Compare commits
	
		
			4 Commits
		
	
	
		
			v3.2.0-bet
			...
			refactor/a
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					673381dae6 | ||
| 
						 | 
					9747ea8014 | ||
| 
						 | 
					cb2521f3d9 | ||
| 
						 | 
					d859f74a10 | 
@@ -26,7 +26,5 @@ DISABLE_CONTINUE=false
 | 
				
			|||||||
OAUTH_WHITELIST=
 | 
					OAUTH_WHITELIST=
 | 
				
			||||||
GENERIC_NAME=My OAuth
 | 
					GENERIC_NAME=My OAuth
 | 
				
			||||||
SESSION_EXPIRY=7200
 | 
					SESSION_EXPIRY=7200
 | 
				
			||||||
LOGIN_TIMEOUT=300
 | 
					 | 
				
			||||||
LOGIN_MAX_RETRIES=5
 | 
					 | 
				
			||||||
LOG_LEVEL=0
 | 
					LOG_LEVEL=0
 | 
				
			||||||
APP_TITLE=Tinyauth SSO
 | 
					APP_TITLE=Tinyauth SSO
 | 
				
			||||||
							
								
								
									
										6
									
								
								.github/workflows/ci.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						@@ -26,17 +26,17 @@ jobs:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
      - name: Install frontend dependencies
 | 
					      - name: Install frontend dependencies
 | 
				
			||||||
        run: |
 | 
					        run: |
 | 
				
			||||||
          cd frontend
 | 
					          cd site
 | 
				
			||||||
          bun install
 | 
					          bun install
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      - name: Build frontend
 | 
					      - name: Build frontend
 | 
				
			||||||
        run: |
 | 
					        run: |
 | 
				
			||||||
          cd frontend
 | 
					          cd site
 | 
				
			||||||
          bun run build
 | 
					          bun run build
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      - name: Copy frontend
 | 
					      - name: Copy frontend
 | 
				
			||||||
        run: |
 | 
					        run: |
 | 
				
			||||||
          cp -r frontend/dist internal/assets/dist
 | 
					          cp -r site/dist internal/assets/dist
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      - name: Run tests
 | 
					      - name: Run tests
 | 
				
			||||||
        run: go test -v ./...
 | 
					        run: go test -v ./...
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										6
									
								
								.github/workflows/release.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						@@ -125,9 +125,9 @@ jobs:
 | 
				
			|||||||
        with:
 | 
					        with:
 | 
				
			||||||
          images: ghcr.io/${{ github.repository_owner }}/tinyauth
 | 
					          images: ghcr.io/${{ github.repository_owner }}/tinyauth
 | 
				
			||||||
          tags: |
 | 
					          tags: |
 | 
				
			||||||
            type=semver,pattern={{version}},prefix=v
 | 
					            type=semver,pattern=v{{version}}
 | 
				
			||||||
            type=semver,pattern={{major}},prefix=v
 | 
					            type=semver,pattern=v{{major}}
 | 
				
			||||||
            type=semver,pattern={{major}}.{{minor}},prefix=v
 | 
					            type=semver,pattern=v{{major}}.{{minor}}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      - name: Create manifest list and push
 | 
					      - name: Create manifest list and push
 | 
				
			||||||
        working-directory: ${{ runner.temp }}/digests
 | 
					        working-directory: ${{ runner.temp }}/digests
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										98
									
								
								.github/workflows/translations.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						@@ -1,98 +0,0 @@
 | 
				
			|||||||
name: Publish translations
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
on:
 | 
					 | 
				
			||||||
  push:
 | 
					 | 
				
			||||||
    branches:
 | 
					 | 
				
			||||||
      - i18n_v*
 | 
					 | 
				
			||||||
  workflow_dispatch:
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
permissions:
 | 
					 | 
				
			||||||
  contents: read
 | 
					 | 
				
			||||||
  pages: write
 | 
					 | 
				
			||||||
  id-token: write
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
concurrency:
 | 
					 | 
				
			||||||
  group: pages
 | 
					 | 
				
			||||||
  cancel-in-progress: false
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
jobs:
 | 
					 | 
				
			||||||
  get-branches:
 | 
					 | 
				
			||||||
    runs-on: ubuntu-latest
 | 
					 | 
				
			||||||
    outputs:
 | 
					 | 
				
			||||||
      i18n-branches: ${{ steps.get-branches.outputs.result }}
 | 
					 | 
				
			||||||
    steps:
 | 
					 | 
				
			||||||
      - name: Get branches
 | 
					 | 
				
			||||||
        id: get-branches
 | 
					 | 
				
			||||||
        uses: actions/github-script@v7
 | 
					 | 
				
			||||||
        with:
 | 
					 | 
				
			||||||
          script: |
 | 
					 | 
				
			||||||
            const { data: repos } = await github.rest.repos.listBranches({
 | 
					 | 
				
			||||||
              owner: context.repo.owner,
 | 
					 | 
				
			||||||
              repo: context.repo.repo,
 | 
					 | 
				
			||||||
            })
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
            const i18nBranches = repos.filter((branch) => branch.name.startsWith("i18n_v"))
 | 
					 | 
				
			||||||
            const i18nBranchNames = i18nBranches.map((branch) => branch.name)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
            return i18nBranchNames
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  get-translations:
 | 
					 | 
				
			||||||
    needs: get-branches
 | 
					 | 
				
			||||||
    runs-on: ubuntu-latest
 | 
					 | 
				
			||||||
    strategy:
 | 
					 | 
				
			||||||
      matrix:
 | 
					 | 
				
			||||||
        branch: ${{ fromJson(needs.get-branches.outputs.i18n-branches) }}
 | 
					 | 
				
			||||||
    steps:
 | 
					 | 
				
			||||||
      - name: Checkout
 | 
					 | 
				
			||||||
        uses: actions/checkout@v4
 | 
					 | 
				
			||||||
        with:
 | 
					 | 
				
			||||||
          ref: ${{ matrix.branch }}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
      - name: Get translation version
 | 
					 | 
				
			||||||
        id: get-version
 | 
					 | 
				
			||||||
        run: |
 | 
					 | 
				
			||||||
          branch=${{ matrix.branch }}
 | 
					 | 
				
			||||||
          version=${branch#i18n_}
 | 
					 | 
				
			||||||
          echo "version=$version" >> $GITHUB_OUTPUT
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
      - name: Upload translations
 | 
					 | 
				
			||||||
        uses: actions/upload-artifact@v4
 | 
					 | 
				
			||||||
        with:
 | 
					 | 
				
			||||||
          name: ${{ steps.get-version.outputs.version }}
 | 
					 | 
				
			||||||
          path: frontend/src/lib/i18n/locales
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  build:
 | 
					 | 
				
			||||||
    needs: get-translations
 | 
					 | 
				
			||||||
    runs-on: ubuntu-latest
 | 
					 | 
				
			||||||
    steps:
 | 
					 | 
				
			||||||
      - name: Checkout
 | 
					 | 
				
			||||||
        uses: actions/checkout@v4
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
      - name: Setup Pages
 | 
					 | 
				
			||||||
        uses: actions/configure-pages@v4
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
      - name: Prepare output directory
 | 
					 | 
				
			||||||
        run: |
 | 
					 | 
				
			||||||
          mkdir -p dist/i18n/
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
      - name: Download translations
 | 
					 | 
				
			||||||
        uses: actions/download-artifact@v4
 | 
					 | 
				
			||||||
        with:
 | 
					 | 
				
			||||||
          path: dist/i18n/
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
      - name: Upload artifact
 | 
					 | 
				
			||||||
        uses: actions/upload-pages-artifact@v3
 | 
					 | 
				
			||||||
        with:
 | 
					 | 
				
			||||||
          path: dist
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  deploy:
 | 
					 | 
				
			||||||
    environment:
 | 
					 | 
				
			||||||
      name: github-pages
 | 
					 | 
				
			||||||
      url: ${{ steps.deployment.outputs.page_url }}
 | 
					 | 
				
			||||||
    needs: build
 | 
					 | 
				
			||||||
    runs-on: ubuntu-latest
 | 
					 | 
				
			||||||
    name: Deploy
 | 
					 | 
				
			||||||
    steps:
 | 
					 | 
				
			||||||
      - name: Deploy to GitHub Pages
 | 
					 | 
				
			||||||
        id: deployment
 | 
					 | 
				
			||||||
        uses: actions/deploy-pages@v4
 | 
					 | 
				
			||||||
@@ -20,22 +20,22 @@ cd tinyauth
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
## Install requirements
 | 
					## Install requirements
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Although you will not need the requirements in your machine since the development will happen in docker, I still recommend to install them because this way you will not have import errors, to install the go requirements, run:
 | 
					Although you will not need the requirements in your machine since the development will happen in docker, I still recommend to install them because this way you will not have errors, to install the go requirements, run:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
```sh
 | 
					```sh
 | 
				
			||||||
go mod tidy
 | 
					go mod tidy
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
You also need to download the frontend dependencies, this can be done like so:
 | 
					You also need to download the frontend requirements, this can be done like so:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
```sh
 | 
					```sh
 | 
				
			||||||
cd frontend/
 | 
					cd site/
 | 
				
			||||||
bun install
 | 
					bun install
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Create your `.env` file
 | 
					## Create your `.env` file
 | 
				
			||||||
 | 
					
 | 
				
			||||||
In order to configure the app you need to create an environment file, this can be done by copying the `.env.example` file to `.env` and modifying the environment variables inside to suit your needs.
 | 
					In order to ocnfigure the app you need to create an environment file, this can be done by copying the `.env.example` file to `.env` and modifying the environment variables inside to suit your needs.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Developing
 | 
					## Developing
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										33
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						@@ -1,22 +1,22 @@
 | 
				
			|||||||
# Site builder
 | 
					# Site builder
 | 
				
			||||||
FROM oven/bun:1.1.45-alpine AS frontend-builder
 | 
					FROM oven/bun:1.1.45-alpine AS site-builder
 | 
				
			||||||
 | 
					
 | 
				
			||||||
WORKDIR /frontend
 | 
					WORKDIR /site
 | 
				
			||||||
 | 
					
 | 
				
			||||||
COPY ./frontend/package.json ./
 | 
					COPY ./site/package.json ./
 | 
				
			||||||
COPY ./frontend/bun.lockb ./
 | 
					COPY ./site/bun.lockb ./
 | 
				
			||||||
 | 
					
 | 
				
			||||||
RUN bun install
 | 
					RUN bun install
 | 
				
			||||||
 | 
					
 | 
				
			||||||
COPY ./frontend/public ./public
 | 
					COPY ./site/public ./public
 | 
				
			||||||
COPY ./frontend/src ./src
 | 
					COPY ./site/src ./src
 | 
				
			||||||
COPY ./frontend/eslint.config.js ./
 | 
					COPY ./site/eslint.config.js ./
 | 
				
			||||||
COPY ./frontend/index.html ./
 | 
					COPY ./site/index.html ./
 | 
				
			||||||
COPY ./frontend/tsconfig.json ./
 | 
					COPY ./site/tsconfig.json ./
 | 
				
			||||||
COPY ./frontend/tsconfig.app.json ./
 | 
					COPY ./site/tsconfig.app.json ./
 | 
				
			||||||
COPY ./frontend/tsconfig.node.json ./
 | 
					COPY ./site/tsconfig.node.json ./
 | 
				
			||||||
COPY ./frontend/vite.config.ts ./
 | 
					COPY ./site/vite.config.ts ./
 | 
				
			||||||
COPY ./frontend/postcss.config.cjs ./
 | 
					COPY ./site/postcss.config.cjs ./
 | 
				
			||||||
 | 
					
 | 
				
			||||||
RUN bun run build
 | 
					RUN bun run build
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -33,7 +33,7 @@ RUN go mod download
 | 
				
			|||||||
COPY ./main.go ./
 | 
					COPY ./main.go ./
 | 
				
			||||||
COPY ./cmd ./cmd
 | 
					COPY ./cmd ./cmd
 | 
				
			||||||
COPY ./internal ./internal
 | 
					COPY ./internal ./internal
 | 
				
			||||||
COPY --from=frontend-builder /frontend/dist ./internal/assets/dist
 | 
					COPY --from=site-builder /site/dist ./internal/assets/dist
 | 
				
			||||||
 | 
					
 | 
				
			||||||
RUN CGO_ENABLED=0 go build -ldflags "-s -w"
 | 
					RUN CGO_ENABLED=0 go build -ldflags "-s -w"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -42,13 +42,8 @@ FROM alpine:3.21 AS runner
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
WORKDIR /tinyauth
 | 
					WORKDIR /tinyauth
 | 
				
			||||||
 | 
					
 | 
				
			||||||
RUN apk add --no-cache curl
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
COPY --from=builder /tinyauth/tinyauth ./
 | 
					COPY --from=builder /tinyauth/tinyauth ./
 | 
				
			||||||
 | 
					
 | 
				
			||||||
EXPOSE 3000
 | 
					EXPOSE 3000
 | 
				
			||||||
 | 
					
 | 
				
			||||||
HEALTHCHECK --interval=10s --timeout=5s \
 | 
					 | 
				
			||||||
    CMD curl -f http://localhost:3000/api/healthcheck || exit 1
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
ENTRYPOINT ["./tinyauth"]
 | 
					ENTRYPOINT ["./tinyauth"]
 | 
				
			||||||
							
								
								
									
										11
									
								
								README.md
									
									
									
									
									
								
							
							
						
						@@ -1,5 +1,5 @@
 | 
				
			|||||||
<div align="center">
 | 
					<div align="center">
 | 
				
			||||||
    <img alt="Tinyauth" title="Tinyauth" width="256" src="frontend/public/logo.png">
 | 
					    <img alt="Tinyauth" title="Tinyauth" width="256" src="site/public/logo.png">
 | 
				
			||||||
    <h1>Tinyauth</h1>
 | 
					    <h1>Tinyauth</h1>
 | 
				
			||||||
    <p>The easiest way to secure your apps with a login screen.</p>
 | 
					    <p>The easiest way to secure your apps with a login screen.</p>
 | 
				
			||||||
</div>
 | 
					</div>
 | 
				
			||||||
@@ -10,7 +10,6 @@
 | 
				
			|||||||
    <img alt="Commit activity" src="https://img.shields.io/github/commit-activity/w/steveiliop56/tinyauth">
 | 
					    <img alt="Commit activity" src="https://img.shields.io/github/commit-activity/w/steveiliop56/tinyauth">
 | 
				
			||||||
    <img alt="Issues" src="https://img.shields.io/github/issues/steveiliop56/tinyauth">
 | 
					    <img alt="Issues" src="https://img.shields.io/github/issues/steveiliop56/tinyauth">
 | 
				
			||||||
    <img alt="Tinyauth CI" src="https://github.com/steveiliop56/tinyauth/actions/workflows/ci.yml/badge.svg">
 | 
					    <img alt="Tinyauth CI" src="https://github.com/steveiliop56/tinyauth/actions/workflows/ci.yml/badge.svg">
 | 
				
			||||||
    <a title="Crowdin" target="_blank" href="https://crowdin.com/project/tinyauth"><img src="https://badges.crowdin.net/tinyauth/localized.svg"></a>
 | 
					 | 
				
			||||||
</div>
 | 
					</div>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
<br />
 | 
					<br />
 | 
				
			||||||
@@ -39,10 +38,6 @@ You can find documentation and guides on all available configuration of tinyauth
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
All contributions to the codebase are welcome! If you have any recommendations on how to improve security or find a security issue in tinyauth please open an issue or pull request so it can be fixed as soon as possible!
 | 
					All contributions to the codebase are welcome! If you have any recommendations on how to improve security or find a security issue in tinyauth please open an issue or pull request so it can be fixed as soon as possible!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Localization
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
If you would like to help translating the project in more languages you can do so by visiting the [Crowdin](https://crowdin.com/project/tinyauth) page.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
## License
 | 
					## License
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Tinyauth is licensed under the GNU General Public License v3.0. TL;DR — You may copy, distribute and modify the software as long as you track changes/dates in source files. Any modifications to or software including (via compiler) GPL-licensed code must also be made available under the GPL along with build & install instructions. For more information about the license check the [license](./LICENSE) file.
 | 
					Tinyauth is licensed under the GNU General Public License v3.0. TL;DR — You may copy, distribute and modify the software as long as you track changes/dates in source files. Any modifications to or software including (via compiler) GPL-licensed code must also be made available under the GPL along with build & install instructions. For more information about the license check the [license](./LICENSE) file.
 | 
				
			||||||
@@ -61,7 +56,3 @@ Credits for the logo of this app go to:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
- **Freepik** for providing the police hat and badge.
 | 
					- **Freepik** for providing the police hat and badge.
 | 
				
			||||||
- **Renee French** for the original gopher logo.
 | 
					- **Renee French** for the original gopher logo.
 | 
				
			||||||
 | 
					 | 
				
			||||||
## Star History
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
[](https://www.star-history.com/#steveiliop56/tinyauth&Date)
 | 
					 | 
				
			||||||
							
								
								
									
										1
									
								
								air.toml
									
									
									
									
									
								
							
							
						
						@@ -2,6 +2,7 @@ root = "/tinyauth"
 | 
				
			|||||||
tmp_dir = "tmp"
 | 
					tmp_dir = "tmp"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[build]
 | 
					[build]
 | 
				
			||||||
 | 
					pre_cmd = ["go mod tidy"]
 | 
				
			||||||
cmd = "go build -o ./tmp/tinyauth ."
 | 
					cmd = "go build -o ./tmp/tinyauth ."
 | 
				
			||||||
bin = "tmp/tinyauth"
 | 
					bin = "tmp/tinyauth"
 | 
				
			||||||
include_ext = ["go"]
 | 
					include_ext = ["go"]
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -14,7 +14,7 @@
 | 
				
			|||||||
      },
 | 
					      },
 | 
				
			||||||
      "timestamp": "2025-03-10T19:00:00.000Z",
 | 
					      "timestamp": "2025-03-10T19:00:00.000Z",
 | 
				
			||||||
      "thumbnail": {
 | 
					      "thumbnail": {
 | 
				
			||||||
        "url": "https://github.com/steveiliop56/tinyauth/blob/main/frontend/public/logo.png?raw=true"
 | 
					        "url": "https://github.com/steveiliop56/tinyauth/blob/main/site/public/logo.png?raw=true"
 | 
				
			||||||
      }
 | 
					      }
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
  ],
 | 
					  ],
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										74
									
								
								cmd/root.go
									
									
									
									
									
								
							
							
						
						@@ -11,7 +11,6 @@ import (
 | 
				
			|||||||
	"tinyauth/internal/assets"
 | 
						"tinyauth/internal/assets"
 | 
				
			||||||
	"tinyauth/internal/auth"
 | 
						"tinyauth/internal/auth"
 | 
				
			||||||
	"tinyauth/internal/docker"
 | 
						"tinyauth/internal/docker"
 | 
				
			||||||
	"tinyauth/internal/handlers"
 | 
					 | 
				
			||||||
	"tinyauth/internal/hooks"
 | 
						"tinyauth/internal/hooks"
 | 
				
			||||||
	"tinyauth/internal/providers"
 | 
						"tinyauth/internal/providers"
 | 
				
			||||||
	"tinyauth/internal/types"
 | 
						"tinyauth/internal/types"
 | 
				
			||||||
@@ -34,8 +33,8 @@ var rootCmd = &cobra.Command{
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		// Get config
 | 
							// Get config
 | 
				
			||||||
		var config types.Config
 | 
							var config types.Config
 | 
				
			||||||
		err := viper.Unmarshal(&config)
 | 
							parseErr := viper.Unmarshal(&config)
 | 
				
			||||||
		HandleError(err, "Failed to parse config")
 | 
							HandleError(parseErr, "Failed to parse config")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Secrets
 | 
							// Secrets
 | 
				
			||||||
		config.Secret = utils.GetSecret(config.Secret, config.SecretFile)
 | 
							config.Secret = utils.GetSecret(config.Secret, config.SecretFile)
 | 
				
			||||||
@@ -46,8 +45,8 @@ var rootCmd = &cobra.Command{
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		// Validate config
 | 
							// Validate config
 | 
				
			||||||
		validator := validator.New()
 | 
							validator := validator.New()
 | 
				
			||||||
		err = validator.Struct(config)
 | 
							validateErr := validator.Struct(config)
 | 
				
			||||||
		HandleError(err, "Failed to validate config")
 | 
							HandleError(validateErr, "Failed to validate config")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Logger
 | 
							// Logger
 | 
				
			||||||
		log.Logger = log.Level(zerolog.Level(config.LogLevel))
 | 
							log.Logger = log.Level(zerolog.Level(config.LogLevel))
 | 
				
			||||||
@@ -55,8 +54,9 @@ var rootCmd = &cobra.Command{
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		// Users
 | 
							// Users
 | 
				
			||||||
		log.Info().Msg("Parsing users")
 | 
							log.Info().Msg("Parsing users")
 | 
				
			||||||
		users, err := utils.GetUsers(config.Users, config.UsersFile)
 | 
							users, usersErr := utils.GetUsers(config.Users, config.UsersFile)
 | 
				
			||||||
		HandleError(err, "Failed to parse users")
 | 
					
 | 
				
			||||||
 | 
							HandleError(usersErr, "Failed to parse users")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if len(users) == 0 && !utils.OAuthConfigured(config) {
 | 
							if len(users) == 0 && !utils.OAuthConfigured(config) {
 | 
				
			||||||
			HandleError(errors.New("no users or OAuth configured"), "No users or OAuth configured")
 | 
								HandleError(errors.New("no users or OAuth configured"), "No users or OAuth configured")
 | 
				
			||||||
@@ -66,15 +66,8 @@ var rootCmd = &cobra.Command{
 | 
				
			|||||||
		oauthWhitelist := utils.Filter(strings.Split(config.OAuthWhitelist, ","), func(val string) bool {
 | 
							oauthWhitelist := utils.Filter(strings.Split(config.OAuthWhitelist, ","), func(val string) bool {
 | 
				
			||||||
			return val != ""
 | 
								return val != ""
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
 | 
					 | 
				
			||||||
		log.Debug().Msg("Parsed OAuth whitelist")
 | 
							log.Debug().Msg("Parsed OAuth whitelist")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Get domain
 | 
					 | 
				
			||||||
		log.Debug().Msg("Getting domain")
 | 
					 | 
				
			||||||
		domain, err := utils.GetUpperDomain(config.AppURL)
 | 
					 | 
				
			||||||
		HandleError(err, "Failed to get upper domain")
 | 
					 | 
				
			||||||
		log.Info().Str("domain", domain).Msg("Using domain for cookie store")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Create OAuth config
 | 
							// Create OAuth config
 | 
				
			||||||
		oauthConfig := types.OAuthConfig{
 | 
							oauthConfig := types.OAuthConfig{
 | 
				
			||||||
			GithubClientId:        config.GithubClientId,
 | 
								GithubClientId:        config.GithubClientId,
 | 
				
			||||||
@@ -92,41 +85,17 @@ var rootCmd = &cobra.Command{
 | 
				
			|||||||
			AppURL:                config.AppURL,
 | 
								AppURL:                config.AppURL,
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Create handlers config
 | 
							log.Debug().Msg("Parsed OAuth config")
 | 
				
			||||||
		handlersConfig := types.HandlersConfig{
 | 
					 | 
				
			||||||
			AppURL:          config.AppURL,
 | 
					 | 
				
			||||||
			DisableContinue: config.DisableContinue,
 | 
					 | 
				
			||||||
			Title:           config.Title,
 | 
					 | 
				
			||||||
			GenericName:     config.GenericName,
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Create api config
 | 
					 | 
				
			||||||
		apiConfig := types.APIConfig{
 | 
					 | 
				
			||||||
			Port:    config.Port,
 | 
					 | 
				
			||||||
			Address: config.Address,
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Create auth config
 | 
					 | 
				
			||||||
		authConfig := types.AuthConfig{
 | 
					 | 
				
			||||||
			Users:           users,
 | 
					 | 
				
			||||||
			OauthWhitelist:  oauthWhitelist,
 | 
					 | 
				
			||||||
			Secret:          config.Secret,
 | 
					 | 
				
			||||||
			CookieSecure:    config.CookieSecure,
 | 
					 | 
				
			||||||
			SessionExpiry:   config.SessionExpiry,
 | 
					 | 
				
			||||||
			Domain:          domain,
 | 
					 | 
				
			||||||
			LoginTimeout:    config.LoginTimeout,
 | 
					 | 
				
			||||||
			LoginMaxRetries: config.LoginMaxRetries,
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Create docker service
 | 
							// Create docker service
 | 
				
			||||||
		docker := docker.NewDocker()
 | 
							docker := docker.NewDocker()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Initialize docker
 | 
							// Initialize docker
 | 
				
			||||||
		err = docker.Init()
 | 
							dockerErr := docker.Init()
 | 
				
			||||||
		HandleError(err, "Failed to initialize docker")
 | 
							HandleError(dockerErr, "Failed to initialize docker")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Create auth service
 | 
							// Create auth service
 | 
				
			||||||
		auth := auth.NewAuth(authConfig, docker)
 | 
							auth := auth.NewAuth(docker, users, oauthWhitelist, config.SessionExpiry)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Create OAuth providers service
 | 
							// Create OAuth providers service
 | 
				
			||||||
		providers := providers.NewProviders(oauthConfig)
 | 
							providers := providers.NewProviders(oauthConfig)
 | 
				
			||||||
@@ -137,11 +106,18 @@ var rootCmd = &cobra.Command{
 | 
				
			|||||||
		// Create hooks service
 | 
							// Create hooks service
 | 
				
			||||||
		hooks := hooks.NewHooks(auth, providers)
 | 
							hooks := hooks.NewHooks(auth, providers)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Create handlers
 | 
					 | 
				
			||||||
		handlers := handlers.NewHandlers(handlersConfig, auth, hooks, providers, docker)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Create API
 | 
							// Create API
 | 
				
			||||||
		api := api.NewAPI(apiConfig, handlers)
 | 
							api := api.NewAPI(types.APIConfig{
 | 
				
