Major Enhancement: NestJS Migration + CASL Authorization + Error Handling
Some checks failed
CI/CD Pipeline / Backend Tests (push) Has been cancelled
CI/CD Pipeline / Frontend Tests (push) Has been cancelled
CI/CD Pipeline / Build Docker Images (push) Has been cancelled
CI/CD Pipeline / Security Scan (push) Has been cancelled
CI/CD Pipeline / Deploy to Staging (push) Has been cancelled
CI/CD Pipeline / Deploy to Production (push) Has been cancelled
Some checks failed
CI/CD Pipeline / Backend Tests (push) Has been cancelled
CI/CD Pipeline / Frontend Tests (push) Has been cancelled
CI/CD Pipeline / Build Docker Images (push) Has been cancelled
CI/CD Pipeline / Security Scan (push) Has been cancelled
CI/CD Pipeline / Deploy to Staging (push) Has been cancelled
CI/CD Pipeline / Deploy to Production (push) Has been cancelled
Complete rewrite from Express to NestJS with enterprise-grade features: ## Backend Improvements - Migrated from Express to NestJS 11.0.1 with TypeScript - Implemented Prisma ORM 7.3.0 for type-safe database access - Added CASL authorization system replacing role-based guards - Created global exception filters with structured logging - Implemented Auth0 JWT authentication with Passport.js - Added vehicle management with conflict detection - Enhanced event scheduling with driver/vehicle assignment - Comprehensive error handling and logging ## Frontend Improvements - Upgraded to React 19.2.0 with Vite 7.2.4 - Implemented CASL-based permission system - Added AbilityContext for declarative permissions - Created ErrorHandler utility for consistent error messages - Enhanced API client with request/response logging - Added War Room (Command Center) dashboard - Created VIP Schedule view with complete itineraries - Implemented Vehicle Management UI - Added mock data generators for testing (288 events across 20 VIPs) ## New Features - Vehicle fleet management (types, capacity, status tracking) - Complete 3-day Jamboree schedule generation - Individual VIP schedule pages with PDF export (planned) - Real-time War Room dashboard with auto-refresh - Permission-based navigation filtering - First user auto-approval as administrator ## Documentation - Created CASL_AUTHORIZATION.md (comprehensive guide) - Created ERROR_HANDLING.md (error handling patterns) - Updated CLAUDE.md with new architecture - Added migration guides and best practices ## Technical Debt Resolved - Removed custom authentication in favor of Auth0 - Replaced role checks with CASL abilities - Standardized error responses across API - Implemented proper TypeScript typing - Added comprehensive logging Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
158
backend-old-20260125/dist/services/jwtKeyManager.js
vendored
Normal file
158
backend-old-20260125/dist/services/jwtKeyManager.js
vendored
Normal file
@@ -0,0 +1,158 @@
|
||||
"use strict";
|
||||
var __importDefault = (this && this.__importDefault) || function (mod) {
|
||||
return (mod && mod.__esModule) ? mod : { "default": mod };
|
||||
};
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.jwtKeyManager = void 0;
|
||||
const crypto_1 = __importDefault(require("crypto"));
|
||||
const jsonwebtoken_1 = __importDefault(require("jsonwebtoken"));
|
||||
class JWTKeyManager {
|
||||
constructor() {
|
||||
this.previousSecret = null;
|
||||
this.rotationInterval = null;
|
||||
this.gracePeriodTimeout = null;
|
||||
console.log('🔑 Initializing JWT Key Manager with automatic rotation');
|
||||
this.currentSecret = this.generateSecret();
|
||||
this.startRotation();
|
||||
}
|
||||
generateSecret() {
|
||||
const secret = crypto_1.default.randomBytes(64).toString('hex');
|
||||
console.log('🔄 Generated new JWT signing key (length:', secret.length, 'chars)');
|
||||
return secret;
|
||||
}
|
||||
startRotation() {
|
||||
// Rotate every 24 hours (86400000 ms)
|
||||
this.rotationInterval = setInterval(() => {
|
||||
this.rotateKey();
|
||||
}, 24 * 60 * 60 * 1000);
|
||||
console.log('⏰ JWT key rotation scheduled every 24 hours');
|
||||
// Also rotate on startup after 1 hour to test the system
|
||||
setTimeout(() => {
|
||||
console.log('🧪 Performing initial key rotation test...');
|
||||
this.rotateKey();
|
||||
}, 60 * 60 * 1000); // 1 hour
|
||||
}
|
||||
rotateKey() {
|
||||
