feat: Initialize Zastava Webhook service with TLS and Authority authentication
- Added Program.cs to set up the web application with Serilog for logging, health check endpoints, and a placeholder admission endpoint. - Configured Kestrel server to use TLS 1.3 and handle client certificates appropriately. - Created StellaOps.Zastava.Webhook.csproj with necessary dependencies including Serilog and Polly. - Documented tasks in TASKS.md for the Zastava Webhook project, outlining current work and exit criteria for each task.
This commit is contained in:
		
							
								
								
									
										5
									
								
								src/StellaOps.Plugin/TASKS.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								src/StellaOps.Plugin/TASKS.md
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,5 @@ | ||||
| # TASKS | ||||
| | Task | Owner(s) | Depends on | Notes | | ||||
| |---|---|---|---| | ||||
| |PLUGIN-DI-08-001 Scoped service support in plugin bootstrap|Plugin Platform Guild (DOING 2025-10-19)|StellaOps.DependencyInjection|Introduce plugin metadata capable of registering scoped services; update plugin loader to instantiate DI routines once per plugin while honouring lifetime hints; document registration contract.| | ||||
| |PLUGIN-DI-08-002 Authority plugin integration updates|Plugin Platform Guild, Authority Core|PLUGIN-DI-08-001|Update Authority identity-provider plugin registrar/registry to resolve scoped services correctly; adjust bootstrap flows and background services to create scopes when needed; add regression tests.| | ||||
		Reference in New Issue
	
	Block a user