diff --git a/backend/README.md b/backend/README.md index df1da95..56fa291 100644 --- a/backend/README.md +++ b/backend/README.md @@ -50,6 +50,7 @@ Compose uses the same image for `api` and the one-off `migrate` job. - `GET /api/v1/danime?part_id=...` — scrape dアニメ episode metadata (returns `{ ep_num, ep_title, season_name, playback_length }`) - `POST /api/v1/oauth/firebase` — verify a Firebase ID token and echo back UID/email - `POST /api/v1/oauth/firebase/claim-admin` — set the `admin` custom claim for a given Firebase UID +- `GET /api/v1/archive` — list archived items (auth + admin required) - `DELETE /api/v1/shows?id=...` — delete a show (guarded by Firebase auth when `AUTH_ENABLED=true`) - `GET /healthz` — health check @@ -65,6 +66,10 @@ curl -X POST http://localhost:8082/api/v1/oauth/firebase/claim-admin \ -H "Content-Type: application/json" \ -d '{"uid":""}' +# List archive (admin only) +curl -X GET http://localhost:8082/api/v1/archive \ + -H "Authorization: Bearer " + # Delete a show with auth curl -X DELETE "http://localhost:8082/api/v1/shows?id=123" \ -H "Authorization: Bearer " diff --git a/backend/internal/core/episode/model.go b/backend/internal/core/episode/model.go index 9b8f280..57b3e01 100644 --- a/backend/internal/core/episode/model.go +++ b/backend/internal/core/episode/model.go @@ -26,6 +26,19 @@ type Episode struct { DateCreated time.Time `json:"date_created"` } +// ArchiveEpisode represents a row in the current_archive table. +type ArchiveEpisode struct { + Id int `json:"id"` + EpNum int `json:"ep_num"` + EpTitle string `json:"ep_title"` + SeasonName string `json:"season_name"` + StartTime string `json:"start_time"` + PlaybackLength string `json:"playback_length"` + CurrentEp bool `json:"current_ep"` + DateCreated time.Time `json:"date_created"` + DateArchived time.Time `json:"date_archived"` +} + // NewShowInput is the payload needed to create a new show/episode. type NewShowInput struct { EpNum int `json:"ep_num"` @@ -49,5 +62,6 @@ type Repository interface { Create(ctx context.Context, in NewShowInput) (Episode, error) MoveToArchive(ctx context.Context, ids []int64) (MoveResult, error) ListAll(ctx context.Context) ([]Episode, error) + ListArchive(ctx context.Context) ([]ArchiveEpisode, error) Delete(ctx context.Context, id int64) error } diff --git a/backend/internal/core/episode/ports.go b/backend/internal/core/episode/ports.go index 57a5081..5b1cf71 100644 --- a/backend/internal/core/episode/ports.go +++ b/backend/internal/core/episode/ports.go @@ -9,5 +9,6 @@ type UseCases interface { Create(ctx context.Context, in NewShowInput) (Episode, error) MoveToArchive(ctx context.Context, ids []int64) (MoveResult, error) ListAll(ctx context.Context) ([]Episode, error) + ListArchive(ctx context.Context) ([]ArchiveEpisode, error) Delete(ctx context.Context, id int64) error } diff --git a/backend/internal/http/handlers.go b/backend/internal/http/handlers.go index fff0137..a5ddb51 100644 --- a/backend/internal/http/handlers.go +++ b/backend/internal/http/handlers.go @@ -38,6 +38,7 @@ func NewRouter(svc episode.UseCases, authClient auth.AuthClient, authEnabled boo protected.Use(AuthMiddleware(authClient)) protected.DELETE("/shows", deleteShowsHandler(svc)) protected.POST("/archive", moveToArchiveHandler(svc)) + protected.GET("/archive", AdminOnly(), listArchiveHandler(svc)) } else { v1.DELETE("/shows", deleteShowsHandler(svc)) v1.POST("/archive", moveToArchiveHandler(svc)) @@ -334,11 +335,16 @@ func oauthFirebaseHandler(verifier auth.TokenVerifier, authEnabled bool) gin.Han return } email, _ := token.Claims["email"].(string) + admin, _ := token.Claims["admin"].