@jmruthers/pace-core 0.4.1 → 0.5.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +26 -1
- package/README.md +231 -229
- package/dist/{DataTable-2LB6HI6V.js → DataTable-ZQDRE46Q.js} +15 -17
- package/dist/{DataTable-BDBqkU-i.d.ts → DataTable-ltTFXHS3.d.ts} +25 -51
- package/dist/{Table-CIm9IWqk.d.ts → PublicLoadingSpinner-Bq_-BeK-.d.ts} +635 -122
- package/dist/{UnifiedAuthProvider-V7y63NjT.d.ts → RBACProvider-BO4ilsQB.d.ts} +11 -36
- package/dist/UnifiedAuthProvider-DGQsy-vY.d.ts +103 -0
- package/dist/{api-AIJ3IJX3.js → api-H5A3H4IR.js} +6 -4
- package/dist/{appConfig-fB1pP_v3.d.ts → appConfig-BVGyuvI7.d.ts} +1 -1
- package/dist/appNameResolver-7GHF5ED2.js +22 -0
- package/dist/{audit-PD5L5ZSC.js → audit-BUW3LMJB.js} +3 -3
- package/dist/chunk-5H3C2SWM.js +3293 -0
- package/dist/chunk-5H3C2SWM.js.map +1 -0
- package/dist/chunk-5SIXIV7R.js +1925 -0
- package/dist/chunk-5SIXIV7R.js.map +1 -0
- package/dist/{chunk-YNU5QJ4S.js → chunk-7BNPOCLL.js} +22 -5
- package/dist/chunk-7BNPOCLL.js.map +1 -0
- package/dist/{chunk-4ZTIEYU2.js → chunk-CDQ3PX7L.js} +1 -1
- package/dist/chunk-CDQ3PX7L.js.map +1 -0
- package/dist/chunk-GNTALZV3.js +17 -0
- package/dist/chunk-GNTALZV3.js.map +1 -0
- package/dist/chunk-GWSBHC4J.js +1349 -0
- package/dist/chunk-GWSBHC4J.js.map +1 -0
- package/dist/{chunk-JUUNUW3O.js → chunk-HD7PYDUV.js} +14 -5
- package/dist/chunk-HD7PYDUV.js.map +1 -0
- package/dist/{chunk-H4PZ4B3Y.js → chunk-HXX35Q2M.js} +113 -27
- package/dist/chunk-HXX35Q2M.js.map +1 -0
- package/dist/chunk-K6B7BLSE.js +388 -0
- package/dist/chunk-K6B7BLSE.js.map +1 -0
- package/dist/chunk-M4RW7PIP.js +5441 -0
- package/dist/chunk-M4RW7PIP.js.map +1 -0
- package/dist/chunk-MZBUOP4P.js +119 -0
- package/dist/chunk-MZBUOP4P.js.map +1 -0
- package/dist/chunk-N2EUGZRW.js +98 -0
- package/dist/chunk-N2EUGZRW.js.map +1 -0
- package/dist/chunk-NQ4TOOO6.js +20 -0
- package/dist/chunk-NQ4TOOO6.js.map +1 -0
- package/dist/{chunk-DC5AMYBS.js → chunk-PLDDJCW6.js} +15 -5
- package/dist/chunk-PLDDJCW6.js.map +1 -0
- package/dist/{chunk-IOX76PSM.js → chunk-PVMYVQSM.js} +270 -28
- package/dist/chunk-PVMYVQSM.js.map +1 -0
- package/dist/{chunk-4MCJAK7J.js → chunk-QKHFMQ5R.js} +2155 -4853
- package/dist/chunk-QKHFMQ5R.js.map +1 -0
- package/dist/chunk-QVYBYGT2.js +428 -0
- package/dist/chunk-QVYBYGT2.js.map +1 -0
- package/dist/{chunk-WHLSWC6W.js → chunk-SS3E6QLB.js} +16 -61
- package/dist/chunk-SS3E6QLB.js.map +1 -0
- package/dist/chunk-WJARTBCT.js +128 -0
- package/dist/chunk-WJARTBCT.js.map +1 -0
- package/dist/chunk-YDJW5XTN.js +84 -0
- package/dist/chunk-YDJW5XTN.js.map +1 -0
- package/dist/components.d.ts +907 -10
- package/dist/components.js +3237 -204
- package/dist/components.js.map +1 -1
- package/dist/{database-CAMsquLm.d.ts → database-C3Szpi5J.d.ts} +28 -11
- package/dist/hooks.d.ts +7 -6
- package/dist/hooks.js +33 -11
- package/dist/hooks.js.map +1 -1
- package/dist/index.d.ts +247 -111
- package/dist/index.js +330 -185
- package/dist/index.js.map +1 -1
- package/dist/{organisation-DLNNQhPB.d.ts → organisation-CO3Sh3_D.d.ts} +1 -1
- package/dist/providers.d.ts +5 -4
- package/dist/providers.js +14 -5
- package/dist/rbac/index.d.ts +964 -839
- package/dist/rbac/index.js +58 -1970
- package/dist/rbac/index.js.map +1 -1
- package/dist/styles/core.css +364 -0
- package/dist/styles/fonts/georama-italic.woff2 +0 -0
- package/dist/styles/fonts/georama.woff2 +0 -0
- package/dist/styles/fonts/open-sans-italic.woff2 +0 -0
- package/dist/styles/fonts/open-sans.woff2 +0 -0
- package/dist/styles/fonts/reddit-mono.woff2 +0 -0
- package/dist/styles/index.d.ts +36 -0
- package/dist/styles/index.js +24 -0
- package/dist/styles/index.js.map +1 -0
- package/dist/theming/runtime.d.ts +73 -0
- package/dist/theming/runtime.js +16 -0
- package/dist/theming/runtime.js.map +1 -0
- package/dist/{types-Bavn44NW.d.ts → types-BRDU7N6w.d.ts} +79 -33
- package/dist/types.d.ts +5 -5
- package/dist/types.js +7 -2
- package/dist/types.js.map +1 -1
- package/dist/{unified-BtRpPbmp.d.ts → unified-CMPjE_fv.d.ts} +0 -1
- package/dist/usePublicRouteParams-B2OcAsur.d.ts +477 -0
- package/dist/utils.d.ts +83 -60
- package/dist/utils.js +293 -55651
- package/dist/utils.js.map +1 -1
- package/dist/validation.d.ts +1 -1
- package/dist/validation.js +1 -1
- package/docs/INDEX.md +192 -0
- package/docs/README.md +46 -32
- package/docs/api/README.md +231 -229
- package/docs/api/classes/ErrorBoundary.md +1 -1
- package/docs/api/classes/InvalidScopeError.md +73 -0
- package/docs/api/classes/MissingUserContextError.md +66 -0
- package/docs/api/classes/OrganisationContextRequiredError.md +66 -0
- package/docs/api/classes/PermissionDeniedError.md +73 -0
- package/docs/api/classes/PublicErrorBoundary.md +132 -0
- package/docs/api/classes/RBACAuditManager.md +270 -0
- package/docs/api/classes/RBACCache.md +284 -0
- package/docs/api/classes/RBACEngine.md +141 -0
- package/docs/api/classes/RBACError.md +76 -0
- package/docs/api/classes/RBACNotInitializedError.md +66 -0
- package/docs/api/classes/SecureSupabaseClient.md +135 -0
- package/docs/api/interfaces/AggregateConfig.md +4 -4
- package/docs/api/interfaces/ButtonProps.md +2 -2
- package/docs/api/interfaces/CardProps.md +2 -2
- package/docs/api/interfaces/ColorPalette.md +1 -1
- package/docs/api/interfaces/ColorShade.md +1 -1
- package/docs/api/interfaces/DataAccessRecord.md +96 -0
- package/docs/api/interfaces/DataTableAction.md +98 -7
- package/docs/api/interfaces/DataTableColumn.md +131 -12
- package/docs/api/interfaces/DataTableProps.md +77 -274
- package/docs/api/interfaces/DataTableToolbarButton.md +7 -7
- package/docs/api/interfaces/EmptyStateConfig.md +5 -5
- package/docs/api/interfaces/EnhancedNavigationMenuProps.md +235 -0
- package/docs/api/interfaces/EventContextType.md +7 -7
- package/docs/api/interfaces/EventLogoProps.md +152 -0
- package/docs/api/interfaces/EventProviderProps.md +2 -2
- package/docs/api/interfaces/FileSizeLimits.md +7 -0
- package/docs/api/interfaces/FileUploadProps.md +154 -0
- package/docs/api/interfaces/FooterProps.md +1 -1
- package/docs/api/interfaces/InactivityWarningModalProps.md +115 -0
- package/docs/api/interfaces/InputProps.md +2 -2
- package/docs/api/interfaces/LabelProps.md +1 -1
- package/docs/api/interfaces/LoginFormProps.md +1 -1
- package/docs/api/interfaces/NavigationAccessRecord.md +107 -0
- package/docs/api/interfaces/NavigationContextType.md +164 -0
- package/docs/api/interfaces/NavigationGuardProps.md +139 -0
- package/docs/api/interfaces/NavigationItem.md +1 -1
- package/docs/api/interfaces/NavigationMenuProps.md +1 -1
- package/docs/api/interfaces/NavigationProviderProps.md +117 -0
- package/docs/api/interfaces/Organisation.md +1 -1
- package/docs/api/interfaces/OrganisationContextType.md +1 -1
- package/docs/api/interfaces/OrganisationMembership.md +1 -1
- package/docs/api/interfaces/OrganisationProviderProps.md +1 -1
- package/docs/api/interfaces/OrganisationSecurityError.md +1 -1
- package/docs/api/interfaces/PaceAppLayoutProps.md +26 -26
- package/docs/api/interfaces/PaceLoginPageProps.md +1 -1
- package/docs/api/interfaces/PageAccessRecord.md +85 -0
- package/docs/api/interfaces/PagePermissionContextType.md +140 -0
- package/docs/api/interfaces/PagePermissionGuardProps.md +153 -0
- package/docs/api/interfaces/PagePermissionProviderProps.md +119 -0
- package/docs/api/interfaces/PaletteData.md +1 -1
- package/docs/api/interfaces/PermissionEnforcerProps.md +153 -0
- package/docs/api/interfaces/PublicErrorBoundaryProps.md +94 -0
- package/docs/api/interfaces/PublicErrorBoundaryState.md +68 -0
- package/docs/api/interfaces/PublicLoadingSpinnerProps.md +86 -0
- package/docs/api/interfaces/PublicPageFooterProps.md +112 -0
- package/docs/api/interfaces/PublicPageHeaderProps.md +138 -0
- package/docs/api/interfaces/PublicPageLayoutProps.md +138 -0
- package/docs/api/interfaces/RBACConfig.md +99 -0
- package/docs/api/interfaces/RBACContextType.md +474 -0
- package/docs/api/interfaces/RBACLogger.md +112 -0
- package/docs/api/interfaces/RBACProviderProps.md +107 -0
- package/docs/api/interfaces/RoleBasedRouterContextType.md +151 -0
- package/docs/api/interfaces/RoleBasedRouterProps.md +156 -0
- package/docs/api/interfaces/RouteAccessRecord.md +107 -0
- package/docs/api/interfaces/RouteConfig.md +121 -0
- package/docs/api/interfaces/SecureDataContextType.md +168 -0
- package/docs/api/interfaces/SecureDataProviderProps.md +132 -0
- package/docs/api/interfaces/StorageConfig.md +41 -0
- package/docs/api/interfaces/StorageFileInfo.md +74 -0
- package/docs/api/interfaces/StorageFileMetadata.md +140 -0
- package/docs/api/interfaces/StorageListOptions.md +86 -0
- package/docs/api/interfaces/StorageListResult.md +41 -0
- package/docs/api/interfaces/StorageUploadOptions.md +88 -0
- package/docs/api/interfaces/StorageUploadResult.md +63 -0
- package/docs/api/interfaces/StorageUrlOptions.md +47 -0
- package/docs/api/interfaces/StyleImport.md +2 -2
- package/docs/api/interfaces/ToastActionElement.md +1 -1
- package/docs/api/interfaces/ToastProps.md +1 -1
- package/docs/api/interfaces/UnifiedAuthContextType.md +465 -64
- package/docs/api/interfaces/UnifiedAuthProviderProps.md +95 -9
- package/docs/api/interfaces/UseInactivityTrackerOptions.md +136 -0
- package/docs/api/interfaces/UseInactivityTrackerReturn.md +123 -0
- package/docs/api/interfaces/UsePublicEventLogoOptions.md +87 -0
- package/docs/api/interfaces/UsePublicEventLogoReturn.md +81 -0
- package/docs/api/interfaces/UsePublicEventOptions.md +34 -0
- package/docs/api/interfaces/UsePublicEventReturn.md +68 -0
- package/docs/api/interfaces/UsePublicRouteParamsReturn.md +94 -0
- package/docs/api/interfaces/UserEventAccess.md +14 -14
- package/docs/api/interfaces/UserMenuProps.md +6 -6
- package/docs/api/interfaces/UserProfile.md +1 -1
- package/docs/api/modules.md +4233 -1134
- package/docs/api-reference/components.md +761 -43
- package/docs/api-reference/hooks.md +126 -0
- package/docs/api-reference/providers.md +141 -65
- package/docs/api-reference/types.md +66 -36
- package/docs/api-reference/utilities.md +1 -1
- package/docs/architecture/README.md +1 -2
- package/docs/best-practices/README.md +400 -0
- package/docs/consuming-app-example.md +42 -96
- package/docs/consuming-app-vite-config.md +233 -0
- package/docs/core-concepts/events.md +3 -3
- package/docs/core-concepts/organisations.md +0 -1
- package/docs/core-concepts/rbac-system.md +23 -10
- package/docs/documentation-style-checklist.md +8 -2
- package/docs/examples/navigation-menu-auth-fix.md +344 -0
- package/docs/getting-started/examples/README.md +15 -1
- package/docs/getting-started/examples/basic-auth-app.md +444 -119
- package/docs/getting-started/examples/full-featured-app.md +6 -6
- package/docs/getting-started/installation.md +231 -52
- package/docs/getting-started/quick-start.md +121 -24
- package/docs/implementation-guides/app-layout.md +133 -108
- package/docs/implementation-guides/data-tables.md +1011 -29
- package/docs/implementation-guides/forms.md +3 -3
- package/docs/implementation-guides/hierarchical-datatable.md +850 -0
- package/docs/implementation-guides/large-datasets.md +2 -2
- package/docs/implementation-guides/navigation.md +1 -1
- package/docs/implementation-guides/permission-enforcement.md +4 -4
- package/docs/implementation-guides/public-pages.md +752 -0
- package/docs/migration/README.md +18 -8
- package/docs/migration/quick-migration-guide.md +320 -0
- package/docs/migration/rbac-migration.md +50 -0
- package/docs/migration/v0.4.15-tailwind-scanning.md +272 -0
- package/docs/migration/v0.4.16-css-first-approach.md +306 -0
- package/docs/migration/v0.4.17-source-path-fix.md +229 -0
- package/docs/migration-guide.md +77 -105
- package/docs/performance/README.md +1 -4
- package/docs/print-components/README.md +258 -0
- package/docs/print-components/api-reference.md +636 -0
- package/docs/print-components/examples/README.md +204 -0
- package/docs/print-components/examples/basic-report.tsx +92 -0
- package/docs/print-components/examples/card-catalog.tsx +149 -0
- package/docs/print-components/examples/cover-page-report.tsx +163 -0
- package/docs/print-components/quick-start.md +363 -0
- package/docs/quick-reference.md +53 -36
- package/docs/rbac/README.md +136 -69
- package/docs/rbac/api-reference.md +39 -8
- package/docs/rbac/examples.md +237 -66
- package/docs/rbac/getting-started.md +131 -16
- package/docs/rbac/quick-start.md +499 -323
- package/docs/rbac/troubleshooting.md +240 -262
- package/docs/security/README.md +50 -1
- package/docs/styles/README.md +226 -111
- package/docs/testing/README.md +6 -10
- package/docs/troubleshooting/README.md +497 -0
- package/docs/troubleshooting/common-issues.md +604 -14
- package/docs/troubleshooting/styling-issues.md +219 -0
- package/docs/troubleshooting/tailwind-content-scanning.md +213 -0
- package/docs/usage.md +54 -91
- package/docs/visual-testing.md +0 -7
- package/package.json +47 -25
- package/src/__mocks__/lucide-react.ts +181 -0
- package/src/__tests__/REBUILD_PLAN.md +223 -0
- package/src/__tests__/TESTING_GUIDELINES.md +341 -0
- package/src/__tests__/fixtures/mocks.ts +93 -0
- package/src/__tests__/helpers/component-test-utils.tsx +145 -0
- package/src/__tests__/helpers/test-utils.tsx +117 -0
- package/src/__tests__/integration/UserProfile.test.tsx +128 -0
- package/src/__tests__/setup.ts +71 -0
- package/src/__tests__/templates/accessibility.test.template.tsx +279 -0
- package/src/__tests__/templates/component.test.template.tsx +144 -0
- package/src/__tests__/templates/hook.test.template.ts +173 -0
- package/src/__tests__/templates/integration.test.template.tsx +199 -0
- package/src/__tests__/types/test.types.ts +106 -0
- package/src/components/Alert/Alert.test.tsx +496 -0
- package/src/components/Alert/Alert.tsx +134 -0
- package/src/components/Alert/index.ts +2 -0
- package/src/components/Avatar/Avatar.test.tsx +484 -0
- package/src/components/Avatar/Avatar.tsx +84 -0
- package/src/components/Avatar/index.ts +2 -0
- package/src/components/Button/Button.test.tsx +662 -0
- package/src/components/Button/Button.tsx +270 -0
- package/src/components/Button/index.ts +2 -0
- package/src/components/Card/Card.test.tsx +593 -0
- package/src/components/Card/Card.tsx +271 -0
- package/src/components/Card/index.ts +1 -0
- package/src/components/Checkbox/Checkbox.test.tsx +461 -0
- package/src/components/Checkbox/Checkbox.tsx +75 -0
- package/src/components/Checkbox/__mocks__/Checkbox.tsx +2 -0
- package/src/components/Checkbox/index.ts +2 -0
- package/src/components/DataTable/DataTable.tsx +446 -0
- package/src/components/DataTable/__tests__/README.md +145 -0
- package/src/components/DataTable/__tests__/mocks/MockRBACProvider.tsx +66 -0
- package/src/components/DataTable/__tests__/test-utils/dataFactories.ts +103 -0
- package/src/components/DataTable/__tests__/test-utils/sharedTestUtils.tsx +381 -0
- package/src/components/DataTable/__tests__/test-utils.ts +94 -0
- package/src/components/DataTable/components/AccessDeniedPage.tsx +168 -0
- package/src/components/DataTable/components/ActionButtons.tsx +194 -0
- package/src/components/DataTable/components/BulkOperationsDropdown.tsx +160 -0
- package/src/components/DataTable/components/ColumnFilter.tsx +114 -0
- package/src/components/DataTable/components/ColumnVisibilityDropdown.tsx +100 -0