			||||||
 | 
								Port:            config.Port,
 | 
				
			||||||
 | 
								Address:         config.Address,
 | 
				
			||||||
 | 
								Secret:          config.Secret,
 | 
				
			||||||
 | 
								AppURL:          config.AppURL,
 | 
				
			||||||
 | 
								CookieSecure:    config.CookieSecure,
 | 
				
			||||||
 | 
								DisableContinue: config.DisableContinue,
 | 
				
			||||||
 | 
								SessionExpiry:   config.SessionExpiry,
 | 
				
			||||||
 | 
								Title:           config.Title,
 | 
				
			||||||
 | 
								GenericName:     config.GenericName,
 | 
				
			||||||
 | 
							}, hooks, auth, providers)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Setup routes
 | 
							// Setup routes
 | 
				
			||||||
		api.Init()
 | 
							api.Init()
 | 
				
			||||||
@@ -158,7 +134,7 @@ func Execute() {
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func HandleError(err error, msg string) {
 | 
					func HandleError(err error, msg string) {
 | 
				
			||||||
	// If error, log it and exit
 | 
						// If error log it and exit
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
		log.Fatal().Err(err).Msg(msg)
 | 
							log.Fatal().Err(err).Msg(msg)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -203,8 +179,6 @@ func init() {
 | 
				
			|||||||
	rootCmd.Flags().Bool("disable-continue", false, "Disable continue screen and redirect to app directly.")
 | 
						rootCmd.Flags().Bool("disable-continue", false, "Disable continue screen and redirect to app directly.")
 | 
				
			||||||
	rootCmd.Flags().String("oauth-whitelist", "", "Comma separated list of email addresses to whitelist when using OAuth.")
 | 
						rootCmd.Flags().String("oauth-whitelist", "", "Comma separated list of email addresses to whitelist when using OAuth.")
 | 
				
			||||||
	rootCmd.Flags().Int("session-expiry", 86400, "Session (cookie) expiration time in seconds.")
 | 
						rootCmd.Flags().Int("session-expiry", 86400, "Session (cookie) expiration time in seconds.")
 | 
				
			||||||
	rootCmd.Flags().Int("login-timeout", 300, "Login timeout in seconds after max retries reached (0 to disable).")
 | 
					 | 
				
			||||||
	rootCmd.Flags().Int("login-max-retries", 5, "Maximum login attempts before timeout (0 to disable).")
 | 
					 | 
				
			||||||
	rootCmd.Flags().Int("log-level", 1, "Log level.")
 | 
						rootCmd.Flags().Int("log-level", 1, "Log level.")
 | 
				
			||||||
	rootCmd.Flags().String("app-title", "Tinyauth", "Title of the app.")
 | 
						rootCmd.Flags().String("app-title", "Tinyauth", "Title of the app.")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -239,8 +213,6 @@ func init() {
 | 
				
			|||||||
	viper.BindEnv("session-expiry", "SESSION_EXPIRY")
 | 
						viper.BindEnv("session-expiry", "SESSION_EXPIRY")
 | 
				
			||||||
	viper.BindEnv("log-level", "LOG_LEVEL")
 | 
						viper.BindEnv("log-level", "LOG_LEVEL")
 | 
				
			||||||
	viper.BindEnv("app-title", "APP_TITLE")
 | 
						viper.BindEnv("app-title", "APP_TITLE")
 | 
				
			||||||
	viper.BindEnv("login-timeout", "LOGIN_TIMEOUT")
 | 
					 | 
				
			||||||
	viper.BindEnv("login-max-retries", "LOGIN_MAX_RETRIES")
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Bind flags to viper
 | 
						// Bind flags to viper
 | 
				
			||||||
	viper.BindPFlags(rootCmd.Flags())
 | 
						viper.BindPFlags(rootCmd.Flags())
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -18,7 +18,7 @@ import (
 | 
				
			|||||||
// Interactive flag
 | 
					// Interactive flag
 | 
				
			||||||
var interactive bool
 | 
					var interactive bool
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Input user
 | 
					// i stands for input
 | 
				
			||||||
var iUser string
 | 
					var iUser string
 | 
				
			||||||
 | 
					
 | 
				
			||||||
var GenerateCmd = &cobra.Command{
 | 
					var GenerateCmd = &cobra.Command{
 | 
				
			||||||
@@ -46,18 +46,18 @@ var GenerateCmd = &cobra.Command{
 | 
				
			|||||||
			)
 | 
								)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Run form
 | 
								// Run form
 | 
				
			||||||
			err := form.WithTheme(baseTheme).Run()
 | 
								formErr := form.WithTheme(baseTheme).Run()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if err != nil {
 | 
								if formErr != nil {
 | 
				
			||||||
				log.Fatal().Err(err).Msg("Form failed")
 | 
									log.Fatal().Err(formErr).Msg("Form failed")
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Parse user
 | 
							// Parse user
 | 
				
			||||||
		user, err := utils.ParseUser(iUser)
 | 
							user, parseErr := utils.ParseUser(iUser)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if err != nil {
 | 
							if parseErr != nil {
 | 
				
			||||||
			log.Fatal().Err(err).Msg("Failed to parse user")
 | 
								log.Fatal().Err(parseErr).Msg("Failed to parse user")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check if user was using docker escape
 | 
							// Check if user was using docker escape
 | 
				
			||||||
@@ -73,13 +73,13 @@ var GenerateCmd = &cobra.Command{
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Generate totp secret
 | 
							// Generate totp secret
 | 
				
			||||||
		key, err := totp.Generate(totp.GenerateOpts{
 | 
							key, keyErr := totp.Generate(totp.GenerateOpts{
 | 
				
			||||||
			Issuer:      "Tinyauth",
 | 
								Issuer:      "Tinyauth",
 | 
				
			||||||
			AccountName: user.Username,
 | 
								AccountName: user.Username,
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if err != nil {
 | 
							if keyErr != nil {
 | 
				
			||||||
			log.Fatal().Err(err).Msg("Failed to generate totp secret")
 | 
								log.Fatal().Err(keyErr).Msg("Failed to generate totp secret")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Create secret
 | 
							// Create secret
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -12,10 +12,7 @@ import (
 | 
				
			|||||||
	"golang.org/x/crypto/bcrypt"
 | 
						"golang.org/x/crypto/bcrypt"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Interactive flag
 | 
					 | 
				
			||||||
var interactive bool
 | 
					var interactive bool
 | 
				
			||||||
 | 
					 | 
				
			||||||
// Docker flag
 | 
					 | 
				
			||||||
var docker bool
 | 
					var docker bool
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// i stands for input
 | 
					// i stands for input
 | 
				
			||||||
@@ -54,10 +51,10 @@ var CreateCmd = &cobra.Command{
 | 
				
			|||||||
			// Use simple theme
 | 
								// Use simple theme
 | 
				
			||||||
			var baseTheme *huh.Theme = huh.ThemeBase()
 | 
								var baseTheme *huh.Theme = huh.ThemeBase()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			err := form.WithTheme(baseTheme).Run()
 | 
								formErr := form.WithTheme(baseTheme).Run()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if err != nil {
 | 
								if formErr != nil {
 | 
				
			||||||
				log.Fatal().Err(err).Msg("Form failed")
 | 
									log.Fatal().Err(formErr).Msg("Form failed")
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -69,10 +66,10 @@ var CreateCmd = &cobra.Command{
 | 
				
			|||||||
		log.Info().Str("username", iUsername).Str("password", iPassword).Bool("docker", docker).Msg("Creating user")
 | 
							log.Info().Str("username", iUsername).Str("password", iPassword).Bool("docker", docker).Msg("Creating user")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Hash password
 | 
							// Hash password
 | 
				
			||||||
		password, err := bcrypt.GenerateFromPassword([]byte(iPassword), bcrypt.DefaultCost)
 | 
							password, passwordErr := bcrypt.GenerateFromPassword([]byte(iPassword), bcrypt.DefaultCost)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if err != nil {
 | 
							if passwordErr != nil {
 | 
				
			||||||
			log.Fatal().Err(err).Msg("Failed to hash password")
 | 
								log.Fatal().Err(passwordErr).Msg("Failed to hash password")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Convert password to string
 | 
							// Convert password to string
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -12,10 +12,7 @@ import (
 | 
				
			|||||||
	"golang.org/x/crypto/bcrypt"
 | 
						"golang.org/x/crypto/bcrypt"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Interactive flag
 | 
					 | 
				
			||||||
var interactive bool
 | 
					var interactive bool
 | 
				
			||||||
 | 
					 | 
				
			||||||
// Docker flag
 | 
					 | 
				
			||||||
var docker bool
 | 
					var docker bool
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// i stands for input
 | 
					// i stands for input
 | 
				
			||||||
@@ -63,18 +60,18 @@ var VerifyCmd = &cobra.Command{
 | 
				
			|||||||
			)
 | 
								)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Run form
 | 
								// Run form
 | 
				
			||||||
			err := form.WithTheme(baseTheme).Run()
 | 
								formErr := form.WithTheme(baseTheme).Run()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if err != nil {
 | 
								if formErr != nil {
 | 
				
			||||||
				log.Fatal().Err(err).Msg("Form failed")
 | 
									log.Fatal().Err(formErr).Msg("Form failed")
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Parse user
 | 
							// Parse user
 | 
				
			||||||
		user, err := utils.ParseUser(iUser)
 | 
							user, userErr := utils.ParseUser(iUser)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if err != nil {
 | 
							if userErr != nil {
 | 
				
			||||||
			log.Fatal().Err(err).Msg("Failed to parse user")
 | 
								log.Fatal().Err(userErr).Msg("Failed to parse user")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Compare username
 | 
							// Compare username
 | 
				
			||||||
@@ -83,9 +80,9 @@ var VerifyCmd = &cobra.Command{
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Compare password
 | 
							// Compare password
 | 
				
			||||||
		err = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(iPassword))
 | 
							verifyErr := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(iPassword))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if err != nil {
 | 
							if verifyErr != nil {
 | 
				
			||||||
			log.Fatal().Msg("Ppassword is incorrect")
 | 
								log.Fatal().Msg("Ppassword is incorrect")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -99,9 +96,9 @@ var VerifyCmd = &cobra.Command{
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check totp code
 | 
							// Check totp code
 | 
				
			||||||
		ok := totp.Validate(iTotp, user.TotpSecret)
 | 
							totpOk := totp.Validate(iTotp, user.TotpSecret)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if !ok {
 | 
							if !totpOk {
 | 
				
			||||||
			log.Fatal().Msg("Totp code incorrect")
 | 
								log.Fatal().Msg("Totp code incorrect")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										12
									
								
								crowdin.yml
									
									
									
									
									
								
							
							
						
						@@ -1,12 +0,0 @@
 | 
				
			|||||||
"base_path": "."
 | 
					 | 
				
			||||||
"base_url": "https://api.crowdin.com"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
"preserve_hierarchy": true
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
files:
 | 
					 | 
				
			||||||
  [
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
      "source": "/frontend/src/lib/i18n/locales/en.json",
 | 
					 | 
				
			||||||
      "translation": "/frontend/src/lib/i18n/locales/%locale%.json",
 | 
					 | 
				
			||||||
    },
 | 
					 | 
				
			||||||
  ]
 | 
					 | 
				
			||||||
@@ -14,20 +14,22 @@ services:
 | 
				
			|||||||
    labels:
 | 
					    labels:
 | 
				
			||||||
      traefik.enable: true
 | 
					      traefik.enable: true
 | 
				
			||||||
      traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
 | 
					      traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
 | 
				
			||||||
 | 
					      traefik.http.services.nginx.loadbalancer.server.port: 80
 | 
				
			||||||
      traefik.http.routers.nginx.middlewares: tinyauth
 | 
					      traefik.http.routers.nginx.middlewares: tinyauth
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  tinyauth-frontend:
 | 
					  tinyauth-frontend:
 | 
				
			||||||
    container_name: tinyauth-frontend
 | 
					    container_name: tinyauth-frontend
 | 
				
			||||||
    build:
 | 
					    build:
 | 
				
			||||||
      context: .
 | 
					      context: .
 | 
				
			||||||
      dockerfile: frontend/Dockerfile.dev
 | 
					      dockerfile: site/Dockerfile.dev
 | 
				
			||||||
    volumes:
 | 
					    volumes:
 | 
				
			||||||
      - ./frontend/src:/frontend/src
 | 
					      - ./site/src:/site/src
 | 
				
			||||||
    ports:
 | 
					    ports:
 | 
				
			||||||
      - 5173:5173
 | 
					      - 5173:5173
 | 
				
			||||||
    labels:
 | 
					    labels:
 | 
				
			||||||
      traefik.enable: true
 | 
					      traefik.enable: true
 | 
				
			||||||
      traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
 | 
					      traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
 | 
				
			||||||
 | 
					      traefik.http.services.tinyauth.loadbalancer.server.port: 5173
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  tinyauth-backend:
 | 
					  tinyauth-backend:
 | 
				
			||||||
    container_name: tinyauth-backend
 | 
					    container_name: tinyauth-backend
 | 
				
			||||||
@@ -39,7 +41,6 @@ services:
 | 
				
			|||||||
      - ./internal:/tinyauth/internal
 | 
					      - ./internal:/tinyauth/internal
 | 
				
			||||||
      - ./cmd:/tinyauth/cmd
 | 
					      - ./cmd:/tinyauth/cmd
 | 
				
			||||||
      - ./main.go:/tinyauth/main.go
 | 
					      - ./main.go:/tinyauth/main.go
 | 
				
			||||||
      - /var/run/docker.sock:/var/run/docker.sock
 | 
					 | 
				
			||||||
    ports:
 | 
					    ports:
 | 
				
			||||||
      - 3000:3000
 | 
					      - 3000:3000
 | 
				
			||||||
    labels:
 | 
					    labels:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -14,6 +14,7 @@ services:
 | 
				
			|||||||
    labels:
 | 
					    labels:
 | 
				
			||||||
      traefik.enable: true
 | 
					      traefik.enable: true
 | 
				
			||||||
      traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
 | 
					      traefik.http.routers.nginx.rule: Host(`whoami.example.com`)
 | 
				
			||||||
 | 
					      traefik.http.services.nginx.loadbalancer.server.port: 80
 | 
				
			||||||
      traefik.http.routers.nginx.middlewares: tinyauth
 | 
					      traefik.http.routers.nginx.middlewares: tinyauth
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  tinyauth:
 | 
					  tinyauth:
 | 
				
			||||||
@@ -26,4 +27,5 @@ services:
 | 
				
			|||||||
    labels:
 | 
					    labels:
 | 
				
			||||||
      traefik.enable: true
 | 
					      traefik.enable: true
 | 
				
			||||||
      traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
 | 
					      traefik.http.routers.tinyauth.rule: Host(`tinyauth.example.com`)
 | 
				
			||||||
 | 
					      traefik.http.services.tinyauth.loadbalancer.server.port: 3000
 | 
				
			||||||
      traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth:3000/api/auth/traefik
 | 
					      traefik.http.middlewares.tinyauth.forwardauth.address: http://tinyauth:3000/api/auth/traefik
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,23 +0,0 @@
 | 
				
			|||||||
FROM oven/bun:1.1.45-alpine
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
WORKDIR /frontend
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
COPY ./frontend/package.json ./
 | 
					 | 
				
			||||||
COPY ./frontend/bun.lockb ./
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
RUN bun install
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
COPY ./frontend/public ./public
 | 
					 | 
				
			||||||
COPY ./frontend/src ./src
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
COPY ./frontend/eslint.config.js ./
 | 
					 | 
				
			||||||
COPY ./frontend/index.html ./
 | 
					 | 
				
			||||||
COPY ./frontend/tsconfig.json ./
 | 
					 | 
				
			||||||
COPY ./frontend/tsconfig.app.json ./
 | 
					 | 
				
			||||||
COPY ./frontend/tsconfig.node.json ./
 | 
					 | 
				
			||||||
COPY ./frontend/vite.config.ts ./
 | 
					 | 
				
			||||||
COPY ./frontend/postcss.config.cjs ./
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
EXPOSE 5173
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
ENTRYPOINT ["bun", "run", "dev"]
 | 
					 | 
				
			||||||
@@ -1,40 +0,0 @@
 | 
				
			|||||||
import { ComboboxItem, Select } from "@mantine/core";
 | 
					 | 
				
			||||||
import { useState } from "react";
 | 
					 | 
				
			||||||
import i18n from "../../lib/i18n/i18n";
 | 
					 | 
				
			||||||
import {
 | 
					 | 
				
			||||||
  SupportedLanguage,
 | 
					 | 
				
			||||||
  getLanguageName,
 | 
					 | 
				
			||||||
  languages,
 | 
					 | 
				
			||||||
} from "../../lib/i18n/locales";
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
export const LanguageSelector = () => {
 | 
					 | 
				
			||||||
  const [language, setLanguage] = useState<ComboboxItem>({
 | 
					 | 
				
			||||||
    value: i18n.language,
 | 
					 | 
				
			||||||
    label: getLanguageName(i18n.language as SupportedLanguage),
 | 
					 | 
				
			||||||
  });
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  const languageOptions = Object.entries(languages).map(([code, name]) => ({
 | 
					 | 
				
			||||||
    value: code,
 | 
					 | 
				
			||||||
    label: name,
 | 
					 | 
				
			||||||
  }));
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  const handleLanguageChange = (option: string) => {
 | 
					 | 
				
			||||||
    i18n.changeLanguage(option as SupportedLanguage);
 | 
					 | 
				
			||||||
    setLanguage({
 | 
					 | 
				
			||||||
      value: option,
 | 
					 | 
				
			||||||
      label: getLanguageName(option as SupportedLanguage),
 | 
					 | 
				
			||||||
    });
 | 
					 | 
				
			||||||
  };
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  return (
 | 
					 | 
				
			||||||
    <Select
 | 
					 | 
				
			||||||
      data={languageOptions}
 | 
					 | 
				
			||||||
      value={language ? language.value : null}
 | 
					 | 
				
			||||||
      onChange={(_value, option) => handleLanguageChange(option.value)}
 | 
					 | 
				
			||||||
      allowDeselect={false}
 | 
					 | 
				
			||||||
      pos="absolute"
 | 
					 | 
				
			||||||
      right={10}
 | 
					 | 
				
			||||||
      top={10}
 | 
					 | 
				
			||||||
    />
 | 
					 | 
				
			||||||
  );
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
@@ -1,16 +0,0 @@
 | 
				
			|||||||
import { Center, Flex } from "@mantine/core";
 | 
					 | 
				
			||||||
import { ReactNode } from "react";
 | 
					 | 
				
			||||||
import { LanguageSelector } from "../language-selector/language-selector";
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
export const Layout = ({ children }: { children: ReactNode }) => {
 | 
					 | 
				
			||||||
  return (
 | 
					 | 
				
			||||||
    <>
 | 
					 | 
				
			||||||
      <LanguageSelector />
 | 
					 | 
				
			||||||
      <Center style={{ minHeight: "100vh" }}>
 | 
					 | 
				
			||||||
        <Flex direction="column" flex="1" maw={340}>
 | 
					 | 
				
			||||||
          {children}
 | 
					 | 
				
			||||||
        </Flex>
 | 
					 | 
				
			||||||
      </Center>
 | 
					 | 
				
			||||||
    </>
 | 
					 | 
				
			||||||
  );
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
@@ -1,37 +0,0 @@
 | 
				
			|||||||
import i18n from "i18next";
 | 
					 | 
				
			||||||
import { initReactI18next } from "react-i18next";
 | 
					 | 
				
			||||||
import LanguageDetector from "i18next-browser-languagedetector";
 | 
					 | 
				
			||||||
import ChainedBackend from "i18next-chained-backend";
 | 
					 | 
				
			||||||
import resourcesToBackend from "i18next-resources-to-backend";
 | 
					 | 
				
			||||||
import HttpBackend from "i18next-http-backend";
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
i18n
 | 
					 | 
				
			||||||
  .use(ChainedBackend)
 | 
					 | 
				
			||||||
  .use(LanguageDetector)
 | 
					 | 
				
			||||||
  .use(initReactI18next)
 | 
					 | 
				
			||||||
  .init({
 | 
					 | 
				
			||||||
    fallbackLng: "en",
 | 
					 | 
				
			||||||
    debug: import.meta.env.MODE === "development",
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    interpolation: {
 | 
					 | 
				
			||||||
      escapeValue: false,
 | 
					 | 
				
			||||||
    },
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    load: "currentOnly",
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    backend: {
 | 
					 | 
				
			||||||
      backends: [
 | 
					 | 
				
			||||||
        HttpBackend,
 | 
					 | 
				
			||||||
        resourcesToBackend(
 | 
					 | 
				
			||||||
          (language: string) => import(`./locales/${language}.json`),
 | 
					 | 
				
			||||||
        ),
 | 
					 | 
				
			||||||
      ],
 | 
					 | 
				
			||||||
      backendOptions: [
 | 
					 | 
				
			||||||
        {
 | 
					 | 
				
			||||||
          loadPath: "https://cdn.tinyauth.app/i18n/v1/{{lng}}.json",
 | 
					 | 
				
			||||||
        },
 | 
					 | 
				
			||||||
      ],
 | 
					 | 
				
			||||||
    },
 | 
					 | 
				
			||||||
  });
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
export default i18n;
 | 
					 | 
				
			||||||
@@ -1,36 +0,0 @@
 | 
				
			|||||||
export const languages = {
 | 
					 | 
				
			||||||
    "af-ZA": "Afrikaans",
 | 
					 | 
				
			||||||
    "ar-SA": "العربية",
 | 
					 | 
				
			||||||
    "ca-ES": "Català",
 | 
					 | 
				
			||||||
    "cs-CZ": "Čeština",
 | 
					 | 
				
			||||||
    "da-DK": "Dansk",
 | 
					 | 
				
			||||||
    "de-DE": "Deutsch",
 | 
					 | 
				
			||||||
    "el-GR": "Ελληνικά",
 | 
					 | 
				
			||||||
    "en-US": "English",
 | 
					 | 
				
			||||||
    "es-ES": "Español",
 | 
					 | 
				
			||||||
    "fi-FI": "Suomi",
 | 
					 | 
				
			||||||
    "fr-FR": "Français",
 | 
					 | 
				
			||||||
    "he-IL": "עברית",
 | 
					 | 
				
			||||||
    "hu-HU": "Magyar",
 | 
					 | 
				
			||||||
    "it-IT": "Italiano",
 | 
					 | 
				
			||||||
    "ja-JP": "日本語",
 | 
					 | 
				
			||||||
    "ko-KR": "한국어",
 | 
					 | 
				
			||||||
    "nl-NL": "Nederlands",
 | 
					 | 
				
			||||||
    "no-NO": "Norsk",
 | 
					 | 
				
			||||||
    "pl-PL": "Polski",
 | 
					 | 
				
			||||||
    "pt-BR": "Português",
 | 
					 | 
				
			||||||
    "pt-PT": "Português",
 | 
					 | 
				
			||||||
    "ro-RO": "Română",
 | 
					 | 
				
			||||||
    "ru-RU": "Русский",
 | 
					 | 
				
			||||||
    "sr-SP": "Српски",
 | 
					 | 
				
			||||||
    "sv-SE": "Svenska",
 | 
					 | 
				
			||||||
    "tr-TR": "Türkçe",
 | 
					 | 
				
			||||||
    "uk-UA": "Українська",
 | 
					 | 
				
			||||||
    "vi-VN": "Tiếng Việt",
 | 
					 | 
				
			||||||
    "zh-CN": "中文",
 | 
					 | 
				
			||||||
    "zh-TW": "中文"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
export type SupportedLanguage = keyof typeof languages;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
export const getLanguageName = (language: SupportedLanguage): string => languages[language];
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Καλώς ήρθατε, συνδεθείτε με",
 | 
					 | 
				
			||||||
    "loginDivider": "Ή συνεχίστε με κωδικό πρόσβασης",
 | 
					 | 
				
			||||||
    "loginUsername": "Όνομα Χρήστη",
 | 
					 | 
				
			||||||
    "loginPassword": "Κωδικός",
 | 
					 | 
				
			||||||
    "loginSubmit": "Είσοδος",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Αποτυχία σύνδεσης",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Παρακαλώ ελέγξτε το όνομα χρήστη και τον κωδικό πρόσβασης",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Συνδεδεμένος",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Καλώς ήρθατε!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Εσωτερικό σφάλμα",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Αποτυχία λήψης OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Ανακατεύθυνση",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Ανακατεύθυνση στον πάροχο OAuth σας",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Ανακατεύθυνση...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "Θα πρέπει να μεταφερθείτε σύντομα στην εφαρμογή σας",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Μη έγκυρη ανακατεύθυνση",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "Το URL ανακατεύθυνσης δεν είναι έγκυρο",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Μη ασφαλής ανακατεύθυνση",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "Προσπαθείτε να ανακατευθύνετε από <Code>https</Code> σε <Code>http</Code>, είστε σίγουροι ότι θέλετε να συνεχίσετε;",
 | 
					 | 
				
			||||||
    "continueTitle": "Συνέχεια",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Κάντε κλικ στο κουμπί για να συνεχίσετε στην εφαρμογή σας.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Εσωτερικό Σφάλμα Διακομιστή",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "Παρουσιάστηκε σφάλμα στο διακομιστή και δεν μπορεί να εξυπηρετήσει το αίτημά σας.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Προσπαθήστε ξανά",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Αποτυχία αποσύνδεσης",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Παρακαλώ δοκιμάστε ξανά",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Αποσυνδεδεμένος",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "Έχετε αποσυνδεθεί",
 | 
					 | 
				
			||||||
    "logoutTitle": "Αποσύνδεση",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "Αυτή τη στιγμή είστε συνδεδεμένοι ως <Code>{{username}}</Code>, κάντε κλικ στο παρακάτω κουμπί για να αποσυνδεθείτε.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "Αυτή τη στιγμή είστε συνδεδεμένοι ως <Code>{{username}}</Code> χρησιμοποιώντας την υπηρεσία παροχής {{provider}} OAuth, κάντε κλικ στο παρακάτω κουμπί για να αποσυνδεθείτε.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Η σελίδα δε βρέθηκε",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "Η σελίδα που ψάχνετε δεν υπάρχει.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Μετάβαση στην αρχική",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Αποτυχία επαλήθευσης κωδικού",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Παρακαλώ ελέγξτε τον κώδικά σας και προσπαθήστε ξανά",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Επαληθεύθηκε",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Ανακατεύθυνση στην εφαρμογή σας",
 | 
					 | 
				
