🔀 merge: auth/complete branch with Better Auth implementation

Merged auth/complete into main with resolved conflicts:
- Kept Better Auth system (EdDSA JWT via JWKS)
- Removed all Coolify references
- Added dev:auth and dev:chat:full scripts for auth development
- Combined zitare scripts from main with auth scripts
- Exported both feedback.schema and organizations.schema

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
Wuesteon 2025-12-01 15:25:38 +01:00
commit 8a43bbfc25
84 changed files with 13452 additions and 6778 deletions

View file

@ -1,722 +0,0 @@
/**
* Supabase Integration Test Suite
* Tests token sync with Supabase client, RLS policy validation, and storage operations with auth
*/
import { jest, describe, it, expect, beforeEach, afterEach } from '@jest/globals';
import { authService } from '../../services/authService';
import { tokenManager, TokenState } from '../../services/tokenManager';
import { setupTokenObservers } from '../../utils/fetchInterceptor';
import {
MOCK_TOKENS,
MOCK_USER_DATA,
MOCK_DEVICE_INFO,
mockFetchResponses,
MockResponseBuilder,
TestScenarioBuilder,
TokenStateObserver,
testUtils,
mockStorage,
} from '../utils/authTestUtils';
// Mock Supabase client
const mockSupabaseClient = {
auth: {
setSession: jest.fn(),
getSession: jest.fn(),
signOut: jest.fn(),
},
from: jest.fn(() => ({
select: jest.fn(() => ({
eq: jest.fn(() => ({
single: jest.fn(),
})),
})),
insert: jest.fn(),
update: jest.fn(),
delete: jest.fn(),
})),
storage: {
from: jest.fn(() => ({
upload: jest.fn(),
download: jest.fn(),
remove: jest.fn(),
list: jest.fn(),
})),
},
rpc: jest.fn(),
};
// Mock dependencies
jest.mock('../../utils/safeStorage', () => {
const { mockStorage } = jest.requireActual('../utils/authTestUtils') as any;
return {
safeStorage: mockStorage,
};
});
jest.mock('../../utils/deviceManager', () => {
const { MOCK_DEVICE_INFO } = jest.requireActual('../utils/authTestUtils') as any;
return {
DeviceManager: {
getDeviceInfo: jest.fn().mockResolvedValue(MOCK_DEVICE_INFO),
getStoredDeviceId: jest.fn().mockResolvedValue(MOCK_DEVICE_INFO.deviceId),
},
};
});
jest.mock('../../utils/supabaseClient', () => ({
updateSupabaseAuth: jest.fn(),
supabaseClient: mockSupabaseClient,
}));
jest.mock('../../utils/supabaseDataService', () => ({
initializeSupabaseAuth: jest.fn(),
}));
describe('Supabase Integration', () => {
let tokenObserver: TokenStateObserver;
let consoleMock: ReturnType<typeof testUtils.mockConsole>;
beforeEach(() => {
tokenObserver = new TokenStateObserver();
consoleMock = testUtils.mockConsole();
// Reset token manager state
tokenManager.reset();
// Clear storage
mockStorage.clear();
// Reset all mocks
jest.clearAllMocks();
// Reset fetch mocks
if (globalThis.fetch && typeof (globalThis.fetch as any).mockReset === 'function') {
(globalThis.fetch as jest.Mock).mockReset();
}
});
afterEach(() => {
consoleMock.restore();
});
describe('Token Sync with Supabase Client', () => {
it('should update Supabase auth when token becomes valid', async () => {
// Arrange
const { updateSupabaseAuth } = require('../../utils/supabaseClient');
mockStorage.setupValidTokens();
setupTokenObservers();
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
const token = await tokenManager.getValidToken();
// Wait for state transition
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.VALID));
// Assert
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
// Should update Supabase auth
await testUtils.waitFor(() => updateSupabaseAuth.mock.calls.length > 0);
expect(updateSupabaseAuth).toHaveBeenCalled();
} finally {
unsubscribe();
}
});
it('should handle Supabase auth update after token refresh', async () => {
// Arrange
const { updateSupabaseAuth } = require('../../utils/supabaseClient');
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
setupTokenObservers();
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
const token = await tokenManager.getValidToken();
// Wait for token refresh and state transition
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.REFRESHING));
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.VALID));
// Assert
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
// Should update Supabase auth after refresh
await testUtils.waitFor(() => updateSupabaseAuth.mock.calls.length > 0);
expect(updateSupabaseAuth).toHaveBeenCalled();
} finally {
unsubscribe();
}
});
it('should handle Supabase auth errors gracefully', async () => {
// Arrange
const { updateSupabaseAuth } = require('../../utils/supabaseClient');
updateSupabaseAuth.mockRejectedValue(new Error('Supabase auth error'));
mockStorage.setupValidTokens();
setupTokenObservers();
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
await tokenManager.getValidToken();
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.VALID));
// Wait for Supabase update attempt
await testUtils.waitFor(() => updateSupabaseAuth.mock.calls.length > 0);
// Assert - Should log error but not crash
expect(updateSupabaseAuth).toHaveBeenCalled();
expect(consoleMock.debugs.some(msg =>
msg.includes('Error updating Supabase auth from token observer')
)).toBe(true);
} finally {
unsubscribe();
}
});
it('should not update Supabase auth on expired token state', async () => {
// Arrange
const { updateSupabaseAuth } = require('../../utils/supabaseClient');
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenExpired().build();
}
return MockResponseBuilder.success().build();
});
setupTokenObservers();
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
await tokenManager.getValidToken();
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.EXPIRED));
// Wait a bit to ensure no Supabase update is called
await testUtils.sleep(200);
// Assert - Should not update Supabase auth for expired tokens
expect(updateSupabaseAuth).not.toHaveBeenCalled();
} finally {
unsubscribe();
}
});
});
describe('RLS Policy Validation with Refreshed Tokens', () => {
it('should validate RLS policies work with refreshed tokens', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
// Mock Supabase query that requires RLS
const mockQuery = mockSupabaseClient.from('test_table').select('*').eq('user_id', MOCK_USER_DATA.sub);
mockQuery.single.mockResolvedValue({
data: { id: 1, name: 'test', user_id: MOCK_USER_DATA.sub },
error: null,
});
// Act - Get valid token (will trigger refresh)
const token = await tokenManager.getValidToken();
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
// Simulate RLS-protected query
const result = await mockQuery.single();
// Assert
expect(result.data).toBeDefined();
expect(result.error).toBeNull();
expect(result.data.user_id).toBe(MOCK_USER_DATA.sub);
});
it('should handle RLS policy failures with expired tokens', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenExpired().build();
}
return MockResponseBuilder.success().build();
});
// Mock Supabase query that fails due to RLS
const mockQuery = mockSupabaseClient.from('test_table').select('*').eq('user_id', MOCK_USER_DATA.sub);
mockQuery.single.mockResolvedValue({
data: null,
error: {
message: 'JWT expired',
code: 'PGRST301',
},
});
// Act
const token = await tokenManager.getValidToken();
expect(token).toBeNull();
// Simulate RLS-protected query with expired token
const result = await mockQuery.single();
// Assert
expect(result.data).toBeNull();
expect(result.error).toBeDefined();
expect(result.error.code).toBe('PGRST301');
});
it('should retry queries after token refresh on RLS failures', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
let queryAttempts = 0;
const mockQuery = mockSupabaseClient.from('test_table').select('*').eq('user_id', MOCK_USER_DATA.sub);
mockQuery.single.mockImplementation(async () => {
queryAttempts++;
// First attempt fails with JWT expired
if (queryAttempts === 1) {
return {
data: null,
error: {
message: 'JWT expired',
code: 'PGRST301',
},
};
}
// Second attempt succeeds after token refresh
return {
data: { id: 1, name: 'test', user_id: MOCK_USER_DATA.sub },
error: null,
};
});
// Act - First get valid token
await tokenManager.getValidToken();
// First query fails
let result = await mockQuery.single();
expect(result.error?.code).toBe('PGRST301');
// Trigger token refresh and retry
await tokenManager.getValidToken();
result = await mockQuery.single();
// Assert - Second attempt should succeed
expect(result.data).toBeDefined();
expect(result.error).toBeNull();
expect(queryAttempts).toBe(2);
});
});
describe('Storage Operations with Auth', () => {
it('should perform storage operations with valid tokens', async () => {
// Arrange
mockStorage.setupValidTokens();
const mockStorageBucket = mockSupabaseClient.storage.from('test-bucket');
