forked from Nixius/authelia
1
0
Fork 0
Commit Graph

72 Commits

Author SHA1 Message Date
Leopere aabdf575e7
Reset email: a250.ca branding, set or reset password, 2FA note
Made-with: Cursor
2026-03-04 17:48:45 -05:00
Leopere 3f5320043c
Fix Authelia reset password URL: custom template replaces %2Flogin with /login
Made-with: Cursor
2026-03-04 17:43:35 -05:00
Leopere 926ddc0356
Add password reset resend button with 1-min rate limit
- Rate limiter per username (resend_ratelimit.go)
- handleResendReset accepts username or email, returns JSON
- Success page: Resend button with 60s cooldown from first send
- Activate page (NeedLogin): email input + Resend with cooldown

Made-with: Cursor
2026-03-04 17:18:51 -05:00
Leopere 4ac4de9df2
Path-based routing, tiered pricing, customer details, Stripe MCP
- Path-based routing: bc.a250.ca/login, /dashboard, /activate, etc.
- Tiered pricing: first 10 free (3mo), next 40 $20/yr->$100/mo, 51+ $200/mo
- Success page: instructs to check inbox for password + 2FA setup
- Messaging: LANDING_TAGLINE, LANDING_FEATURES env vars
- Domain validation: required, must resolve via DNS
- Customer details: phone required, sanitized email/phone, stored in LLDAP
- Stripe MCP: .cursor/mcp.json, stripe-setup.sh for products/prices
- Invoice webhook: migrate $20/yr subs to $100/mo on renewal

Made-with: Cursor
2026-03-04 17:05:42 -05:00
Leopere 7e40fea6f3
Archive customer volumes on expiry, restore on resubscribe
When a subscription is deleted, all Docker volumes for the customer
stack are tarred to /data/archives/{stackName}/ before the stack is
removed and volumes pruned. On resubscribe or reactivation, volumes
are restored from the archive before deploying the stack.

Made-with: Cursor
2026-03-03 18:43:14 -05:00
Leopere 75b63ca923
Persist Gitea config and skip install wizard
Add gitea_config volume for /etc/gitea so app.ini survives restarts.
Set INSTALL_LOCK=true to skip the setup wizard since all config is
provided via environment variables.

Made-with: Cursor
2026-03-03 18:32:29 -05:00
Leopere ab11e62c04
Fix security settings links and enable 2FA for customer stacks
- Update dashboard buttons to use correct Authelia paths:
  /settings/two-factor-authentication and /settings/security
- Change customer stack ACL from one_factor to two_factor so Authelia
  enables the 2FA registration UI (passkeys, TOTP)

Made-with: Cursor
2026-03-03 18:26:20 -05:00
Leopere 8f55b9802b
Add Account Security card with direct links to Authelia settings
Replaces the generic "Account Settings" button with a dedicated card
containing passkey, TOTP, and password links plus a warning about
enabling 2FA to prevent account compromise.

Made-with: Cursor
2026-03-03 18:21:50 -05:00
Leopere bd84b0a578
Include remaining template and route changes
Made-with: Cursor
2026-03-03 18:11:38 -05:00
Leopere bbc828fa35
Fall back to LDAP group check when Authelia session is stale
The Remote-Groups header reflects groups at login time. If a user was
added to 'customers' after logging in (via /activate), the dashboard
would show "No Active Subscription". Now checks LDAP directly as
fallback.

Made-with: Cursor
2026-03-03 18:11:31 -05:00
Leopere 1f8f50d50b
Redirect paid-but-not-activated users from landing to /activate
If a logged-in user has a Stripe customer ID but isn't in the customers
group yet, they've paid but haven't activated. Send them to /activate
instead of showing "No Active Subscription".

Made-with: Cursor
2026-03-03 18:07:57 -05:00
Leopere 91c0411b90
Add /resend-reset endpoint so set-password button sends email directly
The welcome page button was linking to Authelia's reset page which
requires an active login session. Now it POSTs to /resend-reset which
calls the Authelia API server-side and sends the email immediately.
Button text updated from "Reset Password" to "Set Password".