			||||||
    "totpTitle": "Εισάγετε τον κωδικό TOTP",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Μη εξουσιοδοτημένο",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "Ο χρήστης με όνομα χρήστη {{username}} δεν είναι εξουσιοδοτημένος να έχει πρόσβαση στον πόρο <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "Ο χρήστης με όνομα χρήστη {{username}} δεν είναι εξουσιοδοτημένος να συνδεθεί.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Προσπαθήστε ξανά"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,46 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginFailRateLimit": "You failed to login too many times, please try again later",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,46 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginFailRateLimit": "You failed to login too many times, please try again later",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Bienvenue, connectez-vous avec",
 | 
					 | 
				
			||||||
    "loginDivider": "Ou continuez avec le mot de passe",
 | 
					 | 
				
			||||||
    "loginUsername": "Nom d'utilisateur",
 | 
					 | 
				
			||||||
    "loginPassword": "Mot de passe",
 | 
					 | 
				
			||||||
    "loginSubmit": "Se connecter",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Échec de la connexion",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Veuillez vérifier votre nom d'utilisateur et votre mot de passe",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Connecté",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Bienvenue!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Erreur interne",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Impossible d'obtenir l'URL OAuth",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirection",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirection vers votre fournisseur OAuth",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirection...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "Vous devriez être redirigé vers l'application bientôt",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Redirection invalide",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "L'URL de redirection est invalide",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Redirection non sécurisée",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "Vous essayez de rediriger de <Code>https</Code> vers <Code>http</Code>, êtes-vous sûr de vouloir continuer ?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continuer",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Cliquez sur le bouton pour continuer vers votre application.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Erreur interne du serveur",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "Une erreur s'est produite sur le serveur et il ne peut actuellement pas répondre à votre demande.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Réessayer",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Échec de la déconnexion",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Veuillez réessayer",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Déconnecté",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "Vous avez été déconnecté",
 | 
					 | 
				
			||||||
    "logoutTitle": "Déconnexion",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "Vous êtes actuellement connecté en tant que <Code>{{username}}</Code>, cliquez sur le bouton ci-dessous pour vous déconnecter.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "Vous êtes actuellement connecté en tant que <Code>{{username}}</Code> en utilisant le fournisseur OAuth {{provider}} , cliquez sur le bouton ci-dessous pour vous déconnecter.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page introuvable",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "La page recherchée n'existe pas.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Retour à la page d'accueil",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Échec de la vérification du code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Veuillez vérifier votre code et réessayer",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Vérifié",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirection vers votre application",
 | 
					 | 
				
			||||||
    "totpTitle": "Saisissez votre code TOTP",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Non autorisé",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "L'utilisateur avec le nom d'utilisateur {{username}} n'est pas autorisé à accéder à la ressource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "L'utilisateur avec le nom d'utilisateur {{username}} n'est pas autorisé à se connecter.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Réessayer"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Witaj ponownie, zaloguj się przez",
 | 
					 | 
				
			||||||
    "loginDivider": "Lub kontynuuj z hasłem",
 | 
					 | 
				
			||||||
    "loginUsername": "Nazwa użytkownika",
 | 
					 | 
				
			||||||
    "loginPassword": "Hasło",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Sprawdź swoją nazwę użytkownika i hasło",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Zalogowano",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Witaj ponownie!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Wewnętrzny błąd",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Nie udało się uzyskać adresu URL OAuth",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Przekierowywanie",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Przekierowywanie do Twojego dostawcy OAuth",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Przekierowywanie...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "Wkrótce powinieneś zostać przekierowany do aplikacji",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Nieprawidłowe przekierowanie",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "Adres przekierowania jest nieprawidłowy",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Niezabezpieczone przekierowanie",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "Próbujesz przekierować z <Code>https</Code> do <Code>http</Code>, czy na pewno chcesz kontynuować?",
 | 
					 | 
				
			||||||
    "continueTitle": "Kontynuuj",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Kliknij przycisk, aby przejść do aplikacji.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Wewnętrzny błąd serwera",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Spróbuj ponownie",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Spróbuj ponownie",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Wylogowano",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "Zostałeś wylogowany",
 | 
					 | 
				
			||||||
    "logoutTitle": "Wylogowanie",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "Jesteś aktualnie zalogowany jako <Code>{{username}}</Code>, kliknij przycisk poniżej, aby się wylogować.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "Jesteś obecnie zalogowany jako <Code>{{username}}</Code> przy użyciu providera OAuth {{provider}}, kliknij przycisk poniżej, aby się wylogować.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Strona nie znaleziona",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "Strona, której szukasz nie istnieje.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Wróć do strony głównej",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Nie udało się zweryfikować kodu",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Sprawdź swój kod i spróbuj ponownie",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Zweryfikowano",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Przekierowywanie do aplikacji",
 | 
					 | 
				
			||||||
    "totpTitle": "Wprowadź kod TOTP",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Nieautoryzowany",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "Użytkownik o nazwie {{username}} nie jest upoważniony do uzyskania dostępu do zasobu <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "Użytkownik o nazwie {{username}} nie jest upoważniony do logowania.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Spróbuj ponownie"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,45 +0,0 @@
 | 
				
			|||||||
{
 | 
					 | 
				
			||||||
    "loginTitle": "Welcome back, login with",
 | 
					 | 
				
			||||||
    "loginDivider": "Or continue with password",
 | 
					 | 
				
			||||||
    "loginUsername": "Username",
 | 
					 | 
				
			||||||
    "loginPassword": "Password",
 | 
					 | 
				
			||||||
    "loginSubmit": "Login",
 | 
					 | 
				
			||||||
    "loginFailTitle": "Failed to log in",
 | 
					 | 
				
			||||||
    "loginFailSubtitle": "Please check your username and password",
 | 
					 | 
				
			||||||
    "loginSuccessTitle": "Logged in",
 | 
					 | 
				
			||||||
    "loginSuccessSubtitle": "Welcome back!",
 | 
					 | 
				
			||||||
    "loginOauthFailTitle": "Internal error",
 | 
					 | 
				
			||||||
    "loginOauthFailSubtitle": "Failed to get OAuth URL",
 | 
					 | 
				
			||||||
    "loginOauthSuccessTitle": "Redirecting",
 | 
					 | 
				
			||||||
    "loginOauthSuccessSubtitle": "Redirecting to your OAuth provider",
 | 
					 | 
				
			||||||
    "continueRedirectingTitle": "Redirecting...",
 | 
					 | 
				
			||||||
    "continueRedirectingSubtitle": "You should be redirected to the app soon",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectTitle": "Invalid redirect",
 | 
					 | 
				
			||||||
    "continueInvalidRedirectSubtitle": "The redirect URL is invalid",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectTitle": "Insecure redirect",
 | 
					 | 
				
			||||||
    "continueInsecureRedirectSubtitle": "You are trying to redirect from <Code>https</Code> to <Code>http</Code>, are you sure you want to continue?",
 | 
					 | 
				
			||||||
    "continueTitle": "Continue",
 | 
					 | 
				
			||||||
    "continueSubtitle": "Click the button to continue to your app.",
 | 
					 | 
				
			||||||
    "internalErrorTitle": "Internal Server Error",
 | 
					 | 
				
			||||||
    "internalErrorSubtitle": "An error occurred on the server and it currently cannot serve your request.",
 | 
					 | 
				
			||||||
    "internalErrorButton": "Try again",
 | 
					 | 
				
			||||||
    "logoutFailTitle": "Failed to log out",
 | 
					 | 
				
			||||||
    "logoutFailSubtitle": "Please try again",
 | 
					 | 
				
			||||||
    "logoutSuccessTitle": "Logged out",
 | 
					 | 
				
			||||||
    "logoutSuccessSubtitle": "You have been logged out",
 | 
					 | 
				
			||||||
    "logoutTitle": "Logout",
 | 
					 | 
				
			||||||
    "logoutUsernameSubtitle": "You are currently logged in as <Code>{{username}}</Code>, click the button below to logout.",
 | 
					 | 
				
			||||||
    "logoutOauthSubtitle": "You are currently logged in as <Code>{{username}}</Code> using the {{provider}} OAuth provider, click the button below to logout.",
 | 
					 | 
				
			||||||
    "notFoundTitle": "Page not found",
 | 
					 | 
				
			||||||
    "notFoundSubtitle": "The page you are looking for does not exist.",
 | 
					 | 
				
			||||||
    "notFoundButton": "Go home",
 | 
					 | 
				
			||||||
    "totpFailTitle": "Failed to verify code",
 | 
					 | 
				
			||||||
    "totpFailSubtitle": "Please check your code and try again",
 | 
					 | 
				
			||||||
    "totpSuccessTitle": "Verified",
 | 
					 | 
				
			||||||
    "totpSuccessSubtitle": "Redirecting to your app",
 | 
					 | 
				
			||||||
    "totpTitle": "Enter your TOTP code",
 | 
					 | 
				
			||||||
    "unauthorizedTitle": "Unauthorized",
 | 
					 | 
				
			||||||
    "unauthorizedResourceSubtitle": "The user with username {{username}} is not authorized to access the resource <Code>{{resource}}</Code>.",
 | 
					 | 
				
			||||||
    "unaothorizedLoginSubtitle": "The user with username {{username}} is not authorized to login.",
 | 
					 | 
				
			||||||
    "unauthorizedButton": "Try again"
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
							
								
								
									
										4
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						@@ -3,6 +3,7 @@ module tinyauth
 | 
				
			|||||||
go 1.23.2
 | 
					go 1.23.2
 | 
				
			||||||
 | 
					
 | 
				
			||||||
require (
 | 
					require (
 | 
				
			||||||
 | 
						github.com/gin-contrib/sessions v1.0.2
 | 
				
			||||||
	github.com/gin-gonic/gin v1.10.0
 | 
						github.com/gin-gonic/gin v1.10.0
 | 
				
			||||||
	github.com/go-playground/validator/v10 v10.24.0
 | 
						github.com/go-playground/validator/v10 v10.24.0
 | 
				
			||||||
	github.com/google/go-querystring v1.1.0
 | 
						github.com/google/go-querystring v1.1.0
 | 
				
			||||||
@@ -57,8 +58,9 @@ require (
 | 
				
			|||||||
	github.com/go-playground/universal-translator v0.18.1 // indirect
 | 
						github.com/go-playground/universal-translator v0.18.1 // indirect
 | 
				
			||||||
	github.com/goccy/go-json v0.10.4 // indirect
 | 
						github.com/goccy/go-json v0.10.4 // indirect
 | 
				
			||||||
	github.com/gogo/protobuf v1.3.2 // indirect
 | 
						github.com/gogo/protobuf v1.3.2 // indirect
 | 
				
			||||||
 | 
						github.com/gorilla/context v1.1.2 // indirect
 | 
				
			||||||
	github.com/gorilla/securecookie v1.1.2 // indirect
 | 
						github.com/gorilla/securecookie v1.1.2 // indirect
 | 
				
			||||||
	github.com/gorilla/sessions v1.2.2
 | 
						github.com/gorilla/sessions v1.2.2 // indirect
 | 
				
			||||||
	github.com/hashicorp/hcl v1.0.0 // indirect
 | 
						github.com/hashicorp/hcl v1.0.0 // indirect
 | 
				
			||||||
	github.com/inconshreveable/mousetrap v1.1.0 // indirect
 | 
						github.com/inconshreveable/mousetrap v1.1.0 // indirect
 | 
				
			||||||
	github.com/json-iterator/go v1.1.12 // indirect
 | 
						github.com/json-iterator/go v1.1.12 // indirect
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										4
									
								
								go.sum
									
									
									
									
									
								
							
							
						
						@@ -65,6 +65,8 @@ github.com/fsnotify/fsnotify v1.7.0 h1:8JEhPFa5W2WU7YfeZzPNqzMP6Lwt7L2715Ggo0nos
 | 
				
			|||||||
github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM=
 | 
					github.com/fsnotify/fsnotify v1.7.0/go.mod h1:40Bi/Hjc2AVfZrqy+aj+yEI+/bRxZnMJyTJwOpGvigM=
 | 
				
			||||||
github.com/gabriel-vasile/mimetype v1.4.8 h1:FfZ3gj38NjllZIeJAmMhr+qKL8Wu+nOoI3GqacKw1NM=
 | 
					github.com/gabriel-vasile/mimetype v1.4.8 h1:FfZ3gj38NjllZIeJAmMhr+qKL8Wu+nOoI3GqacKw1NM=
 | 
				
			||||||
github.com/gabriel-vasile/mimetype v1.4.8/go.mod h1:ByKUIKGjh1ODkGM1asKUbQZOLGrPjydw3hYPU2YU9t8=
 | 
					github.com/gabriel-vasile/mimetype v1.4.8/go.mod h1:ByKUIKGjh1ODkGM1asKUbQZOLGrPjydw3hYPU2YU9t8=
 | 
				
			||||||
 | 
					github.com/gin-contrib/sessions v1.0.2 h1:UaIjUvTH1cMeOdj3in6dl+Xb6It8RiKRF9Z1anbUyCA=
 | 
				
			||||||
 | 
					github.com/gin-contrib/sessions v1.0.2/go.mod h1:KxKxWqWP5LJVDCInulOl4WbLzK2KSPlLesfZ66wRvMs=
 | 
				
			||||||
github.com/gin-contrib/sse v1.0.0 h1:y3bT1mUWUxDpW4JLQg/HnTqV4rozuW4tC9eFKTxYI9E=
 | 
					github.com/gin-contrib/sse v1.0.0 h1:y3bT1mUWUxDpW4JLQg/HnTqV4rozuW4tC9eFKTxYI9E=
 | 
				
			||||||
github.com/gin-contrib/sse v1.0.0/go.mod h1:zNuFdwarAygJBht0NTKiSi3jRf6RbqeILZ9Sp6Slhe0=
 | 
					github.com/gin-contrib/sse v1.0.0/go.mod h1:zNuFdwarAygJBht0NTKiSi3jRf6RbqeILZ9Sp6Slhe0=
 | 
				
			||||||
github.com/gin-gonic/gin v1.10.0 h1:nTuyha1TYqgedzytsKYqna+DfLos46nTv2ygFy86HFU=
 | 
					github.com/gin-gonic/gin v1.10.0 h1:nTuyha1TYqgedzytsKYqna+DfLos46nTv2ygFy86HFU=
 | 
				
			||||||
@@ -97,6 +99,8 @@ github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0=
 | 
				
			|||||||
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
 | 
					github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
 | 
				
			||||||
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
 | 
					github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
 | 
				
			||||||
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
 | 
					github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
 | 
				
			||||||
 | 
					github.com/gorilla/context v1.1.2 h1:WRkNAv2uoa03QNIc1A6u4O7DAGMUVoopZhkiXWA2V1o=
 | 
				
			||||||
 | 
					github.com/gorilla/context v1.1.2/go.mod h1:KDPwT9i/MeWHiLl90fuTgrt4/wPcv75vFAZLaOOcbxM=
 | 
				
			||||||
github.com/gorilla/securecookie v1.1.2 h1:YCIWL56dvtr73r6715mJs5ZvhtnY73hBvEF8kXD8ePA=
 | 
					github.com/gorilla/securecookie v1.1.2 h1:YCIWL56dvtr73r6715mJs5ZvhtnY73hBvEF8kXD8ePA=
 | 
				
			||||||
github.com/gorilla/securecookie v1.1.2/go.mod h1:NfCASbcHqRSY+3a8tlWJwsQap2VX5pwzwo4h3eOamfo=
 | 
					github.com/gorilla/securecookie v1.1.2/go.mod h1:NfCASbcHqRSY+3a8tlWJwsQap2VX5pwzwo4h3eOamfo=
 | 
				
			||||||
github.com/gorilla/sessions v1.2.2 h1:lqzMYz6bOfvn2WriPUjNByzeXIlVzURcPmgMczkmTjY=
 | 
					github.com/gorilla/sessions v1.2.2 h1:lqzMYz6bOfvn2WriPUjNByzeXIlVzURcPmgMczkmTjY=
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,29 +3,42 @@ package api
 | 
				
			|||||||
import (
 | 
					import (
 | 
				
			||||||
	"fmt"
 | 
						"fmt"
 | 
				
			||||||
	"io/fs"
 | 
						"io/fs"
 | 
				
			||||||
 | 
						"math/rand/v2"
 | 
				
			||||||
	"net/http"
 | 
						"net/http"
 | 
				
			||||||
	"os"
 | 
						"os"
 | 
				
			||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
	"time"
 | 
						"time"
 | 
				
			||||||
	"tinyauth/internal/assets"
 | 
						"tinyauth/internal/assets"
 | 
				
			||||||
	"tinyauth/internal/handlers"
 | 
						"tinyauth/internal/auth"
 | 
				
			||||||
 | 
						"tinyauth/internal/hooks"
 | 
				
			||||||
 | 
						"tinyauth/internal/providers"
 | 
				
			||||||
	"tinyauth/internal/types"
 | 
						"tinyauth/internal/types"
 | 
				
			||||||
 | 
						"tinyauth/internal/utils"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						"github.com/gin-contrib/sessions"
 | 
				
			||||||
 | 
						"github.com/gin-contrib/sessions/cookie"
 | 
				
			||||||
	"github.com/gin-gonic/gin"
 | 
						"github.com/gin-gonic/gin"
 | 
				
			||||||
 | 
						"github.com/google/go-querystring/query"
 | 
				
			||||||
 | 
						"github.com/pquerna/otp/totp"
 | 
				
			||||||
	"github.com/rs/zerolog/log"
 | 
						"github.com/rs/zerolog/log"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func NewAPI(config types.APIConfig, handlers *handlers.Handlers) *API {
 | 
					func NewAPI(config types.APIConfig, hooks *hooks.Hooks, auth *auth.Auth, providers *providers.Providers) *API {
 | 
				
			||||||
	return &API{
 | 
						return &API{
 | 
				
			||||||
		Config:    config,
 | 
							Config:    config,
 | 
				
			||||||
		Handlers: handlers,
 | 
							Hooks:     hooks,
 | 
				
			||||||
 | 
							Auth:      auth,
 | 
				
			||||||
 | 
							Providers: providers,
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
type API struct {
 | 
					type API struct {
 | 
				
			||||||
	Config    types.APIConfig
 | 
						Config    types.APIConfig
 | 
				
			||||||
	Router    *gin.Engine
 | 
						Router    *gin.Engine
 | 
				
			||||||
	Handlers *handlers.Handlers
 | 
						Hooks     *hooks.Hooks
 | 
				
			||||||
 | 
						Auth      *auth.Auth
 | 
				
			||||||
 | 
						Providers *providers.Providers
 | 
				
			||||||
 | 
						Domain    string
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (api *API) Init() {
 | 
					func (api *API) Init() {
 | 
				
			||||||
@@ -39,21 +52,48 @@ func (api *API) Init() {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	// Read UI assets
 | 
						// Read UI assets
 | 
				
			||||||
	log.Debug().Msg("Setting up assets")
 | 
						log.Debug().Msg("Setting up assets")
 | 
				
			||||||
	dist, err := fs.Sub(assets.Assets, "dist")
 | 
						dist, distErr := fs.Sub(assets.Assets, "dist")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if err != nil {
 | 
						if distErr != nil {
 | 
				
			||||||
		log.Fatal().Err(err).Msg("Failed to get UI assets")
 | 
							log.Fatal().Err(distErr).Msg("Failed to get UI assets")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Create file server
 | 
						// Create file server
 | 
				
			||||||
	log.Debug().Msg("Setting up file server")
 | 
						log.Debug().Msg("Setting up file server")
 | 
				
			||||||
	fileServer := http.FileServer(http.FS(dist))
 | 
						fileServer := http.FileServer(http.FS(dist))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Setup cookie store
 | 
				
			||||||
 | 
						log.Debug().Msg("Setting up cookie store")
 | 
				
			||||||
 | 
						store := cookie.NewStore([]byte(api.Config.Secret))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Get domain to use for session cookies
 | 
				
			||||||
 | 
						log.Debug().Msg("Getting domain")
 | 
				
			||||||
 | 
						domain, domainErr := utils.GetRootURL(api.Config.AppURL)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if domainErr != nil {
 | 
				
			||||||
 | 
							log.Fatal().Err(domainErr).Msg("Failed to get domain")
 | 
				
			||||||
 | 
							os.Exit(1)
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						log.Info().Str("domain", domain).Msg("Using domain for cookies")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Domain = fmt.Sprintf(".%s", domain)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Use session middleware
 | 
				
			||||||
 | 
						store.Options(sessions.Options{
 | 
				
			||||||
 | 
							Domain:   api.Domain,
 | 
				
			||||||
 | 
							Path:     "/",
 | 
				
			||||||
 | 
							HttpOnly: true,
 | 
				
			||||||
 | 
							Secure:   api.Config.CookieSecure,
 | 
				
			||||||
 | 
							MaxAge:   api.Config.SessionExpiry,
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						router.Use(sessions.Sessions("tinyauth", store))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// UI middleware
 | 
						// UI middleware
 | 
				
			||||||
	router.Use(func(c *gin.Context) {
 | 
						router.Use(func(c *gin.Context) {
 | 
				
			||||||
		// If not an API request, serve the UI
 | 
							// If not an API request, serve the UI
 | 
				
			||||||
		if !strings.HasPrefix(c.Request.URL.Path, "/api") {
 | 
							if !strings.HasPrefix(c.Request.URL.Path, "/api") {
 | 
				
			||||||
			// Check if the file exists
 | 
					 | 
				
			||||||
			_, err := fs.Stat(dist, strings.TrimPrefix(c.Request.URL.Path, "/"))
 | 
								_, err := fs.Stat(dist, strings.TrimPrefix(c.Request.URL.Path, "/"))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// If the file doesn't exist, serve the index.html
 | 
								// If the file doesn't exist, serve the index.html
 | 
				
			||||||
@@ -74,24 +114,608 @@ func (api *API) Init() {
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (api *API) SetupRoutes() {
 | 
					func (api *API) SetupRoutes() {
 | 
				
			||||||
	// Proxy
 | 
						api.Router.GET("/api/auth/:proxy", func(c *gin.Context) {
 | 
				
			||||||
	api.Router.GET("/api/auth/:proxy", api.Handlers.AuthHandler)
 | 
							// Create struct for proxy
 | 
				
			||||||
 | 
							var proxy types.Proxy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Auth
 | 
							// Bind URI
 | 
				
			||||||
	api.Router.POST("/api/login", api.Handlers.LoginHandler)
 | 
							bindErr := c.BindUri(&proxy)
 | 
				
			||||||
	api.Router.POST("/api/totp", api.Handlers.TotpHandler)
 | 
					 | 
				
			||||||
	api.Router.POST("/api/logout", api.Handlers.LogoutHandler)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Context
 | 
							// Handle error
 | 
				
			||||||
	api.Router.GET("/api/app", api.Handlers.AppHandler)
 | 
							if bindErr != nil {
 | 
				
			||||||
	api.Router.GET("/api/user", api.Handlers.UserHandler)
 | 
								log.Error().Err(bindErr).Msg("Failed to bind URI")
 | 
				
			||||||
 | 
								c.JSON(400, gin.H{
 | 
				
			||||||
 | 
									"status":  400,
 | 
				
			||||||
 | 
									"message": "Bad Request",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// OAuth
 | 
							// Check if the request is coming from a browser (tools like curl/bruno use */* and they don't include the text/html)
 | 
				
			||||||
	api.Router.GET("/api/oauth/url/:provider", api.Handlers.OauthUrlHandler)
 | 
							isBrowser := strings.Contains(c.Request.Header.Get("Accept"), "text/html")
 | 
				
			||||||
	api.Router.GET("/api/oauth/callback/:provider", api.Handlers.OauthCallbackHandler)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// App
 | 
							if isBrowser {
 | 
				
			||||||
	api.Router.GET("/api/healthcheck", api.Handlers.HealthcheckHandler)
 | 
								log.Debug().Msg("Request is most likely coming from a browser")
 | 
				
			||||||
 | 
							} else {
 | 
				
			||||||
 | 
								log.Debug().Msg("Request is most likely not coming from a browser")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Interface("proxy", proxy.Proxy).Msg("Got proxy")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if auth is enabled
 | 
				
			||||||
 | 
							authEnabled, authEnabledErr := api.Auth.AuthEnabled(c)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if authEnabledErr != nil {
 | 
				
			||||||
 | 
								// Return 500 if nginx is the proxy or if the request is not coming from a browser
 | 
				
			||||||
 | 
								if proxy.Proxy == "nginx" || !isBrowser {
 | 
				
			||||||
 | 
									log.Error().Err(authEnabledErr).Msg("Failed to check if auth is enabled")
 | 
				
			||||||
 | 
									c.JSON(500, gin.H{
 | 
				
			||||||
 | 
										"status":  500,
 | 
				
			||||||
 | 
										"message": "Internal Server Error",
 | 
				
			||||||
 | 
									})
 | 
				
			||||||
 | 
									return
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Return the internal server error page
 | 
				
			||||||
 | 
								if api.handleError(c, "Failed to check if auth is enabled", authEnabledErr) {
 | 
				
			||||||
 | 
									return
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// If auth is not enabled, return 200
 | 
				
			||||||
 | 
							if !authEnabled {
 | 
				
			||||||
 | 
								// The user is allowed to access the app
 | 
				
			||||||
 | 
								c.JSON(200, gin.H{
 | 
				
			||||||
 | 
									"status":  200,
 | 
				
			||||||
 | 
									"message": "Authenticated",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Stop further processing
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get user context
 | 
				
			||||||
 | 
							userContext := api.Hooks.UseUserContext(c)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get headers
 | 
				
			||||||
 | 
							uri := c.Request.Header.Get("X-Forwarded-Uri")
 | 
				
			||||||
 | 
							proto := c.Request.Header.Get("X-Forwarded-Proto")
 | 
				
			||||||
 | 
							host := c.Request.Header.Get("X-Forwarded-Host")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if user is logged in
 | 
				
			||||||
 | 
							if userContext.IsLoggedIn {
 | 
				
			||||||
 | 
								log.Debug().Msg("Authenticated")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Check if user is allowed to access subdomain, if request is nginx.example.com the subdomain (resource) is nginx
 | 
				
