Add offline clip caching
This commit is contained in:
5
PLAN.md
5
PLAN.md
@@ -14,6 +14,11 @@
|
|||||||
- Installable React PWA shell with offline-ready game prep scaffolding.
|
- Installable React PWA shell with offline-ready game prep scaffolding.
|
||||||
- Docker-based local development stack.
|
- Docker-based local development stack.
|
||||||
|
|
||||||
|
## Completed Offline Cache Work
|
||||||
|
- Client-side clip and assignment reads now persist locally and revalidate against server ETags.
|
||||||
|
- Normalized playback media is cacheable for offline clip playback.
|
||||||
|
- Auth and session responses remain `no-store` so cached data is limited to app-owned clip state.
|
||||||
|
|
||||||
## Storage Status
|
## Storage Status
|
||||||
- Backend media persists in the `backend-media` named Docker volume.
|
- Backend media persists in the `backend-media` named Docker volume.
|
||||||
|
|
||||||
|
|||||||
@@ -62,3 +62,4 @@ Walkup is a collaborative baseball walk-up song app built as a React PWA with a
|
|||||||
- Song upload and clip creation
|
- Song upload and clip creation
|
||||||
- Game assignments and gameday console
|
- Game assignments and gameday console
|
||||||
- PWA install/offline shell
|
- PWA install/offline shell
|
||||||
|
- Read-only offline clip cache with HTTP revalidation and cached normalized playback media
|
||||||
|
|||||||
79
backend/app/http_cache.py
Normal file
79
backend/app/http_cache.py
Normal file
@@ -0,0 +1,79 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import hashlib
|
||||||
|
import json
|
||||||
|
from collections.abc import Mapping, Sequence
|
||||||
|
from datetime import datetime
|
||||||
|
from typing import Any
|
||||||
|
|
||||||
|
from fastapi import Request, Response
|
||||||
|
from fastapi.encoders import jsonable_encoder
|
||||||
|
|
||||||
|
|
||||||
|
def _strip_keys(value: Any, excluded_keys: set[str]) -> Any:
|
||||||
|
if isinstance(value, Mapping):
|
||||||
|
return {
|
||||||
|
key: _strip_keys(item, excluded_keys)
|
||||||
|
for key, item in value.items()
|
||||||
|
if key not in excluded_keys
|
||||||
|
}
|
||||||
|
if isinstance(value, Sequence) and not isinstance(value, (str, bytes, bytearray)):
|
||||||
|
return [_strip_keys(item, excluded_keys) for item in value]
|
||||||
|
return value
|
||||||
|
|
||||||
|
|
||||||
|
def build_etag(payload: Any, *, exclude_keys: set[str] | None = None) -> str:
|
||||||
|
encoded = jsonable_encoder(payload)
|
||||||
|
if exclude_keys:
|
||||||
|
encoded = _strip_keys(encoded, exclude_keys)
|
||||||
|
serialized = json.dumps(encoded, sort_keys=True, separators=(",", ":"), ensure_ascii=False)
|
||||||
|
digest = hashlib.sha1(serialized.encode("utf-8")).hexdigest()
|
||||||
|
return f'"{digest}"'
|
||||||
|
|
||||||
|
|
||||||
|
def is_matching_etag(request: Request, etag: str) -> bool:
|
||||||
|
header = request.headers.get("if-none-match")
|
||||||
|
if not header:
|
||||||
|
return False
|
||||||
|
|
||||||
|
for candidate in header.split(","):
|
||||||
|
if candidate.strip() in {etag, "*"}:
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def apply_cache_headers(
|
||||||
|
response: Response,
|
||||||
|
*,
|
||||||
|
cache_control: str,
|
||||||
|
etag: str | None = None,
|
||||||
|
last_modified: datetime | None = None,
|
||||||
|
) -> None:
|
||||||
|
response.headers["Cache-Control"] = cache_control
|
||||||
|
response.headers["Vary"] = "Cookie, Authorization"
|
||||||
|
if etag is not None:
|
||||||
|
response.headers["ETag"] = etag
|
||||||
|
if last_modified is not None:
|
||||||
|
response.headers["Last-Modified"] = last_modified.strftime("%a, %d %b %Y %H:%M:%S GMT")
|
||||||
|
|
||||||
|
|
||||||
|
def set_no_store(response: Response) -> None:
|
||||||
|
apply_cache_headers(response, cache_control="no-store")
|
||||||
|
|
||||||
|
|
||||||
|
def set_private_revalidate(response: Response, *, etag: str | None = None, last_modified: datetime | None = None) -> None:
|
||||||
|
apply_cache_headers(
|
||||||
|
response,
|
||||||
|
cache_control="private, max-age=0, must-revalidate",
|
||||||
|
etag=etag,
|
||||||
|
last_modified=last_modified,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def set_public_immutable(response: Response, *, etag: str | None = None, last_modified: datetime | None = None) -> None:
|
||||||
|
apply_cache_headers(
|
||||||
|
response,
|
||||||
|
cache_control="public, max-age=31536000, immutable",
|
||||||
|
etag=etag,
|
||||||
|
last_modified=last_modified,
|
||||||
|
)
|
||||||
@@ -23,6 +23,7 @@ from ..auth import (
|
|||||||
)
|
)
|
||||||
from ..config import settings
|
from ..config import settings
|
||||||
from ..database import get_db
|
from ..database import get_db
|
||||||
|
from ..http_cache import set_no_store
|
||||||
from ..models import UserSession
|
from ..models import UserSession
|
||||||
from .teamsnap import build_proxy_api_root
|
from .teamsnap import build_proxy_api_root
|
||||||
from ..schemas import (
|
from ..schemas import (
|
||||||
@@ -47,6 +48,7 @@ def teamsnap_start(return_to: str | None = Query(default="/")) -> Response:
|
|||||||
raise HTTPException(status_code=status.HTTP_503_SERVICE_UNAVAILABLE, detail="TeamSnap is not configured")
|
raise HTTPException(status_code=status.HTTP_503_SERVICE_UNAVAILABLE, detail="TeamSnap is not configured")
|
||||||
state = secrets.token_urlsafe(24)
|
state = secrets.token_urlsafe(24)
|
||||||
response = JSONResponse({"authorize_url": build_teamsnap_authorize_url(state), "state": state})
|
response = JSONResponse({"authorize_url": build_teamsnap_authorize_url(state), "state": state})
|
||||||
|
set_no_store(response)
|
||||||
response.set_cookie(
|
response.set_cookie(
|
||||||
settings.auth_return_cookie_name,
|
settings.auth_return_cookie_name,
|
||||||
normalize_return_to(return_to),
|
normalize_return_to(return_to),
|
||||||
@@ -73,13 +75,18 @@ async def teamsnap_callback(
|
|||||||
db.commit()
|
db.commit()
|
||||||
redirect_target = normalize_return_to(request.cookies.get(settings.auth_return_cookie_name))
|
redirect_target = normalize_return_to(request.cookies.get(settings.auth_return_cookie_name))
|
||||||
redirect = RedirectResponse(url=redirect_target, status_code=status.HTTP_303_SEE_OTHER)
|
redirect = RedirectResponse(url=redirect_target, status_code=status.HTTP_303_SEE_OTHER)
|
||||||
|
set_no_store(redirect)
|
||||||
set_session_cookie(redirect, session.session_token)
|
set_session_cookie(redirect, session.session_token)
|
||||||
redirect.delete_cookie(settings.auth_return_cookie_name)
|
redirect.delete_cookie(settings.auth_return_cookie_name)
|
||||||
return redirect
|
return redirect
|
||||||
|
|
||||||
|
|
||||||
@router.get("/session", response_model=SessionResponse)
|
@router.get("/session", response_model=SessionResponse)
|
||||||
def session_status(session: UserSession | None = Depends(get_current_session)) -> SessionResponse:
|
def session_status(
|
||||||
|
response: Response,
|
||||||
|
