CRITICAL FIX: Server would CRASH ON STARTUP (multiple import errors)
REMOVED (2 scripts):
1. scripts/framework-watchdog.js
- Monitored .claude/session-state.json (OUR Claude Code setup)
- Monitored .claude/token-checkpoints.json (OUR file structure)
- Implementers won't have our .claude/ directory
2. scripts/init-db.js
- Created website collections: blog_posts, media_inquiries, case_submissions
- Created website collections: resources, moderation_queue, users, citations
- Created website collections: translations, koha_donations
- Next steps referenced deleted scripts (npm run seed:admin)
REWRITTEN (2 files):
src/models/index.js (29 lines → 27 lines)
- REMOVED imports: Document, BlogPost, MediaInquiry, CaseSubmission, Resource
- REMOVED imports: ModerationQueue, User (all deleted in Phase 2)
- KEPT imports: AuditLog, DeliberationSession, GovernanceLog, GovernanceRule
- KEPT imports: Precedent, Project, SessionState, VariableValue, VerificationLog
- Result: Only framework models exported
src/server.js (284 lines → 163 lines, 43% reduction)
- REMOVED: Imports to deleted middleware (csrf-protection, response-sanitization)
- REMOVED: Stripe webhook handling (/api/koha/webhook)
- REMOVED: Static file caching (for deleted public/ directory)
- REMOVED: Static file serving (public/ deleted in Phase 6)
- REMOVED: CSRF token endpoint
- REMOVED: Website homepage with "auth, documents, blog, admin" references
- REMOVED: Instruction sync (scripts/sync-instructions-to-db.js reference)
- REMOVED: Hardcoded log path (${process.env.HOME}/var/log/tractatus/...)
- REMOVED: Website-specific security middleware
- KEPT: Security headers, rate limiting, CORS, body parsers
- KEPT: API routes, governance services, MongoDB connections
- RESULT: Clean framework-only server
RESULT: Repository can now start without crashes, all imports resolve
🤖 Generated with Claude Code
Co-Authored-By: Claude <noreply@anthropic.com>
31 lines
768 B
JavaScript
31 lines
768 B
JavaScript
#!/usr/bin/env node
|
|
/**
|
|
* Generate Test JWT Token
|
|
* Creates a valid JWT token for testing Rule Manager API
|
|
*/
|
|
|
|
require('dotenv').config();
|
|
const jwt = require('jsonwebtoken');
|
|
|
|
const JWT_SECRET = process.env.JWT_SECRET;
|
|
const JWT_EXPIRY = process.env.JWT_EXPIRY || '7d';
|
|
|
|
// Admin user from database
|
|
const payload = {
|
|
userId: '68e3a6fb21af2fd194bf4b50',
|
|
email: 'admin@tractatus.local',
|
|
role: 'admin'
|
|
};
|
|
|
|
const token = jwt.sign(payload, JWT_SECRET, {
|
|
expiresIn: JWT_EXPIRY,
|
|
audience: 'tractatus-admin',
|
|
issuer: 'tractatus'
|
|
});
|
|
|
|
console.log('\n=== Test JWT Token ===\n');
|
|
console.log('Token:', token);
|
|
console.log('\nUse in Authorization header:');
|
|
console.log(`Authorization: Bearer ${token}`);
|
|
console.log('\nExpires in:', JWT_EXPIRY);
|
|
console.log('');
|