			||||||
 | 
								appAllowed, appAllowedErr := api.Auth.ResourceAllowed(c, userContext)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Check if there was an error
 | 
				
			||||||
 | 
								if appAllowedErr != nil {
 | 
				
			||||||
 | 
									// Return 500 if nginx is the proxy or if the request is not coming from a browser
 | 
				
			||||||
 | 
									if proxy.Proxy == "nginx" || !isBrowser {
 | 
				
			||||||
 | 
										log.Error().Err(appAllowedErr).Msg("Failed to check if app is allowed")
 | 
				
			||||||
 | 
										c.JSON(500, gin.H{
 | 
				
			||||||
 | 
											"status":  500,
 | 
				
			||||||
 | 
											"message": "Internal Server Error",
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
 | 
										return
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// Return the internal server error page
 | 
				
			||||||
 | 
									if api.handleError(c, "Failed to check if app is allowed", appAllowedErr) {
 | 
				
			||||||
 | 
										return
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								log.Debug().Bool("appAllowed", appAllowed).Msg("Checking if app is allowed")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// The user is not allowed to access the app
 | 
				
			||||||
 | 
								if !appAllowed {
 | 
				
			||||||
 | 
									log.Warn().Str("username", userContext.Username).Str("host", host).Msg("User not allowed")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// Set WWW-Authenticate header
 | 
				
			||||||
 | 
									c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// Return 401 if nginx is the proxy or if the request is not coming from a browser
 | 
				
			||||||
 | 
									if proxy.Proxy == "nginx" || !isBrowser {
 | 
				
			||||||
 | 
										c.JSON(401, gin.H{
 | 
				
			||||||
 | 
											"status":  401,
 | 
				
			||||||
 | 
											"message": "Unauthorized",
 | 
				
			||||||
 | 
										})
 | 
				
			||||||
 | 
										return
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// Build query
 | 
				
			||||||
 | 
									queries, queryErr := query.Values(types.UnauthorizedQuery{
 | 
				
			||||||
 | 
										Username: userContext.Username,
 | 
				
			||||||
 | 
										Resource: strings.Split(host, ".")[0],
 | 
				
			||||||
 | 
									})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
 | 
				
			||||||
 | 
									if api.handleError(c, "Failed to build query", queryErr) {
 | 
				
			||||||
 | 
										return
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// We are using caddy/traefik so redirect
 | 
				
			||||||
 | 
									c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/unauthorized?%s", api.Config.AppURL, queries.Encode()))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									// Stop further processing
 | 
				
			||||||
 | 
									return
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Set the user header
 | 
				
			||||||
 | 
								c.Header("Remote-User", userContext.Username)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// The user is allowed to access the app
 | 
				
			||||||
 | 
								c.JSON(200, gin.H{
 | 
				
			||||||
 | 
									"status":  200,
 | 
				
			||||||
 | 
									"message": "Authenticated",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Stop further processing
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// The user is not logged in
 | 
				
			||||||
 | 
							log.Debug().Msg("Unauthorized")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Set www-authenticate header
 | 
				
			||||||
 | 
							c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Return 401 if nginx is the proxy or if the request is not coming from a browser
 | 
				
			||||||
 | 
							if proxy.Proxy == "nginx" || !isBrowser {
 | 
				
			||||||
 | 
								c.JSON(401, gin.H{
 | 
				
			||||||
 | 
									"status":  401,
 | 
				
			||||||
 | 
									"message": "Unauthorized",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Build query
 | 
				
			||||||
 | 
							queries, queryErr := query.Values(types.LoginQuery{
 | 
				
			||||||
 | 
								RedirectURI: fmt.Sprintf("%s://%s%s", proto, host, uri),
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
 | 
				
			||||||
 | 
							if api.handleError(c, "Failed to build query", queryErr) {
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Interface("redirect_uri", fmt.Sprintf("%s://%s%s", proto, host, uri)).Msg("Redirecting to login")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Redirect to login
 | 
				
			||||||
 | 
							c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/?%s", api.Config.AppURL, queries.Encode()))
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Router.POST("/api/login", func(c *gin.Context) {
 | 
				
			||||||
 | 
							// Create login struct
 | 
				
			||||||
 | 
							var login types.LoginRequest
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Bind JSON
 | 
				
			||||||
 | 
							err := c.BindJSON(&login)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								log.Error().Err(err).Msg("Failed to bind JSON")
 | 
				
			||||||
 | 
								c.JSON(400, gin.H{
 | 
				
			||||||
 | 
									"status":  400,
 | 
				
			||||||
 | 
									"message": "Bad Request",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Got login request")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get user based on username
 | 
				
			||||||
 | 
							user := api.Auth.GetUser(login.Username)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// User does not exist
 | 
				
			||||||
 | 
							if user == nil {
 | 
				
			||||||
 | 
								log.Debug().Str("username", login.Username).Msg("User not found")
 | 
				
			||||||
 | 
								c.JSON(401, gin.H{
 | 
				
			||||||
 | 
									"status":  401,
 | 
				
			||||||
 | 
									"message": "Unauthorized",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Got user")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if password is correct
 | 
				
			||||||
 | 
							if !api.Auth.CheckPassword(*user, login.Password) {
 | 
				
			||||||
 | 
								log.Debug().Str("username", login.Username).Msg("Password incorrect")
 | 
				
			||||||
 | 
								c.JSON(401, gin.H{
 | 
				
			||||||
 | 
									"status":  401,
 | 
				
			||||||
 | 
									"message": "Unauthorized",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Password correct, checking totp")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if user has totp enabled
 | 
				
			||||||
 | 
							if user.TotpSecret != "" {
 | 
				
			||||||
 | 
								log.Debug().Msg("Totp enabled")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Set totp pending cookie
 | 
				
			||||||
 | 
								api.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
				
			||||||
 | 
									Username:    login.Username,
 | 
				
			||||||
 | 
									Provider:    "username",
 | 
				
			||||||
 | 
									TotpPending: true,
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Return totp required
 | 
				
			||||||
 | 
								c.JSON(200, gin.H{
 | 
				
			||||||
 | 
									"status":      200,
 | 
				
			||||||
 | 
									"message":     "Waiting for totp",
 | 
				
			||||||
 | 
									"totpPending": true,
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Stop further processing
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Create session cookie with username as provider
 | 
				
			||||||
 | 
							api.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
				
			||||||
 | 
								Username: login.Username,
 | 
				
			||||||
 | 
								Provider: "username",
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Return logged in
 | 
				
			||||||
 | 
							c.JSON(200, gin.H{
 | 
				
			||||||
 | 
								"status":      200,
 | 
				
			||||||
 | 
								"message":     "Logged in",
 | 
				
			||||||
 | 
								"totpPending": false,
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Router.POST("/api/totp", func(c *gin.Context) {
 | 
				
			||||||
 | 
							// Create totp struct
 | 
				
			||||||
 | 
							var totpReq types.TotpRequest
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Bind JSON
 | 
				
			||||||
 | 
							err := c.BindJSON(&totpReq)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if err != nil {
 | 
				
			||||||
 | 
								log.Error().Err(err).Msg("Failed to bind JSON")
 | 
				
			||||||
 | 
								c.JSON(400, gin.H{
 | 
				
			||||||
 | 
									"status":  400,
 | 
				
			||||||
 | 
									"message": "Bad Request",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Checking totp")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get user context
 | 
				
			||||||
 | 
							userContext := api.Hooks.UseUserContext(c)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if we have a user
 | 
				
			||||||
 | 
							if userContext.Username == "" {
 | 
				
			||||||
 | 
								log.Debug().Msg("No user context")
 | 
				
			||||||
 | 
								c.JSON(401, gin.H{
 | 
				
			||||||
 | 
									"status":  401,
 | 
				
			||||||
 | 
									"message": "Unauthorized",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get user
 | 
				
			||||||
 | 
							user := api.Auth.GetUser(userContext.Username)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if user exists
 | 
				
			||||||
 | 
							if user == nil {
 | 
				
			||||||
 | 
								log.Debug().Msg("User not found")
 | 
				
			||||||
 | 
								c.JSON(401, gin.H{
 | 
				
			||||||
 | 
									"status":  401,
 | 
				
			||||||
 | 
									"message": "Unauthorized",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if totp is correct
 | 
				
			||||||
 | 
							totpOk := totp.Validate(totpReq.Code, user.TotpSecret)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// TOTP is incorrect
 | 
				
			||||||
 | 
							if !totpOk {
 | 
				
			||||||
 | 
								log.Debug().Msg("Totp incorrect")
 | 
				
			||||||
 | 
								c.JSON(401, gin.H{
 | 
				
			||||||
 | 
									"status":  401,
 | 
				
			||||||
 | 
									"message": "Unauthorized",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Totp correct")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Create session cookie with username as provider
 | 
				
			||||||
 | 
							api.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
				
			||||||
 | 
								Username: user.Username,
 | 
				
			||||||
 | 
								Provider: "username",
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Return logged in
 | 
				
			||||||
 | 
							c.JSON(200, gin.H{
 | 
				
			||||||
 | 
								"status":  200,
 | 
				
			||||||
 | 
								"message": "Logged in",
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Router.POST("/api/logout", func(c *gin.Context) {
 | 
				
			||||||
 | 
							log.Debug().Msg("Logging out")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Delete session cookie
 | 
				
			||||||
 | 
							api.Auth.DeleteSessionCookie(c)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Cleaning up redirect cookie")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Clean up redirect cookie if it exists
 | 
				
			||||||
 | 
							c.SetCookie("tinyauth_redirect_uri", "", -1, "/", api.Domain, api.Config.CookieSecure, true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Return logged out
 | 
				
			||||||
 | 
							c.JSON(200, gin.H{
 | 
				
			||||||
 | 
								"status":  200,
 | 
				
			||||||
 | 
								"message": "Logged out",
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Router.GET("/api/app", func(c *gin.Context) {
 | 
				
			||||||
 | 
							log.Debug().Msg("Getting app context")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get configured providers
 | 
				
			||||||
 | 
							configuredProviders := api.Providers.GetConfiguredProviders()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// We have username/password configured so add it to our providers
 | 
				
			||||||
 | 
							if api.Auth.UserAuthConfigured() {
 | 
				
			||||||
 | 
								configuredProviders = append(configuredProviders, "username")
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Create app context struct
 | 
				
			||||||
 | 
							appContext := types.AppContext{
 | 
				
			||||||
 | 
								Status:              200,
 | 
				
			||||||
 | 
								Message:             "Ok",
 | 
				
			||||||
 | 
								ConfiguredProviders: configuredProviders,
 | 
				
			||||||
 | 
								DisableContinue:     api.Config.DisableContinue,
 | 
				
			||||||
 | 
								Title:               api.Config.Title,
 | 
				
			||||||
 | 
								GenericName:         api.Config.GenericName,
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Return app context
 | 
				
			||||||
 | 
							c.JSON(200, appContext)
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Router.GET("/api/user", func(c *gin.Context) {
 | 
				
			||||||
 | 
							log.Debug().Msg("Getting user context")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get user context
 | 
				
			||||||
 | 
							userContext := api.Hooks.UseUserContext(c)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Create user context response
 | 
				
			||||||
 | 
							userContextResponse := types.UserContextResponse{
 | 
				
			||||||
 | 
								Status:      200,
 | 
				
			||||||
 | 
								IsLoggedIn:  userContext.IsLoggedIn,
 | 
				
			||||||
 | 
								Username:    userContext.Username,
 | 
				
			||||||
 | 
								Provider:    userContext.Provider,
 | 
				
			||||||
 | 
								Oauth:       userContext.OAuth,
 | 
				
			||||||
 | 
								TotpPending: userContext.TotpPending,
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// If we are not logged in we set the status to 401 and add the WWW-Authenticate header else we set it to 200
 | 
				
			||||||
 | 
							if !userContext.IsLoggedIn {
 | 
				
			||||||
 | 
								log.Debug().Msg("Unauthorized")
 | 
				
			||||||
 | 
								c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
 | 
				
			||||||
 | 
								userContextResponse.Message = "Unauthorized"
 | 
				
			||||||
 | 
							} else {
 | 
				
			||||||
 | 
								log.Debug().Interface("userContext", userContext).Msg("Authenticated")
 | 
				
			||||||
 | 
								userContextResponse.Message = "Authenticated"
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Return user context
 | 
				
			||||||
 | 
							c.JSON(200, userContextResponse)
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Router.GET("/api/oauth/url/:provider", func(c *gin.Context) {
 | 
				
			||||||
 | 
							// Create struct for OAuth request
 | 
				
			||||||
 | 
							var request types.OAuthRequest
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Bind URI
 | 
				
			||||||
 | 
							bindErr := c.BindUri(&request)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if bindErr != nil {
 | 
				
			||||||
 | 
								log.Error().Err(bindErr).Msg("Failed to bind URI")
 | 
				
			||||||
 | 
								c.JSON(400, gin.H{
 | 
				
			||||||
 | 
									"status":  400,
 | 
				
			||||||
 | 
									"message": "Bad Request",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Got OAuth request")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Check if provider exists
 | 
				
			||||||
 | 
							provider := api.Providers.GetProvider(request.Provider)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Provider does not exist
 | 
				
			||||||
 | 
							if provider == nil {
 | 
				
			||||||
 | 
								c.JSON(404, gin.H{
 | 
				
			||||||
 | 
									"status":  404,
 | 
				
			||||||
 | 
									"message": "Not Found",
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Str("provider", request.Provider).Msg("Got provider")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get auth URL
 | 
				
			||||||
 | 
							authURL := provider.GetAuthURL()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Got auth URL")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get redirect URI
 | 
				
			||||||
 | 
							redirectURI := c.Query("redirect_uri")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Set redirect cookie if redirect URI is provided
 | 
				
			||||||
 | 
							if redirectURI != "" {
 | 
				
			||||||
 | 
								log.Debug().Str("redirectURI", redirectURI).Msg("Setting redirect cookie")
 | 
				
			||||||
 | 
								c.SetCookie("tinyauth_redirect_uri", redirectURI, 3600, "/", api.Domain, api.Config.CookieSecure, true)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Tailscale does not have an auth url so we create a random code (does not need to be secure) to avoid caching and send it
 | 
				
			||||||
 | 
							if request.Provider == "tailscale" {
 | 
				
			||||||
 | 
								// Build tailscale query
 | 
				
			||||||
 | 
								tailscaleQuery, tailscaleQueryErr := query.Values(types.TailscaleQuery{
 | 
				
			||||||
 | 
									Code: (1000 + rand.IntN(9000)),
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Handle error
 | 
				
			||||||
 | 
								if tailscaleQueryErr != nil {
 | 
				
			||||||
 | 
									log.Error().Err(tailscaleQueryErr).Msg("Failed to build query")
 | 
				
			||||||
 | 
									c.JSON(500, gin.H{
 | 
				
			||||||
 | 
										"status":  500,
 | 
				
			||||||
 | 
										"message": "Internal Server Error",
 | 
				
			||||||
 | 
									})
 | 
				
			||||||
 | 
									return
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Return tailscale URL (immidiately redirects to the callback)
 | 
				
			||||||
 | 
								c.JSON(200, gin.H{
 | 
				
			||||||
 | 
									"status":  200,
 | 
				
			||||||
 | 
									"message": "Ok",
 | 
				
			||||||
 | 
									"url":     fmt.Sprintf("%s/api/oauth/callback/tailscale?%s", api.Config.AppURL, tailscaleQuery.Encode()),
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Return auth URL
 | 
				
			||||||
 | 
							c.JSON(200, gin.H{
 | 
				
			||||||
 | 
								"status":  200,
 | 
				
			||||||
 | 
								"message": "Ok",
 | 
				
			||||||
 | 
								"url":     authURL,
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						api.Router.GET("/api/oauth/callback/:provider", func(c *gin.Context) {
 | 
				
			||||||
 | 
							// Create struct for OAuth request
 | 
				
			||||||
 | 
							var providerName types.OAuthRequest
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Bind URI
 | 
				
			||||||
 | 
							bindErr := c.BindUri(&providerName)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if api.handleError(c, "Failed to bind URI", bindErr) {
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Interface("provider", providerName.Provider).Msg("Got provider name")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get code
 | 
				
			||||||
 | 
							code := c.Query("code")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Code empty so redirect to error
 | 
				
			||||||
 | 
							if code == "" {
 | 
				
			||||||
 | 
								log.Error().Msg("No code provided")
 | 
				
			||||||
 | 
								c.Redirect(http.StatusPermanentRedirect, "/error")
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Got code")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get provider
 | 
				
			||||||
 | 
							provider := api.Providers.GetProvider(providerName.Provider)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Str("provider", providerName.Provider).Msg("Got provider")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Provider does not exist
 | 
				
			||||||
 | 
							if provider == nil {
 | 
				
			||||||
 | 
								c.Redirect(http.StatusPermanentRedirect, "/not-found")
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Exchange token (authenticates user)
 | 
				
			||||||
 | 
							_, tokenErr := provider.ExchangeToken(code)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Got token")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if api.handleError(c, "Failed to exchange token", tokenErr) {
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get email
 | 
				
			||||||
 | 
							email, emailErr := api.Providers.GetUser(providerName.Provider)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Str("email", email).Msg("Got email")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if api.handleError(c, "Failed to get user", emailErr) {
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Email is not whitelisted
 | 
				
			||||||
 | 
							if !api.Auth.EmailWhitelisted(email) {
 | 
				
			||||||
 | 
								log.Warn().Str("email", email).Msg("Email not whitelisted")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Build query
 | 
				
			||||||
 | 
								unauthorizedQuery, unauthorizedQueryErr := query.Values(types.UnauthorizedQuery{
 | 
				
			||||||
 | 
									Username: email,
 | 
				
			||||||
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Handle error
 | 
				
			||||||
 | 
								if api.handleError(c, "Failed to build query", unauthorizedQueryErr) {
 | 
				
			||||||
 | 
									return
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								// Redirect to unauthorized
 | 
				
			||||||
 | 
								c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/unauthorized?%s", api.Config.AppURL, unauthorizedQuery.Encode()))
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Email whitelisted")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Create session cookie
 | 
				
			||||||
 | 
							api.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
				
			||||||
 | 
								Username: email,
 | 
				
			||||||
 | 
								Provider: providerName.Provider,
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Get redirect URI
 | 
				
			||||||
 | 
							redirectURI, redirectURIErr := c.Cookie("tinyauth_redirect_uri")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// If it is empty it means that no redirect_uri was provided to the login screen so we just log in
 | 
				
			||||||
 | 
							if redirectURIErr != nil {
 | 
				
			||||||
 | 
								c.Redirect(http.StatusPermanentRedirect, api.Config.AppURL)
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Str("redirectURI", redirectURI).Msg("Got redirect URI")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Clean up redirect cookie since we already have the value
 | 
				
			||||||
 | 
							c.SetCookie("tinyauth_redirect_uri", "", -1, "/", api.Domain, api.Config.CookieSecure, true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Build query
 | 
				
			||||||
 | 
							redirectQuery, redirectQueryErr := query.Values(types.LoginQuery{
 | 
				
			||||||
 | 
								RedirectURI: redirectURI,
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							log.Debug().Msg("Got redirect query")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Handle error
 | 
				
			||||||
 | 
							if api.handleError(c, "Failed to build query", redirectQueryErr) {
 | 
				
			||||||
 | 
								return
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							// Redirect to continue with the redirect URI
 | 
				
			||||||
 | 
							c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/continue?%s", api.Config.AppURL, redirectQuery.Encode()))
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Simple healthcheck
 | 
				
			||||||
 | 
						api.Router.GET("/api/healthcheck", func(c *gin.Context) {
 | 
				
			||||||
 | 
							c.JSON(200, gin.H{
 | 
				
			||||||
 | 
								"status":  200,
 | 
				
			||||||
 | 
								"message": "OK",
 | 
				
			||||||
 | 
							})
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (api *API) Run() {
 | 
					func (api *API) Run() {
 | 
				
			||||||
@@ -100,12 +724,23 @@ func (api *API) Run() {
 | 
				
			|||||||
	// Run server
 | 
						// Run server
 | 
				
			||||||
	err := api.Router.Run(fmt.Sprintf("%s:%d", api.Config.Address, api.Config.Port))
 | 
						err := api.Router.Run(fmt.Sprintf("%s:%d", api.Config.Address, api.Config.Port))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check for errors
 | 
						// Check error
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
		log.Fatal().Err(err).Msg("Failed to start server")
 | 
							log.Fatal().Err(err).Msg("Failed to start server")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// handleError logs the error and redirects to the error page (only meant for stuff the user may access does not apply for login paths)
 | 
				
			||||||
 | 
					func (api *API) handleError(c *gin.Context, msg string, err error) bool {
 | 
				
			||||||
 | 
						// If error is not nil log it and redirect to error page also return true so we can stop further processing
 | 
				
			||||||
 | 
						if err != nil {
 | 
				
			||||||
 | 
							log.Error().Err(err).Msg(msg)
 | 
				
			||||||
 | 
							c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", api.Config.AppURL))
 | 
				
			||||||
 | 
							return true
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return false
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// zerolog is a middleware for gin that logs requests using zerolog
 | 
					// zerolog is a middleware for gin that logs requests using zerolog
 | 
				
			||||||
func zerolog() gin.HandlerFunc {
 | 
					func zerolog() gin.HandlerFunc {
 | 
				
			||||||
	return func(c *gin.Context) {
 | 
						return func(c *gin.Context) {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -5,13 +5,11 @@ import (
 | 
				
			|||||||
	"io"
 | 
						"io"
 | 
				
			||||||
	"net/http"
 | 
						"net/http"
 | 
				
			||||||
	"net/http/httptest"
 | 
						"net/http/httptest"
 | 
				
			||||||
	"reflect"
 | 
					 | 
				
			||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
	"testing"
 | 
						"testing"
 | 
				
			||||||
	"tinyauth/internal/api"
 | 
						"tinyauth/internal/api"
 | 
				
			||||||
	"tinyauth/internal/auth"
 | 
						"tinyauth/internal/auth"
 | 
				
			||||||
	"tinyauth/internal/docker"
 | 
						"tinyauth/internal/docker"
 | 
				
			||||||
	"tinyauth/internal/handlers"
 | 
					 | 
				
			||||||
	"tinyauth/internal/hooks"
 | 
						"tinyauth/internal/hooks"
 | 
				
			||||||
	"tinyauth/internal/providers"
 | 
						"tinyauth/internal/providers"
 | 
				
			||||||
	"tinyauth/internal/types"
 | 
						"tinyauth/internal/types"
 | 
				
			||||||
@@ -23,25 +21,11 @@ import (
 | 
				
			|||||||
var apiConfig = types.APIConfig{
 | 
					var apiConfig = types.APIConfig{
 | 
				
			||||||
	Port:            8080,
 | 
						Port:            8080,
 | 
				
			||||||
	Address:         "0.0.0.0",
 | 
						Address:         "0.0.0.0",
 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Simple handlers config for tests
 | 
					 | 
				
			||||||
var handlersConfig = types.HandlersConfig{
 | 
					 | 
				
			||||||
	AppURL:          "http://localhost:8080",
 | 
					 | 
				
			||||||
	DisableContinue: false,
 | 
					 | 
				
			||||||
	Title:           "Tinyauth",
 | 
					 | 
				
			||||||
	GenericName:     "Generic",
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Simple auth config for tests
 | 
					 | 
				
			||||||
var authConfig = types.AuthConfig{
 | 
					 | 
				
			||||||
	Users:           types.Users{},
 | 
					 | 
				
			||||||
	OauthWhitelist:  []string{},
 | 
					 | 
				
			||||||
	Secret:          "super-secret-api-thing-for-tests", // It is 32 chars long
 | 
						Secret:          "super-secret-api-thing-for-tests", // It is 32 chars long
 | 
				
			||||||
 | 
						AppURL:          "http://tinyauth.localhost",
 | 
				
			||||||
	CookieSecure:    false,
 | 
						CookieSecure:    false,
 | 
				
			||||||
	SessionExpiry:   3600,
 | 
						SessionExpiry:   3600,
 | 
				
			||||||
	LoginTimeout:    0,
 | 
						DisableContinue: false,
 | 
				
			||||||
	LoginMaxRetries: 0,
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Cookie
 | 
					// Cookie
 | 
				
			||||||
@@ -59,21 +43,20 @@ func getAPI(t *testing.T) *api.API {
 | 
				
			|||||||
	docker := docker.NewDocker()
 | 
						docker := docker.NewDocker()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Initialize docker
 | 
						// Initialize docker
 | 
				
			||||||
	err := docker.Init()
 | 
						dockerErr := docker.Init()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if dockerErr != nil {
 | 
				
			||||||
		t.Fatalf("Failed to initialize docker: %v", err)
 | 
							t.Fatalf("Failed to initialize docker: %v", dockerErr)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Create auth service
 | 
						// Create auth service
 | 
				
			||||||
	authConfig.Users = types.Users{
 | 
						auth := auth.NewAuth(docker, types.Users{
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
			Username: user.Username,
 | 
								Username: user.Username,
 | 
				
			||||||
			Password: user.Password,
 | 
								Password: user.Password,
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
	}
 | 
						}, nil, apiConfig.SessionExpiry)
 | 
				
			||||||
	auth := auth.NewAuth(authConfig, docker)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Create providers service
 | 
						// Create providers service
 | 
				
			||||||
	providers := providers.NewProviders(types.OAuthConfig{})
 | 
						providers := providers.NewProviders(types.OAuthConfig{})
 | 
				
			||||||
@@ -84,11 +67,8 @@ func getAPI(t *testing.T) *api.API {
 | 
				
			|||||||
	// Create hooks service
 | 
						// Create hooks service
 | 
				
			||||||
	hooks := hooks.NewHooks(auth, providers)
 | 
						hooks := hooks.NewHooks(auth, providers)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Create handlers service
 | 
					 | 
				
			||||||
	handlers := handlers.NewHandlers(handlersConfig, auth, hooks, providers, docker)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create API
 | 
						// Create API
 | 
				
			||||||
	api := api.NewAPI(apiConfig, handlers)
 | 
						api := api.NewAPI(apiConfig, hooks, auth, providers)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Setup routes
 | 
						// Setup routes
 | 
				