session: UserSession | None = Depends(get_current_session),
|
||||||
|
) -> SessionResponse:
|
||||||
|
set_no_store(response)
|
||||||
if session is None:
|
if session is None:
|
||||||
return SessionResponse(authenticated=False)
|
return SessionResponse(authenticated=False)
|
||||||
return SessionResponse(
|
return SessionResponse(
|
||||||
@@ -96,6 +103,7 @@ def session_status(session: UserSession | None = Depends(get_current_session)) -
|
|||||||
@router.post("/teamsnap/token", response_model=TeamSnapTokenResponse)
|
@router.post("/teamsnap/token", response_model=TeamSnapTokenResponse)
|
||||||
async def teamsnap_token(
|
async def teamsnap_token(
|
||||||
request: Request,
|
request: Request,
|
||||||
|
response: Response,
|
||||||
session: UserSession = Depends(require_session),
|
session: UserSession = Depends(require_session),
|
||||||
db: Session = Depends(get_db),
|
db: Session = Depends(get_db),
|
||||||
) -> TeamSnapTokenResponse:
|
) -> TeamSnapTokenResponse:
|
||||||
@@ -115,6 +123,7 @@ async def teamsnap_token(
|
|||||||
db.commit()
|
db.commit()
|
||||||
db.refresh(session)
|
db.refresh(session)
|
||||||
|
|
||||||
|
set_no_store(response)
|
||||||
return TeamSnapTokenResponse(
|
return TeamSnapTokenResponse(
|
||||||
access_token=session.access_token,
|
access_token=session.access_token,
|
||||||
expires_at=session.token_expires_at,
|
expires_at=session.token_expires_at,
|
||||||
@@ -126,6 +135,7 @@ async def teamsnap_token(
|
|||||||
@router.post("/session/walkup", response_model=SessionResponse)
|
@router.post("/session/walkup", response_model=SessionResponse)
|
||||||
def update_walkup_session_selection(
|
def update_walkup_session_selection(
|
||||||
payload: WalkupSessionSelectionUpdate,
|
payload: WalkupSessionSelectionUpdate,
|
||||||
|
response: Response,
|
||||||
session: UserSession = Depends(require_session),
|
session: UserSession = Depends(require_session),
|
||||||
db: Session = Depends(get_db),
|
db: Session = Depends(get_db),
|
||||||
) -> SessionResponse:
|
) -> SessionResponse:
|
||||||
@@ -137,6 +147,7 @@ def update_walkup_session_selection(
|
|||||||
db.add(session)
|
db.add(session)
|
||||||
db.commit()
|
db.commit()
|
||||||
db.refresh(session)
|
db.refresh(session)
|
||||||
|
set_no_store(response)
|
||||||
return SessionResponse(
|
return SessionResponse(
|
||||||
authenticated=True,
|
authenticated=True,
|
||||||
provider=session.provider,
|
provider=session.provider,
|
||||||
@@ -156,6 +167,7 @@ def admin_login(payload: AdminLoginRequest, response: Response, db: Session = De
|
|||||||
db.add(session)
|
db.add(session)
|
||||||
db.commit()
|
db.commit()
|
||||||
set_session_cookie(response, session.session_token)
|
set_session_cookie(response, session.session_token)
|
||||||
|
set_no_store(response)
|
||||||
return SessionResponse(authenticated=True, provider="local", is_admin=True)
|
return SessionResponse(authenticated=True, provider="local", is_admin=True)
|
||||||
|
|
||||||
|
|
||||||
@@ -169,9 +181,11 @@ def logout(
|
|||||||
db.delete(session)
|
db.delete(session)
|
||||||
db.commit()
|
db.commit()
|
||||||
clear_session_cookie(response)
|
clear_session_cookie(response)
|
||||||
|
set_no_store(response)
|
||||||
return {"ok": True}
|
return {"ok": True}
|
||||||
|
|
||||||
|
|
||||||
@router.get("/admin/check", response_model=SessionResponse)
|
@router.get("/admin/check", response_model=SessionResponse)
|
||||||
def admin_check(_: UserSession = Depends(require_admin)) -> SessionResponse:
|
def admin_check(response: Response, _: UserSession = Depends(require_admin)) -> SessionResponse:
|
||||||
|
set_no_store(response)
|
||||||
return SessionResponse(authenticated=True, provider="local", is_admin=True)
|
return SessionResponse(authenticated=True, provider="local", is_admin=True)
|
||||||
|
|||||||
@@ -3,11 +3,13 @@ from __future__ import annotations
|
|||||||
from datetime import datetime, timezone
|
from datetime import datetime, timezone
|
||||||
|
|
||||||
from fastapi import APIRouter, Depends, HTTPException, Query
|
from fastapi import APIRouter, Depends, HTTPException, Query
|
||||||
|
from fastapi import Request, Response
|
||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
from sqlalchemy.orm import Session
|
from sqlalchemy.orm import Session
|
||||||
|
|
||||||
from ..auth import require_session
|
from ..auth import require_session
|
||||||
from ..database import get_db
|
from ..database import get_db
|
||||||
|
from ..http_cache import build_etag, is_matching_etag, set_private_revalidate
|
||||||
from ..models import AudioClip, GameAssignment, UserSession
|
from ..models import AudioClip, GameAssignment, UserSession
|
||||||
from ..schemas import (
|
from ..schemas import (
|
||||||
GameAssignmentCreate,
|
GameAssignmentCreate,
|
||||||
@@ -37,8 +39,20 @@ def assignment_to_response(assignment: GameAssignment) -> GameAssignmentResponse
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def prepare_conditional_response(
|
||||||
|
request: Request,
|
||||||
|
payload: object,
|
||||||
|
*,
|
||||||
|
exclude_keys: set[str] | None = None,
|
||||||
|
) -> tuple[str, bool]:
|
||||||
|
etag = build_etag(payload, exclude_keys=exclude_keys)
|
||||||
|
return etag, is_matching_etag(request, etag)
|
||||||
|
|
||||||
|
|
||||||
@router.get("/pins", response_model=list[GameAssignmentResponse])
|
@router.get("/pins", response_model=list[GameAssignmentResponse])
|
||||||
def list_pins(
|
def list_pins(
|
||||||
|
request: Request,
|
||||||
|
response: Response,
|
||||||
external_player_id: str | None = Query(default=None),
|
external_player_id: str | None = Query(default=None),
|
||||||
session: UserSession = Depends(require_session),
|
session: UserSession = Depends(require_session),
|
||||||
db: Session = Depends(get_db),
|
db: Session = Depends(get_db),
|
||||||
@@ -52,11 +66,18 @@ def list_pins(
|
|||||||
GameAssignment.external_player_id == player_id,
|
GameAssignment.external_player_id == player_id,
|
||||||
)
|
)
|
||||||
pins = db.scalars(query.order_by(GameAssignment.external_game_id.asc(), AudioClip.sort_order.asc())).all()
|
pins = db.scalars(query.order_by(GameAssignment.external_game_id.asc(), AudioClip.sort_order.asc())).all()
|
||||||
return [assignment_to_response(assignment) for assignment in pins]
|
payload = [assignment_to_response(assignment) for assignment in pins]
|
||||||
|
etag, not_modified = prepare_conditional_response(request, payload)
|
||||||
|
set_private_revalidate(response, etag=etag)
|
||||||
|
if not_modified:
|
||||||
|
return Response(status_code=304, headers=dict(response.headers))
|
||||||
|
return payload
|
||||||
|
|
||||||
|
|
||||||
@router.get("/{external_game_id}/assignments", response_model=list[GameAssignmentResponse])
|
@router.get("/{external_game_id}/assignments", response_model=list[GameAssignmentResponse])
|
||||||
def list_assignments(
|
def list_assignments(
|
||||||
|
request: Request,
|
||||||
|
response: Response,
|
||||||
