@jmruthers/pace-core 0.5.191 → 0.5.193

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (293) hide show
  1. package/dist/{AuthService-CbP_utw2.d.ts → AuthService-DjnJHDtC.d.ts} +1 -0
  2. package/dist/{DataTable-WKRZD47S.js → DataTable-5FU7IESH.js} +7 -6
  3. package/dist/{PublicPageProvider-ULXC_u6U.d.ts → PublicPageProvider-C0Sm_e5k.d.ts} +3 -1
  4. package/dist/{UnifiedAuthProvider-BYA9qB-o.d.ts → UnifiedAuthProvider-185Ih4dj.d.ts} +2 -0
  5. package/dist/{UnifiedAuthProvider-FTSG5XH7.js → UnifiedAuthProvider-RGJTDE2C.js} +3 -3
  6. package/dist/{api-IHKALJZD.js → api-N774RPUA.js} +2 -2
  7. package/dist/chunk-6C4YBBJM 5.js +628 -0
  8. package/dist/chunk-7D4SUZUM.js 2.map +1 -0
  9. package/dist/{chunk-LOMZXPSN.js → chunk-7EQTDTTJ.js} +47 -74
  10. package/dist/chunk-7EQTDTTJ.js 2.map +1 -0
  11. package/dist/chunk-7EQTDTTJ.js.map +1 -0
  12. package/dist/{chunk-6LTQQAT6.js → chunk-7FLMSG37.js} +336 -137
  13. package/dist/chunk-7FLMSG37.js 2.map +1 -0
  14. package/dist/chunk-7FLMSG37.js.map +1 -0
  15. package/dist/{chunk-XNYQOL3Z.js → chunk-BC4IJKSL.js} +9 -18
  16. package/dist/chunk-BC4IJKSL.js.map +1 -0
  17. package/dist/{chunk-ULHIJK66.js → chunk-E3SPN4VZ 5.js } +146 -36
  18. package/dist/chunk-E3SPN4VZ.js +12917 -0
  19. package/dist/{chunk-ULHIJK66.js.map → chunk-E3SPN4VZ.js.map} +1 -1
  20. package/dist/chunk-E66EQZE6 5.js +37 -0
  21. package/dist/chunk-E66EQZE6.js 2.map +1 -0
  22. package/dist/{chunk-6TQDD426.js → chunk-HWIIPPNI.js} +40 -221
  23. package/dist/chunk-HWIIPPNI.js.map +1 -0
  24. package/dist/chunk-I7PSE6JW 5.js +191 -0
  25. package/dist/chunk-I7PSE6JW.js 2.map +1 -0
  26. package/dist/{chunk-OETXORNB.js → chunk-IIELH4DL.js} +211 -136
  27. package/dist/chunk-IIELH4DL.js.map +1 -0
  28. package/dist/{chunk-ROXMHMY2.js → chunk-KNC55RTG.js} +13 -3
  29. package/dist/{chunk-ROXMHMY2.js.map → chunk-KNC55RTG.js 5.map } +1 -1
  30. package/dist/chunk-KNC55RTG.js.map +1 -0
  31. package/dist/chunk-KQCRWDSA.js 5.map +1 -0
  32. package/dist/{chunk-XYXSXPUK.js → chunk-LFNCN2SP.js} +7 -6
  33. package/dist/chunk-LFNCN2SP.js 2.map +1 -0
  34. package/dist/chunk-LFNCN2SP.js.map +1 -0
  35. package/dist/chunk-LMC26NLJ 2.js +84 -0
  36. package/dist/{chunk-VKB2CO4Z.js → chunk-NOAYCWCX 5.js } +84 -87
  37. package/dist/chunk-NOAYCWCX.js +4993 -0
  38. package/dist/chunk-NOAYCWCX.js.map +1 -0
  39. package/dist/chunk-QWWZ5CAQ.js 3.map +1 -0
  40. package/dist/chunk-QXHPKYJV 3.js +113 -0
  41. package/dist/chunk-R77UEZ4E 3.js +68 -0
  42. package/dist/chunk-VBXEHIUJ.js 6.map +1 -0
  43. package/dist/{chunk-VRGWKHDB.js → chunk-XNXXZ43G.js} +77 -33
  44. package/dist/chunk-XNXXZ43G.js.map +1 -0
  45. package/dist/chunk-ZSAAAMVR 6.js +25 -0
  46. package/dist/components.d.ts +2 -2
  47. package/dist/components.js +7 -7
  48. package/dist/components.js 5.map +1 -0
  49. package/dist/hooks.js +8 -8
  50. package/dist/index.d.ts +5 -5
  51. package/dist/index.js +12 -14
  52. package/dist/index.js.map +1 -1
  53. package/dist/providers.d.ts +3 -3
  54. package/dist/providers.js +2 -2
  55. package/dist/rbac/index.d.ts +1 -19
  56. package/dist/rbac/index.js +7 -9
  57. package/dist/styles/index 2.js +12 -0
  58. package/dist/styles/index.js 5.map +1 -0
  59. package/dist/theming/runtime 5.js +19 -0
  60. package/dist/theming/runtime.js 5.map +1 -0
  61. package/dist/utils.js +1 -1
  62. package/docs/api/classes/ColumnFactory.md +1 -1
  63. package/docs/api/classes/ErrorBoundary.md +1 -1
  64. package/docs/api/classes/InvalidScopeError.md +1 -1
  65. package/docs/api/classes/Logger.md +1 -1
  66. package/docs/api/classes/MissingUserContextError.md +1 -1
  67. package/docs/api/classes/OrganisationContextRequiredError.md +1 -1
  68. package/docs/api/classes/PermissionDeniedError.md +2 -2
  69. package/docs/api/classes/RBACAuditManager.md +2 -2
  70. package/docs/api/classes/RBACCache.md +1 -1
  71. package/docs/api/classes/RBACEngine.md +2 -2
  72. package/docs/api/classes/RBACError.md +1 -1
  73. package/docs/api/classes/RBACNotInitializedError.md +1 -1
  74. package/docs/api/classes/SecureSupabaseClient.md +10 -10
  75. package/docs/api/classes/StorageUtils.md +1 -1
  76. package/docs/api/enums/FileCategory.md +1 -1
  77. package/docs/api/enums/LogLevel.md +1 -1
  78. package/docs/api/enums/RBACErrorCode.md +1 -1
  79. package/docs/api/enums/RPCFunction.md +1 -1
  80. package/docs/api/interfaces/AddressFieldProps.md +1 -1
  81. package/docs/api/interfaces/AddressFieldRef.md +1 -1
  82. package/docs/api/interfaces/AggregateConfig.md +1 -1
  83. package/docs/api/interfaces/AutocompleteOptions.md +1 -1
  84. package/docs/api/interfaces/AvatarProps.md +1 -1
  85. package/docs/api/interfaces/BadgeProps.md +1 -1
  86. package/docs/api/interfaces/ButtonProps.md +1 -1
  87. package/docs/api/interfaces/CalendarProps.md +1 -1
  88. package/docs/api/interfaces/CardProps.md +1 -1
  89. package/docs/api/interfaces/ColorPalette.md +1 -1
  90. package/docs/api/interfaces/ColorShade.md +1 -1
  91. package/docs/api/interfaces/ComplianceResult.md +1 -1
  92. package/docs/api/interfaces/DataAccessRecord.md +1 -1
  93. package/docs/api/interfaces/DataRecord.md +1 -1
  94. package/docs/api/interfaces/DataTableAction.md +1 -1
  95. package/docs/api/interfaces/DataTableColumn.md +1 -1
  96. package/docs/api/interfaces/DataTableProps.md +1 -1
  97. package/docs/api/interfaces/DataTableToolbarButton.md +1 -1
  98. package/docs/api/interfaces/DatabaseComplianceResult.md +1 -1
  99. package/docs/api/interfaces/DatabaseIssue.md +1 -1
  100. package/docs/api/interfaces/EmptyStateConfig.md +1 -1
  101. package/docs/api/interfaces/EnhancedNavigationMenuProps.md +1 -1
  102. package/docs/api/interfaces/EventAppRoleData.md +1 -1
  103. package/docs/api/interfaces/ExportColumn.md +1 -1
  104. package/docs/api/interfaces/ExportOptions.md +1 -1
  105. package/docs/api/interfaces/FileDisplayProps.md +24 -11
  106. package/docs/api/interfaces/FileMetadata.md +1 -1
  107. package/docs/api/interfaces/FileReference.md +1 -1
  108. package/docs/api/interfaces/FileSizeLimits.md +1 -1
  109. package/docs/api/interfaces/FileUploadOptions.md +1 -1
  110. package/docs/api/interfaces/FileUploadProps.md +1 -1
  111. package/docs/api/interfaces/FooterProps.md +1 -1
