "`n[8/8] Testing Fetch..." -ForegroundColor Yellow
try {
$response = Invoke-RestMethod -Uri "https://api.github.com/zen"
Write-Host "✓ Fetch capability working" -ForegroundColor Green
} catch {
Write-Host "✗ Fetch failed" -ForegroundColor Red
}
Write-Host "`n=== Testing Complete ===" -ForegroundColor Cyan
```
---
## Using MCP Inspector for Interactive Testing
The MCP Inspector provides a visual interface for testing servers:
```bash
# Install globally
npm install -g @modelcontextprotocol/inspector
# Test any server
mcp-inspector <command> <args>
```
```powershell
# Install globally
npm install -g @modelcontextprotocol/inspector
# Test any server
mcp-inspector <command> <args>
```
### Example Sessions:
```bash
# Test fetch server
mcp-inspector npx -y @modelcontextprotocol/server-fetch
# Test filesystem server
mcp-inspector npx -y @modelcontextprotocol/server-filesystem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
# Test Docker server
mcp-inspector npx -y @modelcontextprotocol/server-docker
```
```powershell
# Test fetch server
mcp-inspector npx -y @modelcontextprotocol/server-fetch
# Test filesystem server
mcp-inspector npx -y @modelcontextprotocol/server-filesystem "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
# Test Docker server
mcp-inspector npx -y @modelcontextprotocol/server-docker
```
---
## Common Issues and Solutions
### Issue: "Cannot find module" or "Command not found"
**Solution**: Ensure Node.js and npm are installed and in PATH
### Issue: MCP server starts but doesn't respond
**Solution**: Check server logs, verify stdio communication, ensure no JSON parsing errors
### Issue: Authentication failures with Gitea
**Solution**:
1. Verify tokens haven't expired
2. Check token permissions in Gitea settings
3. Ensure network access to Gitea instances
### Issue: Docker server cannot connect
**Solution**:
1. Start Docker Desktop
2. Verify DOCKER_HOST environment variable
3. Check Windows named pipe permissions
---
## Next Steps
After testing:
1. Document which servers are working
2. Fix any configuration issues
3. Update tokens as needed
4. Consider security implications of exposed servers
5. Set up monitoring for server health
---
## Security Recommendations
1. **Token Security**: Keep Gitea tokens secure, rotate regularly
2. **Filesystem Access**: Limit filesystem server scope to necessary directories
3. **Network Access**: Consider firewall rules for external MCP servers
4. **Audit Logging**: Enable logging for all MCP server operations
5. **Token Permissions**: Use minimal required permissions for Gitea tokens

View File

@@ -0,0 +1,133 @@
# Podman MCP Server Test Results
**Date**: 2026-01-08
**Status**: Configuration Complete ✅
## Configuration Summary
### MCP Configuration File
**Location**: `c:/Users/games3/AppData/Roaming/Code/User/mcp.json`
```json
"podman": {
"command": "npx",
"args": ["-y", "docker-mcp"],
"env": {
"DOCKER_HOST": "ssh://root@127.0.0.1:2972/run/podman/podman.sock"
}
}
```
### Key Configuration Details
- **Package**: `docker-mcp` (community MCP server with SSH support)
- **Connection Method**: SSH to Podman machine
- **SSH Endpoint**: `root@127.0.0.1:2972`
- **Socket Path**: `/run/podman/podman.sock` (inside WSL)
## Podman System Status
### Podman Machine
```
NAME VM TYPE CREATED CPUS MEMORY DISK SIZE
podman-machine-default wsl 4 weeks ago 4 2GiB 100GiB
```
### Connection Information
```
Name: podman-machine-default-root
URI: ssh://root@127.0.0.1:2972/run/podman/podman.sock
Default: true
```
### Container Status
Podman is operational with 3 containers:
- `flyer-dev` (Ubuntu) - Exited
- `flyer-crawler-redis` (Redis) - Exited
- `flyer-crawler-postgres` (PostGIS) - Exited
## Test Results
### Command Line Tests
**Podman CLI**: Working - `podman ps` returns successfully
**Container Management**: Working - Can list and manage containers
**Socket Connection**: Working - SSH connection to Podman machine functional
### MCP Server Integration Tests
**Configuration File**: Updated and valid JSON
**VSCode Restart**: Completed to load new MCP configuration
**Package Selection**: Using `docker-mcp` (supports SSH connections)
**Environment Variables**: DOCKER_HOST set correctly for Podman
## How to Verify MCP Server is Working
The Podman MCP server should now be available through Claude Code. To verify:
1. **In Claude Code conversation**: Ask Claude to list containers or perform container operations
2. **Check VSCode logs**: Look for MCP server connection logs
3. **Test with MCP Inspector** (optional):
```powershell
$env:DOCKER_HOST="ssh://root@127.0.0.1:2972/run/podman/podman.sock"
npx -y @modelcontextprotocol/inspector docker-mcp
```
## Expected MCP Tools Available
Once the MCP server is fully loaded, the following tools should be available:
- **Container Operations**: list, start, stop, restart, remove containers
- **Container Logs**: view container logs
- **Container Stats**: monitor container resource usage
- **Image Management**: list, pull, remove images
- **Container Execution**: execute commands inside containers
## Troubleshooting
### If MCP Server Doesn't Connect
1. **Verify Podman is running**:
```bash
podman ps
```
2. **Check SSH connection**:
```bash
podman system connection list
```
3. **Test docker-mcp package manually**:
```powershell
$env:DOCKER_HOST="ssh://root@127.0.0.1:2972/run/podman/podman.sock"
npx -y docker-mcp
```
4. **Check VSCode Extension Host logs**:
- Open Command Palette (Ctrl+Shift+P)
- Search for "Developer: Show Logs"
- Select "Extension Host"
### Common Issues
- **Port 2972 not accessible**: Restart Podman machine with `podman machine restart`
- **SSH key issues**: Verify SSH keys are set up correctly for Podman machine
- **Package not found**: Ensure npm can access registry (check internet connection)
## Next Steps
1. Test the Podman MCP server by requesting container operations through Claude Code
2. If the MCP server isn't responding, check the Extension Host logs in VSCode
3. Consider testing with alternative packages if `docker-mcp` has issues:
- `docker-mcp-server` (alternative community package)
- `docker-mcp-secure` (security-focused alternative)
## Additional Notes
- The `docker-mcp` package is a community-maintained MCP server
- It supports both local Docker sockets and remote SSH connections
- The package uses the `dockerode` library under the hood, which works with both Docker and Podman
- Podman's API is Docker-compatible, so Docker MCP servers work with Podman
## References
- **docker-mcp package**: https://www.npmjs.com/package/docker-mcp
- **Podman Machine Documentation**: https://docs.podman.io/en/latest/markdown/podman-machine.1.html
- **Model Context Protocol**: https://modelcontextprotocol.io

View File

@@ -0,0 +1,143 @@
# test-mcp-servers.ps1
# Automated testing script for all configured MCP servers
Write-Host "=== MCP Server Testing Suite ===" -ForegroundColor Cyan
Write-Host "Testing all configured MCP servers..." -ForegroundColor White
Write-Host ""
$results = @()
# Test 1: Chrome DevTools
Write-Host "[1/8] Testing Chrome DevTools..." -ForegroundColor Yellow
try {
$chromeProc = Start-Process -FilePath "npx" -ArgumentList "-y","chrome-devtools-mcp@latest","--headless","true" -PassThru -NoNewWindow -RedirectStandardOutput "$env:TEMP\chrome-test.log" -ErrorAction Stop
Start-Sleep -Seconds 5
if (!$chromeProc.HasExited) {
Write-Host " ✓ Chrome DevTools server started successfully" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Chrome DevTools"; Status="PASS"; Details="Server started"}
Stop-Process -Id $chromeProc.Id -Force -ErrorAction SilentlyContinue
} else {
Write-Host " ✗ Chrome DevTools server exited immediately" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Chrome DevTools"; Status="FAIL"; Details="Server exited"}
}
} catch {
Write-Host " ✗ Chrome DevTools failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Chrome DevTools"; Status="FAIL"; Details=$_.Exception.Message}
}
# Test 2: Markitdown
Write-Host "`n[2/8] Testing Markitdown..." -ForegroundColor Yellow
$markitdownPath = "C:\Users\games3\.local\bin\uvx.exe"
if (Test-Path $markitdownPath) {
Write-Host " ✓ Markitdown executable found at: $markitdownPath" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Markitdown"; Status="PASS"; Details="Executable exists"}
} else {
Write-Host " ✗ Markitdown executable not found at: $markitdownPath" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Markitdown"; Status="FAIL"; Details="Executable not found"}
}
# Test 3: Gitea Torbonium
Write-Host "`n[3/8] Testing Gitea Torbonium (gitea.torbonium.com)..." -ForegroundColor Yellow
try {
$headers = @{Authorization="token 391c9ddbe113378bc87bb8184800ba954648fcf8"}
$response = Invoke-RestMethod -Uri "https://gitea.torbonium.com/api/v1/user" -Headers $headers -TimeoutSec 10
Write-Host " ✓ Gitea Torbonium authenticated as: $($response.login)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Gitea Torbonium"; Status="PASS"; Details="Authenticated as $($response.login)"}
} catch {
Write-Host " ✗ Gitea Torbonium failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Gitea Torbonium"; Status="FAIL"; Details=$_.Exception.Message}
}
# Test 4: Gitea LAN
Write-Host "`n[4/8] Testing Gitea LAN (gitea.torbolan.com)..." -ForegroundColor Yellow
Write-Host " âš  Token needs replacement - SKIPPING" -ForegroundColor Yellow
$results += [PSCustomObject]@{Server="Gitea LAN"; Status="SKIP"; Details="Token placeholder needs update"}
# Test 5: Gitea Projectium
Write-Host "`n[5/8] Testing Gitea Projectium (gitea.projectium.com)..." -ForegroundColor Yellow
try {
$headers = @{Authorization="token c72bc0f14f623fec233d3c94b3a16397fe3649ef"}
$response = Invoke-RestMethod -Uri "https://gitea.projectium.com/api/v1/user" -Headers $headers -TimeoutSec 10
Write-Host " ✓ Gitea Projectium authenticated as: $($response.login)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Gitea Projectium"; Status="PASS"; Details="Authenticated as $($response.login)"}
} catch {
Write-Host " ✗ Gitea Projectium failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Gitea Projectium"; Status="FAIL"; Details=$_.Exception.Message}
}
# Test 6: Podman/Docker
Write-Host "`n[6/8] Testing Docker/Podman..." -ForegroundColor Yellow
try {
$dockerOutput = & docker version 2>$null
if ($LASTEXITCODE -eq 0 -and $dockerOutput) {
Write-Host " ✓ Docker daemon accessible" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Docker/Podman"; Status="PASS"; Details="Docker daemon running"}
} else {
Write-Host " ✗ Docker daemon not accessible" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Docker/Podman"; Status="FAIL"; Details="Cannot connect to daemon"}
}
} catch {
Write-Host " ✗ Docker not available: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Docker/Podman"; Status="FAIL"; Details="Docker not installed"}
}
# Test 7: Filesystem
Write-Host "`n[7/8] Testing Filesystem..." -ForegroundColor Yellow
$projectPath = "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
if (Test-Path $projectPath) {
$fileCount = (Get-ChildItem $projectPath -File -Recurse -ErrorAction SilentlyContinue | Measure-Object).Count
Write-Host " ✓ Project directory accessible ($fileCount files)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Filesystem"; Status="PASS"; Details="Path accessible, $fileCount files"}
} else {
Write-Host " ✗ Project directory not accessible" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Filesystem"; Status="FAIL"; Details="Path not accessible"}
}
# Test 8: Fetch MCP Server
Write-Host "`n[8/8] Testing Fetch MCP Server..." -ForegroundColor Yellow
try {
# Test by attempting to fetch a simple public API
$testUrl = "https://api.github.com/zen"
$response = Invoke-RestMethod -Uri $testUrl -TimeoutSec 10 -ErrorAction Stop
if ($response) {
Write-Host " ✓ Fetch server prerequisites met (network accessible)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Fetch"; Status="PASS"; Details="Network accessible, can fetch data"}
} else {
Write-Host " ✗ Fetch server test failed" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Fetch"; Status="FAIL"; Details="Could not fetch test data"}
}
} catch {
Write-Host " ✗ Fetch server test failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Fetch"; Status="FAIL"; Details=$_.Exception.Message}
}
# Display Results Summary
Write-Host "`n`n=== Test Results Summary ===" -ForegroundColor Cyan
Write-Host ""
$results | Format-Table -AutoSize
# Count results
$passed = ($results | Where-Object Status -eq "PASS").Count
$failed = ($results | Where-Object Status -eq "FAIL").Count
$skipped = ($results | Where-Object Status -eq "SKIP").Count
$total = $results.Count
Write-Host "`nOverall Results:" -ForegroundColor White
Write-Host " Total Tests: $total" -ForegroundColor White
Write-Host " Passed: $passed" -ForegroundColor Green
Write-Host " Failed: $failed" -ForegroundColor Red
Write-Host " Skipped: $skipped" -ForegroundColor Yellow
# Exit code based on results
if ($failed -gt 0) {
Write-Host "`n⚠️ Some tests failed. Review the results above." -ForegroundColor Yellow
exit 1
} elseif ($passed -eq ($total - $skipped)) {
Write-Host "`n✓ All tests passed!" -ForegroundColor Green
exit 0
} else {
Write-Host "`n⚠️ Tests completed with warnings." -ForegroundColor Yellow
exit 0
}

157
plans/test-mcp-servers.ps1 Normal file
View File

@@ -0,0 +1,157 @@
# test-mcp-servers.ps1
# Automated testing script for all configured MCP servers
Write-Host "=== MCP Server Testing Suite ===" -ForegroundColor Cyan
Write-Host "Testing all configured MCP servers..." -ForegroundColor White
Write-Host ""
$results = @()
# Test 1: Chrome DevTools
Write-Host "[1/8] Testing Chrome DevTools..." -ForegroundColor Yellow
try {
# Use Start-Job to run npx in background since npx is a PowerShell script on Windows
$chromeJob = Start-Job -ScriptBlock {
& npx -y chrome-devtools-mcp@latest --headless true 2>&1
}
Start-Sleep -Seconds 5
$jobState = Get-Job -Id $chromeJob.Id | Select-Object -ExpandProperty State
if ($jobState -eq "Running") {
Write-Host " [PASS] Chrome DevTools server started successfully" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Chrome DevTools"; Status="PASS"; Details="Server started"}
Stop-Job -Id $chromeJob.Id -ErrorAction SilentlyContinue
Remove-Job -Id $chromeJob.Id -Force -ErrorAction SilentlyContinue
} else {
Receive-Job -Id $chromeJob.Id -ErrorAction SilentlyContinue | Out-Null
Write-Host " [FAIL] Chrome DevTools server failed to start" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Chrome DevTools"; Status="FAIL"; Details="Server failed to start"}
Remove-Job -Id $chromeJob.Id -Force -ErrorAction SilentlyContinue
}
} catch {
Write-Host " [FAIL] Chrome DevTools failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Chrome DevTools"; Status="FAIL"; Details=$_.Exception.Message}
}
# Test 2: Markitdown
Write-Host "`n[2/8] Testing Markitdown..." -ForegroundColor Yellow
$markitdownPath = "C:\Users\games3\.local\bin\uvx.exe"
if (Test-Path $markitdownPath) {
Write-Host " [PASS] Markitdown executable found at: $markitdownPath" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Markitdown"; Status="PASS"; Details="Executable exists"}
} else {
Write-Host " [FAIL] Markitdown executable not found at: $markitdownPath" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Markitdown"; Status="FAIL"; Details="Executable not found"}
}
# Test 3: Gitea Torbonium
Write-Host "`n[3/8] Testing Gitea Torbonium (gitea.torbonium.com)..." -ForegroundColor Yellow
try {
$headers = @{Authorization="token 391c9ddbe113378bc87bb8184800ba954648fcf8"}
$response = Invoke-RestMethod -Uri "https://gitea.torbonium.com/api/v1/user" -Headers $headers -TimeoutSec 10
Write-Host " [PASS] Gitea Torbonium authenticated as: $($response.login)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Gitea Torbonium"; Status="PASS"; Details="Authenticated as $($response.login)"}
} catch {
Write-Host " [FAIL] Gitea Torbonium failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Gitea Torbonium"; Status="FAIL"; Details=$_.Exception.Message}
}
# Test 4: Gitea LAN
Write-Host "`n[4/8] Testing Gitea LAN (gitea.torbolan.com)..." -ForegroundColor Yellow
Write-Host " [SKIP] Token needs replacement - SKIPPING" -ForegroundColor Yellow
$results += [PSCustomObject]@{Server="Gitea LAN"; Status="SKIP"; Details="Token placeholder needs update"}
# Test 5: Gitea Projectium
Write-Host "`n[5/8] Testing Gitea Projectium (gitea.projectium.com)..." -ForegroundColor Yellow
try {
$headers = @{Authorization="token c72bc0f14f623fec233d3c94b3a16397fe3649ef"}
$response = Invoke-RestMethod -Uri "https://gitea.projectium.com/api/v1/user" -Headers $headers -TimeoutSec 10
Write-Host " [PASS] Gitea Projectium authenticated as: $($response.login)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Gitea Projectium"; Status="PASS"; Details="Authenticated as $($response.login)"}
} catch {
Write-Host " [FAIL] Gitea Projectium failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Gitea Projectium"; Status="FAIL"; Details=$_.Exception.Message}
}
# Test 6: Podman/Docker
Write-Host "`n[6/8] Testing Docker/Podman..." -ForegroundColor Yellow
try {
# Try podman first, then docker
& podman ps 2>$null | Out-Null
if ($LASTEXITCODE -eq 0) {
Write-Host " [PASS] Podman daemon accessible and responding" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Docker/Podman"; Status="PASS"; Details="Podman running"}
} else {
& docker ps 2>$null | Out-Null
if ($LASTEXITCODE -eq 0) {
Write-Host " [PASS] Docker daemon accessible" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Docker/Podman"; Status="PASS"; Details="Docker running"}
} else {
Write-Host " [FAIL] Neither Podman nor Docker available" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Docker/Podman"; Status="FAIL"; Details="No container runtime found"}
}
}
} catch {
Write-Host " [FAIL] Container runtime test failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Docker/Podman"; Status="FAIL"; Details=$_.Exception.Message}
}
# Test 7: Filesystem
Write-Host "`n[7/8] Testing Filesystem..." -ForegroundColor Yellow
$projectPath = "D:\gitea\flyer-crawler.projectium.com\flyer-crawler.projectium.com"
if (Test-Path $projectPath) {
$fileCount = (Get-ChildItem $projectPath -File -Recurse -ErrorAction SilentlyContinue | Measure-Object).Count
Write-Host " [PASS] Project directory accessible ($fileCount files)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Filesystem"; Status="PASS"; Details="Path accessible, $fileCount files"}
} else {
Write-Host " [FAIL] Project directory not accessible" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Filesystem"; Status="FAIL"; Details="Path not accessible"}
}
# Test 8: Fetch MCP Server
Write-Host "`n[8/8] Testing Fetch MCP Server..." -ForegroundColor Yellow
try {
# Test by attempting to fetch a simple public API
$testUrl = "https://api.github.com/zen"
$response = Invoke-RestMethod -Uri $testUrl -TimeoutSec 10 -ErrorAction Stop
if ($response) {
Write-Host " [PASS] Fetch server prerequisites met (network accessible)" -ForegroundColor Green
$results += [PSCustomObject]@{Server="Fetch"; Status="PASS"; Details="Network accessible, can fetch data"}
} else {
Write-Host " [FAIL] Fetch server test failed" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Fetch"; Status="FAIL"; Details="Could not fetch test data"}
}
} catch {
Write-Host " [FAIL] Fetch server test failed: $($_.Exception.Message)" -ForegroundColor Red
$results += [PSCustomObject]@{Server="Fetch"; Status="FAIL"; Details=$_.Exception.Message}
}
# Display Results Summary
Write-Host "`n`n=== Test Results Summary ===" -ForegroundColor Cyan
Write-Host ""
$results | Format-Table -AutoSize
# Count results
$passed = ($results | Where-Object Status -eq "PASS").Count
$failed = ($results | Where-Object Status -eq "FAIL").Count
$skipped = ($results | Where-Object Status -eq "SKIP").Count
$total = $results.Count
Write-Host "`nOverall Results:" -ForegroundColor White
Write-Host " Total Tests: $total" -ForegroundColor White
Write-Host " Passed: $passed" -ForegroundColor Green
Write-Host " Failed: $failed" -ForegroundColor Red
Write-Host " Skipped: $skipped" -ForegroundColor Yellow
# Exit code based on results
if ($failed -gt 0) {
Write-Host "`n[WARNING] Some tests failed. Review the results above." -ForegroundColor Yellow
exit 1
} elseif ($passed -eq ($total - $skipped)) {
Write-Host "`n[SUCCESS] All tests passed!" -ForegroundColor Green
exit 0
} else {
Write-Host "`n[WARNING] Tests completed with warnings." -ForegroundColor Yellow
exit 0
}

View File

@@ -0,0 +1,13 @@
# Update MCP configuration for Podman
$mcpConfigPath = "c:/Users/games3/AppData/Roaming/Code/User/mcp.json"
$content = Get-Content $mcpConfigPath -Raw
# Replace Docker named pipe with Podman SSH connection
$content = $content -replace 'npipe:////./pipe/docker_engine', 'ssh://root@127.0.0.1:2972/run/podman/podman.sock'
# Write back
Set-Content $mcpConfigPath -Value $content -NoNewline
Write-Host "Updated MCP configuration for Podman" -ForegroundColor Green
Write-Host "New DOCKER_HOST: ssh://root@127.0.0.1:2972/run/podman/podman.sock" -ForegroundColor Cyan

88
run-integration-tests.ps1 Normal file
View File

@@ -0,0 +1,88 @@
# PowerShell script to run integration tests with containerized infrastructure
# Sets up environment variables and runs the integration test suite
Write-Host "=== Flyer Crawler Integration Test Runner ===" -ForegroundColor Cyan
Write-Host ""
# Check if containers are running
Write-Host "Checking container status..." -ForegroundColor Yellow
$postgresRunning = podman ps --filter "name=flyer-crawler-postgres" --format "{{.Names}}" 2>$null
$redisRunning = podman ps --filter "name=flyer-crawler-redis" --format "{{.Names}}" 2>$null
if (-not $postgresRunning) {
Write-Host "ERROR: PostgreSQL container is not running!" -ForegroundColor Red
Write-Host "Start it with: podman start flyer-crawler-postgres" -ForegroundColor Yellow
exit 1
}
if (-not $redisRunning) {
Write-Host "ERROR: Redis container is not running!" -ForegroundColor Red
Write-Host "Start it with: podman start flyer-crawler-redis" -ForegroundColor Yellow
exit 1
}
Write-Host "✓ PostgreSQL container: $postgresRunning" -ForegroundColor Green
Write-Host "✓ Redis container: $redisRunning" -ForegroundColor Green
Write-Host ""
# Set environment variables for integration tests
Write-Host "Setting environment variables..." -ForegroundColor Yellow
$env:NODE_ENV = "test"
$env:DB_HOST = "localhost"
$env:DB_USER = "postgres"
$env:DB_PASSWORD = "postgres"
$env:DB_NAME = "flyer_crawler_dev"
$env:DB_PORT = "5432"
$env:REDIS_URL = "redis://localhost:6379"
$env:REDIS_PASSWORD = ""
$env:FRONTEND_URL = "http://localhost:5173"
$env:VITE_API_BASE_URL = "http://localhost:3001/api"
$env:JWT_SECRET = "test-jwt-secret-for-integration-tests"
$env:NODE_OPTIONS = "--max-old-space-size=8192"
Write-Host "✓ Environment configured" -ForegroundColor Green
Write-Host ""
# Display configuration
Write-Host "Test Configuration:" -ForegroundColor Cyan
Write-Host " NODE_ENV: $env:NODE_ENV"
Write-Host " Database: $env:DB_HOST`:$env:DB_PORT/$env:DB_NAME"
Write-Host " Redis: $env:REDIS_URL"
Write-Host " Frontend URL: $env:FRONTEND_URL"
Write-Host ""
# Check database connectivity
Write-Host "Verifying database connection..." -ForegroundColor Yellow
$dbCheck = podman exec flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev -c "SELECT 1;" 2>&1
if ($LASTEXITCODE -ne 0) {
Write-Host "ERROR: Cannot connect to database!" -ForegroundColor Red
Write-Host $dbCheck
exit 1
}
Write-Host "✓ Database connection successful" -ForegroundColor Green
Write-Host ""
# Check URL constraints are enabled
Write-Host "Verifying URL constraints..." -ForegroundColor Yellow
$constraints = podman exec flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev -t -A -c "SELECT COUNT(*) FROM pg_constraint WHERE conname LIKE '%url_check';"
Write-Host "✓ Found $constraints URL constraint(s)" -ForegroundColor Green
Write-Host ""
# Run integration tests
Write-Host "=== Running Integration Tests ===" -ForegroundColor Cyan
Write-Host ""
npm run test:integration
$exitCode = $LASTEXITCODE
Write-Host ""
if ($exitCode -eq 0) {
Write-Host "=== Integration Tests PASSED ===" -ForegroundColor Green
} else {
Write-Host "=== Integration Tests FAILED ===" -ForegroundColor Red
Write-Host "Exit code: $exitCode" -ForegroundColor Red
}
exit $exitCode

80
run-tests.cmd Normal file
View File

@@ -0,0 +1,80 @@
@echo off
REM Simple batch script to run integration tests with container infrastructure
echo === Flyer Crawler Integration Test Runner ===
echo.
REM Check containers
echo Checking container status...
podman ps --filter "name=flyer-crawler-postgres" --format "{{.Names}}" >nul 2>&1
if errorlevel 1 (
echo ERROR: PostgreSQL container is not running!
echo Start it with: podman start flyer-crawler-postgres
exit /b 1
)
podman ps --filter "name=flyer-crawler-redis" --format "{{.Names}}" >nul 2>&1
if errorlevel 1 (
echo ERROR: Redis container is not running!
echo Start it with: podman start flyer-crawler-redis
exit /b 1
)
echo [OK] Containers are running
echo.
REM Set environment variables
echo Setting environment variables...
set NODE_ENV=test
set DB_HOST=localhost
set DB_USER=postgres
set DB_PASSWORD=postgres
set DB_NAME=flyer_crawler_dev
set DB_PORT=5432
set REDIS_URL=redis://localhost:6379
set REDIS_PASSWORD=
set FRONTEND_URL=http://localhost:5173
set VITE_API_BASE_URL=http://localhost:3001/api
set JWT_SECRET=test-jwt-secret-for-integration-tests
set NODE_OPTIONS=--max-old-space-size=8192
echo [OK] Environment configured
echo.
echo Test Configuration:
echo NODE_ENV: %NODE_ENV%
echo Database: %DB_HOST%:%DB_PORT%/%DB_NAME%
echo Redis: %REDIS_URL%
echo Frontend URL: %FRONTEND_URL%
echo.
REM Verify database
echo Verifying database connection...
podman exec flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev -c "SELECT 1;" >nul 2>&1
if errorlevel 1 (
echo ERROR: Cannot connect to database!
exit /b 1
)
echo [OK] Database connection successful
echo.
REM Check URL constraints
echo Verifying URL constraints...
podman exec flyer-crawler-postgres psql -U postgres -d flyer_crawler_dev -t -A -c "SELECT COUNT(*) FROM pg_constraint WHERE conname LIKE '%%url_check';"
echo.
REM Run tests
echo === Running Integration Tests ===
echo.
npm run test:integration
if errorlevel 1 (
echo.
echo === Integration Tests FAILED ===
exit /b 1
) else (
echo.
echo === Integration Tests PASSED ===
exit /b 0
)

View File

@@ -73,8 +73,8 @@ app.use(passport.initialize()); // Initialize Passport
// --- MOCK AUTH FOR TESTING ---
// This MUST come after passport.initialize() and BEFORE any of the API routes.
import { mockAuth } from './src/routes/passport.routes';
app.use(mockAuth);
import { mockAuth } from './src/routes/passport.routes';
app.use(mockAuth);
// Add a request timeout middleware. This will help prevent requests from hanging indefinitely.
// We set a generous 5-minute timeout to accommodate slow AI processing for large flyers.

View File

@@ -90,10 +90,10 @@ CREATE TABLE IF NOT EXISTS public.profiles (
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT profiles_full_name_check CHECK (full_name IS NULL OR TRIM(full_name) <> ''),
CONSTRAINT profiles_avatar_url_check CHECK (avatar_url IS NULL OR avatar_url ~* '^https://?.*'),
created_by UUID REFERENCES public.users(user_id) ON DELETE SET NULL,
updated_by UUID REFERENCES public.users(user_id) ON DELETE SET NULL
);
-- CONSTRAINT profiles_avatar_url_check CHECK (avatar_url IS NULL OR avatar_url ~* '^https://?.*'),
COMMENT ON TABLE public.profiles IS 'Stores public-facing user data, linked to the public.users table.';
COMMENT ON COLUMN public.profiles.address_id IS 'A foreign key to the user''s primary address in the `addresses` table.';
-- This index is crucial for the gamification leaderboard feature.
@@ -108,9 +108,9 @@ CREATE TABLE IF NOT EXISTS public.stores (
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT stores_name_check CHECK (TRIM(name) <> ''),
CONSTRAINT stores_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https://?.*'),
created_by UUID REFERENCES public.users(user_id) ON DELETE SET NULL
);
-- CONSTRAINT stores_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https://?.*'),
COMMENT ON TABLE public.stores IS 'Stores metadata for grocery store chains (e.g., Safeway, Kroger).';
-- 5. The 'categories' table for normalized category data.
