create-velox-app 0.6.67 → 0.6.69

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,54 @@
1
1
  # create-velox-app
2
2
 
3
+ ## 0.6.69
4
+
5
+ ### Patch Changes
6
+
7
+ - implement user feedback improvements across packages
8
+
9
+ ## Summary
10
+
11
+ Addresses 9 user feedback items to improve DX, reduce boilerplate, and eliminate template duplications.
12
+
13
+ ### Phase 1: Validation Helpers (`@veloxts/validation`)
14
+
15
+ - Add `prismaDecimal()`, `prismaDecimalNullable()`, `prismaDecimalOptional()` for Prisma Decimal → number conversion
16
+ - Add `dateToIso`, `dateToIsoNullable`, `dateToIsoOptional` aliases for consistency
17
+
18
+ ### Phase 2: Template Deduplication (`@veloxts/auth`)
19
+
20
+ - Export `createEnhancedTokenStore()` with token revocation and refresh token reuse detection
21
+ - Export `parseUserRoles()` and `DEFAULT_ALLOWED_ROLES`
22
+ - Fix memory leak: track pending timeouts for proper cleanup on `destroy()`
23
+ - Update templates to import from `@veloxts/auth` instead of duplicating code
24
+ - Fix jwtManager singleton pattern in templates
25
+
26
+ ### Phase 3: Router Helpers (`@veloxts/router`)
27
+
28
+ - Add `createRouter()` returning `{ collections, router }` for DRY setup
29
+ - Add `toRouter()` for router-only use cases
30
+ - Update all router templates to use `createRouter()`
31
+
32
+ ### Phase 4: Guard Type Narrowing - Experimental (`@veloxts/auth`, `@veloxts/router`)
33
+
34
+ - Add `NarrowingGuard` interface with phantom `_narrows` type
35
+ - Add `authenticatedNarrow` and `hasRoleNarrow()` guards
36
+ - Add `guardNarrow()` method to `ProcedureBuilder` for context narrowing
37
+ - Enables `ctx.user` to be non-null after guard passes
38
+
39
+ ### Phase 5: Documentation (`@veloxts/router`)
40
+
41
+ - Document `.rest()` override patterns
42
+ - Document `createRouter()` helper usage
43
+ - Document `guardNarrow()` experimental API
44
+ - Add schema browser-safety patterns for RSC apps
45
+
46
+ ## 0.6.68
47
+
48
+ ### Patch Changes
49
+
50
+ - ci: add Claude code review and security review workflows, add GitHub release workflow, remove npm publish job
51
+
3
52
  ## 0.6.67
4
53
 
5
54
  ### Patch Changes
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "create-velox-app",
3
- "version": "0.6.67",
3
+ "version": "0.6.69",
4
4
  "description": "Project scaffolder for VeloxTS framework",
5
5
  "type": "module",
6
6
  "main": "dist/index.js",
@@ -9,159 +9,9 @@
9
9
 
10
10
  import type { AuthPluginOptions } from '@veloxts/velox';
11
11
 
12
+ import { getJwtSecrets, parseUserRoles, tokenStore } from '../utils/auth.js';
12
13
  import { db } from './database.js';
13
14
 
