This document serves as the master checklist for implementing the Day 1 / Day 2 Securitization Journey.
These tasks ensure the out-of-the-box local developer experience functions fully.
.env override trap in docker-compose.yml.setup.sh to accept optional config.yaml to cure the "Brain Dead" state.sandbox-node container in docker-compose.yml so the Hub isn't an "Empty Shell" on startup.Enable local authentication using the CORTEX_ADMIN_PASSWORD generated by the setup script.
User model (app/db/models/user.py) to include a nullable password_hash column.Settings (app/config.py) to make OIDC settings optional and add an oidc_enabled: bool flag.CORTEX_ADMIN_PASSWORD is present in the environment for the SUPER_ADMINS initialization, hash it and assign it to the admin account.POST /api/v1/users/login/local to issue JWTs) and (PUT /api/v1/users/password for password resets).Support running the mesh over internal loopbacks but strictly warn the end-user.
GRPC_TLS_ENABLED, GRPC_EXTERNAL_ENDPOINT to config.py./api/v1/status or equivalent endpoint providing the current TLS/Hostname state to the frontend.Allow transition to Enterprise SSO without breaking or duplicate accounting.
app/core/services/auth.py (handle_callback) to search for existing local users via email and safely link the incoming OIDC sub payload.PUT /api/v1/admin/config/oidc for UI-based toggling and configuration of SSO parameters without restarting./api/v1/auth/config. If enabled, render the "Log in with SSO" button instead of or alongside local Auth.Wrap the gRPC nodes with SSL definitions.
serve_grpc in app/core/grpc/services/grpc_server.py. If GRPC_TLS_ENABLED, load generic server certs and call server.add_secure_port().PUT /api/v1/admin/config/swarm for UI-based configuration of GRPC_EXTERNAL_ENDPOINT and SSL Cert paths._generate_node_config_yaml (app/api/routes/nodes.py) to inject the GRPC_EXTERNAL_ENDPOINT and toggle grpc.ssl_channel_credentials() for python clients.