Commit graph

168 commits

Author SHA1 Message Date
0ae18f495e Tests, UX improvements. 2026-04-05 14:25:29 +01:00
4e6f5d36b8 UX/UI improvements. 2026-04-05 13:26:51 +01:00
418d3cc402 UI/UX tweaks and improvements. 2026-04-05 12:28:41 +01:00
036af95e00 fix: replace member.save() in invite.post.js and remove stale NUXT_PUBLIC_HELCIM_TOKEN env check 2026-04-04 14:02:06 +01:00
d31b5b4dac fix: use private helcimApiToken for all server-side Helcim API calls 2026-04-04 13:37:34 +01:00
ccd1d0783a fix: use canonical member email for series registration when authenticated 2026-04-04 13:27:47 +01:00
44f3ee8c8c fix: check JWT auth before email lookup in series purchase 2026-04-04 13:26:01 +01:00
bc887ca1d4 fix: replace member.save() with findByIdAndUpdate in Slack invite helper 2026-04-04 13:24:22 +01:00
e592b962ec fix: replace member.save() with findByIdAndUpdate in login.post.js 2026-04-04 13:22:36 +01:00
a7b04bfd3c fix: remove explicit requireAuth import (Nitro auto-imports it) 2026-04-04 12:44:01 +01:00
ee438f5c60 chore: remove working copies and superseded verify.get.js 2026-04-04 12:41:33 +01:00
a32e4de2ac feat: wire welcome email for new member creation 2026-04-04 12:40:15 +01:00
8b7f124f15 refactor: use requireAuth in updates routes (optional-auth) 2026-04-04 12:39:09 +01:00
cbb519449a refactor: use requireAuth in updates routes (required-auth) 2026-04-04 12:36:25 +01:00
15fdf77be8 feat: add /api/health endpoint for uptime monitoring 2026-04-04 12:35:26 +01:00
1875f16d48 feat: validate all required env vars at startup 2026-04-04 12:34:49 +01:00
255518a6a8 fix: throw on missing OIDC_COOKIE_SECRET in production 2026-04-04 12:34:06 +01:00
3b7b75ab70 fix: validate ticket type matches entitlement in series purchase 2026-04-04 12:31:58 +01:00
3620dad03a fix: use requireAuth for member pricing to include revocation + status checks 2026-04-04 12:30:54 +01:00
cee67dc005 fix: use auth cookie for member pricing in series available endpoint 2026-04-04 12:28:55 +01:00
db04b270f4 fix: remove redundant connectDB in cancel-subscription 2026-04-04 12:27:34 +01:00
bbe94f0efb fix: replace member.save() with atomic update in cancel-subscription 2026-04-04 12:26:56 +01:00
d4d9629d83 fix: remove redundant connectDB in verify (requireAuth handles it) 2026-04-04 12:25:25 +01:00
79c712a9e9 fix: replace member.save() with atomic update in verify 2026-04-04 12:24:52 +01:00
707ff7b13a fix: remove redundant connectDB in logout (requireAuth handles it) 2026-04-04 12:24:24 +01:00
ab2532dee8 fix: replace member.save() with atomic update in logout 2026-04-04 12:23:01 +01:00
fcd6f4cdf4 feat: reskin admin pages to zine design system
Migrate the entire admin section from the dark guild-* Tailwind theme
to the zine design system (dashed borders, CSS custom properties,
Brygada 1918 + Commit Mono, cream/dark mode palette).