external_game_id: str,
|
external_game_id: str,
|
||||||
external_player_id: str | None = Query(default=None),
|
external_player_id: str | None = Query(default=None),
|
||||||
_: UserSession = Depends(require_session),
|
_: UserSession = Depends(require_session),
|
||||||
@@ -69,7 +90,12 @@ def list_assignments(
|
|||||||
if external_player_id:
|
if external_player_id:
|
||||||
query = query.where(GameAssignment.external_player_id == external_player_id)
|
query = query.where(GameAssignment.external_player_id == external_player_id)
|
||||||
assignments = db.scalars(query.order_by(AudioClip.sort_order.asc(), GameAssignment.updated_at.desc())).all()
|
assignments = db.scalars(query.order_by(AudioClip.sort_order.asc(), GameAssignment.updated_at.desc())).all()
|
||||||
return [assignment_to_response(assignment) for assignment in assignments]
|
payload = [assignment_to_response(assignment) for assignment in assignments]
|
||||||
|
etag, not_modified = prepare_conditional_response(request, payload)
|
||||||
|
set_private_revalidate(response, etag=etag)
|
||||||
|
if not_modified:
|
||||||
|
return Response(status_code=304, headers=dict(response.headers))
|
||||||
|
return payload
|
||||||
|
|
||||||
|
|
||||||
@router.post("/{external_game_id}/assignments", response_model=GameAssignmentResponse)
|
@router.post("/{external_game_id}/assignments", response_model=GameAssignmentResponse)
|
||||||
@@ -136,6 +162,8 @@ def delete_assignment(
|
|||||||
|
|
||||||
@router.get("/{external_game_id}/prep", response_model=GamePrepResponse)
|
@router.get("/{external_game_id}/prep", response_model=GamePrepResponse)
|
||||||
def prepare_game(
|
def prepare_game(
|
||||||
|
request: Request,
|
||||||
|
response: Response,
|
||||||
external_game_id: str,
|
external_game_id: str,
|
||||||
_: UserSession = Depends(require_session),
|
_: UserSession = Depends(require_session),
|
||||||
db: Session = Depends(get_db),
|
db: Session = Depends(get_db),
|
||||||
@@ -147,9 +175,14 @@ def prepare_game(
|
|||||||
.order_by(AudioClip.sort_order.asc(), GameAssignment.updated_at.desc())
|
.order_by(AudioClip.sort_order.asc(), GameAssignment.updated_at.desc())
|
||||||
).all()
|
).all()
|
||||||
external_team_id = assignments[0].external_team_id if assignments else ""
|
external_team_id = assignments[0].external_team_id if assignments else ""
|
||||||
return GamePrepResponse(
|
payload = GamePrepResponse(
|
||||||
external_game_id=external_game_id,
|
external_game_id=external_game_id,
|
||||||
external_team_id=external_team_id,
|
external_team_id=external_team_id,
|
||||||
prepared_at=datetime.now(timezone.utc),
|
prepared_at=datetime.now(timezone.utc),
|
||||||
assignments=[assignment_to_response(assignment) for assignment in assignments],
|
assignments=[assignment_to_response(assignment) for assignment in assignments],
|
||||||
)
|
)
|
||||||
|
etag, not_modified = prepare_conditional_response(request, payload, exclude_keys={"prepared_at"})
|
||||||
|
set_private_revalidate(response, etag=etag)
|
||||||
|
if not_modified:
|
||||||
|
return Response(status_code=304, headers=dict(response.headers))
|
||||||
|
return payload
|
||||||
|
|||||||
@@ -4,13 +4,14 @@ import secrets
|
|||||||
import shutil
|
import shutil
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
|
|
||||||
from fastapi import APIRouter, Depends, File, Form, HTTPException, UploadFile
|
from fastapi import APIRouter, Depends, File, Form, HTTPException, Request, Response, UploadFile
|
||||||
from fastapi.responses import FileResponse
|
from fastapi.responses import FileResponse
|
||||||
from sqlalchemy import delete, func, select
|
from sqlalchemy import delete, func, select
|
||||||
from sqlalchemy.orm import Session
|
from sqlalchemy.orm import Session
|
||||||
|
|
||||||
from ..auth import require_session
|
from ..auth import require_session
|
||||||
from ..database import get_db
|
from ..database import get_db
|
||||||
|
from ..http_cache import build_etag, is_matching_etag, set_no_store, set_private_revalidate, set_public_immutable
|
||||||
from ..models import AudioAsset, AudioClip, GameAssignment, UserSession
|
from ..models import AudioAsset, AudioClip, GameAssignment, UserSession
|
||||||
from ..schemas import (
|
from ..schemas import (
|
||||||
AudioAssetImportCreate,
|
AudioAssetImportCreate,
|
||||||
@@ -50,6 +51,16 @@ def clip_to_response(clip: AudioClip) -> AudioClipResponse:
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def prepare_conditional_response(
|
||||||
|
request: Request,
|
||||||
|
payload: object,
|
||||||
|
*,
|
||||||
|
exclude_keys: set[str] | None = None,
|
||||||
|
) -> tuple[str, bool]:
|
||||||
|
etag = build_etag(payload, exclude_keys=exclude_keys)
|
||||||
|
return etag, is_matching_etag(request, etag)
|
||||||
|
|
||||||
|
|
||||||
def can_manage_asset(session: UserSession, asset: AudioAsset, owner_external_player_id: str | None = None) -> bool:
|
def can_manage_asset(session: UserSession, asset: AudioAsset, owner_external_player_id: str | None = None) -> bool:
|
||||||
if session.is_admin or asset.uploaded_by_session_id == session.id:
|
if session.is_admin or asset.uploaded_by_session_id == session.id:
|
||||||
return True
|
return True
|
||||||
@@ -211,6 +222,8 @@ def import_audio(
|
|||||||
|
|
||||||
@router.get("/assets", response_model=list[AudioAssetResponse])
|
@router.get("/assets", response_model=list[AudioAssetResponse])
|
||||||
def list_assets(
|
def list_assets(
|
||||||
|
request: Request,
|
||||||
|
response: Response,
|
||||||
external_team_id: str,
|
external_team_id: str,
|
||||||
owner_external_player_id: str | None = None,
|
owner_external_player_id: str | None = None,
|
||||||
_: UserSession = Depends(require_session),
|
_: UserSession = Depends(require_session),
|
||||||
@@ -220,7 +233,12 @@ def list_assets(
|
|||||||
if owner_external_player_id:
|
if owner_external_player_id:
|
||||||
query = query.where(AudioAsset.owner_external_player_id == owner_external_player_id)
|
query = query.where(AudioAsset.owner_external_player_id == owner_external_player_id)
|
||||||
assets = db.scalars(query.order_by(AudioAsset.created_at.desc())).all()
|
assets = db.scalars(query.order_by(AudioAsset.created_at.desc())).all()
|
||||||
return [AudioAssetResponse.model_validate(asset, from_attributes=True) for asset in assets]
|
payload = [AudioAssetResponse.model_validate(asset, from_attributes=True) for asset in assets]
|
||||||
|
etag, not_modified = prepare_conditional_response(request, payload)
|
||||||
|
set_private_revalidate(response, etag=etag)
|
||||||
|
if not_modified:
|
||||||
|
return Response(status_code=304, headers=dict(response.headers))
|
||||||
|
return payload
|
||||||
|
|
||||||
|
|
||||||
@router.delete("/assets/{asset_id}", status_code=204)
|
@router.delete("/assets/{asset_id}", status_code=204)
|
||||||
@@ -363,6 +381,8 @@ def delete_clip(
|
|||||||
|
|
||||||
@router.get("/clips", response_model=list[AudioClipResponse])
|
