forked from Nixius/authelia
1
0
Fork 0
Commit Graph

55 Commits

Author SHA1 Message Date
Leopere d2c8327d8c
Fix template: use splitList (returns slice) instead of split (returns map)
split returns {_0: ..., _1: ...} map, index needs string key.
splitList returns a proper slice that works with index 1.

Made-with: Cursor
2026-03-04 18:25:24 -05:00
Leopere 7c9d40f538
Fix reset URL: hardcode correct base, extract token from .LinkURL
Authelia generates broken URLs (missing /reset-password/step2, has
%2F encoding). Instead of chaining replaces, hardcode the known-good
base URL and extract just the JWT token via split.

Made-with: Cursor
2026-03-04 18:23:47 -05:00
Leopere 0851d6f952
Fix reset URL: replace %2Flogin encoding in .LinkURL
Authelia URL-encodes the /login path in authelia_url when building
the JWT reset link, producing bc.a250.ca%2Flogin instead of
bc.a250.ca/login. Single replace fixes it without any other mangling.

Made-with: Cursor
2026-03-04 18:21:27 -05:00
Leopere e3b9511487
Fix reset URL: use raw .LinkURL, remove Traefik redirect hack
The replace hacks in email templates were double-prepending
/reset-password/step2 since Authelia already generates the correct
URL. Removed the Traefik redirectregex middleware too since it's
no longer needed.

Made-with: Cursor
2026-03-04 18:16:56 -05:00
Leopere e3edf4bb53
Revert: use hardcoded SMTP password - stack password fails SMTP auth
Made-with: Cursor
2026-03-04 18:08:15 -05:00
Leopere c92151d5cf
Authelia notifier: use secret for SMTP password instead of hardcoded
Made-with: Cursor
2026-03-04 18:07:05 -05:00
Leopere 163128b0ca
Fix reset link: /login?token= -> /login/reset-password/step2?token=
Made-with: Cursor
2026-03-04 17:51:41 -05:00
Leopere aabdf575e7
Reset email: a250.ca branding, set or reset password, 2FA note
Made-with: Cursor
2026-03-04 17:48:45 -05:00
Leopere 3f5320043c
Fix Authelia reset password URL: custom template replaces %2Flogin with /login
Made-with: Cursor
2026-03-04 17:43:35 -05:00
Leopere 4ac4de9df2
Path-based routing, tiered pricing, customer details, Stripe MCP
- Path-based routing: bc.a250.ca/login, /dashboard, /activate, etc.
- Tiered pricing: first 10 free (3mo), next 40 $20/yr->$100/mo, 51+ $200/mo
- Success page: instructs to check inbox for password + 2FA setup
- Messaging: LANDING_TAGLINE, LANDING_FEATURES env vars
- Domain validation: required, must resolve via DNS
- Customer details: phone required, sanitized email/phone, stored in LLDAP
- Stripe MCP: .cursor/mcp.json, stripe-setup.sh for products/prices
- Invoice webhook: migrate $20/yr subs to $100/mo on renewal

Made-with: Cursor
2026-03-04 17:05:42 -05:00
Leopere b66dfa053e
Force auth on all customer stacks, migrate to swarm stack.yml
- Remove public/private toggle — all customer stacks now always deploy
  behind authelia-auth middleware, no exceptions
- Remove ALLOW_CUSTOMER_STACK_AUTH_TOGGLE and CUSTOMER_STACK_REQUIRE_AUTH_DEFAULT
  config, env vars, routes, and UI
- Replace docker-compose.dev.yml + docker-compose.swarm-dev.yml with
  unified stack.yml for swarm deployment
- Various handler, ldap, stripe, swarm, and template additions from
  prior work sessions

Made-with: Cursor
2026-03-03 15:51:25 -05:00
Leopere 6fcdd1262d
Bake git commit into Go binary for version traceability
- Add internal/version package with ldflags-injected Commit/BuildTime
- Dockerfile accepts BUILD_COMMIT/BUILD_TIME args, passes via -ldflags
- Log version on startup, expose GET /version endpoint
- Show commit hash badge in bottom-right of landing + dashboard pages
- Deploy scripts gate on clean git tree and pass commit to build
- Remove staging files, misc config updates