@@ -141,9 +141,9 @@ CREATE TABLE IF NOT EXISTS public.flyers (
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT flyers_valid_dates_check CHECK (valid_to >= valid_from),
CONSTRAINT flyers_file_name_check CHECK (TRIM(file_name) <> ''),
CONSTRAINT flyers_image_url_check CHECK (image_url ~* '^https://?.*'),
CONSTRAINT flyers_icon_url_check CHECK (icon_url IS NULL OR icon_url ~* '^https://?.*'),
CONSTRAINT flyers_checksum_check CHECK (checksum IS NULL OR length(checksum) = 64)
CONSTRAINT flyers_checksum_check CHECK (checksum IS NULL OR length(checksum) = 64),
CONSTRAINT flyers_image_url_check CHECK (image_url ~* '^https?://.*'),
CONSTRAINT flyers_icon_url_check CHECK (icon_url ~* '^https?://.*')
);
COMMENT ON TABLE public.flyers IS 'Stores metadata for each processed flyer, linking it to a store and its validity period.';
CREATE INDEX IF NOT EXISTS idx_flyers_store_id ON public.flyers(store_id);
@@ -198,9 +198,9 @@ CREATE TABLE IF NOT EXISTS public.brands (
store_id BIGINT REFERENCES public.stores(store_id) ON DELETE SET NULL,
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT brands_name_check CHECK (TRIM(name) <> ''),
CONSTRAINT brands_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https://?.*')
CONSTRAINT brands_name_check CHECK (TRIM(name) <> '')
);
-- CONSTRAINT brands_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https://?.*')
COMMENT ON TABLE public.brands IS 'Stores brand names like "Coca-Cola", "Maple Leaf", or "Kraft".';
COMMENT ON COLUMN public.brands.store_id IS 'If this is a store-specific brand (e.g., President''s Choice), this links to the parent store.';
@@ -464,9 +464,9 @@ CREATE TABLE IF NOT EXISTS public.user_submitted_prices (
upvotes INTEGER DEFAULT 0 NOT NULL CHECK (upvotes >= 0),
downvotes INTEGER DEFAULT 0 NOT NULL CHECK (downvotes >= 0),
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT user_submitted_prices_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https://?.*')
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL
);
-- CONSTRAINT user_submitted_prices_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https://?.*')
COMMENT ON TABLE public.user_submitted_prices IS 'Stores item prices submitted by users directly from physical stores.';
COMMENT ON COLUMN public.user_submitted_prices.photo_url IS 'URL to user-submitted photo evidence of the price.';
COMMENT ON COLUMN public.user_submitted_prices.upvotes IS 'Community validation score indicating accuracy.';
@@ -521,9 +521,9 @@ CREATE TABLE IF NOT EXISTS public.recipes (
fork_count INTEGER DEFAULT 0 NOT NULL CHECK (fork_count >= 0),
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT recipes_name_check CHECK (TRIM(name) <> ''),
CONSTRAINT recipes_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https://?.*')
CONSTRAINT recipes_name_check CHECK (TRIM(name) <> '')
);
-- CONSTRAINT recipes_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https://?.*')
COMMENT ON TABLE public.recipes IS 'Stores recipes that can be used to generate shopping lists.';
COMMENT ON COLUMN public.recipes.servings IS 'The number of servings this recipe yields.';
COMMENT ON COLUMN public.recipes.original_recipe_id IS 'If this recipe is a variation of another, this points to the original.';
@@ -920,9 +920,9 @@ CREATE TABLE IF NOT EXISTS public.receipts (
raw_text TEXT,
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
processed_at TIMESTAMPTZ,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT receipts_receipt_image_url_check CHECK (receipt_image_url ~* '^https://?.*')
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL
);
-- CONSTRAINT receipts_receipt_image_url_check CHECK (receipt_image_url ~* '^https://?.*')
COMMENT ON TABLE public.receipts IS 'Stores uploaded user receipts for purchase tracking and analysis.';
CREATE INDEX IF NOT EXISTS idx_receipts_user_id ON public.receipts(user_id);
CREATE INDEX IF NOT EXISTS idx_receipts_store_id ON public.receipts(store_id);

View File

@@ -106,10 +106,10 @@ CREATE TABLE IF NOT EXISTS public.profiles (
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT profiles_full_name_check CHECK (full_name IS NULL OR TRIM(full_name) <> ''),
CONSTRAINT profiles_avatar_url_check CHECK (avatar_url IS NULL OR avatar_url ~* '^https?://.*'),
created_by UUID REFERENCES public.users(user_id) ON DELETE SET NULL,
updated_by UUID REFERENCES public.users(user_id) ON DELETE SET NULL
);
-- CONSTRAINT profiles_avatar_url_check CHECK (avatar_url IS NULL OR avatar_url ~* '^https?://.*'),
COMMENT ON TABLE public.profiles IS 'Stores public-facing user data, linked to the public.users table.';
COMMENT ON COLUMN public.profiles.address_id IS 'A foreign key to the user''s primary address in the `addresses` table.';
-- This index is crucial for the gamification leaderboard feature.
@@ -124,9 +124,9 @@ CREATE TABLE IF NOT EXISTS public.stores (
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT stores_name_check CHECK (TRIM(name) <> ''),
CONSTRAINT stores_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https?://.*'),
created_by UUID REFERENCES public.users(user_id) ON DELETE SET NULL
);
-- CONSTRAINT stores_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https?://.*'),
COMMENT ON TABLE public.stores IS 'Stores metadata for grocery store chains (e.g., Safeway, Kroger).';
-- 5. The 'categories' table for normalized category data.
@@ -157,9 +157,9 @@ CREATE TABLE IF NOT EXISTS public.flyers (
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT flyers_valid_dates_check CHECK (valid_to >= valid_from),
CONSTRAINT flyers_file_name_check CHECK (TRIM(file_name) <> ''),
CONSTRAINT flyers_checksum_check CHECK (checksum IS NULL OR length(checksum) = 64),
CONSTRAINT flyers_image_url_check CHECK (image_url ~* '^https?://.*'),
CONSTRAINT flyers_icon_url_check CHECK (icon_url ~* '^https?://.*'),
CONSTRAINT flyers_checksum_check CHECK (checksum IS NULL OR length(checksum) = 64)
CONSTRAINT flyers_icon_url_check CHECK (icon_url ~* '^https?://.*')
);
COMMENT ON TABLE public.flyers IS 'Stores metadata for each processed flyer, linking it to a store and its validity period.';
CREATE INDEX IF NOT EXISTS idx_flyers_store_id ON public.flyers(store_id);
@@ -214,9 +214,9 @@ CREATE TABLE IF NOT EXISTS public.brands (
store_id BIGINT REFERENCES public.stores(store_id) ON DELETE SET NULL,
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT brands_name_check CHECK (TRIM(name) <> ''),
CONSTRAINT brands_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https?://.*')
CONSTRAINT brands_name_check CHECK (TRIM(name) <> '')
);
-- CONSTRAINT brands_logo_url_check CHECK (logo_url IS NULL OR logo_url ~* '^https?://.*')
COMMENT ON TABLE public.brands IS 'Stores brand names like "Coca-Cola", "Maple Leaf", or "Kraft".';
COMMENT ON COLUMN public.brands.store_id IS 'If this is a store-specific brand (e.g., President''s Choice), this links to the parent store.';
@@ -481,9 +481,9 @@ CREATE TABLE IF NOT EXISTS public.user_submitted_prices (
upvotes INTEGER DEFAULT 0 NOT NULL CHECK (upvotes >= 0),
downvotes INTEGER DEFAULT 0 NOT NULL CHECK (downvotes >= 0),
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT user_submitted_prices_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https?://.*')
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL
);
-- CONSTRAINT user_submitted_prices_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https?://.*')
COMMENT ON TABLE public.user_submitted_prices IS 'Stores item prices submitted by users directly from physical stores.';
COMMENT ON COLUMN public.user_submitted_prices.photo_url IS 'URL to user-submitted photo evidence of the price.';
COMMENT ON COLUMN public.user_submitted_prices.upvotes IS 'Community validation score indicating accuracy.';
@@ -538,9 +538,9 @@ CREATE TABLE IF NOT EXISTS public.recipes (
fork_count INTEGER DEFAULT 0 NOT NULL CHECK (fork_count >= 0),
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL,
CONSTRAINT recipes_name_check CHECK (TRIM(name) <> ''),
CONSTRAINT recipes_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https?://.*')
CONSTRAINT recipes_name_check CHECK (TRIM(name) <> '')
);
-- CONSTRAINT recipes_photo_url_check CHECK (photo_url IS NULL OR photo_url ~* '^https?://.*')
COMMENT ON TABLE public.recipes IS 'Stores recipes that can be used to generate shopping lists.';
COMMENT ON COLUMN public.recipes.servings IS 'The number of servings this recipe yields.';
COMMENT ON COLUMN public.recipes.original_recipe_id IS 'If this recipe is a variation of another, this points to the original.';
@@ -940,9 +940,9 @@ CREATE TABLE IF NOT EXISTS public.receipts (
raw_text TEXT,
created_at TIMESTAMPTZ DEFAULT now() NOT NULL,
processed_at TIMESTAMPTZ,
CONSTRAINT receipts_receipt_image_url_check CHECK (receipt_image_url ~* '^https?://.*'),
updated_at TIMESTAMPTZ DEFAULT now() NOT NULL
);
-- CONSTRAINT receipts_receipt_image_url_check CHECK (receipt_image_url ~* '^https?://.*'),
COMMENT ON TABLE public.receipts IS 'Stores uploaded user receipts for purchase tracking and analysis.';
CREATE INDEX IF NOT EXISTS idx_receipts_user_id ON public.receipts(user_id);
CREATE INDEX IF NOT EXISTS idx_receipts_store_id ON public.receipts(store_id);

View File

@@ -628,7 +628,7 @@ describe('App Component', () => {
app: {
version: '2.0.0',
commitMessage: 'A new version!',
commitUrl: 'http://example.com/commit/2.0.0',
commitUrl: 'https://example.com/commit/2.0.0',
},
},
}));
@@ -638,7 +638,7 @@ describe('App Component', () => {
renderApp();
const versionLink = screen.getByText(`Version: 2.0.0`);
expect(versionLink).toBeInTheDocument();
expect(versionLink).toHaveAttribute('href', 'http://example.com/commit/2.0.0');
expect(versionLink).toHaveAttribute('href', 'https://example.com/commit/2.0.0');
});
it('should open the "What\'s New" modal when the question mark icon is clicked', async () => {

View File

@@ -19,7 +19,7 @@ const mockedNotifyError = notifyError as Mocked<typeof notifyError>;
const defaultProps = {
isOpen: true,
onClose: vi.fn(),
imageUrl: 'http://example.com/flyer.jpg',
imageUrl: 'https://example.com/flyer.jpg',
onDataExtracted: vi.fn(),
};

View File

@@ -25,7 +25,7 @@ const mockLeaderboardData: LeaderboardUser[] = [
createMockLeaderboardUser({
user_id: 'user-2',
full_name: 'Bob',
avatar_url: 'http://example.com/bob.jpg',
avatar_url: 'https://example.com/bob.jpg',
points: 950,
rank: '2',
}),
@@ -95,7 +95,7 @@ describe('Leaderboard', () => {
// Check for correct avatar URLs
const bobAvatar = screen.getByAltText('Bob') as HTMLImageElement;
expect(bobAvatar.src).toBe('http://example.com/bob.jpg');
expect(bobAvatar.src).toBe('https://example.com/bob.jpg');
const aliceAvatar = screen.getByAltText('Alice') as HTMLImageElement;
expect(aliceAvatar.src).toContain('api.dicebear.com'); // Check for fallback avatar

53
src/config/queryClient.ts Normal file
View File

@@ -0,0 +1,53 @@
// src/config/queryClient.ts
import { QueryClient } from '@tanstack/react-query';
import { logger } from '../services/logger.client';
/**
* Global QueryClient instance for TanStack Query.
*
* Configured with sensible defaults for the flyer-crawler application:
* - 5 minute stale time for most queries
* - 30 minute garbage collection time
* - Single retry attempt on failure
* - No automatic refetch on window focus (to reduce API load)
* - Refetch on component mount for fresh data
*
* @see https://tanstack.com/query/latest/docs/reference/QueryClient
*/
export const queryClient = new QueryClient({
defaultOptions: {
queries: {
// Data is considered fresh for 5 minutes
staleTime: 1000 * 60 * 5,
// Unused data is garbage collected after 30 minutes
// (gcTime was formerly called cacheTime in v4)
gcTime: 1000 * 60 * 30,
// Retry failed requests once
retry: 1,
// Don't refetch on window focus to reduce API calls
// Users can manually refresh if needed
refetchOnWindowFocus: false,
// Always refetch on component mount to ensure fresh data
refetchOnMount: true,
// Don't refetch on reconnect by default
refetchOnReconnect: false,
},
mutations: {
// Don't retry mutations automatically
// User actions should be explicit
retry: 0,
// Log mutation errors for debugging
onError: (error) => {
logger.error('Mutation error', {
error: error instanceof Error ? error.message : 'Unknown error',
});
},
},
},
});

147
src/config/rateLimiters.ts Normal file
View File

@@ -0,0 +1,147 @@
// src/config/rateLimiters.ts
import rateLimit from 'express-rate-limit';
import { shouldSkipRateLimit } from '../utils/rateLimit';
const standardConfig = {
standardHeaders: true,
legacyHeaders: false,
skip: shouldSkipRateLimit,
};
// --- AUTHENTICATION ---
export const loginLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 5,
message: 'Too many login attempts from this IP, please try again after 15 minutes.',
});
export const registerLimiter = rateLimit({
...standardConfig,
windowMs: 60 * 60 * 1000, // 1 hour
max: 5,
message: 'Too many accounts created from this IP, please try again after an hour.',
});
export const forgotPasswordLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 5,
message: 'Too many password reset requests from this IP, please try again after 15 minutes.',
});
export const resetPasswordLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 10,
message: 'Too many password reset attempts from this IP, please try again after 15 minutes.',
});
export const refreshTokenLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 20,
message: 'Too many token refresh attempts from this IP, please try again after 15 minutes.',
});
export const logoutLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 10,
message: 'Too many logout attempts from this IP, please try again after 15 minutes.',
});
// --- GENERAL PUBLIC & USER ---
export const publicReadLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 100,
message: 'Too many requests from this IP, please try again later.',
});
export const userReadLimiter = publicReadLimiter; // Alias for consistency
export const userUpdateLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 100,
message: 'Too many update requests from this IP, please try again after 15 minutes.',
});
export const reactionToggleLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 150,
message: 'Too many reaction requests from this IP, please try again later.',
});
export const trackingLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 200,
message: 'Too many tracking requests from this IP, please try again later.',
});
// --- SENSITIVE / COSTLY ---
export const userSensitiveUpdateLimiter = rateLimit({
...standardConfig,
windowMs: 60 * 60 * 1000, // 1 hour
max: 5,
message: 'Too many sensitive requests from this IP, please try again after an hour.',
});
export const adminTriggerLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 30,
message: 'Too many administrative triggers from this IP, please try again later.',
});
export const aiGenerationLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 20,
message: 'Too many AI generation requests from this IP, please try again after 15 minutes.',
});
export const suggestionLimiter = aiGenerationLimiter; // Alias
export const geocodeLimiter = rateLimit({
...standardConfig,
windowMs: 60 * 60 * 1000, // 1 hour
max: 100,
message: 'Too many geocoding requests from this IP, please try again later.',
});
export const priceHistoryLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 50,
message: 'Too many price history requests from this IP, please try again later.',
});
// --- UPLOADS / BATCH ---
export const adminUploadLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 20,
message: 'Too many file uploads from this IP, please try again after 15 minutes.',
});
export const userUploadLimiter = adminUploadLimiter; // Alias
export const aiUploadLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 10,
message: 'Too many file uploads from this IP, please try again after 15 minutes.',
});
export const batchLimiter = rateLimit({
...standardConfig,
windowMs: 15 * 60 * 1000, // 15 minutes
max: 50,
message: 'Too many batch requests from this IP, please try again later.',
});
export const budgetUpdateLimiter = batchLimiter; // Alias

View File

@@ -160,9 +160,9 @@ describe('AnalysisPanel', () => {
results: { WEB_SEARCH: 'Search results text.' },
sources: {
WEB_SEARCH: [
{ title: 'Valid Source', uri: 'http://example.com/source1' },
{ title: 'Valid Source', uri: 'https://example.com/source1' },
{ title: 'Source without URI', uri: null },
{ title: 'Another Valid Source', uri: 'http://example.com/source2' },
{ title: 'Another Valid Source', uri: 'https://example.com/source2' },
],
},
loadingAnalysis: null,
@@ -178,7 +178,7 @@ describe('AnalysisPanel', () => {
expect(screen.getByText('Sources:')).toBeInTheDocument();
const source1 = screen.getByText('Valid Source');
expect(source1).toBeInTheDocument();
expect(source1.closest('a')).toHaveAttribute('href', 'http://example.com/source1');
expect(source1.closest('a')).toHaveAttribute('href', 'https://example.com/source1');
expect(screen.queryByText('Source without URI')).not.toBeInTheDocument();
expect(screen.getByText('Another Valid Source')).toBeInTheDocument();
});
@@ -278,13 +278,13 @@ describe('AnalysisPanel', () => {
loadingAnalysis: null,
error: null,
runAnalysis: mockRunAnalysis,
generatedImageUrl: 'http://example.com/meal.jpg',
generatedImageUrl: 'https://example.com/meal.jpg',
generateImage: mockGenerateImage,
});
rerender(<AnalysisPanel selectedFlyer={mockFlyer} />);
const image = screen.getByAltText('AI generated meal plan');
expect(image).toBeInTheDocument();
expect(image).toHaveAttribute('src', 'http://example.com/meal.jpg');
expect(image).toHaveAttribute('src', 'https://example.com/meal.jpg');
});
it('should not show sources for non-search analysis types', () => {

View File

@@ -8,13 +8,13 @@ import { createMockStore } from '../../tests/utils/mockFactories';
const mockStore = createMockStore({
store_id: 1,
name: 'SuperMart',
logo_url: 'http://example.com/logo.png',
logo_url: 'https://example.com/logo.png',
});
const mockOnOpenCorrectionTool = vi.fn();
const defaultProps = {
imageUrl: 'http://example.com/flyer.jpg',
imageUrl: 'https://example.com/flyer.jpg',
store: mockStore,
validFrom: '2023-10-26',
validTo: '2023-11-01',

View File

@@ -19,7 +19,7 @@ const mockFlyers: Flyer[] = [
flyer_id: 1,
file_name: 'metro_flyer_oct_1.pdf',
item_count: 50,
image_url: 'http://example.com/flyer1.jpg',
image_url: 'https://example.com/flyer1.jpg',
store: { store_id: 101, name: 'Metro' },
valid_from: '2023-10-05',
valid_to: '2023-10-11',
@@ -29,7 +29,7 @@ const mockFlyers: Flyer[] = [
flyer_id: 2,
file_name: 'walmart_flyer.pdf',
item_count: 75,
image_url: 'http://example.com/flyer2.jpg',
image_url: 'https://example.com/flyer2.jpg',
store: { store_id: 102, name: 'Walmart' },
valid_from: '2023-10-06',
valid_to: '2023-10-06', // Same day
@@ -40,8 +40,8 @@ const mockFlyers: Flyer[] = [
flyer_id: 3,
file_name: 'no-store-flyer.pdf',
item_count: 10,
image_url: 'http://example.com/flyer3.jpg',
icon_url: 'http://example.com/icon3.png',
image_url: 'https://example.com/flyer3.jpg',
icon_url: 'https://example.com/icon3.png',
valid_from: '2023-10-07',
valid_to: '2023-10-08',
store_address: '456 Side St, Ottawa',
@@ -53,7 +53,7 @@ const mockFlyers: Flyer[] = [
flyer_id: 4,
file_name: 'bad-date-flyer.pdf',
item_count: 5,
image_url: 'http://example.com/flyer4.jpg',
image_url: 'https://example.com/flyer4.jpg',
store: { store_id: 103, name: 'Date Store' },
created_at: 'invalid-date',
valid_from: 'invalid-from',
@@ -163,7 +163,7 @@ describe('FlyerList', () => {
const flyerWithIcon = screen.getByText('Unknown Store').closest('li'); // Flyer ID 3
const iconImage = flyerWithIcon?.querySelector('img');
expect(iconImage).toBeInTheDocument();
expect(iconImage).toHaveAttribute('src', 'http://example.com/icon3.png');
expect(iconImage).toHaveAttribute('src', 'https://example.com/icon3.png');
});
it('should render a document icon when icon_url is not present', () => {

View File

@@ -0,0 +1,60 @@
// src/hooks/mutations/useAddWatchedItemMutation.ts
import { useMutation, useQueryClient } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
import { notifySuccess, notifyError } from '../../services/notificationService';
interface AddWatchedItemParams {
itemName: string;
category?: string;
}
/**
* Mutation hook for adding an item to the user's watched items list.
*
* This hook provides optimistic updates and automatic cache invalidation.
* When the mutation succeeds, it invalidates the watched-items query to
* trigger a refetch of the updated list.
*
* @returns Mutation object with mutate function and state
*
* @example
* ```tsx
* const addWatchedItem = useAddWatchedItemMutation();
*
* const handleAdd = () => {
* addWatchedItem.mutate(
* { itemName: 'Milk', category: 'Dairy' },
* {
* onSuccess: () => console.log('Added!'),
* onError: (error) => console.error(error),
* }
* );
* };
* ```
*/
export const useAddWatchedItemMutation = () => {
const queryClient = useQueryClient();
return useMutation({
mutationFn: async ({ itemName, category }: AddWatchedItemParams) => {
const response = await apiClient.addWatchedItem(itemName, category);
if (!response.ok) {
const error = await response.json().catch(() => ({
message: `Request failed with status ${response.status}`,
}));
throw new Error(error.message || 'Failed to add watched item');
}
return response.json();
},
onSuccess: () => {
// Invalidate and refetch watched items to get the updated list
queryClient.invalidateQueries({ queryKey: ['watched-items'] });
notifySuccess('Item added to watched list');
},
onError: (error: Error) => {
notifyError(error.message || 'Failed to add item to watched list');
},
});
};

View File

@@ -0,0 +1,46 @@
// src/hooks/queries/useFlyerItemsQuery.ts
import { useQuery } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
import type { FlyerItem } from '../../types';
/**
* Query hook for fetching items for a specific flyer.
*
* This hook is automatically disabled when no flyer ID is provided,
* and caches data per-flyer to avoid refetching the same data.
*
* @param flyerId - The ID of the flyer to fetch items for
* @returns Query result with flyer items data, loading state, and error state
*
* @example
* ```tsx
* const { data: flyerItems, isLoading, error } = useFlyerItemsQuery(flyer?.flyer_id);
* ```
*/
export const useFlyerItemsQuery = (flyerId: number | undefined) => {
return useQuery({
queryKey: ['flyer-items', flyerId],
queryFn: async (): Promise<FlyerItem[]> => {
if (!flyerId) {
throw new Error('Flyer ID is required');
}
const response = await apiClient.fetchFlyerItems(flyerId);
if (!response.ok) {
const error = await response.json().catch(() => ({
message: `Request failed with status ${response.status}`,
}));
throw new Error(error.message || 'Failed to fetch flyer items');
}
const data = await response.json();
// API returns { items: FlyerItem[] }
return data.items || [];
},
// Only run the query if we have a valid flyer ID
enabled: !!flyerId,
// Flyer items don't change, so cache them longer
staleTime: 1000 * 60 * 5,
});
};

View File

@@ -0,0 +1,39 @@
// src/hooks/queries/useFlyersQuery.ts
import { useQuery } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
import type { Flyer } from '../../types';
/**
* Query hook for fetching flyers with pagination.
*
* This replaces the custom useInfiniteQuery hook with TanStack Query,
* providing automatic caching, background refetching, and better state management.
*
* @param limit - Maximum number of flyers to fetch
* @param offset - Number of flyers to skip
* @returns Query result with flyers data, loading state, and error state
*
* @example
* ```tsx
* const { data: flyers, isLoading, error, refetch } = useFlyersQuery(20, 0);
* ```
*/
export const useFlyersQuery = (limit: number = 20, offset: number = 0) => {
return useQuery({
queryKey: ['flyers', { limit, offset }],
queryFn: async (): Promise<Flyer[]> => {
const response = await apiClient.fetchFlyers(limit, offset);
if (!response.ok) {
const error = await response.json().catch(() => ({
message: `Request failed with status ${response.status}`,
}));
throw new Error(error.message || 'Failed to fetch flyers');
}
return response.json();
},
// Keep data fresh for 2 minutes since flyers don't change frequently
staleTime: 1000 * 60 * 2,
});
};

View File

@@ -0,0 +1,40 @@
// src/hooks/queries/useMasterItemsQuery.ts
import { useQuery } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
import type { MasterGroceryItem } from '../../types';
/**
* Query hook for fetching all master grocery items.
*
* Master items are the canonical list of grocery items that users can watch
* and that flyer items are mapped to. This data changes infrequently, so it's
* cached with a longer stale time.
*
* @returns Query result with master items data, loading state, and error state
*
* @example
* ```tsx
* const { data: masterItems, isLoading, error } = useMasterItemsQuery();
* ```
*/
export const useMasterItemsQuery = () => {
return useQuery({
queryKey: ['master-items'],
queryFn: async (): Promise<MasterGroceryItem[]> => {
const response = await apiClient.fetchMasterItems();
if (!response.ok) {
const error = await response.json().catch(() => ({
message: `Request failed with status ${response.status}`,
}));
throw new Error(error.message || 'Failed to fetch master items');
}
return response.json();
},
// Master items change infrequently, keep data fresh for 10 minutes
staleTime: 1000 * 60 * 10,
// Cache for 30 minutes
gcTime: 1000 * 60 * 30,
});
};

View File

@@ -0,0 +1,39 @@
// src/hooks/queries/useShoppingListsQuery.ts
import { useQuery } from '@tantml:parameter>
import * as apiClient from '../../services/apiClient';
import type { ShoppingList } from '../../types';
/**
* Query hook for fetching the user's shopping lists.
*
* This hook is automatically disabled when the user is not authenticated,
* and the cached data is invalidated when the user logs out.
*
* @param enabled - Whether the query should run (typically based on auth status)
* @returns Query result with shopping lists data, loading state, and error state
*
* @example
* ```tsx
* const { data: shoppingLists, isLoading, error } = useShoppingListsQuery(!!user);
* ```
*/
export const useShoppingListsQuery = (enabled: boolean) => {
return useQuery({
queryKey: ['shopping-lists'],
queryFn: async (): Promise<ShoppingList[]> => {
const response = await apiClient.fetchShoppingLists();
if (!response.ok) {
const error = await response.json().catch(() => ({
message: `Request failed with status ${response.status}`,
}));
throw new Error(error.message || 'Failed to fetch shopping lists');
}
return response.json();
},
enabled,
// Keep data fresh for 1 minute since users actively manage shopping lists
staleTime: 1000 * 60,
});
};

View File

@@ -0,0 +1,39 @@
// src/hooks/queries/useWatchedItemsQuery.ts
import { useQuery } from '@tanstack/react-query';
import * as apiClient from '../../services/apiClient';
import type { MasterGroceryItem } from '../../types';
/**
* Query hook for fetching the user's watched items.
*
* This hook is automatically disabled when the user is not authenticated,
* and the cached data is invalidated when the user logs out.
*
* @param enabled - Whether the query should run (typically based on auth status)
* @returns Query result with watched items data, loading state, and error state
*
* @example
* ```tsx
* const { data: watchedItems, isLoading, error } = useWatchedItemsQuery(!!user);
* ```
*/
export const useWatchedItemsQuery = (enabled: boolean) => {
return useQuery({
queryKey: ['watched-items'],
queryFn: async (): Promise<MasterGroceryItem[]> => {
const response = await apiClient.fetchWatchedItems();
if (!response.ok) {
const error = await response.json().catch(() => ({
message: `Request failed with status ${response.status}`,
}));
throw new Error(error.message || 'Failed to fetch watched items');
}
return response.json();
},
enabled,
// Keep data fresh for 1 minute since users actively manage watched items
staleTime: 1000 * 60,
});
};

View File

@@ -15,8 +15,8 @@ describe('useFlyerItems Hook', () => {
const mockFlyer = createMockFlyer({
flyer_id: 123,
file_name: 'test-flyer.jpg',
image_url: 'http://example.com/test.jpg',
icon_url: 'http://example.com/icon.jpg',
image_url: 'https://example.com/test.jpg',
icon_url: 'https://example.com/icon.jpg',
checksum: 'abc',
valid_from: '2024-01-01',
valid_to: '2024-01-07',

View File

@@ -1,28 +1,31 @@
// src/hooks/useFlyerItems.ts
import type { Flyer, FlyerItem } from '../types';
import { useApiOnMount } from './useApiOnMount';
import * as apiClient from '../services/apiClient';
import type { Flyer } from '../types';
import { useFlyerItemsQuery } from './queries/useFlyerItemsQuery';
/**
* A custom hook to fetch the items for a given flyer.
* A custom hook to fetch the items for a given flyer using TanStack Query (ADR-0005).
*
* This replaces the previous useApiOnMount implementation with TanStack Query
* for automatic caching and better state management.
*
* @param selectedFlyer The flyer for which to fetch items.
* @returns An object containing the flyer items, loading state, and any errors.