			||||||
	api.Init()
 | 
						api.Init()
 | 
				
			||||||
@@ -143,70 +123,6 @@ func TestLogin(t *testing.T) {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Test app context
 | 
					 | 
				
			||||||
func TestAppContext(t *testing.T) {
 | 
					 | 
				
			||||||
	t.Log("Testing app context")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get API
 | 
					 | 
				
			||||||
	api := getAPI(t)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create recorder
 | 
					 | 
				
			||||||
	recorder := httptest.NewRecorder()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create request
 | 
					 | 
				
			||||||
	req, err := http.NewRequest("GET", "/api/app", nil)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if there was an error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		t.Fatalf("Error creating request: %v", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Set the cookie
 | 
					 | 
				
			||||||
	req.AddCookie(&http.Cookie{
 | 
					 | 
				
			||||||
		Name:  "tinyauth",
 | 
					 | 
				
			||||||
		Value: cookie,
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Serve the request
 | 
					 | 
				
			||||||
	api.Router.ServeHTTP(recorder, req)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Assert
 | 
					 | 
				
			||||||
	assert.Equal(t, recorder.Code, http.StatusOK)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Read the body of the response
 | 
					 | 
				
			||||||
	body, err := io.ReadAll(recorder.Body)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if there was an error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		t.Fatalf("Error getting body: %v", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Unmarshal the body into the user struct
 | 
					 | 
				
			||||||
	var app types.AppContext
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	err = json.Unmarshal(body, &app)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if there was an error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		t.Fatalf("Error unmarshalling body: %v", err)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create tests values
 | 
					 | 
				
			||||||
	expected := types.AppContext{
 | 
					 | 
				
			||||||
		Status:              200,
 | 
					 | 
				
			||||||
		Message:             "OK",
 | 
					 | 
				
			||||||
		ConfiguredProviders: []string{"username"},
 | 
					 | 
				
			||||||
		DisableContinue:     false,
 | 
					 | 
				
			||||||
		Title:               "Tinyauth",
 | 
					 | 
				
			||||||
		GenericName:         "Generic",
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// We should get the username back
 | 
					 | 
				
			||||||
	if !reflect.DeepEqual(app, expected) {
 | 
					 | 
				
			||||||
		t.Fatalf("Expected %v, got %v", expected, app)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Test user context
 | 
					// Test user context
 | 
				
			||||||
func TestUserContext(t *testing.T) {
 | 
					func TestUserContext(t *testing.T) {
 | 
				
			||||||
	t.Log("Testing user context")
 | 
						t.Log("Testing user context")
 | 
				
			||||||
@@ -238,11 +154,11 @@ func TestUserContext(t *testing.T) {
 | 
				
			|||||||
	assert.Equal(t, recorder.Code, http.StatusOK)
 | 
						assert.Equal(t, recorder.Code, http.StatusOK)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Read the body of the response
 | 
						// Read the body of the response
 | 
				
			||||||
	body, err := io.ReadAll(recorder.Body)
 | 
						body, bodyErr := io.ReadAll(recorder.Body)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if bodyErr != nil {
 | 
				
			||||||
		t.Fatalf("Error getting body: %v", err)
 | 
							t.Fatalf("Error getting body: %v", bodyErr)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Unmarshal the body into the user struct
 | 
						// Unmarshal the body into the user struct
 | 
				
			||||||
@@ -252,11 +168,11 @@ func TestUserContext(t *testing.T) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	var user User
 | 
						var user User
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	err = json.Unmarshal(body, &user)
 | 
						jsonErr := json.Unmarshal(body, &user)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if jsonErr != nil {
 | 
				
			||||||
		t.Fatalf("Error unmarshalling body: %v", err)
 | 
							t.Fatalf("Error unmarshalling body: %v", jsonErr)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// We should get the username back
 | 
						// We should get the username back
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1 +1 @@
 | 
				
			|||||||
v3.2.0
 | 
					v3.1.0
 | 
				
			||||||
@@ -1,64 +1,38 @@
 | 
				
			|||||||
package auth
 | 
					package auth
 | 
				
			||||||
 | 
					
 | 
				
			||||||
import (
 | 
					import (
 | 
				
			||||||
	"fmt"
 | 
					 | 
				
			||||||
	"net/http"
 | 
					 | 
				
			||||||
	"regexp"
 | 
						"regexp"
 | 
				
			||||||
	"slices"
 | 
						"slices"
 | 
				
			||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
	"sync"
 | 
					 | 
				
			||||||
	"time"
 | 
						"time"
 | 
				
			||||||
	"tinyauth/internal/docker"
 | 
						"tinyauth/internal/docker"
 | 
				
			||||||
	"tinyauth/internal/types"
 | 
						"tinyauth/internal/types"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						"github.com/gin-contrib/sessions"
 | 
				
			||||||
	"github.com/gin-gonic/gin"
 | 
						"github.com/gin-gonic/gin"
 | 
				
			||||||
	"github.com/gorilla/sessions"
 | 
					 | 
				
			||||||
	"github.com/rs/zerolog/log"
 | 
						"github.com/rs/zerolog/log"
 | 
				
			||||||
	"golang.org/x/crypto/bcrypt"
 | 
						"golang.org/x/crypto/bcrypt"
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func NewAuth(config types.AuthConfig, docker *docker.Docker) *Auth {
 | 
					func NewAuth(docker *docker.Docker, userList types.Users, oauthWhitelist []string, sessionExpiry int) *Auth {
 | 
				
			||||||
	return &Auth{
 | 
						return &Auth{
 | 
				
			||||||
		Config:        config,
 | 
					 | 
				
			||||||
		Docker:         docker,
 | 
							Docker:         docker,
 | 
				
			||||||
		LoginAttempts: make(map[string]*types.LoginAttempt),
 | 
							Users:          userList,
 | 
				
			||||||
 | 
							OAuthWhitelist: oauthWhitelist,
 | 
				
			||||||
 | 
							SessionExpiry:  sessionExpiry,
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
type Auth struct {
 | 
					type Auth struct {
 | 
				
			||||||
	Config        types.AuthConfig
 | 
						Users          types.Users
 | 
				
			||||||
	Docker         *docker.Docker
 | 
						Docker         *docker.Docker
 | 
				
			||||||
	LoginAttempts map[string]*types.LoginAttempt
 | 
						OAuthWhitelist []string
 | 
				
			||||||
	LoginMutex    sync.RWMutex
 | 
						SessionExpiry  int
 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (auth *Auth) GetSession(c *gin.Context) (*sessions.Session, error) {
 | 
					 | 
				
			||||||
	// Create cookie store
 | 
					 | 
				
			||||||
	store := sessions.NewCookieStore([]byte(auth.Config.Secret))
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Configure cookie store
 | 
					 | 
				
			||||||
	store.Options = &sessions.Options{
 | 
					 | 
				
			||||||
		Path:     "/",
 | 
					 | 
				
			||||||
		MaxAge:   auth.Config.SessionExpiry,
 | 
					 | 
				
			||||||
		Secure:   auth.Config.CookieSecure,
 | 
					 | 
				
			||||||
		HttpOnly: true,
 | 
					 | 
				
			||||||
		SameSite: http.SameSiteDefaultMode,
 | 
					 | 
				
			||||||
		Domain:   fmt.Sprintf(".%s", auth.Config.Domain),
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get session
 | 
					 | 
				
			||||||
	session, err := store.Get(c.Request, "tinyauth")
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to get session")
 | 
					 | 
				
			||||||
		return nil, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	return session, nil
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (auth *Auth) GetUser(username string) *types.User {
 | 
					func (auth *Auth) GetUser(username string) *types.User {
 | 
				
			||||||
	// Loop through users and return the user if the username matches
 | 
						// Loop through users and return the user if the username matches
 | 
				
			||||||
	for _, user := range auth.Config.Users {
 | 
						for _, user := range auth.Users {
 | 
				
			||||||
		if user.Username == username {
 | 
							if user.Username == username {
 | 
				
			||||||
			return &user
 | 
								return &user
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -71,78 +45,14 @@ func (auth *Auth) CheckPassword(user types.User, password string) bool {
 | 
				
			|||||||
	return bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) == nil
 | 
						return bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)) == nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// IsAccountLocked checks if a username or IP is locked due to too many failed login attempts
 | 
					 | 
				
			||||||
func (auth *Auth) IsAccountLocked(identifier string) (bool, int) {
 | 
					 | 
				
			||||||
	auth.LoginMutex.RLock()
 | 
					 | 
				
			||||||
	defer auth.LoginMutex.RUnlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Return false if rate limiting is not configured
 | 
					 | 
				
			||||||
	if auth.Config.LoginMaxRetries <= 0 || auth.Config.LoginTimeout <= 0 {
 | 
					 | 
				
			||||||
		return false, 0
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the identifier exists in the map
 | 
					 | 
				
			||||||
	attempt, exists := auth.LoginAttempts[identifier]
 | 
					 | 
				
			||||||
	if !exists {
 | 
					 | 
				
			||||||
		return false, 0
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If account is locked, check if lock time has expired
 | 
					 | 
				
			||||||
	if attempt.LockedUntil.After(time.Now()) {
 | 
					 | 
				
			||||||
		// Calculate remaining lockout time in seconds
 | 
					 | 
				
			||||||
		remaining := int(time.Until(attempt.LockedUntil).Seconds())
 | 
					 | 
				
			||||||
		return true, remaining
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Lock has expired
 | 
					 | 
				
			||||||
	return false, 0
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// RecordLoginAttempt records a login attempt for rate limiting
 | 
					 | 
				
			||||||
func (auth *Auth) RecordLoginAttempt(identifier string, success bool) {
 | 
					 | 
				
			||||||
	// Skip if rate limiting is not configured
 | 
					 | 
				
			||||||
	if auth.Config.LoginMaxRetries <= 0 || auth.Config.LoginTimeout <= 0 {
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	auth.LoginMutex.Lock()
 | 
					 | 
				
			||||||
	defer auth.LoginMutex.Unlock()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get current attempt record or create a new one
 | 
					 | 
				
			||||||
	attempt, exists := auth.LoginAttempts[identifier]
 | 
					 | 
				
			||||||
	if !exists {
 | 
					 | 
				
			||||||
		attempt = &types.LoginAttempt{}
 | 
					 | 
				
			||||||
		auth.LoginAttempts[identifier] = attempt
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Update last attempt time
 | 
					 | 
				
			||||||
	attempt.LastAttempt = time.Now()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If successful login, reset failed attempts
 | 
					 | 
				
			||||||
	if success {
 | 
					 | 
				
			||||||
		attempt.FailedAttempts = 0
 | 
					 | 
				
			||||||
		attempt.LockedUntil = time.Time{} // Reset lock time
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Increment failed attempts
 | 
					 | 
				
			||||||
	attempt.FailedAttempts++
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If max retries reached, lock the account
 | 
					 | 
				
			||||||
	if attempt.FailedAttempts >= auth.Config.LoginMaxRetries {
 | 
					 | 
				
			||||||
		attempt.LockedUntil = time.Now().Add(time.Duration(auth.Config.LoginTimeout) * time.Second)
 | 
					 | 
				
			||||||
		log.Warn().Str("identifier", identifier).Int("timeout", auth.Config.LoginTimeout).Msg("Account locked due to too many failed login attempts")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
 | 
					func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
 | 
				
			||||||
	// If the whitelist is empty, allow all emails
 | 
						// If the whitelist is empty, allow all emails
 | 
				
			||||||
	if len(auth.Config.OauthWhitelist) == 0 {
 | 
						if len(auth.OAuthWhitelist) == 0 {
 | 
				
			||||||
		return true
 | 
							return true
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Loop through the whitelist and return true if the email matches
 | 
						// Loop through the whitelist and return true if the email matches
 | 
				
			||||||
	for _, email := range auth.Config.OauthWhitelist {
 | 
						for _, email := range auth.OAuthWhitelist {
 | 
				
			||||||
		if email == emailSrc {
 | 
							if email == emailSrc {
 | 
				
			||||||
			return true
 | 
								return true
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -152,15 +62,11 @@ func (auth *Auth) EmailWhitelisted(emailSrc string) bool {
 | 
				
			|||||||
	return false
 | 
						return false
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie) error {
 | 
					func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie) {
 | 
				
			||||||
	log.Debug().Msg("Creating session cookie")
 | 
						log.Debug().Msg("Creating session cookie")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Get session
 | 
						// Get session
 | 
				
			||||||
	session, err := auth.GetSession(c)
 | 
						sessions := sessions.Default(c)
 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to get session")
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Setting session cookie")
 | 
						log.Debug().Msg("Setting session cookie")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -170,73 +76,54 @@ func (auth *Auth) CreateSessionCookie(c *gin.Context, data *types.SessionCookie)
 | 
				
			|||||||
	if data.TotpPending {
 | 
						if data.TotpPending {
 | 
				
			||||||
		sessionExpiry = 3600
 | 
							sessionExpiry = 3600
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		sessionExpiry = auth.Config.SessionExpiry
 | 
							sessionExpiry = auth.SessionExpiry
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Set data
 | 
						// Set data
 | 
				
			||||||
	session.Values["username"] = data.Username
 | 
						sessions.Set("username", data.Username)
 | 
				
			||||||
	session.Values["provider"] = data.Provider
 | 
						sessions.Set("provider", data.Provider)
 | 
				
			||||||
	session.Values["expiry"] = time.Now().Add(time.Duration(sessionExpiry) * time.Second).Unix()
 | 
						sessions.Set("expiry", time.Now().Add(time.Duration(sessionExpiry)*time.Second).Unix())
 | 
				
			||||||
	session.Values["totpPending"] = data.TotpPending
 | 
						sessions.Set("totpPending", data.TotpPending)
 | 
				
			||||||
	session.Values["redirectURI"] = data.RedirectURI
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Save session
 | 
						// Save session
 | 
				
			||||||
	err = session.Save(c.Request, c.Writer)
 | 
						sessions.Save()
 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to save session")
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Return nil
 | 
					func (auth *Auth) DeleteSessionCookie(c *gin.Context) {
 | 
				
			||||||
	return nil
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (auth *Auth) DeleteSessionCookie(c *gin.Context) error {
 | 
					 | 
				
			||||||
	log.Debug().Msg("Deleting session cookie")
 | 
						log.Debug().Msg("Deleting session cookie")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Get session
 | 
						// Get session
 | 
				
			||||||
	session, err := auth.GetSession(c)
 | 
						sessions := sessions.Default(c)
 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to get session")
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Delete all values in the session
 | 
						// Clear session
 | 
				
			||||||
	for key := range session.Values {
 | 
						sessions.Clear()
 | 
				
			||||||
		delete(session.Values, key)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Save session
 | 
						// Save session
 | 
				
			||||||
	err = session.Save(c.Request, c.Writer)
 | 
						sessions.Save()
 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to save session")
 | 
					 | 
				
			||||||
		return err
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Return nil
 | 
					func (auth *Auth) GetSessionCookie(c *gin.Context) types.SessionCookie {
 | 
				
			||||||
	return nil
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error) {
 | 
					 | 
				
			||||||
	log.Debug().Msg("Getting session cookie")
 | 
						log.Debug().Msg("Getting session cookie")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Get session
 | 
						// Get session
 | 
				
			||||||
	session, err := auth.GetSession(c)
 | 
						sessions := sessions.Default(c)
 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to get session")
 | 
					 | 
				
			||||||
		return types.SessionCookie{}, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Get data from session
 | 
						// Get data
 | 
				
			||||||
	username, usernameOk := session.Values["username"].(string)
 | 
						cookieUsername := sessions.Get("username")
 | 
				
			||||||
	provider, providerOK := session.Values["provider"].(string)
 | 
						cookieProvider := sessions.Get("provider")
 | 
				
			||||||
	redirectURI, redirectOK := session.Values["redirectURI"].(string)
 | 
						cookieExpiry := sessions.Get("expiry")
 | 
				
			||||||
	expiry, expiryOk := session.Values["expiry"].(int64)
 | 
						cookieTotpPending := sessions.Get("totpPending")
 | 
				
			||||||
	totpPending, totpPendingOk := session.Values["totpPending"].(bool)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if !usernameOk || !providerOK || !expiryOk || !redirectOK || !totpPendingOk {
 | 
						// Convert interfaces to correct types
 | 
				
			||||||
		log.Warn().Msg("Session cookie is missing data")
 | 
						username, usernameOk := cookieUsername.(string)
 | 
				
			||||||
		return types.SessionCookie{}, nil
 | 
						provider, providerOk := cookieProvider.(string)
 | 
				
			||||||
 | 
						expiry, expiryOk := cookieExpiry.(int64)
 | 
				
			||||||
 | 
						totpPending, totpPendingOk := cookieTotpPending.(bool)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Check if the cookie is invalid
 | 
				
			||||||
 | 
						if !usernameOk || !providerOk || !expiryOk || !totpPendingOk {
 | 
				
			||||||
 | 
							log.Warn().Msg("Session cookie invalid")
 | 
				
			||||||
 | 
							return types.SessionCookie{}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if the cookie has expired
 | 
						// Check if the cookie has expired
 | 
				
			||||||
@@ -247,7 +134,7 @@ func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error)
 | 
				
			|||||||
		auth.DeleteSessionCookie(c)
 | 
							auth.DeleteSessionCookie(c)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Return empty cookie
 | 
							// Return empty cookie
 | 
				
			||||||
		return types.SessionCookie{}, nil
 | 
							return types.SessionCookie{}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Str("username", username).Str("provider", provider).Int64("expiry", expiry).Bool("totpPending", totpPending).Msg("Parsed cookie")
 | 
						log.Debug().Str("username", username).Str("provider", provider).Int64("expiry", expiry).Bool("totpPending", totpPending).Msg("Parsed cookie")
 | 
				
			||||||
@@ -257,13 +144,12 @@ func (auth *Auth) GetSessionCookie(c *gin.Context) (types.SessionCookie, error)
 | 
				
			|||||||
		Username:    username,
 | 
							Username:    username,
 | 
				
			||||||
		Provider:    provider,
 | 
							Provider:    provider,
 | 
				
			||||||
		TotpPending: totpPending,
 | 
							TotpPending: totpPending,
 | 
				
			||||||
		RedirectURI: redirectURI,
 | 
						}
 | 
				
			||||||
	}, nil
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (auth *Auth) UserAuthConfigured() bool {
 | 
					func (auth *Auth) UserAuthConfigured() bool {
 | 
				
			||||||
	// If there are users, return true
 | 
						// If there are users, return true
 | 
				
			||||||
	return len(auth.Config.Users) > 0
 | 
						return len(auth.Users) > 0
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bool, error) {
 | 
					func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bool, error) {
 | 
				
			||||||
@@ -273,15 +159,9 @@ func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bo
 | 
				
			|||||||
	// Get app id
 | 
						// Get app id
 | 
				
			||||||
	appId := strings.Split(host, ".")[0]
 | 
						appId := strings.Split(host, ".")[0]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Get the container labels
 | 
						// Check if resource is allowed
 | 
				
			||||||
	labels, err := auth.Docker.GetLabels(appId)
 | 
						allowed, allowedErr := auth.Docker.ContainerAction(appId, func(labels types.TinyauthLabels) (bool, error) {
 | 
				
			||||||
 | 
							// If the container has an oauth whitelist, check if the user is in it
 | 
				
			||||||
	// If there is an error, return false
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return false, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if oauth is allowed
 | 
					 | 
				
			||||||
		if context.OAuth {
 | 
							if context.OAuth {
 | 
				
			||||||
			if len(labels.OAuthWhitelist) == 0 {
 | 
								if len(labels.OAuthWhitelist) == 0 {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
@@ -290,18 +170,30 @@ func (auth *Auth) ResourceAllowed(c *gin.Context, context types.UserContext) (bo
 | 
				
			|||||||
			if slices.Contains(labels.OAuthWhitelist, context.Username) {
 | 
								if slices.Contains(labels.OAuthWhitelist, context.Username) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if user is allowed
 | 
							// If the container has users, check if the user is in it
 | 
				
			||||||
		if len(labels.Users) != 0 {
 | 
							if len(labels.Users) != 0 {
 | 
				
			||||||
			log.Debug().Msg("Checking users")
 | 
								log.Debug().Msg("Checking users")
 | 
				
			||||||
			if slices.Contains(labels.Users, context.Username) {
 | 
								if slices.Contains(labels.Users, context.Username) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Not allowed
 | 
							// Allowed
 | 
				
			||||||
	return false, nil
 | 
							return true, nil
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// If there is an error, return false
 | 
				
			||||||
 | 
						if allowedErr != nil {
 | 
				
			||||||
 | 
							log.Error().Err(allowedErr).Msg("Error checking if resource is allowed")
 | 
				
			||||||
 | 
							return false, allowedErr
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Return if the resource is allowed
 | 
				
			||||||
 | 
						return allowed, nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
 | 
					func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
 | 
				
			||||||
@@ -312,14 +204,8 @@ func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
 | 
				
			|||||||
	// Get app id
 | 
						// Get app id
 | 
				
			||||||
	appId := strings.Split(host, ".")[0]
 | 
						appId := strings.Split(host, ".")[0]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Get the container labels
 | 
						// Check if auth is enabled
 | 
				
			||||||
	labels, err := auth.Docker.GetLabels(appId)
 | 
						enabled, enabledErr := auth.Docker.ContainerAction(appId, func(labels types.TinyauthLabels) (bool, error) {
 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If there is an error, auth enabled
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		return true, err
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Check if the allowed label is empty
 | 
							// Check if the allowed label is empty
 | 
				
			||||||
		if labels.Allowed == "" {
 | 
							if labels.Allowed == "" {
 | 
				
			||||||
			// Auth enabled
 | 
								// Auth enabled
 | 
				
			||||||
@@ -327,12 +213,12 @@ func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Compile regex
 | 
							// Compile regex
 | 
				
			||||||
	regex, err := regexp.Compile(labels.Allowed)
 | 
							regex, regexErr := regexp.Compile(labels.Allowed)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// If there is an error, invalid regex, auth enabled
 | 
							// If there is an error, invalid regex, auth enabled
 | 
				
			||||||
	if err != nil {
 | 
							if regexErr != nil {
 | 
				
			||||||
		log.Warn().Err(err).Msg("Invalid regex")
 | 
								log.Warn().Err(regexErr).Msg("Invalid regex")
 | 
				
			||||||
		return true, err
 | 
								return true, regexErr
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check if the uri matches the regex
 | 
							// Check if the uri matches the regex
 | 
				
			||||||
@@ -343,6 +229,15 @@ func (auth *Auth) AuthEnabled(c *gin.Context) (bool, error) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		// Auth enabled
 | 
							// Auth enabled
 | 
				
			||||||
		return true, nil
 | 
							return true, nil
 | 
				
			||||||
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// If there is an error, auth enabled
 | 
				
			||||||
 | 
						if enabledErr != nil {
 | 
				
			||||||
 | 
							log.Error().Err(enabledErr).Msg("Error checking if auth is enabled")
 | 
				
			||||||
 | 
							return true, enabledErr
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return enabled, nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (auth *Auth) GetBasicAuth(c *gin.Context) *types.User {
 | 
					func (auth *Auth) GetBasicAuth(c *gin.Context) *types.User {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,147 +0,0 @@
 | 
				
			|||||||
package auth_test
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
import (
 | 
					 | 
				
			||||||
	"testing"
 | 
					 | 
				
			||||||
	"time"
 | 
					 | 
				
			||||||
	"tinyauth/internal/auth"
 | 
					 | 
				
			||||||
	"tinyauth/internal/docker"
 | 
					 | 
				
			||||||
	"tinyauth/internal/types"
 | 
					 | 
				
			||||||
)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
var config = types.AuthConfig{
 | 
					 | 
				
			||||||
	Users:          types.Users{},
 | 
					 | 
				
			||||||
	OauthWhitelist: []string{},
 | 
					 | 
				
			||||||
	SessionExpiry:  3600,
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func TestLoginRateLimiting(t *testing.T) {
 | 
					 | 
				
			||||||
	// Initialize a new auth service with 3 max retries and 5 seconds timeout
 | 
					 | 
				
			||||||
	config.LoginMaxRetries = 3
 | 
					 | 
				
			||||||
	config.LoginTimeout = 5
 | 
					 | 
				
			||||||
	authService := auth.NewAuth(config, &docker.Docker{})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test identifier
 | 
					 | 
				
			||||||
	identifier := "test_user"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test successful login - should not lock account
 | 
					 | 
				
			||||||
	t.Log("Testing successful login")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifier, true)
 | 
					 | 
				
			||||||
	locked, _ := authService.IsAccountLocked(identifier)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if locked {
 | 
					 | 
				
			||||||
		t.Fatalf("Account should not be locked after successful login")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test 2 failed attempts - should not lock account yet
 | 
					 | 
				
			||||||
	t.Log("Testing 2 failed login attempts")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifier, false)
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifier, false)
 | 
					 | 
				
			||||||
	locked, _ = authService.IsAccountLocked(identifier)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if locked {
 | 
					 | 
				
			||||||
		t.Fatalf("Account should not be locked after only 2 failed attempts")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add one more failed attempt (total 3) - should lock account with maxRetries=3
 | 
					 | 
				
			||||||
	t.Log("Testing 3 failed login attempts")
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifier, false)
 | 
					 | 
				
			||||||
	locked, remainingTime := authService.IsAccountLocked(identifier)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if !locked {
 | 
					 | 
				
			||||||
		t.Fatalf("Account should be locked after reaching max retries")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	if remainingTime <= 0 || remainingTime > 5 {
 | 
					 | 
				
			||||||
		t.Fatalf("Expected remaining time between 1-5 seconds, got %d", remainingTime)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test reset after waiting for timeout - use 1 second timeout for fast testing
 | 
					 | 
				
			||||||
	t.Log("Testing unlocking after timeout")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Reinitialize auth service with a shorter timeout for testing
 | 
					 | 
				
			||||||
	config.LoginTimeout = 1
 | 
					 | 
				
			||||||
	config.LoginMaxRetries = 3
 | 
					 | 
				
			||||||
	authService = auth.NewAuth(config, &docker.Docker{})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add enough failed attempts to lock the account
 | 
					 | 
				
			||||||
	for i := 0; i < 3; i++ {
 | 
					 | 
				
			||||||
		authService.RecordLoginAttempt(identifier, false)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Verify it's locked
 | 
					 | 
				