  112. package/docs/api/interfaces/FormFieldProps.md +1 -1
  113. package/docs/api/interfaces/FormProps.md +1 -1
  114. package/docs/api/interfaces/GrantEventAppRoleParams.md +1 -1
  115. package/docs/api/interfaces/InactivityWarningModalProps.md +1 -1
  116. package/docs/api/interfaces/InputProps.md +1 -1
  117. package/docs/api/interfaces/LabelProps.md +1 -1
  118. package/docs/api/interfaces/LoggerConfig.md +1 -1
  119. package/docs/api/interfaces/LoginFormProps.md +1 -1
  120. package/docs/api/interfaces/NavigationAccessRecord.md +2 -2
  121. package/docs/api/interfaces/NavigationContextType.md +1 -1
  122. package/docs/api/interfaces/NavigationGuardProps.md +1 -1
  123. package/docs/api/interfaces/NavigationItem.md +1 -1
  124. package/docs/api/interfaces/NavigationMenuProps.md +1 -1
  125. package/docs/api/interfaces/NavigationProviderProps.md +1 -1
  126. package/docs/api/interfaces/Organisation.md +1 -1
  127. package/docs/api/interfaces/OrganisationContextType.md +1 -1
  128. package/docs/api/interfaces/OrganisationMembership.md +1 -1
  129. package/docs/api/interfaces/OrganisationProviderProps.md +1 -1
  130. package/docs/api/interfaces/OrganisationSecurityError.md +1 -1
  131. package/docs/api/interfaces/PaceAppLayoutProps.md +1 -1
  132. package/docs/api/interfaces/PaceLoginPageProps.md +1 -1
  133. package/docs/api/interfaces/PageAccessRecord.md +1 -1
  134. package/docs/api/interfaces/PagePermissionContextType.md +1 -1
  135. package/docs/api/interfaces/PagePermissionGuardProps.md +2 -2
  136. package/docs/api/interfaces/PagePermissionProviderProps.md +1 -1
  137. package/docs/api/interfaces/PaletteData.md +1 -1
  138. package/docs/api/interfaces/ParsedAddress.md +1 -1
  139. package/docs/api/interfaces/PermissionEnforcerProps.md +4 -4
  140. package/docs/api/interfaces/ProgressProps.md +1 -1
  141. package/docs/api/interfaces/ProtectedRouteProps.md +1 -1
  142. package/docs/api/interfaces/PublicPageFooterProps.md +1 -1
  143. package/docs/api/interfaces/PublicPageHeaderProps.md +1 -1
  144. package/docs/api/interfaces/PublicPageLayoutProps.md +1 -1
  145. package/docs/api/interfaces/QuickFix.md +1 -1
  146. package/docs/api/interfaces/RBACAccessValidateParams.md +1 -1
  147. package/docs/api/interfaces/RBACAccessValidateResult.md +1 -1
  148. package/docs/api/interfaces/RBACAuditLogParams.md +1 -1
  149. package/docs/api/interfaces/RBACAuditLogResult.md +1 -1
  150. package/docs/api/interfaces/RBACConfig.md +2 -2
  151. package/docs/api/interfaces/RBACContext.md +1 -1
  152. package/docs/api/interfaces/RBACLogger.md +1 -1
  153. package/docs/api/interfaces/RBACPageAccessCheckParams.md +1 -1
  154. package/docs/api/interfaces/RBACPerformanceMetrics.md +1 -1
  155. package/docs/api/interfaces/RBACPermissionCheckParams.md +1 -1
  156. package/docs/api/interfaces/RBACPermissionCheckResult.md +2 -2
  157. package/docs/api/interfaces/RBACPermissionsGetParams.md +1 -1
  158. package/docs/api/interfaces/RBACPermissionsGetResult.md +1 -1
  159. package/docs/api/interfaces/RBACResult.md +1 -1
  160. package/docs/api/interfaces/RBACRoleGrantParams.md +2 -2
  161. package/docs/api/interfaces/RBACRoleGrantResult.md +1 -1
  162. package/docs/api/interfaces/RBACRoleRevokeParams.md +2 -2
  163. package/docs/api/interfaces/RBACRoleRevokeResult.md +1 -1
  164. package/docs/api/interfaces/RBACRoleValidateParams.md +2 -2
  165. package/docs/api/interfaces/RBACRoleValidateResult.md +1 -1
  166. package/docs/api/interfaces/RBACRolesListParams.md +1 -1
  167. package/docs/api/interfaces/RBACRolesListResult.md +2 -2
  168. package/docs/api/interfaces/RBACSessionTrackParams.md +1 -1
  169. package/docs/api/interfaces/RBACSessionTrackResult.md +1 -1
  170. package/docs/api/interfaces/ResourcePermissions.md +1 -1
  171. package/docs/api/interfaces/RevokeEventAppRoleParams.md +1 -1
  172. package/docs/api/interfaces/RoleBasedRouterContextType.md +1 -1
  173. package/docs/api/interfaces/RoleBasedRouterProps.md +1 -1
  174. package/docs/api/interfaces/RoleManagementResult.md +1 -1
  175. package/docs/api/interfaces/RouteAccessRecord.md +2 -2
  176. package/docs/api/interfaces/RouteConfig.md +2 -2
  177. package/docs/api/interfaces/RuntimeComplianceResult.md +1 -1
  178. package/docs/api/interfaces/SecureDataContextType.md +1 -1
  179. package/docs/api/interfaces/SecureDataProviderProps.md +1 -1
  180. package/docs/api/interfaces/SessionRestorationLoaderProps.md +1 -1
  181. package/docs/api/interfaces/SetupIssue.md +1 -1
  182. package/docs/api/interfaces/StorageConfig.md +1 -1
  183. package/docs/api/interfaces/StorageFileInfo.md +1 -1
  184. package/docs/api/interfaces/StorageFileMetadata.md +1 -1
  185. package/docs/api/interfaces/StorageListOptions.md +1 -1
  186. package/docs/api/interfaces/StorageListResult.md +1 -1
  187. package/docs/api/interfaces/StorageUploadOptions.md +1 -1
  188. package/docs/api/interfaces/StorageUploadResult.md +1 -1
  189. package/docs/api/interfaces/StorageUrlOptions.md +1 -1
  190. package/docs/api/interfaces/StyleImport.md +1 -1
  191. package/docs/api/interfaces/SwitchProps.md +1 -1
  192. package/docs/api/interfaces/TabsContentProps.md +1 -1
  193. package/docs/api/interfaces/TabsListProps.md +1 -1
  194. package/docs/api/interfaces/TabsProps.md +1 -1
  195. package/docs/api/interfaces/TabsTriggerProps.md +1 -1
  196. package/docs/api/interfaces/TextareaProps.md +1 -1
  197. package/docs/api/interfaces/ToastActionElement.md +1 -1
  198. package/docs/api/interfaces/ToastProps.md +1 -1
  199. package/docs/api/interfaces/UnifiedAuthContextType.md +60 -38
  200. package/docs/api/interfaces/UnifiedAuthProviderProps.md +13 -13
  201. package/docs/api/interfaces/UseFormDialogOptions.md +1 -1
  202. package/docs/api/interfaces/UseFormDialogReturn.md +1 -1
  203. package/docs/api/interfaces/UseInactivityTrackerOptions.md +1 -1
  204. package/docs/api/interfaces/UseInactivityTrackerReturn.md +1 -1
  205. package/docs/api/interfaces/UsePublicEventLogoOptions.md +2 -2
  206. package/docs/api/interfaces/UsePublicEventLogoReturn.md +1 -1
  207. package/docs/api/interfaces/UsePublicEventOptions.md +1 -1
  208. package/docs/api/interfaces/UsePublicEventReturn.md +1 -1
  209. package/docs/api/interfaces/UsePublicFileDisplayOptions.md +2 -2