@router.get("/clips", response_model=list[AudioClipResponse])
|
||||||
def list_clips(
|
def list_clips(
|
||||||
|
request: Request,
|
||||||
|
response: Response,
|
||||||
external_team_id: str,
|
external_team_id: str,
|
||||||
owner_external_player_id: str | None = None,
|
owner_external_player_id: str | None = None,
|
||||||
include_hidden: bool = False,
|
include_hidden: bool = False,
|
||||||
@@ -380,7 +400,12 @@ def list_clips(
|
|||||||
if not include_hidden:
|
if not include_hidden:
|
||||||
query = query.where(AudioClip.hidden.is_(False))
|
query = query.where(AudioClip.hidden.is_(False))
|
||||||
clips = db.scalars(query).all()
|
clips = db.scalars(query).all()
|
||||||
return [clip_to_response(clip) for clip in clips]
|
payload = [clip_to_response(clip) for clip in clips]
|
||||||
|
etag, not_modified = prepare_conditional_response(request, payload)
|
||||||
|
set_private_revalidate(response, etag=etag)
|
||||||
|
if not_modified:
|
||||||
|
return Response(status_code=304, headers=dict(response.headers))
|
||||||
|
return payload
|
||||||
|
|
||||||
|
|
||||||
@router.post("/clips/reorder", status_code=204)
|
@router.post("/clips/reorder", status_code=204)
|
||||||
@@ -415,4 +440,16 @@ def media_file(relative_path: str) -> FileResponse:
|
|||||||
path = storage.absolute_path(relative_path)
|
path = storage.absolute_path(relative_path)
|
||||||
if not path.exists():
|
if not path.exists():
|
||||||
raise HTTPException(status_code=404, detail="File not found")
|
raise HTTPException(status_code=404, detail="File not found")
|
||||||
return FileResponse(path)
|
stat = path.stat()
|
||||||
|
if path.is_relative_to(storage.normalized_dir):
|
||||||
|
etag = build_etag({"path": str(path.relative_to(storage.root)), "size": stat.st_size, "mtime_ns": stat.st_mtime_ns})
|
||||||
|
response = FileResponse(
|
||||||
|
path,
|
||||||
|
stat_result=stat,
|
||||||
|
)
|
||||||
|
set_public_immutable(response, etag=etag)
|
||||||
|
return response
|
||||||
|
|
||||||
|
response = FileResponse(path, stat_result=stat)
|
||||||
|
set_no_store(response)
|
||||||
|
return response
|
||||||
|
|||||||
@@ -108,6 +108,112 @@ def test_teamsnap_token_returns_proxy_api_root() -> None:
|
|||||||
|
|
||||||
assert response.status_code == 200
|
assert response.status_code == 200
|
||||||
assert response.json()["api_root"] == "https://kif.local.ascorrea.com/api/teamsnap"
|
assert response.json()["api_root"] == "https://kif.local.ascorrea.com/api/teamsnap"
|
||||||
|
assert response.headers["cache-control"] == "no-store"
|
||||||
|
|
||||||
|
|
||||||
|
def test_session_and_clip_reads_use_cache_validators() -> None:
|
||||||
|
login = client.post("/auth/admin/login", json={"username": "admin", "password": "admin"})
|
||||||
|
assert login.status_code == 200
|
||||||
|
|
||||||
|
session_response = client.get("/auth/session")
|
||||||
|
assert session_response.status_code == 200
|
||||||
|
assert session_response.headers["cache-control"] == "no-store"
|
||||||
|
|
||||||
|
db = SessionLocal()
|
||||||
|
asset = AudioAsset(
|
||||||
|
external_team_id="team-cache",
|
||||||
|
owner_external_player_id="player-cache",
|
||||||
|
title="Cache Song",
|
||||||
|
original_filename="cache-song.mp3",
|
||||||
|
mime_type="audio/mpeg",
|
||||||
|
size_bytes=123,
|
||||||
|
storage_path="uploads/cache-song.mp3",
|
||||||
|
)
|
||||||
|
db.add(asset)
|
||||||
|
db.flush()
|
||||||
|
clip = AudioClip(
|
||||||
|
asset_id=asset.id,
|
||||||
|
label="Cache clip",
|
||||||
|
start_ms=0,
|
||||||
|
end_ms=10000,
|
||||||
|
normalization_status="ready",
|
||||||
|
normalized_path="normalized/cache-clip.mp3",
|
||||||
|
)
|
||||||
|
db.add(clip)
|
||||||
|
db.commit()
|
||||||
|
db.refresh(clip)
|
||||||
|
db.close()
|
||||||
|
|
||||||
|
clips = client.get("/media/clips", params={"external_team_id": "team-cache", "owner_external_player_id": "player-cache"})
|
||||||
|
assert clips.status_code == 200
|
||||||
|
assert clips.headers["etag"]
|
||||||
|
assert clips.headers["cache-control"] == "private, max-age=0, must-revalidate"
|
||||||
|
assert clips.headers["vary"] == "Cookie, Authorization"
|
||||||
|
|
||||||
|
revalidated = client.get(
|
||||||
|
"/media/clips",
|
||||||
|
params={"external_team_id": "team-cache", "owner_external_player_id": "player-cache"},
|
||||||
|
headers={"if-none-match": clips.headers["etag"]},
|
||||||
|
)
|
||||||
|
assert revalidated.status_code == 304
|
||||||
|
|
||||||
|
|
||||||
|
def test_game_prep_uses_stable_etag_for_cached_assignments() -> None:
|
||||||
|
login = client.post("/auth/admin/login", json={"username": "admin", "password": "admin"})
|
||||||
|
assert login.status_code == 200
|
||||||
|
|
||||||
|
db = SessionLocal()
|
||||||
|
asset = AudioAsset(
|
||||||
|
external_team_id="team-prep",
|
||||||
|
owner_external_player_id="player-prep",
|
||||||
|
title="Prep Song",
|
||||||
|
original_filename="prep-song.mp3",
|
||||||
|
mime_type="audio/mpeg",
|
||||||
|
size_bytes=123,
|
||||||
|
storage_path="uploads/prep-song.mp3",
|
||||||
|
)
|
||||||
|
db.add(asset)
|
||||||
|
db.flush()
|
||||||
|
clip = AudioClip(
|
||||||
|
asset_id=asset.id,
|
||||||
|
label="Prep clip",
|
||||||
|
start_ms=0,
|
||||||
|
end_ms=10000,
|
||||||
|
normalization_status="ready",
|
||||||
|
normalized_path="normalized/prep-clip.mp3",
|
||||||
|
)
|
||||||
|
db.add(clip)
|
||||||
|
db.flush()
|
||||||
|
assignment = GameAssignment(
|
||||||
|
external_team_id="team-prep",
|
||||||
|
external_game_id="game-prep",
|
||||||
|
external_player_id="player-prep",
|
||||||
|
clip_id=clip.id,
|
||||||
|
batting_slot=3,
|
||||||
|
status="ready",
|
||||||
|
)
|
||||||
|
db.add(assignment)
|
||||||
|
db.commit()
|
||||||
|
db.close()
|
||||||
|
|
||||||
|
prep = client.get("/games/game-prep/prep")
|
||||||
|
assert prep.status_code == 200
|
||||||
|
assert prep.headers["etag"]
|
||||||
|
|
||||||
|
revalidated = client.get("/games/game-prep/prep", headers={"if-none-match": prep.headers["etag"]})
|
||||||
|
assert revalidated.status_code == 304
|
||||||
|
|
||||||
|
|
||||||
|
def test_normalized_media_files_are_cacheable() -> None:
|
||||||
|
media_file = settings.media_root / "normalized" / "cacheable.mp3"
|
||||||
|
media_file.parent.mkdir(parents=True, exist_ok=True)
|
||||||
|
media_file.write_bytes(make_test_wav_bytes())
|
||||||
|
|
||||||
|
response = client.get("/media/files/normalized/cacheable.mp3")
|
||||||
|
|
||||||
|
assert response.status_code == 200
|
||||||
|
assert response.headers["cache-control"] == "public, max-age=31536000, immutable"
|
||||||
|
assert response.headers["etag"]
|
||||||
|
|
||||||
|
|
||||||
def test_walkup_session_selection_is_persisted_in_session() -> None:
|
def test_walkup_session_selection_is_persisted_in_session() -> None:
|
||||||
|
|||||||
@@ -8,6 +8,7 @@ Walkup is a baseball walk-up song app with a React PWA frontend and a FastAPI ba
|
|||||||
- The backend owns authentication, persisted app data, and media processing.
