- Add brand default recovery flow configuration to Authentik setup
- Update create_recovery_flow.py to set brand's recovery flow automatically
- All 17 servers now have brand recovery flow configured
Security improvements:
- Remove secrets/clients/*.sops.yaml from git tracking
- Remove ansible/host_vars/ from git tracking
- Update .gitignore to exclude sensitive config files
- Files remain encrypted and local, just not in repo
Note: Files still exist in git history. Consider using BFG Repo Cleaner
to remove them completely if needed.
🤖 Generated with Claude Code
Co-Authored-By: Claude <noreply@anthropic.com>
Remove accidentally committed tfplan file and obsolete backup files
from the tofu/ directory.
Changes:
- Remove tofu/tfplan from repository (binary plan file, should not be tracked)
- Delete terraform.tfvars.bak (old private network config, no longer needed)
- Delete terraform.tfstate.1768302414.backup (outdated state from Jan 13)
- Update .gitignore to prevent future commits of:
- tfplan files (tofu/tfplan, tofu/*.tfplan)
- Numbered state backups (tofu/terraform.tfstate.*.backup)
Security Assessment:
- tfplan contained infrastructure state (server IPs) but no credentials
- No sensitive tokens or passwords were exposed
- All actual secrets remain in SOPS-encrypted files only
The tfplan was only in commit b6c9fa6 (post-workshop state) and is now
removed going forward.
🤖 Generated with Claude Code (https://claude.com/claude-code)
Co-Authored-By: Claude <noreply@anthropic.com>
Added docs/ directory and all .md files (except README.md) to .gitignore
to prevent internal deployment logs, security notes, and test reports
from being committed to the repository.
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <noreply@anthropic.com>
GitGuardian detected hardcoded secret in test-oidc-provider.py.
Actions taken:
1. ✅ Deleted test-oidc-provider.py (previous commit)
2. ✅ Rotated authentik_bootstrap_token in secrets file
3. ✅ Added test scripts to .gitignore to prevent future exposure
Old token (COMPROMISED): ak_0Xj3OmKT0rx5E_TDKjuvXAl2Ry8IfxlSDKPSRq7fH71uPX3M04d-Xg
New token: Encrypted in SOPS secrets file
Impact: Test environment only (test.vrije.cloud)
Next step: Redeploy test server to activate new token
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <noreply@anthropic.com>