14
- // ============================================================================
15
- // Environment Variable Validation
16
- // ============================================================================
17
-
18
- /**
19
- * Gets required JWT secrets from environment variables.
20
- * Throws a clear error in production if secrets are not configured.
21
- */
22
- function getRequiredSecrets(): { jwtSecret: string; refreshSecret: string } {
23
- const jwtSecret = process.env.JWT_SECRET;
24
- const refreshSecret = process.env.JWT_REFRESH_SECRET;
25
-
26
- const isDevelopment = process.env.NODE_ENV !== 'production';
27
-
28
- if (!jwtSecret || !refreshSecret) {
29
- if (isDevelopment) {
30
- console.warn(
31
- '\n' +
32
- '='.repeat(70) +
33
- '\n' +
34
- ' WARNING: JWT secrets not configured!\n' +
35
- ' Using temporary development secrets. DO NOT USE IN PRODUCTION!\n' +
36
- '\n' +
37
- ' To configure secrets, add to .env:\n' +
38
- ' JWT_SECRET=<generate with: openssl rand -base64 64>\n' +
39
- ' JWT_REFRESH_SECRET=<generate with: openssl rand -base64 64>\n' +
40
- '='.repeat(70) +
41
- '\n'
42
- );
43
- return {
44
- jwtSecret:
45
- jwtSecret || `dev-only-jwt-secret-${Math.random().toString(36).substring(2).repeat(4)}`,
46
- refreshSecret:
47
- refreshSecret ||
48
- `dev-only-refresh-secret-${Math.random().toString(36).substring(2).repeat(4)}`,
49
- };
50
- }
51
-
52
- throw new Error(
53
- '\n' +
54
- 'CRITICAL: JWT secrets are required but not configured.\n' +
55
- '\n' +
56
- 'Required environment variables:\n' +
57
- ' - JWT_SECRET: Secret for signing access tokens (64+ characters)\n' +
58
- ' - JWT_REFRESH_SECRET: Secret for signing refresh tokens (64+ characters)\n' +
59
- '\n' +
60
- 'Generate secure secrets with:\n' +
61
- ' openssl rand -base64 64\n' +
62
- '\n' +
63
- 'Add them to your environment or .env file before starting the server.\n'
64
- );
65
- }
66
-
67
- return { jwtSecret, refreshSecret };
68
- }
69
-
70
- // ============================================================================
71
- // Token Revocation Store
72
- // ============================================================================
73
-
74
- /**
75
- * In-memory token revocation store.
76
- *
77
- * PRODUCTION NOTE: Replace with Redis or database-backed store for:
78
- * - Persistence across server restarts
79
- * - Horizontal scaling (multiple server instances)
80
- */
81
- class InMemoryTokenStore {
82
- private revokedTokens: Map<string, number> = new Map();
83
- private usedRefreshTokens: Map<string, string> = new Map();
84
- private cleanupInterval: NodeJS.Timeout | null = null;
85
-
86
- constructor() {
87
- this.cleanupInterval = setInterval(() => this.cleanup(), 5 * 60 * 1000);
88
- }
89
-
90
- revoke(jti: string, expiresInMs: number = 7 * 24 * 60 * 60 * 1000): void {
91
- this.revokedTokens.set(jti, Date.now() + expiresInMs);
92
- }
93
-
94
- isRevoked(jti: string): boolean {
95
- const expiry = this.revokedTokens.get(jti);
96
- if (!expiry) return false;
97
- if (Date.now() > expiry) {
98
- this.revokedTokens.delete(jti);
99
- return false;
100
- }
101
- return true;
102
- }
103
-
104
- markRefreshTokenUsed(jti: string, userId: string): void {
105
- this.usedRefreshTokens.set(jti, userId);
106
- setTimeout(() => this.usedRefreshTokens.delete(jti), 7 * 24 * 60 * 60 * 1000);
107
- }
108
-
109
- isRefreshTokenUsed(jti: string): string | undefined {
110
- return this.usedRefreshTokens.get(jti);
111
- }
112
-
113
- revokeAllUserTokens(userId: string): void {
114
- console.warn(
115
- `[Security] Token reuse detected for user ${userId}. ` +
116
- 'All tokens should be revoked. Implement proper user->token mapping for production.'
117
- );
118
- }
119
-
120
- private cleanup(): void {
121
- const now = Date.now();
122
- for (const [jti, expiry] of this.revokedTokens.entries()) {
123
- if (now > expiry) {
124
- this.revokedTokens.delete(jti);
125
- }
126
- }
127
- }
128
-
129
- destroy(): void {
130
- if (this.cleanupInterval) {
131
- clearInterval(this.cleanupInterval);
132
- this.cleanupInterval = null;
133
- }
134
- }
135
- }
136
-
137
- export const tokenStore = new InMemoryTokenStore();
138
-
139
- // ============================================================================
140
- // Role Parsing
141
- // ============================================================================
142
-
143
- const ALLOWED_ROLES = ['user', 'admin', 'moderator', 'editor'] as const;
144
-
145
- export function parseUserRoles(rolesJson: string | null): string[] {
146
- if (!rolesJson) return ['user'];
147
-
148
- try {
149
- const parsed: unknown = JSON.parse(rolesJson);
150
-
151
- if (!Array.isArray(parsed)) {
152
- return ['user'];
153
- }
154
-
155
- const validRoles = parsed
156
- .filter((role): role is string => typeof role === 'string')
157
- .filter((role) => ALLOWED_ROLES.includes(role as (typeof ALLOWED_ROLES)[number]));
158
-
159
- return validRoles.length > 0 ? validRoles : ['user'];
160
- } catch {
161
- return ['user'];
162
- }
163
- }
164
-
165
15
  // ============================================================================
166
16
  // User Loader
167
17
  // ============================================================================
@@ -186,7 +36,7 @@ async function userLoader(userId: string) {
186
36
  // ============================================================================
187
37
 