- package/src/components/DataTable/components/DataTableBody.tsx +461 -0
- package/src/components/DataTable/components/DataTableCore.tsx +1027 -0
- package/src/components/DataTable/components/DataTableErrorBoundary.tsx +214 -0
- package/src/components/DataTable/components/DataTableModals.tsx +87 -0
- package/src/components/DataTable/components/DataTableToolbar.tsx +262 -0
- package/src/components/DataTable/components/DraggableColumnHeader.tsx +144 -0
- package/src/components/DataTable/components/EditableRow.tsx +159 -0
- package/src/components/DataTable/components/EmptyState.tsx +64 -0
- package/src/components/DataTable/components/ExpandButton.tsx +113 -0
- package/src/components/DataTable/components/FilterRow.tsx +100 -0
- package/src/components/DataTable/components/GroupHeader.tsx +42 -0
- package/src/components/DataTable/components/GroupingDropdown.tsx +96 -0
- package/src/components/DataTable/components/ImportModal.tsx +345 -0
- package/src/components/DataTable/components/LoadingState.tsx +12 -0
- package/src/components/DataTable/components/PaginationControls.tsx +332 -0
- package/src/components/DataTable/components/UnifiedTableBody.tsx +742 -0
- package/src/components/DataTable/components/ViewRowModal.tsx +68 -0
- package/src/components/DataTable/components/VirtualizedDataTable.tsx +513 -0
- package/src/components/DataTable/components/index.ts +16 -0
- package/src/components/DataTable/context/DataTableContext.tsx +97 -0
- package/src/components/DataTable/core/ActionManager.ts +235 -0
- package/src/components/DataTable/core/ColumnFactory.ts +268 -0
- package/src/components/DataTable/core/ColumnManager.ts +205 -0
- package/src/components/DataTable/core/DataManager.ts +188 -0
- package/src/components/DataTable/core/DataTableContext.tsx +181 -0
- package/src/components/DataTable/core/LocalDataAdapter.ts +264 -0
- package/src/components/DataTable/core/PluginRegistry.ts +229 -0
- package/src/components/DataTable/core/StateManager.ts +311 -0
- package/src/components/DataTable/core/index.ts +8 -0
- package/src/components/DataTable/core/interfaces.ts +338 -0
- package/src/components/DataTable/examples/HierarchicalActionsExample.tsx +419 -0
- package/src/components/DataTable/examples/HierarchicalExample.tsx +475 -0
- package/src/components/DataTable/examples/InitialPageSizeExample.tsx +176 -0
- package/src/components/DataTable/examples/PerformanceExample.tsx +505 -0
- package/src/components/DataTable/hooks/useColumnOrderPersistence.ts +95 -0
- package/src/components/DataTable/hooks/useColumnReordering.ts +110 -0
- package/src/components/DataTable/hooks/useDataTableState.ts +325 -0
- package/src/components/DataTable/hooks/useHierarchicalState.ts +174 -0
- package/src/components/DataTable/index.ts +68 -0
- package/src/components/DataTable/styles.ts +171 -0
- package/src/components/DataTable/types.ts +511 -0
- package/src/components/DataTable/utils/debugTools.ts +583 -0
- package/src/components/DataTable/utils/errorHandling.ts +494 -0
- package/src/components/DataTable/utils/exportUtils.ts +126 -0
- package/src/components/DataTable/utils/flexibleImport.ts +510 -0
- package/src/components/DataTable/utils/hierarchicalSorting.ts +151 -0
- package/src/components/DataTable/utils/hierarchicalUtils.ts +218 -0
- package/src/components/DataTable/utils/index.ts +1 -0
- package/src/components/DataTable/utils/performanceUtils.ts +351 -0
- package/src/components/Dialog/Dialog.test.tsx +1139 -0
- package/src/components/Dialog/Dialog.tsx +782 -0
- package/src/components/Dialog/README.md +804 -0
- package/src/components/Dialog/examples/BasicHtmlTest.tsx +55 -0
- package/src/components/Dialog/examples/DebugHtmlExample.tsx +68 -0
- package/src/components/Dialog/examples/HtmlDialogExample.tsx +202 -0
- package/src/components/Dialog/examples/SimpleHtmlTest.tsx +61 -0
- package/src/components/Dialog/examples/SmartDialogExample.tsx +322 -0
- package/src/components/Dialog/index.ts +12 -0
- package/src/components/Dialog/utils/safeHtml.ts +185 -0
- package/src/components/ErrorBoundary/ErrorBoundary.test.tsx +752 -0
- package/src/components/ErrorBoundary/ErrorBoundary.tsx +312 -0
- package/src/components/ErrorBoundary/index.ts +8 -0
- package/src/components/EventSelector/EventSelector.tsx +360 -0
- package/src/components/EventSelector/index.ts +3 -0
- package/src/components/EventSelector/types.ts +79 -0
- package/src/components/FileUpload/FileUpload.example.tsx +218 -0
- package/src/components/FileUpload/FileUpload.test.tsx +665 -0
- package/src/components/FileUpload/FileUpload.tsx +237 -0
- package/src/components/FileUpload/index.ts +6 -0
- package/src/components/Footer/Footer.test.tsx +482 -0
- package/src/components/Footer/Footer.tsx +197 -0
- package/src/components/Footer/index.ts +17 -0
- package/src/components/Form/Form.test.tsx +1158 -0
- package/src/components/Form/Form.tsx +166 -0
- package/src/components/Form/FormErrorSummary.tsx +113 -0
- package/src/components/Form/FormField.tsx +249 -0
- package/src/components/Form/FormFieldset.tsx +127 -0
- package/src/components/Form/FormLiveRegion.tsx +198 -0
- package/src/components/Form/index.ts +26 -0
- package/src/components/Header/Header.test.tsx +582 -0
- package/src/components/Header/Header.tsx +301 -0
- package/src/components/Header/index.ts +4 -0
- package/src/components/InactivityWarningModal/InactivityWarningModal.test.tsx +489 -0
- package/src/components/InactivityWarningModal/InactivityWarningModal.tsx +164 -0
- package/src/components/InactivityWarningModal/index.ts +9 -0
- package/src/components/Input/Input.test.tsx +466 -0
- package/src/components/Input/Input.tsx +201 -0
- package/src/components/Input/__mocks__/Input.tsx +2 -0
- package/src/components/Input/index.ts +9 -0
- package/src/components/Label/Label.tsx +186 -0
- package/src/components/Label/index.ts +2 -0
- package/src/components/LoadingSpinner/LoadingSpinner.test.tsx +450 -0
- package/src/components/LoadingSpinner/LoadingSpinner.tsx +98 -0
- package/src/components/LoadingSpinner/index.ts +3 -0
- package/src/components/LoginForm/LoginForm.test.tsx +816 -0
- package/src/components/LoginForm/LoginForm.tsx +273 -0
- package/src/components/LoginForm/index.ts +3 -0
- package/src/components/NavigationMenu/NavigationMenu.test.tsx +883 -0
- package/src/components/NavigationMenu/NavigationMenu.tsx +698 -0
- package/src/components/NavigationMenu/index.ts +10 -0
- package/src/components/NavigationMenu/types.ts +85 -0
- package/src/components/OrganisationSelector/OrganisationSelector.test.tsx +748 -0
- package/src/components/OrganisationSelector/OrganisationSelector.tsx +304 -0
- package/src/components/OrganisationSelector/index.ts +9 -0
- package/src/components/PaceAppLayout/PaceAppLayout.test.tsx +891 -0
- package/src/components/PaceAppLayout/PaceAppLayout.tsx +699 -0
- package/src/components/PaceAppLayout/README.md +278 -0
- package/src/components/PaceAppLayout/index.ts +1 -0
- package/src/components/PaceLoginPage/PaceLoginPage.test.tsx +475 -0
- package/src/components/PaceLoginPage/PaceLoginPage.tsx +221 -0
- package/src/components/PaceLoginPage/index.ts +1 -0
- package/src/components/PasswordReset/PasswordChangeForm.test.tsx +621 -0
- package/src/components/PasswordReset/PasswordChangeForm.tsx +186 -0
- package/src/components/PasswordReset/PasswordResetForm.test.tsx +605 -0
- package/src/components/PasswordReset/PasswordResetForm.tsx +201 -0
- package/src/components/PasswordReset/index.ts +4 -0
- package/src/components/PrintButton/PrintButton.tsx +321 -0
- package/src/components/PrintButton/PrintButtonGroup.tsx +84 -0
- package/src/components/PrintButton/PrintToolbar.tsx +94 -0
- package/src/components/PrintButton/examples/PrintButtonShowcase.tsx +438 -0
- package/src/components/PrintButton/index.ts +33 -0
- package/src/components/PrintButton/types.ts +173 -0
- package/src/components/PrintCard/PrintCard.tsx +154 -0
- package/src/components/PrintCard/PrintCardContent.tsx +57 -0
- package/src/components/PrintCard/PrintCardFooter.tsx +60 -0
- package/src/components/PrintCard/PrintCardGrid.tsx +91 -0
- package/src/components/PrintCard/PrintCardHeader.tsx +78 -0
- package/src/components/PrintCard/PrintCardImage.tsx +81 -0
- package/src/components/PrintCard/examples/PrintCardShowcase.tsx +239 -0
- package/src/components/PrintCard/index.ts +34 -0
- package/src/components/PrintCard/types.ts +171 -0
- package/src/components/PrintDataTable/PrintDataTable.tsx +215 -0
- package/src/components/PrintDataTable/PrintTableGroup.tsx +90 -0
- package/src/components/PrintDataTable/PrintTableRow.tsx +76 -0
- package/src/components/PrintDataTable/index.ts +25 -0
- package/src/components/PrintDataTable/types.ts +67 -0
- package/src/components/PrintFooter/PrintFooter.tsx +183 -0
- package/src/components/PrintFooter/PrintFooterContent.tsx +71 -0
- package/src/components/PrintFooter/PrintFooterInfo.tsx +86 -0
- package/src/components/PrintFooter/PrintPageNumber.tsx +90 -0
- package/src/components/PrintFooter/examples/PrintFooterShowcase.tsx +390 -0
- package/src/components/PrintFooter/index.ts +30 -0
- package/src/components/PrintFooter/types.ts +149 -0
- package/src/components/PrintGrid/PrintGrid.tsx +180 -0
- package/src/components/PrintGrid/PrintGridBreakpoint.tsx +109 -0
- package/src/components/PrintGrid/PrintGridContainer.tsx +128 -0
- package/src/components/PrintGrid/PrintGridItem.tsx +220 -0
- package/src/components/PrintGrid/examples/PrintGridShowcase.tsx +359 -0
- package/src/components/PrintGrid/index.ts +31 -0
- package/src/components/PrintGrid/types.ts +159 -0
- package/src/components/PrintHeader/PrintCoverHeader.tsx +230 -0
- package/src/components/PrintHeader/PrintHeader.tsx +150 -0
- package/src/components/PrintHeader/index.ts +17 -0
- package/src/components/PrintHeader/types.ts +42 -0
- package/src/components/PrintLayout/PrintLayout.tsx +122 -0
- package/src/components/PrintLayout/PrintLayoutContext.tsx +66 -0
- package/src/components/PrintLayout/PrintPageBreak.tsx +52 -0
- package/src/components/PrintLayout/examples/PrintShowcase.tsx +230 -0
- package/src/components/PrintLayout/index.ts +19 -0
- package/src/components/PrintLayout/types.ts +37 -0
- package/src/components/PrintPageBreak/PrintPageBreak.tsx +120 -0
- package/src/components/PrintPageBreak/PrintPageBreakGroup.tsx +90 -0
- package/src/components/PrintPageBreak/PrintPageBreakIndicator.tsx +112 -0
- package/src/components/PrintPageBreak/examples/PrintPageBreakShowcase.tsx +279 -0
- package/src/components/PrintPageBreak/index.ts +23 -0
- package/src/components/PrintPageBreak/types.ts +94 -0
- package/src/components/PrintSection/PrintColumn.tsx +104 -0
- package/src/components/PrintSection/PrintDivider.tsx +101 -0
- package/src/components/PrintSection/PrintSection.tsx +129 -0
- package/src/components/PrintSection/PrintSectionContent.tsx +75 -0
- package/src/components/PrintSection/PrintSectionHeader.tsx +97 -0
- package/src/components/PrintSection/examples/PrintSectionShowcase.tsx +258 -0
- package/src/components/PrintSection/index.ts +33 -0
- package/src/components/PrintSection/types.ts +155 -0
- package/src/components/PrintText/PrintText.tsx +116 -0
- package/src/components/PrintText/index.ts +16 -0
- package/src/components/PrintText/types.ts +24 -0
- package/src/components/Progress/Progress.tsx +116 -0
- package/src/components/Progress/index.ts +3 -0
- package/src/components/PublicLayout/EventLogo.tsx +287 -0
- package/src/components/PublicLayout/PublicErrorBoundary.tsx +279 -0
- package/src/components/PublicLayout/PublicLoadingSpinner.tsx +208 -0
- package/src/components/PublicLayout/PublicPageContextChecker.tsx +130 -0
- package/src/components/PublicLayout/PublicPageDebugger.tsx +104 -0
- package/src/components/PublicLayout/PublicPageDiagnostic.tsx +162 -0
- package/src/components/PublicLayout/PublicPageFooter.tsx +124 -0
- package/src/components/PublicLayout/PublicPageHeader.tsx +178 -0
- package/src/components/PublicLayout/PublicPageLayout.tsx +232 -0
- package/src/components/PublicLayout/PublicPageProvider.tsx +137 -0
- package/src/components/PublicLayout/index.ts +51 -0
- package/src/components/Select/Select.test.tsx +948 -0
- package/src/components/Select/Select.tsx +660 -0
- package/src/components/Select/index.ts +1 -0
- package/src/components/SuperAdminGuard.tsx +116 -0
- package/src/components/Table/Table.tsx +222 -0
- package/src/components/Table/index.ts +11 -0
- package/src/components/Toast/Toast.test.tsx +586 -0
- package/src/components/Toast/Toast.tsx +339 -0
- package/src/components/Toast/index.ts +14 -0
- package/src/components/Tooltip/Tooltip.test.tsx +852 -0
- package/src/components/Tooltip/Tooltip.tsx +167 -0
- package/src/components/Tooltip/index.ts +7 -0
- package/src/components/UserMenu/UserMenu.test.tsx +702 -0
- package/src/components/UserMenu/UserMenu.tsx +243 -0
- package/src/components/UserMenu/index.ts +3 -0
- package/src/components/examples/PermissionExample.tsx +150 -0
- package/src/components/index.ts +434 -0
- package/src/components.ts +19 -0
- package/src/constants/performance.ts +14 -0
- package/src/examples/CorrectPublicPageImplementation.tsx +301 -0
- package/src/examples/PublicEventPage.tsx +274 -0
- package/src/examples/PublicPageApp.tsx +308 -0
- package/src/examples/PublicPageUsageExample.tsx +216 -0
- package/src/hooks/index.ts +56 -0
- package/src/hooks/public/index.ts +34 -0
- package/src/hooks/public/usePublicEvent.ts +261 -0
- package/src/hooks/public/usePublicEventLogo.ts +285 -0
- package/src/hooks/public/usePublicRouteParams.ts +259 -0
- package/src/hooks/useAppConfig.ts +94 -0
- package/src/hooks/useComponentPerformance.ts +39 -0
- package/src/hooks/useCounter.test.ts +135 -0
- package/src/hooks/useDataTablePerformance.ts +387 -0
- package/src/hooks/useDataTableState.ts +110 -0
- package/src/hooks/useDebounce.test.ts +375 -0
- package/src/hooks/useDebounce.ts +18 -0
- package/src/hooks/useFocusManagement.ts +161 -0
- package/src/hooks/useFocusTrap.ts +155 -0
- package/src/hooks/useInactivityTracker.ts +372 -0
- package/src/hooks/useIsMobile.ts +42 -0
- package/src/hooks/useKeyboardShortcuts.ts +237 -0
- package/src/hooks/useOrganisationPermissions.test.ts +528 -0
- package/src/hooks/useOrganisationPermissions.ts +208 -0
- package/src/hooks/useOrganisationSecurity.test.ts +734 -0
- package/src/hooks/useOrganisationSecurity.ts +262 -0
- package/src/hooks/usePerformanceMonitor.ts +128 -0
- package/src/hooks/usePermissionCache.test.ts +542 -0
- package/src/hooks/usePermissionCache.ts +455 -0
- package/src/hooks/useSecureDataAccess.ts +586 -0
- package/src/hooks/useStorage.ts +274 -0
- package/src/hooks/useToast.ts +242 -0
- package/src/hooks/useZodForm.ts +28 -0
- package/src/index.ts +199 -0
- package/src/providers/AuthProvider.tsx +369 -0
- package/src/providers/EventProvider.tsx +324 -0
- package/src/providers/InactivityProvider.tsx +238 -0
- package/src/providers/OrganisationProvider.tsx +588 -0
- package/src/providers/UnifiedAuthProvider.tsx +327 -0
- package/src/providers/index.ts +17 -0
- package/src/rbac/README.md +885 -0
- package/src/rbac/__tests__/integration.test.tsx +218 -0
- package/src/rbac/adapters.tsx +726 -0
- package/src/rbac/api.test.ts +441 -0
- package/src/rbac/api.ts +339 -0
- package/src/rbac/audit-enhanced.ts +339 -0
- package/src/rbac/audit.ts +338 -0
- package/src/rbac/cache.ts +215 -0