Made-with: Cursor
2026-03-03 12:51:12 -05:00
Leopere ac24f6d1dc
Add ss-atlas service, config updates, ignore IDE cruft
Made-with: Cursor
2026-03-03 11:21:03 -05:00
colin 9bbec9a8d2 Clean up WebAuthn config: remove duplicate user_verification setting
- Removed duplicate user_verification from top-level webauthn config
- user_verification is now properly configured only under selection_criteria
- Passkey authentication remains enabled and properly configured
2025-06-20 15:57:20 -04:00
colin b3e748477d Completely disable OIDC provider temporarily - Comment out all OIDC configuration in identity providers and clients - Remove OIDC secrets from stack to eliminate template processing issues - This should get Authelia running with basic auth only 2025-06-11 16:13:51 -04:00
colin f062eeb40d Completely remove Gitea OAuth client configuration - Template engine was processing commented CLIENT_SECRET_GITEA references - Complete removal should fix Authelia startup issue 2025-06-11 16:10:58 -04:00
colin 5ff5cb783a Temporarily disable Gitea OAuth client to fix Authelia startup - Comment out Gitea OIDC client and remove CLIENT_SECRET_GITEA from stack.production.yml 2025-06-11 15:43:08 -04:00
colin fdb8ee6ae8 fixup 2025-06-11 15:26:00 -04:00
colin fac504117c fixup 2025-06-11 14:34:40 -04:00
Your Name 507378655a Add two-factor authentication for sensitive admin services 2025-06-06 11:44:10 -04:00
Your Name e70fed6ad8 Enable passkey login and improve WebAuthn configuration 2025-06-06 10:15:12 -04:00
Your Name bad88a00e9 fixup 2025-06-04 18:21:21 -04:00
colin ad5cf74138 Update docker/authelia/config/configuration.acl.yml 2025-02-06 17:28:27 -05:00
colin 6f70df42f2 Update docker/authelia/config/configuration.acl.yml 2024-09-25 20:19:07 -04:00
colin 7e6d78b1c6 Update docker/authelia/config/configuration.acl.yml 2024-09-25 20:11:05 -04:00
colin 9e744a895a Update docker/authelia/config/configuration.server.yml 2024-07-15 01:58:48 +00:00
colin ee8d8764ae Update docker/authelia/config/configuration.server.yml 2024-07-15 01:36:00 +00:00
colin 962cc71add Update docker/authelia/config/configuration.server.yml 2024-05-02 20:17:40 +00:00
colin 7df2037928 Update docker/authelia/config/configuration.server.yml 2024-05-02 20:10:56 +00:00
colin b6a682e337 Update docker/authelia/config/configuration.server.yml 2024-05-02 19:57:50 +00:00
colin 5cd6a20006 Update docker/authelia/config/configuration.acl.yml 2024-04-12 18:44:35 +00:00
colin 90fbd4f1f2 Update docker/authelia/config/configuration.oidc.clients.yml 2024-04-10 14:27:30 +00:00
colin c491c788af Update docker/authelia/config/configuration.oidc.clients.yml 2024-04-10 14:13:32 +00:00
colin 10a2f16945 Update docker/authelia/config/configuration.oidc.clients.yml 2024-04-09 20:30:55 +00:00
colin 6b3ccdea78 Update docker/authelia/config/configuration.oidc.clients.yml 2024-04-09 20:29:59 +00:00
Colin 21bbcc6de9 Fixup 2024-04-09 10:58:24 -04:00
Colin d10a14fd0c Fixup 2024-04-09 09:24:10 -04:00
Colin bdefad30e5 Fixup 2024-04-09 08:12:54 -04:00
Colin 85bad786c0 working 2024-04-07 22:05:28 -04:00
Colin c485356bdd adding 2024-04-07 21:57:12 -04:00
colin 93372eeb7f Update docker/authelia/config/configuration.server.yml 2024-04-08 01:30:22 +00:00
Colin c26b29a8c2 update 2024-04-07 21:14:47 -04:00
Colin 4cb2ca7c91 update 2024-04-07 18:05:17 -04:00
Colin 014bcefbc9 update 2024-04-07 16:39:22 -04:00
Colin c65f1ad5c1 debug on 2024-04-07 16:34:48 -04:00
Colin 98747d2c08 update 2024-04-07 16:30:52 -04:00
Colin a9079140e1 update 2024-04-07 16:27:57 -04:00
Colin 3987bb4c91 update 2024-04-07 16:24:46 -04:00
colin ebf833c313 Update docker/authelia/config/configuration.server.yml 2024-04-07 20:10:59 +00:00
colin 2f97267136 Update docker/authelia/config/configuration.server.yml 2024-04-07 20:03:56 +00:00