@jmruthers/pace-core 0.5.191 → 0.5.193
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{AuthService-CbP_utw2.d.ts → AuthService-DjnJHDtC.d.ts} +1 -0
- package/dist/{DataTable-WKRZD47S.js → DataTable-5FU7IESH.js} +7 -6
- package/dist/{PublicPageProvider-ULXC_u6U.d.ts → PublicPageProvider-C0Sm_e5k.d.ts} +3 -1
- package/dist/{UnifiedAuthProvider-BYA9qB-o.d.ts → UnifiedAuthProvider-185Ih4dj.d.ts} +2 -0
- package/dist/{UnifiedAuthProvider-FTSG5XH7.js → UnifiedAuthProvider-RGJTDE2C.js} +3 -3
- package/dist/{api-IHKALJZD.js → api-N774RPUA.js} +2 -2
- package/dist/chunk-6C4YBBJM 5.js +628 -0
- package/dist/chunk-7D4SUZUM.js 2.map +1 -0
- package/dist/{chunk-LOMZXPSN.js → chunk-7EQTDTTJ.js} +47 -74
- package/dist/chunk-7EQTDTTJ.js 2.map +1 -0
- package/dist/chunk-7EQTDTTJ.js.map +1 -0
- package/dist/{chunk-6LTQQAT6.js → chunk-7FLMSG37.js} +336 -137
- package/dist/chunk-7FLMSG37.js 2.map +1 -0
- package/dist/chunk-7FLMSG37.js.map +1 -0
- package/dist/{chunk-XNYQOL3Z.js → chunk-BC4IJKSL.js} +9 -18
- package/dist/chunk-BC4IJKSL.js.map +1 -0
- package/dist/{chunk-ULHIJK66.js → chunk-E3SPN4VZ 5.js } +146 -36
- package/dist/chunk-E3SPN4VZ.js +12917 -0
- package/dist/{chunk-ULHIJK66.js.map → chunk-E3SPN4VZ.js.map} +1 -1
- package/dist/chunk-E66EQZE6 5.js +37 -0
- package/dist/chunk-E66EQZE6.js 2.map +1 -0
- package/dist/{chunk-6TQDD426.js → chunk-HWIIPPNI.js} +40 -221
- package/dist/chunk-HWIIPPNI.js.map +1 -0
- package/dist/chunk-I7PSE6JW 5.js +191 -0
- package/dist/chunk-I7PSE6JW.js 2.map +1 -0
- package/dist/{chunk-OETXORNB.js → chunk-IIELH4DL.js} +211 -136
- package/dist/chunk-IIELH4DL.js.map +1 -0
- package/dist/{chunk-ROXMHMY2.js → chunk-KNC55RTG.js} +13 -3
- package/dist/{chunk-ROXMHMY2.js.map → chunk-KNC55RTG.js 5.map } +1 -1
- package/dist/chunk-KNC55RTG.js.map +1 -0
- package/dist/chunk-KQCRWDSA.js 5.map +1 -0
- package/dist/{chunk-XYXSXPUK.js → chunk-LFNCN2SP.js} +7 -6
- package/dist/chunk-LFNCN2SP.js 2.map +1 -0
- package/dist/chunk-LFNCN2SP.js.map +1 -0
- package/dist/chunk-LMC26NLJ 2.js +84 -0
- package/dist/{chunk-VKB2CO4Z.js → chunk-NOAYCWCX 5.js } +84 -87
- package/dist/chunk-NOAYCWCX.js +4993 -0
- package/dist/chunk-NOAYCWCX.js.map +1 -0
- package/dist/chunk-QWWZ5CAQ.js 3.map +1 -0
- package/dist/chunk-QXHPKYJV 3.js +113 -0
- package/dist/chunk-R77UEZ4E 3.js +68 -0
- package/dist/chunk-VBXEHIUJ.js 6.map +1 -0
- package/dist/{chunk-VRGWKHDB.js → chunk-XNXXZ43G.js} +77 -33
- package/dist/chunk-XNXXZ43G.js.map +1 -0
- package/dist/chunk-ZSAAAMVR 6.js +25 -0
- package/dist/components.d.ts +2 -2
- package/dist/components.js +7 -7
- package/dist/components.js 5.map +1 -0
- package/dist/hooks.js +8 -8
- package/dist/index.d.ts +5 -5
- package/dist/index.js +12 -14
- package/dist/index.js.map +1 -1
- package/dist/providers.d.ts +3 -3
- package/dist/providers.js +2 -2
- package/dist/rbac/index.d.ts +1 -19
- package/dist/rbac/index.js +7 -9
- package/dist/styles/index 2.js +12 -0
- package/dist/styles/index.js 5.map +1 -0
- package/dist/theming/runtime 5.js +19 -0
- package/dist/theming/runtime.js 5.map +1 -0
- package/dist/utils.js +1 -1
- package/docs/api/classes/ColumnFactory.md +1 -1
- package/docs/api/classes/ErrorBoundary.md +1 -1
- package/docs/api/classes/InvalidScopeError.md +1 -1
- package/docs/api/classes/Logger.md +1 -1
- package/docs/api/classes/MissingUserContextError.md +1 -1
- package/docs/api/classes/OrganisationContextRequiredError.md +1 -1
- package/docs/api/classes/PermissionDeniedError.md +2 -2
- package/docs/api/classes/RBACAuditManager.md +2 -2
- package/docs/api/classes/RBACCache.md +1 -1
- package/docs/api/classes/RBACEngine.md +2 -2
- package/docs/api/classes/RBACError.md +1 -1
- package/docs/api/classes/RBACNotInitializedError.md +1 -1
- package/docs/api/classes/SecureSupabaseClient.md +10 -10
- package/docs/api/classes/StorageUtils.md +1 -1
- package/docs/api/enums/FileCategory.md +1 -1
- package/docs/api/enums/LogLevel.md +1 -1
- package/docs/api/enums/RBACErrorCode.md +1 -1
- package/docs/api/enums/RPCFunction.md +1 -1
- package/docs/api/interfaces/AddressFieldProps.md +1 -1
- package/docs/api/interfaces/AddressFieldRef.md +1 -1
- package/docs/api/interfaces/AggregateConfig.md +1 -1
- package/docs/api/interfaces/AutocompleteOptions.md +1 -1
- package/docs/api/interfaces/AvatarProps.md +1 -1
- package/docs/api/interfaces/BadgeProps.md +1 -1
- package/docs/api/interfaces/ButtonProps.md +1 -1
- package/docs/api/interfaces/CalendarProps.md +1 -1
- package/docs/api/interfaces/CardProps.md +1 -1
- package/docs/api/interfaces/ColorPalette.md +1 -1
- package/docs/api/interfaces/ColorShade.md +1 -1
- package/docs/api/interfaces/ComplianceResult.md +1 -1
- package/docs/api/interfaces/DataAccessRecord.md +1 -1
- package/docs/api/interfaces/DataRecord.md +1 -1
- package/docs/api/interfaces/DataTableAction.md +1 -1
- package/docs/api/interfaces/DataTableColumn.md +1 -1
- package/docs/api/interfaces/DataTableProps.md +1 -1
- package/docs/api/interfaces/DataTableToolbarButton.md +1 -1
- package/docs/api/interfaces/DatabaseComplianceResult.md +1 -1
- package/docs/api/interfaces/DatabaseIssue.md +1 -1
- package/docs/api/interfaces/EmptyStateConfig.md +1 -1
- package/docs/api/interfaces/EnhancedNavigationMenuProps.md +1 -1
- package/docs/api/interfaces/EventAppRoleData.md +1 -1
- package/docs/api/interfaces/ExportColumn.md +1 -1
- package/docs/api/interfaces/ExportOptions.md +1 -1
- package/docs/api/interfaces/FileDisplayProps.md +24 -11
- package/docs/api/interfaces/FileMetadata.md +1 -1
- package/docs/api/interfaces/FileReference.md +1 -1
- package/docs/api/interfaces/FileSizeLimits.md +1 -1
- package/docs/api/interfaces/FileUploadOptions.md +1 -1
- package/docs/api/interfaces/FileUploadProps.md +1 -1
- package/docs/api/interfaces/FooterProps.md +1 -1
- package/docs/api/interfaces/FormFieldProps.md +1 -1
- package/docs/api/interfaces/FormProps.md +1 -1
- package/docs/api/interfaces/GrantEventAppRoleParams.md +1 -1
- package/docs/api/interfaces/InactivityWarningModalProps.md +1 -1
- package/docs/api/interfaces/InputProps.md +1 -1
- package/docs/api/interfaces/LabelProps.md +1 -1
- package/docs/api/interfaces/LoggerConfig.md +1 -1
- package/docs/api/interfaces/LoginFormProps.md +1 -1
