Some checks failed
CI/CD Pipeline / Backend Tests (push) Has been cancelled
CI/CD Pipeline / Frontend Tests (push) Has been cancelled
CI/CD Pipeline / Build Docker Images (push) Has been cancelled
CI/CD Pipeline / Security Scan (push) Has been cancelled
CI/CD Pipeline / Deploy to Staging (push) Has been cancelled
CI/CD Pipeline / Deploy to Production (push) Has been cancelled
Complete rewrite from Express to NestJS with enterprise-grade features: ## Backend Improvements - Migrated from Express to NestJS 11.0.1 with TypeScript - Implemented Prisma ORM 7.3.0 for type-safe database access - Added CASL authorization system replacing role-based guards - Created global exception filters with structured logging - Implemented Auth0 JWT authentication with Passport.js - Added vehicle management with conflict detection - Enhanced event scheduling with driver/vehicle assignment - Comprehensive error handling and logging ## Frontend Improvements - Upgraded to React 19.2.0 with Vite 7.2.4 - Implemented CASL-based permission system - Added AbilityContext for declarative permissions - Created ErrorHandler utility for consistent error messages - Enhanced API client with request/response logging - Added War Room (Command Center) dashboard - Created VIP Schedule view with complete itineraries - Implemented Vehicle Management UI - Added mock data generators for testing (288 events across 20 VIPs) ## New Features - Vehicle fleet management (types, capacity, status tracking) - Complete 3-day Jamboree schedule generation - Individual VIP schedule pages with PDF export (planned) - Real-time War Room dashboard with auto-refresh - Permission-based navigation filtering - First user auto-approval as administrator ## Documentation - Created CASL_AUTHORIZATION.md (comprehensive guide) - Created ERROR_HANDLING.md (error handling patterns) - Updated CLAUDE.md with new architecture - Added migration guides and best practices ## Technical Debt Resolved - Removed custom authentication in favor of Auth0 - Replaced role checks with CASL abilities - Standardized error responses across API - Implemented proper TypeScript typing - Added comprehensive logging Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2.6 KiB
2.6 KiB
Keycloak Integration Complete! 🎉
✅ What Was Changed
Backend
- Created
backend/src/config/keycloak.ts- Keycloak JWT validation configuration - Updated
backend/src/routes/auth.ts- Replaced Auth0 routes with Keycloak - Updated
backend/src/services/userService.ts- Uses Keycloak user info API - Updated
backend/src/middleware/auth.ts- Uses Keycloak config - Updated
backend/src/index.ts- Uses Keycloak JWT middleware - Updated
backend/.env- Replaced Auth0 vars with Keycloak vars - Updated
docker-compose.dev.yml- Added Keycloak service, updated env vars
Frontend
- Created
frontend/src/contexts/KeycloakContext.tsx- Keycloak React provider - Updated
frontend/src/main.tsx- Uses KeycloakProvider instead of Auth0Provider - Updated
frontend/src/App.tsx- Uses useKeycloak hook - Updated
frontend/src/components/Login.tsx- Uses Keycloak login - Updated
frontend/src/pages/PendingApproval.tsx- Uses Keycloak token - Updated
frontend/src/hooks/useAuthToken.ts- Uses Keycloak token - Updated
frontend/package.json- Replaced @auth0/auth0-react with keycloak-js - Updated
frontend/.env- Replaced Auth0 vars with Keycloak vars - Updated
docker-compose.dev.yml- Updated frontend env vars
🔧 Environment Variables
Backend (.env)
KEYCLOAK_SERVER_URL=http://localhost:8080
KEYCLOAK_REALM=vip-coordinator
KEYCLOAK_CLIENT_ID=vip-coordinator-frontend
Frontend (.env)
VITE_KEYCLOAK_URL=http://localhost:8080
VITE_KEYCLOAK_REALM=vip-coordinator
VITE_KEYCLOAK_CLIENT_ID=vip-coordinator-frontend
🚀 Next Steps
-
Rebuild containers:
docker compose -f docker-compose.dev.yml build docker compose -f docker-compose.dev.yml up -d -
Install frontend dependencies:
cd frontend npm install -
Test the login flow:
- Go to http://localhost:5173
- Click "Sign In with Keycloak"
- Login with Keycloak credentials
- First user becomes administrator
📝 Notes
- Database column
auth0_substill exists (stores Keycloaksubnow) identity_providercolumn set to 'keycloak' for new users- All Auth0 dependencies removed from package.json
- Keycloak runs on port 8080
- Admin console: http://localhost:8080 (admin/admin)
🐛 Troubleshooting
If you see errors:
- Make sure Keycloak is running:
docker ps | grep keycloak - Check Keycloak logs:
docker logs vip-coordinator-keycloak-1 - Verify realm and client exist in Keycloak admin console
- Check browser console for frontend errors