  210. package/docs/api/interfaces/UsePublicFileDisplayReturn.md +1 -1
  211. package/docs/api/interfaces/UsePublicRouteParamsReturn.md +1 -1
  212. package/docs/api/interfaces/UseResolvedScopeOptions.md +2 -2
  213. package/docs/api/interfaces/UseResolvedScopeReturn.md +1 -1
  214. package/docs/api/interfaces/UseResourcePermissionsOptions.md +1 -1
  215. package/docs/api/interfaces/UserEventAccess.md +1 -1
  216. package/docs/api/interfaces/UserMenuProps.md +1 -1
  217. package/docs/api/interfaces/UserProfile.md +1 -1
  218. package/docs/api/modules.md +194 -209
  219. package/docs/migration/database-changes-december-2025.md +2 -1
  220. package/docs/rbac/event-based-apps.md +124 -6
  221. package/package.json +1 -1
  222. package/scripts/check-pace-core-compliance.cjs +292 -57
  223. package/src/__tests__/rls-policies.test.ts +3 -1
  224. package/src/components/DataTable/__tests__/DataTable.default-state.test.tsx +172 -45
  225. package/src/components/DataTable/__tests__/DataTable.grouping-aggregation.test.tsx +121 -28
  226. package/src/components/DataTable/__tests__/DataTableCore.test-setup.ts +9 -8
  227. package/src/components/DataTable/__tests__/DataTableCore.test.tsx +20 -52
  228. package/src/components/DataTable/__tests__/a11y.basic.test.tsx +170 -34
  229. package/src/components/DataTable/__tests__/keyboard.test.tsx +75 -12
  230. package/src/components/DataTable/__tests__/pagination.modes.test.tsx +75 -11
  231. package/src/components/DataTable/components/UnifiedTableBody.tsx +85 -14
  232. package/src/components/DataTable/hooks/useDataTablePermissions.ts +75 -10
  233. package/src/components/FileDisplay/FileDisplay.test.tsx +2 -1
  234. package/src/components/FileDisplay/FileDisplay.tsx +16 -4
  235. package/src/components/NavigationMenu/NavigationMenu.test.tsx +6 -4
  236. package/src/components/NavigationMenu/NavigationMenu.tsx +1 -10
  237. package/src/components/OrganisationSelector/OrganisationSelector.tsx +0 -1
  238. package/src/components/PaceAppLayout/PaceAppLayout.test.tsx +25 -2
  239. package/src/components/PaceAppLayout/PaceAppLayout.tsx +97 -68
  240. package/src/components/PaceLoginPage/PaceLoginPage.tsx +0 -7
  241. package/src/components/ProtectedRoute/ProtectedRoute.test.tsx +5 -9
  242. package/src/components/ProtectedRoute/ProtectedRoute.tsx +0 -1
  243. package/src/components/PublicLayout/PublicPageProvider.tsx +0 -1
  244. package/src/hooks/__tests__/useSecureDataAccess.unit.test.tsx +14 -7
  245. package/src/hooks/services/useAuthService.ts +21 -3
  246. package/src/hooks/services/useEventService.ts +21 -3
  247. package/src/hooks/services/useInactivityService.ts +21 -3
  248. package/src/hooks/services/useOrganisationService.ts +21 -3
  249. package/src/hooks/useFileDisplay.ts +10 -17
  250. package/src/hooks/useSecureDataAccess.test.ts +16 -9
  251. package/src/hooks/useSecureDataAccess.ts +3 -2
  252. package/src/providers/services/EventServiceProvider.tsx +0 -8
  253. package/src/providers/services/UnifiedAuthProvider.tsx +174 -24
  254. package/src/rbac/__tests__/adapters.comprehensive.test.tsx +10 -16
  255. package/src/rbac/__tests__/isSuperAdmin.real.test.ts +82 -0
  256. package/src/rbac/adapters.tsx +3 -22
  257. package/src/rbac/api.test.ts +2 -2
  258. package/src/rbac/api.ts +7 -1
  259. package/src/rbac/components/EnhancedNavigationMenu.tsx +2 -15
  260. package/src/rbac/components/NavigationGuard.tsx +1 -10
  261. package/src/rbac/components/NavigationProvider.tsx +0 -1
  262. package/src/rbac/components/PermissionEnforcer.tsx +45 -12
  263. package/src/rbac/components/SecureDataProvider.tsx +0 -1
  264. package/src/rbac/components/__tests__/EnhancedNavigationMenu.test.tsx +7 -43
  265. package/src/rbac/components/__tests__/NavigationGuard.test.tsx +4 -11
  266. package/src/rbac/components/__tests__/NavigationProvider.test.tsx +3 -3
  267. package/src/rbac/components/__tests__/SecureDataProvider.fixed.test.tsx +1 -1
  268. package/src/rbac/components/__tests__/SecureDataProvider.test.tsx +1 -1
  269. package/src/rbac/engine.ts +14 -2
  270. package/src/rbac/hooks/index.ts +0 -3
  271. package/src/rbac/hooks/usePermissions.ts +51 -11
  272. package/src/rbac/hooks/useRBAC.ts +3 -13
  273. package/src/rbac/hooks/useResolvedScope.test.ts +75 -54
  274. package/src/rbac/hooks/useResolvedScope.ts +58 -33
  275. package/src/rbac/hooks/useSecureSupabase.ts +4 -9
  276. package/src/rbac/secureClient.ts +31 -0
  277. package/src/services/EventService.ts +4 -57
  278. package/src/services/InactivityService.ts +127 -34
  279. package/src/services/OrganisationService.ts +68 -10
  280. package/dist/chunk-6LTQQAT6.js.map +0 -1
  281. package/dist/chunk-6TQDD426.js.map +0 -1
  282. package/dist/chunk-LOMZXPSN.js.map +0 -1
  283. package/dist/chunk-OETXORNB.js.map +0 -1
  284. package/dist/chunk-VKB2CO4Z.js.map +0 -1
  285. package/dist/chunk-VRGWKHDB.js.map +0 -1
  286. package/dist/chunk-XNYQOL3Z.js.map +0 -1
  287. package/dist/chunk-XYXSXPUK.js.map +0 -1
  288. package/scripts/check-pace-core-compliance.js +0 -512
  289. package/src/rbac/hooks/useSuperAdminBypass.ts +0 -126
  290. package/src/utils/context/superAdminOverride.ts +0 -58
  291. /package/dist/{DataTable-WKRZD47S.js.map → DataTable-5FU7IESH.js.map} +0 -0
  292. /package/dist/{UnifiedAuthProvider-FTSG5XH7.js.map → UnifiedAuthProvider-RGJTDE2C.js.map} +0 -0
  293. /package/dist/{api-IHKALJZD.js.map → api-N774RPUA.js.map} +0 -0
@@ -103,10 +103,10 @@ import { useUnifiedAuth } from '../../providers/services/UnifiedAuthProvider';
103
103
  import { useOrganisations } from '../../hooks/useOrganisations';
104
104
  import { useEvents } from '../../hooks/useEvents';
105
105
  import { useEventTheme } from '../../hooks/useEventTheme';
106
- import { useCan, useResolvedScope } from '../../rbac/hooks';
106
+ import { useCan, useResolvedScope, useRBAC } from '../../rbac/hooks';
107
107
  import { createScopeFromEvent } from '../../rbac/utils/eventContext';
108
108
  import { getCurrentAppName } from '../../utils/app/appNameResolver';
109
- import { isSuperAdmin } from '../../rbac/api';
109
+ import { isSuperAdmin as checkSuperAdminApi } from '../../rbac/api';
110
110
  import { logger } from '../../utils/core/logger';
111
111
  import type { Permission, Scope } from '../../rbac/types';
112
112
 
