mirror of
https://github.com/steveiliop56/tinyauth.git
synced 2026-05-10 06:18:11 +00:00
fix: fix typos
This commit is contained in:
@@ -214,7 +214,7 @@ func (app *BootstrapApp) Setup() error {
|
|||||||
return errors.New("no authentication providers configured")
|
return errors.New("no authentication providers configured")
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, provider := range app.runtime.ConfiguredProviders {
|
for _, provider := range configuredProviders {
|
||||||
app.log.App.Debug().Str("provider", provider.Name).Msg("Configured authentication provider")
|
app.log.App.Debug().Str("provider", provider.Name).Msg("Configured authentication provider")
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -238,7 +238,7 @@ func (app *BootstrapApp) Setup() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// create err channel to listen for server errors
|
// create err channel to listen for server errors
|
||||||
errChan := make(chan error, 1)
|
errChan := make(chan error, 2)
|
||||||
|
|
||||||
// serve unix
|
// serve unix
|
||||||
app.wg.Go(func() {
|
app.wg.Go(func() {
|
||||||
@@ -317,7 +317,7 @@ func (app *BootstrapApp) serveUnix() error {
|
|||||||
listener, err := net.Listen("unix", app.config.Server.SocketPath)
|
listener, err := net.Listen("unix", app.config.Server.SocketPath)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create unix socket listner: %w", err)
|
return fmt.Errorf("failed to create unix socket listener: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
server := &http.Server{
|
server := &http.Server{
|
||||||
@@ -330,7 +330,7 @@ func (app *BootstrapApp) serveUnix() error {
|
|||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
<-app.ctx.Done()
|
<-app.ctx.Done()
|
||||||
app.log.App.Debug().Msg("Shutting down unix sokcet listener")
|
app.log.App.Debug().Msg("Shutting down unix socket listener")
|
||||||
server.Close()
|
server.Close()
|
||||||
listener.Close()
|
listener.Close()
|
||||||
os.Remove(app.config.Server.SocketPath)
|
os.Remove(app.config.Server.SocketPath)
|
||||||
@@ -338,7 +338,7 @@ func (app *BootstrapApp) serveUnix() error {
|
|||||||
|
|
||||||
err = server.Serve(listener)
|
err = server.Serve(listener)
|
||||||
|
|
||||||
if err != nil && (!errors.Is(err, net.ErrClosed) || !errors.Is(err, http.ErrServerClosed)) {
|
if err != nil && !errors.Is(err, net.ErrClosed) && !errors.Is(err, http.ErrServerClosed) {
|
||||||
return fmt.Errorf("failed to start unix socket listener: %w", err)
|
return fmt.Errorf("failed to start unix socket listener: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -19,7 +19,7 @@ func (app *BootstrapApp) setupServices() error {
|
|||||||
useKubernetes := app.config.LabelProvider == "kubernetes" ||
|
useKubernetes := app.config.LabelProvider == "kubernetes" ||
|
||||||
(app.config.LabelProvider == "auto" && os.Getenv("KUBERNETES_SERVICE_HOST") != "")
|
(app.config.LabelProvider == "auto" && os.Getenv("KUBERNETES_SERVICE_HOST") != "")
|
||||||
|
|
||||||
var labelProvider service.LabelProviderImpl
|
var labelProvider service.LabelProvider
|
||||||
|
|
||||||
if useKubernetes {
|
if useKubernetes {
|
||||||
app.log.App.Debug().Msg("Using Kubernetes label provider")
|
app.log.App.Debug().Msg("Using Kubernetes label provider")
|
||||||
|
|||||||
@@ -86,7 +86,7 @@ func (controller *UserController) loginHandler(c *gin.Context) {
|
|||||||
if errors.Is(err, service.ErrUserNotFound) {
|
if errors.Is(err, service.ErrUserNotFound) {
|
||||||
controller.log.App.Warn().Str("username", req.Username).Msg("User not found during login attempt")
|
controller.log.App.Warn().Str("username", req.Username).Msg("User not found during login attempt")
|
||||||
controller.auth.RecordLoginAttempt(req.Username, false)
|
controller.auth.RecordLoginAttempt(req.Username, false)
|
||||||
controller.log.AuditLoginFailure(req.Username, "unkown", c.ClientIP(), "user not found")
|
controller.log.AuditLoginFailure(req.Username, "unknown", c.ClientIP(), "user not found")
|
||||||
c.JSON(401, gin.H{
|
c.JSON(401, gin.H{
|
||||||
"status": 401,
|
"status": 401,
|
||||||
"message": "Unauthorized",
|
"message": "Unauthorized",
|
||||||
|
|||||||
@@ -121,7 +121,7 @@ func (c *UserContext) NewFromSession(session *repository.Session) (*UserContext,
|
|||||||
Email: session.Email,
|
Email: session.Email,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
// By default we assume an unkown name which is oauth
|
// By default we assume an unknown name which is oauth
|
||||||
default:
|
default:
|
||||||
c.Provider = ProviderOAuth
|
c.Provider = ProviderOAuth
|
||||||
c.OAuth = &OAuthContext{
|
c.OAuth = &OAuthContext{
|
||||||
|
|||||||
@@ -7,19 +7,19 @@ import (
|
|||||||
"github.com/tinyauthapp/tinyauth/internal/utils/logger"
|
"github.com/tinyauthapp/tinyauth/internal/utils/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
type LabelProviderImpl interface {
|
type LabelProvider interface {
|
||||||
GetLabels(appDomain string) (*model.App, error)
|
GetLabels(appDomain string) (*model.App, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
type AccessControlsService struct {
|
type AccessControlsService struct {
|
||||||
log *logger.Logger
|
log *logger.Logger
|
||||||
labelProvider *LabelProviderImpl
|
labelProvider *LabelProvider
|
||||||
static map[string]model.App
|
static map[string]model.App
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewAccessControlsService(
|
func NewAccessControlsService(
|
||||||
log *logger.Logger,
|
log *logger.Logger,
|
||||||
labelProvider *LabelProviderImpl,
|
labelProvider *LabelProvider,
|
||||||
static map[string]model.App) *AccessControlsService {
|
static map[string]model.App) *AccessControlsService {
|
||||||
return &AccessControlsService{
|
return &AccessControlsService{
|
||||||
log: log,
|
log: log,
|
||||||
|
|||||||
@@ -399,12 +399,6 @@ func (auth *AuthService) DeleteSession(ctx context.Context, uuid string) (*http.
|
|||||||
auth.log.App.Error().Err(err).Str("uuid", uuid).Msg("Failed to delete session from database")
|
auth.log.App.Error().Err(err).Str("uuid", uuid).Msg("Failed to delete session from database")
|
||||||
}
|
}
|
||||||
|
|
||||||
err = auth.queries.DeleteSession(ctx, uuid)
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return &http.Cookie{
|
return &http.Cookie{
|
||||||
Name: auth.runtime.SessionCookieName,
|
Name: auth.runtime.SessionCookieName,
|
||||||
Value: "",
|
Value: "",
|
||||||
|
|||||||
@@ -33,7 +33,7 @@ func NewLogger() *Logger {
|
|||||||
App: model.LogStreamConfig{
|
App: model.LogStreamConfig{
|
||||||
Enabled: true,
|
Enabled: true,
|
||||||
},
|
},
|
||||||
// No reason to enabled audit by default since it will be surpressed by the log level
|
// No reason to enabled audit by default since it will be suppressed by the log level
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user