- package/docs/api/interfaces/NavigationAccessRecord.md +2 -2
- package/docs/api/interfaces/NavigationContextType.md +1 -1
- package/docs/api/interfaces/NavigationGuardProps.md +1 -1
- package/docs/api/interfaces/NavigationItem.md +1 -1
- package/docs/api/interfaces/NavigationMenuProps.md +1 -1
- package/docs/api/interfaces/NavigationProviderProps.md +1 -1
- package/docs/api/interfaces/Organisation.md +1 -1
- package/docs/api/interfaces/OrganisationContextType.md +1 -1
- package/docs/api/interfaces/OrganisationMembership.md +1 -1
- package/docs/api/interfaces/OrganisationProviderProps.md +1 -1
- package/docs/api/interfaces/OrganisationSecurityError.md +1 -1
- package/docs/api/interfaces/PaceAppLayoutProps.md +1 -1
- package/docs/api/interfaces/PaceLoginPageProps.md +1 -1
- package/docs/api/interfaces/PageAccessRecord.md +1 -1
- package/docs/api/interfaces/PagePermissionContextType.md +1 -1
- package/docs/api/interfaces/PagePermissionGuardProps.md +2 -2
- package/docs/api/interfaces/PagePermissionProviderProps.md +1 -1
- package/docs/api/interfaces/PaletteData.md +1 -1
- package/docs/api/interfaces/ParsedAddress.md +1 -1
- package/docs/api/interfaces/PermissionEnforcerProps.md +4 -4
- package/docs/api/interfaces/ProgressProps.md +1 -1
- package/docs/api/interfaces/ProtectedRouteProps.md +1 -1
- package/docs/api/interfaces/PublicPageFooterProps.md +1 -1
- package/docs/api/interfaces/PublicPageHeaderProps.md +1 -1
- package/docs/api/interfaces/PublicPageLayoutProps.md +1 -1
- package/docs/api/interfaces/QuickFix.md +1 -1
- package/docs/api/interfaces/RBACAccessValidateParams.md +1 -1
- package/docs/api/interfaces/RBACAccessValidateResult.md +1 -1
- package/docs/api/interfaces/RBACAuditLogParams.md +1 -1
- package/docs/api/interfaces/RBACAuditLogResult.md +1 -1
- package/docs/api/interfaces/RBACConfig.md +2 -2
- package/docs/api/interfaces/RBACContext.md +1 -1
- package/docs/api/interfaces/RBACLogger.md +1 -1
- package/docs/api/interfaces/RBACPageAccessCheckParams.md +1 -1
- package/docs/api/interfaces/RBACPerformanceMetrics.md +1 -1
- package/docs/api/interfaces/RBACPermissionCheckParams.md +1 -1
- package/docs/api/interfaces/RBACPermissionCheckResult.md +2 -2
- package/docs/api/interfaces/RBACPermissionsGetParams.md +1 -1
- package/docs/api/interfaces/RBACPermissionsGetResult.md +1 -1
- package/docs/api/interfaces/RBACResult.md +1 -1
- package/docs/api/interfaces/RBACRoleGrantParams.md +2 -2
- package/docs/api/interfaces/RBACRoleGrantResult.md +1 -1
- package/docs/api/interfaces/RBACRoleRevokeParams.md +2 -2
- package/docs/api/interfaces/RBACRoleRevokeResult.md +1 -1
- package/docs/api/interfaces/RBACRoleValidateParams.md +2 -2
- package/docs/api/interfaces/RBACRoleValidateResult.md +1 -1
- package/docs/api/interfaces/RBACRolesListParams.md +1 -1
- package/docs/api/interfaces/RBACRolesListResult.md +2 -2
- package/docs/api/interfaces/RBACSessionTrackParams.md +1 -1
- package/docs/api/interfaces/RBACSessionTrackResult.md +1 -1
- package/docs/api/interfaces/ResourcePermissions.md +1 -1
- package/docs/api/interfaces/RevokeEventAppRoleParams.md +1 -1
- package/docs/api/interfaces/RoleBasedRouterContextType.md +1 -1
- package/docs/api/interfaces/RoleBasedRouterProps.md +1 -1
- package/docs/api/interfaces/RoleManagementResult.md +1 -1
- package/docs/api/interfaces/RouteAccessRecord.md +2 -2
- package/docs/api/interfaces/RouteConfig.md +2 -2
- package/docs/api/interfaces/RuntimeComplianceResult.md +1 -1
- package/docs/api/interfaces/SecureDataContextType.md +1 -1
- package/docs/api/interfaces/SecureDataProviderProps.md +1 -1
- package/docs/api/interfaces/SessionRestorationLoaderProps.md +1 -1
- package/docs/api/interfaces/SetupIssue.md +1 -1
- package/docs/api/interfaces/StorageConfig.md +1 -1
- package/docs/api/interfaces/StorageFileInfo.md +1 -1
- package/docs/api/interfaces/StorageFileMetadata.md +1 -1
- package/docs/api/interfaces/StorageListOptions.md +1 -1
- package/docs/api/interfaces/StorageListResult.md +1 -1
- package/docs/api/interfaces/StorageUploadOptions.md +1 -1
- package/docs/api/interfaces/StorageUploadResult.md +1 -1
- package/docs/api/interfaces/StorageUrlOptions.md +1 -1
- package/docs/api/interfaces/StyleImport.md +1 -1
- package/docs/api/interfaces/SwitchProps.md +1 -1
- package/docs/api/interfaces/TabsContentProps.md +1 -1
- package/docs/api/interfaces/TabsListProps.md +1 -1
- package/docs/api/interfaces/TabsProps.md +1 -1
- package/docs/api/interfaces/TabsTriggerProps.md +1 -1
- package/docs/api/interfaces/TextareaProps.md +1 -1
- package/docs/api/interfaces/ToastActionElement.md +1 -1
- package/docs/api/interfaces/ToastProps.md +1 -1
- package/docs/api/interfaces/UnifiedAuthContextType.md +60 -38
- package/docs/api/interfaces/UnifiedAuthProviderProps.md +13 -13
- package/docs/api/interfaces/UseFormDialogOptions.md +1 -1
- package/docs/api/interfaces/UseFormDialogReturn.md +1 -1
- package/docs/api/interfaces/UseInactivityTrackerOptions.md +1 -1
- package/docs/api/interfaces/UseInactivityTrackerReturn.md +1 -1
- package/docs/api/interfaces/UsePublicEventLogoOptions.md +2 -2
- package/docs/api/interfaces/UsePublicEventLogoReturn.md +1 -1
- package/docs/api/interfaces/UsePublicEventOptions.md +1 -1
- package/docs/api/interfaces/UsePublicEventReturn.md +1 -1
- package/docs/api/interfaces/UsePublicFileDisplayOptions.md +2 -2
- package/docs/api/interfaces/UsePublicFileDisplayReturn.md +1 -1
- package/docs/api/interfaces/UsePublicRouteParamsReturn.md +1 -1
- package/docs/api/interfaces/UseResolvedScopeOptions.md +2 -2
- package/docs/api/interfaces/UseResolvedScopeReturn.md +1 -1
- package/docs/api/interfaces/UseResourcePermissionsOptions.md +1 -1
- package/docs/api/interfaces/UserEventAccess.md +1 -1
- package/docs/api/interfaces/UserMenuProps.md +1 -1
- package/docs/api/interfaces/UserProfile.md +1 -1
- package/docs/api/modules.md +194 -209
- package/docs/migration/database-changes-december-2025.md +2 -1
- package/docs/rbac/event-based-apps.md +124 -6
- package/package.json +1 -1
- package/scripts/check-pace-core-compliance.cjs +292 -57
- package/src/__tests__/rls-policies.test.ts +3 -1
- package/src/components/DataTable/__tests__/DataTable.default-state.test.tsx +172 -45
- package/src/components/DataTable/__tests__/DataTable.grouping-aggregation.test.tsx +121 -28
