1.4 KiB
1.4 KiB
Frontend Boundary
- This repository hosts a React edge application for a single BFF.
- Frontend data access flows through
src/api/*adapter modules. - The UI does not access DAL or internal services directly.
- Route shell uses Ant Design layout/menu and keeps business views behind session checks.
- Unauthenticated users are redirected to the central auth host OIDC start endpoint.
- Session-expired responses are treated as an auth boundary concern and trigger revalidation before the UI prompts for login again.
Runtime Base URLs
API_BASE_URLfor business BFF calls.THALOS_AUTH_BASE_URLfor session login/refresh/logout/me.THALOS_DEFAULT_RETURN_URLfor safe callback fallback.THALOS_DEFAULT_TENANT_IDfor OIDC tenant context defaults.
Protected Workflow Endpoints
GET /api/kitchen/ops/board?contextId=...POST /api/kitchen/ops/work-items/claimPOST /api/kitchen/ops/work-items/releasePOST /api/kitchen/ops/work-items/transitionPOST /api/kitchen/ops/board/priority
UI Workflow Coverage
- Kitchen board lanes with work-item detail and station coverage
- Board event feed derived from the loaded lane state
- Claim, release, transition, and priority operator actions
- Latest operator result and recent action history
- Session-expired handling with reauthentication guidance
- Protected route shell for board, operator actions, and session inspection