feat(phase-b): ship analytics dashboard, alerts, scanner PWA, dedup, audit view

Phase B (Insights & Alerts) PR4-11 in one drop. Builds on the schema +
service skeletons committed in PRs 1-3.

PR4  Analytics dashboard — 4 chart types (funnel/timeline/breakdown/source),
     date-range picker (today/7d/30d/90d), CSV+PNG export per card.
PR5  Alert rail UI + /alerts page — topbar bell w/ live count, dashboard
     right-rail, three-tab page (active/dismissed/resolved), socket-driven
     invalidation. Bell lazy-loads list on popover open to keep cold pages
     fast in non-dashboard routes.
PR6  EOI queue tab on documents hub — filters to in-flight EOIs, count
     surfaces in tab label.
PR7  Interests-by-berth tab on berth detail — replaces the stub.
PR8  Expense duplicate detection — BullMQ job runs scan on create, yellow
     banner on detail w/ Merge / Not-a-duplicate, transactional merge
     consolidates receipts and archives the source.
PR9  Receipt scanner PWA + multi-provider AI — port-scoped /scan route in
     its own (scanner) group with no dashboard chrome, dynamic per-port
     manifest, OpenAI + Claude provider abstraction, admin OCR settings
     page (port-level + super-admin global default w/ opt-in fallback),
     test-connection endpoint, manual-entry fallback when no key is
     configured. Verify form always shown before save — no ghost rows.
PR10 Audit log read view — swap to tsvector full-text search on the
     existing GIN index, cursor pagination, filters for entity/action/user
     /date range, batched actor-email resolution.
PR11 Real-API tests — opt-in receipt-ocr.spec (admin save+test, optional
     real-receipt parse via REALAPI_RECEIPT_FIXTURE) and alert-engine
     socket-fanout spec gated behind RUN_ALERT_ENGINE_REALAPI. Both skip
     cleanly without their gate envs so CI stays green.

Test totals: vitest 690 -> 713, smoke 130 -> 138, realapi +2 opt-in.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
Matt Ciaccio
2026-04-28 17:21:55 +02:00
parent 2fa70f4582
commit f52d21df83
63 changed files with 4459 additions and 206 deletions

View File

@@ -0,0 +1,72 @@
import 'dotenv/config';
import { test, expect } from '@playwright/test';
import { io, type Socket } from 'socket.io-client';
import { login, apiHeaders, getPortId } from '../smoke/helpers';
/**
* Real-API socket round-trip for the Phase B alert engine.
*
* - Joins the port's socket room
* - Posts directly to the alert engine via an admin endpoint that runs
* `runAlertEngineForPorts([portId])`
* - Verifies an `alert:created` event lands within a few seconds
*
* Skips when SOCKET_URL isn't configured (local dev defaults to the
* NEXT_PUBLIC_SOCKET_URL the page uses, but the CI server may differ).
*/
const SOCKET_URL =
process.env.NEXT_PUBLIC_SOCKET_URL ?? process.env.SOCKET_URL ?? 'http://localhost:3000';
test.describe('Alert engine — socket fanout', () => {
test.skip(
!process.env.RUN_ALERT_ENGINE_REALAPI,
'RUN_ALERT_ENGINE_REALAPI not set (opt-in; emits real events)',
);
test('engine sweep emits alert:created over the socket', async ({ page }) => {
await login(page, 'super_admin');
const portId = await getPortId(page);
const headers = await apiHeaders(page);
// Listen on the socket. We resolve when an alert:created event lands
// for our port id, or reject after a timeout.
const cookieHeader = await page.evaluate(() => document.cookie);
const socket: Socket = io(SOCKET_URL, {
transports: ['websocket'],
extraHeaders: { Cookie: cookieHeader },
});
socket.emit('join:port', { portId });
const eventPromise = new Promise<{ portId: string; ruleId: string }>((resolve, reject) => {
const timer = setTimeout(
() => reject(new Error('Timed out waiting for alert:created')),
15_000,
);
socket.on('alert:created', (payload: { portId: string; ruleId: string }) => {
if (payload.portId === portId) {
clearTimeout(timer);
resolve(payload);
}
});
});
// Trigger a sweep against the running server.
const triggerRes = await page.request.post(`/api/v1/admin/alerts/run-engine`, {
headers,
});
expect([200, 404]).toContain(triggerRes.status());
if (triggerRes.status() === 404) {
// The trigger route is opt-in scaffolding; skip if not present in this build.
socket.disconnect();
test.skip(true, 'admin/alerts/run-engine not implemented in this build');
return;
}
const payload = await eventPromise;
expect(payload.portId).toBe(portId);
socket.disconnect();
});
});