- package/src/components/DataTable/__tests__/DataTableCore.test-setup.ts +9 -8
- package/src/components/DataTable/__tests__/DataTableCore.test.tsx +20 -52
- package/src/components/DataTable/__tests__/a11y.basic.test.tsx +170 -34
- package/src/components/DataTable/__tests__/keyboard.test.tsx +75 -12
- package/src/components/DataTable/__tests__/pagination.modes.test.tsx +75 -11
- package/src/components/DataTable/components/UnifiedTableBody.tsx +85 -14
- package/src/components/DataTable/hooks/useDataTablePermissions.ts +75 -10
- package/src/components/FileDisplay/FileDisplay.test.tsx +2 -1
- package/src/components/FileDisplay/FileDisplay.tsx +16 -4
- package/src/components/NavigationMenu/NavigationMenu.test.tsx +6 -4
- package/src/components/NavigationMenu/NavigationMenu.tsx +1 -10
- package/src/components/OrganisationSelector/OrganisationSelector.tsx +0 -1
- package/src/components/PaceAppLayout/PaceAppLayout.test.tsx +25 -2
- package/src/components/PaceAppLayout/PaceAppLayout.tsx +97 -68
- package/src/components/PaceLoginPage/PaceLoginPage.tsx +0 -7
- package/src/components/ProtectedRoute/ProtectedRoute.test.tsx +5 -9
- package/src/components/ProtectedRoute/ProtectedRoute.tsx +0 -1
- package/src/components/PublicLayout/PublicPageProvider.tsx +0 -1
- package/src/hooks/__tests__/useSecureDataAccess.unit.test.tsx +14 -7
- package/src/hooks/services/useAuthService.ts +21 -3
- package/src/hooks/services/useEventService.ts +21 -3
- package/src/hooks/services/useInactivityService.ts +21 -3
- package/src/hooks/services/useOrganisationService.ts +21 -3
- package/src/hooks/useFileDisplay.ts +10 -17
- package/src/hooks/useSecureDataAccess.test.ts +16 -9
- package/src/hooks/useSecureDataAccess.ts +3 -2
- package/src/providers/services/EventServiceProvider.tsx +0 -8
- package/src/providers/services/UnifiedAuthProvider.tsx +174 -24
- package/src/rbac/__tests__/adapters.comprehensive.test.tsx +10 -16
- package/src/rbac/__tests__/isSuperAdmin.real.test.ts +82 -0
- package/src/rbac/adapters.tsx +3 -22
- package/src/rbac/api.test.ts +2 -2
- package/src/rbac/api.ts +7 -1
- package/src/rbac/components/EnhancedNavigationMenu.tsx +2 -15
- package/src/rbac/components/NavigationGuard.tsx +1 -10
- package/src/rbac/components/NavigationProvider.tsx +0 -1
- package/src/rbac/components/PermissionEnforcer.tsx +45 -12
- package/src/rbac/components/SecureDataProvider.tsx +0 -1
- package/src/rbac/components/__tests__/EnhancedNavigationMenu.test.tsx +7 -43
- package/src/rbac/components/__tests__/NavigationGuard.test.tsx +4 -11
- package/src/rbac/components/__tests__/NavigationProvider.test.tsx +3 -3
- package/src/rbac/components/__tests__/SecureDataProvider.fixed.test.tsx +1 -1
- package/src/rbac/components/__tests__/SecureDataProvider.test.tsx +1 -1
- package/src/rbac/engine.ts +14 -2
- package/src/rbac/hooks/index.ts +0 -3
- package/src/rbac/hooks/usePermissions.ts +51 -11
- package/src/rbac/hooks/useRBAC.ts +3 -13
- package/src/rbac/hooks/useResolvedScope.test.ts +75 -54
- package/src/rbac/hooks/useResolvedScope.ts +58 -33
- package/src/rbac/hooks/useSecureSupabase.ts +4 -9
- package/src/rbac/secureClient.ts +31 -0
- package/src/services/EventService.ts +4 -57
- package/src/services/InactivityService.ts +127 -34
- package/src/services/OrganisationService.ts +68 -10
- package/dist/chunk-6LTQQAT6.js.map +0 -1
- package/dist/chunk-6TQDD426.js.map +0 -1
- package/dist/chunk-LOMZXPSN.js.map +0 -1
- package/dist/chunk-OETXORNB.js.map +0 -1
- package/dist/chunk-VKB2CO4Z.js.map +0 -1
- package/dist/chunk-VRGWKHDB.js.map +0 -1
- package/dist/chunk-XNYQOL3Z.js.map +0 -1
- package/dist/chunk-XYXSXPUK.js.map +0 -1
- package/scripts/check-pace-core-compliance.js +0 -512
- package/src/rbac/hooks/useSuperAdminBypass.ts +0 -126
- package/src/utils/context/superAdminOverride.ts +0 -58
- /package/dist/{DataTable-WKRZD47S.js.map → DataTable-5FU7IESH.js.map} +0 -0
- /package/dist/{UnifiedAuthProvider-FTSG5XH7.js.map → UnifiedAuthProvider-RGJTDE2C.js.map} +0 -0
- /package/dist/{api-IHKALJZD.js.map → api-N774RPUA.js.map} +0 -0
|
@@ -103,10 +103,10 @@ import { useUnifiedAuth } from '../../providers/services/UnifiedAuthProvider';
|
|
|
103
103
|
import { useOrganisations } from '../../hooks/useOrganisations';
|
|
104
104
|
import { useEvents } from '../../hooks/useEvents';
|
|
105
105
|
import { useEventTheme } from '../../hooks/useEventTheme';
|
|
106
|
-
import { useCan, useResolvedScope } from '../../rbac/hooks';
|
|
106
|
+
import { useCan, useResolvedScope, useRBAC } from '../../rbac/hooks';
|
|
107
107
|
import { createScopeFromEvent } from '../../rbac/utils/eventContext';
|
|
108
108
|
import { getCurrentAppName } from '../../utils/app/appNameResolver';
|
|
109
|
-
import { isSuperAdmin } from '../../rbac/api';
|
|
109
|
+
import { isSuperAdmin as checkSuperAdminApi } from '../../rbac/api';
|
|
110
110
|
import { logger } from '../../utils/core/logger';
|
|
111
111
|
import type { Permission, Scope } from '../../rbac/types';
|
|
112
112
|
|
|
@@ -372,7 +372,7 @@ export function PaceAppLayout({
|
|
|
372
372
|
onRouteAccessDenied,
|
|
373
373
|
onRouteStrictModeViolation
|
|
374
374
|
}: PaceAppLayoutProps) {
|
|
375
|
-
const { user, signOut, updatePassword, supabase, appId: contextAppId } = useUnifiedAuth(); // Get appId from context (resolved on login)
|
|
375
|
+
const { user, signOut, updatePassword, supabase, appId: contextAppId, selectedOrganisationId } = useUnifiedAuth(); // Get appId from context (resolved on login)
|
|
376
376
|
const {
|
|
377
377
|
selectedOrganisation,
|
|
378
378
|
isContextReady,
|
|
@@ -380,6 +380,47 @@ export function PaceAppLayout({
|
|
|
380
380
|
ensureOrganisationContext,
|
|
381
381
|
isLoading: organisationLoading
|
|
382
382
|
} = useOrganisations();
|
|
383
|
+
// Use useRBAC to get super admin status - it's more reliable than async check
|
|
384
|
+
// Note: isSuperAdmin might be false initially while loading, but that's OK - we'll allow rendering
|
|
385
|
+
// if organisation loading completes or if we're a super admin
|
|
386
|
+
const { isSuperAdmin: isSuperAdminFromRBAC, isLoading: rbacLoading } = useRBAC();
|
|
387
|
+
|
|
388
|
+
// Also check super admin status directly as a fallback (for ADMIN/PORTAL apps)