			||||||
	locked, _ = authService.IsAccountLocked(identifier)
 | 
					 | 
				
			||||||
	if !locked {
 | 
					 | 
				
			||||||
		t.Fatalf("Account should be locked initially")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Wait a bit and verify it gets unlocked after timeout
 | 
					 | 
				
			||||||
	time.Sleep(1500 * time.Millisecond) // Wait longer than the timeout
 | 
					 | 
				
			||||||
	locked, _ = authService.IsAccountLocked(identifier)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if locked {
 | 
					 | 
				
			||||||
		t.Fatalf("Account should be unlocked after timeout period")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test disabled rate limiting
 | 
					 | 
				
			||||||
	t.Log("Testing disabled rate limiting")
 | 
					 | 
				
			||||||
	config.LoginMaxRetries = 0
 | 
					 | 
				
			||||||
	config.LoginTimeout = 0
 | 
					 | 
				
			||||||
	authService = auth.NewAuth(config, &docker.Docker{})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	for i := 0; i < 10; i++ {
 | 
					 | 
				
			||||||
		authService.RecordLoginAttempt(identifier, false)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	locked, _ = authService.IsAccountLocked(identifier)
 | 
					 | 
				
			||||||
	if locked {
 | 
					 | 
				
			||||||
		t.Fatalf("Account should not be locked when rate limiting is disabled")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func TestConcurrentLoginAttempts(t *testing.T) {
 | 
					 | 
				
			||||||
	// Initialize a new auth service with 2 max retries and 5 seconds timeout
 | 
					 | 
				
			||||||
	config.LoginMaxRetries = 2
 | 
					 | 
				
			||||||
	config.LoginTimeout = 5
 | 
					 | 
				
			||||||
	authService := auth.NewAuth(config, &docker.Docker{})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test multiple identifiers
 | 
					 | 
				
			||||||
	identifiers := []string{"user1", "user2", "user3"}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test that locking one identifier doesn't affect others
 | 
					 | 
				
			||||||
	t.Log("Testing multiple identifiers")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Add enough failed attempts to lock first user (2 attempts with maxRetries=2)
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifiers[0], false)
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifiers[0], false)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if first user is locked
 | 
					 | 
				
			||||||
	locked, _ := authService.IsAccountLocked(identifiers[0])
 | 
					 | 
				
			||||||
	if !locked {
 | 
					 | 
				
			||||||
		t.Fatalf("User1 should be locked after reaching max retries")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check that other users are not affected
 | 
					 | 
				
			||||||
	for i := 1; i < len(identifiers); i++ {
 | 
					 | 
				
			||||||
		locked, _ := authService.IsAccountLocked(identifiers[i])
 | 
					 | 
				
			||||||
		if locked {
 | 
					 | 
				
			||||||
			t.Fatalf("User%d should not be locked", i+1)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Test successful login after failed attempts (but before lock)
 | 
					 | 
				
			||||||
	t.Log("Testing successful login after failed attempts but before lock")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// One failed attempt for user2
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifiers[1], false)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Successful login should reset the counter
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifiers[1], true)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Now try a failed login again - should not be locked as counter was reset
 | 
					 | 
				
			||||||
	authService.RecordLoginAttempt(identifiers[1], false)
 | 
					 | 
				
			||||||
	locked, _ = authService.IsAccountLocked(identifiers[1])
 | 
					 | 
				
			||||||
	if locked {
 | 
					 | 
				
			||||||
		t.Fatalf("User2 should not be locked after successful login reset")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -5,5 +5,4 @@ var TinyauthLabels = []string{
 | 
				
			|||||||
	"tinyauth.oauth.whitelist",
 | 
						"tinyauth.oauth.whitelist",
 | 
				
			||||||
	"tinyauth.users",
 | 
						"tinyauth.users",
 | 
				
			||||||
	"tinyauth.allowed",
 | 
						"tinyauth.allowed",
 | 
				
			||||||
	"tinyauth.headers",
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,7 +3,7 @@ package docker
 | 
				
			|||||||
import (
 | 
					import (
 | 
				
			||||||
	"context"
 | 
						"context"
 | 
				
			||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
	"tinyauth/internal/types"
 | 
						appTypes "tinyauth/internal/types"
 | 
				
			||||||
	"tinyauth/internal/utils"
 | 
						"tinyauth/internal/utils"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apiTypes "github.com/docker/docker/api/types"
 | 
						apiTypes "github.com/docker/docker/api/types"
 | 
				
			||||||
@@ -23,7 +23,7 @@ type Docker struct {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func (docker *Docker) Init() error {
 | 
					func (docker *Docker) Init() error {
 | 
				
			||||||
	// Create a new docker client
 | 
						// Create a new docker client
 | 
				
			||||||
	client, err := client.NewClientWithOpts(client.FromEnv)
 | 
						apiClient, err := client.NewClientWithOpts(client.FromEnv)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
@@ -32,7 +32,7 @@ func (docker *Docker) Init() error {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	// Set the context and api client
 | 
						// Set the context and api client
 | 
				
			||||||
	docker.Context = context.Background()
 | 
						docker.Context = context.Background()
 | 
				
			||||||
	docker.Client = client
 | 
						docker.Client = apiClient
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Done
 | 
						// Done
 | 
				
			||||||
	return nil
 | 
						return nil
 | 
				
			||||||
@@ -70,22 +70,22 @@ func (docker *Docker) DockerConnected() bool {
 | 
				
			|||||||
	return err == nil
 | 
						return err == nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
 | 
					func (docker *Docker) ContainerAction(appId string, runCheck func(labels appTypes.TinyauthLabels) (bool, error)) (bool, error) {
 | 
				
			||||||
	// Check if we have access to the Docker API
 | 
						// Check if we have access to the Docker API
 | 
				
			||||||
	isConnected := docker.DockerConnected()
 | 
						isConnected := docker.DockerConnected()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// If we don't have access, return an empty struct
 | 
						// If we don't have access, it is assumed that the check passed
 | 
				
			||||||
	if !isConnected {
 | 
						if !isConnected {
 | 
				
			||||||
		log.Debug().Msg("Docker not connected, returning empty labels")
 | 
							log.Debug().Msg("Docker not connected, passing check")
 | 
				
			||||||
		return types.TinyauthLabels{}, nil
 | 
							return true, nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Get the containers
 | 
						// Get the containers
 | 
				
			||||||
	containers, err := docker.GetContainers()
 | 
						containers, containersErr := docker.GetContainers()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// If there is an error, return false
 | 
						// If there is an error, return false
 | 
				
			||||||
	if err != nil {
 | 
						if containersErr != nil {
 | 
				
			||||||
		return types.TinyauthLabels{}, err
 | 
							return false, containersErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Got containers")
 | 
						log.Debug().Msg("Got containers")
 | 
				
			||||||
@@ -93,15 +93,15 @@ func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
 | 
				
			|||||||
	// Loop through the containers
 | 
						// Loop through the containers
 | 
				
			||||||
	for _, container := range containers {
 | 
						for _, container := range containers {
 | 
				
			||||||
		// Inspect the container
 | 
							// Inspect the container
 | 
				
			||||||
		inspect, err := docker.InspectContainer(container.ID)
 | 
							inspect, inspectErr := docker.InspectContainer(container.ID)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// If there is an error, return false
 | 
							// If there is an error, return false
 | 
				
			||||||
		if err != nil {
 | 
							if inspectErr != nil {
 | 
				
			||||||
			return types.TinyauthLabels{}, err
 | 
								return false, inspectErr
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Get the container name (for some reason it is /name)
 | 
							// Get the container name (for some reason it is /name)
 | 
				
			||||||
		containerName := strings.TrimPrefix(inspect.Name, "/")
 | 
							containerName := strings.Split(inspect.Name, "/")[1]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// There is a container with the same name as the app ID
 | 
							// There is a container with the same name as the app ID
 | 
				
			||||||
		if containerName == appId {
 | 
							if containerName == appId {
 | 
				
			||||||
@@ -112,14 +112,14 @@ func (docker *Docker) GetLabels(appId string) (types.TinyauthLabels, error) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
			log.Debug().Msg("Got labels")
 | 
								log.Debug().Msg("Got labels")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Return labels
 | 
								// Run the check
 | 
				
			||||||
			return labels, nil
 | 
								return runCheck(labels)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("No matching container found, returning empty labels")
 | 
						log.Debug().Msg("No matching container found, passing check")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// If no matching container is found, return empty labels
 | 
						// If no matching container is found, pass check
 | 
				
			||||||
	return types.TinyauthLabels{}, nil
 | 
						return true, nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,692 +0,0 @@
 | 
				
			|||||||
package handlers
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
import (
 | 
					 | 
				
			||||||
	"fmt"
 | 
					 | 
				
			||||||
	"math/rand/v2"
 | 
					 | 
				
			||||||
	"net/http"
 | 
					 | 
				
			||||||
	"strings"
 | 
					 | 
				
			||||||
	"tinyauth/internal/auth"
 | 
					 | 
				
			||||||
	"tinyauth/internal/docker"
 | 
					 | 
				
			||||||
	"tinyauth/internal/hooks"
 | 
					 | 
				
			||||||
	"tinyauth/internal/providers"
 | 
					 | 
				
			||||||
	"tinyauth/internal/types"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	"github.com/gin-gonic/gin"
 | 
					 | 
				
			||||||
	"github.com/google/go-querystring/query"
 | 
					 | 
				
			||||||
	"github.com/pquerna/otp/totp"
 | 
					 | 
				
			||||||
	"github.com/rs/zerolog/log"
 | 
					 | 
				
			||||||
)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func NewHandlers(config types.HandlersConfig, auth *auth.Auth, hooks *hooks.Hooks, providers *providers.Providers, docker *docker.Docker) *Handlers {
 | 
					 | 
				
			||||||
	return &Handlers{
 | 
					 | 
				
			||||||
		Config:    config,
 | 
					 | 
				
			||||||
		Auth:      auth,
 | 
					 | 
				
			||||||
		Hooks:     hooks,
 | 
					 | 
				
			||||||
		Providers: providers,
 | 
					 | 
				
			||||||
		Docker:    docker,
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
type Handlers struct {
 | 
					 | 
				
			||||||
	Config    types.HandlersConfig
 | 
					 | 
				
			||||||
	Auth      *auth.Auth
 | 
					 | 
				
			||||||
	Hooks     *hooks.Hooks
 | 
					 | 
				
			||||||
	Providers *providers.Providers
 | 
					 | 
				
			||||||
	Docker    *docker.Docker
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) AuthHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	// Create struct for proxy
 | 
					 | 
				
			||||||
	var proxy types.Proxy
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Bind URI
 | 
					 | 
				
			||||||
	err := c.BindUri(&proxy)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to bind URI")
 | 
					 | 
				
			||||||
		c.JSON(400, gin.H{
 | 
					 | 
				
			||||||
			"status":  400,
 | 
					 | 
				
			||||||
			"message": "Bad Request",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the request is coming from a browser (tools like curl/bruno use */* and they don't include the text/html)
 | 
					 | 
				
			||||||
	isBrowser := strings.Contains(c.Request.Header.Get("Accept"), "text/html")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if isBrowser {
 | 
					 | 
				
			||||||
		log.Debug().Msg("Request is most likely coming from a browser")
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		log.Debug().Msg("Request is most likely not coming from a browser")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Interface("proxy", proxy.Proxy).Msg("Got proxy")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get headers
 | 
					 | 
				
			||||||
	uri := c.Request.Header.Get("X-Forwarded-Uri")
 | 
					 | 
				
			||||||
	proto := c.Request.Header.Get("X-Forwarded-Proto")
 | 
					 | 
				
			||||||
	host := c.Request.Header.Get("X-Forwarded-Host")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if auth is enabled
 | 
					 | 
				
			||||||
	authEnabled, err := h.Auth.AuthEnabled(c)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if there was an error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to check if app is allowed")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if proxy.Proxy == "nginx" || !isBrowser {
 | 
					 | 
				
			||||||
			c.JSON(500, gin.H{
 | 
					 | 
				
			||||||
				"status":  500,
 | 
					 | 
				
			||||||
				"message": "Internal Server Error",
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			return
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get the app id
 | 
					 | 
				
			||||||
	appId := strings.Split(host, ".")[0]
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get the container labels
 | 
					 | 
				
			||||||
	labels, err := h.Docker.GetLabels(appId)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if there was an error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to check if app is allowed")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if proxy.Proxy == "nginx" || !isBrowser {
 | 
					 | 
				
			||||||
			c.JSON(500, gin.H{
 | 
					 | 
				
			||||||
				"status":  500,
 | 
					 | 
				
			||||||
				"message": "Internal Server Error",
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			return
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If auth is not enabled, return 200
 | 
					 | 
				
			||||||
	if !authEnabled {
 | 
					 | 
				
			||||||
		for key, value := range labels.Headers {
 | 
					 | 
				
			||||||
			log.Debug().Str("key", key).Str("value", value).Msg("Setting header")
 | 
					 | 
				
			||||||
			c.Header(key, value)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
			"status":  200,
 | 
					 | 
				
			||||||
			"message": "Authenticated",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get user context
 | 
					 | 
				
			||||||
	userContext := h.Hooks.UseUserContext(c)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if user is logged in
 | 
					 | 
				
			||||||
	if userContext.IsLoggedIn {
 | 
					 | 
				
			||||||
		log.Debug().Msg("Authenticated")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Check if user is allowed to access subdomain, if request is nginx.example.com the subdomain (resource) is nginx
 | 
					 | 
				
			||||||
		appAllowed, err := h.Auth.ResourceAllowed(c, userContext)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Check if there was an error
 | 
					 | 
				
			||||||
		if err != nil {
 | 
					 | 
				
			||||||
			log.Error().Err(err).Msg("Failed to check if app is allowed")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			if proxy.Proxy == "nginx" || !isBrowser {
 | 
					 | 
				
			||||||
				c.JSON(500, gin.H{
 | 
					 | 
				
			||||||
					"status":  500,
 | 
					 | 
				
			||||||
					"message": "Internal Server Error",
 | 
					 | 
				
			||||||
				})
 | 
					 | 
				
			||||||
				return
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
			return
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		log.Debug().Bool("appAllowed", appAllowed).Msg("Checking if app is allowed")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// The user is not allowed to access the app
 | 
					 | 
				
			||||||
		if !appAllowed {
 | 
					 | 
				
			||||||
			log.Warn().Str("username", userContext.Username).Str("host", host).Msg("User not allowed")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// Set WWW-Authenticate header
 | 
					 | 
				
			||||||
			c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			if proxy.Proxy == "nginx" || !isBrowser {
 | 
					 | 
				
			||||||
				c.JSON(401, gin.H{
 | 
					 | 
				
			||||||
					"status":  401,
 | 
					 | 
				
			||||||
					"message": "Unauthorized",
 | 
					 | 
				
			||||||
				})
 | 
					 | 
				
			||||||
				return
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// Build query
 | 
					 | 
				
			||||||
			queries, err := query.Values(types.UnauthorizedQuery{
 | 
					 | 
				
			||||||
				Username: userContext.Username,
 | 
					 | 
				
			||||||
				Resource: strings.Split(host, ".")[0],
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// Handle error (no need to check for nginx/headers since we are sure we are using caddy/traefik)
 | 
					 | 
				
			||||||
			if err != nil {
 | 
					 | 
				
			||||||
				log.Error().Err(err).Msg("Failed to build queries")
 | 
					 | 
				
			||||||
				c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
				return
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
			// We are using caddy/traefik so redirect
 | 
					 | 
				
			||||||
			c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/unauthorized?%s", h.Config.AppURL, queries.Encode()))
 | 
					 | 
				
			||||||
			return
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Set the user header
 | 
					 | 
				
			||||||
		c.Header("Remote-User", userContext.Username)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Set the rest of the headers
 | 
					 | 
				
			||||||
		for key, value := range labels.Headers {
 | 
					 | 
				
			||||||
			log.Debug().Str("key", key).Str("value", value).Msg("Setting header")
 | 
					 | 
				
			||||||
			c.Header(key, value)
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// The user is allowed to access the app
 | 
					 | 
				
			||||||
		c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
			"status":  200,
 | 
					 | 
				
			||||||
			"message": "Authenticated",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// The user is not logged in
 | 
					 | 
				
			||||||
	log.Debug().Msg("Unauthorized")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Set www-authenticate header
 | 
					 | 
				
			||||||
	c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if proxy.Proxy == "nginx" || !isBrowser {
 | 
					 | 
				
			||||||
		c.JSON(401, gin.H{
 | 
					 | 
				
			||||||
			"status":  401,
 | 
					 | 
				
			||||||
			"message": "Unauthorized",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	queries, err := query.Values(types.LoginQuery{
 | 
					 | 
				
			||||||
		RedirectURI: fmt.Sprintf("%s://%s%s", proto, host, uri),
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to build queries")
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Interface("redirect_uri", fmt.Sprintf("%s://%s%s", proto, host, uri)).Msg("Redirecting to login")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Redirect to login
 | 
					 | 
				
			||||||
	c.Redirect(http.StatusTemporaryRedirect, fmt.Sprintf("%s/?%s", h.Config.AppURL, queries.Encode()))
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) LoginHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	// Create login struct
 | 
					 | 
				
			||||||
	var login types.LoginRequest
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Bind JSON
 | 
					 | 
				
			||||||
	err := c.BindJSON(&login)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to bind JSON")
 | 
					 | 
				
			||||||
		c.JSON(400, gin.H{
 | 
					 | 
				
			||||||
			"status":  400,
 | 
					 | 
				
			||||||
			"message": "Bad Request",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Got login request")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get client IP for rate limiting
 | 
					 | 
				
			||||||
	clientIP := c.ClientIP()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create an identifier for rate limiting (username or IP if username doesn't exist yet)
 | 
					 | 
				
			||||||
	rateIdentifier := login.Username
 | 
					 | 
				
			||||||
	if rateIdentifier == "" {
 | 
					 | 
				
			||||||
		rateIdentifier = clientIP
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if the account is locked due to too many failed attempts
 | 
					 | 
				
			||||||
	locked, remainingTime := h.Auth.IsAccountLocked(rateIdentifier)
 | 
					 | 
				
			||||||
	if locked {
 | 
					 | 
				
			||||||
		log.Warn().Str("identifier", rateIdentifier).Int("remaining_seconds", remainingTime).Msg("Account is locked due to too many failed login attempts")
 | 
					 | 
				
			||||||
		c.JSON(429, gin.H{
 | 
					 | 
				
			||||||
			"status":  429,
 | 
					 | 
				
			||||||
			"message": fmt.Sprintf("Too many failed login attempts. Try again in %d seconds", remainingTime),
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get user based on username
 | 
					 | 
				
			||||||
	user := h.Auth.GetUser(login.Username)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// User does not exist
 | 
					 | 
				
			||||||
	if user == nil {
 | 
					 | 
				
			||||||
		log.Debug().Str("username", login.Username).Msg("User not found")
 | 
					 | 
				
			||||||
		// Record failed login attempt
 | 
					 | 
				
			||||||
		h.Auth.RecordLoginAttempt(rateIdentifier, false)
 | 
					 | 
				
			||||||
		c.JSON(401, gin.H{
 | 
					 | 
				
			||||||
			"status":  401,
 | 
					 | 
				
			||||||
			"message": "Unauthorized",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Got user")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if password is correct
 | 
					 | 
				
			||||||
	if !h.Auth.CheckPassword(*user, login.Password) {
 | 
					 | 
				
			||||||
		log.Debug().Str("username", login.Username).Msg("Password incorrect")
 | 
					 | 
				
			||||||
		// Record failed login attempt
 | 
					 | 
				
			||||||
		h.Auth.RecordLoginAttempt(rateIdentifier, false)
 | 
					 | 
				
			||||||
		c.JSON(401, gin.H{
 | 
					 | 
				
			||||||
			"status":  401,
 | 
					 | 
				
			||||||
			"message": "Unauthorized",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Password correct, checking totp")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Record successful login attempt (will reset failed attempt counter)
 | 
					 | 
				
			||||||
	h.Auth.RecordLoginAttempt(rateIdentifier, true)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if user has totp enabled
 | 
					 | 
				
			||||||
	if user.TotpSecret != "" {
 | 
					 | 
				
			||||||
		log.Debug().Msg("Totp enabled")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Set totp pending cookie
 | 
					 | 
				
			||||||
		h.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
					 | 
				
			||||||
			Username:    login.Username,
 | 
					 | 
				
			||||||
			Provider:    "username",
 | 
					 | 
				
			||||||
			TotpPending: true,
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Return totp required
 | 
					 | 
				
			||||||
		c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
			"status":      200,
 | 
					 | 
				
			||||||
			"message":     "Waiting for totp",
 | 
					 | 
				
			||||||
			"totpPending": true,
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Stop further processing
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create session cookie with username as provider
 | 
					 | 
				
			||||||
	h.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
					 | 
				
			||||||
		Username: login.Username,
 | 
					 | 
				
			||||||
		Provider: "username",
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Return logged in
 | 
					 | 
				
			||||||
	c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
		"status":      200,
 | 
					 | 
				
			||||||
		"message":     "Logged in",
 | 
					 | 
				
			||||||
		"totpPending": false,
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) TotpHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	// Create totp struct
 | 
					 | 
				
			||||||
	var totpReq types.TotpRequest
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Bind JSON
 | 
					 | 
				
			||||||
	err := c.BindJSON(&totpReq)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to bind JSON")
 | 
					 | 
				
			||||||
		c.JSON(400, gin.H{
 | 
					 | 
				
			||||||
			"status":  400,
 | 
					 | 
				
			||||||
			"message": "Bad Request",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Checking totp")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get user context
 | 
					 | 
				
			||||||
	userContext := h.Hooks.UseUserContext(c)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if we have a user
 | 
					 | 
				
			||||||
	if userContext.Username == "" {
 | 
					 | 
				
			||||||
		log.Debug().Msg("No user context")
 | 
					 | 
				
			||||||
		c.JSON(401, gin.H{
 | 
					 | 
				
			||||||
			"status":  401,
 | 
					 | 
				
			||||||
			"message": "Unauthorized",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get user
 | 
					 | 
				
			||||||
	user := h.Auth.GetUser(userContext.Username)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if user exists
 | 
					 | 
				
			||||||
	if user == nil {
 | 
					 | 
				
			||||||
		log.Debug().Msg("User not found")
 | 
					 | 
				
			||||||
		c.JSON(401, gin.H{
 | 
					 | 
				
			||||||
			"status":  401,
 | 
					 | 
				
			||||||
			"message": "Unauthorized",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if totp is correct
 | 
					 | 
				
			||||||
	ok := totp.Validate(totpReq.Code, user.TotpSecret)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// TOTP is incorrect
 | 
					 | 
				
			||||||
	if !ok {
 | 
					 | 
				
			||||||
		log.Debug().Msg("Totp incorrect")
 | 
					 | 
				
			||||||
		c.JSON(401, gin.H{
 | 
					 | 
				
			||||||
			"status":  401,
 | 
					 | 
				
			||||||
			"message": "Unauthorized",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Totp correct")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create session cookie with username as provider
 | 
					 | 
				
			||||||
	h.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
					 | 
				
			||||||
		Username: user.Username,
 | 
					 | 
				
			||||||
		Provider: "username",
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Return logged in
 | 
					 | 
				
			||||||
	c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
		"status":  200,
 | 
					 | 
				
			||||||
		"message": "Logged in",
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) LogoutHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	log.Debug().Msg("Logging out")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Delete session cookie
 | 
					 | 
				
			||||||
	h.Auth.DeleteSessionCookie(c)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Cleaning up redirect cookie")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Return logged out
 | 
					 | 
				
			||||||
	c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
		"status":  200,
 | 
					 | 
				
			||||||
		"message": "Logged out",
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) AppHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	log.Debug().Msg("Getting app context")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get configured providers
 | 
					 | 
				
			||||||
	configuredProviders := h.Providers.GetConfiguredProviders()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// We have username/password configured so add it to our providers
 | 
					 | 
				
			||||||
	if h.Auth.UserAuthConfigured() {
 | 
					 | 
				
			||||||
		configuredProviders = append(configuredProviders, "username")
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create app context struct
 | 
					 | 
				
			||||||
	appContext := types.AppContext{
 | 
					 | 
				
			||||||
		Status:              200,
 | 
					 | 
				
			||||||
		Message:             "OK",
 | 
					 | 
				
			||||||
		ConfiguredProviders: configuredProviders,
 | 
					 | 
				
			||||||
		DisableContinue:     h.Config.DisableContinue,
 | 
					 | 
				
			||||||
		Title:               h.Config.Title,
 | 
					 | 
				
			||||||
		GenericName:         h.Config.GenericName,
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Return app context
 | 
					 | 
				
			||||||
	c.JSON(200, appContext)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) UserHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	log.Debug().Msg("Getting user context")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get user context
 | 
					 | 
				
			||||||
	userContext := h.Hooks.UseUserContext(c)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create user context response
 | 
					 | 
				
			||||||
	userContextResponse := types.UserContextResponse{
 | 
					 | 
				
			||||||
		Status:      200,
 | 
					 | 
				
			||||||
		IsLoggedIn:  userContext.IsLoggedIn,
 | 
					 | 
				
			||||||
		Username:    userContext.Username,
 | 
					 | 
				
			||||||
		Provider:    userContext.Provider,
 | 
					 | 
				
			||||||
		Oauth:       userContext.OAuth,
 | 
					 | 
				
			||||||
		TotpPending: userContext.TotpPending,
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If we are not logged in we set the status to 401 and add the WWW-Authenticate header else we set it to 200
 | 
					 | 
				
			||||||
	if !userContext.IsLoggedIn {
 | 
					 | 
				
			||||||
		log.Debug().Msg("Unauthorized")
 | 
					 | 
				
			||||||
		c.Header("WWW-Authenticate", "Basic realm=\"tinyauth\"")
 | 
					 | 
				
			||||||
		userContextResponse.Message = "Unauthorized"
 | 
					 | 
				
			||||||
	} else {
 | 
					 | 
				
			||||||
		log.Debug().Interface("userContext", userContext).Msg("Authenticated")
 | 
					 | 
				
			||||||
		userContextResponse.Message = "Authenticated"
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Return user context
 | 
					 | 
				