188
38
  export function createAuthConfig(): AuthPluginOptions {
189
- const { jwtSecret, refreshSecret } = getRequiredSecrets();
39
+ const { jwtSecret, refreshSecret } = getJwtSecrets();
190
40
 
191
41
  return {
192
42
  jwt: {
@@ -207,3 +57,6 @@ export function createAuthConfig(): AuthPluginOptions {
207
57
  }
208
58
 
209
59
  export const authConfig = createAuthConfig();
60
+
61
+ // Re-export for convenience
62
+ export { parseUserRoles, tokenStore } from '../utils/auth.js';
@@ -16,7 +16,6 @@ import {
16
16
  authenticated,
17
17
  createAuthRateLimiter,
18
18
  hashPassword,
19
- jwtManager,
20
19
  procedure,
21
20
  procedures,
22
21
  verifyPassword,
@@ -30,7 +29,7 @@ import {
30
29
  TokenResponse,
31
30
  UserResponse,
32
31
  } from '../schemas/auth.js';
33
- import { getJwtSecrets, parseUserRoles, tokenStore } from '../utils/auth.js';
32
+ import { jwt, parseUserRoles, tokenStore } from '../utils/auth.js';
34
33
 
35
34
  // ============================================================================
36
35
  // Rate Limiter
@@ -82,21 +81,6 @@ const EnhancedRegisterInput = RegisterInput.extend({
82
81
  ),
83
82
  });
84
83
 
85
- // ============================================================================
86
- // JWT Manager
87
- // ============================================================================
88
-
89
- const { jwtSecret, refreshSecret } = getJwtSecrets();
90
-
91
- const jwt = jwtManager({
92
- secret: jwtSecret,
93
- refreshSecret: refreshSecret,
94
- accessTokenExpiry: '15m',
95
- refreshTokenExpiry: '7d',
96
- issuer: 'velox-app',
97
- audience: 'velox-app-client',
98
- });
99
-
100
84
  // Dummy hash for timing attack prevention
101
85
  const DUMMY_HASH = '$2b$12$LQv3c1yqBWVHxkd0LHAkCOYz6TtxMQJqhN8/X4.uy7dPSSXB5G6Uy';
102
86
 
@@ -9,21 +9,18 @@
9
9
  * The server entry point (index.ts) handles environment setup.
10
10
  */
11
11
 
12
- import { extractRoutes } from '@veloxts/velox';
12
+ import { createRouter, extractRoutes } from '@veloxts/velox';
13
13
 
14
14
  import { authProcedures } from './procedures/auth.js';
15
15
  import { healthProcedures } from './procedures/health.js';
16
16
  import { userProcedures } from './procedures/users.js';
17
17
 
18
- // Procedure collections for routing
19
- export const collections = [healthProcedures, authProcedures, userProcedures];
20
-
21
- // Router definition for frontend type safety
22
- export const router = {
23
- auth: authProcedures,
24
- health: healthProcedures,
25
- users: userProcedures,
26
- };
18
+ // Create router and collections from procedure definitions
19
+ export const { collections, router } = createRouter(
20
+ healthProcedures,
21
+ authProcedures,
22
+ userProcedures
23
+ );
27
24
 
28
25
  export type AppRouter = typeof router;
29
26
 
@@ -9,19 +9,13 @@
9
9
  * The server entry point (index.ts) handles environment setup.
10
10
  */
11
11
 
12
- import { extractRoutes } from '@veloxts/velox';
12
+ import { createRouter, extractRoutes } from '@veloxts/velox';
13
13
 
14
14
  import { healthProcedures } from './procedures/health.js';
15
15
  import { userProcedures } from './procedures/users.js';
16
16
 