|
|
389
|
+
// This allows super admins to proceed even if RBAC hasn't loaded yet
|
|
390
|
+
const [isSuperAdminDirect, setIsSuperAdminDirect] = useState<boolean>(false);
|
|
391
|
+
const [isCheckingSuperAdminDirect, setIsCheckingSuperAdminDirect] = useState<boolean>(false);
|
|
392
|
+
|
|
393
|
+
useEffect(() => {
|
|
394
|
+
const checkSuperAdminDirect = async () => {
|
|
395
|
+
if (!user?.id) {
|
|
396
|
+
setIsSuperAdminDirect(false);
|
|
397
|
+
setIsCheckingSuperAdminDirect(false);
|
|
398
|
+
return;
|
|
399
|
+
}
|
|
400
|
+
|
|
401
|
+
// Only skip if RBAC already confirmed super admin
|
|
402
|
+
if (isSuperAdminFromRBAC) {
|
|
403
|
+
setIsCheckingSuperAdminDirect(false);
|
|
404
|
+
return;
|
|
405
|
+
}
|
|
406
|
+
|
|
407
|
+
setIsCheckingSuperAdminDirect(true);
|
|
408
|
+
try {
|
|
409
|
+
const superAdminStatus = await checkSuperAdminApi(user.id);
|
|
410
|
+
setIsSuperAdminDirect(superAdminStatus);
|
|
411
|
+
} catch (error) {
|
|
412
|
+
logger.error('PaceAppLayout', 'Error checking super admin status directly', { userId: user?.id, error });
|
|
413
|
+
setIsSuperAdminDirect(false);
|
|
414
|
+
} finally {
|
|
415
|
+
setIsCheckingSuperAdminDirect(false);
|
|
416
|
+
}
|
|
417
|
+
};
|
|
418
|
+
|
|
419
|
+
checkSuperAdminDirect();
|
|
420
|
+
}, [user?.id, isSuperAdminFromRBAC]);
|
|
421
|
+
|
|
422
|
+
// Use direct check if RBAC hasn't loaded yet, otherwise use RBAC result
|
|
423
|
+
const isSuperAdmin = isSuperAdminFromRBAC || isSuperAdminDirect;
|
|
383
424
|
const navigate = useNavigate();
|
|
384
425
|
const location = useLocation();
|
|
385
426
|
|
|
@@ -408,28 +449,25 @@ export function PaceAppLayout({
|
|
|
408
449
|
|
|
409
450
|
// Build scope from resolved values
|
|
410
451
|
// Preserve appId from resolvedScope or fallback to resolvedAppId
|
|
452
|
+
// CRITICAL: Always create a new scope object from primitive values to ensure stable reference
|
|
453
|
+
// This prevents useCan from re-checking permissions when resolvedScope changes reference but values are the same
|
|
454
|
+
const scopeOrgId = resolvedScope?.organisationId || selectedOrganisation?.id || '';
|
|
455
|
+
const scopeEventId = resolvedScope?.eventId || selectedEvent?.event_id || undefined;
|
|
456
|
+
const scopeAppId = resolvedScope?.appId || resolvedAppId || undefined;
|
|
457
|
+
|
|
411
458
|
const scope = useMemo<Scope>(() => {
|
|
412
|
-
|
|
413
|
-
if (
|
|
414
|
-
|
|
459
|
+
const newScope: Scope = {};
|
|
460
|
+
if (scopeOrgId) {
|
|
461
|
+
newScope.organisationId = scopeOrgId;
|
|
415
462
|
}
|
|
416
|
-
|
|
417
|
-
|
|
418
|
-
if (selectedOrganisation?.id) {
|
|
419
|
-
return {
|
|
420
|
-
organisationId: selectedOrganisation.id,
|
|
421
|
-
eventId: selectedEvent?.event_id || undefined,
|
|
422
|
-
appId: resolvedAppId || resolvedScope?.appId || undefined
|
|
423
|
-
};
|
|
463
|
+
if (scopeEventId) {
|
|
464
|
+
newScope.eventId = scopeEventId;
|
|
424
465
|
}
|
|
425
|
-
|
|
426
|
-
|
|
427
|
-
|
|
428
|
-
|
|
429
|
-
|
|
430
|
-
appId: resolvedAppId || resolvedScope?.appId || undefined
|
|
431
|
-
};
|
|
432
|
-
}, [resolvedScope, selectedOrganisation?.id, selectedEvent?.event_id, resolvedAppId]);
|
|
466
|
+
if (scopeAppId) {
|
|
467
|
+
newScope.appId = scopeAppId;
|
|
468
|
+
}
|
|
469
|
+
return newScope;
|
|
470
|
+
}, [scopeOrgId, scopeEventId, scopeAppId]);
|
|
433
471
|
|
|
434
472
|
// Default navigation items if none provided
|
|
435
473
|
const defaultNavItems: NavigationItem[] = useMemo(() => [
|
|
@@ -460,61 +498,45 @@ export function PaceAppLayout({
|
|
|
460
498
|
}
|
|
461
499
|
// Extract first path segment (base page name)
|
|
462
500
|
const pathSegments = currentPath.slice(1).split('/').filter(Boolean);
|
|
463
|
-
|
|
501
|
+
// Only return 'home' if there's actually a path segment, otherwise return empty string
|
|
502
|
+
// This prevents checking permissions for a non-existent "home" page when the index route is used
|
|
503
|
+
return pathSegments[0] || '';
|
|
464
504
|
}, [location.pathname, pageIdMapping]);
|
|
465
505
|
|
|
466
506
|
// Build permission string in format: operation:page.pageId
|
|
467
507
|
const currentPermission = useMemo<Permission>(() => {
|
|
468
|
-
|
|
469
|
-
|
|
508
|
+
// If enforcePermissions is false, don't check any permission (return empty string)
|
|
509
|
+
// If currentPageId is empty (index route with no path segments), don't check permissions
|
|
510
|
+
if (!enforcePermissions || !currentPageId) {
|
|
511
|
+
return '' as Permission;
|
|
470
512
|
}
|
|
471
513
|
const permissionString = `${currentRoutePermission}:page.${currentPageId}`;
|
|
472
514
|
return permissionString as Permission;
|
|
473
515
|
}, [enforcePermissions, currentRoutePermission, currentPageId]);
|
|
474
516
|
|
|
475
517
|
// Check super admin status before permission enforcement
|
|
476
|
-
|
|
477
|
-
|
|
478
|
-
|
|
479
|
-
useEffect(() => {
|
|
480
|
-
const checkSuperAdminStatus = async () => {
|
|
481
|
-
if (!user?.id) {
|
|
482
|
-
setIsSuperAdminUser(false);
|
|
483
|
-
setIsCheckingSuperAdmin(false);
|
|
484
|
-
return;
|
|
485
|
-
}
|
|
486
|
-
|
|
487
|
-
setIsCheckingSuperAdmin(true);
|
|
488
|
-
try {
|
|
489
|
-
const superAdminStatus = await isSuperAdmin(user.id);
|
|
490
|
-
setIsSuperAdminUser(superAdminStatus);
|
|
491
|
-
} catch (error) {
|
|
492
|
-
logger.error('PaceAppLayout', 'Error checking super admin status', { userId: user?.id, error });
|
|
493
|
-
setIsSuperAdminUser(false);
|
|
494
|
-
} finally {
|
|
495
|
-
setIsCheckingSuperAdmin(false);
|
|
496
|
-
}
|
|
497
|
-
};
|
|
498
|
-
|
|
499
|
-
checkSuperAdminStatus();
|
|
500
|
-
}, [user?.id]);
|
|
518
|
+
// Removed duplicate super admin check - using useRBAC hook instead
|
|
519
|
+
// The useRBAC hook provides isSuperAdmin which is more reliable
|
|
501
520
|
|
|
502
521
|
// Use useCan hook for permission checking (standardized approach)
|
|
503
522
|
// Note: The database function already handles super admin bypass, but we check here
|
|
504
523
|
// as an additional safety layer to prevent unnecessary permission checks
|
|
505
524
|
// Pass appName to useCan so it can be passed to isPermitted for PORTAL/ADMIN special case
|
|
525
|
+