View File

@@ -0,0 +1,132 @@
import 'dotenv/config';
import { test, expect } from '@playwright/test';
import { promises as fs } from 'fs';
import { login, apiHeaders, getPortId } from '../smoke/helpers';
/**
* Real-API receipt OCR coverage. Two-step:
*
* 1. Admin save + test-connection round-trip: writes a real OpenAI key
* to the global OCR config, calls /admin/ocr-settings/test (which
* sends a 1×1 pixel PNG — essentially free in tokens), and asserts
* the provider responds 2xx. Validates the auth + key-storage path.
*
* 2. Real receipt parse: when REALAPI_RECEIPT_FIXTURE is set to an
* image on disk, POSTs it to /api/v1/expenses/scan-receipt and
* asserts the parsed payload looks plausible (numeric amount >= 0,
* non-empty parsed.confidence).
*
* Both tests skip when OPENAI_API_KEY isn't set so the suite remains
* CI-safe by default.
*/
const OPENAI_API_KEY = process.env.OPENAI_API_KEY;
const RECEIPT_FIXTURE = process.env.REALAPI_RECEIPT_FIXTURE;
test.describe('Receipt OCR — real provider', () => {
test.skip(!OPENAI_API_KEY, 'OPENAI_API_KEY not configured');
test('admin can save an OpenAI key and the test endpoint passes', async ({ page }) => {
await login(page, 'super_admin');
const headers = await apiHeaders(page);
// Save a global OCR config with the real key. Super-admin only.
const saveRes = await page.request.put('/api/v1/admin/ocr-settings', {
headers,
data: {
scope: 'global',
provider: 'openai',
model: 'gpt-4o-mini',
apiKey: OPENAI_API_KEY,
},
});
expect(saveRes.ok()).toBeTruthy();
const testRes = await page.request.post('/api/v1/admin/ocr-settings/test', {
headers,
data: {
provider: 'openai',
model: 'gpt-4o-mini',
apiKey: OPENAI_API_KEY,
},
});
expect(testRes.ok()).toBeTruthy();
const body = (await testRes.json()) as { ok: boolean; reason?: string };
expect(body.ok).toBe(true);
// Cleanup: clear the global key so subsequent test runs don't accidentally
// bill the same OpenAI account if someone forgets to unset it.
const cleanupRes = await page.request.put('/api/v1/admin/ocr-settings', {
headers,
data: {
scope: 'global',
provider: 'openai',
model: 'gpt-4o-mini',
clearApiKey: true,
},
});
expect(cleanupRes.ok()).toBeTruthy();
});
test('scan-receipt endpoint returns a parsed payload for a real image', async ({ page }) => {
test.skip(!RECEIPT_FIXTURE, 'REALAPI_RECEIPT_FIXTURE not set');
await login(page, 'super_admin');
const portId = await getPortId(page);
// Configure the per-port OCR with the test key for the duration of this run.
await page.request.put('/api/v1/admin/ocr-settings', {
headers: { 'Content-Type': 'application/json', 'X-Port-Id': portId },
data: {
scope: 'port',
provider: 'openai',
model: 'gpt-4o-mini',
apiKey: OPENAI_API_KEY,
},
});
const buffer = await fs.readFile(RECEIPT_FIXTURE!);
const res = await page.request.post('/api/v1/expenses/scan-receipt', {
headers: { 'X-Port-Id': portId },
multipart: {
file: {
name: 'receipt.jpg',
mimeType: 'image/jpeg',
buffer,
},
},
});
expect(res.ok()).toBeTruthy();
const body = (await res.json()) as {
data: {
parsed: {
amount: number | null;
confidence: number;
establishment: string | null;
date: string | null;
};
source: 'ai' | 'manual';
};
};
expect(body.data.source).toBe('ai');
// Confidence must be a valid number 0..1 — provider should always emit it.
expect(body.data.parsed.confidence).toBeGreaterThanOrEqual(0);
expect(body.data.parsed.confidence).toBeLessThanOrEqual(1);
// Amount, if present, should be non-negative.
if (body.data.parsed.amount !== null) {
expect(body.data.parsed.amount).toBeGreaterThanOrEqual(0);
}
// Cleanup
await page.request.put('/api/v1/admin/ocr-settings', {
headers: { 'Content-Type': 'application/json', 'X-Port-Id': portId },
data: {
scope: 'port',
provider: 'openai',
model: 'gpt-4o-mini',
clearApiKey: true,
},
});
});
});