17
- // Procedure collections for routing
18
- export const collections = [healthProcedures, userProcedures];
19
-
20
- // Router definition for frontend type safety
21
- export const router = {
22
- health: healthProcedures,
23
- users: userProcedures,
24
- };
17
+ // Create router and collections from procedure definitions
18
+ export const { collections, router } = createRouter(healthProcedures, userProcedures);
25
19
 
26
20
  export type AppRouter = typeof router;
27
21
 
@@ -9,11 +9,13 @@
9
9
  * The server entry point (index.ts) handles environment setup.
10
10
  */
11
11
 
12
+ import { createRouter } from '@veloxts/velox';
13
+
12
14
  import { healthProcedures } from './procedures/health.js';
13
15
  import { userProcedures } from './procedures/users.js';
14
16
 
15
- // Procedure collections for routing
16
- export const collections = [healthProcedures, userProcedures];
17
+ // Create router and collections from procedure definitions
18
+ export const { collections, router } = createRouter(healthProcedures, userProcedures);
17
19
 
18
20
  /**
19
21
  * AppRouter type for frontend type safety
@@ -29,9 +31,4 @@ export const collections = [healthProcedures, userProcedures];
29
31
  * export const api = createVeloxHooks<AppRouter>();
30
32
  * ```
31
33
  */
32
- export const router = {
33
- health: healthProcedures,
34
- users: userProcedures,
35
- };
36
-
37
34
  export type AppRouter = typeof router;
@@ -5,34 +5,13 @@
5
5
  * These are safe to import from procedures without pulling in server-only code.
6
6
  */
7
7
 
8
- // ============================================================================
9
- // Role Parsing
10
- // ============================================================================
11
-
12
- const ALLOWED_ROLES = ['user', 'admin', 'moderator', 'editor'] as const;
13
-
14
- export function parseUserRoles(rolesJson: string | null): string[] {
15
- if (!rolesJson) return ['user'];
16
-
17
- try {
18
- const parsed: unknown = JSON.parse(rolesJson);
8
+ import { createEnhancedTokenStore, jwtManager } from '@veloxts/auth';
19
9
 
20
- if (!Array.isArray(parsed)) {
21
- return ['user'];
22
- }
23
-
24
- const validRoles = parsed
25
- .filter((role): role is string => typeof role === 'string')
26
- .filter((role) => ALLOWED_ROLES.includes(role as (typeof ALLOWED_ROLES)[number]));
27
-
28
- return validRoles.length > 0 ? validRoles : ['user'];
29
- } catch {
30
- return ['user'];
31
- }
32
- }
10
+ // Re-export from @veloxts/auth for convenience
11
+ export { createEnhancedTokenStore, parseUserRoles } from '@veloxts/auth';
33
12
 
34
13
  // ============================================================================
35
- // Token Revocation Store
14
+ // Token Store
36
15
  // ============================================================================
37
16
 
38
17
  /**
@@ -42,63 +21,7 @@ export function parseUserRoles(rolesJson: string | null): string[] {
42
21
  * - Persistence across server restarts
43
22
  * - Horizontal scaling (multiple server instances)
44
23
  */
45
- class InMemoryTokenStore {
46
- private revokedTokens: Map<string, number> = new Map();
47
- private usedRefreshTokens: Map<string, string> = new Map();
48
- private cleanupInterval: NodeJS.Timeout | null = null;
49
-
50
- constructor() {
51
- this.cleanupInterval = setInterval(() => this.cleanup(), 5 * 60 * 1000);
52
- }
53
-
54
- revoke(jti: string, expiresInMs: number = 7 * 24 * 60 * 60 * 1000): void {
55
- this.revokedTokens.set(jti, Date.now() + expiresInMs);
56
- }
57
-
58
- isRevoked(jti: string): boolean {
59
- const expiry = this.revokedTokens.get(jti);
60
- if (!expiry) return false;
61
- if (Date.now() > expiry) {
62
- this.revokedTokens.delete(jti);
63
- return false;
64
- }
65
- return true;
66
- }
67
-
68
- markRefreshTokenUsed(jti: string, userId: string): void {
69
- this.usedRefreshTokens.set(jti, userId);