			||||||
	c.JSON(200, userContextResponse)
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) OauthUrlHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	// Create struct for OAuth request
 | 
					 | 
				
			||||||
	var request types.OAuthRequest
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Bind URI
 | 
					 | 
				
			||||||
	err := c.BindUri(&request)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to bind URI")
 | 
					 | 
				
			||||||
		c.JSON(400, gin.H{
 | 
					 | 
				
			||||||
			"status":  400,
 | 
					 | 
				
			||||||
			"message": "Bad Request",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Got OAuth request")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if provider exists
 | 
					 | 
				
			||||||
	provider := h.Providers.GetProvider(request.Provider)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Provider does not exist
 | 
					 | 
				
			||||||
	if provider == nil {
 | 
					 | 
				
			||||||
		c.JSON(404, gin.H{
 | 
					 | 
				
			||||||
			"status":  404,
 | 
					 | 
				
			||||||
			"message": "Not Found",
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Str("provider", request.Provider).Msg("Got provider")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get auth URL
 | 
					 | 
				
			||||||
	authURL := provider.GetAuthURL()
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Got auth URL")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get redirect URI
 | 
					 | 
				
			||||||
	redirectURI := c.Query("redirect_uri")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Set redirect cookie if redirect URI is provided
 | 
					 | 
				
			||||||
	if redirectURI != "" {
 | 
					 | 
				
			||||||
		log.Debug().Str("redirectURI", redirectURI).Msg("Setting redirect cookie")
 | 
					 | 
				
			||||||
		h.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
					 | 
				
			||||||
			RedirectURI: redirectURI,
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Tailscale does not have an auth url so we create a random code (does not need to be secure) to avoid caching and send it
 | 
					 | 
				
			||||||
	if request.Provider == "tailscale" {
 | 
					 | 
				
			||||||
		// Build tailscale query
 | 
					 | 
				
			||||||
		queries, err := query.Values(types.TailscaleQuery{
 | 
					 | 
				
			||||||
			Code: (1000 + rand.IntN(9000)),
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Handle error
 | 
					 | 
				
			||||||
		if err != nil {
 | 
					 | 
				
			||||||
			log.Error().Err(err).Msg("Failed to build queries")
 | 
					 | 
				
			||||||
			c.JSON(500, gin.H{
 | 
					 | 
				
			||||||
				"status":  500,
 | 
					 | 
				
			||||||
				"message": "Internal Server Error",
 | 
					 | 
				
			||||||
			})
 | 
					 | 
				
			||||||
			return
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Return tailscale URL (immidiately redirects to the callback)
 | 
					 | 
				
			||||||
		c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
			"status":  200,
 | 
					 | 
				
			||||||
			"message": "OK",
 | 
					 | 
				
			||||||
			"url":     fmt.Sprintf("%s/api/oauth/callback/tailscale?%s", h.Config.AppURL, queries.Encode()),
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Return auth URL
 | 
					 | 
				
			||||||
	c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
		"status":  200,
 | 
					 | 
				
			||||||
		"message": "OK",
 | 
					 | 
				
			||||||
		"url":     authURL,
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) OauthCallbackHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	// Create struct for OAuth request
 | 
					 | 
				
			||||||
	var providerName types.OAuthRequest
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Bind URI
 | 
					 | 
				
			||||||
	err := c.BindUri(&providerName)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to bind URI")
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Interface("provider", providerName.Provider).Msg("Got provider name")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get code
 | 
					 | 
				
			||||||
	code := c.Query("code")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Code empty so redirect to error
 | 
					 | 
				
			||||||
	if code == "" {
 | 
					 | 
				
			||||||
		log.Error().Msg("No code provided")
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Got code")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get provider
 | 
					 | 
				
			||||||
	provider := h.Providers.GetProvider(providerName.Provider)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Str("provider", providerName.Provider).Msg("Got provider")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Provider does not exist
 | 
					 | 
				
			||||||
	if provider == nil {
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, "/not-found")
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Exchange token (authenticates user)
 | 
					 | 
				
			||||||
	_, err = provider.ExchangeToken(code)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Got token")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Msg("Failed to exchange token")
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get email
 | 
					 | 
				
			||||||
	email, err := h.Providers.GetUser(providerName.Provider)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Str("email", email).Msg("Got email")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Msg("Failed to get email")
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Email is not whitelisted
 | 
					 | 
				
			||||||
	if !h.Auth.EmailWhitelisted(email) {
 | 
					 | 
				
			||||||
		log.Warn().Str("email", email).Msg("Email not whitelisted")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Build query
 | 
					 | 
				
			||||||
		queries, err := query.Values(types.UnauthorizedQuery{
 | 
					 | 
				
			||||||
			Username: email,
 | 
					 | 
				
			||||||
		})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Handle error
 | 
					 | 
				
			||||||
		if err != nil {
 | 
					 | 
				
			||||||
			log.Error().Msg("Failed to build queries")
 | 
					 | 
				
			||||||
			c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
			return
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		// Redirect to unauthorized
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/unauthorized?%s", h.Config.AppURL, queries.Encode()))
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Email whitelisted")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Get redirect URI
 | 
					 | 
				
			||||||
	cookie, err := h.Auth.GetSessionCookie(c)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Create session cookie (also cleans up redirect cookie)
 | 
					 | 
				
			||||||
	h.Auth.CreateSessionCookie(c, &types.SessionCookie{
 | 
					 | 
				
			||||||
		Username: email,
 | 
					 | 
				
			||||||
		Provider: providerName.Provider,
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// If it is empty it means that no redirect_uri was provided to the login screen so we just log in
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, h.Config.AppURL)
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Str("redirectURI", cookie.RedirectURI).Msg("Got redirect URI")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Build query
 | 
					 | 
				
			||||||
	queries, err := query.Values(types.LoginQuery{
 | 
					 | 
				
			||||||
		RedirectURI: cookie.RedirectURI,
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	log.Debug().Msg("Got redirect query")
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Handle error
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Msg("Failed to build queries")
 | 
					 | 
				
			||||||
		c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/error", h.Config.AppURL))
 | 
					 | 
				
			||||||
		return
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Redirect to continue with the redirect URI
 | 
					 | 
				
			||||||
	c.Redirect(http.StatusPermanentRedirect, fmt.Sprintf("%s/continue?%s", h.Config.AppURL, queries.Encode()))
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
func (h *Handlers) HealthcheckHandler(c *gin.Context) {
 | 
					 | 
				
			||||||
	c.JSON(200, gin.H{
 | 
					 | 
				
			||||||
		"status":  200,
 | 
					 | 
				
			||||||
		"message": "OK",
 | 
					 | 
				
			||||||
	})
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -23,7 +23,7 @@ type Hooks struct {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
 | 
					func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
 | 
				
			||||||
	// Get session cookie and basic auth
 | 
						// Get session cookie and basic auth
 | 
				
			||||||
	cookie, err := hooks.Auth.GetSessionCookie(c)
 | 
						cookie := hooks.Auth.GetSessionCookie(c)
 | 
				
			||||||
	basic := hooks.Auth.GetBasicAuth(c)
 | 
						basic := hooks.Auth.GetBasicAuth(c)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if basic auth is set
 | 
						// Check if basic auth is set
 | 
				
			||||||
@@ -46,19 +46,6 @@ func (hooks *Hooks) UseUserContext(c *gin.Context) types.UserContext {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check cookie error after basic auth
 | 
					 | 
				
			||||||
	if err != nil {
 | 
					 | 
				
			||||||
		log.Error().Err(err).Msg("Failed to get session cookie")
 | 
					 | 
				
			||||||
		// Return empty context
 | 
					 | 
				
			||||||
		return types.UserContext{
 | 
					 | 
				
			||||||
			Username:    "",
 | 
					 | 
				
			||||||
			IsLoggedIn:  false,
 | 
					 | 
				
			||||||
			OAuth:       false,
 | 
					 | 
				
			||||||
			Provider:    "",
 | 
					 | 
				
			||||||
			TotpPending: false,
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	// Check if session cookie has totp pending
 | 
						// Check if session cookie has totp pending
 | 
				
			||||||
	if cookie.TotpPending {
 | 
						if cookie.TotpPending {
 | 
				
			||||||
		log.Debug().Msg("Totp pending")
 | 
							log.Debug().Msg("Totp pending")
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -15,21 +15,21 @@ type GenericUserInfoResponse struct {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func GetGenericEmail(client *http.Client, url string) (string, error) {
 | 
					func GetGenericEmail(client *http.Client, url string) (string, error) {
 | 
				
			||||||
	// Using the oauth client get the user info url
 | 
						// Using the oauth client get the user info url
 | 
				
			||||||
	res, err := client.Get(url)
 | 
						res, resErr := client.Get(url)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if resErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", resErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Got response from generic provider")
 | 
						log.Debug().Msg("Got response from generic provider")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Read the body of the response
 | 
						// Read the body of the response
 | 
				
			||||||
	body, err := io.ReadAll(res.Body)
 | 
						body, bodyErr := io.ReadAll(res.Body)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if bodyErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", bodyErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Read body from generic provider")
 | 
						log.Debug().Msg("Read body from generic provider")
 | 
				
			||||||
@@ -38,11 +38,11 @@ func GetGenericEmail(client *http.Client, url string) (string, error) {
 | 
				
			|||||||
	var user GenericUserInfoResponse
 | 
						var user GenericUserInfoResponse
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Unmarshal the body into the user struct
 | 
						// Unmarshal the body into the user struct
 | 
				
			||||||
	err = json.Unmarshal(body, &user)
 | 
						jsonErr := json.Unmarshal(body, &user)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if jsonErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", jsonErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Parsed user from generic provider")
 | 
						log.Debug().Msg("Parsed user from generic provider")
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -22,21 +22,21 @@ func GithubScopes() []string {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func GetGithubEmail(client *http.Client) (string, error) {
 | 
					func GetGithubEmail(client *http.Client) (string, error) {
 | 
				
			||||||
	// Get the user emails from github using the oauth http client
 | 
						// Get the user emails from github using the oauth http client
 | 
				
			||||||
	res, err := client.Get("https://api.github.com/user/emails")
 | 
						res, resErr := client.Get("https://api.github.com/user/emails")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if resErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", resErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Got response from github")
 | 
						log.Debug().Msg("Got response from github")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Read the body of the response
 | 
						// Read the body of the response
 | 
				
			||||||
	body, err := io.ReadAll(res.Body)
 | 
						body, bodyErr := io.ReadAll(res.Body)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if bodyErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", bodyErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Read body from github")
 | 
						log.Debug().Msg("Read body from github")
 | 
				
			||||||
@@ -45,11 +45,11 @@ func GetGithubEmail(client *http.Client) (string, error) {
 | 
				
			|||||||
	var emails GithubUserInfoResponse
 | 
						var emails GithubUserInfoResponse
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Unmarshal the body into the user struct
 | 
						// Unmarshal the body into the user struct
 | 
				
			||||||
	err = json.Unmarshal(body, &emails)
 | 
						jsonErr := json.Unmarshal(body, &emails)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if jsonErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", jsonErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Parsed emails from github")
 | 
						log.Debug().Msg("Parsed emails from github")
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -20,21 +20,21 @@ func GoogleScopes() []string {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func GetGoogleEmail(client *http.Client) (string, error) {
 | 
					func GetGoogleEmail(client *http.Client) (string, error) {
 | 
				
			||||||
	// Get the user info from google using the oauth http client
 | 
						// Get the user info from google using the oauth http client
 | 
				
			||||||
	res, err := client.Get("https://www.googleapis.com/userinfo/v2/me")
 | 
						res, resErr := client.Get("https://www.googleapis.com/userinfo/v2/me")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if resErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", resErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Got response from google")
 | 
						log.Debug().Msg("Got response from google")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Read the body of the response
 | 
						// Read the body of the response
 | 
				
			||||||
	body, err := io.ReadAll(res.Body)
 | 
						body, bodyErr := io.ReadAll(res.Body)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if bodyErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", bodyErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Read body from google")
 | 
						log.Debug().Msg("Read body from google")
 | 
				
			||||||
@@ -43,11 +43,11 @@ func GetGoogleEmail(client *http.Client) (string, error) {
 | 
				
			|||||||
	var user GoogleUserInfoResponse
 | 
						var user GoogleUserInfoResponse
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Unmarshal the body into the user struct
 | 
						// Unmarshal the body into the user struct
 | 
				
			||||||
	err = json.Unmarshal(body, &user)
 | 
						jsonErr := json.Unmarshal(body, &user)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if jsonErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", jsonErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Parsed user from google")
 | 
						log.Debug().Msg("Parsed user from google")
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -128,11 +128,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
 | 
				
			|||||||
		log.Debug().Msg("Got client from github")
 | 
							log.Debug().Msg("Got client from github")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Get the email from the github provider
 | 
							// Get the email from the github provider
 | 
				
			||||||
		email, err := GetGithubEmail(client)
 | 
							email, emailErr := GetGithubEmail(client)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check if there was an error
 | 
							// Check if there was an error
 | 
				
			||||||
		if err != nil {
 | 
							if emailErr != nil {
 | 
				
			||||||
			return "", err
 | 
								return "", emailErr
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		log.Debug().Msg("Got email from github")
 | 
							log.Debug().Msg("Got email from github")
 | 
				
			||||||
@@ -152,11 +152,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
 | 
				
			|||||||
		log.Debug().Msg("Got client from google")
 | 
							log.Debug().Msg("Got client from google")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Get the email from the google provider
 | 
							// Get the email from the google provider
 | 
				
			||||||
		email, err := GetGoogleEmail(client)
 | 
							email, emailErr := GetGoogleEmail(client)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check if there was an error
 | 
							// Check if there was an error
 | 
				
			||||||
		if err != nil {
 | 
							if emailErr != nil {
 | 
				
			||||||
			return "", err
 | 
								return "", emailErr
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		log.Debug().Msg("Got email from google")
 | 
							log.Debug().Msg("Got email from google")
 | 
				
			||||||
@@ -176,11 +176,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
 | 
				
			|||||||
		log.Debug().Msg("Got client from tailscale")
 | 
							log.Debug().Msg("Got client from tailscale")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Get the email from the tailscale provider
 | 
							// Get the email from the tailscale provider
 | 
				
			||||||
		email, err := GetTailscaleEmail(client)
 | 
							email, emailErr := GetTailscaleEmail(client)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check if there was an error
 | 
							// Check if there was an error
 | 
				
			||||||
		if err != nil {
 | 
							if emailErr != nil {
 | 
				
			||||||
			return "", err
 | 
								return "", emailErr
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		log.Debug().Msg("Got email from tailscale")
 | 
							log.Debug().Msg("Got email from tailscale")
 | 
				
			||||||
@@ -200,11 +200,11 @@ func (providers *Providers) GetUser(provider string) (string, error) {
 | 
				
			|||||||
		log.Debug().Msg("Got client from generic")
 | 
							log.Debug().Msg("Got client from generic")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Get the email from the generic provider
 | 
							// Get the email from the generic provider
 | 
				
			||||||
		email, err := GetGenericEmail(client, providers.Config.GenericUserURL)
 | 
							email, emailErr := GetGenericEmail(client, providers.Config.GenericUserURL)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check if there was an error
 | 
							// Check if there was an error
 | 
				
			||||||
		if err != nil {
 | 
							if emailErr != nil {
 | 
				
			||||||
			return "", err
 | 
								return "", emailErr
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		log.Debug().Msg("Got email from generic")
 | 
							log.Debug().Msg("Got email from generic")
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -31,21 +31,21 @@ var TailscaleEndpoint = oauth2.Endpoint{
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func GetTailscaleEmail(client *http.Client) (string, error) {
 | 
					func GetTailscaleEmail(client *http.Client) (string, error) {
 | 
				
			||||||
	// Get the user info from tailscale using the oauth http client
 | 
						// Get the user info from tailscale using the oauth http client
 | 
				
			||||||
	res, err := client.Get("https://api.tailscale.com/api/v2/tailnet/-/users")
 | 
						res, resErr := client.Get("https://api.tailscale.com/api/v2/tailnet/-/users")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if resErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", resErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Got response from tailscale")
 | 
						log.Debug().Msg("Got response from tailscale")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Read the body of the response
 | 
						// Read the body of the response
 | 
				
			||||||
	body, err := io.ReadAll(res.Body)
 | 
						body, bodyErr := io.ReadAll(res.Body)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if bodyErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", bodyErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Read body from tailscale")
 | 
						log.Debug().Msg("Read body from tailscale")
 | 
				
			||||||
@@ -54,11 +54,11 @@ func GetTailscaleEmail(client *http.Client) (string, error) {
 | 
				
			|||||||
	var users TailscaleUserInfoResponse
 | 
						var users TailscaleUserInfoResponse
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Unmarshal the body into the user struct
 | 
						// Unmarshal the body into the user struct
 | 
				
			||||||
	err = json.Unmarshal(body, &users)
 | 
						jsonErr := json.Unmarshal(body, &users)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if jsonErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", jsonErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	log.Debug().Msg("Parsed users from tailscale")
 | 
						log.Debug().Msg("Parsed users from tailscale")
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,59 +0,0 @@
 | 
				
			|||||||
package types
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// LoginQuery is the query parameters for the login endpoint
 | 
					 | 
				
			||||||
type LoginQuery struct {
 | 
					 | 
				
			||||||
	RedirectURI string `url:"redirect_uri"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// LoginRequest is the request body for the login endpoint
 | 
					 | 
				
			||||||
type LoginRequest struct {
 | 
					 | 
				
			||||||
	Username string `json:"username"`
 | 
					 | 
				
			||||||
	Password string `json:"password"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// OAuthRequest is the request for the OAuth endpoint
 | 
					 | 
				
			||||||
type OAuthRequest struct {
 | 
					 | 
				
			||||||
	Provider string `uri:"provider" binding:"required"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// UnauthorizedQuery is the query parameters for the unauthorized endpoint
 | 
					 | 
				
			||||||
type UnauthorizedQuery struct {
 | 
					 | 
				
			||||||
	Username string `url:"username"`
 | 
					 | 
				
			||||||
	Resource string `url:"resource"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// TailscaleQuery is the query parameters for the tailscale endpoint
 | 
					 | 
				
			||||||
type TailscaleQuery struct {
 | 
					 | 
				
			||||||
	Code int `url:"code"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Proxy is the uri parameters for the proxy endpoint
 | 
					 | 
				
			||||||
type Proxy struct {
 | 
					 | 
				
			||||||
	Proxy string `uri:"proxy" binding:"required"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// User Context response is the response for the user context endpoint
 | 
					 | 
				
			||||||
type UserContextResponse struct {
 | 
					 | 
				
			||||||
	Status      int    `json:"status"`
 | 
					 | 
				
			||||||
	Message     string `json:"message"`
 | 
					 | 
				
			||||||
	IsLoggedIn  bool   `json:"isLoggedIn"`
 | 
					 | 
				
			||||||
	Username    string `json:"username"`
 | 
					 | 
				
			||||||
	Provider    string `json:"provider"`
 | 
					 | 
				
			||||||
	Oauth       bool   `json:"oauth"`
 | 
					 | 
				
			||||||
	TotpPending bool   `json:"totpPending"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// App Context is the response for the app context endpoint
 | 
					 | 
				
			||||||
type AppContext struct {
 | 
					 | 
				
			||||||
	Status              int      `json:"status"`
 | 
					 | 
				
			||||||
	Message             string   `json:"message"`
 | 
					 | 
				
			||||||
	ConfiguredProviders []string `json:"configuredProviders"`
 | 
					 | 
				
			||||||
	DisableContinue     bool     `json:"disableContinue"`
 | 
					 | 
				
			||||||
	Title               string   `json:"title"`
 | 
					 | 
				
			||||||
	GenericName         string   `json:"genericName"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Totp request is the request for the totp endpoint
 | 
					 | 
				
			||||||
type TotpRequest struct {
 | 
					 | 
				
			||||||
	Code string `json:"code"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,81 +0,0 @@
 | 
				
			|||||||
package types
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Config is the configuration for the tinyauth server
 | 
					 | 
				
			||||||
type Config struct {
 | 
					 | 
				
			||||||
	Port                      int    `mapstructure:"port" validate:"required"`
 | 
					 | 
				
			||||||
	Address                   string `validate:"required,ip4_addr" mapstructure:"address"`
 | 
					 | 
				
			||||||
	Secret                    string `validate:"required,len=32" mapstructure:"secret"`
 | 
					 | 
				
			||||||
	SecretFile                string `mapstructure:"secret-file"`
 | 
					 | 
				
			||||||
	AppURL                    string `validate:"required,url" mapstructure:"app-url"`
 | 
					 | 
				
			||||||
	Users                     string `mapstructure:"users"`
 | 
					 | 
				
			||||||
	UsersFile                 string `mapstructure:"users-file"`
 | 
					 | 
				
			||||||
	CookieSecure              bool   `mapstructure:"cookie-secure"`
 | 
					 | 
				
			||||||
	GithubClientId            string `mapstructure:"github-client-id"`
 | 
					 | 
				
			||||||
	GithubClientSecret        string `mapstructure:"github-client-secret"`
 | 
					 | 
				
			||||||
	GithubClientSecretFile    string `mapstructure:"github-client-secret-file"`
 | 
					 | 
				
			||||||
	GoogleClientId            string `mapstructure:"google-client-id"`
 | 
					 | 
				
			||||||
	GoogleClientSecret        string `mapstructure:"google-client-secret"`
 | 
					 | 
				
			||||||
	GoogleClientSecretFile    string `mapstructure:"google-client-secret-file"`
 | 
					 | 
				
			||||||
	TailscaleClientId         string `mapstructure:"tailscale-client-id"`
 | 
					 | 
				
			||||||
	TailscaleClientSecret     string `mapstructure:"tailscale-client-secret"`
 | 
					 | 
				
			||||||
	TailscaleClientSecretFile string `mapstructure:"tailscale-client-secret-file"`
 | 
					 | 
				
			||||||
	GenericClientId           string `mapstructure:"generic-client-id"`
 | 
					 | 
				
			||||||
	GenericClientSecret       string `mapstructure:"generic-client-secret"`
 | 
					 | 
				
			||||||
	GenericClientSecretFile   string `mapstructure:"generic-client-secret-file"`
 | 
					 | 
				
			||||||
	GenericScopes             string `mapstructure:"generic-scopes"`
 | 
					 | 
				
			||||||
	GenericAuthURL            string `mapstructure:"generic-auth-url"`
 | 
					 | 
				
			||||||
	GenericTokenURL           string `mapstructure:"generic-token-url"`
 | 
					 | 
				
			||||||
	GenericUserURL            string `mapstructure:"generic-user-url"`
 | 
					 | 
				
			||||||
	GenericName               string `mapstructure:"generic-name"`
 | 
					 | 
				
			||||||
	DisableContinue           bool   `mapstructure:"disable-continue"`
 | 
					 | 
				
			||||||
	OAuthWhitelist            string `mapstructure:"oauth-whitelist"`
 | 
					 | 
				
			||||||
	SessionExpiry             int    `mapstructure:"session-expiry"`
 | 
					 | 
				
			||||||
	LogLevel                  int8   `mapstructure:"log-level" validate:"min=-1,max=5"`
 | 
					 | 
				
			||||||
	Title                     string `mapstructure:"app-title"`
 | 
					 | 
				
			||||||
	EnvFile                   string `mapstructure:"env-file"`
 | 
					 | 
				
			||||||
	LoginTimeout              int    `mapstructure:"login-timeout"`
 | 
					 | 
				
			||||||
	LoginMaxRetries           int    `mapstructure:"login-max-retries"`
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// Server configuration
 | 
					 | 
				
			||||||
type HandlersConfig struct {
 | 
					 | 
				
			||||||
	AppURL          string
 | 
					 | 
				
			||||||
	DisableContinue bool
 | 
					 | 
				
			||||||
	GenericName     string
 | 
					 | 
				
			||||||
	Title           string
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// OAuthConfig is the configuration for the providers
 | 
					 | 
				
			||||||
type OAuthConfig struct {
 | 
					 | 
				
			||||||
	GithubClientId        string
 | 
					 | 
				
			||||||
	GithubClientSecret    string
 | 
					 | 
				
			||||||
	GoogleClientId        string
 | 
					 | 
				
			||||||
	GoogleClientSecret    string
 | 
					 | 
				
			||||||
	TailscaleClientId     string
 | 
					 | 
				
			||||||
	TailscaleClientSecret string
 | 
					 | 
				
			||||||
	GenericClientId       string
 | 
					 | 
				
			||||||
	GenericClientSecret   string
 | 
					 | 
				
			||||||
	GenericScopes         []string
 | 
					 | 
				
			||||||
	GenericAuthURL        string
 | 
					 | 
				
			||||||
	GenericTokenURL       string
 | 
					 | 
				
			||||||
	GenericUserURL        string
 | 
					 | 
				
			||||||
	AppURL                string
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// APIConfig is the configuration for the API
 | 
					 | 
				
			||||||
type APIConfig struct {
 | 
					 | 
				
			||||||
	Port    int
 | 
					 | 
				
			||||||
	Address string
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
// AuthConfig is the configuration for the auth service
 | 
					 | 
				
			||||||
type AuthConfig struct {
 | 
					 | 
				
			||||||
	Users           Users
 | 
					 | 
				
			||||||
	OauthWhitelist  []string
 | 
					 | 
				
			||||||
	SessionExpiry   int
 | 
					 | 
				
			||||||
	Secret          string
 | 
					 | 
				
			||||||
	CookieSecure    bool
 | 
					 | 
				
			||||||
	Domain          string
 | 
					 | 
				
			||||||
	LoginTimeout    int
 | 
					 | 
				
			||||||
	LoginMaxRetries int
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
@@ -1,9 +1,17 @@
 | 
				
			|||||||
package types
 | 
					package types
 | 
				
			||||||
 | 
					
 | 
				
			||||||
import (
 | 
					import "tinyauth/internal/oauth"
 | 
				
			||||||
	"time"
 | 
					
 | 
				
			||||||
	"tinyauth/internal/oauth"
 | 
					// LoginQuery is the query parameters for the login endpoint
 | 
				
			||||||
)
 | 
					type LoginQuery struct {
 | 
				
			||||||
 | 
						RedirectURI string `url:"redirect_uri"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// LoginRequest is the request body for the login endpoint
 | 
				