mockStorageBucket.upload.mockResolvedValue({
data: { path: 'test-file.jpg' },
error: null,
});
// Act
const token = await tokenManager.getValidToken();
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
const uploadResult = await mockStorageBucket.upload('test-file.jpg', new Blob(['test data']));
// Assert
expect(uploadResult.data).toBeDefined();
expect(uploadResult.error).toBeNull();
expect(uploadResult.data.path).toBe('test-file.jpg');
});
it('should handle storage operations with expired tokens', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenExpired().build();
}
return MockResponseBuilder.success().build();
});
const mockStorageBucket = mockSupabaseClient.storage.from('test-bucket');
mockStorageBucket.upload.mockResolvedValue({
data: null,
error: {
message: 'JWT expired',
statusCode: '401',
},
});
// Act
const token = await tokenManager.getValidToken();
expect(token).toBeNull();
const uploadResult = await mockStorageBucket.upload('test-file.jpg', new Blob(['test data']));
// Assert
expect(uploadResult.data).toBeNull();
expect(uploadResult.error).toBeDefined();
expect(uploadResult.error.statusCode).toBe('401');
});
it('should refresh tokens automatically during storage operations', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
let uploadAttempts = 0;
const mockStorageBucket = mockSupabaseClient.storage.from('test-bucket');
mockStorageBucket.upload.mockImplementation(async () => {
uploadAttempts++;
// First attempt fails with expired token
if (uploadAttempts === 1) {
return {
data: null,
error: {
message: 'JWT expired',
statusCode: '401',
},
};
}
// Second attempt succeeds after token refresh
return {
data: { path: 'test-file.jpg' },
error: null,
};
});
// Act - Get valid token (triggers refresh)
await tokenManager.getValidToken();
// First storage attempt fails
let result = await mockStorageBucket.upload('test-file.jpg', new Blob(['test data']));
expect(result.error?.statusCode).toBe('401');
// Get valid token again and retry
await tokenManager.getValidToken();
result = await mockStorageBucket.upload('test-file.jpg', new Blob(['test data']));
// Assert
expect(result.data).toBeDefined();
expect(result.error).toBeNull();
expect(uploadAttempts).toBe(2);
});
it('should handle storage download operations with auth', async () => {
// Arrange
mockStorage.setupValidTokens();
const mockStorageBucket = mockSupabaseClient.storage.from('test-bucket');
mockStorageBucket.download.mockResolvedValue({
data: new Blob(['test file content']),
error: null,
});
// Act
const token = await tokenManager.getValidToken();
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
const downloadResult = await mockStorageBucket.download('test-file.jpg');
// Assert
expect(downloadResult.data).toBeDefined();
expect(downloadResult.error).toBeNull();
expect(downloadResult.data).toBeInstanceOf(Blob);
});
it('should handle storage listing operations with auth', async () => {
// Arrange
mockStorage.setupValidTokens();
const mockStorageBucket = mockSupabaseClient.storage.from('test-bucket');
mockStorageBucket.list.mockResolvedValue({
data: [
{ name: 'file1.jpg', id: 'id1' },
{ name: 'file2.jpg', id: 'id2' },
],
error: null,
});
// Act
const token = await tokenManager.getValidToken();
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
const listResult = await mockStorageBucket.list('folder');
// Assert
expect(listResult.data).toBeDefined();
expect(listResult.error).toBeNull();
expect(listResult.data).toHaveLength(2);
expect(listResult.data[0].name).toBe('file1.jpg');
});
});
describe('Supabase Auth Session Management', () => {
it('should set Supabase session with valid tokens', async () => {
// Arrange
mockStorage.setupValidTokens();
const { updateSupabaseAuth } = require('../../utils/supabaseClient');
updateSupabaseAuth.mockImplementation(async () => {
await mockSupabaseClient.auth.setSession({
access_token: MOCK_TOKENS.VALID_APP_TOKEN,
refresh_token: MOCK_TOKENS.VALID_REFRESH_TOKEN,
});
});
setupTokenObservers();
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
await tokenManager.getValidToken();
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.VALID));
await testUtils.waitFor(() => updateSupabaseAuth.mock.calls.length > 0);
// Assert
expect(mockSupabaseClient.auth.setSession).toHaveBeenCalledWith({
access_token: MOCK_TOKENS.VALID_APP_TOKEN,
refresh_token: MOCK_TOKENS.VALID_REFRESH_TOKEN,
});
} finally {
unsubscribe();
}
});
it('should get Supabase session after auth update', async () => {
// Arrange
mockSupabaseClient.auth.getSession.mockResolvedValue({
data: {
session: {
access_token: MOCK_TOKENS.VALID_APP_TOKEN,
refresh_token: MOCK_TOKENS.VALID_REFRESH_TOKEN,
user: {
id: MOCK_USER_DATA.sub,
email: MOCK_USER_DATA.email,
},
},
},
error: null,
});
// Act
const sessionResult = await mockSupabaseClient.auth.getSession();
// Assert
expect(sessionResult.data.session).toBeDefined();
expect(sessionResult.error).toBeNull();
expect(sessionResult.data.session.access_token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
expect(sessionResult.data.session.user.id).toBe(MOCK_USER_DATA.sub);
});
it('should handle Supabase sign out', async () => {
// Arrange
mockSupabaseClient.auth.signOut.mockResolvedValue({
error: null,
});
// Act
const signOutResult = await mockSupabaseClient.auth.signOut();
// Assert
expect(signOutResult.error).toBeNull();
expect(mockSupabaseClient.auth.signOut).toHaveBeenCalled();
});
it('should handle Supabase session errors', async () => {
// Arrange
mockSupabaseClient.auth.getSession.mockResolvedValue({
data: { session: null },
error: {
message: 'No active session',
status: 401,
},
});
// Act
const sessionResult = await mockSupabaseClient.auth.getSession();
// Assert
expect(sessionResult.data.session).toBeNull();
expect(sessionResult.error).toBeDefined();
expect(sessionResult.error.message).toBe('No active session');
});
});
describe('Integration Error Scenarios', () => {
it('should handle Supabase client initialization failures', async () => {
// Arrange
const { initializeSupabaseAuth } = require('../../utils/supabaseDataService');
initializeSupabaseAuth.mockRejectedValue(new Error('Supabase initialization failed'));
mockStorage.setupValidTokens();
// Act & Assert - Should not crash the auth flow
const token = await tokenManager.getValidToken();
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
// Supabase initialization failure should be handled gracefully
expect(consoleMock.logs.some(msg =>
msg.includes('Supabase initialization skipped')
)).toBe(false); // This happens at a higher level
});
it('should handle mixed auth success and Supabase failures', async () => {
// Arrange
const { updateSupabaseAuth } = require('../../utils/supabaseClient');
updateSupabaseAuth.mockRejectedValue(new Error('Supabase update failed'));
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
setupTokenObservers();
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act - Token refresh should succeed even if Supabase update fails
const token = await tokenManager.getValidToken();
// Wait for states
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.VALID));
// Assert
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
// Supabase update should have been attempted and failed gracefully
await testUtils.waitFor(() => updateSupabaseAuth.mock.calls.length > 0);
expect(updateSupabaseAuth).toHaveBeenCalled();
expect(consoleMock.debugs.some(msg =>
msg.includes('Error updating Supabase auth from token observer')
)).toBe(true);
} finally {
unsubscribe();
}
});
it('should handle partial Supabase operations during token transitions', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let refreshComplete = false;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
await testUtils.sleep(200);
refreshComplete = true;
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
const mockQuery = mockSupabaseClient.from('test_table').select('*');
mockQuery.eq.mockImplementation(() => {
if (!refreshComplete) {
return {
single: jest.fn().mockResolvedValue({
data: null,
error: { message: 'JWT expired', code: 'PGRST301' },
}),
};
}
return {
single: jest.fn().mockResolvedValue({
data: { id: 1, name: 'test' },
error: null,
}),
};
});
// Act - Start refresh and immediately try to use Supabase
const tokenPromise = tokenManager.getValidToken();
// Try to query before refresh completes
const earlyResult = await mockQuery.eq('id', 1).single();
// Wait for refresh to complete
await tokenPromise;
// Try to query after refresh completes
const lateResult = await mockQuery.eq('id', 1).single();
// Assert
expect(earlyResult.error?.code).toBe('PGRST301');
expect(lateResult.data).toBeDefined();
expect(lateResult.error).toBeNull();
});
});
});

