Fix invite flow, dashboard 500, and RLS policy errors
All checks were successful
Build and Push Docker Images / build-portal (push) Successful in 1m49s
Build and Push Docker Images / build-infra (docker/db, monacousa-db) (push) Successful in 1m4s
Build and Push Docker Images / build-infra (docker/kong, monacousa-kong) (push) Successful in 24s
Build and Push Docker Images / build-infra (docker/migrate, monacousa-migrate) (push) Successful in 1m3s
All checks were successful
Build and Push Docker Images / build-portal (push) Successful in 1m49s
Build and Push Docker Images / build-infra (docker/db, monacousa-db) (push) Successful in 1m4s
Build and Push Docker Images / build-infra (docker/kong, monacousa-kong) (push) Successful in 24s
Build and Push Docker Images / build-infra (docker/migrate, monacousa-migrate) (push) Successful in 1m3s
- Fix auth verify handler to read token_hash (GoTrue param name) instead of token, and verify OTP server-side before redirecting - Fix reset-password page to handle both token_hash and pre-existing session from verify handler - Fix intermittent dashboard 500 by adding error handling and retry to members_with_dues query in safeGetSession - Fix RLS policies using members.user_id (nonexistent) → members.id for cron_execution_logs and bulk_emails tables Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -382,7 +382,7 @@ BEGIN
|
||||
IF NOT EXISTS (SELECT 1 FROM pg_policy WHERE polrelid = 'public.cron_execution_logs'::regclass AND polname = 'Admins can read cron logs') THEN
|
||||
CREATE POLICY "Admins can read cron logs"
|
||||
ON public.cron_execution_logs FOR SELECT TO authenticated
|
||||
USING (EXISTS (SELECT 1 FROM public.members WHERE members.user_id = auth.uid() AND members.role = 'admin'));
|
||||
USING (EXISTS (SELECT 1 FROM public.members WHERE members.id = auth.uid() AND members.role = 'admin'));
|
||||
END IF;
|
||||
IF NOT EXISTS (SELECT 1 FROM pg_policy WHERE polrelid = 'public.cron_execution_logs'::regclass AND polname = 'Service role can manage cron logs') THEN
|
||||
CREATE POLICY "Service role can manage cron logs"
|
||||
@@ -417,7 +417,7 @@ BEGIN
|
||||
IF NOT EXISTS (SELECT 1 FROM pg_policy WHERE polrelid = 'public.bulk_emails'::regclass AND polname = 'Admins can manage bulk emails') THEN
|
||||
CREATE POLICY "Admins can manage bulk emails"
|
||||
ON public.bulk_emails FOR ALL TO authenticated
|
||||
USING (EXISTS (SELECT 1 FROM public.members WHERE members.user_id = auth.uid() AND members.role = 'admin'));
|
||||
USING (EXISTS (SELECT 1 FROM public.members WHERE members.id = auth.uid() AND members.role = 'admin'));
|
||||
END IF;
|
||||
IF NOT EXISTS (SELECT 1 FROM pg_policy WHERE polrelid = 'public.bulk_emails'::regclass AND polname = 'Service role full access to bulk emails') THEN
|
||||
CREATE POLICY "Service role full access to bulk emails"
|
||||
|
||||
Reference in New Issue
Block a user