@@ -372,7 +372,7 @@ export function PaceAppLayout({
372
372
  onRouteAccessDenied,
373
373
  onRouteStrictModeViolation
374
374
  }: PaceAppLayoutProps) {
375
- const { user, signOut, updatePassword, supabase, appId: contextAppId } = useUnifiedAuth(); // Get appId from context (resolved on login)
375
+ const { user, signOut, updatePassword, supabase, appId: contextAppId, selectedOrganisationId } = useUnifiedAuth(); // Get appId from context (resolved on login)
376
376
  const {
377
377
  selectedOrganisation,
378
378
  isContextReady,
@@ -380,6 +380,47 @@ export function PaceAppLayout({
380
380
  ensureOrganisationContext,
381
381
  isLoading: organisationLoading
382
382
  } = useOrganisations();
383
+ // Use useRBAC to get super admin status - it's more reliable than async check
384
+ // Note: isSuperAdmin might be false initially while loading, but that's OK - we'll allow rendering
385
+ // if organisation loading completes or if we're a super admin
386
+ const { isSuperAdmin: isSuperAdminFromRBAC, isLoading: rbacLoading } = useRBAC();
387
+
388
+ // Also check super admin status directly as a fallback (for ADMIN/PORTAL apps)
389
+ // This allows super admins to proceed even if RBAC hasn't loaded yet
390
+ const [isSuperAdminDirect, setIsSuperAdminDirect] = useState<boolean>(false);
391
+ const [isCheckingSuperAdminDirect, setIsCheckingSuperAdminDirect] = useState<boolean>(false);
392
+
393
+ useEffect(() => {
394
+ const checkSuperAdminDirect = async () => {
395
+ if (!user?.id) {
396
+ setIsSuperAdminDirect(false);
397
+ setIsCheckingSuperAdminDirect(false);
398
+ return;
399
+ }
400
+
401
+ // Only skip if RBAC already confirmed super admin
402
+ if (isSuperAdminFromRBAC) {
403
+ setIsCheckingSuperAdminDirect(false);
404
+ return;
405
+ }
406
+
407
+ setIsCheckingSuperAdminDirect(true);
408
+ try {
409
+ const superAdminStatus = await checkSuperAdminApi(user.id);
410
+ setIsSuperAdminDirect(superAdminStatus);
411
+ } catch (error) {
412
+ logger.error('PaceAppLayout', 'Error checking super admin status directly', { userId: user?.id, error });
413
+ setIsSuperAdminDirect(false);
414
+ } finally {
415
+ setIsCheckingSuperAdminDirect(false);
416
+ }
417
+ };
418
+
419
+ checkSuperAdminDirect();
420
+ }, [user?.id, isSuperAdminFromRBAC]);
421
+
422
+ // Use direct check if RBAC hasn't loaded yet, otherwise use RBAC result
423
+ const isSuperAdmin = isSuperAdminFromRBAC || isSuperAdminDirect;
383
424
  const navigate = useNavigate();
384
425
  const location = useLocation();
385
426
 