View file

@ -1,641 +0,0 @@
/**
* Token Refresh Flow Test Suite
* Tests all aspects of the token refresh system including race conditions and concurrent requests
*/
import { jest, describe, it, expect, beforeEach, afterEach } from '@jest/globals';
import { authService } from '../../services/authService';
import { tokenManager, TokenState } from '../../services/tokenManager';
import {
MOCK_TOKENS,
MOCK_USER_DATA,
MOCK_DEVICE_INFO,
mockFetchResponses,
MockResponseBuilder,
TestScenarioBuilder,
TokenStateObserver,
NetworkCondition,
testUtils,
mockStorage,
} from '../utils/authTestUtils';
// Mock dependencies
jest.mock('../../utils/safeStorage', () => {
const { mockStorage } = jest.requireActual('../utils/authTestUtils') as any;
return {
safeStorage: mockStorage,
};
});
jest.mock('../../utils/deviceManager', () => {
const { MOCK_DEVICE_INFO } = jest.requireActual('../utils/authTestUtils') as any;
return {
DeviceManager: {
getDeviceInfo: jest.fn().mockResolvedValue(MOCK_DEVICE_INFO),
getStoredDeviceId: jest.fn().mockResolvedValue(MOCK_DEVICE_INFO.deviceId),
},
};
});
jest.mock('../../utils/networkErrorUtils', () => ({
hasStableConnection: jest.fn().mockResolvedValue(true),
isDeviceConnected: jest.fn().mockResolvedValue(true),
}));
describe('Token Refresh Flow', () => {
let tokenObserver: TokenStateObserver;
let consoleMock: ReturnType<typeof testUtils.mockConsole>;
beforeEach(() => {
tokenObserver = new TokenStateObserver();
consoleMock = testUtils.mockConsole();
// Reset token manager state
tokenManager.reset();
// Clear storage
mockStorage.clear();
// Reset fetch mocks
if (globalThis.fetch && typeof (globalThis.fetch as any).mockReset === 'function') {
(globalThis.fetch as jest.Mock).mockReset();
}
});
afterEach(() => {
consoleMock.restore();
});
describe('Automatic Token Refresh', () => {
it.skip('should refresh token automatically on 401 response', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let callCount = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
// First call returns 401, second call succeeds
callCount++;
if (callCount === 1) {
return MockResponseBuilder.unauthorized('JWT expired').build();
}
return MockResponseBuilder.success({ data: 'success' }).build();
});
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act - Make a request that will trigger token refresh
const response = await tokenManager.handle401Response('http://localhost:3002/api/test', {
method: 'GET',
headers: { 'Authorization': `Bearer ${MOCK_TOKENS.EXPIRED_APP_TOKEN}` },
});
// Assert
expect(response.status).toBe(200);
expect(callCount).toBe(2); // One 401, one retry with new token
// Wait for token state update
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.REFRESHING));
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.VALID));
// Verify new token was stored
const newToken = await mockStorage.getItem('@auth/appToken');
expect(newToken).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
} finally {
unsubscribe();
}
});
it('should queue concurrent requests during token refresh', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let refreshCallCount = 0;
let apiCallCount = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
refreshCallCount++;
// Simulate slow refresh
await testUtils.sleep(500);
return mockFetchResponses.refreshTokenSuccess().build();
}
if (url.includes('/api/test')) {
apiCallCount++;
// Return success after refresh
return MockResponseBuilder.success({ data: `response-${apiCallCount}` }).build();
}
return MockResponseBuilder.unauthorized('JWT expired').build();
});
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act - Make multiple concurrent requests
const requests = [
tokenManager.handle401Response('http://localhost:3002/api/test1', { method: 'GET' }),
tokenManager.handle401Response('http://localhost:3002/api/test2', { method: 'GET' }),
tokenManager.handle401Response('http://localhost:3002/api/test3', { method: 'GET' }),
];
const responses = await Promise.all(requests);
// Assert
expect(refreshCallCount).toBe(1); // Only one refresh should occur
expect(responses).toHaveLength(3);
responses.forEach(response => {
expect(response.status).toBe(200);
});
// Verify token manager handled queuing correctly
const queueStatus = tokenManager.getQueueStatus();
expect(queueStatus.size).toBe(0); // Queue should be empty after processing
} finally {
unsubscribe();
}
});
it('should handle refresh token expiration', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenExpired().build();
}
return MockResponseBuilder.unauthorized('JWT expired').build();
});
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act & Assert
await expect(tokenManager.handle401Response('http://localhost:3002/api/test', { method: 'GET' }))
.rejects.toThrow('Invalid refresh token');
// Wait for state updates
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.EXPIRED));
// Verify tokens were cleared
const appToken = await mockStorage.getItem('@auth/appToken');
const refreshToken = await mockStorage.getItem('@auth/refreshToken');
expect(appToken).toBeNull();
expect(refreshToken).toBeNull();
} finally {
unsubscribe();
}
});
it('should detect device ID changes and handle appropriately', async () => {
// Arrange
mockStorage.setupExpiredTokens();
// Mock device ID mismatch
const { DeviceManager } = require('../../utils/deviceManager');
DeviceManager.getStoredDeviceId.mockResolvedValueOnce('old-device-id');
DeviceManager.getDeviceInfo.mockResolvedValueOnce({
...MOCK_DEVICE_INFO,
deviceId: 'new-device-id',
});
globalThis.fetch = jest.fn().mockImplementation(async () => {
return mockFetchResponses.refreshTokenDeviceChanged().build();
});
// Act & Assert
await expect(authService.refreshTokens(MOCK_TOKENS.VALID_REFRESH_TOKEN))
.rejects.toThrow('Device ID has changed');
});
});
describe('Token Refresh Race Conditions', () => {
it('should prevent multiple simultaneous refresh attempts', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let refreshCallCount = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
refreshCallCount++;
// Simulate slow refresh
await testUtils.sleep(300);
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
// Act - Start multiple refresh attempts simultaneously
const refreshPromises = [
tokenManager.getValidToken(),
tokenManager.getValidToken(),
tokenManager.getValidToken(),
];
const tokens = await Promise.all(refreshPromises);
// Assert
expect(refreshCallCount).toBe(1); // Only one refresh should occur
tokens.forEach(token => {
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
});
});
it('should handle refresh cooldown period', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
// Act - Make first refresh
const firstToken = await tokenManager.getValidToken();
expect(firstToken).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
// Try to refresh again immediately (should be in cooldown)
mockStorage.setItem('@auth/appToken', MOCK_TOKENS.EXPIRED_APP_TOKEN);
const secondToken = await tokenManager.getValidToken();
// Assert - Should get expired token due to cooldown
expect(secondToken).toBe(null);
});
it('should handle max refresh attempts', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let refreshCallCount = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
refreshCallCount++;
// Fail first few attempts, succeed on last
if (refreshCallCount <= 2) {
throw new Error('Network error');
}
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.unauthorized('JWT expired').build();
});
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
const token = await tokenManager.getValidToken();
// Assert
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
