Leopere
d2c8327d8c
Fix template: use splitList (returns slice) instead of split (returns map)
...
split returns {_0: ..., _1: ...} map, index needs string key.
splitList returns a proper slice that works with index 1.
Made-with: Cursor
2026-03-04 18:25:24 -05:00
Leopere
7c9d40f538
Fix reset URL: hardcode correct base, extract token from .LinkURL
...
Authelia generates broken URLs (missing /reset-password/step2, has
%2F encoding). Instead of chaining replaces, hardcode the known-good
base URL and extract just the JWT token via split.
Made-with: Cursor
2026-03-04 18:23:47 -05:00
Leopere
0851d6f952
Fix reset URL: replace %2Flogin encoding in .LinkURL
...
Authelia URL-encodes the /login path in authelia_url when building
the JWT reset link, producing bc.a250.ca%2Flogin instead of
bc.a250.ca/login. Single replace fixes it without any other mangling.
Made-with: Cursor
2026-03-04 18:21:27 -05:00
Leopere
e3b9511487
Fix reset URL: use raw .LinkURL, remove Traefik redirect hack
...
The replace hacks in email templates were double-prepending
/reset-password/step2 since Authelia already generates the correct
URL. Removed the Traefik redirectregex middleware too since it's
no longer needed.
Made-with: Cursor
2026-03-04 18:16:56 -05:00
Leopere
e3edf4bb53
Revert: use hardcoded SMTP password - stack password fails SMTP auth
...
Made-with: Cursor
2026-03-04 18:08:15 -05:00
Leopere
c92151d5cf
Authelia notifier: use secret for SMTP password instead of hardcoded
...
Made-with: Cursor
2026-03-04 18:07:05 -05:00
Leopere
163128b0ca
Fix reset link: /login?token= -> /login/reset-password/step2?token=
...
Made-with: Cursor
2026-03-04 17:51:41 -05:00
Leopere
aabdf575e7
Reset email: a250.ca branding, set or reset password, 2FA note
...
Made-with: Cursor
2026-03-04 17:48:45 -05:00
Leopere
3f5320043c
Fix Authelia reset password URL: custom template replaces %2Flogin with /login
...
Made-with: Cursor
2026-03-04 17:43:35 -05:00
Leopere
4ac4de9df2
Path-based routing, tiered pricing, customer details, Stripe MCP
...
- Path-based routing: bc.a250.ca/login, /dashboard, /activate, etc.
- Tiered pricing: first 10 free (3mo), next 40 $20/yr->$100/mo, 51+ $200/mo
- Success page: instructs to check inbox for password + 2FA setup
- Messaging: LANDING_TAGLINE, LANDING_FEATURES env vars
- Domain validation: required, must resolve via DNS
- Customer details: phone required, sanitized email/phone, stored in LLDAP
- Stripe MCP: .cursor/mcp.json, stripe-setup.sh for products/prices
- Invoice webhook: migrate $20/yr subs to $100/mo on renewal
Made-with: Cursor
2026-03-04 17:05:42 -05:00
Leopere
b66dfa053e
Force auth on all customer stacks, migrate to swarm stack.yml
...
- Remove public/private toggle — all customer stacks now always deploy
behind authelia-auth middleware, no exceptions
- Remove ALLOW_CUSTOMER_STACK_AUTH_TOGGLE and CUSTOMER_STACK_REQUIRE_AUTH_DEFAULT
config, env vars, routes, and UI
- Replace docker-compose.dev.yml + docker-compose.swarm-dev.yml with
unified stack.yml for swarm deployment
- Various handler, ldap, stripe, swarm, and template additions from
prior work sessions
Made-with: Cursor
2026-03-03 15:51:25 -05:00
Leopere
6fcdd1262d
Bake git commit into Go binary for version traceability
...
- Add internal/version package with ldflags-injected Commit/BuildTime
- Dockerfile accepts BUILD_COMMIT/BUILD_TIME args, passes via -ldflags
- Log version on startup, expose GET /version endpoint
- Show commit hash badge in bottom-right of landing + dashboard pages
- Deploy scripts gate on clean git tree and pass commit to build
- Remove staging files, misc config updates
Made-with: Cursor
2026-03-03 12:51:12 -05:00
Leopere
ac24f6d1dc
Add ss-atlas service, config updates, ignore IDE cruft
...
Made-with: Cursor
2026-03-03 11:21:03 -05:00
colin
9bbec9a8d2
Clean up WebAuthn config: remove duplicate user_verification setting
...