// Only check permissions if enforcePermissions is true and we have a valid permission string
|
|
526
|
+
const shouldCheckPermission = enforcePermissions && !!currentPermission && !!currentPageId;
|
|
506
527
|
const { can: canFromHook, isLoading: isCheckingPermission, error: permissionError } = useCan(
|
|
507
528
|
user?.id || '',
|
|
508
529
|
scope,
|
|
509
|
-
currentPermission,
|
|
510
|
-
currentPageId,
|
|
530
|
+
shouldCheckPermission ? currentPermission : ('' as Permission),
|
|
531
|
+
shouldCheckPermission ? currentPageId : '',
|
|
511
532
|
true, // useCache
|
|
512
533
|
appName // Pass appName for PORTAL/ADMIN special case
|
|
513
534
|
);
|
|
514
535
|
|
|
515
536
|
// Permission enforcement state - super admin bypasses all checks
|
|
516
537
|
// This ensures super admins never see permission errors even if useCan hasn't completed
|
|
517
|
-
|
|
538
|
+
// Use combined super admin check (RBAC + direct check)
|
|
539
|
+
const can = isSuperAdmin ? true : canFromHook;
|
|
518
540
|
const hasPermission = enforcePermissions ? can : true;
|
|
519
541
|
|
|
520
542
|
// Handle permission check results with audit logging and callbacks
|
|
@@ -524,19 +546,20 @@ export function PaceAppLayout({
|
|
|
524
546
|
}
|
|
525
547
|
|
|
526
548
|
// Only proceed when permission check is complete (not loading)
|
|
527
|
-
//
|
|
528
|
-
|
|
549
|
+
// Super admin status is checked via useRBAC hook (isSuperAdminFromRBAC)
|
|
550
|
+
// If RBAC is still loading, allow rendering to proceed (optimistic for super admins)
|
|
551
|
+
if (isCheckingPermission) {
|
|
529
552
|
return;
|
|
530
553
|
}
|
|
531
554
|
|
|
532
555
|
// NEW: Phase 1 - Enhanced Security Features
|
|
533
556
|
// Handle strict mode violations - skip for super admins
|
|
534
|
-
if (strictMode && !
|
|
557
|
+
if (strictMode && !isSuperAdmin && !can) {
|
|
535
558
|
logger.error('PaceAppLayout', 'STRICT MODE VIOLATION: User attempted to access protected page without permission', {
|
|
536
559
|
pageName: currentPageId,
|
|
537
560
|
operation: currentRoutePermission,
|
|
538
561
|
userId: user?.id,
|
|
539
|
-
isSuperAdmin:
|
|
562
|
+
isSuperAdmin: isSuperAdmin,
|
|
540
563
|
timestamp: new Date().toISOString()
|
|
541
564
|
});
|
|
542
565
|
|
|
@@ -546,10 +569,10 @@ export function PaceAppLayout({
|
|
|
546
569
|
}
|
|
547
570
|
|
|
548
571
|
// Handle page access denied callback - skip for super admins
|
|
549
|
-
if (!
|
|
572
|
+
if (!isSuperAdmin && !can && onPageAccessDenied) {
|
|
550
573
|
onPageAccessDenied(currentPageId, currentRoutePermission);
|
|
551
574
|
}
|
|
552
|
-
}, [enforcePermissions, can, isCheckingPermission,
|
|
575
|
+
}, [enforcePermissions, can, isCheckingPermission, isSuperAdmin, currentPageId, currentRoutePermission, user?.id, strictMode, auditLog, onPageAccessDenied, onStrictModeViolation]);
|
|
553
576
|
|
|
554
577
|
// Filter navigation items based on permissions
|
|
555
578
|
// Permission filtering is always enabled - users only see navigation items they have permission to access
|
|
@@ -610,8 +633,8 @@ export function PaceAppLayout({
|
|
|
610
633
|
// For super admins, show all items (they bypass permission checks)
|
|
611
634
|
// Gracefully handle RBAC not being initialized (e.g., in tests)
|
|
612
635
|
try {
|
|
613
|
-
const { isSuperAdmin } = await import('../../rbac/api');
|
|
614
|
-
const isSuper = await
|
|
636
|
+
const { isSuperAdmin: checkSuperAdminDynamic } = await import('../../rbac/api');
|
|
637
|
+
const isSuper = await checkSuperAdminDynamic(user.id);
|
|
615
638
|
|
|
616
639
|
if (isSuper) {
|
|
617
640
|
// Super admins see all navigation items
|
|
@@ -825,7 +848,13 @@ export function PaceAppLayout({
|
|
|
825
848
|
// This is critical - we must wait for organisation context before allowing any data access
|
|
826
849
|
// BUT: Allow rendering to proceed if loading is complete, even if user has no organisations (valid state for profile pages)
|
|
827
850
|
// Only block if we're actively loading - once loading completes (success or error), allow rendering
|
|
828
|
-
|
|
851
|
+
// EXCEPTION: Super admins can proceed even during organisation loading (they can access all orgs)
|
|
852
|
+
// Use combined super admin check (RBAC + direct check) to allow super admins to proceed immediately
|
|
853
|
+
// IMPORTANT: If we're still checking super admin status, allow rendering to proceed (optimistic approach)
|
|
854
|
+
// This prevents blocking super admins while their status is being determined
|
|
855
|
+
// Also allow rendering if we already have a selectedOrganisationId (even if organisationLoading is still true)
|
|
856
|
+
// This prevents blank pages when organisation context is available but loading state hasn't cleared yet
|
|
857
|
+
if (user?.id && organisationLoading && !isSuperAdmin && !isCheckingSuperAdminDirect && !rbacLoading && !selectedOrganisationId) {
|
|
829
858
|
return (
|
|
830
859
|
<div className="flex items-center justify-center min-h-screen">
|
|
831
860
|
<div className="text-center">
|
|
@@ -841,10 +870,10 @@ export function PaceAppLayout({
|
|
|
841
870
|
// These pages work with user context only and don't require organisation context
|
|
842
871
|
// The app can check hasValidOrganisationContext() to determine if org context is available for org-specific features
|
|
843
872
|
|
|
844
|
-
// Show loading state while checking permissions
|
|
845
|
-
// Keep loading active until
|
|
846
|
-
//
|
|
847
|
-
if (enforcePermissions &&
|
|
873
|
+
// Show loading state while checking permissions
|
|
874
|
+
// Keep loading active until permission check completes to prevent exposing protected content
|
|
875
|
+
// Super admin status is checked via useRBAC hook (isSuperAdminFromRBAC)
|
|
876
|
+
if (enforcePermissions && isCheckingPermission) {
|
|
848
877
|
return (
|
|
849
878
|
<div className="flex items-center justify-center min-h-screen">
|
|
850
879
|
<div className="text-center">
|
|
@@ -857,7 +886,7 @@ export function PaceAppLayout({
|
|
|
857
886
|
|
|
858
887
|
// Show permission error (only after BOTH checks are complete)
|
|
859
888
|
// Super admins bypass all permission checks, so don't show errors for them
|
|
860
|
-
if (enforcePermissions && permissionError && !