expect(refreshCallCount).toBeGreaterThan(1); // Multiple attempts made
} finally {
unsubscribe();
}
});
});
describe('Network Error Handling During Refresh', () => {
it('should retry refresh on network errors', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let attemptCount = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
attemptCount++;
if (attemptCount <= 2) {
throw new Error('Network request failed');
}
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
// Act
const token = await tokenManager.getValidToken();
// Assert
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
expect(attemptCount).toBe(3); // Should retry network failures
});
it('should not retry on auth errors', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let attemptCount = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
attemptCount++;
return mockFetchResponses.refreshTokenExpired().build();
}
return MockResponseBuilder.success().build();
});
// Act & Assert
const token = await tokenManager.getValidToken();
expect(token).toBe(null);
expect(attemptCount).toBe(1); // Should not retry auth errors
});
it('should handle offline state during refresh', async () => {
// Arrange
mockStorage.setupExpiredTokens();
const { isDeviceConnected } = require('../../utils/networkErrorUtils');
isDeviceConnected.mockResolvedValueOnce(false);
// Act
const token = await tokenManager.getValidToken();
// Assert - Should return current token if offline and it's not expired locally
expect(token).toBe(null);
});
it('should handle unstable connection during refresh', async () => {
// Arrange
mockStorage.setupExpiredTokens();
const { isDeviceConnected, hasStableConnection } = require('../../utils/networkErrorUtils');
isDeviceConnected.mockResolvedValue(true);
hasStableConnection.mockResolvedValueOnce(false).mockResolvedValueOnce(true);
let attemptCount = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
attemptCount++;
if (attemptCount === 1) {
// First attempt should not be made due to unstable connection
return mockFetchResponses.refreshTokenSuccess().build();
}
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
// Act
const token = await tokenManager.getValidToken();
// Assert
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
expect(attemptCount).toBeGreaterThan(0);
});
});
describe('Token Refresh State Management', () => {
it('should properly transition through token states', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
// Simulate slow refresh
await testUtils.sleep(200);
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
const tokenPromise = tokenManager.getValidToken();
// Assert - Should transition through states
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.REFRESHING));
const token = await tokenPromise;
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
await testUtils.waitFor(() => tokenObserver.hasState(TokenState.VALID));
const stateTransitions = tokenObserver.getStateTransitions();
expect(stateTransitions).toContain(TokenState.REFRESHING);
expect(stateTransitions).toContain(TokenState.VALID);
} finally {
unsubscribe();
}
});
it('should notify observers of token state changes', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
const unsubscribe = tokenManager.subscribe(tokenObserver.getCallback());
let observerCallCount = 0;
const testObserver = tokenManager.subscribe(() => {
observerCallCount++;
});
try {
// Act
await tokenManager.getValidToken();
// Assert
expect(observerCallCount).toBeGreaterThan(0);
expect(tokenObserver.getStates().length).toBeGreaterThan(0);
} finally {
unsubscribe();
testObserver();
}
});
it('should handle observer errors gracefully', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.success().build();
});
// Observer that throws error
const errorObserver = jest.fn().mockImplementation(() => {
throw new Error('Observer error');
});
const unsubscribe1 = tokenManager.subscribe(errorObserver);
const unsubscribe2 = tokenManager.subscribe(tokenObserver.getCallback());
try {
// Act
const token = await tokenManager.getValidToken();
// Assert
expect(token).toBe(MOCK_TOKENS.VALID_APP_TOKEN);
expect(errorObserver).toHaveBeenCalled();
expect(tokenObserver.getStates().length).toBeGreaterThan(0); // Other observers still work
} finally {
unsubscribe1();
unsubscribe2();
}
});
});
describe('Request Queueing', () => {
it('should queue requests during token refresh and process them after', async () => {
// Arrange
mockStorage.setupExpiredTokens();
let refreshStarted = false;
let requestsProcessed = 0;
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
refreshStarted = true;
await testUtils.sleep(500); // Slow refresh
return mockFetchResponses.refreshTokenSuccess().build();
}
if (url.includes('/api/test')) {
requestsProcessed++;
return MockResponseBuilder.success({ data: `response-${requestsProcessed}` }).build();
}
return MockResponseBuilder.unauthorized('JWT expired').build();
});
// Act - Start refresh and queue requests
const refreshPromise = tokenManager.handle401Response('http://localhost:3002/api/initial', { method: 'GET' });
// Wait for refresh to start
await testUtils.waitFor(() => refreshStarted);
// Queue additional requests
const queuedRequests = [
tokenManager.handle401Response('http://localhost:3002/api/test1', { method: 'GET' }),
tokenManager.handle401Response('http://localhost:3002/api/test2', { method: 'GET' }),
];
// Wait for all requests to complete
const [initialResponse, ...queuedResponses] = await Promise.all([refreshPromise, ...queuedRequests]);
// Assert
expect(initialResponse.status).toBe(200);
queuedResponses.forEach(response => {
expect(response.status).toBe(200);
});
expect(requestsProcessed).toBe(3); // All requests were processed after refresh
});
it('should handle queue timeout', async () => {
// Arrange
mockStorage.setupExpiredTokens();
// Mock a very slow refresh that exceeds queue timeout
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
await testUtils.sleep(35000); // Longer than queue timeout (30s)
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.unauthorized('JWT expired').build();
});
// Start refresh
tokenManager.handle401Response('http://localhost:3002/api/initial', { method: 'GET' });
await testUtils.sleep(100); // Let refresh start
// Act & Assert - Queue a request that should timeout
await expect(
tokenManager.handle401Response('http://localhost:3002/api/test', { method: 'GET' })
).rejects.toThrow('Queued request timeout');
});
it('should handle queue size limit', async () => {
// Arrange
mockStorage.setupExpiredTokens();
globalThis.fetch = jest.fn().mockImplementation(async (input: RequestInfo | URL) => {
const url = typeof input === 'string' ? input : input.toString();
if (url.includes('/auth/refresh')) {
await testUtils.sleep(1000); // Slow refresh
return mockFetchResponses.refreshTokenSuccess().build();
}
return MockResponseBuilder.unauthorized('JWT expired').build();
});
// Start refresh
tokenManager.handle401Response('http://localhost:3002/api/initial', { method: 'GET' });
await testUtils.sleep(100); // Let refresh start
// Act - Queue many requests (more than MAX_QUEUE_SIZE = 50)
const queuePromises = [];
for (let i = 0; i < 52; i++) {
queuePromises.push(
tokenManager.handle401Response(`http://localhost:3002/api/test${i}`, { method: 'GET' })
.catch(error => error)
);
}
const results = await Promise.all(queuePromises);
// Assert - Some requests should be rejected due to queue limit
const errors = results.filter(result => result instanceof Error);
expect(errors.length).toBeGreaterThan(0);
expect(errors.some(error => error.message === 'Request queue full')).toBe(true);
});
});
});