Made-with: Cursor
2026-03-03 17:30:38 -05:00
Leopere aa1201560d
Show welcome page for any user not yet in customers group
Previously, users already in LDAP but not yet activated (e.g. webhook
created the user, or lapsed sub) were redirected to the auth-gated
dashboard. Now only active customers (in 'customers' group) skip the
welcome page — everyone else sees onboarding with password reset.

Made-with: Cursor
2026-03-03 17:20:21 -05:00
Leopere c7d19ed20d
Fix success page skipped due to webhook race condition
The webhook was provisioning the user before the success page loaded,
causing IsNew=false and skipping the welcome/onboarding page entirely.

Now:
- Webhook only ensures user+stripe ID as a backstop (no password email)
- Success page is the sole owner of password reset + welcome flow
- Uses group membership (not IsNew) to distinguish new vs returning:
  if already in 'customers' group -> dashboard, otherwise -> welcome

Made-with: Cursor
2026-03-03 17:16:48 -05:00
Leopere 677bef195f
Trigger Authelia password reset email on new user checkout
The triggerPasswordReset function existed but was never called.
New users now receive a set-password email immediately after their
Stripe checkout completes.

Made-with: Cursor
2026-03-03 17:13:37 -05:00
Leopere c68edc70d1
Switch customer stack to Gitea + PostgreSQL two-service pattern
- web: Gitea (self-hosted Git), exposed via Traefik behind Authelia
- db: PostgreSQL 16, internal backend network only, never exposed
- Establishes the canonical web+db template structure for future products

Made-with: Cursor
2026-03-03 17:02:49 -05:00
Leopere 463483f769
Unify stack action button behaviour via single event listener
Replace per-form onsubmit handlers with a single script that handles
all data-stack-action forms identically: confirm if needed, then
disable the button and show a contextual loading label.

Made-with: Cursor
2026-03-03 17:00:58 -05:00
Leopere 239d2c07e1
Disable stack action buttons on submit to prevent spam
Made-with: Cursor
2026-03-03 16:58:56 -05:00
Leopere 084548fcd7
Fix dashboard stack state UI after Destroy
- Inverted condition was showing 'being provisioned' when stack not deployed
- Actions block was gated on StackDeployed so no Start button after destroy
- Start button now always shown when not running
- Destroy button only shown when stack is deployed
- 'Being provisioned' message replaced with accurate 'stopped' message

Made-with: Cursor
2026-03-03 16:56:48 -05:00
Leopere 6356cbb1da
Fix Destroy being immediately undone by dashboard auto-redeploy
Dashboard was auto-deploying any missing stack on every page load.
This stomped on the Destroy action. Stack creation only happens at
activation and via explicit Start — not on dashboard render.

Made-with: Cursor
2026-03-03 16:52:31 -05:00
Leopere e71831cf9d
Switch customer stack product to Uptime Kuma
Each customer now receives a dedicated Uptime Kuma monitoring instance
at their subdomain. Drops the unused Redis sidecar from the template.

Made-with: Cursor
2026-03-03 16:49:50 -05:00
Leopere a92cbe9b72
Add header to stack-template, force-update images on deploy
- stack-template.yml: prominent comment explaining this is the product
  being sold and how to swap in the real application image
- deploy-stack-dev.sh: force-update locally-built images after stack
  deploy so swarm always runs the freshly built container

Made-with: Cursor
2026-03-03 16:48:03 -05:00
Leopere 74a24ffe2a
Fix subscription status not showing Expiring for cancel_at_period_end subs
- Also check sub.CancelAt > 0 (handles explicit cancel_at date, not just period-end)
- Fall back to item CurrentPeriodEnd for the display date since current_period_end
  moved off the top-level Subscription object in stripe-go v84

Made-with: Cursor
2026-03-03 16:00:24 -05:00
Leopere 159a0b4455
Remove Rebuild button from dashboard UI
Made-with: Cursor
2026-03-03 15:55:21 -05:00
Leopere b66dfa053e
Force auth on all customer stacks, migrate to swarm stack.yml
- Remove public/private toggle — all customer stacks now always deploy
  behind authelia-auth middleware, no exceptions
- Remove ALLOW_CUSTOMER_STACK_AUTH_TOGGLE and CUSTOMER_STACK_REQUIRE_AUTH_DEFAULT
  config, env vars, routes, and UI
- Replace docker-compose.dev.yml + docker-compose.swarm-dev.yml with
  unified stack.yml for swarm deployment
- Various handler, ldap, stripe, swarm, and template additions from
  prior work sessions