- package/src/rbac/components/EnhancedNavigationMenu.tsx +294 -0
- package/src/rbac/components/NavigationGuard.tsx +294 -0
- package/src/rbac/components/NavigationProvider.tsx +314 -0
- package/src/rbac/components/PagePermissionGuard.tsx +430 -0
- package/src/rbac/components/PagePermissionProvider.tsx +274 -0
- package/src/rbac/components/PermissionEnforcer.tsx +307 -0
- package/src/rbac/components/RoleBasedRouter.tsx +425 -0
- package/src/rbac/components/SecureDataProvider.tsx +319 -0
- package/src/rbac/components/index.ts +64 -0
- package/src/rbac/config.ts +133 -0
- package/src/rbac/docs/event-based-apps.md +285 -0
- package/src/rbac/engine.ts +1026 -0
- package/src/rbac/eslint-rules.js +285 -0
- package/src/rbac/examples/CompleteRBACExample.tsx +323 -0
- package/src/rbac/examples/EventBasedApp.tsx +238 -0
- package/src/rbac/hooks/index.ts +21 -0
- package/src/rbac/hooks/useCan.test.ts +461 -0
- package/src/rbac/hooks/usePermissions.test.ts +359 -0
- package/src/rbac/hooks/usePermissions.ts +567 -0
- package/src/rbac/hooks/useRBAC.simple.test.ts +90 -0
- package/src/rbac/hooks/useRBAC.test.ts +503 -0
- package/src/rbac/hooks/useRBAC.ts +262 -0
- package/src/rbac/index.ts +109 -0
- package/src/rbac/permissions.ts +293 -0
- package/src/rbac/providers/RBACProvider.tsx +634 -0
- package/src/rbac/providers/__tests__/RBACProvider.test.tsx +687 -0
- package/src/rbac/providers/index.ts +11 -0
- package/src/rbac/secureClient.ts +244 -0
- package/src/rbac/security.ts +346 -0
- package/src/rbac/testing/index.tsx +340 -0
- package/src/rbac/types.ts +343 -0
- package/src/rbac/utils/eventContext.ts +83 -0
- package/src/styles/core.css +364 -0
- package/src/styles/index.ts +51 -0
- package/src/theming/runtime.ts +187 -0
- package/src/types/database.ts +472 -0
- package/src/types/guards.ts +30 -0
- package/src/types/index.ts +25 -0
- package/src/types/organisation.ts +184 -0
- package/src/types/security.ts +70 -0
- package/src/types/supabase.ts +166 -0
- package/src/types/theme.ts +6 -0
- package/src/types/unified.ts +262 -0
- package/src/types/validation.ts +164 -0
- package/src/types/vitest-globals.d.ts +43 -0
- package/src/utils/__mocks__/supabaseMock.ts +75 -0
- package/src/utils/__mocks__/supabaseMock.tsx +198 -0
- package/src/utils/appConfig.ts +47 -0
- package/src/utils/appIdResolver.ts +130 -0
- package/src/utils/appNameResolver.ts +190 -0
- package/src/utils/audit.ts +127 -0
- package/src/utils/auth-utils.ts +96 -0
- package/src/utils/bundleAnalysis.ts +129 -0
- package/src/utils/cn.ts +7 -0
- package/src/utils/debugLogger.ts +46 -0
- package/src/utils/deviceFingerprint.ts +215 -0
- package/src/utils/dynamicUtils.ts +105 -0
- package/src/utils/formatDate.test.ts +241 -0
- package/src/utils/formatting.ts +77 -0
- package/src/utils/index.ts +145 -0
- package/src/utils/lazyLoad.tsx +44 -0
- package/src/utils/organisationContext.ts +135 -0
- package/src/utils/performanceBenchmark.ts +64 -0
- package/src/utils/performanceBudgets.ts +111 -0
- package/src/utils/permissionTypes.ts +37 -0
- package/src/utils/permissionUtils.ts +31 -0
- package/src/utils/print/PrintDataProcessor.ts +390 -0
- package/src/utils/print/examples/PrintUtilitiesShowcase.tsx +397 -0
- package/src/utils/print/index.ts +29 -0
- package/src/utils/print/types.ts +196 -0
- package/src/utils/print/usePrintOptimization.ts +272 -0
- package/src/utils/sanitization.ts +264 -0
- package/src/utils/schemaUtils.ts +37 -0
- package/src/utils/secureDataAccess.ts +361 -0
- package/src/utils/secureErrors.ts +79 -0
- package/src/utils/secureStorage.ts +244 -0
- package/src/utils/security.ts +156 -0
- package/src/utils/securityMonitor.ts +45 -0
- package/src/utils/sessionTracking.ts +170 -0
- package/src/utils/storage/README.md +348 -0
- package/src/utils/storage/config.ts +100 -0
- package/src/utils/storage/helpers.ts +359 -0
- package/src/utils/storage/index.ts +36 -0
- package/src/utils/storage/types.ts +90 -0
- package/src/utils/validation.ts +111 -0
- package/src/utils/validationUtils.ts +120 -0
- package/src/validation/common.ts +53 -0
- package/src/validation/csrf.ts +214 -0
- package/src/validation/index.ts +43 -0
- package/src/validation/passwordSchema.ts +125 -0
- package/src/validation/sanitization.ts +96 -0
- package/src/validation/schemaUtils.ts +42 -0
- package/src/validation/sqlInjectionProtection.ts +242 -0
- package/src/validation/user.ts +34 -0
- package/dist/chunk-4MCJAK7J.js.map +0 -1
- package/dist/chunk-4ZTIEYU2.js.map +0 -1
- package/dist/chunk-H4PZ4B3Y.js.map +0 -1
- package/dist/chunk-IOX76PSM.js.map +0 -1
- package/dist/chunk-JUUNUW3O.js.map +0 -1
- package/dist/chunk-KK6WIDK6.js +0 -63
- package/dist/chunk-KK6WIDK6.js.map +0 -1
- package/dist/chunk-U7DY5T33.js +0 -11
- package/dist/chunk-U7DY5T33.js.map +0 -1
- package/dist/chunk-WHLSWC6W.js.map +0 -1
- package/dist/chunk-XI7QFSSC.js +0 -790
- package/dist/chunk-XI7QFSSC.js.map +0 -1
- package/dist/chunk-XIJMMBDD.js +0 -73
- package/dist/chunk-XIJMMBDD.js.map +0 -1
- package/dist/chunk-YNU5QJ4S.js.map +0 -1
- package/dist/chunk-YWYCNGWH.js +0 -2070
- package/dist/chunk-YWYCNGWH.js.map +0 -1
- package/dist/chunk-ZJ3UKPIW.js +0 -952
- package/dist/chunk-ZJ3UKPIW.js.map +0 -1
- package/dist/useAppConfig-CZNJJsT_.d.ts +0 -148
- package/dist/{DataTable-2LB6HI6V.js.map → DataTable-ZQDRE46Q.js.map} +0 -0
- package/dist/{api-AIJ3IJX3.js.map → api-H5A3H4IR.js.map} +0 -0
- package/dist/{audit-PD5L5ZSC.js.map → appNameResolver-7GHF5ED2.js.map} +0 -0
- package/dist/{chunk-DC5AMYBS.js.map → audit-BUW3LMJB.js.map} +0 -0
- package/dist/{validation-D2-NNCCE.d.ts → validation-PM_iOaTI.d.ts} +6 -6
|
@@ -0,0 +1,1925 @@
|
|
|
1
|
+
import {
|
|
2
|
+
useAccessLevel,
|
|
3
|
+
useCan
|
|
4
|
+
} from "./chunk-QVYBYGT2.js";
|
|
5
|
+
import {
|
|
6
|
+
OrganisationContextRequiredError,
|
|
7
|
+
RBACCache,
|
|
8
|
+
getRBACLogger,
|
|
9
|
+
rbacCache
|
|
10
|
+
} from "./chunk-GWSBHC4J.js";
|
|
11
|
+
import {
|
|
12
|
+
useSecureDataAccess
|
|
13
|
+
} from "./chunk-HD7PYDUV.js";
|
|
14
|
+
import {
|
|
15
|
+
init_RBACProvider,
|
|
16
|
+
init_UnifiedAuthProvider,
|
|
17
|
+
useUnifiedAuth
|
|
18
|
+
} from "./chunk-QKHFMQ5R.js";
|
|
19
|
+
import {
|
|
20
|
+
getCurrentAppName,
|
|
21
|
+
init_appNameResolver
|
|
22
|
+
} from "./chunk-MZBUOP4P.js";
|
|
23
|
+
|
|
24
|
+
// src/rbac/secureClient.ts
|
|
25
|
+
import { createClient } from "@supabase/supabase-js";
|
|
26
|
+
var SecureSupabaseClient = class _SecureSupabaseClient {
|
|
27
|
+
constructor(supabaseUrl, supabaseKey, organisationId, eventId, appId) {
|
|
28
|
+
this.supabaseUrl = supabaseUrl;
|
|
29
|
+
this.supabaseKey = supabaseKey;
|
|
30
|
+
this.organisationId = organisationId;
|
|
31
|
+
this.eventId = eventId;
|
|
32
|
+
this.appId = appId;
|
|
33
|
+
this.supabase = createClient(supabaseUrl, supabaseKey, {
|
|
34
|
+
global: {
|
|
35
|
+
headers: {
|
|
36
|
+
"x-organisation-id": organisationId,
|
|
37
|
+
"x-event-id": eventId || "",
|
|
38
|
+
"x-app-id": appId || ""
|
|
39
|
+
}
|
|
40
|
+
}
|
|
41
|
+
});
|
|
42
|
+
this.setupContextInjection();
|
|
43
|
+
}
|
|
44
|
+
/**
|
|
45
|
+
* Setup context injection for all database operations
|
|
46
|
+
*/
|
|
47
|
+
setupContextInjection() {
|
|
48
|
+
const originalFrom = this.supabase.from.bind(this.supabase);
|
|
49
|
+
this.supabase.from = (table) => {
|
|
50
|
+
this.validateContext();
|
|
51
|
+
const query = originalFrom(table);
|
|
52
|
+
return this.injectContext(query);
|
|
53
|
+
};
|
|
54
|
+
const originalRpc = this.supabase.rpc.bind(this.supabase);
|
|
55
|
+
this.supabase.rpc = (fn, args) => {
|
|
56
|
+
this.validateContext();
|
|
57
|
+
const contextArgs = {
|
|
58
|
+
...args,
|
|
59
|
+
p_organisation_id: this.organisationId,
|
|
60
|
+
p_event_id: this.eventId,
|
|
61
|
+
p_app_id: this.appId
|
|
62
|
+
};
|
|
63
|
+
return originalRpc(fn, contextArgs);
|
|
64
|
+
};
|
|
65
|
+
}
|
|
66
|
+
/**
|
|
67
|
+
* Inject organisation context into a query
|
|
68
|
+
*/
|
|
69
|
+
injectContext(query) {
|
|
70
|
+
const originalSelect = query.select.bind(query);
|
|
71
|
+
const originalInsert = query.insert.bind(query);
|
|
72
|
+
const originalUpdate = query.update.bind(query);
|
|
73
|
+
const originalDelete = query.delete.bind(query);
|
|
74
|
+
query.select = (columns) => {
|
|
75
|
+
const result = originalSelect(columns);
|
|
76
|
+
return this.addOrganisationFilter(result);
|
|
77
|
+
};
|
|
78
|
+
query.insert = (values) => {
|
|
79
|
+
const contextValues = Array.isArray(values) ? values.map((v) => ({ ...v, organisation_id: this.organisationId })) : { ...values, organisation_id: this.organisationId };
|
|
80
|
+
return originalInsert(contextValues);
|
|
81
|
+
};
|
|
82
|
+
query.update = (values) => {
|
|
83
|
+
const result = originalUpdate(values);
|
|
84
|
+
return this.addOrganisationFilter(result);
|
|
85
|
+
};
|
|
86
|
+
query.delete = () => {
|
|
87
|
+
const result = originalDelete();
|
|
88
|
+
return this.addOrganisationFilter(result);
|
|
89
|
+
};
|
|
90
|
+
return query;
|
|
91
|
+
}
|
|
92
|
+
/**
|
|
93
|
+
* Add organisation filter to a query
|
|
94
|
+
*/
|
|
95
|
+
addOrganisationFilter(query) {
|
|
96
|
+
return query.eq("organisation_id", this.organisationId);
|
|
97
|
+
}
|
|
98
|
+
/**
|
|
99
|
+
* Validate that required context is present
|
|
100
|
+
*/
|
|
101
|
+
validateContext() {
|
|
102
|
+
if (!this.organisationId) {
|
|
103
|
+
throw new OrganisationContextRequiredError();
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
/**
|
|
107
|
+
* Get the current organisation ID
|
|
108
|
+
*/
|
|
109
|
+
getOrganisationId() {
|
|
110
|
+
return this.organisationId;
|
|
111
|
+
}
|
|
112
|
+
/**
|
|
113
|
+
* Get the current event ID
|
|
114
|
+
*/
|
|
115
|
+
getEventId() {
|
|
116
|
+
return this.eventId;
|
|
117
|
+
}
|
|
118
|
+
/**
|
|
119
|
+
* Get the current app ID
|
|
120
|
+
*/
|
|
121
|
+
getAppId() {
|
|
122
|
+
return this.appId;
|
|
123
|
+
}
|
|
124
|
+
/**
|
|
125
|
+
* Create a new client with updated context
|
|
126
|
+
*/
|
|
127
|
+
withContext(updates) {
|
|
128
|
+
return new _SecureSupabaseClient(
|
|
129
|
+
this.supabaseUrl,
|
|
130
|
+
this.supabaseKey,
|
|
131
|
+
updates.organisationId || this.organisationId,
|
|
132
|
+
updates.eventId !== void 0 ? updates.eventId : this.eventId,
|
|
133
|
+
updates.appId !== void 0 ? updates.appId : this.appId
|
|
134
|
+
);
|
|
135
|
+
}
|
|
136
|
+
/**
|
|
137
|
+
* Get the underlying Supabase client (for internal use only)
|
|
138
|
+
* @internal
|
|
139
|
+
*/
|
|
140
|
+
getClient() {
|
|
141
|
+
return this.supabase;
|
|
142
|
+
}
|
|
143
|
+
};
|
|
144
|
+
function createSecureClient(supabaseUrl, supabaseKey, organisationId, eventId, appId) {
|
|
145
|
+
return new SecureSupabaseClient(supabaseUrl, supabaseKey, organisationId, eventId, appId);
|
|
146
|
+
}
|
|
147
|
+
function fromSupabaseClient(client, organisationId, eventId, appId) {
|
|
148
|
+
throw new Error("fromSupabaseClient is not supported. Use createSecureClient instead.");
|
|
149
|
+
}
|
|
150
|
+
|
|
151
|
+
// src/rbac/components/PagePermissionProvider.tsx
|
|
152
|
+
init_UnifiedAuthProvider();
|
|
153
|
+
import { createContext, useContext, useState, useCallback, useMemo, useEffect } from "react";
|
|
154
|
+
import { jsx } from "react/jsx-runtime";
|
|
155
|
+
var PagePermissionContext = createContext(null);
|
|
156
|
+
function PagePermissionProvider({
|
|
157
|
+
children,
|
|
158
|
+
strictMode = true,
|
|
159
|
+
auditLog = true,
|
|
160
|
+
onPageAccess,
|
|
161
|
+
onStrictModeViolation,
|
|
162
|
+
maxHistorySize = 1e3
|
|
163
|
+
}) {
|
|
164
|
+
const { user, selectedOrganisationId, selectedEventId } = useUnifiedAuth();
|
|
165
|
+
const [pageAccessHistory, setPageAccessHistory] = useState([]);
|
|
166
|
+
const [isEnabled, setIsEnabled] = useState(true);
|
|
167
|
+
const currentScope = useMemo(() => {
|
|
168
|
+
if (!selectedOrganisationId) return null;
|
|
169
|
+
return {
|
|
170
|
+
organisationId: selectedOrganisationId,
|
|
171
|
+
eventId: selectedEventId || void 0,
|
|
172
|
+
appId: void 0
|
|
173
|
+
};
|
|
174
|
+
}, [selectedOrganisationId, selectedEventId]);
|
|
175
|
+
const hasPagePermission = useCallback((pageName, operation, pageId, scope) => {
|
|
176
|
+
if (!isEnabled) return true;
|
|
177
|
+
if (!user?.id) return false;
|
|
178
|
+
const effectiveScope = scope || currentScope;
|
|
179
|
+
if (!effectiveScope) return false;
|
|
180
|
+
const permission = `${operation}:page.${pageName}`;
|
|
181
|
+
return false;
|
|
182
|
+
}, [isEnabled, user?.id, currentScope]);
|
|
183
|
+
const getPagePermissions = useCallback(() => {
|
|
184
|
+
if (!isEnabled || !user?.id) return {};
|
|
185
|
+
return {};
|
|
186
|
+
}, [isEnabled, user?.id]);
|
|
187
|
+
const getPageAccessHistory = useCallback(() => {
|
|
188
|
+
return [...pageAccessHistory];
|
|
189
|
+
}, [pageAccessHistory]);
|
|
190
|
+
const clearPageAccessHistory = useCallback(() => {
|
|
191
|
+
setPageAccessHistory([]);
|
|
192
|
+
}, []);
|
|
193
|
+
const recordPageAccess = useCallback((pageName, operation, allowed, pageId, scope) => {
|
|
194
|
+
if (!auditLog || !user?.id) return;
|
|
195
|
+
const record = {
|
|
196
|
+
pageName,
|
|
197
|
+
operation,
|
|
198
|
+
userId: user.id,
|
|
199
|
+
scope: scope || currentScope || { organisationId: "" },
|
|
200
|
+
allowed,
|
|
201
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString(),
|
|
202
|
+
pageId
|
|
203
|
+
};
|
|
204
|
+
setPageAccessHistory((prev) => {
|
|
205
|
+
const newHistory = [record, ...prev];
|
|
206
|
+
return newHistory.slice(0, maxHistorySize);
|
|
207
|
+
});
|
|
208
|
+
if (onPageAccess) {
|
|
209
|
+
onPageAccess(pageName, operation, allowed, record);
|
|
210
|
+
}
|
|
211
|
+
if (strictMode && !allowed && onStrictModeViolation) {
|
|
212
|
+
onStrictModeViolation(pageName, operation, record);
|
|
213
|
+
}
|
|
214
|
+
}, [auditLog, user?.id, currentScope, maxHistorySize, onPageAccess, onStrictModeViolation, strictMode]);
|
|
215
|
+
const contextValue = useMemo(() => ({
|
|
216
|
+
hasPagePermission,
|
|
217
|
+
getPagePermissions,
|
|
218
|
+
isEnabled,
|
|
219
|
+
isStrictMode: strictMode,
|
|
220
|
+
isAuditLogEnabled: auditLog,
|
|
221
|
+
getPageAccessHistory,
|
|
222
|
+
clearPageAccessHistory
|
|
223
|
+
}), [
|
|
224
|
+
hasPagePermission,
|
|
225
|
+
getPagePermissions,
|
|
226
|
+
isEnabled,
|
|
227
|
+
strictMode,
|
|
228
|
+
auditLog,
|
|
229
|
+
getPageAccessHistory,
|
|
230
|
+
clearPageAccessHistory
|
|
231
|
+
]);
|
|
232
|
+
useEffect(() => {
|
|
233
|
+
if (strictMode && auditLog) {
|
|
234
|
+
console.log(`[PagePermissionProvider] Strict mode enabled - all page access attempts will be logged and enforced`);
|
|
235
|
+
}
|
|
236
|
+
}, [strictMode, auditLog]);
|
|
237
|
+
return /* @__PURE__ */ jsx(PagePermissionContext.Provider, { value: contextValue, children });
|
|
238
|
+
}
|
|
239
|
+
function usePagePermissions() {
|
|
240
|
+
const context = useContext(PagePermissionContext);
|
|
241
|
+
if (!context) {
|
|
242
|
+
throw new Error("usePagePermissions must be used within a PagePermissionProvider");
|
|
243
|
+
}
|
|
244
|
+
return context;
|
|
245
|
+
}
|
|
246
|
+
|
|
247
|
+
// src/rbac/components/PagePermissionGuard.tsx
|
|
248
|
+
import { useMemo as useMemo2, useEffect as useEffect2, useState as useState2 } from "react";
|
|
249
|
+