@@ -408,28 +449,25 @@ export function PaceAppLayout({
408
449
 
409
450
  // Build scope from resolved values
410
451
  // Preserve appId from resolvedScope or fallback to resolvedAppId
452
+ // CRITICAL: Always create a new scope object from primitive values to ensure stable reference
453
+ // This prevents useCan from re-checking permissions when resolvedScope changes reference but values are the same
454
+ const scopeOrgId = resolvedScope?.organisationId || selectedOrganisation?.id || '';
455
+ const scopeEventId = resolvedScope?.eventId || selectedEvent?.event_id || undefined;
456
+ const scopeAppId = resolvedScope?.appId || resolvedAppId || undefined;
457
+
411
458
  const scope = useMemo<Scope>(() => {
412
- // Prefer resolvedScope if available (includes appId)
413
- if (resolvedScope?.organisationId) {
414
- return resolvedScope;
459
+ const newScope: Scope = {};
460
+ if (scopeOrgId) {
461
+ newScope.organisationId = scopeOrgId;
415
462
  }
416
-
417
- // Fallback: build scope from context values with resolvedAppId
418
- if (selectedOrganisation?.id) {
419
- return {
420
- organisationId: selectedOrganisation.id,
421
- eventId: selectedEvent?.event_id || undefined,
422
- appId: resolvedAppId || resolvedScope?.appId || undefined
423
- };
463
+ if (scopeEventId) {
464
+ newScope.eventId = scopeEventId;
424
465
  }
425
-
426
- // Last resort: return minimal scope
427
- return {
428
- organisationId: selectedOrganisation?.id || '',
429
- eventId: selectedEvent?.event_id || undefined,
430
- appId: resolvedAppId || resolvedScope?.appId || undefined
431
- };
432
- }, [resolvedScope, selectedOrganisation?.id, selectedEvent?.event_id, resolvedAppId]);
466
+ if (scopeAppId) {
467
+ newScope.appId = scopeAppId;
468
+ }
469
+ return newScope;
470
+ }, [scopeOrgId, scopeEventId, scopeAppId]);
433
471
 
434
472
  // Default navigation items if none provided
435
473
  const defaultNavItems: NavigationItem[] = useMemo(() => [
@@ -460,61 +498,45 @@ export function PaceAppLayout({
460
498
  }
461
499
  // Extract first path segment (base page name)
462
500
  const pathSegments = currentPath.slice(1).split('/').filter(Boolean);
463
- return pathSegments[0] || 'home';
501
+ // Only return 'home' if there's actually a path segment, otherwise return empty string
502
+ // This prevents checking permissions for a non-existent "home" page when the index route is used
503
+ return pathSegments[0] || '';
464
504
  }, [location.pathname, pageIdMapping]);
465
505
 
466
506
  // Build permission string in format: operation:page.pageId
467
507
  const currentPermission = useMemo<Permission>(() => {
468
- if (!enforcePermissions) {
469
- return 'read:page.home' as Permission;
508
+ // If enforcePermissions is false, don't check any permission (return empty string)
509
+ // If currentPageId is empty (index route with no path segments), don't check permissions
510
+ if (!enforcePermissions || !currentPageId) {
511
+ return '' as Permission;
470
512
  }
471
513
  const permissionString = `${currentRoutePermission}:page.${currentPageId}`;
472
514
  return permissionString as Permission;
473
515
  }, [enforcePermissions, currentRoutePermission, currentPageId]);
474
516
 
475
517
  // Check super admin status before permission enforcement
476
- const [isSuperAdminUser, setIsSuperAdminUser] = useState<boolean>(false);
477
- const [isCheckingSuperAdmin, setIsCheckingSuperAdmin] = useState<boolean>(false);
478
-
479
- useEffect(() => {
480
- const checkSuperAdminStatus = async () => {
481
- if (!user?.id) {
482
- setIsSuperAdminUser(false);
483
- setIsCheckingSuperAdmin(false);
484
- return;
485
- }
486
-
487
- setIsCheckingSuperAdmin(true);
488
- try {
489
- const superAdminStatus = await isSuperAdmin(user.id);
490
- setIsSuperAdminUser(superAdminStatus);
491
- } catch (error) {
492
- logger.error('PaceAppLayout', 'Error checking super admin status', { userId: user?.id, error });
493
- setIsSuperAdminUser(false);
494
- } finally {
495
- setIsCheckingSuperAdmin(false);
496
- }
497
- };
498
-
499
- checkSuperAdminStatus();
500
- }, [user?.id]);
518
+ // Removed duplicate super admin check - using useRBAC hook instead
519
+ // The useRBAC hook provides isSuperAdmin which is more reliable
501
520
 
502
521
  // Use useCan hook for permission checking (standardized approach)
503
522
  // Note: The database function already handles super admin bypass, but we check here
504
523
  // as an additional safety layer to prevent unnecessary permission checks
505
524
  // Pass appName to useCan so it can be passed to isPermitted for PORTAL/ADMIN special case
525
+ // Only check permissions if enforcePermissions is true and we have a valid permission string
526
+ const shouldCheckPermission = enforcePermissions && !!currentPermission && !!currentPageId;
506
527
  const { can: canFromHook, isLoading: isCheckingPermission, error: permissionError } = useCan(
507
528
  user?.id || '',
508
529
  scope,
509
- currentPermission,
510
- currentPageId,
530
+ shouldCheckPermission ? currentPermission : ('' as Permission),
531
+ shouldCheckPermission ? currentPageId : '',
511
532
  true, // useCache
512
533
  appName // Pass appName for PORTAL/ADMIN special case
513
534
  );
514
535
 
515
536
  // Permission enforcement state - super admin bypasses all checks
516
537
  // This ensures super admins never see permission errors even if useCan hasn't completed
517
- const can = isSuperAdminUser ? true : canFromHook;
538
+ // Use combined super admin check (RBAC + direct check)
539
+ const can = isSuperAdmin ? true : canFromHook;
518
540
  const hasPermission = enforcePermissions ? can : true;
519
541
 
520
542
  // Handle permission check results with audit logging and callbacks
@@ -524,19 +546,20 @@ export function PaceAppLayout({
524
546
  }
525
547
 
526
548
  // Only proceed when permission check is complete (not loading)
527
- // Wait for both super admin check and permission check to complete
528
- if (isCheckingSuperAdmin || isCheckingPermission) {
549
+ // Super admin status is checked via useRBAC hook (isSuperAdminFromRBAC)
550
+ // If RBAC is still loading, allow rendering to proceed (optimistic for super admins)
551
+ if (isCheckingPermission) {
529
552
  return;
530
553
  }
531
554
 
532
555
  // NEW: Phase 1 - Enhanced Security Features
533
556
  // Handle strict mode violations - skip for super admins
534
- if (strictMode && !isSuperAdminUser && !can) {
557
+ if (strictMode && !isSuperAdmin && !can) {
535
558
  logger.error('PaceAppLayout', 'STRICT MODE VIOLATION: User attempted to access protected page without permission', {
536
559
  pageName: currentPageId,
537
560
  operation: currentRoutePermission,
538
561
  userId: user?.id,
539
- isSuperAdmin: isSuperAdminUser,
562
+ isSuperAdmin: isSuperAdmin,
540
563
  timestamp: new Date().toISOString()
541
564
  });
542
565
 