console.log('🔄 Rotating JWT signing key...');
|
||||
// Store current secret as previous
|
||||
this.previousSecret = this.currentSecret;
|
||||
// Generate new current secret
|
||||
this.currentSecret = this.generateSecret();
|
||||
console.log('✅ JWT key rotation completed. Grace period: 24 hours');
|
||||
// Clear any existing grace period timeout
|
||||
if (this.gracePeriodTimeout) {
|
||||
clearTimeout(this.gracePeriodTimeout);
|
||||
}
|
||||
// Clean up previous secret after 24 hours (grace period)
|
||||
this.gracePeriodTimeout = setTimeout(() => {
|
||||
this.previousSecret = null;
|
||||
console.log('🧹 Grace period ended. Previous JWT key cleaned up');
|
||||
}, 24 * 60 * 60 * 1000);
|
||||
}
|
||||
generateToken(user) {
|
||||
const payload = {
|
||||
id: user.id,
|
||||
google_id: user.google_id,
|
||||
email: user.email,
|
||||
name: user.name,
|
||||
profile_picture_url: user.profile_picture_url,
|
||||
role: user.role,
|
||||
status: user.status,
|
||||
approval_status: user.approval_status,
|
||||
onboardingData: user.onboardingData,
|
||||
iat: Math.floor(Date.now() / 1000) // Issued at time
|
||||
};
|
||||
return jsonwebtoken_1.default.sign(payload, this.currentSecret, {
|
||||
expiresIn: '24h',
|
||||
issuer: 'vip-coordinator',
|
||||
audience: 'vip-coordinator-users'
|
||||
});
|
||||
}
|
||||
verifyToken(token) {
|
||||
try {
|
||||
// Try current secret first
|
||||
const decoded = jsonwebtoken_1.default.verify(token, this.currentSecret, {
|
||||
issuer: 'vip-coordinator',
|
||||
audience: 'vip-coordinator-users'
|
||||
});
|
||||
return {
|
||||
id: decoded.id,
|
||||
google_id: decoded.google_id,
|
||||
email: decoded.email,
|
||||
name: decoded.name,
|
||||
profile_picture_url: decoded.profile_picture_url,
|
||||
role: decoded.role,
|
||||
status: decoded.status,
|
||||
approval_status: decoded.approval_status,
|
||||
onboardingData: decoded.onboardingData
|
||||
};
|
||||
}
|
||||
catch (error) {
|
||||
// Try previous secret during grace period
|
||||
if (this.previousSecret) {
|
||||
try {
|
||||
const decoded = jsonwebtoken_1.default.verify(token, this.previousSecret, {
|
||||
issuer: 'vip-coordinator',
|
||||
audience: 'vip-coordinator-users'
|
||||
});
|
||||
console.log('🔄 Token verified using previous key (grace period)');
|
||||
return {
|
||||
id: decoded.id,
|
||||
google_id: decoded.google_id,
|
||||
email: decoded.email,
|
||||
name: decoded.name,
|
||||
profile_picture_url: decoded.profile_picture_url,
|
||||
role: decoded.role,
|
||||
status: decoded.status,
|
||||
approval_status: decoded.approval_status,
|
||||
onboardingData: decoded.onboardingData
|
||||
};
|
||||
}
|
||||
catch (gracePeriodError) {
|
||||
console.log('❌ Token verification failed with both current and previous keys');
|
||||
return null;
|
||||
}
|
||||
}
|
||||
console.log('❌ Token verification failed:', error instanceof Error ? error.message : 'Unknown error');
|
||||
return null;
|
||||
}
|
||||
}
|
||||
// Get status for monitoring/debugging
|
||||
getStatus() {
|
||||
return {
|
||||
hasCurrentKey: !!this.currentSecret,
|
||||
hasPreviousKey: !!this.previousSecret,
|
||||
rotationActive: !!this.rotationInterval,
|
||||
gracePeriodActive: !!this.gracePeriodTimeout
|
||||
};
|
||||
}
|
||||
// Cleanup on shutdown
|
||||
destroy() {
|
||||
console.log('🛑 Shutting down JWT Key Manager...');
|
||||
if (this.rotationInterval) {
|
||||
clearInterval(this.rotationInterval);
|
||||
this.rotationInterval = null;
|
||||
}
|
||||
if (this.gracePeriodTimeout) {
|
||||
clearTimeout(this.gracePeriodTimeout);
|
||||
this.gracePeriodTimeout = null;
|
||||
}
|
||||
console.log('✅ JWT Key Manager shutdown complete');
|
||||
}
|
||||
// Manual rotation for testing/emergency
|
||||
forceRotation() {
|
||||
console.log('🚨 Manual key rotation triggered');
|
||||
this.rotateKey();
|
||||
}
|
||||
}
|
||||
// Singleton instance
|
||||
exports.jwtKeyManager = new JWTKeyManager();
|
||||
// Graceful shutdown handling
|
||||
process.on('SIGTERM', () => {
|
||||
exports.jwtKeyManager.destroy();
|
||||
});
|
||||
process.on('SIGINT', () => {
|
||||
exports.jwtKeyManager.destroy();
|
||||
});
|
||||
exports.default = exports.jwtKeyManager;
|
||||
//# sourceMappingURL=jwtKeyManager.js.map
|
||||
Reference in New Issue
Block a user