1.3 KiB
1.3 KiB
Frontend Boundary
- This repository hosts a React edge application for a single BFF.
- Frontend data access flows through
src/api/*adapter modules. - The UI does not access DAL or internal services directly.
- Route shell uses Ant Design layout/menu and keeps business views behind session checks.
- Unauthenticated users are redirected to the central auth host OIDC start endpoint.
- Session-expired responses are treated as an auth boundary concern and trigger revalidation before the UI prompts for login again.
Runtime Base URLs
API_BASE_URLfor business BFF calls.THALOS_AUTH_BASE_URLfor session login/refresh/logout/me.THALOS_DEFAULT_RETURN_URLfor safe callback fallback.THALOS_DEFAULT_TENANT_IDfor OIDC tenant context defaults.
Protected Workflow Endpoints
GET /api/waiter/floor/assignments?contextId=...GET /api/waiter/floor/activity?contextId=...POST /api/waiter/floor/ordersPUT /api/waiter/floor/orders/{orderId}
UI Workflow Coverage
- Waiter assignment snapshot with location metadata and active-order counts
- Recent waiter activity history feed
- Floor order submission and order update workflows
- Session-expired handling with reauthentication guidance
- Protected route shell for assignments, order actions, and session inspection