init_UnifiedAuthProvider();
|
|
250
|
+
|
|
251
|
+
// src/rbac/utils/eventContext.ts
|
|
252
|
+
async function getOrganisationFromEvent(supabase, eventId) {
|
|
253
|
+
const { data, error } = await supabase.from("event").select("organisation_id").eq("event_id", eventId).single();
|
|
254
|
+
if (error || !data) {
|
|
255
|
+
return null;
|
|
256
|
+
}
|
|
257
|
+
return data.organisation_id;
|
|
258
|
+
}
|
|
259
|
+
async function createScopeFromEvent(supabase, eventId, appId) {
|
|
260
|
+
const organisationId = await getOrganisationFromEvent(supabase, eventId);
|
|
261
|
+
if (!organisationId) {
|
|
262
|
+
return null;
|
|
263
|
+
}
|
|
264
|
+
return {
|
|
265
|
+
organisationId,
|
|
266
|
+
eventId,
|
|
267
|
+
appId
|
|
268
|
+
};
|
|
269
|
+
}
|
|
270
|
+
|
|
271
|
+
// src/rbac/components/PagePermissionGuard.tsx
|
|
272
|
+
init_appNameResolver();
|
|
273
|
+
import { Fragment, jsx as jsx2, jsxs } from "react/jsx-runtime";
|
|
274
|
+
function PagePermissionGuard({
|
|
275
|
+
pageName,
|
|
276
|
+
operation,
|
|
277
|
+
children,
|
|
278
|
+
fallback = /* @__PURE__ */ jsx2(DefaultAccessDenied, {}),
|
|
279
|
+
strictMode = true,
|
|
280
|
+
auditLog = true,
|
|
281
|
+
pageId,
|
|
282
|
+
scope,
|
|
283
|
+
onDenied,
|
|
284
|
+
loading = /* @__PURE__ */ jsx2(DefaultLoading, {})
|
|
285
|
+
}) {
|
|
286
|
+
const { user, selectedOrganisationId, selectedEventId, supabase } = useUnifiedAuth();
|
|
287
|
+
const [hasChecked, setHasChecked] = useState2(false);
|
|
288
|
+
const [checkError, setCheckError] = useState2(null);
|
|
289
|
+
const [resolvedScope, setResolvedScope] = useState2(null);
|
|
290
|
+
useEffect2(() => {
|
|
291
|
+
const resolveScope = async () => {
|
|
292
|
+
if (scope) {
|
|
293
|
+
setResolvedScope(scope);
|
|
294
|
+
return;
|
|
295
|
+
}
|
|
296
|
+
let appId = void 0;
|
|
297
|
+
if (supabase) {
|
|
298
|
+
const appName = getCurrentAppName();
|
|
299
|
+
if (appName) {
|
|
300
|
+
try {
|
|
301
|
+
console.log("[PagePermissionGuard] Resolving app name to ID:", appName);
|
|
302
|
+
const { data: app, error: error2 } = await supabase.from("rbac_apps").select("id, name, is_active").eq("name", appName).eq("is_active", true).single();
|
|
303
|
+
if (error2) {
|
|
304
|
+
console.error("[PagePermissionGuard] Database error resolving app ID:", error2);
|
|
305
|
+
const { data: inactiveApp } = await supabase.from("rbac_apps").select("id, name, is_active").eq("name", appName).single();
|
|
306
|
+
if (inactiveApp) {
|
|
307
|
+
console.error(`[PagePermissionGuard] App "${appName}" exists but is inactive (is_active: ${inactiveApp.is_active})`);
|
|
308
|
+
} else {
|
|
309
|
+
console.error(`[PagePermissionGuard] App "${appName}" not found in rbac_apps table`);
|
|
310
|
+
}
|
|
311
|
+
} else if (app) {
|
|
312
|
+
appId = app.id;
|
|
313
|
+
console.log("[PagePermissionGuard] Successfully resolved app ID:", app.id);
|
|
314
|
+
} else {
|
|
315
|
+
console.error("[PagePermissionGuard] No app data returned for:", appName);
|
|
316
|
+
}
|
|
317
|
+
} catch (error2) {
|
|
318
|
+
console.error("[PagePermissionGuard] Unexpected error resolving app ID:", error2);
|
|
319
|
+
}
|
|
320
|
+
} else {
|
|
321
|
+
console.error("[PagePermissionGuard] No app name found. Make sure to call setRBACAppName() in your app setup.");
|
|
322
|
+
}
|
|
323
|
+
}
|
|
324
|
+
if (selectedOrganisationId && selectedEventId) {
|
|
325
|
+
if (!appId) {
|
|
326
|
+
if (false) {
|
|
327
|
+
console.warn("[PagePermissionGuard] App ID not resolved in test environment, proceeding without it");
|
|
328
|
+
} else {
|
|
329
|
+
console.error("[PagePermissionGuard] CRITICAL: App ID not resolved. Check console for details.");
|
|
330
|
+
setCheckError(new Error("App ID not resolved. Check console for database errors."));
|
|
331
|
+
setResolvedScope(null);
|
|
332
|
+
return;
|
|
333
|
+
}
|
|
334
|
+
}
|
|
335
|
+
if (appId) {
|
|
336
|
+
const uuidRegex = /^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;
|
|
337
|
+
if (!uuidRegex.test(appId)) {
|
|
338
|
+
console.error("[PagePermissionGuard] CRITICAL: App ID is not a valid UUID:", appId);
|
|
339
|
+
setCheckError(new Error(`Invalid app ID format: ${appId}. Expected UUID.`));
|
|
340
|
+
setResolvedScope(null);
|
|
341
|
+
return;
|
|
342
|
+
}
|
|
343
|
+
}
|
|
344
|
+
const resolvedScope2 = {
|
|
345
|
+
organisationId: selectedOrganisationId,
|
|
346
|
+
eventId: selectedEventId,
|
|
347
|
+
appId
|
|
348
|
+
};
|
|
349
|
+
console.log("[PagePermissionGuard] Setting resolved scope:", resolvedScope2);
|
|
350
|
+
setResolvedScope(resolvedScope2);
|
|
351
|
+
return;
|
|
352
|
+
}
|
|
353
|
+
if (selectedOrganisationId) {
|
|
354
|
+
if (!appId) {
|
|
355
|
+
if (false) {
|
|
356
|
+
console.warn("[PagePermissionGuard] App ID not resolved in test environment, proceeding without it");
|
|
357
|
+
} else {
|
|
358
|
+
console.error("[PagePermissionGuard] CRITICAL: App ID not resolved. Check console for details.");
|
|
359
|
+
setCheckError(new Error("App ID not resolved. Check console for database errors."));
|
|
360
|
+
setResolvedScope(null);
|
|
361
|
+
return;
|
|
362
|
+
}
|
|
363
|
+
}
|
|
364
|
+
if (appId) {
|
|
365
|
+
const uuidRegex = /^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$/i;
|
|
366
|
+
if (!uuidRegex.test(appId)) {
|
|
367
|
+
console.error("[PagePermissionGuard] CRITICAL: App ID is not a valid UUID:", appId);
|
|
368
|
+
setCheckError(new Error(`Invalid app ID format: ${appId}. Expected UUID.`));
|
|
369
|
+
setResolvedScope(null);
|
|
370
|
+
return;
|
|
371
|
+
}
|
|
372
|
+
}
|
|
373
|
+
const resolvedScope2 = {
|
|
374
|
+
organisationId: selectedOrganisationId,
|
|
375
|
+
eventId: selectedEventId || void 0,
|
|
376
|
+
appId
|
|
377
|
+
};
|
|
378
|
+
console.log("[PagePermissionGuard] Setting resolved scope (org only):", resolvedScope2);
|
|
379
|
+
setResolvedScope(resolvedScope2);
|
|
380
|
+
return;
|
|
381
|
+
}
|
|
382
|
+
if (selectedEventId && supabase) {
|
|
383
|
+
try {
|
|
384
|
+
const eventScope = await createScopeFromEvent(supabase, selectedEventId);
|
|
385
|
+
if (!eventScope) {
|
|
386
|
+
setCheckError(new Error("Could not resolve organization from event context"));
|
|
387
|
+
setResolvedScope(null);
|
|
388
|
+
return;
|
|
389
|
+
}
|
|
390
|
+
setResolvedScope({
|
|
391
|
+
...eventScope,
|
|
392
|
+
appId: appId || eventScope.appId
|
|
393
|
+
});
|
|
394
|
+
} catch (error2) {
|
|
395
|
+
setCheckError(error2);
|
|
396
|
+
setResolvedScope(null);
|
|
397
|
+
}
|
|
398
|
+
return;
|
|
399
|
+
}
|
|
400
|
+
setCheckError(new Error("Either organisation context or event context is required for page permission checking"));
|
|
401
|
+
setResolvedScope(null);
|
|
402
|
+
};
|
|
403
|
+
resolveScope();
|
|
404
|
+
}, [scope, selectedOrganisationId, selectedEventId, supabase]);
|
|
405
|
+
const effectivePageId = useMemo2(() => {
|
|
406
|
+
return pageId || pageName;
|
|
407
|
+
}, [pageId, pageName]);
|
|
408
|
+
const permission = useMemo2(() => {
|
|
409
|
+
return `${operation}:page.${pageName}`;
|
|
410
|
+
}, [operation, pageName]);
|
|
411
|
+
console.log("[PagePermissionGuard] Calling useCan with scope:", resolvedScope);
|
|
412
|
+
console.log("[PagePermissionGuard] resolvedScope:", resolvedScope);
|
|
413
|
+
console.log("[PagePermissionGuard] selectedEventId:", selectedEventId);
|
|
414
|
+
console.log("[PagePermissionGuard] About to call useCan with:", {
|
|
415
|
+
userId: user?.id || "",
|
|
416
|
+
scope: resolvedScope || { organisationId: "", appId: "", eventId: selectedEventId || void 0 },
|
|
417
|
+
permission,
|
|
418
|
+
pageId: effectivePageId,
|
|
419
|
+
useCache: true
|
|
420
|
+
});
|
|
421
|
+
const { can, isLoading: canIsLoading, error: canError } = useCan(
|
|
422
|
+
user?.id || "",
|
|
423
|
+
resolvedScope || { organisationId: "", appId: "", eventId: selectedEventId || void 0 },
|
|
424
|
+
permission,
|
|
425
|
+
effectivePageId,
|
|
426
|
+
true
|
|
427
|
+
// Use cache
|
|
428
|
+
);
|
|
429
|
+
console.log("[PagePermissionGuard] useCan returned:", { can, canIsLoading, canError });
|
|
430
|
+
const isLoading = !resolvedScope || canIsLoading;
|
|
431
|
+
const error = checkError || canError;
|
|
432
|
+
console.log("[PagePermissionGuard] Combined state:", {
|
|
433
|
+
can,
|
|
434
|
+
isLoading,
|
|
435
|
+
canIsLoading,
|
|
436
|
+
resolvedScopeExists: !!resolvedScope,
|
|
437
|
+
error: error?.message
|
|
438
|
+
});
|
|
439
|
+
useEffect2(() => {
|
|
440
|
+
if (!isLoading && !error) {
|
|
441
|
+
setHasChecked(true);
|
|
442
|
+
setCheckError(null);
|
|
443
|
+
if (!can && onDenied) {
|
|
444
|
+
onDenied(pageName, operation);
|
|
445
|
+
}
|
|
446
|
+
} else if (error) {
|
|
447
|
+
setCheckError(error);
|
|
448
|
+
setHasChecked(true);
|
|
449
|
+
}
|
|
450
|
+
}, [can, isLoading, error, pageName, operation, onDenied]);
|
|
451
|
+
useEffect2(() => {
|
|
452
|
+
if (auditLog && hasChecked && !isLoading) {
|
|
453
|
+
console.log(`[PagePermissionGuard] Page access attempt:`, {
|
|
454
|
+
pageName,
|
|
455
|
+
operation,
|
|
456
|
+
userId: user?.id,
|
|
457
|
+
scope: resolvedScope,
|
|
458
|
+
allowed: can,
|
|
459
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
460
|
+
});
|
|
461
|
+
}
|
|
462
|
+
}, [auditLog, hasChecked, isLoading, pageName, operation, user?.id, resolvedScope, can]);
|
|
463
|
+
useEffect2(() => {
|
|
464
|
+
if (strictMode && hasChecked && !isLoading && !can) {
|
|
465
|
+
console.error(`[PagePermissionGuard] STRICT MODE VIOLATION: User attempted to access protected page without permission`, {
|
|
466
|
+
pageName,
|
|
467
|
+
operation,
|
|
468
|
+
userId: user?.id,
|
|
469
|
+
scope: resolvedScope,
|
|
470
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
471
|
+
});
|
|
472
|
+
}
|
|
473
|
+
}, [strictMode, hasChecked, isLoading, can, pageName, operation, user?.id, resolvedScope]);
|
|
474
|
+
if (isLoading || !resolvedScope || !hasChecked) {
|
|
475
|
+
return /* @__PURE__ */ jsx2(Fragment, { children: loading });
|
|
476
|
+
}
|
|
477
|
+
if (checkError) {
|
|
478
|
+
console.error(`[PagePermissionGuard] Permission check failed for page ${pageName}:`, checkError);
|
|
479
|
+
return /* @__PURE__ */ jsx2(Fragment, { children: fallback });
|
|
480
|
+
}
|
|
481
|
+
if (!can) {
|
|
482
|
+
return /* @__PURE__ */ jsx2(Fragment, { children: fallback });
|
|
483
|
+
}
|
|
484
|
+
return /* @__PURE__ */ jsx2(Fragment, { children });
|
|
485
|
+
}
|
|
486
|
+
function DefaultAccessDenied() {
|
|
487
|
+
return /* @__PURE__ */ jsxs("div", { className: "flex flex-col items-center justify-center min-h-[200px] p-8 text-center", children: [
|
|
488
|
+
/* @__PURE__ */ jsx2("div", { className: "mb-4", children: /* @__PURE__ */ jsx2("svg", { className: "w-16 h-16 text-acc-500 mx-auto", fill: "none", stroke: "currentColor", viewBox: "0 0 24 24", children: /* @__PURE__ */ jsx2("path", { strokeLinecap: "round", strokeLinejoin: "round", strokeWidth: 2, d: "M12 9v2m0 4h.01m-6.938 4h13.856c1.54 0 2.502-1.667 1.732-2.5L13.732 4c-.77-.833-1.964-.833-2.732 0L3.732 16.5c-.77.833.192 2.5 1.732 2.5z" }) }) }),
|
|
489
|
+
/* @__PURE__ */ jsx2("h2", { className: "text-xl font-semibold text-sec-900 mb-2", children: "Access Denied" }),
|
|
490
|
+
/* @__PURE__ */ jsx2("p", { className: "text-sec-600 mb-4", children: "You don't have permission to access this page." }),
|
|
491
|
+
/* @__PURE__ */ jsx2(
|
|
492
|
+
"button",
|
|
493
|
+
{
|
|
494
|
+
onClick: () => window.history.back(),
|
|
495
|
+
className: "px-4 py-2 bg-main-600 text-main-50 rounded-md hover:bg-main-700 transition-colors",
|
|
496
|
+
children: "Go Back"
|
|
497
|
+
}
|
|
498
|
+
)
|
|
499
|
+
] });
|
|
500
|
+
}
|
|
501
|
+
function DefaultLoading() {
|
|
502
|
+
return /* @__PURE__ */ jsx2("div", { className: "flex items-center justify-center min-h-[200px] p-8", children: /* @__PURE__ */ jsxs("div", { className: "flex items-center space-x-2", children: [
|
|
503
|
+
/* @__PURE__ */ jsx2("div", { className: "animate-spin rounded-full h-8 w-8 border-b-2 border-main-600" }),
|
|
504
|
+
/* @__PURE__ */ jsx2("span", { className: "text-sec-600", children: "Checking permissions..." })
|
|
505
|
+
] }) });
|
|
506
|
+
}
|
|
507
|
+
|
|
508
|
+
// src/rbac/components/SecureDataProvider.tsx
|
|
509
|
+
init_UnifiedAuthProvider();
|
|
510
|
+
import { createContext as createContext2, useContext as useContext2, useState as useState3, useCallback as useCallback3, useMemo as useMemo3, useEffect as useEffect3 } from "react";
|
|
511
|
+
import { jsx as jsx3 } from "react/jsx-runtime";
|
|
512
|
+
var SecureDataContext = createContext2(null);
|
|
513
|
+
function SecureDataProvider({
|
|
514
|
+
children,
|
|
515
|
+
strictMode = true,
|
|
516
|
+
auditLog = true,
|
|
517
|
+
onDataAccess,
|
|
518
|
+
onStrictModeViolation,
|
|
519
|
+
maxHistorySize = 1e3,
|
|
520
|
+
enforceRLS = true
|
|
521
|
+
}) {
|
|
522
|
+
const { user, selectedOrganisationId, selectedEventId } = useUnifiedAuth();
|
|
523
|
+
const { validateContext } = useSecureDataAccess();
|
|
524
|
+
const [dataAccessHistory, setDataAccessHistory] = useState3([]);
|
|
525
|
+
const [isEnabled, setIsEnabled] = useState3(true);
|
|
526
|
+
const currentScope = useMemo3(() => {
|
|
527
|
+
if (!selectedOrganisationId) return null;
|
|
528
|
+
return {
|
|
529
|
+
organisationId: selectedOrganisationId,
|
|
530
|
+
eventId: selectedEventId || void 0,
|
|
531
|
+
appId: void 0
|
|
532
|
+
};
|
|
533
|
+
}, [selectedOrganisationId, selectedEventId]);
|
|
534
|
+
const isDataAccessAllowed = useCallback3((table, operation, scope) => {
|
|
535
|
+
if (!isEnabled) return true;
|
|
536
|
+
if (!user?.id) return false;
|
|
537
|
+
const effectiveScope = scope || currentScope;
|
|
538
|
+
if (!effectiveScope) return false;
|
|
539
|
+
const permission = `${operation}:data.${table}`;
|
|
540
|
+
return true;
|
|
541
|
+
}, [isEnabled, user?.id, currentScope]);
|
|
542
|
+
const getDataAccessPermissions = useCallback3(() => {
|
|
543
|
+
if (!isEnabled || !user?.id) return {};
|
|
544
|
+
return {};
|
|
545
|
+
}, [isEnabled, user?.id]);
|
|
546
|
+
const getDataAccessHistory = useCallback3(() => {
|
|
547
|
+
return [...dataAccessHistory];
|
|
548
|
+
}, [dataAccessHistory]);
|
|
549
|
+
const clearDataAccessHistory = useCallback3(() => {
|
|
550
|
+
setDataAccessHistory([]);
|
|
551
|
+
}, []);
|
|
552
|
+
const validateDataAccess = useCallback3((table, operation, scope) => {
|
|
553
|
+
if (!isEnabled) return true;
|
|
554
|
+
if (!user?.id) return false;
|
|
555
|
+
const effectiveScope = scope || currentScope;
|
|
556
|
+
if (!effectiveScope) return false;
|
|
557
|
+
try {
|
|
558
|
+
validateContext();
|
|
559
|
+
} catch (error) {
|
|
560
|
+
console.error(`[SecureDataProvider] Organisation context validation failed:`, error);
|
|
561
|
+
return false;
|
|
562
|
+
}
|
|
563
|
+
return isDataAccessAllowed(table, operation, effectiveScope);
|
|
564
|
+
}, [isEnabled, user?.id, currentScope, validateContext, isDataAccessAllowed]);
|
|
565
|
+
const recordDataAccess = useCallback3((table, operation, allowed, query, filters, scope) => {
|
|
566
|
+
if (!auditLog || !user?.id) return;
|
|
567
|
+
const record = {
|
|
568
|
+
table,
|
|
569
|
+
operation,
|
|
570
|
+
userId: user.id,
|
|
571
|
+
scope: scope || currentScope || { organisationId: "" },
|
|
572