View file

@ -1,31 +0,0 @@
version: '3.8'
services:
nutriphi-backend:
build:
context: .
dockerfile: Dockerfile
container_name: nutriphi-backend
restart: unless-stopped
environment:
- NODE_ENV=production
- PORT=${PORT:-3002}
- DATABASE_URL=${DATABASE_URL}
- GEMINI_API_KEY=${GEMINI_API_KEY}
- S3_ENDPOINT=${S3_ENDPOINT}
- S3_ACCESS_KEY_ID=${S3_ACCESS_KEY_ID}
- S3_SECRET_ACCESS_KEY=${S3_SECRET_ACCESS_KEY}
- S3_BUCKET_NAME=${S3_BUCKET_NAME}
- S3_REGION=${S3_REGION:-fsn1}
- S3_PUBLIC_URL=${S3_PUBLIC_URL}
- MANACORE_AUTH_URL=${MANACORE_AUTH_URL}
ports:
- "${PORT:-3002}:${PORT:-3002}"
healthcheck:
test: ["CMD", "curl", "-f", "http://localhost:${PORT:-3002}/api/health"]
interval: 30s
timeout: 10s
retries: 3
start_period: 40s
labels:
- "coolify.managed=true"

View file

@ -56,7 +56,7 @@ docker-compose up --build
## 📝 Documentation
- [Deployment Guide](./DEPLOYMENT.md) - Complete Coolify deployment instructions
- [Deployment Guide](./DEPLOYMENT.md) - Complete Docker Compose deployment instructions
- [Lessons Learned](./DEPLOYMENT_LESSONS_LEARNED.md) - Troubleshooting and insights
- [Domain Setup](./DOMAIN_SETUP_ULO_AD.md) - ulo.ad configuration
- [Coolify Setup](./COOLIFY_SETUP.md) - Detailed Coolify configuration

