Nicholai b20db98051
Some checks failed
CI / build-and-test (pull_request) Failing after 1m19s
feat(ci,flags,ops): ship end-to-end CI, feature-flag framework, gated surfaces, and ops docs
CI (.gitea/workflows/ci.yaml): lint → typecheck → vitest w/ coverage → OpenNext build → preview smoke → bundle-size budgets; Node 20; npm ci; artifacts; safe env; D1 dry-run scaffold.

Budgets: add scripts/budgets.mjs; TOTAL_STATIC_MAX_BYTES and MAX_ASSET_BYTES thresholds; report top offenders; fail on breach; README CI section.

Flags: add lib/flags.ts with typed booleans and safe defaults (ADMIN_ENABLED, ARTISTS_MODULE_ENABLED, UPLOADS_ADMIN_ENABLED, BOOKING_ENABLED, PUBLIC_APPOINTMENT_REQUESTS_ENABLED, REFERENCE_UPLOADS_PUBLIC_ENABLED, DEPOSITS_ENABLED, PUBLIC_DB_ARTISTS_ENABLED, ADVANCED_NAV_SCROLL_ANIMATIONS_ENABLED, STRICT_CI_GATES_ENABLED, ISR_CACHE_R2_ENABLED); robust parsing; client provider; unit tests.

Wiring: gate Admin shell and admin write APIs (503 JSON on uploads and artists writes); disable booking submit and short-circuit booking mutations when off; render static Hero/Artists when advanced animations off; tests for UI and API guards.

Ops: expand docs/prd/rollback-strategy.md with “Feature Flags Operations,” Cloudflare Dashboard and wrangler.toml steps, preview simulation, incident playbook, and post-toggle smoke checklist.

Release: add docs/releases/2025-09-19-feature-flags-rollout.md with last-good commit, preview/production flag matrices, rollback notes, and smoke results; link from rollback doc.

Chore: fix TS issues (gift-cards boolean handling, Lenis options, tailwind darkMode), remove next-on-pages peer conflict, update package.json scripts, configure Gitea act_runner label, open draft PR to trigger CI.

Refs: CI-1, FF-1, FF-2, FF-3, OPS-1
Impact: defaults preserve current behavior; no runtime changes unless flags flipped
2025-09-19 21:33:09 -06:00

172 lines
4.7 KiB
TypeScript

import { NextRequest, NextResponse } from "next/server"
import { requireAuth } from "@/lib/auth"
import { UserRole } from "@/types/database"
import { updateArtistSchema } from "@/lib/validations"
import { db } from "@/lib/db"
import { Flags } from "@/lib/flags"
// GET /api/artists/[id] - Fetch a specific artist
export async function GET(
request: NextRequest,
{ params }: { params: { id: string } }
) {
try {
const { id } = params
// TODO: Implement via Supabase MCP
// const artist = await db.artists.findUnique(id)
// Mock response for now
const mockArtist = {
id,
userId: "user-1",
name: "Alex Rivera",
bio: "Specializing in traditional and neo-traditional tattoos with over 8 years of experience.",
specialties: ["Traditional", "Neo-Traditional", "Color Work"],
instagramHandle: "alexrivera_tattoo",
isActive: true,
hourlyRate: 150,
portfolioImages: [
{
id: "img-1",
artistId: id,
url: "/artists/alex-rivera-traditional-rose.jpg",
caption: "Traditional rose tattoo",
tags: ["traditional", "rose", "color"],
order: 1,
isPublic: true,
createdAt: new Date(),
},
],
availability: [],
createdAt: new Date(),
updatedAt: new Date(),
}
if (!mockArtist) {
return NextResponse.json(
{ error: "Artist not found" },
{ status: 404 }
)
}
return NextResponse.json(mockArtist)
} catch (error) {
console.error("Error fetching artist:", error)
return NextResponse.json(
{ error: "Failed to fetch artist" },
{ status: 500 }
)
}
}
// PUT /api/artists/[id] - Update a specific artist (Admin only)
export async function PUT(
request: NextRequest,
{ params }: { params: { id: string } }
) {
try {
if (!Flags.ARTISTS_MODULE_ENABLED) {
return NextResponse.json({ error: 'Artists module disabled' }, { status: 503 })
}
// Require admin authentication
const session = await requireAuth(UserRole.SHOP_ADMIN)
const { id } = params
const body = await request.json()
const validatedData = updateArtistSchema.parse({ ...body, id })
// TODO: Implement via Supabase MCP
// const updatedArtist = await db.artists.update(id, validatedData)
// Mock response for now
const mockUpdatedArtist = {
id,
userId: "user-1",
name: validatedData.name || "Alex Rivera",
bio: validatedData.bio || "Updated bio",
specialties: validatedData.specialties || ["Traditional"],
instagramHandle: validatedData.instagramHandle,
isActive: validatedData.isActive ?? true,
hourlyRate: validatedData.hourlyRate,
portfolioImages: [],
availability: [],
createdAt: new Date("2024-01-01"),
updatedAt: new Date(),
}
return NextResponse.json(mockUpdatedArtist)
} catch (error) {
console.error("Error updating artist:", error)
if (error instanceof Error) {
if (error.message.includes("Authentication required")) {
return NextResponse.json(
{ error: "Authentication required" },
{ status: 401 }
)
}
if (error.message.includes("Insufficient permissions")) {
return NextResponse.json(
{ error: "Insufficient permissions" },
{ status: 403 }
)
}
}
return NextResponse.json(
{ error: "Failed to update artist" },
{ status: 500 }
)
}
}
// DELETE /api/artists/[id] - Delete a specific artist (Admin only)
export async function DELETE(
request: NextRequest,
{ params }: { params: { id: string } }
) {
try {
if (!Flags.ARTISTS_MODULE_ENABLED) {
return NextResponse.json({ error: 'Artists module disabled' }, { status: 503 })
}
// Require admin authentication
await requireAuth(UserRole.SHOP_ADMIN)
const { id } = params
// TODO: Implement via Supabase MCP
// await db.artists.delete(id)
// Mock response for now
console.log(`Artist ${id} would be deleted`)
return NextResponse.json(
{ message: "Artist deleted successfully" },
{ status: 200 }
)
} catch (error) {
console.error("Error deleting artist:", error)
if (error instanceof Error) {
if (error.message.includes("Authentication required")) {
return NextResponse.json(
{ error: "Authentication required" },
{ status: 401 }
)
}
if (error.message.includes("Insufficient permissions")) {
return NextResponse.json(
{ error: "Insufficient permissions" },
{ status: 403 }
)
}
}
return NextResponse.json(
{ error: "Failed to delete artist" },
{ status: 500 }
)
}
}