|
+
allowed,
|
|
573
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString(),
|
|
574
|
+
query,
|
|
575
|
+
filters
|
|
576
|
+
};
|
|
577
|
+
setDataAccessHistory((prev) => {
|
|
578
|
+
const newHistory = [record, ...prev];
|
|
579
|
+
return newHistory.slice(0, maxHistorySize);
|
|
580
|
+
});
|
|
581
|
+
if (onDataAccess) {
|
|
582
|
+
onDataAccess(table, operation, allowed, record);
|
|
583
|
+
}
|
|
584
|
+
if (strictMode && !allowed && onStrictModeViolation) {
|
|
585
|
+
onStrictModeViolation(table, operation, record);
|
|
586
|
+
}
|
|
587
|
+
}, [auditLog, user?.id, currentScope, maxHistorySize, onDataAccess, onStrictModeViolation, strictMode]);
|
|
588
|
+
const contextValue = useMemo3(() => ({
|
|
589
|
+
isDataAccessAllowed,
|
|
590
|
+
getDataAccessPermissions,
|
|
591
|
+
isEnabled,
|
|
592
|
+
isStrictMode: strictMode,
|
|
593
|
+
isAuditLogEnabled: auditLog,
|
|
594
|
+
getDataAccessHistory,
|
|
595
|
+
clearDataAccessHistory,
|
|
596
|
+
validateDataAccess
|
|
597
|
+
}), [
|
|
598
|
+
isDataAccessAllowed,
|
|
599
|
+
getDataAccessPermissions,
|
|
600
|
+
isEnabled,
|
|
601
|
+
strictMode,
|
|
602
|
+
auditLog,
|
|
603
|
+
getDataAccessHistory,
|
|
604
|
+
clearDataAccessHistory,
|
|
605
|
+
validateDataAccess
|
|
606
|
+
]);
|
|
607
|
+
useEffect3(() => {
|
|
608
|
+
if (strictMode && auditLog) {
|
|
609
|
+
console.log(`[SecureDataProvider] Strict mode enabled - all data access attempts will be logged and enforced`);
|
|
610
|
+
}
|
|
611
|
+
}, [strictMode, auditLog]);
|
|
612
|
+
useEffect3(() => {
|
|
613
|
+
if (enforceRLS && auditLog) {
|
|
614
|
+
console.log(`[SecureDataProvider] RLS enforcement enabled - all queries will include organisation context`);
|
|
615
|
+
}
|
|
616
|
+
}, [enforceRLS, auditLog]);
|
|
617
|
+
return /* @__PURE__ */ jsx3(SecureDataContext.Provider, { value: contextValue, children });
|
|
618
|
+
}
|
|
619
|
+
function useSecureData() {
|
|
620
|
+
const context = useContext2(SecureDataContext);
|
|
621
|
+
if (!context) {
|
|
622
|
+
throw new Error("useSecureData must be used within a SecureDataProvider");
|
|
623
|
+
}
|
|
624
|
+
return context;
|
|
625
|
+
}
|
|
626
|
+
|
|
627
|
+
// src/rbac/components/PermissionEnforcer.tsx
|
|
628
|
+
import { useMemo as useMemo4, useEffect as useEffect4, useState as useState4 } from "react";
|
|
629
|
+
init_UnifiedAuthProvider();
|
|
630
|
+
import { Fragment as Fragment2, jsx as jsx4, jsxs as jsxs2 } from "react/jsx-runtime";
|
|
631
|
+
function PermissionEnforcer({
|
|
632
|
+
permissions,
|
|
633
|
+
operation,
|
|
634
|
+
children,
|
|
635
|
+
fallback = /* @__PURE__ */ jsx4(DefaultAccessDenied2, {}),
|
|
636
|
+
strictMode = true,
|
|
637
|
+
auditLog = true,
|
|
638
|
+
scope,
|
|
639
|
+
onDenied,
|
|
640
|
+
loading = /* @__PURE__ */ jsx4(DefaultLoading2, {}),
|
|
641
|
+
requireAll = true
|
|
642
|
+
}) {
|
|
643
|
+
const { user, selectedOrganisationId, selectedEventId, supabase } = useUnifiedAuth();
|
|
644
|
+
const [hasChecked, setHasChecked] = useState4(false);
|
|
645
|
+
const [checkError, setCheckError] = useState4(null);
|
|
646
|
+
const [permissionResults, setPermissionResults] = useState4({});
|
|
647
|
+
const [resolvedScope, setResolvedScope] = useState4(null);
|
|
648
|
+
useEffect4(() => {
|
|
649
|
+
const resolveScope = async () => {
|
|
650
|
+
if (scope) {
|
|
651
|
+
setResolvedScope(scope);
|
|
652
|
+
return;
|
|
653
|
+
}
|
|
654
|
+
if (selectedOrganisationId && selectedEventId) {
|
|
655
|
+
setResolvedScope({
|
|
656
|
+
organisationId: selectedOrganisationId,
|
|
657
|
+
eventId: selectedEventId,
|
|
658
|
+
appId: void 0
|
|
659
|
+
});
|
|
660
|
+
return;
|
|
661
|
+
}
|
|
662
|
+
if (selectedOrganisationId) {
|
|
663
|
+
setResolvedScope({
|
|
664
|
+
organisationId: selectedOrganisationId,
|
|
665
|
+
eventId: selectedEventId || void 0,
|
|
666
|
+
appId: void 0
|
|
667
|
+
});
|
|
668
|
+
return;
|
|
669
|
+
}
|
|
670
|
+
if (selectedEventId && supabase) {
|
|
671
|
+
try {
|
|
672
|
+
const eventScope = await createScopeFromEvent(supabase, selectedEventId);
|
|
673
|
+
if (!eventScope) {
|
|
674
|
+
setCheckError(new Error("Could not resolve organization from event context"));
|
|
675
|
+
return;
|
|
676
|
+
}
|
|
677
|
+
setResolvedScope(eventScope);
|
|
678
|
+
} catch (error2) {
|
|
679
|
+
setCheckError(error2);
|
|
680
|
+
}
|
|
681
|
+
return;
|
|
682
|
+
}
|
|
683
|
+
setCheckError(new Error("Either organisation context or event context is required for permission checking"));
|
|
684
|
+
};
|
|
685
|
+
resolveScope();
|
|
686
|
+
}, [scope, selectedOrganisationId, selectedEventId, supabase]);
|
|
687
|
+
const representativePermission = permissions[0];
|
|
688
|
+
const { can, isLoading, error } = useCan(
|
|
689
|
+
user?.id || "",
|
|
690
|
+
resolvedScope || { eventId: selectedEventId || void 0 },
|
|
691
|
+
representativePermission,
|
|
692
|
+
void 0,
|
|
693
|
+
true
|
|
694
|
+
// Use cache
|
|
695
|
+
);
|
|
696
|
+
const hasRequiredPermissions = useMemo4(() => {
|
|
697
|
+
if (permissions.length === 0) return true;
|
|
698
|
+
return can;
|
|
699
|
+
}, [permissions, can]);
|
|
700
|
+
useEffect4(() => {
|
|
701
|
+
if (!isLoading && !error) {
|
|
702
|
+
setHasChecked(true);
|
|
703
|
+
setCheckError(null);
|
|
704
|
+
if (!hasRequiredPermissions && onDenied) {
|
|
705
|
+
onDenied(permissions, operation);
|
|
706
|
+
}
|
|
707
|
+
} else if (error) {
|
|
708
|
+
setCheckError(error);
|
|
709
|
+
setHasChecked(true);
|
|
710
|
+
}
|
|
711
|
+
}, [hasRequiredPermissions, isLoading, error, permissions, operation, onDenied]);
|
|
712
|
+
useEffect4(() => {
|
|
713
|
+
if (auditLog && hasChecked && !isLoading) {
|
|
714
|
+
console.log(`[PermissionEnforcer] Permission check attempt:`, {
|
|
715
|
+
permissions,
|
|
716
|
+
operation,
|
|
717
|
+
userId: user?.id,
|
|
718
|
+
scope: resolvedScope,
|
|
719
|
+
allowed: hasRequiredPermissions,
|
|
720
|
+
requireAll,
|
|
721
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
722
|
+
});
|
|
723
|
+
}
|
|
724
|
+
}, [auditLog, hasChecked, isLoading, permissions, operation, user?.id, resolvedScope, hasRequiredPermissions, requireAll]);
|
|
725
|
+
useEffect4(() => {
|
|
726
|
+
if (strictMode && hasChecked && !isLoading && !hasRequiredPermissions) {
|
|
727
|
+
console.error(`[PermissionEnforcer] STRICT MODE VIOLATION: User attempted to perform operation without permission`, {
|
|
728
|
+
permissions,
|
|
729
|
+
operation,
|
|
730
|
+
userId: user?.id,
|
|
731
|
+
scope: resolvedScope,
|
|
732
|
+
requireAll,
|
|
733
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
734
|
+
});
|
|
735
|
+
}
|
|
736
|
+
}, [strictMode, hasChecked, isLoading, hasRequiredPermissions, permissions, operation, user?.id, resolvedScope, requireAll]);
|
|
737
|
+
if (isLoading || !hasChecked) {
|
|
738
|
+
return /* @__PURE__ */ jsx4(Fragment2, { children: loading });
|
|
739
|
+
}
|
|
740
|
+
if (checkError) {
|
|
741
|
+
console.error(`[PermissionEnforcer] Permission check failed for operation ${operation}:`, checkError);
|
|
742
|
+
return /* @__PURE__ */ jsx4(Fragment2, { children: fallback });
|
|
743
|
+
}
|
|
744
|
+
if (!hasRequiredPermissions) {
|
|
745
|
+
return /* @__PURE__ */ jsx4(Fragment2, { children: fallback });
|
|
746
|
+
}
|
|
747
|
+
return /* @__PURE__ */ jsx4(Fragment2, { children });
|
|
748
|
+
}
|
|
749
|
+
function DefaultAccessDenied2() {
|
|
750
|
+
return /* @__PURE__ */ jsxs2("div", { className: "flex flex-col items-center justify-center min-h-[200px] p-8 text-center", children: [
|
|
751
|
+
/* @__PURE__ */ jsx4("div", { className: "mb-4", children: /* @__PURE__ */ jsx4("svg", { className: "w-16 h-16 text-acc-500 mx-auto", fill: "none", stroke: "currentColor", viewBox: "0 0 24 24", children: /* @__PURE__ */ jsx4("path", { strokeLinecap: "round", strokeLinejoin: "round", strokeWidth: 2, d: "M12 9v2m0 4h.01m-6.938 4h13.856c1.54 0 2.502-1.667 1.732-2.5L13.732 4c-.77-.833-1.964-.833-2.732 0L3.732 16.5c-.77.833.192 2.5 1.732 2.5z" }) }) }),
|
|
752
|
+
/* @__PURE__ */ jsx4("h2", { className: "text-xl font-semibold text-sec-900 mb-2", children: "Access Denied" }),
|
|
753
|
+
/* @__PURE__ */ jsx4("p", { className: "text-sec-600 mb-4", children: "You don't have permission to perform this operation." }),
|
|
754
|
+
/* @__PURE__ */ jsx4(
|
|
755
|
+
"button",
|
|
756
|
+
{
|
|
757
|
+
onClick: () => window.history.back(),
|
|
758
|
+
className: "px-4 py-2 bg-main-600 text-main-50 rounded-md hover:bg-main-700 transition-colors",
|
|
759
|
+
children: "Go Back"
|
|
760
|
+
}
|
|
761
|
+
)
|
|
762
|
+
] });
|
|
763
|
+
}
|
|
764
|
+
function DefaultLoading2() {
|
|
765
|
+
return /* @__PURE__ */ jsx4("div", { className: "flex items-center justify-center min-h-[200px] p-8", children: /* @__PURE__ */ jsxs2("div", { className: "flex items-center space-x-2", children: [
|
|
766
|
+
/* @__PURE__ */ jsx4("div", { className: "animate-spin rounded-full h-8 w-8 border-b-2 border-main-600" }),
|
|
767
|
+
/* @__PURE__ */ jsx4("span", { className: "text-sec-600", children: "Checking permissions..." })
|
|
768
|
+
] }) });
|
|
769
|
+
}
|
|
770
|
+
|
|
771
|
+
// src/rbac/components/RoleBasedRouter.tsx
|
|
772
|
+
import { useMemo as useMemo5, useCallback as useCallback5, useEffect as useEffect5, useState as useState5, createContext as createContext3, useContext as useContext3 } from "react";
|
|
773
|
+
import { useLocation, useNavigate, Outlet } from "react-router-dom";
|
|
774
|
+
init_UnifiedAuthProvider();
|
|
775
|
+
import { jsx as jsx5, jsxs as jsxs3 } from "react/jsx-runtime";
|
|
776
|
+
var RoleBasedRouterContext = createContext3(null);
|
|
777
|
+
function RoleBasedRouter({
|
|
778
|
+
routes,
|
|
779
|
+
fallbackRoute = "/unauthorized",
|
|
780
|
+
children,
|
|
781
|
+
strictMode = true,
|
|
782
|
+
auditLog = true,
|
|
783
|
+
onRouteAccess,
|
|
784
|
+
onStrictModeViolation,
|
|
785
|
+
maxHistorySize = 1e3,
|
|
786
|
+
unauthorizedComponent: UnauthorizedComponent = DefaultUnauthorizedComponent
|
|
787
|
+
}) {
|
|
788
|
+
const { user, selectedOrganisationId, selectedEventId } = useUnifiedAuth();
|
|
789
|
+
const location = useLocation();
|
|
790
|
+
const navigate = useNavigate();
|
|
791
|
+
const [routeAccessHistory, setRouteAccessHistory] = useState5([]);
|
|
792
|
+
const [currentRoute, setCurrentRoute] = useState5("");
|
|
793
|
+
const currentScope = useMemo5(() => {
|
|
794
|
+
if (!selectedOrganisationId) return null;
|
|
795
|
+
return {
|
|
796
|
+
organisationId: selectedOrganisationId,
|
|
797
|
+
eventId: selectedEventId || void 0,
|
|
798
|
+
appId: void 0
|
|
799
|
+
};
|
|
800
|
+
}, [selectedOrganisationId, selectedEventId]);
|
|
801
|
+
const currentRouteConfig = useMemo5(() => {
|
|
802
|
+
const currentPath = location.pathname;
|
|
803
|
+
return routes.find((route) => route.path === currentPath) || null;
|
|
804
|
+
}, [routes, location.pathname]);
|
|
805
|
+
const canAccessRoute = useCallback5((path) => {
|
|
806
|
+
if (!user?.id || !currentScope) return false;
|
|
807
|
+
const routeConfig = routes.find((route) => route.path === path);
|
|
808
|
+
if (!routeConfig) return false;
|
|
809
|
+
return true;
|
|
810
|
+
}, [user?.id, currentScope, routes]);
|
|
811
|
+
const { can: canAccessCurrentRoute, isLoading: permissionLoading } = useCan(
|
|
812
|
+
user?.id || "",
|
|
813
|
+
currentScope || { organisationId: "", eventId: void 0, appId: void 0 },
|
|
814
|
+
currentRouteConfig?.permissions?.[0] || "read:page",
|
|
815
|
+
currentRouteConfig?.pageId
|
|
816
|
+
);
|
|
817
|
+
const hasPermissions = currentRouteConfig?.permissions && currentRouteConfig.permissions.length > 0;
|
|
818
|
+
const finalCanAccess = hasPermissions ? canAccessCurrentRoute : false;
|
|
819
|
+
const finalLoading = hasPermissions ? permissionLoading : false;
|
|
820
|
+
const getAccessibleRoutes = useCallback5(() => {
|
|
821
|
+
if (!user?.id || !currentScope) return [];
|
|
822
|
+
return routes.filter((route) => canAccessRoute(route.path));
|
|
823
|
+
}, [user?.id, currentScope, routes, canAccessRoute]);
|
|
824
|
+
const getRouteConfig = useCallback5((path) => {
|
|
825
|
+
return routes.find((route) => route.path === path) || null;
|
|
826
|
+
}, [routes]);
|
|
827
|
+
const getRouteAccessHistory = useCallback5(() => {
|
|
828
|
+
return [...routeAccessHistory];
|
|
829
|
+
}, [routeAccessHistory]);
|
|
830
|
+
const clearRouteAccessHistory = useCallback5(() => {
|
|
831
|
+
setRouteAccessHistory([]);
|
|
832
|
+
}, []);
|
|
833
|
+
const recordRouteAccess = useCallback5((route, allowed, routeConfig) => {
|
|
834
|
+
if (!auditLog || !user?.id || !currentScope) return;
|
|
835
|
+
const record = {
|
|
836
|
+
route,
|
|
837
|
+
permissions: routeConfig.permissions,
|
|
838
|
+
userId: user.id,
|
|
839
|
+
scope: currentScope,
|
|
840
|
+
allowed,
|
|
841
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString(),
|
|
842
|
+
pageId: routeConfig.pageId,
|
|
843
|
+
roles: routeConfig.roles,
|
|
844
|
+
accessLevel: routeConfig.accessLevel
|
|
845
|
+
};
|
|
846
|
+
setRouteAccessHistory((prev) => {
|
|
847
|
+
const newHistory = [record, ...prev];
|
|
848
|
+
return newHistory.slice(0, maxHistorySize);
|
|
849
|
+
});
|
|
850
|
+
if (onRouteAccess) {
|
|
851
|
+
onRouteAccess(route, allowed, record);
|
|
852
|
+
}
|
|
853
|
+
if (strictMode && !allowed && onStrictModeViolation) {
|
|
854
|
+
onStrictModeViolation(route, record);
|
|
855
|
+
}
|
|
856
|
+
}, [auditLog, user?.id, currentScope, maxHistorySize, onRouteAccess, onStrictModeViolation, strictMode]);
|
|
857
|
+
useEffect5(() => {
|
|
858
|
+
const currentPath = location.pathname;
|
|
859
|
+
setCurrentRoute(currentPath);
|
|
860
|
+
if (!currentRouteConfig) {
|
|
861
|
+
if (strictMode) {
|
|
862
|
+
console.error(`[RoleBasedRouter] STRICT MODE VIOLATION: Route not found in configuration`, {
|
|
863
|
+
route: currentPath,
|
|
864
|
+
userId: user?.id,
|
|
865
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
866
|
+
});
|
|
867
|
+
if (onStrictModeViolation) {
|
|
868
|
+
onStrictModeViolation(currentPath, {
|
|
869
|
+
route: currentPath,
|
|
870
|
+
permissions: [],
|
|
871
|
+
userId: user?.id || "",
|
|
872
|
+
scope: currentScope || { organisationId: "" },
|
|
873
|
+
allowed: false,
|
|
874
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
875
|
+
});
|
|
876
|
+
}
|
|
877
|
+
}
|
|
878
|
+
return;
|
|
879
|
+
}
|
|
880
|
+
const allowed = finalCanAccess;
|
|
881
|
+
recordRouteAccess(currentPath, allowed, currentRouteConfig);
|
|
882
|
+
if (!allowed) {
|
|
883
|
+
navigate(fallbackRoute, { replace: true });
|
|
884
|
+
}
|
|
885
|
+
}, [location.pathname, currentRouteConfig, canAccessCurrentRoute, recordRouteAccess, strictMode, user?.id, currentScope, onStrictModeViolation, navigate, fallbackRoute]);
|
|
886
|
+
const contextValue = useMemo5(() => ({
|
|
887
|
+
getAccessibleRoutes,
|
|
888
|
+
canAccessRoute,
|
|
889
|
+
getRouteConfig,
|
|
890
|
+
getRouteAccessHistory,
|
|
891
|
+
clearRouteAccessHistory,
|
|
892
|
+
isStrictMode: strictMode,
|
|
893
|
+
isAuditLogEnabled: auditLog
|
|
894
|
+
}), [
|
|
895
|
+
getAccessibleRoutes,
|
|
896
|
+
canAccessRoute,
|
|
897
|
+
getRouteConfig,
|
|
898
|
+
getRouteAccessHistory,
|
|
899
|
+
clearRouteAccessHistory,
|
|
900
|
+
strictMode,
|
|
901
|
+
auditLog
|
|
902
|
+
]);
|
|
