forked from Nixius/authelia
1
0
Fork 0
Commit Graph

20 Commits

Author SHA1 Message Date
Leopere 8b3ba3ab5a
archive legacy auth stack
Move Authelia and LLDAP artifacts out of the active deployment path so ATLAS ships against the Authentik-backed stack and ss-atlas image only.

Made-with: Cursor
2026-04-25 15:12:47 -04:00
Leopere 897e1f6b17
bump 2026-03-05 15:36:59 -05:00
Leopere 630bd3d3f4
bump 2026-03-05 15:20:55 -05:00
Leopere 4ac4de9df2
Path-based routing, tiered pricing, customer details, Stripe MCP
- Path-based routing: bc.a250.ca/login, /dashboard, /activate, etc.
- Tiered pricing: first 10 free (3mo), next 40 $20/yr->$100/mo, 51+ $200/mo
- Success page: instructs to check inbox for password + 2FA setup
- Messaging: LANDING_TAGLINE, LANDING_FEATURES env vars
- Domain validation: required, must resolve via DNS
- Customer details: phone required, sanitized email/phone, stored in LLDAP
- Stripe MCP: .cursor/mcp.json, stripe-setup.sh for products/prices
- Invoice webhook: migrate $20/yr subs to $100/mo on renewal

Made-with: Cursor
2026-03-04 17:05:42 -05:00
Leopere a92cbe9b72
Add header to stack-template, force-update images on deploy
- stack-template.yml: prominent comment explaining this is the product
  being sold and how to swap in the real application image
- deploy-stack-dev.sh: force-update locally-built images after stack
  deploy so swarm always runs the freshly built container

Made-with: Cursor
2026-03-03 16:48:03 -05:00
Leopere b66dfa053e
Force auth on all customer stacks, migrate to swarm stack.yml
- Remove public/private toggle — all customer stacks now always deploy
  behind authelia-auth middleware, no exceptions
- Remove ALLOW_CUSTOMER_STACK_AUTH_TOGGLE and CUSTOMER_STACK_REQUIRE_AUTH_DEFAULT
  config, env vars, routes, and UI
- Replace docker-compose.dev.yml + docker-compose.swarm-dev.yml with
  unified stack.yml for swarm deployment
- Various handler, ldap, stripe, swarm, and template additions from
  prior work sessions

Made-with: Cursor
2026-03-03 15:51:25 -05:00
Leopere 6fcdd1262d
Bake git commit into Go binary for version traceability
- Add internal/version package with ldflags-injected Commit/BuildTime
- Dockerfile accepts BUILD_COMMIT/BUILD_TIME args, passes via -ldflags
- Log version on startup, expose GET /version endpoint
- Show commit hash badge in bottom-right of landing + dashboard pages
- Deploy scripts gate on clean git tree and pass commit to build
- Remove staging files, misc config updates

Made-with: Cursor
2026-03-03 12:51:12 -05:00
Leopere c3097bd8fe
Deploy: prune old images after deploy, document full rebuild/redeploy
Made-with: Cursor
2026-03-03 11:35:07 -05:00
Leopere ac24f6d1dc
Add ss-atlas service, config updates, ignore IDE cruft
Made-with: Cursor
2026-03-03 11:21:03 -05:00
colin a01930a6a6 Fix CI deployment script to remove OIDC secrets from required variables - Remove IDENTITY_PROVIDERS_OIDC_* and CLIENT_SECRET_* from required env vars - Remove them from secrets management list - This fixes deployment script failure when OIDC is disabled 2025-06-11 16:18:23 -04:00
Your Name e70fed6ad8 Enable passkey login and improve WebAuthn configuration 2025-06-06 10:15:12 -04:00
Your Name bb890c17d4 fixing deploy step 2025-06-05 12:12:49 -04:00
Your Name ff3d077282 fixing deploy step 2025-06-05 11:58:43 -04:00
Your Name 40fe535bdd fixing deploy step 2025-06-05 11:46:01 -04:00
Your Name 1f207cb0d2 fixing deploy step 2025-06-05 11:26:05 -04:00
Your Name 03b209140d fixing deploy step 2025-06-05 09:36:23 -04:00
Your Name 4e1e5f21cf fixing deploy step 2025-06-05 09:27:46 -04:00
Your Name 993b32af46 optimize: speed up deployment while ensuring latest images and better diagnostics - Force pull latest images with hash verification before deployment - Reduce timeouts: deployment 3min, health check 90s, stack removal 60s - Check every 2s instead of 5s for faster feedback - Exit early on clear failures to avoid waiting - Comprehensive container-level diagnostics on failure - Show task status, container logs, and service inspection - Verify deployed image matches pulled image hash - Minimal 10s initialization wait instead of 30s - Better error messages with image hash tracking 2025-06-05 09:15:00 -04:00
Your Name bf09520c1d enhance: add comprehensive resilience to CI deployment script - Concurrent execution prevention with lock files - Retry logic for transient failures (3 attempts) - Extensive pre-flight checks (disk space, env vars, Docker health) - Configurable timeouts (5min deployment, 2min health checks) - Enhanced health checking with multiple validation methods - Automatic cleanup on script exit - Detailed debugging information on failure - Environment variable validation for all 10 secrets - Rollback preparation and improved logging 2025-06-05 09:11:37 -04:00
Your Name 9645631496 fixing deploy step 2025-06-05 09:06:59 -04:00