View file

@ -1,50 +0,0 @@
# =============================================================================
# uload Docker Compose - Coolify Deployment
# =============================================================================
# This file is used by Coolify for deployment.
# Environment variables are injected by Coolify.
# =============================================================================
services:
app:
build:
context: .
dockerfile: Dockerfile
ports:
- '3000:3000'
environment:
NODE_ENV: production
PORT: 3000
HOST: 0.0.0.0
ORIGIN: ${ORIGIN:-https://ulo.ad}
# Database (set in Coolify)
DATABASE_URL: ${DATABASE_URL}
# Redis (optional, set in Coolify)
REDIS_URL: ${REDIS_URL:-}
# Auth
AUTH_SECRET: ${AUTH_SECRET}
# External Services (set in Coolify)
RESEND_API_KEY: ${RESEND_API_KEY:-}
STRIPE_SECRET_KEY: ${STRIPE_SECRET_KEY:-}
STRIPE_WEBHOOK_SECRET: ${STRIPE_WEBHOOK_SECRET:-}
# R2 Storage (set in Coolify)
R2_ACCESS_KEY_ID: ${R2_ACCESS_KEY_ID:-}
R2_SECRET_ACCESS_KEY: ${R2_SECRET_ACCESS_KEY:-}
R2_BUCKET_NAME: ${R2_BUCKET_NAME:-}
R2_ENDPOINT: ${R2_ENDPOINT:-}
# Analytics (optional)
PUBLIC_UMAMI_URL: ${PUBLIC_UMAMI_URL:-}
PUBLIC_UMAMI_WEBSITE_ID: ${PUBLIC_UMAMI_WEBSITE_ID:-}
restart: unless-stopped
healthcheck:
test: ["CMD", "wget", "--no-verbose", "--tries=1", "--spider", "http://localhost:3000/api/health"]
interval: 30s
timeout: 10s
retries: 3
start_period: 40s

View file

@ -2,7 +2,7 @@
# uload Docker Compose - Production (standalone)
# =============================================================================
# Use this for manual production deployment without Coolify.
# For Coolify deployments, use docker-compose.coolify.yml instead.
# For Docker Compose deployments, use docker-compose.coolify.yml instead.
# =============================================================================
services:

View file

@ -1,374 +0,0 @@
# Detaillierte Coolify Setup Anleitung
## Voraussetzungen
- Coolify ist auf deinem Hetzner VPS installiert und läuft
- Du hast Admin-Zugang zum Coolify Dashboard
- Dein GitHub Repository ist gepusht mit allen Docker-Dateien
## Schritt-für-Schritt Anleitung
### 1. Login in Coolify
```
https://deine-coolify-domain.com
```
oder
```
http://server-ip:8000
```
### 2. Neue Application erstellen
#### 2.1 Start
1. Klicke im Dashboard auf **"+ New Resource"**
2. Wähle **"Application"** aus
3. Wähle als Source: **"Public Repository"** (oder "Private Repository" wenn privat)
#### 2.2 Repository Details
```
Repository URL: https://github.com/dein-username/uload
Branch: main
```
### 3. Build Configuration
#### 3.1 Build Pack Selection
- **Build Pack:** `Dockerfile` auswählen (NICHT Nixpacks!)
- **Dockerfile Location:** `./Dockerfile` (Standard, kann leer bleiben)
- **Docker Context:** `.` (Root directory)
#### 3.2 Build Settings
```yaml
Build Command: (leer lassen - wird vom Dockerfile übernommen)
Install Command: (leer lassen)
Start Command: (leer lassen)
```
### 4. Environment Variables
Klicke auf **"Environment Variables"** Tab und füge folgende hinzu:
```bash
# Basis Konfiguration
NODE_ENV=production
PORT=3000
# Domain Settings (WICHTIG: Deine echte Domain einsetzen!)
ORIGIN=https://deine-app.domain.com
PUBLIC_POCKETBASE_URL=https://deine-app.domain.com/api
# PocketBase Admin (wird beim ersten Start automatisch erstellt)
POCKETBASE_ADMIN_EMAIL=till.schneider@memoro.ai
POCKETBASE_ADMIN_PASSWORD=p0ck3tRA1N
# Optional: Wenn du eine andere interne PocketBase URL nutzen willst
POCKETBASE_INTERNAL_URL=http://localhost:8090
```
**Wichtig:**
- `ORIGIN` muss die komplette URL mit https:// sein
- `PUBLIC_POCKETBASE_URL` ist die öffentliche URL für das Frontend
- Nutze HTTPS sobald SSL aktiviert ist
### 5. Networking Configuration
#### 5.1 Ports
Im **"Networking"** Tab:
1. **Exposed Port hinzufügen:**
```
Container Port: 3000
Host Port: (automatisch zugewiesen oder manuell)
```
2. **Für PocketBase Admin UI (optional):**
```
Container Port: 8090
Host Port: (automatisch zugewiesen)
```
#### 5.2 Domain Setup
1. Klicke auf **"Add Domain"**
2. Eingabe: `deine-app.domain.com`
3. **Generate SSL Certificate:** ✅ aktivieren
4. **Force HTTPS:** ✅ aktivieren
5. **www redirect:** Nach Bedarf
### 6. Advanced Settings
#### 6.1 Health Check
Im **"Health Check"** Tab:
```
Path: /health
Port: 3000
Interval: 30
Timeout: 10
Retries: 3
Start Period: 40
```
#### 6.2 Resources (optional)
Im **"Resources"** Tab:
```yaml
CPU: 1000m (1 CPU)
Memory: 1024MB
Storage: 10GB
```
#### 6.3 Persistent Storage (WICHTIG!)
Im **"Storage"** Tab einen neuen Volume hinzufügen:
1. Klicke **"Add Volume"**
2. Konfiguration:
```
Name: pocketbase-data
Mount Path: /app/pb_data
Size: 5GB
```
### 7. Proxy Configuration
#### 7.1 Automatische Proxy Rules
Coolify erstellt automatisch Proxy Rules für die Hauptdomain. Für PocketBase API musst du zusätzliche Rules hinzufügen:
Im **"Proxy"** Tab, füge Custom Configuration hinzu:
```nginx
# PocketBase API Proxy
location /api {
rewrite ^/api/(.*) /$1 break;
proxy_pass http://localhost:8090;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_cache_bypass $http_upgrade;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
# PocketBase Admin UI
location /_/ {
proxy_pass http://localhost:8090;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_cache_bypass $http_upgrade;
}
# WebSocket Support für Realtime
location /api/realtime {
proxy_pass http://localhost:8090;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
}
```
### 8. Deployment starten
#### 8.1 Manuelles Deployment
1. Klicke auf **"Deploy"** Button
2. Warte auf Build-Prozess (Logs beobachten)
3. Status sollte auf "Running" wechseln
#### 8.2 Auto-Deploy aktivieren (optional)
Im **"General"** Tab:
- **Auto Deploy:** ✅ aktivieren
- **Deploy on Push:** ✅ aktivieren
### 9. DNS Konfiguration
Bei deinem Domain-Provider (z.B. Cloudflare, Hetzner DNS):
#### 9.1 A-Record erstellen
```
Type: A
Name: deine-app (oder @ für root domain)
Value: <Hetzner-Server-IP>
TTL: 3600
```
#### 9.2 Warten auf DNS Propagation
- Kann 5-60 Minuten dauern
- Teste mit: `nslookup deine-app.domain.com`
### 10. Post-Deployment Checks
#### 10.1 Application Check
```bash
# Frontend testen
curl https://deine-app.domain.com
# Health Check
curl https://deine-app.domain.com/health
# PocketBase API
curl https://deine-app.domain.com/api/health
```
#### 10.2 PocketBase Admin Setup
1. Navigiere zu: `https://deine-app.domain.com/_/`
2. Erstelle Admin Account beim ersten Besuch
3. Konfiguriere Collections und API Rules
### 11. Monitoring in Coolify
#### 11.1 Logs
- **Application Logs:** Real-time logs beider Services
- **Build Logs:** Deployment-Prozess verfolgen
- **System Logs:** Container-Status
#### 11.2 Metrics
- CPU Usage
- Memory Usage
- Network Traffic
- Disk Usage
### 12. Troubleshooting
#### Problem: Build Failed
```bash
# Check Build Logs in Coolify
# Häufige Ursachen:
- NPM dependency conflicts → package-lock.json löschen und neu generieren
- Docker build cache → "Rebuild without cache" Option nutzen
```
#### Problem: Application not reachable
```bash
# 1. Check Container Status
docker ps
# 2. Check Logs
docker logs <container-id>
# 3. Check Firewall
ufw status
# 4. Check DNS
nslookup deine-domain.com
```
#### Problem: PocketBase nicht erreichbar
- Proxy Rules überprüfen
- Environment Variables kontrollieren
- Port 8090 in Container exposed?
### 13. Backup Setup in Coolify
1. Gehe zu **Settings → Backups**
2. Configure:
```
Schedule: 0 3 * * * (täglich um 3 Uhr)
Retention: 7 days
Backup Location: Local oder S3
```
### 14. Update Workflow
Für zukünftige Updates:
```bash
# Lokal entwickeln
git add .
git commit -m "Update feature XY"
git push origin main
# Coolify deployed automatisch (wenn Auto-Deploy aktiv)
# Oder manuell: "Redeploy" Button in Coolify
```
## Wichtige Umgebungsvariablen Übersicht
| Variable | Beispiel | Beschreibung |
| ------------------------- | ------------------------ | ----------------------------- |
| NODE_ENV | production | Immer "production" für Live |
| PORT | 3000 | SvelteKit Server Port |
| ORIGIN | https://ulo.ad | Vollständige URL deiner App |
| PUBLIC_POCKETBASE_URL | https://ulo.ad/api | Öffentliche API URL |
| POCKETBASE_ADMIN_EMAIL | till.schneider@memoro.ai | Admin Email für Auto-Setup |
| POCKETBASE_ADMIN_PASSWORD | p0ck3tRA1N | Admin Password für Auto-Setup |
## Domain Setup für ulo.ad
### DNS Records
```
A Record: @ → 91.99.221.179
CNAME: www → ulo.ad
```
### Nach Domain Verbindung
1. Environment Variables updaten (ORIGIN und PUBLIC_POCKETBASE_URL)
2. SSL Certificate generieren lassen
3. Force HTTPS aktivieren
4. Container neu deployen
## Security Checklist
- [ ] SSL/HTTPS aktiviert
- [ ] Environment Variables gesetzt (keine Secrets im Code)
- [ ] PocketBase Admin mit starkem Passwort
- [ ] Firewall konfiguriert
- [ ] Backups eingerichtet
- [ ] Monitoring aktiviert
## Nützliche Coolify Features
### Rollback
- Bei Problemen: "Rollback" zu vorheriger Version möglich
- Coolify speichert die letzten 5 Deployments
### Staging Environment
- Erstelle zweite Application mit branch "staging"
- Separate Domain: staging.deine-app.com
- Teste Updates vor Production
### Secrets Management
- Nutze Coolify's Secret Storage für sensitive Daten
- Secrets werden verschlüsselt gespeichert
- Können in Environment Variables referenziert werden: ${SECRET_NAME}
## Support Links
- [Coolify Discord](https://discord.gg/coolify)
- [Coolify Docs](https://coolify.io/docs)
- [Coolify GitHub Issues](https://github.com/coollabsio/coolify/issues)