(bool) c.JSON(http.StatusOK, FirebaseOAuthRes{ UID: token.UID, Email: email, Issuer: token.Issuer, Expires: token.Expires, + Admin: admin, + CustomClaims: map[string]interface{}{ + "admin": admin, + }, }) } } @@ -385,3 +391,37 @@ func claimFirebaseAdminHandler(client auth.AuthClient, authEnabled bool) gin.Han }) } } + +// listArchiveHandler godoc +// @Summary List archive +// @Description List all rows from `current_archive` (admin only). +// @Tags archive +// @Produce json +// @Success 200 {array} ArchiveResponse +// @Failure 403 {object} HTTPError "admin only" +// @Failure 500 {object} HTTPError "list failed" +// @Router /api/v1/archive [get] +func listArchiveHandler(svc episode.UseCases) gin.HandlerFunc { + return func(c *gin.Context) { + items, err := svc.ListArchive(c.Request.Context()) + if err != nil { + c.JSON(http.StatusInternalServerError, gin.H{"error": "list failed"}) + return + } + res := make([]ArchiveResponse, 0, len(items)) + for _, it := range items { + res = append(res, ArchiveResponse{ + ID: it.Id, + EpNum: it.EpNum, + EpTitle: it.EpTitle, + SeasonName: it.SeasonName, + StartTime: it.StartTime, + PlaybackLength: it.PlaybackLength, + CurrentEp: it.CurrentEp, + DateCreated: it.DateCreated, + DateArchived: it.DateArchived, + }) + } + c.JSON(http.StatusOK, res) + } +} diff --git a/backend/internal/http/handlers_test.go b/backend/internal/http/handlers_test.go index dbec791..7dc2171 100644 --- a/backend/internal/http/handlers_test.go +++ b/backend/internal/http/handlers_test.go @@ -39,6 +39,8 @@ type fakeSvc struct { lastMove []int64 lastDelID int64 lastCreate episode.NewShowInput + archiveRes []episode.ArchiveEpisode + archiveErr error } func (f *fakeSvc) GetCurrent(ctx context.Context) (episode.Episode, error) { @@ -58,6 +60,9 @@ func (f *fakeSvc) ListAll(ctx context.Context) ([]episode.Episode, error) { } return f.listRes, f.listErr } +func (f *fakeSvc) ListArchive(ctx context.Context) ([]episode.ArchiveEpisode, error) { + return f.archiveRes, f.archiveErr +} func (f *fakeSvc) Delete(ctx context.Context, id int64) error { f.lastDelID = id return f.deleteErr @@ -490,6 +495,44 @@ func TestClaimFirebaseAdmin_OK(t *testing.T) { } } +func TestListArchive_AdminRequired(t *testing.T) { + svc := &fakeSvc{} + client := &fakeAuthClient{token: &fbauth.Token{UID: "uid-1", Claims: map[string]interface{}{"admin": false}}} + r := newRouterWithOpts(svc, client, true) + req := httptest.NewRequest(http.MethodGet, "/api/v1/archive", nil) + req.Header.Set("Authorization", "Bearer tok") + w := httptest.NewRecorder() + r.ServeHTTP(w, req) + if w.Code != http.StatusForbidden { + t.Fatalf("expected 403, got %d", w.Code) + } +} + +func TestListArchive_OK(t *testing.T) { + now := time.Now().UTC() + svc := &fakeSvc{ + archiveRes: []episode.ArchiveEpisode{ + {Id: 1, EpNum: 1, EpTitle: "Pilot", SeasonName: "S1", StartTime: "10:00:00", PlaybackLength: "00:24:00", DateCreated: now, DateArchived: now}, + }, + } + client := &fakeAuthClient{token: &fbauth.Token{UID: "uid-1", Claims: map[string]interface{}{"admin": true}}} + r := newRouterWithOpts(svc, client, true) + req := httptest.NewRequest(http.MethodGet, "/api/v1/archive", nil) + req.Header.Set("Authorization", "Bearer tok") + w := httptest.NewRecorder() + r.ServeHTTP(w, req) + if w.Code != http.StatusOK { + t.Fatalf("expected 200, got %d: %s", w.Code, w.Body.String()) + } + var items []episode.ArchiveEpisode + if err := json.Unmarshal(w.Body.Bytes(), &items); err != nil { + t.Fatalf("json: %v", err) + } + if len(items) != 1 || items[0].EpTitle != "Pilot" { + t.Fatalf("unexpected items: %+v", items) + } +} + func