70
- setTimeout(() => this.usedRefreshTokens.delete(jti), 7 * 24 * 60 * 60 * 1000);
71
- }
72
-
73
- isRefreshTokenUsed(jti: string): string | undefined {
74
- return this.usedRefreshTokens.get(jti);
75
- }
76
-
77
- revokeAllUserTokens(userId: string): void {
78
- console.warn(
79
- `[Security] Token reuse detected for user ${userId}. ` +
80
- 'All tokens should be revoked. Implement proper user->token mapping for production.'
81
- );
82
- }
83
-
84
- private cleanup(): void {
85
- const now = Date.now();
86
- for (const [jti, expiry] of this.revokedTokens.entries()) {
87
- if (now > expiry) {
88
- this.revokedTokens.delete(jti);
89
- }
90
- }
91
- }
92
-
93
- destroy(): void {
94
- if (this.cleanupInterval) {
95
- clearInterval(this.cleanupInterval);
96
- this.cleanupInterval = null;
97
- }
98
- }
99
- }
100
-
101
- export const tokenStore = new InMemoryTokenStore();
24
+ export const tokenStore = createEnhancedTokenStore();
102
25
 
103
26
  // ============================================================================
104
27
  // JWT Configuration Helper
@@ -155,3 +78,24 @@ export function getJwtSecrets(): { jwtSecret: string; refreshSecret: string } {
155
78
 
156
79
  return { jwtSecret, refreshSecret };
157
80
  }
81
+
82
+ // ============================================================================
83
+ // JWT Manager Singleton
84
+ // ============================================================================
85
+
86
+ const { jwtSecret, refreshSecret } = getJwtSecrets();
87
+
88
+ /**
89
+ * Shared JWT manager instance for the application.
90
+ *
91
+ * Use this singleton instead of creating new jwtManager instances.
92
+ * Configured with environment variables via getJwtSecrets().
93
+ */
94
+ export const jwt = jwtManager({
95
+ secret: jwtSecret,
96
+ refreshSecret: refreshSecret,
97
+ accessTokenExpiry: '15m',
98
+ refreshTokenExpiry: '7d',
99
+ issuer: 'velox-app',
100
+ audience: 'velox-app-client',
101
+ });
@@ -16,7 +16,6 @@ import {
16
16
  authenticated,
17
17
  createAuthRateLimiter,
18
18
  hashPassword,
19
- jwtManager,
20
19
  verifyPassword,
21
20
  } from '@veloxts/auth';
22
21
  import { procedure, procedures } from '@veloxts/router';
@@ -29,7 +28,7 @@ import {
29
28
  TokenResponse,
30
29
  UserResponse,
31
30
  } from '../schemas/auth.js';
32
- import { getJwtSecrets, parseUserRoles, tokenStore } from '../utils/auth.js';
31
+ import { jwt, parseUserRoles, tokenStore } from '../utils/auth.js';
33
32
 
34
33
  // ============================================================================
35
34
  // Rate Limiter
@@ -81,21 +80,6 @@ const EnhancedRegisterInput = RegisterInput.extend({
81
80
  ),
82
81
  });
83
82
 
84
- // ============================================================================
85
- // JWT Manager
86
- // ============================================================================
87
-
88
- const { jwtSecret, refreshSecret } = getJwtSecrets();
89
-
90
- const jwt = jwtManager({
91
- secret: jwtSecret,
92
- refreshSecret: refreshSecret,
93
- accessTokenExpiry: '15m',
94
- refreshTokenExpiry: '7d',
95
- issuer: 'velox-app',
96
- audience: 'velox-app-client',
97
- });
98
-
99
83
  // Dummy hash for timing attack prevention
100
84
  const DUMMY_HASH = '$2b$12$LQv3c1yqBWVHxkd0LHAkCOYz6TtxMQJqhN8/X4.uy7dPSSXB5G6Uy';
101
85
 
@@ -5,34 +5,13 @@
5
5
  * These are safe to import from procedures without pulling in server-only code.
6
6
  */
7
7
 
8
- // ============================================================================
9
- // Role Parsing
10
- // ============================================================================
11
-
12
- const ALLOWED_ROLES = ['user', 'admin', 'moderator', 'editor'] as const;
13
-
14
- export function parseUserRoles(rolesJson: string | null): string[] {
15
- if (!rolesJson) return ['user'];
16
-
17
- try {
18