903
|
+
if (finalLoading) {
|
|
904
|
+
return /* @__PURE__ */ jsx5("div", { className: "flex items-center justify-center min-h-screen", children: /* @__PURE__ */ jsxs3("div", { className: "text-center", children: [
|
|
905
|
+
/* @__PURE__ */ jsx5("div", { className: "animate-spin rounded-full h-8 w-8 border-b-2 border-main-600 mx-auto mb-4" }),
|
|
906
|
+
/* @__PURE__ */ jsx5("p", { className: "text-sec-600", children: "Checking permissions..." })
|
|
907
|
+
] }) });
|
|
908
|
+
}
|
|
909
|
+
if (currentRouteConfig && !finalCanAccess) {
|
|
910
|
+
return /* @__PURE__ */ jsx5(
|
|
911
|
+
UnauthorizedComponent,
|
|
912
|
+
{
|
|
913
|
+
route: currentRoute,
|
|
914
|
+
reason: "Insufficient permissions"
|
|
915
|
+
}
|
|
916
|
+
);
|
|
917
|
+
}
|
|
918
|
+
return /* @__PURE__ */ jsxs3(RoleBasedRouterContext.Provider, { value: contextValue, children: [
|
|
919
|
+
children,
|
|
920
|
+
/* @__PURE__ */ jsx5(Outlet, {})
|
|
921
|
+
] });
|
|
922
|
+
}
|
|
923
|
+
function useRoleBasedRouter() {
|
|
924
|
+
const context = useContext3(RoleBasedRouterContext);
|
|
925
|
+
if (!context) {
|
|
926
|
+
throw new Error("useRoleBasedRouter must be used within a RoleBasedRouter");
|
|
927
|
+
}
|
|
928
|
+
return context;
|
|
929
|
+
}
|
|
930
|
+
function DefaultUnauthorizedComponent({ route, reason }) {
|
|
931
|
+
return /* @__PURE__ */ jsxs3("div", { className: "flex flex-col items-center justify-center min-h-screen p-8 text-center", children: [
|
|
932
|
+
/* @__PURE__ */ jsx5("div", { className: "mb-4", children: /* @__PURE__ */ jsx5("svg", { className: "w-16 h-16 text-acc-500 mx-auto", fill: "none", stroke: "currentColor", viewBox: "0 0 24 24", children: /* @__PURE__ */ jsx5("path", { strokeLinecap: "round", strokeLinejoin: "round", strokeWidth: 2, d: "M12 9v2m0 4h.01m-6.938 4h13.856c1.54 0 2.502-1.667 1.732-2.5L13.732 4c-.77-.833-1.964-.833-2.732 0L3.732 16.5c-.77.833.192 2.5 1.732 2.5z" }) }) }),
|
|
933
|
+
/* @__PURE__ */ jsx5("h2", { className: "text-xl font-semibold text-sec-900 mb-2", children: "Access Denied" }),
|
|
934
|
+
/* @__PURE__ */ jsxs3("p", { className: "text-sec-600 mb-4", children: [
|
|
935
|
+
"You don't have permission to access ",
|
|
936
|
+
/* @__PURE__ */ jsx5("code", { className: "bg-sec-100 px-2 py-1 rounded", children: route })
|
|
937
|
+
] }),
|
|
938
|
+
/* @__PURE__ */ jsxs3("p", { className: "text-sm text-sec-500 mb-4", children: [
|
|
939
|
+
"Reason: ",
|
|
940
|
+
reason
|
|
941
|
+
] }),
|
|
942
|
+
/* @__PURE__ */ jsx5(
|
|
943
|
+
"button",
|
|
944
|
+
{
|
|
945
|
+
onClick: () => window.history.back(),
|
|
946
|
+
className: "px-4 py-2 bg-main-600 text-main-50 rounded-md hover:bg-main-700 transition-colors",
|
|
947
|
+
children: "Go Back"
|
|
948
|
+
}
|
|
949
|
+
)
|
|
950
|
+
] });
|
|
951
|
+
}
|
|
952
|
+
|
|
953
|
+
// src/rbac/components/NavigationProvider.tsx
|
|
954
|
+
init_UnifiedAuthProvider();
|
|
955
|
+
import { createContext as createContext4, useContext as useContext4, useState as useState6, useCallback as useCallback6, useMemo as useMemo6, useEffect as useEffect6 } from "react";
|
|
956
|
+
import { jsx as jsx6 } from "react/jsx-runtime";
|
|
957
|
+
var NavigationContext = createContext4(null);
|
|
958
|
+
function NavigationProvider({
|
|
959
|
+
children,
|
|
960
|
+
strictMode = true,
|
|
961
|
+
auditLog = true,
|
|
962
|
+
onNavigationAccess,
|
|
963
|
+
onStrictModeViolation,
|
|
964
|
+
maxHistorySize = 1e3
|
|
965
|
+
}) {
|
|
966
|
+
const { user, selectedOrganisationId, selectedEventId } = useUnifiedAuth();
|
|
967
|
+
const [navigationAccessHistory, setNavigationAccessHistory] = useState6([]);
|
|
968
|
+
const [isEnabled, setIsEnabled] = useState6(true);
|
|
969
|
+
const currentScope = useMemo6(() => {
|
|
970
|
+
if (!selectedOrganisationId) return null;
|
|
971
|
+
return {
|
|
972
|
+
organisationId: selectedOrganisationId,
|
|
973
|
+
eventId: selectedEventId || void 0,
|
|
974
|
+
appId: void 0
|
|
975
|
+
};
|
|
976
|
+
}, [selectedOrganisationId, selectedEventId]);
|
|
977
|
+
const hasNavigationPermission = useCallback6((item) => {
|
|
978
|
+
if (!isEnabled) return true;
|
|
979
|
+
if (!user?.id) return false;
|
|
980
|
+
if (!currentScope) return false;
|
|
981
|
+
return true;
|
|
982
|
+
}, [isEnabled, user?.id, currentScope]);
|
|
983
|
+
const getNavigationPermissions = useCallback6(() => {
|
|
984
|
+
if (!isEnabled || !user?.id) return {};
|
|
985
|
+
return {};
|
|
986
|
+
}, [isEnabled, user?.id]);
|
|
987
|
+
const getFilteredNavigationItems = useCallback6((items) => {
|
|
988
|
+
if (!isEnabled) return items;
|
|
989
|
+
return items.filter((item) => hasNavigationPermission(item));
|
|
990
|
+
}, [isEnabled, hasNavigationPermission]);
|
|
991
|
+
const getNavigationAccessHistory = useCallback6(() => {
|
|
992
|
+
return [...navigationAccessHistory];
|
|
993
|
+
}, [navigationAccessHistory]);
|
|
994
|
+
const clearNavigationAccessHistory = useCallback6(() => {
|
|
995
|
+
setNavigationAccessHistory([]);
|
|
996
|
+
}, []);
|
|
997
|
+
const recordNavigationAccess = useCallback6((item, allowed) => {
|
|
998
|
+
if (!auditLog || !user?.id || !currentScope) return;
|
|
999
|
+
const record = {
|
|
1000
|
+
navigationItem: item.id,
|
|
1001
|
+
permissions: item.permissions,
|
|
1002
|
+
userId: user.id,
|
|
1003
|
+
scope: currentScope,
|
|
1004
|
+
allowed,
|
|
1005
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString(),
|
|
1006
|
+
pageId: item.pageId,
|
|
1007
|
+
roles: item.roles,
|
|
1008
|
+
accessLevel: item.accessLevel
|
|
1009
|
+
};
|
|
1010
|
+
setNavigationAccessHistory((prev) => {
|
|
1011
|
+
const newHistory = [record, ...prev];
|
|
1012
|
+
return newHistory.slice(0, maxHistorySize);
|
|
1013
|
+
});
|
|
1014
|
+
if (onNavigationAccess) {
|
|
1015
|
+
onNavigationAccess(item, allowed, record);
|
|
1016
|
+
}
|
|
1017
|
+
if (strictMode && !allowed && onStrictModeViolation) {
|
|
1018
|
+
onStrictModeViolation(item, record);
|
|
1019
|
+
}
|
|
1020
|
+
}, [auditLog, user?.id, currentScope, maxHistorySize, onNavigationAccess, onStrictModeViolation, strictMode]);
|
|
1021
|
+
const contextValue = useMemo6(() => ({
|
|
1022
|
+
hasNavigationPermission,
|
|
1023
|
+
getNavigationPermissions,
|
|
1024
|
+
getFilteredNavigationItems,
|
|
1025
|
+
isEnabled,
|
|
1026
|
+
isStrictMode: strictMode,
|
|
1027
|
+
isAuditLogEnabled: auditLog,
|
|
1028
|
+
getNavigationAccessHistory,
|
|
1029
|
+
clearNavigationAccessHistory
|
|
1030
|
+
}), [
|
|
1031
|
+
hasNavigationPermission,
|
|
1032
|
+
getNavigationPermissions,
|
|
1033
|
+
getFilteredNavigationItems,
|
|
1034
|
+
isEnabled,
|
|
1035
|
+
strictMode,
|
|
1036
|
+
auditLog,
|
|
1037
|
+
getNavigationAccessHistory,
|
|
1038
|
+
clearNavigationAccessHistory
|
|
1039
|
+
]);
|
|
1040
|
+
useEffect6(() => {
|
|
1041
|
+
if (strictMode && auditLog) {
|
|
1042
|
+
console.log(`[NavigationProvider] Strict mode enabled - all navigation access attempts will be logged and enforced`);
|
|
1043
|
+
}
|
|
1044
|
+
}, [strictMode, auditLog]);
|
|
1045
|
+
return /* @__PURE__ */ jsx6(NavigationContext.Provider, { value: contextValue, children });
|
|
1046
|
+
}
|
|
1047
|
+
function useNavigationPermissions() {
|
|
1048
|
+
const context = useContext4(NavigationContext);
|
|
1049
|
+
if (!context) {
|
|
1050
|
+
throw new Error("useNavigationPermissions must be used within a NavigationProvider");
|
|
1051
|
+
}
|
|
1052
|
+
return context;
|
|
1053
|
+
}
|
|
1054
|
+
|
|
1055
|
+
// src/rbac/components/NavigationGuard.tsx
|
|
1056
|
+
import { useMemo as useMemo7, useEffect as useEffect7, useState as useState7 } from "react";
|
|
1057
|
+
init_UnifiedAuthProvider();
|
|
1058
|
+
import { Fragment as Fragment3, jsx as jsx7, jsxs as jsxs4 } from "react/jsx-runtime";
|
|
1059
|
+
function NavigationGuard({
|
|
1060
|
+
navigationItem,
|
|
1061
|
+
children,
|
|
1062
|
+
fallback = /* @__PURE__ */ jsx7(DefaultAccessDenied3, {}),
|
|
1063
|
+
strictMode = true,
|
|
1064
|
+
auditLog = true,
|
|
1065
|
+
scope,
|
|
1066
|
+
onDenied,
|
|
1067
|
+
loading = /* @__PURE__ */ jsx7(DefaultLoading3, {}),
|
|
1068
|
+
requireAll = true
|
|
1069
|
+
}) {
|
|
1070
|
+
const { user, selectedOrganisationId, selectedEventId, supabase } = useUnifiedAuth();
|
|
1071
|
+
const [hasChecked, setHasChecked] = useState7(false);
|
|
1072
|
+
const [checkError, setCheckError] = useState7(null);
|
|
1073
|
+
const [resolvedScope, setResolvedScope] = useState7(null);
|
|
1074
|
+
useEffect7(() => {
|
|
1075
|
+
const resolveScope = async () => {
|
|
1076
|
+
if (scope) {
|
|
1077
|
+
setResolvedScope(scope);
|
|
1078
|
+
return;
|
|
1079
|
+
}
|
|
1080
|
+
if (selectedOrganisationId && selectedEventId) {
|
|
1081
|
+
setResolvedScope({
|
|
1082
|
+
organisationId: selectedOrganisationId,
|
|
1083
|
+
eventId: selectedEventId,
|
|
1084
|
+
appId: void 0
|
|
1085
|
+
});
|
|
1086
|
+
return;
|
|
1087
|
+
}
|
|
1088
|
+
if (selectedOrganisationId) {
|
|
1089
|
+
setResolvedScope({
|
|
1090
|
+
organisationId: selectedOrganisationId,
|
|
1091
|
+
eventId: selectedEventId || void 0,
|
|
1092
|
+
appId: void 0
|
|
1093
|
+
});
|
|
1094
|
+
return;
|
|
1095
|
+
}
|
|
1096
|
+
if (selectedEventId && supabase) {
|
|
1097
|
+
try {
|
|
1098
|
+
const eventScope = await createScopeFromEvent(supabase, selectedEventId);
|
|
1099
|
+
if (!eventScope) {
|
|
1100
|
+
setCheckError(new Error("Could not resolve organization from event context"));
|
|
1101
|
+
return;
|
|
1102
|
+
}
|
|
1103
|
+
setResolvedScope(eventScope);
|
|
1104
|
+
} catch (error2) {
|
|
1105
|
+
setCheckError(error2);
|
|
1106
|
+
}
|
|
1107
|
+
return;
|
|
1108
|
+
}
|
|
1109
|
+
setCheckError(new Error("Either organisation context or event context is required for navigation permission checking"));
|
|
1110
|
+
};
|
|
1111
|
+
resolveScope();
|
|
1112
|
+
}, [scope, selectedOrganisationId, selectedEventId, supabase]);
|
|
1113
|
+
const representativePermission = navigationItem.permissions[0];
|
|
1114
|
+
const { can, isLoading, error } = useCan(
|
|
1115
|
+
user?.id || "",
|
|
1116
|
+
resolvedScope || { eventId: selectedEventId || void 0 },
|
|
1117
|
+
representativePermission,
|
|
1118
|
+
navigationItem.pageId,
|
|
1119
|
+
true
|
|
1120
|
+
// Use cache
|
|
1121
|
+
);
|
|
1122
|
+
const hasRequiredPermissions = useMemo7(() => {
|
|
1123
|
+
if (navigationItem.permissions.length === 0) return true;
|
|
1124
|
+
return can;
|
|
1125
|
+
}, [navigationItem.permissions, can]);
|
|
1126
|
+
useEffect7(() => {
|
|
1127
|
+
if (!isLoading && !error) {
|
|
1128
|
+
setHasChecked(true);
|
|
1129
|
+
setCheckError(null);
|
|
1130
|
+
if (!hasRequiredPermissions && onDenied) {
|
|
1131
|
+
onDenied(navigationItem);
|
|
1132
|
+
}
|
|
1133
|
+
} else if (error) {
|
|
1134
|
+
setCheckError(error);
|
|
1135
|
+
setHasChecked(true);
|
|
1136
|
+
}
|
|
1137
|
+
}, [hasRequiredPermissions, isLoading, error, navigationItem, onDenied]);
|
|
1138
|
+
useEffect7(() => {
|
|
1139
|
+
if (auditLog && hasChecked && !isLoading) {
|
|
1140
|
+
console.log(`[NavigationGuard] Navigation access attempt:`, {
|
|
1141
|
+
navigationItem: navigationItem.id,
|
|
1142
|
+
permissions: navigationItem.permissions,
|
|
1143
|
+
userId: user?.id,
|
|
1144
|
+
scope: resolvedScope,
|
|
1145
|
+
allowed: hasRequiredPermissions,
|
|
1146
|
+
requireAll,
|
|
1147
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1148
|
+
});
|
|
1149
|
+
}
|
|
1150
|
+
}, [auditLog, hasChecked, isLoading, navigationItem, user?.id, resolvedScope, hasRequiredPermissions, requireAll]);
|
|
1151
|
+
useEffect7(() => {
|
|
1152
|
+
if (strictMode && hasChecked && !isLoading && !hasRequiredPermissions) {
|
|
1153
|
+
console.error(`[NavigationGuard] STRICT MODE VIOLATION: User attempted to access protected navigation item without permission`, {
|
|
1154
|
+
navigationItem: navigationItem.id,
|
|
1155
|
+
permissions: navigationItem.permissions,
|
|
1156
|
+
userId: user?.id,
|
|
1157
|
+
scope: resolvedScope,
|
|
1158
|
+
requireAll,
|
|
1159
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1160
|
+
});
|
|
1161
|
+
}
|
|
1162
|
+
}, [strictMode, hasChecked, isLoading, hasRequiredPermissions, navigationItem, user?.id, resolvedScope, requireAll]);
|
|
1163
|
+
if (isLoading || !resolvedScope || !hasChecked) {
|
|
1164
|
+
return /* @__PURE__ */ jsx7(Fragment3, { children: loading });
|
|
1165
|
+
}
|
|
1166
|
+
if (checkError) {
|
|
1167
|
+
console.error(`[NavigationGuard] Permission check failed for navigation item ${navigationItem.id}:`, checkError);
|
|
1168
|
+
return /* @__PURE__ */ jsx7(Fragment3, { children: fallback });
|
|
1169
|
+
}
|
|
1170
|
+
if (!hasRequiredPermissions) {
|
|
1171
|
+
return /* @__PURE__ */ jsx7(Fragment3, { children: fallback });
|
|
1172
|
+
}
|
|
1173
|
+
return /* @__PURE__ */ jsx7(Fragment3, { children });
|
|
1174
|
+
}
|
|
1175
|
+
function DefaultAccessDenied3() {
|
|
1176
|
+
return /* @__PURE__ */ jsx7("div", { className: "flex items-center justify-center p-2 text-center", children: /* @__PURE__ */ jsxs4("div", { className: "flex items-center space-x-2", children: [
|
|
1177
|
+
/* @__PURE__ */ jsx7("svg", { className: "w-4 h-4 text-acc-500", fill: "none", stroke: "currentColor", viewBox: "0 0 24 24", children: /* @__PURE__ */ jsx7("path", { strokeLinecap: "round", strokeLinejoin: "round", strokeWidth: 2, d: "M12 9v2m0 4h.01m-6.938 4h13.856c1.54 0 2.502-1.667 1.732-2.5L13.732 4c-.77-.833-1.964-.833-2.732 0L3.732 16.5c-.77.833.192 2.5 1.732 2.5z" }) }),
|
|
1178
|
+
/* @__PURE__ */ jsx7("span", { className: "text-sm text-sec-600", children: "Access Denied" })
|
|
1179
|
+
] }) });
|
|
1180
|
+
}
|
|
1181
|
+
function DefaultLoading3() {
|
|
1182
|
+
return /* @__PURE__ */ jsx7("div", { className: "flex items-center justify-center p-2", children: /* @__PURE__ */ jsxs4("div", { className: "flex items-center space-x-2", children: [
|
|
1183
|
+
/* @__PURE__ */ jsx7("div", { className: "animate-spin rounded-full h-4 w-4 border-b-2 border-main-600" }),
|
|
1184
|
+
/* @__PURE__ */ jsx7("span", { className: "text-sm text-sec-600", children: "Checking..." })
|
|
1185
|
+
] }) });
|
|
1186
|
+
}
|
|
1187
|
+
var NavigationGuard_default = NavigationGuard;
|
|
1188
|
+
|
|
1189
|
+
// src/rbac/components/EnhancedNavigationMenu.tsx
|
|
1190
|
+
import { useMemo as useMemo8, useCallback as useCallback8, useEffect as useEffect8, useState as useState8 } from "react";
|
|
1191
|
+
import { jsx as jsx8, jsxs as jsxs5 } from "react/jsx-runtime";
|
|
1192
|
+
function EnhancedNavigationMenu({
|
|
1193
|
+
items,
|
|
1194
|
+
strictMode = true,
|
|
1195
|
+
auditLog = true,
|
|
1196
|
+
onNavigationAccess,
|
|
1197
|
+
onStrictModeViolation,
|
|
1198
|
+
className = "flex flex-col space-y-1",
|
|
1199
|
+
itemClassName = "px-3 py-2 rounded-md text-sm font-medium transition-colors",
|
|
1200
|
+
activeItemClassName = "bg-main-100 text-main-700",
|
|
1201
|
+
disabledItemClassName = "text-sec-400 cursor-not-allowed",
|
|
1202
|
+
hideUnauthorizedItems = false,
|
|
1203
|
+
renderItem,
|
|
1204
|
+
activePath,
|
|
1205
|
+
onItemClick
|
|
1206
|
+
}) {
|
|
1207
|
+
const {
|
|
1208
|
+
hasNavigationPermission,
|
|
1209
|
+
getFilteredNavigationItems,
|
|
1210
|
+
isEnabled,
|
|
1211
|
+
isStrictMode,
|
|
1212
|
+
isAuditLogEnabled
|
|
1213
|
+
} = useNavigationPermissions();
|
|