TestListShows_Error(t *testing.T) { svc := &fakeSvc{listErr: errors.New("query failed")} r := newRouterWithSvc(svc) diff --git a/backend/internal/http/middleware.go b/backend/internal/http/middleware.go index 7084c25..351dc2b 100644 --- a/backend/internal/http/middleware.go +++ b/backend/internal/http/middleware.go @@ -6,6 +6,7 @@ import ( "watch-party-backend/internal/auth" + fbauth "firebase.google.com/go/v4/auth" "github.com/gin-gonic/gin" ) @@ -31,3 +32,25 @@ func AuthMiddleware(verifier auth.TokenVerifier) gin.HandlerFunc { c.Next() } } + +// AdminOnly ensures the firebaseToken context value has admin=true claim. +func AdminOnly() gin.HandlerFunc { + return func(c *gin.Context) { + val, ok := c.Get("firebaseToken") + if !ok { + c.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error": "missing token"}) + return + } + token, ok := val.(*fbauth.Token) + if !ok || token == nil { + c.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error": "missing token"}) + return + } + admin, _ := token.Claims["admin"].(bool) + if !admin { + c.AbortWithStatusJSON(http.StatusForbidden, gin.H{"error": "admin only"}) + return + } + c.Next() + } +} diff --git a/backend/internal/http/middleware_test.go b/backend/internal/http/middleware_test.go index 530a1e1..e2adf43 100644 --- a/backend/internal/http/middleware_test.go +++ b/backend/internal/http/middleware_test.go @@ -69,3 +69,54 @@ func TestAuthMiddleware_Success(t *testing.T) { t.Fatalf("expected status %d, got %d", http.StatusOK, w.Code) } } + +func TestAdminOnly_MissingToken(t *testing.T) { + gin.SetMode(gin.TestMode) + r := gin.New() + r.Use(AdminOnly()) + r.GET("/", func(c *gin.Context) {}) + + req := httptest.NewRequest(http.MethodGet, "/", nil) + w := httptest.NewRecorder() + r.ServeHTTP(w, req) + + if w.Code != http.StatusUnauthorized { + t.Fatalf("expected status %d, got %d", http.StatusUnauthorized, w.Code) + } +} + +func TestAdminOnly_Forbidden(t *testing.T) { + gin.SetMode(gin.TestMode) + r := gin.New() + r.Use(func(c *gin.Context) { + c.Set("firebaseToken", &fbauth.Token{Claims: map[string]interface{}{"admin": false}}) + }) + r.Use(AdminOnly()) + r.GET("/", func(c *gin.Context) {}) + + req := httptest.NewRequest(http.MethodGet, "/", nil) + w := httptest.NewRecorder() + r.ServeHTTP(w, req) + + if w.Code != http.StatusForbidden { + t.Fatalf("expected status %d, got %d", http.StatusForbidden, w.Code) + } +} + +func TestAdminOnly_Success(t *testing.T) { + gin.SetMode(gin.TestMode) + r := gin.New() + r.Use(func(c *gin.Context) { + c.Set("firebaseToken", &fbauth.Token{Claims: map[string]interface{}{"admin": true}}) + }) + r.Use(AdminOnly()) + r.GET("/", func(c *gin.Context) { c.Status(http.StatusOK) }) + + req := httptest.NewRequest(http.MethodGet, "/", nil) + w := httptest.NewRecorder() + r.ServeHTTP(w, req) + + if w.Code != http.StatusOK { + t.Fatalf("expected status %d, got %d", http.StatusOK, w.Code) + } +} diff --git a/backend/internal/http/types.go b/backend/internal/http/types.go index c90a944..7be3979 100644 --- a/backend/internal/http/types.go +++ b/backend/internal/http/types.go @@ -69,6 +69,9 @@ type FirebaseOAuthRes struct { Email string `json:"email,omitempty" example:"user@example.com"` Issuer string `json:"issuer,omitempty" example:"https://securetoken.google.com/"` Expires int64 `json:"expires,omitempty" example:"1700000000"` + Admin bool `json:"admin,omitempty" example:"true"` + // CustomClaims echoes back custom claims; only include non-sensitive claims. + CustomClaims map[string]interface{} `json:"custom_claims,omitempty"` } // FirebaseAdminClaimReq is the request body for POST /api/v1/oauth/firebase/claim-admin. @@ -83,3 +86,16 @@ type FirebaseAdminClaimRes struct { Admin bool `json:"admin" example:"true"` CustomClaims map[string]interface{} `json:"custom_claims,omitempty"` } + +// ArchiveResponse represents a row from current_archive. +type ArchiveResponse struct { + ID int `json:"id" example:"123"` + EpNum int `json:"ep_num" example:"1"` + EpTitle string `json:"ep_title" example:"Pilot"` + SeasonName string `json:"season_name" example:"Season 1"` + StartTime string `json:"start_time" example:"10:00:00"` + PlaybackLength string `json:"playback_length" example:"00:24:00"` + CurrentEp bool `json:"current_ep" example:"false"` + DateCreated time.Time `json:"date_created" example:"2024-02-01T15:04:05Z"` + DateArchived time.Time `json:"date_archived" example:"2024-03-01T15:04:05Z"` +} diff --git a/backend/internal/repo/episode_repo.go b/backend/internal/repo/episode_repo.go index 92ae8e1..57d0bda 100644 --- a/backend/internal/repo/episode_repo.go +++ b/backend/internal/repo/episode_repo.go @@ -112,6 +112,38 @@ RETURNING return e, nil } +func (r *pgxEpisodeRepo) ListArchive(ctx context.Context) ([]episode.ArchiveEpisode, error) { + const q = ` +SELECT + id, + ep_num, + ep_title, + season_name, + to_char(start_time, 'HH24:MI:SS') AS start_time, + to_char(playback_length, 'HH24:MI:SS') AS playback_length, + current_ep, + date_created, + date_archived +FROM current_archive +ORDER BY date_archived DESC, id DESC; +` + rows, err := r.pool.Query(ctx, q) + if err != nil { + return nil, err + } + defer rows.Close() + + var out []episode.ArchiveEpisode + for rows.Next() { + var e episode.ArchiveEpisode + if err := rows.Scan(&e.Id, &e.EpNum, &e.EpTitle, &e.SeasonName, &e.StartTime, &e.PlaybackLength, &e.CurrentEp, &e.DateCreated, &e.DateArchived); err != nil { + return nil, err + } + out = append(out, e) + } + return out, rows.Err() +} + func (r *pgxEpisodeRepo) SetCurrent(ctx context.Context, id int64, startHHMMSS string) error { tx, err := r.pool.Begin(ctx) if err != nil { diff --git a/backend/internal/service/episode_service.go b/backend/internal/service/episode_service.go index c542a42..4299db9 100644 --- a/backend/internal/service/episode_service.go +++ b/backend/internal/service/episode_service.go @@ -24,6 +24,12 @@ func (s *Service) ListAll(ctx context.Context) ([]episode.Episode, error) { return s.repo.ListAll(c) } +func (s *Service) ListArchive(ctx context.Context) ([]episode.ArchiveEpisode, error) { + c, cancel := context.WithTimeout(ctx, 5*time.Second) + defer cancel() + return s.repo.ListArchive(c) +} + func (s *Service) GetCurrent(ctx context.Context) (episode.Episode, error) { c, cancel := context.WithTimeout(ctx, 3*time.Second) defer cancel() diff --git a/backend/internal/service/episode_service_test.go b/backend/internal/service/episode_service_test.go index cf7344e..fe5920b 100644 --- a/backend/internal/service/episode_service_test.go +++ b/backend/internal/service/episode_service_test.go @@ -22,12 +22,14 @@ type fakeRepo struct { id int64 start string } - moveCalls [][]int64 - listRes []episode.Episode - listErr error - createRes episode.Episode - createErr error - createIn []episode.NewShowInput + moveCalls [][]int64 + listRes []episode.Episode + listErr error + createRes episode.Episode + createErr error + createIn []episode.NewShowInput + archiveRes []episode.ArchiveEpisode + archiveErr error } func (f *fakeRepo) GetCurrent(ctx context.Context) (episode.Episode, error) { @@ -47,6 +49,9 @@ func (f *fakeRepo) MoveToArchive(ctx context.Context, ids []int64) (episode.Move func (f *fakeRepo) ListAll(ctx context.Context) ([]episode.Episode, error) { return