|
- The backend owns authentication, persisted app data, and media processing.
|
||||||
- TeamSnap is the source of truth for teams, members, events, lineups, and availability.
|
- TeamSnap is the source of truth for teams, members, events, lineups, and availability.
|
||||||
- The backend stores only app-owned data plus TeamSnap external IDs and tokens needed for the auth flow.
|
- The backend stores only app-owned data plus TeamSnap external IDs and tokens needed for the auth flow.
|
||||||
|
- Clip and gameday reads are cached on the client with HTTP validators so the app can keep working when reception is poor or absent.
|
||||||
|
|
||||||
## Frontend
|
## Frontend
|
||||||
|
|
||||||
@@ -16,6 +17,7 @@ Walkup is a baseball walk-up song app with a React PWA frontend and a FastAPI ba
|
|||||||
- TeamSnap data is loaded through the official JavaScript SDK from the browser after the backend provides an access token.
|
- TeamSnap data is loaded through the official JavaScript SDK from the browser after the backend provides an access token.
|
||||||
- The UI includes player, gameday, and library views for clip management and gameday playback.
|
- The UI includes player, gameday, and library views for clip management and gameday playback.
|
||||||
- The app is shipped as a PWA with install and offline-prep behavior.
|
- The app is shipped as a PWA with install and offline-prep behavior.
|
||||||
|
- Normalized playback media is cached by the service worker, and the backend marks those files cacheable while keeping auth/session responses `no-store`.
|
||||||
|
|
||||||
## Backend
|
## Backend
|
||||||
|
|
||||||
|
|||||||
@@ -10,6 +10,7 @@ import { ProfilePage } from "./pages/ProfilePage";
|
|||||||
import { AdminPage } from "./pages/AdminPage";
|
import { AdminPage } from "./pages/AdminPage";
|
||||||
import { SignInPage } from "./pages/SignInPage";
|
import { SignInPage } from "./pages/SignInPage";
|
||||||
import { formatTeamLabel } from "./lib/teamsnapHelpers";
|
import { formatTeamLabel } from "./lib/teamsnapHelpers";
|
||||||
|
import { useOnlineStatus } from "./hooks/useOnlineStatus";
|
||||||
|
|
||||||
function getRouteDestinationLabel(pathname: string) {
|
function getRouteDestinationLabel(pathname: string) {
|
||||||
switch (pathname) {
|
switch (pathname) {
|
||||||
@@ -227,6 +228,7 @@ function ShellLayout() {
|
|||||||
const [navOpen, setNavOpen] = useState(false);
|
const [navOpen, setNavOpen] = useState(false);
|
||||||
const walkup = useWalkupContext();
|
const walkup = useWalkupContext();
|
||||||
const location = useLocation();
|
const location = useLocation();
|
||||||
|
const isOnline = useOnlineStatus();
|
||||||
const currentPageLabel = getNavbarPageLabel(location.pathname);
|
const currentPageLabel = getNavbarPageLabel(location.pathname);
|
||||||
const showNavbar = walkup.sessionQuery.data?.authenticated === true;
|
const showNavbar = walkup.sessionQuery.data?.authenticated === true;
|
||||||
const showTeamSelectionModal = walkup.isTeamSnap && walkup.teamsQuery.isFetched && !walkup.hasSelectedTeam;
|
const showTeamSelectionModal = walkup.isTeamSnap && walkup.teamsQuery.isFetched && !walkup.hasSelectedTeam;
|
||||||
@@ -249,7 +251,7 @@ function ShellLayout() {
|
|||||||
}, [showTeamSelectionModal]);
|
}, [showTeamSelectionModal]);
|
||||||
|
|
||||||
return (
|
return (
|
||||||
<div className={shellClassName}>
|
<div className={shellClassName}>
|
||||||
{showNavbar ? (
|
{showNavbar ? (
|
||||||
<nav className="navbar navbar-expand-lg navbar-dark bg-dark shadow-sm sticky-top px-3 py-2" aria-label="Primary">
|
<nav className="navbar navbar-expand-lg navbar-dark bg-dark shadow-sm sticky-top px-3 py-2" aria-label="Primary">
|
||||||
<div className="container-fluid">
|
<div className="container-fluid">
|
||||||
@@ -301,6 +303,11 @@ function ShellLayout() {
|
|||||||
</div>
|
</div>
|
||||||
</nav>
|
</nav>
|
||||||
) : null}
|
) : null}
|
||||||
|
{!isOnline ? (
|
||||||
|
<div className="alert alert-warning rounded-0 border-0 mb-0 py-2 text-center" role="status">
|
||||||
|
Offline mode: showing cached clips and previously loaded game data until the connection returns.
|
||||||
|
</div>
|
||||||
|
) : null}
|
||||||
<main className="container-fluid py-4">
|
<main className="container-fluid py-4">
|
||||||
<Routes>
|
<Routes>
|
||||||
<Route path="/signin" element={<SignInRoute />} />
|
<Route path="/signin" element={<SignInRoute />} />
|
||||||
|
|||||||
@@ -9,6 +9,7 @@ import type {
|
|||||||
SessionResponse,
|
SessionResponse,
|
||||||
TeamSnapTokenResponse,
|
TeamSnapTokenResponse,
|
||||||
} from "./types";
|
} from "./types";
|
||||||
|
import { cachedJsonRequest, clearOfflineCache } from "../lib/offlineCache";
|
||||||
|
|
||||||
export const API_BASE = import.meta.env.VITE_API_BASE_URL ?? "http://localhost:8000";
|
export const API_BASE = import.meta.env.VITE_API_BASE_URL ?? "http://localhost:8000";
|
||||||
|
|
||||||
@@ -22,13 +23,15 @@ type UploadAssetPayload = {
|
|||||||
};
|
};
|
||||||
|
|
||||||
async function request<T>(path: string, init?: RequestInit): Promise<T> {
|
async function request<T>(path: string, init?: RequestInit): Promise<T> {
|
||||||
|
const headers = new Headers(init?.headers);
|
||||||
|
if (init?.body != null && !headers.has("Content-Type")) {
|
||||||
|
headers.set("Content-Type", "application/json");
|
||||||
|
}
|
||||||
|
|
||||||
const response = await fetch(`${API_BASE}${path}`, {
|
const response = await fetch(`${API_BASE}${path}`, {
|
||||||
credentials: "include",
|
credentials: "include",
|
||||||
...init,
|
...init,
|
||||||
headers: {
|
headers,
|
||||||
"Content-Type": "application/json",
|
|
||||||
...(init?.headers ?? {}),
|
|
||||||
},
|
|
||||||
});
|
});
|
||||||
|
|
||||||
if (!response.ok) {
|
if (!response.ok) {
|
||||||
@@ -40,7 +43,18 @@ async function request<T>(path: string, init?: RequestInit): Promise<T> {
|
|||||||
}
|
}
|
||||||
|
|
||||||
export const api = {
|
export const api = {
|
||||||
getSession: () => request<SessionResponse>("/auth/session"),
|
getSession: () =>
|
||||||
|
cachedJsonRequest<SessionResponse>(
|
||||||
|
["session"],
|
||||||
|
`${API_BASE}/auth/session`,
|
||||||
|
undefined,
|
||||||
|
{
|
||||||
|
onUnauthorized: () => {
|
||||||
|
clearOfflineCache();
|
||||||
|
return { authenticated: false, is_admin: false };
|
||||||
|
},
|
||||||
|
},
|
||||||
|
),
|
||||||
startTeamSnap: (returnTo: string) =>
|
startTeamSnap: (returnTo: string) =>
|
||||||
request<{ authorize_url: string; state: string }>(`/auth/teamsnap/start?return_to=${encodeURIComponent(returnTo)}`),
|