View file

@ -17,7 +17,7 @@ Diese Anleitung beschreibt das Deployment einer SvelteKit + PocketBase Anwendung
│ Hetzner VPS │
│ │
│ ┌─────────────────────────────┐ │
│ │ Coolify Platform │ │
│ │ Docker Compose │ │
│ │ │ │
│ │ ┌───────────────────────┐ │ │
│ │ │ Docker Container │ │ │

View file

@ -11,7 +11,7 @@ Deployment einer SvelteKit + PocketBase Anwendung auf Hetzner VPS mit Coolify.
│ Hetzner VPS (91.99.221.179) │
│ │
│ ┌────────────────────────────────────────┐ │
│ │ Coolify Platform │ │
│ │ Docker Compose │ │
│ │ │ │
│ │ ┌───────────────────────────────────┐ │ │
│ │ │ Docker Container │ │ │
@ -116,7 +116,7 @@ POCKETBASE_ADMIN_PASSWORD=p0ck3tRA1N
- **Problem:** Supervisor kann nicht starten ohne die ENV Variables
- **Symptom:** Endlosschleife im Container mit Supervisor Error
- **Lösung:** ALLE benötigten ENV Variables in Coolify UI setzen
- **Lösung:** ALLE benötigten ENV Variables in Docker Compose configuration setzen
### 2. Docker Build Context