f.listRes, f.listErr } +func (f *fakeRepo) ListArchive(ctx context.Context) ([]episode.ArchiveEpisode, error) { + return f.archiveRes, f.archiveErr +} func (f *fakeRepo) Delete(ctx context.Context, id int64) error { return nil } @@ -177,6 +182,28 @@ func TestEpisodeService_ListAll_Error(t *testing.T) { } } +func TestEpisodeService_ListArchive(t *testing.T) { + fr := &fakeRepo{ + archiveRes: []episode.ArchiveEpisode{{Id: 1}, {Id: 2}}, + } + svc := service.NewEpisodeService(fr) + got, err := svc.ListArchive(context.Background()) + if err != nil { + t.Fatalf("unexpected: %v", err) + } + if len(got) != 2 || got[0].Id != 1 { + t.Fatalf("bad archive list: %+v", got) + } +} + +func TestEpisodeService_ListArchive_Error(t *testing.T) { + fr := &fakeRepo{archiveErr: errors.New("down")} + svc := service.NewEpisodeService(fr) + if _, err := svc.ListArchive(context.Background()); err == nil { + t.Fatal("expected error") + } +} + func TestEpisodeService_Create_Validation(t *testing.T) { tests := []struct { name string diff --git a/frontend/src/App.tsx b/frontend/src/App.tsx index 9d51986..e29ce7d 100644 --- a/frontend/src/App.tsx +++ b/frontend/src/App.tsx @@ -2,10 +2,12 @@ import React from "react"; import { Link, NavLink, Route, Routes, useLocation } from "react-router-dom"; import Timer from "./components/Timer"; import ShowsPage from "./pages/ShowsPage"; +import ArchivePage from "./pages/ArchivePage"; import TimeSyncNotice from "./components/TimeSyncNotice"; import { ToastViewport } from "./components/Toasts"; import DebugOverlay from "./components/DebugOverlay"; import AuthStatus from "./components/AuthStatus"; +import { useAuth } from "./auth/AuthProvider"; import "./index.css"; const TIME_SYNC_OFF_THRESHOLD = 100; @@ -13,6 +15,7 @@ const TIME_SYNC_OFF_THRESHOLD = 100; export default function App() { const [open, setOpen] = React.useState(false); const loc = useLocation(); + const { isAdmin } = useAuth(); // close sidebar on route change React.useEffect(() => setOpen(false), [loc.pathname]); @@ -46,6 +49,7 @@ export default function App() {
管理用サインイン
@@ -68,6 +72,7 @@ export default function App() { } /> } /> + } />
diff --git a/frontend/src/api/types.ts b/frontend/src/api/types.ts index b8c26cc..26b062b 100644 --- a/frontend/src/api/types.ts +++ b/frontend/src/api/types.ts @@ -34,6 +34,8 @@ export type FirebaseAuthResponse = { email?: string; issuer?: string; expires?: number; + admin?: boolean; + custom_claims?: Record; }; export type ArchiveResult = { @@ -44,3 +46,15 @@ export type ArchiveResult = { deleted: number; skipped: number; }; + +export type ArchiveItem = { + id: number; + ep_num: number; + ep_title: string; + season_name: string; + start_time: string; + playback_length: string; + current_ep: boolean; + date_created: string; + date_archived: string; +}; diff --git a/frontend/src/api/watchparty.ts b/frontend/src/api/watchparty.ts index 1011bdf..a3de934 100644 --- a/frontend/src/api/watchparty.ts +++ b/frontend/src/api/watchparty.ts @@ -1,8 +1,8 @@ import { API_ENDPOINT } from "./endpoint"; import { ApiError, apiFetch } from "./client"; -import type { ArchiveResult, DanimeEpisode, ScheduleResponse, ShowItem, TimeResponse } from "./types"; +import type { ArchiveItem, ArchiveResult, DanimeEpisode, ScheduleResponse, ShowItem, TimeResponse } from "./types"; -export type { DanimeEpisode, ScheduleResponse, ShowItem, TimeResponse } from "./types"; +export type { DanimeEpisode, ScheduleResponse, ShowItem, TimeResponse, ArchiveItem } from "./types"; function asNumber(v: unknown, fallback = 0) { const n = typeof v === "number" ? v : Number(v); @@ -52,6 +52,33 @@ function normalizeShows(data: unknown): ShowItem[] { }); } +function normalizeArchive(data: unknown): ArchiveItem[] { + if (!Array.isArray(data)) { + throw new ApiError("Archive payload is not an array", { url: API_ENDPOINT.v1.ARCHIVE, data }); + } + return data.map((item) => { + if (!item || typeof item !