request<{ authorize_url: string; state: string }>(`/auth/teamsnap/start?return_to=${encodeURIComponent(returnTo)}`),
|
||||||
getTeamSnapToken: () => request<TeamSnapTokenResponse>("/auth/teamsnap/token", { method: "POST" }),
|
getTeamSnapToken: () => request<TeamSnapTokenResponse>("/auth/teamsnap/token", { method: "POST" }),
|
||||||
@@ -50,8 +64,9 @@ export const api = {
|
|||||||
updateWalkupSessionSelection: (payload: { external_team_id: string; external_player_id: string }) =>
|
updateWalkupSessionSelection: (payload: { external_team_id: string; external_player_id: string }) =>
|
||||||
request<SessionResponse>("/auth/session/walkup", { method: "POST", body: JSON.stringify(payload) }),
|
request<SessionResponse>("/auth/session/walkup", { method: "POST", body: JSON.stringify(payload) }),
|
||||||
listAssets: (teamId: string, playerId?: string) =>
|
listAssets: (teamId: string, playerId?: string) =>
|
||||||
request<AudioAsset[]>(
|
cachedJsonRequest<AudioAsset[]>(
|
||||||
`/media/assets?external_team_id=${encodeURIComponent(teamId)}${
|
["assets", teamId, playerId ?? ""],
|
||||||
|
`${API_BASE}/media/assets?external_team_id=${encodeURIComponent(teamId)}${
|
||||||
playerId ? `&owner_external_player_id=${encodeURIComponent(playerId)}` : ""
|
playerId ? `&owner_external_player_id=${encodeURIComponent(playerId)}` : ""
|
||||||
}`,
|
}`,
|
||||||
),
|
),
|
||||||
@@ -131,8 +146,9 @@ export const api = {
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
listClips: (teamId: string, playerId?: string, includeHidden = false) =>
|
listClips: (teamId: string, playerId?: string, includeHidden = false) =>
|
||||||
request<AudioClip[]>(
|
cachedJsonRequest<AudioClip[]>(
|
||||||
`/media/clips?external_team_id=${encodeURIComponent(teamId)}${
|
["clips", teamId, playerId ?? "", includeHidden ? "all" : "visible"],
|
||||||
|
`${API_BASE}/media/clips?external_team_id=${encodeURIComponent(teamId)}${
|
||||||
playerId ? `&owner_external_player_id=${encodeURIComponent(playerId)}` : ""
|
playerId ? `&owner_external_player_id=${encodeURIComponent(playerId)}` : ""
|
||||||
}${includeHidden ? "&include_hidden=true" : ""}`,
|
}${includeHidden ? "&include_hidden=true" : ""}`,
|
||||||
),
|
),
|
||||||
@@ -159,13 +175,14 @@ export const api = {
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
listAssignments: (gameId: string, playerId?: string) =>
|
listAssignments: (gameId: string, playerId?: string) =>
|
||||||
request<GameAssignment[]>(
|
cachedJsonRequest<GameAssignment[]>(
|
||||||
`/games/${encodeURIComponent(gameId)}/assignments${
|
["assignments", gameId, playerId ?? ""],
|
||||||
|
`${API_BASE}/games/${encodeURIComponent(gameId)}/assignments${
|
||||||
playerId ? `?external_player_id=${encodeURIComponent(playerId)}` : ""
|
playerId ? `?external_player_id=${encodeURIComponent(playerId)}` : ""
|
||||||
}`,
|
}`,
|
||||||
),
|
),
|
||||||
listPins: (playerId: string) =>
|
listPins: (playerId: string) =>
|
||||||
request<GameAssignment[]>(`/games/pins?external_player_id=${encodeURIComponent(playerId)}`),
|
cachedJsonRequest<GameAssignment[]>(["pins", playerId], `${API_BASE}/games/pins?external_player_id=${encodeURIComponent(playerId)}`),
|
||||||
createAssignment: (
|
createAssignment: (
|
||||||
gameId: string,
|
gameId: string,
|
||||||
payload: {
|
payload: {
|
||||||
@@ -194,5 +211,6 @@ export const api = {
|
|||||||
throw new Error(await response.text());
|
throw new Error(await response.text());
|
||||||
}
|
}
|
||||||
}),
|
}),
|
||||||
prepareGame: (gameId: string) => request<GamePrepResponse>(`/games/${encodeURIComponent(gameId)}/prep`),
|
prepareGame: (gameId: string) =>
|
||||||
|
cachedJsonRequest<GamePrepResponse>(["prep", gameId], `${API_BASE}/games/${encodeURIComponent(gameId)}/prep`),
|
||||||
};
|
};
|
||||||
|
|||||||
29
frontend/src/hooks/useOnlineStatus.ts
Normal file
29
frontend/src/hooks/useOnlineStatus.ts
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
import { useEffect, useState } from "react";
|
||||||
|
|
||||||
|
export function useOnlineStatus(): boolean {
|
||||||
|
const [isOnline, setIsOnline] = useState(() => {
|
||||||
|
if (typeof navigator === "undefined") {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return navigator.onLine;
|
||||||
|
});
|
||||||
|
|
||||||
|
useEffect(() => {
|
||||||
|
function handleOnline() {
|
||||||
|
setIsOnline(true);
|
||||||
|
}
|
||||||
|
|
||||||
|
function handleOffline() {
|
||||||
|
setIsOnline(false);
|
||||||
|
}
|
||||||
|
|
||||||
|
window.addEventListener("online", handleOnline);
|
||||||
|
window.addEventListener("offline", handleOffline);
|
||||||
|
return () => {
|
||||||
|
window.removeEventListener("online", handleOnline);
|
||||||
|
window.removeEventListener("offline", handleOffline);
|
||||||
|
};
|
||||||
|
}, []);
|
||||||
|
|
||||||
|
return isOnline;
|
||||||
|
}
|
||||||
@@ -6,6 +6,7 @@ export function useSession() {
|
|||||||
return useQuery({
|
return useQuery({
|
||||||
queryKey: ["session"],
|
queryKey: ["session"],
|
||||||
queryFn: api.getSession,
|
queryFn: api.getSession,
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -29,6 +29,8 @@ function useBuildWalkupContext() {
|
|||||||
queryKey: ["teamsnap", "teams"],
|
queryKey: ["teamsnap", "teams"],
|
||||||
queryFn: () => teamsnapClient.loadTeams(),
|
queryFn: () => teamsnapClient.loadTeams(),
|
||||||
enabled: isTeamSnap,
|
enabled: isTeamSnap,
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
|
|
||||||
const teams = teamsQuery.data ?? [];
|
const teams = teamsQuery.data ?? [];
|
||||||
@@ -54,11 +56,15 @@ function useBuildWalkupContext() {
|
|||||||
queryKey: ["teamsnap", "members", resolvedTeamId],
|
queryKey: ["teamsnap", "members", resolvedTeamId],
|
||||||
queryFn: () => teamsnapClient.loadMembers(resolvedTeamId),
|
queryFn: () => teamsnapClient.loadMembers(resolvedTeamId),
|
||||||
enabled: isTeamSnap && Boolean(resolvedTeamId),
|
enabled: isTeamSnap && Boolean(resolvedTeamId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
const eventsQuery = useQuery({
|
const eventsQuery = useQuery({
|
||||||
queryKey: ["teamsnap", "events", resolvedTeamId],
|
queryKey: ["teamsnap", "events", resolvedTeamId],
|
||||||
queryFn: () => teamsnapClient.loadEvents(resolvedTeamId),
|
queryFn: () => teamsnapClient.loadEvents(resolvedTeamId),
|
||||||
enabled: isTeamSnap && Boolean(resolvedTeamId),
|
enabled: isTeamSnap && Boolean(resolvedTeamId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
|
|
||||||
const members: TeamSnapMember[] = membersQuery.data ?? [];
|
const members: TeamSnapMember[] = membersQuery.data ?? [];