@@ -546,10 +569,10 @@ export function PaceAppLayout({
546
569
  }
547
570
 
548
571
  // Handle page access denied callback - skip for super admins
549
- if (!isSuperAdminUser && !can && onPageAccessDenied) {
572
+ if (!isSuperAdmin && !can && onPageAccessDenied) {
550
573
  onPageAccessDenied(currentPageId, currentRoutePermission);
551
574
  }
552
- }, [enforcePermissions, can, isCheckingPermission, isCheckingSuperAdmin, isSuperAdminUser, currentPageId, currentRoutePermission, user?.id, strictMode, auditLog, onPageAccessDenied, onStrictModeViolation]);
575
+ }, [enforcePermissions, can, isCheckingPermission, isSuperAdmin, currentPageId, currentRoutePermission, user?.id, strictMode, auditLog, onPageAccessDenied, onStrictModeViolation]);
553
576
 
554
577
  // Filter navigation items based on permissions
555
578
  // Permission filtering is always enabled - users only see navigation items they have permission to access
@@ -610,8 +633,8 @@ export function PaceAppLayout({
610
633
  // For super admins, show all items (they bypass permission checks)
611
634
  // Gracefully handle RBAC not being initialized (e.g., in tests)
612
635
  try {
613
- const { isSuperAdmin } = await import('../../rbac/api');
614
- const isSuper = await isSuperAdmin(user.id);
636
+ const { isSuperAdmin: checkSuperAdminDynamic } = await import('../../rbac/api');
637
+ const isSuper = await checkSuperAdminDynamic(user.id);
615
638
 
616
639
  if (isSuper) {
617
640
  // Super admins see all navigation items
@@ -825,7 +848,13 @@ export function PaceAppLayout({
825
848
  // This is critical - we must wait for organisation context before allowing any data access
826
849
  // BUT: Allow rendering to proceed if loading is complete, even if user has no organisations (valid state for profile pages)
827
850
  // Only block if we're actively loading - once loading completes (success or error), allow rendering
828
- if (user?.id && organisationLoading) {
851
+ // EXCEPTION: Super admins can proceed even during organisation loading (they can access all orgs)
852
+ // Use combined super admin check (RBAC + direct check) to allow super admins to proceed immediately
853
+ // IMPORTANT: If we're still checking super admin status, allow rendering to proceed (optimistic approach)
854
+ // This prevents blocking super admins while their status is being determined
855
+ // Also allow rendering if we already have a selectedOrganisationId (even if organisationLoading is still true)
856
+ // This prevents blank pages when organisation context is available but loading state hasn't cleared yet
857
+ if (user?.id && organisationLoading && !isSuperAdmin && !isCheckingSuperAdminDirect && !rbacLoading && !selectedOrganisationId) {
829
858
  return (
830
859
  <div className="flex items-center justify-center min-h-screen">
831
860
  <div className="text-center">
@@ -841,10 +870,10 @@ export function PaceAppLayout({
841
870
  // These pages work with user context only and don't require organisation context
842
871
  // The app can check hasValidOrganisationContext() to determine if org context is available for org-specific features
843
872
 
844
- // Show loading state while checking permissions or super admin status
845
- // Keep loading active until BOTH checks complete to prevent exposing protected content
846
- // This ensures we don't render the main layout when permission check failed but super admin check is pending
847
- if (enforcePermissions && (isCheckingSuperAdmin || isCheckingPermission)) {
873
+ // Show loading state while checking permissions
874
+ // Keep loading active until permission check completes to prevent exposing protected content
875
+ // Super admin status is checked via useRBAC hook (isSuperAdminFromRBAC)
876
+ if (enforcePermissions && isCheckingPermission) {
848
877
  return (
849
878
  <div className="flex items-center justify-center min-h-screen">
850
879
  <div className="text-center">
@@ -857,7 +886,7 @@ export function PaceAppLayout({
857
886
 
858
887
  // Show permission error (only after BOTH checks are complete)
859
888
  // Super admins bypass all permission checks, so don't show errors for them
860
- if (enforcePermissions && permissionError && !isSuperAdminUser) {
889
+ if (enforcePermissions && permissionError && !isSuperAdmin) {
861
890
  return (
862
891
  <div className="flex items-center justify-center min-h-screen">
863
892
  <div className="text-center">
@@ -871,7 +900,7 @@ export function PaceAppLayout({
871
900
 
872
901
  // Show permission fallback if user lacks permission
873
902
  // Only show this if super admin check is complete and user is not a super admin
874
- if (enforcePermissions && hasPermission === false && !isCheckingSuperAdmin && !isSuperAdminUser) {
903
+ if (enforcePermissions && hasPermission === false && !isCheckingSuperAdminDirect && !isSuperAdmin) {
875
904
  // NEW: Phase 1 - Use page permission fallback if available
876
905
  if (enforcePagePermissions && pagePermissionFallback) {
877
906
  return <>{pagePermissionFallback}</>;
@@ -208,7 +208,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
208
208
  }
209
209
  } catch (error) {
210
210
  // Service may not be available yet or events not loaded - that's okay
211
- logger.debug('PaceLoginPage', 'Could not restore persisted event (service may not be ready):', error);
212
211
  }
213
212
  };
214
213
 
@@ -266,7 +265,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
266
265
  .eq('app_id', appData.id);
267
266
 
268
267
  if (pagesError || !pagesData || pagesData.length === 0) {
269
- logger.debug('PaceLoginPage', 'No pages configured for app:', appName);
270
268
  setAccessError(`You do not have permission to access ${appName}. This application is currently unavailable. Please contact your administrator if you believe you should have access.`);
271
269
  setIsCheckingAccess(false);
272
270
  return;
@@ -285,7 +283,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
285
283
  const organisationId = orgRow?.organisation_id;
286
284
 
287
285
  if (!organisationId) {
288
- logger.debug('PaceLoginPage', 'User has no organisation access');
289
286
  setAccessError(`You do not have permission to access ${appName}. You are not assigned to any organisation. Please contact your administrator.`);
290
287
  setIsCheckingAccess(false);
291
288
  return;
@@ -305,8 +302,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
305
302
  p_page_id: page.page_name // Page name to resolve to UUID
306
303
  });
307
304
 
308
- logger.debug('PaceLoginPage', 'Permission check for page:', { pageName: page.page_name, hasPermission, error: permError });
309
-
310
305
  if (!permError && hasPermission === true) {
311
306
  hasAnyAccess = true;
312
307
  break;
@@ -314,14 +309,12 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
314
309
  }
315
310
 
316
311
  if (hasAnyAccess) {
317
- logger.debug('PaceLoginPage', 'User has access to app');
318
312
  setIsCheckingAccess(false);
319
313
  navigate(onSuccessRedirectPath, { replace: true });
320
314
  return;
321
315
  }
322
316
 