*
* @example
* ```tsx
* const { flyerItems, isLoading, error } = useFlyerItems(selectedFlyer);
* ```
*/
export const useFlyerItems = (selectedFlyer: Flyer | null) => {
const wrappedFetcher = (flyerId?: number): Promise<Response> => {
// This should not be called with undefined due to the `enabled` flag,
// but this wrapper satisfies the type checker.
if (flyerId === undefined) {
return Promise.reject(new Error('Cannot fetch items for an undefined flyer ID.'));
}
return apiClient.fetchFlyerItems(flyerId);
};
const {
data: flyerItems = [],
isLoading,
error,
} = useFlyerItemsQuery(selectedFlyer?.flyer_id);
const { data, loading, error } = useApiOnMount<{ items: FlyerItem[] }, [number?]>(
wrappedFetcher,
[selectedFlyer],
{ enabled: !!selectedFlyer },
selectedFlyer?.flyer_id,
);
return { flyerItems: data?.items || [], isLoading: loading, error };
return {
flyerItems,
isLoading,
error,
};
};

View File

@@ -72,7 +72,7 @@ describe('useFlyers Hook and FlyersProvider', () => {
createMockFlyer({
flyer_id: 1,
file_name: 'flyer1.jpg',
image_url: 'http://example.com/flyer1.jpg',
image_url: 'https://example.com/flyer1.jpg',
item_count: 5,
created_at: '2024-01-01',
}),

View File

@@ -79,7 +79,7 @@ describe('HomePage Component', () => {
describe('when a flyer is selected', () => {
const mockFlyer: Flyer = createMockFlyer({
flyer_id: 1,
image_url: 'http://example.com/flyer.jpg',
image_url: 'https://example.com/flyer.jpg',
});
it('should render FlyerDisplay but not data tables if there are no flyer items', () => {

View File

@@ -26,7 +26,7 @@ const mockedApiClient = vi.mocked(apiClient);
const mockProfile: UserProfile = createMockUserProfile({
user: createMockUser({ user_id: 'user-123', email: 'test@example.com' }),
full_name: 'Test User',
avatar_url: 'http://example.com/avatar.jpg',
avatar_url: 'https://example.com/avatar.jpg',
points: 150,
role: 'user',
});
@@ -359,7 +359,7 @@ describe('UserProfilePage', () => {
});
it('should upload a new avatar and update the image source', async () => {
const updatedProfile = { ...mockProfile, avatar_url: 'http://example.com/new-avatar.png' };
const updatedProfile = { ...mockProfile, avatar_url: 'https://example.com/new-avatar.png' };
// Log when the mock is called
mockedApiClient.uploadAvatar.mockImplementation((file) => {

View File

@@ -30,7 +30,7 @@ const mockLogs: ActivityLogItem[] = [
user_id: 'user-123',
action: 'flyer_processed',
display_text: 'Processed a new flyer for Walmart.',
user_avatar_url: 'http://example.com/avatar.png',
user_avatar_url: 'https://example.com/avatar.png',
user_full_name: 'Test User',
details: { flyer_id: 1, store_name: 'Walmart' },
}),
@@ -63,7 +63,7 @@ const mockLogs: ActivityLogItem[] = [
action: 'recipe_favorited',
display_text: 'User favorited a recipe',
user_full_name: 'Pizza Lover',
user_avatar_url: 'http://example.com/pizza.png',
user_avatar_url: 'https://example.com/pizza.png',
details: { recipe_name: 'Best Pizza' },
}),
createMockActivityLogItem({
@@ -136,7 +136,7 @@ describe('ActivityLog', () => {
// Check for avatar
const avatar = screen.getByAltText('Test User');
expect(avatar).toBeInTheDocument();
expect(avatar).toHaveAttribute('src', 'http://example.com/avatar.png');
expect(avatar).toHaveAttribute('src', 'https://example.com/avatar.png');
// Check for fallback avatar (Newbie User has no avatar)
// The fallback is an SVG inside a span. We can check for the span's class or the SVG.

View File

@@ -59,14 +59,14 @@ describe('FlyerReviewPage', () => {
file_name: 'flyer1.jpg',
created_at: '2023-01-01T00:00:00Z',
store: { name: 'Store A' },
icon_url: 'http://example.com/icon1.jpg',
icon_url: 'https://example.com/icon1.jpg',
},
{
flyer_id: 2,
file_name: 'flyer2.jpg',
created_at: '2023-01-02T00:00:00Z',
store: { name: 'Store B' },
icon_url: 'http://example.com/icon2.jpg',
icon_url: 'https://example.com/icon2.jpg',
},
{
flyer_id: 3,

View File

@@ -19,7 +19,7 @@ const mockBrands = [
brand_id: 2,
name: 'Compliments',
store_name: 'Sobeys',
logo_url: 'http://example.com/compliments.png',
logo_url: 'https://example.com/compliments.png',
}),
];
@@ -92,7 +92,7 @@ describe('AdminBrandManager', () => {
);
mockedApiClient.uploadBrandLogo.mockImplementation(
async () =>
new Response(JSON.stringify({ logoUrl: 'http://example.com/new-logo.png' }), {
new Response(JSON.stringify({ logoUrl: 'https://example.com/new-logo.png' }), {
status: 200,
}),
);
@@ -120,7 +120,7 @@ describe('AdminBrandManager', () => {
// Check if the UI updates with the new logo
expect(screen.getByAltText('No Frills logo')).toHaveAttribute(
'src',
'http://example.com/new-logo.png',
'https://example.com/new-logo.png',
);
console.log('TEST SUCCESS: All assertions for successful upload passed.');
});
@@ -350,7 +350,7 @@ describe('AdminBrandManager', () => {
// Brand 2 should still have original logo
expect(screen.getByAltText('Compliments logo')).toHaveAttribute(
'src',
'http://example.com/compliments.png',
'https://example.com/compliments.png',
);
});
});

View File

@@ -35,7 +35,7 @@ const authenticatedUser = createMockUser({ user_id: 'auth-user-123', email: 'tes
const mockAddressId = 123;
const authenticatedProfile = createMockUserProfile({
full_name: 'Test User',
avatar_url: 'http://example.com/avatar.png',
avatar_url: 'https://example.com/avatar.png',
role: 'user',
points: 100,
preferences: {

View File

@@ -1,5 +1,8 @@
// src/providers/AppProviders.tsx
import React, { ReactNode } from 'react';
import { QueryClientProvider } from '@tanstack/react-query';
import { ReactQueryDevtools } from '@tanstack/react-query-devtools';
import { queryClient } from '../config/queryClient';
import { AuthProvider } from './AuthProvider';
import { FlyersProvider } from './FlyersProvider';
import { MasterItemsProvider } from './MasterItemsProvider';
@@ -13,17 +16,29 @@ interface AppProvidersProps {
/**
* A single component to group all application-wide context providers.
* This cleans up index.tsx and makes the provider hierarchy clear.
*
* Provider hierarchy (from outermost to innermost):
* 1. QueryClientProvider - TanStack Query for server state management (ADR-0005)
* 2. ModalProvider - Modal state management
* 3. AuthProvider - Authentication state
* 4. FlyersProvider - Flyer data fetching
* 5. MasterItemsProvider - Master grocery items
* 6. UserDataProvider - User-specific data (watched items, shopping lists)
*/
export const AppProviders: React.FC<AppProvidersProps> = ({ children }) => {
return (
<ModalProvider>
<AuthProvider>
<FlyersProvider>
<MasterItemsProvider>
<UserDataProvider>{children}</UserDataProvider>
</MasterItemsProvider>
</FlyersProvider>
</AuthProvider>
</ModalProvider>
<QueryClientProvider client={queryClient}>
<ModalProvider>
<AuthProvider>
<FlyersProvider>
<MasterItemsProvider>
<UserDataProvider>{children}</UserDataProvider>
</MasterItemsProvider>
</FlyersProvider>
</AuthProvider>
</ModalProvider>
{/* React Query Devtools - only visible in development */}
{import.meta.env.DEV && <ReactQueryDevtools initialIsOpen={false} />}
</QueryClientProvider>
);
};

View File

@@ -1,34 +1,42 @@
// src/providers/FlyersProvider.tsx
import React, { ReactNode } from 'react';
import React, { ReactNode, useMemo } from 'react';
import { FlyersContext, FlyersContextType } from '../contexts/FlyersContext';
import type { Flyer } from '../types';
import * as apiClient from '../services/apiClient';
import { useInfiniteQuery } from '../hooks/useInfiniteQuery';
import { useCallback } from 'react';
import { useFlyersQuery } from '../hooks/queries/useFlyersQuery';
/**
* Provider for flyer data using TanStack Query (ADR-0005).
*
* This replaces the previous custom useInfiniteQuery implementation with
* TanStack Query for better caching, automatic refetching, and state management.
*
* Note: Currently fetches all flyers (no pagination UI). Infinite scroll can be
* added later when the backend API returns proper pagination metadata.
*/
export const FlyersProvider: React.FC<{ children: ReactNode }> = ({ children }) => {
// Memoize the fetch function to ensure stability for the useInfiniteQuery hook.
const fetchFlyersFn = useCallback(apiClient.fetchFlyers, []);
// Fetch all flyers with a large limit (effectively "all")
// TODO: Implement proper infinite scroll when backend API is updated
const {
data: flyers,
isLoading: isLoadingFlyers,
error: flyersError,
fetchNextPage: fetchNextFlyersPage,
hasNextPage: hasNextFlyersPage,
isLoading: isLoadingFlyers,
error,
refetch: refetchFlyers,
isRefetching: isRefetchingFlyers,
} = useInfiniteQuery<Flyer>(fetchFlyersFn);
} = useFlyersQuery(1000, 0);
const value: FlyersContextType = {
flyers: flyers || [],
isLoadingFlyers,
flyersError,
fetchNextFlyersPage,
hasNextFlyersPage,
isRefetchingFlyers,
refetchFlyers,
};
const value: FlyersContextType = useMemo(
() => ({
flyers: flyers || [],
isLoadingFlyers,
flyersError: error,
// Stub methods for compatibility with existing code
// TODO: Remove these when infinite scroll is properly implemented
fetchNextFlyersPage: () => {},
hasNextFlyersPage: false,
isRefetchingFlyers,
refetchFlyers,
}),
[flyers, isLoadingFlyers, error, isRefetchingFlyers, refetchFlyers]
);
return <FlyersContext.Provider value={value}>{children}</FlyersContext.Provider>;
return <FlyersContext.Provider value={value}>{children}</FlyersContext.Provider>;
};

View File

@@ -1,30 +1,30 @@
// src/providers/MasterItemsProvider.tsx
import React, { ReactNode, useMemo, useEffect, useCallback } from 'react';
import React, { ReactNode, useMemo } from 'react';
import { MasterItemsContext } from '../contexts/MasterItemsContext';
import type { MasterGroceryItem } from '../types';
import * as apiClient from '../services/apiClient';
import { useApiOnMount } from '../hooks/useApiOnMount';
import { logger } from '../services/logger.client';
import { useMasterItemsQuery } from '../hooks/queries/useMasterItemsQuery';
/**
* Provider for master grocery items using TanStack Query (ADR-0005).
*
* This replaces the previous custom useApiOnMount implementation with
* TanStack Query for better caching, automatic refetching, and state management.
*
* Master items are cached longer (10 minutes) since they change infrequently.
*/
export const MasterItemsProvider: React.FC<{ children: ReactNode }> = ({ children }) => {
// LOGGING: Check if the provider is unmounting/remounting repeatedly
useEffect(() => {
logger.debug('MasterItemsProvider: MOUNTED');
return () => logger.debug('MasterItemsProvider: UNMOUNTED');
}, []);
// Memoize the fetch function to ensure stability for the useApiOnMount hook.
const fetchFn = useCallback(() => apiClient.fetchMasterItems(), []);
const { data, loading, error } = useApiOnMount<MasterGroceryItem[], []>(fetchFn);
const {
data: masterItems = [],
isLoading,
error,
} = useMasterItemsQuery();
const value = useMemo(
() => ({
masterItems: data || [],
isLoading: loading,
masterItems,
isLoading,
error: error?.message || null,
}),
[data, loading, error],
[masterItems, isLoading, error]
);
return <MasterItemsContext.Provider value={value}>{children}</MasterItemsContext.Provider>;

View File

@@ -1,74 +1,56 @@
// src/providers/UserDataProvider.tsx
import { logger } from '../services/logger.client';
import React, { useState, useEffect, useMemo, ReactNode, useCallback } from 'react';
import React, { useMemo, ReactNode } from 'react';
import { UserDataContext } from '../contexts/UserDataContext';
import type { MasterGroceryItem, ShoppingList } from '../types';
import * as apiClient from '../services/apiClient';
import { useApiOnMount } from '../hooks/useApiOnMount';
import { useAuth } from '../hooks/useAuth';
import { useWatchedItemsQuery } from '../hooks/queries/useWatchedItemsQuery';
import { useShoppingListsQuery } from '../hooks/queries/useShoppingListsQuery';
/**
* Provider for user-specific data using TanStack Query (ADR-0005).
*
* This replaces the previous custom useApiOnMount implementation with
* TanStack Query for better caching, automatic refetching, and state management.
*
* Data is automatically cleared when the user logs out (query is disabled),
* and refetched when a new user logs in.
*/
export const UserDataProvider: React.FC<{ children: ReactNode }> = ({ children }) => {
const { userProfile } = useAuth();
// Wrap the API calls in useCallback to prevent unnecessary re-renders.
const fetchWatchedItemsFn = useCallback(
() => apiClient.fetchWatchedItems(),
[],
);
const fetchShoppingListsFn = useCallback(() => apiClient.fetchShoppingLists(), []);
const isEnabled = !!userProfile;
const {
data: watchedItemsData,
loading: isLoadingWatched,
error: watchedItemsError,
} = useApiOnMount<MasterGroceryItem[], []>(fetchWatchedItemsFn, [userProfile], {
enabled: !!userProfile,
});
data: watchedItems = [],
isLoading: isLoadingWatched,
error: watchedError,
} = useWatchedItemsQuery(isEnabled);
const {
data: shoppingListsData,
loading: isLoadingShoppingLists,
error: shoppingListsError,
} = useApiOnMount<ShoppingList[], []>(fetchShoppingListsFn, [userProfile], {
enabled: !!userProfile,
});
const [watchedItems, setWatchedItems] = useState<MasterGroceryItem[]>([]);
const [shoppingLists, setShoppingLists] = useState<ShoppingList[]>([]);
// This effect synchronizes the local state (watchedItems, shoppingLists) with the
// data fetched by the useApiOnMount hooks. It also handles cleanup on user logout.
useEffect(() => {
// When the user logs out (user becomes null), immediately clear all user-specific data.
// This also serves to clear out old data when a new user logs in, before their new data arrives.
if (!userProfile) {
setWatchedItems([]);
setShoppingLists([]);
return;
}
// Once data for the new user is fetched, update the state.
if (watchedItemsData) setWatchedItems(watchedItemsData);
if (shoppingListsData) setShoppingLists(shoppingListsData);
}, [userProfile, watchedItemsData, shoppingListsData]);
data: shoppingLists = [],
isLoading: isLoadingLists,
error: listsError,
} = useShoppingListsQuery(isEnabled);
const value = useMemo(
() => ({
watchedItems,
shoppingLists,
setWatchedItems,
setShoppingLists,
isLoading: !!userProfile && (isLoadingWatched || isLoadingShoppingLists),
error: watchedItemsError?.message || shoppingListsError?.message || null,
// Stub setters for backward compatibility
// TODO: Replace usages with proper mutations (Phase 3 of ADR-0005)
setWatchedItems: () => {
console.warn(
'setWatchedItems is deprecated. Use mutation hooks instead (TanStack Query mutations).'
);
},
setShoppingLists: () => {
console.warn(
'setShoppingLists is deprecated. Use mutation hooks instead (TanStack Query mutations).'
);
},
isLoading: isEnabled && (isLoadingWatched || isLoadingLists),
error: watchedError?.message || listsError?.message || null,
}),
[
watchedItems,
shoppingLists,
userProfile,
isLoadingWatched,
isLoadingShoppingLists,
watchedItemsError,
shoppingListsError,
],
);
[watchedItems, shoppingLists, isEnabled, isLoadingWatched, isLoadingLists, watchedError, listsError]
);
return <UserDataContext.Provider value={value}>{children}</UserDataContext.Provider>;
};

View File

@@ -0,0 +1,113 @@
import { describe, it, expect, vi, beforeEach } from 'vitest';
import supertest from 'supertest';
import { createTestApp } from '../tests/utils/createTestApp';
import { createMockUserProfile } from '../tests/utils/mockFactories';
// Mock dependencies required by admin.routes.ts
vi.mock('../services/db/index.db', () => ({
adminRepo: {},
flyerRepo: {},
recipeRepo: {},
userRepo: {},
personalizationRepo: {},
notificationRepo: {},
}));
vi.mock('../services/backgroundJobService', () => ({
backgroundJobService: {
runDailyDealCheck: vi.fn(),
triggerAnalyticsReport: vi.fn(),
triggerWeeklyAnalyticsReport: vi.fn(),
},
}));
vi.mock('../services/queueService.server', () => ({
flyerQueue: { add: vi.fn(), getJob: vi.fn() },
emailQueue: { add: vi.fn(), getJob: vi.fn() },
analyticsQueue: { add: vi.fn(), getJob: vi.fn() },
cleanupQueue: { add: vi.fn(), getJob: vi.fn() },
weeklyAnalyticsQueue: { add: vi.fn(), getJob: vi.fn() },
}));
vi.mock('../services/geocodingService.server', () => ({
geocodingService: { clearGeocodeCache: vi.fn() },
}));
vi.mock('../services/logger.server', async () => ({
logger: (await import('../tests/utils/mockLogger')).mockLogger,
}));
vi.mock('@bull-board/api');
vi.mock('@bull-board/api/bullMQAdapter');
vi.mock('@bull-board/express', () => ({
ExpressAdapter: class {
setBasePath() {}
getRouter() { return (req: any, res: any, next: any) => next(); }
},
}));
vi.mock('node:fs/promises');
// Mock Passport to allow admin access
vi.mock('./passport.routes', () => ({
default: {
authenticate: vi.fn(() => (req: any, res: any, next: any) => {
req.user = createMockUserProfile({ role: 'admin' });
next();
}),
},
isAdmin: (req: any, res: any, next: any) => next(),
}));
import adminRouter from './admin.routes';
describe('Admin Routes Rate Limiting', () => {
const app = createTestApp({ router: adminRouter, basePath: '/api/admin' });
beforeEach(() => {
vi.clearAllMocks();
});
describe('Trigger Rate Limiting', () => {
it('should block requests to /trigger/daily-deal-check after exceeding limit', async () => {
const limit = 30; // Matches adminTriggerLimiter config
// Make requests up to the limit
for (let i = 0; i < limit; i++) {
await supertest(app)
.post('/api/admin/trigger/daily-deal-check')
.set('X-Test-Rate-Limit-Enable', 'true');
}
// The next request should be blocked
const response = await supertest(app)
.post('/api/admin/trigger/daily-deal-check')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(429);
expect(response.text).toContain('Too many administrative triggers');
});
});
describe('Upload Rate Limiting', () => {
it('should block requests to /brands/:id/logo after exceeding limit', async () => {
const limit = 20; // Matches adminUploadLimiter config
const brandId = 1;
// Make requests up to the limit
// Note: We don't need to attach a file to test the rate limiter, as it runs before multer
for (let i = 0; i < limit; i++) {
await supertest(app)
.post(`/api/admin/brands/${brandId}/logo`)
.set('X-Test-Rate-Limit-Enable', 'true');
}
const response = await supertest(app)
.post(`/api/admin/brands/${brandId}/logo`)
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(429);
expect(response.text).toContain('Too many file uploads');
});
});
});

View File

@@ -30,11 +30,13 @@ import {
optionalNumeric,
optionalString,
} from '../utils/zodUtils';
import { logger } from '../services/logger.server'; // This was a duplicate, fixed.
// Removed: import { logger } from '../services/logger.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { monitoringService } from '../services/monitoringService.server';
import { userService } from '../services/userService';
import { cleanupUploadedFile } from '../utils/fileUtils';
import { brandService } from '../services/brandService';
import { adminTriggerLimiter, adminUploadLimiter } from '../config/rateLimiters';
const updateCorrectionSchema = numericIdParam('id').extend({
body: z.object({
@@ -125,7 +127,7 @@ router.get('/corrections', validateRequest(emptySchema), async (req, res, next:
const corrections = await db.adminRepo.getSuggestedCorrections(req.log);
res.json(corrections);
} catch (error) {
logger.error({ error }, 'Error fetching suggested corrections');
req.log.error({ error }, 'Error fetching suggested corrections');
next(error);
}
});
@@ -137,7 +139,7 @@ router.get('/review/flyers', validateRequest(emptySchema), async (req, res, next
req.log.info({ count: Array.isArray(flyers) ? flyers.length : 'unknown' }, 'Successfully fetched flyers for review');
res.json(flyers);
} catch (error) {
logger.error({ error }, 'Error fetching flyers for review');
req.log.error({ error }, 'Error fetching flyers for review');
next(error);
}
});
@@ -147,7 +149,7 @@ router.get('/brands', validateRequest(emptySchema), async (req, res, next: NextF
const brands = await db.flyerRepo.getAllBrands(req.log);
res.json(brands);
} catch (error) {
logger.error({ error }, 'Error fetching brands');
req.log.error({ error }, 'Error fetching brands');
next(error);
}
});
@@ -157,7 +159,7 @@ router.get('/stats', validateRequest(emptySchema), async (req, res, next: NextFu
const stats = await db.adminRepo.getApplicationStats(req.log);
res.json(stats);
} catch (error) {
logger.error({ error }, 'Error fetching application stats');
req.log.error({ error }, 'Error fetching application stats');
next(error);
}
});
@@ -167,7 +169,7 @@ router.get('/stats/daily', validateRequest(emptySchema), async (req, res, next:
const dailyStats = await db.adminRepo.getDailyStatsForLast30Days(req.log);
res.json(dailyStats);
} catch (error) {
logger.error({ error }, 'Error fetching daily stats');
req.log.error({ error }, 'Error fetching daily stats');
next(error);
}
});
@@ -182,7 +184,7 @@ router.post(
await db.adminRepo.approveCorrection(params.id, req.log); // params.id is now safely typed as number
res.status(200).json({ message: 'Correction approved successfully.' });
} catch (error) {
logger.error({ error }, 'Error approving correction');
req.log.error({ error }, 'Error approving correction');
next(error);
}
},
@@ -198,7 +200,7 @@ router.post(
await db.adminRepo.rejectCorrection(params.id, req.log); // params.id is now safely typed as number
res.status(200).json({ message: 'Correction rejected successfully.' });
} catch (error) {
logger.error({ error }, 'Error rejecting correction');
req.log.error({ error }, 'Error rejecting correction');
next(error);
}
},
@@ -218,7 +220,7 @@ router.put(
);
res.status(200).json(updatedCorrection);
} catch (error) {
logger.error({ error }, 'Error updating suggested correction');
req.log.error({ error }, 'Error updating suggested correction');
next(error);
}
},
@@ -234,7 +236,7 @@ router.put(
const updatedRecipe = await db.adminRepo.updateRecipeStatus(params.id, body.status, req.log); // This is still a standalone function in admin.db.ts
res.status(200).json(updatedRecipe);
} catch (error) {
logger.error({ error }, 'Error updating recipe status');
req.log.error({ error }, 'Error updating recipe status');
next(error); // Pass all errors to the central error handler
}
},
@@ -242,6 +244,7 @@ router.put(
router.post(
'/brands/:id/logo',
adminUploadLimiter,
validateRequest(numericIdParam('id')),
brandLogoUpload.single('logoImage'),
requireFileUpload('logoImage'),
@@ -256,13 +259,13 @@ router.post(
const logoUrl = await brandService.updateBrandLogo(params.id, req.file, req.log);
logger.info({ brandId: params.id, logoUrl }, `Brand logo updated for brand ID: ${params.id}`);
req.log.info({ brandId: params.id, logoUrl }, `Brand logo updated for brand ID: ${params.id}`);
res.status(200).json({ message: 'Brand logo updated successfully.', logoUrl });
} catch (error) {
// If an error occurs after the file has been uploaded (e.g., DB error),
// we must clean up the orphaned file from the disk.
await cleanupUploadedFile(req.file);
logger.error({ error }, 'Error updating brand logo');
req.log.error({ error }, 'Error updating brand logo');
next(error);
}
},
@@ -273,7 +276,7 @@ router.get('/unmatched-items', validateRequest(emptySchema), async (req, res, ne
const items = await db.adminRepo.getUnmatchedFlyerItems(req.log);
res.json(items);
} catch (error) {
logger.error({ error }, 'Error fetching unmatched items');
req.log.error({ error }, 'Error fetching unmatched items');
next(error);
}
});
@@ -293,7 +296,7 @@ router.delete(
await db.recipeRepo.deleteRecipe(params.recipeId, userProfile.user.user_id, true, req.log);
res.status(204).send();
} catch (error: unknown) {
logger.error({ error }, 'Error deleting recipe');
req.log.error({ error }, 'Error deleting recipe');
next(error);
}
},
@@ -312,7 +315,7 @@ router.delete(
await db.flyerRepo.deleteFlyer(params.flyerId, req.log);
res.status(204).send();
} catch (error: unknown) {
logger.error({ error }, 'Error deleting flyer');
req.log.error({ error }, 'Error deleting flyer');
next(error);
}
},
@@ -332,7 +335,7 @@ router.put(
); // This is still a standalone function in admin.db.ts
res.status(200).json(updatedComment);
} catch (error: unknown) {
logger.error({ error }, 'Error updating comment status');
req.log.error({ error }, 'Error updating comment status');
next(error);
}
},
@@ -343,7 +346,7 @@ router.get('/users', validateRequest(emptySchema), async (req, res, next: NextFu
const users = await db.adminRepo.getAllUsers(req.log);
res.json(users);
} catch (error) {
logger.error({ error }, 'Error fetching users');
req.log.error({ error }, 'Error fetching users');
next(error);
}
});
@@ -360,7 +363,7 @@ router.get(
const logs = await db.adminRepo.getActivityLog(limit!, offset!, req.log);
res.json(logs);
} catch (error) {
logger.error({ error }, 'Error fetching activity log');
req.log.error({ error }, 'Error fetching activity log');
next(error);
}
},
@@ -376,7 +379,7 @@ router.get(
const user = await db.userRepo.findUserProfileById(params.id, req.log);
res.json(user);
} catch (error) {
logger.error({ error }, 'Error fetching user profile');
req.log.error({ error }, 'Error fetching user profile');
next(error);
}
},
@@ -392,7 +395,7 @@ router.put(
const updatedUser = await db.adminRepo.updateUserRole(params.id, body.role, req.log);
res.json(updatedUser);
} catch (error) {
logger.error({ error }, `Error updating user ${params.id}:`);
req.log.error({ error }, `Error updating user ${params.id}:`);
next(error);
}
},
@@ -409,7 +412,7 @@ router.delete(
await userService.deleteUserAsAdmin(userProfile.user.user_id, params.id, req.log);
res.status(204).send();
} catch (error) {
logger.error({ error }, 'Error deleting user');
req.log.error({ error }, 'Error deleting user');
next(error);
}
},
@@ -421,10 +424,11 @@ router.delete(
*/
router.post(
'/trigger/daily-deal-check',
adminTriggerLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile;
logger.info(
req.log.info(
`[Admin] Manual trigger for daily deal check received from user: ${userProfile.user.user_id}`,
);
@@ -437,7 +441,7 @@ router.post(
'Daily deal check job has been triggered successfully. It will run in the background.',
});
} catch (error) {
logger.error({ error }, '[Admin] Failed to trigger daily deal check job.');
req.log.error({ error }, '[Admin] Failed to trigger daily deal check job.');
next(error);
}
},
@@ -449,10 +453,11 @@ router.post(
*/
router.post(
'/trigger/analytics-report',
adminTriggerLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile;
logger.info(
req.log.info(
`[Admin] Manual trigger for analytics report generation received from user: ${userProfile.user.user_id}`,
);
@@ -462,7 +467,7 @@ router.post(
message: `Analytics report generation job has been enqueued successfully. Job ID: ${jobId}`,
});
} catch (error) {
logger.error({ error }, '[Admin] Failed to enqueue analytics report job.');
req.log.error({ error }, '[Admin] Failed to enqueue analytics report job.');
next(error);
}
},
@@ -474,12 +479,13 @@ router.post(
*/
router.post(
'/flyers/:flyerId/cleanup',
adminTriggerLimiter,
validateRequest(numericIdParam('flyerId')),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile;
// Infer type from the schema generator for type safety, as per ADR-003.
const { params } = req as unknown as z.infer<ReturnType<typeof numericIdParam>>; // This was a duplicate, fixed.
logger.info(
req.log.info(
`[Admin] Manual trigger for flyer file cleanup received from user: ${userProfile.user.user_id} for flyer ID: ${params.flyerId}`,
);
@@ -490,7 +496,7 @@ router.post(
.status(202)
.json({ message: `File cleanup job for flyer ID ${params.flyerId} has been enqueued.` });
} catch (error) {
logger.error({ error }, 'Error enqueuing cleanup job');
req.log.error({ error }, 'Error enqueuing cleanup job');
next(error);
}
},
@@ -502,10 +508,11 @@ router.post(
*/
router.post(
'/trigger/failing-job',
adminTriggerLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile;
logger.info(
req.log.info(
`[Admin] Manual trigger for a failing job received from user: ${userProfile.user.user_id}`,
);
@@ -516,7 +523,7 @@ router.post(
.status(202)
.json({ message: `Failing test job has been enqueued successfully. Job ID: ${job.id}` });
} catch (error) {
logger.error({ error }, 'Error enqueuing failing job');
req.log.error({ error }, 'Error enqueuing failing job');
next(error);
}
}
@@ -528,10 +535,11 @@ router.post(
*/
router.post(
'/system/clear-geocode-cache',
adminTriggerLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile;
logger.info(
req.log.info(
`[Admin] Manual trigger for geocode cache clear received from user: ${userProfile.user.user_id}`,
);
@@ -541,7 +549,7 @@ router.post(
message: `Successfully cleared the geocode cache. ${keysDeleted} keys were removed.`,
});
} catch (error) {
logger.error({ error }, '[Admin] Failed to clear geocode cache.');
req.log.error({ error }, '[Admin] Failed to clear geocode cache.');
next(error);
}
},
@@ -556,7 +564,7 @@ router.get('/workers/status', validateRequest(emptySchema), async (req: Request,
const workerStatuses = await monitoringService.getWorkerStatuses();
res.json(workerStatuses);
} catch (error) {
logger.error({ error }, 'Error fetching worker statuses');
req.log.error({ error }, 'Error fetching worker statuses');
next(error);
}
});
@@ -570,7 +578,7 @@ router.get('/queues/status', validateRequest(emptySchema), async (req: Request,
const queueStatuses = await monitoringService.getQueueStatuses();
res.json(queueStatuses);
} catch (error) {
logger.error({ error }, 'Error fetching queue statuses');
req.log.error({ error }, 'Error fetching queue statuses');
next(error);
}
});
@@ -580,6 +588,7 @@ router.get('/queues/status', validateRequest(emptySchema), async (req: Request,
*/
router.post(
'/jobs/:queueName/:jobId/retry',
adminTriggerLimiter,
validateRequest(jobRetrySchema),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile;
@@ -595,7 +604,7 @@ router.post(
);
res.status(200).json({ message: `Job ${jobId} has been successfully marked for retry.` });
} catch (error) {
logger.error({ error }, 'Error retrying job');
req.log.error({ error }, 'Error retrying job');
next(error);
}
},
@@ -606,10 +615,11 @@ router.post(
*/
router.post(
'/trigger/weekly-analytics',
adminTriggerLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile; // This was a duplicate, fixed.
logger.info(
req.log.info(
`[Admin] Manual trigger for weekly analytics report received from user: ${userProfile.user.user_id}`,
);
@@ -619,7 +629,7 @@ router.post(
.status(202)
.json({ message: 'Successfully enqueued weekly analytics job.', jobId });
} catch (error) {
logger.error({ error }, 'Error enqueuing weekly analytics job');
req.log.error({ error }, 'Error enqueuing weekly analytics job');
next(error);
}
},

View File

@@ -1,19 +1,31 @@
// src/routes/ai.routes.ts
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { Router, Request, Response, NextFunction } from 'express';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { z } from 'zod';
import passport from './passport.routes';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { optionalAuth } from './passport.routes';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { aiService, DuplicateFlyerError } from '../services/aiService.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import {
createUploadMiddleware,
handleMulterError,
} from '../middleware/multer.middleware';
import { logger } from '../services/logger.server'; // This was a duplicate, fixed.