Made-with: Cursor
2026-03-03 15:51:25 -05:00
Leopere 6fcdd1262d
Bake git commit into Go binary for version traceability
- Add internal/version package with ldflags-injected Commit/BuildTime
- Dockerfile accepts BUILD_COMMIT/BUILD_TIME args, passes via -ldflags
- Log version on startup, expose GET /version endpoint
- Show commit hash badge in bottom-right of landing + dashboard pages
- Deploy scripts gate on clean git tree and pass commit to build
- Remove staging files, misc config updates

Made-with: Cursor
2026-03-03 12:51:12 -05:00
Leopere ac24f6d1dc
Add ss-atlas service, config updates, ignore IDE cruft
Made-with: Cursor
2026-03-03 11:21:03 -05:00
colin 9bbec9a8d2 Clean up WebAuthn config: remove duplicate user_verification setting
- Removed duplicate user_verification from top-level webauthn config
- user_verification is now properly configured only under selection_criteria
- Passkey authentication remains enabled and properly configured
2025-06-20 15:57:20 -04:00
colin 4ae5e0a956 fixup 2025-06-11 16:14:22 -04:00
colin b3e748477d Completely disable OIDC provider temporarily - Comment out all OIDC configuration in identity providers and clients - Remove OIDC secrets from stack to eliminate template processing issues - This should get Authelia running with basic auth only 2025-06-11 16:13:51 -04:00
colin f062eeb40d Completely remove Gitea OAuth client configuration - Template engine was processing commented CLIENT_SECRET_GITEA references - Complete removal should fix Authelia startup issue 2025-06-11 16:10:58 -04:00
colin 5ff5cb783a Temporarily disable Gitea OAuth client to fix Authelia startup - Comment out Gitea OIDC client and remove CLIENT_SECRET_GITEA from stack.production.yml 2025-06-11 15:43:08 -04:00
colin fdb8ee6ae8 fixup 2025-06-11 15:26:00 -04:00
colin fac504117c fixup 2025-06-11 14:34:40 -04:00
Your Name 507378655a Add two-factor authentication for sensitive admin services 2025-06-06 11:44:10 -04:00
Your Name e70fed6ad8 Enable passkey login and improve WebAuthn configuration 2025-06-06 10:15:12 -04:00
Your Name 1a04d35590 fix: create assets directory in Dockerfile to resolve configuration error - Add mkdir -p /config/assets to satisfy Authelia's expectation - Prevents 'directory does not exist' error without unnecessary config 2025-06-05 08:53:36 -04:00
Your Name bad88a00e9 fixup 2025-06-04 18:21:21 -04:00
Your Name 73e9856e61 fixup 2025-06-04 16:20:48 -04:00
colin ad5cf74138 Update docker/authelia/config/configuration.acl.yml 2025-02-06 17:28:27 -05:00
colin 6f70df42f2 Update docker/authelia/config/configuration.acl.yml 2024-09-25 20:19:07 -04:00
colin 7e6d78b1c6 Update docker/authelia/config/configuration.acl.yml 2024-09-25 20:11:05 -04:00
colin 9e744a895a Update docker/authelia/config/configuration.server.yml 2024-07-15 01:58:48 +00:00
colin ee8d8764ae Update docker/authelia/config/configuration.server.yml 2024-07-15 01:36:00 +00:00
colin 962cc71add Update docker/authelia/config/configuration.server.yml 2024-05-02 20:17:40 +00:00
colin 7df2037928 Update docker/authelia/config/configuration.server.yml 2024-05-02 20:10:56 +00:00
colin b6a682e337 Update docker/authelia/config/configuration.server.yml 2024-05-02 19:57:50 +00:00
colin 5cd6a20006 Update docker/authelia/config/configuration.acl.yml 2024-04-12 18:44:35 +00:00
colin 90fbd4f1f2 Update docker/authelia/config/configuration.oidc.clients.yml 2024-04-10 14:27:30 +00:00
colin c491c788af Update docker/authelia/config/configuration.oidc.clients.yml 2024-04-10 14:13:32 +00:00