32 lines
1.4 KiB
Markdown
32 lines
1.4 KiB
Markdown
# Frontend Boundary
|
|
|
|
- This repository hosts a React edge application for a single BFF.
|
|
- Frontend data access flows through `src/api/*` adapter modules.
|
|
- The UI does not access DAL or internal services directly.
|
|
- Route shell uses Ant Design layout/menu and keeps business views behind session checks.
|
|
- Unauthenticated users are redirected to the central auth host OIDC start endpoint.
|
|
- Session-expired responses are treated as an auth boundary concern and trigger revalidation before the UI prompts for login again.
|
|
|
|
## Runtime Base URLs
|
|
|
|
- `API_BASE_URL` for business BFF calls.
|
|
- `THALOS_AUTH_BASE_URL` for session login/refresh/logout/me.
|
|
- `THALOS_DEFAULT_RETURN_URL` for safe callback fallback.
|
|
- `THALOS_DEFAULT_TENANT_ID` for OIDC tenant context defaults.
|
|
|
|
## Protected Workflow Endpoints
|
|
|
|
- `GET /api/customer/orders/status?contextId=...`
|
|
- `GET /api/customer/orders/history?contextId=...`
|
|
- `GET /api/customer/orders/{orderId}?contextId=...`
|
|
- `POST /api/customer/orders`
|
|
|
|
## UI Workflow Coverage
|
|
|
|
- Customer order status dashboard with current orders from the shared restaurant lifecycle
|
|
- Selected order detail lookup
|
|
- Recent order history and event feed
|
|
- Customer order submission and recent submission results with shared-lifecycle progression hints
|
|
- Session-expired handling with reauthentication guidance
|
|
- Protected route shell for status, submission, and session inspection
|