|
|
889
|
+
if (enforcePermissions && permissionError && !isSuperAdmin) {
|
|
861
890
|
return (
|
|
862
891
|
<div className="flex items-center justify-center min-h-screen">
|
|
863
892
|
<div className="text-center">
|
|
@@ -871,7 +900,7 @@ export function PaceAppLayout({
|
|
|
871
900
|
|
|
872
901
|
// Show permission fallback if user lacks permission
|
|
873
902
|
// Only show this if super admin check is complete and user is not a super admin
|
|
874
|
-
if (enforcePermissions && hasPermission === false && !
|
|
903
|
+
if (enforcePermissions && hasPermission === false && !isCheckingSuperAdminDirect && !isSuperAdmin) {
|
|
875
904
|
// NEW: Phase 1 - Use page permission fallback if available
|
|
876
905
|
if (enforcePagePermissions && pagePermissionFallback) {
|
|
877
906
|
return <>{pagePermissionFallback}</>;
|
|
@@ -208,7 +208,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
|
|
|
208
208
|
}
|
|
209
209
|
} catch (error) {
|
|
210
210
|
// Service may not be available yet or events not loaded - that's okay
|
|
211
|
-
logger.debug('PaceLoginPage', 'Could not restore persisted event (service may not be ready):', error);
|
|
212
211
|
}
|
|
213
212
|
};
|
|
214
213
|
|
|
@@ -266,7 +265,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
|
|
|
266
265
|
.eq('app_id', appData.id);
|
|
267
266
|
|
|
268
267
|
if (pagesError || !pagesData || pagesData.length === 0) {
|
|
269
|
-
logger.debug('PaceLoginPage', 'No pages configured for app:', appName);
|
|
270
268
|
setAccessError(`You do not have permission to access ${appName}. This application is currently unavailable. Please contact your administrator if you believe you should have access.`);
|
|
271
269
|
setIsCheckingAccess(false);
|
|
272
270
|
return;
|
|
@@ -285,7 +283,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
|
|
|
285
283
|
const organisationId = orgRow?.organisation_id;
|
|
286
284
|
|
|
287
285
|
if (!organisationId) {
|
|
288
|
-
logger.debug('PaceLoginPage', 'User has no organisation access');
|
|
289
286
|
setAccessError(`You do not have permission to access ${appName}. You are not assigned to any organisation. Please contact your administrator.`);
|
|
290
287
|
setIsCheckingAccess(false);
|
|
291
288
|
return;
|
|
@@ -305,8 +302,6 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
|
|
|
305
302
|
p_page_id: page.page_name // Page name to resolve to UUID
|
|
306
303
|
});
|
|
307
304
|
|
|
308
|
-
logger.debug('PaceLoginPage', 'Permission check for page:', { pageName: page.page_name, hasPermission, error: permError });
|
|
309
|
-
|
|
310
305
|
if (!permError && hasPermission === true) {
|
|
311
306
|
hasAnyAccess = true;
|
|
312
307
|
break;
|
|
@@ -314,14 +309,12 @@ export const PaceLoginPage: React.FC<PaceLoginPageProps> = ({
|
|
|
314
309
|
}
|
|
315
310
|
|
|
316
311
|
if (hasAnyAccess) {
|
|
317
|
-
logger.debug('PaceLoginPage', 'User has access to app');
|
|
318
312
|
setIsCheckingAccess(false);
|
|
319
313
|
navigate(onSuccessRedirectPath, { replace: true });
|
|
320
314
|
return;
|
|
321
315
|
}
|
|
322
316
|
|
|
323
317
|
// No access - deny
|
|
324
|
-
logger.debug('PaceLoginPage', 'Access denied - no permissions');
|
|
325
318
|
setAccessError(`You do not have permission to access ${appName}. This application is restricted to authorized users only. Please contact your administrator if you believe you should have access.`);
|
|
326
319
|
setIsCheckingAccess(false);
|
|
327
320
|
} catch (error) {
|
|
@@ -165,12 +165,8 @@ describe('ProtectedRoute Component', () => {
|
|
|
165
165
|
|
|
166
166
|
expect(screen.getByTestId('outlet')).toBeInTheDocument();
|
|
167
167
|
|
|
168
|
-
//
|
|
169
|
-
|
|
170
|
-
expect(consoleDebugSpy).toHaveBeenCalledWith(
|
|
171
|
-
expect.stringContaining('[DEBUG] [ProtectedRoute] Events available but none selected - allowing render so selector is visible')
|
|
172
|
-
);
|
|
173
|
-
}, { timeout: 1000 });
|
|
168
|
+
// Note: ProtectedRoute no longer logs this debug message - it just allows rendering
|
|
169
|
+
// The component allows rendering when events exist but none selected to make the selector visible
|
|
174
170
|
});
|
|
175
171
|
|
|
176
172
|
it('renders session restoration loader when session is restoring', () => {
|
|
@@ -461,9 +457,9 @@ describe('ProtectedRoute Component', () => {
|
|
|
461
457
|
renderWithProviders(<ProtectedRoute requireEvent={true} />);
|
|
462
458
|
|
|
463
459
|
expect(screen.getByTestId('outlet')).toBeInTheDocument();
|
|
464
|
-
|
|
465
|
-
|
|
466
|
-
|
|
460
|
+
|
|
461
|
+
// Note: ProtectedRoute no longer logs this debug message - it just allows rendering
|
|
462
|
+
// The component allows rendering when events exist but none selected to make the selector visible
|
|
467
463
|
});
|
|
468
464
|
|
|
469
465
|
it('renders outlet when event is selected', () => {
|
|
@@ -359,7 +359,6 @@ export function ProtectedRoute({
|
|
|
359
359
|
// The event selector will be visible and user can select, or auto-selection will kick in
|
|
360
360
|
if (!selectedEvent) {
|
|
361
361
|
// Log for debugging - this is expected behavior, not an error
|
|
362
|
-
logger.debug('ProtectedRoute', 'Events available but none selected - allowing render so selector is visible');
|
|
363
362
|
return <Outlet />;
|
|
364
363
|
}
|
|
365
364
|
|
|
@@ -102,7 +102,6 @@ export function PublicPageProvider({ children, appName }: PublicPageProviderProp
|
|
|
102
102
|
return null;
|
|
103
103
|
}
|
|
104
104
|