- const parsed: unknown = JSON.parse(rolesJson);
8
+ import { createEnhancedTokenStore, jwtManager } from '@veloxts/auth';
19
9
 
20
- if (!Array.isArray(parsed)) {
21
- return ['user'];
22
- }
23
-
24
- const validRoles = parsed
25
- .filter((role): role is string => typeof role === 'string')
26
- .filter((role) => ALLOWED_ROLES.includes(role as (typeof ALLOWED_ROLES)[number]));
27
-
28
- return validRoles.length > 0 ? validRoles : ['user'];
29
- } catch {
30
- return ['user'];
31
- }
32
- }
10
+ // Re-export from @veloxts/auth for convenience
11
+ export { createEnhancedTokenStore, parseUserRoles } from '@veloxts/auth';
33
12
 
34
13
  // ============================================================================
35
- // Token Revocation Store
14
+ // Token Store
36
15
  // ============================================================================
37
16
 
38
17
  /**
@@ -42,63 +21,7 @@ export function parseUserRoles(rolesJson: string | null): string[] {
42
21
  * - Persistence across server restarts
43
22
  * - Horizontal scaling (multiple server instances)
44
23
  */
45
- class InMemoryTokenStore {
46
- private revokedTokens: Map<string, number> = new Map();
47
- private usedRefreshTokens: Map<string, string> = new Map();
48
- private cleanupInterval: NodeJS.Timeout | null = null;
49
-
50
- constructor() {
51
- this.cleanupInterval = setInterval(() => this.cleanup(), 5 * 60 * 1000);
52
- }
53
-
54
- revoke(jti: string, expiresInMs: number = 7 * 24 * 60 * 60 * 1000): void {
55
- this.revokedTokens.set(jti, Date.now() + expiresInMs);
56
- }
57
-
58
- isRevoked(jti: string): boolean {
59
- const expiry = this.revokedTokens.get(jti);
60
- if (!expiry) return false;
61
- if (Date.now() > expiry) {
62
- this.revokedTokens.delete(jti);
63
- return false;
64
- }
65
- return true;
66
- }
67
-
68
- markRefreshTokenUsed(jti: string, userId: string): void {
69
- this.usedRefreshTokens.set(jti, userId);
70
- setTimeout(() => this.usedRefreshTokens.delete(jti), 7 * 24 * 60 * 60 * 1000);
71
- }
72
-
73
- isRefreshTokenUsed(jti: string): string | undefined {
74
- return this.usedRefreshTokens.get(jti);
75
- }
76
-
77
- revokeAllUserTokens(userId: string): void {
78
- console.warn(
79
- `[Security] Token reuse detected for user ${userId}. ` +
80
- 'All tokens should be revoked. Implement proper user->token mapping for production.'
81
- );
82
- }
83
-
84
- private cleanup(): void {
85
- const now = Date.now();
86
- for (const [jti, expiry] of this.revokedTokens.entries()) {
87
- if (now > expiry) {
88
- this.revokedTokens.delete(jti);
89
- }
90
- }
91
- }
92
-
93
- destroy(): void {
94
- if (this.cleanupInterval) {
95
- clearInterval(this.cleanupInterval);
96
- this.cleanupInterval = null;
97
- }
98
- }
99
- }
100
-
101
- export const tokenStore = new InMemoryTokenStore();
24
+ export const tokenStore = createEnhancedTokenStore();
102
25
 
103
26
  // ============================================================================
104
27
  // JWT Configuration Helper
@@ -155,3 +78,24 @@ export function getJwtSecrets(): { jwtSecret: string; refreshSecret: string } {
155
78
 
156
79
  return { jwtSecret, refreshSecret };
157
80
  }
81
+
82
+ // ============================================================================
83
+ // JWT Manager Singleton
84
+ // ============================================================================
85
+
86
+ const { jwtSecret, refreshSecret } = getJwtSecrets();
87
+
88
+ /**
89
+ * Shared JWT manager instance for the application.
90
+ *
91
+ * Use this singleton instead of creating new jwtManager instances.
92
+ * Configured with environment variables via getJwtSecrets().
93
+ */
94
+ export const jwt = jwtManager({
95
+ secret: jwtSecret,
96
+ refreshSecret: refreshSecret,
97
+ accessTokenExpiry: '15m',
98
+ refreshTokenExpiry: '7d',
99
+ issuer: 'velox-app',
100
+ audience: 'velox-app-client',
101
+ });