View file

@ -1,279 +0,0 @@
# Redis Setup auf Coolify - Complete Guide
## Erfolgreiche Redis Integration für uLoad
Nach einigen Herausforderungen haben wir Redis erfolgreich auf Coolify zum Laufen gebracht. Hier sind die wichtigsten Learnings und die funktionierende Konfiguration.
## ✅ Funktionierende Konfiguration
### Redis Service in Coolify
#### 1. Redis als Database Service hinzufügen
- **Type:** Redis Database
- **Image:** redis:7.2
- **Name:** redis-database-[generated-id]
#### 2. General Settings
```
Username: default
Password: [Sicheres Passwort generieren]
Custom Docker Options: --protected-mode no --bind 0.0.0.0
```
**Wichtig:** Die Custom Docker Options sind KRITISCH! Ohne diese wird Redis Verbindungen ablehnen.
#### 3. Network Configuration
```
Ports Mappings: 6379:6379
Redis URL (internal): [wird automatisch generiert]
```
**Achtung:** Nicht 5432 verwenden (das ist PostgreSQL)!
### Hauptanwendung Environment Variables
#### Funktionierende Konfiguration:
```bash
REDIS_HOST=ycsoowwsc84s0s8gc8oooosk # Der Container-Name (NICHT der Service-Name!)
REDIS_PORT=6379
REDIS_USERNAME=default
REDIS_PASSWORD=[Das gleiche Passwort wie im Redis Service]
```
## 🔍 Wichtige Erkenntnisse
### 1. Container Name vs. Service Name
**Problem:** Der Coolify Service Name funktioniert nicht für die interne Kommunikation.
**Lösung:** Verwende den tatsächlichen Container-Namen:
- ❌ FALSCH: `redis-database-ycsoowwsc84s0s8gc8oooosk`
- ❌ FALSCH: `redis-database-ycsoowwsc84s0s8gc8oooosk.coolify`
- ✅ RICHTIG: `ycsoowwsc84s0s8gc8oooosk`
Der Container-Name findest du in den Redis Logs oder beim Container Start.
### 2. Protected Mode Problem
**Problem:** "Connection is closed" Fehler trotz korrekter Credentials.
**Lösung:** Redis Protected Mode deaktivieren:
```bash
--protected-mode no --bind 0.0.0.0
```
Diese Optionen MÜSSEN in "Custom Docker Options" gesetzt werden!
### 3. Environment Variables Format
**Problem:** REDIS_HOST wurde mit kompletter URL statt nur Hostname gesetzt.
**Lösung:**
- ❌ FALSCH: `REDIS_HOST=redis://default:password@host:6379`
- ✅ RICHTIG: `REDIS_HOST=ycsoowwsc84s0s8gc8oooosk`
REDIS_HOST darf NUR der Hostname sein, keine URL!
### 4. Port Mapping Confusion
**Problem:** Falscher Port (5432 statt 6379) wurde gemappt.
**Lösung:**
- Port 6379 ist Redis
- Port 5432 ist PostgreSQL
- Immer 6379:6379 für Redis verwenden
## 📋 Komplette Setup-Anleitung
### Schritt 1: Redis Service erstellen
1. In Coolify → New Resource → Database → Redis
2. Wähle redis:7.2 als Image
3. Setze Username: `default`
4. Generiere ein starkes Passwort
5. **WICHTIG:** Custom Docker Options: `--protected-mode no --bind 0.0.0.0`
6. Port Mapping: `6379:6379`
7. Deploy
### Schritt 2: Container Name ermitteln
1. Gehe zu Redis Service → Logs
2. Suche nach Container Name (z.B. `ycsoowwsc84s0s8gc8oooosk`)
3. Notiere diesen Namen!
### Schritt 3: Hauptapp konfigurieren
Environment Variables in deiner Hauptapp:
```bash
REDIS_HOST=[Container-Name aus Schritt 2]
REDIS_PORT=6379
REDIS_USERNAME=default
REDIS_PASSWORD=[Passwort aus Redis Service]
```
### Schritt 4: Testen
Erstelle einen Test-Endpoint in deiner App:
```typescript
// src/routes/test-redis/+server.ts
import { json } from '@sveltejs/kit';
import Redis from 'ioredis';
export async function GET() {
const redis = new Redis({
host: process.env.REDIS_HOST,
port: parseInt(process.env.REDIS_PORT || '6379'),
username: process.env.REDIS_USERNAME,
password: process.env.REDIS_PASSWORD,
});
try {
await redis.ping();
await redis.set('test', 'Hello Redis!');
const value = await redis.get('test');
redis.disconnect();
return json({
success: true,
value,
host: process.env.REDIS_HOST,
});
} catch (error) {
return json(
{
success: false,
error: error.message,
},
{ status: 500 }
);
}
}
```
## 🚀 Performance-Verbesserungen
Nach erfolgreicher Redis-Integration:
### Link Redirects
- **Vorher:** 50-100ms (PocketBase Query)
- **Nachher:** 2-5ms (Redis Cache)
- **Verbesserung:** 20-50x schneller!
### Dashboard Loading
- **Vorher:** 200-400ms
- **Nachher:** 10-20ms
- **Verbesserung:** 10-20x schneller!
### Analytics
- **Vorher:** 500-1500ms
- **Nachher:** 20-50ms
- **Verbesserung:** 10-30x schneller!
## 🐛 Troubleshooting
### "Connection is closed" Error
1. Check Custom Docker Options: `--protected-mode no --bind 0.0.0.0`
2. Verify Container Name (nicht Service Name!)
3. Check Password ist korrekt
### "ECONNREFUSED" Error
1. Redis Service läuft nicht
2. Falscher Host/Port
3. Network Isolation Problem
### "NOAUTH Authentication required"
1. Password nicht gesetzt in Environment Variables
2. Falsches Password
3. Username fehlt (sollte "default" sein)
### Debug Commands
Im Redis Container (via Coolify Terminal):
```bash
# Test Redis läuft
redis-cli ping
# Mit Auth
redis-cli -a [password] ping
# Check Config
redis-cli -a [password] CONFIG GET bind
redis-cli -a [password] CONFIG GET protected-mode
```
## 💡 Best Practices
### 1. Resource Limits
```bash
--maxmemory 512mb
--maxmemory-policy allkeys-lru
```
### 2. Persistence
```bash
--appendonly yes
--save 900 1 # Save every 15 min if at least 1 key changed
```
### 3. Security
- Niemals Redis Port öffentlich exponieren
- Starkes Passwort verwenden
- Protected Mode nur intern deaktivieren
### 4. Monitoring
- Memory Usage im Auge behalten
- Hit Rate tracken
- Slow Queries monitoren
## 📊 Resource-Bedarf
Für uLoad auf Hetzner CX21:
- **RAM:** 50-200MB (von 8GB verfügbar)
- **CPU:** <1% (von 2 vCPUs)
- **Disk:** <1GB (von 40GB)
Redis ist extrem ressourcen-effizient!
## 🎯 Zusammenfassung
Die wichtigsten Punkte für erfolgreiche Redis-Integration auf Coolify:
1. **Container-Name verwenden**, nicht Service-Name
2. **Protected Mode deaktivieren** mit Custom Docker Options
3. **Port 6379** verwenden, nicht 5432
4. **Environment Variables korrekt formatieren** (REDIS_HOST = nur Hostname)
5. **Test-Endpoint** erstellen zum Verifizieren
Mit dieser Konfiguration läuft Redis stabil und performant auf dem gleichen Hetzner VPS wie die Hauptanwendung, ohne zusätzliche Kosten und mit minimaler Latenz.
## 🔗 Weiterführende Dokumentation
- [Redis Best Practices](https://redis.io/docs/manual/patterns/)
- [Coolify Documentation](https://coolify.io/docs)
- [ioredis Documentation](https://github.com/redis/ioredis)
---
_Dokumentiert nach erfolgreicher Redis-Integration für uLoad auf Coolify, August 2025_