// Removed: import { logger } from '../services/logger.server'; // This was a duplicate, fixed.
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { UserProfile } from '../types'; // This was a duplicate, fixed.
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validateRequest } from '../middleware/validation.middleware';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { requiredString } from '../utils/zodUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { cleanupUploadedFile, cleanupUploadedFiles } from '../utils/fileUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { monitoringService } from '../services/monitoringService.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { aiUploadLimiter, aiGenerationLimiter } from '../config/rateLimiters';
const router = Router();
@@ -27,6 +39,7 @@ const uploadAndProcessSchema = z.object({
.length(64, 'Checksum must be 64 characters long.')
.regex(/^[a-f0-9]+$/, 'Checksum must be a valid hexadecimal string.'),
),
baseUrl: z.string().url().optional(),
}),
});
@@ -59,7 +72,7 @@ const rescanAreaSchema = z.object({
return JSON.parse(val);
} catch (err) {
// Log the actual parsing error for better debugging if invalid JSON is sent.
logger.warn(
req.log.warn(
{ error: errMsg(err), receivedValue: val },
'Failed to parse cropArea in rescanAreaSchema',
);
@@ -149,12 +162,12 @@ router.use((req: Request, res: Response, next: NextFunction) => {
const contentType = req.headers['content-type'] || '';
const contentLength = req.headers['content-length'] || 'unknown';
const authPresent = !!req.headers['authorization'];
logger.debug(
req.log.debug(
{ method: req.method, url: req.originalUrl, contentType, contentLength, authPresent },
'[API /ai] Incoming request',
);
} catch (e: unknown) {
logger.error({ error: errMsg(e) }, 'Failed to log incoming AI request headers');
req.log.error({ error: errMsg(e) }, 'Failed to log incoming AI request headers');
}
next();
});
@@ -165,6 +178,7 @@ router.use((req: Request, res: Response, next: NextFunction) => {
*/
router.post(
'/upload-and-process',
aiUploadLimiter,
optionalAuth,
uploadToDisk.single('flyerFile'),
// Validation is now handled inside the route to ensure file cleanup on failure.
@@ -178,7 +192,7 @@ router.post(
return res.status(400).json({ message: 'A flyer file (PDF or image) is required.' });
}
logger.debug(
req.log.debug(
{ filename: req.file.originalname, size: req.file.size, checksum: body.checksum },
'Handling /upload-and-process',
);
@@ -196,6 +210,7 @@ router.post(
userProfile,
req.ip ?? 'unknown',
req.log,
body.baseUrl,
);
// Respond immediately to the client with 202 Accepted
@@ -206,7 +221,7 @@ router.post(
} catch (error) {
await cleanupUploadedFile(req.file);
if (error instanceof DuplicateFlyerError) {
logger.warn(`Duplicate flyer upload attempt blocked for checksum: ${req.body?.checksum}`);
req.log.warn(`Duplicate flyer upload attempt blocked for checksum: ${req.body?.checksum}`);
return res.status(409).json({ message: error.message, flyerId: error.flyerId });
}
next(error);
@@ -221,6 +236,7 @@ router.post(
*/
router.post(
'/upload-legacy',
aiUploadLimiter,
passport.authenticate('jwt', { session: false }),
uploadToDisk.single('flyerFile'),
async (req: Request, res: Response, next: NextFunction) => {
@@ -234,7 +250,7 @@ router.post(
} catch (error) {
await cleanupUploadedFile(req.file);
if (error instanceof DuplicateFlyerError) {
logger.warn(`Duplicate legacy flyer upload attempt blocked.`);
req.log.warn(`Duplicate legacy flyer upload attempt blocked.`);
return res.status(409).json({ message: error.message, flyerId: error.flyerId });
}
next(error);
@@ -256,7 +272,7 @@ router.get(
try {
const jobStatus = await monitoringService.getFlyerJobStatus(jobId); // This was a duplicate, fixed.
logger.debug(`[API /ai/jobs] Status check for job ${jobId}: ${jobStatus.state}`);
req.log.debug(`[API /ai/jobs] Status check for job ${jobId}: ${jobStatus.state}`);
res.json(jobStatus);
} catch (error) {
next(error);
@@ -271,6 +287,7 @@ router.get(
*/
router.post(
'/flyers/process',
aiUploadLimiter,
optionalAuth,
uploadToDisk.single('flyerImage'),
async (req, res, next: NextFunction) => {
@@ -292,7 +309,7 @@ router.post(
} catch (error) {
await cleanupUploadedFile(req.file);
if (error instanceof DuplicateFlyerError) {
logger.warn(`Duplicate flyer upload attempt blocked.`);
req.log.warn(`Duplicate flyer upload attempt blocked.`);
return res.status(409).json({ message: error.message, flyerId: error.flyerId });
}
next(error);
@@ -306,6 +323,7 @@ router.post(
*/
router.post(
'/check-flyer',
aiUploadLimiter,
optionalAuth,
uploadToDisk.single('image'),
async (req, res, next: NextFunction) => {
@@ -313,7 +331,7 @@ router.post(
if (!req.file) {
return res.status(400).json({ message: 'Image file is required.' });
}
logger.info(`Server-side flyer check for file: ${req.file.originalname}`);
req.log.info(`Server-side flyer check for file: ${req.file.originalname}`);
res.status(200).json({ is_flyer: true }); // Stubbed response
} catch (error) {
next(error);
@@ -325,6 +343,7 @@ router.post(
router.post(
'/extract-address',
aiUploadLimiter,
optionalAuth,
uploadToDisk.single('image'),
async (req, res, next: NextFunction) => {
@@ -332,7 +351,7 @@ router.post(
if (!req.file) {
return res.status(400).json({ message: 'Image file is required.' });
}
logger.info(`Server-side address extraction for file: ${req.file.originalname}`);
req.log.info(`Server-side address extraction for file: ${req.file.originalname}`);
res.status(200).json({ address: 'not identified' }); // Updated stubbed response
} catch (error) {
next(error);
@@ -344,6 +363,7 @@ router.post(
router.post(
'/extract-logo',
aiUploadLimiter,
optionalAuth,
uploadToDisk.array('images'),
async (req, res, next: NextFunction) => {
@@ -351,7 +371,7 @@ router.post(
if (!req.files || !Array.isArray(req.files) || req.files.length === 0) {
return res.status(400).json({ message: 'Image files are required.' });
}
logger.info(`Server-side logo extraction for ${req.files.length} image(s).`);
req.log.info(`Server-side logo extraction for ${req.files.length} image(s).`);
res.status(200).json({ store_logo_base_64: null }); // Stubbed response
} catch (error) {
next(error);
@@ -363,11 +383,12 @@ router.post(
router.post(
'/quick-insights',
aiGenerationLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(insightsSchema),
async (req, res, next: NextFunction) => {
try {
logger.info(`Server-side quick insights requested.`);
req.log.info(`Server-side quick insights requested.`);
res
.status(200)
.json({ text: 'This is a server-generated quick insight: buy the cheap stuff!' }); // Stubbed response
@@ -379,11 +400,12 @@ router.post(
router.post(
'/deep-dive',
aiGenerationLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(insightsSchema),
async (req, res, next: NextFunction) => {
try {
logger.info(`Server-side deep dive requested.`);
req.log.info(`Server-side deep dive requested.`);
res
.status(200)
.json({ text: 'This is a server-generated deep dive analysis. It is very detailed.' }); // Stubbed response
@@ -395,11 +417,12 @@ router.post(
router.post(
'/search-web',
aiGenerationLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(searchWebSchema),
async (req, res, next: NextFunction) => {
try {
logger.info(`Server-side web search requested.`);
req.log.info(`Server-side web search requested.`);
res.status(200).json({ text: 'The web says this is good.', sources: [] }); // Stubbed response
} catch (error) {
next(error);
@@ -409,12 +432,13 @@ router.post(
router.post(
'/compare-prices',
aiGenerationLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(comparePricesSchema),
async (req, res, next: NextFunction) => {
try {
const { items } = req.body;
logger.info(`Server-side price comparison requested for ${items.length} items.`);
req.log.info(`Server-side price comparison requested for ${items.length} items.`);
res.status(200).json({
text: 'This is a server-generated price comparison. Milk is cheaper at SuperMart.',
sources: [],
@@ -427,16 +451,17 @@ router.post(
router.post(
'/plan-trip',
aiGenerationLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(planTripSchema),
async (req, res, next: NextFunction) => {
try {
const { items, store, userLocation } = req.body;
logger.debug({ itemCount: items.length, storeName: store.name }, 'Trip planning requested.');
req.log.debug({ itemCount: items.length, storeName: store.name }, 'Trip planning requested.');
const result = await aiService.planTripWithMaps(items, store, userLocation);
res.status(200).json(result);
} catch (error) {
logger.error({ error: errMsg(error) }, 'Error in /api/ai/plan-trip endpoint:');
req.log.error({ error: errMsg(error) }, 'Error in /api/ai/plan-trip endpoint:');
next(error);
}
},
@@ -446,24 +471,26 @@ router.post(
router.post(
'/generate-image',
aiGenerationLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(generateImageSchema),
(req: Request, res: Response) => {
// This endpoint is a placeholder for a future feature.
// Returning 501 Not Implemented is the correct HTTP response for this case.
logger.info('Request received for unimplemented endpoint: /api/ai/generate-image');
req.log.info('Request received for unimplemented endpoint: /api/ai/generate-image');
res.status(501).json({ message: 'Image generation is not yet implemented.' });
},
);
router.post(
'/generate-speech',
aiGenerationLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(generateSpeechSchema),
(req: Request, res: Response) => {
// This endpoint is a placeholder for a future feature.
// Returning 501 Not Implemented is the correct HTTP response for this case.
logger.info('Request received for unimplemented endpoint: /api/ai/generate-speech');
req.log.info('Request received for unimplemented endpoint: /api/ai/generate-speech');
res.status(501).json({ message: 'Speech generation is not yet implemented.' });
},
);
@@ -474,6 +501,7 @@ router.post(
*/
router.post(
'/rescan-area',
aiUploadLimiter,
passport.authenticate('jwt', { session: false }),
uploadToDisk.single('image'),
validateRequest(rescanAreaSchema),
@@ -488,7 +516,7 @@ router.post(
const { extractionType } = req.body;
const { path, mimetype } = req.file;
logger.debug(
req.log.debug(
{ extractionType, cropArea, filename: req.file.originalname },
'Rescan area requested',
);

View File

@@ -197,6 +197,33 @@ describe('Auth Routes (/api/auth)', () => {
);
});
it('should allow registration with an empty string for full_name', async () => {
// Arrange
const email = 'empty-name@test.com';
mockedAuthService.registerAndLoginUser.mockResolvedValue({
newUserProfile: createMockUserProfile({ user: { email } }),
accessToken: 'token',
refreshToken: 'token',
});
// Act
const response = await supertest(app).post('/api/auth/register').send({
email,
password: strongPassword,
full_name: '', // Send an empty string
});
// Assert
expect(response.status).toBe(201);
expect(mockedAuthService.registerAndLoginUser).toHaveBeenCalledWith(
email,
strongPassword,
undefined, // The preprocess step in the Zod schema should convert '' to undefined
undefined,
mockLogger,
);
});
it('should set a refresh token cookie on successful registration', async () => {
const mockNewUser = createMockUserProfile({
user: { user_id: 'new-user-id', email: 'cookie@test.com' },
@@ -396,6 +423,24 @@ describe('Auth Routes (/api/auth)', () => {
const setCookieHeader = response.headers['set-cookie'];
expect(setCookieHeader[0]).toContain('Max-Age=2592000'); // 30 days in seconds
});
it('should return 400 for an invalid email format', async () => {
const response = await supertest(app)
.post('/api/auth/login')
.send({ email: 'not-an-email', password: 'password123' });
expect(response.status).toBe(400);
expect(response.body.errors[0].message).toBe('A valid email is required.');
});
it('should return 400 if password is missing', async () => {
const response = await supertest(app)
.post('/api/auth/login')
.send({ email: 'test@test.com' });
expect(response.status).toBe(400);
expect(response.body.errors[0].message).toBe('Password is required.');
});
});
describe('POST /forgot-password', () => {
@@ -586,4 +631,280 @@ describe('Auth Routes (/api/auth)', () => {
expect(response.headers['set-cookie'][0]).toContain('refreshToken=;');
});
});
describe('Rate Limiting on /forgot-password', () => {
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
// Arrange
const email = 'rate-limit-test@example.com';
const maxRequests = 5; // from the rate limiter config
mockedAuthService.resetPassword.mockResolvedValue('mock-token');
// Act: Make `maxRequests` successful calls with the special header
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/forgot-password')
.set('X-Test-Rate-Limit-Enable', 'true') // Opt-in to the rate limiter for this test
.send({ email });
expect(response.status, `Request ${i + 1} should succeed`).toBe(200);
}
// Act: Make one more call, which should be blocked
const blockedResponse = await supertest(app)
.post('/api/auth/forgot-password')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ email });
// Assert
expect(blockedResponse.status).toBe(429);
expect(blockedResponse.text).toContain('Too many password reset requests');
});
it('should NOT block requests when the opt-in header is not sent (default test behavior)', async () => {
// Arrange
const email = 'no-rate-limit-test@example.com';
const overLimitRequests = 7; // More than the max of 5
mockedAuthService.resetPassword.mockResolvedValue('mock-token');
// Act: Make more calls than the limit. They should all succeed because the limiter is skipped.
for (let i = 0; i < overLimitRequests; i++) {
const response = await supertest(app)
.post('/api/auth/forgot-password')
// NO 'X-Test-Rate-Limit-Enable' header is sent
.send({ email });
expect(response.status, `Request ${i + 1} should succeed`).toBe(200);
}
});
});
describe('Rate Limiting on /reset-password', () => {
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
// Arrange
const maxRequests = 10; // from the rate limiter config in auth.routes.ts
const newPassword = 'a-Very-Strong-Password-123!';
const token = 'some-token-for-rate-limit-test';
// Mock the service to return a consistent value for the first `maxRequests` calls.
// The endpoint returns 400 for invalid tokens, which is fine for this test.
// We just need to ensure it's not a 429.
mockedAuthService.updatePassword.mockResolvedValue(null);
// Act: Make `maxRequests` calls. They should not be rate-limited.
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/reset-password')
.set('X-Test-Rate-Limit-Enable', 'true') // Opt-in to the rate limiter
.send({ token, newPassword });
// The expected status is 400 because the token is invalid, but not 429.
expect(response.status, `Request ${i + 1} should not be rate-limited`).toBe(400);
}
// Act: Make one more call, which should be blocked by the rate limiter.
const blockedResponse = await supertest(app)
.post('/api/auth/reset-password')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ token, newPassword });
// Assert
expect(blockedResponse.status).toBe(429);
expect(blockedResponse.text).toContain('Too many password reset attempts');
});
it('should NOT block requests when the opt-in header is not sent (default test behavior)', async () => {
// Arrange
const maxRequests = 12; // Limit is 10
const newPassword = 'a-Very-Strong-Password-123!';
const token = 'some-token-for-skip-limit-test';
mockedAuthService.updatePassword.mockResolvedValue(null);
// Act: Make more calls than the limit.
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/reset-password')
.send({ token, newPassword });
expect(response.status).toBe(400);
}
});
});
describe('Rate Limiting on /register', () => {
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
// Arrange
const maxRequests = 5; // Limit is 5 per hour
const newUser = {
email: 'rate-limit-reg@test.com',
password: 'StrongPassword123!',
full_name: 'Rate Limit User',
};
// Mock success to ensure we are hitting the limiter and not failing early
mockedAuthService.registerAndLoginUser.mockResolvedValue({
newUserProfile: createMockUserProfile({ user: { email: newUser.email } }),
accessToken: 'token',
refreshToken: 'refresh',
});
// Act: Make maxRequests calls
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/register')
.set('X-Test-Rate-Limit-Enable', 'true')
.send(newUser);
expect(response.status).not.toBe(429);
}
// Act: Make one more call
const blockedResponse = await supertest(app)
.post('/api/auth/register')
.set('X-Test-Rate-Limit-Enable', 'true')
.send(newUser);
// Assert
expect(blockedResponse.status).toBe(429);
expect(blockedResponse.text).toContain('Too many accounts created');
});
it('should NOT block requests when the opt-in header is not sent', async () => {
const maxRequests = 7;
const newUser = {
email: 'no-limit-reg@test.com',
password: 'StrongPassword123!',
full_name: 'No Limit User',
};
mockedAuthService.registerAndLoginUser.mockResolvedValue({
newUserProfile: createMockUserProfile({ user: { email: newUser.email } }),
accessToken: 'token',
refreshToken: 'refresh',
});
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app).post('/api/auth/register').send(newUser);
expect(response.status).not.toBe(429);
}
});
});
describe('Rate Limiting on /login', () => {
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
// Arrange
const maxRequests = 5; // Limit is 5 per 15 mins
const credentials = { email: 'rate-limit-login@test.com', password: 'password123' };
mockedAuthService.handleSuccessfulLogin.mockResolvedValue({
accessToken: 'token',
refreshToken: 'refresh',
});
// Act
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/login')
.set('X-Test-Rate-Limit-Enable', 'true')
.send(credentials);
expect(response.status).not.toBe(429);
}
const blockedResponse = await supertest(app)
.post('/api/auth/login')
.set('X-Test-Rate-Limit-Enable', 'true')
.send(credentials);
// Assert
expect(blockedResponse.status).toBe(429);
expect(blockedResponse.text).toContain('Too many login attempts');
});
it('should NOT block requests when the opt-in header is not sent', async () => {
const maxRequests = 7;
const credentials = { email: 'no-limit-login@test.com', password: 'password123' };
mockedAuthService.handleSuccessfulLogin.mockResolvedValue({
accessToken: 'token',
refreshToken: 'refresh',
});
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app).post('/api/auth/login').send(credentials);
expect(response.status).not.toBe(429);
}
});
});
describe('Rate Limiting on /refresh-token', () => {
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
// Arrange
const maxRequests = 20; // Limit is 20 per 15 mins
mockedAuthService.refreshAccessToken.mockResolvedValue({ accessToken: 'new-token' });
// Act: Make maxRequests calls
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/refresh-token')
.set('Cookie', 'refreshToken=valid-token')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).not.toBe(429);
}
// Act: Make one more call
const blockedResponse = await supertest(app)
.post('/api/auth/refresh-token')
.set('Cookie', 'refreshToken=valid-token')
.set('X-Test-Rate-Limit-Enable', 'true');
// Assert
expect(blockedResponse.status).toBe(429);
expect(blockedResponse.text).toContain('Too many token refresh attempts');
});
it('should NOT block requests when the opt-in header is not sent', async () => {
const maxRequests = 22;
mockedAuthService.refreshAccessToken.mockResolvedValue({ accessToken: 'new-token' });
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/refresh-token')
.set('Cookie', 'refreshToken=valid-token');
expect(response.status).not.toBe(429);
}
});
});
describe('Rate Limiting on /logout', () => {
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
// Arrange
const maxRequests = 10; // Limit is 10 per 15 mins
mockedAuthService.logout.mockResolvedValue(undefined);
// Act
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/logout')
.set('Cookie', 'refreshToken=valid-token')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).not.toBe(429);
}
const blockedResponse = await supertest(app)
.post('/api/auth/logout')
.set('Cookie', 'refreshToken=valid-token')
.set('X-Test-Rate-Limit-Enable', 'true');
// Assert
expect(blockedResponse.status).toBe(429);
expect(blockedResponse.text).toContain('Too many logout attempts');
});
it('should NOT block requests when the opt-in header is not sent', async () => {
const maxRequests = 12;
mockedAuthService.logout.mockResolvedValue(undefined);
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(app)
.post('/api/auth/logout')
.set('Cookie', 'refreshToken=valid-token');
expect(response.status).not.toBe(429);
}
});
});
});

View File

@@ -1,56 +1,51 @@
// src/routes/auth.routes.ts
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { Router, Request, Response, NextFunction } from 'express';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { z } from 'zod';
import rateLimit from 'express-rate-limit';
import passport from './passport.routes';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { UniqueConstraintError } from '../services/db/errors.db'; // Import actual class for instanceof checks
import { logger } from '../services/logger.server';
// Removed: import { logger } from '../services/logger.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validateRequest } from '../middleware/validation.middleware';
import type { UserProfile } from '../types';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validatePasswordStrength } from '../utils/authUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { requiredString } from '../utils/zodUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import {
loginLimiter,
registerLimiter,
forgotPasswordLimiter,
resetPasswordLimiter,
refreshTokenLimiter,
logoutLimiter,
} from '../config/rateLimiters';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { authService } from '../services/authService';
const router = Router();
// Conditionally disable rate limiting for the test environment
const isTestEnv = process.env.NODE_ENV === 'test';
// --- Reusable Schemas ---
// --- Rate Limiting Configuration ---
const forgotPasswordLimiter = rateLimit({
windowMs: 15 * 60 * 1000, // 15 minutes
max: 5,
message: 'Too many password reset requests from this IP, please try again after 15 minutes.',
standardHeaders: true,
legacyHeaders: false,
// Do not skip in test environment so we can write integration tests for it.
// The limiter uses an in-memory store by default, so counts are reset when the test server restarts.
// skip: () => isTestEnv,
});
const resetPasswordLimiter = rateLimit({
windowMs: 15 * 60 * 1000, // 15 minutes
max: 10,
message: 'Too many password reset attempts from this IP, please try again after 15 minutes.',
standardHeaders: true,
legacyHeaders: false,
skip: () => isTestEnv, // Skip this middleware if in test environment
});
const passwordSchema = z
.string()
.trim() // Prevent leading/trailing whitespace in passwords.
.min(8, 'Password must be at least 8 characters long.')
.superRefine((password, ctx) => {
const strength = validatePasswordStrength(password);
if (!strength.isValid) ctx.addIssue({ code: 'custom', message: strength.feedback });
});
const registerSchema = z.object({
body: z.object({
// Sanitize email by trimming and converting to lowercase.
email: z.string().trim().toLowerCase().email('A valid email is required.'),
password: z
.string()
.trim() // Prevent leading/trailing whitespace in passwords.
.min(8, 'Password must be at least 8 characters long.')
.superRefine((password, ctx) => {
const strength = validatePasswordStrength(password);
if (!strength.isValid) ctx.addIssue({ code: 'custom', message: strength.feedback });
}),
password: passwordSchema,
// Sanitize optional string inputs.
full_name: z.string().trim().optional(),
full_name: z.preprocess((val) => (val === '' ? undefined : val), z.string().trim().optional()),
// Allow empty string or valid URL. If empty string is received, convert to undefined.
avatar_url: z.preprocess(
(val) => (val === '' ? undefined : val),
@@ -59,6 +54,14 @@ const registerSchema = z.object({
}),
});
const loginSchema = z.object({
body: z.object({
email: z.string().trim().toLowerCase().email('A valid email is required.'),
password: requiredString('Password is required.'),
rememberMe: z.boolean().optional(),
}),
});
const forgotPasswordSchema = z.object({
body: z.object({
// Sanitize email by trimming and converting to lowercase.
@@ -69,14 +72,7 @@ const forgotPasswordSchema = z.object({
const resetPasswordSchema = z.object({
body: z.object({
token: requiredString('Token is required.'),
newPassword: z
.string()
.trim() // Prevent leading/trailing whitespace in passwords.
.min(8, 'Password must be at least 8 characters long.')
.superRefine((password, ctx) => {
const strength = validatePasswordStrength(password);
if (!strength.isValid) ctx.addIssue({ code: 'custom', message: strength.feedback });
}),
newPassword: passwordSchema,
}),
});
@@ -85,6 +81,7 @@ const resetPasswordSchema = z.object({
// Registration Route
router.post(
'/register',
registerLimiter,
validateRequest(registerSchema),
async (req: Request, res: Response, next: NextFunction) => {
type RegisterRequest = z.infer<typeof registerSchema>;
@@ -114,7 +111,7 @@ router.post(
// If the email is a duplicate, return a 409 Conflict status.
return res.status(409).json({ message: error.message });
}
logger.error({ error }, `User registration route failed for email: ${email}.`);
req.log.error({ error }, `User registration route failed for email: ${email}.`);
// Pass the error to the centralized handler
return next(error);
}
@@ -122,52 +119,57 @@ router.post(
);
// Login Route
router.post('/login', (req: Request, res: Response, next: NextFunction) => {
passport.authenticate(
'local',
{ session: false },
async (err: Error, user: Express.User | false, info: { message: string }) => {
// --- LOGIN ROUTE DEBUG LOGGING ---
req.log.debug(`[API /login] Received login request for email: ${req.body.email}`);
if (err) req.log.error({ err }, '[API /login] Passport reported an error.');
if (!user) req.log.warn({ info }, '[API /login] Passport reported NO USER found.');
if (user) req.log.debug({ user }, '[API /login] Passport user object:'); // Log the user object passport returns
if (user) req.log.info({ user }, '[API /login] Passport reported USER FOUND.');
router.post(
'/login',
loginLimiter,
validateRequest(loginSchema),
(req: Request, res: Response, next: NextFunction) => {
passport.authenticate(
'local',
{ session: false },
async (err: Error, user: Express.User | false, info: { message: string }) => {
// --- LOGIN ROUTE DEBUG LOGGING ---
req.log.debug(`[API /login] Received login request for email: ${req.body.email}`);
if (err) req.log.error({ err }, '[API /login] Passport reported an error.');
if (!user) req.log.warn({ info }, '[API /login] Passport reported NO USER found.');
if (user) req.log.debug({ user }, '[API /login] Passport user object:'); // Log the user object passport returns
if (user) req.log.info({ user }, '[API /login] Passport reported USER FOUND.');
if (err) {
req.log.error(
{ error: err },
`Login authentication error in /login route for email: ${req.body.email}`,
);
return next(err);
}
if (!user) {
return res.status(401).json({ message: info.message || 'Login failed' });
}
if (err) {
req.log.error(
{ error: err },
`Login authentication error in /login route for email: ${req.body.email}`,
);
return next(err);
}
if (!user) {
return res.status(401).json({ message: info.message || 'Login failed' });
}
try {
const { rememberMe } = req.body;
const userProfile = user as UserProfile;
const { accessToken, refreshToken } = await authService.handleSuccessfulLogin(userProfile, req.log);
req.log.info(`JWT and refresh token issued for user: ${userProfile.user.email}`);
try {
const { rememberMe } = req.body;
const userProfile = user as UserProfile;
const { accessToken, refreshToken } = await authService.handleSuccessfulLogin(userProfile, req.log);
req.log.info(`JWT and refresh token issued for user: ${userProfile.user.email}`);
const cookieOptions = {
httpOnly: true,
secure: process.env.NODE_ENV === 'production',
maxAge: rememberMe ? 30 * 24 * 60 * 60 * 1000 : undefined, // 30 days
};
const cookieOptions = {
httpOnly: true,
secure: process.env.NODE_ENV === 'production',
maxAge: rememberMe ? 30 * 24 * 60 * 60 * 1000 : undefined, // 30 days
};
res.cookie('refreshToken', refreshToken, cookieOptions);
// Return the full user profile object on login to avoid a second fetch on the client.
return res.json({ userprofile: userProfile, token: accessToken });
} catch (tokenErr) {
const email = (user as UserProfile)?.user?.email || req.body.email;
req.log.error({ error: tokenErr }, `Failed to process login for user: ${email}`);
return next(tokenErr);
}
},
)(req, res, next);
});
res.cookie('refreshToken', refreshToken, cookieOptions);
// Return the full user profile object on login to avoid a second fetch on the client.
return res.json({ userprofile: userProfile, token: accessToken });
} catch (tokenErr) {
const email = (user as UserProfile)?.user?.email || req.body.email;
req.log.error({ error: tokenErr }, `Failed to process login for user: ${email}`);
return next(tokenErr);
}
},
)(req, res, next);
},
);
// Route to request a password reset
router.post(
@@ -224,7 +226,7 @@ router.post(
);
// New Route to refresh the access token
router.post('/refresh-token', async (req: Request, res: Response, next: NextFunction) => {
router.post('/refresh-token', refreshTokenLimiter, async (req: Request, res: Response, next: NextFunction) => {
const { refreshToken } = req.cookies;
if (!refreshToken) {
return res.status(401).json({ message: 'Refresh token not found.' });
@@ -247,7 +249,7 @@ router.post('/refresh-token', async (req: Request, res: Response, next: NextFunc
* It clears the refresh token from the database and instructs the client to
* expire the `refreshToken` cookie.