const client = createClient<Database>(supabaseUrl, supabaseKey);
|
|
105
|
-
logger.info('PublicPageProvider', 'Supabase client created successfully for public pages');
|
|
106
105
|
return client;
|
|
107
106
|
}, [supabaseUrl, supabaseKey]);
|
|
108
107
|
|
|
@@ -5,7 +5,7 @@ import { useUnifiedAuth } from '../../providers';
|
|
|
5
5
|
import { useOrganisations } from '../../hooks/useOrganisations';
|
|
6
6
|
import { testDataGenerators } from '../../__tests__/helpers/test-utils';
|
|
7
7
|
import { useResolvedScope } from '../../rbac/hooks/useResolvedScope';
|
|
8
|
-
import {
|
|
8
|
+
import { useOrganisationSecurity } from '../useOrganisationSecurity';
|
|
9
9
|
|
|
10
10
|
// Mock dependencies
|
|
11
11
|
vi.mock('../../providers', () => ({
|
|
@@ -28,8 +28,8 @@ vi.mock('../../rbac/hooks/useResolvedScope', () => ({
|
|
|
28
28
|
useResolvedScope: vi.fn(),
|
|
29
29
|
}));
|
|
30
30
|
|
|
31
|
-
vi.mock('
|
|
32
|
-
|
|
31
|
+
vi.mock('../useOrganisationSecurity', () => ({
|
|
32
|
+
useOrganisationSecurity: vi.fn(),
|
|
33
33
|
}));
|
|
34
34
|
|
|
35
35
|
const mockUseUnifiedAuth = {
|
|
@@ -114,10 +114,17 @@ describe('useSecureDataAccess', () => {
|
|
|
114
114
|
isLoading: false,
|
|
115
115
|
error: null,
|
|
116
116
|
});
|
|
117
|
-
// Default mock for
|
|
118
|
-
vi.mocked(
|
|
119
|
-
isSuperAdmin: false,
|
|
120
|
-
|
|
117
|
+
// Default mock for useOrganisationSecurity - not super admin
|
|
118
|
+
vi.mocked(useOrganisationSecurity).mockReturnValue({
|
|
119
|
+
superAdminContext: { isSuperAdmin: false, hasGlobalAccess: false, canManageAllOrganisations: false },
|
|
120
|
+
validateOrganisationAccess: vi.fn(),
|
|
121
|
+
hasMinimumRole: vi.fn(),
|
|
122
|
+
canAccessChildOrganisations: vi.fn(),
|
|
123
|
+
checkPermission: vi.fn(),
|
|
124
|
+
getPermissions: vi.fn(),
|
|
125
|
+
logOrganisationAccess: vi.fn(),
|
|
126
|
+
canManageOrganisation: vi.fn(),
|
|
127
|
+
} as any);
|
|
121
128
|
});
|
|
122
129
|
|
|
123
130
|
describe('validateContext', () => {
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
* Provides authentication service with reactive state updates.
|
|
9
9
|
*/
|
|
10
10
|
|
|
11
|
-
import { useContext, useReducer, useEffect } from 'react';
|
|
11
|
+
import { useContext, useReducer, useEffect, useRef } from 'react';
|
|
12
12
|
import { AuthServiceContext } from '../../providers/services/AuthServiceProvider';
|
|
13
13
|
import { AuthService } from '../../services/AuthService';
|
|
14
14
|
|
|
@@ -19,11 +19,29 @@ export function useAuthService(): AuthService {
|
|
|
19
19
|
throw new Error('useAuthService must be used within AuthServiceProvider');
|
|
20
20
|
}
|
|
21
21
|
|
|
22
|
-
// Subscribe to service state changes
|
|
22
|
+
// Subscribe to service state changes with debouncing to prevent excessive re-renders
|
|
23
23
|
const [, forceUpdate] = useReducer(x => x + 1, 0);
|
|
24
|
+
const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
|
|
24
25
|
|
|
25
26
|
useEffect(() => {
|
|
26
|
-
|
|
27
|
+
const debouncedUpdate = () => {
|
|
28
|
+
if (timeoutRef.current) {
|
|
29
|
+
clearTimeout(timeoutRef.current);
|
|
30
|
+
}
|
|
31
|
+
timeoutRef.current = setTimeout(() => {
|
|
32
|
+
forceUpdate();
|
|
33
|
+
timeoutRef.current = null;
|
|
34
|
+
}, 50); // 50ms debounce to batch rapid updates
|
|
35
|
+
};
|
|
36
|
+
|
|
37
|
+
const unsubscribe = context.authService.subscribe(debouncedUpdate);
|
|
38
|
+
|
|
39
|
+
return () => {
|
|
40
|
+
unsubscribe();
|
|
41
|
+
if (timeoutRef.current) {
|
|
42
|
+
clearTimeout(timeoutRef.current);
|
|
43
|
+
}
|
|
44
|
+
};
|
|
27
45
|
}, [context.authService]);
|
|
28
46
|
|
|
29
47
|
return context.authService;
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
* Provides event service with reactive state updates.
|
|
9
9
|
*/
|
|
10
10
|
|
|
11
|
-
import { useContext, useReducer, useEffect } from 'react';
|
|
11
|
+
import { useContext, useReducer, useEffect, useRef } from 'react';
|
|
12
12
|
import { EventServiceContext } from '../../providers/services/EventServiceProvider';
|
|
13
13
|
import { EventService } from '../../services/EventService';
|
|
14
14
|
|
|
@@ -19,11 +19,29 @@ export function useEventService(): EventService {
|
|
|
19
19
|
throw new Error('useEventService must be used within EventServiceProvider');
|
|
20
20
|
}
|
|
21
21
|
|
|
22
|
-
// Subscribe to service state changes
|
|
22
|
+
// Subscribe to service state changes with debouncing to prevent excessive re-renders
|
|
23
23
|
const [, forceUpdate] = useReducer(x => x + 1, 0);
|
|
24
|
+
const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
|
|
24
25
|
|
|
25
26
|
useEffect(() => {
|
|
26
|
-
|
|
27
|
+
const debouncedUpdate = () => {
|
|
28
|
+
if (timeoutRef.current) {
|
|
29
|
+
clearTimeout(timeoutRef.current);
|
|
30
|
+
}
|
|
31
|
+
timeoutRef.current = setTimeout(() => {
|
|
32
|
+
forceUpdate();
|
|
33
|
+
timeoutRef.current = null;
|
|
34
|
+
}, 50); // 50ms debounce to batch rapid updates
|
|
35
|
+
};
|
|
36
|
+
|
|
37
|
+
const unsubscribe = context.eventService.subscribe(debouncedUpdate);
|
|
38
|
+
|
|
39
|
+
return () => {
|
|
40
|
+
unsubscribe();
|
|
41
|
+
if (timeoutRef.current) {
|
|
42
|
+
clearTimeout(timeoutRef.current);
|
|
43
|
+
}
|
|
44
|
+
};
|
|
27
45
|
}, [context.eventService]);
|
|
28
46
|
|
|
29
47
|
return context.eventService;
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
* Provides inactivity service with reactive state updates.
