feat(website-intake): dual-write endpoint + migration chain repair

Adds website_submissions table + shared-secret POST endpoint so the
marketing site can dual-write inquiries alongside its NocoDB write.
Race-safe via INSERT ... ON CONFLICT, idempotent on submission_id,
refuses every request when WEBSITE_INTAKE_SECRET is unset. Also
repairs pre-existing 0020/0021/0022 prevId collision (renumbered +
journal re-sorted) so db:generate works again. 11 unit tests.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
Matt Ciaccio
2026-05-04 22:52:33 +02:00
parent c612bbdfd9
commit 49d34e00c8
16 changed files with 11556 additions and 28 deletions

View File

@@ -0,0 +1,69 @@
/**
* Dedicated test for the 503 path on /api/public/website-inquiries.
*
* Lives in its own file rather than sharing the main test file because
* the test mocks `@/lib/env` to return an empty object - that mock would
* leak into other tests in the same file via Vitest's module cache,
* making the rest of the suite return 503 instead of the expected
* status. Isolating to a single-test file sidesteps that entirely.
*
* Asserts the security-critical contract: when WEBSITE_INTAKE_SECRET is
* unset, every request gets 503, regardless of headers or payload. This
* is the dev/staging posture; without it, the endpoint would be
* unauthenticated.
*/
import { describe, expect, it, vi } from 'vitest';
vi.mock('@/lib/env', () => ({
env: {}, // WEBSITE_INTAKE_SECRET intentionally unset
}));
vi.mock('@/lib/rate-limit', () => ({
rateLimiters: { websiteIntake: { limit: 10, window: 60_000 } },
checkRateLimit: vi.fn(async () => ({ allowed: true, resetAt: Date.now() })),
}));
vi.mock('@/lib/logger', () => ({
logger: { info: vi.fn(), warn: vi.fn(), error: vi.fn() },
}));
vi.mock('@/lib/db', () => ({
db: {
select: () => ({ from: () => ({ where: () => ({ limit: async () => [] }) }) }),
insert: () => ({
values: () => ({
onConflictDoNothing: () => ({ returning: async () => [] }),
}),
}),
},
}));
function makeReq(body: unknown, headers: Record<string, string> = {}) {
return {
headers: {
get(name: string) {
return headers[name.toLowerCase()] ?? null;
},
},
json: async () => body,
} as unknown as import('next/server').NextRequest;
}
describe('POST /api/public/website-inquiries — 503 when secret unset', () => {
it('returns 503 even when a "valid" header + payload are supplied', async () => {
const { POST } = await import('@/app/api/public/website-inquiries/route');
const res = await POST(
makeReq(
{
submission_id: '11111111-1111-4111-8111-111111111111',
kind: 'berth_inquiry',
payload: {},
},
{ 'x-webhook-secret': 'anything-here-doesnt-matter' },
),
);
expect(res.status).toBe(503);
const body = await res.json();
expect(body.error).toMatch(/not configured/i);
});
});