WIP: Save current work before CHORUS rebrand

- Agent roles integration progress
- Various backend and frontend updates
- Storybook cache cleanup

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
anthonyrawlins
2025-08-01 02:20:56 +10:00
parent 1e81daaf18
commit b6bff318d9
740 changed files with 90022 additions and 279523 deletions

40
generate_password_hash.py Normal file
View File

@@ -0,0 +1,40 @@
#!/usr/bin/env python3
"""
Generate password hash for Hive admin user
Uses the same passlib configuration as the backend
"""
import subprocess
import sys
try:
from passlib.context import CryptContext
except ImportError:
print("❌ passlib not installed. Installing...")
subprocess.run([sys.executable, "-m", "pip", "install", "passlib[bcrypt]"])
from passlib.context import CryptContext
# Same configuration as backend
pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto")
# Generate hash for the new password
password = "hiveadmin123"
hashed = pwd_context.hash(password)
print(f"Original password: {password}")
print(f"Generated hash: {hashed}")
# Verify it works
verified = pwd_context.verify(password, hashed)
print(f"Verification test: {'✅ PASS' if verified else '❌ FAIL'}")
# Test against old password
old_hash = "$2b$12$EjRUdYXNPgnveP6mgFY00uOj.fBp6u/9ZKqCZPdL4RK7QWg1Tpvp2"
old_password_test = pwd_context.verify("hiveadmin", old_hash)
print(f"Old password 'hiveadmin' verification: {'✅ PASS' if old_password_test else '❌ FAIL'}")
new_password_test = pwd_context.verify("hiveadmin123", old_hash)
print(f"New password 'hiveadmin123' against old hash: {'✅ PASS' if new_password_test else '❌ FAIL (expected)'}")
print(f"\nSQL UPDATE command:")
print(f"UPDATE users SET hashed_password = '{hashed}' WHERE username = 'admin';")