|
||||||
|
|||||||
149
frontend/src/lib/offlineCache.ts
Normal file
149
frontend/src/lib/offlineCache.ts
Normal file
@@ -0,0 +1,149 @@
|
|||||||
|
type CacheEntry<T> = {
|
||||||
|
cachedAt: string;
|
||||||
|
data: T;
|
||||||
|
etag?: string;
|
||||||
|
};
|
||||||
|
|
||||||
|
type CacheStore = {
|
||||||
|
version: 1;
|
||||||
|
entries: Record<string, CacheEntry<unknown>>;
|
||||||
|
};
|
||||||
|
|
||||||
|
const STORAGE_KEY = "walkup.offlineCache:v1";
|
||||||
|
|
||||||
|
function safeLocalStorage(): Storage | null {
|
||||||
|
if (typeof window === "undefined") {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
const { localStorage } = window;
|
||||||
|
const probeKey = "__walkup_cache_probe__";
|
||||||
|
localStorage.setItem(probeKey, "1");
|
||||||
|
localStorage.removeItem(probeKey);
|
||||||
|
return localStorage;
|
||||||
|
} catch {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function readStore(): CacheStore {
|
||||||
|
const storage = safeLocalStorage();
|
||||||
|
if (!storage) {
|
||||||
|
return { version: 1, entries: {} };
|
||||||
|
}
|
||||||
|
|
||||||
|
const raw = storage.getItem(STORAGE_KEY);
|
||||||
|
if (!raw) {
|
||||||
|
return { version: 1, entries: {} };
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
const parsed = JSON.parse(raw) as Partial<CacheStore>;
|
||||||
|
if (parsed.version !== 1 || !parsed.entries || typeof parsed.entries !== "object") {
|
||||||
|
return { version: 1, entries: {} };
|
||||||
|
}
|
||||||
|
return {
|
||||||
|
version: 1,
|
||||||
|
entries: parsed.entries as Record<string, CacheEntry<unknown>>,
|
||||||
|
};
|
||||||
|
} catch {
|
||||||
|
return { version: 1, entries: {} };
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function writeStore(store: CacheStore): void {
|
||||||
|
const storage = safeLocalStorage();
|
||||||
|
if (!storage) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
storage.setItem(STORAGE_KEY, JSON.stringify(store));
|
||||||
|
} catch {
|
||||||
|
// Ignore quota and storage errors. The app can still operate online.
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function cacheKeyFromParts(parts: readonly unknown[]): string {
|
||||||
|
return JSON.stringify(parts);
|
||||||
|
}
|
||||||
|
|
||||||
|
export function readCachedValue<T>(parts: readonly unknown[]): CacheEntry<T> | null {
|
||||||
|
const store = readStore();
|
||||||
|
const entry = store.entries[cacheKeyFromParts(parts)];
|
||||||
|
return entry ? (entry as CacheEntry<T>) : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
export function writeCachedValue<T>(parts: readonly unknown[], data: T, etag?: string): void {
|
||||||
|
const store = readStore();
|
||||||
|
store.entries[cacheKeyFromParts(parts)] = {
|
||||||
|
cachedAt: new Date().toISOString(),
|
||||||
|
data,
|
||||||
|
etag,
|
||||||
|
};
|
||||||
|
writeStore(store);
|
||||||
|
}
|
||||||
|
|
||||||
|
export function clearOfflineCache(): void {
|
||||||
|
const storage = safeLocalStorage();
|
||||||
|
if (!storage) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
storage.removeItem(STORAGE_KEY);
|
||||||
|
}
|
||||||
|
|
||||||
|
async function readResponseText(response: Response): Promise<string> {
|
||||||
|
try {
|
||||||
|
return await response.text();
|
||||||
|
} catch {
|
||||||
|
return "";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
export async function cachedJsonRequest<T>(
|
||||||
|
parts: readonly unknown[],
|
||||||
|
url: string,
|
||||||
|
init?: RequestInit,
|
||||||
|
options?: {
|
||||||
|
onUnauthorized?: () => T;
|
||||||
|
},
|
||||||
|
): Promise<T> {
|
||||||
|
const cached = readCachedValue<T>(parts);
|
||||||
|
const headers = new Headers(init?.headers);
|
||||||
|
if (cached?.etag) {
|
||||||
|
headers.set("If-None-Match", cached.etag);
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
const response = await fetch(url, {
|
||||||
|
...init,
|
||||||
|
headers,
|
||||||
|
cache: "no-cache",
|
||||||
|
credentials: "include",
|
||||||
|
});
|
||||||
|
|
||||||
|
if (response.status === 304) {
|
||||||
|
if (!cached) {
|
||||||
|
throw new Error("Cache validation returned 304 without a cached response.");
|
||||||
|
}
|
||||||
|
return cached.data;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!response.ok) {
|
||||||
|
if ((response.status === 401 || response.status === 403) && options?.onUnauthorized) {
|
||||||
|
return options.onUnauthorized();
|
||||||
|
}
|
||||||
|
throw new Error((await readResponseText(response)) || `Request failed: ${response.status}`);
|
||||||
|
}
|
||||||
|
|
||||||
|
const data = (await response.json()) as T;
|
||||||
|
writeCachedValue(parts, data, response.headers.get("etag") ?? undefined);
|
||||||
|
return data;
|
||||||
|
} catch (error) {
|
||||||
|
if (cached && error instanceof TypeError) {
|
||||||
|
return cached.data;
|
||||||
|
}
|
||||||
|
throw error;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -2,6 +2,7 @@ import { FormEvent, useState } from "react";
|
|||||||
import { useNavigate } from "react-router-dom";
|
import { useNavigate } from "react-router-dom";
|
||||||
|
|
||||||
import { api } from "../api/client";
|
import { api } from "../api/client";
|
||||||
|
import { clearOfflineCache } from "../lib/offlineCache";
|
||||||
import { queryClient } from "../lib/queryClient";
|
import { queryClient } from "../lib/queryClient";
|
||||||
|
|
||||||
export function AdminPage() {
|
export function AdminPage() {
|
||||||
@@ -15,7 +16,8 @@ export function AdminPage() {
|
|||||||
setError(null);
|
setError(null);
|
||||||
try {
|
try {
|
||||||
await api.adminLogin({ username, password });
|
await api.adminLogin({ username, password });
|
||||||
await queryClient.invalidateQueries({ queryKey: ["session"] });
|
clearOfflineCache();
|
||||||
|
queryClient.clear();
|
||||||
navigate("/");
|
navigate("/");
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
setError(err instanceof Error ? err.message : "Unable to sign in");
|
setError(err instanceof Error ? err.message : "Unable to sign in");
|
||||||
|
|||||||
@@ -33,16 +33,22 @@ export function GamePage() {
|
|||||||
queryKey: ["clips", teamId, playerId, "visible"],
|
queryKey: ["clips", teamId, playerId, "visible"],
|
||||||
queryFn: () => api.listClips(teamId, playerId),
|
queryFn: () => api.listClips(teamId, playerId),
|
||||||
enabled: Boolean(teamId && playerId),
|
enabled: Boolean(teamId && playerId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
const assignmentsQuery = useQuery({
|
const assignmentsQuery = useQuery({
|
||||||
queryKey: ["assignments", selectedGameId, playerId],