- Removed duplicate user_verification from top-level webauthn config
- user_verification is now properly configured only under selection_criteria
- Passkey authentication remains enabled and properly configured
2025-06-20 15:57:20 -04:00
colin
b3e748477d
Completely disable OIDC provider temporarily - Comment out all OIDC configuration in identity providers and clients - Remove OIDC secrets from stack to eliminate template processing issues - This should get Authelia running with basic auth only
2025-06-11 16:13:51 -04:00
colin
f062eeb40d
Completely remove Gitea OAuth client configuration - Template engine was processing commented CLIENT_SECRET_GITEA references - Complete removal should fix Authelia startup issue
2025-06-11 16:10:58 -04:00
colin
5ff5cb783a
Temporarily disable Gitea OAuth client to fix Authelia startup - Comment out Gitea OIDC client and remove CLIENT_SECRET_GITEA from stack.production.yml
2025-06-11 15:43:08 -04:00
colin
fdb8ee6ae8
fixup
2025-06-11 15:26:00 -04:00
colin
fac504117c
fixup
2025-06-11 14:34:40 -04:00
Your Name
507378655a
Add two-factor authentication for sensitive admin services
2025-06-06 11:44:10 -04:00
Your Name
e70fed6ad8
Enable passkey login and improve WebAuthn configuration
2025-06-06 10:15:12 -04:00
Your Name
bad88a00e9
fixup
2025-06-04 18:21:21 -04:00
colin
ad5cf74138
Update docker/authelia/config/configuration.acl.yml
2025-02-06 17:28:27 -05:00
colin
6f70df42f2
Update docker/authelia/config/configuration.acl.yml
2024-09-25 20:19:07 -04:00
colin
7e6d78b1c6
Update docker/authelia/config/configuration.acl.yml
2024-09-25 20:11:05 -04:00
colin
9e744a895a
Update docker/authelia/config/configuration.server.yml
2024-07-15 01:58:48 +00:00
colin
ee8d8764ae
Update docker/authelia/config/configuration.server.yml
2024-07-15 01:36:00 +00:00
colin
962cc71add
Update docker/authelia/config/configuration.server.yml
2024-05-02 20:17:40 +00:00
colin
7df2037928
Update docker/authelia/config/configuration.server.yml
2024-05-02 20:10:56 +00:00
colin
b6a682e337
Update docker/authelia/config/configuration.server.yml
2024-05-02 19:57:50 +00:00
colin
5cd6a20006
Update docker/authelia/config/configuration.acl.yml
2024-04-12 18:44:35 +00:00
colin
90fbd4f1f2
Update docker/authelia/config/configuration.oidc.clients.yml
2024-04-10 14:27:30 +00:00
colin
c491c788af
Update docker/authelia/config/configuration.oidc.clients.yml
2024-04-10 14:13:32 +00:00
colin
10a2f16945
Update docker/authelia/config/configuration.oidc.clients.yml
2024-04-09 20:30:55 +00:00
colin
6b3ccdea78
Update docker/authelia/config/configuration.oidc.clients.yml
2024-04-09 20:29:59 +00:00
Colin
21bbcc6de9
Fixup
2024-04-09 10:58:24 -04:00
Colin
d10a14fd0c
Fixup
2024-04-09 09:24:10 -04:00
Colin
bdefad30e5
Fixup
2024-04-09 08:12:54 -04:00
Colin
85bad786c0
working
2024-04-07 22:05:28 -04:00
Colin
c485356bdd
adding
2024-04-07 21:57:12 -04:00
colin
93372eeb7f
Update docker/authelia/config/configuration.server.yml
2024-04-08 01:30:22 +00:00
Colin
c26b29a8c2
update
2024-04-07 21:14:47 -04:00
Colin
4cb2ca7c91
update
2024-04-07 18:05:17 -04:00
Colin
014bcefbc9
update
2024-04-07 16:39:22 -04:00
Colin
c65f1ad5c1
debug on
2024-04-07 16:34:48 -04:00
Colin
98747d2c08
update
2024-04-07 16:30:52 -04:00
Colin
a9079140e1
update
2024-04-07 16:27:57 -04:00
Colin
3987bb4c91
update
2024-04-07 16:24:46 -04:00
colin
ebf833c313
Update docker/authelia/config/configuration.server.yml
2024-04-07 20:10:59 +00:00
colin
2f97267136
Update docker/authelia/config/configuration.server.yml
2024-04-07 20:03:56 +00:00