Major Features:
✅ JWT Bearer Token authentication system with secure token management
✅ API key generation and management with scoped permissions
✅ Complete user management (registration, login, logout, password change)
✅ Frontend authentication components and context integration
Backend Architecture Improvements:
✅ CORS configuration via environment variables (CORS_ORIGINS)
✅ Dependency injection pattern for unified coordinator
✅ Database schema fixes with UUID support and SQLAlchemy compliance
✅ Task persistence replaced in-memory storage with database-backed system
✅ Service separation following Single Responsibility Principle
✅ Fixed SQLAlchemy metadata column naming conflicts
Infrastructure & Testing:
✅ Comprehensive Jest unit testing and Playwright e2e testing infrastructure
✅ GitHub Actions CI/CD pipeline integration
✅ Enhanced API clients matching PROJECT_PLAN.md specifications
✅ Docker Swarm deployment with proper networking and service connectivity
Database & Security:
✅ UUID-based user models with proper validation
✅ Unified database schema with authentication tables
✅ Token blacklisting and refresh token management
✅ Secure password hashing with bcrypt
✅ API key scoping and permissions system
API Enhancements:
✅ Authentication endpoints (/api/auth/*)
✅ Task management with database persistence
✅ Enhanced monitoring and health check endpoints
✅ Comprehensive error handling and validation
Deployment:
✅ Successfully deployed to Docker Swarm at https://hive.home.deepblack.cloud✅ All services operational with proper networking
✅ Environment-based configuration support
🛠️ Technical Debt Resolved:
- Fixed global coordinator instances with proper dependency injection
- Replaced hardcoded CORS origins with environment variables
- Unified User model schema conflicts across authentication system
- Implemented database persistence for critical task storage
- Created comprehensive testing infrastructure
This release transforms Hive from a development prototype into a production-ready
distributed AI orchestration platform with enterprise-grade authentication,
proper architectural patterns, and robust deployment infrastructure.
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
Major changes:
- Consolidate 3 different User models into single unified model (models/user.py)
- Use UUID primary keys throughout (matches existing database schema)
- Add comprehensive authentication fields while preserving existing data
- Remove duplicate User model from auth.py, keep APIKey/RefreshToken/TokenBlacklist
- Update all imports to use unified User model consistently
- Create database migration (002_add_auth_fields.sql) for safe schema upgrade
- Fix frontend User interface to handle UUID string IDs
- Add backward compatibility fields (name property, role field)
- Maintain relationships for authentication features (api_keys, refresh_tokens)
Schema conflicts resolved:
✅ Migration schema (UUID, 7 fields) + Basic model (Integer, 6 fields) + Auth model (Integer, 10 fields)
→ Unified model (UUID, 12 fields with full backward compatibility)
✅ Field inconsistencies (name vs full_name) resolved with compatibility property
✅ Database foreign key constraints updated for UUID relationships
✅ JWT token handling fixed for UUID user IDs
This completes the holistic database schema unification requested after quick
patching caused conflicts. All existing data preserved, full auth system functional.
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>
- Create comprehensive authentication backend with JWT and API key support
- Add database models for users, API keys, and tokens with proper security
- Implement authentication middleware and API endpoints
- Build complete frontend authentication UI with:
- LoginForm component with JWT authentication
- APIKeyManager for creating and managing API keys
- AuthDashboard for comprehensive auth management
- AuthContext for state management and authenticated requests
- Initialize database with default admin user (admin/admin123)
- Add proper token refresh, validation, and blacklisting
- Implement scope-based API key authorization system
🤖 Generated with [Claude Code](https://claude.ai/code)
Co-Authored-By: Claude <noreply@anthropic.com>