|
queryKey: ["assignments", selectedGameId, playerId],
|
||||||
queryFn: () => api.listAssignments(selectedGameId, playerId),
|
queryFn: () => api.listAssignments(selectedGameId, playerId),
|
||||||
enabled: Boolean(selectedGameId && playerId),
|
enabled: Boolean(selectedGameId && playerId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
const prepQuery = useQuery({
|
const prepQuery = useQuery({
|
||||||
queryKey: ["prep", selectedGameId],
|
queryKey: ["prep", selectedGameId],
|
||||||
queryFn: () => api.prepareGame(selectedGameId),
|
queryFn: () => api.prepareGame(selectedGameId),
|
||||||
enabled: Boolean(selectedGameId),
|
enabled: Boolean(selectedGameId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
|
|
||||||
const saveMutation = useMutation({
|
const saveMutation = useMutation({
|
||||||
|
|||||||
@@ -117,6 +117,7 @@ export function GamedayPage() {
|
|||||||
queryFn: () => api.listAssignments(resolvedSelectedGameId),
|
queryFn: () => api.listAssignments(resolvedSelectedGameId),
|
||||||
enabled: Boolean(resolvedSelectedGameId),
|
enabled: Boolean(resolvedSelectedGameId),
|
||||||
retry: 0,
|
retry: 0,
|
||||||
|
networkMode: "always",
|
||||||
});
|
});
|
||||||
|
|
||||||
const preparedGame = resolvedSelectedGameId ? loadPreparedGame(resolvedSelectedGameId) : null;
|
const preparedGame = resolvedSelectedGameId ? loadPreparedGame(resolvedSelectedGameId) : null;
|
||||||
@@ -126,12 +127,16 @@ export function GamedayPage() {
|
|||||||
queryKey: ["teamsnap", "eventLineup", teamId, resolvedSelectedGameId],
|
queryKey: ["teamsnap", "eventLineup", teamId, resolvedSelectedGameId],
|
||||||
queryFn: () => teamsnapClient.loadEventLineupData(teamId, resolvedSelectedGameId),
|
queryFn: () => teamsnapClient.loadEventLineupData(teamId, resolvedSelectedGameId),
|
||||||
enabled: Boolean(teamId && resolvedSelectedGameId),
|
enabled: Boolean(teamId && resolvedSelectedGameId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
|
|
||||||
const availabilityQuery = useQuery({
|
const availabilityQuery = useQuery({
|
||||||
queryKey: ["teamsnap", "availabilities", teamId, resolvedSelectedGameId],
|
queryKey: ["teamsnap", "availabilities", teamId, resolvedSelectedGameId],
|
||||||
queryFn: () => teamsnapClient.loadAvailabilities(teamId, resolvedSelectedGameId),
|
queryFn: () => teamsnapClient.loadAvailabilities(teamId, resolvedSelectedGameId),
|
||||||
enabled: Boolean(teamId && resolvedSelectedGameId),
|
enabled: Boolean(teamId && resolvedSelectedGameId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
|
|
||||||
const orderedMembers = useMemo(
|
const orderedMembers = useMemo(
|
||||||
@@ -428,6 +433,8 @@ function LibraryClips({
|
|||||||
queryKey: ["clips", teamId, playerId, "visible"],
|
queryKey: ["clips", teamId, playerId, "visible"],
|
||||||
queryFn: () => api.listClips(teamId, playerId),
|
queryFn: () => api.listClips(teamId, playerId),
|
||||||
enabled: Boolean(teamId && playerId),
|
enabled: Boolean(teamId && playerId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
|
|
||||||
if (fallbackClipsQuery.isLoading) {
|
if (fallbackClipsQuery.isLoading) {
|
||||||
|
|||||||
@@ -71,16 +71,22 @@ export function LibraryPage() {
|
|||||||
queryKey: ["assets", teamId, playerId],
|
queryKey: ["assets", teamId, playerId],
|
||||||
queryFn: () => api.listAssets(teamId, playerId),
|
queryFn: () => api.listAssets(teamId, playerId),
|
||||||
enabled: Boolean(teamId && playerId),
|
enabled: Boolean(teamId && playerId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
const clipsQuery = useQuery({
|
const clipsQuery = useQuery({
|
||||||
queryKey: clipsQueryKey(teamId, playerId, true),
|
queryKey: clipsQueryKey(teamId, playerId, true),
|
||||||
queryFn: () => api.listClips(teamId, playerId, true),
|
queryFn: () => api.listClips(teamId, playerId, true),
|
||||||
enabled: Boolean(teamId && playerId),
|
enabled: Boolean(teamId && playerId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
const pinsQuery = useQuery({
|
const pinsQuery = useQuery({
|
||||||
queryKey: ["pins", teamId, playerId],
|
queryKey: ["pins", teamId, playerId],
|
||||||
queryFn: () => api.listPins(playerId),
|
queryFn: () => api.listPins(playerId),
|
||||||
enabled: Boolean(playerId),
|
enabled: Boolean(playerId),
|
||||||
|
networkMode: "always",
|
||||||
|
retry: 0,
|
||||||
});
|
});
|
||||||
const orderedClips = useMemo(
|
const orderedClips = useMemo(
|
||||||
() =>
|
() =>
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ import { useNavigate } from "react-router-dom";
|
|||||||
|
|
||||||
import { api } from "../api/client";
|
import { api } from "../api/client";
|
||||||
import { useWalkupContext } from "../hooks/useWalkupContext";
|
import { useWalkupContext } from "../hooks/useWalkupContext";
|
||||||
|
import { clearOfflineCache } from "../lib/offlineCache";
|
||||||
import { formatMemberName, formatTeamLabel } from "../lib/teamsnapHelpers";
|
import { formatMemberName, formatTeamLabel } from "../lib/teamsnapHelpers";
|
||||||
import { queryClient } from "../lib/queryClient";
|
import { queryClient } from "../lib/queryClient";
|
||||||
|
|
||||||
@@ -12,8 +13,8 @@ export function ProfilePage() {
|
|||||||
const logoutMutation = useMutation({
|
const logoutMutation = useMutation({
|
||||||
mutationFn: api.logout,
|
mutationFn: api.logout,
|
||||||
onSuccess: async () => {
|
onSuccess: async () => {
|
||||||
await queryClient.invalidateQueries({ queryKey: ["session"] });
|
clearOfflineCache();
|
||||||
await queryClient.removeQueries({ queryKey: ["teamsnap"] });
|
queryClient.clear();
|
||||||
navigate("/signin");
|
navigate("/signin");
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|||||||
@@ -12,6 +12,24 @@ export default defineConfig(({ mode }) => {
|
|||||||
VitePWA({
|
VitePWA({
|
||||||
registerType: "autoUpdate",
|
registerType: "autoUpdate",
|
||||||
includeAssets: ["icon.svg"],
|
includeAssets: ["icon.svg"],
|
||||||
|
workbox: {
|
||||||
|
runtimeCaching: [
|
||||||
|
{
|
||||||
|
urlPattern: ({ url }) => url.pathname.startsWith("/api/media/files/"),
|
||||||
|
handler: "CacheFirst",
|
||||||
|
options: {
|
||||||
|
cacheName: "walkup-media",
|
||||||
|
cacheableResponse: {
|
||||||
|
statuses: [200],
|
||||||
|
},
|
||||||
|
expiration: {
|
||||||
|
maxEntries: 200,
|
||||||
|
maxAgeSeconds: 60 * 60 * 24 * 30,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
],
|
||||||
|
},
|
||||||
manifest: {
|
manifest: {
|
||||||
name: "Walkup",
|
name: "Walkup",
|
||||||
short_name: "Walkup",
|
short_name: "Walkup",
|
||||||
|
|||||||
Reference in New Issue
Block a user