== "object") { + throw new ApiError("Bad archive item", { url: API_ENDPOINT.v1.ARCHIVE, data: item }); + } + const obj = item as Record; + const id = asNumber(obj.id, NaN); + if (!Number.isFinite(id)) { + throw new ApiError("Archive item missing id", { url: API_ENDPOINT.v1.ARCHIVE, data: item }); + } + return { + id, + ep_num: asNumber(obj.ep_num, 0), + ep_title: asString(obj.ep_title, "不明"), + season_name: asString(obj.season_name, "不明"), + start_time: asString(obj.start_time, ""), + playback_length: asString(obj.playback_length, ""), + current_ep: Boolean(obj.current_ep), + date_created: asString(obj.date_created, ""), + date_archived: asString(obj.date_archived, ""), + }; + }); +} + function normalizeDanimeEpisode(data: unknown): DanimeEpisode { if (!data || typeof data !== "object") { throw new ApiError("Bad danime payload", { url: API_ENDPOINT.v1.DANIME, data }); @@ -153,3 +180,18 @@ export async function archiveShow(id: number, idToken: string) { logLabel: "archive show", }); } + +export async function fetchArchive(idToken: string) { + if (!idToken) { + throw new ApiError("Missing auth token for archive list"); + } + const data = await apiFetch(API_ENDPOINT.v1.ARCHIVE, { + method: "GET", + headers: { + "Authorization": `Bearer ${idToken}`, + }, + timeoutMs: 12_000, + logLabel: "fetch archive", + }); + return normalizeArchive(data); +} diff --git a/frontend/src/auth/AuthProvider.tsx b/frontend/src/auth/AuthProvider.tsx index a244155..78208a4 100644 --- a/frontend/src/auth/AuthProvider.tsx +++ b/frontend/src/auth/AuthProvider.tsx @@ -13,6 +13,7 @@ type AuthContextShape = { user: User | null; idToken: string | null; backendClaims: FirebaseAuthResponse | null; + isAdmin: boolean; verifying: boolean; signingIn: boolean; error: string | null; @@ -29,6 +30,7 @@ export function AuthProvider({ children }: { children: React.ReactNode }) { const [user, setUser] = React.useState(null); const [idToken, setIdToken] = React.useState(null); const [backendClaims, setBackendClaims] = React.useState(null); + const isAdmin = Boolean(backendClaims?.admin ?? backendClaims?.custom_claims?.admin); const [verifying, setVerifying] = React.useState(false); const [signingIn, setSigningIn] = React.useState(false); const [error, setError] = React.useState(null); @@ -132,13 +134,14 @@ export function AuthProvider({ children }: { children: React.ReactNode }) { user, idToken, backendClaims, + isAdmin, verifying, signingIn, error, signInWithGoogle, signOut, refreshToken, - }), [enabled, status, user, idToken, backendClaims, verifying, signingIn, error, signInWithGoogle, signOut, refreshToken]); + }), [enabled, status, user, idToken, backendClaims, isAdmin, verifying, signingIn, error, signInWithGoogle, signOut, refreshToken]); return ( diff --git a/frontend/src/components/AuthStatus.tsx b/frontend/src/components/AuthStatus.tsx index 1ea9857..68b8a19 100644 --- a/frontend/src/components/AuthStatus.tsx +++ b/frontend/src/components/AuthStatus.tsx @@ -1,7 +1,7 @@ import { useAuth } from "../auth/AuthProvider"; export default function AuthStatus() { - const { enabled, status, user, verifying, signingIn, signInWithGoogle, signOut, error } = useAuth(); + const { enabled, status, user, verifying, signingIn, signInWithGoogle, signOut, error, isAdmin } = useAuth(); if (!enabled) { return
