Implement user isolation for session queue and socket events #30
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
Multi-user setups were leaking queue events and field values across users. When User A started a generation, User B would see the preview/progress events and generated images would appear on both boards. Field values from any user's queue items were visible to all users.
Backend:
user_id,is_admin)sanitize_queue_item_for_user()clears values for non-admins viewing others' itemsLEFT JOIN usersto fetch display namesFrontend:
Example socket event filtering logic:
Related Issues / Discussions
Addresses enhancement request for multi-user isolation improvements.
QA Instructions
Multi-user event isolation:
Field value privacy:
User display:
Merge Plan
TypeScript types must be regenerated after merge:
Checklist
What's Newcopy (if doing a release after this PR)Original prompt
✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.