1214
|
+
const [navigationHistory, setNavigationHistory] = useState8([]);
|
|
1215
|
+
const filteredItems = useMemo8(() => {
|
|
1216
|
+
if (!isEnabled) return items;
|
|
1217
|
+
return getFilteredNavigationItems(items);
|
|
1218
|
+
}, [isEnabled, items, getFilteredNavigationItems]);
|
|
1219
|
+
const handleItemClick = useCallback8((item) => {
|
|
1220
|
+
if (onItemClick) {
|
|
1221
|
+
onItemClick(item);
|
|
1222
|
+
}
|
|
1223
|
+
if (auditLog) {
|
|
1224
|
+
console.log(`[EnhancedNavigationMenu] Navigation item clicked:`, {
|
|
1225
|
+
item: item.id,
|
|
1226
|
+
path: item.path,
|
|
1227
|
+
permissions: item.permissions,
|
|
1228
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1229
|
+
});
|
|
1230
|
+
}
|
|
1231
|
+
setNavigationHistory((prev) => {
|
|
1232
|
+
const newHistory = [item, ...prev.filter((i) => i.id !== item.id)];
|
|
1233
|
+
return newHistory.slice(0, 10);
|
|
1234
|
+
});
|
|
1235
|
+
}, [onItemClick, auditLog]);
|
|
1236
|
+
const handleNavigationAccess = useCallback8((item, allowed) => {
|
|
1237
|
+
if (onNavigationAccess) {
|
|
1238
|
+
onNavigationAccess(item, allowed);
|
|
1239
|
+
}
|
|
1240
|
+
if (auditLog) {
|
|
1241
|
+
console.log(`[EnhancedNavigationMenu] Navigation access attempt:`, {
|
|
1242
|
+
item: item.id,
|
|
1243
|
+
allowed,
|
|
1244
|
+
strictMode,
|
|
1245
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1246
|
+
});
|
|
1247
|
+
}
|
|
1248
|
+
}, [onNavigationAccess, auditLog, strictMode]);
|
|
1249
|
+
const handleStrictModeViolation = useCallback8((item) => {
|
|
1250
|
+
if (onStrictModeViolation) {
|
|
1251
|
+
onStrictModeViolation(item);
|
|
1252
|
+
}
|
|
1253
|
+
if (strictMode) {
|
|
1254
|
+
console.error(`[EnhancedNavigationMenu] STRICT MODE VIOLATION: User attempted to access protected navigation item without permission`, {
|
|
1255
|
+
item: item.id,
|
|
1256
|
+
path: item.path,
|
|
1257
|
+
permissions: item.permissions,
|
|
1258
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1259
|
+
});
|
|
1260
|
+
}
|
|
1261
|
+
}, [onStrictModeViolation, strictMode]);
|
|
1262
|
+
const defaultRenderItem = useCallback8((item, isAuthorized) => {
|
|
1263
|
+
const isActive = activePath === item.path;
|
|
1264
|
+
const isDisabled = !isAuthorized;
|
|
1265
|
+
return /* @__PURE__ */ jsx8(
|
|
1266
|
+
NavigationGuard_default,
|
|
1267
|
+
{
|
|
1268
|
+
navigationItem: item,
|
|
1269
|
+
strictMode,
|
|
1270
|
+
auditLog,
|
|
1271
|
+
onDenied: handleStrictModeViolation,
|
|
1272
|
+
fallback: hideUnauthorizedItems ? null : /* @__PURE__ */ jsx8("div", { className: `${itemClassName} ${disabledItemClassName}`, children: /* @__PURE__ */ jsxs5("div", { className: "flex items-center space-x-2", children: [
|
|
1273
|
+
item.meta?.icon && /* @__PURE__ */ jsx8("span", { className: "text-sm", children: item.meta.icon }),
|
|
1274
|
+
/* @__PURE__ */ jsx8("span", { children: item.label }),
|
|
1275
|
+
/* @__PURE__ */ jsx8("span", { className: "text-xs text-sec-400", children: "(Access Denied)" })
|
|
1276
|
+
] }) }),
|
|
1277
|
+
children: /* @__PURE__ */ jsx8(
|
|
1278
|
+
"button",
|
|
1279
|
+
{
|
|
1280
|
+
onClick: () => handleItemClick(item),
|
|
1281
|
+
className: `${itemClassName} ${isActive ? activeItemClassName : ""} ${isDisabled ? disabledItemClassName : "hover:bg-sec-100"}`,
|
|
1282
|
+
disabled: isDisabled,
|
|
1283
|
+
children: /* @__PURE__ */ jsxs5("div", { className: "flex items-center space-x-2", children: [
|
|
1284
|
+
item.meta?.icon && /* @__PURE__ */ jsx8("span", { className: "text-sm", children: item.meta.icon }),
|
|
1285
|
+
/* @__PURE__ */ jsx8("span", { children: item.label }),
|
|
1286
|
+
item.meta?.description && /* @__PURE__ */ jsx8("span", { className: "text-xs text-sec-500 ml-auto", children: item.meta.description })
|
|
1287
|
+
] })
|
|
1288
|
+
}
|
|
1289
|
+
)
|
|
1290
|
+
},
|
|
1291
|
+
item.id
|
|
1292
|
+
);
|
|
1293
|
+
}, [
|
|
1294
|
+
activePath,
|
|
1295
|
+
itemClassName,
|
|
1296
|
+
activeItemClassName,
|
|
1297
|
+
disabledItemClassName,
|
|
1298
|
+
hideUnauthorizedItems,
|
|
1299
|
+
strictMode,
|
|
1300
|
+
auditLog,
|
|
1301
|
+
handleStrictModeViolation,
|
|
1302
|
+
handleItemClick
|
|
1303
|
+
]);
|
|
1304
|
+
useEffect8(() => {
|
|
1305
|
+
if (strictMode && auditLog) {
|
|
1306
|
+
console.log(`[EnhancedNavigationMenu] Strict mode enabled - all navigation access attempts will be logged and enforced`);
|
|
1307
|
+
}
|
|
1308
|
+
}, [strictMode, auditLog]);
|
|
1309
|
+
useEffect8(() => {
|
|
1310
|
+
if (auditLog) {
|
|
1311
|
+
console.log(`[EnhancedNavigationMenu] Navigation menu initialized:`, {
|
|
1312
|
+
totalItems: items.length,
|
|
1313
|
+
filteredItems: filteredItems.length,
|
|
1314
|
+
strictMode,
|
|
1315
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1316
|
+
});
|
|
1317
|
+
}
|
|
1318
|
+
}, [items.length, filteredItems.length, strictMode, auditLog]);
|
|
1319
|
+
return /* @__PURE__ */ jsx8("nav", { className, children: filteredItems.map((item) => {
|
|
1320
|
+
const isAuthorized = hasNavigationPermission(item);
|
|
1321
|
+
if (renderItem) {
|
|
1322
|
+
return renderItem(item, isAuthorized);
|
|
1323
|
+
}
|
|
1324
|
+
return defaultRenderItem(item, isAuthorized);
|
|
1325
|
+
}) });
|
|
1326
|
+
}
|
|
1327
|
+
|
|
1328
|
+
// src/rbac/providers/index.ts
|
|
1329
|
+
init_RBACProvider();
|
|
1330
|
+
|
|
1331
|
+
// src/rbac/adapters.tsx
|
|
1332
|
+
import React9, { useContext as useContext5 } from "react";
|
|
1333
|
+
import { Fragment as Fragment4, jsx as jsx9, jsxs as jsxs6 } from "react/jsx-runtime";
|
|
1334
|
+
function PermissionGuard({
|
|
1335
|
+
userId,
|
|
1336
|
+
scope,
|
|
1337
|
+
permission,
|
|
1338
|
+
pageId,
|
|
1339
|
+
children,
|
|
1340
|
+
fallback = null,
|
|
1341
|
+
onDenied,
|
|
1342
|
+
loading = null,
|
|
1343
|
+
// NEW: Phase 1 - Enhanced Security Features
|
|
1344
|
+
strictMode = true,
|
|
1345
|
+
auditLog = true,
|
|
1346
|
+
enforceAudit = true
|
|
1347
|
+
}) {
|
|
1348
|
+
const logger = getRBACLogger();
|
|
1349
|
+
const authContext = useContext5(React9.createContext(null));
|
|
1350
|
+
let effectiveUserId = userId;
|
|
1351
|
+
if (!effectiveUserId) {
|
|
1352
|
+
try {
|
|
1353
|
+
if (authContext?.user?.id) {
|
|
1354
|
+
effectiveUserId = authContext.user.id;
|
|
1355
|
+
} else {
|
|
1356
|
+
const globalUser = window.__PACE_USER__;
|
|
1357
|
+
if (globalUser?.id) {
|
|
1358
|
+
effectiveUserId = globalUser.id;
|
|
1359
|
+
}
|
|
1360
|
+
}
|
|
1361
|
+
} catch (error2) {
|
|
1362
|
+
logger.debug("Could not infer userId from context:", error2);
|
|
1363
|
+
}
|
|
1364
|
+
}
|
|
1365
|
+
const { can, isLoading, error } = useCan(effectiveUserId || "", scope, permission, pageId);
|
|
1366
|
+
if (!effectiveUserId) {
|
|
1367
|
+
logger.error("PermissionGuard: No userId provided and could not infer from context");
|
|
1368
|
+
return /* @__PURE__ */ jsxs6("div", { className: "rbac-error", role: "alert", children: [
|
|
1369
|
+
/* @__PURE__ */ jsx9("p", { children: "Permission check failed: User context not available" }),
|
|
1370
|
+
/* @__PURE__ */ jsxs6("details", { children: [
|
|
1371
|
+
/* @__PURE__ */ jsx9("summary", { children: "Debug info" }),
|
|
1372
|
+
/* @__PURE__ */ jsx9("p", { children: "Make sure to either:" }),
|
|
1373
|
+
/* @__PURE__ */ jsxs6("ul", { children: [
|
|
1374
|
+
/* @__PURE__ */ jsx9("li", { children: "Pass userId prop explicitly" }),
|
|
1375
|
+
/* @__PURE__ */ jsx9("li", { children: "Wrap your app with an auth provider" }),
|
|
1376
|
+
/* @__PURE__ */ jsx9("li", { children: "Set window.__PACE_USER__ with user data" })
|
|
1377
|
+
] })
|
|
1378
|
+
] })
|
|
1379
|
+
] });
|
|
1380
|
+
}
|
|
1381
|
+
if (isLoading) {
|
|
1382
|
+
return loading || /* @__PURE__ */ jsx9("div", { className: "rbac-loading", role: "status", "aria-live": "polite", children: /* @__PURE__ */ jsx9("span", { className: "sr-only", children: "Checking permissions..." }) });
|
|
1383
|
+
}
|
|
1384
|
+
if (error) {
|
|
1385
|
+
logger.error("Permission check failed:", error);
|
|
1386
|
+
if (auditLog) {
|
|
1387
|
+
logger.info(`[PermissionGuard] Permission check failed:`, {
|
|
1388
|
+
userId: effectiveUserId,
|
|
1389
|
+
scope,
|
|
1390
|
+
permission,
|
|
1391
|
+
pageId,
|
|
1392
|
+
error: error.message,
|
|
1393
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1394
|
+
});
|
|
1395
|
+
}
|
|
1396
|
+
return fallback;
|
|
1397
|
+
}
|
|
1398
|
+
if (!can) {
|
|
1399
|
+
if (auditLog) {
|
|
1400
|
+
logger.info(`[PermissionGuard] Permission denied:`, {
|
|
1401
|
+
userId: effectiveUserId,
|
|
1402
|
+
scope,
|
|
1403
|
+
permission,
|
|
1404
|
+
pageId,
|
|
1405
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1406
|
+
});
|
|
1407
|
+
}
|
|
1408
|
+
if (strictMode) {
|
|
1409
|
+
logger.error(`[PermissionGuard] STRICT MODE VIOLATION: User attempted to access protected resource without permission`, {
|
|
1410
|
+
userId: effectiveUserId,
|
|
1411
|
+
scope,
|
|
1412
|
+
permission,
|
|
1413
|
+
pageId,
|
|
1414
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1415
|
+
});
|
|
1416
|
+
}
|
|
1417
|
+
if (onDenied) {
|
|
1418
|
+
onDenied();
|
|
1419
|
+
}
|
|
1420
|
+
return /* @__PURE__ */ jsx9(Fragment4, { children: fallback });
|
|
1421
|
+
}
|
|
1422
|
+
if (auditLog) {
|
|
1423
|
+
logger.info(`[PermissionGuard] Permission granted:`, {
|
|
1424
|
+
userId: effectiveUserId,
|
|
1425
|
+
scope,
|
|
1426
|
+
permission,
|
|
1427
|
+
pageId,
|
|
1428
|
+
timestamp: (/* @__PURE__ */ new Date()).toISOString()
|
|
1429
|
+
});
|
|
1430
|
+
}
|
|
1431
|
+
return /* @__PURE__ */ jsx9(Fragment4, { children });
|
|
1432
|
+
}
|
|
1433
|
+
function AccessLevelGuard({
|
|
1434
|
+
userId,
|
|
1435
|
+
scope,
|
|
1436
|
+
minLevel,
|
|
1437
|
+
children,
|
|
1438
|
+
fallback = null,
|
|
1439
|
+
loading = null
|
|
1440
|
+
}) {
|
|
1441
|
+
const logger = getRBACLogger();
|
|
1442
|
+
const authContext = useContext5(React9.createContext(null));
|
|
1443
|
+
let effectiveUserId = userId;
|
|
1444
|
+
if (!effectiveUserId) {
|
|
1445
|
+
try {
|
|
1446
|
+
if (authContext?.user?.id) {
|
|
1447
|
+
effectiveUserId = authContext.user.id;
|
|
1448
|
+
} else {
|
|
1449
|
+
const globalUser = window.__PACE_USER__;
|
|
1450
|
+
if (globalUser?.id) {
|
|
1451
|
+
effectiveUserId = globalUser.id;
|
|
1452
|
+
}
|
|
1453
|
+
}
|
|
1454
|
+
} catch (error2) {
|
|
1455
|
+
logger.debug("Could not infer userId from context:", error2);
|
|
1456
|
+
}
|
|
1457
|
+
}
|
|
1458
|
+
const { accessLevel, isLoading, error } = useAccessLevel(effectiveUserId || "", scope);
|
|
1459
|
+
if (!effectiveUserId) {
|
|
1460
|
+
logger.error("AccessLevelGuard: No userId provided and could not infer from context");
|
|
1461
|
+
return /* @__PURE__ */ jsxs6("div", { className: "rbac-error", role: "alert", children: [
|
|
1462
|
+
/* @__PURE__ */ jsx9("p", { children: "Access level check failed: User context not available" }),
|
|
1463
|
+
/* @__PURE__ */ jsxs6("details", { children: [
|
|
1464
|
+
/* @__PURE__ */ jsx9("summary", { children: "Debug info" }),
|
|
1465
|
+
/* @__PURE__ */ jsx9("p", { children: "Make sure to either:" }),
|
|
1466
|
+
/* @__PURE__ */ jsxs6("ul", { children: [
|
|
1467
|
+
/* @__PURE__ */ jsx9("li", { children: "Pass userId prop explicitly" }),
|
|
1468
|
+
/* @__PURE__ */ jsx9("li", { children: "Wrap your app with an auth provider" }),
|
|
1469
|
+
/* @__PURE__ */ jsx9("li", { children: "Set window.__PACE_USER__ with user data" })
|
|
1470
|
+
] })
|
|
1471
|
+
] })
|
|
1472
|
+
] });
|
|
1473
|
+
}
|
|
1474
|
+
if (isLoading) {
|
|
1475
|
+
return loading || /* @__PURE__ */ jsx9("div", { className: "rbac-loading", role: "status", "aria-live": "polite", children: /* @__PURE__ */ jsx9("span", { className: "sr-only", children: "Checking access level..." }) });
|
|
1476
|
+
}
|
|
1477
|
+
if (error) {
|
|
1478
|
+
logger.error("Access level check failed:", error);
|
|
1479
|
+
return fallback;
|
|
1480
|
+
}
|
|
1481
|
+
const levelHierarchy = ["viewer", "participant", "planner", "admin", "super"];
|
|
1482
|
+
const userLevelIndex = accessLevel ? levelHierarchy.indexOf(accessLevel) : -1;
|
|
1483
|
+
const requiredLevelIndex = levelHierarchy.indexOf(minLevel);
|
|
1484
|
+
if (userLevelIndex < requiredLevelIndex) {
|
|
1485
|
+
return /* @__PURE__ */ jsx9(Fragment4, { children: fallback });
|
|
1486
|
+
}
|
|
1487
|
+
return /* @__PURE__ */ jsx9(Fragment4, { children });
|
|
1488
|
+
}
|
|
1489
|
+
function withPermissionGuard(config, handler) {
|
|
1490
|
+
return async (...args) => {
|
|
1491
|
+
const [req] = args;
|
|
1492
|
+
const userId = req.user?.id;
|
|
1493
|
+
const organisationId = req.organisationId;
|
|
1494
|
+
const eventId = req.eventId;
|
|
1495
|
+
const appId = req.appId;
|
|
1496
|
+
if (!userId || !organisationId) {
|
|
1497
|
+
throw new Error("User context required for permission check");
|
|
1498
|
+
}
|
|
1499
|
+
const { isPermitted: isPermitted2 } = await import("./api-H5A3H4IR.js");
|
|
1500
|
+
const hasPermission2 = await isPermitted2({
|
|
1501
|
+
userId,
|
|
1502
|
+
scope: { organisationId, eventId, appId },
|
|
1503
|
+
permission: config.permission,
|
|
1504
|
+
pageId: config.pageId
|
|
1505
|
+
});
|
|
1506
|
+
if (!hasPermission2) {
|
|
1507
|
+
throw new Error(`Permission denied: ${config.permission}`);
|
|
1508
|
+
}
|
|
1509
|
+
return handler(...args);
|
|
1510
|
+
};
|
|
1511
|
+
}
|
|
1512
|
+
function withAccessLevelGuard(minLevel, handler) {
|
|
1513
|
+
return async (...args) => {
|
|
1514
|
+
const [req] = args;
|
|
1515
|
+
const userId = req.user?.id;
|
|
1516
|
+
const organisationId = req.organisationId;
|
|
1517
|
+
const eventId = req.eventId;
|
|
1518
|
+
const appId = req.appId;
|
|
1519
|
+
if (!userId || !organisationId) {
|
|
1520
|
+
throw new Error("User context required for access level check");
|
|
1521
|
+
}
|
|
1522
|
+
const { getAccessLevel: getAccessLevel2 } = await import("./api-H5A3H4IR.js");
|
|
1523
|
+
const accessLevel = await getAccessLevel2({
|
|
1524
|
+
userId,
|
|
1525
|
+
scope: { organisationId, eventId, appId }
|
|
1526
|
+
});
|
|
1527
|
+
const levelHierarchy = ["viewer", "participant", "planner", "admin", "super"];
|
|
1528
|
+
const userLevelIndex = levelHierarchy.indexOf(accessLevel);
|
|
1529
|
+
const requiredLevelIndex = levelHierarchy.indexOf(minLevel);
|
|
1530
|
+
if (userLevelIndex < requiredLevelIndex) {
|
|
1531
|
+
throw new Error(`Access level required: ${minLevel}, got: ${accessLevel}`);
|
|
1532
|
+
}
|
|
1533
|
+
return handler(...args);
|
|
1534
|
+
};
|
|
1535
|
+
}
|
|
1536
|
+
function withRoleGuard(config, handler) {
|
|
1537
|
+
return async (...args) => {
|
|
1538
|
+
const [req] = args;
|
|
1539
|
+
const userId = req.user?.id;
|
|
1540
|
+
const organisationId = req.organisationId;
|
|
1541
|
+
const eventId = req.eventId;
|
|
1542
|
+
const appId = req.appId;
|
|
1543
|
+
if (!userId || !organisationId) {
|
|
1544
|
+
throw new Error("User context required for role check");
|
|
1545
|
+
}
|
|
1546
|
+
if (config.globalRoles && config.globalRoles.length > 0) {
|
|
1547
|
+
const { isSuperAdmin } = await import("./api-H5A3H4IR.js");
|
|
1548
|
+
const isSuper = await isSuperAdmin(userId);
|
|
1549
|
+
if (isSuper) {
|
|
1550
|
+
if (organisationId) {
|
|
1551
|
+