			||||||
 | 
					type LoginRequest struct {
 | 
				
			||||||
 | 
						Username string `json:"username"`
 | 
				
			||||||
 | 
						Password string `json:"password"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// User is the struct for a user
 | 
					// User is the struct for a user
 | 
				
			||||||
type User struct {
 | 
					type User struct {
 | 
				
			||||||
@@ -15,27 +23,39 @@ type User struct {
 | 
				
			|||||||
// Users is a list of users
 | 
					// Users is a list of users
 | 
				
			||||||
type Users []User
 | 
					type Users []User
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// OAuthProviders is the struct for the OAuth providers
 | 
					// Config is the configuration for the tinyauth server
 | 
				
			||||||
type OAuthProviders struct {
 | 
					type Config struct {
 | 
				
			||||||
	Github    *oauth.OAuth
 | 
						Port                      int    `mapstructure:"port" validate:"required"`
 | 
				
			||||||
	Google    *oauth.OAuth
 | 
						Address                   string `validate:"required,ip4_addr" mapstructure:"address"`
 | 
				
			||||||
	Microsoft *oauth.OAuth
 | 
						Secret                    string `validate:"required,len=32" mapstructure:"secret"`
 | 
				
			||||||
}
 | 
						SecretFile                string `mapstructure:"secret-file"`
 | 
				
			||||||
 | 
						AppURL                    string `validate:"required,url" mapstructure:"app-url"`
 | 
				
			||||||
// SessionCookie is the cookie for the session (exculding the expiry)
 | 
						Users                     string `mapstructure:"users"`
 | 
				
			||||||
type SessionCookie struct {
 | 
						UsersFile                 string `mapstructure:"users-file"`
 | 
				
			||||||
	Username    string
 | 
						CookieSecure              bool   `mapstructure:"cookie-secure"`
 | 
				
			||||||
	Provider    string
 | 
						GithubClientId            string `mapstructure:"github-client-id"`
 | 
				
			||||||
	TotpPending bool
 | 
						GithubClientSecret        string `mapstructure:"github-client-secret"`
 | 
				
			||||||
	RedirectURI string
 | 
						GithubClientSecretFile    string `mapstructure:"github-client-secret-file"`
 | 
				
			||||||
}
 | 
						GoogleClientId            string `mapstructure:"google-client-id"`
 | 
				
			||||||
 | 
						GoogleClientSecret        string `mapstructure:"google-client-secret"`
 | 
				
			||||||
// TinyauthLabels is the labels for the tinyauth container
 | 
						GoogleClientSecretFile    string `mapstructure:"google-client-secret-file"`
 | 
				
			||||||
type TinyauthLabels struct {
 | 
						TailscaleClientId         string `mapstructure:"tailscale-client-id"`
 | 
				
			||||||
	OAuthWhitelist []string
 | 
						TailscaleClientSecret     string `mapstructure:"tailscale-client-secret"`
 | 
				
			||||||
	Users          []string
 | 
						TailscaleClientSecretFile string `mapstructure:"tailscale-client-secret-file"`
 | 
				
			||||||
	Allowed        string
 | 
						GenericClientId           string `mapstructure:"generic-client-id"`
 | 
				
			||||||
	Headers        map[string]string
 | 
						GenericClientSecret       string `mapstructure:"generic-client-secret"`
 | 
				
			||||||
 | 
						GenericClientSecretFile   string `mapstructure:"generic-client-secret-file"`
 | 
				
			||||||
 | 
						GenericScopes             string `mapstructure:"generic-scopes"`
 | 
				
			||||||
 | 
						GenericAuthURL            string `mapstructure:"generic-auth-url"`
 | 
				
			||||||
 | 
						GenericTokenURL           string `mapstructure:"generic-token-url"`
 | 
				
			||||||
 | 
						GenericUserURL            string `mapstructure:"generic-user-url"`
 | 
				
			||||||
 | 
						GenericName               string `mapstructure:"generic-name"`
 | 
				
			||||||
 | 
						DisableContinue           bool   `mapstructure:"disable-continue"`
 | 
				
			||||||
 | 
						OAuthWhitelist            string `mapstructure:"oauth-whitelist"`
 | 
				
			||||||
 | 
						SessionExpiry             int    `mapstructure:"session-expiry"`
 | 
				
			||||||
 | 
						LogLevel                  int8   `mapstructure:"log-level" validate:"min=-1,max=5"`
 | 
				
			||||||
 | 
						Title                     string `mapstructure:"app-title"`
 | 
				
			||||||
 | 
						EnvFile                   string `mapstructure:"env-file"`
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// UserContext is the context for the user
 | 
					// UserContext is the context for the user
 | 
				
			||||||
@@ -47,9 +67,100 @@ type UserContext struct {
 | 
				
			|||||||
	TotpPending bool
 | 
						TotpPending bool
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// LoginAttempt tracks information about login attempts for rate limiting
 | 
					// APIConfig is the configuration for the API
 | 
				
			||||||
type LoginAttempt struct {
 | 
					type APIConfig struct {
 | 
				
			||||||
	FailedAttempts int
 | 
						Port            int
 | 
				
			||||||
	LastAttempt    time.Time
 | 
						Address         string
 | 
				
			||||||
	LockedUntil    time.Time
 | 
						Secret          string
 | 
				
			||||||
 | 
						AppURL          string
 | 
				
			||||||
 | 
						CookieSecure    bool
 | 
				
			||||||
 | 
						SessionExpiry   int
 | 
				
			||||||
 | 
						DisableContinue bool
 | 
				
			||||||
 | 
						GenericName     string
 | 
				
			||||||
 | 
						Title           string
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// OAuthConfig is the configuration for the providers
 | 
				
			||||||
 | 
					type OAuthConfig struct {
 | 
				
			||||||
 | 
						GithubClientId        string
 | 
				
			||||||
 | 
						GithubClientSecret    string
 | 
				
			||||||
 | 
						GoogleClientId        string
 | 
				
			||||||
 | 
						GoogleClientSecret    string
 | 
				
			||||||
 | 
						TailscaleClientId     string
 | 
				
			||||||
 | 
						TailscaleClientSecret string
 | 
				
			||||||
 | 
						GenericClientId       string
 | 
				
			||||||
 | 
						GenericClientSecret   string
 | 
				
			||||||
 | 
						GenericScopes         []string
 | 
				
			||||||
 | 
						GenericAuthURL        string
 | 
				
			||||||
 | 
						GenericTokenURL       string
 | 
				
			||||||
 | 
						GenericUserURL        string
 | 
				
			||||||
 | 
						AppURL                string
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// OAuthRequest is the request for the OAuth endpoint
 | 
				
			||||||
 | 
					type OAuthRequest struct {
 | 
				
			||||||
 | 
						Provider string `uri:"provider" binding:"required"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// OAuthProviders is the struct for the OAuth providers
 | 
				
			||||||
 | 
					type OAuthProviders struct {
 | 
				
			||||||
 | 
						Github    *oauth.OAuth
 | 
				
			||||||
 | 
						Google    *oauth.OAuth
 | 
				
			||||||
 | 
						Microsoft *oauth.OAuth
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// UnauthorizedQuery is the query parameters for the unauthorized endpoint
 | 
				
			||||||
 | 
					type UnauthorizedQuery struct {
 | 
				
			||||||
 | 
						Username string `url:"username"`
 | 
				
			||||||
 | 
						Resource string `url:"resource"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// SessionCookie is the cookie for the session (exculding the expiry)
 | 
				
			||||||
 | 
					type SessionCookie struct {
 | 
				
			||||||
 | 
						Username    string
 | 
				
			||||||
 | 
						Provider    string
 | 
				
			||||||
 | 
						TotpPending bool
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// TinyauthLabels is the labels for the tinyauth container
 | 
				
			||||||
 | 
					type TinyauthLabels struct {
 | 
				
			||||||
 | 
						OAuthWhitelist []string
 | 
				
			||||||
 | 
						Users          []string
 | 
				
			||||||
 | 
						Allowed        string
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// TailscaleQuery is the query parameters for the tailscale endpoint
 | 
				
			||||||
 | 
					type TailscaleQuery struct {
 | 
				
			||||||
 | 
						Code int `url:"code"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// Proxy is the uri parameters for the proxy endpoint
 | 
				
			||||||
 | 
					type Proxy struct {
 | 
				
			||||||
 | 
						Proxy string `uri:"proxy" binding:"required"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// User Context response is the response for the user context endpoint
 | 
				
			||||||
 | 
					type UserContextResponse struct {
 | 
				
			||||||
 | 
						Status      int    `json:"status"`
 | 
				
			||||||
 | 
						Message     string `json:"message"`
 | 
				
			||||||
 | 
						IsLoggedIn  bool   `json:"isLoggedIn"`
 | 
				
			||||||
 | 
						Username    string `json:"username"`
 | 
				
			||||||
 | 
						Provider    string `json:"provider"`
 | 
				
			||||||
 | 
						Oauth       bool   `json:"oauth"`
 | 
				
			||||||
 | 
						TotpPending bool   `json:"totpPending"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// App Context is the response for the app context endpoint
 | 
				
			||||||
 | 
					type AppContext struct {
 | 
				
			||||||
 | 
						Status              int      `json:"status"`
 | 
				
			||||||
 | 
						Message             string   `json:"message"`
 | 
				
			||||||
 | 
						ConfiguredProviders []string `json:"configuredProviders"`
 | 
				
			||||||
 | 
						DisableContinue     bool     `json:"disableContinue"`
 | 
				
			||||||
 | 
						Title               string   `json:"title"`
 | 
				
			||||||
 | 
						GenericName         string   `json:"genericName"`
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// Totp request is the request for the totp endpoint
 | 
				
			||||||
 | 
					type TotpRequest struct {
 | 
				
			||||||
 | 
						Code string `json:"code"`
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -29,11 +29,11 @@ func ParseUsers(users string) (types.Users, error) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	// Loop through the users and split them by colon
 | 
						// Loop through the users and split them by colon
 | 
				
			||||||
	for _, user := range userList {
 | 
						for _, user := range userList {
 | 
				
			||||||
		parsed, err := ParseUser(user)
 | 
							parsed, parseErr := ParseUser(user)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Check if there was an error
 | 
							// Check if there was an error
 | 
				
			||||||
		if err != nil {
 | 
							if parseErr != nil {
 | 
				
			||||||
			return types.Users{}, err
 | 
								return types.Users{}, parseErr
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// Append the user to the users struct
 | 
							// Append the user to the users struct
 | 
				
			||||||
@@ -46,14 +46,14 @@ func ParseUsers(users string) (types.Users, error) {
 | 
				
			|||||||
	return usersParsed, nil
 | 
						return usersParsed, nil
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Get upper domain parses a hostname and returns the upper domain (e.g. sub1.sub2.domain.com -> sub2.domain.com)
 | 
					// Root url parses parses a hostname and returns the root domain (e.g. sub1.sub2.domain.com -> sub2.domain.com)
 | 
				
			||||||
func GetUpperDomain(urlSrc string) (string, error) {
 | 
					func GetRootURL(urlSrc string) (string, error) {
 | 
				
			||||||
	// Make sure the url is valid
 | 
						// Make sure the url is valid
 | 
				
			||||||
	urlParsed, err := url.Parse(urlSrc)
 | 
						urlParsed, parseErr := url.Parse(urlSrc)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if parseErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", parseErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Split the hostname by period
 | 
						// Split the hostname by period
 | 
				
			||||||
@@ -69,19 +69,19 @@ func GetUpperDomain(urlSrc string) (string, error) {
 | 
				
			|||||||
// Reads a file and returns the contents
 | 
					// Reads a file and returns the contents
 | 
				
			||||||
func ReadFile(file string) (string, error) {
 | 
					func ReadFile(file string) (string, error) {
 | 
				
			||||||
	// Check if the file exists
 | 
						// Check if the file exists
 | 
				
			||||||
	_, err := os.Stat(file)
 | 
						_, statErr := os.Stat(file)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if statErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", statErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Read the file
 | 
						// Read the file
 | 
				
			||||||
	data, err := os.ReadFile(file)
 | 
						data, readErr := os.ReadFile(file)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if readErr != nil {
 | 
				
			||||||
		return "", err
 | 
							return "", readErr
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Return the file contents
 | 
						// Return the file contents
 | 
				
			||||||
@@ -152,10 +152,10 @@ func GetUsers(conf string, file string) (types.Users, error) {
 | 
				
			|||||||
	// If the file is set, read the file and append the users to the users string
 | 
						// If the file is set, read the file and append the users to the users string
 | 
				
			||||||
	if file != "" {
 | 
						if file != "" {
 | 
				
			||||||
		// Read the file
 | 
							// Read the file
 | 
				
			||||||
		contents, err := ReadFile(file)
 | 
							fileContents, fileErr := ReadFile(file)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		// If there isn't an error we can append the users to the users string
 | 
							// If there isn't an error we can append the users to the users string
 | 
				
			||||||
		if err == nil {
 | 
							if fileErr == nil {
 | 
				
			||||||
			log.Debug().Msg("Using users from file")
 | 
								log.Debug().Msg("Using users from file")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Append the users to the users string
 | 
								// Append the users to the users string
 | 
				
			||||||
@@ -164,7 +164,7 @@ func GetUsers(conf string, file string) (types.Users, error) {
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Parse the file contents into a comma separated list of users
 | 
								// Parse the file contents into a comma separated list of users
 | 
				
			||||||
			users += ParseFileToLine(contents)
 | 
								users += ParseFileToLine(fileContents)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -193,16 +193,6 @@ func GetTinyauthLabels(labels map[string]string) types.TinyauthLabels {
 | 
				
			|||||||
				tinyauthLabels.Users = strings.Split(value, ",")
 | 
									tinyauthLabels.Users = strings.Split(value, ",")
 | 
				
			||||||
			case "tinyauth.allowed":
 | 
								case "tinyauth.allowed":
 | 
				
			||||||
				tinyauthLabels.Allowed = value
 | 
									tinyauthLabels.Allowed = value
 | 
				
			||||||
			case "tinyauth.headers":
 | 
					 | 
				
			||||||
				tinyauthLabels.Headers = make(map[string]string)
 | 
					 | 
				
			||||||
				headers := strings.Split(value, ",")
 | 
					 | 
				
			||||||
				for _, header := range headers {
 | 
					 | 
				
			||||||
					headerSplit := strings.Split(header, "=")
 | 
					 | 
				
			||||||
					if len(headerSplit) != 2 {
 | 
					 | 
				
			||||||
						continue
 | 
					 | 
				
			||||||
					}
 | 
					 | 
				
			||||||
					tinyauthLabels.Headers[headerSplit[0]] = headerSplit[1]
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -38,15 +38,15 @@ func TestParseUsers(t *testing.T) {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Test the get upper domain function
 | 
					// Test the get root url function
 | 
				
			||||||
func TestGetUpperDomain(t *testing.T) {
 | 
					func TestGetRootURL(t *testing.T) {
 | 
				
			||||||
	t.Log("Testing get upper domain with a valid url")
 | 
						t.Log("Testing get root url with a valid url")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Test the get upper domain function with a valid url
 | 
						// Test the get root url function with a valid url
 | 
				
			||||||
	url := "https://sub1.sub2.domain.com:8080"
 | 
						url := "https://sub1.sub2.domain.com:8080"
 | 
				
			||||||
	expected := "sub2.domain.com"
 | 
						expected := "sub2.domain.com"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	result, err := utils.GetUpperDomain(url)
 | 
						result, err := utils.GetRootURL(url)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Check if there was an error
 | 
						// Check if there was an error
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
@@ -102,7 +102,7 @@ func TestParseFileToLine(t *testing.T) {
 | 
				
			|||||||
	t.Log("Testing parse file to line with a valid string")
 | 
						t.Log("Testing parse file to line with a valid string")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Test the parse file to line function with a valid string
 | 
						// Test the parse file to line function with a valid string
 | 
				
			||||||
	content := "\nuser1:pass1\nuser2:pass2\n"
 | 
						content := "user1:pass1\nuser2:pass2"
 | 
				
			||||||
	expected := "user1:pass1,user2:pass2"
 | 
						expected := "user1:pass1,user2:pass2"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	result := utils.ParseFileToLine(content)
 | 
						result := utils.ParseFileToLine(content)
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										0
									
								
								frontend/.gitignore → site/.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
							
								
								
									
										23
									
								
								site/Dockerfile.dev
									
									
									
									
									
										Normal file
									
								
							
							
						
						@@ -0,0 +1,23 @@
 | 
				
			|||||||
 | 
					FROM oven/bun:1.1.45-alpine
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					WORKDIR /site
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					COPY ./site/package.json ./
 | 
				
			||||||
 | 
					COPY ./site/bun.lockb ./
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					RUN bun install
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					COPY ./site/public ./public
 | 
				
			||||||
 | 
					COPY ./site/src ./src
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					COPY ./site/eslint.config.js ./
 | 
				
			||||||
 | 
					COPY ./site/index.html ./
 | 
				
			||||||
 | 
					COPY ./site/tsconfig.json ./
 | 
				
			||||||
 | 
					COPY ./site/tsconfig.app.json ./
 | 
				
			||||||
 | 
					COPY ./site/tsconfig.node.json ./
 | 
				
			||||||
 | 
					COPY ./site/vite.config.ts ./
 | 
				
			||||||
 | 
					COPY ./site/postcss.config.cjs ./
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					EXPOSE 5173
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					ENTRYPOINT ["bun", "run", "dev"]
 | 
				
			||||||
							
								
								
									
										
											BIN
										
									
								
								site/bun.lockb
									
									
									
									
									
										Executable file
									
								
							
							
						
						@@ -6,7 +6,7 @@
 | 
				
			|||||||
    <link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png" />
 | 
					    <link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png" />
 | 
				
			||||||
    <link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png" />
 | 
					    <link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png" />
 | 
				
			||||||
    <link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png" />
 | 
					    <link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png" />
 | 
				
			||||||
    <link rel="manifest" href="/frontend.webmanifest" />
 | 
					    <link rel="manifest" href="/site.webmanifest" />
 | 
				
			||||||
    <title>Tinyauth</title>
 | 
					    <title>Tinyauth</title>
 | 
				
			||||||
  </head>
 | 
					  </head>
 | 
				
			||||||
  <body>
 | 
					  <body>
 | 
				
			||||||
@@ -1,11 +1,11 @@
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
  "name": "frontend",
 | 
					  "name": "site",
 | 
				
			||||||
  "version": "0.0.0",
 | 
					  "version": "0.0.0",
 | 
				
			||||||
  "lockfileVersion": 3,
 | 
					  "lockfileVersion": 3,
 | 
				
			||||||
  "requires": true,
 | 
					  "requires": true,
 | 
				
			||||||
  "packages": {
 | 
					  "packages": {
 | 
				
			||||||
    "": {
 | 
					    "": {
 | 
				
			||||||
      "name": "frontend",
 | 
					      "name": "site",
 | 
				
			||||||
      "version": "0.0.0",
 | 
					      "version": "0.0.0",
 | 
				
			||||||
      "dependencies": {
 | 
					      "dependencies": {
 | 
				
			||||||
        "@mantine/core": "^7.16.0",
 | 
					        "@mantine/core": "^7.16.0",
 | 
				
			||||||
@@ -1,5 +1,5 @@
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
  "name": "frontend",
 | 
					  "name": "site",
 | 
				
			||||||
  "private": true,
 | 
					  "private": true,
 | 
				
			||||||
  "version": "0.0.0",
 | 
					  "version": "0.0.0",
 | 
				
			||||||
  "type": "module",
 | 
					  "type": "module",
 | 
				
			||||||
@@ -16,14 +16,8 @@
 | 
				
			|||||||
    "@mantine/notifications": "^7.16.0",
 | 
					    "@mantine/notifications": "^7.16.0",
 | 
				
			||||||
    "@tanstack/react-query": "4",
 | 
					    "@tanstack/react-query": "4",
 | 
				
			||||||
    "axios": "^1.7.9",
 | 
					    "axios": "^1.7.9",
 | 
				
			||||||
    "i18next": "^24.2.3",
 | 
					 | 
				
			||||||
    "i18next-browser-languagedetector": "^8.0.4",
 | 
					 | 
				
			||||||
    "i18next-chained-backend": "^4.6.2",
 | 
					 | 
				
			||||||
    "i18next-http-backend": "^3.0.2",
 | 
					 | 
				
			||||||
    "i18next-resources-to-backend": "^1.2.1",
 | 
					 | 
				
			||||||
    "react": "^18.3.1",
 | 
					    "react": "^18.3.1",
 | 
				
			||||||
    "react-dom": "^18.3.1",
 | 
					    "react-dom": "^18.3.1",
 | 
				
			||||||
    "react-i18next": "^15.4.1",
 | 
					 | 
				
			||||||
    "react-router": "^7.1.3",
 | 
					    "react-router": "^7.1.3",
 | 
				
			||||||
    "zod": "^3.24.1"
 | 
					    "zod": "^3.24.1"
 | 
				
			||||||
  },
 | 
					  },
 | 
				
			||||||
| 
		 Before Width: | Height: | Size: 15 KiB After Width: | Height: | Size: 15 KiB  | 
| 
		 Before Width: | Height: | Size: 46 KiB After Width: | Height: | Size: 46 KiB  | 
| 
		 Before Width: | Height: | Size: 13 KiB After Width: | Height: | Size: 13 KiB  | 
| 
		 Before Width: | Height: | Size: 602 B After Width: | Height: | Size: 602 B  | 
| 
		 Before Width: | Height: | Size: 1.4 KiB After Width: | Height: | Size: 1.4 KiB  | 
| 
		 Before Width: | Height: | Size: 15 KiB After Width: | Height: | Size: 15 KiB  | 
| 
		 Before Width: | Height: | Size: 35 KiB After Width: | Height: | Size: 35 KiB  | 
@@ -1,7 +1,6 @@
 | 
				
			|||||||
import { TextInput, PasswordInput, Button } from "@mantine/core";
 | 
					import { TextInput, PasswordInput, Button } from "@mantine/core";
 | 
				
			||||||
import { useForm, zodResolver } from "@mantine/form";
 | 
					import { useForm, zodResolver } from "@mantine/form";
 | 
				
			||||||
import { LoginFormValues, loginSchema } from "../../schemas/login-schema";
 | 
					import { LoginFormValues, loginSchema } from "../../schemas/login-schema";
 | 
				
			||||||
import { useTranslation } from "react-i18next";
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
interface LoginFormProps {
 | 
					interface LoginFormProps {
 | 
				
			||||||
  isLoading: boolean;
 | 
					  isLoading: boolean;
 | 
				
			||||||
@@ -10,7 +9,6 @@ interface LoginFormProps {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
export const LoginForm = (props: LoginFormProps) => {
 | 
					export const LoginForm = (props: LoginFormProps) => {
 | 
				
			||||||
  const { isLoading, onSubmit } = props;
 | 
					  const { isLoading, onSubmit } = props;
 | 
				
			||||||
  const { t } = useTranslation();
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
  const form = useForm({
 | 
					  const form = useForm({
 | 
				
			||||||
    mode: "uncontrolled",
 | 
					    mode: "uncontrolled",
 | 
				
			||||||
@@ -24,7 +22,7 @@ export const LoginForm = (props: LoginFormProps) => {
 | 
				
			|||||||
  return (
 | 
					  return (
 | 
				
			||||||
    <form onSubmit={form.onSubmit(onSubmit)}>
 | 
					    <form onSubmit={form.onSubmit(onSubmit)}>
 | 
				
			||||||
      <TextInput
 | 
					      <TextInput
 | 
				
			||||||
        label={t("loginUsername")}
 | 
					        label="Username"
 | 
				
			||||||
        placeholder="user@example.com"
 | 
					        placeholder="user@example.com"
 | 
				
			||||||
        required
 | 
					        required
 | 
				
			||||||
        disabled={isLoading}
 | 
					        disabled={isLoading}
 | 
				
			||||||
@@ -32,7 +30,7 @@ export const LoginForm = (props: LoginFormProps) => {
 | 
				
			|||||||
        {...form.getInputProps("username")}
 | 
					        {...form.getInputProps("username")}
 | 
				
			||||||
      />
 | 
					      />
 | 
				
			||||||
      <PasswordInput
 | 
					      <PasswordInput
 | 
				
			||||||
        label={t("loginPassword")}
 | 
					        label="Password"
 | 
				
			||||||
        placeholder="password"
 | 
					        placeholder="password"
 | 
				
			||||||
        required
 | 
					        required
 | 
				
			||||||
        mt="md"
 | 
					        mt="md"
 | 
				
			||||||
@@ -41,7 +39,7 @@ export const LoginForm = (props: LoginFormProps) => {
 | 
				
			|||||||
        {...form.getInputProps("password")}
 | 
					        {...form.getInputProps("password")}
 | 
				
			||||||
      />
 | 
					      />
 | 
				
			||||||
      <Button fullWidth mt="xl" type="submit" loading={isLoading}>
 | 
					      <Button fullWidth mt="xl" type="submit" loading={isLoading}>
 | 
				
			||||||
        {t("loginSubmit")}
 | 
					        Login
 | 
				
			||||||
      </Button>
 | 
					      </Button>
 | 
				
			||||||
    </form>
 | 
					    </form>
 | 
				
			||||||
  );
 | 
					  );
 | 
				
			||||||
							
								
								
									
										12
									
								
								site/src/components/layouts/layout.tsx
									
									
									
									
									
										Normal file
									
								
							
							
						
						@@ -0,0 +1,12 @@
 | 
				
			|||||||
 | 
					import { Center, Flex } from "@mantine/core";
 | 
				
			||||||
 | 
					import { ReactNode } from "react";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					export const Layout = ({ children }: { children: ReactNode }) => {
 | 
				
			||||||
 | 
					  return (
 | 
				
			||||||
 | 
					    <Center style={{ minHeight: "100vh" }}>
 | 
				
			||||||
 | 
					      <Flex direction="column" flex="1" maw={350}>
 | 
				
			||||||
 | 
					        {children}
 | 
				
			||||||
 | 
					      </Flex>
 | 
				
			||||||
 | 
					    </Center>
 | 
				
			||||||
 | 
					  );
 | 
				
			||||||
 | 
					};
 | 
				
			||||||