323
317
  // No access - deny
324
- logger.debug('PaceLoginPage', 'Access denied - no permissions');
325
318
  setAccessError(`You do not have permission to access ${appName}. This application is restricted to authorized users only. Please contact your administrator if you believe you should have access.`);
326
319
  setIsCheckingAccess(false);
327
320
  } catch (error) {
@@ -165,12 +165,8 @@ describe('ProtectedRoute Component', () => {
165
165
 
166
166
  expect(screen.getByTestId('outlet')).toBeInTheDocument();
167
167
 
168
- // Wait a bit for the logger to be called (it's called during render)
169
- await waitFor(() => {
170
- expect(consoleDebugSpy).toHaveBeenCalledWith(
171
- expect.stringContaining('[DEBUG] [ProtectedRoute] Events available but none selected - allowing render so selector is visible')
172
- );
173
- }, { timeout: 1000 });
168
+ // Note: ProtectedRoute no longer logs this debug message - it just allows rendering
169
+ // The component allows rendering when events exist but none selected to make the selector visible
174
170
  });
175
171
 
176
172
  it('renders session restoration loader when session is restoring', () => {
@@ -461,9 +457,9 @@ describe('ProtectedRoute Component', () => {
461
457
  renderWithProviders(<ProtectedRoute requireEvent={true} />);
462
458
 
463
459
  expect(screen.getByTestId('outlet')).toBeInTheDocument();
464
- expect(consoleDebugSpy).toHaveBeenCalledWith(
465
- expect.stringContaining('[DEBUG] [ProtectedRoute] Events available but none selected - allowing render so selector is visible')
466
- );
460
+
461
+ // Note: ProtectedRoute no longer logs this debug message - it just allows rendering
462
+ // The component allows rendering when events exist but none selected to make the selector visible
467
463
  });
468
464
 
469
465
  it('renders outlet when event is selected', () => {
@@ -359,7 +359,6 @@ export function ProtectedRoute({
359
359
  // The event selector will be visible and user can select, or auto-selection will kick in
360
360
  if (!selectedEvent) {
361
361
  // Log for debugging - this is expected behavior, not an error
362
- logger.debug('ProtectedRoute', 'Events available but none selected - allowing render so selector is visible');
363
362
  return <Outlet />;
364
363
  }
365
364
 
@@ -102,7 +102,6 @@ export function PublicPageProvider({ children, appName }: PublicPageProviderProp
102
102
  return null;
103
103
  }
104
104
  const client = createClient<Database>(supabaseUrl, supabaseKey);
105
- logger.info('PublicPageProvider', 'Supabase client created successfully for public pages');
106
105
  return client;
107
106
  }, [supabaseUrl, supabaseKey]);
108
107
 
@@ -5,7 +5,7 @@ import { useUnifiedAuth } from '../../providers';
5
5
  import { useOrganisations } from '../../hooks/useOrganisations';
6
6
  import { testDataGenerators } from '../../__tests__/helpers/test-utils';
7
7
  import { useResolvedScope } from '../../rbac/hooks/useResolvedScope';
8
- import { useSuperAdminBypass } from '../../rbac/hooks/useSuperAdminBypass';
8
+ import { useOrganisationSecurity } from '../useOrganisationSecurity';
9
9
 
10
10
  // Mock dependencies
11
11
  vi.mock('../../providers', () => ({
@@ -28,8 +28,8 @@ vi.mock('../../rbac/hooks/useResolvedScope', () => ({
28
28
  useResolvedScope: vi.fn(),
29
29
  }));
30
30
 
31
- vi.mock('../../rbac/hooks/useSuperAdminBypass', () => ({
32
- useSuperAdminBypass: vi.fn(),
31
+ vi.mock('../useOrganisationSecurity', () => ({
32
+ useOrganisationSecurity: vi.fn(),
33
33
  }));
34
34
 
35
35
  const mockUseUnifiedAuth = {
@@ -114,10 +114,17 @@ describe('useSecureDataAccess', () => {
114
114
  isLoading: false,
115
115
  error: null,
116
116
  });
117
- // Default mock for useSuperAdminBypass - not super admin
118
- vi.mocked(useSuperAdminBypass).mockReturnValue({
119
- isSuperAdmin: false,
120
- });
117
+ // Default mock for useOrganisationSecurity - not super admin
118
+ vi.mocked(useOrganisationSecurity).mockReturnValue({
119
+ superAdminContext: { isSuperAdmin: false, hasGlobalAccess: false, canManageAllOrganisations: false },
120
+ validateOrganisationAccess: vi.fn(),
121
+ hasMinimumRole: vi.fn(),
122
+ canAccessChildOrganisations: vi.fn(),
123
+ checkPermission: vi.fn(),
124
+ getPermissions: vi.fn(),
125
+ logOrganisationAccess: vi.fn(),
126
+ canManageOrganisation: vi.fn(),
127
+ } as any);
121
128
  });
122
129
 
123
130
  describe('validateContext', () => {
@@ -8,7 +8,7 @@
8
8
  * Provides authentication service with reactive state updates.
9
9
  */
10
10
 
11
- import { useContext, useReducer, useEffect } from 'react';
11
+ import { useContext, useReducer, useEffect, useRef } from 'react';
12
12
  import { AuthServiceContext } from '../../providers/services/AuthServiceProvider';
13
13
  import { AuthService } from '../../services/AuthService';
14
14
 
@@ -19,11 +19,29 @@ export function useAuthService(): AuthService {
19
19
  throw new Error('useAuthService must be used within AuthServiceProvider');
20
20
  }
21
21
 
22
- // Subscribe to service state changes
22
+ // Subscribe to service state changes with debouncing to prevent excessive re-renders
23
23
  const [, forceUpdate] = useReducer(x => x + 1, 0);
24
+ const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
24
25
 
25
26
  useEffect(() => {
26
- return context.authService.subscribe(() => forceUpdate());
27
+ const debouncedUpdate = () => {
28
+ if (timeoutRef.current) {
29
+ clearTimeout(timeoutRef.current);
30
+ }
31
+ timeoutRef.current = setTimeout(() => {
32
+ forceUpdate();
33
+ timeoutRef.current = null;
34
+ }, 50); // 50ms debounce to batch rapid updates
35
+ };
36
+
37
+ const unsubscribe = context.authService.subscribe(debouncedUpdate);
38
+
39
+ return () => {
40
+ unsubscribe();
41
+ if (timeoutRef.current) {
42
+ clearTimeout(timeoutRef.current);
43
+ }
44
+ };
27
45
  }, [context.authService]);
28
46
 
29
47
  return context.authService;
@@ -8,7 +8,7 @@
8
8
  * Provides event service with reactive state updates.
9
9
  */
10
10
 
11
- import { useContext, useReducer, useEffect } from 'react';
11
+ import { useContext, useReducer, useEffect, useRef } from 'react';
12
12
  import { EventServiceContext } from '../../providers/services/EventServiceProvider';
13
13
  import { EventService } from '../../services/EventService';
14
14
 
@@ -19,11 +19,29 @@ export function useEventService(): EventService {
19
19
  throw new Error('useEventService must be used within EventServiceProvider');
20
20
  }
21
21
 