- Replace admin top-nav layout with sidebar matching default layout
- Reskin dashboard, members, events, series management pages
- Reskin events/create and series/create form pages
- Add dev-only test login endpoint (GET /api/dev/test-login)
- Redirect duplicate admin/dashboard.vue to /admin
- Update CLAUDE.md design system docs
2026-04-03 10:56:01 +01:00
c785a23910 Redirect regular members to coming-soon page after magic link login
Instead of sending members directly to the wiki (where they hit
Outline's login page and have to click again), land them on the
coming-soon page which shows a welcome message and wiki link.
2026-03-19 13:02:12 +00:00
2705d171bd Add missing schemas, member model fields, and import endpoint
Adds memberInviteSchema and bulkMemberImportSchema needed by the invite
and CSV import endpoints. Adds inviteEmailSent/inviteEmailSentAt fields
to member model. Adds the bulk import API route.
2026-03-19 11:44:49 +00:00
772f57c2b2 Route login redirect by role: admins to /admin, everyone else to wiki 2026-03-19 10:48:35 +00:00
c0dcfac173 Redirect invite logins to wiki, regular logins to /members
Invite tokens now include a redirect claim so the verify endpoint
can distinguish them from regular login tokens. Only invite links
redirect to wiki.ghostguild.org; normal logins go to /members.
2026-03-19 10:48:00 +00:00
27c07cd3e9 Send invite emails as HTML with clickable button, redirect login to wiki
Invite emails now include both plain text and HTML versions. The
{loginLink} placeholder renders as a styled button in HTML email
clients. Other URLs in the template are auto-linked. The auth verify
endpoint redirects to wiki.ghostguild.org instead of /members.
2026-03-19 10:41:21 +00:00
44805dbecf Remove serif fonts from wiki login and logout pages 2026-03-11 14:22:06 +00:00
2258f9d2ae Switch wiki login email to plain text format 2026-03-11 14:13:59 +00:00
ba5cce62fb Fix OIDC logout form posting to http:// behind reverse proxy
The oidc-provider generates form actions using http:// despite proxy
trust settings, causing an insecure form submission warning. Rewrite
the form action URL to https:// before rendering.
2026-03-05 23:11:00 +00:00
fed1cc4bc7 Skip CSP on OIDC routes to fix logout form submission
The oidc-provider generates form actions with http:// URLs that
conflict with the CSP form-action directive. OIDC routes serve
self-contained HTML outside Nuxt, so CSP is not needed there.
2026-03-05 23:05:52 +00:00
ba92075366 Fix OIDC issuer generating http:// URLs in production
The OIDC provider was falling back to config.public.appUrl for its
issuer, which could resolve to an http:// URL. This caused the logout
form action to use http://, violating the CSP form-action directive.
Hardcode the issuer fallback to https://ghostguild.org.
2026-03-05 22:42:12 +00:00
17d29647b4 Allow OIDC logout form submission in CSP form-action directive
The oidc-provider library renders logout forms with absolute URLs,
which gets blocked by the strict form-action 'self' CSP directive.
2026-03-05 22:33:11 +00:00
c3c8b6bcd4 Refactor email templates to use plain text format and update sender addresses
- Simplified the magic link email format to plain text for better compatibility.
- Updated the welcome email to use plain text and changed the sender address to match the domain.
- Enhanced event registration email format to plain text, removing HTML styling for a cleaner approach.
2026-03-05 18:40:37 +00:00
fadf473dde Readying for design 2026-03-04 18:24:20 +00:00
d73256ca2b Tidy template 2026-03-04 17:40:49 +00:00
bf57f4b33d Style wiki auth screens with guild design system
Add guild-styled HTML templates for OIDC logout confirmation, post-logout
success, and error pages. Update wiki login heading to brand convention
(candlelight + warm-text). Restyle magic link email from blue to guild
colour tokens.
2026-03-04 17:26:48 +00:00
4b3fed9689 Move OIDC login page to /auth/wiki-login to avoid catch-all conflict
The /oidc/[...] server catch-all was intercepting /oidc/login before
the Nuxt page router could render it. Moving the page outside /oidc/
avoids the conflict entirely.
2026-03-01 17:19:41 +00:00
3187b5118b Skip /oidc/login in catch-all so Nuxt renders the login page
The server catch-all route was intercepting /oidc/login and passing
it to oidc-provider, which returned 404. Now it falls through to
the Vue page router instead.
2026-03-01 17:12:31 +00:00
025c1a180f Add Zod validation to all API endpoints and remove debug test route
Adds schema-based input validation across helcim, events, members,
series, admin, and updates API endpoints. Removes the peer-support
debug test endpoint. Adds validation test coverage.
2026-03-01 17:04:26 +00:00
e4813075b7 Force x-forwarded-proto to https for OIDC endpoints 2026-03-01 16:53:38 +00:00
a3b4f1118c Ensure OIDC endpoints use https behind reverse proxy
Set x-forwarded-proto header on requests before passing to
oidc-provider so generated URLs use https:// in production.
2026-03-01 16:49:40 +00:00
f43d1bf500 Trust proxy headers for OIDC provider
Set proxy: true so oidc-provider reads X-Forwarded-Proto from Traefik
and generates https:// endpoint URLs in the discovery document.
2026-03-01 16:45:44 +00:00
a055874680 Fix OIDC endpoint URLs to include /oidc prefix
Configure oidc-provider routes with explicit /oidc prefix so the
discovery document and token endpoints resolve correctly. Previously
the catch-all stripped the prefix, causing the provider to generate
URLs without it.
2026-03-01 16:41:38 +00:00
8a529a8e7c Add OIDC provider for Outline wiki SSO
Add oidc-provider with MongoDB adapter so ghostguild.org can act as
the identity provider for the self-hosted Outline wiki. Members
authenticate via the existing magic-link flow, with automatic SSO
when an active session exists. Includes interaction routes, well-known
discovery endpoint, and login page.
2026-03-01 15:46:01 +00:00