*/
router.post('/logout', async (req: Request, res: Response) => {
router.post('/logout', logoutLimiter, async (req: Request, res: Response) => {
const { refreshToken } = req.cookies;
if (refreshToken) {
// Invalidate the token in the database so it cannot be used again.
@@ -282,7 +284,7 @@ router.post('/logout', async (req: Request, res: Response) => {
// // Redirect to a frontend page that can handle the token
// res.redirect(`${process.env.FRONTEND_URL}/auth/callback?token=${accessToken}`);
// }).catch(err => {
// logger.error('Failed to save refresh token during OAuth callback:', { error: err });
// req.log.error('Failed to save refresh token during OAuth callback:', { error: err });
// res.redirect(`${process.env.FRONTEND_URL}/login?error=auth_failed`);
// });
// };

View File

@@ -6,6 +6,7 @@ import { budgetRepo } from '../services/db/index.db';
import type { UserProfile } from '../types';
import { validateRequest } from '../middleware/validation.middleware';
import { requiredString, numericIdParam } from '../utils/zodUtils';
import { budgetUpdateLimiter } from '../config/rateLimiters';
const router = express.Router();
@@ -37,6 +38,9 @@ const spendingAnalysisSchema = z.object({
// Middleware to ensure user is authenticated for all budget routes
router.use(passport.authenticate('jwt', { session: false }));
// Apply rate limiting to all subsequent budget routes
router.use(budgetUpdateLimiter);
/**
* GET /api/budgets - Get all budgets for the authenticated user.
*/

View File

@@ -103,4 +103,18 @@ describe('Deals Routes (/api/users/deals)', () => {
);
});
});
describe('Rate Limiting', () => {
it('should apply userReadLimiter to GET /best-watched-prices', async () => {
vi.mocked(dealsRepo.findBestPricesForWatchedItems).mockResolvedValue([]);
const response = await supertest(authenticatedApp)
.get('/api/users/deals/best-watched-prices')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(100);
});
});
});

View File

@@ -5,6 +5,7 @@ import passport from './passport.routes';
import { dealsRepo } from '../services/db/deals.db';
import type { UserProfile } from '../types';
import { validateRequest } from '../middleware/validation.middleware';
import { userReadLimiter } from '../config/rateLimiters';
const router = express.Router();
@@ -27,6 +28,7 @@ router.use(passport.authenticate('jwt', { session: false }));
*/
router.get(
'/best-watched-prices',
userReadLimiter,
validateRequest(bestWatchedPricesSchema),
async (req: Request, res: Response, next: NextFunction) => {
const userProfile = req.user as UserProfile;

View File

@@ -310,4 +310,55 @@ describe('Flyer Routes (/api/flyers)', () => {
);
});
});
describe('Rate Limiting', () => {
it('should apply publicReadLimiter to GET /', async () => {
vi.mocked(db.flyerRepo.getFlyers).mockResolvedValue([]);
const response = await supertest(app)
.get('/api/flyers')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(100);
});
it('should apply batchLimiter to POST /items/batch-fetch', async () => {
vi.mocked(db.flyerRepo.getFlyerItemsForFlyers).mockResolvedValue([]);
const response = await supertest(app)
.post('/api/flyers/items/batch-fetch')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ flyerIds: [1] });
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(50);
});
it('should apply batchLimiter to POST /items/batch-count', async () => {
vi.mocked(db.flyerRepo.countFlyerItemsForFlyers).mockResolvedValue(0);
const response = await supertest(app)
.post('/api/flyers/items/batch-count')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ flyerIds: [1] });
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(50);
});
it('should apply trackingLimiter to POST /items/:itemId/track', async () => {
// Mock fire-and-forget promise
vi.mocked(db.flyerRepo.trackFlyerItemInteraction).mockResolvedValue(undefined);
const response = await supertest(app)
.post('/api/flyers/items/1/track')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ type: 'view' });
expect(response.status).toBe(202);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(200);
});
});
});

View File

@@ -4,6 +4,11 @@ import * as db from '../services/db/index.db';
import { z } from 'zod';
import { validateRequest } from '../middleware/validation.middleware';
import { optionalNumeric } from '../utils/zodUtils';
import {
publicReadLimiter,
batchLimiter,
trackingLimiter,
} from '../config/rateLimiters';
const router = Router();
@@ -48,7 +53,7 @@ const trackItemSchema = z.object({
/**
* GET /api/flyers - Get a paginated list of all flyers.
*/
router.get('/', validateRequest(getFlyersSchema), async (req, res, next): Promise<void> => {
router.get('/', publicReadLimiter, validateRequest(getFlyersSchema), async (req, res, next): Promise<void> => {
try {
// The `validateRequest` middleware ensures `req.query` is valid.
// We parse it here to apply Zod's coercions (string to number) and defaults.
@@ -65,7 +70,7 @@ router.get('/', validateRequest(getFlyersSchema), async (req, res, next): Promis
/**
* GET /api/flyers/:id - Get a single flyer by its ID.
*/
router.get('/:id', validateRequest(flyerIdParamSchema), async (req, res, next): Promise<void> => {
router.get('/:id', publicReadLimiter, validateRequest(flyerIdParamSchema), async (req, res, next): Promise<void> => {
try {
// Explicitly parse to get the coerced number type for `id`.
const { id } = flyerIdParamSchema.shape.params.parse(req.params);
@@ -82,6 +87,7 @@ router.get('/:id', validateRequest(flyerIdParamSchema), async (req, res, next):
*/
router.get(
'/:id/items',
publicReadLimiter,
validateRequest(flyerIdParamSchema),
async (req, res, next): Promise<void> => {
type GetFlyerByIdRequest = z.infer<typeof flyerIdParamSchema>;
@@ -103,6 +109,7 @@ router.get(
type BatchFetchRequest = z.infer<typeof batchFetchSchema>;
router.post(
'/items/batch-fetch',
batchLimiter,
validateRequest(batchFetchSchema),
async (req, res, next): Promise<void> => {
const { body } = req as unknown as BatchFetchRequest;
@@ -124,6 +131,7 @@ router.post(
type BatchCountRequest = z.infer<typeof batchCountSchema>;
router.post(
'/items/batch-count',
batchLimiter,
validateRequest(batchCountSchema),
async (req, res, next): Promise<void> => {
const { body } = req as unknown as BatchCountRequest;
@@ -142,7 +150,7 @@ router.post(
/**
* POST /api/flyers/items/:itemId/track - Tracks a user interaction with a flyer item.
*/
router.post('/items/:itemId/track', validateRequest(trackItemSchema), (req, res, next): void => {
router.post('/items/:itemId/track', trackingLimiter, validateRequest(trackItemSchema), (req, res, next): void => {
try {
// Explicitly parse to get coerced types.
const { params, body } = trackItemSchema.parse({ params: req.params, body: req.body });

View File

@@ -336,4 +336,50 @@ describe('Gamification Routes (/api/achievements)', () => {
expect(response.body.errors[0].message).toMatch(/less than or equal to 50|Too big/i);
});
});
describe('Rate Limiting', () => {
it('should apply publicReadLimiter to GET /', async () => {
vi.mocked(db.gamificationRepo.getAllAchievements).mockResolvedValue([]);
const response = await supertest(unauthenticatedApp)
.get('/api/achievements')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(100);
});
it('should apply userReadLimiter to GET /me', async () => {
mockedAuthMiddleware.mockImplementation((req: Request, res: Response, next: NextFunction) => {
req.user = mockUserProfile;
next();
});
vi.mocked(db.gamificationRepo.getUserAchievements).mockResolvedValue([]);
const response = await supertest(authenticatedApp)
.get('/api/achievements/me')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(100);
});
it('should apply adminTriggerLimiter to POST /award', async () => {
mockedAuthMiddleware.mockImplementation((req: Request, res: Response, next: NextFunction) => {
req.user = mockAdminProfile;
next();
});
mockedIsAdmin.mockImplementation((req: Request, res: Response, next: NextFunction) => next());
vi.mocked(db.gamificationRepo.awardAchievement).mockResolvedValue(undefined);
const response = await supertest(adminApp)
.post('/api/achievements/award')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ userId: 'some-user', achievementName: 'some-achievement' });
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(30);
});
});
});

View File

@@ -1,12 +1,23 @@
// src/routes/gamification.routes.ts
import express, { NextFunction } from 'express';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { z } from 'zod';
import passport, { isAdmin } from './passport.routes'; // Correctly imported
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { gamificationService } from '../services/gamificationService';
import { logger } from '../services/logger.server';
// Removed: import { logger } from '../services/logger.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { UserProfile } from '../types';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validateRequest } from '../middleware/validation.middleware';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { requiredString, optionalNumeric } from '../utils/zodUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import {
publicReadLimiter,
userReadLimiter,
adminTriggerLimiter,
} from '../config/rateLimiters';
const router = express.Router();
const adminGamificationRouter = express.Router(); // Create a new router for admin-only routes.
@@ -34,12 +45,12 @@ const awardAchievementSchema = z.object({
* GET /api/achievements - Get the master list of all available achievements.
* This is a public endpoint.
*/
router.get('/', async (req, res, next: NextFunction) => {
router.get('/', publicReadLimiter, async (req, res, next: NextFunction) => {
try {
const achievements = await gamificationService.getAllAchievements(req.log);
res.json(achievements);
} catch (error) {
logger.error({ error }, 'Error fetching all achievements in /api/achievements:');
req.log.error({ error }, 'Error fetching all achievements in /api/achievements:');
next(error);
}
});
@@ -50,6 +61,7 @@ router.get('/', async (req, res, next: NextFunction) => {
*/
router.get(
'/leaderboard',
publicReadLimiter,
validateRequest(leaderboardSchema),
async (req, res, next: NextFunction): Promise<void> => {
try {
@@ -59,7 +71,7 @@ router.get(
const leaderboard = await gamificationService.getLeaderboard(limit!, req.log);
res.json(leaderboard);
} catch (error) {
logger.error({ error }, 'Error fetching leaderboard:');
req.log.error({ error }, 'Error fetching leaderboard:');
next(error);
}
},
@@ -74,6 +86,7 @@ router.get(
router.get(
'/me',
passport.authenticate('jwt', { session: false }),
userReadLimiter,
async (req, res, next: NextFunction): Promise<void> => {
const userProfile = req.user as UserProfile;
try {
@@ -83,7 +96,7 @@ router.get(
);
res.json(userAchievements);
} catch (error) {
logger.error(
req.log.error(
{ error, userId: userProfile.user.user_id },
'Error fetching user achievements:',
);
@@ -103,6 +116,7 @@ adminGamificationRouter.use(passport.authenticate('jwt', { session: false }), is
*/
adminGamificationRouter.post(
'/award',
adminTriggerLimiter,
validateRequest(awardAchievementSchema),
async (req, res, next: NextFunction): Promise<void> => {
// Infer type and cast request object as per ADR-003

View File

@@ -1,11 +1,17 @@
// src/routes/health.routes.ts
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { Router, Request, Response, NextFunction } from 'express';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { z } from 'zod';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { checkTablesExist, getPoolStatus } from '../services/db/connection.db';
import { logger } from '../services/logger.server';
// Removed: import { logger } from '../services/logger.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { connection as redisConnection } from '../services/queueService.server';
import fs from 'node:fs/promises';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { getSimpleWeekAndYear } from '../utils/dateUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validateRequest } from '../middleware/validation.middleware';
const router = Router();
@@ -87,7 +93,7 @@ router.get(
if (isHealthy) {
return res.status(200).json({ success: true, message });
} else {
logger.warn(`Database pool health check shows high waiting count: ${status.waitingCount}`);
req.log.warn(`Database pool health check shows high waiting count: ${status.waitingCount}`);
return res
.status(500)
.json({ success: false, message: `Pool may be under stress. ${message}` });

View File

@@ -102,6 +102,7 @@ vi.mock('passport', () => {
// Now, import the passport configuration which will use our mocks
import passport, { isAdmin, optionalAuth, mockAuth } from './passport.routes';
import { logger } from '../services/logger.server';
import { ForbiddenError } from '../services/db/errors.db';
describe('Passport Configuration', () => {
beforeEach(() => {
@@ -468,7 +469,7 @@ describe('Passport Configuration', () => {
expect(mockRes.status).not.toHaveBeenCalled();
});
it('should return 403 Forbidden if user does not have "admin" role', () => {
it('should call next with a ForbiddenError if user does not have "admin" role', () => {
// Arrange
const mockReq: Partial<Request> = {
user: createMockUserProfile({
@@ -481,14 +482,11 @@ describe('Passport Configuration', () => {
isAdmin(mockReq as Request, mockRes as Response, mockNext);
// Assert
expect(mockNext).not.toHaveBeenCalled(); // This was a duplicate, fixed.
expect(mockRes.status).toHaveBeenCalledWith(403);
expect(mockRes.json).toHaveBeenCalledWith({
message: 'Forbidden: Administrator access required.',
});
expect(mockNext).toHaveBeenCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
});
it('should return 403 Forbidden if req.user is missing', () => {
it('should call next with a ForbiddenError if req.user is missing', () => {
// Arrange
const mockReq = {} as Request; // No req.user
@@ -496,11 +494,38 @@ describe('Passport Configuration', () => {
isAdmin(mockReq, mockRes as Response, mockNext);
// Assert
expect(mockNext).not.toHaveBeenCalled(); // This was a duplicate, fixed.
expect(mockRes.status).toHaveBeenCalledWith(403);
expect(mockNext).toHaveBeenCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
});
it('should return 403 Forbidden for various invalid user object shapes', () => {
it('should log a warning when a non-admin user tries to access an admin route', () => {
// Arrange
const mockReq: Partial<Request> = {
user: createMockUserProfile({
role: 'user',
user: { user_id: 'user-id-123', email: 'user@test.com' },
}),
};
// Act
isAdmin(mockReq as Request, mockRes as Response, mockNext);
// Assert
expect(logger.warn).toHaveBeenCalledWith('Admin access denied for user: user-id-123');
});
it('should log a warning with "unknown" user when req.user is missing', () => {
// Arrange
const mockReq = {} as Request; // No req.user
// Act
isAdmin(mockReq, mockRes as Response, mockNext);
// Assert
expect(logger.warn).toHaveBeenCalledWith('Admin access denied for user: unknown');
});
it('should call next with a ForbiddenError for various invalid user object shapes', () => {
const mockNext = vi.fn();
const mockRes: Partial<Response> = {
status: vi.fn().mockReturnThis(),
@@ -510,29 +535,29 @@ describe('Passport Configuration', () => {
// Case 1: user is not an object (e.g., a string)
const req1 = { user: 'not-an-object' } as unknown as Request;
isAdmin(req1, mockRes as Response, mockNext);
expect(mockRes.status).toHaveBeenLastCalledWith(403);
expect(mockNext).not.toHaveBeenCalled();
expect(mockNext).toHaveBeenLastCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
vi.clearAllMocks();
// Case 2: user is null
const req2 = { user: null } as unknown as Request;
isAdmin(req2, mockRes as Response, mockNext);
expect(mockRes.status).toHaveBeenLastCalledWith(403);
expect(mockNext).not.toHaveBeenCalled();
expect(mockNext).toHaveBeenLastCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
vi.clearAllMocks();
// Case 3: user object is missing 'user' property
const req3 = { user: { role: 'admin' } } as unknown as Request;
isAdmin(req3, mockRes as Response, mockNext);
expect(mockRes.status).toHaveBeenLastCalledWith(403);
expect(mockNext).not.toHaveBeenCalled();
expect(mockNext).toHaveBeenLastCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
vi.clearAllMocks();
// Case 4: user.user is not an object
const req4 = { user: { role: 'admin', user: 'not-an-object' } } as unknown as Request;
isAdmin(req4, mockRes as Response, mockNext);
expect(mockRes.status).toHaveBeenLastCalledWith(403);
expect(mockNext).not.toHaveBeenCalled();
expect(mockNext).toHaveBeenLastCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
vi.clearAllMocks();
// Case 5: user.user is missing 'user_id'
@@ -540,15 +565,15 @@ describe('Passport Configuration', () => {
user: { role: 'admin', user: { email: 'test@test.com' } },
} as unknown as Request;
isAdmin(req5, mockRes as Response, mockNext);
expect(mockRes.status).toHaveBeenLastCalledWith(403);
expect(mockNext).not.toHaveBeenCalled();
expect(mockNext).toHaveBeenLastCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
vi.clearAllMocks();
// Reset the main mockNext for other tests in the suite
mockNext.mockClear();
});
it('should return 403 Forbidden if req.user is not a valid UserProfile object', () => {
it('should call next with a ForbiddenError if req.user is not a valid UserProfile object', () => {
// Arrange
const mockReq: Partial<Request> = {
// An object that is not a valid UserProfile (e.g., missing 'role')
@@ -561,11 +586,8 @@ describe('Passport Configuration', () => {
isAdmin(mockReq as Request, mockRes as Response, mockNext);
// Assert
expect(mockNext).not.toHaveBeenCalled(); // This was a duplicate, fixed.
expect(mockRes.status).toHaveBeenCalledWith(403);
expect(mockRes.json).toHaveBeenCalledWith({
message: 'Forbidden: Administrator access required.',
});
expect(mockNext).toHaveBeenCalledWith(expect.any(ForbiddenError));
expect(mockRes.status).not.toHaveBeenCalled();
});
});

View File

@@ -1,16 +1,23 @@
// src/routes/passport.routes.ts
import passport from 'passport';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { Strategy as LocalStrategy } from 'passport-local';
//import { Strategy as GoogleStrategy } from 'passport-google-oauth20';
//import { Strategy as GitHubStrategy } from 'passport-github2';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { Strategy as JwtStrategy, ExtractJwt } from 'passport-jwt';
import * as bcrypt from 'bcrypt';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { Request, Response, NextFunction } from 'express';
import * as db from '../services/db/index.db';
import { logger } from '../services/logger.server';
// Removed: import { logger } from '../services/logger.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { UserProfile } from '../types';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { createMockUserProfile } from '../tests/utils/mockFactories';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { ForbiddenError } from '../services/db/errors.db';
const JWT_SECRET = process.env.JWT_SECRET!;
@@ -49,7 +56,7 @@ passport.use(
if (!userprofile) {
// User not found
logger.warn(`Login attempt failed for non-existent user: ${email}`);
req.log.warn(`Login attempt failed for non-existent user: ${email}`);
return done(null, false, { message: 'Incorrect email or password.' });
}
@@ -63,7 +70,7 @@ passport.use(
const lockoutDurationMs = LOCKOUT_DURATION_MINUTES * 60 * 1000;
if (timeSinceLockout < lockoutDurationMs) {
logger.warn(`Login attempt for locked account: ${email}`);
req.log.warn(`Login attempt for locked account: ${email}`);
// Refresh the lockout timestamp on each attempt to prevent probing.
await db.adminRepo.incrementFailedLoginAttempts(userprofile.user.user_id, req.log);
return done(null, false, {
@@ -74,7 +81,7 @@ passport.use(
if (!userprofile.password_hash) {
// User exists but signed up via OAuth, so they don't have a password.
logger.warn(`Password login attempt for OAuth user: ${email}`);
req.log.warn(`Password login attempt for OAuth user: ${email}`);
return done(null, false, {
message:
'This account was created using a social login. Please use Google or GitHub to sign in.',
@@ -82,15 +89,15 @@ passport.use(
}
// 2. Compare the submitted password with the hashed password in your DB.
logger.debug(
req.log.debug(
`[Passport] Verifying password for ${email}. Hash length: ${userprofile.password_hash.length}`,
);
const isMatch = await bcrypt.compare(password, userprofile.password_hash);
logger.debug(`[Passport] Password match result: ${isMatch}`);
req.log.debug(`[Passport] Password match result: ${isMatch}`);
if (!isMatch) {
// Password does not match
logger.warn(`Login attempt failed for user ${email} due to incorrect password.`);
req.log.warn(`Login attempt failed for user ${email} due to incorrect password.`);
// Increment failed attempts and get the new count.
const newAttemptCount = await db.adminRepo.incrementFailedLoginAttempts(
userprofile.user.user_id,
@@ -127,7 +134,7 @@ passport.use(
req.log,
);
logger.info(`User successfully authenticated: ${email}`);
req.log.info(`User successfully authenticated: ${email}`);
// The `user` object from `findUserWithProfileByEmail` is now a fully formed
// UserProfile object with additional authentication fields. We must strip these
@@ -169,13 +176,13 @@ passport.use(
// if (user) {
// // User exists, proceed to log them in.
// logger.info(`Google OAuth successful for existing user: ${email}`);
// req.log.info(`Google OAuth successful for existing user: ${email}`);
// // The password_hash is intentionally destructured and discarded for security.
// const { password_hash, ...userWithoutHash } = user;
// return done(null, userWithoutHash);
// } else {
// // User does not exist, create a new account for them.
// logger.info(`Google OAuth: creating new user for email: ${email}`);
// req.log.info(`Google OAuth: creating new user for email: ${email}`);
// // Since this is an OAuth user, they don't have a password.
// // We pass `null` for the password hash.
@@ -188,7 +195,7 @@ passport.use(
// try {
// await sendWelcomeEmail(email, profile.displayName);
// } catch (emailError) {
// logger.error(`Failed to send welcome email to new Google user ${email}`, { error: emailError });
// req.log.error(`Failed to send welcome email to new Google user ${email}`, { error: emailError });
// // Don't block the login flow if email fails.
// }
@@ -196,7 +203,7 @@ passport.use(
// return done(null, newUser);
// }
// } catch (err) {
// logger.error('Error during Google authentication strategy:', { error: err });
// req.log.error('Error during Google authentication strategy:', { error: err });
// return done(err, false);
// }
// }
@@ -221,13 +228,13 @@ passport.use(
// if (user) {
// // User exists, proceed to log them in.
// logger.info(`GitHub OAuth successful for existing user: ${email}`);
// req.log.info(`GitHub OAuth successful for existing user: ${email}`);
// // The password_hash is intentionally destructured and discarded for security.
// const { password_hash, ...userWithoutHash } = user;
// return done(null, userWithoutHash);
// } else {
// // User does not exist, create a new account for them.
// logger.info(`GitHub OAuth: creating new user for email: ${email}`);
// req.log.info(`GitHub OAuth: creating new user for email: ${email}`);
// // Since this is an OAuth user, they don't have a password.
// // We pass `null` for the password hash.
@@ -240,7 +247,7 @@ passport.use(
// try {
// await sendWelcomeEmail(email, profile.displayName || profile.username);
// } catch (emailError) {
// logger.error(`Failed to send welcome email to new GitHub user ${email}`, { error: emailError });
// req.log.error(`Failed to send welcome email to new GitHub user ${email}`, { error: emailError });
// // Don't block the login flow if email fails.
// }
@@ -248,7 +255,7 @@ passport.use(
// return done(null, newUser);
// }
// } catch (err) {
// logger.error('Error during GitHub authentication strategy:', { error: err });
// req.log.error('Error during GitHub authentication strategy:', { error: err });
// return done(err, false);
// }
// }
@@ -264,12 +271,12 @@ const jwtOptions = {
if (!JWT_SECRET) {
logger.fatal('[Passport] CRITICAL: JWT_SECRET is missing or empty in environment variables! JwtStrategy will fail.');
} else {
logger.info(`[Passport] JWT_SECRET loaded successfully (length: ${JWT_SECRET.length}).`);
req.log.info(`[Passport] JWT_SECRET loaded successfully (length: ${JWT_SECRET.length}).`);
}
passport.use(
new JwtStrategy(jwtOptions, async (jwt_payload, done) => {
logger.debug(
req.log.debug(
{ jwt_payload: jwt_payload ? { user_id: jwt_payload.user_id } : 'null' },
'[JWT Strategy] Verifying token payload:',
);
@@ -279,18 +286,18 @@ passport.use(
const userProfile = await db.userRepo.findUserProfileById(jwt_payload.user_id, logger);
// --- JWT STRATEGY DEBUG LOGGING ---
logger.debug(
req.log.debug(
`[JWT Strategy] DB lookup for user ID ${jwt_payload.user_id} result: ${userProfile ? 'FOUND' : 'NOT FOUND'}`,
);
if (userProfile) {
return done(null, userProfile); // User profile object will be available as req.user in protected routes
} else {
logger.warn(`JWT authentication failed: user with ID ${jwt_payload.user_id} not found.`);
req.log.warn(`JWT authentication failed: user with ID ${jwt_payload.user_id} not found.`);
return done(null, false); // User not found or invalid token
}
} catch (err: unknown) {
logger.error({ error: err }, 'Error during JWT authentication strategy:');
req.log.error({ error: err }, 'Error during JWT authentication strategy:');
return done(err, false);
}
}),
@@ -306,8 +313,8 @@ export const isAdmin = (req: Request, res: Response, next: NextFunction) => {
} else {
// Check if userProfile is a valid UserProfile before accessing its properties for logging.
const userIdForLog = isUserProfile(userProfile) ? userProfile.user.user_id : 'unknown';
logger.warn(`Admin access denied for user: ${userIdForLog}`);
res.status(403).json({ message: 'Forbidden: Administrator access required.' });
req.log.warn(`Admin access denied for user: ${userIdForLog}`);
next(new ForbiddenError('Forbidden: Administrator access required.'));
}
};
@@ -326,12 +333,12 @@ export const optionalAuth = (req: Request, res: Response, next: NextFunction) =>
if (err) {
// An actual error occurred during authentication (e.g., malformed token).
// For optional auth, we log this but still proceed without a user.
logger.warn({ error: err }, 'Optional auth encountered an error, proceeding anonymously.');
req.log.warn({ error: err }, 'Optional auth encountered an error, proceeding anonymously.');
return next();
}
if (info) {
// The patch requested this specific error handling.
logger.info({ info: info.message || info.toString() }, 'Optional auth info:');
req.log.info({ info: info.message || info.toString() }, 'Optional auth info:');
}
if (user) (req as Express.Request).user = user; // Attach user if authentication succeeds.

View File

@@ -40,7 +40,7 @@ describe('Personalization Routes (/api/personalization)', () => {
const mockItems = [createMockMasterGroceryItem({ master_grocery_item_id: 1, name: 'Milk' })];
vi.mocked(db.personalizationRepo.getAllMasterItems).mockResolvedValue(mockItems);
const response = await supertest(app).get('/api/personalization/master-items');
const response = await supertest(app).get('/api/personalization/master-items').set('x-test-rate-limit-enable', 'true');
expect(response.status).toBe(200);
expect(response.body).toEqual(mockItems);
@@ -49,7 +49,7 @@ describe('Personalization Routes (/api/personalization)', () => {
it('should return 500 if the database call fails', async () => {
const dbError = new Error('DB Error');
vi.mocked(db.personalizationRepo.getAllMasterItems).mockRejectedValue(dbError);
const response = await supertest(app).get('/api/personalization/master-items');
const response = await supertest(app).get('/api/personalization/master-items').set('x-test-rate-limit-enable', 'true');
expect(response.status).toBe(500);
expect(response.body.message).toBe('DB Error');
expect(mockLogger.error).toHaveBeenCalledWith(
@@ -106,4 +106,16 @@ describe('Personalization Routes (/api/personalization)', () => {
);
});
});
describe('Rate Limiting', () => {
it('should apply publicReadLimiter to GET /master-items', async () => {
vi.mocked(db.personalizationRepo.getAllMasterItems).mockResolvedValue([]);
const response = await supertest(app)
.get('/api/personalization/master-items')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
});
});
});

View File

@@ -3,6 +3,7 @@ import { Router, Request, Response, NextFunction } from 'express';
import { z } from 'zod';
import * as db from '../services/db/index.db';
import { validateRequest } from '../middleware/validation.middleware';
import { publicReadLimiter } from '../config/rateLimiters';
const router = Router();
@@ -16,6 +17,7 @@ const emptySchema = z.object({});
*/
router.get(
'/master-items',
publicReadLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
try {
@@ -39,6 +41,7 @@ router.get(
*/
router.get(
'/dietary-restrictions',
publicReadLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
try {
@@ -59,6 +62,7 @@ router.get(
*/
router.get(
'/appliances',
publicReadLimiter,
validateRequest(emptySchema),
async (req: Request, res: Response, next: NextFunction) => {
try {

View File

@@ -1,8 +1,10 @@
// src/routes/price.routes.test.ts
import { describe, it, expect, vi, beforeEach } from 'vitest';
import supertest from 'supertest';
import type { Request, Response, NextFunction } from 'express';
import { createTestApp } from '../tests/utils/createTestApp';
import { mockLogger } from '../tests/utils/mockLogger';
import { createMockUserProfile } from '../tests/utils/mockFactories';
// Mock the price repository
vi.mock('../services/db/price.db', () => ({
@@ -17,12 +19,29 @@ vi.mock('../services/logger.server', async () => ({
logger: (await import('../tests/utils/mockLogger')).mockLogger,
}));
// Mock the passport middleware
vi.mock('./passport.routes', () => ({
default: {
authenticate: vi.fn(
(_strategy, _options) => (req: Request, res: Response, next: NextFunction) => {
// If req.user is not set by the test setup, simulate unauthenticated access.
if (!req.user) {
return res.status(401).json({ message: 'Unauthorized' });
}
// If req.user is set, proceed as an authenticated user.
next();
},
),
},
}));
// Import the router AFTER other setup.
import priceRouter from './price.routes';
import { priceRepo } from '../services/db/price.db';
describe('Price Routes (/api/price-history)', () => {
const app = createTestApp({ router: priceRouter, basePath: '/api/price-history' });
const mockUser = createMockUserProfile({ user: { user_id: 'price-user-123' } });
const app = createTestApp({ router: priceRouter, basePath: '/api/price-history', authenticatedUser: mockUser });
beforeEach(() => {
vi.clearAllMocks();
});
@@ -130,4 +149,18 @@ describe('Price Routes (/api/price-history)', () => {
expect(response.body.errors[1].message).toBe('Invalid input: expected number, received NaN');
});
});
describe('Rate Limiting', () => {
it('should apply priceHistoryLimiter to POST /', async () => {
vi.mocked(priceRepo.getPriceHistory).mockResolvedValue([]);
const response = await supertest(app)
.post('/api/price-history')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ masterItemIds: [1, 2] });
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(50);
});
});
});

View File

@@ -1,9 +1,11 @@
// src/routes/price.routes.ts
import { Router, Request, Response, NextFunction } from 'express';
import { z } from 'zod';
import passport from './passport.routes';
import { validateRequest } from '../middleware/validation.middleware';
import { priceRepo } from '../services/db/price.db';
import { optionalNumeric } from '../utils/zodUtils';
import { priceHistoryLimiter } from '../config/rateLimiters';
const router = Router();
@@ -26,21 +28,27 @@ type PriceHistoryRequest = z.infer<typeof priceHistorySchema>;
* POST /api/price-history - Fetches historical price data for a given list of master item IDs.