22
- // Subscribe to service state changes
22
+ // Subscribe to service state changes with debouncing to prevent excessive re-renders
23
23
  const [, forceUpdate] = useReducer(x => x + 1, 0);
24
+ const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
24
25
 
25
26
  useEffect(() => {
26
- return context.eventService.subscribe(() => forceUpdate());
27
+ const debouncedUpdate = () => {
28
+ if (timeoutRef.current) {
29
+ clearTimeout(timeoutRef.current);
30
+ }
31
+ timeoutRef.current = setTimeout(() => {
32
+ forceUpdate();
33
+ timeoutRef.current = null;
34
+ }, 50); // 50ms debounce to batch rapid updates
35
+ };
36
+
37
+ const unsubscribe = context.eventService.subscribe(debouncedUpdate);
38
+
39
+ return () => {
40
+ unsubscribe();
41
+ if (timeoutRef.current) {
42
+ clearTimeout(timeoutRef.current);
43
+ }
44
+ };
27
45
  }, [context.eventService]);
28
46
 
29
47
  return context.eventService;
@@ -8,7 +8,7 @@
8
8
  * Provides inactivity service with reactive state updates.
9
9
  */
10
10
 
11
- import { useContext, useReducer, useEffect } from 'react';
11
+ import { useContext, useReducer, useEffect, useRef } from 'react';
12
12
  import { InactivityServiceContext } from '../../providers/services/InactivityServiceProvider';
13
13
  import { InactivityService } from '../../services/InactivityService';
14
14
 
@@ -19,11 +19,29 @@ export function useInactivityService(): InactivityService {
19
19
  throw new Error('useInactivityService must be used within InactivityServiceProvider');
20
20
  }
21
21
 
22
- // Subscribe to service state changes
22
+ // Subscribe to service state changes with debouncing to prevent excessive re-renders
23
23
  const [, forceUpdate] = useReducer(x => x + 1, 0);
24
+ const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
24
25
 
25
26
  useEffect(() => {
26
- return context.inactivityService.subscribe(() => forceUpdate());
27
+ const debouncedUpdate = () => {
28
+ if (timeoutRef.current) {
29
+ clearTimeout(timeoutRef.current);
30
+ }
31
+ timeoutRef.current = setTimeout(() => {
32
+ forceUpdate();
33
+ timeoutRef.current = null;
34
+ }, 50); // 50ms debounce to batch rapid updates
35
+ };
36
+
37
+ const unsubscribe = context.inactivityService.subscribe(debouncedUpdate);
38
+
39
+ return () => {
40
+ unsubscribe();
41
+ if (timeoutRef.current) {
42
+ clearTimeout(timeoutRef.current);
43
+ }
44
+ };
27
45
  }, [context.inactivityService]);
28
46
 
29
47
  return context.inactivityService;
@@ -8,7 +8,7 @@
8
8
  * Provides organisation service with reactive state updates.
9
9
  */
10
10
 
11
- import { useContext, useReducer, useEffect } from 'react';
11
+ import { useContext, useReducer, useEffect, useRef } from 'react';
12
12
  import { OrganisationServiceContext } from '../../providers/services/OrganisationServiceProvider';
13
13
  import { OrganisationService } from '../../services/OrganisationService';
14
14
 
@@ -19,11 +19,29 @@ export function useOrganisationService(): OrganisationService {
19
19
  throw new Error('useOrganisationService must be used within OrganisationServiceProvider');
20
20
  }
21
21
 
22
- // Subscribe to service state changes
22
+ // Subscribe to service state changes with debouncing to prevent excessive re-renders
23
23
  const [, forceUpdate] = useReducer(x => x + 1, 0);
24
+ const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
24
25
 
25
26
  useEffect(() => {
26
- return context.organisationService.subscribe(() => forceUpdate());
27
+ const debouncedUpdate = () => {
28
+ if (timeoutRef.current) {
29
+ clearTimeout(timeoutRef.current);
30
+ }
31
+ timeoutRef.current = setTimeout(() => {
32
+ forceUpdate();
33
+ timeoutRef.current = null;
34
+ }, 50); // 50ms debounce to batch rapid updates
35
+ };
36
+
37
+ const unsubscribe = context.organisationService.subscribe(debouncedUpdate);
38
+
39
+ return () => {
40
+ unsubscribe();
41
+ if (timeoutRef.current) {
42
+ clearTimeout(timeoutRef.current);
43
+ }
44
+ };
27
45
  }, [context.organisationService]);
28
46
 
29
47
  return context.organisationService;
@@ -391,12 +391,7 @@ export function useFileDisplay(
391
391
  // Category is stored in file_metadata JSONB field, not a direct column
392
392
  if (category) {
393
393
  // Single file mode - get files by category using RPC
394
- logger.debug('useFileDisplay', 'Using RPC function for category filtering:', {
395
- table_name,
396
- record_id,
397
- category,
398
- organisation_id
399
- });
394
+ // Removed verbose debug log - only log on errors
400
395
  files = await service.getFilesByCategory(
401
396
  table_name,
402
397
  record_id,
@@ -510,21 +505,13 @@ export function useFileDisplay(
510
505
  if (category && files.length > 0) {
511
506
  // Single file mode - get first file
512
507
  const firstFile = files[0];
513
- logger.debug('useFileDisplay', 'Processing category files, first file:', {
514
- id: firstFile.id,
515
- file_path: firstFile.file_path,
516
- is_public: firstFile.is_public,
517
- has_file_metadata: !!firstFile.file_metadata,
518
- category_in_metadata: firstFile.file_metadata?.category
519
- });
520
-
508
+ // Removed verbose debug logs - only log on errors
521
509
  setFileReference(firstFile);
522
510
 
523
511
  // Generate URL based on file visibility
524
512
  let url: string | null = null;
525
513
  if (firstFile.is_public) {
526
514
  url = getPublicUrl(supabase, firstFile.file_path, true);
527
- logger.debug('useFileDisplay', 'Generated public URL:', url);
528
515
  } else {
529
516
  const signedUrlResult = await getSignedUrl(supabase, firstFile.file_path, {
530
517
  appName: 'pace-core',
@@ -533,9 +520,15 @@ export function useFileDisplay(
533
520
  expiresIn: 3600
534
521
  });
535
522
  url = signedUrlResult?.url || null;
536
- logger.debug('useFileDisplay', 'Generated signed URL:', url ? 'URL generated' : 'URL generation failed');
523
+ // Only log if URL generation fails
524
+ if (!url) {
525
+ logger.warn('useFileDisplay', 'Failed to generate signed URL for file:', {
526
+ file_path: firstFile.file_path,
527
+ record_id,
528
+ table_name
529
+ });
530
+ }
537
531
  }
538
- logger.debug('useFileDisplay', 'Setting file URL:', url ? 'URL set' : 'URL is null');
539
532
  setFileUrl(url);
540
533
  } else {
541
534
  // Multiple files mode - generate URLs for all files in batch