Auth off
; @@ -24,7 +24,10 @@ export default function AuthStatus() {
{user.photoURL && }
-
{user.displayName || user.email || user.uid}
+
+ {user.displayName || user.email || user.uid} + {isAdmin && ADMIN} +
{verifying && (
確認中… diff --git a/frontend/src/index.css b/frontend/src/index.css index 20b2512..14c8d5a 100644 --- a/frontend/src/index.css +++ b/frontend/src/index.css @@ -503,6 +503,42 @@ kbd { background: var(--accent); color:#0b0f14; border:none; } .primary:disabled { opacity:0.5; cursor:not-allowed; } +.archive-table { + display: grid; + gap: 6px; + text-align: left; +} +.archive-header, +.archive-row { + display: grid; + grid-template-columns: 70px 80px 1fr 90px 90px 150px 150px; + gap: 10px; + align-items: center; + padding: 10px 12px; + border-radius: 10px; +} +.archive-header { + font-weight: 800; + color: var(--subtle); + background: rgba(255,255,255,0.04); + border: 1px solid rgba(255,255,255,0.08); +} +.archive-row { + background: rgba(255,255,255,0.03); + border: 1px solid rgba(255,255,255,0.05); +} +.archive-row:hover { background: rgba(255,255,255,0.05); } +.archive-row span { overflow: hidden; text-overflow: ellipsis; white-space: nowrap; } +@media (max-width: 820px) { + .archive-header, + .archive-row { + grid-template-columns: repeat(2, minmax(0, 1fr)); + row-gap: 6px; + } + .archive-header span:nth-child(3), + .archive-row span:nth-child(3) { grid-column: span 2; } +} + .scrape-card { padding: 14px; border-radius: 14px; diff --git a/frontend/src/pages/ArchivePage.tsx b/frontend/src/pages/ArchivePage.tsx new file mode 100644 index 0000000..f960a15 --- /dev/null +++ b/frontend/src/pages/ArchivePage.tsx @@ -0,0 +1,102 @@ +import React from "react"; +import { fetchArchive } from "../api/watchparty"; +import type { ArchiveItem } from "../api/types"; +import { useAuth } from "../auth/AuthProvider"; +import { toastError } from "../utils/toastBus"; +import { logApiError } from "../utils/logger"; + +function formatTimestamp(ts: string) { + if (!ts) return ""; + const d = new Date(ts); + if (Number.isNaN(d.getTime())) return ts; + return d.toLocaleString("ja-JP", { timeZone: "Asia/Tokyo" }); +} + +export default function ArchivePage() { + const { enabled, idToken, isAdmin } = useAuth(); + const [items, setItems] = React.useState([]); + const [loading, setLoading] = React.useState(true); + const [error, setError] = React.useState(null); + + const load = React.useCallback(async () => { + if (!idToken) { + setError("サインインが必要です"); + return; + } + setError(null); + try { + setLoading(true); + const data = await fetchArchive(idToken); + setItems(data); + } catch (e: unknown) { + const msg = e instanceof Error ? e.message : "アーカイブを取得できませんでした。"; + setError(msg); + logApiError("fetch archive", e); + toastError("アーカイブを取得できませんでした", msg); + } finally { + setLoading(false); + } + }, [idToken]); + + React.useEffect(() => { + if (enabled && isAdmin && idToken) { + load().catch(() => { }); + } else { + setLoading(false); + } + }, [enabled, isAdmin, idToken, load]); + + if (!enabled) { + return
認証が無効です。
; + } + if (!isAdmin) { + return
管理者のみアクセスできます。
; + } + + return ( +
+

アーカイブ一覧

+
+ 削除済みのエピソードを表示します。最新のアーカイブが上に表示されます。 + +
+ + {loading &&
読み込み中…
} + {error && ( +
+ {error} +
+ )} + {!loading && !error && items.length === 0 && ( +
アーカイブは空です。
+ )} + + {items.length > 0 && ( +
+
+ ID + 話数 + タイトル + 開始時刻 + 再生時間 + 登録 + アーカイブ +
+ {items.map((it) => ( +
+ #{it.id} + 第{it.ep_num}話 + {it.ep_title} + {it.start_time.slice(0, 5)} + {it.playback_length.slice(0, 5)} + {formatTimestamp(it.date_created)} + {formatTimestamp(it.date_archived)} +
+ ))} +
+ )} +
+ ); +}