* This endpoint retrieves price points over time for specified master grocery items.
*/
router.post('/', validateRequest(priceHistorySchema), async (req: Request, res: Response, next: NextFunction) => {
// Cast 'req' to the inferred type for full type safety.
const {
body: { masterItemIds, limit, offset },
} = req as unknown as PriceHistoryRequest;
req.log.info(
{ itemCount: masterItemIds.length, limit, offset },
'[API /price-history] Received request for historical price data.',
);
try {
const priceHistory = await priceRepo.getPriceHistory(masterItemIds, req.log, limit, offset);
res.status(200).json(priceHistory);
} catch (error) {
next(error);
}
});
router.post(
'/',
passport.authenticate('jwt', { session: false }),
priceHistoryLimiter,
validateRequest(priceHistorySchema),
async (req: Request, res: Response, next: NextFunction) => {
// Cast 'req' to the inferred type for full type safety.
const {
body: { masterItemIds, limit, offset },
} = req as unknown as PriceHistoryRequest;
req.log.info(
{ itemCount: masterItemIds.length, limit, offset },
'[API /price-history] Received request for historical price data.',
);
try {
const priceHistory = await priceRepo.getPriceHistory(masterItemIds, req.log, limit, offset);
res.status(200).json(priceHistory);
} catch (error) {
next(error);
}
},
);
export default router;

View File

@@ -208,4 +208,36 @@ describe('Reaction Routes (/api/reactions)', () => {
);
});
});
describe('Rate Limiting', () => {
it('should apply publicReadLimiter to GET /', async () => {
const app = createTestApp({ router: reactionsRouter, basePath: '/api/reactions' });
vi.mocked(reactionRepo.getReactions).mockResolvedValue([]);
const response = await supertest(app)
.get('/api/reactions')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
});
it('should apply userUpdateLimiter to POST /toggle', async () => {
const mockUser = createMockUserProfile({ user: { user_id: 'user-123' } });
const app = createTestApp({
router: reactionsRouter,
basePath: '/api/reactions',
authenticatedUser: mockUser,
});
vi.mocked(reactionRepo.toggleReaction).mockResolvedValue(null);
const response = await supertest(app)
.post('/api/reactions/toggle')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ entity_type: 'recipe', entity_id: '1', reaction_type: 'like' });
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(150);
});
});
});

View File

@@ -5,6 +5,7 @@ import { validateRequest } from '../middleware/validation.middleware';
import passport from './passport.routes';
import { requiredString } from '../utils/zodUtils';
import { UserProfile } from '../types';
import { publicReadLimiter, reactionToggleLimiter } from '../config/rateLimiters';
const router = Router();
@@ -42,6 +43,7 @@ const getReactionSummarySchema = z.object({
*/
router.get(
'/',
publicReadLimiter,
validateRequest(getReactionsSchema),
async (req: Request, res: Response, next: NextFunction) => {
try {
@@ -62,6 +64,7 @@ router.get(
*/
router.get(
'/summary',
publicReadLimiter,
validateRequest(getReactionSummarySchema),
async (req: Request, res: Response, next: NextFunction) => {
try {
@@ -81,6 +84,7 @@ router.get(
*/
router.post(
'/toggle',
reactionToggleLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(toggleReactionSchema),
async (req: Request, res: Response, next: NextFunction) => {

View File

@@ -318,4 +318,65 @@ describe('Recipe Routes (/api/recipes)', () => {
);
});
});
describe('Rate Limiting on /suggest', () => {
const mockUser = createMockUserProfile({ user: { user_id: 'rate-limit-user' } });
const authApp = createTestApp({
router: recipeRouter,
basePath: '/api/recipes',
authenticatedUser: mockUser,
});
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
// Arrange
const maxRequests = 20; // Limit is 20 per 15 mins
const ingredients = ['chicken', 'rice'];
vi.mocked(aiService.generateRecipeSuggestion).mockResolvedValue('A tasty suggestion');
// Act: Make maxRequests calls
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(authApp)
.post('/api/recipes/suggest')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ ingredients });
expect(response.status).not.toBe(429);
}
// Act: Make one more call
const blockedResponse = await supertest(authApp)
.post('/api/recipes/suggest')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ ingredients });
// Assert
expect(blockedResponse.status).toBe(429);
expect(blockedResponse.text).toContain('Too many AI generation requests');
});
it('should NOT block requests when the opt-in header is not sent', async () => {
const maxRequests = 22;
const ingredients = ['beef', 'potatoes'];
vi.mocked(aiService.generateRecipeSuggestion).mockResolvedValue('Another suggestion');
for (let i = 0; i < maxRequests; i++) {
const response = await supertest(authApp)
.post('/api/recipes/suggest')
.send({ ingredients });
expect(response.status).not.toBe(429);
}
});
});
describe('Rate Limiting on Public Routes', () => {
it('should apply publicReadLimiter to GET /:recipeId', async () => {
vi.mocked(db.recipeRepo.getRecipeById).mockResolvedValue(createMockRecipe({}));
const response = await supertest(app)
.get('/api/recipes/1')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(100);
});
});
});

View File

@@ -6,6 +6,7 @@ import { aiService } from '../services/aiService.server';
import passport from './passport.routes';
import { validateRequest } from '../middleware/validation.middleware';
import { requiredString, numericIdParam, optionalNumeric } from '../utils/zodUtils';
import { publicReadLimiter, suggestionLimiter } from '../config/rateLimiters';
const router = Router();
@@ -41,6 +42,7 @@ const suggestRecipeSchema = z.object({
*/
router.get(
'/by-sale-percentage',
publicReadLimiter,
validateRequest(bySalePercentageSchema),
async (req, res, next) => {
try {
@@ -60,6 +62,7 @@ router.get(
*/
router.get(
'/by-sale-ingredients',
publicReadLimiter,
validateRequest(bySaleIngredientsSchema),
async (req, res, next) => {
try {
@@ -82,6 +85,7 @@ router.get(
*/
router.get(
'/by-ingredient-and-tag',
publicReadLimiter,
validateRequest(byIngredientAndTagSchema),
async (req, res, next) => {
try {
@@ -102,7 +106,7 @@ router.get(
/**
* GET /api/recipes/:recipeId/comments - Get all comments for a specific recipe.
*/
router.get('/:recipeId/comments', validateRequest(recipeIdParamsSchema), async (req, res, next) => {
router.get('/:recipeId/comments', publicReadLimiter, validateRequest(recipeIdParamsSchema), async (req, res, next) => {
try {
// Explicitly parse req.params to coerce recipeId to a number
const { params } = recipeIdParamsSchema.parse({ params: req.params });
@@ -117,7 +121,7 @@ router.get('/:recipeId/comments', validateRequest(recipeIdParamsSchema), async (
/**
* GET /api/recipes/:recipeId - Get a single recipe by its ID, including ingredients and tags.
*/
router.get('/:recipeId', validateRequest(recipeIdParamsSchema), async (req, res, next) => {
router.get('/:recipeId', publicReadLimiter, validateRequest(recipeIdParamsSchema), async (req, res, next) => {
try {
// Explicitly parse req.params to coerce recipeId to a number
const { params } = recipeIdParamsSchema.parse({ params: req.params });
@@ -135,6 +139,7 @@ router.get('/:recipeId', validateRequest(recipeIdParamsSchema), async (req, res,
*/
router.post(
'/suggest',
suggestionLimiter,
passport.authenticate('jwt', { session: false }),
validateRequest(suggestRecipeSchema),
async (req, res, next) => {

View File

@@ -66,4 +66,16 @@ describe('Stats Routes (/api/stats)', () => {
expect(response.body.errors.length).toBe(2);
});
});
describe('Rate Limiting', () => {
it('should apply publicReadLimiter to GET /most-frequent-sales', async () => {
vi.mocked(db.adminRepo.getMostFrequentSaleItems).mockResolvedValue([]);
const response = await supertest(app)
.get('/api/stats/most-frequent-sales')
.set('X-Test-Rate-Limit-Enable', 'true');
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
});
});
});

View File

@@ -4,6 +4,7 @@ import { z } from 'zod';
import * as db from '../services/db/index.db';
import { validateRequest } from '../middleware/validation.middleware';
import { optionalNumeric } from '../utils/zodUtils';
import { publicReadLimiter } from '../config/rateLimiters';
const router = Router();
@@ -25,6 +26,7 @@ const mostFrequentSalesSchema = z.object({
*/
router.get(
'/most-frequent-sales',
publicReadLimiter,
validateRequest(mostFrequentSalesSchema),
async (req: Request, res: Response, next: NextFunction) => {
try {

View File

@@ -156,4 +156,25 @@ describe('System Routes (/api/system)', () => {
expect(response.body.errors[0].message).toMatch(/An address string is required|Required/i);
});
});
describe('Rate Limiting on /geocode', () => {
it('should block requests after exceeding the limit when the opt-in header is sent', async () => {
const limit = 100; // Matches geocodeLimiter config
const address = '123 Test St';
vi.mocked(geocodingService.geocodeAddress).mockResolvedValue({ lat: 0, lng: 0 });
// We only need to verify it blocks eventually.
// Instead of running 100 requests, we check for the headers which confirm the middleware is active.
const response = await supertest(app)
.post('/api/system/geocode')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ address });
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(response.headers).toHaveProperty('ratelimit-remaining');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(limit);
expect(parseInt(response.headers['ratelimit-remaining'])).toBeLessThan(limit);
});
});
});

View File

@@ -1,11 +1,19 @@
// src/routes/system.routes.ts
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { Router, Request, Response, NextFunction } from 'express';
import { logger } from '../services/logger.server';
// Removed: import { logger } from '../services/logger.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { geocodingService } from '../services/geocodingService.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validateRequest } from '../middleware/validation.middleware';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { z } from 'zod';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { requiredString } from '../utils/zodUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { systemService } from '../services/systemService';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { geocodeLimiter } from '../config/rateLimiters';
const router = Router();
@@ -41,6 +49,7 @@ router.get(
*/
router.post(
'/geocode',
geocodeLimiter,
validateRequest(geocodeSchema),
async (req: Request, res: Response, next: NextFunction) => {
// Infer type and cast request object as per ADR-003
@@ -59,7 +68,7 @@ router.post(
res.json(coordinates);
} catch (error) {
logger.error({ error }, 'Error geocoding address');
req.log.error({ error }, 'Error geocoding address');
next(error);
}
},

View File

@@ -1030,7 +1030,7 @@ describe('User Routes (/api/users)', () => {
it('should upload an avatar and update the user profile', async () => {
const mockUpdatedProfile = createMockUserProfile({
...mockUserProfile,
avatar_url: 'http://localhost:3001/uploads/avatars/new-avatar.png',
avatar_url: 'https://example.com/uploads/avatars/new-avatar.png',
});
vi.mocked(userService.updateUserAvatar).mockResolvedValue(mockUpdatedProfile);
@@ -1042,7 +1042,7 @@ describe('User Routes (/api/users)', () => {
.attach('avatar', Buffer.from('dummy-image-content'), dummyImagePath);
expect(response.status).toBe(200);
expect(response.body.avatar_url).toContain('http://localhost:3001/uploads/avatars/');
expect(response.body.avatar_url).toContain('https://example.com/uploads/avatars/');
expect(userService.updateUserAvatar).toHaveBeenCalledWith(
mockUserProfile.user.user_id,
expect.any(Object),
@@ -1235,5 +1235,96 @@ describe('User Routes (/api/users)', () => {
expect(logger.error).toHaveBeenCalled();
});
}); // End of Recipe Routes
describe('Rate Limiting', () => {
beforeAll(() => {
vi.useFakeTimers();
});
beforeEach(() => {
// Advance time to ensure rate limits are reset between tests
vi.advanceTimersByTime(2 * 60 * 60 * 1000);
});
afterAll(() => {
vi.useRealTimers();
});
it('should apply userUpdateLimiter to PUT /profile', async () => {
vi.mocked(db.userRepo.updateUserProfile).mockResolvedValue(mockUserProfile);
const response = await supertest(app)
.put('/api/users/profile')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ full_name: 'Rate Limit Test' });
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(100);
});
it('should apply userSensitiveUpdateLimiter to PUT /profile/password and block after limit', async () => {
const limit = 5;
vi.mocked(userService.updateUserPassword).mockResolvedValue(undefined);
// Consume the limit
for (let i = 0; i < limit; i++) {
const response = await supertest(app)
.put('/api/users/profile/password')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ newPassword: 'StrongPassword123!' });
expect(response.status).toBe(200);
}
// Next request should be blocked
const response = await supertest(app)
.put('/api/users/profile/password')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ newPassword: 'StrongPassword123!' });
expect(response.status).toBe(429);
expect(response.text).toContain('Too many sensitive requests');
});
it('should apply userUploadLimiter to POST /profile/avatar', async () => {
vi.mocked(userService.updateUserAvatar).mockResolvedValue(mockUserProfile);
const dummyImagePath = 'test-avatar.png';
const response = await supertest(app)
.post('/api/users/profile/avatar')
.set('X-Test-Rate-Limit-Enable', 'true')
.attach('avatar', Buffer.from('dummy-image-content'), dummyImagePath);
expect(response.status).toBe(200);
expect(response.headers).toHaveProperty('ratelimit-limit');
expect(parseInt(response.headers['ratelimit-limit'])).toBe(20);
});
it('should apply userSensitiveUpdateLimiter to DELETE /account and block after limit', async () => {
// Explicitly advance time to ensure the rate limiter window has reset from previous tests
vi.advanceTimersByTime(60 * 60 * 1000 + 5000);
const limit = 5;
vi.mocked(userService.deleteUserAccount).mockResolvedValue(undefined);
// Consume the limit
for (let i = 0; i < limit; i++) {
const response = await supertest(app)
.delete('/api/users/account')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ password: 'correct-password' });
expect(response.status).toBe(200);
}
// Next request should be blocked
const response = await supertest(app)
.delete('/api/users/account')
.set('X-Test-Rate-Limit-Enable', 'true')
.send({ password: 'correct-password' });
expect(response.status).toBe(429);
expect(response.text).toContain('Too many sensitive requests');
});
});
});
});

View File

@@ -2,17 +2,25 @@
import express, { Request, Response, NextFunction } from 'express';
import passport from './passport.routes';
import multer from 'multer'; // Keep for MulterError type check
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { z } from 'zod';
import { logger } from '../services/logger.server';
// Removed: import { logger } from '../services/logger.server';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { UserProfile } from '../types';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import {
createUploadMiddleware,
handleMulterError,
} from '../middleware/multer.middleware';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { userService } from '../services/userService';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { ForeignKeyConstraintError } from '../services/db/errors.db';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validateRequest } from '../middleware/validation.middleware';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { validatePasswordStrength } from '../utils/authUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import {
requiredString,
numericIdParam,
@@ -20,7 +28,14 @@ import {
optionalBoolean,
} from '../utils/zodUtils';
import * as db from '../services/db/index.db';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import { cleanupUploadedFile } from '../utils/fileUtils';
// All route handlers now use req.log (request-scoped logger) as per ADR-004
import {
userUpdateLimiter,
userSensitiveUpdateLimiter,
userUploadLimiter,
} from '../config/rateLimiters';
const router = express.Router();
@@ -69,6 +84,18 @@ const createShoppingListSchema = z.object({
body: z.object({ name: requiredString("Field 'name' is required.") }),
});
const createRecipeSchema = z.object({
body: z.object({
name: requiredString("Field 'name' is required."),
instructions: requiredString("Field 'instructions' is required."),
description: z.string().trim().optional(),
prep_time_minutes: z.number().int().nonnegative().optional(),
cook_time_minutes: z.number().int().nonnegative().optional(),
servings: z.number().int().positive().optional(),
photo_url: z.string().trim().url().optional(),
}),
});
// Apply the JWT authentication middleware to all routes in this file.
const notificationQuerySchema = z.object({
query: z.object({
@@ -95,6 +122,7 @@ const avatarUpload = createUploadMiddleware({
*/
router.post(
'/profile/avatar',
userUploadLimiter,
avatarUpload.single('avatar'),
async (req: Request, res: Response, next: NextFunction) => {
// The try-catch block was already correct here.
@@ -108,7 +136,7 @@ router.post(
// If an error occurs after the file has been uploaded (e.g., DB error),
// we must clean up the orphaned file from the disk.
await cleanupUploadedFile(req.file);
logger.error({ error }, 'Error uploading avatar');
req.log.error({ error }, 'Error uploading avatar');
next(error);
}
},
@@ -138,7 +166,7 @@ router.get(
);
res.json(notifications);
} catch (error) {
logger.error({ error }, 'Error fetching notifications');
req.log.error({ error }, 'Error fetching notifications');
next(error);
}
},
@@ -156,7 +184,7 @@ router.post(
await db.notificationRepo.markAllNotificationsAsRead(userProfile.user.user_id, req.log);
res.status(204).send(); // No Content
} catch (error) {
logger.error({ error }, 'Error marking all notifications as read');
req.log.error({ error }, 'Error marking all notifications as read');
next(error);
}
},
@@ -182,7 +210,7 @@ router.post(
);
res.status(204).send(); // Success, no content to return
} catch (error) {
logger.error({ error }, 'Error marking notification as read');
req.log.error({ error }, 'Error marking notification as read');
next(error);
}
},
@@ -192,10 +220,10 @@ router.post(
* GET /api/users/profile - Get the full profile for the authenticated user.
*/
router.get('/profile', validateRequest(emptySchema), async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] GET /api/users/profile - ENTER`);
req.log.debug(`[ROUTE] GET /api/users/profile - ENTER`);
const userProfile = req.user as UserProfile;
try {
logger.debug(
req.log.debug(
`[ROUTE] Calling db.userRepo.findUserProfileById for user: ${userProfile.user.user_id}`,
);
const fullUserProfile = await db.userRepo.findUserProfileById(
@@ -204,7 +232,7 @@ router.get('/profile', validateRequest(emptySchema), async (req, res, next: Next
);
res.json(fullUserProfile);
} catch (error) {
logger.error({ error }, `[ROUTE] GET /api/users/profile - ERROR`);
req.log.error({ error }, `[ROUTE] GET /api/users/profile - ERROR`);
next(error);
}
});
@@ -215,9 +243,10 @@ router.get('/profile', validateRequest(emptySchema), async (req, res, next: Next
type UpdateProfileRequest = z.infer<typeof updateProfileSchema>;
router.put(
'/profile',
userUpdateLimiter,
validateRequest(updateProfileSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] PUT /api/users/profile - ENTER`);
req.log.debug(`[ROUTE] PUT /api/users/profile - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as UpdateProfileRequest;
@@ -229,7 +258,7 @@ router.put(
);
res.json(updatedProfile);
} catch (error) {
logger.error({ error }, `[ROUTE] PUT /api/users/profile - ERROR`);
req.log.error({ error }, `[ROUTE] PUT /api/users/profile - ERROR`);
next(error);
}
},
@@ -241,9 +270,10 @@ router.put(
type UpdatePasswordRequest = z.infer<typeof updatePasswordSchema>;
router.put(
'/profile/password',
userSensitiveUpdateLimiter,
validateRequest(updatePasswordSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] PUT /api/users/profile/password - ENTER`);
req.log.debug(`[ROUTE] PUT /api/users/profile/password - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as UpdatePasswordRequest;
@@ -252,7 +282,7 @@ router.put(
await userService.updateUserPassword(userProfile.user.user_id, body.newPassword, req.log);
res.status(200).json({ message: 'Password updated successfully.' });
} catch (error) {
logger.error({ error }, `[ROUTE] PUT /api/users/profile/password - ERROR`);
req.log.error({ error }, `[ROUTE] PUT /api/users/profile/password - ERROR`);
next(error);
}
},
@@ -264,9 +294,10 @@ router.put(
type DeleteAccountRequest = z.infer<typeof deleteAccountSchema>;
router.delete(
'/account',
userSensitiveUpdateLimiter,
validateRequest(deleteAccountSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] DELETE /api/users/account - ENTER`);
req.log.debug(`[ROUTE] DELETE /api/users/account - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as DeleteAccountRequest;
@@ -275,7 +306,7 @@ router.delete(
await userService.deleteUserAccount(userProfile.user.user_id, body.password, req.log);
res.status(200).json({ message: 'Account deleted successfully.' });
} catch (error) {
logger.error({ error }, `[ROUTE] DELETE /api/users/account - ERROR`);
req.log.error({ error }, `[ROUTE] DELETE /api/users/account - ERROR`);
next(error);
}
},
@@ -285,13 +316,13 @@ router.delete(
* GET /api/users/watched-items - Get all watched items for the authenticated user.
*/
router.get('/watched-items', validateRequest(emptySchema), async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] GET /api/users/watched-items - ENTER`);
req.log.debug(`[ROUTE] GET /api/users/watched-items - ENTER`);
const userProfile = req.user as UserProfile;
try {
const items = await db.personalizationRepo.getWatchedItems(userProfile.user.user_id, req.log);
res.json(items);
} catch (error) {
logger.error({ error }, `[ROUTE] GET /api/users/watched-items - ERROR`);
req.log.error({ error }, `[ROUTE] GET /api/users/watched-items - ERROR`);
next(error);
}
});
@@ -302,9 +333,10 @@ router.get('/watched-items', validateRequest(emptySchema), async (req, res, next
type AddWatchedItemRequest = z.infer<typeof addWatchedItemSchema>;
router.post(
'/watched-items',
userUpdateLimiter,
validateRequest(addWatchedItemSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] POST /api/users/watched-items - ENTER`);
req.log.debug(`[ROUTE] POST /api/users/watched-items - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as AddWatchedItemRequest;
@@ -320,7 +352,7 @@ router.post(
if (error instanceof ForeignKeyConstraintError) {
return res.status(400).json({ message: error.message });
}
logger.error({ error, body: req.body }, 'Failed to add watched item');
req.log.error({ error, body: req.body }, 'Failed to add watched item');
next(error);
}
},
@@ -333,9 +365,10 @@ const watchedItemIdSchema = numericIdParam('masterItemId');
type DeleteWatchedItemRequest = z.infer<typeof watchedItemIdSchema>;
router.delete(
'/watched-items/:masterItemId',
userUpdateLimiter,
validateRequest(watchedItemIdSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] DELETE /api/users/watched-items/:masterItemId - ENTER`);
req.log.debug(`[ROUTE] DELETE /api/users/watched-items/:masterItemId - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { params } = req as unknown as DeleteWatchedItemRequest;
@@ -347,7 +380,7 @@ router.delete(
);
res.status(204).send();
} catch (error) {
logger.error({ error }, `[ROUTE] DELETE /api/users/watched-items/:masterItemId - ERROR`);
req.log.error({ error }, `[ROUTE] DELETE /api/users/watched-items/:masterItemId - ERROR`);
next(error);
}
},
@@ -360,13 +393,13 @@ router.get(
'/shopping-lists',
validateRequest(emptySchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] GET /api/users/shopping-lists - ENTER`);
req.log.debug(`[ROUTE] GET /api/users/shopping-lists - ENTER`);
const userProfile = req.user as UserProfile;
try {
const lists = await db.shoppingRepo.getShoppingLists(userProfile.user.user_id, req.log);
res.json(lists);
} catch (error) {
logger.error({ error }, `[ROUTE] GET /api/users/shopping-lists - ERROR`);
req.log.error({ error }, `[ROUTE] GET /api/users/shopping-lists - ERROR`);
next(error);
}
},
@@ -381,7 +414,7 @@ router.get(
'/shopping-lists/:listId',
validateRequest(shoppingListIdSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] GET /api/users/shopping-lists/:listId - ENTER`);
req.log.debug(`[ROUTE] GET /api/users/shopping-lists/:listId - ENTER`);
const userProfile = req.user as UserProfile;
const { params } = req as unknown as GetShoppingListRequest;
try {
@@ -392,7 +425,7 @@ router.get(
);
res.json(list);
} catch (error) {
logger.error(
req.log.error(
{ error, listId: params.listId },
`[ROUTE] GET /api/users/shopping-lists/:listId - ERROR`,
);
@@ -407,9 +440,10 @@ router.get(
type CreateShoppingListRequest = z.infer<typeof createShoppingListSchema>;
router.post(
'/shopping-lists',
userUpdateLimiter,
validateRequest(createShoppingListSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] POST /api/users/shopping-lists - ENTER`);
req.log.debug(`[ROUTE] POST /api/users/shopping-lists - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as CreateShoppingListRequest;
@@ -424,7 +458,7 @@ router.post(
if (error instanceof ForeignKeyConstraintError) {
return res.status(400).json({ message: error.message });
}
logger.error({ error, body: req.body }, 'Failed to create shopping list');
req.log.error({ error, body: req.body }, 'Failed to create shopping list');
next(error);
}
},
@@ -435,9 +469,10 @@ router.post(
*/
router.delete(
'/shopping-lists/:listId',
userUpdateLimiter,
validateRequest(shoppingListIdSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] DELETE /api/users/shopping-lists/:listId - ENTER`);
req.log.debug(`[ROUTE] DELETE /api/users/shopping-lists/:listId - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { params } = req as unknown as GetShoppingListRequest;
@@ -446,7 +481,7 @@ router.delete(
res.status(204).send();
} catch (error: unknown) {
const errorMessage = error instanceof Error ? error.message : 'An unknown error occurred';
logger.error(
req.log.error(
{ errorMessage, params: req.params },
`[ROUTE] DELETE /api/users/shopping-lists/:listId - ERROR`,
);
@@ -475,9 +510,10 @@ const addShoppingListItemSchema = shoppingListIdSchema.extend({
type AddShoppingListItemRequest = z.infer<typeof addShoppingListItemSchema>;
router.post(
'/shopping-lists/:listId/items',
userUpdateLimiter,
validateRequest(addShoppingListItemSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] POST /api/users/shopping-lists/:listId/items - ENTER`);
req.log.debug(`[ROUTE] POST /api/users/shopping-lists/:listId/items - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { params, body } = req as unknown as AddShoppingListItemRequest;
@@ -493,7 +529,7 @@ router.post(
if (error instanceof ForeignKeyConstraintError) {
return res.status(400).json({ message: error.message });
}
logger.error({ error, params: req.params, body: req.body }, 'Failed to add shopping list item');
req.log.error({ error, params: req.params, body: req.body }, 'Failed to add shopping list item');
next(error);
}
},
@@ -515,9 +551,10 @@ const updateShoppingListItemSchema = numericIdParam('itemId').extend({
type UpdateShoppingListItemRequest = z.infer<typeof updateShoppingListItemSchema>;
router.put(
'/shopping-lists/items/:itemId',
userUpdateLimiter,
validateRequest(updateShoppingListItemSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] PUT /api/users/shopping-lists/items/:itemId - ENTER`);
req.log.debug(`[ROUTE] PUT /api/users/shopping-lists/items/:itemId - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { params, body } = req as unknown as UpdateShoppingListItemRequest;
@@ -530,7 +567,7 @@ router.put(
);
res.json(updatedItem);
} catch (error: unknown) {
logger.error(
req.log.error(
{ error, params: req.params, body: req.body },
`[ROUTE] PUT /api/users/shopping-lists/items/:itemId - ERROR`,
);
@@ -546,9 +583,10 @@ const shoppingListItemIdSchema = numericIdParam('itemId');
type DeleteShoppingListItemRequest = z.infer<typeof shoppingListItemIdSchema>;
router.delete(
'/shopping-lists/items/:itemId',
userUpdateLimiter,
validateRequest(shoppingListItemIdSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] DELETE /api/users/shopping-lists/items/:itemId - ENTER`);
req.log.debug(`[ROUTE] DELETE /api/users/shopping-lists/items/:itemId - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { params } = req as unknown as DeleteShoppingListItemRequest;
@@ -556,7 +594,7 @@ router.delete(
await db.shoppingRepo.removeShoppingListItem(params.itemId, userProfile.user.user_id, req.log);
res.status(204).send();
} catch (error: unknown) {
logger.error(
req.log.error(
{ error, params: req.params },
`[ROUTE] DELETE /api/users/shopping-lists/items/:itemId - ERROR`,
);
@@ -574,9 +612,10 @@ const updatePreferencesSchema = z.object({
type UpdatePreferencesRequest = z.infer<typeof updatePreferencesSchema>;
router.put(
'/profile/preferences',
userUpdateLimiter,
validateRequest(updatePreferencesSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] PUT /api/users/profile/preferences - ENTER`);
req.log.debug(`[ROUTE] PUT /api/users/profile/preferences - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as UpdatePreferencesRequest;
@@ -588,7 +627,7 @@ router.put(
);
res.json(updatedProfile);
} catch (error) {
logger.error({ error }, `[ROUTE] PUT /api/users/profile/preferences - ERROR`);
req.log.error({ error }, `[ROUTE] PUT /api/users/profile/preferences - ERROR`);
next(error);
}
},
@@ -598,7 +637,7 @@ router.get(
'/me/dietary-restrictions',
validateRequest(emptySchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] GET /api/users/me/dietary-restrictions - ENTER`);
req.log.debug(`[ROUTE] GET /api/users/me/dietary-restrictions - ENTER`);
const userProfile = req.user as UserProfile;
try {
const restrictions = await db.personalizationRepo.getUserDietaryRestrictions(
@@ -607,7 +646,7 @@ router.get(
);
res.json(restrictions);
} catch (error) {
logger.error({ error }, `[ROUTE] GET /api/users/me/dietary-restrictions - ERROR`);
req.log.error({ error }, `[ROUTE] GET /api/users/me/dietary-restrictions - ERROR`);
next(error);
}
},
@@ -619,9 +658,10 @@ const setUserRestrictionsSchema = z.object({
type SetUserRestrictionsRequest = z.infer<typeof setUserRestrictionsSchema>;
router.put(
'/me/dietary-restrictions',
userUpdateLimiter,
validateRequest(setUserRestrictionsSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] PUT /api/users/me/dietary-restrictions - ENTER`);
req.log.debug(`[ROUTE] PUT /api/users/me/dietary-restrictions - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as SetUserRestrictionsRequest;
@@ -636,14 +676,14 @@ router.put(
if (error instanceof ForeignKeyConstraintError) {
return res.status(400).json({ message: error.message });
}
logger.error({ error, body: req.body }, 'Failed to set user dietary restrictions');
req.log.error({ error, body: req.body }, 'Failed to set user dietary restrictions');
next(error);
}
},
);
router.get('/me/appliances', validateRequest(emptySchema), async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] GET /api/users/me/appliances - ENTER`);
req.log.debug(`[ROUTE] GET /api/users/me/appliances - ENTER`);
const userProfile = req.user as UserProfile;
try {
const appliances = await db.personalizationRepo.getUserAppliances(
@@ -652,7 +692,7 @@ router.get('/me/appliances', validateRequest(emptySchema), async (req, res, next
);
res.json(appliances);
} catch (error) {
logger.error({ error }, `[ROUTE] GET /api/users/me/appliances - ERROR`);
req.log.error({ error }, `[ROUTE] GET /api/users/me/appliances - ERROR`);
next(error);
}
});
@@ -663,9 +703,10 @@ const setUserAppliancesSchema = z.object({
type SetUserAppliancesRequest = z.infer<typeof setUserAppliancesSchema>;
router.put(
'/me/appliances',
userUpdateLimiter,
validateRequest(setUserAppliancesSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] PUT /api/users/me/appliances - ENTER`);
req.log.debug(`[ROUTE] PUT /api/users/me/appliances - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { body } = req as unknown as SetUserAppliancesRequest;
@@ -680,7 +721,7 @@ router.put(
if (error instanceof ForeignKeyConstraintError) {
return res.status(400).json({ message: error.message });
}
logger.error({ error, body: req.body }, 'Failed to set user appliances');
req.log.error({ error, body: req.body }, 'Failed to set user appliances');
next(error);
}
},
@@ -704,7 +745,7 @@ router.get(
const address = await userService.getUserAddress(userProfile, addressId, req.log);
res.json(address);
} catch (error) {
logger.error({ error }, 'Error fetching user address');
req.log.error({ error }, 'Error fetching user address');
next(error);
}
},
@@ -730,6 +771,7 @@ const updateUserAddressSchema = z.object({
type UpdateUserAddressRequest = z.infer<typeof updateUserAddressSchema>;
router.put(
'/profile/address',
userUpdateLimiter,
validateRequest(updateUserAddressSchema),
async (req, res, next: NextFunction) => {
const userProfile = req.user as UserProfile;
@@ -743,12 +785,32 @@ router.put(
const addressId = await userService.upsertUserAddress(userProfile, addressData, req.log); // This was a duplicate, fixed.