const { emitAuditEvent: emitAuditEvent2 } = await import("./audit-BUW3LMJB.js");
|
|
1552
|
+
await emitAuditEvent2({
|
|
1553
|
+
type: "permission_check",
|
|
1554
|
+
userId,
|
|
1555
|
+
organisationId,
|
|
1556
|
+
eventId,
|
|
1557
|
+
appId,
|
|
1558
|
+
permission: "bypass:all",
|
|
1559
|
+
decision: true,
|
|
1560
|
+
source: "api",
|
|
1561
|
+
bypass: true,
|
|
1562
|
+
duration_ms: 0,
|
|
1563
|
+
metadata: {
|
|
1564
|
+
operation: "role_guard",
|
|
1565
|
+
reason: "super_admin_bypass"
|
|
1566
|
+
}
|
|
1567
|
+
});
|
|
1568
|
+
}
|
|
1569
|
+
return handler(...args);
|
|
1570
|
+
}
|
|
1571
|
+
}
|
|
1572
|
+
if (config.organisationRoles && config.organisationRoles.length > 0) {
|
|
1573
|
+
const { isOrganisationAdmin } = await import("./api-H5A3H4IR.js");
|
|
1574
|
+
const isOrgAdmin = await isOrganisationAdmin(userId, organisationId);
|
|
1575
|
+
if (!isOrgAdmin && config.requireAll !== false) {
|
|
1576
|
+
throw new Error(`Organisation admin role required`);
|
|
1577
|
+
}
|
|
1578
|
+
}
|
|
1579
|
+
if (config.eventAppRoles && config.eventAppRoles.length > 0 && eventId && appId) {
|
|
1580
|
+
const { isEventAdmin } = await import("./api-H5A3H4IR.js");
|
|
1581
|
+
const isEventAdminUser = await isEventAdmin(userId, { organisationId, eventId, appId });
|
|
1582
|
+
if (!isEventAdminUser && config.requireAll !== false) {
|
|
1583
|
+
throw new Error(`Event admin role required`);
|
|
1584
|
+
}
|
|
1585
|
+
}
|
|
1586
|
+
if (organisationId) {
|
|
1587
|
+
const { emitAuditEvent: emitAuditEvent2 } = await import("./audit-BUW3LMJB.js");
|
|
1588
|
+
await emitAuditEvent2({
|
|
1589
|
+
type: "permission_check",
|
|
1590
|
+
userId,
|
|
1591
|
+
organisationId,
|
|
1592
|
+
eventId,
|
|
1593
|
+
appId,
|
|
1594
|
+
permission: "role:check",
|
|
1595
|
+
decision: true,
|
|
1596
|
+
source: "api",
|
|
1597
|
+
bypass: false,
|
|
1598
|
+
duration_ms: 0,
|
|
1599
|
+
metadata: {
|
|
1600
|
+
operation: "role_guard"
|
|
1601
|
+
}
|
|
1602
|
+
});
|
|
1603
|
+
}
|
|
1604
|
+
return handler(...args);
|
|
1605
|
+
};
|
|
1606
|
+
}
|
|
1607
|
+
function createRBACMiddleware(config) {
|
|
1608
|
+
return async (req, res, next) => {
|
|
1609
|
+
const { pathname } = req.nextUrl;
|
|
1610
|
+
const userId = req.user?.id;
|
|
1611
|
+
const organisationId = req.organisationId;
|
|
1612
|
+
if (!userId || !organisationId) {
|
|
1613
|
+
return res.redirect(config.fallbackUrl || "/login");
|
|
1614
|
+
}
|
|
1615
|
+
const protectedRoute = config.protectedRoutes.find(
|
|
1616
|
+
(route) => pathname.startsWith(route.path)
|
|
1617
|
+
);
|
|
1618
|
+
if (protectedRoute) {
|
|
1619
|
+
try {
|
|
1620
|
+
const { isPermitted: isPermitted2 } = await import("./api-H5A3H4IR.js");
|
|
1621
|
+
const hasPermission2 = await isPermitted2({
|
|
1622
|
+
userId,
|
|
1623
|
+
scope: { organisationId },
|
|
1624
|
+
permission: protectedRoute.permission,
|
|
1625
|
+
pageId: protectedRoute.pageId
|
|
1626
|
+
});
|
|
1627
|
+
if (!hasPermission2) {
|
|
1628
|
+
return res.redirect(config.fallbackUrl || "/access-denied");
|
|
1629
|
+
}
|
|
1630
|
+
} catch (_error) {
|
|
1631
|
+
return res.redirect(config.fallbackUrl || "/access-denied");
|
|
1632
|
+
}
|
|
1633
|
+
}
|
|
1634
|
+
next();
|
|
1635
|
+
};
|
|
1636
|
+
}
|
|
1637
|
+
function createRBACExpressMiddleware(config) {
|
|
1638
|
+
return async (req, res, next) => {
|
|
1639
|
+
const userId = req.user?.id;
|
|
1640
|
+
const organisationId = req.organisationId;
|
|
1641
|
+
const eventId = req.eventId;
|
|
1642
|
+
const appId = req.appId;
|
|
1643
|
+
if (!userId || !organisationId) {
|
|
1644
|
+
return res.status(401).json({ error: "User context required" });
|
|
1645
|
+
}
|
|
1646
|
+
try {
|
|
1647
|
+
const { isPermitted: isPermitted2 } = await import("./api-H5A3H4IR.js");
|
|
1648
|
+
const hasPermission2 = await isPermitted2({
|
|
1649
|
+
userId,
|
|
1650
|
+
scope: { organisationId, eventId, appId },
|
|
1651
|
+
permission: config.permission,
|
|
1652
|
+
pageId: config.pageId
|
|
1653
|
+
});
|
|
1654
|
+
if (!hasPermission2) {
|
|
1655
|
+
return res.status(403).json({ error: "Permission denied" });
|
|
1656
|
+
}
|
|
1657
|
+
next();
|
|
1658
|
+
} catch (_error) {
|
|
1659
|
+
return res.status(500).json({ error: "Permission check failed" });
|
|
1660
|
+
}
|
|
1661
|
+
};
|
|
1662
|
+
}
|
|
1663
|
+
function hasPermissionCached(userId, scope, _permission, _pageId) {
|
|
1664
|
+
const cacheKey = RBACCache.generatePermissionKey({
|
|
1665
|
+
userId,
|
|
1666
|
+
organisationId: scope.organisationId,
|
|
1667
|
+
eventId: scope.eventId,
|
|
1668
|
+
appId: scope.appId
|
|
1669
|
+
});
|
|
1670
|
+
return rbacCache.get(cacheKey) || false;
|
|
1671
|
+
}
|
|
1672
|
+
function hasAnyPermissionCached(userId, scope, permissions, pageId) {
|
|
1673
|
+
return permissions.some(
|
|
1674
|
+
(permission) => hasPermissionCached(userId, scope, permission, pageId)
|
|
1675
|
+
);
|
|
1676
|
+
}
|
|
1677
|
+
|
|
1678
|
+
// src/rbac/permissions.ts
|
|
1679
|
+
var GLOBAL_PERMISSIONS = {
|
|
1680
|
+
MANAGE_ALL: "manage:*",
|
|
1681
|
+
READ_ALL: "read:*",
|
|
1682
|
+
CREATE_ALL: "create:*",
|
|
1683
|
+
UPDATE_ALL: "update:*",
|
|
1684
|
+
DELETE_ALL: "delete:*"
|
|
1685
|
+
};
|
|
1686
|
+
var ORGANISATION_PERMISSIONS = {
|
|
1687
|
+
// Organisation management
|
|
1688
|
+
MANAGE_ORGANISATION: "manage:organisation",
|
|
1689
|
+
READ_ORGANISATION: "read:organisation",
|
|
1690
|
+
UPDATE_ORGANISATION: "update:organisation",
|
|
1691
|
+
// User management
|
|
1692
|
+
MANAGE_USERS: "manage:users",
|
|
1693
|
+
READ_USERS: "read:users",
|
|
1694
|
+
CREATE_USERS: "create:users",
|
|
1695
|
+
UPDATE_USERS: "update:users",
|
|
1696
|
+
DELETE_USERS: "delete:users",
|
|
1697
|
+
// Role management
|
|
1698
|
+
MANAGE_ROLES: "manage:roles",
|
|
1699
|
+
READ_ROLES: "read:roles",
|
|
1700
|
+
CREATE_ROLES: "create:roles",
|
|
1701
|
+
UPDATE_ROLES: "update:roles",
|
|
1702
|
+
DELETE_ROLES: "delete:roles",
|
|
1703
|
+
// Event management
|
|
1704
|
+
MANAGE_EVENTS: "manage:events",
|
|
1705
|
+
READ_EVENTS: "read:events",
|
|
1706
|
+
CREATE_EVENTS: "create:events",
|
|
1707
|
+
UPDATE_EVENTS: "update:events",
|
|
1708
|
+
DELETE_EVENTS: "delete:events",
|
|
1709
|
+
// App management
|
|
1710
|
+
MANAGE_APPS: "manage:apps",
|
|
1711
|
+
READ_APPS: "read:apps",
|
|
1712
|
+
CREATE_APPS: "create:apps",
|
|
1713
|
+
UPDATE_APPS: "update:apps",
|
|
1714
|
+
DELETE_APPS: "delete:apps"
|
|
1715
|
+
};
|
|
1716
|
+
var EVENT_APP_PERMISSIONS = {
|
|
1717
|
+
// Event management
|
|
1718
|
+
MANAGE_EVENT: "manage:event",
|
|
1719
|
+
READ_EVENT: "read:event",
|
|
1720
|
+
UPDATE_EVENT: "update:event",
|
|
1721
|
+
// App management
|
|
1722
|
+
MANAGE_APP: "manage:app",
|
|
1723
|
+
READ_APP: "read:app",
|
|
1724
|
+
UPDATE_APP: "update:app",
|
|
1725
|
+
// Team management
|
|
1726
|
+
MANAGE_TEAM: "manage:team",
|
|
1727
|
+
READ_TEAM: "read:team",
|
|
1728
|
+
CREATE_TEAM: "create:team",
|
|
1729
|
+
UPDATE_TEAM: "update:team",
|
|
1730
|
+
DELETE_TEAM: "delete:team",
|
|
1731
|
+
// Team members
|
|
1732
|
+
MANAGE_TEAM_MEMBERS: "manage:team.members",
|
|
1733
|
+
READ_TEAM_MEMBERS: "read:team.members",
|
|
1734
|
+
CREATE_TEAM_MEMBERS: "create:team.members",
|
|
1735
|
+
UPDATE_TEAM_MEMBERS: "update:team.members",
|
|
1736
|
+
DELETE_TEAM_MEMBERS: "delete:team.members",
|
|
1737
|
+
// Event content
|
|
1738
|
+
MANAGE_EVENT_CONTENT: "manage:event.content",
|
|
1739
|
+
READ_EVENT_CONTENT: "read:event.content",
|
|
1740
|
+
CREATE_EVENT_CONTENT: "create:event.content",
|
|
1741
|
+
UPDATE_EVENT_CONTENT: "update:event.content",
|
|
1742
|
+
DELETE_EVENT_CONTENT: "delete:event.content",
|
|
1743
|
+
// Event settings
|
|
1744
|
+
MANAGE_EVENT_SETTINGS: "manage:event.settings",
|
|
1745
|
+
READ_EVENT_SETTINGS: "read:event.settings",
|
|
1746
|
+
UPDATE_EVENT_SETTINGS: "update:event.settings"
|
|
1747
|
+
};
|
|
1748
|
+
var PAGE_PERMISSIONS = {
|
|
1749
|
+
// General page access
|
|
1750
|
+
READ_PAGE: "read:page",
|
|
1751
|
+
MANAGE_PAGE: "manage:page",
|
|
1752
|
+
// Admin pages
|
|
1753
|
+
READ_ADMIN: "read:admin",
|
|
1754
|
+
MANAGE_ADMIN: "manage:admin",
|
|
1755
|
+
// Dashboard pages
|
|
1756
|
+
READ_DASHBOARD: "read:dashboard",
|
|
1757
|
+
MANAGE_DASHBOARD: "manage:dashboard",
|
|
1758
|
+
// Settings pages
|
|
1759
|
+
READ_SETTINGS: "read:settings",
|
|
1760
|
+
MANAGE_SETTINGS: "manage:settings",
|
|
1761
|
+
// Reports pages
|
|
1762
|
+
READ_REPORTS: "read:reports",
|
|
1763
|
+
MANAGE_REPORTS: "manage:reports"
|
|
1764
|
+
};
|
|
1765
|
+
var PERMISSION_GROUPS = {
|
|
1766
|
+
// Global admin permissions
|
|
1767
|
+
GLOBAL_ADMIN: [
|
|
1768
|
+
GLOBAL_PERMISSIONS.MANAGE_ALL,
|
|
1769
|
+
GLOBAL_PERMISSIONS.READ_ALL,
|
|
1770
|
+
GLOBAL_PERMISSIONS.CREATE_ALL,
|
|
1771
|
+
GLOBAL_PERMISSIONS.UPDATE_ALL,
|
|
1772
|
+
GLOBAL_PERMISSIONS.DELETE_ALL
|
|
1773
|
+
],
|
|
1774
|
+
// Organisation admin permissions
|
|
1775
|
+
ORG_ADMIN: [
|
|
1776
|
+
ORGANISATION_PERMISSIONS.MANAGE_ORGANISATION,
|
|
1777
|
+
ORGANISATION_PERMISSIONS.READ_ORGANISATION,
|
|
1778
|
+
ORGANISATION_PERMISSIONS.UPDATE_ORGANISATION,
|
|
1779
|
+
ORGANISATION_PERMISSIONS.MANAGE_USERS,
|
|
1780
|
+
ORGANISATION_PERMISSIONS.READ_USERS,
|
|
1781
|
+
ORGANISATION_PERMISSIONS.CREATE_USERS,
|
|
1782
|
+
ORGANISATION_PERMISSIONS.UPDATE_USERS,
|
|
1783
|
+
ORGANISATION_PERMISSIONS.DELETE_USERS,
|
|
1784
|
+
ORGANISATION_PERMISSIONS.MANAGE_ROLES,
|
|
1785
|
+
ORGANISATION_PERMISSIONS.READ_ROLES,
|
|
1786
|
+
ORGANISATION_PERMISSIONS.CREATE_ROLES,
|
|
1787
|
+
ORGANISATION_PERMISSIONS.UPDATE_ROLES,
|
|
1788
|
+
ORGANISATION_PERMISSIONS.DELETE_ROLES,
|
|
1789
|
+
ORGANISATION_PERMISSIONS.MANAGE_EVENTS,
|
|
1790
|
+
ORGANISATION_PERMISSIONS.READ_EVENTS,
|
|
1791
|
+
ORGANISATION_PERMISSIONS.CREATE_EVENTS,
|
|
1792
|
+
ORGANISATION_PERMISSIONS.UPDATE_EVENTS,
|
|
1793
|
+
ORGANISATION_PERMISSIONS.DELETE_EVENTS,
|
|
1794
|
+
ORGANISATION_PERMISSIONS.MANAGE_APPS,
|
|
1795
|
+
ORGANISATION_PERMISSIONS.READ_APPS,
|
|
1796
|
+
ORGANISATION_PERMISSIONS.CREATE_APPS,
|
|
1797
|
+
ORGANISATION_PERMISSIONS.UPDATE_APPS,
|
|
1798
|
+
ORGANISATION_PERMISSIONS.DELETE_APPS
|
|
1799
|
+
],
|
|
1800
|
+
// Event admin permissions
|
|
1801
|
+
EVENT_ADMIN: [
|
|
1802
|
+
EVENT_APP_PERMISSIONS.MANAGE_EVENT,
|
|
1803
|
+
EVENT_APP_PERMISSIONS.READ_EVENT,
|
|
1804
|
+
EVENT_APP_PERMISSIONS.UPDATE_EVENT,
|
|
1805
|
+
EVENT_APP_PERMISSIONS.MANAGE_APP,
|
|
1806
|
+
EVENT_APP_PERMISSIONS.READ_APP,
|
|
1807
|
+
EVENT_APP_PERMISSIONS.UPDATE_APP,
|
|
1808
|
+
EVENT_APP_PERMISSIONS.MANAGE_TEAM,
|
|
1809
|
+
EVENT_APP_PERMISSIONS.READ_TEAM,
|
|
1810
|
+
EVENT_APP_PERMISSIONS.CREATE_TEAM,
|
|
1811
|
+
EVENT_APP_PERMISSIONS.UPDATE_TEAM,
|
|
1812
|
+
EVENT_APP_PERMISSIONS.DELETE_TEAM,
|
|
1813
|
+
EVENT_APP_PERMISSIONS.MANAGE_TEAM_MEMBERS,
|
|
1814
|
+
EVENT_APP_PERMISSIONS.READ_TEAM_MEMBERS,
|
|
1815
|
+
EVENT_APP_PERMISSIONS.CREATE_TEAM_MEMBERS,
|
|
1816
|
+
EVENT_APP_PERMISSIONS.UPDATE_TEAM_MEMBERS,
|
|
1817
|
+
EVENT_APP_PERMISSIONS.DELETE_TEAM_MEMBERS,
|
|
1818
|
+
EVENT_APP_PERMISSIONS.MANAGE_EVENT_CONTENT,
|
|
1819
|
+
EVENT_APP_PERMISSIONS.READ_EVENT_CONTENT,
|
|
1820
|
+
EVENT_APP_PERMISSIONS.CREATE_EVENT_CONTENT,
|
|
1821
|
+
EVENT_APP_PERMISSIONS.UPDATE_EVENT_CONTENT,
|
|
1822
|
+
EVENT_APP_PERMISSIONS.DELETE_EVENT_CONTENT,
|
|
1823
|
+
EVENT_APP_PERMISSIONS.MANAGE_EVENT_SETTINGS,
|
|
1824
|
+
EVENT_APP_PERMISSIONS.READ_EVENT_SETTINGS,
|
|
1825
|
+
EVENT_APP_PERMISSIONS.UPDATE_EVENT_SETTINGS
|
|
1826
|
+
],
|
|
1827
|
+
// Planner permissions
|
|
1828
|
+
PLANNER: [
|
|
1829
|
+
EVENT_APP_PERMISSIONS.READ_EVENT,
|
|
1830
|
+
EVENT_APP_PERMISSIONS.UPDATE_EVENT,
|
|
1831
|
+
EVENT_APP_PERMISSIONS.READ_APP,
|
|
1832
|
+
EVENT_APP_PERMISSIONS.UPDATE_APP,
|
|
1833
|
+
EVENT_APP_PERMISSIONS.READ_TEAM,
|
|
1834
|
+
EVENT_APP_PERMISSIONS.CREATE_TEAM,
|
|
1835
|
+
EVENT_APP_PERMISSIONS.UPDATE_TEAM,
|
|
1836
|
+
EVENT_APP_PERMISSIONS.READ_TEAM_MEMBERS,
|
|
1837
|
+
EVENT_APP_PERMISSIONS.CREATE_TEAM_MEMBERS,
|
|
1838
|
+
EVENT_APP_PERMISSIONS.UPDATE_TEAM_MEMBERS,
|
|
1839
|
+
EVENT_APP_PERMISSIONS.READ_EVENT_CONTENT,
|
|
1840
|
+
EVENT_APP_PERMISSIONS.CREATE_EVENT_CONTENT,
|
|
1841
|
+
EVENT_APP_PERMISSIONS.UPDATE_EVENT_CONTENT,
|
|
1842
|
+
EVENT_APP_PERMISSIONS.READ_EVENT_SETTINGS,
|
|
1843
|
+
EVENT_APP_PERMISSIONS.UPDATE_EVENT_SETTINGS
|
|
1844
|
+
],
|
|
1845
|
+
// Participant permissions
|
|
1846
|
+
PARTICIPANT: [
|
|
1847
|
+
EVENT_APP_PERMISSIONS.READ_EVENT,
|
|
1848
|
+
EVENT_APP_PERMISSIONS.READ_APP,
|
|
1849
|
+
EVENT_APP_PERMISSIONS.READ_TEAM,
|
|
1850
|
+
EVENT_APP_PERMISSIONS.READ_TEAM_MEMBERS,
|
|
1851
|
+
EVENT_APP_PERMISSIONS.READ_EVENT_CONTENT,
|
|
1852
|
+
EVENT_APP_PERMISSIONS.READ_EVENT_SETTINGS
|
|
1853
|
+
],
|
|
1854
|
+
// Viewer permissions
|
|
1855
|
+
VIEWER: [
|
|
1856
|
+
EVENT_APP_PERMISSIONS.READ_EVENT,
|
|
1857
|
+
EVENT_APP_PERMISSIONS.READ_APP,
|
|
1858
|
+
EVENT_APP_PERMISSIONS.READ_TEAM,
|
|
1859
|
+
EVENT_APP_PERMISSIONS.READ_EVENT_CONTENT
|
|
1860
|
+
]
|
|
1861
|
+
};
|
|
1862
|
+
function isValidPermission(permission) {
|
|
1863
|
+
const pattern = /^(read|create|update|delete|manage):[a-z0-9._-]+$|^(read|create|update|delete|manage):\*$/;
|
|
1864
|
+
return pattern.test(permission);
|
|
1865
|
+
}
|
|
1866
|
+
function getPermissionsForRole(role) {
|
|
1867
|
+
switch (role) {
|
|
1868
|
+
case "super_admin":
|
|
1869
|
+
return [...PERMISSION_GROUPS.GLOBAL_ADMIN];
|
|
1870
|
+
case "org_admin":
|
|
1871
|
+
return [...PERMISSION_GROUPS.ORG_ADMIN];
|
|
1872
|
+
case "event_admin":
|
|
1873
|
+
return [...PERMISSION_GROUPS.EVENT_ADMIN];
|
|
1874
|
+
case "planner":
|
|
1875
|
+
return [...PERMISSION_GROUPS.PLANNER];
|
|
1876
|
+
case "participant":
|
|
1877
|
+
return [...PERMISSION_GROUPS.PARTICIPANT];
|
|
1878
|
+
case "viewer":
|
|
1879
|
+
return [...PERMISSION_GROUPS.VIEWER];
|
|
1880
|
+
default:
|
|
1881
|
+
return [];
|
|
1882
|
+
}
|
|
1883
|
+
}
|
|
1884
|
+
var ALL_PERMISSIONS = {
|
|
1885
|
+
...GLOBAL_PERMISSIONS,
|
|
1886
|
+
...ORGANISATION_PERMISSIONS,
|
|
1887
|
+
...EVENT_APP_PERMISSIONS,
|
|
1888
|
+
...PAGE_PERMISSIONS
|
|
1889
|
+
};
|
|
1890
|
+
|
|
1891
|
+
export {
|
|
1892
|
+
SecureSupabaseClient,
|
|
1893
|
+
createSecureClient,
|
|
1894
|
+
fromSupabaseClient,
|
|
1895
|
+
PagePermissionProvider,
|
|
1896
|
+
usePagePermissions,
|
|
1897
|
+
PagePermissionGuard,
|
|
1898
|
+
SecureDataProvider,
|
|
1899
|
+
useSecureData,
|
|
1900
|
+
PermissionEnforcer,
|
|
1901
|
+
RoleBasedRouter,
|
|
1902
|
+
useRoleBasedRouter,
|
|
1903
|
+
NavigationProvider,
|
|
1904
|
+
useNavigationPermissions,
|
|
1905
|
+
NavigationGuard,
|
|
1906
|
+
EnhancedNavigationMenu,
|
|
1907
|
+
PermissionGuard,
|
|
1908
|
+
AccessLevelGuard,
|
|
1909
|
+
withPermissionGuard,
|
|
1910
|
+
withAccessLevelGuard,
|
|
1911
|
+
withRoleGuard,
|
|
1912
|
+
createRBACMiddleware,
|
|
1913
|
+
createRBACExpressMiddleware,
|
|
1914
|
+
hasPermissionCached,
|
|
1915
|
+
hasAnyPermissionCached,
|
|
1916
|
+
GLOBAL_PERMISSIONS,
|
|
1917
|
+
ORGANISATION_PERMISSIONS,
|
|
1918
|
+
EVENT_APP_PERMISSIONS,
|
|
1919
|
+
PAGE_PERMISSIONS,
|
|
1920
|
+
PERMISSION_GROUPS,
|
|
1921
|
+
isValidPermission,
|
|
1922
|
+
getPermissionsForRole,
|
|
1923
|
+
ALL_PERMISSIONS
|
|
1924
|
+
};
|
|
1925
|
+
//# sourceMappingURL=chunk-5SIXIV7R.js.map
|