|
|
9
9
|
*/
|
|
10
10
|
|
|
11
|
-
import { useContext, useReducer, useEffect } from 'react';
|
|
11
|
+
import { useContext, useReducer, useEffect, useRef } from 'react';
|
|
12
12
|
import { InactivityServiceContext } from '../../providers/services/InactivityServiceProvider';
|
|
13
13
|
import { InactivityService } from '../../services/InactivityService';
|
|
14
14
|
|
|
@@ -19,11 +19,29 @@ export function useInactivityService(): InactivityService {
|
|
|
19
19
|
throw new Error('useInactivityService must be used within InactivityServiceProvider');
|
|
20
20
|
}
|
|
21
21
|
|
|
22
|
-
// Subscribe to service state changes
|
|
22
|
+
// Subscribe to service state changes with debouncing to prevent excessive re-renders
|
|
23
23
|
const [, forceUpdate] = useReducer(x => x + 1, 0);
|
|
24
|
+
const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
|
|
24
25
|
|
|
25
26
|
useEffect(() => {
|
|
26
|
-
|
|
27
|
+
const debouncedUpdate = () => {
|
|
28
|
+
if (timeoutRef.current) {
|
|
29
|
+
clearTimeout(timeoutRef.current);
|
|
30
|
+
}
|
|
31
|
+
timeoutRef.current = setTimeout(() => {
|
|
32
|
+
forceUpdate();
|
|
33
|
+
timeoutRef.current = null;
|
|
34
|
+
}, 50); // 50ms debounce to batch rapid updates
|
|
35
|
+
};
|
|
36
|
+
|
|
37
|
+
const unsubscribe = context.inactivityService.subscribe(debouncedUpdate);
|
|
38
|
+
|
|
39
|
+
return () => {
|
|
40
|
+
unsubscribe();
|
|
41
|
+
if (timeoutRef.current) {
|
|
42
|
+
clearTimeout(timeoutRef.current);
|
|
43
|
+
}
|
|
44
|
+
};
|
|
27
45
|
}, [context.inactivityService]);
|
|
28
46
|
|
|
29
47
|
return context.inactivityService;
|
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
* Provides organisation service with reactive state updates.
|
|
9
9
|
*/
|
|
10
10
|
|
|
11
|
-
import { useContext, useReducer, useEffect } from 'react';
|
|
11
|
+
import { useContext, useReducer, useEffect, useRef } from 'react';
|
|
12
12
|
import { OrganisationServiceContext } from '../../providers/services/OrganisationServiceProvider';
|
|
13
13
|
import { OrganisationService } from '../../services/OrganisationService';
|
|
14
14
|
|
|
@@ -19,11 +19,29 @@ export function useOrganisationService(): OrganisationService {
|
|
|
19
19
|
throw new Error('useOrganisationService must be used within OrganisationServiceProvider');
|
|
20
20
|
}
|
|
21
21
|
|
|
22
|
-
// Subscribe to service state changes
|
|
22
|
+
// Subscribe to service state changes with debouncing to prevent excessive re-renders
|
|
23
23
|
const [, forceUpdate] = useReducer(x => x + 1, 0);
|
|
24
|
+
const timeoutRef = useRef<ReturnType<typeof setTimeout> | null>(null);
|
|
24
25
|
|
|
25
26
|
useEffect(() => {
|
|
26
|
-
|
|
27
|
+
const debouncedUpdate = () => {
|
|
28
|
+
if (timeoutRef.current) {
|
|
29
|
+
clearTimeout(timeoutRef.current);
|
|
30
|
+
}
|
|
31
|
+
timeoutRef.current = setTimeout(() => {
|
|
32
|
+
forceUpdate();
|
|
33
|
+
timeoutRef.current = null;
|
|
34
|
+
}, 50); // 50ms debounce to batch rapid updates
|
|
35
|
+
};
|
|
36
|
+
|
|
37
|
+
const unsubscribe = context.organisationService.subscribe(debouncedUpdate);
|
|
38
|
+
|
|
39
|
+
return () => {
|
|
40
|
+
unsubscribe();
|
|
41
|
+
if (timeoutRef.current) {
|
|
42
|
+
clearTimeout(timeoutRef.current);
|
|
43
|
+
}
|
|
44
|
+
};
|
|
27
45
|
}, [context.organisationService]);
|
|
28
46
|
|
|
29
47
|
return context.organisationService;
|
|
@@ -391,12 +391,7 @@ export function useFileDisplay(
|
|
|
391
391
|
// Category is stored in file_metadata JSONB field, not a direct column
|
|
392
392
|
if (category) {
|
|
393
393
|
// Single file mode - get files by category using RPC
|
|
394
|
-
|
|
395
|
-
table_name,
|
|
396
|
-
record_id,
|
|
397
|
-
category,
|
|
398
|
-
organisation_id
|
|
399
|
-
});
|
|
394
|
+
// Removed verbose debug log - only log on errors
|
|
400
395
|
files = await service.getFilesByCategory(
|
|
401
396
|
table_name,
|
|
402
397
|
record_id,
|
|
@@ -510,21 +505,13 @@ export function useFileDisplay(
|
|
|
510
505
|
if (category && files.length > 0) {
|
|
511
506
|
// Single file mode - get first file
|
|
512
507
|
const firstFile = files[0];
|
|
513
|
-
|
|
514
|
-
id: firstFile.id,
|
|
515
|
-
file_path: firstFile.file_path,
|
|
516
|
-
is_public: firstFile.is_public,
|
|
517
|
-
has_file_metadata: !!firstFile.file_metadata,
|
|
518
|
-
category_in_metadata: firstFile.file_metadata?.category
|
|
519
|
-
});
|
|
520
|
-
|
|
508
|
+
// Removed verbose debug logs - only log on errors
|
|
521
509
|
setFileReference(firstFile);
|
|
522
510
|
|
|
523
511
|
// Generate URL based on file visibility
|
|
524
512
|
let url: string | null = null;
|
|
525
513
|
if (firstFile.is_public) {
|
|
526
514
|
url = getPublicUrl(supabase, firstFile.file_path, true);
|
|
527
|
-
logger.debug('useFileDisplay', 'Generated public URL:', url);
|
|
528
515
|
} else {
|
|
529
516
|
const signedUrlResult = await getSignedUrl(supabase, firstFile.file_path, {
|
|
530
517
|
appName: 'pace-core',
|
|
@@ -533,9 +520,15 @@ export function useFileDisplay(
|
|
|
533
520
|
expiresIn: 3600
|
|
534
521
|
});
|
|
535
522
|
url = signedUrlResult?.url || null;
|
|
536
|
-
|
|
523
|
+
// Only log if URL generation fails
|
|
524
|
+
if (!url) {
|
|
525
|
+
logger.warn('useFileDisplay', 'Failed to generate signed URL for file:', {
|
|
526
|
+
file_path: firstFile.file_path,
|
|
527
|
+
record_id,
|
|
528
|
+
table_name
|
|
529
|
+
});
|
|
530
|
+
}
|
|
537
531
|
}
|
|
538
|
-
logger.debug('useFileDisplay', 'Setting file URL:', url ? 'URL set' : 'URL is null');
|
|
539
532
|
setFileUrl(url);
|
|
540
533
|
} else {
|
|
541
534
|
// Multiple files mode - generate URLs for all files in batch
|