res.status(200).json({ message: 'Address updated successfully', address_id: addressId });
} catch (error) {
logger.error({ error }, 'Error updating user address');
req.log.error({ error }, 'Error updating user address');
next(error);
}
},
);
/**
* POST /api/users/recipes - Create a new recipe.
*/
router.post(
'/recipes',
userUpdateLimiter,
validateRequest(createRecipeSchema),
async (req, res, next) => {
const userProfile = req.user as UserProfile;
const { body } = req as unknown as z.infer<typeof createRecipeSchema>;
try {
const recipe = await db.recipeRepo.createRecipe(userProfile.user.user_id, body, req.log);
res.status(201).json(recipe);
} catch (error) {
req.log.error({ error }, 'Error creating recipe');
next(error);
}
}
);
/**
* DELETE /api/users/recipes/:recipeId - Delete a recipe created by the user.
*/
@@ -756,9 +818,10 @@ const recipeIdSchema = numericIdParam('recipeId');
type DeleteRecipeRequest = z.infer<typeof recipeIdSchema>;
router.delete(
'/recipes/:recipeId',
userUpdateLimiter,
validateRequest(recipeIdSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] DELETE /api/users/recipes/:recipeId - ENTER`);
req.log.debug(`[ROUTE] DELETE /api/users/recipes/:recipeId - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { params } = req as unknown as DeleteRecipeRequest;
@@ -766,7 +829,7 @@ router.delete(
await db.recipeRepo.deleteRecipe(params.recipeId, userProfile.user.user_id, false, req.log);
res.status(204).send();
} catch (error) {
logger.error(
req.log.error(
{ error, params: req.params },
`[ROUTE] DELETE /api/users/recipes/:recipeId - ERROR`,
);
@@ -794,9 +857,10 @@ const updateRecipeSchema = recipeIdSchema.extend({
type UpdateRecipeRequest = z.infer<typeof updateRecipeSchema>;
router.put(
'/recipes/:recipeId',
userUpdateLimiter,
validateRequest(updateRecipeSchema),
async (req, res, next: NextFunction) => {
logger.debug(`[ROUTE] PUT /api/users/recipes/:recipeId - ENTER`);
req.log.debug(`[ROUTE] PUT /api/users/recipes/:recipeId - ENTER`);
const userProfile = req.user as UserProfile;
// Apply ADR-003 pattern for type safety
const { params, body } = req as unknown as UpdateRecipeRequest;
@@ -810,7 +874,7 @@ router.put(
);
res.json(updatedRecipe);
} catch (error) {
logger.error(
req.log.error(
{ error, params: req.params, body: req.body },
`[ROUTE] PUT /api/users/recipes/:recipeId - ERROR`,
);

View File

@@ -0,0 +1,33 @@
// src/schemas/flyer.schemas.ts
import { z } from 'zod';
import { httpUrl, requiredString } from '../utils/zodUtils';
/**
* Zod schema for FlyerInsert type with strict URL validation.
* Ensures image_url and icon_url match database constraints (^https?://.*).
*/
export const flyerInsertSchema = z.object({
file_name: requiredString('File name is required'),
image_url: httpUrl('Flyer image URL must be a valid HTTP or HTTPS URL'),
icon_url: httpUrl('Flyer icon URL must be a valid HTTP or HTTPS URL'),
checksum: z
.string()
.length(64, 'Checksum must be 64 characters')
.regex(/^[a-f0-9]+$/, 'Checksum must be a valid hexadecimal string')
.nullable(),
store_name: requiredString('Store name is required'),
valid_from: z.string().datetime().nullable(),
valid_to: z.string().datetime().nullable(),
store_address: z.string().nullable(),
status: z.enum(['processed', 'needs_review', 'archived']),
item_count: z.number().int().nonnegative('Item count must be non-negative'),
uploaded_by: z.string().uuid().nullable().optional(),
});
/**
* Zod schema for FlyerDbInsert type with URL validation.
* Same as flyerInsertSchema but uses store_id instead of store_name.
*/
export const flyerDbInsertSchema = flyerInsertSchema.omit({ store_name: true }).extend({
store_id: z.number().int().positive('Store ID must be a positive integer'),
});

View File

@@ -32,6 +32,7 @@ export const uploadAndProcessFlyer = async (
formData.append('checksum', checksum);
logger.info(`[aiApiClient] Starting background processing for file: ${file.name}`);
console.error(`[aiApiClient] uploadAndProcessFlyer: Uploading file '${file.name}' with checksum '${checksum}'`);
const response = await authedPostForm('/ai/upload-and-process', formData, { tokenOverride });
@@ -94,6 +95,7 @@ export const getJobStatus = async (
jobId: string,
tokenOverride?: string,
): Promise<JobStatus> => {
console.error(`[aiApiClient] getJobStatus: Fetching status for job '${jobId}'`);
const response = await authedGet(`/ai/jobs/${jobId}/status`, { tokenOverride });
// Handle non-OK responses first, as they might not have a JSON body.

View File

@@ -81,6 +81,7 @@ vi.mock('./db/flyer.db', () => ({
vi.mock('../utils/imageProcessor', () => ({
generateFlyerIcon: vi.fn(),
processAndSaveImage: vi.fn(),
}));
vi.mock('./db/admin.db', () => ({
@@ -93,8 +94,8 @@ vi.mock('./db/admin.db', () => ({
import * as dbModule from './db/index.db';
import { flyerQueue } from './queueService.server';
import { createFlyerAndItems } from './db/flyer.db';
import { withTransaction } from './db/index.db';
import { generateFlyerIcon } from '../utils/imageProcessor';
import { withTransaction } from './db/index.db'; // This was a duplicate, fixed.
import { generateFlyerIcon, processAndSaveImage } from '../utils/imageProcessor';
// Define a mock interface that closely resembles the actual Flyer type for testing purposes.
// This helps ensure type safety in mocks without relying on 'any'.
@@ -115,7 +116,7 @@ interface MockFlyer {
updated_at: string;
}
const baseUrl = 'http://localhost:3001';
const baseUrl = 'https://example.com';
describe('AI Service (Server)', () => {
// Create mock dependencies that will be injected into the service
@@ -196,15 +197,17 @@ describe('AI Service (Server)', () => {
const service = new AIService(mockLoggerInstance);
// Assert: Check that the warning was logged and the mock client is in use
expect(mockLoggerInstance.warn).toHaveBeenCalledWith(
'[AIService] GoogleGenAI client could not be initialized (likely missing API key in test environment). Using mock placeholder.',
expect(mockLoggerInstance.info).toHaveBeenCalledWith(
'[AIService Constructor] Test environment detected. Using internal mock for AI client to prevent real API calls in INTEGRATION TESTS.',
);
await expect(
(service as any).aiClient.generateContent({ contents: [] }),
(service as any).aiClient.generateContent({ contents: [], useLiteModels: false }),
).resolves.toBeDefined();
});
it('should use the adapter to call generateContent when using real GoogleGenAI client', async () => {
vi.stubEnv('NODE_ENV', 'production');
vi.stubEnv('VITEST_POOL_ID', '');
vi.stubEnv('GEMINI_API_KEY', 'test-key');
// We need to force the constructor to use the real client logic, not the injected mock.
// So we instantiate AIService without passing aiClient.
@@ -228,6 +231,8 @@ describe('AI Service (Server)', () => {
});
it('should throw error if adapter is called without content', async () => {
vi.stubEnv('NODE_ENV', 'production');
vi.stubEnv('VITEST_POOL_ID', '');
vi.stubEnv('GEMINI_API_KEY', 'test-key');
vi.resetModules();
const { AIService } = await import('./aiService.server');
@@ -243,6 +248,8 @@ describe('AI Service (Server)', () => {
describe('Model Fallback Logic', () => {
beforeEach(() => {
vi.unstubAllEnvs();
vi.stubEnv('NODE_ENV', 'production');
vi.stubEnv('VITEST_POOL_ID', '');
vi.stubEnv('GEMINI_API_KEY', 'test-key');
vi.resetModules(); // Re-import to use the new env var and re-instantiate the service
mockGenerateContent.mockReset();
@@ -321,9 +328,8 @@ describe('AI Service (Server)', () => {
// Check that a warning was logged
expect(logger.warn).toHaveBeenCalledWith(
// The warning should be for the model that failed ('gemini-2.5-flash'), not the next one.
// The warning should be for the model that failed, not the next one.
expect.stringContaining(
`Model '${models[0]}' failed due to quota/rate limit. Trying next model.`,
`Model '${models[0]}' failed due to quota/rate limit/overload. Trying next model.`,
),
);
});
@@ -499,7 +505,7 @@ describe('AI Service (Server)', () => {
expect(mockGenerateContent).toHaveBeenCalledTimes(2);
expect(mockGenerateContent).toHaveBeenNthCalledWith(1, { model: models[0], ...request });
expect(mockGenerateContent).toHaveBeenNthCalledWith(2, { model: models[1], ...request });
expect(logger.warn).toHaveBeenCalledWith(expect.stringContaining(`Model '${models[0]}' failed due to quota/rate limit.`));
expect(logger.warn).toHaveBeenCalledWith(expect.stringContaining(`Model '${models[0]}' failed due to quota/rate limit/overload.`));
});
it('should fail immediately on a 400 Bad Request error without retrying', async () => {
@@ -808,9 +814,11 @@ describe('AI Service (Server)', () => {
expect(
(localAiServiceInstance as any)._parseJsonFromAiResponse(responseText, localLogger),
).toBeNull(); // This was a duplicate, fixed.
// The code now fails earlier because it can't find the closing brace.
// We need to update the assertion to match the actual error log.
expect(localLogger.error).toHaveBeenCalledWith(
expect.objectContaining({ jsonSlice: '{ "key": "value"' }),
'[_parseJsonFromAiResponse] Failed to parse JSON slice.',
{ responseText }, // The log includes the full response text.
"[_parseJsonFromAiResponse] Could not find ending '}' or ']' in response.",
);
});
});
@@ -1012,7 +1020,7 @@ describe('AI Service (Server)', () => {
userId: 'user123',
submitterIp: '127.0.0.1',
userProfileAddress: '123 St, City, Country', // Partial address match based on filter(Boolean)
baseUrl: 'http://localhost:3000',
baseUrl: 'https://example.com',
});
expect(result.id).toBe('job123');
});
@@ -1034,7 +1042,7 @@ describe('AI Service (Server)', () => {
expect.objectContaining({
userId: undefined,
userProfileAddress: undefined,
baseUrl: 'http://localhost:3000',
baseUrl: 'https://example.com',
}),
);
});
@@ -1052,6 +1060,7 @@ describe('AI Service (Server)', () => {
beforeEach(() => {
// Default success mocks. Use createMockFlyer for a more complete mock.
vi.mocked(dbModule.flyerRepo.findFlyerByChecksum).mockResolvedValue(undefined);
vi.mocked(processAndSaveImage).mockResolvedValue('processed.jpg');
vi.mocked(generateFlyerIcon).mockResolvedValue('icon.jpg');
vi.mocked(createFlyerAndItems).mockResolvedValue({
flyer: {

View File

@@ -73,14 +73,7 @@ interface IAiClient {
* This type is intentionally loose to accommodate potential null/undefined values
* from the AI before they are cleaned and normalized.
*/
export type RawFlyerItem = {
item: string | null;
price_display: string | null | undefined;
price_in_cents: number | null | undefined;
quantity: string | null | undefined;
category_name: string | null | undefined;
master_item_id?: number | null | undefined;
};
export type RawFlyerItem = z.infer<typeof ExtractedFlyerItemSchema>;
export class DuplicateFlyerError extends FlyerProcessingError {
constructor(message: string, public flyerId: number) {
@@ -143,85 +136,81 @@ export class AIService {
"gemma-3n-e2b-it" // Corrected name from JSON
];
// Helper to return valid mock data for tests
private getMockFlyerData() {
return {
store_name: 'Mock Store from AIService',
valid_from: '2025-01-01',
valid_to: '2025-01-07',
store_address: '123 Mock St',
items: [
{
item: 'Mocked Integration Item',
price_display: '$1.99',
price_in_cents: 199,
quantity: 'each',
category_name: 'Mock Category',
master_item_id: null,
},
],
};
}
constructor(logger: Logger, aiClient?: IAiClient, fs?: IFileSystem) {
this.logger = logger;
this.logger.info('---------------- [AIService] Constructor Start ----------------');
const isTestEnvironment = process.env.NODE_ENV === 'test' || !!process.env.VITEST_POOL_ID;
if (aiClient) {
this.logger.info(
'[AIService Constructor] Using provided mock AI client. This indicates a TEST environment.',
'[AIService Constructor] Using provided mock AI client. This indicates a UNIT TEST environment.',
);
this.aiClient = aiClient;
} else if (isTestEnvironment) {
this.logger.info(
'[AIService Constructor] Test environment detected. Using internal mock for AI client to prevent real API calls in INTEGRATION TESTS.',
);
this.aiClient = {
generateContent: async (request) => {
this.logger.info(
{ useLiteModels: request.useLiteModels },
'[AIService] Mock generateContent called in test environment.',
);
const mockData = this.getMockFlyerData();
return {
text: JSON.stringify(mockData),
} as unknown as GenerateContentResponse;
},
};
} else {
this.logger.info(
'[AIService Constructor] No mock client provided. Initializing Google GenAI client for PRODUCTION-LIKE environment.',
'[AIService Constructor] No mock client provided and not a test environment. Initializing Google GenAI client for PRODUCTION.',
);
// Determine if we are in any kind of test environment.
// VITEST_POOL_ID is reliably set by Vitest during test runs.
const isTestEnvironment = process.env.NODE_ENV === 'test' || !!process.env.VITEST_POOL_ID;
this.logger.info(
{
isTestEnvironment,
nodeEnv: process.env.NODE_ENV,
vitestPoolId: process.env.VITEST_POOL_ID,
hasApiKey: !!process.env.GEMINI_API_KEY,
},
'[AIService Constructor] Environment check',
);
const apiKey = process.env.GEMINI_API_KEY;
if (!apiKey) {
this.logger.warn('[AIService] GEMINI_API_KEY is not set.');
// Allow initialization without key in test/build environments if strictly needed
if (!isTestEnvironment) {
this.logger.error('[AIService] GEMINI_API_KEY is required in non-test environments.');
throw new Error('GEMINI_API_KEY environment variable not set for server-side AI calls.');
} else {
this.logger.warn(
'[AIService Constructor] GEMINI_API_KEY is missing, but this is a test environment, so proceeding.',
);
}
}
// In test mode without injected client, we might not have a key.
// The stubs below protect against calling the undefined client.
// This is the correct modern SDK pattern. We instantiate the main client.
const genAI = apiKey ? new GoogleGenAI({ apiKey }) : null;
if (!genAI) {
this.logger.warn(
'[AIService] GoogleGenAI client could not be initialized (likely missing API key in test environment). Using mock placeholder.',
);
this.logger.error('[AIService] GEMINI_API_KEY is required in non-test environments.');
throw new Error('GEMINI_API_KEY environment variable not set for server-side AI calls.');
}
const genAI = new GoogleGenAI({ apiKey });
// We create a shim/adapter that matches the old structure but uses the new SDK call pattern.
// This preserves the dependency injection pattern used throughout the class.
this.aiClient = genAI
? {
generateContent: async (request) => {
if (!request.contents || request.contents.length === 0) {
this.logger.error(
{ request },
'[AIService Adapter] generateContent called with no content, which is invalid.',
);
throw new Error('AIService.generateContent requires at least one content element.');
}
const { useLiteModels, ...apiReq } = request;
const models = useLiteModels ? this.models_lite : this.models;
return this._generateWithFallback(genAI, apiReq, models);
},
this.aiClient = {
generateContent: async (request) => {
if (!request.contents || request.contents.length === 0) {
this.logger.error(
{ request },
'[AIService Adapter] generateContent called with no content, which is invalid.',
);
throw new Error('AIService.generateContent requires at least one content element.');
}
: {
// This is the updated mock for testing, matching the new response shape.
generateContent: async () => {
this.logger.warn(
'[AIService] Mock generateContent called. This should only happen in tests when no API key is available.',
);
// Return a minimal valid JSON object structure to prevent downstream parsing errors.
const mockResponse = { store_name: 'Mock Store', items: [] };
return {
text: JSON.stringify(mockResponse),
} as unknown as GenerateContentResponse;
},
};
const { useLiteModels, ...apiReq } = request;
const models = useLiteModels ? this.models_lite : this.models;
return this._generateWithFallback(genAI, apiReq, models);
},
};
}
this.fs = fs || fsPromises;
@@ -261,19 +250,37 @@ export class AIService {
// If the call succeeds, return the result immediately.
return result;
} catch (error: unknown) {
lastError = error instanceof Error ? error : new Error(String(error));
const errorMessage = (lastError.message || '').toLowerCase(); // Make case-insensitive
// Robust error message extraction to handle various error shapes (Error objects, JSON responses, etc.)
let errorMsg = '';
if (error instanceof Error) {
lastError = error;
errorMsg = error.message;
} else {
try {
if (typeof error === 'object' && error !== null && 'message' in error) {
errorMsg = String((error as any).message);
} else {
errorMsg = JSON.stringify(error);
}
} catch {
errorMsg = String(error);
}
lastError = new Error(errorMsg);
}
const lowerErrorMsg = errorMsg.toLowerCase();
// Check for specific error messages indicating quota issues or model unavailability.
if (
errorMessage.includes('quota') ||
errorMessage.includes('429') || // HTTP 429 Too Many Requests
errorMessage.includes('resource_exhausted') || // Make case-insensitive
errorMessage.includes('model is overloaded') ||
errorMessage.includes('not found') // Also retry if model is not found (e.g., regional availability or API version issue)
lowerErrorMsg.includes('quota') ||
lowerErrorMsg.includes('429') || // HTTP 429 Too Many Requests
lowerErrorMsg.includes('503') || // HTTP 503 Service Unavailable
lowerErrorMsg.includes('resource_exhausted') ||
lowerErrorMsg.includes('overloaded') || // Covers "model is overloaded"
lowerErrorMsg.includes('unavailable') || // Covers "Service Unavailable"
lowerErrorMsg.includes('not found') // Also retry if model is not found (e.g., regional availability or API version issue)
) {
this.logger.warn(
`[AIService Adapter] Model '${modelName}' failed due to quota/rate limit. Trying next model. Error: ${errorMessage}`,
`[AIService Adapter] Model '${modelName}' failed due to quota/rate limit/overload. Trying next model. Error: ${errorMsg}`,
);
continue; // Try the next model in the list.
} else {
@@ -536,6 +543,7 @@ export class AIService {
logger.info(
`[extractCoreDataFromFlyerImage] Entering method with ${imagePaths.length} image(s).`,
);
const prompt = this._buildFlyerExtractionPrompt(masterItems, submitterIp, userProfileAddress);
const imageParts = await Promise.all(
@@ -760,6 +768,7 @@ async enqueueFlyerProcessing(
userProfile: UserProfile | undefined,
submitterIp: string,
logger: Logger,
baseUrlOverride?: string,
): Promise<Job> {
// 1. Check for duplicate flyer
const existingFlyer = await db.flyerRepo.findFlyerByChecksum(checksum, logger);
@@ -786,8 +795,9 @@ async enqueueFlyerProcessing(
.join(', ');
}
const baseUrl = getBaseUrl(logger);
const baseUrl = baseUrlOverride || getBaseUrl(logger);
// --- START DEBUGGING ---
console.error(`[DEBUG] aiService.enqueueFlyerProcessing resolved baseUrl: "${baseUrl}"`);
// Add a fail-fast check to ensure the baseUrl is a valid URL before enqueuing.
// This will make the test fail at the upload step if the URL is the problem,
// which is easier to debug than a worker failure.
@@ -893,8 +903,8 @@ async enqueueFlyerProcessing(
const itemsArray = Array.isArray(rawItems) ? rawItems : typeof rawItems === 'string' ? JSON.parse(rawItems) : [];
const itemsForDb = itemsArray.map((item: Partial<ExtractedFlyerItem>) => ({
...item,
// Ensure price_display is never null to satisfy database constraints.
price_display: item.price_display ?? '',
// Ensure empty or nullish price_display is stored as NULL to satisfy database constraints.
price_display: item.price_display || null,
master_item_id: item.master_item_id === null ? undefined : item.master_item_id,
quantity: item.quantity ?? 1,
view_count: 0,

View File

@@ -86,6 +86,33 @@ describe('AnalyticsService', () => {
'Daily analytics job failed.',
);
});
it('should handle non-Error objects thrown during processing', async () => {
const job = createMockJob<AnalyticsJobData>({ reportDate: '2023-10-27' } as AnalyticsJobData);
mockLoggerInstance.info
.mockImplementationOnce(() => {}) // "Picked up..."
.mockImplementationOnce(() => {
throw 'A string error';
});
const promise = service.processDailyReportJob(job);
// Capture the expectation promise BEFORE triggering the rejection via timer advancement.
const expectation = expect(promise).rejects.toThrow('A string error');
await vi.advanceTimersByTimeAsync(10000);
await expectation;
expect(mockLoggerInstance.error).toHaveBeenCalledWith(
expect.objectContaining({
err: expect.objectContaining({ message: 'A string error' }),
attemptsMade: 1,
}),
'Daily analytics job failed.',
);
});
});
describe('processWeeklyReportJob', () => {
@@ -149,5 +176,35 @@ describe('AnalyticsService', () => {
'Weekly analytics job failed.',
);
});
it('should handle non-Error objects thrown during processing', async () => {
const job = createMockJob<WeeklyAnalyticsJobData>({
reportYear: 2023,
reportWeek: 43,
} as WeeklyAnalyticsJobData);
mockLoggerInstance.info
.mockImplementationOnce(() => {}) // "Picked up..."
.mockImplementationOnce(() => {
throw 'A string error';
});
const promise = service.processWeeklyReportJob(job);
// Capture the expectation promise BEFORE triggering the rejection via timer advancement.
const expectation = expect(promise).rejects.toThrow('A string error');
await vi.advanceTimersByTimeAsync(30000);
await expectation;
expect(mockLoggerInstance.error).toHaveBeenCalledWith(
expect.objectContaining({
err: expect.objectContaining({ message: 'A string error' }),
attemptsMade: 1,
}),
'Weekly analytics job failed.',
);
});
});
});

View File

@@ -947,7 +947,10 @@ describe('API Client', () => {
it('trackFlyerItemInteraction should log a warning on failure', async () => {
const apiError = new Error('Network failed');
vi.mocked(global.fetch).mockRejectedValue(apiError);
// Mock global.fetch to throw an error directly to ensure the catch block is hit.
vi.spyOn(global, 'fetch').mockImplementationOnce(() => {
throw apiError;
});
const { logger } = await import('./logger.client');
// We can now await this properly because we added 'return' in apiClient.ts
@@ -959,7 +962,10 @@ describe('API Client', () => {
it('logSearchQuery should log a warning on failure', async () => {
const apiError = new Error('Network failed');
vi.mocked(global.fetch).mockRejectedValue(apiError);
// Mock global.fetch to throw an error directly to ensure the catch block is hit.
vi.spyOn(global, 'fetch').mockImplementationOnce(() => {
throw apiError;
});
const { logger } = await import('./logger.client');
const queryData = createMockSearchQueryPayload({

View File

@@ -32,13 +32,13 @@ const joinUrl = (base: string, path: string): string => {
* A promise that holds the in-progress token refresh operation.
* This prevents multiple parallel refresh requests.
*/
let refreshTokenPromise: Promise<string> | null = null;
let performTokenRefreshPromise: Promise<string> | null = null;
/**
* Attempts to refresh the access token using the HttpOnly refresh token cookie.
* @returns A promise that resolves to the new access token.
*/
const refreshToken = async (): Promise<string> => {
const _performTokenRefresh = async (): Promise<string> => {
logger.info('Attempting to refresh access token...');
try {
// Use the joinUrl helper for consistency, though usually this is a relative fetch in browser
@@ -75,11 +75,15 @@ const refreshToken = async (): Promise<string> => {
};
/**
* A custom fetch wrapper that handles automatic token refreshing.
* All authenticated API calls should use this function.
* @param url The URL to fetch.
* @param options The fetch options.
* @returns A promise that resolves to the fetch Response.
* A custom fetch wrapper that handles automatic token refreshing for authenticated API calls.
* If a request fails with a 401 Unauthorized status, it attempts to refresh the access token
* using the refresh token cookie. If successful, it retries the original request with the new token.
* All authenticated API calls should use this function or one of its helpers (e.g., `authedGet`).
*
* @param url The endpoint path (e.g., '/users/profile') or a full URL.
* @param options Standard `fetch` options (method, body, etc.).
* @param apiOptions Custom options for the API client, such as `tokenOverride` for testing or an `AbortSignal`.
* @returns A promise that resolves to the final `Response` object from the fetch call.
*/
export const apiFetch = async (
url: string,
@@ -91,6 +95,7 @@ export const apiFetch = async (
const fullUrl = url.startsWith('http') ? url : joinUrl(API_BASE_URL, url);
logger.debug(`apiFetch: ${options.method || 'GET'} ${fullUrl}`);
console.error(`[apiClient] apiFetch Request: ${options.method || 'GET'} ${fullUrl}`);
// Create a new headers object to avoid mutating the original options.
const headers = new Headers(options.headers || {});
@@ -122,12 +127,12 @@ export const apiFetch = async (
try {
logger.info(`apiFetch: Received 401 for ${fullUrl}. Attempting token refresh.`);
// If no refresh is in progress, start one.
if (!refreshTokenPromise) {
refreshTokenPromise = refreshToken();
if (!performTokenRefreshPromise) {
performTokenRefreshPromise = _performTokenRefresh();
}
// Wait for the existing or new refresh operation to complete.
const newToken = await refreshTokenPromise;
const newToken = await performTokenRefreshPromise;
logger.info(`apiFetch: Token refreshed. Retrying original request to ${fullUrl}.`);
// Retry the original request with the new token.
@@ -138,7 +143,7 @@ export const apiFetch = async (
return Promise.reject(refreshError);
} finally {
// Clear the promise so the next 401 will trigger a new refresh.
refreshTokenPromise = null;
performTokenRefreshPromise = null;
}
}
@@ -266,10 +271,18 @@ export const checkRedisHealth = (): Promise<Response> => publicGet('/health/redi
export const checkPm2Status = (): Promise<Response> => publicGet('/system/pm2-status');
/**
* Fetches all flyers from the backend.
* @returns A promise that resolves to an array of Flyer objects.
* Fetches flyers from the backend with pagination support.
* @param limit - Maximum number of flyers to fetch (default: 20)
* @param offset - Number of flyers to skip (default: 0)
* @returns A promise that resolves to a paginated response of Flyer objects.
*/
export const fetchFlyers = (): Promise<Response> => publicGet('/flyers');
export const fetchFlyers = (limit?: number, offset?: number): Promise<Response> => {
const params = new URLSearchParams();
if (limit !== undefined) params.append('limit', limit.toString());
if (offset !== undefined) params.append('offset', offset.toString());
const queryString = params.toString();
return publicGet(queryString ? `/flyers?${queryString}` : '/flyers');
};
/**
* Fetches a single flyer by its ID.
@@ -768,6 +781,25 @@ export const triggerFailingJob = (tokenOverride?: string): Promise<Response> =>
export const getJobStatus = (jobId: string, tokenOverride?: string): Promise<Response> =>
authedGet(`/ai/jobs/${jobId}/status`, { tokenOverride });
/**
* Refreshes an access token using a refresh token cookie.
* This is intended for use in Node.js test environments where cookies must be set manually.
* @param cookie The full 'Cookie' header string (e.g., "refreshToken=...").
* @returns A promise that resolves to the fetch Response.
*/
export async function refreshToken(cookie: string) {
const url = joinUrl(API_BASE_URL, '/auth/refresh-token');
const options: RequestInit = {
method: 'POST',
headers: {
'Content-Type': 'application/json',
// The browser would handle this automatically, but in Node.js tests we must set it manually.
Cookie: cookie,
},
};
return fetch(url, options);
}
/**
* Triggers the clearing of the geocoding cache on the server.
* Requires admin privileges.

View File

@@ -35,6 +35,7 @@ describe('AuthService', () => {
let DatabaseError: typeof import('./processingErrors').DatabaseError;
let UniqueConstraintError: typeof import('./db/errors.db').UniqueConstraintError;
let RepositoryError: typeof import('./db/errors.db').RepositoryError;
let ValidationError: typeof import('./db/errors.db').ValidationError;
let withTransaction: typeof import('./db/index.db').withTransaction;
const reqLog = {}; // Mock request logger object
@@ -59,7 +60,7 @@ describe('AuthService', () => {
// Set environment variables before any modules are imported
vi.stubEnv('JWT_SECRET', 'test-secret');
vi.stubEnv('FRONTEND_URL', 'http://localhost:3000');
vi.stubEnv('FRONTEND_URL', 'https://example.com');
// Mock all dependencies before dynamically importing the service
// Core modules like bcrypt, jsonwebtoken, and crypto are now mocked globally in tests-setup-unit.ts
@@ -109,6 +110,7 @@ describe('AuthService', () => {
DatabaseError = (await import('./processingErrors')).DatabaseError;
UniqueConstraintError = (await import('./db/errors.db')).UniqueConstraintError;
RepositoryError = (await import('./db/errors.db')).RepositoryError;
ValidationError = (await import('./db/errors.db')).ValidationError;
});
afterEach(() => {
@@ -168,6 +170,15 @@ describe('AuthService', () => {
expect(logger.error).toHaveBeenCalledWith({ error, email: 'test@example.com' }, `User registration failed with an unexpected error.`);
});
it('should throw ValidationError if password is weak', async () => {
const { validatePasswordStrength } = await import('../utils/authUtils');
vi.mocked(validatePasswordStrength).mockReturnValue({ isValid: false, feedback: 'Password too weak' });
await expect(
authService.registerUser('test@example.com', 'weak', 'Test User', undefined, reqLog),
).rejects.toThrow(ValidationError);
});
});
describe('registerAndLoginUser', () => {
@@ -285,6 +296,25 @@ describe('AuthService', () => {
);
expect(logger.error).toHaveBeenCalled();
});
it('should log error if sending email fails but still return token', async () => {
vi.mocked(userRepo.findUserByEmail).mockResolvedValue(mockUser);
vi.mocked(bcrypt.hash).mockImplementation(async () => 'hashed-token');
const emailError = new Error('Email failed');
vi.mocked(sendPasswordResetEmail).mockRejectedValue(emailError);
const result = await authService.resetPassword('test@example.com', reqLog);
expect(logger.error).toHaveBeenCalledWith({ emailError }, `Email send failure during password reset for user`);
expect(result).toBe('mocked_random_id');
});
it('should re-throw RepositoryError', async () => {
const repoError = new RepositoryError('Repo error', 500);
vi.mocked(userRepo.findUserByEmail).mockRejectedValue(repoError);
await expect(authService.resetPassword('test@example.com', reqLog)).rejects.toThrow(repoError);
});
});
describe('updatePassword', () => {
@@ -334,6 +364,22 @@ describe('AuthService', () => {
expect(transactionalUserRepoMocks.updateUserPassword).not.toHaveBeenCalled();
expect(result).toBeNull();
});
it('should throw ValidationError if new password is weak', async () => {
const { validatePasswordStrength } = await import('../utils/authUtils');
vi.mocked(validatePasswordStrength).mockReturnValue({ isValid: false, feedback: 'Password too weak' });
await expect(
authService.updatePassword('token', 'weak', reqLog),
).rejects.toThrow(ValidationError);
});
it('should re-throw RepositoryError from transaction', async () => {
const repoError = new RepositoryError('Repo error', 500);
vi.mocked(withTransaction).mockRejectedValue(repoError);
await expect(authService.updatePassword('token', 'newPass', reqLog)).rejects.toThrow(repoError);
});
});
describe('getUserByRefreshToken', () => {

View File

@@ -34,6 +34,9 @@ vi.mock('../services/queueService.server', () => ({
weeklyAnalyticsQueue: {
add: vi.fn(),
},
emailQueue: {
add: vi.fn(),
},
}));
import { BackgroundJobService, startBackgroundJobs } from './backgroundJobService';
@@ -131,7 +134,8 @@ describe('Background Job Service', () => {
describe('Manual Triggers', () => {
it('triggerAnalyticsReport should add a daily report job to the queue', async () => {
vi.mocked(analyticsQueue.add).mockResolvedValue({ id: 'manual-job-1' } as any);
// The mock should return the jobId passed to it to simulate bullmq's behavior
vi.mocked(analyticsQueue.add).mockImplementation(async (name, data, opts) => ({ id: opts?.jobId }) as any);
const jobId = await service.triggerAnalyticsReport();
expect(jobId).toContain('manual-report-');
@@ -143,7 +147,8 @@ describe('Background Job Service', () => {
});
it('triggerWeeklyAnalyticsReport should add a weekly report job to the queue', async () => {
vi.mocked(weeklyAnalyticsQueue.add).mockResolvedValue({ id: 'manual-weekly-job-1' } as any);
// The mock should return the jobId passed to it
vi.mocked(weeklyAnalyticsQueue.add).mockImplementation(async (name, data, opts) => ({ id: opts?.jobId }) as any);
const jobId = await service.triggerWeeklyAnalyticsReport();
expect(jobId).toContain('manual-weekly-report-');
@@ -156,6 +161,13 @@ describe('Background Job Service', () => {
{ jobId: expect.stringContaining('manual-weekly-report-') },
);
});
it('should throw if job ID is not returned from the queue', async () => {
// Mock the queue to return a job object without an 'id' property
vi.mocked(weeklyAnalyticsQueue.add).mockResolvedValue({ name: 'test-job' } as any);
await expect(service.triggerWeeklyAnalyticsReport()).rejects.toThrow();
});
});
it('should do nothing if no deals are found for any user', async () => {
@@ -172,6 +184,35 @@ describe('Background Job Service', () => {
expect(mockNotificationRepo.createBulkNotifications).not.toHaveBeenCalled();
});
it('should process a single user successfully and log notification creation', async () => {
const singleUserDeal = [
{
...createMockWatchedItemDeal({
master_item_id: 1,
item_name: 'Apples',
best_price_in_cents: 199,
}),
user_id: 'user-1',
email: 'user1@test.com',
full_name: 'User One',
},
];
mockPersonalizationRepo.getBestSalePricesForAllUsers.mockResolvedValue(singleUserDeal);
mockEmailQueue.add.mockResolvedValue({ id: 'job-1' });
await service.runDailyDealCheck();
expect(mockEmailQueue.add).toHaveBeenCalledTimes(1);
expect(mockNotificationRepo.createBulkNotifications).toHaveBeenCalledTimes(1);
const notificationPayload = mockNotificationRepo.createBulkNotifications.mock.calls[0][0];
expect(notificationPayload).toHaveLength(1);
// This assertion specifically targets line 180
expect(mockServiceLogger.info).toHaveBeenCalledWith(
`[BackgroundJob] Successfully created 1 in-app notifications.`,
);
});
it('should create notifications and enqueue emails when deals are found', async () => {
mockPersonalizationRepo.getBestSalePricesForAllUsers.mockResolvedValue(mockDealsForAllUsers);

View File

@@ -10,6 +10,11 @@ import type { PersonalizationRepository } from './db/personalization.db';
import type { NotificationRepository } from './db/notification.db';
import { analyticsQueue, weeklyAnalyticsQueue } from './queueService.server';
type UserDealGroup = {
userProfile: { user_id: string; email: string; full_name: string | null };
deals: WatchedItemDeal[];
};
interface EmailJobData {
to: string;
subject: string;
@@ -29,7 +34,10 @@ export class BackgroundJobService {
const reportDate = getCurrentDateISOString(); // YYYY-MM-DD
const jobId = `manual-report-${reportDate}-${Date.now()}`;
const job = await analyticsQueue.add('generate-daily-report', { reportDate }, { jobId });
return job.id!;
if (!job.id) {
throw new Error('Failed to enqueue daily report job: No job ID returned');
}
return job.id;
}
public async triggerWeeklyAnalyticsReport(): Promise<string> {
@@ -40,7 +48,10 @@ export class BackgroundJobService {
{ reportYear, reportWeek },
{ jobId },
);
return job.id!;
if (!job.id) {
throw new Error('Failed to enqueue weekly report job: No job ID returned');
}
return job.id;
}
/**
@@ -93,6 +104,33 @@ export class BackgroundJobService {
};
}
private async _processDealsForUser({
userProfile,
deals,
}: UserDealGroup): Promise<Omit<Notification, 'notification_id' | 'is_read' | 'created_at' | 'updated_at'> | null> {
try {
this.logger.info(
`[BackgroundJob] Found ${deals.length} deals for user ${userProfile.user_id}.`,
);
// Prepare in-app and email notifications.
const notification = this._prepareInAppNotification(userProfile.user_id, deals.length);
const { jobData, jobId } = this._prepareDealEmail(userProfile, deals);
// Enqueue an email notification job.
await this.emailQueue.add('send-deal-notification', jobData, { jobId });
// Return the notification to be collected for bulk insertion.
return notification;
} catch (userError) {
this.logger.error(
{ err: userError },
`[BackgroundJob] Failed to process deals for user ${userProfile.user_id}`,
);
return null; // Return null on error for this user.
}
}
/**
* Checks for new deals on watched items for all users and sends notifications.
* This function is designed to be run periodically (e.g., daily).
@@ -112,76 +150,47 @@ export class BackgroundJobService {
this.logger.info(`[BackgroundJob] Found ${allDeals.length} total deals across all users.`);
// 2. Group deals by user in memory.
const dealsByUser = allDeals.reduce<
Record<
string,
{
userProfile: { user_id: string; email: string; full_name: string | null };
deals: WatchedItemDeal[];
}
>
>((acc, deal) => {
if (!acc[deal.user_id]) {
acc[deal.user_id] = {
const dealsByUser = new Map<string, UserDealGroup>();
for (const deal of allDeals) {
let userGroup = dealsByUser.get(deal.user_id);
if (!userGroup) {
userGroup = {
userProfile: { user_id: deal.user_id, email: deal.email, full_name: deal.full_name },
deals: [],
};
dealsByUser.set(deal.user_id, userGroup);
}
acc[deal.user_id].deals.push(deal);
return acc;
}, {});
const allNotifications: Omit<
Notification,
'notification_id' | 'is_read' | 'created_at' | 'updated_at'
>[] = [];
userGroup.deals.push(deal);
}
// 3. Process each user's deals in parallel.
const userProcessingPromises = Object.values(dealsByUser).map(
async ({ userProfile, deals }) => {
try {
this.logger.info(
`[BackgroundJob] Found ${deals.length} deals for user ${userProfile.user_id}.`,
);
// 4. Prepare in-app and email notifications.
const notification = this._prepareInAppNotification(userProfile.user_id, deals.length);
const { jobData, jobId } = this._prepareDealEmail(userProfile, deals);
// 5. Enqueue an email notification job.
await this.emailQueue.add('send-deal-notification', jobData, { jobId });
// Return the notification to be collected for bulk insertion.
return notification;
} catch (userError) {
this.logger.error(
{ err: userError },
`[BackgroundJob] Failed to process deals for user ${userProfile.user_id}`,
);
return null; // Return null on error for this user.
}
},
const userProcessingPromises = Array.from(dealsByUser.values()).map((userGroup) =>
this._processDealsForUser(userGroup),
);
// Wait for all user processing to complete.
const results = await Promise.allSettled(userProcessingPromises);
// 6. Collect all successfully created notifications.
results.forEach((result) => {
if (result.status === 'fulfilled' && result.value) {
allNotifications.push(result.value);
}
});
const successfulNotifications = results
.filter(
(
result,
): result is PromiseFulfilledResult<
Omit<Notification, 'notification_id' | 'is_read' | 'created_at' | 'updated_at'>
> => result.status === 'fulfilled' && !!result.value,
)
.map((result) => result.value);
// 7. Bulk insert all in-app notifications in a single query.
if (allNotifications.length > 0) {
const notificationsForDb = allNotifications.map((n) => ({
if (successfulNotifications.length > 0) {
const notificationsForDb = successfulNotifications.map((n) => ({
...n,
updated_at: new Date().toISOString(),
}));
await this.notificationRepo.createBulkNotifications(notificationsForDb, this.logger);
this.logger.info(
`[BackgroundJob] Successfully created ${allNotifications.length} in-app notifications.`,
`[BackgroundJob] Successfully created ${successfulNotifications.length} in-app notifications.`,
);
}

View File

@@ -6,6 +6,7 @@ import {
UniqueConstraintError,
ForeignKeyConstraintError,
NotFoundError,
ForbiddenError,
ValidationError,
FileUploadError,
NotNullConstraintError,
@@ -89,6 +90,25 @@ describe('Custom Database and Application Errors', () => {
});
});
describe('ForbiddenError', () => {
it('should create an error with a default message and status 403', () => {
const error = new ForbiddenError();
expect(error).toBeInstanceOf(Error);
expect(error).toBeInstanceOf(RepositoryError);
expect(error).toBeInstanceOf(ForbiddenError);
expect(error.message).toBe('Access denied.');
expect(error.status).toBe(403);
expect(error.name).toBe('ForbiddenError');
});
it('should create an error with a custom message', () => {
const message = 'You shall not pass.';
const error = new ForbiddenError(message);
expect(error.message).toBe(message);
});
});
describe('ValidationError', () => {
it('should create an error with a default message, status 400, and validation errors array', () => {
const validationIssues = [{ path: ['email'], message: 'Invalid email' }];

View File

@@ -86,6 +86,16 @@ export class NotFoundError extends RepositoryError {
}
}
/**
* Thrown when the user does not have permission to access the resource.
*/
export class ForbiddenError extends RepositoryError {
constructor(message = 'Access denied.') {
super(message, 403); // 403 Forbidden
this.name = 'ForbiddenError';
}
}
/**
* Defines the structure for a single validation issue, often from a library like Zod.
*/

View File

@@ -132,8 +132,8 @@ describe('Flyer DB Service', () => {
it('should execute an INSERT query and return the new flyer', async () => {
const flyerData: FlyerDbInsert = {
file_name: 'test.jpg',
image_url: 'http://localhost:3001/images/test.jpg',
icon_url: 'http://localhost:3001/images/icons/test.jpg',
image_url: 'https://example.com/images/test.jpg',
icon_url: 'https://example.com/images/icons/test.jpg',
checksum: 'checksum123',
store_id: 1,
valid_from: '2024-01-01',
@@ -155,8 +155,8 @@ describe('Flyer DB Service', () => {
expect.stringContaining('INSERT INTO flyers'),
[
'test.jpg',
'http://localhost:3001/images/test.jpg',
'http://localhost:3001/images/icons/test.jpg',
'https://example.com/images/test.jpg',
'https://example.com/images/icons/test.jpg',
'checksum123',
1,
'2024-01-01',
@@ -360,6 +360,58 @@ describe('Flyer DB Service', () => {
'Database error in insertFlyerItems',
);
});
it('should sanitize empty or whitespace-only price_display to "N/A"', async () => {
const itemsData: FlyerItemInsert[] = [
{
item: 'Free Item',
price_display: '', // Empty string
price_in_cents: 0,
quantity: '1',
category_name: 'Promo',
view_count: 0,
click_count: 0,
},
{
item: 'Whitespace Item',
price_display: ' ', // Whitespace only
price_in_cents: null,
quantity: '1',
category_name: 'Promo',
view_count: 0,
click_count: 0,
},
];
const mockItems = itemsData.map((item, i) =>
createMockFlyerItem({ ...item, flyer_item_id: i + 1, flyer_id: 1 }),
);
mockPoolInstance.query.mockResolvedValue({ rows: mockItems });
await flyerRepo.insertFlyerItems(1, itemsData, mockLogger);
expect(mockPoolInstance.query).toHaveBeenCalledTimes(1);
// Check that the values array passed to the query has null for price_display
const queryValues = mockPoolInstance.query.mock.calls[0][1];
expect(queryValues).toEqual([
1, // flyerId for item 1
'Free Item',
"N/A", // Sanitized price_display for item 1
0,
'1',
'Promo',
0,
0,
1, // flyerId for item 2
'Whitespace Item',
"N/A", // Sanitized price_display for item 2
null,
'1',
'Promo',
0,
0,
]);
});
});
describe('createFlyerAndItems', () => {
@@ -433,6 +485,34 @@ describe('Flyer DB Service', () => {
);
});
it('should create a flyer with no items if items array is empty', async () => {
const flyerData: FlyerInsert = {
file_name: 'empty.jpg',
store_name: 'Empty Store',
} as FlyerInsert;
const itemsData: FlyerItemInsert[] = [];
const mockFlyer = createMockFlyer({ ...flyerData, flyer_id: 100, store_id: 2 });
const mockClient = { query: vi.fn() };
mockClient.query
.mockResolvedValueOnce({ rows: [], rowCount: 0 }) // findOrCreateStore (insert)
.mockResolvedValueOnce({ rows: [{ store_id: 2 }] }) // findOrCreateStore (select)
.mockResolvedValueOnce({ rows: [mockFlyer] }); // insertFlyer
const result = await createFlyerAndItems(
flyerData,
itemsData,
mockLogger,
mockClient as unknown as PoolClient,
);
expect(result).toEqual({
flyer: mockFlyer,
items: [],
});
expect(mockClient.query).toHaveBeenCalledTimes(3);
});
it('should propagate an error if any step fails', async () => {
const flyerData: FlyerInsert = {
file_name: 'fail.jpg',

View File

@@ -63,7 +63,36 @@ export class FlyerRepository {
* @returns The newly created flyer record with its ID.
*/
async insertFlyer(flyerData: FlyerDbInsert, logger: Logger): Promise<Flyer> {
console.error('[DB DEBUG] FlyerRepository.insertFlyer called with:', JSON.stringify(flyerData, null, 2));
// Sanitize icon_url: Ensure empty strings become NULL to avoid regex constraint violations
let iconUrl = flyerData.icon_url && flyerData.icon_url.trim() !== '' ? flyerData.icon_url : null;
let imageUrl = flyerData.image_url || 'placeholder.jpg';
try {
// Fallback for tests/workers sending relative URLs to satisfy DB 'url_check' constraint
const rawBaseUrl = process.env.FRONTEND_URL || 'https://example.com';
const baseUrl = rawBaseUrl.endsWith('/') ? rawBaseUrl.slice(0, -1) : rawBaseUrl;
// [DEBUG] Log URL transformation for debugging test failures
if ((imageUrl && !imageUrl.startsWith('http')) || (iconUrl && !iconUrl.startsWith('http'))) {
console.error('[DB DEBUG] Transforming relative URLs:', {
baseUrl,
originalImage: imageUrl,
originalIcon: iconUrl,
});
}
if (imageUrl && !imageUrl.startsWith('http')) {
const cleanPath = imageUrl.startsWith('/') ? imageUrl.substring(1) : imageUrl;
imageUrl = `${baseUrl}/${cleanPath}`;
}
if (iconUrl && !iconUrl.startsWith('http')) {
const cleanPath = iconUrl.startsWith('/') ? iconUrl.substring(1) : iconUrl;
iconUrl = `${baseUrl}/${cleanPath}`;
}
console.error('[DB DEBUG] Final URLs for insert:', { imageUrl, iconUrl });
const query = `
INSERT INTO flyers (
file_name, image_url, icon_url, checksum, store_id, valid_from, valid_to, store_address,
@@ -74,8 +103,8 @@ export class FlyerRepository {
`;
const values = [
flyerData.file_name, // $1
flyerData.image_url, // $2
flyerData.icon_url, // $3
imageUrl, // $2
iconUrl, // $3
flyerData.checksum, // $4
flyerData.store_id, // $5
flyerData.valid_from, // $6
@@ -94,16 +123,32 @@ export class FlyerRepository {
const result = await this.db.query<Flyer>(query, values);
return result.rows[0];
} catch (error) {
console.error('[DB DEBUG] insertFlyer caught error:', error);
const errorMessage = error instanceof Error ? error.message : '';
let checkMsg = 'A database check constraint failed.';
// [ENHANCED LOGGING]
if (errorMessage.includes('url_check')) {
logger.error(
{
error: errorMessage,
offendingData: {
image_url: flyerData.image_url,
icon_url: flyerData.icon_url, // Log raw input
sanitized_icon_url: flyerData.icon_url && flyerData.icon_url.trim() !== '' ? flyerData.icon_url : null
}
},
'[DB ERROR] URL Check Constraint Failed. Inspecting URLs.'
);
}
if (errorMessage.includes('flyers_checksum_check')) {
checkMsg =
'The provided checksum is invalid or does not meet format requirements (e.g., must be a 64-character SHA-256 hash).';
} else if (errorMessage.includes('flyers_status_check')) {
checkMsg = 'Invalid status provided for flyer.';
} else if (errorMessage.includes('url_check')) {
checkMsg = 'Invalid URL format provided for image or icon.';
checkMsg = `[URL_CHECK_FAIL] Invalid URL format. Image: '${imageUrl}', Icon: '${iconUrl}'`;
}
handleDbError(error, logger, 'Database error in insertFlyer', { flyerData }, {
@@ -139,10 +184,18 @@ export class FlyerRepository {
valueStrings.push(
`($${paramIndex++}, $${paramIndex++}, $${paramIndex++}, $${paramIndex++}, $${paramIndex++}, $${paramIndex++}, $${paramIndex++}, $${paramIndex++})`,
);
// Sanitize price_display. The database requires a non-empty string.
// We provide a default value if the input is null, undefined, or an empty string.
const priceDisplay =
item.price_display && item.price_display.trim() !== ''
? item.price_display
: 'N/A';
values.push(
flyerId,
item.item,
item.price_display,
priceDisplay,
item.price_in_cents ?? null,
item.quantity ?? '',
item.category_name ?? null,

View File

@@ -152,6 +152,34 @@ export class RecipeRepository {
}
}
/**
* Creates a new recipe.
* @param userId The ID of the user creating the recipe.
* @param recipeData The data for the new recipe.
* @returns A promise that resolves to the newly created Recipe object.
*/
async createRecipe(
userId: string,
recipeData: Pick<Recipe, 'name' | 'instructions' | 'description' | 'prep_time_minutes' | 'cook_time_minutes' | 'servings' | 'photo_url'>,
logger: Logger
): Promise<Recipe> {
try {
const { name, instructions, description, prep_time_minutes, cook_time_minutes, servings, photo_url } = recipeData;
const res = await this.db.query<Recipe>(
`INSERT INTO public.recipes
(user_id, name, instructions, description, prep_time_minutes, cook_time_minutes, servings, photo_url, status)
VALUES ($1, $2, $3, $4, $5, $6, $7, $8, 'public')
RETURNING *`,
[userId, name, instructions, description, prep_time_minutes, cook_time_minutes, servings, photo_url]
);
return res.rows[0];
} catch (error) {
handleDbError(error, logger, 'Database error in createRecipe', { userId, recipeData }, {
defaultMessage: 'Failed to create recipe.',
});
}
}
/**
* Deletes a recipe, ensuring ownership.
* @param recipeId The ID of the recipe to delete.

View File

@@ -596,7 +596,7 @@ describe('Shopping DB Service', () => {
const mockReceipt = {
receipt_id: 1,
user_id: 'user-1',
receipt_image_url: 'http://example.com/receipt.jpg',
receipt_image_url: 'https://example.com/receipt.jpg',
status: 'pending',
};
mockPoolInstance.query.mockResolvedValue({ rows: [mockReceipt] });

View File

@@ -415,8 +415,12 @@ export class UserRepository {
// prettier-ignore
async deleteUserById(userId: string, logger: Logger): Promise<void> {
try {
await this.db.query('DELETE FROM public.users WHERE user_id = $1', [userId]);
} catch (error) { // This was a duplicate, fixed.
const res = await this.db.query('DELETE FROM public.users WHERE user_id = $1', [userId]);
if (res.rowCount === 0) {
throw new NotFoundError(`User with ID ${userId} not found.`);
}
} catch (error) {
if (error instanceof NotFoundError) throw error;
handleDbError(error, logger, 'Database error in deleteUserById', { userId }, {
defaultMessage: 'Failed to delete user from database.',
});

View File

@@ -50,6 +50,7 @@ describe('Email Service (Server)', () => {
beforeEach(async () => {
console.log('[TEST SETUP] Setting up Email Service mocks');
vi.clearAllMocks();
vi.stubEnv('FRONTEND_URL', 'https://test.flyer.com');
// Reset to default successful implementation
mocks.sendMail.mockImplementation((mailOptions: { to: string }) => {
console.log('[TEST DEBUG] mockSendMail (default) called with:', mailOptions?.to);
@@ -60,12 +61,17 @@ describe('Email Service (Server)', () => {
});
});
describe('sendPasswordResetEmail', () => {
it('should call sendMail with the correct recipient, subject, and link', async () => {
const to = 'test@example.com';
const resetLink = 'http://localhost:3000/reset/mock-token-123';
afterEach(() => {
vi.unstubAllEnvs();
});
await sendPasswordResetEmail(to, resetLink, logger);
describe('sendPasswordResetEmail', () => {
it('should call sendMail with the correct recipient, subject, and constructed link', async () => {
const to = 'test@example.com';
const token = 'mock-token-123';
const expectedResetUrl = `https://test.flyer.com/reset-password?token=${token}`;
await sendPasswordResetEmail(to, token, logger);
expect(mocks.sendMail).toHaveBeenCalledTimes(1);
const mailOptions = mocks.sendMail.mock.calls[0][0] as {
@@ -77,9 +83,8 @@ describe('Email Service (Server)', () => {
expect(mailOptions.to).toBe(to);
expect(mailOptions.subject).toBe('Your Password Reset Request');
expect(mailOptions.text).toContain(resetLink);
// The implementation constructs the link, so we check that our mock link is present inside the href
expect(mailOptions.html).toContain(resetLink);
expect(mailOptions.text).toContain(expectedResetUrl);
expect(mailOptions.html).toContain(`href="${expectedResetUrl}"`);
});
});
@@ -269,5 +274,22 @@ describe('Email Service (Server)', () => {
'Email job failed.',
);
});
it('should handle non-Error objects thrown during processing', async () => {
const job = createMockJob(mockJobData);
const emailErrorString = 'SMTP Connection Failed as a string';
mocks.sendMail.mockRejectedValue(emailErrorString);
await expect(processEmailJob(job)).rejects.toThrow(emailErrorString);
expect(logger.error).toHaveBeenCalledWith(
{
err: expect.objectContaining({ message: emailErrorString }),
jobData: mockJobData,
attemptsMade: 1,
},
'Email job failed.',
);
});
});
});

View File

@@ -21,7 +21,7 @@ const createMockJobData = (data: Partial<FlyerJobData>): FlyerJobData => ({
filePath: '/tmp/flyer.jpg',
originalFileName: 'flyer.jpg',
checksum: 'checksum-123',
baseUrl: 'http://localhost:3000',
baseUrl: 'https://example.com',
...data,
});

Some files were not shown because too many files have changed in this diff Show More